CN112087765A - Information reporting method performed by user equipment and user equipment - Google Patents

Information reporting method performed by user equipment and user equipment Download PDF

Info

Publication number
CN112087765A
CN112087765A CN201910514717.0A CN201910514717A CN112087765A CN 112087765 A CN112087765 A CN 112087765A CN 201910514717 A CN201910514717 A CN 201910514717A CN 112087765 A CN112087765 A CN 112087765A
Authority
CN
China
Prior art keywords
random access
information
access procedure
rach
step random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910514717.0A
Other languages
Chinese (zh)
Inventor
常宁娟
刘仁茂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sharp Corp
Original Assignee
Sharp Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sharp Corp filed Critical Sharp Corp
Priority to CN201910514717.0A priority Critical patent/CN112087765A/en
Priority to PCT/CN2020/095363 priority patent/WO2020249007A1/en
Publication of CN112087765A publication Critical patent/CN112087765A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure

Abstract

The present disclosure provides an information reporting method performed by a user equipment and a corresponding user equipment. An information reporting method performed by a user equipment is a Random Access Channel (RACH) information reporting method including two-step random access procedure information, the two-step random access procedure is a random access procedure for enhancing a four-step random access procedure based on contention, the method includes the steps of: when a user equipment UE transmits RACH information contained in a RACH report, a connection establishment failure CEF report, or a radio link failure RLF report to a base station, the UE sets the contents of the RACH information according to: first information is set for indicating whether the corresponding random access procedure is a two-step random access procedure or a four-step random access procedure.

Description

Information reporting method performed by user equipment and user equipment
Technical Field
The present disclosure relates to the field of wireless communication technologies, and in particular, to an information reporting method performed by a user equipment and a user equipment.
Background
The aim of optimizing the network performance can be achieved through network optimization in the wireless network. Generally, means such as data acquisition and data analysis are performed on an existing deployed and operated network, so that the reason influencing the network quality is found out, and the network performance is improved by means such as modifying configured network parameters, adjusting a network structure and deployed equipment. For Self-configuring and Self-optimizing networks (SON), it refers to a process of automatically adjusting the Network based on measurements/performance measurements of user equipment and/or base stations. The network side may configure the UE to perform measurements for SON. The SON Function includes many aspects, such as an Automatic neighbor Relation Function (ANR) for reducing the neighbor management burden of an operator, a Mobility Load Balancing Function (MLB) for Balancing responsibility between different cells, a Mobility Robustness Optimization (MRO) for optimizing Mobility, a random access channel Optimization (rach) for optimizing random access channel parameters, and a radio link failure reporting Function for optimizing coverage and MRO.
In 6.2018, a New work Project (see RP-182105: Study on RAN-centralized Data Collection and Utilization for LTE and NR) with further enhancements to New Radio technology (NR, New Radio) and Long Term Evolution (LTE) systems was approved at the third Generation Partnership Project (3rd Generation Partnership Project: 3GPP) RAN #80 Congress. One of the goals of this research project is to implement the functions of SON in NR networks, including ANR, random access channel performance, and connection failure reporting for coverage optimization.
The present disclosure is directed to implementing random access channel performance in SON functions in NR networks and coverage optimization problems due to random access problems, and further, to solving the problem of how to more accurately feed back random access procedure information to the network side.
Disclosure of Invention
The invention aims to provide a solution to the problem of random access channel performance in the implementation of SON functions in NR networks and coverage optimization due to random access problems. More specifically, the present disclosure proposes a solution to the problem of how to more accurately feed back random access procedure information to the network side.
According to a first aspect of the present disclosure, an information reporting method performed by a user equipment is provided, which is a random access channel, RACH, information reporting method including two-step random access procedure information, the two-step random access procedure being a random access procedure in which a four-step random access procedure based on contention is enhanced, the method comprising the steps of: when a user equipment UE transmits RACH information contained in a RACH report, a connection establishment failure CEF report, or a radio link failure RLF report to a base station, the UE sets the contents of the RACH information according to: first information is set for indicating whether the corresponding random access procedure is a two-step random access procedure or a four-step random access procedure.
According to a second aspect of the present disclosure, there is provided an information reporting method performed by a user equipment, which is a random access channel, RACH, information reporting method including two-step random access procedure information, the two-step random access procedure being a random access procedure in which a four-step random access procedure based on contention is enhanced, the method comprising the steps of: when a user equipment UE transmits RACH information contained in a RACH report, a connection establishment failure CEF report, or a radio link failure RLF report to a base station, the UE sets the contents of the RACH information according to: and setting second information for indicating whether the first random access type is changed in the corresponding random access process, wherein the random access type is two-step random access or four-step random access.
According to a third aspect of the present disclosure, there is provided an information reporting method performed by a user equipment, which is a random access channel, RACH, information reporting method including two-step random access procedure information, the two-step random access procedure being a random access procedure in which a four-step random access procedure based on contention is enhanced, the method comprising the steps of: when a user equipment UE transmits RACH information contained in a RACH report, a connection establishment failure CEF report, or a radio link failure RLF report to a base station, the UE sets the contents of the RACH information according to: setting third information for indicating a reason or a trigger condition for changing a random access type in a corresponding random access process, wherein the random access type is two-step random access or four-step random access.
In the above information reporting method performed by the user equipment, it is preferable that the third information is set to: the reason for indicating the change of the random access type is because a random access response for indicating that the UE changes or backs off to four-step random access is received; a reason for indicating the random access type change is that the number of two-step random access procedure attempts or transmissions reaches a configured maximum number; or the reason for indicating the random access type change is that the number of attempts or transmissions of the four-step random access procedure reaches the configured maximum number.
In the above information reporting method performed by the user equipment, it is preferable that the UE includes, in addition to the first, second, and third information, one or more of the following information in the RACH information: information for indicating the number of random access preambles transmitted by a media access control layer in a corresponding random access procedure; information indicating that contention is detected for at least one transmitted random access preamble in a corresponding random access procedure; information indicating whether a carrier used by the random access procedure is a normal uplink carrier or a supplementary uplink carrier.
According to a fourth aspect of the present disclosure, there is provided an information reporting method performed by a user equipment, which is a random access channel, RACH, information reporting method including two-step random access procedure information, the two-step random access procedure being a random access procedure in which a four-step random access procedure based on contention is enhanced, the method comprising the steps of: when the user equipment UE transmits RACH information contained in a RACH report, a connection setup failure CEF report, or a radio link failure RLF report to the base station, parameter settings are distinguished for the two-step random access procedure information and the four-step random access procedure information.
In the above-described information reporting method performed by the user equipment, it is preferable that, for the two-step random access procedure, one or more of the following information is contained in the RACH information: information for indicating the number of times of random access preambles transmitted by the media access control layer in the corresponding two-step random access process; information indicating that contention is detected for at least one transmitted random access preamble in the corresponding two-step random access procedure; information for indicating whether the carrier used by the two-step random access procedure is a normal uplink carrier or a supplementary uplink carrier, and for the four-step random access procedure, one or more of the following information is contained in the RACH information: information for indicating the number of times of random access preambles transmitted by a media access control layer in the corresponding four-step random access process; information for indicating that contention is detected for at least one transmitted random access preamble in the corresponding four-step random access procedure; information for indicating whether a carrier used by the four-step random access procedure is a normal uplink carrier or a supplementary uplink carrier.
In the above-mentioned information reporting method performed by the user equipment, preferably, the two-step random access procedure comprises: UE sends message A to base station; and the UE receives a message B from the base station, wherein the message A comprises a random access preamble and physical uplink shared channel transmission, and the message B comprises a random access response or a competition resolving identifier.
In the above-described information reporting method performed by the user equipment, it is preferable that when the RACH information is information included in the RACH report or the RLF report, the corresponding random access procedure is a most recently successfully completed random access procedure, and when the RACH information is information included in the CEF report or the RLF report, the corresponding random access procedure is a failed random access procedure.
According to a fifth aspect of the present disclosure, a user equipment is provided, including: a processor; and a memory having instructions stored thereon that, when executed by the processor, cause the user equipment to perform the information reporting method described above.
According to the information reporting method performed by the user equipment and the corresponding user equipment, the base station can acquire more accurate RACH information, so that RACH parameter adjustment is more accurately performed based on the accurate information in the RACH information report, and RACH performance and coverage performance are improved.
Drawings
The above and other features of the present disclosure will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings, in which:
fig. 1 is a diagram illustrating a contention-based random access procedure.
Fig. 2 is a diagram illustrating a non-contention based random access procedure.
Fig. 3 is a schematic diagram of the enhanced two-step random access procedure in R16.
Fig. 4 is a diagram showing four-step random access RAR contents and corresponding mac subheaders in an NR system. (a) Is MAC subheader corresponding to MAC RAR containing random access leading mark; (b) is the MAC subheader corresponding to the MAC RAR containing the backspacing parameter; (c) is the MAC RAR content.
Fig. 5 is a diagram showing four-step random access RAR contents and corresponding mac subheaders in an LTE system. (a) Is MAC subheader corresponding to MAC RAR containing random access leading mark; (b) is the MAC subheader corresponding to the MAC RAR containing the backspacing parameter; (c) is the MAC RAR content.
Fig. 6 is a diagram showing an information reporting method performed by a user equipment according to embodiment 1 of the present disclosure.
Fig. 7 is a diagram showing an information reporting method performed by a user equipment according to embodiment 2 of the present disclosure.
Fig. 8 is a diagram showing an information reporting method performed by a user equipment according to embodiment 3 of the present disclosure.
Fig. 9 is a diagram showing an information reporting method performed by a user equipment according to embodiment 4 of the present disclosure.
Fig. 10 is a block diagram showing a schematic structure of a user equipment UE according to the present disclosure.
Detailed Description
Other aspects, advantages, and salient features of the disclosure will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses exemplary embodiments of the disclosure.
In the present disclosure, the terms "include" and "comprise," as well as derivatives thereof, mean inclusion without limitation; the term "or" is inclusive, meaning and/or.
In this specification, the various embodiments described below which are used to describe the principles of the present disclosure are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of exemplary embodiments of the present disclosure as defined by the claims and their equivalents. The following description includes various specific details to aid understanding, but such details are to be regarded as illustrative only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Moreover, descriptions of well-known functions and constructions are omitted for clarity and conciseness. Moreover, throughout the drawings, the same reference numerals are used for similar functions and operations.
Various embodiments according to the present disclosure are described in detail below with an NR/LTE mobile communication system as an example application environment. However, it is to be noted that the present disclosure is not limited to the following embodiments, but is applicable to more other wireless communication systems, such as an LTE system connected to a 5G core network, and the like.
The base station in the present disclosure may be any type of base station, including a Node B, an enhanced base station eNB, or a 5G communication system base station gNB, or a micro base station, a pico base station, a macro base station, a home base station, etc.; the cell may be a cell under any type of base station, the cell may be a beam (beam), a Transmission point (TRP), or the base station may be a Central Unit (gNB-Central Unit, gNB-CU) or a Distributed Unit (gNB-Distributed Unit, gNB-DU) that constitutes the base station. Unless otherwise specified, the concepts of cell and base station may be interchanged in this disclosure; the LTE system is also used to refer to the LTE system of 5G and beyond (e.g. referred to as the LTE system, or the LTE system that can be connected to the 5G core network), and LTE may be replaced by Evolved Universal Terrestrial Radio Access (E-UTRA) or Evolved Universal Terrestrial Radio Access network E-UTRAN. Combinations of the different embodiments may also work. For convenience of description, the RRC reconfiguration message and the RRC connection reconfiguration message are equivalent in this disclosure; similarly, the response message RRC reconfiguration complete message is equivalent to the RRC connection reconfiguration complete message. The handover command is equivalent to the RRC message containing the handover command, and refers to the RRC message or the configuration in the RRC message that triggers the UE to perform the handover. The handover configuration refers to all or part of the configuration in the handover command. Cancellation, release, deletion, cleanup, and the like may be substituted. Execution, use, and application are alternatives. Configuration and reconfiguration may be alternative. Monitoring (monitor) and detection (detect) may be replaced. The conditional switch command and the conditional switch configuration are replaceable.
Some concepts related to the present disclosure are described below. It is noted that some of the nomenclature used in the following description is merely exemplary and not limiting, and that other nomenclature may be used.
Physical random access channel resources: physical Random Access Channel (PRACH) resource. In the present disclosure, the physical random access channel resource PRACH resource may refer to a physical frequency resource and/or a time domain resource and/or a code domain resource (e.g., preamble) used for random access.
Random access channel: random Access Channel, RACH. The RACH in this disclosure may refer to either a transmission channel RACH or a physical random access channel PRACH without distinction. RACH parameters/configuration refers to radio configuration for implementing a random access function, and includes related configurations of PRACH, such as maximum preamble transmission times, power ramping parameters, a random access response receiving window size, MAC contention resolution timer configuration, PRACH time-frequency resource configuration, message 1 (i.e., preamble) subcarrier spacing, configuration (configured by SSB-RACH-contention and preamble information elements) for indicating number information of Synchronization channel blocks (SSBs) corresponding to each RACH Occasion (RO) and number of contention-based random preamble preambles corresponding to each SSB, and the like.
In the LTE system, for the RACH capability in the SON function, the base station may send a UE information request message to the UE, where the UE includes a RACH-report request indication (RACH-report information element) for requesting the UE to report an RACH report of the random access procedure. After receiving the UEinformationRequest message including the indication, the UE reports the RACH report included in the ueinformationreport message to the base station. The base station takes an RACH report reported by the UE as a sample, and based on a plurality of samples which are enough, the base station can analyze whether the current RACH performance meets the requirement or not and adjust the RACH parameters according to the requirement to improve the RACH performance. Similarly, for the coverage performance in the SON function, the base station issues a UE information request message to the UE, where the UE information request message includes a connection establishment failure report request indication (connEstFailReportReq information element) for requesting the UE to report the saved connection establishment failure information. After receiving the UEinformationRequest message including the indication, the UE includes a connection establishment failure report (a connEstFailReport information element, referred to as a CEF report in this disclosure) in the ueinformationreport message and reports the report to the base station. For the mobility and coverage performance in the SON function, the base station issues a UE information request message to the UE, where the UE includes a Radio Link Failure report request indication (RLF-ReportReq information element) for requesting the UE to report the stored Radio Link Failure (RLF) report information. Upon receiving the UEinformationRequest message including the indication, the UE reports the saved RLF Report (RLF-Report information element) to the base station included in the ueinformationreport message.
In LTE, both RACH report and CEF report contain two pieces of information about the random Access procedure, one is the number of random Access PREAMBLE TRANSMISSIONs (numberfprability) for indicating the number of random Access PREAMBLE TRANSMISSIONs during the random Access procedure, corresponding to the PREAMBLE _ TRANSMISSION _ COUNTER count value of the Medium Access Control (MAC) layer; the other is a contention detection indication (contentioned) for indicating whether contention is detected for at least one transmitted random access preamble. The RACH parameters that the base station may adjust may include RACH resource configuration, random access preamble partition (e.g., partition into dedicated preambles, preamble grouping of a group and B group), RACH backoff (backoff) parameters, RACH transmission power control parameters, and the like.
In the present disclosure, the random access procedure information included in the CEF report and the RLF report is also referred to as RACH failure information, but the random access procedure information included in the RACH report, the CEF report, and the RLF report may all be collectively referred to as RACH information, unless otherwise specified. The CEF report may refer to an RRC connection establishment failure report, an RRC connection recovery failure report, or an RRC connection re-establishment failure report; that is, the CEF report in the present disclosure may be applied to information in the case where the RRC connection establishment procedure fails, the RRC connection recovery procedure fails, or the RRC connection re-establishment procedure fails.
The network optimization structure in the NR system follows the above framework in LTE and is enhanced in combination with the characteristics of NR. The conclusion was reached on RAN2#106 conferences: the RACH Information includes SSB-related Information or Channel State Information Reference Signal (CSI-RS) -related Information in addition to the above Information. The SSB/CSI-RS association information includes an SSB/CSI-RS index value and/or the number of times of sending a random access preamble corresponding to each attempted SSB/CSI-RS, and is used to indicate whether an UpLink carrier associated with random access is a normal UpLink carrier (UL) or a supplemental UpLink carrier (SUL).
In the existing NR/LTE mechanism, there are two random access procedures: contention Based Random Access (CBRA) and non-Contention Based Random Access (i.e., Contention Free Random Access (CFRA)). The CBRA process is shown in fig. 1 and includes four steps: the first step, is used for UE to send message 1 (namely random access preamble) to the base transceiver station; the second step is that: the UE receives a message 2 (namely, a Random Access Response, RAR) from the base station, where the message 2 may include a time advance command, a backoff parameter, a Random Access preamble Identifier, an uplink grant UL grant, a Temporary Cell Radio Network Temporary Identifier (TC-RNTI), and the like; the third step: the UE sends a message 3 (uplink transmission scheduled by an uplink grant in the message 2), where the message 3 is generally used to send a UE identifier, an RRC message used for Radio Resource Control (RRC) connection establishment/recovery/re-establishment, a UE contention resolution identifier used for random access contention resolution, and the like to the base station; the fourth step: the UE receives a message 4 (i.e. a message for contention resolution, which may comprise an RRC message) from the base station. The PRACH resource used in CBRA is shared by a plurality of UEs, and when the UE completes the four steps of CBRA random access and the competition solution is successful, the random access process is successfully completed. The CFRA procedure is shown in fig. 2 and is divided into two steps: the first step is as follows: for UE to send message 1 (i.e. random access preamble) to the base station; the second step is that: the UE receives a message 2 (i.e., Random Access Response, RAR) from the base station. After successfully receiving message 2 associated with message 1, the UE considers that the CFRA procedure is successfully completed. If the RAR in the CFRA procedure includes an uplink grant UL grant, the uplink transmission scheduled by using the uplink grant UL grant in the RAR may also be referred to as message 3. The CFRA generally allocates a dedicated PRACH resource, such as a preamble (referred to as step 0 in fig. 2), to the UE in advance by the base station, so that no contention exists. In LTE, one random access procedure is either CBRA or CFRA. In NR, due to the existence of the beam, it is supported that both the CBRA and CFRA random access resources may be used in one random access procedure. That is, the retransmission of the random access preamble may change the random access resource used by the random access preamble, for example, when the random access resource is selected for a UE allocated with a CFRA resource (e.g., used for beam failure recovery or beam switching through RRC signaling), if the reference signal received power value measured by the SSB or CSI-RS corresponding to the allocated CFRA resource is smaller than a configured threshold value when the UE selects the random access resource before transmitting msg1, the UE may abandon the configured CFRA and select a random access resource corresponding to an SSB or CSI-RS with better signal quality from the CBRA resource to transmit msg 1.
As can be seen from the above, in CBRA, four steps are required to complete random access. In order to reduce the delay of random access and save the signaling overhead, the RAN in 12 months in 2018 has been studied through a new work item (see 3GPP document: RP-190711) to study a two-step random access procedure, which is mainly enhanced or improved based on a CBRA four-step random access procedure. As shown in fig. 3, the general mechanism of the two-step random access procedure is: the first step is as follows: the UE sends message a to the base station. The message a includes a random access preamble and a Physical Uplink Shared Channel (PUSCH) transmission, which actually correspond to the message 1 and the message 3 of the conventional four-step random access process; the second step is that: the UE receives message B from the base station. The message B may implement a function of a conventional four-step random access procedure message 2 (i.e., may include a time advance command, a backoff parameter, a random access preamble Identifier, an uplink grant UL grant, a Temporary Cell-Radio Network Temporary Identifier (TC-RNTI), etc.) and/or a function of a message 4 (a contention resolution Identifier and/or an RRC message). The conclusion reached at the RAN1#96b conference is that the PRACH resources used for the two-step random access and the four-step random access are independently configured. One conclusion of the RAN2#106 conference is to support a fallback from a two-step random access procedure to (or change to) a conventional four-step random access procedure. In one scenario of two-step random access to four-step random access, after the UE sends the message a for two-step random access, the received message B is an RAR indicating that it falls back to four-step random access, and the RAR indicating that it falls back to four-step random access may be an RAR of a conventional message 2, as shown in fig. 4 and 5, or may be a fallback RAR newly defined by two-step random access. Another possible scenario of two-step random access to four-step random access is that the UE may switch to the four-step random access procedure to re-attempt the random access procedure when it has attempted a number of two-step random access procedures but failed all.
If the RACH information in the existing system is directly used, the base station cannot distinguish whether the RACH information is for the RACH parameters of the two-step random access procedure or for the RACH parameters of the four-step random access procedure, because the base station side cannot analyze the received samples more accurately, it cannot be determined which RACH parameters (the random access configuration parameters corresponding to the two-step random access or the random access configuration parameters corresponding to the four-step random access) should be adjusted and how to adjust, and thus the optimization of the RACH parameters is inaccurate or even wrong. Considering that the RACH parameters of the two-step random access procedure are configured separately from those of the conventional four-step random access procedure, the base station needs to adjust and optimize the RACH performance for the two-step random access procedure and the RACH performance for the four-step random access procedure, respectively. In addition, for the foregoing two-step random access procedure, the procedure may be switched or backed to the four-step random access procedure, that is, one random access procedure may include both the phase of using the RACH resources of the two-step random access procedure and the phase of using the RACH resources of the four-step random access procedure, and the RACH information report in the existing system may not support such finer-based RACH information, so that the base station may not know whether the sample is suitable for RACH performance optimization of the two-step random access resource or the four-step random resource based on the received RACH information sample, thereby possibly resulting in inaccuracy of RACH performance and coverage performance optimization. Similarly, for a random access procedure using both CBRA and CFRA resources, the RACH information report in the existing system cannot achieve more refined RACH information.
Therefore, how to implement more accurate RACH information becomes a concern of the present disclosure, and more specifically, how to implement more accurate RACH information considering a two-step random access procedure or a random access procedure using both CBRA resources and CFRA resources, and the following embodiments of the present disclosure provide specific implementation manners for this problem.
In the present disclosure and subsequent embodiments, the legacy random access procedure includes the random access procedure defined by NR or LTE release 15 and previous releases. Preferably, the conventional random access procedure refers to a conventional four-step random access procedure, CBRA; optionally, the conventional random access procedure refers to a conventional non-contention based random access procedure, i.e., CFRA. The two-step random access process refers to R16 and a two-step random access process in a subsequent version, which is enhanced for a conventional random access process (CBRA or CFRA) and adopts a method of transmitting a message a including a random access preamble and an uplink transmission PUSCH. Preferably, the two-step random access procedure refers to a two-step random access procedure enhanced for a conventional CBRA four-step random access procedure and employing a method of transmitting a message a including a random access preamble and an uplink transmission PUSCH.
Example 1
The embodiment provides a RACH information reporting method including two-step random access procedure information.
As shown in fig. 6, when the user equipment UE transmits RACH information contained in the RACH report/CEF report/RLF report to the base station, the UE sets the content of the RACH information according to:
first information is set for indicating whether the corresponding random access procedure is a two-step random access procedure or a four-step random access procedure. Or as indicating whether the corresponding random access procedure is a two-step random access procedure or a four-step random access procedure. When the RACH information is contained in the RACH report or the RLF report, the corresponding random access process refers to the random access process which is completed successfully recently; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
In one implementation, the value of the field corresponding to the first information is "tune" or "1", which indicates that the corresponding random access procedure is a two-step random access procedure. And if the value of the domain corresponding to the first information is 'FALSE' or '0', the corresponding random access process is the traditional four-step random access process.
In another implementation, the first information corresponding field is an enumerated type. Namely, the value is set as 2-step RACH, which indicates that the corresponding random access process is a two-step random access process; or set to "4-step RACH", indicates that the corresponding random access procedure is a conventional four-step random access procedure.
Optionally, if the first information does not exist, the UE considers that the corresponding random access procedure is a four-step random access procedure. That is, the UE only contains the first information if the random access procedure is a two-step random access procedure.
The two-step random access process can also be described as using PRACH resources or RACH configuration configured by the two-step random access; the four-step random access procedure may also be described as being a PRACH resource or RACH configuration configured using four-step random access (e.g., included in a RACH-configCommon or RACH-configDedicated information element in an NR system, may be included in a RACH-configBFR or candidatebeamsrist information element in a beam failure recovery set in a random access for beam failure recovery, and may be included in a PRACH-config or RACH-configCommon or RACH-configDedicated information element in an LTE system).
By the method in this embodiment, the base station may determine whether the RACH information received by the first information is for a two-step random access procedure or a four-step random access procedure, so that RACH parameter adjustment and network performance optimization for distinguishing the types of random access procedures may be performed more accurately.
Example 2
The present embodiment presents another RACH information reporting method including two-step random access procedure information.
As shown in fig. 7, when the UE transmits RACH information contained in the RACH report/CEF report/RLF report to the base station, the UE sets the content of the RACH information according to:
and setting second information for indicating whether the first random access type change occurs in the corresponding random access process. The random access type refers to two-step random access or conventional random access. Preferably, the first random access type change refers to a change from a two-step random access procedure fallback/change to a conventional random access procedure. Alternatively, the first random access type change may also refer to a fallback/change from a conventional random access procedure to a two-step random access procedure. In the present disclosure, the second information may be referred to as a backoff indicator or a first random access type change indicator, which is for convenience of description only and is not limited thereto.
When the RACH information is contained in the RACH report or the RLF report, the corresponding random access process refers to the random access process which is completed successfully recently; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
In one implementation, a value of the field corresponding to the second information is "tune" or "1", which indicates that the corresponding random access procedure is changed/backed off by the first random access type. And if the value of the domain corresponding to the second information is "FALSE" or "0", it indicates that the corresponding random access procedure has not been changed/backed off by the first random access type.
In another implementation, the second information corresponding field is an enumeration type. I.e., the value thereof is set to "fallback" or "RACH type change" or "fallback to4 step", indicates that the corresponding random access procedure is changed/backed off by the first random access type.
In yet another implementation, the second information may further indicate a direction in which a type of a random access procedure is changed. The second information may also be used to indicate that the type of the random access procedure is changed/backed off from two-step random access to four-step random access, for example, when the value thereof may be set to "2 step 4 step". Also, the second information may be used to indicate a change of the type of the random access procedure from four-step random access to two-step random access, for example, the value may be set to "4 step 2 step".
Optionally, if the second information does not exist, the UE considers that the first random access type change/backoff does not occur in the corresponding random access procedure. That is, the UE only includes the second information when the random access procedure is changed/backed off for the first random access type.
The occurrence of the first random access type change may also be described as a change in the type of random access resources used. Changing from two-step random access to conventional random access as the type of random access procedure may also be described as a PRACH resource or RACH configuration configured from using two-step random access; change/fallback to PRACH resources or RACH configuration configured using conventional random access (as contained in RACH-configCommon or RACH-configdivided information element in NR system, may be contained in RACH-configBFR or candidatebeamsrlist information element in beam failure recovery set, and contained in PRACH-config or RACH-configdivided information element in LTE system, at random access for beam failure recovery).
Example 3
The present embodiment presents another RACH information reporting method including two-step random access procedure information.
As shown in fig. 8, when the UE transmits RACH information contained in the RACH report/CEF report/RLF report to the base station, the UE sets the content of the RACH information according to:
and setting third information for indicating the reason of the random access type change or the triggering condition/situation in the corresponding random access process. The random access type refers to two-step random access or conventional random access. Preferably, the random access type change refers to a fallback/change from a two-step random access procedure to a conventional random access procedure. Alternatively, the random access type change may also refer to a fallback/change from a conventional random access procedure to a two-step random access procedure.
For example, according to different triggering conditions of the change of the random access type, the third information may be set as a reason for indicating the change of the random access type because RAR (also described as random access type change/fallback indicated by the network) for indicating that the UE changes/backs to the conventional random access is received. As mentioned above, the RAR may be a conventional RAR (i.e., an RAR used in a conventional random access procedure) or an RAR defined specifically for instructing a change/fallback to a conventional random access.
For example, the third information may also be set to indicate that the reason for the change of the random access type is that the number of attempts/transmissions of the two-step random access procedure reaches the configured maximum number. The maximum number is used to determine the change of the random access type, that is, when the number of attempts of the two-step random access procedure (the number of times of sending the preamble using the two-step random access resources) reaches or exceeds the configured maximum number, the UE changes/backs to the mode of using the conventional random access procedure (sending the preamble using the corresponding random access resources).
For example, the third information may also be set to indicate that the reason for the change of the random access type is that the number of conventional random access procedure attempts/transmissions reaches the configured maximum number. The maximum number is used to determine the change of the random access type, that is, when the number of attempts of the conventional random access procedure (the number of times of sending the preamble using the conventional random access resource) reaches or exceeds the configured maximum number, the UE changes/backs to a mode of using two-step random access procedure (sending the preamble using the corresponding random access resource).
When the RACH information is contained in the RACH report or the RLF report, the corresponding random access process refers to the random access process which is completed successfully recently; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
Optionally, if the third information does not exist, the UE considers that no random access type change/backoff occurs in the corresponding random access procedure. That is, the UE includes the third information only when a random access type change/backoff occurs in the random access procedure. In this implementation, the function of the second information in embodiment 2 can be implemented using the third information.
The occurrence of a change in random access type may also be described as a change in the type of random access resource used. Changing from two-step random access to conventional random access as the type of random access procedure may also be described as a PRACH resource or RACH configuration configured from using two-step random access; change/fallback to PRACH resources or RACH configuration configured using conventional random access (as contained in RACH-configCommon or RACH-configdivided information element in NR system, may be contained in RACH-configBFR or candidatebeamsrlist information element in beam failure recovery set, and contained in PRACH-config or RACH-configdivided information element in LTE system, at random access for beam failure recovery).
In embodiments 1 to 3, in addition to the first, second, and third information, the UE further includes one or more of the aforementioned RACH information in the RACH information, such as:
-information indicating the number of random access preambles transmitted by the MAC layer in the corresponding random access procedure. Optionally, in the NR system, the number of times of the random access preamble transmitted by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time, the number of times of the random access preamble transmitted by the MAC layer further includes an SSB index value or a CSI-RS index value corresponding to the transmitted random access preamble. In this case, the RACH information may include a plurality of SSB indices or CSI-RS indices and the number of transmissions of the random access preamble corresponding thereto.
-information indicating that contention is detected or described as unsuccessful contention resolution (contention resolution) for at least one transmitted random access preamble in a corresponding random access procedure. Optionally, the information that the contention is monitored may also be information that distinguishes an SSB or a CSI-RS, that is, the RACH information includes one or more SSB index values and information (contentionDetected) that the contention is monitored corresponding to the SSB index values.
-information indicating whether the carrier used by the random access procedure is UL or SUL.
Preferably, the UE includes the RACH information in a UE information response message.
Optionally, the UE reports the RACH information after receiving an RACH information request from the base station, for example, if the RACH information request (e.g., a RACH-ReportReq information element, or an rlf-ReportReq information element, or a connEstFailReportReq information element) received by the UE is set to "tune", the UE reports the RACH information to the base station according to the set content. Preferably, the RACH information request indication that the base station is configured to request the UE to report is included in the UE information request message.
The present disclosure does not limit the name of a Radio Resource Control (RRC) message containing the request or report.
Example 4
The present embodiment provides yet another RACH information reporting method including two-step random access procedure information.
As shown in fig. 9, when the UE transmits RACH information contained in RACH report/CEF report/RLF report to the base station, parameter setting is differentiated for two-step random access procedure information and conventional random access procedure information. That is, the RACH information in the report is divided into two sets, one set is RACH information for a two-step random access procedure, and the other set is RACH information for a conventional random access procedure. The RACH information contains one or more of the following information:
-information indicating the number of random access preambles transmitted by the MAC layer in the corresponding random access procedure. Optionally, in the NR system, the number of times of the random access preamble transmitted by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time, the number of times of the random access preamble transmitted by the MAC layer further includes an SSB index value or a CSI-RS index value corresponding to the transmitted random access preamble. In this case, the RACH information may include a plurality of SSB indices or CSI-RS indices and the number of transmissions of the random access preamble corresponding thereto.
-information indicating that contention is detected or described as unsuccessful contention resolution (contention resolution) for at least one transmitted random access preamble in a corresponding random access procedure. Optionally, the information that the contention is monitored may also be information that distinguishes an SSB or a CSI-RS, that is, the RACH information includes one or more SSB index values and information (contentionDetected) that the contention is monitored corresponding to the SSB index values.
-information indicating whether the carrier used by the random access procedure is UL or SUL.
That is, the RACH information parameter described above in the present embodiment is distinguished between two-step random access and conventional random access.
Taking the above three parameters as an example, the RACH information in the report is in the following format:
-parameters 1: information (which may be denoted as numberofpreamblesent) indicating the number of times of random access preambles transmitted by the MAC layer in the corresponding two-step random access procedure and its associated SSB or CSI index value. The SSB or CSI index value is applied only in the NR system. In this case, the RACH information may include a plurality of parameters 1 corresponding to a plurality of SSB index or CSI-RS index values.
-parameter 2: information for indicating that contention is detected or that contention resolution (contention resolution) is unsuccessful for at least one transmitted random access preamble in the corresponding two-step random access procedure. The RACH information includes one or more SSB index values and a plurality of parameters 2 corresponding to the monitored contention information (contentiodetected). The SSB or CSI index value is applied only in the NR system.
-parameter 3: information indicating whether a carrier used by the two-step random access procedure is UL or SUL.
-parameter 4: information (which may be denoted as numberofpreamblesent) indicating the number of times the random access preamble is transmitted by the MAC layer in the corresponding conventional random access procedure and its associated SSB or CSI index value. The SSB or CSI index value is applied only in the NR system. In this case, the RACH information may include a plurality of parameters 4 corresponding to a plurality of SSB index or CSI-RS index values.
-parameters 5: information indicating that contention is detected or that contention resolution (contention resolution) is unsuccessful for at least one transmitted random access preamble in a corresponding conventional random access procedure. The RACH information includes one or more SSB index values and a plurality of parameters 5 corresponding to the monitored contention information (contentiodetected). The SSB or CSI index value is applied only in the NR system.
-parameter 6: information indicating whether a carrier used by the legacy random access procedure is UL or SUL.
In the above example, when the random access procedure executed by the UE is a two-step random access procedure (i.e. only the random access resources and the configured random access procedure of the two-step random access procedure are adopted, and no change/backoff of the random access type occurs in the random access procedure), the UE may include the parameters for the two-step random access procedure in the reported RACH information, i.e. only parameters 1, 2, and 3. When the random access procedure executed by the UE is a conventional random access procedure (i.e., only the random access resource and the configured random access procedure of the conventional random access procedure are used, and no random access type change/backoff occurs in the random access procedure), the UE only needs to include the parameters for the conventional random access procedure in the reported RACH information, i.e., only the parameters 4, 5, and 6. Although the contents of the parameters contained in the RACH information for the two-step random access and the conventional random access are the same, the different parameters/code points are adopted, so that the base station can distinguish whether the RACH information is for the two-step random access or the conventional random access when receiving the RACH information. When the random access type change/backoff occurs in the random access procedure executed by the UE, the RACH information reported by the UE includes both the parameters for the two-step random access procedure and the parameters for the conventional random access procedure, i.e., parameters 1, 2, 3, 4, 5, and 6.
When the RACH information is contained in the RACH report or the RLF report, the corresponding random access process refers to the random access process which is completed successfully recently; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
The occurrence of a change in random access type may also be described as a change in the type of random access resource used. Changing from two-step random access to conventional random access as the type of random access procedure may also be described as a PRACH resource or RACH configuration configured from using two-step random access; change/fallback to PRACH resources or RACH configuration configured using conventional random access (as contained in RACH-configCommon or RACH-configdivided information element in NR system, may be contained in RACH-configBFR or candidatebeamsrlist information element in beam failure recovery set, and contained in PRACH-config or RACH-configdivided information element in LTE system, at random access for beam failure recovery).
Example 5
The present embodiment presents an enabling method of RACH information reporting including two-step random access procedure information.
In an implementation method, only when a serving cell of a UE enables a two-step random access procedure or configures a random access resource or other random access configurations corresponding to the two-step random access procedure, the UE includes RACH information related to the two-step random access procedure in any one or more of embodiments 1 to4 in RACH information. The random access resources or parameters corresponding to the two-step random access procedure may be enabled or configured through system information, or may be enabled or configured through dedicated RRC messages (e.g., RRC connection reconfiguration message, RRC connection release message, etc.).
In one implementation, the UE includes the RACH information related to the two-step random access procedure in any one or more of embodiments 1 to4 only when its serving cell enables the two-step random access procedure RACH information reporting. That is, the UE receives an RRC message from the base station, where the RRC message includes an enable indication of reporting of RACH information in a two-step random access procedure, where the enable indication is used to enable the UE to include a function of the RACH information related to the two-step random access procedure in any one or more of embodiments 1 to4 when reporting the RACH information. The RRC message may be system information or a dedicated RRC message (e.g., RRC connection reconfiguration message, RRC connection release message, etc.).
The following is a description of the base station side corresponding to the above-described UE-side embodiment.
Example 6
The embodiment provides a RACH information reporting method including two-step random access procedure information.
The base station receives RACH information contained in RACH report/CEF report/RLF report and sent by UE, and the content of the RACH information comprises:
first information indicating whether a corresponding random access procedure is a two-step random access procedure or a conventional random access procedure. Or as indicating whether the corresponding random access procedure is a two-step random access procedure or a conventional random access procedure. When the RACH information is contained in the RACH report or the RLF report, the corresponding random access process refers to the random access process which is completed successfully recently; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
In one implementation, the value of the field corresponding to the first information is "tune" or "1", which indicates that the corresponding random access procedure is a two-step random access procedure. And if the value of the domain corresponding to the first information is 'FALSE' or '0', the corresponding random access procedure is a conventional random access procedure.
In another implementation, the first information corresponding field is an enumerated type. Namely, the value is set as 2-step RACH, which indicates that the corresponding random access process is a two-step random access process; or set to "4-step RACH", indicates that the corresponding random access procedure is a conventional four-step random access procedure.
Optionally, if the first information does not exist, the base station considers that the corresponding random access procedure is a conventional random access procedure. That is, the base station receives the first information only when the random access procedure is a two-step random access procedure.
The two-step random access process can also be described as using PRACH resources or RACH configuration configured by the two-step random access; the conventional random access procedure may also be described as being configured using the PRACH resource or RACH configuration configured by the conventional random access (e.g., included in the RACH-configCommon or RACH-configDedicated information element in the NR system, may be included in the RACH-configBFR or candidatebeamserst information element in the beam failure recovery configuration when used for random access for beam failure recovery, and may be included in the PRACH-config or RACH-configCommon or RACH-configDedicated information element in the LTE system).
In this embodiment, besides the first information, the RACH information further includes the aforementioned RACH information of the present disclosure, such as:
-information indicating the number of random access preambles transmitted by the MAC layer in the corresponding random access procedure. Optionally, in the NR system, the number of times of the random access preamble transmitted by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time, the number of times of the random access preamble transmitted by the MAC layer further includes an SSB index value or a CSI-RS index value corresponding to the transmitted random access preamble. In this case, the RACH information may include a plurality of SSB indices or CSI-RS indices and the number of transmissions of the random access preamble corresponding thereto.
-information indicating that contention is detected or described as unsuccessful contention resolution (contention resolution) for at least one transmitted random access preamble in a corresponding random access procedure. Optionally, the information that the contention is monitored may also be information that distinguishes an SSB or a CSI-RS, that is, the RACH information includes one or more SSB index values and information (contentionDetected) that the contention is monitored corresponding to the SSB index values.
-information indicating whether the carrier used by the random access procedure is UL or SUL.
Preferably, the base station receives the RACH information through a ue information response message.
Optionally, before the base station receives the RACH information reported by the UE, the base station further sends an RACH information request to the UE. For example, if a RACH information request (e.g., a RACH-ReportReq information element or rlf-ReportReq information element or connEstFailReportReq information element) transmitted by the base station is set to "tune", the base station receives the contents of the RACH information including the above information. Preferably, the RACH information request indication that the base station is configured to request the UE to report is included in the UE information request message.
The present disclosure does not limit the name of a Radio Resource Control (RRC) message containing the request or report.
By the method in this embodiment, the base station may determine whether the RACH information received by the first information is for a two-step random access procedure or a conventional random access procedure, so that RACH parameter adjustment and network performance optimization for distinguishing a type of the random access procedure may be performed more accurately.
Example 7
The present embodiment presents another RACH information reporting method including two-step random access procedure information.
The base station receives RACH information contained in RACH report/CEF report/RLF report and sent by UE, and the content of the RACH information comprises:
and second information for indicating whether a random access type change occurs in a corresponding random access procedure. The random access type refers to two-step random access or conventional random access. Preferably, the random access type change refers to a fallback/change from a two-step random access procedure to a conventional random access procedure. Alternatively, the random access type change may also refer to a fallback/change from a conventional random access procedure to a two-step random access procedure. In the present disclosure, the second information may be referred to as a backoff indicator or a random access type change indicator, which is for convenience of description and is not limited thereto.
When the RACH information is contained in the RACH report or the RLF report, the corresponding random access process refers to the random access process which is completed successfully recently; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
In one implementation, a value of the field corresponding to the second information is "tune" or "1", which indicates that a random access type change/backoff occurs in the corresponding random access procedure. And if the value of the domain corresponding to the second information is "FALSE" or "0", it indicates that no random access type change/backoff has occurred in the corresponding random access procedure.
In another implementation, the second information corresponding field is an enumeration type. That is, the value thereof is set to "fallback" or "RACH type change" or "fallback to4 step" to indicate that a random access type change/backoff has occurred in the corresponding random access procedure.
In yet another implementation, the second information may further indicate a direction in which a type of a random access procedure is changed. The second information may also be used to indicate that the type of random access procedure is changed/backed off from two-step random access to four-step random access, for example, when the value is "2 step 4 step". Likewise, the second information may also be used to indicate a change of the type of the random access procedure from four-step random access to two-step random access, for example, with a value of "4 step 02 step".
Optionally, if the second information does not exist, the base station considers that no random access type change/backoff occurs in the corresponding random access procedure. That is, the base station receives the RACH information including the second information only when a random access type change/backoff has occurred in the random access procedure.
The occurrence of a change in random access type may also be described as a change in the type of random access resource used. Changing from two-step random access to conventional random access as the type of random access procedure may also be described as a PRACH resource or RACH configuration configured from using two-step random access; change/fallback to PRACH resources or RACH configuration configured using conventional random access (as contained in RACH-configCommon or RACH-configdivided information element in NR system, may be contained in RACH-configBFR or candidatebeamsrlist information element in beam failure recovery set, and contained in PRACH-config or RACH-configdivided information element in LTE system, at random access for beam failure recovery).
Preferably, the base station receives the RACH information through a ue information response message.
Optionally, before the base station receives the RACH information reported by the UE, the base station further sends an RACH information request to the UE. For example, if a RACH information request (e.g., a RACH-ReportReq information element or rlf-ReportReq information element or connEstFailReportReq information element) transmitted by the base station is set to "tune", the base station receives the contents of the RACH information including the above information. Preferably, the RACH information request indication that the base station is configured to request the UE to report is included in the UE information request message.
Example 8
The present embodiment presents another RACH information reporting method including two-step random access procedure information.
The base station receives RACH information contained in RACH report/CEF report/RLF report and sent by UE, and the content of the RACH information comprises:
and third information, which is used for indicating the reason of the random access type change or the triggering condition/situation occurring in the corresponding random access process. The random access type refers to two-step random access or conventional random access. Preferably, the random access type change refers to a fallback/change from a two-step random access procedure to a conventional random access procedure. Alternatively, the random access type change may also refer to a fallback/change from a conventional random access procedure to a two-step random access procedure.
For example, according to different triggering conditions of a change of a random access type, the reason why the third information is used for indicating the change of the random access type is because RAR (which can also be described as random access type change/fallback indicated by a network) for indicating that a UE changes/backs to a conventional random access is received. As mentioned above, the RAR may be a conventional RAR (i.e., an RAR used in a conventional random access procedure) or an RAR defined specifically for instructing a change/fallback to a conventional random access.
For example, the third information may also be a cause for indicating that the random access type is changed because the number of two-step random access procedure attempts/transmissions reaches the configured maximum number. The maximum number is used to determine the change of the random access type, that is, when the number of attempts of the two-step random access procedure (the number of times of sending the preamble using the two-step random access resources) reaches or exceeds the configured maximum number, the UE changes/backs to the mode of using the conventional random access procedure (sending the preamble using the corresponding random access resources).
For example, the third information may also be used to indicate that the reason for the change of the random access type is that the number of conventional random access procedure attempts/transmissions reaches the configured maximum number. The maximum number is used to determine the change of the random access type, that is, when the number of attempts of the conventional random access procedure (the number of times of sending the preamble using the conventional random access resource) reaches or exceeds the configured maximum number, the UE changes/backs to a mode of using two-step random access procedure (sending the preamble using the corresponding random access resource).
When the RACH information is contained in the RACH report or the RLF report, the corresponding random access process refers to the random access process which is completed successfully recently; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
Optionally, if the third information does not exist, the base station considers that no random access type change/backoff occurs in the corresponding random access procedure. That is, the base station receives the RACH information including the third information only when a random access type change/backoff has occurred in the random access procedure. In this implementation, the third information can also realize the function of the second information in embodiment 7.
The occurrence of a change in random access type may also be described as a change in the type of random access resource used. Changing from two-step random access to conventional random access as the type of random access procedure may also be described as a PRACH resource or RACH configuration configured from using two-step random access; change/fallback to PRACH resources or RACH configuration configured using conventional random access (as contained in the RACH-configCommon or RACH-configmodified information element in the NR system, in the RACH-configBFR or candidatebeamsrlist information element in the beam failure recovery set, in the RACH-config or RACH-configmodified information element in the LTE system, at random access for beam failure recovery).
Preferably, the base station receives the RACH information through a ue information response message.
Optionally, before the base station receives the RACH information reported by the UE, the base station further sends an RACH information request to the UE. For example, if a RACH information request (e.g., a RACH-ReportReq information element or rlf-ReportReq information element or connEstFailReportReq information element) transmitted by the base station is set to "tune", the base station receives the contents of the RACH information including the above information. Preferably, the RACH information request indication that the base station is configured to request the UE to report is included in the UE information request message.
Example 9
The present embodiment provides yet another RACH information reporting method including two-step random access procedure information.
And the base station receives RACH information which is sent by the UE and contained in the RACH report/CEF report/RLF report, wherein the content of the RACH information is that the two-step random access process information and the traditional random access process information are used for distinguishing parameter receiving. That is, the RACH information in the report is divided into two sets, one set is RACH information for a two-step random access procedure, and the other set is RACH information for a conventional random access procedure. The RACH information contains one or more of the following information:
-information indicating the number of random access preambles transmitted by the MAC layer in the corresponding random access procedure. Optionally, in the NR system, the number of times of the random access preamble transmitted by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time, the number of times of the random access preamble transmitted by the MAC layer further includes an SSB index value or a CSI-RS index value corresponding to the transmitted random access preamble. In this case, the RACH information may include a plurality of SSB indices or CSI-RS indices and the number of transmissions of the random access preamble corresponding thereto.
-information indicating that contention is detected or described as unsuccessful contention resolution (contention resolution) for at least one transmitted random access preamble in a corresponding random access procedure. Optionally, the information that the contention is monitored may also be information that distinguishes an SSB or a CSI-RS, that is, the RACH information includes one or more SSB index values and information (contentionDetected) that the contention is monitored corresponding to the SSB index values.
-information indicating whether the carrier used by the random access procedure is UL or SUL.
That is, the RACH information parameter described above in the present embodiment is distinguished between two-step random access and conventional random access.
Taking the above three parameters as an example, the RACH information in the report is in the following format:
-parameters 1: information (which may be denoted as numberofpreamblesent) indicating the number of times of random access preambles transmitted by the MAC layer in the corresponding two-step random access procedure and its associated SSB or CSI index value. The SSB or CSI index value is applied only in the NR system. In this case, the RACH information may include a plurality of parameters 1 corresponding to a plurality of SSB index or CSI-RS index values.
-parameter 2: information for indicating that contention is detected or that contention resolution (contention resolution) is unsuccessful for at least one transmitted random access preamble in the corresponding two-step random access procedure. The RACH information includes one or more SSB index values and a plurality of parameters 2 corresponding to the monitored contention information (contentiodetected). The SSB or CSI index value is applied only in the NR system.
-parameter 3: information indicating whether a carrier used by the two-step random access procedure is UL or SUL.
-parameter 4: information (which may be denoted as numberofpreamblesent) indicating the number of times the random access preamble is transmitted by the MAC layer in the corresponding conventional random access procedure and its associated SSB or CSI index value. The SSB or CSI index value is applied only in the NR system. In this case, the RACH information may include a plurality of parameters 4 corresponding to a plurality of SSB index or CSI-RS index values.
-parameters 5: information indicating that contention is detected or that contention resolution (contention resolution) is unsuccessful for at least one transmitted random access preamble in a corresponding conventional random access procedure. The RACH information includes one or more SSB index values and a plurality of parameters 5 corresponding to the monitored contention information (contentiodetected). The SSB or CSI index value is applied only in the NR system.
-parameter 6: information indicating whether a carrier used by the legacy random access procedure is UL or SUL.
In the above example, when the random access procedure performed by the UE is a two-step random access procedure (i.e. a random access procedure completed by only adopting random access resources and configuration of the two-step random access procedure, and no change/backoff of random access type occurs in the random access procedure), the RACH information reported by the UE and received by the base station includes the parameters for the two-step random access procedure, i.e. only parameters 1, 2, and 3. When the random access procedure executed by the UE is a conventional random access procedure (i.e., only the random access resource and the configured random access procedure of the conventional random access procedure are used, and no change/backoff of the random access type occurs in the random access procedure), the RACH information reported by the UE and received by the base station includes the parameters of the conventional random access procedure, i.e., only parameters 4, 5, and 6. Although the contents of the parameters contained in the RACH information for the two-step random access and the conventional random access are the same, the different parameters/code points are adopted, so that the base station can distinguish whether the RACH information is for the two-step random access or the conventional random access when receiving the RACH information. When the random access type change/backoff occurs in the random access process performed by the UE, the RACH information reported by the UE and received by the base station includes the parameters for the two-step random access process and the parameters for the conventional random access process, that is, parameters 1, 2, 3, 4, 5, and 6.
Alternatively, for parameters 1 and 4, the MAC layer needs to maintain two parameters: PREAMBLE _ transition _ COUNTER _2STEP and PREAMBLE _ transition _ COUNTER _4 STEP. Parameter 1 corresponds to PREAMBLE _ transition _ COUNTER _2STEP of the MAC layer, and parameter 4 corresponds to PREAMBLE _ transition _ COUNTER _4STEP of the MAC layer. PREAMBLE _ TRANSMISSION _ COUNTER _2STEP is used to indicate the number of times message a is transmitted using two-STEP random access resources in one random access procedure, PREAMBLE _ TRANSMISSION _ COUNTER _4STEP is used to indicate the number of times message 1 is transmitted using conventional random access resources in one random access procedure. If PREAMBLE _ TRANSMISSION _ COUNTER does not reach or is not greater than the configured maximum threshold value PREAMBLE transmax, the MAC layer adds 1 to PREAMBLE _ TRANSMISSION _ COUNTER _2STEP each time message a is sent, and adds 1 to PREAMBLE _ TRANSMISSION _ COUNTER _4STEP each time message 1 (i.e., the PREAMBLE not included in message a) is sent; the MAC layer zeroes these two parameters at the initialization stage or end of a random access procedure. Furthermore, these two parameter designations are for convenience of presentation only and are not limiting.
Preferably, when the RACH information is contained in the RACH report or the RLF report, the corresponding random access procedure refers to a most recently successfully completed random access procedure; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
The occurrence of a change in random access type may also be described as a change in the type of random access resource used. Changing from two-step random access to conventional random access as the type of random access procedure may also be described as a PRACH resource or RACH configuration configured from using two-step random access; change/fallback to PRACH resources or RACH configuration configured using conventional random access (as contained in RACH-configCommon or RACH-configdivided information element in NR system, may be contained in RACH-configBFR or candidatebeamsrlist information element in beam failure recovery set, and contained in PRACH-config or RACH-configdivided information element in LTE system, at random access for beam failure recovery).
Preferably, the base station receives the RACH information through a ue information response message.
Optionally, before the base station receives the RACH information reported by the UE, the base station further sends an RACH information request to the UE. For example, if a RACH information request (e.g., a RACH-ReportReq information element or rlf-ReportReq information element or connEstFailReportReq information element) transmitted by the base station is set to "tune", the base station receives the contents of the RACH information including the above information. Preferably, the RACH information request indication that the base station is configured to request the UE to report is included in the UE information request message.
Example 10
In this embodiment, a random access information reporting method for random access type change between contention-based random access and non-contention-based random access in a random access process is provided.
When the UE transmits RACH information contained in the RACH report/CEF report/RLF report to the base station, the UE sets the contents of the RACH information according to:
and setting fourth information for indicating whether the second random access type change occurs in the corresponding random access process. The random access type in this embodiment refers to CBRA or CFRA. Preferably, the second random access type change refers to a change from CFRA to CBRA. Alternatively, the second random access type change may also refer to a change from CBRA to CFRA. In the present disclosure, the fourth information may be referred to as a second random access type change indication, which is for convenience of description only and is not limited thereto.
When the RACH information is contained in the RACH report or the RLF report, the corresponding random access process refers to the random access process which is completed successfully recently; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
In one implementation, a value of the field corresponding to the fourth information is "tune" or "1", which indicates that the corresponding random access procedure is changed/backed off by the second random access type. And if the value of the domain corresponding to the fourth information is "FALSE" or "0", it indicates that the corresponding random access procedure has not been changed/backed off by the second random access type.
In another implementation, the fourth information corresponding field is an enumeration type. I.e., its value is set to "RACH type change/switch" to indicate that the corresponding random access procedure has a second random access type change/backoff.
Optionally, if the fourth information does not exist, the UE considers that the second random access type change does not occur in the corresponding random access procedure. That is, the UE includes the fourth information only when the random access procedure is changed in the second random access type.
The occurrence of the second random access type change may also be described as a change in the type of random access resource used. Changing the type of the random access procedure from CFRA to CBRA as described above may also be described as changing from PRACH resources configured using CFRA or RACH configuration (as included in the RACH-configdivided information element in the NR system, which may be included in the RACH-configdivided information element in the LTE system) to PRACH resources configured using CBRA or RACH configuration (as included in the RACH-configcommon information element) at the time of random access for beam failure recovery.
Preferably, the UE includes the RACH information in a UE information response message.
Optionally, the UE reports the RACH information after receiving an RACH information request from the base station, for example, if the RACH information request (e.g., a RACH-ReportReq information element, or an rlf-ReportReq information element, or a connEstFailReportReq information element) received by the UE is set to "tune", the UE reports the RACH information to the base station according to the set content. Preferably, the RACH information request indication that the base station is configured to request the UE to report is included in the UE information request message.
Example 11
In this embodiment, another random access information reporting method for random access type change between contention-based random access and non-contention-based random access in a random access process is provided.
The UE transmits RACH information contained in the RACH report/CEF report/RLF report to the base station. The CBRA random access information and the CFRA random access information in the RACH information are received by distinguishing parameters. That is, the RACH information in the report is divided into two sets, one set is RACH information for CBRA random access, and the other set is RACH information for CFRA random access. The RACH information contains one or more of the following information:
-information indicating the number of random access preambles transmitted by the MAC layer in the corresponding random access procedure. Optionally, in the NR system, the number of times of the random access preamble transmitted by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time, the number of times of the random access preamble transmitted by the MAC layer further includes an SSB index value or a CSI-RS index value corresponding to the transmitted random access preamble. In this case, the RACH information may include a plurality of SSB indices or CSI-RS indices and the number of transmissions of the random access preamble corresponding thereto.
-information indicating that contention is detected or described as unsuccessful contention resolution (contention resolution) for at least one transmitted random access preamble in a corresponding random access procedure. Optionally, the information that the contention is monitored may also be information that distinguishes an SSB or a CSI-RS, that is, the RACH information includes one or more SSB index values and information (contentionDetected) that the contention is monitored corresponding to the SSB index values.
-information indicating whether the carrier used by the random access procedure is UL or SUL.
That is, in the present embodiment, the RACH information parameter is used to distinguish between CBRA random access and CFRA random access.
Taking the above three parameters as an example, the RACH information in the report is in the following format:
-parameters 1: information (which may be denoted as numberofpreamblesent) indicating the number of times of random access preambles transmitted by the MAC layer in the corresponding CBRA and its associated SSB or CSI index value. The SSB or CSI index value is applied only in the NR system. In this case, the RACH information may include a plurality of parameters 1 corresponding to a plurality of SSB index or CSI-RS index values.
-parameter 2: information indicating that contention is detected or described as unsuccessful contention resolution (contention resolution) for at least one transmitted random access preamble in the corresponding CBRA. The RACH information includes one or more SSB index values and a plurality of parameters 2 corresponding to the monitored contention information (contentiodetected). The SSB or CSI index value is applied only in the NR system.
-parameter 3: information indicating whether a carrier used by the CBRA is UL or SUL.
-parameter 4: information (which may be denoted as numberofpreamblesent) indicating the number of times of random access preambles transmitted by the MAC layer in the corresponding CFRA and its associated SSB or CSI index value. The SSB or CSI index value is applied only in the NR system. In this case, the RACH information may include a plurality of parameters 4 corresponding to a plurality of SSB index or CSI-RS index values.
-parameters 5: information indicating whether a carrier used by the CFRA is UL or SUL.
In the above example, when the random access procedure executed by the UE is a random access procedure completed only with the CBRA random access resource and configuration, and no change of the random access type occurs in the random access procedure, the RACH information reported by the UE to the base station only includes the parameters for the CBRA, that is, only includes parameters 1, 2, and 3. When the random access procedure executed by the UE is a random access procedure completed only by using the CFRA random access resource and configuration, and no change of the random access type occurs in the random access procedure, the RACH information reported by the UE to the base station only includes the parameters for the CFRA, that is, only includes parameters 4 and 5. When the random access type is changed in the random access process performed by the UE, the RACH information reported by the UE to the base station includes both the parameters for CBRA and the parameters for CFRA, i.e., parameters 1, 2, 3, 4, and 5.
Alternatively, for parameters 1 and 4, the MAC layer needs to maintain two parameters: PREAMBLE _ transition _ COUNTER _ CBRA and PREAMBLE _ transition _ COUNTER _ CFRA. Parameter 1 corresponds to PREAMBLE _ transition _ COUNTER _ CBRA of the MAC layer, and parameter 4 corresponds to PREAMBLE _ transition _ COUNTER _ CFRA of the MAC layer. PREAMBLE _ TRANSMISSION _ COUNTER _ CBRA is used to indicate the number of times message 1 is transmitted using CBRA random access resources in one random access procedure, PREAMBLE _ TRANSMISSION _ COUNTER _ CFRA is used to indicate the number of times message 1 is transmitted using CFRA random access resources in one random access procedure. If the PREAMBLE _ TRANSMISSION _ COUNTER does not reach or is not greater than the configured maximum threshold value PREAMBLE transmax, the MAC layer adds 1 to PREAMBLE _ TRANSMISSION _ COUNTER _ CBRA each time the message 1 is transmitted using CBRA resources, and adds 1 to PREAMBLE _ TRANSMISSION _ COUNTER _ CFRA each time the message 1 is transmitted using CFRA resources; the MAC layer zeroes these two parameters at the initialization stage or end of a random access procedure. Furthermore, these two parameter designations are for convenience of presentation only and are not limiting.
Preferably, when the RACH information is contained in the RACH report or the RLF report, the corresponding random access procedure refers to a most recently successfully completed random access procedure; when the RACH information is contained in a CEF report or an RLF report, the corresponding random access procedure refers to a failed random access procedure, preferably to a most recently failed random access procedure.
The occurrence of a change in random access type may also be described as a change in the type of random access resource used. Changing the type of the random access procedure from CFRA to CBRA as described above may also be described as changing from PRACH resources configured using CFRA or RACH configuration (as included in the RACH-configdivided information element in the NR system, which may be included in the RACH-configdivided information element in the LTE system) to PRACH resources configured using CBRA or RACH configuration (as included in the RACH-configcommon information element) at the time of random access for beam failure recovery.
Preferably, the base station receives the RACH information through a ue information response message.
Optionally, before the UE reports the RACH information to the base station, the UE further receives a RACH information request from the base station. For example, if the RACH information request (e.g., the RACH-ReportReq information element or rlf-ReportReq information element or connEstFailReportReq information element) received by the UE is set to "tune", the UE transmits the contents of the RACH information including the above information to the base station. Preferably, the RACH information request indication for requesting the UE to report is included in the UE information request message.
Note that, each information included in the RACH information in each of the above embodiments may be arbitrarily combined.
Fig. 10 is a block diagram showing a schematic structure of a user equipment UE according to the present disclosure. As shown in fig. 10, the user equipment UE1000 includes a processor 1001 and a memory 1002. The processor 1001 may include, for example, a microprocessor, a microcontroller, an embedded processor, or the like. The memory 1002 may include, for example, volatile memory (e.g., random access memory RAM), a Hard Disk Drive (HDD), non-volatile memory (e.g., flash memory), or other memory, among others. The memory 1002 has stored thereon program instructions. The instructions, when executed by the processor 1001, may perform the above-described methods performed by the user equipment as detailed in the present disclosure.
The program running on the apparatus according to the present disclosure may be a program that causes a computer to realize the functions of the embodiments of the present disclosure by controlling a Central Processing Unit (CPU). The program or information processed by the program may be temporarily stored in a volatile memory (such as a random access memory RAM), a Hard Disk Drive (HDD), a nonvolatile memory (such as a flash memory), or other memory system.
A program for implementing the functions of the embodiments of the present disclosure may be recorded on a computer-readable recording medium. The corresponding functions can be realized by causing a computer system to read the programs recorded on the recording medium and execute the programs. The term "computer system" as used herein may be a computer system embedded in the device and may include an operating system or hardware (e.g., peripheral devices). The "computer-readable recording medium" may be a semiconductor recording medium, an optical recording medium, a magnetic recording medium, a recording medium that stores a program for short-term dynamics, or any other recording medium that is readable by a computer.
Various features or functional blocks of the devices used in the above-described embodiments may be implemented or performed by circuitry (e.g., a single or multiple chip integrated circuits). Circuitry designed to perform the functions described herein may include a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. The circuit may be a digital circuit or an analog circuit. Where new integrated circuit technology has emerged as a replacement for existing integrated circuits due to advances in semiconductor technology, one or more embodiments of the present disclosure may also be implemented using such new integrated circuit technology.
Further, the present disclosure is not limited to the above-described embodiments. While various examples of the embodiments have been described, the present disclosure is not so limited. Fixed or non-mobile electronic devices installed indoors or outdoors may be used as terminal devices or communication devices, such as AV devices, kitchen devices, cleaning devices, air conditioners, office devices, vending machines, and other home appliances.
As above, the embodiments of the present disclosure have been described in detail with reference to the accompanying drawings. However, the specific configuration is not limited to the above embodiment, and the present disclosure also includes any design modification without departing from the gist of the present disclosure. In addition, various modifications can be made to the present disclosure within the scope of the claims, and embodiments obtained by appropriately combining technical means disclosed in different embodiments are also included in the technical scope of the present disclosure. Further, components having the same effects described in the above embodiments may be substituted for each other.

Claims (10)

1. An information reporting method performed by a user equipment, which is a Random Access Channel (RACH) information reporting method including information of a two-step random access procedure, the two-step random access procedure being a random access procedure in which a four-step random access procedure based on contention is enhanced, the method comprising the steps of:
when a user equipment UE transmits RACH information contained in a RACH report, a connection establishment failure CEF report, or a radio link failure RLF report to a base station, the UE sets the contents of the RACH information according to:
first information is set for indicating whether the corresponding random access procedure is a two-step random access procedure or a four-step random access procedure.
2. An information reporting method performed by a user equipment, which is a Random Access Channel (RACH) information reporting method including information of a two-step random access procedure, the two-step random access procedure being a random access procedure in which a four-step random access procedure based on contention is enhanced, the method comprising the steps of:
when a user equipment UE transmits RACH information contained in a RACH report, a connection establishment failure CEF report, or a radio link failure RLF report to a base station, the UE sets the contents of the RACH information according to:
setting second information for indicating whether the first random access type change occurs in the corresponding random access procedure,
wherein the random access type is two-step random access or four-step random access.
3. An information reporting method performed by a user equipment, which is a Random Access Channel (RACH) information reporting method including information of a two-step random access procedure, the two-step random access procedure being a random access procedure in which a four-step random access procedure based on contention is enhanced, the method comprising the steps of:
when a user equipment UE transmits RACH information contained in a RACH report, a connection establishment failure CEF report, or a radio link failure RLF report to a base station, the UE sets the contents of the RACH information according to:
setting third information for indicating a cause or trigger condition of a random access type change occurring in a corresponding random access procedure,
wherein the random access type is two-step random access or four-step random access.
4. The information reporting method performed by a user equipment of claim 3,
according to different triggering conditions of random access type change, the third information is set as:
the reason for indicating the change of the random access type is because a random access response for indicating that the UE changes or backs off to four-step random access is received;
a reason for indicating the random access type change is that the number of two-step random access procedure attempts or transmissions reaches a configured maximum number; or
The reason for indicating the change of the random access type is that the number of attempts or transmissions of the four-step random access procedure reaches the configured maximum number.
5. The information reporting method performed by a user equipment according to any one of claims 1-4,
besides the first, second and third information, the UE further includes one or more of the following information in the RACH information:
information for indicating the number of random access preambles transmitted by a media access control layer in a corresponding random access procedure;
information indicating that contention is detected for at least one transmitted random access preamble in a corresponding random access procedure;
information indicating whether a carrier used by the random access procedure is a normal uplink carrier or a supplementary uplink carrier.
6. An information reporting method performed by a user equipment, which is a Random Access Channel (RACH) information reporting method including information of a two-step random access procedure, the two-step random access procedure being a random access procedure in which a four-step random access procedure based on contention is enhanced, the method comprising the steps of:
when the user equipment UE transmits RACH information contained in a RACH report, a connection setup failure CEF report, or a radio link failure RLF report to the base station, parameter settings are distinguished for the two-step random access procedure information and the four-step random access procedure information.
7. The information reporting method performed by a user equipment of claim 6,
for a two-step random access procedure, one or more of the following information is contained in the RACH information:
information for indicating the number of times of random access preambles transmitted by the media access control layer in the corresponding two-step random access process;
information indicating that contention is detected for at least one transmitted random access preamble in the corresponding two-step random access procedure;
information indicating whether a carrier used by the two-step random access procedure is a normal uplink carrier or a supplementary uplink carrier,
for a four-step random access procedure, one or more of the following information is contained in the RACH information:
information for indicating the number of times of random access preambles transmitted by a media access control layer in the corresponding four-step random access process;
information for indicating that contention is detected for at least one transmitted random access preamble in the corresponding four-step random access procedure;
information for indicating whether a carrier used by the four-step random access procedure is a normal uplink carrier or a supplementary uplink carrier.
8. The information reporting method performed by a user equipment according to any one of claims 1-4, 6-7, wherein,
the two-step random access procedure comprises:
UE sends message A to base station; and
the UE receives a message B from the base station,
the message a contains the random access preamble and the physical uplink shared channel transmission,
the message B contains a random access response or a contention resolution identity.
9. The information reporting method performed by a user equipment according to any one of claims 1-4, 6-7, wherein,
when the RACH information is information contained in the RACH report or the RLF report, the corresponding random access procedure is the most recently successfully completed random access procedure,
when the RACH information is information contained in the CEF report or the RLF report, the corresponding random access procedure is a failed random access procedure.
10. A user equipment, comprising:
a processor; and
a memory having instructions stored thereon,
the instructions, when executed by the processor, cause the user equipment to perform the method of any of claims 1-9.
CN201910514717.0A 2019-06-13 2019-06-13 Information reporting method performed by user equipment and user equipment Pending CN112087765A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910514717.0A CN112087765A (en) 2019-06-13 2019-06-13 Information reporting method performed by user equipment and user equipment
PCT/CN2020/095363 WO2020249007A1 (en) 2019-06-13 2020-06-10 Information report method executed by user equipment, and user equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910514717.0A CN112087765A (en) 2019-06-13 2019-06-13 Information reporting method performed by user equipment and user equipment

Publications (1)

Publication Number Publication Date
CN112087765A true CN112087765A (en) 2020-12-15

Family

ID=73733845

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910514717.0A Pending CN112087765A (en) 2019-06-13 2019-06-13 Information reporting method performed by user equipment and user equipment

Country Status (2)

Country Link
CN (1) CN112087765A (en)
WO (1) WO2020249007A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022206668A1 (en) * 2021-03-30 2022-10-06 夏普株式会社 Random access information reporting method and user equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116233917A (en) * 2021-12-03 2023-06-06 夏普株式会社 Connection establishment failure reporting method and user equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841889A (en) * 2009-03-19 2010-09-22 中兴通讯股份有限公司 Method for acquiring random access information and user facility
US20180035469A1 (en) * 2016-07-28 2018-02-01 Asustek Computer Inc. Method and apparatus for improving random access procedure in a wireless communication system
CN108271275A (en) * 2017-01-04 2018-07-10 电信科学技术研究院 A kind of method and apparatus for competing random access
WO2018204863A1 (en) * 2017-05-04 2018-11-08 Ofinno Technologies, Llc Beam-based measurement configuration

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR112019001471A2 (en) * 2016-09-28 2019-05-07 Sony Corporation wireless transmission / reception unit and data transmission method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841889A (en) * 2009-03-19 2010-09-22 中兴通讯股份有限公司 Method for acquiring random access information and user facility
US20180035469A1 (en) * 2016-07-28 2018-02-01 Asustek Computer Inc. Method and apparatus for improving random access procedure in a wireless communication system
CN108271275A (en) * 2017-01-04 2018-07-10 电信科学技术研究院 A kind of method and apparatus for competing random access
WO2018204863A1 (en) * 2017-05-04 2018-11-08 Ofinno Technologies, Llc Beam-based measurement configuration

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022206668A1 (en) * 2021-03-30 2022-10-06 夏普株式会社 Random access information reporting method and user equipment

Also Published As

Publication number Publication date
WO2020249007A1 (en) 2020-12-17

Similar Documents

Publication Publication Date Title
EP3692744B1 (en) Random access channel resource selection in multi-beam environment
EP3817443B1 (en) Method executed by user equipment, and user equipment
EP3738388B1 (en) Handling communication of a user equipment in a wireless communication network
EP3442296B1 (en) Resource reconfiguration method and base station
US20200373992A1 (en) Contention based random access for beam failure recovery
EP3751949A1 (en) Method and device for performing random access process in unlicensed band
JP2018533242A (en) Cell activation
EP3120636A1 (en) Method, system and device for switching a transmission time interval
WO2015118094A1 (en) Method and apparatus for performing handover and re-establishment of connections
US20210219163A1 (en) Measurement reporting for network maintenance methods and systems
US10813133B2 (en) Methods and apparatus relating to random access in a wireless communications network
US11405952B2 (en) User equipment and base station for improved prioritized random access
US10111252B2 (en) Methods and devices for random access preamble shifting
CN113055931A (en) Random access reporting method performed by user equipment and user equipment
CN112087765A (en) Information reporting method performed by user equipment and user equipment
EP3619961B1 (en) Requesting system information in a wireless communication network
WO2019136631A1 (en) Random access techniques in wireless networks
CN115150878A (en) Random access information reporting method and user equipment
TW202139743A (en) Systems and methods for reporting of information related to requesting or reception of on-demand system information
CN115087129A (en) Random access reporting method and user equipment
US20230328793A1 (en) Beam indication in random access
CN113055906A (en) Random access reporting method performed by user equipment and user equipment
WO2020074636A1 (en) Self-optimization of beam selection
CN116419308A (en) Connection establishment failure reporting method and user equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination