CN113133126B - Method, terminal and network equipment for converting working frequency points - Google Patents

Method, terminal and network equipment for converting working frequency points Download PDF

Info

Publication number
CN113133126B
CN113133126B CN202010043823.8A CN202010043823A CN113133126B CN 113133126 B CN113133126 B CN 113133126B CN 202010043823 A CN202010043823 A CN 202010043823A CN 113133126 B CN113133126 B CN 113133126B
Authority
CN
China
Prior art keywords
random access
bwp
pdsch
terminal
command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010043823.8A
Other languages
Chinese (zh)
Other versions
CN113133126A (en
Inventor
吴昱民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010043823.8A priority Critical patent/CN113133126B/en
Publication of CN113133126A publication Critical patent/CN113133126A/en
Application granted granted Critical
Publication of CN113133126B publication Critical patent/CN113133126B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Abstract

The embodiment of the invention provides a method, a terminal and network equipment for converting working frequency points, wherein the method for converting the working frequency points comprises the following steps: receiving a BWP conversion command in a process of monitoring a random access response of an initiated random access process; performing a BWP transformation, or ignoring the BWP transformation command. According to the embodiment of the present invention, when the terminal receives the BWP change command during the process of monitoring the random access response of the random access procedure (such as the 2-step random access procedure), the terminal may perform BWP change or ignore the BWP change command, so as to clarify the terminal behavior and reduce the number of times of random access initiation while avoiding the random access failure as much as possible.

Description

Method, terminal and network equipment for converting working frequency points
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, a terminal, and a network device for changing a working frequency point.
Background
Currently, for an initiated random access procedure, such as a 2-step random access procedure, a terminal may receive a BWP (Bandwidth Part) conversion command during listening for a random access response. But in this case, the terminal behavior is not yet determined.
Disclosure of Invention
The embodiment of the invention provides a method, a terminal and network equipment for converting working frequency points, which are used for solving the problem that the terminal behavior is not determined under the condition that a BWP conversion command is received by the terminal in the process of monitoring a random access response.
In order to solve the above technical problem, the embodiment of the present invention is implemented as follows:
in a first aspect, an embodiment of the present invention provides a method for transforming working frequency points, which is applied to a terminal, and includes:
receiving a BWP conversion command in a process of monitoring a random access response of an initiated random access process;
performing a BWP transformation, or ignoring the BWP transformation command.
In a second aspect, an embodiment of the present invention provides a method for converting working frequency points, which is applied to a network device, and includes:
receiving a random access request of a terminal;
in case of transmitting the random access response, the BWP conversion command is not transmitted.
In a third aspect, an embodiment of the present invention provides a terminal, including:
a first receiving module, configured to receive a BWP conversion command during a procedure of monitoring a random access response of an initiated random access procedure;
a processing module for performing a BWP transformation, or ignoring the BWP transformation command.
In a fourth aspect, an embodiment of the present invention provides a network device, including:
a second receiving module, configured to receive a random access request of a terminal;
a sending module, configured to not send the BWP conversion command when sending the random access response.
In a fifth aspect, an embodiment of the present invention provides a communication device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the computer program, when executed by the processor, implements the steps of the method for converting operating frequency points. The communication device may be selected as a terminal or a network device.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method for transforming operating frequency points.
In the embodiment of the present invention, when the terminal receives the BWP change command during the process of monitoring the random access response of the random access procedure (e.g. 2-step random access procedure), the terminal may perform BWP change, or ignore the BWP change command, so as to clarify the terminal behavior, and reduce the number of times of random access initiation while avoiding random access failure as much as possible.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a flowchart of a 2-step random access procedure in an embodiment of the present invention.
FIG. 2 is a flowchart of a method for transforming operating frequency points according to an embodiment of the present invention;
fig. 3 is a flowchart of another method for transforming operating frequency points according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a network device according to an embodiment of the present invention;
fig. 6 is a second schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 7 is a second schematic structural diagram of a network device according to an embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
The wireless communication system of the embodiment of the invention comprises a terminal and network equipment. The terminal may also be referred to as a terminal Device or a User Equipment (UE), and the terminal may be a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), or a vehicle-mounted Device, and the specific type of the terminal is not limited in the embodiment of the present invention. The network device may be a Base Station or a core network, wherein the Base Station may be a 5G or later-version Base Station (e.g., a gNB, a 5G NR NB, etc.), or a Base Station in other communication systems (e.g., an eNB, a WLAN access point, or other access points, etc.), and the Base Station may be referred to as a node B, an enodeb, an access point, a Base Transceiver Station (BTS), a radio Base Station, a radio Transceiver, a Basic Service Set (BSS), an Extended Service Set (ESS), a node B, an evolved node B (eNB), a home node B, a home evolved node B, a WLAN access point, a WiFi node, or some other suitable terminology in the field, and is not limited to a specific terminology as long as the same technical effect is achieved.
Optionally, the random access procedure in the embodiment of the present invention may be selected as a 2-step random access procedure (2-step RACH procedure), and further may be selected as a 2-step random access procedure in a connected state. As shown in fig. 1, the corresponding 2-step random access procedure may include the following steps:
step 11: a network device such as the gNB configures configuration information for the 2-step RACH for the UE. For example, the configuration information includes: and sending resource information corresponding to the random access request (MsgA) and the random access response (MsgB).
Step 12: the UE triggers a 2-step RACH procedure, sending MsgA to the gNB, such as over a PUSCH (Physical Uplink Shared Channel), which includes a UE identity (UE ID). Meanwhile, the UE may also send PRACH (Physical Random Access Channel) information to the gNB.
Step 13: after sending MsgA, the UE listens for MsgB reception for a certain period of time (e.g., within a RAR (Random Access Response) reception time window). While during the listening to MsgB, i.e., before the triggered 2-step RACH procedure is finished, the UE may receive a Bandwidth Part (BWP) change command (e.g., C-RNTI PDCCH indicates the target BWP identity for the change).
In addition, if the UE fails to receive MsgB, msgA may be resent.
For a connected UE, in case of triggering 2-step RACH due to "uplink data arrival and uplink out-of-sync", after the gNB successfully receives MsgA, the gNB will send MsgB. For the MsgB transmission, the gNB may schedule transmission of a Downlink PDSCH (Physical Downlink Shared Channel) through a Physical Downlink Control Channel (PDCCH) (Cell Radio Network Temporary Identity ), where the PDSCH may include a MAC CE (media access Control Element) for Absolute uplink Timing of the UE (i.e., an Absolute Timing Advance Command MAC CE) for uplink synchronization of the UE.
Optionally, for the 2-step random access process, the random access request may also be denoted as Msg1, and the corresponding random access response is denoted as Msg2, which is not limited in this embodiment.
Optionally, the UE may be configured with a plurality of different frequency ranges in 1 cell. The UE can only have 1 BWP active at the same time. A network device such as the gNB may transform the UE-activated BWP by carrying the transformed target BWP identification through C-RNTI PDCCH.
Referring to fig. 2, fig. 2 is a flowchart of a method for transforming operating frequency points according to an embodiment of the present invention, where the method is applied to a terminal, and as shown in fig. 2, the method includes the following steps:
step 201: in listening for a random access response of an initiated random access procedure, a BWP change command is received.
Alternatively, the random access procedure in this embodiment may be a 2-step random access procedure (2-step RACH procedure) in a connected state, that is, a 2-step RACH procedure triggered by a terminal in a connected state. The BWP transform command is sent, for example, through C-RNTI PDCCH carrying the transformed target BWP id to transform the terminal-activated BWP.
For example, a connected UE initiates a 2-step RACH procedure due to uplink failure and uplink data arrival, and sends MsgA, where the MsgA includes an identity C-RNTI of the UE. Thereafter, the UE listens to the MsgB for reception and, in the course of listening to the MsgB, receives the BWP transform command.
Step 202: performing a BWP transformation, or ignoring the BWP transformation command.
Wherein ignoring the BWP transform command in this step 202 may be understood as discarding the BWP transform.
In the method for transforming the working frequency points in the embodiment of the invention, when the terminal receives the BWP transformation command in the process of monitoring the random access response of the initiated random access process (such as a 2-step random access process), the BWP transformation can be executed or the BWP transformation command is ignored, so that the terminal behavior is defined, and the random access initiation times are reduced under the condition of avoiding the random access failure as much as possible.
Optionally, before performing the BWP transform in step 202, the method may further include:
determining whether to perform BWP transform according to whether the BWP transform command includes scheduling information of a PDSCH.
As an optional implementation manner, if the BWP conversion command includes scheduling information of the PDSCH, determining to perform BWP conversion; and if the BWP conversion command does not include the scheduling information of the PDSCH, determining not to perform BWP conversion.
Optionally, the performing BWP transformation in step 202 may further include the following cases:
case 1: and if the received BWP conversion command comprises scheduling information of a PDSCH, executing the BWP conversion.
In this case 1, if a random access response is received on the PDSCH, the terminal may determine that the initiated random access procedure is successfully completed. And if no random access response is received on the PDSCH, the terminal may stop the initiated random access procedure.
Case 2: and if the received BWP conversion command does not comprise the scheduling information of the PDSCH, executing the BWP conversion.
In this case 2, the terminal may stop the initiated random access procedure after performing the BWP transform.
Alternatively, for the above cases 1 and 2, after stopping the initiated random access procedure, the terminal may reinitiate the random access procedure. If, during the process of re-initiating the random access procedure, an absolute uplink timing MAC CE is received outside the receiving time window of the random access response (e.g., msgB) and (e.g., the absolute uplink timing MAC CE is received before the MsgB receiving timer (e.g., msgB-ResponseWindow) is started, or the absolute uplink timing MAC CE is received before the MsgA is sent), the terminal may discard the absolute uplink timing MAC CE or not apply the uplink timing value indicated in the absolute uplink timing MAC CE.
Optionally, the reinitiating the random access procedure may include: if the target BWP indicated by the received BWP conversion command configures the random access resource, re-initiating the random access process on the target BWP; or, if the target BWP indicated by the received BWP conversion command does not configure the random access resource, re-initiating the random access procedure on the first BWP, where the first BWP is a preset BWP configured with the random access resource, for example, the preset BWP is an initial BWP agreed by the protocol.
Optionally, the type of the initiated random access procedure is the same as the type of the re-initiated random access procedure. For example, if the type of the random access procedure stopped by the UE is 2-step RACH, the type of the random access procedure initiated again is also 2-step RACH.
In one embodiment, for a connected 2-step RACH procedure, after the UE sends MsgA, in the process of receiving MsgB, if a BWP change command is received (e.g., via C-RNTI PDCCH):
1) If the BWP switch command includes scheduling information for the downlink PDSCH, the UE selects to perform BWP switching. Further, if the PDSCH scheduled by the C-RNTI PDCCH of the UE contains Msg2 information of the UE, the UE may determine that the 2-step RACH procedure is successfully completed; and if the PDSCH scheduled by the C-RNTI PDCCH of the UE does not contain the Msg2 information of the UE, the UE can stop the 2-step RACH process and reinitiate the 2-step RACH process at the target BWP.
2) If the BWP transform command does not include scheduling information for the downlink PDSCH, the UE selects to perform BWP transform. Further, after selecting to perform BWP transition, the UE may stop the 2-step RACH procedure and re-initiate the 2-step RACH procedure at the target BWP.
In this embodiment of the present invention, after performing BWP conversion in step 202, the terminal behavior may further include any one of the following:
(1) The initiated random access procedure is stopped.
Further, the stopping of the initiated random access procedure in (1) may include:
stopping the initiated random access process if the received BWP conversion command comprises scheduling information of a PDSCH and no random access response is received on the PDSCH;
or, if the received BWP change command does not include the scheduling information of the PDSCH, stopping the initiated random access procedure.
Further, the terminal may re-initiate the random access procedure after stopping the initiated random access procedure. If the absolute uplink timing MAC CE is received outside the receiving time window of the random access response (e.g., msgB) during the process of re-initiating the random access procedure (e.g., the absolute uplink timing MAC CE is received before the MsgB receiving timer (e.g., msgB-ResponseWindow) is started, or the absolute uplink timing MAC CE is received before the MsgA is sent), the terminal may discard the absolute uplink timing MAC CE, or not apply the uplink timing value indicated in the absolute uplink timing MAC CE.
Optionally, the reinitiating the random access procedure may include: if the target BWP indicated by the received BWP conversion command configures the random access resource, re-initiating the random access process on the target BWP; or, if the target BWP indicated by the received BWP conversion command does not configure the random access resource, re-initiating the random access procedure on the first BWP, where the first BWP is a preset BWP configured with the random access resource, for example, the preset BWP is an initial BWP agreed by the protocol.
Optionally, the type of the initiated random access procedure is the same as the type of the re-initiated random access procedure. For example, if the type of the random access procedure stopped by the UE is 2-step RACH, the type of the random access procedure initiated again is also 2-step RACH.
(2) If the received BWP change command includes scheduling information of the PDSCH and a random access response (e.g., including an absolute uplink timing MAC CE) is received on the PDSCH, it is determined that the initiated random access procedure is successfully completed.
(3) If the received BWP change command includes scheduling information of the PDSCH and a random access response (e.g., including an absolute uplink timing MAC CE) is received on the PDSCH, discarding the random access response (e.g., discarding the received absolute uplink timing MAC CE or not applying the uplink timing value indicated in the absolute uplink timing MAC CE).
In another embodiment, for the connected 2-step RACH procedure, after the UE sends MsgA, in the process of receiving MsgB, if the BWP change command is received, the UE behavior includes any one of the following:
executing BWP transformation and abandoning the BWP transformation.
Further, after performing BWP transformation, the UE behavior may include any of:
1) The UE stops the 2-step RACH procedure in progress.
2) If the BWP change command does not include scheduling information of the downlink PDSCH (e.g., the BWP change command includes an Uplink grant for PUSCH transmission), the UE stops the 2-step RACH procedure in progress.
3) If the BWP change command includes scheduling information of a downlink PDSCH, the UE receives MsgB on the PDSCH. Thereafter, the UE behavior includes any one of:
if the MsgB content corresponding to the UE is received on the PDSCH (e.g., the MsgB contains an absolute uplink timing MAC CE), the UE determines that the 2-step random access procedure is successfully completed.
If the MsgB content corresponding to the UE is received on the PDSCH (e.g., the MsgB contains an absolute uplink timing MAC CE), the UE discards the MsgB content (e.g., the UE discards the received absolute uplink timing MAC CE, or does not apply the uplink timing value indicated in the absolute uplink timing MAC CE).
Iii if the MsgB content corresponding to the UE is not received on the PDSCH (e.g., the MsgB does not contain the absolute uplink timing MAC CE), the UE stops the 2-step RACH procedure in progress.
Further, according to the above-mentioned determination condition, if the UE stops the 2-step RACH procedure in progress (e.g., stops the MsgB reception timer (e.g., msgB-ResponseWindow)), the UE re-initiates the random access procedure.
Further, if the absolute uplink timing MAC CE is received outside the receiving time window of the MsgB during the "UE re-initiates the random access procedure" (e.g., the UE re-initiates the random access procedure, the absolute uplink timing MAC CE is received before the MsgB receiving timer (e.g., msgB-ResponseWindow) starts), or the UE re-initiates the random access procedure, the absolute uplink timing MAC CE is received before the MsgA is sent, the UE discards the received absolute uplink timing MAC CE, or does not apply the uplink timing value indicated in the absolute uplink timing MAC CE.
Further, if the UE re-initiates the random access procedure, the type of the re-initiated random access procedure is the same as the type of the random access procedure that was stopped last time. For example, if the type of the random access procedure stopped by the UE is 2-step RACH, the type of the random access procedure restarted is also 2-step RACH.
Further, if the UE re-initiates the random access procedure and the target BWP indicated by the BWP transformation command does not configure the random access resource, the UE transforms the activated BWP to the protocol-agreed BWP with the random access resource (e.g., initial BWP).
Thus, by the method in this embodiment, when the UE initiates a 2-step RACH procedure and receives a BWP change command, BWP change is performed through a predefined behavior, and whether to initiate a new random access procedure is determined through the predefined behavior, so as to reduce the number of times of random access initiation while avoiding random access failure as much as possible.
Referring to fig. 3, fig. 3 is a flowchart of a method for transforming working frequency points according to an embodiment of the present invention, where the method is applied to a network device, and as shown in fig. 3, the method includes the following steps:
step 301: a random access request of a terminal is received.
Alternatively, the random access procedure in this embodiment may be a 2-step random access procedure (2-step RACH procedure) in a connected state, that is, a 2-step RACH procedure triggered by a terminal in a connected state. The random access request for the terminal may be denoted as Msg1 or MsgA under a 2-step RACH procedure.
Step 302: in the case of transmitting the random access response, the BWP conversion command is not transmitted.
Optionally, the random access response sent by the network device may be Msg2 or MsgB in a 2-step RACH procedure.
In one embodiment, for a connected 2-step RACH procedure, after the UE sends MsgA, the network device such as gNB disables the sending of a BWP transform command while sending MsgB.
In another embodiment, the UE initiates a 2-step RACH procedure and sends the MsgA. For example, a connected UE initiates a 2-step RACH procedure due to uplink failure and uplink data arrival, and sends MsgA, where the MsgA includes an identity C-RNTI of the UE. The UE listens for the reception of MsgB. The gNB does not send a BWP transform command to the UE during the process of the UE listening to the MsgB. For example, C-RNTI PDCCH does not contain a BWP transform command after the gNB receives the UE's MsgA, before and while it sends the MsgB down.
In this way, by not transmitting the BWP change command in the case of transmitting the random access response, the terminal can be prevented from changing BWP during the random access procedure, thereby reducing the number of random access failures.
Optionally, after step 301, the method may further include:
if the BWP conversion command is sent and the BWP conversion command comprises scheduling information of a PDSCH, the network equipment sends a random access response on the PDSCH so that the terminal successfully receives the random access response and the successful completion of the random access process is ensured.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention, and as shown in fig. 4, the terminal 40 includes:
a first receiving module 41, configured to receive a BWP conversion command in a process of monitoring a random access response of an initiated random access process;
a processing module 42 for performing a BWP transformation or ignoring the BWP transformation command.
Optionally, the terminal 40 further includes:
a determining module for determining whether to perform BWP transform according to whether the BWP transform command includes scheduling information of a PDSCH.
Optionally, after performing the BWP transform, the processing module 42 is further configured to:
stopping the initiated random access procedure;
or, when the BWP change command includes scheduling information of a PDSCH and a random access response is received on the PDSCH, determining that the initiated random access procedure is successfully completed;
or, when the BWP change command includes scheduling information of the PDSCH and a random access response is received on the PDSCH, discarding the random access response.
Optionally, the processing module 42 is further configured to:
stopping the initiated random access procedure when the BWP transform command includes scheduling information of a PDSCH and no random access response is received on the PDSCH;
or, when the BWP change command does not include scheduling information of the PDSCH, stopping the initiated random access procedure.
Optionally, the processing module 42 is further configured to: re-initiating the random access procedure after stopping the initiated random access procedure.
Optionally, if the absolute uplink timing MAC CE is received outside the receiving time window of the random access response in the process of re-initiating the random access procedure, the processing module 42 is further configured to:
and discarding the absolute uplink timing MAC CE, or not applying the uplink timing value indicated in the absolute uplink timing MAC CE.
Optionally, the processing module 42 is further configured to:
re-initiating a random access procedure on the target BWP when the target BWP indicated by the BWP transformation command is configured with random access resources;
or, when the target BWP indicated by the BWP change command is not configured with the random access resource, re-initiating the random access procedure on the first BWP, where the first BWP is a preset BWP configured with the random access resource.
Optionally, the type of the initiated random access procedure is the same as the type of the re-initiated random access procedure.
Optionally, the initiated random access process is a connected 2-step random access process.
The terminal 40 in the embodiment of the present invention may implement each process implemented in the method embodiment shown in fig. 2 and achieve the same beneficial effects, and for avoiding repetition, details are not described here again.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a network device according to an embodiment of the present invention, and as shown in fig. 5, the network device 50 includes:
a second receiving module 51, configured to receive a random access request of a terminal;
a sending module 52, configured to not send the BWP conversion command in case of sending the random access response.
Optionally, the sending module 52 is further configured to:
transmitting a random access response on a PDSCH when a BWP transform command is transmitted and the BWP transform command includes scheduling information of the PDSCH.
The network device 50 according to the embodiment of the present invention may implement each process implemented in the method embodiment shown in fig. 3 and achieve the same beneficial effects, and for avoiding repetition, details are not described here again.
An embodiment of the present invention further provides a communication device, including a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the method for transforming working frequency points, and can achieve the same technical effect, and is not described herein again to avoid repetition. The communication device may optionally be a terminal or a network device.
Referring to fig. 6, fig. 6 is a schematic diagram of a hardware structure of a terminal for implementing various embodiments of the present invention, where the terminal 600 includes, but is not limited to: a radio frequency unit 601, a network module 602, an audio output unit 603, an input unit 604, a sensor 605, a display unit 606, a user input unit 607, an interface unit 608, a memory 609, a processor 610, and a power supply 611. Those skilled in the art will appreciate that the terminal configuration shown in fig. 6 is not intended to be limiting, and that the terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
Wherein, the radio frequency unit 601 is configured to receive a BWP conversion command in a process of monitoring a random access response of an initiated random access process;
a processor 610 for performing a BWP transformation or ignoring the BWP transformation command.
The terminal 600 of the embodiment of the present invention may implement each process implemented in the method embodiment shown in fig. 2 and achieve the same beneficial effects, and for avoiding repetition, details are not described here again.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 601 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 610; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 601 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio frequency unit 601 may also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through the network module 602, such as helping the user send and receive e-mails, browse web pages, and access streaming media.
The audio output unit 603 may convert audio data received by the radio frequency unit 601 or the network module 602 or stored in the memory 609 into an audio signal and output as sound. Also, the audio output unit 603 can also provide audio output related to a specific function performed by the terminal 600 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 603 includes a speaker, a buzzer, a receiver, and the like.
The input unit 604 is used to receive audio or video signals. The input Unit 604 may include a Graphics Processing Unit (GPU) 6041 and a microphone 6042, and the Graphics processor 6041 processes image data of a still picture or video obtained by an image capturing apparatus (such as a camera) in a video capture mode or an image capture mode. The processed image frames may be displayed on the display unit 606. The image frames processed by the graphic processor 6041 may be stored in the memory 609 (or other storage medium) or transmitted via the radio frequency unit 601 or the network module 602. The microphone 6042 can receive sounds and can process such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 601 in case of the phone call mode.
The terminal 600 also includes at least one sensor 605, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 6061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 6061 and/or the backlight when the terminal 600 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 605 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which are not further described herein.
The display unit 606 is used to display information input by the user or information provided to the user. The Display unit 606 may include a Display panel 6061, and the Display panel 6061 may be configured by a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 607 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 607 includes a touch panel 6071 and other input devices 6072. Touch panel 6071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 6071 using a finger, stylus, or any suitable object or accessory). The touch panel 6071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 610, receives a command from the processor 610, and executes the command. In addition, the touch panel 6071 can be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The user input unit 607 may include other input devices 6072 in addition to the touch panel 6071. Specifically, the other input devices 6072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 6071 can be overlaid on the display panel 6061, and when the touch panel 6071 detects a touch operation on or near the touch panel 6071, the touch operation is transmitted to the processor 610 to determine the type of the touch event, and then the processor 610 provides a corresponding visual output on the display panel 6061 according to the type of the touch event. Although in fig. 6, the touch panel 6071 and the display panel 6061 are two independent components to realize the input and output functions of the terminal, in some embodiments, the touch panel 6071 and the display panel 6061 may be integrated to realize the input and output functions of the terminal, and this is not limited here.
The interface unit 608 is an interface for connecting an external device to the terminal 600. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 608 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal 600 or may be used to transmit data between the terminal 600 and an external device.
The memory 609 may be used to store software programs as well as various data. The memory 609 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 609 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 610 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 609 and calling data stored in the memory 609, thereby performing overall monitoring of the terminal. Processor 610 may include one or more processing units; preferably, the processor 610 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 610.
The terminal 600 may further include a power supply 611 (e.g., a battery) for supplying power to the various components, and preferably, the power supply 611 is logically connected to the processor 610 via a power management system, so that functions of managing charging, discharging, and power consumption are performed via the power management system.
In addition, the terminal 600 may further include some functional modules that are not shown, and are not described herein again.
Referring to fig. 7, fig. 7 is a schematic diagram of a hardware structure of a network device for implementing various embodiments of the present invention, where the network device 70 includes, but is not limited to: bus 71, transceiver 72, antenna 73, bus interface 74, processor 75, and memory 76.
In this embodiment of the present invention, the network device 70 further includes: a computer program stored on the memory 76 and executable on the processor 75, the computer program when executed by the processor 75 performing the steps of:
the random access request of the receiving terminal does not transmit the BWP conversion command when the random access response is transmitted.
A transceiver 72 for receiving and transmitting data under the control of a processor 75.
The network device 70 according to the embodiment of the present invention may implement each process implemented in the method embodiment shown in fig. 3, and achieve the same beneficial effects, and for avoiding repetition, details are not described here again.
In fig. 7, a bus architecture (represented by bus 71), bus 71 may include any number of interconnected buses and bridges, bus 71 linking together various circuits including one or more processors, represented by processor 75, and memory, represented by memory 76. The bus 71 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 74 provides an interface between the bus 71 and the transceiver 72. The transceiver 72 may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 75 is transmitted over a wireless medium via the antenna 73, and further, the antenna 73 receives the data and transmits the data to the processor 75.
The processor 75 is responsible for managing the bus 71 and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And the memory 76 may be used to store data used by the processor 75 in performing operations.
Alternatively, the processor 75 may be a CPU, ASIC, FPGA or CPLD.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program can implement each process of the method embodiment shown in fig. 2 or fig. 3, and can achieve the same technical effect, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium is, for example, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (14)

1. A method for converting working frequency points is applied to a terminal, and is characterized by comprising the following steps:
receiving a bandwidth part BWP conversion command in the process of monitoring a random access response of an initiated random access process;
performing a BWP transform;
after the performing the BWP transform, the method further comprises:
and if the BWP conversion command comprises scheduling information of a PDSCH and a random access response is received on the PDSCH, determining that the initiated random access process is successfully completed.
2. The method according to claim 1, wherein prior to performing the BWP transform, the method further comprises:
and determining whether to execute BWP conversion according to whether the BWP conversion command comprises scheduling information of a Physical Downlink Shared Channel (PDSCH).
3. The method according to claim 1, wherein after said performing BWP transformation, the method further comprises:
stopping the initiated random access procedure;
or, if the BWP change command includes scheduling information of the PDSCH and a random access response is received on the PDSCH, discarding the random access response.
4. The method of claim 3, wherein the stopping the initiated random access procedure comprises:
stopping the initiated random access process if the BWP conversion command comprises scheduling information of a PDSCH and no random access response is received on the PDSCH;
or, if the BWP change command does not include the scheduling information of the PDSCH, stopping the initiated random access procedure.
5. The method of claim 3, wherein after the stopping the initiated random access procedure, the method further comprises:
and re-initiating the random access process.
6. The method of claim 5, wherein if an absolute uplink timing media access control (MAC CE) CE is received outside a receiving time window of a random access response during the re-initiating of the random access procedure, the method further comprises:
discarding the absolute uplink timing MAC CE, or not applying the uplink timing value indicated in the absolute uplink timing MAC CE.
7. The method of claim 5, wherein the re-initiating the random access procedure comprises:
if the target BWP indicated by the BWP conversion command is configured with random access resources, re-initiating a random access process on the target BWP;
or, if the target BWP indicated by the BWP conversion command does not configure the random access resource, re-initiating the random access procedure on the first BWP, where the first BWP is a preset BWP configured with the random access resource.
8. The method of claim 5, wherein the type of the initiated random access procedure is the same as the type of the re-initiated random access procedure.
9. The method of claim 1, wherein the initiated random access procedure is a connected 2-step random access procedure.
10. A method for converting working frequency points is applied to network equipment and is characterized by comprising the following steps:
receiving a random access request of a terminal;
in case of transmitting the random access response, not transmitting the BWP conversion command;
after receiving the random access request of the terminal, the method further includes:
if a BWP conversion command is sent and the BWP conversion command comprises scheduling information of a PDSCH, sending a random access response on the PDSCH; and the random access response sent on the PDSCH is used for the terminal to determine that the random access process is successfully completed.
11. A terminal, comprising:
a first receiving module, configured to receive a BWP conversion command during a process of monitoring a random access response of an initiated random access process;
a processing module to perform a BWP transform;
after performing the BWP transform, the processing module is further to:
determining that the initiated random access procedure is successfully completed when the BWP transform command includes scheduling information of a PDSCH and a random access response is received on the PDSCH.
12. A network device, comprising:
a second receiving module, configured to receive a random access request of a terminal;
a transmission module for not transmitting the BWP conversion command in case of transmitting the random access response;
the sending module is further configured to:
transmitting a random access response on a PDSCH when a BWP transform command is transmitted and the BWP transform command includes scheduling information of the PDSCH; and the random access response sent on the PDSCH is used for the terminal to determine that the random access process is successfully completed.
13. A communication device comprising a memory, a processor and a computer program stored on said memory and executable on said processor, characterized in that said computer program, when executed by said processor, performs the steps of a method of transforming an operating frequency point according to any one of claims 1 to 9 or the steps of a method of transforming an operating frequency point according to claim 10.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for transforming an operating frequency point according to any one of claims 1 to 9, or the steps of the method for transforming an operating frequency point according to claim 10.
CN202010043823.8A 2020-01-15 2020-01-15 Method, terminal and network equipment for converting working frequency points Active CN113133126B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010043823.8A CN113133126B (en) 2020-01-15 2020-01-15 Method, terminal and network equipment for converting working frequency points

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010043823.8A CN113133126B (en) 2020-01-15 2020-01-15 Method, terminal and network equipment for converting working frequency points

Publications (2)

Publication Number Publication Date
CN113133126A CN113133126A (en) 2021-07-16
CN113133126B true CN113133126B (en) 2022-11-25

Family

ID=76771630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010043823.8A Active CN113133126B (en) 2020-01-15 2020-01-15 Method, terminal and network equipment for converting working frequency points

Country Status (1)

Country Link
CN (1) CN113133126B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115913493A (en) * 2021-09-30 2023-04-04 展讯通信(上海)有限公司 Communication method and communication device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109937605A (en) * 2017-10-27 2019-06-25 华为技术有限公司 A kind of method and apparatus of random access

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587789B (en) * 2017-09-28 2021-09-24 维沃移动通信有限公司 Random access method, mobile terminal and network equipment
CN113242607B (en) * 2017-10-20 2022-08-02 维沃移动通信有限公司 Random access method, equipment and terminal
US10887903B2 (en) * 2017-10-26 2021-01-05 Ofinno, Llc Wireless device processes with bandwidth part switching
EP3711233B1 (en) * 2017-11-15 2023-11-22 Nokia Technologies Oy Random access with bandwidth part switch
US20190200395A1 (en) * 2017-12-21 2019-06-27 Samsung Electronics Co., Ltd. System and method of handling bandwidth part inactivity timer
CN110198568B (en) * 2018-02-24 2021-03-09 维沃移动通信有限公司 Method and user equipment for bandwidth conversion
KR102477564B1 (en) * 2018-04-05 2022-12-14 주식회사 아이티엘 Method and apparatus for processing beam failure recovery
CN110635878B (en) * 2018-06-22 2020-09-01 维沃移动通信有限公司 Command processing method and terminal equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109937605A (en) * 2017-10-27 2019-06-25 华为技术有限公司 A kind of method and apparatus of random access

Also Published As

Publication number Publication date
CN113133126A (en) 2021-07-16

Similar Documents

Publication Publication Date Title
US11343855B2 (en) Method and device for random access and terminal
WO2020020212A1 (en) Random access method, terminal, and network device
CN111836280B (en) Data transmission method and terminal
CN111278153B (en) Random access method and device, and communication equipment
EP3706486B1 (en) Random access method and user terminal
US20210219128A1 (en) Method for processing terminal device capability information, terminal device, and network-side device
CN110958710B (en) Channel access method, configuration method, terminal and network side equipment
CN110035473B (en) System information transmission method and user terminal
EP3813469A1 (en) Random access method and communication device
CN109561514B (en) Processing method, terminal and base station for random access process
CN111836311B (en) Capability negotiation method, terminal and network equipment
CN110167202B (en) Session processing method, device, terminal and medium
CN113133126B (en) Method, terminal and network equipment for converting working frequency points
CN113543313A (en) Paging response method, terminal and network equipment
CN111836395A (en) Random access method, configuration method, terminal and network side equipment
CN110636614A (en) Random access method, terminal and network equipment
CN111836408B (en) Mode switching method, terminal and network equipment
CN111356183B (en) Transmission method, network equipment and terminal
CN110958708B (en) Signal transmission method, user equipment and network equipment
CN113497688A (en) Configuration method of scheduling request, terminal and network equipment
CN111800831B (en) Path conversion method, device, communication system and computer readable storage medium
CN112584536B (en) Uplink transmission method, resource allocation method, terminal and network side equipment
CN111836396B (en) Method for selecting random access request resource, terminal and network equipment
CN112788772B (en) Beam failure recovery confirmation method, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant