CN112740808B - Message transmission method and device - Google Patents

Message transmission method and device Download PDF

Info

Publication number
CN112740808B
CN112740808B CN201980062146.XA CN201980062146A CN112740808B CN 112740808 B CN112740808 B CN 112740808B CN 201980062146 A CN201980062146 A CN 201980062146A CN 112740808 B CN112740808 B CN 112740808B
Authority
CN
China
Prior art keywords
message
resource
terminal device
network device
indication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201980062146.XA
Other languages
Chinese (zh)
Other versions
CN112740808A (en
Inventor
徐伟杰
唐海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN112740808A publication Critical patent/CN112740808A/en
Application granted granted Critical
Publication of CN112740808B publication Critical patent/CN112740808B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]

Abstract

A method and apparatus for message transmission are provided that enable flexible adjustment of the time interval between different messages. The method comprises the following steps: the terminal equipment sends a first message according to the TA of the first message; the terminal equipment sends a second message according to the TA of the second message, wherein the first message and the second message are two messages which are continuously transmitted, and the TA of the second message is unequal to the TA of the first message.

Description

Message transmission method and device
Technical Field
Embodiments of the present application relate to the field of communications, and more particularly, to a method and apparatus for message transmission.
Background
In a 5G system, or New Radio (NR) system, data transmission over an unlicensed band (unlicensed spectrum) is supported. In an NR (NR-based access to unlicensed spectrum, NR-U) system in an unlicensed band, information transmission based on a listen before talk (Listen Before Talk, LBT) principle is required. That is, channel sensing is required prior to sending the message. The transmission is possible when the interception result is that the channel is idle, and the transmission is impossible when the interception result is that the channel is busy. When the time interval between two consecutively transmitted messages is less than 16us, LBT need not be performed before the second transmission of the message. It can be seen that message transmissions on unlicensed bands have uncertainty relative to message transmissions on licensed spectrum. Therefore, how to achieve more efficient message transmission, especially on unlicensed bands, is a problem to be solved.
Disclosure of Invention
The application provides a method and equipment for transmitting messages, which can flexibly adjust the time intervals among different messages and realize more effective message transmission.
In a first aspect, a method for message transmission is provided, including: the terminal equipment sends a first message according to the TA of the first message; the terminal equipment sends a second message according to the TA of the second message, wherein the first message and the second message are two messages which are continuously transmitted, and the TA of the second message is unequal to the TA of the first message.
In a second aspect, there is provided a method of message transmission, comprising: the terminal equipment sends a first message; the terminal device sends a second message, wherein the second message comprises data and a occupying signal positioned before the data, and the occupying signal occupies at least part of the GT of the first message.
In a third aspect, a method for message transmission is provided, including: the network equipment receives the first message according to the TA of the first message; the network equipment receives a second message according to the TA of the second message, wherein the first message and the second message are two messages which are continuously transmitted, and the TA of the second message is unequal to the TA of the first message.
In a fourth aspect, a method for message transmission is provided, comprising: the network equipment receives a first message; the network device receives a second message, wherein the second message includes data and a placeholder signal located before the data, the placeholder signal occupying at least a portion within a GT of the first message.
In a fifth aspect, a terminal device is provided, which may perform the method of the first aspect or any optional implementation of the first aspect. In particular, the terminal device may comprise functional modules for performing the method of the first aspect or any possible implementation of the first aspect.
In a sixth aspect, a terminal device is provided, which may perform the method of the second aspect or any optional implementation of the second aspect. In particular, the terminal device may comprise functional modules for performing the method of the second aspect described above or any possible implementation of the second aspect.
In a seventh aspect, a network device is provided, which may perform the method of the third aspect or any optional implementation of the third aspect. In particular, the network device may comprise functional modules for performing the method of the third aspect or any possible implementation of the third aspect.
In an eighth aspect, a network device is provided, which may perform the method of the fourth aspect or any optional implementation of the fourth aspect. In particular, the network device may comprise functional modules for performing the method in the fourth aspect or any possible implementation of the fourth aspect.
In a ninth aspect, a terminal device is provided, comprising a processor and a memory. The memory is for storing a computer program, and the processor is for calling and running the computer program stored in the memory, for performing the method of the first aspect or any possible implementation of the first aspect, or for performing the method of the second aspect or any possible implementation of the second aspect.
In a tenth aspect, a network device is provided that includes a processor and a memory. The memory is for storing a computer program, and the processor is for calling and running the computer program stored in the memory, for performing the method of the third aspect or any possible implementation of the third aspect, or for performing the method of the fourth aspect or any possible implementation of the fourth aspect.
In an eleventh aspect, a chip is provided that includes a processor. The processor is configured to call and run a computer program from a memory, such that a device on which the chip is mounted performs the method of the first aspect or any possible implementation of the first aspect, or performs the method of the second aspect or any possible implementation of the second aspect.
In a twelfth aspect, a chip is provided that includes a processor. The processor is configured to call up and run a computer program from a memory, such that a device on which the chip is mounted performs the method of the third aspect or any possible implementation of the third aspect or performs the method of the fourth aspect or any possible implementation of the fourth aspect.
In a thirteenth aspect, a computer-readable storage medium is provided for storing a computer program for causing a computer to perform the method of the first aspect or any possible implementation of the first aspect or to perform the method of the second aspect or any possible implementation of the second aspect.
In a fourteenth aspect, a computer-readable storage medium is provided for storing a computer program for causing a computer to perform the method of the third aspect or any possible implementation of the third aspect or the method of the fourth aspect or any possible implementation of the fourth aspect.
A fifteenth aspect provides a computer program product comprising computer program instructions for causing a computer to perform the method of the first aspect or any possible implementation of the first aspect or to perform the method of the second aspect or any possible implementation of the second aspect.
In a sixteenth aspect, there is provided a computer program product comprising computer program instructions for causing a computer to perform the method of the third aspect or any of the possible implementations of the third aspect or perform the method of the fourth aspect or any of the possible implementations of the fourth aspect.
A seventeenth aspect provides a computer program which, when run on a computer, causes the computer to perform the method of the first aspect or any possible implementation of the first aspect or perform the method of the second aspect or any possible implementation of the second aspect.
An eighteenth aspect provides a computer program which, when run on a computer, causes the computer to perform the method of the third aspect or any possible implementation of the third aspect or perform the method of the fourth aspect or any possible implementation of the fourth aspect.
In a nineteenth aspect, a communication system is provided that includes a terminal device and a network device.
The terminal device is used for: transmitting a first message according to the TA of the first message; transmitting a second message according to the TA of the second message;
the network device is configured to: receiving a first message according to the TA of the first message; receiving a second message according to the TA of the second message;
the first message and the second message are two messages transmitted continuously, and the TA of the second message is unequal to the TA of the first message.
In a twentieth aspect, a communication system is provided that includes a terminal device and a network device.
The terminal device is used for: sending a first message; transmitting a second message, wherein the second message comprises data and a placeholder signal positioned in front of the data;
the network device is configured to: receiving a first message; receiving a second message, wherein the second message comprises data and a placeholder signal positioned before the data;
wherein the occupancy signal occupies at least part of the guard time GT of the first message.
Based on the above technical solution, in one implementation manner, message transmission is performed by using different TAs, so as to flexibly adjust the time interval between two adjacent messages. Especially for message transmission on an unlicensed frequency band, the time interval between two adjacent messages can be reduced by configuring different TAs, so that multiple LBT caused by overlarge time interval is avoided, and the transmission delay is reduced.
In another implementation, the addition of a placeholder signal in a message is used to flexibly adjust the time interval between two adjacent messages. Especially for message transmission on an unlicensed frequency band, the time interval between two adjacent messages can be reduced by increasing the occupied signal, so that multiple LBT caused by overlarge time interval is avoided, and the transmission delay is reduced.
Drawings
Fig. 1 is a schematic diagram of one possible wireless communication system to which embodiments of the present application may be applied.
Fig. 2 is a schematic flow chart of 4-step random access.
Fig. 3 is a schematic flow chart of 2-step random access
Fig. 4 is a schematic diagram of a slot structure of a first message of a 2-step random access.
Fig. 5 is a flow chart of a method of message transmission according to one embodiment of the application.
Fig. 6 (a) and 6 (b) are schematic diagrams of the transmission of Msg a based on the method of fig. 5.
Fig. 7 is a flow chart of a method of message transmission according to another embodiment of the present application.
Fig. 8 is a schematic diagram of an embodiment of the present application using cyclic prefix occupancy.
Fig. 9 (a) and 9 (b) are schematic diagrams of the transmission of Msg a based on the method of fig. 7.
Fig. 10 is a schematic block diagram of a terminal device of an embodiment of the present application.
Fig. 11 is a schematic block diagram of a terminal device of an embodiment of the present application.
Fig. 12 is a schematic block diagram of a network device of an embodiment of the present application.
Fig. 13 is a schematic block diagram of a network device of an embodiment of the present application.
Fig. 14 is a schematic structural diagram of a communication device of an embodiment of the present application.
Fig. 15 is a schematic structural view of a chip of an embodiment of the present application.
Fig. 16 is a schematic block diagram of a communication system of an embodiment of the present application.
Fig. 17 is a schematic block diagram of a communication system of another embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
The technical scheme of the embodiment of the application can be applied to various communication systems, such as: a long term evolution (Long Term Evolution, LTE) system, a LTE frequency division duplex (Frequency Division Duplex, FDD) system, a LTE time division duplex (Time Division Duplex, TDD) system, a long term evolution advanced (Advanced long term evolution, LTE-a) system, a New Radio (NR) system, an evolution system of a NR system, a LTE-based access to unlicensed spectrum, LTE-U system on an unlicensed frequency band, a NR (NR-based access to unlicensed spectrum, NR-U) system on an unlicensed frequency band, a universal mobile telecommunications system (Universal Mobile Telecommunication System, UMTS), a wireless local area network (Wireless Local Area Networks, WLAN), wireless fidelity (Wireless Fidelity, wiFi), a future 5G system (which may also be referred to as a New Radio (NR) system or other communication system, etc.
Generally, the number of connections supported by the conventional communication system is limited and easy to implement, however, as the communication technology advances, the mobile communication system will support not only conventional communication but also, for example, device-to-Device (D2D) communication, machine-to-machine (Machine to Machine, M2M) communication, machine type communication (Machine Type Communication, MTC), inter-vehicle (Vehicle to Vehicle, V2V) communication, and the like, to which the embodiments of the present application can also be applied.
Optionally, the communication system in the embodiment of the present application may also be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, a dual connectivity (Dual Connectivity, DC) scenario, an independent (SA) networking scenario, and the like.
Fig. 1 is a schematic diagram of one possible wireless communication system to which embodiments of the present application may be applied. The wireless communication system 100 may include a network device 110. Network device 110 may provide communication coverage for a particular geographic area and may communicate with terminal devices located within the coverage area.
Alternatively, the network device 100 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, an evolved base station (Evolutional Node B, eNB or eNodeB) in an LTE system, or a radio controller in a cloud radio access network (Cloud Radio Access Network, CRAN), or the network device may be a relay station, an access point, a vehicle device, a wearable device, a future network side device, or a network device in a future evolved public land mobile network (Public Land Mobile Network, PLMN), etc.
The wireless communication system 100 further includes at least one terminal device 120 located within the coverage area of the network device 110.
The terminal device 120 may be mobile or stationary.
Alternatively, the terminal device 120 may refer to a user device, access terminal, subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or user equipment. The terminal device may also be a cellular telephone, a cordless telephone, a session initiation protocol (Session Initiation Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital assistant (Personal Digital Assistant, PDA), a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal device in a future 5G network or a terminal device in a future evolved public land mobile network (Public Land Mobile Network, PLMN), etc., as embodiments of the present application are not limited in this regard. Optionally, a direct terminal (D2D) communication may also be performed between the terminal devices 120.
Network device 110 may serve a cell through which terminal device 120 communicates with network device 110 via transmission resources, e.g., frequency domain resources, or spectrum resources, used by the cell. The cell may be a cell corresponding to the network device 110 (e.g., a base station), where the cell may belong to a macro base station or may belong to a base station corresponding to a Small cell (Small cell), where the Small cell may include: urban cells (Metro cells), micro cells (Micro cells), pico cells (Pico cells), femto cells (Femto cells) and the like, and the small cells have the characteristics of small coverage area and low transmitting power and are suitable for providing high-rate data transmission services.
Fig. 1 exemplarily shows one network device and two terminal devices, but the present application is not limited thereto. The wireless communication system 100 may include multiple network devices and may include other numbers of terminal devices within the coverage area of each network device. The wireless communication system 100 may further include other network entities such as a network controller, a mobility management entity, and the like.
The following will briefly describe the random access procedure and related content of unlicensed bands.
After the cell search procedure, the terminal device has acquired downlink synchronization with the cell, and thus the terminal device can receive downlink data. But the terminal equipment can only perform uplink transmission if uplink synchronization is obtained with the cell. The terminal device can establish a connection with the cell and acquire uplink synchronization through a random access procedure (Random Access Procedure, RAR). That is, through random access, the terminal device can acquire uplink synchronization and acquire a unique identity allocated thereto by the network device, i.e., a cell radio network temporary identity (Cell Radio Network Temporary Identity, C-RNTI). Therefore, the random access procedure can be applied not only in the initial access, but also in the case that the uplink synchronization of the user is lost. The random access procedure may include a 4-step random access procedure and a 2-step random access procedure. For ease of understanding, a 4-step random access procedure and a 2-step random access procedure will be described below with reference to fig. 2 and 3, respectively.
The 4-step random access procedure and the 2-step random access procedure may be generally triggered by one of the following 6 types of trigger events:
(1) Initial access (initial access).
The terminal device enters an RRC CONNECTED state (rrc_connected) from a radio resource control (Radio Resource Control, RRC) IDLE state (rrc_idle state).
(2) Handover (handover).
When the terminal equipment needs to establish uplink synchronization with a new cell, random access needs to be initiated in the new cell.
(3) RRC connection reestablishment (RRC Connection Re-establisment).
After the radio link failure (Radio Link Failure, RLF) occurs at the terminal device, the radio connection is re-established.
(4) In the RRC connected state, when downlink data arrives, the uplink is in an "unsynchronized" state.
At this time, the terminal device needs a reply Acknowledgement (ACK) message or a negative Acknowledgement (Negative Acknowledgement, NACK) message after the downlink data arrives.
(5) In the RRC connected state, when uplink data arrives, the uplink is in an "unsynchronized" state or no physical uplink control channel (Physical Uplink Control Channel, PUCCH) resources are available for scheduling request (Scheduling Request, SR) transmission.
When uplink data arrives, for example, measurement report needs to be reported or data needs to be sent, if the uplink is in an 'unsynchronized' state, the terminal equipment can initiate a random access process; alternatively, if a terminal device that is already in an uplink synchronization state is allowed to use a random access channel (Random Access Channel, RACH) instead of the SR role, the terminal device may initiate a random access procedure while the uplink is in an "unsynchronized" state.
(6) In the RRC connected state, the terminal device needs to obtain a Timing Advance (TA) for positioning.
In addition, the random access procedure may be triggered due to RRC active state (rrc_inactive) transition, request for other system information (Other System Information, OSI), or beam failure recovery (beam failure recovery) etc.
In the embodiment of the application, the first message to the fourth message in the 4-step random access process are respectively marked as Msg 1, msg 2, msg 3 and Msg 4, and the first message and the second message in the 2-step random access process are respectively marked as Msg A and Msg B.
Fig. 2 is a flow chart of a 4-step random access. As shown in fig. 2, the 4-step random access procedure may include the following four steps:
step 1, a terminal device sends Msg 1.
The terminal device sends Msg 1 to the network device to tell the network device that the terminal device initiated the random access request. The Msg 1 carries a random access preamble (Random Access Preamble, RAP), or referred to as a preamble, a random access preamble sequence, a preamble sequence, or the like. Meanwhile, the Msg 1 can also be used for the network equipment to estimate the transmission delay between the network equipment and the terminal equipment and calibrate the uplink time according to the transmission delay.
And step 2, the network equipment transmits Msg 2.
After receiving the Msg 1 sent by the terminal device, the network device sends an Msg 2, i.e. a random access response (Random Access Response, RAR) message to the terminal device. The Msg 2 may be scrambled by a random access radio network temporary identity (Random Access Radio Network Temporary Identity, RA-RNTI). The terminal device may listen to the physical downlink control channel (Physical Downlink Control Channel, PDCCH) within a RAR window (RAR window) to receive the RAR message scrambled with the RA-RNTI, without regard to a measurement gap (measurement gap) that may occur.
If the terminal device does not receive the RAR message replied by the network device in the RAR window, the random access is considered to be failed. If the terminal device successfully detects the RAR message in the RAR window and the index of the preamble carried in the RAR message is the same as the index of the preamble in Msg 1, the terminal device may stop detecting the RAR message. The terminal device may descramble the RAR message using the RA-RNTI.
Wherein, the RAR message may include response messages for a plurality of terminal devices transmitting the preamble. The response message for each terminal device includes a random access preamble index (Random Access Preamble Identify, RAPID) adopted by the terminal device, resource allocation information of Msg 3, time Advance (TA) adjustment information, and Temporary Cell radio network Temporary identifier (TC-RNTI) and the like.
In the NR standard, the RAR message may be scheduled using a downlink control information (Download Control Information, DCI) format (DCI format) 1-0, and the PDCCH for scheduling the RAR message may be scrambled using the RA-RNTI described above.
And 3, the terminal equipment sends Msg 3.
After receiving the RAR message, the terminal device determines whether the RAR is an RAR message belonging to itself, for example, the terminal device may check by using the preamble index, and after determining that the RAR message is an RAR message belonging to itself, generates Msg 3 in the RRC layer, and sends the Msg 3 to the network device, where the terminal device needs to be carried with identification information of the terminal device.
The Msg 3 transmitted by the 4-step random access procedure terminal device in step 3 may comprise different contents for different random access trigger events.
For example, for the initial Access scenario, msg 3 includes an RRC connection request message (RRC Connection Request) generated by the RRC layer, where at least Non-Access Stratum (NAS) identification information of the terminal device is carried. In addition, the Msg 3 may also carry, for example, a Serving temporary mobile subscriber identity (Serving-Temporary Mobile Subscriber Identity, S-TMSI) or a random number of the terminal device, etc.
For another example, for the RRC connection reestablishment scenario, msg 3 includes an RRC connection reestablishment request message (RRC Connection Re-establishment Request) generated by the RRC layer and does not carry any NAS messages. In addition, msg 3 may also carry, for example, cell radio network temporary identity (Cell Radio Network Temporary Identifier, C-RNTI) and protocol control information (Protocol Control Information, PCI), etc.
For another example, for a handover scenario, msg 3 includes an RRC layer generated RRC handover confirm message (RRC Handover Confirm) that carries the C-RNTI of the terminal device. In addition, msg 3 may also carry information such as buffer status reports (Buffer Status Report, BSR).
For another example, for other trigger events such as the scenario of up/down data arrival, msg 3 needs to include at least the C-RNTI of the terminal device.
It should be noted that the uplink transmissions typically use terminal device specific information, e.g., C-RNTI, etc., to scramble the data carried in the uplink shared channel (Uplink Shared Channel, UL-SCH). But the collision is not resolved at this time, so scrambling Msg 3 cannot be based on the C-RNTI, but only the TC-RNTI can be used.
And step 4, the network equipment transmits Msg 4.
The network device sends the Msg 4 to the terminal device so that the terminal device receives the Msg 4 correctly and completes the contention resolution (Contention Resolution). For example, during RRC connection establishment, an RRC connection establishment message may be carried in Msg 4.
Since the terminal device in step 3 may carry its unique identifier, for example, the C-RNTI or identifier information from the core network (such as S-TMSI or a random number), in the Msg 3, the network device will carry the unique identifier of the terminal device in the Msg 4 in the contention resolution mechanism to designate the terminal device that wins the contention. While other terminal devices that are not winning in contention resolution will re-initiate random access. The PDCCH used to schedule Msg 4 may be scrambled with a TC-RNTI.
In the 5G system, when the terminal device performs random access, the above 4-step random access method may be used for random access, and a 2-step random access method may also be used. One possible way is to send messages Msg 1 and Msg 3 in a 4-step random access procedure as the first message in a 2-step random access procedure, msg a; msg 2 and Msg4 in the 4-step random access procedure are sent as the second message in the 2-step random access procedure, msg B.
Fig. 3 is a flow chart of 2-step random access. As shown in fig. 3, the 2-step random access procedure may include the following two steps:
step 1, a terminal device sends Msg A.
The Msg a may include a preamble and uplink data. The uplink data may be carried on an uplink channel, which may be, for example, PUSCH. The uplink channel may carry, for example, identification information of the terminal device, a cause of the RRC request, and the like. In other words, part or all of the information in Msg 1 and Msg 3 in the 4-step random access procedure may be carried in Msg a.
And step 2, the network equipment transmits the Msg B.
If the network equipment successfully receives the Msg A sent by the terminal equipment, the network equipment sends the Msg B to the terminal equipment. The Msg B may include, for example, collision resolution information, C-RNTI assignment information, TA adjustment information, and the like. In other words, part or all of the information in Msg 2 and Msg4 in the 4-step random access procedure may be carried in Msg B.
In the 2-step random access procedure, the Msg B carries conflict resolution information (including information related to the identity of the terminal device sent by the terminal device in the Msg a), C-RNTI allocation information, TA adjustment information, and the like for a single terminal device. In addition, msg B may also carry RRC connection setup message, etc.
It should be understood that fig. 2 or 3 are merely examples. Wherein, msg a may include some or all of the information carried in Msg 1 and Msg 3, or may also include other information. Msg B may include some or all of the information carried in Msg 2 and Msg 4, or possibly other information as well.
Since the 2-step random access procedure has not entered the standardization phase, the description is given here by way of example only in fig. 3, and there are other possibilities for defining the individual random access messages involved therein, without restricting the other definition of the individual random access messages in the 2-step random access procedure. The method provided by the embodiment of the application is suitable for all other 2-step random access processes.
In NR systems, data transmission over unlicensed frequency bands (or referred to as unlicensed spectrum) is supported. Unlicensed bands are nationally and regionally divided spectrum available for radio communications, which is generally considered to be a shared spectrum, i.e., devices in different systems can use the spectrum as long as they meet regulatory requirements set by the country or region on the spectrum, without requiring a proprietary spectrum grant to be applied to the government. In order for individual communication systems using unlicensed spectrum for wireless communication to co-exist friendly over the spectrum, some countries or regions have stipulated regulatory requirements that must be met using unlicensed spectrum.
For example, in europe and the like, the device follows the principle of LBT. That is, the device needs to perform channel listening before sending a message on the unlicensed spectrum channel. When the channel interception result is that the channel is idle, the channel interception result can be sent; and when the channel interception result is that the channel is busy, the channel cannot be transmitted. Thus, message transmissions on unlicensed bands have uncertainty relative to message transmissions on licensed spectrum.
Fig. 4 is a schematic diagram of a typical slot structure of a 2-step random access Msg a. The Msg a includes two parts, namely a preamble (preamble) and PUSCH. The preamble occupies consecutive Time domain symbols, which is fixedly followed by a Guard Time (GT). The preamble and its GT occupy several symbols, e.g. 6 symbols as shown in fig. 4.
In 2-step random access, PUSCH transmission and preamble transmission are independent, PUSCH is transmitted after the preamble and its GT, and there are several symbol offsets between PUSCH and GT of the preamble. The PUSCH may occupy a plurality of OFDM symbols by using an orthogonal frequency division multiple access multiplexing (Orthogonal Frequency Division Multiplexing, OFDM) scheme, for example. For example, as shown in fig. 4, there are 4 symbol offsets between PUSCH and GT of the preamble, and PUSCH occupies 3 symbols.
In NR-U, unlicensed frequency bands are shared by channel preemption between multiple devices, even with devices of different systems such as wireless fidelity (Wireless Fidelity, wiFi) systems. Therefore, the device needs to perform LBT before sending the message, and determines that the channel is idle before sending. And, when the time interval between two consecutively transmitted messages is less than 16us, LBT need not be performed before the second transmission of the message.
Therefore, in the 2-step random access process, if the time interval between the PUSCH and the preamble exceeds 16us, after the preamble is sent, LBT is needed to be carried out again to send the PUSCH, so that the time delay of the 2-step random access in the NR-U is increased, and the reliability of the system is reduced.
In addition, in the 2-step random access procedure, the setting of GT is related to the radius of the supported cell, and the larger the supported cell radius is, the larger the GT is. For the case of PUSCH and preamble independent transmission shown in fig. 4, msg a is the first message of 2-step random access, and the terminal device has not yet acquired information such as Timing Advance (TA), so PUSCH also requires a GT, which is not shown in fig. 4. This requires a portion of the spectrum resources to be occupied.
The embodiment of the application provides a message transmission scheme, which can flexibly adjust the time intervals among different messages and realize more effective message transmission. Especially when the scheme is applied to the transmission of the preamble and the PUSCH in the Msg A, the time delay of 2 steps of random access can be reduced, and the frequency spectrum resource can be saved.
Fig. 5 is a schematic flow chart diagram of a method 500 of message transmission of an embodiment of the present application. The method described in fig. 5 may be performed by a terminal device and a network device. The terminal device may be, for example, the terminal device 120 shown in fig. 1, and the network device may be, for example, the network device 110 shown in fig. 1. As shown in fig. 5, the method 500 of message transmission may include some or all of the following steps. Wherein:
in 510, the terminal device sends the first message according to a Timing Advance (TA) of the first message.
In 520, the terminal device sends the second message according to the TA of the second message.
In 530, the network device receives the first message according to the TA of the first message;
in 540, the network device receives the second message according to the TA of the second message
Wherein the first message and the second message are two messages transmitted continuously, and the TA of the second message is not equal to the TA of the first message.
In this embodiment, the terminal device may use different TAs to send the first message and the second message respectively, so that the time interval between the first message and the second message in the actual transmission process is flexibly adjusted by using the different TAs.
Typically, the transmission of messages in space is delayed. For example, if the terminal device is farther from the network device, the message sent from the terminal device to the base station will arrive farther and farther from the network device. Such delays may cause interference between messages received by the network device and sent by the terminal device and messages received by other terminal devices received by the network device. Therefore, after the terminal equipment acquires the TA configured by the network equipment, the message is sent in advance based on the TA, so that the delay can be reduced, and the effective transmission of the message is ensured.
In the embodiment of the present application, TA may be 0 or greater than zero. For example, if TA of the first message is equal to 0, it indicates that the first message does not need to be sent in advance; when the TA of the first message is greater than 0, the first message is sent in advance based on the TA.
The first message may include a data portion and a Guard Time (GT) following the data portion. The value of GT may for example be selected from a number of values specified by the protocol.
Alternatively, the second message may occupy at least part of the GT of the first message.
In this case, the first message and the second message may be regarded as a whole, that is, the first message and the second message may be combined into one message. Therefore, the GT may not be set in the second message, so that the spectral efficiency of the system is improved.
Optionally, the method further comprises: the network device sends first indication information, wherein the first indication information is used for indicating the TA of the first message and/or the TA of the second message. Correspondingly, the terminal equipment receives the first indication information.
For example, the TA of the first message is a preset value, and the first indication information is used to indicate an offset of the TA of the second message relative to the preset value.
The offset is greater than or equal to 0.
The preset value may be configured by the network device or may be pre-configured, e.g., protocol-agreed.
Assume that TA of the first message is TA 1 and TA of the second message is TA 2. When TA 1 = 0, the first indication message may be used to indicate TA 2; when TA 1 is not equal to 0, the first indication information can be used to indicate the offset of TA 2 relative to TA 1, namely TA 2-TA 1.
Further, optionally, the network device may send a broadcast message, where the broadcast message includes the first indication information. Accordingly, the terminal device receives the broadcast message.
The method can be applied to various communication systems, and can be applied to both unlicensed frequency bands and licensed frequency bands. When the method is applied in an unlicensed band, optionally, the time interval between the second message and the non-GT portion of the first message is less than a preset value. Wherein the preset value is, for example, a minimum time interval for performing LBT, for example, 16us.
Since the time interval between two consecutive transmitted messages is less than 16us in the unlicensed band, LBT need not be performed before the second transmission of the message. Therefore, the time interval between the second message and the first message can be reduced by configuring that the TA of the first message is different from the TA of the second message, so that the time interval between the two messages is less than 16us, thereby avoiding frequent LBT and reducing transmission delay.
Optionally, in 510, the terminal device sends the first message according to the TA of the first message based on the first resource, and correspondingly, in 530, the network device receives the first message according to the TA of the first message based on the first resource.
Optionally, in 520, the terminal device sends the second message according to the TA of the second message based on the second resource, and correspondingly, in 540, the network device receives the second message according to the TA of the second message based on the second resource.
Wherein the first resource is a configured resource for transmitting the first message and the second resource is a configured resource for transmitting the second message.
For example, the second resource may be located after the first resource without a symbol interval. Wherein the first resource includes a resource for transmitting data in the first message, and a GT located after the resource, and the second resource is located after the GT without symbol interval.
The second resource and the first resource may be configured by the network device or may be pre-configured, e.g., protocol-agreed.
It is to be appreciated that the first resource can be considered a resource nominally used for transmitting the first message that satisfies the frame alignment and the symbol alignment in the time domain. For example, when TA of the first message is 0, the terminal device sends the first message on the first resource, and at this time, the resource actually sending the first message is the first resource; when the TA of the first message is not 0, the terminal device may send the first message in advance of the TA value, where the resources actually sending the first message are advanced with respect to the first resources.
Similarly, the second resource may be considered a resource nominally used for transmitting the second message, which satisfies the frame alignment and the symbol alignment in the time domain. For example, when TA of the second message is 0, the terminal device sends the first message on the second resource, and at this time, the resource actually sending the second message is the second resource; when the TA of the second message is not 0, the terminal device may send the second message in advance of the TA value, where the resources actually sending the second message are advanced with respect to the second resources.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message. This can avoid signal interference generated on different frequency bands.
The embodiment of the application does not limit the first message and the second message. For example, the first message may be a preamble in a first message of 2-step random access, and the second message may be a PUSCH in the first message of 2-step random access.
The first message and the second message together may be referred to as a first message of a 2-step random access procedure or a message sent in a first step of a 2-step random access procedure. For specific details of this first message, reference may be made to the description of Msg a in fig. 3 above.
Next, in conjunction with fig. 6 (a) and fig. 6 (b), the method for transmitting a message according to the embodiment of the present application will be described in detail, taking the first message as a preamble in Msg a and the second message as a PUSCH in Msg a as an example.
Shown in fig. 6 (a) are preamble resources configured for transmitting a preamble, and PUSCH resources for transmitting PUSCH. Wherein, the preamble resource further includes a GT, and the PUSCH resource is located after the GT without symbol interval. When the same TA is used for both the preamble and PUSCH, the terminal device transmits the preamble on the preamble resource and the PUSCH on the PUSCH resource as shown in fig. 6 (a), assuming that the TA is 0. Since GT between PUSCH and preamble is greater than 16us, when the terminal device performs LBT to obtain channel usage right and transmits the preamble to the network device, it is necessary to perform LBT again and transmit PUSCH after obtaining channel usage right, thus bringing time delay and affecting random access of the terminal device.
At this time, as shown in fig. 6 (b), different TAs may be configured for the preamble and PUSCH, assuming that TA of the preamble is 0 and TA of the PUSCH is t1, the terminal device sends the preamble on the preamble resource and sends the PUSCH in advance for a period of t1, where t1 should satisfy t1 > GT-16us, and t2 is a time interval between the PUSCH actually transmitted and the preamble. Since t1+t2=gt, then t2 < 16us, i.e. the time interval between PUSCH and preamble is less than 16us. Therefore, after the terminal device obtains the channel usage right by LBT and sends the preamble to the network device, the terminal device can send the PUSCH without carrying out LBT again, thereby avoiding additional LBT and improving the random access efficiency.
In the embodiment of the present application, the TA of the following message, for example, the TA of PUSCH in fig. 6, may be adjusted in two adjacent messages; the TA of the previous message, e.g., the TA of the preamble in fig. 6, may also be adjusted. The increase of the TA of the following message and the decrease of the TA of the preceding message can reduce the time interval between the two messages in actual transmission, and the decrease of the TA of the following message and the increase of the TA of the preceding message can increase the time interval between the two messages in actual transmission.
Therefore, by setting different TAs, the time interval between two adjacent messages can be flexibly adjusted. Especially for message transmission on an unlicensed frequency band, the time interval between two adjacent messages can be reduced by configuring different TAs, so that multiple LBT caused by overlarge time interval is avoided, and the transmission delay is reduced.
Fig. 7 is a schematic flow chart diagram of a method 700 of message transmission in accordance with an embodiment of the present application. The method described in fig. 7 may be performed by a terminal device and a network device. The terminal device may be, for example, the terminal device 120 shown in fig. 1, and the network device may be, for example, the network device 110 shown in fig. 1. As shown in fig. 7, the method 700 of message transmission may include some or all of the following steps. Wherein:
in 710, the terminal device sends a first message.
At 720, a second message is sent.
In 730, the network device receives a first message;
in 740, the network device receives the second message.
Wherein the second message includes data and a placeholder signal preceding the data.
In this embodiment, the time interval between the first message and the second message in the actual transmission process is flexibly adjusted by adding the occupancy signal to the second message.
For example, the first message and the second message are two messages that are transmitted consecutively. When the second message is located after the first message, the placeholder signal may be set before the data portion of the second message, thereby reducing the time interval between the second message and the first message; the placeholder signal may be set after the data portion of the second message when the second message is located before the first message, thereby reducing the time interval between the second message and the first message.
The first message may include a data portion and a GT located after the data portion. The value of GT may for example be selected from a number of values specified by the protocol.
Optionally, the occupancy signal occupies at least part of the GT of the first message.
In this case, the first message and the second message may be regarded as a whole, that is, the first message and the second message may be combined into one message. Therefore, the GT may not be set in the second message, so that the spectral efficiency of the system is improved.
Optionally, the occupancy signal is a Cyclic Prefix (CP) of the second message.
For example, the placeholder signal is a CP of data on the first symbol of the second message.
At this time, optionally, another portion of the CP is located within the first symbol.
The CP to which the data corresponds may be generated based on the data. In general, CP is configured by moving data at the tail of an OFDM symbol to the head, and has an effect of canceling inter-symbol interference, inter-channel interference, and the like.
For example, when the first symbol occupied by the second message shown in fig. 8 is occupied by no occupancy signal, the sample 1 at the end of the symbol is shifted to the head of the symbol, so that the CP of the data in the symbol, that is, the CP portion 1 shown in fig. 8, is formed. In order to reduce the time interval between the second message and the preceding first message, a placeholder signal may be set before the symbol. At this time, before the samples 1 and 2 at the end of the symbol are moved to the data portion in the symbol, a new CP is formed, and the new CP includes not only the CP portion 1 but also the CP portion 2 located before the first symbol, and the CP2 can be used as a placeholder signal of the second message.
The method can be applied to various communication systems, and can be applied to both unlicensed frequency bands and licensed frequency bands. When the method is applied in an unlicensed band, optionally, the time interval between the second message and the non-GT portion of the first message is less than a preset value. Wherein the preset value is, for example, a minimum time interval for performing LBT, for example, 16us.
Since the time interval between two consecutive transmitted messages is less than 16us in the unlicensed band, LBT need not be performed before the second transmission of the message. Therefore, the time interval between the second message and the first message can be reduced by setting the occupying signal in the second message, so that the time interval between the two messages is smaller than 16us, thereby avoiding frequent LBT and reducing transmission delay.
Optionally, in 710 the terminal device sends the first message based on the first resource, and correspondingly, in 530 the network device receives the first message based on the first resource.
Optionally, in 720, the terminal device transmits the second message based on the second resource, and accordingly, in 740, the network device receives the second message based on the second resource.
Wherein the first resource is a configured resource for transmitting the first message and the second resource is a configured resource for transmitting the second message.
For example, the second resource may be located after the first resource without a symbol interval. Wherein the first resource includes a resource for transmitting data in the first message, and a GT located after the resource, and the second resource is located after the GT without symbol interval.
The second resource and the first resource may be configured by the network device or may be pre-configured, e.g., protocol-agreed.
It is to be appreciated that the first resource can be considered a resource nominally used to transmit a first message and the second resource can be considered a resource nominally used to transmit a second message, the first and second resources satisfying frame alignment and symbol alignment in the time domain. For example, when the second message does not include the occupying signal, the terminal device sends the second message on the second resource, and at this time, the resource actually sending the second message is the second resource; when the second message includes the occupying signal, the resources actually transmitting the second message include the second resource and the resource for transmitting the occupying signal located before the second resource.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message. This can avoid signal interference generated on different frequency bands.
The embodiment of the application does not limit the first message and the second message. For example, the first message may be a preamble in a first message of 2-step random access, and the second message may be a PUSCH in the first message of 2-step random access.
The first message and the second message together may be referred to as a first message of a 2-step random access procedure or a message sent in a first step of a 2-step random access procedure. For specific details of this first message, reference may be made to the description of Msg a in fig. 3 above.
Next, in conjunction with fig. 9 (a) and fig. 9 (b), the method for transmitting a message according to the embodiment of the present application will be described in detail, taking the first message as a preamble in Msg a and the second message as a PUSCH in Msg a as an example.
Shown in fig. 9 (a) are a preamble resource configured to transmit a preamble, and a PUSCH resource configured to transmit a PUSCH. Wherein, the preamble resource further includes a GT, and the PUSCH resource is located after the GT without symbol interval. Assuming that the TA of the preamble and PUSCH are both 0, the terminal device transmits the preamble on the preamble resource and the PUSCH on the PUSCH resource as shown in fig. 9 (a). Since GT between PUSCH and preamble is greater than 16us, when the terminal device performs LBT to obtain channel usage right and transmits the preamble to the network device, it is necessary to perform LBT again and transmit PUSCH after obtaining channel usage right, thus bringing time delay and affecting random access of the terminal device.
At this time, as shown in fig. 9 (b), a space occupying signal having a length t1 may be arranged in the PUSCH. The terminal equipment sends a preamble on the preamble resource and then sends an occupied signal and a data part in the PUSCH, wherein the occupied signal starts to be transmitted in the period t1, which is equivalent to that the occupied signal preempts the resource with the time length t1 for the PUSCH in advance. t1 should satisfy t1 > GT-16us, t2 is the time interval between the PUSCH and the preamble actually transmitted, and since t1+t2=gt, t2 < 16us, i.e. the time interval between the PUSCH and the preamble is less than 16us. Therefore, after the terminal device obtains the channel usage right by LBT and sends the preamble to the network device, the terminal device can send the PUSCH without carrying out LBT again, thereby avoiding additional LBT and improving the random access efficiency.
In the embodiment of the application, in two adjacent messages, the occupation signal can be configured for the following message or the previous message. Setting the occupancy signal at the head of the following message and the occupancy signal at the tail of the preceding message can reduce the time interval between the two messages in actual transmission.
Therefore, it is used to add a placeholder signal to a message, thereby flexibly adjusting the time interval between two adjacent messages. Especially for message transmission on an unlicensed frequency band, the time interval between two adjacent messages can be reduced by increasing the occupied signal, so that multiple LBT caused by overlarge time interval is avoided, and the transmission delay is reduced.
It should be understood that the two ways of setting different TAs, and setting the placeholder signals in the message, may be implemented alone or in combination. That is, at least one of the following operations may be performed on the first message and/or the second message: setting the same or different TAs; setting a placeholder signal for the second message; a placeholder signal is set for the first message. As long as the time interval between the first message and the second message can be made to satisfy the required conditions.
The data in the embodiments of the present application may refer to service data and/or control signals. And, the message may be replaced with information, signals, data, channels, etc.
In the above, the method of the embodiment of the present application is used as an example for the terminal device to send the message, but the embodiment of the present application is not limited thereto. The network device may also send the third message and the fourth message using the method of the embodiment of the present application. For example, the network device sends the third message and the fourth message based on different TAs and/or sets a placeholder signal for one of the messages, so as to flexibly adjust a time interval between the third message and the fourth message in an actual sending process.
The random access procedure described in the embodiments of the present application includes, but is not limited to, an initial access procedure, and may be a contention-based random access procedure (contention based RACH) or a non-contention-based random access procedure (contention free RACH).
It should be noted that, on the premise of no conflict, the embodiments and/or technical features in the embodiments described in the present application may be combined with each other arbitrarily, and the technical solutions obtained after combination should also fall into the protection scope of the present application.
In various embodiments of the present application, the sequence number of each process does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Having described the method of message transmission in detail according to the embodiment of the present application, the apparatus according to the embodiment of the present application will be described below with reference to fig. 10 to 17, and technical features described in the method embodiment are applicable to the following apparatus embodiments.
Fig. 10 is a schematic block diagram of a terminal device 1000 according to an embodiment of the application. As shown in fig. 10, the terminal device 1000 includes a transmitting unit 1010. Optionally, the terminal device further comprises a receiving unit 1020. Wherein:
the transmitting unit 1010 is configured to: sending a first message according to the time advance TA of the first message; transmitting a second message according to the TA of the second message; the first message and the second message are two messages transmitted continuously, and the TA of the second message is unequal to the TA of the first message.
Therefore, the time interval between two adjacent messages can be flexibly adjusted by using different TAs for message transmission. Especially for message transmission on an unlicensed frequency band, the time interval between two adjacent messages can be reduced by configuring different TAs, so that multiple LBT caused by overlarge time interval is avoided, and the transmission delay is reduced.
Optionally, the second message occupies at least part of the guard time GT of the first message.
Optionally, the receiving unit 1020 is configured to: and receiving first indication information, wherein the first indication information is used for indicating the TA of the first message and/or the TA of the second message.
Optionally, the TA of the first message is a preset value, and the first indication information is used to indicate an offset of the TA of the second message relative to the preset value.
Optionally, the receiving unit 1020 is specifically configured to: and receiving a broadcast message, wherein the broadcast message comprises the first indication information.
Optionally, the terminal device uses an unlicensed frequency band.
Optionally, the time interval between the second message and the non-GT part of the first message is smaller than a preset value, the preset value being a minimum time interval for performing LBT.
Optionally, the preset value is 16 microseconds.
Optionally, the sending unit 1010 is specifically configured to:
transmitting the first message according to the TA of the first message based on the first resource;
transmitting the second message according to the TA of the second message based on the second resource;
the first resource is configured to transmit the first message, the second resource is configured to transmit the second message, and the second resource is located after the first resource without symbol interval.
Optionally, the first message is a preamble in a first message of 2-step random access, and the second message is a PUSCH in the first message of 2-step random access.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message.
It should be understood that the terminal device 1000 may perform the corresponding operations performed by the terminal device in the method 500 according to the embodiment of the present application, which are not described herein for brevity.
Fig. 11 is a schematic block diagram of a terminal device 1100 according to an embodiment of the present application. As shown in fig. 11, the terminal apparatus 1100 includes a transmitting unit 1110 for:
sending a first message;
And sending a second message, wherein the second message comprises data and a occupying signal positioned before the data, and the occupying signal occupies at least part of the GT of the first message.
Therefore, it is used to add a placeholder signal to a message, thereby flexibly adjusting the time interval between two adjacent messages. Especially for message transmission on an unlicensed frequency band, the time interval between two adjacent messages can be reduced by increasing the occupied signal, so that multiple LBT caused by overlarge time interval is avoided, and the transmission delay is reduced.
Optionally, the placeholder signal is a cyclic prefix CP of the data on the first symbol.
Optionally, another portion of the CP is located within the first symbol.
Optionally, the terminal device uses an unlicensed frequency band.
Optionally, the time interval between the second message and the non-GT part of the first message is smaller than a preset value, the preset value being a minimum time interval for performing LBT.
Optionally, the preset value is 16 microseconds.
Optionally, the sending unit 1110 is specifically configured to: transmitting the first message based on a first resource; transmitting the second message based on a second resource; the first resource is configured to transmit the first message, the second resource is configured to transmit the second message, and the second resource is located after the first resource without symbol interval.
Optionally, the first message is a preamble in a first message of 2-step random access, and the second message is a PUSCH in the first message of 2-step random access.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message.
Optionally, the time advance TA of the second message is equal to the TA of the first message.
It should be understood that the terminal device 1100 may perform the corresponding operations performed by the terminal device in the method 700 according to the embodiment of the present application, which are not described herein for brevity.
Fig. 12 is a schematic block diagram of a network device 1200 in accordance with an embodiment of the present application. As shown in fig. 12, the network device 1200 includes a receiving unit 1210. Optionally, the network device 1200 further comprises a sending unit 1220. Wherein:
the receiving unit 1210 is configured to: receiving a first message according to a time advance TA of the first message; receiving a second message according to the TA of the second message; the first message and the second message are two messages transmitted continuously, and the TA of the second message is unequal to the TA of the first message.
Therefore, the time interval between two adjacent messages can be flexibly adjusted by using different TAs for message transmission. Especially for message transmission on an unlicensed frequency band, the time interval between two adjacent messages can be reduced by configuring different TAs, so that multiple LBT caused by overlarge time interval is avoided, and the transmission delay is reduced.
Optionally, the second message occupies at least part of the GT of the first message.
Optionally, the sending unit 1220 is configured to: and sending first indication information, wherein the first indication information is used for indicating the TA of the first message and/or the TA of the second message.
Optionally, the TA of the first message is a preset value, and the first indication information is used to indicate an offset of the TA of the second message relative to the preset value.
Optionally, the sending unit 1220 is specifically configured to: and sending a broadcast message, wherein the broadcast message comprises the first indication information.
Optionally, the network device uses unlicensed frequency bands.
Optionally, the time interval between the second message and the non-GT part of the first message is smaller than a preset value, the preset value being a minimum time interval for performing listen before talk LBT.
Optionally, the preset value is 16 microseconds.
Optionally, the receiving unit 1210 is specifically configured to:
receiving the first message according to the TA of the first message based on the first resource;
receiving the second message according to the TA of the second message based on the second resource;
the first resource is configured to transmit the first message, the second resource is configured to transmit the second message, and the second resource is located after the first resource without symbol interval.
Optionally, the first message is a preamble in a first message of 2-step random access, and the second message is a PUSCH in the first message of 2-step random access.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message.
It should be understood that the network device 1200 may perform the corresponding operations performed by the network device in the method 500 according to the embodiment of the present application, which are not described herein for brevity.
Fig. 13 is a schematic block diagram of a network device 1300 in accordance with an embodiment of the present application. As shown in fig. 13, the network device 1300 includes a receiving unit 1310 for:
receiving a first message;
a second message is received, wherein the second message comprises data and a placeholder signal preceding the data, the placeholder signal occupying at least part of the GT of the first message.
Therefore, it is used to add a placeholder signal to a message, thereby flexibly adjusting the time interval between two adjacent messages. Especially for message transmission on an unlicensed frequency band, the time interval between two adjacent messages can be reduced by increasing the occupied signal, so that multiple LBT caused by overlarge time interval is avoided, and the transmission delay is reduced.
Optionally, the placeholder signal is a cyclic prefix CP of the data on the first symbol.
Optionally, another portion of the CP is located within the first symbol.
Optionally, the network device uses unlicensed frequency bands.
Optionally, the time interval between the second message and the non-GT part of the first message is smaller than a preset value, the preset value being a minimum time interval for performing listen before talk LBT.
Optionally, the preset value is 16 microseconds.
Optionally, the receiving unit 1310 is specifically configured to:
receiving the first message based on a first resource;
receiving the second message based on a second resource;
the first resource is configured to transmit the first message, the second resource is configured to transmit the second message, and the second resource is located after the first resource without symbol interval.
Optionally, the first message is a preamble in a first message of 2-step random access, and the second message is a physical uplink shared channel PUSCH in the first message of 2-step random access.
Optionally, the frequency band occupied by the second message is located within the frequency band occupied by the first message.
Optionally, the time advance TA of the second message is equal to the TA of the first message.
It should be understood that the network device 1300 may perform the corresponding operations performed by the network device in the method 700 according to the embodiment of the present application, which are not described herein for brevity.
Fig. 14 is a schematic block diagram of a communication device 1400 provided in an embodiment of the present application. The communication device 1400 shown in fig. 14 includes a processor 1410, and the processor 1410 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 14, the communication device 1400 may also include a memory 1420. Wherein the processor 1410 may invoke and run a computer program from the memory 1420 to implement the method in the embodiments of the present application.
Wherein the memory 1420 may be a separate device from the processor 1410 or may be integrated into the processor 1410.
Optionally, as shown in fig. 14, the communication device 1400 may further include a transceiver 1430, and the processor 1410 may control the transceiver 1430 to communicate with other devices, and in particular, may send information or data to other devices or receive information or data sent by other devices.
Wherein the transceiver 1430 may include a transmitter and a receiver. The transceiver 1430 may further include an antenna, the number of which may be one or more.
Optionally, the communication device 1400 may be specifically a terminal device in the embodiment of the present application, and the communication device 1400 may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the communication device 1400 may be a network device according to an embodiment of the present application, and the communication device 1400 may implement corresponding processes implemented by the network device in each method according to the embodiment of the present application, which are not described herein for brevity.
Fig. 15 is a schematic structural view of a chip of an embodiment of the present application. The chip 1500 shown in fig. 15 includes a processor 1510, and the processor 1510 may call and execute a computer program from memory to implement the method in an embodiment of the present application.
Optionally, as shown in fig. 15, the chip 1500 may further include a memory 1520. Wherein the processor 1510 may invoke and run a computer program from the memory 1520 to implement the method in embodiments of the present application.
Wherein the memory 1520 may be a separate device from the processor 1510 or may be integrated into the processor 1510.
Optionally, the chip 1500 may also include an input interface 1530. Wherein the processor 1510 may control the input interface 1530 to communicate with other devices or chips, and in particular, may obtain information or data sent by other devices or chips.
Optionally, the chip 1500 may also include an output interface 1540. Wherein the processor 1510 may control the output interface 1540 to communicate with other devices or chips, and in particular may output information or data to other devices or chips.
Optionally, the chip may be applied to a terminal device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the chip may be applied to the network device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the network device in each method in the embodiment of the present application, which is not described herein for brevity.
The chip described in the embodiments of the present application may also be referred to as a system-on-chip, a chip system, or a system-on-chip.
The processor in the embodiments of the present application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be implemented by integrated logic circuits of hardware in a processor or instructions in software form. The processor may be a general purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be embodied directly in the execution of a hardware decoding processor, or in the execution of a combination of hardware and software modules in a decoding processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method.
The memory in embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (Double Data Rate SDRAM), enhanced SDRAM (ESDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DR RAM).
The foregoing memory is illustrative but not limiting, and for example, the memory in the embodiments of the present application may be Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), direct RAM (DR RAM), and the like. That is, the memory in embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
Fig. 16 is a schematic block diagram of a communication system 1600 in accordance with an embodiment of the present application. As shown in fig. 16, the communication system 1600 includes a terminal device 1610 and a network device 1620.
Wherein, the terminal device 1610 is configured to: transmitting a first message according to the TA of the first message; transmitting a second message according to the TA of the second message;
the network device 1620 is configured to: receiving a first message according to the TA of the first message; receiving a second message according to the TA of the second message;
The first message and the second message are two messages transmitted continuously, and the TA of the second message is unequal to the TA of the first message.
The terminal device 1610 may be used to implement the corresponding functions implemented by the terminal device in the method according to the embodiment of the present application, and the composition of the terminal device 1610 may be as shown in the terminal device 1000 in fig. 10, which is not described herein for brevity.
The network device 1620 may be used to implement the corresponding functions implemented by the network device in the method according to the embodiment of the present application, and the composition of the network device 1620 may be as shown in the network device 1200 in fig. 12, which is not described herein for brevity.
Fig. 17 is a schematic block diagram of a communication system 1700 in accordance with an embodiment of the present application. As shown in fig. 17, the communication system 1700 includes a terminal device 1710 and a network device 1720.
Wherein, the terminal device 1710 is configured to: sending a first message; transmitting a second message, wherein the second message comprises data and a placeholder signal positioned in front of the data;
the network device 1720 is configured to: receiving a first message; receiving a second message, wherein the second message comprises data and a placeholder signal positioned before the data;
Wherein the occupancy signal occupies at least part of the guard time GT of the first message.
The terminal device 1710 may be used to implement the corresponding functions implemented by the terminal device in the method according to the embodiment of the present application, and the composition of the terminal device 1710 may be as shown in the terminal device 1100 in fig. 11, which is not described herein for brevity.
The network device 1720 may be used to implement the corresponding functions implemented by the network device in the method according to the embodiment of the present application, and the composition of the network device 1720 may be as shown in the network device 1300 in fig. 13, which is not described herein for brevity.
The embodiment of the application also provides a computer readable storage medium for storing a computer program. Optionally, the computer readable storage medium may be applied to a network device in the embodiment of the present application, and the computer program causes a computer to execute a corresponding flow implemented by the network device in each method in the embodiment of the present application, which is not described in detail for brevity. Optionally, the computer readable storage medium may be applied to a terminal device in the embodiment of the present application, and the computer program causes a computer to execute a corresponding flow implemented by the terminal device in each method of the embodiment of the present application, which is not described in detail for brevity.
The embodiment of the application also provides a computer program product comprising computer program instructions. Optionally, the computer program product may be applied to a network device in the embodiment of the present application, and the computer program instructions cause a computer to execute corresponding processes implemented by the network device in each method in the embodiment of the present application, which are not described herein for brevity. Optionally, the computer program product may be applied to a terminal device in the embodiment of the present application, and the computer program instructions cause a computer to execute corresponding processes implemented by the terminal device in each method in the embodiment of the present application, which are not described herein for brevity.
The embodiment of the application also provides a computer program. Optionally, the computer program may be applied to a network device in the embodiment of the present application, and when the computer program runs on a computer, the computer is caused to execute a corresponding flow implemented by the network device in each method in the embodiment of the present application, which is not described herein for brevity. Optionally, the computer program may be applied to a terminal device in the embodiment of the present application, and when the computer program runs on a computer, the computer is caused to execute a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
The terms "system" and "network" in embodiments of the application are used interchangeably herein. The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In the embodiment of the present application, "B corresponding to (corresponding to) a" means that B is associated with a, from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also determine B from a and/or other information.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (31)

1. A method of message transmission, comprising:
the terminal equipment sends a first message according to the time advance TA of the first message;
the terminal equipment sends a second message according to the TA of the second message, wherein the first message and the second message are two messages which are continuously transmitted, the first message is a preamble in a first message accessed by 2 steps, the second message is a Physical Uplink Shared Channel (PUSCH) in the first message accessed by 2 steps, and the TA of the second message is unequal to the TA of the first message;
the method further comprises the steps of:
the terminal equipment receives first indication information, wherein the first indication information is used for indicating the TA of the first message and/or the TA of the second message;
the first indication information is used for indicating the offset of the TA of the second message relative to the preset value;
the first message comprises a data portion and a guard time GT located after the data portion, the second message occupies at least part of the GT of the first message, and GT is not set for the second message;
The time interval between the second message and the non-GT portion of the first message is less than a preset value, which is a minimum time interval for performing listen before talk, LBT.
2. The method of claim 1, wherein the terminal device receives the first indication information, comprising:
the terminal equipment receives a broadcast message, wherein the broadcast message comprises the first indication information.
3. The method according to claim 1 or 2, characterized in that the method is applied to unlicensed bands.
4. The method of claim 1, wherein the preset value is 16 microseconds.
5. The method according to claim 1 or 2, wherein the terminal device sends the first message according to the TA of the first message, comprising:
the terminal equipment sends the first message according to the TA of the first message based on the first resource;
the terminal device sends the second message according to the TA of the second message, including:
the terminal equipment sends the second message according to the TA of the second message based on the second resource;
the first resource is configured to transmit the first message, the second resource is configured to transmit the second message, and the second resource is located after the first resource without symbol interval.
6. A method according to claim 1 or 2, characterized in that the frequency band occupied by the second message is located within the frequency band occupied by the first message.
7. A method of message transmission, comprising:
the network equipment receives a first message according to the time advance TA of the first message;
the network equipment receives a second message according to the TA of the second message, wherein the first message and the second message are two messages which are continuously transmitted, the first message is a preamble in a first message accessed by 2 steps, the second message is a Physical Uplink Shared Channel (PUSCH) in the first message accessed by 2 steps, and the TA of the second message is unequal to the TA of the first message;
the method further comprises the steps of:
the network equipment sends first indication information, wherein the first indication information is used for indicating the TA of a first message and/or the TA of a second message;
the first indication information is used for indicating the offset of the TA of the second message relative to the preset value;
the first message comprises a data portion and a guard time GT located after the data portion, the second message occupies at least part of the guard time GT of the first message, and GT is not set for the second message;
The time interval between the second message and the non-GT portion of the first message is less than a preset value, which is a minimum time interval for performing listen before talk, LBT.
8. The method of claim 7, wherein the network device sending the first indication information to the terminal device comprises:
the network device sends a broadcast message, wherein the broadcast message comprises the first indication information.
9. The method according to claim 7 or 8, wherein the method is applied to unlicensed bands.
10. The method of claim 7, wherein the preset value is 16 microseconds.
11. The method according to claim 7 or 8, wherein the network device receiving the first message comprises:
the network equipment receives the first message according to the TA of the first message based on the first resource;
the network device sends the second message according to the TA of the second message, including:
the network equipment receives the second message according to the TA of the second message based on the second resource;
the first resource is configured to transmit the first message, the second resource is configured to transmit the second message, and the second resource is located after the first resource without symbol interval.
12. The method according to claim 7 or 8, wherein the frequency band occupied by the second message is located within the frequency band occupied by the first message.
13. A terminal device, comprising:
a sending unit, configured to send a first message according to a time advance TA of the first message;
the terminal equipment unit is further configured to send a second message according to a TA of the second message, where the first message and the second message are two messages that are continuously transmitted, the first message is a preamble in a first message that is accessed by 2 steps of random access, the second message is a physical uplink shared channel PUSCH in the first message that is accessed by 2 steps of random access, and the TA of the second message is unequal to the TA of the first message;
the terminal device further includes:
a receiving unit, configured to receive first indication information, where the first indication information is used to indicate a TA of the first message and/or a TA of the second message;
the first indication information is used for indicating the offset of the TA of the second message relative to the preset value;
the first message comprises a data portion and a guard time GT located after the data portion, the second message occupies at least part of the guard time GT of the first message, and GT is not set for the second message;
The time interval between the second message and the non-GT portion of the first message is less than a preset value, which is a minimum time interval for performing listen before talk, LBT.
14. The terminal device according to claim 13, wherein the receiving unit is specifically configured to:
and receiving a broadcast message, wherein the broadcast message comprises the first indication information.
15. Terminal device according to claim 13 or 14, characterized in that the terminal device uses unlicensed frequency bands.
16. The terminal device of claim 13, wherein the preset value is 16 microseconds.
17. Terminal device according to claim 13 or 14, characterized in that the sending unit is specifically configured to:
transmitting the first message according to the TA of the first message based on the first resource;
transmitting the second message according to the TA of the second message based on the second resource;
the first resource is configured to transmit the first message, the second resource is configured to transmit the second message, and the second resource is located after the first resource without symbol interval.
18. The terminal device according to claim 13 or 14, characterized in that the frequency band occupied by the second message is located within the frequency band occupied by the first message.
19. A network device, comprising:
a receiving unit, configured to receive a first message according to a time advance TA of the first message;
the receiving unit is further configured to receive a second message according to a TA of the second message, where the first message and the second message are two messages that are continuously transmitted, the first message is a preamble in a first message that is accessed by 2 steps, the second message is a physical uplink shared channel PUSCH in the first message that is accessed by 2 steps, and the TA of the second message is unequal to the TA of the first message;
the network device further includes:
a transmitting unit, configured to transmit first indication information, where the first indication information is used to indicate a TA of a first message and a TA of a second message;
the first indication information is used for indicating the offset of the TA of the second message relative to the preset value;
the first message comprises a data portion and a guard time GT located after the data portion, the second message occupies at least part of the guard time GT of the first message, and GT is not set for the second message;
The time interval between the second message and the non-GT portion of the first message is less than a preset value, which is a minimum time interval for performing listen before talk, LBT.
20. The network device according to claim 19, wherein the sending unit is specifically configured to:
and sending a broadcast message, wherein the broadcast message comprises the first indication information.
21. The network device according to claim 19 or 20, characterized in that the network device uses unlicensed frequency bands.
22. The network device of claim 19, wherein the preset value is 16 microseconds.
23. The network device according to claim 19 or 20, wherein the receiving unit is specifically configured to:
receiving the first message according to the TA of the first message based on the first resource;
receiving the second message according to the TA of the second message based on the second resource;
the first resource is configured to transmit the first message, the second resource is configured to transmit the second message, and the second resource is located after the first resource without symbol interval.
24. The network device of claim 19 or 20, wherein the frequency band occupied by the second message is located within the frequency band occupied by the first message.
25. A terminal device, characterized in that it comprises a processor and a memory for storing a computer program, the processor being adapted to invoke and run the computer program stored in the memory for performing the method according to any of claims 1 to 6.
26. A network device comprising a processor and a memory for storing a computer program, the processor for invoking and running the computer program stored in the memory to perform the method of any of claims 7 to 12.
27. A chip comprising a processor for invoking and running a computer program from memory, such that a device on which the chip is mounted performs the method of any of claims 1-6.
28. A chip comprising a processor for invoking and running a computer program from memory, such that a device on which the chip is mounted performs the method of any of claims 7 to 12.
29. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 1 to 6.
30. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 7 to 12.
31. A communication system comprising a terminal device according to any of claims 13 to 18 and a network device according to any of claims 19 to 24.
CN201980062146.XA 2019-04-15 2019-04-15 Message transmission method and device Active CN112740808B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/082779 WO2020210963A1 (en) 2019-04-15 2019-04-15 Message transmission method and device

Publications (2)

Publication Number Publication Date
CN112740808A CN112740808A (en) 2021-04-30
CN112740808B true CN112740808B (en) 2023-08-29

Family

ID=72837665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980062146.XA Active CN112740808B (en) 2019-04-15 2019-04-15 Message transmission method and device

Country Status (2)

Country Link
CN (1) CN112740808B (en)
WO (1) WO2020210963A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117676789A (en) * 2022-08-12 2024-03-08 华为技术有限公司 Information transmission method and communication device
CN117119576A (en) * 2023-03-29 2023-11-24 荣耀终端有限公司 Processing method and device for time advance TA

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017215437A1 (en) * 2016-06-12 2017-12-21 电信科学技术研究院 Method and device for use in random access

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101932052B (en) * 2009-06-23 2016-08-24 华为技术有限公司 A kind of changing method, user terminal and network equipment
CN102111257B (en) * 2011-03-04 2015-04-01 中兴通讯股份有限公司 Method and system for adjusting timing advance
RU2732993C1 (en) * 2017-06-23 2020-09-28 ЭлДжи ЭЛЕКТРОНИКС ИНК. Method and device for transmitting and receiving uplink signal in wireless communication system
CN109121222B (en) * 2017-06-23 2021-08-13 华为技术有限公司 Communication method and communication device
CN109429354B (en) * 2017-08-31 2021-05-18 华为技术有限公司 Random access method and terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017215437A1 (en) * 2016-06-12 2017-12-21 电信科学技术研究院 Method and device for use in random access

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Intel Corporation."Channel structure for 2-step RACH".3GPP TSG RAN WG1 #96bis R1-1904280.1-11. *

Also Published As

Publication number Publication date
WO2020210963A1 (en) 2020-10-22
CN112740808A (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN114340014B (en) Random access method and equipment
CN111837446B (en) Random access method and communication equipment
CN113490288B (en) Method, apparatus and computer-readable storage medium for random access
CN111869306B (en) Random access method, terminal equipment and network equipment
CN113519201A (en) Random access method and equipment
CN113347735A (en) Random access process selection method, device, chip and computer program
CN111972032B (en) Random access method and equipment
CN111989978B (en) Random access method and equipment
CN113678562B (en) Communication method, terminal device and network device
CN112740808B (en) Message transmission method and device
KR20210036931A (en) Random access method and related devices
WO2022067519A1 (en) Random access methods and terminals
CN112997574B (en) Random access method, terminal equipment and network equipment
US20230129426A1 (en) Wireless communication method and terminal device
CN114246013A (en) Wireless communication method and terminal device
CN112997575B (en) Wireless communication method, terminal device and network device
US20220225433A1 (en) Wireless communication method, terminal device, and network device
EP3836475B1 (en) Method for controlling power ramp counter, and terminal device
EP4087347A1 (en) Wireless communication method, terminal device, and network device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant