CN111526582A - Random access method, equipment and device - Google Patents

Random access method, equipment and device Download PDF

Info

Publication number
CN111526582A
CN111526582A CN201910102928.3A CN201910102928A CN111526582A CN 111526582 A CN111526582 A CN 111526582A CN 201910102928 A CN201910102928 A CN 201910102928A CN 111526582 A CN111526582 A CN 111526582A
Authority
CN
China
Prior art keywords
terminal
step rach
base station
initiating
alternatively
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910102928.3A
Other languages
Chinese (zh)
Inventor
谌丽
皮埃尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Mobile Communications Equipment Co Ltd
Original Assignee
Telecommunications Science and Technology Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telecommunications Science and Technology Research Institute Co Ltd filed Critical Telecommunications Science and Technology Research Institute Co Ltd
Priority to CN201910102928.3A priority Critical patent/CN111526582A/en
Priority to CN202311797927.8A priority patent/CN117750518A/en
Priority to PCT/CN2020/072321 priority patent/WO2020156188A1/en
Publication of CN111526582A publication Critical patent/CN111526582A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/541Allocation or scheduling criteria for wireless resources based on quality criteria using the level of interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/542Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure

Abstract

The invention discloses a random access method, equipment and a device, comprising the following steps: the base station configures a rule for allowing the two-step random access for the terminal; and when the terminal initiates random access according to the rule, executing the random access for the terminal. The terminal determines that the base station configures a rule allowing two-step random access for the terminal; and initiating two-step random access or four-step random access according to the rule. The invention can improve the success rate of initiating random access according to the conditions of the network and the terminal, reduce or even eliminate uplink interference caused by two-step random access, improve the transmission accuracy of uplink data, and improve the transmission efficiency of the whole network due to the reduction of the uplink interference to other terminals.

Description

Random access method, equipment and device
Technical Field
The present invention relates to the field of wireless communications technologies, and in particular, to a random access method, device, and apparatus.
Background
Random access of LTE (Long Term Evolution) and NR (New Radio) systems is classified into two types, namely contention random access and non-contention random access. The process is as follows:
fig. 1 is a schematic diagram of a contention Random Access procedure, which is mainly divided into four steps as shown in the figure, and is called a 4-step RACH (Random Access Channel):
msg 1: a UE (User Equipment, i.e. a terminal) selects a Random Access preamble and a PRACH (Physical Random Access Channel) resource and transmits the selected Random Access preamble to a base station by using the PRACH resource.
Msg 2: and the base station receives the preamble and sends a random access response. The random access response contains two parts: a MAC (Media Access Control) header and a MAC RAR (Random Access Response). The MAC header includes a plurality of sub-headers, whose main contents are RAPID (Random Access Preamble ID) and Backoff parameter BI (Backoff Indicator), and fig. 2 is a schematic diagram of the MAC sub-header with RAPID. Fig. 3 is a schematic diagram of a MAC RAR, which includes a timing Advance TAC (Time Advance Command), an uplink resource Grant (UL Grant) for Msg3, and a temporal C-RNTI (Temporary C-RNTI; C-RNTI: Cell-Radio Network temporal identity) allocated by a Network side. A Physical Downlink Control Channel (PDCCH) carrying the Msg2 scheduling information is scrambled by using a Random Access-Radio Network Temporary Identity (RA-RNTI), and the RA-RNTI uniquely corresponds to a time-frequency resource for transmitting the Msg1 within a window length of receiving the Msg2 by the UE. When the UE receives the Msg2, the Msg2 is determined to correspond to the Msg1 sent by the UE through the RA-RNTI and the preamble ID.
Msg 3: the UE sends uplink transmission on the UL grant designated by the Msg2, the uplink transmission content is different for different random access reasons Msg3, for example, for initial access, the Msg3 transmits an RRC (Radio Resource Control) connection establishment request, and the connected UE sends C-RNTI MAC CE (Control Element) in the Msg 3.
Msg 4: and the UE can judge whether the random access is successful according to the Msg 4. For idle UE (idle UE) or inactive UE (inactive UE), Msg4 carries CCCH (common control Channel) MAC CE corresponding to RRC signaling of Msg3, and for connected UE, Msg4 performs contention resolution by using PDCCH with unique C-RNTI in the UE cell. For idle UE or inactive UE, after the competition resolving is successful, the temporary C-RNTI is converted into the unique UE identity C-RNTI of the UE in the cell.
Fig. 4 is a schematic diagram of a non-contention random access process, where the non-contention random access process is mainly divided into three steps as shown in the figure:
msg 0: the base station allocates a dedicated preamble for non-contention random access and a PRACH resource used by random access to the UE.
Msg 1: and the UE sends the appointed special preamble to the base station on the appointed PRACH resource according to the instruction of the Msg 0. And after receiving the Msg1, the base station calculates an uplink TA (Timing Advance) according to the Msg 1.
Msg 2: and the base station sends a random access response to the UE, wherein the random access response comprises timing advance information and a subsequent uplink transmission resource allocation (UL grant), and the timing advance is used for the timing relation of the subsequent uplink transmission of the UE.
In the new generation of wireless network NR system, a two-step Random access procedure (2-step RACH) is introduced based on 4-step RACH (Random access), and fig. 5 is a schematic diagram of the 2-step RACH access procedure, and the procedure is shown in the figure. The 2-step RACH is a contention random access and needs to complete contention resolution.
The defects of the prior art are that the 2-step RACH resource occupation and the failure probability are large, if the 2-step RACH resource occupation and the failure probability are not limited, the random access failure probability and the wireless resource occupation are large, and uplink interference to other terminals is caused at the same time, so that the whole network transmission efficiency is reduced.
Disclosure of Invention
The invention provides a random access method, equipment and a device, which are used for solving the problem caused by no limitation on a 2-step RACH.
The embodiment of the invention provides a random access method, which comprises the following steps:
configuring a rule for a terminal to allow a two-step random access 2-step RACH to be used;
and when the terminal initiates random access according to the rule, executing the random access for the terminal.
In an implementation, the rules include one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
In the implementation, when the base station notifies the terminal in the system message whether the cell supports the 2-step RACH, the method further includes:
if the base station supports the 2-step RACH, the base station configures preamble codes and PRACH resources of msgA in the 2-step RACH and PUSCH resources corresponding to the msgA in the system message.
In implementation, the condition that the base station informs the terminal to initiate the 2-step RACH in the system message includes one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and the NR channel of the 2-step RACH is initiated to occupy the time NR COT threshold, and the terminal can initiate the 2-step RACH when the NR COT is lower than the NR COT threshold.
In implementation, the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
when the base station carries out the configuration of the 2-step RACH resources, the effective time length is configured, and if the effective time length is exceeded, the 2-step RACH resources are invalid.
The embodiment of the invention provides a random access method, which comprises the following steps:
determining that the base station configures rules for the terminal to allow the use of the 2-step RACH;
initiating a 2-step RACH or initiating a 4-step RACH according to the rule.
In an implementation, the rules include one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
In the implementation, when the base station notifies the terminal in the system message whether the cell supports the 2-step RACH, the method further includes:
and if the base station supports the 2-step RACH, receiving preamble codes and PRACH resources of msgA in the 2-step RACH configured in the system message by the base station and PUSCH resources corresponding to the msgA.
In implementation, the condition that the base station informs the terminal to initiate the 2-step RACH in the system message includes one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and initiating an NR COT threshold of the 2-step RACH, and when the NR COT is lower than the NR COT threshold, the terminal can initiate the 2-step RACH.
In implementation, the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
when the base station carries out the configuration of the 2-step RACH resources, the effective time length is configured, and if the effective time length is exceeded, the 2-step RACH resources are invalid.
An embodiment of the present invention provides a base station, including:
a processor for reading the program in the memory, performing the following processes:
configuring a rule for the terminal to allow the use of the 2-step RACH;
when the terminal initiates random access according to the rule, random access is executed for the terminal;
a transceiver for receiving and transmitting data under the control of the processor.
In an implementation, the rules include one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
In the implementation, when the base station notifies the terminal in the system message whether the cell supports the 2-step RACH, the method further includes:
if the base station supports the 2-step RACH, the base station configures preamble codes and PRACH resources of msgA in the 2-step RACH and PUSCH resources corresponding to the msgA in the system message.
In implementation, the condition that the base station informs the terminal to initiate the 2-step RACH in the system message includes one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and initiating an NR COT threshold of the 2-step RACH, and when the NR COT is lower than the NR COT threshold, the terminal can initiate the 2-step RACH.
In implementation, the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
when the base station carries out the configuration of the 2-step RACH resources, the effective time length is configured, and if the effective time length is exceeded, the 2-step RACH resources are invalid.
An embodiment of the present invention provides a terminal, including:
a processor for reading the program in the memory, performing the following processes:
determining that the base station configures rules for the terminal to allow the use of the 2-step RACH;
initiating a 2-step RACH or a 4-step RACH according to the rule;
a transceiver for receiving and transmitting data under the control of the processor.
In an implementation, the rules include one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
In the implementation, when the base station notifies the terminal in the system message whether the cell supports the 2-step RACH, the method further includes:
and if the base station supports the 2-step RACH, receiving preamble codes and PRACH resources of msgA in the 2-step RACH configured in the system message by the base station and PUSCH resources corresponding to the msgA.
In implementation, the condition that the base station informs the terminal to initiate the 2-step RACH in the system message includes one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and initiating an NR COT threshold of the 2-step RACH, and when the NR COT is lower than the NR COT threshold, the terminal can initiate the 2-step RACH.
In implementation, the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
when the base station carries out the configuration of the 2-step RACH resources, the effective time length is configured, and if the effective time length is exceeded, the 2-step RACH resources are invalid.
An embodiment of the present invention provides a random access apparatus, including:
a configuration module for configuring a rule for a terminal that allows the use of a two-step random access 2-step RACH;
and the random access module is used for executing random access for the terminal when the terminal initiates random access according to the rule.
An embodiment of the present invention provides a random access apparatus, including:
a determining module, configured to determine that the base station configures a rule for the terminal that allows using the 2-step RACH;
and the initiating module is used for initiating the 2-step RACH or initiating the 4-step RACH according to the rule.
An embodiment of the present invention provides a computer-readable storage medium, which stores a computer program for executing the random access method.
The invention has the following beneficial effects:
in the technical scheme provided by the embodiment of the invention, as the base station configures the rule allowing the use of the 2-step RACH for the terminal, on one hand, after the terminal determines that the base station configures the rule allowing the use of the 2-step RACH for the terminal, the terminal can initiate the 2-step RACH or initiate the 4-step RACH according to the rule; and the base station executes random access for the terminal when the terminal initiates random access according to the rule. Therefore, since the base station can provide the rule of 2-step RACH access, the terminal has selectivity, so the success rate of initiating random access can be improved according to the conditions of the network and the terminal, the uplink interference caused by the 2-step RACH is reduced or even eliminated, the uplink data transmission accuracy is improved, and the transmission efficiency of the whole network can be improved due to the reduction of the uplink interference to other terminals.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a diagram illustrating a contention random access procedure in the background art;
FIG. 2 is a diagram of a MAC subheader with RAPID in the background art;
FIG. 3 is a diagram of a MAC RAR in the background art;
FIG. 4 is a diagram illustrating a non-contention random access procedure in the background art;
FIG. 5 is a diagram illustrating a 2-step RACH access procedure in the background art;
fig. 6 is a schematic flow chart of an implementation of a network side random access method in an embodiment of the present invention;
fig. 7 is a schematic flow chart of an implementation of a random access method at a terminal side in an embodiment of the present invention;
FIG. 8 is a diagram illustrating a base station structure according to an embodiment of the present invention;
fig. 9 is a schematic diagram of a terminal structure in an embodiment of the present invention.
Detailed Description
The inventor notices in the process of invention that:
the first step of the 2-step RACH needs to send PUSCH (Physical Uplink Shared Channel) transmission, at this time, the terminal and the base station have not achieved Uplink synchronization yet, data sent by the terminal has intersymbol interference, the base station is likely not to correctly receive the transmission of msgA on the PUSCH, and the terminal is also likely to cause interference to other terminals, so that the transmission of other terminals is not correctly performed. Therefore, the terminal cannot always successfully initiate the 2-step RACH, and thus measures need to be taken to control the 2-step RACH.
Based on this, the present invention provides a random access scheme, and the following describes a specific embodiment of the present invention with reference to the accompanying drawings.
In the description process, the implementation of the terminal and the base station side will be described separately, and then an example of the implementation of the two in cooperation will be given to better understand the implementation of the scheme given in the embodiment of the present invention. Such an explanation does not mean that the two must be implemented in cooperation or separately, and actually, when the terminal and the base station are implemented separately, the problems on the terminal side and the base station side are solved separately, and when the two are used in combination, a better technical effect is obtained.
Fig. 6 is a schematic flow chart of an implementation of a random access method on a network side, as shown in the figure, the method may include:
step 601, configuring a rule allowing to use 2-step RACH for a terminal;
step 602, when the terminal initiates random access according to the rule, random access is executed for the terminal.
Fig. 7 is a schematic flowchart of an implementation process of a terminal-side random access method, as shown in the figure, the implementation process may include:
step 701, determining that a base station configures rules allowing the use of the 2-step RACH for a terminal;
step 702, initiating 2-step RACH or initiating 4-step RACH according to the rule.
In implementation, the base station configures the terminal with a rule allowing the use of 2-step RACH, and the terminal selects to use 2-step RACH or 4-step RACH according to the configuration of the base station.
In an implementation, the rules include one or a combination of the following:
the method comprises the steps that a base station informs a terminal whether a cell supports 2-step RACH in a system message, and the terminal can initiate the 2-step RACH when the cell supports the terminal; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
and thirdly, the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can start the 2-step RACH when in a connected state.
The following description will be made separately.
In the first mode, the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the cell supports the 2-step RACH.
In a specific implementation. In the RRC IE (Information Element) organization, the 2-stepRACH configuration may be set to optional, indicating that 2-step RACH can be supported when the resource is present and not allowed when not present. Where the "optional" option itself occupies 1 bit.
In specific implementation, the base station notifies the terminal in a system message whether the cell supports the 2-step RACH. If so, the base station configures preamble codes and PRACH resources of msgA in the 2-step RACH and PUSCH resources corresponding to the msgA in the system message.
That is, when the base station notifies the terminal in the system message whether the cell supports the 2-step RACH, the network side may further include:
if the base station supports the 2-step RACH, the base station configures preamble codes and PRACH resources of msgA in the 2-step RACH and PUSCH resources corresponding to the msgA in the system message.
Accordingly, the terminal side may further include:
and if the base station supports the 2-step RACH, receiving preamble codes and PRACH resources of msgA in the 2-step RACH configured in the system message by the base station and PUSCH resources corresponding to the msgA.
And secondly, the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the condition is met.
In implementation, the condition that the base station informs the terminal to initiate the 2-step RACH in the system message may include one or a combination of the following conditions:
1. a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated;
in this way, the terminal calculates the random number a when initiating the contention random access, if a < p, then initiates 2-step RACH, otherwise initiates 4-step RACH. This parameter is to limit the uplink interference to a desired range.
2. Initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH;
in this manner, a terminal speed threshold for 2-step RACH is initiated. If the terminal is below this speed, e.g., the terminal is stationary, a 2-step RACH may be initiated. This is because the terminal at a stationary or low speed can better estimate the uplink synchronization bias through the downlink timing synchronization, thereby ensuring that the uplink transmission does not exceed the CP (Cyclic prefix) range and does not cause large interference.
3. Initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH;
in this way, the terminal type initiating the 2-step RACH, for example, only machine type, or the terminal with low latency and high reliability requirement can initiate the 2-step RACH.
4. Initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH;
in this way, the terminal initiating the 2-step RACH accesses the grade, and only the terminal higher than the access grade can initiate the 2-step RACH.
5. Initiating an NR COT threshold of the 2-step RACH, and when the NR COT is lower than the NR COT threshold, the terminal can initiate the 2-step RACH;
in this way, an NR COT threshold of 2-step RACH is initiated, the COT being a Channel Occupied Time. For a system in an unlicensed frequency band, channel detection is required, a time period in which the frequency resource can be used is determined, the COT is high, that is, the time period in which the system can use the unlicensed frequency band is long, and conversely, the time period in which the system can use the frequency band is short. If the NR COT is below the configured threshold, the NR system may use the frequency band for a short time and the terminal may initiate a 2-step RACH.
And thirdly, the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can start the 2-step RACH when in a connected state.
In a specific implementation, the base station allocates a 2-step RACH resource to the terminal through RRC dedicated signaling. In this way, only in the connected state, a terminal receiving the configuration can initiate a 2-step RACH. The basis of this method is that even if uplink desynchronization occurs in the connected terminal, the deviation of the desynchronization is not too large due to the prior information, and the probability that the uplink transmission is kept in the CP (cyclic prefix) is high.
Therefore, in implementation, the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
when the base station carries out the configuration of the 2-step RACH resources, the effective time length is configured, and if the effective time length is exceeded, the 2-step RACH resources are invalid.
The following is illustrated by way of example.
Example 1:
in this example, the base station informs whether the cell supports 2-step RACH by using a system message.
A base station side: the base station sends a system message to inform whether the local cell supports the 2-step RACH. If so, the base station configures preamble codes and PRACH resources of msgA in the 2-step RACH and PUSCH resources corresponding to the msgA in the system message.
A terminal side: receiving system information, determining whether the 2-step RACH can be initiated in the local cell, and if the 2-step RACH is allowed to be initiated, determining the resource of the 2-step RACH.
Example 2:
in this example, the base station informs the conditions for initiating 2-step RACH with a system message.
A base station side: a base station sends a system message, and configures preamble codes and PRACH resources of msgA in 2-step RACH and PUSCH resources corresponding to the msgA in the system message; and configuring the use condition for the configured 2-step RACH resource, wherein the use condition can be specifically one or more of the following combinations:
probability p threshold for initiating 2-step RACH.
Terminal speed threshold for initiating 2-step RACH.
Terminal type that initiates 2-step RACH.
The terminal access class of the 2-step RACH is initiated.
The NR COT threshold for 2-step RACH is initiated.
A terminal side: receiving system information, determining 2-step RACH resources and using conditions thereof, judging whether the terminal meets the using conditions for using the 2-step RACH, if so, initiating the 2-step RACH, otherwise, initiating the 4-step RACH.
Example 3:
in this example, the base station allocates a 2-step RACH resource to the terminal using RRC dedicated signaling.
A base station side: the terminal is allocated 2-step RACH resources through RRC dedicated signaling.
The failure condition of the 2-step RACH resource is one or more of the following combinations:
the resource is invalid only when the uplink timing between the terminal and the base station is out of step;
when the terminal leaves the connection state or leaves a cell configured with 2-step RACH resources, the resources are invalid;
when the base station carries out 2-step RACH resource configuration, the effective time length is configured, and if the effective time length exceeds the effective time length, the resource is invalid.
A terminal side: and receiving the 2-step RACH resource allocated by the special RRC signaling at the base station side, and when the random access needs to be initiated, if the resource is effective, initiating the 2-step RACH.
Based on the same inventive concept, the embodiment of the present invention further provides a base station, a terminal, a random access apparatus, and a storage medium, and because the principle of solving the problem of these devices is similar to that of the random access method, the implementation of these devices may refer to the implementation of the method, and repeated details are not repeated.
When the technical scheme provided by the embodiment of the invention is implemented, the implementation can be carried out as follows.
Fig. 8 is a schematic structural diagram of a base station, as shown in the figure, the base station includes:
the processor 800, which is used to read the program in the memory 820, executes the following processes:
configuring a rule for the terminal to allow the use of the 2-step RACH;
when the terminal initiates random access according to the rule, random access is executed for the terminal;
a transceiver 810 for receiving and transmitting data under the control of the processor 800.
In an implementation, the rules include one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
In the implementation, when the base station notifies the terminal in the system message whether the cell supports the 2-step RACH, the method further includes:
if the base station supports the 2-step RACH, the base station configures preamble codes and PRACH resources of msgA in the 2-step RACH and PUSCH resources corresponding to the msgA in the system message.
In implementation, the condition that the base station informs the terminal to initiate the 2-step RACH in the system message includes one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and initiating an NR COT threshold of the 2-step RACH, and when the NR COT is lower than the NR COT threshold, the terminal can initiate the 2-step RACH.
In implementation, the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
when the base station carries out the configuration of the 2-step RACH resources, the effective time length is configured, and if the effective time length is exceeded, the 2-step RACH resources are invalid.
Where in fig. 8, the bus architecture may include any number of interconnected buses and bridges, with various circuits being linked together, particularly one or more processors represented by processor 800 and memory represented by memory 820. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 810 may be a number of elements including a transmitter and a transceiver providing a means for communicating with various other apparatus over a transmission medium. The processor 800 is responsible for managing the bus architecture and general processing, and the memory 820 may store data used by the processor 800 in performing operations.
Fig. 9 is a schematic structural diagram of a terminal, as shown in the figure, including:
a processor 900 for reading the program in the memory 920, executing the following processes:
determining that the base station configures rules for the terminal to allow the use of the 2-step RACH;
initiating a 2-step RACH or a 4-step RACH according to the rule;
a transceiver 910 for receiving and transmitting data under the control of the processor 900.
In an implementation, the rules include one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
In the implementation, when the base station notifies the terminal in the system message whether the cell supports the 2-step RACH, the method further includes:
and if the base station supports the 2-step RACH, receiving preamble codes and PRACH resources of msgA in the 2-step RACH configured in the system message by the base station and PUSCH resources corresponding to the msgA.
In implementation, the condition that the base station informs the terminal to initiate the 2-step RACH in the system message includes one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and initiating an NR COT threshold of the 2-step RACH, and when the NR COT is lower than the NR COT threshold, the terminal can initiate the 2-step RACH.
In implementation, the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
when the base station carries out the configuration of the 2-step RACH resources, the effective time length is configured, and if the effective time length is exceeded, the 2-step RACH resources are invalid.
In fig. 9, among other things, the bus architecture may include any number of interconnected buses and bridges, with one or more processors, represented by processor 900, and various circuits, represented by memory 920, being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 910 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The user interface 930 may also be an interface capable of interfacing with a desired device for different user devices, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 900 is responsible for managing the bus architecture and general processing, and the memory 920 may store data used by the processor 900 in performing operations.
An embodiment of the present invention provides a random access apparatus, including:
a configuration module for configuring a rule for a terminal that allows the use of a two-step random access 2-step RACH;
and the random access module is used for executing random access for the terminal when the terminal initiates random access according to the rule.
Specifically, refer to the implementation of the random access method on the network side.
An embodiment of the present invention provides a random access apparatus, including:
a determining module, configured to determine that the base station configures a rule for the terminal that allows using the 2-step RACH;
and the initiating module is used for initiating the 2-step RACH or initiating the 4-step RACH according to the rule.
See in particular the implementation of the random access method at the terminal side.
An embodiment of the present invention provides a computer-readable storage medium, which stores a computer program for executing the random access method.
Specifically, refer to the implementation of the random access method at the network side and the terminal side.
For convenience of description, each part of the above-described apparatus is separately described as being functionally divided into various modules or units. Of course, the functionality of the various modules or units may be implemented in the same one or more pieces of software or hardware in practicing the invention.
In summary, in the technical solution provided by the embodiment of the present invention, the base station configures a rule allowing the terminal to use 2-step RACH, and the terminal selects to use 2-step RACH or 4-step RACH according to the configuration of the base station.
Specifically, the base station informs the terminal whether the local cell supports the 2-step RACH in the system message. If so, the base station configures preamble codes and PRACH resources of msgA in the 2-step RACH and PUSCH resources corresponding to the msgA in the system message. The base station informs the terminal of the conditions for initiating the 2-step RACH in a system message, and the contents of the limitations of the specific conditions. The base station allocates the 2-step RACH resource for the terminal through RRC dedicated signaling, and the effective condition of the 2-step RACH.
By adopting the scheme, the uplink interference caused by the 2-step RACH can be reduced or even eliminated, so that the success probability of random access and the accuracy of uplink data transmission are improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (23)

1. A random access method, comprising:
configuring a rule for a terminal to allow a two-step random access 2-step RACH to be used;
and when the terminal initiates random access according to the rule, executing the random access for the terminal.
2. The method of claim 1, wherein the rules comprise one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
3. The method as claimed in claim 2, wherein the base station notifies the terminal in a system message whether the cell supports 2-step RACH, further comprising:
if the base station supports the 2-step RACH, the base station configures preamble codes and Physical Random Access Channel (PRACH) resources of msgA in the 2-step RACH and Physical Uplink Shared Channel (PUSCH) resources corresponding to the preamble codes and the Physical Random Access Channel (PRACH) resources in system messages.
4. The method of claim 2, wherein the condition that the base station informs the terminal of the initiation of the 2-stepach in the system message comprises one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and the NR channel of the 2-step RACH is initiated to occupy the time NR COT threshold, and the terminal can initiate the 2-step RACH when the NR COT is lower than the NR COT threshold.
5. The method of claim 2, wherein the 2-step RACH resource allocated by the base station for the terminal through radio resource control, RRC, dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
and the base station configures an effective time length when the 2-step RACH resource configuration is carried out, and if the effective time length is exceeded, the 2-step RACH resource is invalid.
6. A random access method, comprising:
determining that the base station configures rules for the terminal to allow the use of the 2-step RACH;
initiating a 2-step RACH or initiating a 4-step RACH according to the rule.
7. The method of claim 6, wherein the rules comprise one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
8. The method as claimed in claim 7, wherein the base station notifies the terminal in a system message whether the cell supports 2-step RACH, further comprising:
and if the base station supports the 2-step RACH, receiving preamble codes and PRACH resources of msgA in the 2-step RACH configured in the system message by the base station and PUSCH resources corresponding to the msgA.
9. The method of claim 7, wherein the condition that the base station informs the terminal of the initiation of the 2-stepach in the system message comprises one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and initiating an NR COT threshold of the 2-step RACH, and when the NR COT is lower than the NR COT threshold, the terminal can initiate the 2-step ACH.
10. The method of claim 7, wherein the 2-stepach resource allocated by the base station to the terminal through RRC dedicated signaling fails when one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
and the base station configures an effective time length when the 2-step RACH resource configuration is carried out, and if the effective time length is exceeded, the 2-step RACH resource is invalid.
11. A base station, comprising:
a processor for reading the program in the memory, performing the following processes:
configuring a rule for the terminal to allow the use of the 2-step RACH;
when the terminal initiates random access according to the rule, random access is executed for the terminal;
a transceiver for receiving and transmitting data under the control of the processor.
12. The base station of claim 11, wherein the rules comprise one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
13. The base station of claim 12, wherein when the base station notifies the terminal in a system message whether the cell supports 2-step RACH, the base station further comprises:
if the base station supports the 2-step RACH, the base station configures preamble codes and PRACH resources of msgA in the 2-step RACH and PUSCH resources corresponding to the msgA in the system message.
14. The base station of claim 12, wherein the condition that the base station informs the terminal of the initiation of 2-stepach in the system message comprises one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and initiating an NR COT threshold of the 2-step RACH, and when the NR COT is lower than the NR COT threshold, the terminal can initiate the 2-step ACH.
15. The base station of claim 12, wherein the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
and the base station configures an effective time length when the 2-step RACH resource configuration is carried out, and if the effective time length is exceeded, the 2-step RACH resource is invalid.
16. A terminal, comprising:
a processor for reading the program in the memory, performing the following processes:
determining that the base station configures rules for the terminal to allow the use of the 2-step RACH;
initiating a 2-step RACH or a 4-step RACH according to the rule;
a transceiver for receiving and transmitting data under the control of the processor.
17. The terminal of claim 16, wherein the rules comprise one or a combination of the following:
the base station informs the terminal whether the cell supports the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the terminal supports the base station; or the like, or, alternatively,
the base station informs the terminal of the condition for initiating the 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when meeting the condition; or the like, or, alternatively,
the base station allocates 2-step RACH resources for the terminal through RRC dedicated signaling, and the terminal can initiate 2-step RACH when in a connected state.
18. The terminal of claim 17, wherein when the base station notifies the terminal in a system message whether the cell supports 2-step RACH, the method further comprises:
and if the base station supports the 2-step RACH, receiving preamble codes and PRACH resources of msgA in the 2-step RACH configured in the system message by the base station and PUSCH resources corresponding to the msgA.
19. The terminal of claim 17, wherein the condition that the base station informs the terminal of the initiation of 2-stepach in the system message comprises one or a combination of the following conditions:
a probability p threshold of initiating the 2-step RACH, the terminal calculates a random number a when initiating the competitive random access, if a < p, the 2-step RACH can be initiated; or the like, or, alternatively,
initiating a terminal speed threshold of the 2-step RACH, and when the speed of the terminal is lower than the speed threshold, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal type of the 2-step RACH, and when the type of the terminal is met, initiating the 2-step RACH; or the like, or, alternatively,
initiating a terminal access grade of the 2-step RACH, and when the access grade of the terminal is higher than the access grade, initiating the 2-step RACH; or the like, or, alternatively,
and initiating an NR COT threshold of the 2-step RACH, and when the NR COT is lower than the NR COT threshold, the terminal can initiate the 2-step ACH.
20. The terminal of claim 17, wherein the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling fails under one or a combination of the following conditions:
the 2-step RACH resource is invalid when the uplink timing between the terminal and the base station is out of step; or the like, or, alternatively,
when the terminal leaves the connection state or leaves a cell configured with the 2-step RACH resource, the 2-step RACH resource is invalid; or the like, or, alternatively,
and the base station configures an effective time length when the 2-step RACH resource configuration is carried out, and if the effective time length is exceeded, the 2-step RACH resource is invalid.
21. A random access apparatus, comprising:
a configuration module for configuring a rule for a terminal that allows the use of a two-step random access 2-step RACH;
and the random access module is used for executing random access for the terminal when the terminal initiates random access according to the rule.
22. A random access apparatus, comprising:
a determining module, configured to determine that the base station configures a rule for the terminal that allows using the 2-step RACH;
and the initiating module is used for initiating the 2-step RACH or initiating the 4-step RACH according to the rule.
23. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 1 to 10.
CN201910102928.3A 2019-02-01 2019-02-01 Random access method, equipment and device Pending CN111526582A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201910102928.3A CN111526582A (en) 2019-02-01 2019-02-01 Random access method, equipment and device
CN202311797927.8A CN117750518A (en) 2019-02-01 2019-02-01 Random access method, equipment and device
PCT/CN2020/072321 WO2020156188A1 (en) 2019-02-01 2020-01-15 Random access method, device and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910102928.3A CN111526582A (en) 2019-02-01 2019-02-01 Random access method, equipment and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202311797927.8A Division CN117750518A (en) 2019-02-01 2019-02-01 Random access method, equipment and device

Publications (1)

Publication Number Publication Date
CN111526582A true CN111526582A (en) 2020-08-11

Family

ID=71840237

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202311797927.8A Pending CN117750518A (en) 2019-02-01 2019-02-01 Random access method, equipment and device
CN201910102928.3A Pending CN111526582A (en) 2019-02-01 2019-02-01 Random access method, equipment and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202311797927.8A Pending CN117750518A (en) 2019-02-01 2019-02-01 Random access method, equipment and device

Country Status (2)

Country Link
CN (2) CN117750518A (en)
WO (1) WO2020156188A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022109777A1 (en) * 2020-11-24 2022-06-02 Lenovo (Beijing) Limited Method and apparatus for performing random access

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180110075A1 (en) * 2016-10-19 2018-04-19 Qualcomm Incorporated Random access channel (rach) procedure design
WO2018085726A1 (en) * 2016-11-04 2018-05-11 Intel IP Corporation Performing 2-step random access channel (rach) procedures
WO2018126418A1 (en) * 2017-01-05 2018-07-12 广东欧珀移动通信有限公司 Method for random access and terminal device
CN108282816A (en) * 2017-01-05 2018-07-13 中兴通讯股份有限公司 A kind of cut-in method and access device
US20180205516A1 (en) * 2017-01-13 2018-07-19 Motorola Mobility Llc Method and Apparatus for Performing Contention Based Random Access in a Carrier Frequency
CN111405675A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Random access method, terminal and network equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180110075A1 (en) * 2016-10-19 2018-04-19 Qualcomm Incorporated Random access channel (rach) procedure design
WO2018085726A1 (en) * 2016-11-04 2018-05-11 Intel IP Corporation Performing 2-step random access channel (rach) procedures
WO2018126418A1 (en) * 2017-01-05 2018-07-12 广东欧珀移动通信有限公司 Method for random access and terminal device
CN108282816A (en) * 2017-01-05 2018-07-13 中兴通讯股份有限公司 A kind of cut-in method and access device
US20180205516A1 (en) * 2017-01-13 2018-07-19 Motorola Mobility Llc Method and Apparatus for Performing Contention Based Random Access in a Carrier Frequency
CN111405675A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Random access method, terminal and network equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HUAWEI等: ""Two-step RACH procedure for NR-U"", 《3GPP TSG-RAN WG2 MEETING #104 R2-1816617》 *
NOKIA等: ""Network control of 2-step random access procedure"", 《3GPP TSG-RAN WG2 MEETING #103BIS R2-1814287》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022109777A1 (en) * 2020-11-24 2022-06-02 Lenovo (Beijing) Limited Method and apparatus for performing random access

Also Published As

Publication number Publication date
CN117750518A (en) 2024-03-22
WO2020156188A1 (en) 2020-08-06

Similar Documents

Publication Publication Date Title
US11937308B2 (en) Two-step contention-based random access over radio resources in LAA
CN108282899B (en) Two-step competition random access method and device
EP3714654B1 (en) Method and related device for handling random access procedure in bandwidth part switching operation
US10779329B2 (en) Random access response transmission method and device
EP3606266B1 (en) Method and device for random access and instruction after random access rollback
US20230328801A1 (en) Method and apparatus for determining ra-rnti
US20210168894A1 (en) State transitions for idle mode transmissions using pre-configured dedicated resources
CN110022607B (en) Beam failure recovery method, device and equipment
US11503643B2 (en) Random access method and device
US10462826B2 (en) Random access method and related apparatus
US10091816B2 (en) Method and apparatus for timing maintenance under coverage enhancement mechanism
CN108024259B (en) Transmission point or beam indication and transmission method and device for new generation wireless communication system
EP3876654A1 (en) Uplink transmission method and device, computer readable storage medium and terminal
CN110268790B (en) PRACH scheduling method, scheduled PRACH transmission method, network node and user equipment
JP2021524698A (en) Random access method and terminal
CN110933762A (en) Random access method, system, terminal and base station based on competition
WO2020156188A1 (en) Random access method, device and apparatus
US11937310B2 (en) Handling timing conflicts involving random access procedure messages
CN111526597B (en) Two-step random access method, equipment and device
CN110012539B (en) Resource indication method and base station
US20230379971A1 (en) Data transmission method and apparatus, terminal, network device and medium
CN117835449A (en) Beam failure recovery method and device, storage medium, terminal and network equipment
CN117676830A (en) Data transmission method, apparatus, device, storage medium and program product
JP2022508431A (en) Power ramping counter control method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210525

Address after: 100085 1st floor, building 1, yard 5, Shangdi East Road, Haidian District, Beijing

Applicant after: DATANG MOBILE COMMUNICATIONS EQUIPMENT Co.,Ltd.

Address before: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Applicant before: Telecommunications Science and Technology Research Institute Co.,Ltd.

TA01 Transfer of patent application right