CN111629394A - Random access method and device - Google Patents

Random access method and device Download PDF

Info

Publication number
CN111629394A
CN111629394A CN201910146690.4A CN201910146690A CN111629394A CN 111629394 A CN111629394 A CN 111629394A CN 201910146690 A CN201910146690 A CN 201910146690A CN 111629394 A CN111629394 A CN 111629394A
Authority
CN
China
Prior art keywords
cyclic shift
target
random access
value
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910146690.4A
Other languages
Chinese (zh)
Other versions
CN111629394B (en
Inventor
廖树日
丁梦颖
胡远洲
汪凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201910146690.4A priority Critical patent/CN111629394B/en
Priority to PCT/CN2020/074615 priority patent/WO2020173295A1/en
Publication of CN111629394A publication Critical patent/CN111629394A/en
Application granted granted Critical
Publication of CN111629394B publication Critical patent/CN111629394B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure

Abstract

The application provides a random access method and a random access device, which can increase the number of random access leader sequences of a cell, thereby reducing the probability of collision of random access. The method comprises the following steps: the network equipment sends first information to the terminal equipment, wherein the first information is used for indicating a target logical root serial number of a cell, the target logical root serial number is used for indicating a target physical root serial number and J-1 target cyclic shift difference values, and J is an integer larger than 1; the terminal device receives the first information and sends a random access leader sequence to the network device, and the network device receives the random access leader sequence, wherein the random access leader sequence is determined according to a target physical root sequence number and J-1 target cyclic shift difference values.

Description

Random access method and device
Technical Field
The present application relates to the field of communications, and in particular, to a random access method and apparatus in the field of communications.
Background
In order to cope with the explosive mobile data traffic increase, the connection of massive mobile communication devices, and various new services and application scenarios which are continuously emerging in the future, a fifth generation (5th generation, 5G) communication system which can support multiple services is produced. Compared with a random access scenario in a Long Term Evolution (LTE) communication system, a random access scenario in a 5G communication system requires that the number of users in a serving cell can reach 10-100 times of the number of users in the serving cell in the LTE communication system, and therefore a Random Access Channel (RACH) is required to support a stronger function, for example, the spectral efficiency of the RACH can be increased by 4 times in a scenario lower than 6GHz, and increased by 64 times in a scenario higher than 6 GHz. The random access channel is used for the terminal device to access the network device during an access process, for example, the terminal device may send a random access preamble sequence (preamble, which may also be referred to as a random access preamble or an access preamble) to the network device on a Physical Random Access Channel (PRACH). After the terminal equipment is accessed to the network equipment, the terminal equipment can carry out data transmission with the network equipment. For example, the terminal device may perform downlink data transmission with the network device, that is, the network device sends data to the terminal device; for another example, the terminal device may perform uplink data transmission with the network device, that is, the terminal device sends data to the network device.
The random access preamble sequence transmitted by the terminal device may be randomly selected from a set of random access preamble sequences configured for the cell, wherein the set of random access preamble sequences includes one or more random access preamble sequences. Because the number of the random access leader sequences included in the random access leader sequence set is limited, with the increasing number of the terminal devices, the situation that a plurality of terminal devices adopt the same random access leader sequence to request to access the same cell easily occurs, that is, the random access collides, and the access of the plurality of terminal devices to the cell fails.
Disclosure of Invention
The application provides a random access method and a random access device, which can increase the number of random access leader sequences of a cell, thereby reducing the probability of collision of random access.
In a first aspect, a random access method is provided, including: receiving first information, wherein the first information is used for indicating a target logical root sequence number of a cell, the target logical root sequence number is used for indicating a target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer greater than 1; and sending a random access leader sequence, wherein the random access leader sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values.
According to the random access method, the network equipment sends the first information to the terminal equipment to indicate the target logic root serial number, the terminal equipment determines the target physical root serial number and the J-1 target cyclic shift difference values according to the target logic root serial number, and then obtains the random access sequence and sends the random access sequence to the network equipment, so that the collision probability of random access can be reduced, and meanwhile, the signaling overhead when the logic root serial number is configured can be reduced.
In this embodiment, the J-1 target cyclic shift difference values are obtained from a plurality of target cyclic shift values, or are described as the J-1 target cyclic shift difference values used to determine a plurality of target cyclic shift values, and the J-1 target cyclic shift difference values may be the difference between two target cyclic shift values in the plurality of target cyclic shift values. Thus, for a particular set of J-1 target cyclic shift differences, different two target cyclic shift values can obtain the same target cyclic shift difference, e.g., a cyclic shift difference of 1 can be obtained from the cyclic shift value combination (1,2) and the cyclic shift value combination (3, 4). I.e., J-1 target cyclic shift differences may correspond to a plurality of different combinations of target cyclic shift values. Because a random access leader sequence can be generated according to a target cyclic shift value combination, more random access leader sequences can be obtained according to a target physical root sequence number and J-1 target cyclic shift difference values, and the random access leader sequences are used for randomly selecting a sequence for access by terminal equipment. The J-1 target cyclic shift differences may be completely the same, may not be completely the same, and may not be completely the same, which is not limited in this application. For example, when J-1 is greater than 1, any two target cyclic shift differences of the J-1 target cyclic shift differences may be the same or different.
Further, in the embodiment of the present application, a specific (physical root sequence number, cyclic shift difference) combination is configured for one cell, so that one cell can correspond to a greater number of cyclic shift value combinations, and compared with the above logical root sequence number and (physical root sequence number, cyclic shift value) combination, the signaling overhead of configuring the logical root sequence number by the network device is smaller.
In some implementations of the first aspect, the terminal device may determine the target physical root sequence number and J-1 target cyclic shift difference values according to the first mapping relationship and the target logical root sequence number. The first mapping is used to represent a one-to-one correspondence between a plurality of logical root sequence numbers and a plurality of (physical root sequence numbers, J-1 cyclic shift difference values) combinations. In the embodiment of the application, the target logical root sequence number corresponds to a combination of a target physical root sequence number and J-1 target cyclic shift difference values. For example, the first mapping relationship may be embodied in a form of a table or a formula, and the like, which is not limited in this embodiment of the application.
For the terminal device, sending a random access preamble sequence according to the target physical root sequence number and the J-1 target cyclic shift difference values, there may be multiple implementation manners.
In a possible implementation manner, the terminal device may generate M random access preamble sequences according to the target physical root sequence number and the J-1 target cyclic shift difference values. When the terminal device performs random access, it may randomly select one sequence from the M random access preamble sequences and send it to the network device. Alternatively, the terminal device may store the M random access preamble sequences before random access.
In a possible implementation manner, the terminal device may determine M combinations of target cyclic shift values according to the J-1 target cyclic shift difference values, where the M combinations of target cyclic shift values may generate M random access sequences. When the terminal device performs random access, a cyclic shift value combination can be selected from the M target cyclic shift value combinations, cyclic shift is performed on a target physical root sequence according to cyclic shift values in the cyclic shift value combination to obtain J target sequences, and the J target sequences are overlapped to obtain a random access leader sequence. The terminal device may transmit the random access preamble sequence to a network device. Alternatively, the terminal device may store the M target cyclic shift values in combination before the random access.
In certain implementations of the first aspect, the determining the random access preamble sequence according to the target physical root sequence number and the J-1 target cyclic shift difference values includes: the random access preamble sequence is determined according to the target physical root sequence number and J target cyclic shift values, the J target cyclic shift values are determined according to the J-1 target cyclic shift difference values, a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference value between a jth +1 target cyclic shift value and a 1 st target cyclic shift value of the J target cyclic shift values, a value range of J is from 1 to J-1, and J is an integer.
In certain implementations of the first aspect, the J-1 target cyclic shift difference values are derived from J target cyclic shift values, a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference between a jth +1 target cyclic shift value and a jth target cyclic shift value of the J target cyclic shift values, J ranges from 1 to J-1, and J is an integer.
Specifically, J target cyclic shift values may be determined according to the J-1 target cyclic shift difference values, and according to one possible combination of the J target cyclic shift values, cyclic shift is performed on the target physical root sequences corresponding to the J-1 target cyclic shift difference values, so as to obtain J target sequences. And superposing the J target sequences to obtain a random access leader sequence which is finally adopted by the terminal equipment to access the cell. According to multiple possible combinations of the J target cyclic shift values, multiple random access preamble sequences available to the terminal device can be generated, and the terminal device can randomly select one sequence from the multiple random access preamble sequences to access the cell.
In certain implementations of the first aspect, the random access preamble sequence is obtained by stacking J target sequences, and the J target sequences respectively correspond to the J target cyclic shift values.
In certain implementations of the first aspect, the J-1 target cyclic shift difference values are derived from other numbers of target cyclic shift values. Optionally, the number of target cyclic shift values is 2 × J (1), that is, J-1 target cyclic shift differences are obtained from 2 × J (1) target cyclic shift values, a jth target cyclic shift difference of the J-1 target cyclic shift differences is a difference between a 2 × J target cyclic shift value of the 2 × J (1) target cyclic shift values and a 2 × J-1 target cyclic shift value, J ranges from 1 to J-1, and J is an integer.
Specifically, 2 × target cyclic shift values may be determined according to the J-1 target cyclic shift differences, and 2 × target (J-1) target sequences may be obtained by cyclically shifting the target physical root sequence according to one possible combination of the 2 × target cyclic shift values. And superposing the 2x (J-1) target sequences to obtain a random access leader sequence which is finally adopted by the terminal equipment to access the cell. According to the possible combinations of the 2 × J-1 target cyclic shift values, a plurality of random access preamble sequences available to the terminal device may be generated, and the terminal device may randomly select one of the plurality of random access preamble sequences to access the cell.
In certain implementations of the first aspect, the random access preamble sequence is a superposition of 2 × J-1 target sequences, and the 2 × J-1 target sequences respectively correspond to the 2 × J-1 target cyclic shift values.
It should be understood that the above-mentioned superimposing multiple target sequences is only one possible implementation manner of generating the random access preamble sequence, and the random access preamble sequence may also be determined in a dot-product manner or other manners, which is not limited in this embodiment of the present application.
In certain implementations of the first aspect, the random access preamble sequence is one of M random access preamble sequences determined from the J-1 target cyclic shift difference values,
Figure BDA0001980252850000031
Figure BDA0001980252850000032
Figure BDA0001980252850000033
wherein Nzc is the length of the target physical root sequence, Ncs is the target zero correlation value,
Figure BDA0001980252850000034
indicating that a rounding down is performed on x and MAX indicates the maximum value.
In certain implementations of the first aspect, a Cubic Metric (CM) value of the random access preamble sequence is less than a preset CM threshold. The network device can screen the random access leader sequence according to the CM threshold value, and ensure that the CM value of the random access leader sequence adopted by the terminal device is smaller than the CM threshold value, thereby reducing the requirement on the power amplifier.
As an optional embodiment, a peak to average power ratio (PAPR) value of the random access preamble sequence is smaller than a preset PAPR threshold. The network device can screen the random access leader sequence according to the PAPR threshold value, and ensure that the PAPR value of the random access leader sequence adopted by the terminal device is smaller than the PAPR threshold value, thereby reducing the requirement on the power amplifier.
In certain implementations of the first aspect, the J-1 target cyclic shift differences are cyclic shift differences at a target zero correlation value Ncs-2.
In certain implementations of the first aspect, the J-1 target cyclic shift differences are
Figure BDA0001980252850000041
And the J-1 targetsA target cyclic shift difference among the cyclic shift differences satisfies a maximum value of the cyclic shift differences when Ncs-2 or less, where X is a positive integer,
Figure BDA0001980252850000042
indicating that rounding up is performed on x.
In certain implementations of the first aspect, the method further comprises: receiving second information, where the second information is used to indicate a target zero correlation value of the cell from a candidate zero correlation value set, and a zero correlation value in the candidate zero correlation value set is an integer multiple of 2.
Specifically, the network device may send second information to the terminal device, where the second information is used to configure a target zero correlation value, where the target zero correlation value is selected from a candidate zero correlation value set, and a zero correlation value included in the candidate zero correlation value set is an integer multiple of 2. In this way, the correspondence relationship between the logical root sequence number and the combination of (physical root sequence number, J-1 cyclic shift difference values) can be configured only for the cyclic shift difference value corresponding to Ncs ═ 2. For cyclic shift difference corresponding to Ncs 2 × X, the cyclic shift difference can be expressed by formula
Figure BDA0001980252850000043
And determining, thereby saving signaling overhead of configuring the logical root sequence number by the network equipment.
In a second aspect, a random access method is provided, including: sending first information, wherein the first information is used for indicating a target logical root sequence number of a cell, the target logical root sequence number is used for indicating a target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer larger than 1; receiving a random access preamble sequence, wherein the random access preamble sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values.
In certain implementations of the second aspect, the determining the random access preamble sequence according to the target physical root sequence number and the J-1 target cyclic shift difference values includes: the random access preamble sequence is determined according to J target cyclic shift values, the J target cyclic shift values are determined according to J-1 target cyclic shift difference values, a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference value between a jth +1 target cyclic shift value and a 1 st target cyclic shift value of the J target cyclic shift values, a value range of J is from 1 to J-1, and J is an integer.
In certain implementations of the second aspect, the J-1 target cyclic shift difference values are derived from J target cyclic shift values, a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference between a jth +1 target cyclic shift value and a jth target cyclic shift value of the J target cyclic shift values, J ranges from 1 to J-1, and J is an integer.
In certain implementations of the second aspect, the random access preamble sequence is obtained by stacking J target sequences, and the J target sequences respectively correspond to the J target cyclic shift values
In certain implementations of the second aspect, the J-1 target cyclic shift difference values are derived from other numbers of target cyclic shift values. Optionally, the number of target cyclic shift values is 2 × 1, that is, J-1 target cyclic shift difference values are obtained from 2 × 1 target cyclic shift values, a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference value between a 2 jth target cyclic shift value and a 2J-1 target cyclic shift value of the 2 × 1 target cyclic shift values, J ranges from 1 to J-1, and J is an integer.
In certain implementations of the second aspect, the random access preamble sequence is a superposition of 2 × J-1 target sequences, and the 2 × J-1 target sequences respectively correspond to the 2 × J-1 target cyclic shift values.
In certain implementations of the second aspect, the random access preamble is one of M random access preamble sequences determined from the J-1 target cyclic shift difference values,
Figure BDA0001980252850000044
Figure BDA0001980252850000045
Figure BDA0001980252850000046
wherein Nzc is the length of the target physical root sequence, Ncs is the target zero correlation value,
Figure BDA0001980252850000047
indicating that a rounding down is performed on x and MAX indicates the maximum value.
In certain implementations of the second aspect, the cubic metric CM value of the random access preamble sequence is less than a preset CM threshold.
In certain implementations of the second aspect, a peak-to-average power ratio, PAPR, value of the random access preamble sequence is less than a preset PAPR threshold.
In certain implementations of the second aspect, the J-1 target cyclic shift differences are cyclic shift differences at a target zero correlation value Ncs of 2.
In certain implementations of the second aspect, the J-1 target cyclic shift differences are
Figure BDA0001980252850000051
And a target cyclic shift difference value of the J-1 target cyclic shift difference values satisfies a maximum value of cyclic shift difference values when Ncs-2, where X is a positive integer,
Figure BDA0001980252850000052
indicating that rounding up is performed on x.
In certain implementations of the second aspect, the method further comprises: and sending second information, wherein the second information is used for indicating the target zero correlation value of the cell from a candidate zero correlation value set, and the zero correlation value in the candidate zero correlation value set is an integral multiple of 2.
In a third aspect, another random access method is provided, including: and sending a random access sequence, wherein the random access sequence is included in a candidate random access sequence set, the candidate random access sequence set comprises one or more candidate random access sequences, and the CM value of the random access sequence in the candidate random access sequence set is smaller than the CM threshold value.
In certain implementations of the third aspect, each random access sequence in the set of candidate random access sequences is determined according to a physical root sequence number and J target cyclic shift values. Illustratively, each random access sequence in the candidate random access sequence set is obtained by superposition according to J target sequences. The J target sequences correspond one-to-one to the J target cyclic shift values. And one target sequence in the J target sequences is obtained by circularly shifting the physical root sequence according to the corresponding target circular shift value. The physical root sequence corresponds to the physical root sequence number.
In certain implementations of the third aspect, prior to the sending the random access sequence, the method further comprises: receiving first information, wherein the first information is used for indicating a target logical root sequence number of a cell, the target logical root sequence number is used for indicating a target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer greater than 1; and sending a random access leader sequence, wherein the random access leader sequence is determined according to the K target physical root sequence numbers and the J-1 target cyclic shift difference values. For the description of the J-1 target cyclic shift differences, reference may be made to the first aspect, which is not described herein again.
In certain implementations of the third aspect, the method further comprises: and receiving second information, wherein the second information is used for configuring a target zero correlation value of the cell for the terminal equipment from a candidate zero correlation value set, and the zero correlation value in the candidate zero correlation value set is an integral multiple of 2.
In a fourth aspect, another random access method is provided, including: receiving a random access sequence, wherein the random access sequence is included in a candidate random access sequence set, the candidate random access sequence set includes one or more candidate random access sequences, and a CM value of a random access sequence in the candidate random access sequence set is smaller than a CM threshold.
In certain implementations of the fourth aspect, each random access sequence in the set of candidate random access sequences is determined according to a physical root sequence number and J target cyclic shift values. Illustratively, each random access sequence in the candidate random access sequence set is obtained by superposition according to J target sequences. The J target sequences correspond one-to-one to the J target cyclic shift values. And one target sequence in the J target sequences is obtained by circularly shifting the physical root sequence according to the corresponding target circular shift value. The physical root sequence corresponds to the physical root sequence number.
In certain implementations of the fourth aspect, prior to the receiving the random access sequence, the method further comprises: sending first information, wherein the first information is used for indicating a target logical root sequence number of a cell, the target logical root sequence number is used for indicating a target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer larger than 1; receiving a random access preamble sequence, wherein the random access preamble sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values. For the description of the J-1 target cyclic shift differences, reference may be made to the second aspect, which is not described herein again.
In certain implementations of the fourth aspect, the method further comprises: and sending second information, wherein the second information is used for configuring a target zero correlation value of the cell for the terminal equipment from a candidate zero correlation value set, and the zero correlation value in the candidate zero correlation value set is an integral multiple of 2.
In a fifth aspect, another random access method is provided, including: receiving first information, wherein the first information is used for indicating a target logic root serial number of a cell, and the target logic root serial number is used for indicating a target physical root serial number; and sending a random access leader sequence, wherein the random access leader sequence is determined according to the target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer larger than 1.
Specifically, the target logical root sequence number and the target physical root sequence number are in one-to-one correspondence, that is, a logical root sequence number (or referred to as a logical root sequence index) and a corresponding physical root sequence number (RootNumber) are defined. In the embodiment of the present application, J-1 target cyclic shift differences may be configured for different cells, and the J-1 target cyclic shift differences of different cells may be completely the same or not completely the same (i.e., partially the same or completely different), and are not limited herein. That is, for a cell, the J-1 target cyclic shift difference value of the cell may be a fixed value, a value determined by some predefined rule (e.g., a positive integer pre-configured by the cell ID mod), or a value indicated by the network device for the terminal device through the third information.
It should be understood that, after determining the J-1 target cyclic shift differences of the cell, the description in the first aspect above may be referred to for a method for determining a random access preamble sequence according to a target physical root sequence number and the J-1 target cyclic shift differences, and further, the description of the J-1 target cyclic shift differences may also refer to the first aspect above, which is not repeated herein.
In a sixth aspect, another random access method is provided, including: sending first information, wherein the first information is used for indicating a target logic root serial number of a cell, and the target logic root serial number is used for indicating a target physical root serial number; receiving a random access preamble sequence, wherein the random access preamble sequence is determined according to the target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer greater than 1.
Specifically, the target logical root sequence number and the target physical root sequence number are in one-to-one correspondence, that is, a logical root sequence number (or referred to as a logical root sequence index) and a corresponding physical root sequence number (RootNumber) are defined. In the embodiment of the present application, J-1 target cyclic shift differences may be configured for different cells, and the J-1 target cyclic shift differences of different cells may be completely the same or not completely the same (i.e., partially the same or completely different), and are not limited herein. That is, for a cell, the J-1 target cyclic shift difference value of the cell may be a fixed value, a value determined by some predefined rule (e.g., a positive integer pre-configured by the cell ID mod), or a value indicated by the network device for the terminal device through the third information.
It should be understood that, after determining the J-1 target cyclic shift differences of the cell, the description in the second aspect above may be referred to for a method for determining a random access preamble sequence according to the target physical root sequence number and the J-1 target cyclic shift differences, and further, the description of the J-1 target cyclic shift differences may also refer to the second aspect above, which is not repeated herein.
In a seventh aspect, an apparatus is provided for performing the method of the above aspects or any possible implementation manner of the aspects. In particular, the apparatus comprises means for performing the method in the above aspects or any possible implementation of the aspects. In one design, the apparatus may include a module corresponding to one or more of the methods/operations/steps/actions described in the foregoing aspects, and the module may be a hardware circuit, a software circuit, or a combination of a hardware circuit and a software circuit.
In an eighth aspect, there is provided an apparatus comprising: a communication interface, a memory, and a processor. Wherein the processor is configured to implement the method of the above aspects or any possible implementation of the aspects, and the memory is coupled to the processor. Optionally, the communication interface, the memory and the processor are in communication with each other via an internal connection, the memory is configured to store instructions, and the processor is configured to execute the instructions stored by the memory to implement the method in the above aspects or any possible implementation manner of the aspects.
In a ninth aspect, there is provided a system comprising means for implementing the method of the first aspect or any one of the possible implementations of the first aspect, and means for implementing the method of the second aspect or any one of the possible implementations of the second aspect; or the system comprises means for implementing the method of any possible implementation of the third aspect or the third aspect described above, and means for implementing the method of any possible implementation of the fourth aspect or the fourth aspect described above; or the system comprises means for implementing the method of any possible implementation of the fifth aspect or the fifth aspect described above, and means for implementing the method of any possible implementation of the sixth aspect or the sixth aspect described above. In one design, the system includes means for implementing the method performed by the terminal device and means for implementing the method performed by the network device.
In a tenth aspect, there is provided a computer program product comprising: computer program code which, when executed by a computing device, causes the computing device to perform the method of any one of the above aspects or possible implementations of the aspects.
In an eleventh aspect, there is provided a computer-readable medium for storing instructions that, when executed on a computer, cause the computer to perform the instructions of the above aspects or the method in any possible implementation of the aspects.
In a twelfth aspect, an embodiment of the present application provides a chip system, where the chip system includes a processor and may further include a memory, and is configured to implement the method in the foregoing aspects or any possible implementation manner of the aspects. The chip system may be formed by a chip, and may also include a chip and other discrete devices.
Drawings
Fig. 1 shows a schematic diagram of an application scenario of an embodiment of the present application;
fig. 2 shows a schematic flow chart of a random access method of an embodiment of the present application;
FIG. 3 shows a schematic block diagram of an apparatus of an embodiment of the present application;
fig. 4 shows a schematic block diagram of another apparatus of an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a global system for mobile communications (GSM) system, a Code Division Multiple Access (CDMA) system, a Wideband Code Division Multiple Access (WCDMA) system, a General Packet Radio Service (GPRS), a long term evolution (long term evolution, LTE) system, a LTE Frequency Division Duplex (FDD) system, a LTE Time Division Duplex (TDD), a universal mobile telecommunications system (universal mobile telecommunications system, UMTS), a Worldwide Interoperability for Microwave Access (WiMAX) communication system, a fifth generation (5G) system, or a New Radio (NR), etc.
The terminal device related to the embodiment of the present application may be simply referred to as a terminal, and may be a device having a wireless transceiving function. The terminal can be deployed on land, including indoors or outdoors, hand-held or vehicle-mounted; can also be deployed on the water surface (such as a ship and the like); and may also be deployed in the air (e.g., airplanes, balloons, satellites, etc.). The terminal device may be a User Equipment (UE). The UE includes a handheld device, an in-vehicle device, a wearable device, or a computing device with wireless communication capabilities. Illustratively, the UE may be a mobile phone (mobile phone), a tablet computer, or a computer with wireless transceiving function. The terminal device may also be a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal in industrial control, a wireless terminal in unmanned driving, a wireless terminal in telemedicine, a wireless terminal in smart grid, a wireless terminal in smart city (smart city), a wireless terminal in smart home (smart volume), and so on. In the embodiment of the present application, the apparatus for implementing the function of the terminal may be a terminal; it may also be a device, such as a system-on-chip, capable of supporting the terminal to implement the function, which may be installed in the terminal. In the embodiment of the present application, the chip system may be composed of a chip, and may also include a chip and other discrete devices. In the technical solution provided in the embodiment of the present application, a device for implementing a function of a terminal is taken as an example, and the technical solution provided in the embodiment of the present application is described.
The network device in this embodiment may be a device for communicating with a terminal device, where the network device may be a Base Transceiver Station (BTS) in a global system for mobile communications (GSM) system or a Code Division Multiple Access (CDMA) system, may also be a node B (NodeB, NB) in a Wideband Code Division Multiple Access (WCDMA) system, may also be an evolved node B (evolved NodeB, eNB, or eNodeB) in an LTE system, and may also be a wireless controller in a Cloud Radio Access Network (CRAN) scenario, or the network device may be a relay station, an access point, a vehicle-mounted device, a wearable device, a network device in a future 5G network, a network device in a Public Land Mobile Network (PLMN) for future evolution, or the like, and the embodiment of the present application is not limited. A base station may be a device deployed in a radio access network that is capable of wireless communication with terminals. The base station may have various forms, such as a macro base station, a micro base station, a relay station, an access point, and the like. For example, the base station related to the embodiment of the present application may be a base station in 5G or a base station in LTE, where the base station in 5G may also be referred to as a Transmission Reception Point (TRP) or a gnb (generation nodeb). In the embodiment of the present application, the apparatus for implementing the function of the network device may be a network device; or may be a device, such as a system-on-chip, capable of supporting the network device to implement the function, and the device may be installed in the network device. In the technical solution provided in the embodiment of the present application, a device for implementing a function of a network device is taken as an example of a network device, and the technical solution provided in the embodiment of the present application is described.
The method provided by the embodiment of the present application may be used for communication between a network device and a terminal device, may also be used for communication between a macro base station and a micro base station, and may also be used for communication between a terminal device and a terminal device, which is not limited in the embodiment of the present application.
In the embodiment of the application, the terminal device or the network device includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer. The hardware layer includes hardware such as a Central Processing Unit (CPU), a Memory Management Unit (MMU), and a memory (also referred to as a main memory). The operating system may be any one or more computer operating systems that implement business processing through processes (processes), such as a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a windows operating system. The application layer comprises applications such as a browser, an address list, word processing software, instant messaging software and the like. Furthermore, the embodiment of the present application does not particularly limit the specific structure of the execution subject of the method provided by the embodiment of the present application as long as communication can be performed according to the method provided by the embodiment of the present application, for example, the execution subject of the method provided by the embodiment of the present application may be a terminal device or a network device, or a functional module capable of executing a program in the terminal device or the network device.
Additionally, various aspects or features of embodiments of the application may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term "article of manufacture" as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer-readable media may include, but are not limited to: magnetic storage devices (e.g., hard disk, floppy disk, or magnetic tape), optical disks (e.g., Compact Disk (CD), Digital Versatile Disk (DVD), etc.), smart cards, and flash memory devices (e.g., erasable programmable read-only memory (EPROM), card, stick, or key drive, etc.). In addition, various storage media described herein can represent one or more devices and/or other machine-readable media for storing information. The term "machine-readable medium" can include, without being limited to, various other media capable of storing, containing, and/or carrying instruction(s) and/or data.
Fig. 1 illustrates a communication system 100 to which embodiments of the present application may be applied. The communication system 100 may include at least one network device 110 and one or more terminal devices 120 located within the coverage area of the network device 110. Fig. 1 exemplarily shows one network device and two terminal devices, and optionally, the communication system 100 may include a plurality of network devices and may include other numbers of terminal devices within the coverage of each network device, which is not limited in this embodiment of the present application. In the embodiments of the present application, at least one may be one or more, for example, 1,2, 3, or more.
Optionally, the wireless communication system 100 may further include other network entities such as a network controller, a mobility management entity, and the like, which is not limited thereto.
The following first introduces possible application scenarios of the method provided by the embodiment of the present application.
When a terminal device wants to perform data transmission with a network device in a certain cell, the terminal device needs to access the network device. Specifically, the terminal device may randomly select one random access preamble sequence from at least one random access preamble sequence (preamble, which may also be referred to as random access preamble, random access sequence, and the like) included in a random access preamble sequence set configured for the cell, and then send the random access preamble sequence to the network device on a physical random access channel. After the terminal device accesses the network device, data transmission can be performed with the network device. It should be understood that one cell may configure a specific set of random access preamble sequences. Taking the example that the random access preamble sequence set includes a plurality of random access preamble sequences, the terminal device may determine the plurality of random access preamble sequences in various ways.
In a possible implementation manner, the network device may configure a random access preamble sequence set for a cell, so that a terminal device in the coverage of the cell accesses the network device of the cell. The set of random access preamble sequences for each cell may include a positive integer number, e.g., 64, ZC (Zadoff-Chu) sequences, each ZC sequence corresponding to a random access preamble Identification (ID).
When the terminal device accesses a certain cell by adopting a competitive random access mode, the terminal device can randomly select a ZC sequence from a random access leader sequence set of the cell as a random access leader sequence, and the terminal device sends the selected random access leader sequence to the network device of the cell to request to access the cell.
The network device or the terminal device may obtain a random access preamble sequence set of a cell by performing Cyclic Shift (CS) on the ZC root sequence.
For a cell, a network device may allocate a logical root sequence number of a ZC root sequence to the cell, where the logical root sequence number corresponds to a physical root sequence number, the physical root sequence number may be used to generate a physical root sequence, and a random access preamble sequence of the cell is generated according to the physical root sequence. The correspondence between the logical root sequence number and the physical root sequence number may be described in a logical root sequence number schedule table. In this document, Nzc is used to indicate the length of a random access preamble sequence, Ncs is used to indicate a zero correlation value used for determining a cyclic shift value, and both the Nzc and Ncs values may be agreed by a protocol or configured by a network device for a terminal device through signaling. Where Nzc and Ncs are positive integers. In the embodiment of the present application, the positive integer may be an integer of 1,2, 3, or more, and the embodiment of the present application is not limited.
Herein, the zero correlation value Ncs may be used to represent a cyclic shift size of the cell, where the cyclic shift size determines a zero correlation zone of the random access preamble sequence, and the cyclic shift size is related to a radius of the cell, so that orthogonality of the random access preamble sequence used by the terminal device at different positions in the cell may be ensured, and a success rate of access of the terminal device may be ensured.
In the embodiment of the present application, the signaling may be semi-static signaling and/or dynamic signaling.
The semi-static signaling may be Radio Resource Control (RRC) signaling, broadcast messages, system messages, or MAC Control Elements (CEs). The broadcast message may include a Remaining Minimum System Information (RMSI).
The dynamic signaling may be physical layer signaling. The physical layer signaling may be signaling carried by a physical control channel or signaling carried by a physical data channel. The physical data channel may be a downlink channel, such as a Physical Downlink Shared Channel (PDSCH). The physical control channel may be a Physical Downlink Control Channel (PDCCH), an Enhanced Physical Downlink Control Channel (EPDCCH), a Narrowband Physical Downlink Control Channel (NPDCCH), or a machine communication physical downlink control channel (MTC) MPDCCH. The signaling carried by the PDCCH or EPDCCH may also be referred to as Downlink Control Information (DCI). The physical control channel may also be a physical side link control channel (physical side link control channel), and signaling carried by the physical side link control channel may also be referred to as side link control information (SCI).
Taking the length Nzc of the random access leader sequence as 139 as an example, the first table provides a protocol logical root sequence number planning table, which plans the physical root sequence number according to the sequence order according to the symmetry of the ZC sequence and is applicable to all zero correlation values Ncs. In table one, there is a one-to-one correspondence between a logical root sequence number (logical root sequence number) and a physical root sequence number (physical root sequence number).
Watch 1
Figure BDA0001980252850000101
In order to reduce the collision probability of a plurality of terminal devices accessing the cell, the configuration of the number of preamble sequences of the cell can be increased as much as possible. In one possible implementation, for a particular cell, the number of random access preamble sequences required by the cell may be configured. This number may be predefined or signaled by the network device for the terminal device. Illustratively, the number may be configured to be a positive integer, e.g., 64, 128, 640, etc., and the terminal device needs to select from the positive integer number of random access preamble sequences, so as to reduce the probability of random access collision between the terminal device and other terminal devices accessing the cell simultaneously.
Taking the number of random access preamble sequences required by a cell equal to 64 as an example, after the terminal device determines a logical root sequence number of a cell, 64 random access preamble sequences of the cell may be generated according to the logical root sequence number. The specific generation method of the 64 random access preamble sequences of the cell is as follows:
1) the terminal equipment reads the system parameters of the cell, and acquires a parameter RACH _ ROOT _ SEQUENCE from the system parameters of the cell, wherein the parameter RACH _ ROOT _ SEQUENCE is used for indicating the logical ROOT SEQUENCE number of the cell;
2) the terminal device determines a logical ROOT SEQUENCE number (index) of the cell according to the parameter RACH _ ROOT _ SEQUENCE, obtains a corresponding physical ROOT SEQUENCE number according to the logical ROOT SEQUENCE number (for example, by looking up the table one, if the logical ROOT SEQUENCE number is 1, the corresponding physical ROOT SEQUENCE number is 138), and determines a corresponding ZC ROOT SEQUENCE according to the physical ROOT SEQUENCE number, that is, a physical ROOT SEQUENCE represented by the physical ROOT SEQUENCE number;
3) the terminal device can use all available cyclic shifts of the ZC root sequence to generate a sequence, wherein the larger the cyclic shift is, the larger the number of the sequence is;
for example, for one cell, the random access preamble sequence generated using the cyclic shift of the ZC root sequence can be represented as:
xu,v(n)=xu((n+Cv)modNzc)
wherein:
Figure BDA0001980252850000111
xuis ZC root sequence, u is physical root sequence number determined according to logical root sequence number, and Nzc is ZC root sequence xuLength of (C)vIs a cyclic shift value determined from the zero correlation value Ncs.
By way of example, in one possible implementation,
Figure BDA0001980252850000112
Figure BDA0001980252850000113
indicating that a rounding down is performed on x and a "/" indicates a division. The terminal equipment can also determine C through a zero correlation value Ncs according to other modesvAnd are not intended to be limiting herein.
4) If one ZC root sequence is not enough to generate 64 random access preamble sequences, the terminal device may determine a next logical root sequence number according to the logical root sequence number, and continue to generate random access preamble sequences using the ZC root sequence corresponding to the next logical root sequence number until 64 random access preamble sequences are generated.
For example, for a certain cell, the logical root sequence number of the cell is configured to be 0 (the corresponding physical root sequence number is 1), and the number of random access preamble sequence configurations of the cell needs to be 64. When Ncs is 2, the number of sequences generated by cyclic shift due to a single root (physical root sequence) is 2
Figure BDA0001980252850000114
69 is greater than 64, therefore, a physical root sequence can meet the sequence number configuration requirement of the cell, and the number of root sequences required by the cell is 1, the corresponding logical root sequence number is 0, and the corresponding physical root sequence number is 1 according to table one. When Ncs is 69, the number of sequences generated by cyclic shift of a single root (physical root sequence) is 69
Figure BDA0001980252850000115
2 is less than 64, the configuration of the number of sequences of the single cell is not satisfied, therefore, the terminal device may determine a next logical root sequence number consecutive to the logical root sequence number of the cell in an incremental manner, and continue to generate the sequence with the next logical root sequence number until the number of the generated sequences satisfies the configuration of the cell. In the present embodiment, the minimum value is satisfiedThe random access sequence configuration number of the cell requires 64, the number of logical root sequence numbers required for the single cell is 32, the corresponding logical root sequence numbers are 0-31, and the corresponding physical root sequence numbers are (1, 138, 2, 137, …, 16, 123) according to table one.
In the foregoing implementation manner, the logical root sequence numbers and the physical root sequence numbers correspond to each other one to one, and each logical root sequence number may correspond to all sequences generated by cyclic shift of a physical root sequence corresponding to the logical root sequence number. As described above, if a logical root sequence number is configured for a certain cell, all sequences generated by cyclic shift of a physical root sequence corresponding to the logical root sequence number can only be used in the cell corresponding to the logical root sequence number, but cannot be used in other cells, and the sequence utilization efficiency is low.
In addition, the random access scenario of 5G requires that the number of accessible terminal devices can be 10-100 times that in the LTE system. When the terminal devices in 5G access the cell in a contention random access manner, if the manner of generating the random access preamble sequence in the LTE system is still used, a situation that multiple terminal devices simultaneously use the same random access preamble sequence to request access to the cell (that is, the random access is collided) easily occurs in one cell, resulting in a failure of access to the cell by the multiple terminal devices.
Therefore, in another possible implementation manner, the embodiment of the present application proposes another random access method. The method comprises the following steps: for a cell, the network device configures L random access sequence sets for the terminal device, each random access sequence set comprises J random access sequences, L and J are positive integers, and J is greater than or equal to 2. The L random access sequence sets may correspond to the L random access identifiers one to one, respectively. When initiating random access, the terminal device may determine a first random access identifier from the L random access identifiers, and select a first random access sequence set corresponding to the first random access identifier from the L random access sequence sets. The terminal device may determine a random access sequence from the selected first set of random access sequences. For example, the determined random access sequence is generated from a sum (e.g., direct addition, or direct addition followed by multiplication by a coefficient, or weighted summation) of J random access sequences in the selected first set of random access sequences. And the terminal equipment sends the determined random access sequence to the network equipment. The method can greatly increase the number of candidate random access sequences by corresponding a random access sequence ID to a random access sequence set and obtaining a new random access sequence according to the sum of J random access sequences in the random access sequence set. Therefore, when the terminal device generates the random access sequence requesting to access the cell to be accessed by adopting the above manner, the probability that a plurality of terminal devices simultaneously use the same random access sequence to request to access the cell (namely, the random access collision probability) can be reduced, so that the PRACH capacity of the cell can be improved.
In this embodiment of the present application, a new random access sequence is generated by adding J random access sequences, and the method provided in this embodiment of the present application may also be applied to other methods for determining a new random access sequence according to J random access sequences, for example, multiplying a coefficient after adding, performing weighted summation, or other manners, which is not limited in this embodiment of the present application.
When J random access sequences in the set of random access sequences correspond to the same physical root sequence but different cyclic shifts, the above method may also be referred to as generating a new sequence by cyclic shift combination of a single root (physical root sequence).
For a scenario in which a new sequence is generated by combining cyclic shifts of a single piece, J is 2, that is, the number of cyclic shifts of a single piece for generating a new sequence is 2. For a set of random access sequences, a combination of (physical root sequence number, cyclic shift value 1, cyclic shift value 2) is defined, i.e. (RootNumber, C)v1,Cv2) And (4) combining. Wherein RootNumber denotes a physical root sequence number, Cv1Representing the cyclic shift value of the first sequence used to generate the new sequence with respect to the physical root sequence, Cv2Indicating the cyclic shift value of the second sequence used to generate the new sequence relative to the physical root sequence.
Alternatively, the combination (physical root sequence number, cyclic shift value 1, cyclic shift value 2) may also be replaced by a combination (physical root sequence number, cyclic shift number 1, cyclic shift number 2), that is, a combination (RootNumber, CS1, CS2), which is not limited in this embodiment of the present application. Wherein RootNumber denotes a physical root sequence number, and CS1 denotes a cyclic shift value C of a first sequence for generating a new sequence with respect to the physical root sequencev1CS2 denotes a cyclic shift value C of the second sequence used for generating the new sequence with respect to the physical root sequencev2The number of (2).
As an alternative embodiment, the cyclic shift value is equal to the cyclic shift number Ncs, that is, the cyclic shift value 1 is equal to the cyclic shift number 1 Ncs, and the cyclic shift value 2 is equal to the cyclic shift number 2 Ncs. In this case, CS1 ═ Cv1/Ncs,CS2=Cv2and/Ncs. It should be understood that there may be other corresponding relationships between the cyclic shift numbers and the cyclic shift values, and this is not limited in this embodiment of the application.
In the embodiment of the present application, since the cyclic shift value and the cyclic shift number may have these relationships, the cyclic shift value may be equivalent to the cyclic shift number without a logical contradiction. For example, the method described with the cyclic shift value as an example may be replaced with the method described with the cyclic shift number as an example. The cyclic shift number may also be referred to as a cyclic shift value number, or other names, which is not limited in this embodiment of the present application.
For convenience of description, the present embodiment is described by taking (physical root sequence number, cyclic shift number 1, cyclic shift number 2) combination, that is, (RootNumber, CS1, CS2) combination as an example.
By way of example, in one possible implementation,
Figure BDA0001980252850000131
Figure BDA0001980252850000132
CS1 is v1CS2 is v2. I.e. Cv1Exist of
Figure BDA0001980252850000133
A possible value, Cv2Also exist
Figure BDA0001980252850000134
A possible value. The terminal equipment can also determine C through a zero correlation value Ncs according to other modesv1And Cv2And are not intended to be limiting herein.
Once C is determinedv1And Cv2Since CS1 ═ Cv1/Ncs,CS 2=Cv2/Ncs, i.e. CS1 and CS2 are determined, then each (RootNumber, CS1, CS2) can generate a new sequence. The logical root sequence numbers are in one-to-one correspondence with the (RootNumber, CS1, CS2) combinations, and the correspondence can be described in a logical sequence number planning table of the random access new sequence. The logical root sequence number may also be referred to as a logical sequence number or other names, which is not limited in this embodiment.
For example, the ZC sequence length Nzc is 37, the zero correlation value Ncs is 2, and the number J of cyclic shifts of a single root that generates a new sequence is 2, and table two shows the correspondence between the logical root sequence number and the (RootNumber, CS1, CS2) combination in this case. Specifically, the number of physical root sequences is Nzc-1-37-1-36, and the number of sequences generated by cyclic shift of a single root is
Figure BDA0001980252850000135
The number of new sequences generated by cyclic shift combining is C (18,2) ═ 18 × 17/2 ═ 153, so that the total number of new sequences generated by cyclic shift combining is 36 × 153 ═ 5508 for all physical root sequences.
Watch two
Figure BDA0001980252850000136
For a cell, the network device assigns a logical root sequence number to the cell, where the logical root sequence number corresponds to a combination of (RootNumber, CS1, CS 2). After determining the logical root sequence number of a cell, the terminal device may generate a random access preamble sequence required by the cell according to the logical root sequence number. The specific generation method of the random access leader sequence of the cell is as follows:
1) the terminal equipment reads the system parameters of the cell, and acquires a parameter RACH _ ROOT _ SEQUENCE from the system parameters of the cell, wherein the parameter RACH _ ROOT _ SEQUENCE is used for indicating the logical ROOT SEQUENCE number of the cell;
2) the terminal device may determine a logical ROOT SEQUENCE number (index) of the cell according to the parameter RACH _ ROOT _ SEQUENCE, and obtain a corresponding (RootNumber, CS1, CS2) combination according to the logical ROOT SEQUENCE number (for example, by looking up the table two);
3) the terminal equipment generates a random access leader sequence of the cell according to the combination of (RootNumber, CS1 and CS 2); specifically, the combination of (RootNumber, CS1, CS2) indicates that ZC sequences corresponding to physical root sequence numbers are respectively assigned to C determined according to CS1 and CS2v1And Cv2Performs cyclic shift. For a particular Cv1And Cv2Value combination, 2 sequences can be generated by circularly shifting a physical root sequence, and a new available random access leader sequence can be generated by overlapping the 2 sequences. According to a specific value of (RootNumber, CS1, CS2), the terminal device may generate a random access preamble sequence.
4) If the number of the new sequences does not satisfy the requirement of the number of the sequences configured by the cell, the terminal device may increment the logical root sequence number corresponding to the cell, that is, determine a next logical root sequence number consecutive to the logical root sequence number of the cell, and then continue to generate new sequences by using a (RootNumber, CS1, CS2) combination corresponding to the next logical root sequence number until the number of the generated new sequences satisfies the number of the random access preamble sequences configured by the cell.
It should be understood that, in order to reduce the collision probability of multiple terminal devices accessing the cell, the configuration of the number of preamble sequences of the cell should be increased as much as possible, but the configuration of the number of preamble sequences of the cell is not limited in this embodiment.
In the foregoing implementation manner, the logical root sequence number and the combination (physical root sequence number, cyclic shift number 1, cyclic shift number 2) (i.e., (RootNumber, CS1, CS2) combination) are in one-to-one correspondence, and a new sequence generated by cyclic shift for a single root is fully utilized, which may support more cell configurations, but the configuration of the number of the logical root sequence number is larger, which may cause a larger signaling overhead when the network device configures the logical root sequence number for the terminal device.
In view of this, the present application provides a new random access method, which can increase the number of random access preamble sequences of a cell, thereby reducing the probability of random access collision and ensuring that the signaling overhead of configuring a logical root sequence number by a network device is small.
Fig. 2 shows a schematic flow chart of a random access method 200 of an embodiment of the present application. The method 200 may be applied to the communication system 100 shown in fig. 1, but the embodiment of the present application is not limited thereto.
S210, a network device sends first information, wherein the first information is used for indicating a target logical root sequence number of a cell, the target logical root sequence number is used for indicating a target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer larger than 1; correspondingly, the terminal device receives the first information. The first information may also be referred to as first configuration information, first signaling, or other names, which is not limited in this embodiment of the application.
The cell is the cell where the terminal device is located. The terminal device may receive the first information from the network device in the cell.
In the embodiment of the present application, the cyclic shift difference may be a difference between cyclic shift values or a difference between cyclic shift numbers. For simplicity of description, the method provided by the embodiment of the present application may be described by taking one of the methods as an example. Illustratively, the cyclic shift value is the cyclic shift number Ncs. The difference between the cyclic shift numbers may also be referred to as a cyclic shift number difference, a cyclic shift difference number, or another name, which is not limited in this embodiment. When it is necessary to distinguish the difference between the cyclic shift values from the difference between the cyclic shift numbers, the difference between the cyclic shift values may be represented by a cyclic shift difference value, and the difference between the cyclic shift numbers may be represented by a cyclic shift difference value number or a cyclic shift number difference value.
S220, the terminal equipment sends a random access leader sequence; the network device correspondingly receives the random access preamble sequence. The random access preamble sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values.
Specifically, the network device may send first information to the terminal device, indicating a target logical root sequence number of a cell in which the terminal device is located. And the terminal equipment receives the first information, and determines a target physical root serial number and J-1 target cyclic shift difference values corresponding to the target logical root serial number according to the target logical root serial number indicated by the first information. The terminal device can send a random access leader sequence to the network device according to the target physical root sequence number and the J-1 target cyclic shift difference value, and request to access the network device.
In this embodiment, the J-1 target cyclic shift difference values are obtained from a plurality of target cyclic shift values, or are described as the J-1 target cyclic shift difference values used to determine a plurality of target cyclic shift values, and the J-1 target cyclic shift difference values may be the difference between two target cyclic shift values in the plurality of target cyclic shift values. For a specific set of J-1 target cyclic shift differences, two different target cyclic shift values can obtain the same target cyclic shift difference, e.g., a cyclic shift difference of 1 can be obtained from both cyclic shift value combination (1,2) and cyclic shift value combination (3, 4), i.e., 2-1 equals 1 and 4-3 equals 1. I.e., J-1 target cyclic shift differences may correspond to a plurality of different combinations of target cyclic shift values. The number of target cyclic shift value combinations may be greater than J-1. Because a random access leader sequence can be generated according to a target cyclic shift value combination, more random access leader sequences can be obtained according to a target physical root sequence number and J-1 target cyclic shift difference values, and the random access leader sequences are used for randomly selecting a random access leader sequence for access by terminal equipment. The J-1 target cyclic shift differences may be completely the same, may not be completely the same, and may not be completely the same, which is not limited in this application. For example, when J-1 is greater than 1, any two target cyclic shift differences of the J-1 target cyclic shift differences may be the same or different.
Therefore, in the random access method of the embodiment of the application, the network device sends the first information to the terminal device to indicate the target logical root sequence number, and the terminal device determines the target physical root sequence number and the J-1 target cyclic shift difference values according to the target logical root sequence number, so as to obtain the random access sequence and send the random access sequence to the network device, thereby increasing the number of random access preamble sequences of a cell and reducing the probability of collision of random access. In the embodiment of the application, a specific (physical root sequence number, cyclic shift difference value) combination is configured for one cell, so that one cell can correspond to a greater number of cyclic shift value combinations, and compared with the above logical root sequence number and (physical root sequence number, cyclic shift value) combination, the signaling overhead of configuring the logical root sequence number by the network device is smaller.
Optionally, the first information may be a system parameter of a cell. The system parameter may be transmitted to the terminal device in the form of a broadcast channel, a system message, or a Radio Resource Control (RRC) message.
Optionally, the terminal device may determine the target physical root sequence number and J-1 target cyclic shift difference values according to the first mapping relationship and the target logical root sequence number. The first mapping is used to represent a one-to-one correspondence between a plurality of logical root sequence numbers and a plurality of (physical root sequence numbers, J-1 cyclic shift difference values) combinations. In the embodiment of the present application, one target logical root sequence number corresponds to one combination of a target physical root sequence number and J-1 target cyclic shift difference values. For example, the first mapping relationship may be embodied in a form of a table or a formula, and the like, which is not limited in this embodiment of the application.
It should be further understood that the names of the target logical root sequence number, the target physical root sequence number, and the J-1 target cyclic shift difference value are only used for distinguishing from other sequences or difference values, and refer to the names specific to the current terminal device, which may also be referred to as a first logical root sequence number (or a first sequence number, or a first logical sequence number), a first physical root sequence number (or a first physical sequence number, or a second sequence number), J-1 first cyclic shift difference values (or J-1 cyclic shift difference values), or other names, and the embodiments of the present application are not limited thereto.
For the terminal device sending the random access preamble sequence according to the target physical root sequence number and the J-1 target cyclic shift difference values, there may be multiple implementation manners, which is not limited in this embodiment of the present application.
In a possible implementation manner, the terminal device may generate M random access preamble sequences according to the target physical root sequence number and the J-1 target cyclic shift difference values. When the terminal device performs random access, it may randomly select one sequence from the M random access preamble sequences and send it to the network device. Alternatively, the terminal device may store the M random access preamble sequences before random access. In the embodiment of the present application, "generating a sequence" may also be described as "determining a sequence", "obtaining a sequence", and the like.
In one possible implementation, the terminal device may determine, according to the J-1 target cyclic shift difference values, combinations of M target cyclic shift values, where the combinations of M target cyclic shift values may be used to generate M random access sequences. Each of the M combinations of target cyclic shift values includes J target cyclic shift values therein. The J target cyclic shift values comprised by different combinations of target cyclic shift values may be all different or partly different. When the terminal device performs random access, a cyclic shift value combination can be selected from the M target cyclic shift value combinations, a target physical root sequence corresponding to a target physical root sequence number is cyclically shifted according to the cyclic shift value in the cyclic shift value combination, and a random access preamble sequence is generated according to the cyclic shift of the target physical root sequence. The terminal device may transmit the random access preamble sequence to a network device. Alternatively, the terminal device may store the M target cyclic shift values in combination before the random access. Optionally, the target cyclic shift value combination may further include a physical root sequence number.
As an alternative embodiment, the sending the random access preamble sequence includes:
determining J target cyclic shift values according to the J-1 target cyclic shift difference values, wherein the jth target cyclic shift difference value in the J-1 target cyclic shift difference values is a difference value between the jth +1 target cyclic shift value and the 1 st target cyclic shift value in the J target cyclic shift values, the value range of J is from 1 to J-1, and J is an integer;
and sending the random access leader sequence, wherein the random access leader sequence is determined according to the target physical root sequence number and the J target cyclic shift values.
In the embodiment of the present application, J-1 target cyclic shift difference values are obtained from J target cyclic shift values, specifically, the 1 st target cyclic shift difference value is a difference between the 2 nd target cyclic shift value and the 1 st target cyclic shift value, the 2 nd target cyclic shift difference value is a difference between the 3 rd target cyclic shift value and the 1 st target cyclic shift value, and so on, the J-1 st target cyclic shift difference value is a difference between the J th target cyclic shift value and the 1 st target cyclic shift value. The terminal device may determine J target cyclic shift values according to the J-1 target cyclic shift difference values, and it should be understood that there may be many possible combinations of the J target cyclic shift values. As described above, assuming that the value of J-1 is 1, for example, the target cyclic shift difference value is 1, the 2 target cyclic shift values corresponding to the target cyclic shift difference value may be (1,2), (2, 3), (3, 4), and other possible combinations; assuming that the value of J-1 is 2, for example, the target cyclic shift difference value is (1,2), the 3 target cyclic shift values corresponding to the target cyclic shift difference value may be (1,2, 3), (2, 3, 4), and other possible combinations.
Or, in this embodiment of the application, the J-1 target cyclic shift difference is obtained from J target cyclic shift numbers, specifically, the 1 st target cyclic shift difference is a difference between the 2 nd target cyclic shift number and the 1 st target cyclic shift number, the 2 nd target cyclic shift difference is a difference between the 3 rd target cyclic shift number and the 1 st target cyclic shift number, and so on, and the J-1 st target cyclic shift difference is a difference between the J th target cyclic shift number and the 1 st target cyclic shift number. The terminal device may determine J target cyclic shift values or J target cyclic shift numbers according to the J-1 target cyclic shift difference values, and it should be understood that there may be many possible combinations of the J target cyclic shift values or the J target cyclic shift numbers. Here, the cyclic shift value is a cyclic shift number Ncs.
After determining J target cyclic shift values according to the J-1 target cyclic shift difference values, the terminal device may obtain a random access preamble sequence according to the J target cyclic shift values and send the random access preamble sequence to the network device. It should be understood that, since there may exist a plurality of combinations of J target cyclic shift values determined according to the J-1 target cyclic shift difference values, the terminal device may select one combination from the plurality of combinations to generate one random access preamble sequence, and transmit the generated random access preamble to the network device; or, the terminal device may also generate a plurality of random access preamble sequences according to all combinations of the J target cyclic shift values, select one random access preamble sequence from the plurality of random access preamble sequences, and send the selected random access preamble to the network device.
In another possible implementation manner, the J-1 target cyclic shift difference values are obtained from J target cyclic shift values, a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference value between a jth +1 target cyclic shift value and a jth target cyclic shift value of the J target cyclic shift values, a value range of J is from 1 to J-1, and J is an integer.
Specifically, the 1 st target cyclic shift difference value is the difference between the 2 nd target cyclic shift value and the 1 st target cyclic shift value, the 2 nd target cyclic shift difference value is the difference between the 3 rd target cyclic shift value and the 2 nd target cyclic shift value, and so on, and the J-1 st target cyclic shift difference value is the difference between the J-th target cyclic shift value and the J-1 st target cyclic shift value. The terminal device may determine J target cyclic shift values according to the J-1 target cyclic shift difference values, and it should be understood that there may be many possible combinations of the J target cyclic shift values. Assuming that the value of J-1 is 2, for example, the target cyclic shift difference value is (1, 1), the 3 target cyclic shift values corresponding to the target cyclic shift difference value may be (1,2, 3), (2, 3, 4), and other possible combinations.
Or, in another possible implementation manner, the J-1 target cyclic shift difference is obtained from J target cyclic shift numbers, a jth target cyclic shift difference of the J-1 target cyclic shift differences is a difference between a jth +1 target cyclic shift number and a jth target cyclic shift number of the J target cyclic shift numbers, a value range of J is from 1 to J-1, and J is an integer. The terminal device may determine J target cyclic shift values or J target cyclic shift numbers according to the J-1 target cyclic shift difference values, and it should be understood that there may be many possible combinations of the J target cyclic shift values or the J target cyclic shift numbers. Here, the cyclic shift value is a cyclic shift number Ncs.
In another possible implementation, the J-1 target cyclic shift difference values are derived from other numbers of target cyclic shift values or target cyclic shift numbers.
Optionally, the number of target cyclic shift values is 2 × J (1), that is, J-1 target cyclic shift differences are obtained from 2 × J (1) target cyclic shift values, a jth target cyclic shift difference of the J-1 target cyclic shift differences is a difference between a 2 × J target cyclic shift value of the 2 × J (1) target cyclic shift values and a 2 × J-1 target cyclic shift value, J ranges from 1 to J-1, and J is an integer.
Specifically, 2 × target cyclic shift values (J-1) may be determined according to the J-1 target cyclic shift differences, and according to one possible combination of the 2 × target cyclic shift values, the target physical root sequences corresponding to the J-1 target cyclic shift differences are cyclically shifted, so as to obtain 2 × target sequences (J-1). And superposing the 2x (J-1) target sequences to obtain a random access leader sequence which is finally adopted by the terminal equipment to access the cell. According to the possible combinations of the 2 × J-1 target cyclic shift values, a plurality of random access preamble sequences available to the terminal device may be generated, and the terminal device may randomly select one of the plurality of random access preamble sequences to access the cell. Specifically, the correspondence between the cyclic shift value and the cyclic shift difference value may be: the 1 st target cyclic shift difference value is the difference between a target cyclic shift value 2 and a target cyclic shift value 1; the 2 nd target cyclic shift difference value is the difference between the target cyclic shift value 4 and the target cyclic shift value 3, and so on, the J-1 th target cyclic shift difference value is the difference between the 2x (J-1) th target cyclic shift value and the 2J-3 th target cyclic shift value. Assuming that the value of J-1 is 2, for example, the target cyclic shift difference value is (1,2), the number of target cyclic shift values corresponding to the target cyclic shift difference value may be 4, and the 4 target cyclic shift values may be (0,1, 2, 4), (0,1, 3, 5), and so on, in various possible combinations.
Optionally, the number of the target cyclic shift numbers is 2 × J-1, that is, J-1 target cyclic shift differences are obtained from 2 × J-1 target cyclic shift numbers, a jth target cyclic shift difference of the J-1 target cyclic shift differences is a difference between a 2 × J target cyclic shift number of the 2 × J (J-1) target cyclic shift numbers and a 2 × J-1 target cyclic shift number, a value of J ranges from 1 to J-1, and J is an integer. Here, the cyclic shift value is a cyclic shift number Ncs.
The above embodiments only show a few possible correspondences between J-1 target cyclic shift difference values and a plurality of target cyclic shift values or a plurality of target cyclic shift numbers. The J-1 target cyclic shift difference values may also be determined in other manners, that is, the J-1 target cyclic shift difference values may also have other corresponding relationships with the target cyclic shift value or the target cyclic shift number, which is not limited in this application. The terminal device can acquire the corresponding relationship by a protocol convention or a network device configuration mode.
As an optional embodiment, the random access preamble sequence sent by the terminal device is obtained by superimposing J target sequences, where the J target sequences respectively correspond to the J target cyclic shift values, or the J target sequences respectively correspond to the J target cyclic shift values corresponding to the J target cyclic shift numbers. Wherein one target sequence corresponds to one target cyclic shift value.
Specifically, J target cyclic shift values may be determined according to the J-1 target cyclic shift difference values, and J target sequences may be obtained by performing cyclic shift on the target physical root sequence according to one possible combination of the J target cyclic shift values. Illustratively, the J target sequences may be calculated according to the J target cyclic shift values and the target physical root sequence numbers by the following formula:
xu,vj(n)=xu((n+Cvj)modNzc)
xuis a target physical root sequence, u is a target physical root sequence number determined according to the logical root sequence number, and Nzc is the target physical root sequence xuLength of (C)vjIs a target cyclic shift value determined according to a zero correlation value Ncs, J is taken from 1 to J, J is an integer, CvjIs the jth target cyclic shift value.
Wherein:
Figure BDA0001980252850000181
formula (II)
Figure BDA0001980252850000182
J in (a) is an imaginary unit whose square is equal to-1.
And superposing the J target sequences to obtain a random access leader sequence used when the terminal equipment is accessed to the cell. According to a plurality of possible combinations of the J target cyclic shift values, a plurality of random access preamble sequences available to the terminal device in the cell can be generated, and the terminal device can randomly select one sequence from the plurality of random access preamble sequences to access the cell.
It should be understood that the above-mentioned superposition of J target sequences is only one possible implementation manner for generating the random access preamble sequence, and the random access preamble sequence may also be determined in a dot-product manner or other manners, which is not limited in this embodiment of the present application.
As an optional embodiment, the method further comprises:
the terminal equipment determines the value range of the J target cyclic shift values according to the length Nzc of the target physical root sequence and a target zero correlation value Ncs;
the terminal equipment determines M cyclic shift value combinations according to the value range, the value of J and the J-1 target cyclic shift difference values, wherein the M cyclic shift value combinations respectively comprise J target cyclic shift values which are not identical;
and the terminal equipment obtains M random access leader sequences according to the target physical root sequence and the M cyclic shift value combinations, wherein the M random access leader sequences are respectively obtained by superposing J sequences generated by cyclically shifting the target physical root sequence according to J cyclic shift values in the M cyclic shift value combinations. And performing cyclic shift on the target physical root sequence according to the J cyclic shift values respectively to obtain J sequences, and superposing the J sequences to obtain a random access leader sequence.
Specifically, the terminal device may determine a value range of the target cyclic shift value according to the length Nzc of the target physical root sequence and the target zero correlation value Ncs, where the value range is
Figure BDA0001980252850000191
Figure BDA0001980252850000192
Indicating that a rounding down is performed on x. The terminal equipment can determine M cyclic shifts according to the value range, the value of J and the J-1 target cyclic shift difference valueAnd (4) value combination. For example, Nzc 139, Ncs 2, J target cyclic shift values range from [0 to (69-1)]2, and the target cyclic shift value is not an integer multiple of 2 when the target cyclic shift value is not 0. Assuming that J is 2 and the target cyclic shift difference is 1 × 2, the M combinations of cyclic shift values include 68 combinations of (0,1) × 2, (1,2) × 2, …, (67,68) × 2. The terminal device may select a first combination of cyclic shift values from the M combinations of cyclic shift values. For a first cyclic shift value combination of the M cyclic shift value combinations, the terminal device performs cyclic shift on the target physical root sequence according to J cyclic shift values included in the first cyclic shift value combination to generate J sequences, and then superimposes the J sequences to generate a random access preamble sequence corresponding to the first cyclic shift value combination. Thus, M random access preamble sequences can be generated according to the M cyclic shift value combinations, and the terminal device can select one random access preamble sequence from the M random access preamble sequences to perform random access.
As an alternative embodiment, the random access preamble sequence sent by the terminal device to the network device is one of M random access preamble sequences determined according to the J-1 target cyclic shift difference values,
Figure BDA0001980252850000193
Figure BDA0001980252850000194
Figure BDA0001980252850000195
wherein Nzc is the length of the target physical root sequence, Ncs is the target zero correlation value,
Figure BDA0001980252850000196
indicating that a rounding down is performed on x and MAX indicates the maximum value.
Specifically, the value of M is the maximum value of the number of combinations of cyclic shift values that can be obtained according to the J-1 target cyclic shift differences.
As an optional embodiment, in various random access methods related to embodiments of the present application, a cubic metric CM value of a random access preamble sequence is smaller than a preset CM threshold. The unit of the CM threshold may be dB, and the value range of the CM threshold may be a real number greater than 0. Illustratively, the CM threshold is less than or equal to 2.5dB, or the CM threshold is less than or equal to 3dB, dB representing a unit of power.
It should be understood that Cubic Metric (CM) is used to characterize the power amplifier power efficiency. If all newly generated sequences are selected as random access preamble sequences, the overall CM characteristics of the uplink access sequences are obviously deteriorated, i.e., the CM is too high, which may reduce the efficiency of the power amplifier. Therefore, the network device can screen the random access leader sequence according to the CM threshold value, and ensure that the CM value of the random access leader sequence adopted by the terminal device is smaller than the CM threshold value.
As an optional embodiment, in various random access methods related to embodiments of the present application, a peak-to-average power ratio, PAPR, of the random access preamble sequence is smaller than a preset PAPR threshold. The unit of the PAPR threshold may be dB, and the range of the PAPR threshold may be a real number greater than 0. Illustratively, the PAPR threshold is less than or equal to 7dB, dB representing a unit of power.
It should be understood that peak to average power ratio (PAPR) is simply referred to as peak-to-average ratio, which may be the ratio of the instantaneous peak power of a continuous signal to the average power of that signal. If all newly generated sequences are selected as random access preamble sequences, the overall PAPR characteristic of the uplink access sequence is significantly deteriorated, i.e., the PAPR is too high, and when uplink data transmission is performed, the efficiency of the power amplifier is reduced due to too high PAPR. Therefore, the network device can screen the random access leader sequence according to the PAPR threshold value, and ensure that the PAPR value of the random access leader sequence adopted by the terminal device is smaller than the PAPR threshold value.
As an alternative embodiment, the J-1 target cyclic shift differences are cyclic shift differences when the target zero correlation value Ncs is 2.
As an alternative embodiment, any one of the J-1 target cyclic shift differences is
Figure BDA0001980252850000201
And a target cyclic shift difference value of the J-1 target cyclic shift difference values satisfies a maximum value of cyclic shift difference values when Ncs-2, where X is a positive integer,
Figure BDA0001980252850000202
indicating that rounding up is performed on x. Illustratively, any one of the J-1 target cyclic shift difference values satisfies a maximum value of cyclic shift difference values when Ncs ═ 2 or less.
Illustratively, the target zero correlation value Ncs is 2 × X, and since the range of the cyclic shift value is related to Ncs, the cyclic shift difference value corresponding to Ncs of 2 has the above-mentioned correlation with the cyclic shift difference value corresponding to Ncs of 2 × X.
As an optional embodiment, the method further comprises:
the network equipment sends second information, wherein the second information is used for indicating a target zero correlation value of the cell from a candidate zero correlation value set, and the zero correlation value in the candidate zero correlation value set is an integral multiple of 2; correspondingly, the terminal device receives the second information. The second information may also be referred to as second configuration information, second signaling, or other names, which is not limited in this embodiment of the application.
Specifically, the network device may send second information to the terminal device, where the second information is used to configure a target zero correlation value, where the target zero correlation value is selected from a candidate zero correlation value set, and a zero correlation value included in the candidate zero correlation value set is an integer multiple of 2. In this way, the correspondence relationship between the logical root sequence number and the (physical root sequence, J-1 cyclic shift difference) combination can be configured only for the cyclic shift difference corresponding to Ncs ═ 2. For cyclic shift difference corresponding to Ncs 2 × X, the cyclic shift difference can be expressed by formula
Figure BDA0001980252850000203
Determine, thereby saving network equipmentAnd configuring the signaling overhead of the logical root sequence number.
The embodiment of the application also provides another random access method, which comprises the following steps:
the network equipment sends the first information, and correspondingly, the terminal equipment receives the first information; the first information is used for indicating a target logical root sequence number of a cell, and the target logical root sequence number is used for indicating a target physical root sequence number;
the terminal equipment sends the random access leader sequence, and correspondingly, the network equipment receives the random access leader sequence; the random access preamble sequence is determined according to a target physical root sequence number and J-1 target cyclic shift difference values, wherein J is an integer greater than 1.
Specifically, the target logical root sequence number and the target physical root sequence number are in one-to-one correspondence, that is, a logical root sequence number (or referred to as a logical root sequence index) and a corresponding physical root sequence number (RootNumber) are defined. In the embodiment of the present application, J-1 target cyclic shift differences may be configured for different cells, and the J-1 target cyclic shift differences of different cells may be completely the same or not completely the same (i.e., partially the same or completely different), and are not limited herein. That is, for a cell, the J-1 target cyclic shift difference value of the cell may be a fixed value, a value determined by some predefined rule (e.g., a positive integer pre-configured by the cell ID mod), or a value configured by the network device for the terminal device through the third information. Where mod represents the modulo operation. The third information may also be referred to as third signaling.
It should be understood that the above-mentioned J-1 target cyclic shift difference values are obtained from J target cyclic shift values, or the J-1 target cyclic shift difference values are obtained from J target cyclic shift numbers, which is not limited in this embodiment of the present application.
The determination of the J-1 target cyclic shift difference values through some predefined rule may be determined according to a cell Identifier (ID), for example. Taking Nzc 139 and Ncs 2 as an example, the value range of J target cyclic shift values is [0 to (69-1) ] 2, and the value range of corresponding J target cyclic shift values is 0 to (69-1), then the value range of J-1 target cyclic shift differences is [1, 68], and the value range of J-1 target cyclic shift differences is an integer.
In one possible implementation, the cell may be preconfigured with a total of 68 cyclic shift differences. In another possible implementation manner, for a specific cell, the initial value of the cyclic shift difference of the cell may be preconfigured according to the cell ID of the cell, and at the same time, the number of cyclic shift differences (i.e., J-1) of the cell is configured. Thus, the J-1 cyclic shift difference values for the cell may be determined by sequentially incrementing by 1 the initial value of the cyclic shift difference value for the cell, which may be equal to N mod 68 for a cell with a cell ID of N, N being a positive integer.
It should be understood that the above method for determining J-1 target cyclic shift difference values according to cell IDs is only one possible implementation manner, and the random access method of the embodiment of the present application may also use other rules to determine J-1 target cyclic shift difference values.
It should also be understood that, after determining J-1 target cyclic shift differences of a cell according to the above method, reference may be made to the description in the above method 200 for a method for determining a random access preamble sequence according to a target physical root sequence number and the J-1 target cyclic shift differences, and further reference may be made to the foregoing embodiment for a description of the J-1 target cyclic shift differences, which is not described herein again.
The method for generating a random access preamble sequence according to the embodiment of the present application is described in detail below with reference to specific embodiments.
For a new sequence generated by cyclic shift combination of a single root, a logical root sequence number (i.e., a logical root sequence index) and a corresponding cyclic shift value combination thereof, i.e., a corresponding (RootNumber, Delta _ C) combination thereof, are defined, and the (RootNumber, Delta _ C) combination is used to generate the new sequence. Wherein, RootNumber is the physical root sequence number used for generating the new sequence, and Delta _ C represents the difference value of cyclic shift values of the sequences used for generating the new sequence by superposition.
When the method is applied to the random access process of a cell:
1) the terminal equipment reads the system parameters of the cell, and acquires a parameter RACH _ ROOT _ SEQUENCE from the system parameters of the cell, wherein the parameter RACH _ ROOT _ SEQUENCE is used for indicating the logical ROOT SEQUENCE number of the cell;
2) the terminal equipment determines a logical ROOT SEQUENCE number (index) of the cell according to a parameter RACH _ ROOT _ SEQUENCE, and obtains a corresponding (Rootnumber, Delta _ C) combination according to the logical ROOT SEQUENCE number;
3) generating a new sequence set of the cell according to the (RootNumber, Delta _ C) combination;
4) if the number of sequences generated by one (RootNumber, Delta _ C) combination does not satisfy the number of random access preamble sequences configured by the cell, the terminal device may determine a next logical root sequence number consecutive to the logical root sequence number of the cell, and continue to generate a new random access preamble sequence using the (RootNumber, Delta _ C) combination corresponding to the next logical root sequence number until the number of generated new sequences satisfies the number of random access preamble sequences configured by the cell.
It should be understood that, in order to reduce the collision probability of multiple terminal devices accessing the cell, the configuration of the number of preamble sequences of the cell should be increased as much as possible, but the configuration of the number of preamble sequences of the cell is not limited in this embodiment.
Further, the terminal device may randomly select a new sequence from the determined available new sequence set of the cell as the random access preamble sequence. The terminal device may send the selected random access preamble sequence to a network device to which the cell belongs to request access to the cell. The available new sequence set of the cell may also be referred to as a set of candidate new sequences, a set of candidate access preamble sequences, or other names, which is not limited in this embodiment of the present application.
It should be understood that Delta _ C may include one value or a plurality of values, which are not limited in the embodiments of the present application. For example, Delta _ C may include J-1 values, i.e., Delta _ C ═ where J is greater than or equal to 2 for representing a single unit that generates a new sequence (Delta _ C1, Delta _ C2, …, Delta _ C (J-1))The number of cyclic shift values of a root. Here J values of the cyclic shift are denoted as Cv1、Cv2、…、CvJThe J values can satisfy Cv1<Cv2<Cv3<…<CvJOr satisfy other relationships, Cv1Representing the cyclic shift value of the first sequence used to generate the new sequence with respect to the physical root sequence, Cv2Representing the cyclic shift value of the second sequence used to generate the new sequence relative to the physical root sequence, and so on, CvJIndicating the cyclic shift value of the jth sequence used to generate the new sequence relative to the physical root sequence. I.e. CvjRepresents the cyclic shift value of the jth sequence used to generate the new sequence relative to the physical root sequence, where J takes 1 through J, where J is an integer.
Alternatively, the above (RootNumber, Delta _ C) combination may be replaced by a (RootNumber, Delta _ CS) combination. Delta _ CS represents a difference value of cyclic shift numbers of sequences for superimposing and generating a new sequence, and this embodiment may be referred to as a cyclic shift difference value, a cyclic shift number difference value, or a cyclic shift difference value number. Delta _ CS may include J-1 values, i.e., Delta _ CS ═ Delta _ CS1, Delta _ CS2, …, Delta _ CS (J-1)). In other words, the above (physical root sequence number, cyclic shift difference 1, cyclic shift difference 2, …, cyclic shift difference J-1) combination, i.e., (roots number, Delta _ C1, Delta _ C2, …, Delta _ C (J-1)) combination may also be replaced by (physical root sequence number, cyclic shift difference number 1, cyclic shift difference number 2 …, cyclic shift difference number J-1) combination, i.e., (roots number, Delta _ CS1, Delta _ CS2 …, Delta _ CS J-1) combination, which is not limited in the embodiment of the present application. Where Delta _ CS multiplied by Ncs equals Delta _ C.
The numbers of the J values of the cyclic shift are represented as CS1, CS2, … and CS J, and the J values of the cyclic shift can satisfy CS1<CS 2<CS 3<…<CS J or satisfies other relationships, CS1 denotes a cyclic shift value C of a first sequence with respect to a physical root sequence for generating a new sequencev1CS2 denotes a cyclic shift value C of the second sequence used for generating the new sequence with respect to the physical root sequencev2CS J represents the cyclic shift value C of the J-th sequence relative to the physical root sequence for generating the new sequence, and so onvJThe number of (2).
As an alternative embodiment, the cyclic shift difference is a cyclic shift difference number Ncs, that is, the cyclic shift difference 1 is a cyclic shift difference number 1 Ncs, the cyclic shift difference 2 is a cyclic shift difference number 2 Ncs, …, and the cyclic shift difference J-1 is a cyclic shift difference number (J-1) Ncs. In this case, CS1 ═ Cv1/Ncs,CS 2=Cv2/Ncs,…,CS J=CvJand/Ncs. It should be understood that there may be other corresponding relations between the cyclic shift difference numbers and the cyclic shift values, and this is not limited in this embodiment of the application.
For simplicity of description, the present embodiment takes (RootNumber, Delta _ CS) combinations, that is, (physical root sequence number, cyclic shift difference number 1, cyclic shift difference number 2 …, cyclic shift difference number (J-1)) combinations as an example for explanation.
By way of example, in one possible implementation,
Figure BDA0001980252850000221
wherein J is taken from 1 to J, and J is an integer. I.e. Cv1,Cv2,…,CvJAre respectively present
Figure BDA0001980252850000222
A possible value. The terminal equipment can also determine C through a zero correlation value Ncs according to other modesv1,Cv2,…,CvJAnd are not intended to be limiting herein.
When a new sequence set is generated according to a (RootNumber, Delta _ CS) combination, Delta _ CS represents cyclic shift value C of J sequences generating the new sequencev1,Cv2,…,CvJThe number of absolute values of the difference between. Due to cyclic shift value Cv1,Cv2,…,CvJMay have different values, respectively, the Delta _ CS may correspond to a plurality of different cyclic shift value number combinations. For example, in a cycle of generating a single root of a new sequenceIn the combination of the ring shift values, Delta _ CS1 represents the difference between the cyclic shift value number 2(CS 2) and the cyclic shift value number 1(CS 1), Delta _ CS2 represents the difference between the cyclic shift value number 3(CS 3) and the cyclic shift value number 1(CS 1), …, and Delta _ CS (J-1) represents the difference between the cyclic shift value number J (CS J) and the cyclic shift value number 1(CS 1).
From the above equations, for a given Ncs, a single root may correspond to a cyclic shift value of
Figure BDA0001980252850000231
Figure BDA0001980252850000232
CS1, CS2, …, CS J may represent Slave
Figure BDA0001980252850000233
The corresponding results of J independent cyclic shift value numbers selected from the above are arranged in ascending order, namely CS1<CS 2<CS 3<…<CS J. For example, according to the relation Delta _ CS (J-1) ═ CSj-CS1 and J cyclic shift value numbers, the values of Delta _ CS1, Delta _ CS2, …, and Delta _ CS (J-1) can be obtained, so as to obtain the above combination (RootNumber, Delta _ CS), where J is an integer and J has a value range of 2 to J.
According to the correspondence between the logical root sequence number and the (RootNumber, Delta _ CS) combination, the terminal device may determine the logical root sequence number of the cell according to the parameter of the cell to be accessed, and further select the (RootNumber, Delta _ CS) combination corresponding to the logical root sequence number of the cell. Specifically, the terminal device can determine all cases of J cyclic shift value numbers for generating a single root of a new sequence from (RootNumber, Delta _ CS1, Delta _ CS2, …, Delta _ CS (J-1)).
Alternatively, in the embodiment of the present application, each (RootNumber, Delta _ CS) combination can generate M new sequences,
Figure BDA0001980252850000234
Figure BDA0001980252850000235
wherein the content of the first and second substances,
Figure BDA0001980252850000236
indicating that a rounding down is performed on x.
Taking the number J of cyclic shift value combinations of a single root for generating a new sequence as an example, Delta _ CS is Delta _ CS1, and logical sequence numbers in a cell and (root number, Delta _ CS) combinations correspond to each other one by one, where Delta _ CS is | CS 2-CS1|, CS1 represents a cyclic shift value number 1 of a first sequence for generating the new sequence with respect to a physical root sequence, and CS2 represents a cyclic shift value number 2 of a second sequence for generating the new sequence with respect to the physical root sequence. Taking sequence length Nzc 139 and Ncs 2 as examples, the cyclic shift values that a single root can obtain are [ 0- (69-1)]And 2, the corresponding cyclic shift values are numbered from 0 to (69-1). Assuming that (RootNumber, Delta _ CS) ═ 1, 1), the terminal device may determine that the sequence number used to generate the physical root sequence is 1, and may determine that the combination (CS 1, CS2) of two sequences used to generate the new sequence with respect to two cyclic shift value numbers of the physical root sequence includes 68 cases of (0,1), (1,2), …, (67,68), and the new sequence may be obtained by adding up 2 sequences respectively generated from 2 cyclic shift value numbers in each combination by a single root. In other words, Delta _ CS is 1,
Figure BDA0001980252850000237
this (RootNumber, Delta _ CS) combination can generate 68 new sequences.
In a possible implementation manner, the correspondence between the above-mentioned logical root sequence number and the (root number, Delta _ CS) combination may be represented by a logical root sequence number planning table (e.g., table three) of the new sequence.
A logic root sequence number planning table taking the ZC sequence length Nzc 139, the zero correlation value Ncs 2, and the number J of cyclic shift values of a single root for generating a new sequence J2 as an example is shown in table three below:
watch III
Figure BDA0001980252850000238
The logical serial number planning base table may have the following rules:
(1) the logic sequence number corresponds to the combination of (Rootnumber, Delta _ CS) one by one;
(2) and (RootNumber, Delta _ CS) combinations are sequentially ordered according to the physical root sequence number and the Delta _ CS sequence number corresponding to each physical root sequence. Wherein the order may be ascending or descending.
Further, optionally, the number of new sequences generated by each (roots number, Delta _ CS) combination in the third table may be obtained according to a corresponding relationship table (e.g., table four) of Delta _ CS and new sequences.
Table four shows the number M of new sequences generated by each (RootNumber, Delta _ CS) combination, and the new sequence number M and Delta _ CS take values corresponding to each other.
Watch four
Delta_CS M
1 68
2 67
3 66
67 2
68 1
It should be understood that after determining the (RootNumber, Delta _ CS) combination corresponding to the logical root sequence number of the cell to be accessed, the terminal device may determine the number M of new sequences that can be generated by the (RootNumber, Delta _ CS) combination according to table four. Optionally, the terminal equipment can also be based on
Figure BDA0001980252850000241
Figure BDA0001980252850000242
Figure BDA0001980252850000243
And calculating the value of M. Where ellipses represent sequential runs from 1 to J and "/" represents division.
In the embodiment, the target cyclic shift difference 1/Ncs is Delta _ CS1, the target cyclic shift difference 2/Ncs is Delta _ CS2, …, and the target cyclic shift difference (J-1)/Ncs is Delta _ CS (J-1). Therefore, the temperature of the molten metal is controlled,
Figure BDA0001980252850000244
Figure BDA0001980252850000245
Figure BDA0001980252850000246
wherein the ellipses represent from 1 to J in order.
The terminal equipment can judge whether M meets the random access leader sequence number configured by the cell to be accessed, if not, the next logical root serial number continuous with the logical root serial number of the cell is continuously adopted to generate a new sequence. If the number of sequences mapped in the cell is 64, in the above example, (RootNumber, Delta _ CS) ═ 1, 68 new sequences can be generated, and the number of mapping is satisfied.
It should be understood that the new sequence logic root sequence number plan table obtained in table three is only applicable to a specific scenario where the cyclic shift value Ncs is 2, and the new sequence logic root sequence number plan table when Ncs is 2 is referred to as a logic root sequence number plan base table in this application.
In this embodiment, the logical root sequence numbers and the (root number, Delta _ CS) combinations correspond to each other one by one, and since the number of the (root number, Delta _ CS) combinations is much smaller than the total number of the new sequences, the signaling overhead of the logical root sequence number configuration is reduced.
In summary, assuming that Nzc is 139 and Ncs is 2, in an embodiment where logical root sequence numbers and physical root sequence numbers are in one-to-one correspondence (i.e., table one), if the number of physical root sequences is Nroot-Nzc-1, 139-1, and 138, the number of corresponding logical root sequence numbers is 138. Assuming that Nzc is 139 and Ncs is 2, the cyclic shift number J of the single root used for generating the new sequence is 2, and for the embodiment where the logical root sequence numbers and (RootNumber, CS1, CS2) combinations correspond one to one (i.e., table two), the cyclic shift number of the single root is 139/2 is 69, the cyclic shift combination number of the single root is C (69,2) is 2346, the total number of combinations of (RootNumber, CS1, CS2) is the number of physical root sequences multiplied by the number of cyclic shift combinations of the single root, that is, 138 × 2346 is 323748, and the number of corresponding logical sequence numbers is 323748. For the embodiment where the logical root sequence numbers correspond to the (root number, Delta _ CS) combinations one by one (i.e., table three), the number of cyclic shifts that can be achieved by a single root is 139/2-69, and the number of Delta _ CS that can be achieved by a single root is 69-1-68, then the total number of the (root number, Delta _ CS) combinations is the number of physical root sequences multiplied by the number of Delta _ CS that can be achieved by a single root, that is, 138, 68, 9384, and then the number of corresponding logical root sequence numbers is 9384. Therefore, the embodiment can ensure that the number of the logical root sequence numbers is not too large, and compared with the implementation mode that the logical root sequence numbers are combined with (RootNumber, CS1, CS2) in a one-to-one correspondence manner, the signaling overhead during the configuration of the logical root sequence numbers is reduced.
The above logical root sequence number mapping table (i.e., table three) is only applicable to the case where Ncs is 2, and if the logical root sequence number mapping table is configured separately for different Ncs, the signaling overhead of the logical root sequence number mapping table configuration is large. In order to reduce signaling overhead, it may be considered to optimize the cyclic shift Ncs value configuration table, and the purpose of the optimization is to make other Ncs values and Ncs be in integer multiple relation of 2. Table five shows a possible Ncs value configuration table.
Watch five
Zero correlation value identification Ncs
1 2
2 4
3 6
4 8
5 10
6 12
7 15
As can be seen from table five, when the zero correlation value is identified as 7, the corresponding Ncs is equal to 15 and is not an integer multiple of 2, so that table five can be changed to a form of table six, that is, the Ncs corresponding to the zero correlation value is identified as 7 is changed to 16, so that all Ncs values are integer multiples of 2. It should be understood that 16 is merely an exemplary illustration, and may be configured to be other values such as 14, 18, 20, etc., and it is only necessary to ensure that Ncs is an integer multiple of 2, which is not limited in this embodiment of the present application.
Watch six
Zero correlation value identification Ncs
1 2
2 4
3 6
4 8
5 10
6 12
7 16
After the sixth table is configured, the terminal device may determine the relationship between the cyclic shift difference Delta _ C corresponding to other Ncs and Delta _ C corresponding to Ncs-2 according to the multiple relationship between the values of other Ncs and Ncs-2 and the logical root sequence number planning table (i.e., table three) when Ncs-2. For example, Delta _ C corresponding to Ncs ═ N is hereinafter referred to as Delta _ C _ N, and Ncs ═ N is also referred to as Ncs _ N.
Taking the sequence length Nzc 139, Ncs 4, and J2 as an example, the cyclic shift value of a single root may be (0 to 33) × Ncs _4 (0 to 33) × 4, and if the cyclic shift value is not 0, the cyclic shift value is an integer multiple of 4, and if Delta _ C _4 is 1 × 4, and the corresponding cyclic shift value is also 4 if Ncs 2, the relationship between two cyclic shift values is that for the same physical root sequence, the two cyclic shift values have the same relationship
Figure BDA0001980252850000261
That is, the same physical root sequence has the above-described relationship between Delta _ C corresponding to Ncs 4 and Ncs 2. Similarly, the correspondence between other Ncs values and Delta _ C corresponding to Ncs ═ 2 can be obtained. After determining the corresponding relationship between other Ncs values and Delta _ C corresponding to Ncs-2, the terminal device may further obtain a logic root sequence number planning table of other Ncs values from the logic root sequence number planning base table corresponding to Ncs-2.
To sum up, according to the optimized Ncs value configuration table (i.e., table six), the generation of the new sequence logic root sequence number planning table for a certain Ncs value may have the following rules:
(1) obtaining a logic root serial number planning base table (namely table three) according to Ncs-2;
(2) the logic root sequence number planning table meeting the integer multiple of Ncs value of 2 can be obtained by a logic root sequence number planning base table with Ncs being 2, and the logic root sequence number planning table meeting the integer multiple of Ncs value of 2 is a subset table of the logic root sequence number planning base table with Ncs being 2;
(3) if Ncs is 2X, the target cyclic shift difference when Ncs is 2X is:
Figure BDA0001980252850000262
and the J-1 targets are circularly shiftedAny one of the difference values satisfies a maximum value of cyclic shift difference values when Ncs ═ 2 or less, where X is a positive integer,
Figure BDA0001980252850000263
indicating that rounding up is performed on x.
Since the cyclic shift difference/Ncs is the cyclic shift difference number, as an alternative embodiment, the terminal device may also determine the relationship between the cyclic shift difference number Delta _ CS that other Ncs can take and the Delta _ CS that Ncs 2 can take. For example, Delta _ CS that Ncs — N may be called Delta _ CS _ N, and Ncs — N is also written as Ncs _ N.
In the above example, Nzc is 139, Ncs is 4, J is 2, and the cyclic shift value number of a single cyclic shift may be 0 to 33. Assuming that the corresponding Delta _ CS _4 value is 1, the corresponding cyclic shift value is 1 × Ncs _4 ═ 1 × 4 ═ 2 × Ncs _2, that is, the cyclic shift value number corresponding to Ncs ═ 2 is 2, that is, for the same physical root sequence, the difference between the two cyclic shift value numbers is
Figure BDA0001980252850000264
That is, the same physical root sequence may have the above-described relationship between Delta _ CS for Ncs 4 and Ncs 2. Similarly, the corresponding relationship between other Ncs values and Delta _ CS that Ncs is 2 can be obtained.
Taking ZC sequence length Nzc 139, zero correlation value Ncs 4, and the number J of cyclic shift values for generating a single root of a new sequence 2 as an example, a base table (table three) is planned according to a logical root sequence number corresponding to Ncs 2, and a logical root sequence number planning table corresponding to Ncs 4 can be obtained as shown in table seven below:
watch seven
Figure BDA0001980252850000271
Therefore, in the embodiment of the present application, the configuration table of zero correlation value Ncs is optimized, so that a multiple relationship exists between the value of Ncs and Ncs-2, and the basic table is planned according to the logical root serial number corresponding to Ncs-2, so as to determine the logical root serial number planning table corresponding to other values of Ncs. In this way, the system only needs to configure the logic root sequence number planning base table when Ncs is 2, and does not need to configure the logic root sequence number planning table with Ncs equal to other values, thereby reducing the signaling overhead of logic sequence number planning table configuration.
Another embodiment of the present application is described below. In this embodiment, the terminal device may determine the available new random access sequence according to a Cubic Metric (CM) value of the new random access sequence of the single root. For an available new random access sequence, the CM value of the sequence is lower than the preset CM threshold.
It should be understood that CM represents a cubic metric that directly characterizes how high the power amplifier power efficiency is. The peak to average power ratio (PAPR) is referred to as the PAPR, i.e., the ratio of the instantaneous peak power of a continuous signal to the average power of the signal. The PAPR or CM characteristic curve of the random access preamble sequence generated based on the above methods may be obtained according to a Cumulative Distribution Function (CDF) of the PAPR or CM. If all newly generated sequences are selected as random access preamble sequences, the overall PAPR or CM characteristics of the uplink access sequence are significantly deteriorated, i.e., the PAPR or CM is too high, which may reduce the efficiency of the power amplifier when performing uplink data transmission.
For the above embodiment (i.e. table two) in which the logical root sequence numbers and the combinations of (RootNumber, CS1, CS2) are in one-to-one correspondence and the embodiment (i.e. table three) in which the logical root sequence numbers and the combinations of (RootNumber, Delta _ CS) are in one-to-one correspondence, a new random access sequence is generated by superimposing J sequences, which is equivalent to superimposing and transmitting the J sequences when transmitting the new sequence. Assuming that the equal power allocation principle is adopted when a new random access sequence is transmitted, the power of each of the J sequences is 1/J of that when a single sequence is transmitted, which may cause the PAPR or CM of the new sequence to be high.
The above method may be used in an embodiment (i.e., table two) in which the logical root sequence numbers and the combinations of (RootNumber, CS1, CS2) are in one-to-one correspondence, or may be used in an embodiment (i.e., table three) in which the logical root sequence numbers and the combinations of (RootNumber, Delta _ CS) are in one-to-one correspondence, which is not limited in this embodiment.
For example, in an embodiment (i.e., table three) in which the logical root sequence numbers and the (RootNumber, Delta _ CS) combinations correspond one to one, in order to maintain the low CM characteristic of the new sequences, the (RootNumber, Delta _ CS) combinations may be screened by a preset CM threshold, that is, the new sequences determined according to the (RootNumber, Delta _ CS) combinations in the logical root sequence number planning table are new sequences whose CM values are smaller than the preset CM threshold. Alternatively, the (RootNumber, CS1, CS2) determined according to the (RootNumber, Delta _ CS) combination may be filtered by a preset CM threshold, or the new sequence determined according to the (RootNumber, Delta _ CS) combination may be filtered by a preset CM threshold, so that the new sequence determined according to the (RootNumber, CS1, CS2) combination is a new sequence having a CM value smaller than the preset CM threshold. Illustratively, 4 new sequences can be determined according to a specific (RootNumber, Delta _ CS) combination in the logical root sequence number planning table, wherein the CM value of 1 new sequence is smaller than the CM threshold value, and the CM value of the other 3 new sequences is larger than the CM threshold value. The terminal device does not select these 3 new sequences in the selection of the random access sequence or these 3 new sequences are not included in the candidate random access sequences of the cell.
According to the distribution rule of new sequences generated by ZC sequence characteristics and different cyclic shift combinations of the single root after CM value screening, the following conclusion exists:
(1) for any two new sequences generated by a certain sequence through cyclic shift combination, if the cyclic shift difference Delta _ CS of the cyclic shift combination for generating the two new sequences is the same, the CM values of the two new sequences are similar;
(2) according to the symmetry of the ZC sequence root sequence CM distribution, namely, the physical root sequence with the sequence number of RootNumber and the physical root sequence with the sequence number of Nzc-RootNumber have symmetry on CM values, the CM values of the (RootNumber, Delta _ CS) pair generated new sequence and the (Nzc-RootNumber, Delta _ CS) pair generated new sequence are the same, wherein Nzc represents the sequence length of the ZC sequence.
The embodiment of the application screens the newly generated random access leader sequence by presetting the CM threshold value, and selects the new sequence with part of CM value lower than the CM threshold value, thereby ensuring the low CM characteristic of the new sequence.
For example, when designing the logical root sequence number planning table, the filtered (root number, Delta _ CS) combinations may be further sorted in an ascending order (or a descending order) according to the value size of CM. Similarly, a plurality of (RootNumber, Delta _ CS) combinations may be grouped according to the number of (RootNumber, Delta _ CS) combinations, but this embodiment is not limited thereto. After grouping, the logical root sequence numbers and the (RootNumber, Delta _ CS) combinations are in one-to-one correspondence.
It should be understood that when the value of Nzc is larger, the number of new sequences generated by cyclic shift combination of a single root sequence is larger. For the convenience of analysis, a logic root sequence number planning table for generating a new sequence by cyclic shift combination of a single sequence is given below by taking Nzc as 37, Ncs as 2, and J as 2 as an example. At this time, the number of sequences generated by a single cyclic shift is 37/2-18, the number of new sequences generated by random combination of sequences generated by cyclic shifts is C (18,2) -153, and a logic root sequence number plan table of the new sequences according to a distribution rule of the new sequences generated by a single different cyclic shift combination after CM value selection is shown in the following table eight:
table eight
Figure BDA0001980252850000291
The logical root sequence number planning base table for the new sequence may have at least one of the following rules:
(1) the logical root sequence number corresponds to (Rootnumber, Delta _ CS) one to one;
(2) dividing the logic serial number planning basic table into integer groups according to the number of the (Rootnumber, Delta _ CS) combinations;
(3) the (Delta _ CS) combinations in each group are subjected to ascending sequencing according to the value of CM generating a new sequence;
(4) the number of new sequences generated by each (RootNumber, Delta _ CS) combination can be according to the formula
Figure BDA0001980252850000292
The calculation result can be obtained according to a Delta _ CS and a new sequence number corresponding relation table (for example, table four).
According to the method and the device, the (RootNumber, Delta _ CS) combinations are screened according to the PAPR or the CM threshold, and the screened (RootNumber, Delta _ CS) combinations are subjected to new sequence planning, so that the low PAPR or CM characteristic of a new sequence is ensured, and the signaling overhead configured by a logic root sequence number planning table is reduced. In addition, the scheme of performing new sequence planning on PAPR or CM values according to the ascending order of the (Rootnumber, Delta _ CS) combination is beneficial to maintaining continuity of the PAPR/CM values of the new sequence selected by the same cell, thereby reducing the requirement on the power amplifier. It should be understood that, in order to ensure that the PAPR or CM value of the new sequence selected in the same cell maintains continuity, the new sequence may also be planned according to the descending order of the PAPR or CM value, which is not limited in this embodiment. It should also be understood that, because Delta _ CS and Delta _ C have a certain correspondence, combinations of Delta _ C may also be screened according to PAPR or CM threshold, and the embodiment of the present application is not limited.
It should be understood that the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
The random access method according to the embodiment of the present application is described in detail above with reference to fig. 1 to 2, and the apparatus of the random access method according to the embodiment of the present application is described in detail below with reference to fig. 3 to 4.
Fig. 3 illustrates an apparatus 300 provided by an embodiment of the present application. The apparatus 300 may be a terminal device, or may be an apparatus capable of supporting the terminal device to implement its function, for example, a chip or a chip system that may be used in the terminal device. Alternatively, the apparatus 300 may be a network device, or may be an apparatus capable of supporting the network device to implement its function, for example, a chip or a system-on-chip that may be used in the network device. The apparatus 300 comprises: a receiving unit 310 and a transmitting unit 320.
In a possible implementation manner, the apparatus 300 is configured to execute various flows and steps corresponding to the terminal device in the method provided in the embodiment of the present application.
For example, the receiving unit 310 is configured to: receiving first information, wherein the first information is used for indicating a target logical root sequence number of a cell, the target logical root sequence number is used for indicating a target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer greater than 1;
for example, the sending unit 320 is configured to: and sending a random access leader sequence, wherein the random access leader sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values.
According to the device, the network equipment sends the first information to the terminal equipment to indicate the target logic root serial number, the terminal equipment determines the target physical root serial number and the J-1 target cyclic shift difference values according to the target logic root serial number, and then obtains the random access sequence and sends the random access sequence to the network equipment, so that the number of random access leader sequences of a cell can be increased, and the probability of collision of random access is reduced.
Optionally, the apparatus further comprises: a processing unit, configured to determine J target cyclic shift values according to the J-1 target cyclic shift difference values, where a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference value between a jth +1 target cyclic shift value and a 1 st target cyclic shift value of the J target cyclic shift values, a value range of J is from 1 to J-1, and J is an integer; the sending unit 320 is specifically configured to: and sending the random access leader sequence, wherein the random access leader sequence is determined according to the target physical root sequence number and the J target cyclic shift values.
Optionally, the random access preamble sequence is obtained by superimposing J target sequences, where the J target sequences correspond to the J target cyclic shift values one by one. Each target sequence is obtained by circularly shifting the physical root sequence according to the corresponding target cyclic shift value. The physical root sequence is a sequence derived from a physical root sequence number.
Optionally, the random access preamble sequence is one of M random access preamble sequences determined according to the J-1 target cyclic shift difference values,
Figure BDA0001980252850000301
Figure BDA0001980252850000302
Figure BDA0001980252850000303
wherein Nzc is the length of the target physical root sequence, Ncs is the target zero correlation value,
Figure BDA0001980252850000304
indicating that a rounding down is performed on x and MAX indicates the maximum value.
Optionally, the cubic metric CM value of the random access preamble sequence is smaller than a preset CM threshold.
Optionally, the J-1 target cyclic shift difference values are cyclic shift difference values when the target zero correlation value Ncs is 2.
Optionally, the J-1 target cyclic shift difference is
Figure BDA0001980252850000311
And the J-1 target cyclic shift differences satisfy a maximum value of cyclic shift differences that are less than or equal to Ncs-2, where X is a positive integer,
Figure BDA0001980252850000312
indicating that rounding up is performed on x.
Optionally, the receiving unit 310 is further configured to: receiving second information, where the second information is used to indicate a target zero correlation value of the cell from a candidate zero correlation value set, and a zero correlation value in the candidate zero correlation value set is an integer multiple of 2.
In a possible implementation manner, the apparatus 300 is configured to execute various flows and steps corresponding to network devices in the method provided in the embodiment of the present application.
The sending unit 320 is configured to: sending first information, wherein the first information is used for indicating a target logical root sequence number of a cell, the target logical root sequence number is used for indicating a target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer larger than 1;
the receiving unit 310 is configured to: receiving a random access preamble sequence, wherein the random access preamble sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values.
Optionally, the random access preamble sequence is determined according to J target cyclic shift values, the J target cyclic shift values are determined according to J-1 target cyclic shift difference values, a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference value between a jth +1 target cyclic shift value and a 1 st target cyclic shift value of the J target cyclic shift values, a value range of J is from 1 to J-1, and J is an integer.
Optionally, the random access preamble sequence is obtained by superimposing J target sequences, where the J target sequences correspond to the J target cyclic shift values one by one. Each target sequence is obtained by circularly shifting the physical root sequence according to the corresponding target cyclic shift value. The physical root sequence is a sequence derived from a physical root sequence number.
Optionally, the random access preamble is one of M random access preamble sequences determined according to the J-1 target cyclic shift difference values,
Figure BDA0001980252850000313
Figure BDA0001980252850000314
wherein Nzc is the length of the target physical root sequence, Ncs is the target zero correlation value,
Figure BDA0001980252850000315
indicating that a fetch is performed on xIn whole, MAX indicates taking the maximum value.
Optionally, the cubic metric CM value of the random access preamble sequence is smaller than a preset CM threshold.
Optionally, the J-1 target cyclic shift difference values are cyclic shift difference values when the target zero correlation value Ncs is 2.
Optionally, the J-1 target cyclic shift difference is
Figure BDA0001980252850000316
And the J-1 target cyclic shift differences satisfy a maximum value of cyclic shift differences that are less than or equal to Ncs-2, where X is a positive integer,
Figure BDA0001980252850000317
indicating that rounding up is performed on x.
Optionally, the sending unit 320 is further configured to: and sending second information, wherein the second information is used for indicating the target zero correlation value of the cell from a candidate zero correlation value set, and the zero correlation value in the candidate zero correlation value set is an integral multiple of 2.
It should be understood that the apparatus 300 herein is embodied in the form of a functional unit. The term "unit" herein may refer to an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (e.g., a shared, dedicated, or group processor) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that support the described functionality. In an optional example, it may be understood by those skilled in the art that the apparatus 300 may be specifically a terminal device or a network device in the foregoing embodiment, and the apparatus 300 may be configured to execute each procedure and/or step corresponding to the terminal device or the network device in the foregoing method embodiment, and in order to avoid repetition, details are not described here again.
The apparatus 300 of each of the above schemes has a function of implementing corresponding steps executed by the terminal device or the network device in the above method; the functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software comprises one or more modules corresponding to the functions; for example, the transmitting unit and the receiving unit may be replaced by a communication interface, and other units, such as the determining unit, may be replaced by a processor, to perform the transceiving operation and the related processing operation in each method embodiment, respectively. In the embodiment of the present application, the communication interface may be a circuit, a module, a bus interface, a transceiver, or the like, which may implement a communication function.
In the embodiment of the present application, the apparatus in fig. 3 may also be a chip or a chip system, for example: system on chip (SoC). Correspondingly, the receiving unit and the transmitting unit may be a transceiver circuit of the chip, and are not limited herein.
Fig. 4 illustrates another apparatus 400 provided by an embodiment of the present application. The apparatus 400 includes a processor 410, a communication interface 420. Optionally, the apparatus 400 may further comprise a memory 430. Optionally, the memory 430 may be included in the processor 410. The processor 410, the communication interface 420 and the memory 430 are in communication with each other through an internal connection path, the memory 430 is used for storing instructions, and the processor 410 is used for executing the instructions stored in the memory 430 to implement the method provided by the embodiment of the present application.
In a possible implementation manner, the apparatus 400 is configured to execute various flows and steps corresponding to terminal devices in the method provided in the embodiment of the present application.
Wherein the processor 410 is configured to: receiving first information through the communication interface 420, where the first information is used to indicate a target logical root sequence number of a cell, and the target logical root sequence number is used to indicate a target physical root sequence number and J-1 target cyclic shift difference values, where J is an integer greater than 1; and sending a random access leader sequence, wherein the random access leader sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values.
In a possible implementation manner, the apparatus 400 is configured to execute various flows and steps corresponding to network devices in the method provided in the embodiment of the present application.
Wherein the processor 410 is configured to: sending first information through the communication interface 420, where the first information is used to indicate a target logical root sequence number of a cell, and the target logical root sequence number is used to indicate a target physical root sequence number and J-1 target cyclic shift difference values, where J is an integer greater than 1; receiving a random access preamble sequence, wherein the random access preamble sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values.
It should be understood that the apparatus 400 may be embodied as a terminal device or a network device in the foregoing embodiments, and may be configured to perform each step and/or flow corresponding to the terminal device or the network device in the foregoing method embodiments. Memory 430 may alternatively comprise read-only memory and random access memory, and provides instructions and data to the processor. The portion of memory may also include non-volatile random access memory. For example, the memory may also store device type information. The processor 410 may be configured to execute the instructions stored in the memory, and when the processor 410 executes the instructions stored in the memory, the processor 410 is configured to perform the various steps and/or procedures of the method embodiments described above corresponding to the terminal device or the network device.
It should be understood that in the embodiment of the present application, the processor of the above apparatus may be a Central Processing Unit (CPU), and the processor may also be other general processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software elements in a processor. The software elements may be located in ram, flash, rom, prom, or eprom, registers, among other storage media that are well known in the art. The storage medium is located in a memory, and a processor executes instructions in the memory, in combination with hardware thereof, to perform the steps of the above-described method. To avoid repetition, it is not described in detail here.
In the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a alone, both A and B, and B alone, where A, B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c or a-b-c, wherein a, b and c can be single or multiple.
Those of ordinary skill in the art will appreciate that the various method steps and elements described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of both, and that the steps and elements of the various embodiments have been described above generally in terms of their functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. In the embodiments of the present application, the embodiments may refer to each other, for example, methods and/or terms between the embodiments of the method may refer to each other, for example, functions and/or terms between the embodiments of the apparatus and the embodiments of the method may refer to each other, without logical contradiction.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiments of the present application.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium.
The method provided by the embodiment of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a network appliance, a user device, or other programmable apparatus. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., Digital Video Disk (DVD)), or a semiconductor medium (e.g., SSD), among others.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (18)

1. A random access method, comprising:
receiving first information, wherein the first information is used for indicating a target logical root sequence number of a cell, the target logical root sequence number is used for indicating a target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer greater than 1;
and sending a random access leader sequence, wherein the random access leader sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values.
2. The method of claim 1, wherein the random access preamble sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values, and wherein the method comprises:
the random access preamble sequence is determined according to the target physical root sequence number and J target cyclic shift values, the J target cyclic shift values are determined according to the J-1 target cyclic shift difference values, a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference value between a jth +1 target cyclic shift value and a 1 st target cyclic shift value of the J target cyclic shift values, a value range of J is from 1 to J-1, and J is an integer.
3. The method of claim 2, wherein the random access preamble sequence is obtained by stacking J target sequences, and the J target sequences respectively correspond to the J target cyclic shift values.
4. The method according to any of claims 1 to 3, wherein the random access preamble sequence is one of M random access preamble sequences determined according to the J-1 target cyclic shift differences, M-MAX
Figure FDA0001980252840000016
Figure FDA0001980252840000017
Wherein Nzc is the length of the target physical root sequence, Ncs is the target zero correlation value,
Figure FDA0001980252840000014
indicating rounding down and MAX indicating the maximum value.
5. The method according to any of claims 1 to 4, wherein the cubic metric CM value of the random access preamble sequence is smaller than a preset CM threshold.
6. The method according to any of claims 1 to 5, wherein the J-1 target cyclic shift differences are cyclic shift differences at a target zero correlation value Ncs-2.
7. The method according to any one of claims 1 to 5, wherein the J-1 target cyclic shift difference is
Figure FDA0001980252840000015
And a target cyclic shift difference of the J-1 target cyclic shift differences is less than or equal to a maximum value of cyclic shift differences when Ncs is 2, where X is a positive integer.
8. The method according to any one of claims 1 to 7, further comprising:
receiving second information, where the second information is used to indicate a target zero correlation value of the cell from a candidate zero correlation value set, and a zero correlation value in the candidate zero correlation value set is an integer multiple of 2.
9. A random access method, comprising:
sending first information, wherein the first information is used for indicating a target logical root sequence number of a cell, the target logical root sequence number is used for indicating a target physical root sequence number and J-1 target cyclic shift difference values, and J is an integer larger than 1;
receiving a random access preamble sequence, wherein the random access preamble sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values.
10. The method of claim 9, wherein the random access preamble sequence is determined according to the target physical root sequence number and the J-1 target cyclic shift difference values, and comprising:
the random access preamble sequence is determined according to the target physical root sequence number and J target cyclic shift values, the J target cyclic shift values are determined according to the J-1 target cyclic shift difference values, a jth target cyclic shift difference value of the J-1 target cyclic shift difference values is a difference value between a jth +1 target cyclic shift value and a 1 st target cyclic shift value of the J target cyclic shift values, a value range of J is from 1 to J-1, and J is an integer.
11. The method of claim 10, wherein the random access preamble sequence is obtained by stacking J target sequences, and wherein the J target sequences respectively correspond to the J target cyclic shift values.
12. The method according to any of claims 9-11, wherein the random access preamble is one of M random access preamble sequences determined according to the J-1 target cyclic shift differences, M ═ MAX
Figure FDA0001980252840000026
Figure FDA0001980252840000027
Wherein Nzc is the length of the target physical root sequence, Ncs is the target zero correlation value,
Figure FDA0001980252840000024
indicating rounding down and MAX indicating the maximum value.
13. The method according to any of claims 9 to 12, wherein the cubic metric, CM, value of the random access preamble sequence is smaller than a preset CM threshold.
14. The method according to any of claims 9 to 13, wherein the J-1 target cyclic shift differences are cyclic shift differences at a target zero correlation value Ncs-2.
15. The method according to any one of claims 9 to 13, wherein the J-1 target cyclic shift difference is
Figure FDA0001980252840000025
And a target cyclic shift difference of the J-1 target cyclic shift differences is less than or equal to a maximum value of cyclic shift differences when Ncs is 2, where X is a positive integer.
16. The method according to any one of claims 9 to 15, further comprising:
and sending second information, wherein the second information is used for indicating the target zero correlation value of the cell from a candidate zero correlation value set, and the zero correlation value in the candidate zero correlation value set is an integral multiple of 2.
17. An apparatus for carrying out the method of any one of claims 1 to 16.
18. An apparatus comprising a processor and a memory, the processor coupled with the memory, the processor configured to perform the method of any of claims 1-16.
CN201910146690.4A 2019-02-27 2019-02-27 Random access method and device Active CN111629394B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910146690.4A CN111629394B (en) 2019-02-27 2019-02-27 Random access method and device
PCT/CN2020/074615 WO2020173295A1 (en) 2019-02-27 2020-02-10 Random access method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910146690.4A CN111629394B (en) 2019-02-27 2019-02-27 Random access method and device

Publications (2)

Publication Number Publication Date
CN111629394A true CN111629394A (en) 2020-09-04
CN111629394B CN111629394B (en) 2022-02-15

Family

ID=72239064

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910146690.4A Active CN111629394B (en) 2019-02-27 2019-02-27 Random access method and device

Country Status (2)

Country Link
CN (1) CN111629394B (en)
WO (1) WO2020173295A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116723585A (en) * 2023-08-10 2023-09-08 上海移芯通信科技股份有限公司 Random access method, system, equipment and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117675475A (en) * 2022-08-26 2024-03-08 华为技术有限公司 Communication method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242652A (en) * 2008-02-29 2008-08-13 中兴通讯股份有限公司 ZC sequence sorting method and device for random access channel
CN101636937A (en) * 2007-03-16 2010-01-27 Lg电子株式会社 Method of generating random access preambles in wireless communication system
EP2221993A1 (en) * 2007-12-05 2010-08-25 ZTE Corporation Method and device for sequencing for zc sequences of rach
CN101981840A (en) * 2007-06-20 2011-02-23 诺基亚西门子通信公司 Low PAR zero auto-correlation zone sequences for code sequence modulation
CN103379075A (en) * 2012-04-26 2013-10-30 京信通信系统(中国)有限公司 Method and device for determining frequency domain sequence randomly connected to ZC sequences
CN104982079A (en) * 2013-02-06 2015-10-14 高通股份有限公司 Determination of NCS parameter and logical root sequence assignments
CN105453477A (en) * 2013-09-17 2016-03-30 英特尔Ip公司 Generation of random access preambles
CN108322282A (en) * 2017-01-16 2018-07-24 北京三星通信技术研究有限公司 Generation method, indicating means and the device of random access leader sequence

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3515027B1 (en) * 2014-12-29 2020-02-05 Telefonaktiebolaget LM Ericsson (publ) Methods and devices for generating and detecting random access preambles
CN108809597B (en) * 2017-05-05 2023-05-26 北京三星通信技术研究有限公司 Method for determining cyclic shift amount of preamble sequence and method and device for configuring set thereof
CN107787047A (en) * 2017-11-20 2018-03-09 深圳市金立通信设备有限公司 Resource allocation methods, relevant device and computer-readable medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101636937A (en) * 2007-03-16 2010-01-27 Lg电子株式会社 Method of generating random access preambles in wireless communication system
CN101981840A (en) * 2007-06-20 2011-02-23 诺基亚西门子通信公司 Low PAR zero auto-correlation zone sequences for code sequence modulation
EP2221993A1 (en) * 2007-12-05 2010-08-25 ZTE Corporation Method and device for sequencing for zc sequences of rach
CN101242652A (en) * 2008-02-29 2008-08-13 中兴通讯股份有限公司 ZC sequence sorting method and device for random access channel
CN103379075A (en) * 2012-04-26 2013-10-30 京信通信系统(中国)有限公司 Method and device for determining frequency domain sequence randomly connected to ZC sequences
CN104982079A (en) * 2013-02-06 2015-10-14 高通股份有限公司 Determination of NCS parameter and logical root sequence assignments
CN105453477A (en) * 2013-09-17 2016-03-30 英特尔Ip公司 Generation of random access preambles
CN108322282A (en) * 2017-01-16 2018-07-24 北京三星通信技术研究有限公司 Generation method, indicating means and the device of random access leader sequence

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116723585A (en) * 2023-08-10 2023-09-08 上海移芯通信科技股份有限公司 Random access method, system, equipment and storage medium
CN116723585B (en) * 2023-08-10 2023-11-21 上海移芯通信科技股份有限公司 Random access method, system, equipment and storage medium

Also Published As

Publication number Publication date
WO2020173295A1 (en) 2020-09-03
CN111629394B (en) 2022-02-15

Similar Documents

Publication Publication Date Title
CN107071905B (en) Inter-device communication method, user equipment and base station
EP3740011B1 (en) Method and device for receiving and sending reference signal, and computer-readable storage medium
CN110178325B (en) Data transmission method, terminal equipment and network equipment
US11665736B2 (en) Control channel position determining method, device, and processor-readable storage medium
CN111769918B (en) DMRS port indication method and device
CN106817210B (en) Transmission method and device of reference signal sequence
CN111629445B (en) Random access method and device
CN109391426A (en) Instruction, method of reseptance and the device of resource location
CN107733497A (en) Method, terminal device and the network side equipment of tracking beam
KR101561434B1 (en) A method for communicating in mobile system
CN108886811A (en) Send method, equipment and the system of Physical Random Access Channel PRACH
CN111629394B (en) Random access method and device
KR20190104618A (en) Resource Allocation Method, First Node, and Second Node
CN110572195B (en) Method and device for indicating antenna port
CN105794165A (en) Method for transmitting reference signal and user equipment
EP4092948A1 (en) Broadcast signal sending method, broadcast signal receiving method, network device, and terminal device
US20160165612A1 (en) Multicarrier selection method and device
CN115668987A (en) Information transmission method, device and storage medium
CN112398624B (en) Method for receiving positioning reference signal and related equipment
CN109803438B (en) Random access method, network equipment and terminal
EP3748891A1 (en) Communication method and wireless apparatus
CN106899965B (en) Configuration method of transmission power, terminal, base station and baseband chip
CN111601382A (en) Data transmission method and communication device
CN111464279A (en) Data transmission method, terminal equipment and network equipment
US20210195568A1 (en) Communication method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant