CN111586879B - Random access method and device - Google Patents

Random access method and device Download PDF

Info

Publication number
CN111586879B
CN111586879B CN201910118161.3A CN201910118161A CN111586879B CN 111586879 B CN111586879 B CN 111586879B CN 201910118161 A CN201910118161 A CN 201910118161A CN 111586879 B CN111586879 B CN 111586879B
Authority
CN
China
Prior art keywords
random access
terminal side
uplink data
response
side device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910118161.3A
Other languages
Chinese (zh)
Other versions
CN111586879A (en
Inventor
徐小英
黄曲芳
酉春华
范强
郭英昊
娄崇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201910118161.3A priority Critical patent/CN111586879B/en
Priority to PCT/CN2020/075425 priority patent/WO2020164622A1/en
Publication of CN111586879A publication Critical patent/CN111586879A/en
Application granted granted Critical
Publication of CN111586879B publication Critical patent/CN111586879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/002Transmission of channel access control information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]

Abstract

The embodiment of the application provides a random access method and a random access device, relates to the field of communication, and can avoid response messages of a random access process being wrongly analyzed by terminal side equipment. The method comprises the following steps: the terminal side equipment receives a first configuration parameter of a first random access process from the network side equipment, wherein the first configuration parameter comprises an identifier of a first search space and configuration of a first uplink resource; the terminal side equipment sends a first random access request to the network side equipment and sends first uplink data by using a first uplink resource; the terminal side equipment detects downlink control information borne in the first search space according to the identifier of the first search space, or detects downlink control information corresponding to the first random access process according to the first RNTI; and the terminal side equipment receives response information on the resource indicated by the downlink control information, wherein the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data. The embodiment of the application is applied to the random access process.

Description

Random access method and device
Technical Field
The present application relates to the field of wireless communications, and in particular, to a random access method and apparatus.
Background
In a wireless communication system, a terminal-side device may access a base station using a 4-step random access procedure. As shown in fig. 1, the 4-step random access procedure includes step S1, the terminal side device selects a preamble index (preamble index) and a Physical Random Access Channel (PRACH) resource for transmitting the preamble index (preamble), and transmits the preamble on the resource. S2, the base station sends a Random Access Response (RAR) to the terminal side device. S3, the terminal side equipment sends a third message (message3, Msg3) to the base station according to the random access response, and the Msg3 comprises uplink data. S4, the base station sends a fourth message (message4, Msg4) to the terminal side device, and the Msg4 includes contention resolution information so that the terminal side device can access the base station.
At present, in the fifth generation (5)thgeneration, 5G) mobile communication system, a 2-step random access procedure is proposed. As shown in fig. 2, the method includes step S1, where the terminal side device selects a PRACH resource used for sending a preamble and acquires an uplink resource used for sending uplink data, and sends the preamble on the PRACH resource and sends the uplink data on the uplink resource. S2, the base station sends a response message, such as message B (MsgB), to the terminal-side device, where the response message may include contention resolution information.
Currently, when receiving response information of a 2-step random access process, a terminal side device may further have response information of a 4-step random access process, so that a user equipment may erroneously analyze the response information of the 2-step random access process.
Disclosure of Invention
The embodiment of the application provides a random access method, which can avoid that terminal side equipment analyzes response messages of a random access process by mistake.
In a first aspect, an embodiment of the present application provides a random access method, including: the method comprises the steps that terminal side equipment receives first configuration parameters of a first random access process from network side equipment, the first configuration parameters comprise identification of a first search space and configuration of first uplink resources, the first random access process is a process that the terminal side equipment sends a first random access request, first uplink data are sent by using the first uplink resources, and response information is received; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; the terminal side equipment sends a first random access request to the network side equipment and sends first uplink data by using a first uplink resource; the terminal side equipment detects downlink control information carried in the first search space according to the identifier of the first search space, and the downlink control information indicates resources of response information; and the terminal side equipment receives the response information on the resources indicated by the downlink control information.
Based on the method provided by the embodiment of the present application, after the terminal side device initiates the first random access process, the downlink control information carried in the first search space may be detected according to the identifier of the first search space, and the response information is received on the resource indicated by the downlink control information. Therefore, the terminal side equipment can quickly identify the response message of the first random access process according to the identifier of the first search space, and can avoid the terminal side equipment from analyzing the response message by mistake.
In a possible implementation manner of the first aspect, the method further includes: the terminal side equipment receives a second configuration parameter of a second random access process from the network side equipment, wherein the second configuration parameter comprises an identifier of a second search space, the second random access process is a process of sending a second random access request to the terminal side equipment, receiving a second random access response to the second random access request and sending second uplink data according to the second random access response, and the second search space is used for bearing downlink control information indicating resources of the second random access response; and the terminal side equipment performs a second random access process. Therefore, the terminal side device can quickly identify the second random access response according to the identifier of the second search space, and can avoid the terminal side device from analyzing the response message by mistake.
In a possible implementation manner of the first aspect, the first configuration parameter further includes an identifier of a first control resource set, where the first control resource set is a resource set for detecting that the first search space carries downlink control information. In this way, the terminal side device may determine the resource set carrying the downlink control information according to the identifier of the first control resource set, so as to receive the response message according to the resource indicated by the downlink control information.
In one possible implementation form of the first aspect, the identification of the first search space and the identification of the second search space are different. The identity of the first search space is specific to a first random access procedure and the identity of the second search space is specific to a second random access procedure, different random access procedures being identifiable in dependence of the identity of the different search spaces.
In a second aspect, an embodiment of the present application provides a random access method, including: the method comprises the steps that terminal side equipment receives a first configuration parameter of a first random access request from network side equipment, the first configuration parameter comprises a first uplink resource, and a first random access process is a process that the terminal side equipment sends the first random access request to the network side equipment, sends first uplink data by using the first uplink resource and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; the terminal side device detects downlink control information corresponding to a first random access process according to a first Radio Network Temporary Identity (RNTI), wherein the downlink control information indicates a resource of response information, and the first RNTI is a scrambling identity of the downlink control information corresponding to the first random access process; and the terminal side equipment receives the response information on the resource of the response information.
Based on the method provided by the embodiment of the application, the terminal side device may detect the downlink control information corresponding to the first random access process according to the first RNTI, and receive the response information on the resource of the response information indicated by the downlink control information. Therefore, the terminal side device can quickly identify the response message of the first random access process according to the first RNTI, and the terminal side device can be prevented from analyzing the response message by mistake.
In one possible implementation manner of the second aspect, the method further includes: the terminal side equipment sends a second random access request to the network side equipment in a second random access process, wherein the second random access process is a process that the terminal side equipment sends the second random access request, receives a second random access response to the second random access request and sends second uplink data according to the second random access response; the terminal side equipment detects downlink control information corresponding to a second random access process according to a second RNTI, the downlink control information indicates resources of a second random access response, wherein the second RNTI is a scrambling identifier of the downlink control information corresponding to the second random access process; and the terminal side equipment receives the second random access response on the resource of the second random access response and sends second uplink data according to the second random access response. Therefore, the terminal side equipment can quickly identify the second random access response according to the second RNTI, and the terminal side equipment can be prevented from analyzing the response message by mistake.
In a possible implementation manner of the second aspect, the first RNTI is predefined or notified by a network side device through a message. For example, the network device may notify the terminal side device of the first RNTI through the resource configuration message or the first configuration parameter.
In a possible implementation manner of the second aspect, the first RNTI and a resource (e.g., PUSCH resource) for transmitting the first uplink data have a corresponding relationship. The first RNTI may be associated with PUSCH resources indicated by one or more uplink grant configurations.
In a third aspect, an embodiment of the present application provides a random access method, where a terminal side device receives a first configuration parameter of a first random access request from a network side device, where the first configuration parameter includes a first uplink resource; the terminal side equipment sends a first random access request to the network side equipment and first uplink data by using a first uplink resource in a first random access process, wherein the first random access process is a process of sending the first random access request and the first uplink data by the terminal side equipment and receiving response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; the terminal side device receives a media access control protocol data unit (MAC PDU), where the MAC PDU includes a first MAC sub-PDU corresponding to a first random access procedure, and the first MAC sub-PDU includes response information.
Based on the method provided by the embodiment of the application, after the terminal side equipment initiates the first random access process, the terminal side equipment can receive the MAC PDU sent by the network side equipment, wherein the MAC PDU comprises a first MAC sub-PDU corresponding to the first random access process, and the first MAC sub-PDU comprises response information. Therefore, the terminal side equipment can identify the response message of the first random access process according to the first MAC sub-PDU, and the terminal side equipment can be prevented from analyzing the response message by mistake.
In a possible implementation manner of the third aspect, the first MAC sub-PDU further includes an identifier of the first random access request. Therefore, the terminal side equipment can quickly identify the response message of the first random access process according to the identifier of the first random access request, and can avoid the terminal side equipment from analyzing the response message by mistake.
In a possible implementation manner of the third aspect, the MAC PDU further includes a second MAC sub-PDU corresponding to a second random access process, where the second MAC sub-PDU includes a second random access response in the second random access process; the second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response. Therefore, the terminal side equipment can identify the response message of the second random access process according to the second MAC sub-PDU, and the terminal side equipment can be prevented from analyzing the response message by mistake.
In a possible implementation manner of the third aspect, the second MAC sub-PDU further includes an identifier of the second random access request. Therefore, the terminal side equipment can quickly identify the response message of the second random access process according to the identifier of the second random access request, and can avoid the terminal side equipment from analyzing the response message by mistake.
In one possible implementation manner of the third aspect, in the MAC PDU, the second MAC sub-PDU is located before the first MAC sub-PDU. Therefore, the terminal side equipment can quickly identify the response messages of the first random access process and the second random access process according to the position relation of the MAC sub-PDU, and the terminal side equipment can be prevented from analyzing the response messages by mistake.
In a possible implementation manner of the third aspect, whether a contention resolution information field exists is indicated in a payload or a subheader in the first MAC sub-PDU; wherein, in case of yes, the first MAC sub-PDU further comprises one or more contention resolution information fields. In this way, the terminal side device may determine the payload or subheader of the first MAC sub-PDU according to the indication in the payload or subheader of the first MAC sub-PDU. If so, the terminal-side device may obtain one or more contention resolution information fields.
In a possible implementation manner of the first aspect, the second aspect, or the third aspect, the method further includes: the terminal side device obtains first uplink data from a first message cache, wherein the first message cache is a cache specific to a first random access process. Therefore, after the terminal side device initiates the first random access process, the first uplink data of the first random access process can be managed (stored or acquired) through the first message cache, and because the first message cache is a cache specific to the first random access process, the cache confusion of different random access processes can be avoided.
In a possible implementation manner of the first aspect, the second aspect, or the third aspect, in a case where the first random access procedure fails, or in a case where the second message buffer does not have uplink data and the first message buffer has uplink data, the second message buffer is specific to the second random access procedure; the method further comprises the following steps: and in the second random access process, the terminal side equipment acquires second uplink data from the first message cache.
In a possible implementation manner of the first aspect, the second aspect, or the third aspect, in a case where the first random access procedure fails, or in a case where the second message buffer does not have uplink data and the first message buffer has uplink data, the second message buffer is specific to the second random access procedure; the method further comprises the following steps: the terminal side equipment stores the uplink data in the first message cache into a second message cache; and in the second random access process, the terminal side equipment acquires second uplink data from the second message cache.
In a possible implementation manner of the first aspect, the second aspect, or the third aspect, the method further includes: the terminal side equipment stores the first uplink data in a first message cache and a second message cache; or the terminal side equipment stores the second uplink data in the first message buffer and the second message buffer.
In a possible implementation manner of the first aspect, the second aspect, or the third aspect, in a case that the second random access procedure fails, or in a case that the first message buffer does not have uplink data and the second message buffer has uplink data, the second message buffer is specific to the second random access procedure; the method further comprises the following steps: and the terminal side equipment acquires the first uplink data from the second message buffer.
In a possible implementation manner of the first aspect, the second aspect, or the third aspect, the method further includes: the terminal side equipment acquires first uplink data from the third message cache in the first random access process; the terminal side equipment acquires second uplink data from the third message cache in a second random access process; and the third message cache is a shared cache of the first random access process and the second random access process.
In a possible implementation manner of the first aspect, the second aspect, or the third aspect, the method further includes: when the terminal side equipment initializes the first random access process, the terminal side equipment sets a first counter as an initial value, and the first counter is used for the first random access process.
In a possible implementation manner of the first aspect, the second aspect, or the third aspect, the method further includes: when the terminal side equipment initializes the first random access process, the terminal side equipment sets a second counter as an initial value, and the second counter is a shared counter of the first random access process and the second random access process.
In a fourth aspect, an embodiment of the present application provides a random access method, including: the method comprises the steps that network side equipment sends first configuration parameters of a first random access process to terminal side equipment, the first configuration parameters comprise identification of a first search space and configuration of first uplink resources, the first random access process is a process that the terminal side equipment sends a first random access request, first uplink data are sent by using the first uplink resources, and response information is received; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; the network side equipment receives first uplink data from the terminal side equipment; the network side equipment sends downlink control information in the first search space according to the identifier of the first search space, and the downlink control information indicates the resource of the response information; and the network side equipment sends the response information on the resources indicated by the downlink control information.
In one possible implementation manner of the fourth aspect, the method further includes: and the network side equipment sends a second configuration parameter of a second random access process to the terminal side equipment, wherein the second configuration parameter comprises an identifier of a second search space, the second random access process is a process of sending a second random access request to the terminal side equipment, receiving a second random access response to the second random access request, and sending second uplink data according to the second random access response, and the second search space is used for bearing downlink control information indicating resources of the second random access response.
In a possible implementation manner of the fourth aspect, the first configuration parameter further includes an identifier of a first control resource set, where the first control resource set is a resource set for detecting that the first search space carries the downlink control information.
In one possible implementation of the fourth aspect, the identification of the first search space and the identification of the second search space are the same or different.
In a fifth aspect, an embodiment of the present application provides a random access method, including: the method comprises the steps that network side equipment sends first configuration parameters of a first random access process to terminal side equipment, the first configuration parameters comprise first uplink resources, and the first random access process is a process that the terminal side equipment sends a first random access request to the network side equipment, sends first uplink data by using the first uplink resources and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; the network side equipment scrambles downlink control information corresponding to a first random access process according to a first Radio Network Temporary Identifier (RNTI), and the downlink control information indicates resources of response information, wherein the first RNTI is a scrambled identifier of the downlink control information corresponding to the first random access process; and the network side equipment sends the response information on the resource of the response information.
In one possible implementation manner of the fifth aspect, the method further includes: the network side equipment receives a second random access request of a second random access process from the terminal side equipment, wherein the second random access process is a process of sending the second random access request to the terminal side equipment, receiving a second random access response to the second random access request and sending second uplink data according to the second random access response; the network side equipment scrambles downlink control information corresponding to a second random access process according to a second RNTI, and the downlink control information indicates resources of a second random access response, wherein the second RNTI is a scrambling identifier of the downlink control information corresponding to the second random access process; and the network side equipment sends the second random access response on the resource of the second random access response and receives the second uplink data.
In a possible implementation manner of the fifth aspect, the first RNTI is predefined or notified by a network side device through a message.
In a possible implementation manner of the fifth aspect, the first RNTI and a resource for transmitting the first uplink data have a corresponding relationship.
In a sixth aspect, an embodiment of the present application provides a random access method, where a network side device sends a first configuration parameter of a first random access process to a terminal side device, where the first configuration parameter includes a first uplink resource; the method comprises the steps that network side equipment receives a first random access request and first uplink data of a first random access process from terminal side equipment, wherein the first random access process is a process that the terminal side equipment sends the first random access request and the first uplink data and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; and the network side equipment sends a media access control protocol data unit (MAC PDU), wherein the MAC PDU comprises a first MAC sub-PDU corresponding to the first random access process, and the first MAC sub-PDU comprises response information.
In a possible implementation manner of the sixth aspect, the first MAC sub-PDU further includes an identifier of the first random access request.
In a possible implementation manner of the sixth aspect, the MAC PDU further includes a second MAC sub-PDU corresponding to a second random access process, where the second MAC sub-PDU includes a second random access response in the second random access process; the second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response.
In a possible implementation manner of the sixth aspect, the second MAC sub-PDU further includes an identifier of the second random access request.
In one possible implementation of the sixth aspect, the second MAC sub-PDU precedes the first MAC sub-PDU in the MAC PDU.
In a possible implementation manner of the sixth aspect, whether a contention resolution information field exists is indicated in a payload or a subheader in the first MAC sub-PDU; wherein, in case of yes, the first MAC sub-PDU further comprises one or more contention resolution information fields.
In a seventh aspect, an embodiment of the present application provides a terminal-side device, including: a receiving unit, configured to receive, from a network side device, a first configuration parameter of a first random access process, where the first configuration parameter includes an identifier of a first search space and configuration of a first uplink resource, and the first random access process is a process in which a terminal side device sends a first random access request and uses the first uplink resource to send first uplink data, and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; a sending unit, configured to send a first random access request to a network side device and send first uplink data using a first uplink resource; a processing unit, configured to detect downlink control information carried in the first search space according to the identifier of the first search space, where the downlink control information indicates a resource of the response information; and the receiving unit is further configured to receive the response information on the resource indicated by the downlink control information.
In a possible implementation manner of the seventh aspect, the receiving unit is further configured to receive, from the network side device, a second configuration parameter of a second random access process, where the second configuration parameter includes an identifier of a second search space, the second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response, and the second search space is used for carrying downlink control information indicating a resource of the second random access response; and the processing unit is used for carrying out a second random access process.
In a possible implementation manner of the seventh aspect, the first configuration parameter further includes an identifier of a first control resource set, where the first control resource set is a resource set for detecting that the first search space carries the downlink control information.
In a possible implementation manner of the seventh aspect, the identification of the first search space and the identification of the second search space are different.
In an eighth aspect, an embodiment of the present application provides a terminal side device, including: a receiving unit, configured to receive a first configuration parameter of a first random access request, where the first configuration parameter includes a first uplink resource, and a first random access process is a process in which a terminal side device sends the first random access request to a network side device and sends first uplink data using the first uplink resource, and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; a processing unit, configured to detect downlink control information corresponding to a first random access process according to a first radio network temporary identity RNTI, where the downlink control information indicates a resource of response information, and the first RNTI is a scrambling identity of the downlink control information corresponding to the first random access process; a receiving unit, configured to receive the response information on the resource of the response information.
In a possible implementation manner of the eighth aspect, the apparatus further includes a sending unit, configured to send a second random access request to the network side device in a second random access process, where the second random access process is a process in which the terminal side device sends the second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response; a processing unit, configured to detect downlink control information corresponding to a second random access process according to a second RNTI, where the downlink control information indicates a resource of a second random access response, and the second RNTI is a scrambling identifier of the downlink control information corresponding to the second random access process; and the receiving unit is used for receiving the second random access response on the resource of the second random access response, and the sending unit is used for sending the second uplink data according to the second random access response.
In a possible implementation manner of the eighth aspect, the first RNTI is predefined or notified by a network side device through a message.
In a possible implementation manner of the eighth aspect, the first RNTI and a resource for transmitting the first uplink data have a corresponding relationship.
In a ninth aspect, an embodiment of the present application provides a terminal side device, including a receiving unit, configured to receive a first configuration parameter of a first random access request from a network side device, where the first configuration parameter includes a first uplink resource; a sending unit, configured to send a first random access request to a network side device and send first uplink data using a first uplink resource in a first random access process, where the first random access process is a process in which a terminal side device sends the first random access request and the first uplink data and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; and the receiving unit is further configured to receive a media access control protocol data unit MAC PDU, where the MAC PDU includes a first MAC sub-PDU corresponding to the first random access procedure, and the first MAC sub-PDU includes response information.
In a possible implementation manner of the ninth aspect, the first MAC sub-PDU further includes an identifier of the first random access request.
In a possible implementation manner of the ninth aspect, the MAC PDU further includes a second MAC sub-PDU corresponding to a second random access process, where the second MAC sub-PDU includes a second random access response in the second random access process; the second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response.
In a possible implementation manner of the ninth aspect, the second MAC sub-PDU further includes an identifier of the second random access request.
In one possible implementation of the ninth aspect, the second MAC sub-PDU precedes the first MAC sub-PDU in the MAC PDU.
In a possible implementation manner of the ninth aspect, whether a contention resolution information field exists is indicated in a payload or a subheader in the first MAC sub-PDU; wherein, in case of yes, the first MAC sub-PDU further comprises one or more contention resolution information fields.
In a possible implementation manner of the seventh aspect, the eighth aspect, or the ninth aspect, the processing unit is further configured to obtain the first uplink data from a first message buffer, where the first message buffer is a buffer specific to the first random access procedure.
In a possible implementation manner of the seventh aspect, the eighth aspect, or the ninth aspect, in a case that the first random access procedure fails, or in a case that the second message buffer does not have uplink data and the first message buffer has uplink data, the second message buffer is specific to the second random access procedure; in the second random access process, the processing unit is further configured to obtain second uplink data from the first message buffer.
In a possible implementation manner of the seventh aspect, the eighth aspect, or the ninth aspect, in a case that the first random access procedure fails, or in a case that the second message buffer does not have uplink data and the first message buffer has uplink data, the second message buffer is specific to the second random access procedure; the processing unit is further used for storing the uplink data in the first message buffer into a second message buffer; in the second random access process, the processing unit is further configured to obtain second uplink data from the second message buffer.
In a possible implementation manner of the seventh aspect, the eighth aspect, or the ninth aspect, the processing unit is configured to store the first uplink data in a first message buffer and a second message buffer; or the processing unit is configured to store the second uplink data in the first message buffer and the second message buffer.
In a possible implementation manner of the seventh aspect, the eighth aspect, or the ninth aspect, in a case that the second random access procedure fails, or in a case that the first message buffer has no uplink data and the second message buffer has uplink data, the second message buffer is specific to the second random access procedure; the processing unit is further configured to obtain the first uplink data from the second message buffer.
In a possible implementation manner of the seventh aspect, the eighth aspect, or the ninth aspect, the processing unit is configured to obtain the first uplink data from the third message buffer in a first random access process; the processing unit is further configured to obtain second uplink data from the third message cache in a second random access process; and the third message cache is a shared cache of the first random access process and the second random access process.
In a possible implementation manner of the seventh aspect, the eighth aspect, or the ninth aspect, when the terminal-side device initializes the first random access procedure, the processing unit is configured to set a first counter to an initial value, where the first counter is specific to the first random access procedure.
In a possible implementation manner of the seventh aspect, the eighth aspect, or the ninth aspect, when the terminal-side device initializes the first random access procedure, the processing unit is configured to set a second counter as an initial value, where the second counter is a shared counter of the first random access procedure and the second random access procedure.
In a tenth aspect, an embodiment of the present application provides a network side device, including: a sending unit, configured to send a first configuration parameter of a first random access process to a terminal side device, where the first configuration parameter includes an identifier of a first search space and configuration of a first uplink resource, and the first random access process is a process in which the terminal side device sends a first random access request and uses the first uplink resource to send first uplink data, and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; a receiving unit, configured to receive first uplink data from a terminal side device; a sending unit, configured to send downlink control information in the first search space according to the identifier of the first search space, where the downlink control information indicates a resource of the response information; the sending unit is further configured to send the response information on the resource indicated by the downlink control information.
In a possible implementation manner of the tenth aspect, the sending unit is further configured to send a second configuration parameter of a second random access process to the terminal side device, where the second configuration parameter includes an identifier of a second search space, the second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response, and the second search space is used for carrying downlink control information indicating resources of the second random access response.
In a possible implementation manner of the tenth aspect, the first configuration parameter further includes an identifier of a first control resource set, and the first control resource set is a resource set for detecting that the first search space carries downlink control information.
In one possible implementation of the tenth aspect, the identification of the first search space and the identification of the second search space are different.
In an eleventh aspect, an embodiment of the present application provides a network side device, including: a sending unit, configured to send a first configuration parameter of a first random access process to a terminal side device, where the first configuration parameter includes a first uplink resource, and the first random access process is a process in which the terminal side device sends a first random access request to a network side device and sends first uplink data using the first uplink resource, and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; a processing unit, configured to scramble downlink control information corresponding to a first random access process according to a first radio network temporary identity RNTI, where the downlink control information indicates a resource of response information, and the first RNTI is a scrambling identity of the downlink control information corresponding to the first random access process; and a sending unit, configured to send the response information on the resource of the response information.
In a possible implementation manner of the eleventh aspect, the receiving unit is further configured to receive a second random access request of a second random access process from the terminal side device, where the second random access process is a process of sending the second random access request to the terminal side device, receiving a second random access response to the second random access request, and sending second uplink data according to the second random access response; the processing unit is further configured to scramble downlink control information corresponding to a second random access process according to a second RNTI, where the downlink control information indicates a resource of a second random access response, and the second RNTI is a scrambling identifier of the downlink control information corresponding to the second random access process; the sending unit is further configured to send the second random access response on the resource of the second random access response, and receive the second uplink data.
In a possible implementation manner of the eleventh aspect, the first RNTI is predefined or notified by a network side device through a message.
In a possible implementation manner of the eleventh aspect, the first RNTI and a resource for transmitting the first uplink data have a corresponding relationship.
In a twelfth aspect, an embodiment of the present application provides a network side device, including: a sending unit, configured to send a first configuration parameter of a first random access process to a terminal side device, where the first configuration parameter includes a first uplink resource; the method comprises the steps that network side equipment receives a first random access request and first uplink data of a first random access process from terminal side equipment, wherein the first random access process is a process that the terminal side equipment sends the first random access request and the first uplink data and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; the sending unit is further configured to send a media access control protocol data unit MAC PDU, where the MAC PDU includes a first MAC sub-PDU corresponding to the first random access procedure, and the first MAC sub-PDU includes response information.
In a possible implementation manner of the twelfth aspect, the first MAC sub-PDU further includes an identifier of the first random access request.
In a possible implementation manner of the twelfth aspect, the MAC PDU further includes a second MAC sub-PDU corresponding to a second random access process, where the second MAC sub-PDU includes a second random access response in the second random access process; the second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response.
In a possible implementation manner of the twelfth aspect, the second MAC sub-PDU further includes an identifier of the second random access request.
In one possible implementation of the twelfth aspect, the second MAC sub-PDU precedes the first MAC sub-PDU in the MAC PDU.
In a possible implementation manner of the twelfth aspect, whether a contention resolution information field exists is indicated in a payload or a subheader in the first MAC sub-PDU; wherein, in case of yes, the first MAC sub-PDU further comprises one or more contention resolution information fields.
In a thirteenth aspect, embodiments of the present application further provide an apparatus, which may be a terminal-side device or a chip. The apparatus comprises a processor configured to implement any one of the methods provided in the first to third aspects. The apparatus may also include a memory for storing program instructions and data, which may be memory integrated within the apparatus or off-chip memory disposed external to the apparatus. The memory is coupled to the processor, and the processor may call and execute the program instructions stored in the memory to implement any one of the methods provided in the first to third aspects. The apparatus may also include a communication interface for the apparatus to communicate with other devices (e.g., network-side devices).
In a fourteenth aspect, an apparatus, which may be a network device or a chip, is further provided in an embodiment of the present application. The apparatus comprises a processor configured to implement any one of the methods provided in the fourth to sixth aspects. The apparatus may also include a memory for storing program instructions and data, which may be memory integrated within the apparatus or off-chip memory disposed external to the apparatus. The memory is coupled to the processor, and the processor can call and execute the program instructions stored in the memory to implement any one of the methods provided by the above-mentioned fourth to sixth aspects. The apparatus may also include a communication interface for the apparatus to communicate with other devices (e.g., terminal-side devices).
In a fifteenth aspect, an embodiment of the present application provides a computer-readable storage medium, which includes instructions that, when executed on a computer, cause the computer to perform any one of the methods provided in the first to sixth aspects.
In a sixteenth aspect, embodiments of the present application provide a computer program product containing instructions that, when run on a computer, cause the computer to perform any one of the methods provided in the first to sixth aspects.
In a seventeenth aspect, an embodiment of the present application provides a chip system, where the chip system includes a processor and may further include a memory, and is configured to implement any one of the methods provided in the first aspect to the sixth aspect. The chip system may be formed by a chip, and may also include a chip and other discrete devices.
In an eighteenth aspect, an embodiment of the present application provides a system, where the system includes the terminal-side device in the seventh aspect to the ninth aspect, and the network-side device in the tenth aspect to the twelfth aspect.
Drawings
Fig. 1 is a schematic diagram of a 4-step random access procedure provided in an embodiment of the present application;
fig. 2 is a schematic diagram of a 2-step random access procedure provided in an embodiment of the present application;
fig. 3 is a schematic diagram of a system architecture suitable for a random access method according to an embodiment of the present application;
fig. 4 is a schematic internal structure diagram of a terminal-side device according to an embodiment of the present disclosure;
fig. 5 is a schematic internal structure diagram of a network-side device according to an embodiment of the present disclosure;
fig. 6a is a schematic diagram of an RAR window according to an embodiment of the present application;
FIG. 6b is a diagram illustrating a conventional MAC PDU;
fig. 6c is a schematic diagram of a subheader of a MAC sub-PDU according to an embodiment of the present application;
fig. 6d is a schematic diagram of a MAC SDU provided in the embodiment of the present application;
fig. 7 is a schematic signal interaction diagram suitable for a random access method according to an embodiment of the present application;
fig. 8 is a schematic diagram of a listening window according to an embodiment of the present application;
fig. 9 is a schematic diagram of a MAC PDU provided in an embodiment of the present application;
fig. 10 is a schematic diagram of another MAC PDU provided in an embodiment of the present application;
fig. 11 is a schematic diagram of another MAC PDU provided in an embodiment of the present application;
fig. 12 is a schematic diagram of another MAC PDU provided in an embodiment of the present application;
fig. 13 is a schematic diagram of another MAC PDU provided in an embodiment of the present application;
fig. 14 is a schematic diagram of another MAC PDU provided in an embodiment of the present application;
fig. 15 is a schematic internal structure diagram of another terminal-side device according to an embodiment of the present application;
fig. 16 is a schematic internal structure diagram of another network-side device according to an embodiment of the present application.
Detailed Description
The embodiments of the present application provide a random access method and apparatus, which are applied to a mobile communication network, for example, a mobile communication network supporting Radio Interface Technology (RIT) of multiple radio interface technologies.
Fig. 3 is a schematic diagram of a communication system to which the technical solution provided in the embodiment of the present application is applied, where the communication system may include a network-side device 100 and one or more terminal-side devices 200 (only 1 is shown in fig. 3) connected to the network-side device 100. Data transmission can be carried out between the network side equipment and the terminal side equipment.
The network-side device 100 may be a device capable of communicating with the terminal-side device 200. For example, the network side device 100 may be a base station, which may be a Base Transceiver Station (BTS) in global system for mobile communication (GSM) or Code Division Multiple Access (CDMA), a node B (NodeB, NB) in Wideband Code Division Multiple Access (WCDMA), an evolved node B (evolved NodeB, eNB, or eNodeB) in LTE, a base station in NR, a relay station, an access point, or a base station in a future network, and the like, and the embodiments of the present application are not limited thereto. Herein, the base station in the NR may also be referred to as a Transmission Reception Point (TRP) or a gNB. In this embodiment, the network side device may be a network device sold independently, such as a base station, or may be a chip in the network device that implements a corresponding function. In the embodiment of the present application, the chip system may be composed of a chip, and may also include a chip and other discrete devices. In the technical solution provided in the embodiment of the present application, taking a device for implementing a function of a network side device as an example, the technical solution provided in the embodiment of the present application is described.
The terminal-side device 200 in the embodiment of the present application may also be referred to as a terminal, and may be a device having a wireless transceiving function, where the terminal may be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; can also be deployed on the water surface (such as a ship and the like); and may also be deployed in the air (e.g., airplanes, balloons, satellites, etc.). The terminal side device may be a User Equipment (UE). Wherein the UE comprises a handheld device, an in-vehicle device, a wearable device, or a computing device with wireless communication capabilities. Illustratively, the UE may be a mobile phone (mobile phone), a tablet computer, or a computer with wireless transceiving function. The terminal-side device may also be a Virtual Reality (VR) terminal-side device, an Augmented Reality (AR) terminal-side device, a wireless terminal in industrial control, a wireless terminal in unmanned driving, a wireless terminal in telemedicine, a wireless terminal in smart grid, a wireless terminal in smart city (smart city), a wireless terminal in smart home (smart home), and so on. In the embodiment of the application, the terminal side device may be a terminal for independent sale, or may be a chip in the terminal. In the technical solution provided in the embodiment of the present application, a device for implementing a function of a terminal is taken as an example to be a terminal side device, and the technical solution provided in the embodiment of the present application is described.
In this embodiment of the application, the network-side device 100 or the terminal-side device 200 in fig. 3 may be implemented by one device, or may be one functional module in one device, which is not specifically limited in this embodiment of the application. It is understood that the above functions may be network elements in a hardware device, or software functions running on dedicated hardware, or virtualization functions instantiated on a platform (e.g., a cloud platform), or a system-on-chip. In the embodiment of the present application, the chip system may be composed of a chip, and may also include a chip and other discrete devices.
For example, the apparatus for implementing the functions of the terminal-side device provided in the embodiments of the present application may be implemented by the apparatus 400 in fig. 4. Fig. 4 is a schematic hardware structure diagram of an apparatus 400 according to an embodiment of the present disclosure. The apparatus 400 includes at least one processor 401 for implementing the functions of the terminal-side device provided in the embodiments of the present application. Also included in the apparatus 400 is a bus 402 and at least one communication interface 404. The apparatus 400 may also include a memory 403.
In the embodiment of the present application, the processor may be a Central Processing Unit (CPU), a general purpose processor, a Network Processor (NP), a Digital Signal Processor (DSP), a microprocessor, a microcontroller, a Programmable Logic Device (PLD), or any combination thereof. The processor may also be any other means having a processing function such as a circuit, device or software module.
Bus 402 may be used to transfer information between the above components.
A communication interface 404 for communicating with other devices or communication networks, such as ethernet, Radio Access Network (RAN), Wireless Local Area Network (WLAN), etc. The communication interface 404 may be an interface, a circuit, a transceiver, or other device capable of implementing communication, and is not limited in this application. The communication interface 404 may be coupled to the processor 401. The coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, and may be an electrical, mechanical or other form for information interaction between the devices, units or modules.
In the embodiments of the present application, the memory may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, a Random Access Memory (RAM) or other types of dynamic storage devices that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory may be stand alone or coupled to the processor, such as through bus 402. The memory may also be integral to the processor.
The memory 403 is used for storing program instructions and can be controlled by the processor 401 to execute, so as to implement the resource scheduling method provided by the following embodiments of the present application. The processor 401 is configured to call and execute the instructions stored in the memory 403, so as to implement the resource scheduling method provided by the following embodiments of the present application.
Optionally, the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
Optionally, the memory 403 may be included in the processor 401.
In particular implementations, processor 401 may include one or more CPUs such as CPU 0and CPU1 in fig. 4 as an example.
In particular implementations, apparatus 400 may include multiple processors, such as processor 401 and processor 407 in FIG. 4, for example, as an example. Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
In one implementation, the apparatus 400 may further include an output device 405 and an input device 406, as an example. An output device 405 is coupled to the processor 401 and may display information in a variety of ways. For example, the output device 405 may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display device, a Cathode Ray Tube (CRT) display device, a projector (projector), or the like. An input device 406 is coupled to the processor 401 and may receive user input in a variety of ways. For example, the input device 406 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
The apparatus 400 may be a general-purpose device or a special-purpose device. In a specific implementation, the terminal-side device 400 may be a desktop, a laptop, a web server, a Personal Digital Assistant (PDA), a mobile phone, a tablet, a wireless terminal-side device, an embedded device, or a device with a similar structure as in fig. 4. The embodiment of the present application does not limit the type of the apparatus 400.
For example, an apparatus for implementing the functions of the network-side device provided in the embodiments of the present application may be implemented by the apparatus 500 in fig. 5. Fig. 5 is a schematic hardware configuration diagram of an apparatus 500 according to an embodiment of the present disclosure. The apparatus 500 includes at least one processor 501 for implementing the functions of the terminal-side device provided in the embodiments of the present application. Also included in the apparatus 500 is a bus 502 and at least one communication interface 504. The apparatus 500 may also include a memory 503.
Bus 502 may be used to transfer information between the above components.
A communication interface 504 for communicating with other devices or a communication network, such as ethernet, RAN, WLAN, etc. The communication interface 504 may be an interface, a circuit, a transceiver, or other device capable of enabling communication, and is not limited in this application. The communication interface 504 may be coupled to the processor 501.
The memory 503 is used for storing program instructions, and can be controlled by the processor 501 to execute, so as to implement the resource scheduling method provided by the following embodiments of the present application. For example, the processor 501 is configured to call and execute instructions stored in the memory 503, so as to implement the resource scheduling method provided by the following embodiments of the present application.
Optionally, the memory 503 may be included in the processor 501.
In particular implementations, processor 501 may include one or more CPUs such as CPU 0and CPU1 in fig. 5 as an example.
In particular implementations, apparatus 500 may include multiple processors, such as processor 501 and processor 505 in FIG. 5, for example, as an example. Each of these processors may be a single core processor or a multi-core processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
For clarity and conciseness of the following description of the various embodiments, a brief introduction to related concepts or technologies is first presented:
in Long Term Evolution (LTE), the buffer (buffer) of the random access procedure (including 4-step random access procedure) is related to: when the terminal side equipment initiates a random access process in a service cell, the MAC entity of the terminal side equipment clears the MSG3 buffer. And if the random access response indicates that the terminal side equipment is successfully accessed randomly, acquiring the MAC PDU to be sent from the multiplexing and assembling entity and storing the MAC PDU in the Msg3 buffer. Then, a hybrid automatic repeat request (HARQ) entity obtains a MAC PDU to be sent from the MSG3buffer, and indicates an HARQ process corresponding to the MAC PDU to be sent to trigger new transmission. After the MSG3 sends, the MAC entity clears the HARQ buffer used to send the MAC PDU in the MSG3 buffer.
Receiving operation of random access response in LTE: the UE receives configuration of Physical Random Access Channel (PRACH) resources on a network side, where the PRACH resources include time-frequency resource configuration. After sending a preamble sequence to a base station on PRACH resources, a UE needs to receive scheduling of a Physical Downlink Control Channel (PDCCH) signaling of the base station in a Random Access Response (RAR) window. The PDCCH signaling is scrambled by RA-RNTI, and the value of the RA-RNTI can be obtained by the calculation of the formula (1):
RA-RNTI ═ 1+ s _ id +14 × t _ id +14 × 80 × f _ id +14 × 80 × 8 × ul _ carrier _ id formula (1)
Wherein s _ id is an index number of a first symbol of the PRACH resource (0 ≦ s _ id <14), t _ id is an index number of a first slot of the PRACH resource in a system frame (0 ≦ t _ id <80), f _ id is a resource index number of the PUSCH in the frequency domain (0 ≦ f _ id <8), and ul _ carrier _ id is a carrier identifier for transmitting the preamble.
Therefore, after the UE sends the preamble on one PRACH resource, a unique RA-RNTI can be calculated according to the formula (1) through the time-frequency position of the PRACH resource, and then the indication of the PDCCH signaling scrambled by the RA-RNTI is received in the RAR window. In LTE, the start position of the RAR window is the third subframe after the subframe in which the UE sends the preamble.
As shown in fig. 6a, after the initial position of the RAR window is located one symbol after the PRACH opportunity, type 1PDCCH may be received in the RAR window, and a control resource set of the RAR search space is determined by Downlink Control Information (DCI) carried in the PDCCH. The length of the RAR window may be indicated by the base station through Radio Resource Control (RRC) signaling.
As shown in fig. 6b, the RAR may be included in a MAC PDU, and one MAC PDU may include a plurality of MAC sub-PDUs. One MAC sub-PDU may include a subheader (sub) and a payload (payload), in which RARs may be carried. Or one MAC sub-PDU may include only the sub-header. As shown in fig. 6c, one MAC sub-PDU may include an E field, a T field, an R field, and a BI field, or one MAC sub-PDU may include an E field, a T field, and a RAP ID field. Wherein, the E field is used to indicate whether the MAC sub-PDU containing the sub-header is the last MAC sub-PDU of the MAC PDU, the T field indicates whether the MAC sub-header contains a random access preamble identifier or backoff indication information, the R field is reserved bits, the BI field identifies the load condition of the cell, and the RAP ID field identifies the transmitted random access preamble identifier. As shown in fig. 6d, one MAC Service Data Unit (SDU) may include 1 or more fields. For example, fields R timing advance command (timing advance command), uplink Grant (UL Grant), and temporary cell radio network identity (temporary C-RNTI) are included.
In NR, the size of RAR is 7 bytes (byte), the UE may determine the starting position of reading the MAC RAR through the MAC subheader, and if the UE detects that the RAP ID is the same as the preamble ID sent by the UE in a certain MAC subheader, read the 7 bytes RAR information following the MAC subheader.
For the 2-step random access process, as shown in fig. 2, the terminal sends a message a, where the message a includes a preamble and uplink data. The terminal side device may determine Random Access Channel (RACH) resources and data resources in a 2-step random access procedure, send a preamble on the RACH resources, and send uplink data on the data resources. And after the terminal sends the message A, the terminal receives a message B. If the terminal verifies that the contention resolution information included in the message B is successful, the random access is successful. If the network side does not decode the message A successfully, response information can be sent to inform the UE to return to the 4-step random access process or inform the UE to continue the 2-step random access process.
At present, for further implementation of the 2-step random access scheme, and for how compatible the 4-step random access scheme and the 2-step random access scheme, the following problems exist: after the UE performs the random access process of 4 steps or the random access process of 2 steps, the formats of the response messages are different, and how to avoid the need to design for the terminal side device to perform the wrong analysis.
Based on the random access method provided by the application, terminal side equipment can search PDCCH in different search spaces according to the identifiers of the different search spaces, or the terminal side equipment can detect PDCCH according to different RNTIs, downlink control information borne by the PDCCH indicates the resource of the response information, and the terminal side equipment receives the response information on the resource indicated by the downlink control information; or the terminal side equipment can identify corresponding response messages according to different MAC PDU formats, so that the terminal side equipment can quickly identify the response messages of different random access processes, and the terminal side equipment is prevented from being analyzed by mistake.
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. In the description of the present application, unless otherwise specified, "at least one" means one or more, "a plurality" means two or more. In addition, in order to facilitate clear description of technical solutions of the embodiments of the present application, in the embodiments of the present application, terms such as "first" and "second" are used to distinguish the same items or similar items having substantially the same functions and actions. Those skilled in the art will appreciate that the terms "first," "second," etc. do not denote any order or quantity, nor do the terms "first," "second," etc. denote any order or importance.
For convenience of understanding, the random access method provided by the embodiments of the present application is specifically described below with reference to the accompanying drawings.
As shown in fig. 7, an embodiment of the present application provides a random access method, including:
701. and the network side equipment sends the first configuration parameter of the first random access process to the terminal side equipment.
The first configuration parameter includes an identifier of the first search space and a configuration of the first uplink resource. Or, the first configuration parameter includes configuration of the first uplink resource.
702. The terminal side equipment receives a first configuration parameter of a first random access process from the network side equipment.
The first random access process is a process that terminal side equipment sends a first random access request, first uplink data is sent by using a first uplink resource, and response information is received; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data. It is understood that the first uplink resource is a resource obtained before the random access response. Thus. The terminal may transmit the first uplink data before acquiring the resources in the random access response. The response to the first uplink data may include contention resolution information, an Acknowledgement (ACK) or a Negative Acknowledgement (NACK), and the like.
For example, the first random access procedure may be a random access procedure including 2 steps, that is, a random access procedure in which the terminal-side device transmits the MSGA and receives the MSGB.
The first configuration parameter includes an identifier of the first search space and a configuration of the first uplink resource. The identification of the first search space may be specifically allocated for the first random access procedure or the identification of the first search space is specific to the first random access procedure. The terminal side device may quickly identify a search space of the first random access procedure according to the identifier of the first search space, and then detect Downlink Control Information (DCI) of the first random access procedure in the search space. The first configuration parameters may also include a DCI format associated with the identification of the first search space, a monitored slot period or a monitored slot position, and the like.
The first configuration parameter may further include an identifier of a first control resource set, where the first control resource set is a resource set for detecting downlink control information carried in the first search space. The identifier of the first control resource set is associated with the frequency domain resource and the duration of the carried downlink control information.
That is to say, the terminal side device may search for DCI in the PDCCH corresponding to the first random access procedure according to the time-frequency control resource set indicated by the first control resource set identifier. The set of time-frequency control resources indicated by the first set of control resources identification may comprise one or more time-frequency resources. The first search space is associated with an identification of the first set of control resources.
703. The terminal side equipment sends a first random access request to the network side equipment and sends first uplink data by using a first uplink resource.
Wherein the first random access request may include a first random access preamble or a first demodulation reference signal (DMRS). It may be appreciated that the first random access preamble and the first DMRS may also both be transmitted.
The terminal side device may obtain a first uplink resource for transmitting first uplink data from a resource configuration message of the first random access procedure, and select a first random access preamble or DMRS corresponding to the first random access procedure, and select a PRACH resource for transmitting the first random access preamble or DMRS. And the terminal side equipment transmits first uplink data by using the first uplink resource and transmits a first random access preamble or a DMRS by using the PRACH resource. It is to be appreciated that the DRMS can transmit on PUSCH resources on which data is transmitted.
In a possible design, the terminal-side device may obtain, from the multiplexing and assembling entity, first uplink data to be sent, and store the first uplink data in the first message buffer. The first message cache is a first random access procedure specific cache. Or the first message buffer may be dedicated to the first random access procedure. The first message buffer may also be referred to as MSGA buffer, and the application is not limited as long as the concept of the message buffer for identifying the first random access procedure conforms to the definition of the first message buffer in this document. Then, the terminal side device may obtain the first uplink data from the first message buffer, store the first uplink data in the HARQ buffer, and instruct the HARQ process to trigger transmission of the first uplink data in the HARQ buffer. It can be understood that if there is already one MAC PDU in the first message buffer and this resource is an uplink grant resource of the first random access procedure, the HARQ entity can obtain this MAC PDU from the first message buffer.
Optionally, when determining that the serving cell initializes the first random access procedure, the terminal side device may clear the first message buffer and/or the second message buffer to clear data left in the first message buffer and the second message buffer in the last random access procedure, so that the first message buffer may carry first uplink data of the first random access procedure, and the second message buffer may carry second uplink data of the second random access procedure.
It should be noted that the first uplink data may be an RRC connection establishment request, an RRC connection recovery request, or an RRC reestablishment request message. The first uplink Data may also be uplink service Data or signaling generated by a MAC layer, a Radio Link Control (RLC), a Packet Data Convergence Protocol (PDCP), or a non-access stratum (NAS) layer. The first upstream data may also be considered a combination of one or more of the types of data described above.
The second message buffer is specific to the second random access procedure in case the first random access procedure fails or in case the second message buffer has no uplink data and the first message buffer has uplink data. And the terminal side equipment re-initiates a second random access process and acquires second uplink data from the first message cache. That is to say, when the terminal side device moves back from the first random access process to the second random access process, the uplink data can be obtained from the first message buffer, and the uplink data does not need to be generated again, thereby improving the data transmission efficiency. The second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response. For example, the second random access procedure refers to a random access procedure including 4 steps, that is, a random access procedure in which the terminal-side device and the network device interact with each other through MSG1-MSG 4.
Under the condition that the first random access process fails or the second message cache does not have uplink data and the first message cache has the uplink data, the second message cache is used for a second random access process; the method further comprises the following steps: the terminal side equipment stores the uplink data in the first message cache into a second message cache; and in the second random access process, the terminal side equipment acquires second uplink data from the second message cache. That is to say, when the terminal side device falls back from the first random access process to the second random access process, the uplink data in the first message buffer may be copied to the second message buffer, and the uplink data may be obtained from the second message buffer, without generating the uplink data again, thereby improving the data transmission efficiency.
In one possible design, the terminal-side device may store the first uplink data in the first message buffer and the second message buffer. That is to say, when the terminal side device initiates the first random access procedure, the first uplink data may be stored in the first message buffer and the second message buffer. If the first random access process initiated by the terminal side equipment fails, the terminal side equipment needs to return to the second random access process, and can directly acquire uplink data from the second message cache without regenerating the uplink data, so that the data transmission efficiency is improved.
In one possible design, the terminal-side device may obtain, in the first random access procedure, first uplink data to be sent from the multiplexing and assembling entity, and store the first uplink data in a third message buffer (e.g., RACH buffer). And then, the terminal side equipment acquires the first uplink data from the third message buffer, stores the first uplink data in the HARQ buffer, and instructs the HARQ process to trigger the transmission of the first uplink data in the HARQ buffer. And the third message cache is a shared cache of the first random access process and the second random access process.
Optionally, the terminal side device may clear the third message buffer when determining that the serving cell initializes the first random access procedure. And clearing the data left in the third message buffer in the last random access process so that the third message buffer can bear the first uplink data and the second uplink data of the first random access process.
In a possible design, after the terminal-side device instructs the HARQ process to trigger transmission of the first uplink data in the HARQ buffer, the terminal-side device may temporarily reserve the first uplink data in the HARQ buffer, and if the first random access process fails, the terminal-side device may retransmit the first uplink data in the HARQ buffer according to the first uplink grant, or may retransmit the first uplink data in the HARQ buffer before transmitting the first uplink data. In the prior art, after data in the HARQ buffer is transmitted, the HARQ buffer is cleared in time, and in the present application, the first uplink data in the HARQ buffer may be temporarily reserved, so that it is avoided that the first uplink data needs to be obtained from the message buffer (e.g., the first message buffer) or the multiplexing and assembling entity again after the first random access process fails, and the data transmission efficiency is improved.
In all the above designs, if the size of the uplink data transmission resource in the first random procedure or the second random access procedure cannot be matched with the size of the MAC PDU obtained from the message buffer, the multiplexing and assembling entity is instructed to process. For example, part or all of the MAC SDUs are obtained from the MAC PDU, MAC sub-PDUs are generated for the MAC SDUs, and then the MAC PDUs are composed.
When the terminal-side device initializes the first random access procedure, the terminal-side device may set the first counter to an initial value, for example, may set the value of the first counter to 0 or 1. The first counter is specific to, or dedicated to, the first random access procedure. The first COUNTER may be a first random access PREAMBLE TRANSMISSION COUNTER (PREAMBLE _ transition _ COUNTER). If the contention resolution of the first random access procedure fails, the terminal side device increments the count value of the first counter by one. The contention resolution failure of the first random access procedure may be that, when the PDCCH detection window is overtime, the response message of the first random access procedure received by the terminal side device does not match the first random access preamble sent by the terminal side device, or the terminal side device does not receive the response message of the first random access procedure, or the terminal side device does not receive the PDCCH scheduled by the C-RNTI of the terminal, or the contention resolution information field of the response message of the first random access procedure is not verified successfully. If the first counter reaches the configured maximum value, the terminal side equipment indicates that the first random access process of a higher layer (for example, an RRC layer) fails. The maximum value of the first counter may be (preambleTransMax) or (preambleTransMax + 1).
Or when the terminal side device initializes the first random access process, the terminal side device sets a second counter as an initial value, and the second counter is a shared counter of the first random access process and the second random access process. The related operation of the second counter may refer to the first counter, which is not described herein. It can be understood that, if contention resolution of the first or second random access procedure fails, the terminal side device increments the count value of the shared counter by one.
Optionally, the terminal may count the number of times of failure in the first random access procedure, and report the number of times of failure to the network device through a high-level signaling. For example, the auxiliary information reporting message is reported to the network device. It can be understood that the terminal may count the number of times of failure of the second random access procedure, and report the number of times of failure to the network device through the high-level signaling. The failure times of the first random access process and the failure times of the second random access process can be counted and reported respectively.
Also, when the terminal-side device initializes the first random access procedure, the terminal-side device may set the first power ramp counter to an initial value (e.g., 1), the first power ramp counter may be specific to the first random access procedure, or the first power ramp counter may be specific to the first random access procedure. If the second terminal-side device needs to (re) transmit the first random access request or the first uplink data, and the Synchronization Signal Block (SSB) is not changed, the terminal-side device increments the count value of the first power ramp-up counter by one.
Or when the terminal side device initializes the first random access process, the terminal side device sets a second power ramp-up counter as an initial value, and the second power ramp-up counter is a shared power ramp-up counter of the first random access process and the second random access process. The operation of the second power ramp counter may refer to the first power ramp counter, which is not described herein. It will be appreciated that the second random access procedure is initiated, the synchronization signal block is unchanged, and the count value of the second power ramp-up counter is incremented by one.
704. And the network side equipment sends the downlink control information.
The downlink control information is used for indicating resources of response information of the first random access procedure.
705. The terminal side device detects the downlink control information.
And the terminal side equipment searches DCI in the time-frequency resource of the PDCCH corresponding to the first random access process. As shown in fig. 8, after the terminal-side device sends the first message on the PUSCH resource, the terminal-side device starts to receive the detection window of the PDCCH corresponding to the first random access procedure. The window may be a RAR window or a specific window timer configured by the network.
The window may be initiated at one of: (1) after the last symbol of the PRACH opportunity that sends preamble, it is used for receiving a symbol of the control resource set of the type 1PDCCH search space of RAR at the earliest. (2) After the last symbol of the PUSCH opportunity for transmitting data, the symbol is used for receiving the control resource set of the type 1PDCCH search space of Msg B at the earliest. (3) And starting the data at the starting time after the last symbol sent by the PUSCH resource.
In a possible design, the terminal side device detects downlink control information carried in the first search space according to the identifier of the first search space, where the downlink control information indicates a resource of the response information.
In a possible design, the terminal side device detects downlink control information corresponding to the first random access process according to the first RNTI, and the downlink control information indicates resources of the response information. The first RNTI is a scrambling identifier of downlink control information corresponding to the first random access process. That is, DCI in a PDCCH corresponding to the first random access procedure may be a first DCI format (e.g., DCI formats 0_0and 1_0 or other formats) scrambled with the first RNTI. The first RNTI may be specifically allocated for the first random access procedure, or the first RNTI may be specific to the first random access procedure. The terminal side device may descramble the PDCCH corresponding to the first random access procedure with the first RNTI. It is to be understood that the first RNTI is different from the RA-RNTI already defined in the protocol.
The first RNTI is predefined or notified by the network side device through a dedicated or common message. For example, the first RNTI may be included in a resource configuration message of the first random access procedure. The first RNTI may be allocated to the UE through a higher layer or a physical layer. A plurality of UEs may share one first RNTI. The terminal side device in an idle state, an active state (inactive) or a connected state may correspond to different first RNTIs. The first RNTI and a resource for transmitting the first uplink data have a corresponding relationship. The first RNTI may be associated with PUSCH resources indicated by one or more uplink grant configurations. After the terminal side equipment sends first uplink data through the first uplink grant, the terminal side equipment receives DCI in the PDCCH through the first RNTI related to the first uplink grant.
In a possible design, the terminal side device detects downlink control information carried in the first search space according to the identifier of the first search space, and descrambles the downlink control information corresponding to the first random access process according to the first RNTI.
706. And the terminal side equipment receives the response information on the resources indicated by the downlink control information.
Namely, the terminal side equipment receives the response information on the resource of the response information indicated by the downlink control information.
After receiving and descrambling DCI corresponding to the first random access process, the terminal side device may receive an MAC PDU from a Physical Downlink Shared Channel (PDSCH) indicated by the DCI, where the MAC PDU includes a first MAC sub-PDU corresponding to the first random access process, and the first MAC sub-PDU includes response information.
Optionally, the first MAC sub-PDU further includes an identifier of the first random access request. For example, an identification of the first random access request (e.g., Preamble ID) may be included in a MAC subheader in the first MAC sub-PDU.
In one possible design, a MAC PDU may include 1 or more MAC sub-PDUs. The MAC PDU may include not only a first MAC sub-PDU corresponding to a first random access procedure, but also a second MAC sub-PDU corresponding to a second random access procedure, where the second MAC sub-PDU includes a second random access response in the second random access procedure. The second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response.
Optionally, the second MAC sub-PDU further includes an identifier of the second random access request. For example, the identification of the second random access request may be included in a MAC subheader in the second MAC sub-PDU. Payload of the second MAC sub-PDU is the RAR field.
In one possible design, the second MAC sub-PDU precedes the first MAC sub-PDU in the MAC PDU.
For example, as shown in fig. 9, the first MAC PDU may include 3 MAC sub-PDUs, where the first MAC sub-PDU may carry a response of the second random access procedure initiated by the first terminal side device, and the second MAC sub-PDU may carry a response of the first random access procedure initiated by the second terminal side device. The third MAC sub-PDU may carry a response of the first random access procedure initiated by the third terminal side device. Optionally, the MAC subheader of the first MAC sub-PDU carries a logical channel identifier, where the logical channel identifier indicates that a payload (i.e., RAR) after the MAC subheader is a response to the second random access procedure initiated by the first terminal-side device. The MAC subheader of the second MAC sub-PDU carries a logical channel identifier, which indicates that payload (i.e., RAR field and CR field) after the MAC subheader is a response to the first random access procedure initiated by the second terminal-side device. And the MAC subheader of the third MAC subPDU carries a logical channel identifier, and the identifier indicates that payload behind the MAC subheader is a response to the first random access process initiated by the third terminal side equipment. Optionally, each MAC subheader carries length field information or length indication bit information, where the length information indicates the length of the payload following the MAC subheader, so as to support variable payload length.
For example, as shown in fig. 10, the first MAC PDU may include 2 MAC sub-PDUs. The first MAC sub-PDU contains 1 MAC sub-header and 1 RAR field. The second MAC sub-PDU contains a CR field, 1 MAC sub-header and 1 RAR field. Wherein, the CR field may be 1 or more (as an example in the figure).
For example, as shown in fig. 11, the first MAC PDU may include 2 MAC sub-PDUs. The first MAC sub-PDU contains 1 MAC sub-header and 1 RAR field. The second MAC sub-PDU contains a CR field and 1 MAC sub-header. Wherein, the CR field may be 1 or more.
For example, as shown in fig. 12, the first MAC PDU may include 3 MAC sub-PDUs. The first MAC sub-PDU contains 1 MAC sub-header and 1 RAR field. The second MAC sub-PDU contains 1 MAC sub-header and 1 CR field. The third MAC sub-PDU contains 1 MAC sub-header and 1 CR field.
For example, as shown in fig. 13, the first MAC PDU may include 2 MAC sub-PDUs. The first MAC sub-PDU contains 1 MAC sub-header and 1 enhanced RAR field. The second MAC sub-PDU contains 1 MAC sub-header and an enhanced RAR field. The enhanced RAR field includes at least one or more of a timing adjustment field, an uplink grant field, a temporary cell radio network temporary identification field, and a CR field.
For example, the first MAC PDU may include 2 MAC sub-PDUs. One MAC sub-PDU includes 1 MAC sub-header and 1 RAR field, CR field. The second MAC sub-PDU includes 1 MAC sub-header and RAR and CR fields.
In one possible design, the first MAC sub-PDU includes a MAC sub-header, 1 or more CR fields.
In one possible design, a payload or subheader in the first MAC sub-PDU indicates whether a contention resolution information field exists; wherein, in case of yes, the first MAC sub-PDU further comprises one or more contention resolution information fields. That is, the CRs in the response to the first random access procedure initiated by the plurality of terminal-side devices may be concatenated in the first MAC sub-PDU. Alternatively, the first MAC sub-PDU may be the last MAC sub-PDU among the MAC PDUs. For example, whether a CR is present is indicated by one R bit of the MAC payload in the RAR. For example, R ═ 0 indicates that there is no CR field, and R ═ 1 indicates that there is a CR field. Wherein the CR field may be before, during or after the RAR.
In one possible design, a subheader of the first MAC sub-PDU carries a logical channel identifier, indicating that the first MAC sub-PDU only contains the contention resolution information field. It is understood that one or more contention resolution information fields. Optionally, the sub-header of the first MAC sub-PDU indicates the number of fields carrying contention resolution information.
The information of the contention resolution information field in the present invention may be part or all of the terminal identifier of the terminal, or may be part or all of the uplink data. Optionally, the MAC subheader carries a logical channel identifier, which indicates that payload is a format of the MAC PDU or MAC subpdu of the first random access (e.g., 2-step random access) response.
In one possible design, the terminal determines a MAC PDU or a format of a MAC sub-PDU of the first random access (e.g., 2-step random access) response based on the identity of the first random access request in the first MAC subheader. The identifier of the first random access request corresponds to the format of the MAC PDU or MAC sub-PDU of the 2-step random access response in the invention, and the identifier of the second random access request corresponds to the format of the existing MAC PDU or MAC sub-PDU of the 4-step random access response.
For example, as shown in fig. 14, taking the example that the MAC PDU includes 3 MAC sub-PDUs, the first MAC sub-PDU may be the last MAC sub-PDU (i.e. the third MAC sub-PDU), and it may be indicated by E ═ 0 in the MAC sub-header of the third MAC sub-PDU that there may be a CR after the RAR of the last MAC sub-PDU. The terminal side device defaults to reading the CR information at a fixed bit size (e.g., 48 bits).
The E bit of the MAC subheader of the existing random access response, 0, indicates that the MAC subpdu containing the MAC subheader is the last MAC subpdu of the MAC PDU. For the present invention, the terminal determines whether there is a CR according to the size of the MAC PDU. One possibility for this is to be followed by padding, not the CR field. In one possible design, the indication information is added in the MAC subheader, and the CR field exists after the last MAC sub-PDU indicated when E ═ 0. Alternatively, the number of CR fields present or the length of all CR fields may be indicated. In one possible design, indication information is added to the MAC subheader, and the MAC sub-PDU of the CR field exists after the last MAC sub-PDU indicated when E ═ 0. Alternatively, the number of MAC sub-PDUs in which the CR field exists or the length of all MAC sub-PDUs in which the CR field exists may be indicated.
In one possible design, a MAC PDU may include 1 or more MAC sub-PDUs. The RAR field and the CR field are not in the same MAC PDU. The MAC PDU only contains the first MAC sub-PDU. At this time, the first MAC sub-PDU includes a first MAC sub-header, 1 or more CR fields. This MAC PDU does not contain a RAR field. The MAC PDU includes only the second MAC sub-PDU, including the second MAC sub-header and the RAR field. This MAC PDU does not contain the CR field.
707. And the network side equipment sends the second configuration parameters of the second random access process to the terminal side equipment.
The second configuration parameter may include an identification of the second search space and an uplink grant for the second random access procedure. Or, the second configuration parameter includes an uplink grant of the second random access procedure.
708. And the terminal side equipment receives a second configuration parameter of a second random access process from the network side equipment.
The second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response. For example, the second random access procedure refers to a random access procedure including 4 steps, that is, a random access procedure in which the terminal-side device and the network device interact with each other through MSG1-MSG 4.
The second configuration parameter includes an identification of the second search space, the identification of the second search space being different from the identification of the first search space. The second search space may be used to carry downlink control information indicating resources of the second random access response. The terminal side device may identify the search space of the second random access procedure according to the identifier of the second search space, and then detect DCI of the second random access procedure in the search space.
The second configuration parameter may further include a second control resource set identifier, where the second control resource set is a resource set for detecting downlink control information carried in the second search space. That is, the terminal side device may search the DCI corresponding to the second random access procedure on the time-frequency control resource set indicated by the second control resource set identifier.
709. And the terminal side equipment sends a second random access request to the network side equipment in a second random access process.
The second random access request may include a second random access preamble of a second random access procedure. And the terminal side equipment sends a second random access preamble to the network side equipment in the selected PRACH resource.
710. And the network side equipment transmits the DCI on the resource of the second random access response.
The downlink control information indicates resources of the second random access response.
711. The terminal side device receives the DCI on the resources of the second random access response.
In a possible design, the terminal side device receives the PDCCH corresponding to the second random access procedure according to the identifier of the second search space. Referring to the description in step 706, the identifier of the second search space includes a second control resource set identifier, and the terminal side device may search for the PDCCH corresponding to the second random access procedure on the time-frequency control resource set indicated by the second control resource set identifier.
It should be noted that the identification of the first search space and the identification of the second search space may be different. In particular, the identification of the first search space may be specifically allocated for the first random access procedure, or the identification of the first search space may be specific to the first random access procedure. The identification of the second search space may be specifically allocated for the second random access procedure, or the identification of the second search space may be specific to the second random access procedure. Thus, if the terminal side device initiates the first random access procedure (i.e., the random access procedure including two steps), the PDCCH may be received according to the identifier of the first search space. If the terminal side device initiates a second random access procedure (i.e., a random access procedure including four steps), the PDCCH may be received according to the identifier of the second search space. Therefore, the terminal side equipment can quickly identify or distinguish the PDCCH of different random access processes according to different identifications of the search space, and the terminal side equipment is prevented from analyzing response messages of different random access processes by mistake.
And the terminal side equipment detects downlink control information corresponding to a second random access process according to a second RNTI, wherein the downlink control information indicates resources of a second random access response, and the second RNTI is a scrambling identifier of the downlink control information corresponding to the second random access process.
In one possible design, the terminal side device receives a PDCCH scrambled with the second RNTI corresponding to the second random access procedure. That is, DCI in a PDCCH corresponding to the second random access procedure may be a second DCI format (e.g., DCI formats 0_0and 1_0 or other formats) scrambled with the second RNTI. The terminal side device may descramble the PDCCH corresponding to the second random access procedure with the second RNTI.
The first RNTI and the RNTI may be different. Specifically, the first RNTI may be specifically allocated for the first random access procedure, or the first RNTI is dedicated to the first random access procedure. And the second RNTI may be specifically allocated for the second random access procedure, or the second RNTI may be specific to the second random access procedure. Thus, if the terminal side device initiates a first random access procedure (i.e., a random access procedure including two steps), the PDCCH may be descrambled according to the first RNTI. If the terminal side device initiates a second random access procedure (i.e., a random access procedure including four steps), the PDCCH may be descrambled according to the second RNTI. Therefore, the terminal side equipment can quickly identify or distinguish the PDCCH of different random access processes according to the difference of the RNTI, and the terminal side equipment is prevented from analyzing the response messages of different random access processes by mistake.
In one possible design, the terminal side device receives, according to the identifier of the first search space, a PDCCH corresponding to a first random access procedure scrambled by the first RNTI. The terminal side equipment can rapidly identify or distinguish the PDCCH of different random access processes according to the difference of the identification of the search space and the RNTI, so that the terminal side equipment is prevented from analyzing the response messages of different random access processes by mistake.
712. And the terminal side equipment sends second uplink data according to the second random access response.
And the terminal side equipment receives the response information of the second random access preamble according to the scheduling information of the PDCCH corresponding to the second random access process. After receiving and descrambling the PDCCH corresponding to the second random access procedure, the terminal side device may obtain DCI from the PDSCH indicated by the scheduling information of the PDCCH, where the DCI indicates a resource of the second random access response.
Then, the terminal side device may obtain the second uplink data from the second message buffer, store the second uplink data in the HARQ buffer, and instruct the HARQ process to trigger transmission of the second uplink data in the HARQ buffer. The second uplink data may be uplink traffic and/or signaling data.
Optionally, the terminal side device may clear the second message buffer when determining that the serving cell initializes the second random access procedure.
And under the condition that the second random access process fails or the first message cache has no uplink data and the second message cache has uplink data, the terminal side equipment initiates the first random access process again to acquire the uplink data from the second message cache. That is to say, when the terminal side device moves back from the second random access process to the first random access process, the uplink data can be obtained from the second message buffer, and the uplink data does not need to be generated again, thereby improving the data transmission efficiency.
In one possible design, the terminal-side device may store the second uplink data in the first message buffer and the second message buffer. That is to say, when the terminal side device initiates the second random access procedure, the first uplink data may be stored in the first message buffer and the second message buffer. If the second random access process initiated by the terminal side equipment fails, the first random access process is carried out, the uplink data can be directly obtained from the first message cache without regenerating the uplink data, and the data transmission efficiency is improved.
In a possible design, the terminal side device obtains the second uplink data from the third message buffer, stores the second uplink data in the HARQ buffer, and instructs the HARQ process to trigger transmission of the second uplink data in the HARQ buffer. And the third message cache is a shared cache of the first random access process and the second random access process.
If the sending resource of the terminal side device does not match the size of the data obtained from the buffer, the terminal side device may reassemble the data obtained from the buffer into the MAC PDU, refer to the above description, and are not described herein again.
Optionally, the terminal side device may clear the third message buffer when determining that the serving cell initializes the second random access procedure.
When the terminal-side device initializes the second random access procedure, the terminal-side device may set the third counter to an initial value, for example, may set a value of the third counter to 0 or 1. The third counter is specific to the second random access procedure. The third COUNTER may be a third random access PREAMBLE transmit COUNTER (PREAMBLE _ transition _ COUNTER). And if the contention resolution of the second random access process fails, the terminal side equipment adds one to the count value of the third counter. If the third counter reaches the configured maximum value, the terminal side device indicates that the first random access procedure of the higher layer (for example, RRC layer) fails. The terminal can count the failure times of the first random access process and report the failure times to the network equipment. No further description is given here to the details,
or when the terminal side device initializes the second random access process, the terminal side device sets a second counter as an initial value, and the second counter is a shared counter of the first random access process and the second random access process.
Also, when the terminal-side device initializes the second random access procedure, the terminal-side device may set a third power ramp counter to an initial value (e.g., 1), the third power ramp counter may be specific to the first random access procedure, or the third power ramp counter may be specific to the first random access procedure. If the terminal side device needs to (re) send the first random access request or the first uplink data, and the synchronization signal block is not changed at this time, the terminal side device increases the count value of the third power ramp-up counter by one.
Or when the terminal side device initializes the first random access process, the terminal side device sets a second power ramp-up counter as an initial value, and the second power ramp-up counter is a shared power ramp-up counter of the first random access process and the second random access process. It will be appreciated that the first random access procedure and the second random access procedure are initiated, the synchronization signal block is unchanged, and the count value of the third power ramp-up counter is incremented by one.
713. And the network side equipment sends competition resolving information to the terminal side equipment.
The contention resolution information may be included in the Msg 4.
714. And the terminal side equipment receives the competition resolving information sent by the network side equipment.
Contention resolution information corresponding to the second random access procedure may be included in the Msg4, and the terminal-side device may access a network-side device (e.g., an eNodeB) according to the contention resolution information.
It should be noted that, there is no necessary execution sequence between steps 701 to 714, and the execution sequence between the steps is not specifically limited in this embodiment.
In the embodiments provided in the present application, the method provided in the embodiments of the present application is introduced from the perspective of the terminal side device, the network side device, and the interaction between the terminal side device and the network side device. In order to implement the functions in the method provided by the embodiment of the present application, the terminal-side device and the network-side device may include a hardware structure and/or a software module, and implement the functions in the form of a hardware structure, a software module, or a hardware structure and a software module. Whether any of the above-described functions is implemented as a hardware structure, a software module, or a hardware structure plus a software module depends upon the particular application and design constraints imposed on the technical solution.
In the case of dividing each functional module according to each function, fig. 15 shows a schematic diagram of a possible structure of the apparatus 15 according to the above embodiment, which may be a terminal-side device, and the terminal-side device includes: a receiving unit 1501, a transmitting unit 1502, and a processing unit 1503. In this embodiment of the present application, the receiving unit 1501 is configured to receive, from a network side device, a first configuration parameter of a first random access process, where the first configuration parameter includes an identifier of a first search space and configuration of a first uplink resource, and the first random access process is a process in which a terminal side device sends a first random access request and uses the first uplink resource to send first uplink data, and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; a sending unit 1502, configured to send a first random access request to a network side device and send first uplink data by using a first uplink resource; a processing unit 1503, configured to detect, according to the identifier of the first search space, downlink control information carried in the first search space, where the downlink control information indicates a resource of the response information; the receiving unit 1501 is further configured to receive response information on a resource indicated by the downlink control information. Or, the processing unit 1503 is configured to detect, according to the first radio network temporary identity RNTI, downlink control information corresponding to the first random access procedure, where the downlink control information indicates a resource of the response information, and the first RNTI is a scrambling identity of the downlink control information corresponding to the first random access procedure. The receiving unit 1501 may be further configured to receive a media access control protocol data unit MAC PDU, where the MAC PDU includes a first MAC sub-PDU corresponding to the first random access procedure, and the first MAC sub-PDU includes response information.
In the method embodiment shown in fig. 7, the receiving unit 1501 is configured to support the terminal-side device to perform the processes 702, 706, 708, and 714 in fig. 7. The sending unit 1502 is configured to support the terminal-side device to perform the processes 703, 709, and 712 in fig. 7. A processing unit 1503, configured to support the terminal-side device to execute the process 705 in fig. 7. All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
In the case of dividing each functional module by corresponding functions, fig. 16 shows a schematic structural diagram of a possible apparatus 16 involved in the foregoing embodiment, where the apparatus may be a network side device, and the network side device includes: a transmitting unit 1601 and a receiving unit 1602. In this embodiment of the present application, the sending unit 1601 is configured to send a first configuration parameter of a first random access process to a terminal side device, where the first configuration parameter includes an identifier of a first search space and configuration of a first uplink resource, and the first random access process is a process in which the terminal side device sends a first random access request and uses the first uplink resource to send first uplink data, and receives response information; the response information is a first random access response aiming at the first random access request or a response aiming at the first uplink data; a receiving unit 1602, configured to receive first uplink data from a terminal side device; a sending unit 1601, configured to send downlink control information in the first search space according to the identifier of the first search space, where the downlink control information indicates a resource of the response information; the transmitting unit 1601 is further configured to transmit the response information on the resource indicated by the downlink control information. Optionally, the network side device may further include a processing unit 1603, configured to scramble downlink control information corresponding to the first random access process according to the first radio network temporary identifier RNTI, where the downlink control information indicates a resource of the response information, and the first RNTI is a scrambling identifier of the downlink control information corresponding to the first random access process. The sending unit 1601 may further be configured to send a medium access control protocol data unit MAC PDU, where the MAC PDU includes a first MAC sub-PDU corresponding to the first random access procedure, and the first MAC sub-PDU includes response information.
In the method embodiment shown in fig. 7, the sending unit 1601 is configured to support a network-side device to perform processes 701, 704, 707, 710, and 713 in fig. 7. All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
The division of the modules in the embodiments of the present application is schematic, and only one logical function division is provided, and in actual implementation, there may be another division manner, and in addition, each functional module in each embodiment of the present application may be integrated in one processor, may also exist alone physically, or may also be integrated in one module by two or more modules. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. For example, in the embodiment of the present application, the receiving unit and the transmitting unit may be integrated into the transceiving unit.
The method provided by the embodiment of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a network side device, a user device, or other programmable apparatus. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., Digital Video Disk (DVD)), or a semiconductor medium (e.g., Solid State Drive (SSD)), among others.
It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.

Claims (22)

1. A random access method, comprising:
a terminal side device receives a first configuration parameter of a first random access process from a network side device, wherein the first configuration parameter comprises an identifier of a first search space and configuration of a first uplink resource, and the first random access process is a process of sending a first random access request to the terminal side device, sending first uplink data by using the first uplink resource, and receiving response information; wherein the response information is a first random access response for a first random access request or a response for the first uplink data;
the terminal side equipment sends the first random access request to the network side equipment and sends the first uplink data by using the first uplink resource;
the terminal side device detects downlink control information carried in the first search space according to the identifier of the first search space, wherein the downlink control information indicates the resource of the response information;
the terminal side equipment receives the response information on the resource indicated by the downlink control information;
the terminal side device receives a second configuration parameter of a second random access process from the network side device, where the second configuration parameter includes an identifier of a second search space, the second random access process is a process in which the terminal side device sends a second random access request, receives a second random access response to the second random access request, and sends second uplink data according to the second random access response, and the second search space is used for carrying downlink control information indicating resources of the second random access response;
and the terminal side equipment performs the second random access process.
2. The random access method of claim 1,
the first configuration parameter further includes an identifier of a first control resource set, where the first control resource set is a resource set for detecting that the downlink control information is carried in the first search space.
3. The random access method of claim 1, wherein the identity of the first search space and the identity of the second search space are different.
4. A random access method, comprising:
a terminal side device receives a first configuration parameter of a first random access process from a network side device, wherein the first configuration parameter comprises a first uplink resource, and the first random access process is a process of sending a first random access request to the network side device by the terminal side device, sending first uplink data by using the first uplink resource, and receiving response information; wherein the response information is a first random access response for a first random access request or a response for the first uplink data;
the terminal side device detects downlink control information corresponding to the first random access process according to a first Radio Network Temporary Identifier (RNTI), wherein the downlink control information indicates resources of the response information, and the first RNTI is a scrambling identifier of the downlink control information corresponding to the first random access process;
the terminal side equipment receives the response information on the resource of the response information;
the terminal side equipment sends a second random access request to the network side equipment in a second random access process, wherein the second random access process is a process of sending the second random access request to the terminal side equipment, receiving a second random access response to the second random access request and sending second uplink data according to the second random access response;
the terminal side equipment detects downlink control information corresponding to the second random access process according to a second RNTI, wherein the downlink control information indicates a resource of the second random access response, and the second RNTI is a scrambling identifier of the downlink control information corresponding to the second random access process;
and the terminal side equipment receives the second random access response on the resource of the second random access response and sends the second uplink data according to the second random access response.
5. The random access method according to claim 4, wherein the first RNTI is predefined or notified by a network side device through a message.
6. The method according to claim 4, wherein the first RNTI corresponds to a resource for transmitting the first uplink data.
7. A random access method, characterized in that,
a terminal side device receives a first configuration parameter of a first random access process from a network side device, wherein the first configuration parameter comprises a first uplink resource;
the terminal side equipment sends a first random access request to network side equipment and first uplink data by using the first uplink resource in the first random access process, wherein the first random access process is a process of sending the first random access request and the first uplink data by the terminal side equipment and receiving response information; wherein the response information is a first random access response for a first random access request or a response for the first uplink data;
the terminal side equipment receives a media access control protocol data unit (MAC PDU), wherein the MAC PDU comprises a first MAC sub-PDU corresponding to the first random access process, and the first MAC sub-PDU comprises the response information;
the MAC PDU also comprises a second MAC sub-PDU corresponding to a second random access process, and the second MAC sub-PDU comprises a second random access response in the second random access process; the second random access process is a process of sending a second random access request by the terminal side device, receiving a second random access response to the second random access request, and sending second uplink data according to the second random access response.
8. The random access method of claim 7, wherein the first MAC sub-PDU further comprises an identification of the first random access request.
9. The random access method of claim 7, wherein the second MAC sub-PDU further comprises an identification of the second random access request.
10. The random access method of claim 7, wherein the second MAC sub-PDU precedes the first MAC sub-PDU in the MAC PDU.
11. The random access method of claim 7, wherein a payload or subheader in the first MAC sub-PDU indicates whether a contention resolution information field exists;
wherein, in the case of yes, the first MAC sub-PDU further includes one or more contention resolution information fields.
12. The random access method according to any of claims 1-11, further comprising:
and the terminal side equipment acquires the first uplink data from a first message cache, wherein the first message cache is a cache specific to the first random access process.
13. The random access method according to any of claims 1-11, wherein a second message buffer is a buffer specific to the second random access procedure, in case the first random access procedure fails, or in case the second message buffer has no uplink data and the first message buffer has uplink data, wherein the first message buffer is a buffer specific to the first random access procedure;
the method further comprises the following steps: in the second random access process, the terminal side device obtains the second uplink data from the first message cache.
14. The random access method according to any of claims 1-11, wherein a second message buffer is a buffer specific to the second random access procedure, in case the first random access procedure fails, or in case the second message buffer has no uplink data and the first message buffer has uplink data, wherein the first message buffer is a buffer specific to the first random access procedure;
the method further comprises the following steps:
the terminal side equipment stores the uplink data in the first message cache into a second message cache;
and in the second random access process, the terminal side device obtains the second uplink data from the second message buffer.
15. The random access method according to any of claims 1-11, further comprising:
the terminal side equipment stores the first uplink data in a first message cache and a second message cache; or the like, or, alternatively,
the terminal side equipment stores the second uplink data in the first message cache and a second message cache; wherein the first message cache is a cache specific to the first random access procedure; the second message cache is a cache specific to the second random access procedure.
16. The random access method according to any of claims 1-11, wherein a second message buffer is a buffer specific to the second random access procedure, in case the second random access procedure fails, or in case a first message buffer has no uplink data and the second message buffer has uplink data, wherein the first message buffer is a buffer specific to the first random access procedure;
the method further comprises the following steps: and the terminal side equipment acquires the first uplink data from the second message cache.
17. The random access method according to any of claims 1-11, further comprising:
the terminal side equipment acquires the first uplink data from a third message cache in the first random access process;
the terminal side device obtains the second uplink data from the third message cache in the second random access process;
wherein the third message cache is a shared cache of the first random access procedure and the second random access procedure.
18. The random access method according to any of claims 1-11, wherein the method further comprises:
when the terminal side device initializes the first random access procedure, the terminal side device sets a first counter to an initial value, the first counter being specific to the first random access procedure.
19. The random access method according to any of claims 1-11, wherein the method further comprises:
when the terminal side device initializes the first random access process, the terminal side device sets a second counter as an initial value, wherein the second counter is a shared counter of the first random access process and the second random access process.
20. A communication apparatus, configured to implement the random access method according to any one of claims 1 to 19.
21. A communications apparatus comprising a processor and a memory, the memory having instructions stored therein, which when invoked and executed, cause the communications apparatus to perform the random access method of any one of claims 1 to 19.
22. A computer-readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the random access method of any one of claims 1 to 19.
CN201910118161.3A 2019-02-15 2019-02-15 Random access method and device Active CN111586879B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910118161.3A CN111586879B (en) 2019-02-15 2019-02-15 Random access method and device
PCT/CN2020/075425 WO2020164622A1 (en) 2019-02-15 2020-02-14 Random access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910118161.3A CN111586879B (en) 2019-02-15 2019-02-15 Random access method and device

Publications (2)

Publication Number Publication Date
CN111586879A CN111586879A (en) 2020-08-25
CN111586879B true CN111586879B (en) 2022-04-05

Family

ID=72043914

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910118161.3A Active CN111586879B (en) 2019-02-15 2019-02-15 Random access method and device

Country Status (2)

Country Link
CN (1) CN111586879B (en)
WO (1) WO2020164622A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804706B (en) * 2020-12-31 2022-07-26 联想未来通信科技(重庆)有限公司 Communication link detection method and device
CN115334531A (en) * 2021-05-10 2022-11-11 华为技术有限公司 Communication method and communication device
CN115955726A (en) * 2022-04-29 2023-04-11 中兴通讯股份有限公司 Control method of random access process and related equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102440057A (en) * 2009-04-23 2012-05-02 交互数字专利控股公司 Method and apparatus for random access in multicarrier wireless communications
CN103858498A (en) * 2012-09-29 2014-06-11 华为技术有限公司 Control information sending method, receiving method, and apparatus
CN104704756A (en) * 2012-10-08 2015-06-10 Lg电子株式会社 Method for transceiving control information, and apparatus for same
CN108738134A (en) * 2017-04-13 2018-11-02 普天信息技术有限公司 A kind of time division multiplexing random access resource selection method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150046029A (en) * 2012-07-27 2015-04-29 엘지전자 주식회사 Method and apparatus for receiving downlink signal in wireless communication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102440057A (en) * 2009-04-23 2012-05-02 交互数字专利控股公司 Method and apparatus for random access in multicarrier wireless communications
CN103858498A (en) * 2012-09-29 2014-06-11 华为技术有限公司 Control information sending method, receiving method, and apparatus
CN104704756A (en) * 2012-10-08 2015-06-10 Lg电子株式会社 Method for transceiving control information, and apparatus for same
CN108738134A (en) * 2017-04-13 2018-11-02 普天信息技术有限公司 A kind of time division multiplexing random access resource selection method

Also Published As

Publication number Publication date
WO2020164622A1 (en) 2020-08-20
CN111586879A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
US11102825B2 (en) Method and device for responding to random access
JP6204599B2 (en) Method, user equipment, and base station for pre-determining resources in random access
US8305964B2 (en) Signaling for preamble used for random access
US9295084B2 (en) Method and apparatus for performing contention based random access
CN111447644A (en) User equipment and uplink data transmission method
EP3857769B1 (en) User equipment and method for random access performed by user equipment
US20200374920A1 (en) Method and apparatus for transmitting data in random access process
CN111586879B (en) Random access method and device
WO2012135998A1 (en) Random access procedures with cross-carrier scheduling
US20210410191A1 (en) Efficient messaging in a procedure for accessing a communication channel
EP2235996B1 (en) Apparatus and method for random access in cellular system
US8509167B2 (en) Method of effectively transmitting identification information of terminal during the generation of data block
JP2023537067A (en) Frequency domain resource determination method, device and storage medium
TWI511597B (en) Method of preventing random access response collision
EP3573413A1 (en) Random access method, user equipment, base station and random access system
CN111465112B (en) Method and device for processing access control signaling
CN111586883B (en) Random access method and device
WO2018201850A1 (en) Resource configuration method, apparatus and system
US20210218495A1 (en) Signal transmission method and communications apparatus
US11882602B2 (en) Data transmission method, base station, and user equipment
CN113439467B (en) Communication between a terminal and a radio network node
RU2801324C2 (en) Random access method and device
CN109617656B (en) Terminal, base station and HARQ (hybrid automatic repeat request) process identification ID configuration method
CN113875311B (en) Non-contention based two-step random access method, device, terminal and storage medium
CN107637159B (en) Method for managing contention resolution, wireless communication device and radio network node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant