CN111918405B - Random access method, terminal and network side equipment - Google Patents

Random access method, terminal and network side equipment Download PDF

Info

Publication number
CN111918405B
CN111918405B CN201910388979.7A CN201910388979A CN111918405B CN 111918405 B CN111918405 B CN 111918405B CN 201910388979 A CN201910388979 A CN 201910388979A CN 111918405 B CN111918405 B CN 111918405B
Authority
CN
China
Prior art keywords
content
random access
guard interval
terminal
interval
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910388979.7A
Other languages
Chinese (zh)
Other versions
CN111918405A (en
Inventor
刘玉真
孙军帅
黄学艳
王莹莹
韩星宇
吴敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN201910388979.7A priority Critical patent/CN111918405B/en
Publication of CN111918405A publication Critical patent/CN111918405A/en
Application granted granted Critical
Publication of CN111918405B publication Critical patent/CN111918405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0866Non-scheduled access, e.g. ALOHA using a dedicated channel for access

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a random access method, a terminal and network side equipment, belonging to the technical field of wireless communication, wherein the random access method applied to the terminal comprises the following steps: and sending random access information, wherein the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located. The invention adds a section of guard interval after the two parts of MsgA contents of two-step random access respectively to avoid the interference to other terminals as far as possible.

Description

Random access method, terminal and network side equipment
Technical Field
The present invention relates to the field of wireless communication technologies, and in particular, to a random access method, a terminal, and a network device.
Background
According to the current development of Third Generation Partnership project (3 GPP) standardization, the Random Access process in the fifth Generation mobile communication technology-New air interface (5 th-Generation New Radio, abbreviated as 5G NR) is divided into Contention-based Random Access (CBRA) and non-Contention-based Random Access (CFRA), a terminal (User Equipment, abbreviated as UE) first sends a first message (Msg 1), which is a preamble, to a base station, and then the base station replies to a second message (Msg 2) to the UE, and a Control unit (MAC CE, which is a Control Element) of the Media Access Control layer of the Msg2 includes a Timing adjustment Command (Timing Advance), and uplink synchronization can be performed on the UE according to the value.
Two-step random access (2-step RACH) has been defined, in the 2-step RACH, a conventional first message (Msg 1) and a third message (Msg 3) are combined into a message a (MsgA) and reported to the base station, and a conventional second message (Msg 2) and a fourth message (Msg 4) are combined into a message B (MsgB) and sent to the UE by the base station. That is, in the 2-step RACH, the conventional Msg2 is sent to the UE in the MsgB, so the MsgA can only be sent to the base station without Timing Advance (TA), uplink synchronization cannot be guaranteed, and interference may occur to other UEs at this time.
Disclosure of Invention
In view of this, the present invention provides a random access method, a terminal and a network side device, which are used to solve the problem that the terminal sending the first message MsgA without TA in the current two-step random access process may cause interference to other terminals.
In order to solve the above technical problem, in a first aspect, the present invention provides a random access method, applied to a terminal, including:
and sending random access information, wherein the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located.
Preferably, before the step of sending the random access information, the method further includes:
acquiring downlink synchronous information;
and determining the first protection interval and the second protection interval according to the downlink synchronization information.
Preferably, the step of acquiring the downlink synchronization information includes:
acquiring a first time domain position which is considered by the terminal to be capable of receiving a broadcast message sent by network side equipment;
acquiring a second time domain position of a broadcast message actually received from network side equipment;
and determining the downlink synchronization information according to the first time domain position and the second time domain position.
Preferably, the step of determining the first guard interval and the second guard interval according to the downlink synchronization information includes:
and selecting the values of the first protection interval and the second protection interval within the range of the cell-level protection interval according to the downlink synchronization information.
Preferably, the first guard interval and the second guard interval are equal.
In a second aspect, the present invention further provides a random access method, applied to a network side device, including:
receiving random access information, wherein the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located.
Preferably, after the step of receiving the random access information, the method further includes:
and if the first protection interval is equal to the second protection interval, determining that the first content and the second content come from the same terminal.
In a third aspect, the present invention further provides a terminal, including:
the transceiver is used for sending random access information, the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located.
Preferably, the terminal further includes:
the processor is used for acquiring downlink synchronization information; and determining the first protection interval and the second protection interval according to the downlink synchronization information.
Preferably, the processor is further configured to acquire a first time domain position where the terminal considers that the terminal can receive a broadcast message sent by a network side device; acquiring a second time domain position of a broadcast message actually received from network side equipment; and determining the downlink synchronization information according to the first time domain position and the second time domain position.
Preferably, the processor is further configured to select values of the first guard interval and the second guard interval within a range of a cell-level guard interval according to the downlink synchronization information.
Preferably, the first guard interval and the second guard interval are equal.
In a fourth aspect, the present invention further provides a network side device, including:
the transceiver is used for receiving random access information, the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located.
Preferably, the network side device further includes:
a processor, configured to determine that the first content and the second content are from a same terminal if the first guard interval and the second guard interval are equal.
In a fifth aspect, the present invention also provides a terminal, including a memory, a processor, and a computer program stored on the memory and executable on the processor; the processor implements any of the above random access methods applied to the terminal when executing the computer program.
In a sixth aspect, the present invention further provides a network-side device, including a memory, a processor, and a computer program stored in the memory and executable on the processor; when the processor executes the computer program, any one of the random access methods applied to the network side equipment is realized.
In a seventh aspect, the present invention also provides a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of any one of the random access methods.
The technical scheme of the invention has the following beneficial effects:
in the embodiment of the invention, when the terminal sends the first message (MsgA) in the two-step random access process, a section of guard interval is added after the two parts of contents (the first content and the second content) of the MsgA respectively, so as to avoid interference to other terminals as far as possible.
Drawings
Fig. 1 is a flowchart illustrating a random access method according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for determining the first guard interval and the second guard interval according to a first embodiment of the present invention;
fig. 3 is a flowchart illustrating a random access method according to a second embodiment of the present invention;
fig. 4 is a flowchart illustrating another random access method according to a second embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal according to a third embodiment of the present invention;
fig. 6 is a schematic structural diagram of a network side device in a fourth embodiment of the present invention;
fig. 7 is a schematic structural diagram of a terminal in a fifth embodiment of the present invention;
fig. 8 is a schematic structural diagram of a network side device in a sixth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the drawings of the embodiments of the present invention. It should be apparent that the described embodiments are only some of the embodiments of the present invention, and not all of them. All other embodiments, which can be derived by a person skilled in the art from the described embodiments of the invention, are within the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic flow chart of a random access method according to an embodiment of the present invention, where the method is applied to a terminal, and includes the following steps:
step 11: the terminal sends random access information, the random access information comprises a first content and a second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval (protection interval: guard time, GT for short) is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located.
It should be noted that the first content is a signal to detect the UE, the second content is a data portion (payload), and the second content is transmitted on a Physical Uplink Shared Channel (PUSCH). Wherein the second content at least comprises Msg3 in the conventional contention-based random access, and the Msg3 contains different contents in different random access scenarios.
In the embodiment of the invention, when the terminal sends the first message (MsgA) in the two-step random access process, a segment of guard interval is respectively added behind the contents of the two parts of the MsgA so as to avoid interference on other terminals as far as possible.
The random access method described above is exemplified below.
Optionally, before the step of sending the random access information, the method further includes:
the terminal acquires downlink synchronous information;
and the terminal determines the first protection interval and the second protection interval according to the downlink synchronization information.
In the embodiment of the present invention, before sending the random access information, since the terminal does not send a message to a network side device (e.g., a base station), the network side device does not send a message to the terminal, and the terminal cannot acquire the TA, the terminal can only estimate the length of the guard interval based on the downlink synchronization information, and then add the estimated guard interval after two parts of contents of the random access information, so as to avoid interference to other terminals as much as possible.
Further optionally, the step of acquiring the downlink synchronization information includes:
the terminal acquires a first time domain position which is considered by the terminal to be capable of receiving a broadcast message sent by network side equipment;
the terminal acquires a second time domain position of a broadcast message actually received and sent by the network side equipment;
and determining the downlink synchronization information according to the first time domain position and the second time domain position.
It should be noted that, theoretically, the terminal should know the period information of the broadcast message sent by the network-side device, but for some reasons, such as clock accuracy, the terminal may consider that the time domain position of the broadcast message sent by the network-side device is deviated from the time domain position of the broadcast message actually sent by the network-side device.
In the embodiment of the invention, because a certain physical distance exists between the terminal and the network side equipment, transmission delay exists when electromagnetic waves are transmitted from one side to the other side. Therefore, the terminal considers that a time difference exists between the first time domain position where the network side equipment broadcast message should be received and the second time domain position where the terminal actually receives the network side equipment broadcast message, that is, the downlink synchronization information.
Optionally, the step of determining the first guard interval and the second guard interval according to the downlink synchronization information includes:
and the terminal selects the values of the first protection interval and the second protection interval within the range of cell-specific guard time according to the downlink synchronization information.
That is, in the embodiment of the present invention, after estimating the downlink synchronization information, the terminal randomly selects values of the first guard interval and the second guard interval within a conventionally calculated cell-level guard interval range directly according to the downlink synchronization information.
It should be noted that the cell-level guard interval may be the guard interval of a conventional random access preamble, and the length of the guard interval depends on the cell coverage radius, and is generally set to be the time length required by twice the distance of the signal transmission cell radius. The size range of the radius of a conventional cell is well known in the art.
For example, fig. 2 shows a method for determining the first guard interval and the second guard interval, which includes the following specific processes:
step 21: the terminal acquires the time t at which it considers that it should receive the broadcast message sent by the base station 1 I.e. the terminal considers the base station as t 1 Constantly sending broadcast messages;
step 22: the terminal obtains the time t when the terminal actually receives the broadcast message of the base station 2
Step 23: the terminal calculates the downlink time difference (namely the downlink synchronous information) delta = | t 1 -t 2 |;
Step 24: and the terminal randomly selects one or two values as the values of the first protection interval and the second protection interval respectively according to the downlink time difference delta to the range of the conventionally calculated cell-level protection interval.
Optionally, the first guard interval and the second guard interval are equal.
In the two-step Random Access process, in a scenario where the first content and the second content in the first message MsgA are separately sent to the network side device, for example, the first content is sent on a Physical Random Access Channel (PRACH), the second content is sent on a Physical Uplink Shared Channel (PUSCH), and the network side device cannot effectively distinguish which terminal the received second content belongs to. Therefore, in the embodiment of the present invention, a terminal-level guard interval pair (GT pair) is designed for the first content and the second content, that is, the first guard interval and the second guard interval are equal to each other, so that after receiving the first content and the second content, the network side device may identify which terminal the second content belongs to by comparing whether the guard intervals of the first content and the second content are consistent, and make a corresponding response.
Referring to fig. 3, fig. 3 is a flowchart illustrating a random access method according to a second embodiment of the present invention, where the method is applied to a network side device, and includes the following steps:
step 31: the network side equipment receives random access information, the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located.
Wherein, the network side device may be a base station.
The first content is a signal to detect the UE, and the second content is a data portion (payload). Wherein the second content may include Msg3 in a conventional contention-based random access, and the Msg3 contains different contents in different random access scenarios.
In the embodiment of the invention, when the terminal sends the first message (MsgA) in the two-step random access process, a segment of protection interval is respectively added behind the two parts of contents of the MsgA so as to avoid interference on other terminals as far as possible, and therefore, a first protection interval is arranged behind the first content received by the network side equipment, and a second protection interval is arranged behind the second content.
Optionally, after the step of receiving the random access information, the method further includes:
if the first guard interval and the second guard interval are equal, the network side device determines that the first content and the second content are from the same terminal.
In the two-step random access process, the terminal sends the first content and the second content in the first message MsgA to the network side device separately, for example, the first content is sent on the PRACH, the second content is sent on the PUSCH, and the network side device cannot effectively distinguish which terminal the received second content belongs to. Therefore, in the embodiment of the present invention, the terminal designs a terminal-level guard interval (UE-specific guard time) pair (GT pair) for the first content and the second content, that is, the first guard interval and the second guard interval are equal in value, so that after receiving the first content and the second content, the network side device can identify which terminal the second content belongs to by comparing whether the guard intervals of the first content and the second content are consistent, and make a corresponding response.
For example, fig. 4 shows a random access method applied to a base station, which specifically includes the following steps:
step 41: the base station detects the first content and the second content sent by the terminal within a certain time (the waiting time of the base station is not limited here, and may be determined specifically according to actual requirements). If the first content and the second content carrying the same guard interval are detected, step 41 is executed; if only the first content or only the second content is detected, then step 42 is performed; if neither the first content nor the second content is detected, i.e. no message of the terminal is detected, step 43 is entered.
Step 42: and the base station considers that the first content and the second content in the MsgA of the same terminal are received, and makes corresponding response according to the solved information.
Step 43: the base station decodes the received first content or second content and responds accordingly.
Step 44: no operation is performed.
The embodiments of the present invention provide technical solutions corresponding to the above embodiments and having the same inventive concept, and the same technical effects can be achieved.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a terminal according to a third embodiment of the present invention, where the terminal 50 includes:
the transceiver 51 is configured to send random access information, where the random access information includes a first content and a second content, the first content includes a random access preamble, the second content includes data related to random access, a first guard interval is set behind a symbol where the first content is located, and a second guard interval is set behind a symbol where the second content is located.
In the embodiment of the invention, when the terminal sends the first message (MsgA) in the two-step random access process, a section of guard interval is added after the two parts of contents (the first content and the second content) of the MsgA respectively, so as to avoid interference to other terminals as far as possible.
Optionally, the terminal further includes:
the processor is used for acquiring downlink synchronization information; and determining the first protection interval and the second protection interval according to the downlink synchronization information.
Optionally, the processor is further configured to acquire a first time domain location where the terminal considers that a broadcast message sent by a network side device can be received; acquiring a second time domain position of a broadcast message actually received from network side equipment; and determining the downlink synchronization information according to the first time domain position and the second time domain position.
Optionally, the processor is further configured to select values of the first guard interval and the second guard interval within a range of a cell-level guard interval according to the downlink synchronization information.
Optionally, the first guard interval and the second guard interval are equal.
The embodiment of the present invention is a product embodiment corresponding to the above method embodiment, and therefore, detailed description is omitted here, and please refer to the first embodiment in detail.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a network-side device according to a fourth embodiment of the present invention, where the network-side device 60 includes:
the transceiver 61 is configured to receive random access information, where the random access information includes a first content and a second content, the first content includes a random access preamble, the second content includes data related to random access, a first guard interval is set behind a symbol where the first content is located, and a second guard interval is set behind a symbol where the second content is located.
In the embodiment of the invention, when a terminal sends a first message (MsgA) in a two-step random access process, a segment of guard interval is respectively added behind two parts of contents of the MsgA so as to avoid interference on other terminals as far as possible, and therefore, a first guard interval is arranged behind a first content received by a network side device, and a second guard interval is arranged behind a second content received by the network side device.
Optionally, the network side device further includes:
a processor, configured to determine that the first content and the second content are from a same terminal if the first guard interval and the second guard interval are equal.
The embodiment of the present invention is a product embodiment corresponding to the above method embodiment, and therefore, detailed description is omitted here, and please refer to the second embodiment.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a terminal according to a fifth embodiment of the present invention, where the terminal 70 includes a processor 71, a memory 72, and a computer program stored in the memory 72 and capable of running on the processor 71; the processor 71, when executing the computer program, performs the steps of:
and sending random access information, wherein the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located.
In the embodiment of the invention, when the terminal sends the first message (MsgA) in the two-step random access process, a section of guard interval is added after the two parts of contents (the first content and the second content) of the MsgA respectively, so as to avoid interference to other terminals as far as possible.
Optionally, the processor 71 may further implement the following steps when executing the computer program:
before the step of sending the random access information, the method further comprises:
acquiring downlink synchronous information;
and determining the first protection interval and the second protection interval according to the downlink synchronization information.
Optionally, the processor 71 may further implement the following steps when executing the computer program:
the step of acquiring the downlink synchronization information comprises:
acquiring a first time domain position which is considered by the terminal to be capable of receiving a broadcast message sent by network side equipment;
acquiring a second time domain position of a broadcast message actually received from network side equipment;
and determining the downlink synchronization information according to the first time domain position and the second time domain position.
Optionally, the processor 71 may further implement the following steps when executing the computer program:
the step of determining the first guard interval and the second guard interval according to the downlink synchronization information includes:
and selecting the values of the first protection interval and the second protection interval within the range of the cell-level protection interval according to the downlink synchronization information.
Optionally, the first guard interval and the second guard interval are equal.
The specific working process of the embodiment of the present invention is the same as that of the first embodiment of the method, and therefore, detailed description is not repeated here, and please refer to the description of the method steps in the first embodiment.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a network-side device according to a sixth embodiment of the present invention, where the network-side device 80 includes a processor 81, a memory 82, and a computer program stored in the memory 82 and capable of running on the processor 81; the processor 81, when executing the computer program, implements the steps of:
receiving random access information, wherein the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located.
In the embodiment of the invention, when the terminal sends the first message (MsgA) in the two-step random access process, a segment of protection interval is respectively added behind the two parts of contents of the MsgA so as to avoid interference on other terminals as far as possible, and therefore, a first protection interval is arranged behind the first content received by the network side equipment, and a second protection interval is arranged behind the second content.
Optionally, when the processor 81 executes the computer program, the following steps may be further implemented:
after the step of receiving the random access information, the method further includes:
and if the first protection interval is equal to the second protection interval, determining that the first content and the second content are from the same terminal.
The specific working process of the embodiment of the present invention is the same as that of the second embodiment of the method, and therefore, the detailed description thereof is omitted, and refer to the description of the method steps in the second embodiment.
A seventh embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps in the random access method in any one of the first embodiment and the second embodiment. Please refer to the above description of the method steps in the corresponding embodiments.
The network side device in the embodiment of the present invention may be a Base Transceiver Station (BTS) in Global System for Mobile communication (GSM) or Code Division Multiple Access (CDMA), may also be a Base Station (NodeB, NB) in Wideband Code Division Multiple Access (WCDMA), may also be an evolved Node B (eNB or eNodeB) in LTE, or a relay Station or Access point, or a Base Station in a future 5G network, and the like, and is not limited herein.
The terminal in the embodiments of the present invention may be a wireless terminal or a wired terminal, and the wireless terminal may be a device providing voice and/or other service data connectivity to a user, a handheld device having a wireless connection function, or other processing devices connected to a wireless modem. A wireless terminal, which may be a mobile terminal such as a mobile telephone (or called a "cellular" telephone) and a computer having a mobile terminal, e.g., a portable, pocket, hand-held, computer-included, or vehicle-mounted mobile device, may communicate with one or more core networks via a Radio Access Network (RAN), and may exchange language and/or data with the RAN. For example, personal Communication Service (PCS) phones, cordless phones, session Initiation Protocol (SIP) phones, wireless Local Loop (WLL) stations, personal Digital Assistants (PDAs), and the like. A wireless Terminal may also be referred to as a system, a Subscriber Unit (Subscriber Unit), a Subscriber Station (Subscriber Station), a Mobile Station (Mobile), a Remote Station (Remote Station), a Remote Terminal (Remote Terminal), an Access Terminal (Access Terminal), a User Terminal (User Terminal), a User Agent (User Agent), and a Terminal (User Device or User Equipment), which are not limited herein.
The computer-readable storage media described above, including non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (13)

1. A random access method applied to a terminal is characterized by comprising the following steps:
sending random access information, wherein the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located;
before the step of sending the random access information, the method further comprises:
acquiring downlink synchronous information;
determining the first guard interval and the second guard interval according to the downlink synchronization information;
the step of determining the first guard interval and the second guard interval according to the downlink synchronization information includes:
and selecting the values of the first protection interval and the second protection interval within the range of the cell-level protection interval according to the downlink synchronization information.
2. The method of claim 1, wherein the step of acquiring the downlink synchronization information comprises:
acquiring a first time domain position which is considered by the terminal to be capable of receiving a broadcast message sent by network side equipment;
acquiring a second time domain position of a broadcast message actually received from network side equipment;
and determining the downlink synchronization information according to the first time domain position and the second time domain position.
3. The method of claim 1, wherein the first guard interval and the second guard interval are equal.
4. A random access method is applied to network side equipment, and is characterized by comprising the following steps:
receiving random access information, wherein the random access information comprises first content and second content, the first content comprises a random access lead code, the second content comprises data related to random access, a first protection interval is arranged behind a symbol where the first content is located, and a second protection interval is arranged behind a symbol where the second content is located;
wherein the determining, by the terminal according to the downlink synchronization information, the first guard interval and the second guard interval include: and selecting the values of the first protection interval and the second protection interval within the range of the cell-level protection interval according to the downlink synchronization information.
5. The method of claim 4, wherein the step of receiving the random access information is followed by:
and if the first protection interval is equal to the second protection interval, determining that the first content and the second content come from the same terminal.
6. A terminal, comprising:
a transceiver, configured to send random access information, where the random access information includes a first content and a second content, the first content includes a random access preamble, the second content includes data related to random access, a first guard interval is set behind a symbol where the first content is located, and a second guard interval is set behind a symbol where the second content is located;
a processor, configured to acquire downlink synchronization information; determining the first guard interval and the second guard interval according to the downlink synchronization information;
the processor is further configured to select values of the first guard interval and the second guard interval within a range of a cell-level guard interval according to the downlink synchronization information.
7. The terminal of claim 6, wherein the processor is further configured to obtain a first time domain location where the terminal considers that a broadcast message sent by a network-side device can be received; acquiring a second time domain position of a broadcast message actually received from network side equipment; and determining the downlink synchronization information according to the first time domain position and the second time domain position.
8. The terminal of claim 6, wherein the first guard interval and the second guard interval are equal.
9. A network-side device, comprising:
a transceiver, configured to receive random access information, where the random access information includes a first content and a second content, the first content includes a random access preamble, the second content includes data related to random access, a first guard interval is set behind a symbol where the first content is located, and a second guard interval is set behind a symbol where the second content is located; wherein the determining, by the terminal according to the downlink synchronization information, the first guard interval and the second guard interval include: and selecting the values of the first protection interval and the second protection interval within the range of the cell-level protection interval according to the downlink synchronization information.
10. The network-side device of claim 9, further comprising:
a processor, configured to determine that the first content and the second content are from a same terminal if the first guard interval and the second guard interval are equal.
11. A terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor; characterized in that the processor implements the random access method according to any of claims 1 to 3 when executing the computer program.
12. A network-side device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor; characterized in that the processor realizes the random access method according to claim 4 or 5 when executing the computer program.
13. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the random access method according to any one of claims 1 to 5.
CN201910388979.7A 2019-05-10 2019-05-10 Random access method, terminal and network side equipment Active CN111918405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910388979.7A CN111918405B (en) 2019-05-10 2019-05-10 Random access method, terminal and network side equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910388979.7A CN111918405B (en) 2019-05-10 2019-05-10 Random access method, terminal and network side equipment

Publications (2)

Publication Number Publication Date
CN111918405A CN111918405A (en) 2020-11-10
CN111918405B true CN111918405B (en) 2022-12-16

Family

ID=73242655

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910388979.7A Active CN111918405B (en) 2019-05-10 2019-05-10 Random access method, terminal and network side equipment

Country Status (1)

Country Link
CN (1) CN111918405B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101369840A (en) * 2007-08-13 2009-02-18 大唐移动通信设备有限公司 TDD accidental access method, system and its composition modules
CN103916973A (en) * 2013-01-05 2014-07-09 中国移动通信集团公司 Method for being randomly access to ultra-large type cell and UE

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108207027B (en) * 2016-12-20 2021-02-12 华为技术有限公司 Random access method and equipment
GB2559382B (en) * 2017-02-03 2021-10-20 Tcl Communication Ltd Systems and methods for cell range extension

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101369840A (en) * 2007-08-13 2009-02-18 大唐移动通信设备有限公司 TDD accidental access method, system and its composition modules
CN103916973A (en) * 2013-01-05 2014-07-09 中国移动通信集团公司 Method for being randomly access to ultra-large type cell and UE

Also Published As

Publication number Publication date
CN111918405A (en) 2020-11-10

Similar Documents

Publication Publication Date Title
US11368986B2 (en) Method and apparatus for random access in a wireless communication system
US20190342849A1 (en) Time Service Method, Terminal Device, and Network Device
EP3254510B1 (en) Method and apparatus for implementing a time-alignment guard timer
CN112272368A (en) Base station, method in base station and wireless terminal
US20200137703A1 (en) Synchronization method and apparatus
US11076422B2 (en) Random access responding method and device, and random access method and device
EP3873162B1 (en) Random access method and device
EP4193772B1 (en) Coverage enhancement of msg3 and msga transmissions on physical uplink shared channel
CN111212449B (en) Random access method, terminal and network side equipment
WO2011043845A1 (en) Method and apparatus for avoiding physical random access channel collisions
CN110831236A (en) Random access method and device
US20220104281A1 (en) Random access method and apparatus
WO2021077343A1 (en) Wireless communication method and terminal device
CN110677916B (en) Configuration, transmission and detection method of random access information, terminal and base station
US11115948B2 (en) Measurement signal sending method, indication information sending method, and device
EP4124146A1 (en) Communication method and communication apparatus
CN116210331A (en) Data processing method, apparatus and computer readable storage medium
CN111918405B (en) Random access method, terminal and network side equipment
CN112291842A (en) Communication method and device
CN112788712B (en) Detection method of random access response RAR, terminal equipment and network equipment
WO2021146866A1 (en) Time adjustment method and system, device and storage medium
CN111757526A (en) Random access method, terminal and network side equipment
WO2023207652A1 (en) Method and apparatus for determining transmit power of sounding reference signal in mobile communications
WO2022205427A1 (en) Validation of timing advance in wireless communication
CN114222350B (en) Random access method and device, user equipment and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant