CN111837446B - Random access method and communication equipment - Google Patents

Random access method and communication equipment Download PDF

Info

Publication number
CN111837446B
CN111837446B CN201980017936.6A CN201980017936A CN111837446B CN 111837446 B CN111837446 B CN 111837446B CN 201980017936 A CN201980017936 A CN 201980017936A CN 111837446 B CN111837446 B CN 111837446B
Authority
CN
China
Prior art keywords
random access
message
rnti
index
scrambling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201980017936.6A
Other languages
Chinese (zh)
Other versions
CN111837446A (en
Inventor
徐伟杰
尤心
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN111837446A publication Critical patent/CN111837446A/en
Application granted granted Critical
Publication of CN111837446B publication Critical patent/CN111837446B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method and communication device for random access can efficiently schedule transmission of a second message in a 2-step random access procedure. The method comprises the following steps: generating a random access radio network temporary identifier RA-RNTI according to a first index, wherein the first index comprises a RAPID and/or SSB index of the terminal equipment; and performing first processing on a downlink control channel by using the RA-RNTI, wherein the downlink control channel is used for scheduling a second message in the 2-step random access process, and the first processing comprises scrambling or descrambling the downlink control channel.

Description

Random access method and communication equipment
This application claims priority from chinese patent application filed on 25.7.2018, entitled "method and communication device for random access", application number 201810827475.6, filed in chinese patent office, the entire contents of which are incorporated herein by reference.
Technical Field
The embodiment of the application relates to the field of communication, in particular to a random access method and communication equipment.
Background
In a 5G system or a New Radio (NR) system, when a terminal device performs Random Access (RA), a 2-step RA manner may be adopted. For example, a Message (Message, abbreviated as "Msg") 1, i.e., a preamble (preamble), and Msg 3 in a 4-step RA procedure are sent as a first Message; msg 2 and Msg 4 in the 4-step random access procedure are sent as the second message.
In the 4-step Random Access process, Msg 2 includes Random Access Response (RAR) messages of multiple users, while in the 2-step Random Access process, Msg 2 may include only an RAR message of one user, for which it is necessary that the terminal device can identify its own RAR message. Therefore, in the 2-step random access process, how to schedule the transmission of the second message between the network device and the terminal device becomes an urgent problem to be solved.
Disclosure of Invention
The embodiment of the application provides a random access method and communication equipment, which can effectively schedule the transmission of a second message in a 2-step random access process.
In a first aspect, a method for random access is provided, including: generating a random access radio network temporary identifier RA-RNTI according to a first index, wherein the first index comprises a random access preamble index RAPID and/or a synchronous signal block SSB index of the terminal equipment; and performing first processing on a downlink control channel by using the RA-RNTI, wherein the downlink control channel is used for scheduling a second message in the 2-step random access process, and the first processing comprises scrambling or descrambling the downlink control channel.
In a second aspect, a communication device is provided, which may perform the method of the first aspect or any optional implementation manner of the first aspect. In particular, the communication device may comprise functional modules for performing the method of the first aspect described above or any possible implementation manner of the first aspect.
In a third aspect, a communication device is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory to execute the method of the first aspect or any possible implementation manner of the first aspect.
In a fourth aspect, a chip is provided for implementing the method of the first aspect or any possible implementation manner of the first aspect. In particular, the chip comprises a processor for calling and running a computer program from a memory, such that a device in which the chip is installed performs the method as described above in the first aspect or any possible implementation manner of the first aspect.
In a fifth aspect, a computer-readable storage medium is provided for storing a computer program, which causes a computer to perform the method of the first aspect or any possible implementation manner of the first aspect.
A sixth aspect provides a computer program product comprising computer program instructions to cause a computer to perform the method of the first aspect or any possible implementation form of the first aspect.
In a seventh aspect, a computer program is provided, which, when run on a computer, causes the computer to perform the method of the first aspect or any possible implementation manner of the first aspect.
Through the technical scheme, the network equipment and the terminal equipment can generate the RA-RNT based on the RAPID or the SSB index, and scramble or descramble the downlink control channel used for scheduling the second message in the 2-step random access process by using the RA-RNT. For different terminal devices, the RAPID and the corresponding SSB index selected may be different, so that for a terminal device that performs random access using different preambles, the RA-RNTIs generated for scrambling or descrambling the downlink control channel may also be different, so that the network device may identify the second message replied for different terminal devices, thereby implementing effective transmission of the second message in the 2-step random access process.
Drawings
Fig. 1 is a schematic diagram of a possible wireless communication system to which an embodiment of the present application is applied.
Fig. 2 is a schematic flow interaction diagram of 4-step random access.
Fig. 3 is a schematic flow interaction diagram of 2-step random access.
Fig. 4 is a schematic flow chart of a method of random access according to an embodiment of the present application.
Fig. 5 is a schematic block diagram of a communication device of an embodiment of the present application.
Fig. 6 is a schematic configuration diagram of a communication apparatus according to an embodiment of the present application.
Fig. 7 is a schematic structural diagram of a chip of an embodiment of the present application.
Fig. 8 is a schematic block diagram of a communication system of an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a Global System for Mobile communications (GSM) System, a Code Division Multiple Access (CDMA) System, a Wideband Code Division Multiple Access (WCDMA) System, a General Packet Radio Service (GPRS), a Long Term Evolution (Long Term Evolution, LTE) System, a LTE Frequency Division Duplex (FDD) System, a LTE Time Division Duplex (TDD) System, a Long Term Evolution (Advanced) Evolution (LTE-A) System, a New Radio (New Radio, NR) System, an Evolution System of an NR System, a non-licensed spectrum (LTE-based) System, a non-licensed spectrum (LTE-based General communication) System, a non-licensed spectrum (NR) System, a non-licensed spectrum (Mobile-NR) System, UMTS), Worldwide Interoperability for Microwave Access (WiMAX) communication system, Wireless Local Area Network (WLAN), Wireless Fidelity (WiFi), next generation communication system, or other communication system.
Generally, conventional Communication systems support a limited number of connections and are easy to implement, however, with the development of Communication technology, mobile Communication systems will support not only conventional Communication, but also, for example, Device-to-Device (D2D) Communication, Machine-to-Machine (M2M) Communication, Machine Type Communication (MTC), and Vehicle-to-Vehicle (V2V) Communication, etc., and the embodiments of the present application can also be applied to these Communication systems.
Optionally, the communication system in the embodiment of the present application may be applied to a Carrier Aggregation (CA) scenario, may also be applied to a Dual Connectivity (DC) scenario, and may also be applied to an independent (SA) networking scenario.
Illustratively, a communication system 100 applied in the embodiment of the present application is shown in fig. 1. The wireless communication system 100 may include a network device 110. Network device 110 may be a device that communicates with a terminal device. Network device 110 may provide communication coverage for a particular geographic area and may communicate with terminal devices located within that coverage area. Optionally, the Network device 100 may be a Base Transceiver Station (BTS) in a GSM system or a CDMA system, a Base Station (NodeB, NB) in a WCDMA system, an evolved Node B (eNB or eNodeB) in an LTE system, a Network side device in an NR system, or a wireless controller in a Cloud Radio Access Network (CRAN), or a Network device in a relay Station, an Access point, a vehicle-mounted device, a wearable device, a Network side device in a next generation Network, or a Network device in a Public Land Mobile Network (PLMN) for future evolution, or the like.
The wireless communication system 100 also includes at least one terminal device 120 located within the coverage area of the network device 110. As used herein, "terminal equipment" includes, but is not limited to, connections via wireline, such as Public Switched Telephone Network (PSTN), Digital Subscriber Line (DSL), Digital cable, direct cable connection; and/or another data connection/network; and/or via a Wireless interface, such as for a cellular Network, a Wireless Local Area Network (WLAN), a digital television Network such as a DVB-H Network, a satellite Network, an AM-FM broadcast transmitter; and/or means of another terminal device arranged to receive/transmit communication signals; and/or Internet of Things (IoT) devices. A terminal device arranged to communicate over a wireless interface may be referred to as a "wireless communication terminal", "wireless terminal", or "mobile terminal".
The terminal device 120 may be mobile or stationary. Alternatively, terminal Equipment 120 may refer to an access terminal, User Equipment (UE), subscriber unit, subscriber station, mobile station, remote terminal, mobile device, User terminal, wireless communication device, User agent, or User Equipment. An access terminal may be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device having Wireless communication capabilities, a computing device or other processing device connected to a Wireless modem, a vehicle mounted device, a wearable device, a terminal device in a future 5G network or a terminal device in a future evolved PLMN, etc. Optionally, a Device to Device (D2D) communication may be performed between the terminal devices 120.
Specifically, the network device 110 may provide a service for a cell, and the terminal device 120 communicates with the network device 110 through a transmission resource (e.g., a frequency domain resource or a spectrum resource) used by the cell, where the cell may be a cell corresponding to the network device 110 (e.g., a base station), and the cell may belong to a macro base station or a base station corresponding to a Small cell (Small cell), where the Small cell may include: urban cells (Metro cells), Micro cells (Micro cells), Pico cells (Pico cells), Femto cells (Femto cells), and the like, wherein the small cells have the characteristics of small coverage area and low transmission power, and are suitable for providing high-rate data transmission services.
Fig. 1 exemplarily shows one network device and two terminal devices, and optionally, the wireless communication system 100 may include a plurality of network devices and may include other numbers of terminal devices within the coverage of each network device, which is not limited in this embodiment of the present application.
Optionally, the wireless communication system 100 may further include other network entities such as a network controller, a mobility management entity, and the like, which is not limited in this embodiment.
It should be understood that a device having a communication function in a network/system in the embodiments of the present application may be referred to as a communication device. Taking the communication system 100 shown in fig. 1 as an example, the communication device may include a network device 110 and a terminal device 120 having a communication function, and the network device 110 and the terminal device 120 may be the specific devices described above and are not described herein again; the communication device may also include other devices in the communication system 100, such as other network entities, for example, a network controller, a mobility management entity, and the like, which is not limited in this embodiment.
After the cell search procedure, the terminal device has acquired downlink synchronization with the cell, and therefore the terminal device can receive downlink data. However, the terminal device can perform uplink transmission only if it acquires uplink synchronization with the cell. The terminal device may establish a connection with a cell and acquire uplink synchronization through a Random Access Procedure (RAR). That is, through random access, the terminal device may obtain uplink synchronization, and obtain a Cell Radio Network Temporary Identity (C-RNTI), which is a unique identifier allocated to the terminal device by the Network device. Therefore, the random access can be applied not only in the initial access, but also in the case of the uplink synchronization loss of the user. For ease of understanding, the random access procedure will be briefly described below in conjunction with fig. 2 and 3.
The random access procedure may typically be triggered by one of the following 6 types of triggering events:
(1) initial access (initial access).
The terminal device enters an RRC CONNECTED state (RRC _ CONNECTED) from a Radio Resource Control (RRC) IDLE state (RRC _ IDLE state).
(2) Handover (handover).
When the terminal device needs to establish uplink synchronization with a new cell, random access needs to be initiated in the new cell.
(3) RRC Connection reestablishment (RRC Connection Re-establishment).
The terminal device reestablishes the Radio connection after Radio Link Failure (RLF) occurs.
(4) In the RRC connected state, when downlink data arrives, the uplink is in an "out-of-sync" state.
At this time, after the downlink data arrives, the terminal device needs to reply an Acknowledgement (ACK) or a Negative Acknowledgement (NACK).
(5) In the RRC connected state, when Uplink data arrives, the Uplink is in an "out-of-sync" state or there is no available Physical Uplink Control Channel (PUCCH) resource for Scheduling Request (SR) transmission.
When uplink data reaches a state that a measurement report needs to be reported or data needs to be sent, if the uplink is in an asynchronous state, the terminal equipment can initiate a random access process; alternatively, if a terminal device already in the uplink synchronization state is allowed to use a Random Access Channel (RACH) instead of the SR, the terminal device may initiate a Random Access procedure when the uplink is in the "out-of-synchronization" state.
(6) In the RRC connected state, Timing Advance (TA) is required for positioning.
In addition, random access may be triggered due to RRC active state (RRC _ INACTIVE) transition, request of Other System Information (OSI), or beam failure recovery (beam failure recovery).
Fig. 2 is a flow interaction diagram of 4-step random access. As shown in fig. 2, the flow of 4-step random access may include the following four steps:
step 1, Msg 1.
The terminal device sends Msg 1 to the base station to tell the network device that the terminal device has initiated a Random Access request, where the Msg 1 carries a Random Access Preamble (RAP), or is called a Random Access Preamble sequence, a Preamble, and the like. Meanwhile, the Msg 1 can also be used for the network device to estimate the transmission delay between the network device and the terminal device and calibrate the uplink time according to the estimation delay.
Step 2, Msg 2.
After receiving the Msg 1 sent by the terminal device, the network device sends Msg 2, that is, a Random Access Response (RAR) message to the terminal device. The Msg 2 may be scrambled by a Random Access Radio Network Temporary Identity (RA-RNTI). The Msg 2 may carry, for example, Time Advance (TA) information, an uplink grant instruction, such as configuration of an uplink resource, a Temporary Cell-Radio Network Temporary Identity (TC-RNTI), and the like.
The terminal device monitors a Physical Downlink Control Channel (PDCCH) in a random access response time window (RAR window) for receiving an RAR message replied by the network device. The RAR message may be descrambled using a corresponding RA-RNTI.
And if the terminal equipment does not receive the RAR message replied by the network equipment in the RAR time window, the random access process is considered to fail.
If the terminal device successfully receives an RAR message and a preamble index (preamble index) carried in the RAR message is the same as the preamble index sent by the terminal device through Msg 1, it is considered that the RAR is successfully received, and at this time, the terminal device may stop monitoring within the RAR time window.
The Msg 2 may include RAR messages for a plurality of terminal devices, and the RAR message of each terminal device may include a random access preamble identifier (RAP identity, RAPID) (or referred to as a random access preamble index) adopted by the terminal device, information of resources used for transmitting the Msg 3, TA adjustment information, TC-RNTI, and the like. In the NR standard, the RAR message may be scheduled using a Downlink Control Information (DCI) format (DCI format)1-0, and a PDCCH scheduling the RAR message may be scrambled using the RA-RNTI described above.
Step 3, Msg 3.
After receiving the RAR message, the terminal device determines whether the RAR is a RAR message belonging to the terminal device, for example, the terminal device may perform a check by using a preamble identifier, and after determining that the RAR message belongs to the terminal device, generates Msg 3 in an RRC layer, and sends Msg 3 to the network device. Wherein identification information of the terminal device, etc. needs to be carried.
Specifically, the Msg 3 in step 3 of the 4-step random access procedure may include different contents for different random access trigger events to perform Scheduled Transmission (Scheduled Transmission).
For example, for an initial Access scenario, Msg 3 includes an RRC Connection Request (RRC Connection Request) generated by an RRC layer, where at least Non-Access Stratum (NAS) identification information of the terminal device is carried, and may also carry, for example, a service-Temporary Mobile Subscriber Identity (S-TMSI) or a random number of the terminal device; for a Connection reestablishment scene, Msg 3 includes an RRC Connection reestablishment Request (RRC Connection Re-establishment Request) generated by an RRC layer, does not carry any NAS message, and may also carry, for example, a Cell Radio Network Temporary Identifier (C-RNTI) and Protocol Control Information (PCI); for a Handover scenario, Msg 3 includes an RRC Handover complete message (RRC Handover Confirm) generated by an RRC layer and a C-RNTI of the terminal device, and may also carry, for example, a Buffer Status Report (BSR); for other triggering events such as the scene of uplink/downlink data arrival, Msg 3 at least needs to include the C-RNTI of the terminal device.
It should be noted that Uplink transmission typically uses terminal device specific information, e.g., C-RNTI or the like, to scramble data carried in the Uplink Shared Channel (UL-SCH). However, since the collision is not resolved in this case, only TC-RNTI can be used instead of C-RNTI when scrambling Msg 3.
Step 4, Msg 4.
The network device sends Msg 4 to the terminal device, and the terminal device correctly receives Msg 4 to complete Contention Resolution (Contention Resolution). For example, in the RRC connection establishment procedure, the Msg 4 may carry an RRC connection establishment message.
Since the terminal device in step 3 will carry its unique identity in Msg 3, such as C-RNTI or identification information from the core network (e.g. S-TMSI or a random number), the network device will carry the unique identity of the terminal device in Msg 4 in the contention resolution mechanism to designate the terminal device that wins the contention. While other terminal devices that have not won contention resolution will re-initiate random access. The PDCCH of the Msg 4 can be scrambled by TC-RNTI.
In the 5G system, when performing random access, the terminal device may perform random access by using a 2-step random access method in addition to the 4-step random access method described above. One possible method is to send the messages Msg 1, Msg 3 in a 4-step random access procedure as the first message; msg 2 and Msg 4 in the 4-step random access procedure are sent as the second message.
As shown in fig. 3, the flow of 2-step random access may include the following two steps:
step 1, the terminal equipment sends a first message to the base station.
The first message may include a preamble and an Uplink Channel, where the Uplink Channel may be a Physical Uplink Shared Channel (PUSCH). The uplink channel may carry, for example, identification information of the terminal device and a reason of the RRC request. The first message carries some or all of the information similar to that carried in Msg 1 and Msg 3 in a 4-step random access procedure.
And step 2, if the network equipment successfully receives the first message sent by the terminal equipment, sending a second message to the terminal equipment.
The second message may include, for example, an RAR message, collision resolution information (including a unique identifier of the terminal device generated in the contention), C-RNTI assignment information, and the like, and the RAR message may include TA adjustment information, Backoff (BI) information, and the like. This second message carries some or all of the information similar to that carried in Msg 2 and Msg 4 in a 4-step random access procedure.
It should be understood that fig. 2 or 3 are merely examples. Since the 2-step random access procedure has not entered the standardization phase, it is only described here by way of example with reference to fig. 3, and there are other possibilities for defining the respective random access messages involved therein, without defining the other definitions of the respective random access messages in the 2-step random access procedure. The method described in the embodiment of the application is applicable to all other 2-step random access processes.
In the 4-step random access process, different RAR messages for multiple terminal devices may be included in Msg 2. In the 2-step random access process, the second message may carry an RAR message for a terminal device, and may also carry a collision resolution message (i.e., information related to the identifier of the terminal device in the first message) of the terminal device, allocation information of the C-RNTI, and the like. It is also possible to carry e.g. RRC connection setup information etc.
Each cell may have 64 available preambles, and each terminal device may select one of the preambles for Random Access and transmit the selected preamble through a Physical Random Access Channel (PRACH). In the 4-step random access process, the Msg 2 may carry RAR messages of multiple terminal devices at most. In the 2-step random access process, since the second message includes all or part of the Msg 2 and Msg 4 in the 4-step random access process, and since Msg 4 may also carry information with very large bit overhead, such as RRC connection establishment information, etc., if the above information for a plurality of terminal devices is still carried in the second message, a large resource overhead is required to cover these terminal devices in the cell, otherwise, the entire cell cannot be covered. And this increases the reception complexity of the terminal device. Therefore, the second message in the 2-step random access procedure may carry an RAR message for one terminal device. At this time, if the method of generating RA-RNTI in the 4-step random access procedure is still adopted, when the resources of the PRACH used by the multiple terminal devices to transmit the respective preambles are the same, the RA-RNTIs determined based on the resource information of the PRACH are also the same, and thus it is not possible to distinguish different second messages respectively replied by the network device for the terminal devices.
Therefore, the embodiment of the present application proposes that the network device and the terminal device may generate an RA-RNT based on an RAPID or a synchronization Signal Block (SSB or SS Block) index, and scramble or descramble a downlink control channel used for scheduling the second message in the 2-step random access process using the RA-RNT. For different terminal devices, the RAPID and the corresponding SSB index selected may be different, so that for a terminal device that performs random access using different preambles, the RA-RNTIs generated for scrambling or descrambling the downlink control channel may also be different, so that the network device may identify the second message replied for different terminal devices, thereby implementing effective transmission of the second message in the 2-step random access process.
It should be understood that, in the 2-step random access process in the embodiment of the present application, the first message may also be referred to as a New Msg 1(New _ Msg 1), and the second message may also be referred to as a New Msg 2(New _ Msg 2). Alternatively, the first message and the second message may be replaced by other words, which is not limited herein.
Fig. 4 is a schematic flow chart diagram of a method 400 of random access in an embodiment of the present application. The method described in fig. 4 may be performed by a communication device, which may be, for example, a terminal device, such as terminal device 120 shown in fig. 1, or a network device, such as network device 110 shown in fig. 1. As shown in fig. 4, the method 400 of random access may include some or all of the following steps. Wherein:
in 410, an RA-RNTI is generated based on the first index.
Wherein the first index includes a RAPID and/or an SSB index (SSB index) of the terminal device.
In 420, a first process is performed on a downlink control channel using the RA-RNTI.
The downlink control channel is used for scheduling a second message in a 2-step random access process, and the first processing includes scrambling or descrambling the downlink control channel, for example, scrambling or descrambling CRC check bits of the downlink control channel.
The second message in the 2-step random access procedure may include, for example, a random access response message and/or a collision resolution message. The random access response message may include TA adjustment information, BI information, and the like, for example. Optionally, the second message may further include allocation information of the C-RNTI and the like. In addition, the second message may also include other information, such as an RRC connection complete message, an RRC reestablishment complete message, and the like.
These information may all be carried in a downlink control channel, e.g., PDSCH, and the CRC check code of the downlink control channel, e.g., PDCCH, on which the PDSCH is scheduled may be scrambled with the RA _ RNTI.
It is understood that the second message may include part or all of the Msg 2 and Msg 4 information in a 4-step random access procedure, for example. Since the 2-step random access procedure has not entered the standardization stage, the content carried in the second message described herein is only an example, and should not bring any limitation to the second message in the embodiment of the present application.
In order to distinguish from the RA-RNTI used in the 4-step random access process, the RA-RNTI in the 2-step random access process in the embodiment of the present application may also be referred to as a New RA-RNTI (New _ RA-RNTI), and the like, which is not limited herein.
When initiating random access, the terminal equipment firstly determines a random access preamble code used by the terminal equipment. Alternatively, the terminal device may randomly select a preamble for its own random access among a plurality of preamble sequences. Because the terminal equipment randomly selects the preamble, different terminal equipment can greatly reduce the probability of the preamble sequence conflict when selecting from a plurality of preamble sequences. Alternatively, the terminal device may select the preamble based on other information.
After the terminal device determines the preamble for random access, the terminal device may send the preamble to the network device through the first message. The first message may include a data channel in addition to the preamble. The data channel may be used, for example, to carry a reason for requesting establishment of the RRC connection and/or identification information of the terminal device required to establish the RRC connection, and the like.
It is understood that the first message may include part or all of the Msg 1 and Msg 3 information in a 4-step random access procedure, for example. Since the 2-step random access procedure has not entered the standardization stage, the content carried in the first message described herein is only an example, and should not bring any limitation to the first message in the embodiments of the present application.
It should be appreciated that the reason for requesting establishment of the RRC connection is related to the triggering event that initiates random access. For example, for initial access, the first message may include an RRC connection request, through which the terminal device may initially establish a radio connection with the network, and the terminal device may go from an RRC idle state to an RRC connected state; for handover, the first message may include an RRC handover complete message, and at this time, the terminal device needs to establish uplink synchronization with the new cell after handover; for connection re-establishment, the first message may include an RRC connection re-establishment request for the terminal device to re-establish the radio connection after RLF occurs; for uplink data, when the uplink data arrives, for example, a measurement report needs to be reported or user data needs to be sent, the uplink transmission is in "unsynchronized" or no available PUCCH resource is used for SR transmission, the first message may include the uplink data, and when no available PUCCH resource is used for SR transmission, the terminal device already in the uplink synchronization state is allowed to use RACH to replace the SR function; for downlink data arrival, but uplink transmission is not synchronized, the random access information may include an ACK or NACK for the downlink data.
After the network device receives the first message sent by the terminal device and learns the preamble of the terminal device, optionally, the network device may generate an RA-RNTI according to the preamble; alternatively, the network device may also generate the RA-RNTI based on other information of the terminal device, for example, the RA-RNTI is generated based on the SSB index of the terminal device.
The network device may then perform a first process on a downlink control channel for scheduling a second message using the RA-RNTI. The first process may be a scrambling process on the downlink control channel, for example, scrambling Cyclic Redundancy Check (CRC) Check bits of the downlink control channel. Specifically, after the network device encodes the original information of the downlink control channel, the encoded information may be subjected to CRC check by a CRC check code, and the CRC check bits of the downlink control channel are scrambled by using the RA-RNTI.
The network device sends the downlink control information scrambled by the RA-RNTI to the terminal device, and the terminal device obtains the information of the data channel carrying the second message in the downlink control channel. After receiving the downlink control channel, the terminal device needs to descramble the downlink control channel by using the RA-RNTI.
Similarly, the terminal device may also generate an RA-RNTI according to the preamble selected by the terminal device; alternatively, the terminal device may generate the RA-RNTI based on other information of the terminal device, for example, the RA-RNTI is generated based on the SSB index of the terminal device.
Of course, the RA-RNTI may also be generated by the network device and indicated to the terminal device, that is, the terminal device receives the RA-RNTI sent by the network device.
The terminal device uses the RA-RNTI generated in 410 to descramble the downlink control channel for scheduling the second message, thereby obtaining information of the data channel carrying the second message, and receives the second message in the data channel. Since the downlink control channel is scrambled by the RA-RNTI and the RA-RNT may be generated based on the first index, e.g., based on the preamble selected by the terminal device, the RA-RNTIs used for scheduling the downlink control channel of the second message for terminal devices employing different preambles may also be different.
In this way, the second message in the 2-step random access process may carry an RAR message for a terminal device, and the downlink control channel for scheduling the second message may be identified by the RA-RNTI generated based on the first index of the terminal device, thereby achieving effective transmission of the second message in the 2-step random access process.
Further optionally, in 410, the communication device generates an RA-RNTI according to the first index, including: and generating the RA-RNTI according to the first index and the resource information of the PRACH for sending the random access preamble.
The resource information of the PRACH includes, for example, at least one of the following information: the position of an Orthogonal Frequency Division Multiplexing (OFDM) symbol occupied by the PRACH resource in a time domain, the position of a time slot occupied by the PRACH resource in a system frame, the number of resources occupied by the PRACH resource in a Frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the Frequency domain.
For example, taking the first index as RAPID as an example, the network device or the terminal device may generate the RA-RNTI based on the following formula:
New_RA-RNTI=1+RAP_id+preamble_number×s_id+preamble_number×symbol_number×t_id+preamble_number×symbol_number×slot_number×f_id+preamble_number×symbol_number×slot_number×frequency_number×ul_carrier_id。
wherein, RAP _ id is a lead code index (RAPID) of a random access lead code sent by the terminal equipment, and RAP _ id is more than or equal to 0 and is less than lead code _ number; s _ id is the first OFDM symbol of the PRACH resource used for transmitting the random access preamble, s _ id is greater than or equal to 0 and is less than symbol _ number; t _ id is an index of a first slot (slot) of the PRACH resource used for transmitting the random access preamble, and t _ id is greater than or equal to 0 and less than slot _ number; f _ id is the resource number of the PRACH resource in the frequency domain, and f _ id is more than or equal to 0 and is less than frequency _ number; UL _ carrier _ id is an uplink carrier (UL carrier) used for transmitting the random access preamble, and a value of 0 indicates a normal uplink carrier, and a value of 1 indicates a single uplink carrier.
Wherein, preamble _ number is the total number of preambles used by 2-step random access within one PRACH opportunity (PRACH opportunity); symbol _ number is the total possible index number of the starting symbol of the PRACH occasion used by the 2-step random access, and slot _ number is the total index number of the first slot index in the slot where the PRACH occasion used by the 2-step random access is located; frequency _ number is the number of total frequency domain indexes of PRACH occasion used by 2-step random access.
The terminal device or the network device may bring the preamble index and the resource information of the PRACH into the formula according to the formula, thereby obtaining the RA-RNTI.
For example, when preamble _ number is 64, symbol _ number is 14, slot _ number is 80, and frequency _ number is 8 in the above formula, the formula may become:
RA-RNTI=1+RAP_id+64×s_id+64×14×t_id+64×14×80×f_id+64×14×80×8×ul_carrier_id。
substituting RAP _ id and PRACH resource information, i.e. s _ id, t _ id, f _ id and ul _ carrier _ id, into the formula, so as to obtain RA-RNTI of the downlink control channel for scrambling/descrambling scheduling of the second message.
The parameters such as preamble _ number, symbol _ number, slot _ number, and frequency _ number may be other values. Optionally, all or part of the parameter values may be determined by the network device and configured to the terminal device, or agreed in advance in the protocol; alternatively, the values of some of these parameters may be determined by the network device and configured to the terminal device, and the values of other parameters may be agreed by the protocol.
Optionally, the network device and the terminal device may also determine the RA-RNTI from only the random access preamble index.
For example, taking the first index as RAPID as an example, the terminal device or the network device may determine RA-RNTI according to the formula New _ RA-RNTI of 1+ RAP _ id or New _ RA-RNTI of 1+ RAP _ id + offset, where offset is an offset value configured by the network device or pre-stored in the device.
In the method for determining RA-RNTI described above, the RAP _ id therein may be replaced by the SSB index, so that the terminal device and the network device may generate the RA-RNTI of the downlink control channel for scrambling/descrambling scheduling of the second message according to the SSB index. For example, the terminal device and the network device may determine the RA-RNTI according to the following formula and SSB index:
new _ RA-RNTI is 1+ SSB _ index + SSB _ number × s _ id + SSB _ number × symbol _ number × t _ id + SSB _ number × symbol _ number × slot _ number × f _ id + SSB _ number × symbol _ number × slot _ number × frequency _ number × ul _ carrier _ id; alternatively, the first and second electrodes may be,
new _ RA-RNTI is 1+ SSB _ index; alternatively, the first and second liquid crystal display panels may be,
New_RA-RNTI=1+SSB_index+offset。
wherein, the SSB _ index is a fast index of a synchronization signal of the terminal device, i.e. SSB index, and SSB _ index < SSB _ number is greater than or equal to 0; s _ id is the first OFDM symbol of the PRACH resource used for transmitting the random access preamble, s _ id is greater than or equal to 0 and is less than symbol _ number; t _ id is the index of the first slot (slot) of the PRACH resource used for sending the random access preamble, t _ id is greater than or equal to 0 and is less than slot number; f _ id is the resource number of the PRACH resource in the frequency domain, and f _ id is more than or equal to 0 and less than frequency _ number; UL _ carrier _ id is an uplink carrier (UL carrier) used for transmitting the random access preamble, and a value of 0 indicates a normal uplink carrier, and a value of 1 indicates a single uplink carrier.
Wherein SSB _ number is the total number of SSB indices used within one SSB cluster set (SSB burst set); symbol _ number is the total possible index number of the starting symbol of the PRACH occasion used by the 2-step random access, and slot _ number is the total index number of the first slot index in the slot where the PRACH occasion used by the 2-step random access is located; frequency _ number is the number of total frequency domain indexes of PRACH occasion used by 2-step random access.
Optionally, in this embodiment of the present application, a mapping relationship between the preamble and the RA-RNTI may also be established, so that the RA-RNTI for scrambling or descrambling the second message is determined according to the mapping relationship between the preamble and the RA-RNTI. For example, the network device may determine, according to the target preamble used by the terminal device and the mapping relationship, the target RA-RNTI used for scrambling the second message as the RA-RNTI corresponding to the target preamble.
It was described above how the network device and the terminal device generate an RA-RNTI for scrambling a downlink control channel scheduling the second message. However, considering that the network device does not allocate the TC-RNTI to the terminal device before the first message in the 2-step random access process is sent, because the network device allocates the TC-RNTI to the terminal device in the Msg 2 in the 4-step random access process, the embodiment of the present application also proposes a corresponding scrambling and descrambling scheme for the data channel in the first message.
Optionally, the method further comprises: generating a first scrambling code sequence; and performing second processing on the uplink data channel in the first message in the 2-step random access process by using the first scrambling code sequence.
Wherein, when the first processing comprises scrambling the downlink control channel, the second processing comprises descrambling the coded information bits of the uplink data channel; or, when the first processing includes descrambling the downlink control channel, the second processing includes scrambling the coded information bits of the uplink data channel.
Specifically, the network device and the terminal device may generate the first scrambling sequence for the terminal device to scramble the data channel in the first message and for the network device to descramble the data channel in the first message in the following two ways.
Mode 1
Optionally, the generating the first scrambling sequence includes: determining an initial value of the first scrambling code sequence according to the RA-RNTI; and generating the first scrambling code sequence according to the initial value.
For example, the obtained RA-RNTI and the formula c can be usedinit=nRA-RNTI×215+nIDDetermining an initial value of the first scrambling sequence and obtaining the first scrambling sequence based on the initial value, wherein,
Figure GDA0002671349070000111
it should be understood that, the process of obtaining the first scrambling code sequence according to the initial value may refer to an existing process of generating a scrambling code sequence based on the initial value, and for brevity, the description is omitted here.
Mode 2
Optionally, the generating the first scrambling sequence includes: and generating the first scrambling code sequence according to the first index and the mapping relation between a plurality of first indexes and a plurality of first scrambling code sequences.
The first scrambling code sequence is a first scrambling code sequence corresponding to the first index in the plurality of first scrambling code sequences.
It is to be understood that the mapping relationship includes a mapping relationship between a plurality of first indices and a plurality of first scrambling code sequences, where each first index may correspond to one or more first scrambling code sequences, and each first scrambling code sequence may correspond to one or more first indices. The first scrambling code sequences corresponding to different first indexes may be the same or different, and the first indexes corresponding to different first scrambling code sequences may also be the same or different. The mapping relationship may be implemented by mapping a table, or the mapping relationship may be implemented by other means such as a formula and an icon, which is not limited in the embodiments of the present application
As shown in table one, taking the first index as the preamble index as an example, if RAPID of the preamble selected by the terminal device is index 1, scrambling the data channel in the first message by using sequence 1; if the RAPID of the preamble selected by the terminal device is the index N-1, the data channel in the first message is scrambled by using the sequence N-1.
Watch 1
Random access preamble index First scrambling code sequence
Index 1 Sequence 1
Index 2 Sequence 2
…… ……
Index N-1 Sequence N-1
Index N Sequence N
Alternatively, the network device or the terminal device may obtain the mapping relationship that is pre-stored, for example, the mapping relationship may be agreed in advance by a protocol. Or the mapping relation is determined and configured to the terminal device by the network device.
Optionally, scrambling and descrambling the data channel in the first message may also use an RA-RNTI in a 4-step random access procedure, and the RA-RNTI may be, for example:
RA-RNTI=1+s_id+14×t_id+14×80×f_id+14×80×8×ul_carrier_id。
wherein s _ id is the first OFDM symbol of the PRACH resource where the random access preamble is located, and s _ id is greater than or equal to 0 and is less than symbol _ number; t _ id is the index of the first slot (slot) of the PRACH resource where the random access preamble is located, and t _ id is more than or equal to 0 and is less than slot _ number; f _ id is the resource number of the PRACH resource in the frequency domain, and f _ id is more than or equal to 0 and is less than frequency _ number; UL _ carrier _ id is an uplink carrier (UL carrier) where the random access preamble is located, a value of 0 indicates a normal uplink carrier, and a value of 1 indicates a single uplink carrier.
The data channel is carried in the first message in the random access process, and the data channel is descrambled based on a scrambling code sequence generated by a random access lead code index and/or a synchronous signal block index of the terminal equipment, so that the data channel can be descrambled when the network equipment does not allocate any RNTI to the terminal equipment, and the data channel can be sent through the first message, so that the time delay of the random access process is shortened.
In the embodiment of the present application, the RA-RNTI used for scrambling and descrambling the downlink control channel for scheduling the second message may be the same as the RA-RNTI used for generating the first scrambling sequence, as described above. Of course, the RA-RNTI used for scrambling and descrambling the downlink control channel may be different from the RA-RNTI used for generating the first scrambling sequence, for example, RA-RNTI1 used for scrambling and descrambling CRC check bits of the downlink control channel is generated by RA-RNTI1 ═ f1(RAPID), and RA-RNTI2 is generated by RA-RNTI2 ═ f2(RAPID) to further generate the first scrambling sequence so as to scramble the data channel in the first message.
Optionally, there may be a mapping relationship between the preamble and the data channel carried in the first message. After acquiring the preamble in the first message, the network device may determine information of the data channel corresponding to the preamble, such as a resource location.
It should also be understood that the method of the embodiment of the present application may be applied to a 4-step random access procedure, and may also be applied to a 2-step random access procedure. In addition, the method of the embodiment of the application can be applied to various random access processes, not only initial access. Also, the method of the embodiment of the present application may be applied to a contention based random access procedure (contention based RACH) and a non-contention based random access procedure (contention free RACH).
It should be noted that, without conflict, the embodiments and/or technical features in the embodiments described in the present application may be arbitrarily combined with each other, and the technical solutions obtained after the combination also fall within the protection scope of the present application.
In the embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Having described the communication method according to the embodiment of the present application in detail above, an apparatus according to the embodiment of the present application will be described below with reference to fig. 5 to 8, and the technical features described in the method embodiment are applicable to the following apparatus embodiments.
Fig. 5 is a schematic block diagram of a communication device 500 according to an embodiment of the present application. As shown in fig. 5, the communication device 500 comprises a processing unit 510, the processing unit 510 is configured to:
generating a random access radio network temporary identifier RA-RNTI according to a first index, wherein the first index comprises a random access preamble index RAPID and/or a synchronous signal block SSB index of the terminal equipment;
and performing first processing on a downlink control channel by using the RA-RNTI, wherein the downlink control channel is used for scheduling a second message in the 2-step random access process, and the first processing comprises scrambling or descrambling the downlink control channel.
Therefore, the network device and the terminal device can generate an RA-RNT based on the RAPID or SSB index, and scramble or descramble the second message in the 2-step random access procedure using the RA-RNT. For different terminal devices, the RAPID and the corresponding SSB index selected may be different, so that the RA-RNTIs of the downlink control channel generated for scrambling/descrambling scheduling the second message for the terminal device that performs random access using different preambles may also be different, so that the second message replied by the network device for different terminal devices can be distinguished, and effective transmission of the second message in the 2-step random access process is achieved.
Optionally, the first processing includes scrambling or descrambling CRC check bits of the downlink control channel.
Optionally, the processing unit 510 is specifically configured to: and generating the RA-RNTI according to the first index and resource information of a Physical Random Access Channel (PRACH) for sending a random access preamble.
Optionally, the resource information of the PRACH includes at least one of the following information: the position of an Orthogonal Frequency Division Multiplexing (OFDM) symbol occupied by the PRACH resource in a time domain, the position of a time slot occupied by the PRACH resource in a system frame, the number of the resource occupied by the PRACH resource in a frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
Optionally, the processing unit 510 is further configured to: generating a first scrambling code sequence; and performing second processing on an uplink data channel in the first message in the 2-step random access process by using the first scrambling sequence, wherein the second processing includes descrambling the coded information bits of the uplink data channel when the first processing includes scrambling the downlink control channel, or the second processing includes scrambling the coded information bits of the uplink data channel when the first processing includes descrambling the downlink control channel.
Optionally, the processing unit 510 is specifically configured to: determining an initial value of the first scrambling code sequence according to the RA-RNTI; and generating the first scrambling code sequence according to the initial value.
Optionally, the processing unit 510 is specifically configured to: and generating the first scrambling code sequence according to the first index and the mapping relation between a plurality of first indexes and a plurality of first scrambling code sequences.
Optionally, the communication device further includes an obtaining unit or a transceiving unit 520, wherein: the acquisition unit is configured to: acquiring the pre-stored mapping relation; the transceiving unit 520 is configured to: when the communication equipment is the terminal equipment, receiving the mapping relation sent by the network equipment; or, when the communication device is the network device, sending the mapping relationship to the terminal device.
Optionally, the first message in the 2-step random access process includes a random access preamble and the uplink channel, where the information carried in the uplink channel includes a reason for requesting establishment of a radio resource control, RRC, connection and/or identification information of the terminal device required for establishment of the RRC connection.
Optionally, the second message in the 2-step random access procedure includes a random access response, RAR, message and/or a collision resolution message.
It should be understood that the communication device 500 may perform corresponding operations performed by the terminal device or the network device in the method 400, and therefore, for brevity, will not be described again.
Fig. 6 is a schematic structural diagram of a communication device 600 according to an embodiment of the present application. The communication device 600 shown in fig. 6 includes a processor 610, and the processor 610 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 6, the communication device 600 may further include a memory 620. From the memory 620, the processor 610 may call and run a computer program to implement the method in the embodiment of the present application.
The memory 620 may be a separate device from the processor 610, or may be integrated into the processor 610.
Optionally, as shown in fig. 6, the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices, and specifically, may transmit information or data to the other devices or receive information or data transmitted by the other devices.
The transceiver 630 may include a transmitter and a receiver, among others. The transceiver 630 may further include one or more antennas.
Optionally, the communication device 600 may specifically be a network device in the embodiment of the present application, and the communication device 600 may implement a corresponding process implemented by the network device in each method in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the communication device 600 may specifically be a terminal device in the embodiment of the present application, and the communication device 600 may implement a corresponding process implemented by the terminal device in each method in the embodiment of the present application, which is not described herein again for brevity.
Fig. 7 is a schematic structural diagram of a chip of an embodiment of the present application. The chip 700 shown in fig. 7 includes a processor 710, and the processor 710 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 7, the chip 700 may further include a memory 720. From the memory 720, the processor 710 can call and run a computer program to implement the method in the embodiment of the present application.
The memory 720 may be a separate device from the processor 710 or may be integrated into the processor 710.
Optionally, the chip 700 may further include an input interface 730. The processor 710 may control the input interface 730 to communicate with other devices or chips, and in particular, may obtain information or data transmitted by other devices or chips.
Optionally, the chip 700 may further include an output interface 740. The processor 710 may control the output interface 740 to communicate with other devices or chips, and in particular, may output information or data to the other devices or chips.
Optionally, the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Optionally, the chip may be applied to the terminal device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the terminal device in each method in the embodiment of the present application, and for brevity, details are not described here again.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as a system-on-chip, or a system-on-chip.
It should be understood that the processor of the embodiments of the present application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It will be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous link SDRAM (SLDRAM), and Direct Rambus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood that the above memories are exemplary but not limiting illustrations, for example, the memories in the embodiments of the present application may also be Static random access memory (Static RAM, SRAM), Dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double data rate Synchronous Dynamic random access memory (Double data SDRAM, DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Direct Rambus RAM (DR RAM), and so on. That is, the memory in the embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
Fig. 8 is a schematic block diagram of a communication system 800 according to an embodiment of the present application. As shown in fig. 8, the communication system 800 includes a network device 810 and a terminal device 820.
Wherein the network device 810 is configured to: generating a random access radio network temporary identifier RA-RNTI according to a first index, wherein the first index comprises an RAPID and/or SSB index of the terminal equipment; and scrambling a downlink control channel by using the RA-RNTI.
Wherein the terminal device 820 is configured to: generating a random access radio network temporary identifier RA-RNTI according to a first index, wherein the first index comprises a RAPID and/or SSB index of the terminal equipment; and descrambling the downlink control channel by using the RA-RNTI.
Wherein, the downlink control channel is used for scheduling a second message in the 2-step random access process.
The network device 810 may be configured to implement corresponding functions implemented by the network device in the method 400, and the composition of the network device 810 may be as shown in the communication device 500 in fig. 5, which is not described herein again for brevity.
The terminal device 820 may be configured to implement the corresponding functions implemented by the terminal device in the method 400, and the composition of the terminal device 820 may be as shown in the communication device 500 in fig. 5, which is not described herein again for brevity.
An embodiment of the present application further provides a computer-readable storage medium for storing a computer program.
Optionally, the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding process implemented by the network device in each method in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the computer-readable storage medium may be applied to the terminal device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding process implemented by the terminal device in each method in the embodiment of the present application, which is not described herein again for brevity.
Embodiments of the present application also provide a computer program product comprising computer program instructions.
Optionally, the computer program product may be applied to the network device in the embodiment of the present application, and the computer program instructions enable the computer to execute corresponding processes implemented by the network device in the methods in the embodiment of the present application, which are not described herein again for brevity.
Optionally, the computer program product may be applied to the terminal device in the embodiment of the present application, and the computer program instructions enable the computer to execute the corresponding processes implemented by the terminal device in the methods in the embodiment of the present application, which are not described herein again for brevity.
The embodiment of the application also provides a computer program.
Optionally, the computer program may be applied to the network device in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute the corresponding process implemented by the network device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Optionally, the computer program may be applied to the terminal device in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute the corresponding process implemented by the terminal device in each method in the embodiment of the present application, and for brevity, details are not described here again.
It should be understood that the terms "system" and "network" are often used interchangeably herein. The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should also be understood that in the present embodiment, "B corresponding to (corresponding to) a" means that B is associated with a, from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may be determined from a and/or other information.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the unit is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. A method of random access, the method comprising:
generating a random access radio network temporary identifier RA-RNTI according to a first index, wherein the first index comprises a random access preamble index RAPID and a synchronous signal block SSB index of the terminal equipment; using the RA-RNTI to perform first processing on a downlink control channel, wherein the downlink control channel is used for scheduling a second message in a 2-step random access process, and the first processing comprises scrambling or descrambling the downlink control channel; wherein, RAPID and SSB indexes of different terminal devices are different, and are used to generate different RA-RNTIs to identify the second message of the different terminal devices;
the method further comprises the following steps:
generating a first scrambling code sequence;
performing second processing on an uplink data channel in a first message in the 2-step random access process by using the first scrambling sequence, wherein the second processing includes descrambling the coded information bits of the uplink data channel when the first processing includes scrambling the downlink control channel, or the second processing includes scrambling the coded information bits of the uplink data channel when the first processing includes descrambling the downlink control channel;
the generating of the first scrambling sequence comprises:
determining an initial value of the first scrambling code sequence according to the RA-RNTI;
and generating the first scrambling code sequence according to the initial value.
2. The method of claim 1, wherein the first processing comprises scrambling or descrambling Cyclic Redundancy Check (CRC) check bits of the downlink control channel.
3. The method according to claim 1, wherein the generating a random access radio network temporary identity RA-RNTI according to the first index comprises:
and generating the RA-RNTI according to the first index and resource information of a Physical Random Access Channel (PRACH) for sending a random access preamble.
4. The method of claim 3, wherein the resource information of the PRACH comprises at least one of the following information:
the position of an Orthogonal Frequency Division Multiplexing (OFDM) symbol occupied by the PRACH resource in a time domain, the position of a time slot occupied by the PRACH resource in a system frame, the number of the resource occupied by the PRACH resource in a frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
5. The method according to any of claims 1 to 4, wherein said second message of said 2-step random access procedure comprises a random access response, RAR, message and/or a collision resolution message.
6. A communication device, characterized in that the communication device comprises:
the processing unit is used for generating a random access radio network temporary identifier RA-RNTI according to a first index, wherein the first index comprises a random access preamble index RAPID and a synchronous signal block SSB index of the terminal equipment;
the processing unit is further configured to perform first processing on a downlink control channel by using the RA-RNTI, where the downlink control channel is used to schedule a second message in a 2-step random access process, and the first processing includes scrambling or descrambling the downlink control channel; wherein, the RAPID and SSB indexes of different terminal devices are different, and are used to generate different RA-RNTIs to identify the second message of the different terminal devices;
the processing unit is further to:
generating a first scrambling code sequence;
performing second processing on an uplink data channel in a first message in the 2-step random access process by using the first scrambling sequence, wherein the second processing includes descrambling the coded information bits of the uplink data channel when the first processing includes scrambling the downlink control channel, or the second processing includes scrambling the coded information bits of the uplink data channel when the first processing includes descrambling the downlink control channel;
the processing unit is specifically configured to:
determining an initial value of the first scrambling code sequence according to the RA-RNTI;
and generating the first scrambling code sequence according to the initial value.
7. The communications device of claim 6, wherein the first processing comprises scrambling or descrambling CRC check bits of the downlink control channel.
8. The communication device according to claim 6, wherein the processing unit is specifically configured to:
and generating the RA-RNTI according to the first index and resource information of a Physical Random Access Channel (PRACH) for sending a random access preamble.
9. The communications device of claim 8, wherein the resource information for the PRACH comprises at least one of:
the position of an Orthogonal Frequency Division Multiplexing (OFDM) symbol occupied by the PRACH resource in a time domain, the position of a time slot occupied by the PRACH resource in a system frame, the number of the resource occupied by the PRACH resource in a frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
10. The communication device according to any of claims 6 to 9, wherein the second message of the 2-step random access procedure comprises a random access response, RAR, message and/or a collision resolution message.
11. A chip, characterized in that it comprises a processor for calling up and running a computer program from a memory, so that a device in which the chip is installed performs the method according to any one of claims 1 to 5.
12. A computer-readable storage medium for storing a computer program which causes a computer to perform the method of any one of claims 1 to 5.
CN201980017936.6A 2018-07-25 2019-07-25 Random access method and communication equipment Active CN111837446B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2018108274756 2018-07-25
CN201810827475 2018-07-25
PCT/CN2019/097626 WO2020020270A1 (en) 2018-07-25 2019-07-25 Random access method and communication device

Publications (2)

Publication Number Publication Date
CN111837446A CN111837446A (en) 2020-10-27
CN111837446B true CN111837446B (en) 2022-05-17

Family

ID=69181315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980017936.6A Active CN111837446B (en) 2018-07-25 2019-07-25 Random access method and communication equipment

Country Status (3)

Country Link
CN (1) CN111837446B (en)
TW (1) TW202008836A (en)
WO (1) WO2020020270A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3927091A4 (en) * 2019-02-13 2022-05-04 KDDI Corporation Terminal device for executing random access procedure, base station device, control method, and program
WO2021155591A1 (en) * 2020-02-07 2021-08-12 Oppo广东移动通信有限公司 Random access method, apparatus, terminal, network device, and storage medium
CN115053630A (en) * 2020-02-13 2022-09-13 瑞典爱立信有限公司 Method and apparatus for random access
WO2021237479A1 (en) * 2020-05-26 2021-12-02 深圳传音控股股份有限公司 Data transmission method and device, and computer-readable storage medium
CN113766659A (en) * 2020-06-04 2021-12-07 华为技术有限公司 Random access method, device and system
WO2022027488A1 (en) * 2020-08-06 2022-02-10 Oppo广东移动通信有限公司 Wireless communication method, terminal device, and network device
WO2022141559A1 (en) * 2020-12-31 2022-07-07 华为技术有限公司 Power determination method, apparatus and system
WO2022151171A1 (en) * 2021-01-14 2022-07-21 富士通株式会社 Random access method and apparatus
CN115884424A (en) * 2021-08-24 2023-03-31 大唐移动通信设备有限公司 Random access method, network side equipment, terminal, device and storage medium
CN116058062A (en) * 2022-11-04 2023-05-02 北京小米移动软件有限公司 Random access method and device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101394222A (en) * 2007-09-20 2009-03-25 北京信威通信技术股份有限公司 Method and device for highly effectively recognizing customer identifier
CN102325382A (en) * 2011-06-30 2012-01-18 电信科学技术研究院 Random access method and equipment
CN102932917A (en) * 2011-08-08 2013-02-13 普天信息技术研究院有限公司 Method for acquiring absolute uplink timing advance (TA) in carrier aggregation scene

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102505734B1 (en) * 2017-01-13 2023-03-03 모토로라 모빌리티 엘엘씨 Method and Apparatus for Performing Contention Based Random Access in Carrier Frequency

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101394222A (en) * 2007-09-20 2009-03-25 北京信威通信技术股份有限公司 Method and device for highly effectively recognizing customer identifier
CN102325382A (en) * 2011-06-30 2012-01-18 电信科学技术研究院 Random access method and equipment
CN102932917A (en) * 2011-08-08 2013-02-13 普天信息技术研究院有限公司 Method for acquiring absolute uplink timing advance (TA) in carrier aggregation scene

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Open issues for the Random access procedure;Ericsson;《3GPP TSG-RAN WG2 #100 Tdoc R2-1713474》;20171201;全文 *
Remaining details of RACH procedure;ZTE等;《3GPP TSG RAN WG1 Meeting #90bis R1-1717036》;20171013;第4节 *
Remaining details on RACH procedure;Ericsson;《3GPP TSG RAN WG1 NR Ad-Hoc#3 R1- 1716155》;20170921;第2节 *

Also Published As

Publication number Publication date
WO2020020270A1 (en) 2020-01-30
TW202008836A (en) 2020-02-16
CN111837446A (en) 2020-10-27

Similar Documents

Publication Publication Date Title
CN111837446B (en) Random access method and communication equipment
CN113905453B (en) Random access method and equipment
CN111869306B (en) Random access method, terminal equipment and network equipment
CN112929982B (en) Random access method and communication equipment
CN113490288B (en) Method, apparatus and computer-readable storage medium for random access
CN112806088B (en) Random access method, terminal equipment and network equipment
CN111989978B (en) Random access method and equipment
US11310787B2 (en) Downlink channel receiving method and terminal device
CN111972032B (en) Random access method and equipment
WO2022067519A1 (en) Random access methods and terminals
CN112740808B (en) Message transmission method and device
CN112997574B (en) Random access method, terminal equipment and network equipment
CN112997575B (en) Wireless communication method, terminal device and network device
AU2019311070A1 (en) Random access method, terminal device, and network device
CN113115423B (en) Method and terminal device for controlling power ramp counter
AU2018422690B2 (en) Downlink channel receiving method, and terminal apparatus
CN117580188A (en) Wireless communication method, terminal device and network device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant