CN112740808A - Message transmission method and device - Google Patents

Message transmission method and device Download PDF

Info

Publication number
CN112740808A
CN112740808A CN201980062146.XA CN201980062146A CN112740808A CN 112740808 A CN112740808 A CN 112740808A CN 201980062146 A CN201980062146 A CN 201980062146A CN 112740808 A CN112740808 A CN 112740808A
Authority
CN
China
Prior art keywords
message
resource
terminal device
network device
random access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201980062146.XA
Other languages
Chinese (zh)
Other versions
CN112740808B (en
Inventor
徐伟杰
唐海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN112740808A publication Critical patent/CN112740808A/en
Application granted granted Critical
Publication of CN112740808B publication Critical patent/CN112740808B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]

Abstract

A method and apparatus for transmitting a message are provided, which can flexibly adjust a time interval between different messages. The method comprises the following steps: the terminal equipment sends the first message according to the TA of the first message; the terminal device sends a second message according to a TA of the second message, wherein the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.

Description

Message transmission method and device Technical Field
The embodiments of the present application relate to the field of communications, and in particular, to a method and an apparatus for message transmission.
Background
In a 5G system, or New Radio (NR) system, data transmission over an unlicensed frequency band (unlicensed spectrum) is supported. In an NR (NR-based access to unlicensed spectrum, NR-U) system, information transmission needs to be performed on the basis of Listen Before Talk (LBT). That is, channel sensing is required before sending a message. The channel is idle and not busy when the sensing result is busy. When the time interval between two consecutive transmitted messages is less than 16us, LBT need not be performed before the second transmission of the message. It can be seen that there is uncertainty in the transmission of messages over the unlicensed frequency band relative to the transmission of messages over the licensed frequency spectrum. Therefore, how to realize more effective message transmission, especially message transmission on unlicensed frequency band, becomes a problem to be solved urgently.
Disclosure of Invention
The application provides a method and equipment for message transmission, which can flexibly adjust the time interval between different messages and realize more effective message transmission.
In a first aspect, a method for transmitting a message is provided, including: the terminal equipment sends the first message according to the TA of the first message; the terminal device sends a second message according to a TA of the second message, wherein the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
In a second aspect, a method for transmitting a message is provided, including: the terminal equipment sends a first message; the terminal device sends a second message, wherein the second message includes data and an occupancy signal preceding the data, and the occupancy signal occupies at least part of the GT of the first message.
In a third aspect, a method for transmitting a message is provided, including: the network equipment receives a first message according to the TA of the first message; the network device receives a second message according to a TA of the second message, where the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
In a fourth aspect, a method for transmitting a message is provided, including: the network equipment receives a first message; the network device receives a second message, wherein the second message includes data and an occupancy signal preceding the data, the occupancy signal occupying at least a portion within the GT of the first message.
In a fifth aspect, a terminal device is provided, where the terminal device may perform the method in the first aspect or any optional implementation manner of the first aspect. In particular, the terminal device may comprise functional modules for performing the method of the first aspect or any possible implementation manner of the first aspect.
A sixth aspect provides a terminal device, which may perform the method of the second aspect or any optional implementation manner of the second aspect. In particular, the terminal device may comprise functional modules for performing the method of the second aspect or any possible implementation manner of the second aspect.
A seventh aspect provides a network device, which may perform the method in the third aspect or any optional implementation manner of the third aspect. In particular, the network device may comprise functional modules for performing the method in the third aspect or any possible implementation manner of the third aspect.
In an eighth aspect, a network device is provided, which may perform the method of the fourth aspect or any optional implementation manner of the fourth aspect. In particular, the network device may comprise functional modules for performing the method of the fourth aspect described above or any possible implementation manner of the fourth aspect.
In a ninth aspect, a terminal device is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and executing the computer program stored in the memory, executing the method in the first aspect or any possible implementation manner of the first aspect, or executing the method in the second aspect or any possible implementation manner of the second aspect.
In a tenth aspect, a network device is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory, executing the method in any possible implementation manner of the third aspect or the third aspect, or executing the method in any possible implementation manner of the fourth aspect or the fourth aspect.
In an eleventh aspect, a chip is provided that includes a processor. The processor is configured to call and run a computer program from the memory, so that the device on which the chip is installed executes a method in the first aspect or any possible implementation manner of the first aspect, or executes a method in the second aspect or any possible implementation manner of the second aspect.
In a twelfth aspect, a chip is provided that includes a processor. The processor is configured to call and run a computer program from the memory, so that the device on which the chip is installed performs the method in the third aspect or any possible implementation manner of the third aspect, or performs the method in the fourth aspect or any possible implementation manner of the fourth aspect.
In a thirteenth aspect, a computer-readable storage medium is provided for storing a computer program for causing a computer to perform the method of the first aspect or any possible implementation manner of the first aspect, or the method of the second aspect or any possible implementation manner of the second aspect.
In a fourteenth aspect, a computer-readable storage medium is provided for storing a computer program that causes a computer to perform the method of the third aspect or any possible implementation manner of the third aspect, or the method of any possible implementation manner of the fourth aspect.
In a fifteenth aspect, a computer program product is provided, comprising computer program instructions to cause a computer to perform the method of the first aspect or any possible implementation of the first aspect, or to perform the method of the second aspect or any possible implementation of the second aspect.
In a sixteenth aspect, there is provided a computer program product comprising computer program instructions for causing a computer to perform the method of the third aspect or any possible implementation of the third aspect, or the method of the fourth aspect or any possible implementation of the fourth aspect.
A seventeenth aspect provides a computer program that, when run on a computer, causes the computer to perform the method of the first aspect or any possible implementation of the first aspect, or the method of the second aspect or any possible implementation of the second aspect.
In an eighteenth aspect, there is provided a computer program which, when run on a computer, causes the computer to perform the method of the third aspect or any possible implementation of the third aspect described above, or the method of the fourth aspect or any possible implementation of the fourth aspect described above.
In a nineteenth aspect, a communication system is provided that includes a terminal device and a network device.
The terminal device is configured to: sending the first message according to the TA of the first message; sending a second message according to the TA of the second message;
the network device is to: receiving a first message according to a TA of the first message; receiving a second message according to a TA of the second message;
the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
In a twentieth aspect, a communication system is provided, comprising a terminal device and a network device.
The terminal device is configured to: sending a first message; transmitting a second message, wherein the second message comprises data and a placeholder signal located before the data;
the network device is to: receiving a first message; receiving a second message, wherein the second message comprises data and a placeholder signal located before the data;
wherein the occupancy signal occupies at least a portion of the guard time GT of the first message.
Based on the above technical solution, in an implementation manner, the message transmission is performed by using different TAs, so that the time interval between two adjacent messages is flexibly adjusted. Especially for message transmission on the unlicensed frequency band, the time interval between two adjacent messages can be reduced by configuring different TA, multiple LBT caused by overlarge time interval is avoided, and transmission delay is reduced.
In another implementation, a placeholder signal is added to a message, so that the time interval between two adjacent messages can be flexibly adjusted. Especially for message transmission on an unauthorized frequency band, the time interval between two adjacent messages can be reduced by increasing the occupied signals, multiple LBT caused by overlarge time interval is avoided, and transmission delay is reduced.
Drawings
Fig. 1 is a schematic diagram of a possible wireless communication system to which an embodiment of the present application is applied.
Fig. 2 is a schematic flow interaction diagram of 4-step random access.
FIG. 3 is a schematic flow interaction diagram of 2-step random access
Fig. 4 is a diagram illustrating a slot structure of a first message of a 2-step random access.
Fig. 5 is a flowchart interaction diagram of a method of message transmission according to an embodiment of the present application.
Fig. 6(a) and 6(b) are schematic diagrams of Msg a transfer based on the method of fig. 5.
Fig. 7 is a flowchart interaction diagram of a method of message transmission according to another embodiment of the present application.
Fig. 8 is a schematic diagram of using cyclic prefix placeholders in an embodiment of the present application.
Fig. 9(a) and 9(b) are schematic diagrams for transmitting Msg a based on the method of fig. 7.
Fig. 10 is a schematic block diagram of a terminal device according to an embodiment of the present application.
Fig. 11 is a schematic block diagram of a terminal device according to an embodiment of the present application.
Fig. 12 is a schematic block diagram of a network device of an embodiment of the present application.
Fig. 13 is a schematic block diagram of a network device of an embodiment of the present application.
Fig. 14 is a schematic configuration diagram of a communication apparatus according to an embodiment of the present application.
Fig. 15 is a schematic structural diagram of a chip of an embodiment of the present application.
Fig. 16 is a schematic block diagram of a communication system of an embodiment of the present application.
Fig. 17 is a schematic block diagram of a communication system of another embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a Long Term Evolution (LTE) System, an LTE Frequency Division Duplex (FDD) System, an LTE Time Division Duplex (TDD) System, an Advanced Long Term Evolution (LTE-a) System, a New Radio (NR) System, an Evolution System of an NR System, an LTE (LTE-based unlicensed spectrum, LTE-U) System over an unlicensed band, an NR (NR-based access to unlicensed spectrum, NR-U) System over an unlicensed band, a Universal Mobile Telecommunications System (UMTS), a Wireless Local Area Network (WLAN), a Wireless Fidelity (WiFi), a New Wireless Fidelity (WiFi) System, a New Radio (NR-5) System, and so on.
Generally, conventional Communication systems support a limited number of connections and are easy to implement, however, with the development of Communication technology, mobile Communication systems will support not only conventional Communication, but also, for example, Device-to-Device (D2D) Communication, Machine-to-Machine (M2M) Communication, Machine Type Communication (MTC), and Vehicle-to-Vehicle (V2V) Communication, and the embodiments of the present application can also be applied to these Communication systems.
Optionally, the communication system in the embodiment of the present application may also be applied to a Carrier Aggregation (CA) scenario, a Dual Connectivity (DC) scenario, an independent (SA) networking scenario, and the like.
Fig. 1 is a schematic diagram of a possible wireless communication system to which an embodiment of the present application is applied. The wireless communication system 100 may include a network device 110. Network device 110 may provide communication coverage for a particular geographic area and may communicate with terminal devices located within that coverage area.
Optionally, the Network device 100 may be a Base Transceiver Station (BTS) in a GSM system or a CDMA system, a Base Station (NodeB, NB) in a WCDMA system, an evolved Node B (eNB or eNodeB) in an LTE system, or a wireless controller in a Cloud Radio Access Network (CRAN), or a Network device in a relay Station, an Access point, a vehicle-mounted device, a wearable device, a future Network side device, or a future evolved Public Land Mobile Network (PLMN), or the like.
The wireless communication system 100 also includes at least one terminal device 120 located within the coverage area of the network device 110.
The terminal device 120 may be mobile or stationary.
Alternatively, terminal device 120 can refer to a user equipment, access terminal, subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or user equipment. The terminal device may also be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with Wireless communication function, a computing device or other processing device connected to a Wireless modem, a vehicle-mounted device, a wearable device, a terminal device in a future 5G Network or a terminal device in a future evolved Public Land Mobile Network (PLMN), and the like, which are not limited in this embodiment. Optionally, a Device to Device (D2D) communication may be performed between the terminal devices 120.
Network device 110 may serve a cell through which terminal device 120 communicates with network device 110 using transmission resources, e.g., frequency domain resources, or spectrum resources, used by the cell. The cell may be a cell corresponding to the network device 110 (e.g., a base station), and the cell may belong to a macro base station or a base station corresponding to a Small cell (Small cell), where the Small cell may include: urban cells (Metro cells), Micro cells (Micro cells), Pico cells (Pico cells), Femto cells (Femto cells), and the like, and the small cells have the characteristics of small coverage area and low transmission power, and are suitable for providing high-rate data transmission services.
Fig. 1 exemplarily shows one network device and two terminal devices, but the present application is not limited thereto. The wireless communication system 100 may include a plurality of network devices and may include other numbers of terminal devices within the coverage area of each network device. The wireless communication system 100 may also include other network entities such as a network controller, a mobility management entity, and so on.
The following briefly describes the random access procedure and the related contents of the unlicensed frequency band.
After the cell search procedure, the terminal device has acquired downlink synchronization with the cell, and therefore the terminal device can receive downlink data. However, the terminal device can perform uplink transmission only if it acquires uplink synchronization with the cell. The terminal device may establish a connection with a cell and acquire uplink synchronization through a Random Access Procedure (RAR). That is, through random access, the terminal device may obtain uplink synchronization and obtain a unique identifier, i.e., a Cell Radio Network Temporary Identity (C-RNTI), allocated to the terminal device by the Network device. Therefore, the random access procedure can be applied not only in the initial access, but also in the case of the uplink synchronization loss of the user. The random access procedure may include a 4-step random access procedure and a 2-step random access procedure. For ease of understanding, the 4-step random access procedure and the 2-step random access procedure will be described below with reference to fig. 2 and 3, respectively.
The 4-step random access procedure and the 2-step random access procedure may be triggered by one of the following 6 types of triggering events:
(1) initial access (initial access).
The terminal device enters an RRC CONNECTED state (RRC _ CONNECTED) from a Radio Resource Control (RRC) IDLE state (RRC _ IDLE state).
(2) Handover (handover).
When the terminal device needs to establish uplink synchronization with a new cell, random access needs to be initiated in the new cell.
(3) RRC Connection reestablishment (RRC Connection Re-establishment).
After Radio Link Failure (RLF) occurs in the terminal device, the Radio connection is reestablished.
(4) In the RRC connected state, when downlink data arrives, the uplink is in an "out-of-sync" state.
At this time, after the downlink data arrives, the terminal device needs to reply an Acknowledgement (ACK) message or a Negative Acknowledgement (NACK) message.
(5) In the RRC connected state, when Uplink data arrives, the Uplink is in an "out-of-sync" state or there is no available Physical Uplink Control Channel (PUCCH) resource for Scheduling Request (SR) transmission.
When uplink data reaches a state that a measurement report needs to be reported or data needs to be sent, if the uplink is in an asynchronous state, the terminal equipment can initiate a random access process; alternatively, if a terminal device already in the uplink synchronization state is allowed to use a Random Access Channel (RACH) instead of the SR, the terminal device may initiate a Random Access procedure when the uplink is in the "out-of-synchronization" state.
(6) In the RRC connected state, the terminal device needs to obtain Timing Advance (TA) for positioning.
In addition, the random access procedure may be triggered due to RRC active state (RRC _ INACTIVE) transition, request of Other System Information (OSI), or beam failure recovery (beam failure recovery).
In the embodiment of the present application, the first message to the fourth message in the 4-step random access process are respectively denoted as Msg 1, Msg 2, Msg3, and Msg4, and the first message and the second message in the 2-step random access process are respectively denoted as Msg a and Msg B.
Fig. 2 is a flow interaction diagram of 4-step random access. As shown in fig. 2, the flow of 4-step random access may include the following four steps:
step 1, the terminal equipment sends Msg 1.
The terminal device sends Msg 1 to the network device to tell the network device that the terminal device initiated a random access request. The Msg 1 carries a Random Access Preamble (RAP), or is called a Preamble, a Random Access Preamble sequence, a Preamble sequence, etc. Meanwhile, the Msg 1 can also be used for the network device to estimate the transmission delay between the network device and the terminal device and calibrate the uplink time according to the estimation delay.
And step 2, the network equipment sends the Msg 2.
After receiving the Msg 1 sent by the terminal device, the network device sends Msg 2, that is, a Random Access Response (RAR) message to the terminal device. The Msg 2 may be scrambled by a Random Access Radio Network Temporary Identity (RA-RNTI). The terminal device may listen to a Physical Downlink Control Channel (PDCCH) within a RAR window (RAR window) to receive the RAR message scrambled with the RA-RNTI, regardless of a measurement gap (measurement gap) that may occur.
And if the terminal equipment does not receive the RAR message replied by the network equipment in the RAR window, the random access is considered to be failed. If the terminal device successfully detects the RAR message in the RAR window and the index of the preamble carried in the RAR message is the same as the index of the preamble in Msg 1, the terminal device may stop detecting the RAR message. The terminal device may descramble the RAR message using the RA-RNTI.
The RAR message may include response messages for a plurality of terminal devices that transmit preambles. The response message for each terminal device includes a Random Access Preamble Identity (RAPID), resource allocation information of Msg3, Time Advance (TA) adjustment information, a Temporary Cell-Radio Network Temporary Identity (TC-RNTI), and the like, which are used by the terminal device.
In the NR standard, the RAR message may be scheduled using a Downlink Control Information (DCI) format (DCI format)1-0, and a PDCCH scheduling the RAR message may be scrambled using the RA-RNTI described above.
And 3, the terminal equipment sends the Msg 3.
After receiving the RAR message, the terminal device determines whether the RAR is an RAR message belonging to the terminal device, for example, the terminal device may perform a check by using a preamble index, and after determining that the RAR message belongs to the RAR message, generate Msg3 on an RRC layer, and send Msg3 to the network device, where the Msg3 needs to carry identification information of the terminal device.
The Msg3 sent by the 4-step random access procedure terminal device in step 3 may include different content for different random access trigger events.
For example, for an initial Access scenario, the Msg3 includes an RRC Connection Request message (RRC Connection Request) generated by an RRC layer, where at least Non-Access Stratum (NAS) identification information of the terminal device is carried. Furthermore, Msg3 may also carry, for example, a Serving-Temporary Mobile Subscriber Identity (S-TMSI) or a random number of the terminal device.
For another example, for an RRC Connection reestablishment scenario, Msg3 includes an RRC Connection reestablishment Request message (RRC Connection Re-establishment Request) generated by the RRC layer and does not carry any NAS message. In addition, the Msg3 may also carry, for example, a Cell Radio Network Temporary Identifier (C-RNTI), Protocol Control Information (PCI), and the like.
For another example, for the Handover scenario, Msg3 includes an RRC Handover Confirm message (RRC Handover Confirm) generated by the RRC layer, which carries the C-RNTI of the terminal device. In addition, the Msg3 may also carry information such as a Buffer Status Report (BSR).
For another example, for other triggering events such as the scene of uplink/downlink data arrival, Msg3 at least needs to include the C-RNTI of the terminal device.
It should be noted that Uplink transmission typically scrambles data carried in an Uplink Shared Channel (UL-SCH) using terminal device specific information such as C-RNTI and the like. However, since the collision is not yet resolved at this time, only TC-RNTI cannot be used when scrambling Msg 3.
And step 4, the network equipment sends the Msg 4.
The network device sends Msg4 to the terminal device, so that the terminal device correctly receives Msg4 and completes Contention Resolution (Contention Resolution). For example, in the RRC connection establishment procedure, the Msg4 may carry an RRC connection establishment message.
Since the terminal device in step 3 can carry its unique identity in Msg3, such as C-RNTI or identification information from the core network (e.g. S-TMSI or a random number), the network device will carry the unique identity of the terminal device in Msg4 in the contention resolution mechanism to designate the terminal device that wins the contention. While other terminal devices that have not won contention resolution will re-initiate random access. The PDCCH for scheduling the Msg4 can be scrambled by adopting TC-RNTI.
In the 5G system, when performing random access, the terminal device may perform random access by using a 2-step random access method in addition to the 4-step random access method described above. One possible way is to send the messages Msg 1 and Msg3 in the 4-step random access procedure as the first message Msg a in the 2-step random access procedure; and the Msg 2 and Msg4 in the 4-step random access process are sent as a second message, namely Msg B, in the 2-step random access process.
Fig. 3 is a flow interaction diagram of 2-step random access. As shown in fig. 3, the flow of 2-step random access may include the following two steps:
step 1, the terminal equipment sends Msg A.
The Msg a may include a preamble and uplink data. The uplink data may be carried on an uplink channel, which may be, for example, a PUSCH. The uplink channel may carry, for example, identification information of the terminal device, a reason for the RRC request, and the like. In other words, Msg a may carry part or all of the Msg 1 and Msg3 information in a 4-step random access process.
And step 2, the network equipment sends the Msg B.
And if the network equipment successfully receives the Msg A sent by the terminal equipment, the Msg B is sent to the terminal equipment. The Msg B may include collision resolution information, C-RNTI assignment information, TA adjustment information, and the like. In other words, Msg B may carry part or all of the Msg 2 and Msg4 information in a 4-step random access process.
In the 2-step random access process, the Msg B carries conflict resolution information (including information related to the identity of the terminal device sent by the terminal device in the Msg a), C-RNTI assignment information, TA adjustment information, and the like for a single terminal device. Furthermore, Msg B may also carry RRC connection setup messages, etc.
It should be understood that fig. 2 or 3 are merely examples. Wherein, the Msg a may include part or all of the information carried in Msg 1 and Msg3, or may also include other information. Msg B may include some or all of the information carried in Msg 2 and Msg4, or may also include other information.
Since the 2-step random access procedure has not entered the standardization phase, it is only described here by way of example with reference to fig. 3, and there are other possibilities for defining the respective random access messages involved therein, without defining the other definitions of the respective random access messages in the 2-step random access procedure. The method described in the embodiment of the application is applicable to all other 2-step random access processes.
In NR systems, data transmission on unlicensed bands (otherwise known as unlicensed spectrum) is supported. Unlicensed frequency bands are nationally and regionally divided spectrum available for communication by radio devices, which is generally considered to be shared spectrum, i.e., a spectrum may be used by devices in different systems as long as the regulatory requirements set by the country or region on the spectrum are met, without requiring a proprietary spectrum license to be applied to the government. In order for various communication systems using unlicensed spectrum for wireless communication to coexist friendly on the spectrum, some countries or regions stipulate regulatory requirements that must be met using unlicensed spectrum.
For example, in europe and the like, equipment follows the principles of LBT. That is, the device needs to perform channel sensing before sending a message on the unlicensed spectrum channel. The channel monitoring can be sent only when the channel monitoring result is that the channel is idle; and when the channel sensing result is that the channel is busy, the channel sensing cannot be transmitted. Thus, there is uncertainty in the transmission of messages over the unlicensed band relative to the transmission of messages over the licensed spectrum.
Fig. 4 is a diagram of a typical timeslot structure of Msg a for 2-step random access. Wherein, Msg a includes a preamble (preamble) and a PUSCH. The preamble occupies consecutive Time domain symbols, which are fixedly followed by a Guard Time (GT). The preamble and its GT occupy several symbols, e.g. as shown in fig. 4, the preamble and its GT occupy 6 symbols.
In 2-step random access, the transmission of the PUSCH and the transmission of the preamble are independent of each other, the PUSCH is transmitted after the preamble and its GT, and there are several symbol offsets between the PUSCH and the GT of the preamble. The PUSCH may occupy a plurality of OFDM symbols using, for example, an Orthogonal Frequency Division Multiplexing (OFDM) scheme. For example, as shown in fig. 4, there is 4 symbol offset between PUSCH and GT of preamble, and PUSCH occupies 3 symbols.
In the NR-U, an unlicensed frequency band needs to be shared by a plurality of devices, even devices of different systems such as a Wireless Fidelity (WiFi) system, by way of channel preemption. Therefore, before sending a message, the device needs to perform LBT, and can send the message after determining that the channel is idle. And, when the time interval between messages transmitted two consecutive times is less than 16us, LBT does not need to be performed until the message is transmitted the second time.
Therefore, in the 2-step random access process, if the time interval between the PUSCH and the preamble exceeds 16us, after the preamble is sent, LBT needs to be performed again to send the PUSCH, so that the delay of 2-step random access in NR-U is increased, and the system reliability is reduced.
In addition, in the 2-step random access procedure, the GT is set in relation to the radius of the supported cell, and the larger the radius of the supported cell is, the larger the GT is. For the case of PUSCH and preamble independent transmission shown in fig. 4, Msg a is the first message of 2-step random access, and at this time, the terminal device has not acquired information such as Timing Advance (TA), so the PUSCH also needs one GT, which is not shown in fig. 4. This requires a portion of the spectrum resources to be occupied.
The embodiment of the application provides a message transmission scheme, which can flexibly adjust the time interval between different messages and realize more effective message transmission. Especially when the scheme is applied to transmission of a preamble and a PUSCH in Msg A, the time delay of 2-step random access can be reduced, and spectrum resources are saved.
Fig. 5 is a schematic flow chart diagram of a method 500 of message transmission according to an embodiment of the present application. The method described in fig. 5 may be performed by a terminal device and a network device. The terminal device may be, for example, terminal device 120 shown in fig. 1, and the network device may be, for example, network device 110 shown in fig. 1. As shown in fig. 5, the method 500 of message transmission may include some or all of the following steps. Wherein:
in 510, the terminal device transmits the first message according to a Timing Advance (TA) of the first message.
In 520, the terminal device transmits the second message according to the TA of the second message.
At 530, the network device receives the first message according to the TA of the first message;
at 540, the network device receives the second message according to the TA of the second message
The first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
In this embodiment, the terminal device may use different TAs to respectively send the first message and the second message, so that the time interval between the first message and the second message in the actual transmission process is flexibly adjusted by the different TAs.
Typically, messages are transmitted with a delay in space. For example, the terminal device is further and further away from the network device, the message sent from the terminal device to the base station will arrive at the network device more and more late. Such a delay may cause interference between messages received by the network device and sent by the terminal device and messages received by the network device and sent by other terminal devices. Therefore, after acquiring the TA configured for the terminal device by the network device, the terminal device sends the message in advance based on the TA, so that the delay can be reduced, and effective transmission of the message is ensured.
In this embodiment, TA may be 0 or greater than zero. For example, if TA of the first message is equal to 0, it indicates that the first message does not need to be sent in advance; when the TA of the first message is greater than 0, the first message is sent in advance based on the TA.
The first message may include a data portion and a Guard Time (GT) following the data portion. The value of GT may be selected from several values specified by the protocol, for example.
Optionally, the second message may occupy at least part of the GT of the first message.
In this case, the first message and the second message may be regarded as a whole, that is, the first message and the second message may be synthesized into one message. Therefore, the GT may not be set in the second message any more, so that the spectral efficiency of the system is improved.
Optionally, the method further comprises: the network equipment sends first indication information, and the first indication information is used for indicating the TA of the first message and/or the TA of the second message. Accordingly, the terminal device receives the first indication information.
For example, the TA of the first message is a preset value, and the first indication information is used to indicate an offset of the TA of the second message with respect to the preset value.
The offset is greater than or equal to 0.
The preset value may be network device configured or pre-configured, such as protocol conventions.
Assume that the TA of the first message is TA 1 and the TA of the second message is TA 2. When TA 1 is 0, the first indication message may be used to indicate TA 2; when TA 1 ≠ 0, the first indication information can be used to indicate the offset of TA 2 with respect to TA 1, i.e. TA 2-TA 1.
Further, optionally, the network device may send a broadcast message including the first indication information. Accordingly, the terminal device receives the broadcast message.
The method can be applied to various communication systems, and can be applied to both an unlicensed frequency band and a licensed frequency band. When the method is applied in the unlicensed frequency band, optionally, a time interval between the second message and the non-GT portion of the first message is smaller than a preset value. The preset value is, for example, a minimum time interval for performing LBT, for example, 16 us.
Since the time interval between two consecutive messages is less than 16us in the unlicensed band, LBT does not need to be performed before the second message is sent. Therefore, the time interval between the second message and the first message can be reduced by configuring the TA of the first message to be different from the TA of the second message, so that the time interval between the two messages is smaller than 16us, thereby avoiding frequent LBT and reducing transmission delay.
Optionally, in 510, the terminal device sends the first message according to the TA of the first message based on the first resource, and accordingly, in 530, the network device receives the first message according to the TA of the first message based on the first resource.
Optionally, in 520, the terminal device sends the second message according to the TA of the second message based on the second resource, and correspondingly, in 540, the network device receives the second message according to the TA of the second message based on the second resource.
The first resource is a configured resource for transmitting the first message, and the second resource is a configured resource for transmitting the second message.
For example, the second resource may be located after the first resource with an unsigned gap. Wherein the first resource includes a resource for transmitting data in the first message and a GT located after the resource, and the second resource is located after the GT without a symbol interval.
The second resource and the first resource may be network device configured or pre-configured, e.g., protocol agreed.
It will be appreciated that the first resource can be considered a resource nominally used for transmission of the first message that satisfies both frame alignment and symbol alignment in the time domain. For example, when the TA of the first message is 0, the terminal device sends the first message on the first resource, and at this time, the resource actually sending the first message is the first resource; when the TA of the first message is not 0, the terminal device may send the first message in advance of the TA value, and at this time, the resource actually sending the first message is in advance of the first resource.
Similarly, the second resource can be considered a resource nominally used for transmission of the second message that satisfies both frame alignment and symbol alignment in the time domain. For example, when the TA of the second message is 0, the terminal device sends the first message on the second resource, and at this time, the resource that actually sends the second message is the second resource; when the TA of the second message is not 0, the terminal device may send the second message in advance of the TA value, and at this time, the resource actually sending the second message is in advance of the second resource.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message. This avoids signal interference generated in different frequency bands.
The first message and the second message are not limited in the embodiments of the present application. For example, the first message may be a preamble in a first message of the 2-step random access, and the second message may be a PUSCH in the first message of the 2-step random access.
The first message and the second message may be collectively referred to as a first message of the 2-step random access procedure, or a message transmitted in a first step of the 2-step random access procedure. For the details of the first message, reference may be made to the description of fig. 3 regarding Msg a.
Next, with reference to fig. 6(a) and 6(b), the method for transmitting a message according to the embodiment of the present application is described in detail by taking the first message as a preamble in the Msg a and the second message as a PUSCH in the Msg a as an example.
Shown in fig. 6(a) are configured preamble resources for transmission of a preamble, and PUSCH resources for transmission of a PUSCH. Wherein, the preamble resource further comprises a GT, and the PUSCH resource is located after the GT without a symbol interval. When the preamble and the PUSCH both use the same TA, assuming that the TA is 0, the terminal apparatus transmits a preamble on the preamble resource and transmits a PUSCH on the PUSCH resource, as shown in fig. 6 (a). Because GT between the PUSCH and the preamble is greater than 16us, when the terminal device performs LBT to obtain the channel usage right and transmits the preamble to the network device, LBT needs to be performed again and the PUSCH needs to be transmitted after the channel usage right is obtained, which brings delay and affects random access of the terminal device.
At this time, as shown in fig. 6(b), different TAs may be configured for the preamble and the PUSCH, assuming that the TA of the preamble is 0, the TA of the PUSCH is t1, the terminal device transmits the preamble on the preamble resource, and transmits the PUSCH in advance of t1 duration, where t1 should satisfy t1 > GT-16us, and t2 is the time interval between the actually transmitted PUSCH and the preamble. Since t1+ t2 is GT, t2 < 16us, i.e. the time interval between PUSCH and preamble is less than 16 us. Therefore, after the terminal device performs LBT to obtain the channel usage right and sends the preamble to the network device, the terminal device can send the PUSCH next without performing LBT again, thereby avoiding extra LBT and improving the efficiency of random access.
In the embodiment of the present application, the TA of the subsequent message, for example, the TA of the PUSCH in fig. 6, may be adjusted in the two adjacent messages; the TA of the preceding message, e.g. the preamble in fig. 6, may also be adjusted. Increasing the TA of the following message and decreasing the TA of the preceding message may both decrease the time interval between the two messages when actually transmitted, and decreasing the TA of the following message and increasing the TA of the preceding message may both increase the time interval between the two messages when actually transmitted.
Therefore, by setting different TAs, the time interval between two adjacent messages can be flexibly adjusted. Especially for message transmission on the unlicensed frequency band, the time interval between two adjacent messages can be reduced by configuring different TA, multiple LBT caused by overlarge time interval is avoided, and transmission delay is reduced.
Fig. 7 is a schematic flow chart diagram of a method 700 of message transmission according to an embodiment of the present application. The method described in fig. 7 may be performed by a terminal device and a network device. The terminal device may be, for example, terminal device 120 shown in fig. 1, and the network device may be, for example, network device 110 shown in fig. 1. As shown in fig. 7, the method 700 of message transmission may include some or all of the following steps. Wherein:
in 710, the terminal device transmits a first message.
At 720, a second message is sent.
At 730, the network device receives a first message;
at 740, the network device receives a second message.
Wherein the second message includes data and a placeholder signal that precedes the data.
In this embodiment, the time interval between the first message and the second message in the actual transmission process is flexibly adjusted by adding the occupancy signal to the second message.
For example, the first message and the second message are two messages transmitted consecutively. When the second message is located after the first message, the placeholder signal may be set before the data portion of the second message, thereby reducing the time interval between the second message and the first message; when the second message precedes the first message, an occupancy signal may be set after the data portion of the second message, thereby reducing the time interval between the second message and the first message.
The first message may include a data portion and a GT following the data portion. The value of GT may be selected from several values specified by the protocol, for example.
Optionally, the occupancy signal occupies at least part of the GT of the first message.
In this case, the first message and the second message may be regarded as a whole, that is, the first message and the second message may be synthesized into one message. Therefore, the GT may not be set in the second message any more, so that the spectral efficiency of the system is improved.
Optionally, the placeholder signal is a Cyclic Prefix (CP) of the second message.
For example, the placeholder signal is a CP of data on the first symbol of the second message.
At this time, optionally, another part of the CP is located within the first symbol.
A CP corresponding to the data may be generated based on the data. In general, the CP is configured by transferring data at the end of an OFDM symbol to the head, and has an effect of canceling inter-symbol interference and inter-channel interference.
For example, the first symbol occupied by the second message shown in fig. 8, when the placeholder signal is not needed for placeholder, sample point 1 at the end of the symbol is moved to the head of the symbol, thereby forming the CP of the data in the symbol, i.e., CP portion 1 shown in fig. 8. To reduce the time interval between the second message and the preceding first message, an occupancy signal may be placed before the symbol. At this time, sample 1 and sample 2 at the end of the symbol may be moved to the front of the data portion in the symbol to form a new CP, which includes not only CP portion 1 but also CP portion 2 located before the first symbol, and CP2 may be used as a placeholder for the second message.
The method can be applied to various communication systems, and can be applied to both an unlicensed frequency band and a licensed frequency band. When the method is applied in the unlicensed frequency band, optionally, a time interval between the second message and the non-GT portion of the first message is smaller than a preset value. The preset value is, for example, a minimum time interval for performing LBT, for example, 16 us.
Since the time interval between two consecutive messages is less than 16us in the unlicensed band, LBT does not need to be performed before the second message is sent. Therefore, the time interval between the second message and the first message can be reduced by setting the occupancy signal in the second message, so that the time interval between the two messages is smaller than 16us, thereby avoiding frequent LBT and reducing transmission delay.
Optionally, in 710, the terminal device sends the first message based on the first resource, and accordingly, in 530, the network device receives the first message based on the first resource.
Optionally, in 720, the terminal device sends the second message based on the second resource, and correspondingly, in 740, the network device receives the second message based on the second resource.
The first resource is a configured resource for transmitting the first message, and the second resource is a configured resource for transmitting the second message.
For example, the second resource may be located after the first resource with an unsigned gap. Wherein the first resource includes a resource for transmitting data in the first message and a GT located after the resource, and the second resource is located after the GT without a symbol interval.
The second resource and the first resource may be network device configured or pre-configured, e.g., protocol agreed.
It will be appreciated that the first resource can be considered a resource nominally for transmission of a first message and the second resource can be considered a resource nominally for transmission of a second message, the first and second resources satisfying frame alignment and symbol alignment in the time domain. For example, when the second message does not include the placeholder signal, the terminal device sends the second message on the second resource, and at this time, the resource actually sending the second message is the second resource; when the second message includes the placeholder signal, the resource actually transmitting the second message includes the second resource and a resource located before the second resource and used for transmitting the placeholder signal.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message. This avoids signal interference generated in different frequency bands.
The first message and the second message are not limited in the embodiments of the present application. For example, the first message may be a preamble in a first message of the 2-step random access, and the second message may be a PUSCH in the first message of the 2-step random access.
The first message and the second message may be collectively referred to as a first message of the 2-step random access procedure, or a message transmitted in a first step of the 2-step random access procedure. For the details of the first message, reference may be made to the description of fig. 3 regarding Msg a.
Next, with reference to fig. 9(a) and 9(b), the method for transmitting a message according to the embodiment of the present application is described in detail by taking the first message as a preamble in Msg a and the second message as a PUSCH in Msg a as an example.
Shown in fig. 9(a) are configured preamble resources for transmission of a preamble, and PUSCH resources for transmission of a PUSCH. Wherein, the preamble resource further comprises a GT, and the PUSCH resource is located after the GT without a symbol interval. Assuming that the TA of the preamble and the PUSCH are both 0, the terminal apparatus transmits the preamble on the preamble resource and transmits the PUSCH on the PUSCH resource as shown in fig. 9 (a). Because GT between the PUSCH and the preamble is greater than 16us, when the terminal device performs LBT to obtain the channel usage right and transmits the preamble to the network device, LBT needs to be performed again and the PUSCH needs to be transmitted after the channel usage right is obtained, which brings delay and affects random access of the terminal device.
At this time, as shown in fig. 9(b), an occupancy signal of length t1 may be configured in the PUSCH. The terminal device sends a preamble on the preamble resource and then sends an occupancy signal and a data portion in the PUSCH, where the occupancy signal starts to be transmitted within the time period t1, which is equivalent to that the occupancy signal preempts the resource with the duration t1 for the PUSCH in advance. t1 should satisfy t1 > GT-16us, t2 is the time interval between the actually transmitted PUSCH and the preamble, and since t1+ t2 ═ GT, t2 < 16us, i.e. the time interval between the PUSCH and the preamble is less than 16 us. Therefore, after the terminal device performs LBT to obtain the channel usage right and sends the preamble to the network device, the terminal device can send the PUSCH next without performing LBT again, thereby avoiding extra LBT and improving the efficiency of random access.
In the embodiment of the present application, in two adjacent messages, an occupancy signal may be configured for a following message, and an occupancy signal may also be configured for a preceding message. The time interval between two messages in actual transmission can be reduced by setting the occupancy signal at the head of the following message and the occupancy signal at the tail of the preceding message.
Therefore, it is used to add an occupancy signal to a message, so as to flexibly adjust the time interval between two adjacent messages. Especially for message transmission on an unauthorized frequency band, the time interval between two adjacent messages can be reduced by increasing the occupied signals, multiple LBT caused by overlarge time interval is avoided, and transmission delay is reduced.
It should be understood that the setting of different TAs, and the setting of the occupancy signal in the message, can be implemented separately or in combination. That is, at least one of the following operations may be performed on the first message and/or the second message: setting the same or different TA; setting an occupancy signal for the second message; an occupancy signal is set for the first message. As long as the time interval between the first message and the second message can be made to satisfy the required condition.
The data in the embodiments of the present application may refer to traffic data and/or control signals. Also, the messages may be replaced with information, signals, data, channels, etc.
In the above, the terminal device sends the message by using the method of the embodiment of the present application is taken as an example for description, but the embodiment of the present application is not limited thereto. The network device may also send the third message and the fourth message using the method of the embodiment of the present application. For example, the network device transmits the third message and the fourth message respectively based on different TAs and/or sets an occupancy signal for one of the messages, so as to flexibly adjust the time interval between the third message and the fourth message in the actual transmission process.
The random access procedure described in the embodiments of the present application includes, but is not limited to, an initial access procedure, and may be a contention-based random access procedure (contention-based RACH) or a non-contention-based random access procedure (contention free RACH).
It should be noted that, without conflict, the embodiments and/or technical features in the embodiments described in the present application may be arbitrarily combined with each other, and the technical solutions obtained after the combination also fall within the protection scope of the present application.
In the embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Having described the method for message transmission according to the embodiment of the present application in detail, an apparatus according to the embodiment of the present application will be described below with reference to fig. 10 to 17, and the technical features described in the method embodiment are applicable to the following apparatus embodiments.
Fig. 10 is a schematic block diagram of a terminal device 1000 according to an embodiment of the present application. As shown in fig. 10, the terminal device 1000 includes a transmitting unit 1010. Optionally, the terminal device further includes a receiving unit 1020. Wherein:
the sending unit 1010 is configured to: sending a first message according to a Timing Advance (TA) of the first message; sending a second message according to the TA of the second message; the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
Therefore, the message transmission is performed by using different TAs, so that the time interval between two adjacent messages can be flexibly adjusted. Especially for message transmission on the unlicensed frequency band, the time interval between two adjacent messages can be reduced by configuring different TA, multiple LBT caused by overlarge time interval is avoided, and transmission delay is reduced.
Optionally, the second message occupies at least part of the guard time GT of the first message.
Optionally, the receiving unit 1020 is configured to: receiving first indication information, where the first indication information is used to indicate a TA of the first message and/or a TA of the second message.
Optionally, the TA of the first message is a preset value, and the first indication information is used to indicate an offset of the TA of the second message with respect to the preset value.
Optionally, the receiving unit 1020 is specifically configured to: and receiving a broadcast message, wherein the broadcast message comprises the first indication information.
Optionally, the terminal device uses an unlicensed frequency band.
Optionally, a time interval between the second message and the non-GT portion of the first message is smaller than a preset value, where the preset value is a minimum time interval for performing LBT.
Optionally, the preset value is 16 microseconds.
Optionally, the sending unit 1010 is specifically configured to:
based on a first resource, sending the first message according to the TA of the first message;
based on second resources, sending the second message according to the TA of the second message;
wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
Optionally, the first message is a preamble in a first message of 2-step random access, and the second message is a PUSCH in the first message of 2-step random access.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message.
It should be understood that the terminal device 1000 may perform corresponding operations performed by the terminal device in the method 500 according to the embodiment of the present application, and details are not described herein for brevity.
Fig. 11 is a schematic block diagram of a terminal device 1100 according to an embodiment of the present application. As shown in fig. 11, the terminal device 1100 includes a transmitting unit 1110 for:
sending a first message;
transmitting a second message, wherein the second message comprises data and an occupancy signal preceding the data, the occupancy signal occupying at least part of the GT of the first message.
Therefore, it is used to add an occupancy signal to a message, so as to flexibly adjust the time interval between two adjacent messages. Especially for message transmission on an unauthorized frequency band, the time interval between two adjacent messages can be reduced by increasing the occupied signals, multiple LBT caused by overlarge time interval is avoided, and transmission delay is reduced.
Optionally, the placeholder signal is a cyclic prefix CP of the data on the first symbol.
Optionally, another part of the CP is located within the first symbol.
Optionally, the terminal device uses an unlicensed frequency band.
Optionally, a time interval between the second message and the non-GT portion of the first message is smaller than a preset value, where the preset value is a minimum time interval for performing LBT.
Optionally, the preset value is 16 microseconds.
Optionally, the sending unit 1110 is specifically configured to: transmitting the first message based on a first resource; transmitting the second message based on a second resource; wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
Optionally, the first message is a preamble in a first message of 2-step random access, and the second message is a PUSCH in the first message of 2-step random access.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message.
Optionally, the timing advance TA of the second message is equal to the TA of the first message.
It should be understood that the terminal device 1100 may perform corresponding operations performed by the terminal device in the method 700 according to the embodiment of the present application, and for brevity, details are not described herein again.
Fig. 12 is a schematic block diagram of a network device 1200 according to an embodiment of the present application. As shown in fig. 12, the network device 1200 includes a receiving unit 1210. Optionally, the network device 1200 further includes a sending unit 1220. Wherein:
the receiving unit 1210 is configured to: receiving a first message according to a Timing Advance (TA) of the first message; receiving a second message according to a TA of the second message; the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
Therefore, the message transmission is performed by using different TAs, so that the time interval between two adjacent messages can be flexibly adjusted. Especially for message transmission on the unlicensed frequency band, the time interval between two adjacent messages can be reduced by configuring different TA, multiple LBT caused by overlarge time interval is avoided, and transmission delay is reduced.
Optionally, the second message occupies at least part of within the GT of the first message.
Optionally, the sending unit 1220 is configured to: and sending first indication information, wherein the first indication information is used for indicating the TA of the first message and/or the TA of the second message.
Optionally, the TA of the first message is a preset value, and the first indication information is used to indicate an offset of the TA of the second message with respect to the preset value.
Optionally, the sending unit 1220 is specifically configured to: and sending a broadcast message, wherein the broadcast message comprises the first indication information.
Optionally, the network device uses an unlicensed frequency band.
Optionally, a time interval between the second message and the non-GT portion of the first message is less than a preset value, the preset value being a minimum time interval for performing listen before talk, LBT.
Optionally, the preset value is 16 microseconds.
Optionally, the receiving unit 1210 is specifically configured to:
receiving the first message according to the TA of the first message based on the first resource;
receiving the second message according to the TA of the second message based on the second resource;
wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
Optionally, the first message is a preamble in a first message of 2-step random access, and the second message is a PUSCH in the first message of 2-step random access.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message.
It should be understood that the network device 1200 may perform corresponding operations performed by the network device in the method 500 according to the embodiment of the present application, and for brevity, the description is not repeated herein.
Fig. 13 is a schematic block diagram of a network device 1300 according to an embodiment of the present application. As shown in fig. 13, the network device 1300 includes a receiving unit 1310 configured to:
receiving a first message;
receiving a second message, wherein the second message comprises data and an occupancy signal preceding the data, the occupancy signal occupying at least part of the GT of the first message.
Therefore, it is used to add an occupancy signal to a message, so as to flexibly adjust the time interval between two adjacent messages. Especially for message transmission on an unauthorized frequency band, the time interval between two adjacent messages can be reduced by increasing the occupied signals, multiple LBT caused by overlarge time interval is avoided, and transmission delay is reduced.
Optionally, the placeholder signal is a cyclic prefix CP of the data on the first symbol.
Optionally, another part of the CP is located within the first symbol.
Optionally, the network device uses an unlicensed frequency band.
Optionally, a time interval between the second message and the non-GT portion of the first message is less than a preset value, the preset value being a minimum time interval for performing listen before talk, LBT.
Optionally, the preset value is 16 microseconds.
Optionally, the receiving unit 1310 is specifically configured to:
receiving the first message based on a first resource;
receiving the second message based on a second resource;
wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
Optionally, the first message is a preamble in a first message of 2-step random access, and the second message is a physical uplink shared channel, PUSCH, in the first message of 2-step random access.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message.
Optionally, the timing advance TA of the second message is equal to the TA of the first message.
It should be understood that the network device 1300 may perform corresponding operations performed by the network device in the method 700 of the embodiment of the present application, and for brevity, detailed descriptions thereof are omitted here.
Fig. 14 is a schematic structural diagram of a communication device 1400 according to an embodiment of the present application. The communication device 1400 shown in fig. 14 includes a processor 1410, and the processor 1410 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 14, the communication device 1400 may further include a memory 1420. From memory 1420, processor 1410 may invoke and execute a computer program to implement the methods of the embodiments of the present application.
The memory 1420 may be a separate device from the processor 1410, or may be integrated into the processor 1410.
Optionally, as shown in fig. 14, the communication device 1400 may further include a transceiver 1430, and the processor 1410 may control the transceiver 1430 to communicate with other devices, and in particular, may transmit information or data to other devices or receive information or data transmitted by other devices.
The transceiver 1430 may include a transmitter and a receiver, among others. The transceiver 1430 may further include antennas, and the number of antennas may be one or more.
Optionally, the communication device 1400 may specifically be a terminal device in the embodiment of the present application, and the communication device 1400 may implement a corresponding process implemented by the terminal device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Optionally, the communication device 1400 may specifically be a network device in this embodiment, and the communication device 1400 may implement a corresponding process implemented by the network device in each method in this embodiment, which is not described herein again for brevity.
Fig. 15 is a schematic structural diagram of a chip of an embodiment of the present application. The chip 1500 shown in fig. 15 includes a processor 1510, and the processor 1510 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 15, the chip 1500 may further include a memory 1520. From the memory 1520, the processor 1510 can call and execute a computer program to implement the method in the embodiment of the present application.
The memory 1520 may be a separate device from the processor 1510 or may be integrated into the processor 1510.
Optionally, the chip 1500 may also include an input interface 1530. The processor 1510 can control the input interface 1530 to communicate with other devices or chips, and in particular, can obtain information or data transmitted by other devices or chips.
Optionally, the chip 1500 may also include an output interface 1540. The processor 1510 may control the output interface 1540 to communicate with other devices or chips, and in particular, may output information or data to the other devices or chips.
Optionally, the chip may be applied to the terminal device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the terminal device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Optionally, the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method in the embodiment of the present application, and for brevity, details are not described here again.
The chip described in the embodiments of the present application may also be referred to as a system-on-chip, or a system-on-chip.
The processor in the embodiments of the present application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The memory in the embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous link SDRAM (SLDRAM), and Direct Rambus RAM (DR RAM).
For example, the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), a synchronous dynamic random access memory (synchronous DRAM, SDRAM), a double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), an enhanced synchronous SDRAM (enhanced SDRAM, ESDRAM), a Synchronous Link DRAM (SLDRAM), a Direct Rambus RAM (DR RAM), and the like. That is, the memory in the embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
Fig. 16 is a schematic block diagram of a communication system 1600 in accordance with an embodiment of the present application. As shown in fig. 16, the communication system 1600 includes a terminal device 1610 and a network device 1620.
Wherein the terminal device 1610 is configured to: sending the first message according to the TA of the first message; sending a second message according to the TA of the second message;
the network device 1620 is configured to: receiving a first message according to a TA of the first message; receiving a second message according to a TA of the second message;
the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
The terminal device 1610 may be configured to implement corresponding functions implemented by the terminal device in the method according to the embodiment of the present application, and the composition of the terminal device 1610 may be as shown in the terminal device 1000 in fig. 10, which is not described herein again for brevity.
The network device 1620 may be configured to implement corresponding functions implemented by the network device in the method according to the embodiment of the present application, and the composition of the network device 1620 may be as shown in the network device 1200 in fig. 12, which is not described herein again for brevity.
Fig. 17 is a schematic block diagram of a communication system 1700 according to an embodiment of the present application. As shown in fig. 17, the communication system 1700 includes a terminal device 1710 and a network device 1720.
Wherein the terminal device 1710 is configured to: sending a first message; transmitting a second message, wherein the second message comprises data and a placeholder signal located before the data;
the network device 1720 is to: receiving a first message; receiving a second message, wherein the second message comprises data and a placeholder signal located before the data;
wherein the occupancy signal occupies at least a portion of the guard time GT of the first message.
The terminal device 1710 may be configured to implement a corresponding function implemented by the terminal device in the method according to the embodiment of the present application, and the composition of the terminal device 1710 may be as shown in the terminal device 1100 in fig. 11, which is not described herein again for brevity.
The network device 1720 may be configured to implement corresponding functions implemented by the network device in the method according to the embodiment of the present application, and the composition of the network device 1720 may be as shown in the network device 1300 in fig. 13, which is not described herein again for brevity.
The embodiment of the application also provides a computer readable storage medium for storing the computer program. Optionally, the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program enables a computer to execute corresponding processes implemented by the network device in the methods in the embodiments of the present application, which are not described again for brevity. Optionally, the computer-readable storage medium may be applied to the terminal device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding process implemented by the terminal device in each method in the embodiment of the present application, which is not described again for brevity.
Embodiments of the present application also provide a computer program product comprising computer program instructions. Optionally, the computer program product may be applied to the network device in the embodiment of the present application, and the computer program instructions enable the computer to execute corresponding processes implemented by the network device in the methods in the embodiment of the present application, which are not described herein again for brevity. Optionally, the computer program product may be applied to the terminal device in the embodiment of the present application, and the computer program instructions enable the computer to execute the corresponding processes implemented by the terminal device in the methods in the embodiment of the present application, which are not described herein again for brevity.
The embodiment of the application also provides a computer program. Optionally, the computer program may be applied to the network device in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute the corresponding process implemented by the network device in each method in the embodiment of the present application, and for brevity, details are not described here again. Optionally, the computer program may be applied to the terminal device in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute the corresponding process implemented by the terminal device in each method in the embodiment of the present application, and for brevity, details are not described here again.
The terms "system" and "network" in embodiments of the present invention are often used interchangeably herein. The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
In the embodiment of the present invention, "B corresponding to (corresponding to) a" means that B is associated with a, from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may be determined from a and/or other information.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the unit is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (96)

  1. A method of message transmission, comprising:
    the terminal equipment sends the first message according to the TA (timing advance) of the first message;
    the terminal device sends a second message according to a TA of the second message, wherein the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
  2. The method of claim 1, wherein the second message occupies at least a portion of a guard time GT of the first message.
  3. The method according to claim 1 or 2, characterized in that the method further comprises:
    the terminal equipment receives first indication information, wherein the first indication information is used for indicating the TA of the first message and/or the TA of the second message.
  4. The method of claim 3, wherein the TA of the first message is a preset value, and wherein the first indication information is used for indicating an offset of the TA of the second message relative to the preset value.
  5. The method according to claim 3 or 4, wherein the terminal device receives the first indication information, and comprises:
    and the terminal equipment receives a broadcast message, wherein the broadcast message comprises the first indication information.
  6. The method according to any of claims 1 to 5, wherein the method is applied to unlicensed frequency bands.
  7. The method according to any of claims 1-6, wherein a time interval between the second message and the non-GT portion of the first message is less than a preset value, the preset value being a minimum time interval to perform listen before talk, LBT.
  8. The method of claim 7, wherein the predetermined value is 16 microseconds.
  9. The method according to any of claims 1 to 8, wherein the terminal device sends the first message according to the TA of the first message, comprising:
    the terminal equipment sends the first message according to the TA of the first message based on the first resource;
    the terminal equipment sends the second message according to the TA of the second message, and the method comprises the following steps:
    the terminal equipment sends the second message according to the TA of the second message based on the second resource;
    wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
  10. The method according to any of claims 1 to 9, wherein the first message is a preamble in a first message of 2-step random access, and the second message is a physical uplink shared channel, PUSCH, in the first message of 2-step random access.
  11. The method according to any of claims 1 to 10, wherein the frequency band occupied by the second message is located within the frequency band occupied by the first message.
  12. A method of message transmission, comprising:
    the terminal equipment sends a first message;
    the terminal device sends a second message, where the second message includes data and an occupancy signal located before the data, and the occupancy signal occupies at least part of the guard time GT of the first message.
  13. The method of claim 12, wherein the placeholder signal is at least part of a Cyclic Prefix (CP) of the data on a first symbol.
  14. The method of claim 13, wherein another portion of the CP is located within the first symbol.
  15. The method according to any of claims 12 to 14, wherein the method is applied to unlicensed frequency bands.
  16. The method according to any of claims 12-15, wherein a time interval between the second message and the non-GT portion of the first message is less than a preset value, the preset value being a minimum time interval for performing listen before talk, LBT.
  17. The method of claim 16, wherein the predetermined value is 16 microseconds.
  18. The method according to any of claims 12 to 17, wherein the terminal device sends the first message, comprising:
    the terminal equipment sends the first message based on the first resource;
    the terminal device sends the second message, including:
    the terminal equipment sends the second message based on a second resource;
    wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
  19. The method according to any of claims 12 to 18, wherein the first message is a preamble in a first message of a 2-step random access, and the second message is a physical uplink shared channel, PUSCH, in the first message of the 2-step random access.
  20. The method according to any of claims 12 to 19, wherein the frequency band occupied by the second message is located within the frequency band occupied by the first message.
  21. The method according to any of claims 12 to 20, wherein the timing advance TA of the second message is equal to the TA of the first message.
  22. A method of message transmission, comprising:
    the network equipment receives a first message according to a Timing Advance (TA) of the first message;
    the network device receives a second message according to a TA of the second message, where the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
  23. The method of claim 22, wherein the second message occupies at least a portion of a guard time GT of the first message.
  24. The method according to claim 22 or 23, further comprising:
    the network equipment sends first indication information, wherein the first indication information is used for indicating the TA of the first message and/or the TA of the second message.
  25. The method of claim 24, wherein the TA of the first message is a preset value, and wherein the first indication information is used for indicating an offset of the TA of the second message with respect to the preset value.
  26. The method according to claim 24 or 25, wherein the network device sends the first indication information to the terminal device, and comprises:
    and the network equipment sends a broadcast message, wherein the broadcast message comprises the first indication information.
  27. The method according to any of claims 22 to 26, wherein the method is applied to unlicensed frequency bands.
  28. The method according to any of claims 22 to 27, wherein a time interval between the second message and the non-GT portion of the first message is less than a preset value, the preset value being a minimum time interval for performing listen before talk, LBT.
  29. The method of claim 28, wherein the predetermined value is 16 microseconds.
  30. The method according to any of claims 22 to 29, wherein the network device receives the first message, comprising:
    the network equipment receives the first message according to the TA of the first message based on the first resource;
    the network device sends the second message according to the TA of the second message, including:
    the network equipment receives the second message according to the TA of the second message based on the second resource;
    wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
  31. The method according to any of claims 22 to 30, wherein the first message is a preamble in a first message of a 2-step random access, and the second message is a physical uplink shared channel, PUSCH, in the first message of the 2-step random access.
  32. The method according to any of claims 22 to 31, wherein the frequency band occupied by the second message is located within the frequency band occupied by the first message.
  33. A method of message transmission, comprising:
    the network equipment receives a first message;
    the network device receives a second message, wherein the second message comprises data and an occupancy signal preceding the data, the occupancy signal occupying at least part of a guard time GT of the first message.
  34. The method of claim 33, wherein the placeholder signal is at least part of a Cyclic Prefix (CP) of the data on a first symbol.
  35. The method of claim 34, wherein another portion of the CP is located within the first symbol.
  36. The method according to any of claims 33-35, wherein the method is applied to unlicensed frequency bands.
  37. The method of any of claims 33 to 36, wherein a time interval between the second message and the non-GT portion of the first message is less than a preset value, the preset value being a minimum time interval for performing listen before talk, LBT.
  38. The method of claim 37, wherein the predetermined value is 16 microseconds.
  39. The method according to any of claims 33 to 38, wherein the network device receives the first message, comprising:
    the network device receiving the first message based on a first resource;
    the network device receiving the second message, including:
    the network device receiving the second message based on a second resource;
    wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
  40. The method according to any of claims 33 to 39, wherein the first message is a preamble in a first message of a 2-step random access, and the second message is a physical uplink shared channel, PUSCH, in the first message of the 2-step random access.
  41. The method according to any of claims 33 to 40, wherein the frequency band occupied by the second message is located within the frequency band occupied by the first message.
  42. The method according to any of claims 33-41, wherein the TA of the second message is equal to the TA of the first message.
  43. A terminal device, comprising:
    a sending unit, configured to send a first message according to a timing advance TA of the first message;
    the terminal device unit is further configured to send a second message according to a TA of the second message, where the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
  44. A terminal device according to claim 43, wherein the second message occupies at least part of the first message within a guard time GT.
  45. The terminal device according to claim 43 or 44, wherein the terminal device further comprises:
    a receiving unit, configured to receive first indication information, where the first indication information is used to indicate a TA of the first message and/or a TA of the second message.
  46. The terminal device of claim 45, wherein the TA of the first message is a preset value, and wherein the first indication information is used to indicate an offset of the TA of the second message with respect to the preset value.
  47. The terminal device according to claim 45 or 46, wherein the receiving unit is specifically configured to:
    and receiving a broadcast message, wherein the broadcast message comprises the first indication information.
  48. A terminal device according to any of claims 43 to 47, wherein the terminal device uses unlicensed frequency bands.
  49. A terminal device according to any of claims 43 to 48, wherein the time interval between the second message and the non-GT portion of the first message is less than a preset value, the preset value being the minimum time interval for performing listen before talk, LBT.
  50. The terminal device of claim 49, wherein the predetermined value is 16 microseconds.
  51. The terminal device according to any one of claims 43 to 50, wherein the sending unit is specifically configured to:
    based on a first resource, sending the first message according to the TA of the first message;
    based on second resources, sending the second message according to the TA of the second message;
    wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
  52. The terminal device according to any of claims 43 to 51, wherein the first message is a preamble in a first message of a 2-step random access, and the second message is a physical uplink shared channel, PUSCH, in the first message of the 2-step random access.
  53. The terminal device of any of claims 43 to 52, wherein the frequency band occupied by the second message is located within the frequency band occupied by the first message.
  54. A terminal device, comprising:
    a transmitting unit configured to transmit a first message;
    the transmitting unit is further configured to transmit a second message, where the second message includes data and a placeholder signal located before the data, and the placeholder signal occupies at least a portion of the guard time GT of the first message.
  55. The terminal device of claim 54, wherein the placeholder signal is at least part of a Cyclic Prefix (CP) of the data on a first symbol.
  56. The terminal device of claim 55, wherein another portion of the CP is located within the first symbol.
  57. The terminal device of any one of claims 54-56, wherein the terminal device uses an unlicensed frequency band.
  58. A terminal device according to any of claims 54 to 57, wherein the time interval between the second message and the non-GT portion of the first message is less than a preset value, the preset value being the minimum time interval for performing listen before talk, LBT.
  59. The terminal device of claim 58, wherein the predetermined value is 16 microseconds.
  60. The terminal device according to any one of claims 54 to 59, wherein the sending unit is specifically configured to:
    transmitting the first message based on a first resource;
    transmitting the second message based on a second resource;
    wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
  61. The terminal device according to any of claims 54 to 60, wherein the first message is a preamble in a first message of a 2-step random access, and the second message is a physical uplink shared channel, PUSCH, in the first message of the 2-step random access.
  62. The terminal device of any one of claims 54 to 61, wherein the frequency band occupied by the second message is located within the frequency band occupied by the first message.
  63. A terminal device according to any of claims 54 to 62, wherein the TA of the second message is equal to the TA of the first message.
  64. A network device, comprising:
    a receiving unit, configured to receive a first message according to a timing advance TA of the first message;
    the receiving unit is further configured to receive a second message according to a TA of the second message, where the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
  65. The network device of claim 64, wherein the second message occupies at least a portion of a guard time GT of the first message.
  66. The network device of claim 64 or 65, wherein the network device further comprises:
    a sending unit, configured to send first indication information, where the first indication information is used to indicate a TA of the first message and/or a TA of the second message.
  67. The network device of claim 66, wherein the TA of the first message is a preset value, and wherein the first indication information is used to indicate an offset of the TA of the second message relative to the preset value.
  68. The network device according to claim 66 or 67, wherein the sending unit is specifically configured to:
    and sending a broadcast message, wherein the broadcast message comprises the first indication information.
  69. The network device of any one of claims 64-68, wherein the network device uses an unlicensed frequency band.
  70. The network device of any one of claims 64 to 69, wherein a time interval between the second message and a non-GT portion of the first message is less than a preset value, the preset value being a minimum time interval for performing listen before talk, LBT.
  71. The network device of claim 70, wherein the predetermined value is 16 microseconds.
  72. The network device according to any one of claims 64 to 71, wherein the receiving unit is specifically configured to:
    receiving the first message according to the TA of the first message based on the first resource;
    receiving the second message according to the TA of the second message based on the second resource;
    wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
  73. The network device according to any of claims 64 to 72, wherein the first message is a preamble in a first message of a 2-step random access, and the second message is a physical uplink shared channel, PUSCH, in the first message of the 2-step random access.
  74. The network device of any of claims 64-73, wherein a frequency band occupied by the second message is located within a frequency band occupied by the first message.
  75. A network device, comprising:
    a receiving unit, configured to receive a first message;
    the receiving unit is further configured to receive a second message, where the second message includes data and an occupancy signal located before the data, and the occupancy signal occupies at least a portion of a guard time GT of the first message.
  76. The network device of claim 75, wherein the placeholder signal is at least part of a Cyclic Prefix (CP) of the data on a first symbol.
  77. The network device of claim 76, wherein another portion of the CP is located within the first symbol.
  78. The network device of claim 75 or 76, wherein the network device uses an unlicensed frequency band.
  79. The network device of any one of claims 75-78, wherein a time interval between the second message and a non-GT portion of the first message is less than a preset value, the preset value being a minimum time interval to perform listen before talk, LBT.
  80. The network device of claim 79, wherein the predetermined value is 16 microseconds.
  81. The network device according to any one of claims 75 to 80, wherein the receiving unit is specifically configured to:
    receiving the first message based on a first resource;
    receiving the second message based on a second resource;
    wherein the first resource is a configured resource for transmitting the first message, the second resource is a configured resource for transmitting the second message, and the second resource is located after the first resource without a symbol interval.
  82. The network device of any one of claims 75 to 81, wherein the first message is a preamble in a first message of a 2-step random access, and the second message is a Physical Uplink Shared Channel (PUSCH) in the first message of the 2-step random access.
  83. The network device of any one of claims 75-82, wherein the frequency band occupied by the second message is within the frequency band occupied by the first message.
  84. The network device of any one of claims 75-83, wherein a timing advance, TA, of the second message is equal to a TA of the first message.
  85. A terminal device, characterized in that the terminal device comprises a processor and a memory for storing a computer program, the processor being configured to invoke and run the computer program stored in the memory to perform the method of any of claims 1 to 11 or to perform the method of any of claims 12 to 21.
  86. A network device comprising a processor and a memory, the memory storing a computer program, the processor being configured to invoke and execute the computer program stored in the memory to perform the method of any of claims 22 to 32 or to perform the method of any of claims 33 to 42.
  87. A chip, characterized in that the chip comprises a processor for calling up and running a computer program from a memory, such that a device in which the chip is installed performs the method of any of claims 1 to 11 or performs the method of any of claims 12 to 21.
  88. A chip, characterized in that the chip comprises a processor for calling up and running a computer program from a memory, causing a device in which the chip is installed to perform the method of any of claims 22 to 32 or to perform the method of any of claims 33 to 42.
  89. A computer-readable storage medium for storing a computer program which causes a computer to perform the method of any one of claims 1 to 11 or to perform the method of any one of claims 12 to 21.
  90. A computer-readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 22 to 32 or to perform the method of any one of claims 33 to 42.
  91. A computer program product comprising computer program instructions to cause a computer to perform the method of any one of claims 1 to 11 or to perform the method of any one of claims 12 to 21.
  92. A computer program product comprising computer program instructions to cause a computer to perform the method of any of claims 22 to 32 or to perform the method of any of claims 33 to 42.
  93. A computer program, characterized in that the computer program causes a computer to perform the method of any of claims 1-11 or to perform the method of any of claims 12-21.
  94. A computer program, characterized in that the computer program causes a computer to perform the method of any of claims 22 to 32 or to perform the method of any of claims 33 to 41.
  95. A communication system comprising a terminal device according to any of claims 43 to 53 and a network device according to any of claims 64 to 74.
  96. A communication system comprising a terminal device according to any of claims 54 to 63 and a network device according to any of claims 75 to 84.
CN201980062146.XA 2019-04-15 2019-04-15 Message transmission method and device Active CN112740808B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/082779 WO2020210963A1 (en) 2019-04-15 2019-04-15 Message transmission method and device

Publications (2)

Publication Number Publication Date
CN112740808A true CN112740808A (en) 2021-04-30
CN112740808B CN112740808B (en) 2023-08-29

Family

ID=72837665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980062146.XA Active CN112740808B (en) 2019-04-15 2019-04-15 Message transmission method and device

Country Status (2)

Country Link
CN (1) CN112740808B (en)
WO (1) WO2020210963A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117676789A (en) * 2022-08-12 2024-03-08 华为技术有限公司 Information transmission method and communication device
CN117119576A (en) * 2023-03-29 2023-11-24 荣耀终端有限公司 Processing method and device for time advance TA

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017215437A1 (en) * 2016-06-12 2017-12-21 电信科学技术研究院 Method and device for use in random access

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101932052B (en) * 2009-06-23 2016-08-24 华为技术有限公司 A kind of changing method, user terminal and network equipment
CN102111257B (en) * 2011-03-04 2015-04-01 中兴通讯股份有限公司 Method and system for adjusting timing advance
RU2732993C1 (en) * 2017-06-23 2020-09-28 ЭлДжи ЭЛЕКТРОНИКС ИНК. Method and device for transmitting and receiving uplink signal in wireless communication system
CN109121222B (en) * 2017-06-23 2021-08-13 华为技术有限公司 Communication method and communication device
CN109429354B (en) * 2017-08-31 2021-05-18 华为技术有限公司 Random access method and terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017215437A1 (en) * 2016-06-12 2017-12-21 电信科学技术研究院 Method and device for use in random access

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
INTEL CORPORATION: ""Channel structure for 2-step RACH"" *
INTEL CORPORATION: "R1-1904280 "Channel structure for 2-step RACH"", 《3GPP TSG_RAN\WG1_RL1》 *
VIVO: "R1-1904059 "Discussion on channel structure for 2-step RACH"", 《3GPP TSG_RAN\WG1_RL1》 *
VIVO: "R1-1904061 "Evaluation for 2-step RACH"", 《3GPP TSG_RAN\WG1_RL1》 *

Also Published As

Publication number Publication date
CN112740808B (en) 2023-08-29
WO2020210963A1 (en) 2020-10-22

Similar Documents

Publication Publication Date Title
CN111837446B (en) Random access method and communication equipment
CN114340014B (en) Random access method and equipment
CN111869306B (en) Random access method, terminal equipment and network equipment
CN113490288B (en) Method, apparatus and computer-readable storage medium for random access
CN113905453A (en) Random access method and equipment
CN112806088B (en) Random access method, terminal equipment and network equipment
CN111972032B (en) Random access method and equipment
CN111989978B (en) Random access method and equipment
CN112740808B (en) Message transmission method and device
CN113678562A (en) Communication method, terminal equipment and network equipment
WO2022067519A1 (en) Random access methods and terminals
CN112997574B (en) Random access method, terminal equipment and network equipment
US20230129426A1 (en) Wireless communication method and terminal device
CN114246013A (en) Wireless communication method and terminal device
CN112997575B (en) Wireless communication method, terminal device and network device
CN113115423B (en) Method and terminal device for controlling power ramp counter
EP4025002A1 (en) Wireless communication method, terminal device, and network device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant