CN112995961B - Terminal access method for terminal through communication based on broadband technology - Google Patents

Terminal access method for terminal through communication based on broadband technology Download PDF

Info

Publication number
CN112995961B
CN112995961B CN202110252851.5A CN202110252851A CN112995961B CN 112995961 B CN112995961 B CN 112995961B CN 202110252851 A CN202110252851 A CN 202110252851A CN 112995961 B CN112995961 B CN 112995961B
Authority
CN
China
Prior art keywords
access
terminal
access control
mac
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110252851.5A
Other languages
Chinese (zh)
Other versions
CN112995961A (en
Inventor
张永生
郭梯云
李建东
王重阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Rongzhao Intelligent Co ltd
Original Assignee
Anhui Rongzhao Intelligent Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Rongzhao Intelligent Co ltd filed Critical Anhui Rongzhao Intelligent Co ltd
Priority to CN202110252851.5A priority Critical patent/CN112995961B/en
Publication of CN112995961A publication Critical patent/CN112995961A/en
Application granted granted Critical
Publication of CN112995961B publication Critical patent/CN112995961B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements
    • H04W56/001Synchronization between nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a terminal access method of terminal through communication based on broadband technology, comprising the following steps: s20: the AC (access control layer) informs the MAC (medium access control layer) to perform cell search; s21: the MAC sends the cell search result to the AC; s22: the AC confirms that the cell is accessible; s23: the AC informs the MAC to initiate competitive access and sends MSG3 carrying ID number; s24: the MAC sends MSG4 carried in the transmission message to the AC; s25: the AC judges whether the access request of the UE of the cell is received, the AC selects whether to grant the access of the UE according to the link condition, and sends the unique identification number of the access UE carried by the MSG4 to the MAC; s26: the MAC completes UE access, transmits messages MSG5 to AC, and informs the subordinate UE that the access is successful; s27: and the AC judges whether the access is successful, if so, the MSG5 sends an ACK back to confirm that the cell access is successful.

Description

Terminal access method for terminal through communication based on broadband technology
Technical Field
The invention relates to a terminal through mode, in particular to a terminal access method of terminal through communication D2D based on a broadband technology.
Background
The description of the background art to which the present invention pertains is merely for illustrating and facilitating understanding of the summary of the invention, and should not be construed as an explicit recognition or presumption by the applicant that the applicant regards the prior art as the filing date of the first filed application.
In some application scenarios based on LTE technology, for example, power system smart grid data acquisition, downlink transmission of acquisition instructions, uplink transmission of various types of acquired data, where part of smart meters can be arranged in places with large path loss and weak coverage, the signal-to-noise ratio of uplink reception is very low. In the existing LTE general network, the transmitting power of the existing cell is difficult to cover all users in the edge area of the cell or some special places, and the users cannot access in some places, if the sites of the cell are increased, the network construction cost is increased, and the cost performance is not high.
A terminal through mode (D2D for short) refers to direct communication between two or more mobile stations without forwarding through a base station or a network. Namely, the UE in the signal coverage is selected as the relay UE, and data transmission is carried out between the relay UE and the UE outside the signal coverage, so that the UE outside the signal coverage accesses the network through the relay UE, and the D2D mode can support the effective communication between the mobile stations in the area where the network coverage cannot be achieved. To realize the direct communication of the terminal, a plurality of key technologies are required to be broken through. For example, inter-terminal synchronization techniques, inter-terminal discovery techniques, inter-terminal data transmission techniques, inter-terminal time domain frequency domain resource coordination techniques, and the like.
At present, the communication protocol of the terminal is zigbee, lora, wifi and the like. Although Zigbee and lora have the characteristics of wide coverage and flexible networking, the Zigbee and the lora are narrowband communication, and the transmission rate is not high. Wifi provides broadband communication, but is limited by the close distance of communication.
The 4/5G broadband network is a network with a base station as a center, and terminals communicate with each other through the transfer of the base station (and a core network). If the terminal cannot contact the base station, it cannot communicate. Therefore, how to avoid the above-mentioned drawbacks and reasonably perform channel configuration, so that the UE outside the signal coverage can access the network through the relay UE becomes a problem to be solved.
The invention combines PSS/SSS, PRACH, SC-OFDM and other basic channel waveforms in 4G/5G communication, and provides a novel broadband terminal straight-through protocol, wherein a terminal automatically establishes a chain network to carry out broadband straight-through communication, and the method is submitted as a series of applications and comprises the following steps: channel configuration method, synchronization method between terminals, terminal access method, data transmission method between terminals, and coordination method of time domain and frequency domain resources between terminals. In order to provide a long-distance high-reliability broadband terminal direct communication protocol.
The invention relates to a terminal access method of terminal through communication D2D based on broadband technology, aiming at enabling UE outside signal coverage to access a network through relay UE based on the newly proposed terminal through communication protocol technology, thereby being widely applied to terminal relay scene and effectively expanding coverage area of network access and remote data return in a low-cost mode.
Disclosure of Invention
The invention provides a novel terminal direct communication protocol based on the applicant, and provides a novel terminal access method of terminal direct communication D2D based on a broadband technology.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, or may be learned by practice of the invention.
The invention provides a terminal access method of terminal through communication based on broadband technology, which comprises the following steps:
s20: the AC informs the MAC to search the cell;
s21: the MAC sends the cell search result to the AC;
s22: the AC confirms that the cell is accessible;
s23: the AC informs the MAC to initiate competitive access and sends MSG3 carrying ID number;
s24: the MAC sends MSG4 carried in the transmission message to the AC;
s25: the AC judges whether the access request of the UE of the cell is received, the AC selects whether to grant the access of the UE according to the link condition, and sends the unique identification number of the access UE carried by the MSG4 to the MAC;
s26: the MAC completes UE access, transmits messages MSG5 to AC, and informs the subordinate UE that the access is successful;
s27: and the AC judges whether the access is successful, if so, the MSG5 sends an ACK back to confirm that the cell access is successful.
According to another aspect of the present invention, there is provided a terminal access system for through communication of a terminal based on broadband technology, wherein the system includes a memory and a processor, the memory storing a computer program, which when executed by the processor, causes the processor to perform the terminal access method for through communication of a terminal based on broadband technology described in any one of the above.
According to yet another aspect of the present invention, there is provided a storage medium having stored thereon computer program instructions executable by a processor to implement a terminal access method for terminal pass-through communication based on broadband technology as described above.
Under the condition of keeping the advantages of the cellular network, the coverage area of network access is expanded by using the D2D multi-hop self-organizing network at low cost, so that the high-bandwidth flexible configuration of 1.4M-100M and high-speed and video service are supported, and meanwhile, compared with a WIFI communication mode, the communication distance is farther, the frequency band is more flexible, and the safety is higher.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
fig. 1 shows a first application scenario of the terminal access method of the terminal through communication D2D based on broadband technology of the present invention;
fig. 2 shows a second application scenario of the terminal access method of the terminal through communication D2D based on broadband technology of the present invention;
fig. 3 shows an inter-UE chain networking mode adopted by the terminal access method of the terminal through communication D2D based on the broadband technology of the present invention;
Fig. 4 is a schematic diagram showing a system frame structure of D2D adopted by the terminal access method of the terminal through communication D2D based on the broadband technology of the present invention;
fig. 5 is a diagram illustrating a sub-frame allocation of a system superframe of 40ms for D2D employed in the present invention;
fig. 6 shows a 40ms superframe 5 user subframe allocation schedule of a synchronization channel of D2D according to the present invention;
fig. 7 shows a parameter configuration diagram of PSS;
FIG. 8 shows a parameter configuration diagram of an SSS;
figure 9 shows a time-frequency location diagram of a PUCCH & USS channel;
fig. 10 shows an RE mapping diagram of PUCCH;
fig. 11 shows DMRS parameter configuration;
fig. 12 shows a PRACH parameter configuration table;
fig. 13 shows a reference symbol position determined in a PUSCH channel;
fig. 14 (a) shows a specific format of a message header of a RAR packet, and fig. 14 (B) and 14 (C) show specific formats of message headers of non-RAR packet packets.
Fig. 15 shows a MAC scheduling information diagram;
fig. 16 shows a schematic flow diagram of a terminal synchronization method of the terminal through communication based on the broadband technology in the present technology;
fig. 17 shows a schematic diagram of a time-frequency position of a synchronization channel in a terminal synchronization method of a terminal through communication based on a broadband technology in the present technology;
Fig. 18 shows a schematic diagram of a terminal access method of the terminal through communication D2D based on broadband technology of the present application;
fig. 19 (a) and 19 (B) show parameters of messages MSG2 and MSG4, respectively.
Fig. 20 shows a schematic diagram of an entity structure of an electronic device according to an embodiment of the present invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
The following discussion provides various embodiments of the invention. While each embodiment represents a single combination of the invention, different embodiments of the invention may be substituted or combined, and the invention is thus to be considered to include all possible combinations of the same and/or different embodiments described. Thus, if one embodiment comprises A, B, C and another embodiment comprises a combination of B and D, then the present invention should also be considered to include embodiments comprising one or more of all other possible combinations comprising A, B, C, D, although such an embodiment may not be explicitly recited in the following.
Fig. 1 shows a first application scenario of the terminal access method of the terminal through communication D2D based on broadband technology of the present invention. As shown in fig. 1, a D2D multi-hop ad hoc network mode is added on the basis of a standard cellular network, and coverage expansion is realized by using terminal relay. A terminal which is not in the coverage area of the base station network can communicate with other terminals through D2D, and finally is connected with the base station or the control console through multi-hop relay of a plurality of terminals to realize network access. This effectively extends the coverage of the network access in a low cost manner. And the coverage area of the base station uses the terminal to communicate with the base station, and the coverage area of the base station is not used for directly communicating with the terminal.
The communication terminals are denoted T1, T2, T3, … … in the figure. In the coverage area of the base station eNB1, the terminal T1/T2 directly returns data through a wireless network. Within the coverage area of the base station eNB2, the terminal T5 directly returns data through the wireless network. Outside the coverage area of the base station, such as a T3 terminal and a T4 terminal, the data can be transmitted to other terminals such as a T1 terminal through a D2D multi-hop network after multi-stage relay, for example, through a T2 relay, and finally, the backhaul is realized through the base station network.
Fig. 2 shows a second application scenario of the terminal access method of the terminal through communication D2D based on broadband technology of the present invention. As shown in fig. 2, in the second application scenario of the present application, the wireless access all employs a D2D multi-hop ad hoc network. The whole communication terminal is denoted T1, T2, T3, … … in the figure. T1 is connected to the router through a wired Ethernet to realize the external network connection. And forming a multi-hop self-organizing network among the T1-T5 terminal nodes. And the data of T5 sequentially passes through the relays of the terminal nodes such as T4, T3, T2, T1 and the like, finally reaches the router, and realizes the external network connection.
In this way, the wireless network is entirely composed of terminals with D2D functions, without requiring a base station. A high availability network is implemented with terminal ad hoc. The terminals within a certain distance can be found each other to form an ad hoc network. When a certain terminal node fails, other nodes can be automatically adjusted, so that network self-healing to a certain degree is realized. This greatly improves the availability and reliability of the network and, on the other hand, simplifies the maintenance work of the network.
In the prior art, the resource scheduling of the LTE system is a fast time-frequency resource allocation, and the eNodeB allocates radio resources within 1ms, and a time-frequency resource diagram of the LTE system is shown in the figure. This way it is possible for D2D to use unallocated time-frequency resources or to partially multiplex already allocated resources.
In the LTE system, as shown in fig. 4, a basic unit of time domain radio resources is a TTI (transmission time interval), and each TTI value is 1ms. Each TTI is in turn composed of 2 slots of 0.5ms, i.e. 14 OFDM symbols in a general configuration. 10 TTIs constitute one LTE radio frame.
In the frequency domain, the entire bandwidth is divided into 20khz sub-channels, corresponding to 12 consecutive 15khz sub-carriers. The size of the sub-channels is fixed and the number of sub-channels corresponding to different bandwidths is different.
In the time-frequency domain, the time domain corresponds to 0.5ms, and a unit corresponding to 1 subchannel in the frequency domain is called RB (ResouceBlock).
D2D communication typically has 4 modes: an uplink multiplexing mode, a downlink multiplexing mode, a dedicated resource mode, and a relay mode.
The multiplexing mode D2D user multiplexes the resources of the cellular users to generate the same-frequency interference, and the base station adopts reasonable resource allocation and power control, multi-antenna technology, advanced coding technology and other control links to interfere.
Dedicated resource mode-D2D user occupies a part of independent resources for end-to-end direct communication, and the remaining resources are used for cellular communication. Since the resources of the parts are orthogonal to each other, no interference is generated between the D2D communication and the cellular communication.
The relay mode (conceptually the same as the conventional cellular mode) is that D2D users relay communications through the base station, and all communication links allocate independent orthogonal channel resources without interfering with each other.
The choice of mode depends on a number of factors and also determines the different ways in which the data is synchronized and transferred.
The D2D mode selection strategy depends not only on the link quality between D2D devices and base stations, but also on specific interference environment and location information. For example, the path loss based mode selection is simple and easy but has poor performance, and only considers the channel conditions among D2D devices. For another example, when the D2D device is far from the base station, the effect of using the uplink frequency band is better than that of using the downlink frequency band; when the D2D device is closer to the base station, the downlink frequency band is better than the uplink frequency band. However, good mode selection algorithms need to take into account a number of factors and the requirements for channel measurements are higher.
The method selects a downlink frequency band.
Fig. 5 shows a schematic diagram of a D2D system frame structure adopted by the terminal UE downlink synchronization method of the terminal through communication D2D based on the broadband technology of the present invention. As shown in fig. 5, a schematic diagram of a D2D system frame structure adopted by the terminal UE downlink synchronization method of the terminal through communication D2D based on the broadband technology of the present invention is shown. The system frame structure of the D2D consists of a system superframe, a system field, a system subframe (synchronous subframe/scheduling measurement subframe) and a data subframe. The following is presented in sequence.
1) System superframe
The system super frame has a length of N, and is composed of two system half frames with equal length, and each system half frame has a length of N/2. Where the system superframe length N may be configured to be 4,8, 16, i.e., 40ms/80ms/160ms.
2) System half frame
A system superframe consists of two system fields.
The system half frame is composed of a system subframe (synchronous subframe/scheduling measurement subframe) and a data subframe, and the length is N/2. When the system superframe N is configured to be 4,8, 16 (40 ms/80ms/160 ms), the system half frame length corresponds to 2,4,8 (20 ms/40ms/80 ms).
To solve the problem of data frame resource preemption, a first system field (also referred to as the first system field) starts scheduling preemption data subframe resources in a scheduling subframe from a first node of a user, and a second system field (also referred to as the second system field) starts scheduling preemption data subframe resources in a scheduling subframe from a last node of the user.
Fig. 6 shows a sub-frame allocation diagram of a 40ms system superframe of the D2D employed in the present invention. Assume that the users corresponding to the communication terminals T1 to T5 of fig. 1-2 are UE1 to UE5. As shown in fig. 6, a 40ms system superframe allocates subframes to 5 users of UEs 1 to 5. In the system, 5 users exist, the system frame is set to 40ms, wherein the first half frame users arrange the scheduling subframes from the sequence of the users from the UE1 to the UE5, so that the data subframes are preempted from the sequence of the users from the UE1 to the UE5, and the second half system frame is opposite, and the sequence from the users from the UE5 to the UE1 occupies the scheduling subframes and preempts the data subframe resources.
3) System subframes
The system subframe includes: a synchronization subframe, a schedule measurement subframe, and a data subframe.
3.1 Synchronous subframe)
The synchronization subframe contains 2 symbols, PSS and SSS, respectively. Transmission starts at a fixed period in one subframe 0 of the system superframe. When the system super frame lengths are 40ms,80ms, and 160ms, respectively, the fixed periods corresponding to the synchronous subframes are 20ms,40ms, and 80ms. One symbol PSS sequence and one symbol SSS sequence are transmitted at synchronization subframe boundary postamble 624 Ts.
The synchronization subframe is only transmitted by the tail node for synchronization of other surrounding nodes when the system is networked.
3.2 Scheduled measurement subframes
The scheduling measurement subframe takes 1 subframe as a unit, and the corresponding position of the user system measurement subframe in the system superframe is found according to the number of the current nodes obtained after user synchronization, and the scheduling measurement subframe in the first system field sequentially performs time domain resource allocation in the system field from the head node (as shown in figure 6, UE1- > UE 5). For example, subframe 2 of user UE2 is a scheduling measurement subframe transmitted to user UE1, subframe 3 is a scheduling measurement subframe transmitted to user UE3, and so on. The scheduling measurement subframes in the second system half frame sequentially perform resource allocation from the tail node (as shown in fig. UE5- > UE 1).
Before a user establishes a connection after synchronization, a first system field is first used for access and system information transmission, and when the entire system is accessed, the position of a user scheduling measurement subframe corresponding to a second half system field is rearranged, for example, once a user UE6 is to access the system, subframe 1 of the second half system field becomes a scheduling measurement subframe sent by the user UE6 to the user 1.
The scheduling measurement subframe configures a USS channel and a PUCCH channel or RACH channel.
USS channel: for the UE to make channel time domain resource idle measurements, such as the subframes indicated in fig. 6. If UE4 does not measure USS signals in measurement scheduling subframes transmitted by UE1 and UE2, UE4 may consider subframe 123 of frame 0 to be available for reception, informing UE5, and UE5 may borrow these subframes to transmit data information to UE 4. The same holds for the subframes in the dark grey frame, taking the second half of the system field, user UE1, as an example, user UE1 does not detect USS signals in measurement scheduling subframes from user UE5, and although these data subframes are already occupied by data sent by user UE5, user UE1 can inform user UE2 that there is no collision on these subframes, and user UE2 can send data to user UE1 on these subframes according to its own data subframe occupancy condition.
PUCCH channel:
transmission of system information at access (MSG 2/MSG3/MSG4/MSG5 …);
the connection time indicates time-frequency scheduling information of the data subframes and corresponding MCS, the length of the target UE data, etc., for example, in FIG. 3, UE1 applies for data subframes 0-3 to UE2 for data transmission;
time-frequency domain scheduling information (next system superframe is in effect) for indicating that other user scheduling measurement subframes are treated as data subframes at the time of connection. For example, user 5 utilizes the scheduled measurement subframe time domain resources of users 1 and 2 for transmitting data to user 4. But this is limited to the case where user 4 does not detect USS signals for user 1 and user 2 at the corresponding time domain locations during the channel idle measurement.
The method is used for feeding back ACK information in HARQ;
the relevant measurements for UE measurements include time-frequency offset, link quality.
RACH channel:
the method is used for the lower node to initiate a random access signal to the upper node for uplink synchronization. The time domain resource of RACH is sent in the first symbol of the scheduling measurement subframe corresponding to the user.
3.3 Data subframes
The data subframe is used for transmitting data among users, and the scheduling coding information is indicated by the scheduling measurement subframe. If the data subframe occupies time domain resources outside the scheduling measurement subframe, information in the scheduling subframe takes effect in the current half frame; if the data subframe is a time domain resource occupying a scheduling subframe of other users, information in the scheduling subframe takes effect in the next system superframe. The last subframe of the continuously transmitted data subframe should leave N symbols of GAP on the schedule, and the number of N is determined by the measurement result of USS between users.
The channel adopted by the transmission protocol of the terminal through communication based on the broadband technology comprises the following components: 1) Synchronization channels, PSS channels and SSS channels; 2) Control channel, PUCCH channel and USS channel; 3) Random access channel, PRACH channel; 4) Data channel: a PUSCH channel.
1) Synchronization channel, PSS channel and SSS channel
The synchronization channel is composed of a PSS channel and an SSS channel, accounting for the middle 6 RBs of the entire transmission bandwidth. When the system superframe length is 40ms, the fixed period corresponding to the synchronization subframe is 20ms, and the period of the synchronization channel is 20ms. One SSS symbol sequence and one SSS sequence are transmitted at the subframe boundary postamble 624 Ts. As shown in fig. 6, the time-frequency position of the synchronization channel is shown. The PSS channel is composed of PSS sequences of one symbol. The PSS sequence occupies the first 0FDM signal of the synchronization subframe. The PSS sequence is generated by adopting the PSS sequence in 4 GLTE. See for details standard [ 3GPPTS36.2116.11.1 ], generated using rootindex u=38.
The SSS channel consists of an SSS sequence of one symbol, which occupies the second 0FDM symbol, accounting for the middle 6 RBs of the entire transmission bandwidth. SSS sequences were generated using SSS sequences in 4 GLTE. Please refer to the standard 3GPPTS36.2116.11.2, which is a prior art and will not be described in detail.
The 0bit of the SSS sequence represents the front and back system half frames, the lowest bit of the SSS sequence of the first system half frame is 0, and the lowest bit of the SSS sequence of the second system half frame is 1, and 1-6 bits represent the node number when in access.
And the tail node transmits the user information subframe resources which are used for synchronizing other surrounding nodes and acquiring the order number calculation of the chains in the system and correspond to the user information subframe resources.
The parameter configuration of the PSS is shown as in fig. 7.
The parameter configuration of SSS is shown in fig. 8.
2) Control channel, PUCCH & USS channel
Figure 9 is the time frequency position of the PUCCH & USS channel. The PUCCH and USS channels transmit in the first two symbols of the scheduling measurement subframe, and the PUCCH occupies the whole system of the first two symbols minus the middle 6 RBs occupied by the USS.
Fig. 10 is an RE mapping of PUCCH. The PUCCH channel consists of data and reference symbols, where the reference signals occupy fixed positions in one RB, i.e. positions of REs 1,5,9, i.e. 1/4 interval, as shown in dark squares in fig. 10. The data occupies the remaining REs in 1 RB.
The DMRS sequence is generated using an upstream DMRS sequence in 4 GLTE. See [ 3GPPTS36.2115.5.2.1 ], which is the prior art and will not be described in detail. Wherein n is cs MOD (N, 12), N is the node index corresponding to the current user from the root node. Fig. 11 shows DMRS parameter configuration.
The coding of the PUCCH adopts a POLAR coding mode of 5GNR, see [ 3GPPTS38.2125.3.1 ], which is the prior art and will not be described in detail. Wherein, the mask of 16 bits to RNTI after CRC is cancelled, and QPSK adjustment mode is adopted. Wherein, the cell id used for generating the scrambling code is the index of the node where the user is located, and the CRNTI is distributed by the superior node.
The sequence generation of USS is the same as the PSS sequence generation formula generated by PSS channel, and Root index u=25 is adopted for generation.
3) Random access channel, PRACH channel
Fig. 12 shows a PRACH parameter configuration table. The PRACH channel is sent on a dispatching measurement subframe of a first half system frame sent to the upper node by the user and is used for accessing the upper node after the user performs downlink synchronization. The PRACH starts transmitting from the first symbol of the scheduled measurement subframe, accounting for the middle 6 RBs of the system bandwidth. The RACH sequence formula [ 3GPPTS36.2116.11.2 ] applying LTE is the prior art and will not be described in detail.
4) Data channel: PUSCH channel
Fig. 13 shows a reference symbol position determined in a PUSCH channel, and as shown in fig. 13, is determined according to a length of a transmission symbol and DMRS-add-pos (DMRS-addition position) configured in scheduling information. The PUSCH channel is transmitted on a data subframe, consisting of data and reference symbols. And scheduling the time-frequency domain position and the MCS of the PUSCH in the data subframe by the MAC information in the scheduling measurement subframe. The PUSCH channel may start to transmit at any position of 14 symbols of one subframe, with a transmitted symbol length of 1-14. The reference symbol position of the PUSCH is determined according to the length of the transmission symbol and the DMRS-add-pos configured in the scheduling information, as shown in fig. 13, where l0 is the first symbol DMRS symbol from which the PUSCH starts, and the reference symbol occupies the RB scheduled by the entire PUSCH. The sequence generation formula of DMRS refers to [ 3GPPTS36.2116.11.2 ], which is the prior art and will not be described in detail.
The channel coding of PUSCH data adopts the 5G LDPC coding standard. See [ 3GPPTS38.2125.3.2 ], which is the prior art and will not be described in detail. Wherein, the cell id used for generating the scrambling code is the index of the node where the user is located, and the CRNTI is distributed by the superior node.
The protocol high layer of the invention is composed of an Access Control (AC), a data delivery layer (IPreal) and an L2 layer. The following are respectively described:
1) Access control module (AC)
An access control module (AC) is used to process system related information, and establishment of RBs.
The access control module (AC) is divided into a transmission part and a reception part. And sending the function related to the cell established by the UE and receiving the function related to the cell to be accessed.
1.1 Function of the transmitting section)
Establishing a cell, reading NV content, acquiring basic information (super frame length, system frequency points, system bandwidth and the like) of the cell, and determining a cell ID number to be established according to whether the current UE has accessed a certain cell and the accessed cell ID.
New RBs are established-there are three RBs to be established, one for the UE to communicate with the previous UE, one for the UE to communicate with the next UE, and one for receiving downlink data sent to the UE.
1.2 Function of the receiving section)
Terminal access
Processing received system information
2) IPrealay layer
The IPrealay layer is responsible for delivering data between the upper layer and the lower layer; the set-up mode is as follows:
2.1 Configured local IP address)
According to the node position of the UE in the chain, the front IP address is fixed to be 192.168.13, and the last 8 bits are the current node position. For example, the UE is the 5 th UE in the chain, and the IP address is 192.168.13.5;
the last digital small residual local IP of the destination address IP of the data to be transmitted is considered to be transmitted to the uplink direction of the chain, and so on,
2.2 Bearer establishment)
The transmitting end establishes at least one bearing, no bearing ID and only direction;
the receiving end establishes a bearing and processes IP data sent to the local machine;
the last byte value of the destination IP is passed to L2.
3) L2 layer
The L2 layer is responsible for handling non-signaling data. The L2 layer is divided into PDCP layer, RLC layer, MAC layer. Wherein, an uplink buffer function is added to process the D2D newly added cell, a part of random access function, and L1C is combined into L2 to process the flow related to physical layer resource scheduling and time sequence, and a part of random access function.
3.1 A) a transmitting section
The up-down RBs are respectively packed, no logical channel exists, and the last byte value of the IP address is used for replacing the MAC sub-head.
There are three types of data: a) traffic data from IPRELAY (data delivery layer), B) signaling data from AC, C) data generated by L2 itself (system information, MACCE, etc.).
3.2 A receiving section
If the data is the data for the UE, unpacking and then delivering to an upper layer;
if the data is forwarded, after uplink and downlink are judged, the data is put into a corresponding bearing buffer, and the sending part carries out subsequent processing;
and if the system information is the system information, carrying out subsequent scheduling according to the content.
In this protocol, the MAC mainly has RAR packets and non-RAR packets according to the packet format. Fig. 14 (a) shows a specific format of a message header of a RAR packet, and fig. 14 (B) and 14 (C) show specific formats of message headers of non-RAR packet packets.
Wherein, as shown in fig. 14 (a), the transmission and reception of the RAR packet are completed with a fixed timing, and the RAPID in the header is preambiindex in msg1, which is the generated random number.
Wherein, as shown in fig. 14 (B), the non-RAR packets are distinguished by LCID. In the non-RAR message header, E:1, followed by at least one header; e:0, which is the last header.
Fig. 14 (C) shows a specific definition of the non-RAR packet LCID.
On the basis of the RAR packet and the non-RAR packet shown in fig. 14 (a) (B) (C), the predetermined rule of the MAC layer packet is as follows:
(1) The header is preceding and the data is following, the header may include more than one header;
(2) System information is preceding (if any), data is following;
(3) If the length of the grouped packets does not reach the maximum length allowed by the MAC PDU, adding a Padding sub-head at the end of the MAC head;
(4) The last subheader has no length;
(5) If the length of the grouped packets +2= maximum length allowed by MAC PDU, MAC PDU starts two bytes filled with 0xff, then it is the sub-header;
(6) If the length of the grouped packets +1= maximum length allowed by MAC PDU, MAC PDU starts one byte to fill 0xff, then it is the sub-header;
(7) If the length of the grouped packets= = maximum length allowed by mac pdu, mac pdu does not contain 0xff, directly is a sub-header.
Wherein, the predetermined rule of the MAC layer unpacking is as follows:
when the data packet to be transmitted is large and larger than the transmission length provided by the MAC, the IP packet needs to be split, which requires adding one byte of information to accomplish this, which we call the unpacking information byte. The MAC packets place the unpacking information byte in front of the data, i.e. it is treated as part of the data. The unpacking information byte is composed of two parts: the rightmost 6bits represent node numbers, and the purpose is to tell the target node to whom the ip packet is given, and the leftmost two bits represent that the slice is sitting in the ip packet:
00: no subpackaging is carried out;
01: the beginning of the IP packet;
10: a middle packet of IP packets;
11: the last part of the IP packet.
There may be three cases depending on the size of the IP packet: a) This IP packet is not split; b) This IP packet is split into two parts: a beginning and a last portion; c) The IP packet is split into three parts: beginning, middle and last part.
The function of generating the MAC scheduling information, namely generating the scheduling information in the system measurement subframe, comprises the following steps:
(1) And the user is responsible for generating the time-frequency information of the data subframes of the user to the upper node and the lower node according to the occupation condition of the current data subframes and the result of the idle measurement of the channel.
(2) And is responsible for updating the data subframe occupancy of the entire superframe.
(3) And the MCS of the data subframe is generated according to the quality of the reporting channel of the L1 layer.
(4) The lower node TA value responsible for the measurement according to the L1 layer.
Specifically, fig. 15 shows a MAC scheduling information diagram.
Based on the definition, the terminal synchronization method of the terminal through communication of the application firstly searches PSS synchronization channels through downlink synchronization flow UE, then searches SSS synchronization channels, finally calculates RSRP according to DMRS, and confirms final synchronization.
Fig. 16 shows a schematic flow diagram of a terminal synchronization method of the terminal through communication based on the broadband technology of the present invention.
As shown in fig. 16, the terminal UE downlink synchronization method for the terminal through communication in the present application includes the following steps:
s10: the UE searches for the PSS synchronization channel, specifically including,
s101: the UE performs PSS searching in a period corresponding to the configuration length of the system superframe;
as described above, the system superframe is composed of N subframes (e.g., subframes of length 1 ms), and is denoted as a length N of the system superframe. One system superframe is divided into two system half frames. Each system field has a length of N/2. Where N may be configured as 4,8, 16, i.e., the system superframe corresponds to a period of 40ms/80ms/160ms.
In this step, the UE performs PSS search with a period corresponding to the system superframe configuration length, that is, 40ms/80ms/160ms.
In the invention technology related to the protocol, except for triggering and sending the synchronous information according to the command, the UE initially searches for the synchronous state for the PSS.
S102: the PSS synchronization channel is transmitted at the period beginning at 0 subframe of the first frame of the system half frame, and a sequence of PSS of one symbol and a sequence of SSS of one symbol are transmitted at a fixed period T2 (e.g., 624 Ts) after the subframe boundary.
As shown in fig. 6, a 40ms system superframe, 5 user subframe allocation map. In order to solve the problem of data frame resource preemption, the first system half frame starts to schedule and preempt data subframe resources in a scheduling frame from a first node of a user, and the second system half frame starts to schedule and preempt data subframe resources in the scheduling frame from a last node of the user. As shown in fig. 3, in the system, 5 users and a system frame are set to 40ms, wherein the first half frame users arrange the scheduling subframes in the sequence of 1-5, so that the data subframes are preempted in the sequence of 1-5, and the second half system frame occupies the scheduling subframes and preempts the data subframe resources in the sequence of 5-1.
Furthermore, the tail node only transmits the PSS sub-frame when the system is networked. As such, to synchronize with other surrounding nodes.
S11: and judging whether the peak value of the PSS exceeds a threshold, if so, executing step S12.
S12: the UE searches for SSS synchronization channels.
S13: and judging whether the peak value of the SSS exceeds a threshold, if so, executing step S14.
S14: and the UE acquires an SSS sequence corresponding to the SSS exceeding judgment threshold, the number of the current user nodes of the front system half frame is 0bit, the number of the current user nodes of the rear system half frame SSS sequence is 1bit, and a system information subframe in a scheduling measurement subframe occupied by the UE is determined.
As described above, before the user establishes a connection after synchronization, the first system field (i.e., the first system field) is first used for access and system information transmission, and when the entire system is accessed, the position of the user scheduling measurement subframe corresponding to the second system field is rearranged, for example, once the user UE6 wants to access the system, the subframe 1 of the second system field becomes the scheduling measurement subframe transmitted by the user 6 to the user 1.
The scheduling measurement subframe takes 1 subframe as a unit, and the corresponding position of the user system measurement subframe in the system superframe is found according to the number of the current nodes obtained after user synchronization, and the scheduling measurement subframe in the first system field sequentially performs time domain resource allocation in the system field from the head node (as shown in figure 6, UE1- > UE 5). For example, subframe 2 of user UE2 is a scheduling measurement subframe transmitted to user UE1, subframe 3 is a scheduling measurement subframe transmitted to user UE3, and so on. The scheduling measurement subframes in the second system half frame sequentially perform resource allocation from the tail node (as shown in fig. UE5- > UE 1).
The scheduling measurement subframe configures a USS channel and a PUCCH channel or RACH channel.
In S14, the number of current user nodes of the front system field of the SSS sequence corresponding to the SSS overrun judgment threshold is 0bit, and the number of current user nodes of the rear system field SSS sequence is 1bit;
the corresponding 0bit of the SSS sequence represents the front and back system half frames, the lowest bit of the SSS sequence of the first system half frame is 0, and the SSS sequence of the second system half frame is 1, wherein 1-6 represents the number of the current user nodes.
See fig. 17 for a time-frequency position diagram of the synchronization channel. As shown in fig. 17, SSS is at the latter symbol position of PSS.
S15: according to the PSS and SSS synchronous channels, TCA and FCA calculation of a frequency domain is carried out, and time sequence and AFC are adjusted so as to carry out time frequency offset correction;
s16: calculating RSRP according to the periodically grabbed PSS and SSS synchronous signals, determining whether to access the UE according to the strength of the PRSP, and executing step S15 if so;
s17: and adjusting DL_Timing to perform downlink synchronization according to PSS and SSS synchronization, and calculating the starting position of a system superframe and the position of the subframe where the system superframe is currently positioned.
After judging that the RSRP decides to access the UE, adjusting the DL_Timing to carry out downlink synchronization according to the PSS and the SSS synchronization, and calculating the starting position of the superframe and the position of the subframe where the superframe is currently positioned.
In this way, the terminal synchronization method of the terminal through communication of the application searches the PSS synchronization channel through the downlink synchronization flow UE, searches the SSS synchronization channel, calculates the RSRP according to the DMRS, confirms the final synchronization position and completes synchronization. In this way, the UE completes synchronization with other surrounding user nodes.
The terminal through communication technology based on the broadband technology can carry out the step of UE access after UE synchronization, adopts a random access process, and is continuously described.
As shown in fig. 18, a schematic diagram of a terminal access method of the terminal through communication D2D based on the broadband technology in the present application is shown.
As described above, the protocol upper layer of the present invention is composed of an Access Control (AC), a data delivery layer (ipreal), and an L2 layer. The terminal access method of the terminal through communication D2D based on the broadband technology is completed by a protocol high layer.
MSG1
After synchronization, MSG1 is sent on the scheduling measurement subframe of the user calculated according to the node index before the point in the first half frame, the MSG1 information, for example PreambleFormat, NCS, U and High-speed-flag are all defined by initialization, and the sent frequency domain position is the middle 6 RBs.
S20: the AC (access control layer) informs the MAC (medium access control layer) to perform cell search;
s21: the MAC sends the cell search result to the AC;
the MAC sends a terminal access request, wherein the request message carries the detected preamble, specifically, the MAC calculates a frame structure according to information (upper and lower half frame indication, existing node number) in the SSS and sends information I in the SSS to the AC;
optionally, in step S211, when the MAC sends the cell search result to the AC, if multiple cells are searched, the MAC selects one cell according to a predetermined rule to report, so as to avoid performing cell search again when camping (camp on).
S22: the AC confirms that the cell is accessible;
s23: the AC informs the MAC to initiate competitive access and sends MSG3 carrying ID number;
specifically, the AC selects which terminal's RACH request message to receive and notifies the MAC reply MSG2.
Contention access refers to that after the access node sends PRACH, the MSG2 judges that the received PRACH is identical to the Preamble-idx of the access node, and the MSG3 is sent in the latest corresponding information subframe to perform the contention access flow. If contention access is not considered, MSG3 is completed for random access. After receiving the access completion, the root node stops sending the synchronization information and sends MSG4 to inform the lower node that the establishment is completed. The node that has completed the establishment starts sending a synchronization signal.
Parameters of the MSG2 and MSG4 are shown in fig. 19 (a) and 19 (B), respectively.
MSG2
And the sending node of the synchronous information performs RACH searching on the corresponding resources, selects a nearest UE from the RACH, and receives the system information including TA, preamble-idx, RNTI and the like in MSG2 on a scheduling subframe of a receiving upper node corresponding to the user in the front system field of the next system super frame.
S24: and the MAC reports the MSG4 carried in the transmission message.
The parameter setting of MSG4 is shown in fig. 19 (B).
S25: and the AC judges whether the access request of the UE of the cell is received, selects whether to grant the access of the UE according to the link condition, and sends the unique identification number of the access UE carried by the MSG4 to the MAC.
Optionally, the step S25 further includes:
s251: judging whether the UE to be accessed is an initial node or not;
s252: if yes, executing the following access steps;
s253: if not, it is determined whether the UE initial state is a synchronization state?
S254: if yes, carrying out a random access process.
S26: the MAC completes UE access, transmits messages MSG5 to AC, and informs the subordinate UE that the access is successful;
s27: and the AC judges whether the access is successful, if so, the MSG5 sends an ACK back to confirm that the cell access is successful.
Optionally, the terminal access method of the terminal through communication based on the broadband technology further comprises the following steps for subsequent data communication.
S28: the AC informs the MAC to establish a new RB;
as described above, RBs are established—there are three RBs to be established: one for the UE to communicate with the UE at the upper level, one for the UE to communicate with the UE at the lower level, and one for receiving downlink data transmitted to the UE.
Optionally, the AC notifies the L1C to stop sending the synchronization signal;
s29: the MAC indicates that the new RB establishment was successful;
s30: the AC reports the current access status to the ATMT and IPRELAY.
As described above, the ipRELAY (data delivery layer) is part of the higher layers of the protocol.
Optionally, the terminal access method of the terminal through communication based on the broadband technology further comprises the following steps,
s31: the AC judges whether the current UE is the first node in the link, if so, the AC informs the DHCP of configuring the IP;
s32: the AC determines whether the current UE is the last node in the link, and if not, the AC informs the L1C to establish a new cell.
As described above, the specific manner in which the AC establishes a new cell is to read the NV content, obtain the basic information of the cell (superframe length, system frequency point, system bandwidth, etc.), and determine the cell ID number to be established according to whether the current UE has accessed a certain cell and the accessed cell ID.
Fig. 3 shows an inter-UE chain networking mode adopted by the terminal access method of the terminal through communication D2D based on the broadband technology. As shown in fig. 3, after receiving a request for establishing a link from a head node UE1, a synchronization signal is sent, after the surrounding nodes search for the synchronization signal, access is requested to the UE1, after receiving the request, the UE1 selects a UE2 closest to the UE1 to perform access connection, after the access is successful, the UE1 and the UE2 establish a communication link, the UE1 stops sending the synchronization signal, the UE2 starts sending the synchronization signal, after receiving the signal, the surrounding nodes request the UE2 for connection, the UE2 selects a closest UE3 to establish the communication link, and so on. The head node only communicates with the lower node, the tail node only communicates with the upper node, and the middle node communicates with the upper and lower UEs.
The invention relates to a terminal access method of terminal through communication D2D based on broadband technology, aiming at enabling UE outside signal coverage to access a network through relay UE based on the newly proposed terminal through communication protocol technology, thereby being widely applied to terminal relay scene and effectively expanding coverage area of network access and remote data return in a low-cost mode. The biggest difference of the D2D communication technology is that it uses the licensed band of the telecom operator, its interference environment is controllable, and the data transmission has higher reliability.
In addition, bluetooth needs manual pairing when transferring files, and user configuration is also needed when accessing to WLAN connection points, and D2D communication can be automatically connected; meanwhile, the similar technologies work on an unlicensed frequency band, and compared with the D2D communication connection working on the licensed frequency band, the similar technologies are not stable enough and not reliable enough. In addition, the short-range direct communication can effectively lighten the burden of the base station, reduce the transmitting power of the terminal equipment and reduce the transmission delay.
Under the condition of keeping the advantages of the cellular network, the coverage area of network access is expanded by using the D2D multi-hop self-organizing network at low cost, so that the high-bandwidth flexible configuration of 1.4M-100M and high-speed and video service are supported, and meanwhile, compared with a WIFI communication mode, the communication distance is farther, the frequency band is more flexible, and the safety is higher.
Fig. 20 is a schematic entity structure diagram of an electronic device of a terminal access system for terminal through communication based on broadband technology according to an embodiment of the present invention, as shown in fig. 20, where the electronic system includes: a processor (processor) 101, a memory (memory) 102, and a bus 103; the processor 101 and the memory 102 complete communication with each other through the bus 103. The processor 101 is configured to invoke program instructions in the memory 102 to perform the methods provided by the method embodiments described above.
The present embodiments disclose a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, are capable of performing the methods provided by the method embodiments described above. The present embodiment provides a non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the methods provided by the above-described method embodiments. Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware associated with program instructions, where the foregoing program may be stored in a computer readable storage medium, and when executed, the program performs steps including the above method embodiments; and the aforementioned storage medium includes: various media that can store program code, such as ROM, RAM, magnetic or optical disks. The above-described embodiments of electronic devices and the like are merely illustrative, wherein the elements described as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the embodiments of the present invention, and are not limited thereto; although embodiments of the present invention have been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present invention.

Claims (8)

1. A terminal access method of terminal through communication based on broadband technology comprises the following steps:
s20: the access control module layer AC informs the medium access control layer MAC to search the cell;
s21: the media access control layer MAC sends the cell search result to the access control layer AC;
s22: the access control module layer AC confirms that the cell can be accessed;
s23: the access control module layer AC informs the medium access control layer MAC to initiate competitive access and sends MSG3 carrying ID number;
s24: the media access control layer MAC sends MSG4 carried in the transmission message to the access control layer AC;
s25: the access control module AC judges whether the access request of the UE of the cell is received, selects whether to grant the access of the UE according to the link condition, and sends the unique identification number carried by MSG4 and accessed to the UE to the Media Access Control (MAC);
S26: the media access control module MAC completes UE access, and transmits a message MSG5 to the access control module AC to inform the lower UE that the access is successful;
s27: the access control module layer AC judges whether the access is successful or not, if so, the MSG5 is sent to reply ACK, and the success of the cell access is confirmed.
2. The method for accessing a terminal through communication based on broadband technology as claimed in claim 1, wherein in the step S21, when the medium access control layer MAC sends the cell search result to the access control layer AC, if a plurality of cells are searched, the medium access control layer MAC selects one cell according to a predetermined rule to report, so as to avoid cell search again during residence.
3. The terminal access method of terminal through communication based on broadband technology as claimed in claim 2, wherein, after the UE transmits PRACH, the UE receives MSG2 and determines that the same as its Preamble-idx, and transmits MSG3 in the nearest corresponding information subframe for contention access.
4. The terminal access method of terminal through communication based on broadband technology as claimed in claim 1, wherein the step S25 further comprises:
s251: the access control module AC determines whether the current UE is the first node in the link,
S252: if yes, notifying the dynamic address configuration DHCP configuration IP;
s253: if not, judging whether the initial state of the UE is a synchronous state;
s254: if yes, carrying out a random access process.
5. The terminal access method for terminal through communication based on broadband technology as claimed in claim 1, the method further comprising:
s28: the access control module layer AC informs the medium access control layer MAC to establish a resource block RB for the communication between the UE and the upper-level UE and a new resource block RB for receiving the downlink data sent to the UE;
s29: the Media Access Control (MAC) layer indicates that the new Resource Block (RB) is successfully established;
s30: the access control module layer AC reports the current access state to the ATMT and the data delivery layer IPRELAY.
6. The terminal access method for terminal through communication based on broadband technology as claimed in claim 1, the method further comprising:
s31: the access control module layer AC judges whether the current UE is the first node in the link, if yes, the DHCP configuration IP is notified;
s32: the access control module layer AC judges whether the current UE is the last node in the link, if not, the access control module layer AC informs the L1C of establishing a new cell.
7. A terminal access system for terminal through communication based on broadband technology, characterized in that the system comprises a memory and a processor, the memory stores a computer program, and the computer program when executed by the processor causes the processor to execute the terminal access method for terminal through communication based on broadband technology according to any one of claims 1 to 6.
8. A storage medium having stored thereon computer program instructions executable by a processor to implement a terminal access method of broadband technology based terminal pass through communication according to any of claims 1-6.
CN202110252851.5A 2021-03-09 2021-03-09 Terminal access method for terminal through communication based on broadband technology Active CN112995961B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110252851.5A CN112995961B (en) 2021-03-09 2021-03-09 Terminal access method for terminal through communication based on broadband technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110252851.5A CN112995961B (en) 2021-03-09 2021-03-09 Terminal access method for terminal through communication based on broadband technology

Publications (2)

Publication Number Publication Date
CN112995961A CN112995961A (en) 2021-06-18
CN112995961B true CN112995961B (en) 2023-12-22

Family

ID=76335296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110252851.5A Active CN112995961B (en) 2021-03-09 2021-03-09 Terminal access method for terminal through communication based on broadband technology

Country Status (1)

Country Link
CN (1) CN112995961B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005563A (en) * 2018-08-22 2018-12-14 武汉虹信通信技术有限责任公司 A kind of LTE load-balancing method and system
WO2019104545A1 (en) * 2017-11-29 2019-06-06 Qualcomm Incorporated Nb iot optimized connected mode rach handling to improve throughput
CN111083798A (en) * 2018-10-22 2020-04-28 普天信息技术有限公司 Random access method and device based on competition
WO2020091315A1 (en) * 2018-10-31 2020-05-07 엘지전자 주식회사 Method for relay terminal to transmit and receive signals in wireless communication system and device for same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019104545A1 (en) * 2017-11-29 2019-06-06 Qualcomm Incorporated Nb iot optimized connected mode rach handling to improve throughput
CN109005563A (en) * 2018-08-22 2018-12-14 武汉虹信通信技术有限责任公司 A kind of LTE load-balancing method and system
CN111083798A (en) * 2018-10-22 2020-04-28 普天信息技术有限公司 Random access method and device based on competition
WO2020091315A1 (en) * 2018-10-31 2020-05-07 엘지전자 주식회사 Method for relay terminal to transmit and receive signals in wireless communication system and device for same

Also Published As

Publication number Publication date
CN112995961A (en) 2021-06-18

Similar Documents

Publication Publication Date Title
US11690096B2 (en) Method for controlling access of terminal in communication system
EP3506708B1 (en) Method and apparatus for transmitting data in rrc deactivated state
US11219035B2 (en) Method and apparatus for deprioritizing duplicated packet transmission in wireless communication system
US11516633B2 (en) V2X communication method of terminal in wireless communication system and apparatus using same method
CN110612688B (en) Method for transmitting signal by terminal for V2X communication in wireless communication system and terminal using the same
KR102258653B1 (en) A method of allocating power of a terminal configured with a plurality of carriers and a terminal using the method
US20210185559A1 (en) Method and apparatus for deprioritizing packet transmission based on reliability level or congestion level in wireless communication system
KR20180035719A (en) Method and apparatus for transmitting data in rrc inactive state or rrc active state
KR20220050896A (en) Methods and devices for reporting information, methods and devices for receiving messages
CN112189367B (en) Method and user equipment for configuring standby paging opportunities in a new radio unlicensed network
TW202014038A (en) Method for determining listen before talk and channel access priority class and user equipments thereof
KR20070107619A (en) A method for random access in cellular system
JP7440426B2 (en) How to control terminal connections in a communication system
TWI640215B (en) Methods and apparatus for cell access via anchor carrier
CN110999446B (en) Method and apparatus for transmitting signal in system supporting multiple TTI lengths
CN113170477A (en) Channel access priority level for signaling radio bearers in unlicensed new radios
CN112398632B (en) Uplink transmission method and user equipment
WO2013173505A1 (en) Distributed interference management algorithm
CN111201816B (en) Method and apparatus for a terminal to set transmission power for multiple CCs during carrier aggregation in a wireless communication system
US9807713B2 (en) Synchronization in communications networks
CN112995959B (en) Channel configuration method for terminal direct communication based on broadband technology
KR20220011409A (en) Method and apparatus for partial sensing for device-to-device communication in wireless communication system
CN112995961B (en) Terminal access method for terminal through communication based on broadband technology
CN112995960B (en) Data transmission method for direct communication of chained networking terminal
CN112996100B (en) Terminal downlink synchronization method for terminal through communication based on broadband technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231130

Address after: Northeast of the intersection of Sidingshan Road and Manquan Road, Hefei Circular Economy Demonstration Park, Feidong County, Hefei City, Anhui Province, 230000

Applicant after: Anhui Rongzhao Intelligent Co.,Ltd.

Address before: 101400 room 1124, 80 Huanzhen Road, Bohai Town, Huairou District, Beijing

Applicant before: Beijing Guozhi Zhonghe Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant