CN113498212A - Random access method, terminal and network side equipment - Google Patents

Random access method, terminal and network side equipment Download PDF

Info

Publication number
CN113498212A
CN113498212A CN202010258050.5A CN202010258050A CN113498212A CN 113498212 A CN113498212 A CN 113498212A CN 202010258050 A CN202010258050 A CN 202010258050A CN 113498212 A CN113498212 A CN 113498212A
Authority
CN
China
Prior art keywords
random access
message
terminal
pusch
transmission power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010258050.5A
Other languages
Chinese (zh)
Inventor
郭春霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010258050.5A priority Critical patent/CN113498212A/en
Publication of CN113498212A publication Critical patent/CN113498212A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • H04W74/0841Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment
    • H04W74/085Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment collision avoidance
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The present disclosure provides a random access method, a terminal and a network side device, wherein the method includes: determining whether the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access reaches the maximum transmission power; and executing a four-step random access process under the condition that the PUSCH uplink transmission power contained in the message A of the two-step random access reaches the maximum transmission power. At least one embodiment of the disclosure can reduce interference to other PUSCH transmissions caused by message A retransmission, reduce power consumption of a terminal, and improve success rate of random access.

Description

Random access method, terminal and network side equipment
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a random access method, a terminal, and a network side device.
Background
From the perspective of reducing delay and saving signaling cost, a scheme supporting a two-step (2-step) Random Access Channel (RACH) is currently provided, as shown in fig. 1, a two-step RACH procedure specifically includes: step 1, a terminal sends a random access message A (msgA), wherein the message comprises a random access preamble (preamble) and an original message III (msg 3); and step 2, the base station feeds back a message B (msgB).
The current 2-step or 4-step RACH selection mechanism is mainly embodied in the initial random access procedure and the procedure of fallback from 2-step RACH to 4-step RACH.
Disclosure of Invention
At least one embodiment of the present disclosure provides a random access method, a terminal, and a network side device, so as to solve the problem that an access success rate is not high in an existing two-step random access process.
In order to solve the above problem, at least one embodiment of the present disclosure provides a random access method applied to a terminal, including:
determining whether the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access reaches the maximum transmission power;
and executing a four-step random access process under the condition that the PUSCH uplink transmission power contained in the message A of the two-step random access reaches the maximum transmission power.
Wherein, the determining whether the uplink transmission power of the physical uplink shared channel PUSCH included in the message a of the two-step random access reaches the maximum transmission power includes:
in a random access receiving window after sending the PUSCH, receiving and decoding a Physical Downlink Control Channel (PDCCH) to obtain a decoding result;
and under the condition that the terminal can continue to transmit the message A of the two-step random access on the first beam, determining whether the uplink transmission power of the PUSCH reaches the maximum transmission power or not according to the decoding result.
The first beam is a synchronization signal block SSB or a channel state information reference signal CSI-RS beam, and is the same as a transmission beam of a message A corresponding to a PDCCH received by a terminal in the random access receiving window.
Wherein, the determining whether the uplink transmission power of the PUSCH reaches the maximum transmission power according to the decoding result includes:
and under the condition that the physical layer of the terminal indicates that the terminal cannot continuously increase the uplink transmission power of the PUSCH, if the terminal does not decode in the PDCCH to obtain the random access preamble, determining that the uplink transmission power of the PUSCH reaches the maximum transmission power.
And the random access lead code is scrambled by using a random access radio network temporary identifier RA-RNTI.
Wherein the executing of the four-step random access procedure includes:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
At least one embodiment of the present disclosure further provides a random access method, applied to a network side device, including:
receiving a first message of four-step random access sent by a terminal;
the terminal sends the message under the condition that the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access is determined to reach the maximum transmission power.
At least one embodiment of the present disclosure further provides a random access method, applied to a terminal, including:
when the initial transmission of the message A in the two-step random access process is carried out, selecting a first target resource from a first resource set for PUSCH transmission;
if the message A is not successfully transmitted, selecting a second target resource from a second resource set for PUSCH transmission when the message A is retransmitted;
wherein the resources in the first set of resources and the second set of resources do not overlap.
If the message a is not successfully transmitted, selecting a second target resource from the second resource set for PUSCH transmission when the message a is retransmitted, including:
receiving a Physical Downlink Control Channel (PDCCH) in a random access receiving window after the PUSCH is sent;
and if the terminal does not decode in the PDCCH to obtain the random access preamble scrambled by using the random access radio network temporary identifier RA-RNTI, selecting a second target resource from the second resource set for PUSCH transmission.
Wherein, if the message a is not successfully transmitted, then when the message a is retransmitted, after selecting a second target resource in the second resource set for PUSCH transmission, the method further includes:
and if the retransmission times of the message A aiming at the same synchronous signal block SSB or the channel state information reference signal CSI-RS wave beam exceed a preset threshold value or the uplink transmission power of the PUSCH cannot be increased, executing a four-step random access process.
Wherein the executing of the four-step random access procedure includes:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
At least one embodiment of the present disclosure further provides a random access method, applied to a network side device, including:
the method comprises the steps that a receiving terminal utilizes a PUSCH sent by a first target resource when carrying out initial transmission of a message A in a two-step random access process, and receives a PUSCH sent by a second target resource when carrying out retransmission of the message A in the two-step random access process;
wherein the first target resource is selected by the terminal in a first resource set, the second target resource is selected by the terminal in a second resource set, and the first resource set is not overlapped with the resources in the second resource set.
At least one embodiment of the present disclosure also provides a terminal, including:
a determining module, configured to determine whether uplink transmission power of a physical uplink shared channel PUSCH included in the message a of the two-step random access reaches a maximum transmission power;
a first executing module, configured to execute a four-step random access procedure when PUSCH uplink transmission power included in the message a of the two-step random access reaches a maximum transmission power.
At least one embodiment of the present disclosure also provides a terminal comprising a transceiver and a processor;
the processor is configured to determine whether uplink transmission power of a physical uplink shared channel PUSCH included in the message a of the two-step random access reaches maximum transmission power;
and executing a four-step random access process under the condition that the PUSCH uplink transmission power contained in the message A of the two-step random access reaches the maximum transmission power.
At least one embodiment of the present disclosure also provides a terminal, including:
the first sending module is used for selecting a first target resource from the first resource set to send the PUSCH when the message A of the two-step random access process is initially transmitted;
a second sending module, configured to select a second target resource from the second resource set for PUSCH sending when the message a is retransmitted if the message a is not successfully sent;
wherein the resources in the first set of resources and the second set of resources do not overlap.
At least one embodiment of the present disclosure also provides a terminal comprising a transceiver and a processor;
the transceiver is used for selecting a first target resource from a first resource set to transmit PUSCH when the initial transmission of the message A in the two-step random access process is carried out;
if the message A is not successfully transmitted, selecting a second target resource from a second resource set for PUSCH transmission when the message A is retransmitted;
wherein the resources in the first set of resources and the second set of resources do not overlap.
At least one embodiment of the present disclosure also provides a terminal, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the program, the processor implements the random access method described above.
At least one embodiment of the present disclosure further provides a network side device, including:
the first receiving module is used for receiving a first message of four-step random access sent by a terminal;
the terminal sends the message under the condition that the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access is determined to reach the maximum transmission power.
At least one embodiment of the present disclosure further provides a network side device, including: the network side equipment comprises a transceiver and a processor;
the transceiver is used for receiving a first message of four-step random access sent by a terminal;
the terminal sends the message under the condition that the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access is determined to reach the maximum transmission power.
At least one embodiment of the present disclosure further provides a network side device, including:
the second receiving module is used for receiving the PUSCH sent by the first target resource when the terminal performs initial transmission of the message A in the two-step random access process, and receiving the PUSCH sent by the second target resource when the terminal performs retransmission of the message A in the two-step random access process;
wherein the first target resource is selected by the terminal in a first resource set, the second target resource is selected by the terminal in a second resource set, and the first resource set is not overlapped with the resources in the second resource set.
At least one embodiment of the present disclosure further provides a network side device, including: the network side equipment comprises a transceiver and a processor;
the transceiver is used for receiving the PUSCH sent by the first target resource when the terminal performs initial transmission of the message A in the two-step random access process, and receiving the PUSCH sent by the second target resource when the terminal performs retransmission of the message A in the two-step random access process;
wherein the first target resource is selected by the terminal in a first resource set, the second target resource is selected by the terminal in a second resource set, and the first resource set is not overlapped with the resources in the second resource set.
At least one embodiment of the present disclosure also provides a computer-readable storage medium having a computer program stored thereon, which when executed by a processor, implements the steps in the random access method described above.
The technical scheme of the disclosure at least has the following beneficial effects:
in the random access method, the terminal and the network side device of at least one embodiment of the disclosure, interference to other PUSCH transmissions due to message a retransmission can be reduced, power consumption of the terminal can be reduced, and a success rate of random access is improved.
Drawings
Figure 1 shows a two-step RACH flow diagram;
fig. 2 is a flowchart illustrating steps of a random access method according to at least one embodiment of the present disclosure;
fig. 3 illustrates one of the detailed flowcharts of the random access method provided by at least one embodiment of the present disclosure;
fig. 4 illustrates one of the schematic structural diagrams of a terminal provided by at least one embodiment of the present disclosure;
fig. 5 is a flowchart illustrating a second step of a random access method according to at least one embodiment of the disclosure;
fig. 6 illustrates a second detailed flowchart of a random access method according to at least one embodiment of the present disclosure;
fig. 7 illustrates a third detailed flowchart of a random access method according to at least one embodiment of the present disclosure;
fig. 8 illustrates a second schematic structural diagram of a terminal according to at least one embodiment of the present disclosure;
fig. 9 is a flowchart illustrating a third step of a random access method according to at least one embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of a network-side device according to at least one embodiment of the present disclosure;
fig. 11 is a flow chart illustrating a fourth step of a random access method according to at least one embodiment of the disclosure;
fig. 12 is a second schematic structural diagram of a network-side device according to at least one embodiment of the present disclosure.
Detailed Description
The main hardware involved in the present application is a terminal and a base station, where the terminal may be a User Equipment (UE), for example: the terminal side Device may be a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), or a Wearable Device (Wearable Device), and it should be noted that the specific type of the terminal is not limited in the embodiments of the present invention. The base station may be a base station of 5G and later versions (e.g., a gNB, a 5G NR NB), or a base station in another communication system, or referred to as a node B, and it should be noted that in the embodiment of the present invention, only the 5G base station is taken as an example, but the specific type of the base station is not limited.
The random access procedure refers to a procedure from a time when a terminal sends a random access preamble to a time when the terminal attempts to access a base station to establish a basic signaling connection with the base station, and is a very critical step in a mobile communication system and a last step of establishing a communication link between the terminal and the base station. The terminal carries out information interaction with the base station through random access to finish the following operations: such as calls, resource requests, data transmissions, etc.; the terminal realizes uplink time synchronization with the system through random access; the performance of random access directly affects the user experience.
The random access of Long Term Evolution (LTE) and the conventional random access of New Radio (NR) are classified into two types, namely, contention random access (i.e., four-step random access) and non-contention random access (i.e., two-step random access).
The contention random access process mainly comprises:
message one (Msg 1): a User Equipment (UE, also called a terminal) selects a Random Access preamble (preamble) and a Physical Random Access Channel (PRACH) resource and transmits the selected Random Access preamble to a base station using the PRACH resource.
Message two (Msg 2): and the base station receives the preamble and sends a Random Access Response (RAR). The random access response contains two parts: a Medium Access Control (MAC) header and a MAC RAR. The MAC header includes a plurality of sub-headers, and its main contents include a Random Access Preamble ID (RAPID) and a Backoff parameter (BI), and fig. 2 is a schematic diagram of the MAC sub-header with RAPID. Fig. 3 is a format of a random access response MAC RAR, which includes a Timing Advance Command (TAC), an uplink resource Grant (UL Grant) for a message three (Msg3), and a Temporary cell Radio Network Temporary Identity (C-RNTI) allocated by a Network side. A Physical Downlink Control Channel (PDCCH) for bearing the Msg2 scheduling information and a Physical Downlink Shared Channel (PDSCH) for bearing the Msg2 are scrambled by using RA-RNTI, the RA-RNTI uniquely corresponds to time-frequency resources for transmitting the Msg1 in the window length of Msg2 received by the UE, and the calculation formula is as follows: RA-RNTI is 1+ s _ id +14 × t _ id +14 × 80 × f _ id +14 × 80 × 8 × ul _ carrier _ id (the range of NR Rel-15 is 1 to 17920). When the UE receives the Msg2, the Msg2 is determined to correspond to the Msg1 sent by the UE through the RA-RNTI and the preamble ID.
Msg 3: the UE sends uplink transmission on the UL grant specified by the Msg2, the content of the uplink transmission is different for different random access reasons Msg3, for example, for initial access, the Msg3 sends a Radio Resource Control (RRC) connection establishment request, and the connected UE sends a C-RNTI MAC Control Element (CE) in the Msg 3. In summary, Msg3 sends a UE-specific identity for the base station to ultimately uniquely identify the UE.
Message four (Msg 4): and D, the UE judges whether the random access is successful according to the Msg 4. CCCH MAC CE containing the RRC signaling content of Msg3 carried by Msg4 for idle (idle) or inactive (inactive) UEs; for the connected UE, the Msg4 uses the PDCCH of the C-RNTI which is the unique identifier in the cell of the UE for scheduling, and the PDCCH can realize contention resolution. For an idle state terminal (idle UE) or an inactive state terminal (inactive UE), after the competition resolving is successful, the temporary C-RNTI is converted into the unique UE identity C-RNTI of the UE in the cell.
In a new generation wireless network NR system, a two-step random access process is extended on the basis of four-step random access for non-competitive random access, wherein msgA is divided into preamble transmission on PRACH and data transmission on Physical Uplink Shared Channel (PUSCH), and is equivalent to Msg1 and Msg3 of 4-step RA; msgB random access response and contention resolution, which is equivalent to Msg2 plus Msg4 in 4-step random access. Since the msgB contains UE contention resolution information, its size must be different from Msg 2.
The main problems existing in the existing scheme are as follows:
1. according to the existing mechanism, multiple users share the same Physical Uplink Shared Channel (PUSCH) resource in a message a (msgA), repeated sending of PUSCH by two steps of RACHs may cause interference to other users who initiate random access using the same PUSCH resource, collision occurs, and access failure of other users is caused, especially for users with non-optimal Channel quality, that is, a scheme of selecting 2-step RACH or 4-step RACH according to Reference Signal Received Power (RSRP) is distinguished, for a terminal slightly higher than the RSRP threshold, a 2-step RACH method may be adopted to access a network, but the Signal environment is less optimal, and transmission Power may need to be increased multiple times to complete msgA information transmission. The users can easily generate interference to other users who select the same PUSCH resource, and the users often need higher transmission power and higher power consumption.
2. When a random access process is repeatedly initiated each time, a terminal increases transmission power according to a step, and the existing standard provides that the actual transmission power value of the PUSCH is greater than the preamble transmission power value, so that the situation that the PUSCH reaches the maximum transmission power and the preamble does not reach the maximum transmission power yet occurs, and successful access cannot be guaranteed.
To make the technical problems, technical solutions and advantages to be solved by the present disclosure clearer, the following detailed description is made with reference to the accompanying drawings and specific embodiments.
As shown in fig. 2, at least one embodiment of the present disclosure provides a random access method applied to a terminal, including:
step 21, determining whether the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access reaches the maximum transmission power;
and step 22, executing a four-step random access process under the condition that the PUSCH uplink transmission power contained in the message A of the two-step random access reaches the maximum transmission power.
In at least one embodiment of the present disclosure, whether the terminal continuously performs the two-step random access or the four-step random access is controlled by the uplink transmission power of the PUSCH, and when the uplink transmission power of the PUSCH reaches the maximum transmission power, it indicates that even if the terminal continuously and repeatedly transmits the message a (msga), the probability of success of the random access is not high, interference to other terminals is also caused, and power consumption of the terminal is wasted.
In at least one embodiment of the present disclosure, the specific implementation manner of step 21 is:
receiving and decoding a Physical Downlink Control Channel (PDCCH) in a random access receiving window after sending the PUSCH to obtain a decoding result;
and under the condition that the terminal can continue to transmit the message A of the two-step random access on the first beam, determining whether the uplink transmission power of the PUSCH reaches the maximum transmission power or not according to the decoding result.
It should be noted here that, in at least one embodiment of the present disclosure, the first beam is a Synchronization Signal Block (SSB) or a channel state information reference signal (CSI-RS) beam, and the first beam is the same as a transmission beam of the message a corresponding to the PDCCH received by the terminal in the random access reception window, that is, the first beam is a beam for previously transmitting the message a.
It should be further noted that, in at least one embodiment of the present disclosure, a specific implementation manner of determining whether the uplink transmission power of the PUSCH reaches the maximum transmission power according to the decoding result is as follows:
and under the condition that the physical layer of the terminal indicates that the terminal cannot continuously increase the uplink transmission power of the PUSCH, if the terminal does not decode in the PDCCH to obtain the random access preamble, determining that the uplink transmission power of the PUSCH reaches the maximum transmission power.
In particular, in at least one embodiment of the present disclosure, the random access preamble is scrambled with a random access radio network temporary identity (RA-RNTI).
It should be noted that, in at least one embodiment of the present disclosure, after MsgA is sent, blind detection is performed on a PDCCH sent by a base station, and if a terminal can decode in the PDCCH to obtain a preamble scrambled by an RA-RNTI through blind detection on the PDCCH, it is indicated that random access of the terminal is successful; if the terminal can not decode the PDCCH to obtain the preamble scrambled by the RA-RNTI, the random access failure of the terminal is indicated, at this time, random access needs to be carried out again, and MsgA is sent again, and if the terminal can continue to send the message A of two-step random access on the same SSB or CSI-RS beam, but the physical layer indicates that the terminal can not continue to increase the uplink sending power of the PUSCH, the terminal indicates that the uplink sending power of the PUSCH reaches the maximum sending power, the random access strategy needs to be changed, and the terminal returns to four-step random access.
In at least one embodiment of the present disclosure, the specific implementation manner of step 22 is:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
As shown in fig. 3, the detailed process of at least one embodiment of the present disclosure specifically includes:
step 31, the terminal sends a two-step random access message A to the base station;
specifically, the message a contains a two-step random access preamble and an original message three (Msg3), which refers to a PUSCH message.
Step 32, receiving the PDCCH in a random access receiving window after sending the PUSCH, and determining to return to four-step random access if the terminal does not decode in the PDCCH to obtain a random access preamble scrambled by using the RA-RNTI and can continue to send a message A of two-step random access on the same SSB or CSI-RS wave beam, and a physical layer of the terminal indicates that the terminal cannot continue to increase the uplink sending power of the PUSCH;
step 33, sending the four-step random access lead code;
step 34, the base station feeds back a message two (Msg2) to the terminal;
step 35, the terminal sends a message three (Msg3) to the base station;
in step 36, the base station sends a message four (Msg4) to the terminal.
It should be noted that, in at least one embodiment of the present disclosure, by returning to the four-step random access process when the uplink transmission power of the PUSCH reaches the maximum transmission power, interference to other terminals due to repeated transmission of the PUSCH can be avoided, and meanwhile, power consumption of the terminal can be saved, thereby improving the random access success rate.
As shown in fig. 4, at least one embodiment of the present disclosure also provides a terminal 40, including:
a determining module 41, configured to determine whether uplink transmission power of a physical uplink shared channel PUSCH included in the message a of the two-step random access reaches a maximum transmission power;
a first executing module 42, configured to execute a four-step random access procedure when PUSCH uplink transmission power included in the message a of the two-step random access reaches the maximum transmission power.
Wherein, the determining module 41 includes:
the decoding unit is used for receiving and decoding a Physical Downlink Control Channel (PDCCH) in a random access receiving window after the PUSCH is sent to obtain a decoding result;
and a determining unit, configured to determine whether the uplink transmission power of the PUSCH reaches the maximum transmission power according to the decoding result, when the terminal is able to continue transmission of the message a for the two-step random access on the first beam.
The first beam is a synchronization signal block SSB or a channel state information reference signal CSI-RS beam, and is the same as a transmission beam of a message A corresponding to a PDCCH received by a terminal in the random access receiving window.
Wherein the determining unit is configured to:
and under the condition that the physical layer of the terminal indicates that the terminal cannot continuously increase the uplink transmission power of the PUSCH, if the terminal does not decode in the PDCCH to obtain the random access preamble, determining that the uplink transmission power of the PUSCH reaches the maximum transmission power.
And the random access lead code is scrambled by using a random access radio network temporary identifier RA-RNTI.
Wherein the first executing module 42 is configured to:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
In summary, in the embodiments of the present disclosure, by returning to the four-step random access process when the uplink transmission power of the PUSCH reaches the maximum transmission power, interference to other terminals due to repeated transmission of the PUSCH can be avoided, and meanwhile, power consumption of the terminal can be saved, thereby improving the random access success rate.
It should be noted that, at least one embodiment of the present disclosure provides a terminal capable of performing the random access method, and all embodiments of the random access method are applicable to the terminal and can achieve the same or similar beneficial effects.
At least one embodiment of the present disclosure also provides a terminal comprising a transceiver and a processor;
the processor is configured to determine whether uplink transmission power of a physical uplink shared channel PUSCH included in the message a of the two-step random access reaches maximum transmission power;
and executing a four-step random access process under the condition that the PUSCH uplink transmission power contained in the message A of the two-step random access reaches the maximum transmission power.
The processor is specifically implemented to determine whether the uplink transmission power of the physical uplink shared channel PUSCH included in the message a of the two-step random access reaches the maximum transmission power:
in a random access receiving window after sending the PUSCH, receiving and decoding a Physical Downlink Control Channel (PDCCH) to obtain a decoding result;
and under the condition that the terminal can continue to transmit the message A of the two-step random access on the first beam, determining whether the uplink transmission power of the PUSCH reaches the maximum transmission power or not according to the decoding result.
The first beam is a synchronization signal block SSB or a channel state information reference signal CSI-RS beam, and is the same as a transmission beam of a message A corresponding to a PDCCH received by a terminal in the random access receiving window.
Wherein, the processor is specifically implemented to determine whether the uplink transmission power of the PUSCH reaches the maximum transmission power according to the decoding result:
and under the condition that the physical layer of the terminal indicates that the terminal cannot continuously increase the uplink transmission power of the PUSCH, if the terminal does not decode in the PDCCH to obtain the random access preamble, determining that the uplink transmission power of the PUSCH reaches the maximum transmission power.
Wherein, the processor is specifically configured to, when executing the four-step random access procedure:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
At least one embodiment of the present disclosure further provides a terminal, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements each process in the random access method embodiment described above when executing the program, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
At least one embodiment of the present disclosure further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the processes in the random access method embodiments as described above, and can achieve the same technical effects, and details are not repeated here to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
As shown in fig. 5, at least one embodiment of the present disclosure provides a random access method applied to a terminal, including:
step 51, when the initial transmission of the message a in the two-step random access process is performed, selecting a first target resource from the first resource set for PUSCH transmission;
it should be noted that in at least one embodiment of the present disclosure, the initial transmission refers to the terminal sending the first message a when two-step random access is performed.
Step 52, if the message a is not successfully sent, selecting a second target resource from the second resource set for PUSCH sending when the message a is retransmitted;
it should be noted that, in at least one embodiment of the present disclosure, the resources in the first resource set and the resources in the second resource set do not overlap, that is, the resources in the first resource set and the resources in the second resource set are all different.
In at least one embodiment of the present disclosure, when PUSCH is initially transmitted and retransmitted, resources in different resource sets are selected and used, so that interference caused by retransmission on initial transmission can be avoided, and the access success rate of initial transmission is ensured as much as possible.
In at least one embodiment of the present disclosure, the specific implementation manner of step 52 is:
receiving a Physical Downlink Control Channel (PDCCH) in a random access receiving window after PUSCH is sent;
and if the terminal does not decode in the PDCCH to obtain a random access preamble scrambled by a random access radio network temporary identifier (RA-RNTI), selecting a second target resource from the second resource set for PUSCH transmission.
It should be noted that, in at least one embodiment of the present disclosure, after an initial MsgA transmission is sent, by performing blind detection on a PDCCH sent by a base station, if a terminal can decode a preamble scrambled by an RA-RNTI in the PDCCH by performing blind detection on the PDCCH, it is indicated that a random access of the terminal is successful, and if the terminal cannot decode the PDCCH to obtain the preamble scrambled by the RA-RNTI, it is indicated that the random access of the terminal is failed, a random access needs to be performed again, and MsgA is sent again, where the terminal needs to reselect a resource from a resource set different from the initial MsgA transmission.
It should be noted that, in at least one embodiment of the present disclosure, after the step 52, the method further includes:
and if the retransmission times of the message A aiming at the same Synchronous Signal Block (SSB) or channel state information reference signal (CSI-RS) beam exceed a preset threshold value or the uplink transmission power of the PUSCH cannot be increased, executing a four-step random access process.
That is to say, in the retransmission process, if the retransmission times of the message a of the two-step random access of the terminal to the same SSB or CSI-RS beam already exceed a preset threshold (the preset threshold refers to the maximum retransmission times of the terminal), the terminal needs to change the random access policy and fall back to the four-step random access; or in the retransmission process, if the terminal cannot continue to increase the transmission power for the PUSCH of the two-step random access of the same SSB or CSI-RS beam, that is, the PUSCH has already reached the maximum transmission power, at this time, the terminal needs to change the random access policy and fall back to the four-step random access.
In at least one embodiment of the present disclosure, a specific implementation manner of executing the four-step random access procedure is as follows:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
As shown in fig. 6, when feedback to the four-step random access is not required, the detailed flow of at least one embodiment of the present disclosure is specifically:
step 61, the terminal sends an initial message A of two-step random access to the base station (namely, initial transmission of eliminating A is carried out first);
specifically, the message a includes a two-step random access preamble and an original message three (Msg3), where the original message three refers to a PUSCH message, and further, the PUSCH corresponding to the Msg3 is selected from resource set 1.
Step 62, receiving the PDCCH in a random access receiving window after sending the PUSCH, and if the terminal does not decode in the PDCCH to obtain a random access preamble scrambled by using the RA-RNTI and the terminal can continue to send a message A of two-step random access on the same SSB or CSI-RS wave beam, determining to carry out two-step random access retransmission;
step 63, the terminal sends a retransmission message A of the two-step random access to the base station;
specifically, the message a includes a two-step random access preamble and an original message three (Msg3), where the original message three refers to a PUSCH message, and further, the PUSCH corresponding to the Msg3 is selected from resource set 2, where the resources in resource set 1 and resource set 2 do not overlap.
Step 64, the base station feeds back a message B (MsgB) to the terminal.
As shown in fig. 7, the detailed process of at least one embodiment of the present disclosure specifically includes:
step 71, the terminal sends an initial message A of two-step random access to the base station (namely, initial transmission of eliminating A is carried out first);
specifically, the message a includes a two-step random access preamble and an original message three (Msg3), where the original message three refers to a PUSCH message, and further, the PUSCH corresponding to the Msg3 is selected from resource set 1.
Step 72, receiving the PDCCH in a random access receiving window after sending the PUSCH, and if the terminal does not decode in the PDCCH to obtain a random access preamble scrambled by using the RA-RNTI and the terminal can continue to send a message A of two-step random access on the same SSB or CSI-RS wave beam, determining to carry out two-step random access retransmission;
73, the terminal sends a retransmission message A of the two-step random access to the base station;
specifically, the message a includes a two-step random access preamble and an original message three (Msg3), where the original message three refers to a PUSCH message, and further, the PUSCH corresponding to the Msg3 is selected from resource set 2, where the resources in resource set 1 and resource set 2 do not overlap.
Step 74, determining to fallback to four-step random access if the retransmission times of the message A of the same SSB or CSI-RS beam exceed a preset threshold or the uplink transmission power of the PUSCH cannot be increased;
step 75, sending four-step random access preamble;
step 76, the base station feeds back a message two (Msg2) to the terminal;
step 77, the terminal sends a message three (Msg3) to the base station;
in step 78, the base station sends a message four (Msg4) to the terminal.
It should be noted that, in at least one embodiment of the present disclosure, by performing resource selection in different resource sets during random access initial transmission and reselection, interference caused by retransmission on initial transmission can be avoided, and a success rate of initial transmission is ensured as much as possible, so as to improve a success rate of random access.
As shown in fig. 8, at least one embodiment of the present disclosure also provides a terminal 80, including:
a first sending module 81, configured to select a first target resource from the first resource set for PUSCH sending when performing initial transmission of the message a in the two-step random access process;
a second sending module 82, configured to select a second target resource from the second resource set for PUSCH sending when the message a is retransmitted if the message a is not successfully sent;
wherein the resources in the first set of resources and the second set of resources do not overlap.
Wherein, the second sending module 82 includes:
a second receiving unit, configured to receive a physical downlink control channel PDCCH in a random access receiving window after sending the PUSCH;
and the sending unit is used for selecting a second target resource from the second resource set to carry out PUSCH sending if the terminal does not decode in the PDCCH to obtain the random access preamble scrambled by the random access radio network temporary identifier RA-RNTI.
If the message a is not successfully transmitted, the second transmitting module 82, when the message a is retransmitted, after selecting a second target resource from a second resource set for PUSCH transmission, further includes:
and the second execution module is used for executing a four-step random access process if the retransmission times of the message A aiming at the same synchronous signal block SSB or the channel state information reference signal CSI-RS wave beam exceed a preset threshold value or the uplink transmission power of the PUSCH cannot be increased.
Wherein the second execution module is configured to:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
It should be noted that, at least one embodiment of the present disclosure provides a terminal capable of performing the random access method, and all embodiments of the random access method are applicable to the terminal and can achieve the same or similar beneficial effects.
At least one embodiment of the present disclosure also provides a terminal comprising a transceiver and a processor;
the transceiver is used for selecting a first target resource from a first resource set to transmit PUSCH when the initial transmission of the message A in the two-step random access process is carried out;
if the message A is not successfully transmitted, selecting a second target resource from a second resource set for PUSCH transmission when the message A is retransmitted;
wherein the resources in the first set of resources and the second set of resources do not overlap.
Wherein, if the message a is not successfully transmitted, the transceiver specifically performs, when the message a is retransmitted, when selecting a second target resource in the second resource set for PUSCH transmission:
receiving a Physical Downlink Control Channel (PDCCH) in a random access receiving window after the PUSCH is sent;
and if the terminal does not decode in the PDCCH to obtain the random access preamble scrambled by using the random access radio network temporary identifier RA-RNTI, selecting a second target resource from the second resource set for PUSCH transmission.
Wherein, when the transceiver performs that if the message a is not successfully transmitted, and when the message a is retransmitted, the processor is configured to select a second target resource from a second resource set for PUSCH transmission, and then: and if the retransmission times of the message A aiming at the same synchronous signal block SSB or the channel state information reference signal CSI-RS wave beam exceed a preset threshold value or the uplink transmission power of the PUSCH cannot be increased, executing a four-step random access process.
Wherein, the processor is specifically configured to, when executing the four-step random access procedure:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
At least one embodiment of the present disclosure further provides a terminal, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements each process in the random access method embodiment described above when executing the program, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
At least one embodiment of the present disclosure further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the processes in the random access method embodiments as described above, and can achieve the same technical effects, and details are not repeated here to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
As shown in fig. 9, at least one embodiment of the present disclosure provides a random access method applied to a network side device, including:
step 91, receiving a first message of four-step random access sent by a terminal;
the terminal sends the message under the condition that the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access is determined to reach the maximum transmission power.
When the terminal sends the message one of the four-step random access, the terminal needs to select the random access resource and the lead code corresponding to the four-step random access to realize the sending of the message one.
In summary, in the embodiments of the present disclosure, when the uplink transmission power of the terminal for transmitting the PUSCH reaches the maximum transmission power, the first message of the four-step random access transmitted by the terminal is received, so that interference to other terminals due to repeated transmission of the PUSCH can be avoided, power consumption of the terminal can be saved, and the random access success rate is further improved.
As shown in fig. 10, at least one embodiment of the present disclosure further provides a network-side device 100, including:
a first receiving module 101, configured to receive a first message of four-step random access sent by a terminal;
the terminal sends the message under the condition that the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access is determined to reach the maximum transmission power.
It should be noted that, the network side device provided in at least one embodiment of the present disclosure is a terminal capable of executing the random access method, and all embodiments of the random access method are applicable to the network side device and can achieve the same or similar beneficial effects.
At least one embodiment of the present disclosure also provides a network side device, which includes a transceiver and a processor;
the transceiver is used for receiving a first message of four-step random access sent by a terminal;
the terminal sends the message under the condition that the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access is determined to reach the maximum transmission power.
At least one embodiment of the present disclosure further provides a network side device, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements each process in the random access method embodiment described above when executing the program, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
At least one embodiment of the present disclosure further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the processes in the random access method embodiments as described above, and can achieve the same technical effects, and details are not repeated here to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
As shown in fig. 11, at least one embodiment of the present disclosure provides a random access method applied to a network side device, including:
step 111, the receiving terminal uses the PUSCH sent by the first target resource when performing initial transmission of the message a in the two-step random access process, and receives the PUSCH sent by the second target resource when performing retransmission of the message a in the two-step random access process;
wherein the first target resource is selected by the terminal in a first resource set, the second target resource is selected by the terminal in a second resource set, and the first resource set is not overlapped with the resources in the second resource set.
Wherein, after step 111, further comprising:
receiving a first message of four-step random access sent by a terminal, wherein the first message is sent when the terminal retransmits the message A and if the retransmission times of the message A aiming at the same synchronous signal block SSB or a channel state information reference signal CSI-RS wave beam exceed a preset threshold or the uplink sending power of a PUSCH cannot be increased.
It should be noted that, in at least one embodiment of the present disclosure, by receiving the message a through resources in different resource sets when performing random access initial transmission and reselection, interference caused by retransmission on initial transmission can be avoided, and a success rate of initial transmission is ensured as much as possible, so as to improve a success rate of random access.
As shown in fig. 12, at least one embodiment of the present disclosure further provides a network-side device 120, including:
the second receiving module is used for receiving the PUSCH sent by the first target resource when the terminal performs initial transmission of the message A in the two-step random access process, and receiving the PUSCH sent by the second target resource when the terminal performs retransmission of the message A in the two-step random access process;
wherein the first target resource is selected by the terminal in a first resource set, the second target resource is selected by the terminal in a second resource set, and the first resource set is not overlapped with the resources in the second resource set.
Wherein, the network side device 120 further includes:
and the third receiving module is used for receiving a first message of four-step random access sent by the terminal, wherein the first message is sent by the terminal when the retransmission times of the message A aiming at the same synchronous signal block SSB or the CSI-RS wave beam exceed a preset threshold value or the uplink sending power of the PUSCH cannot be increased when the retransmission times of the message A aiming at the same synchronous signal block SSB or the CSI-RS wave beam exceed the preset threshold value.
It should be noted that, the network side device provided in at least one embodiment of the present disclosure is a network side device capable of executing the random access method, and all embodiments of the random access method are applicable to the network side device and can achieve the same or similar beneficial effects.
At least one embodiment of the present disclosure also provides a network side device, which includes a transceiver and a processor;
the transceiver is used for receiving the PUSCH sent by the first target resource when the terminal performs initial transmission of the message A in the two-step random access process, and receiving the PUSCH sent by the second target resource when the terminal performs retransmission of the message A in the two-step random access process;
wherein the first target resource is selected by the terminal in a first resource set, the second target resource is selected by the terminal in a second resource set, and the first resource set is not overlapped with the resources in the second resource set.
Wherein the transceiver is further configured to:
receiving a first message of four-step random access sent by a terminal, wherein the first message is sent when the terminal retransmits the message A and if the retransmission times of the message A aiming at the same synchronous signal block SSB or a channel state information reference signal CSI-RS wave beam exceed a preset threshold or the uplink sending power of a PUSCH cannot be increased.
At least one embodiment of the present disclosure further provides a network side device, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements each process in the random access method embodiment described above when executing the program, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
At least one embodiment of the present disclosure further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the processes in the random access method embodiments as described above, and can achieve the same technical effects, and details are not repeated here to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-readable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block or blocks.
These computer program instructions may also be stored in a computer-readable storage medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable storage medium produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the foregoing is directed to the preferred embodiment of the present disclosure, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the principles of the disclosure, and it is intended to cover all such changes and modifications as fall within the scope of the disclosure.

Claims (23)

1. A random access method applied to a terminal is characterized by comprising the following steps:
determining whether the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access reaches the maximum transmission power;
and executing a four-step random access process under the condition that the PUSCH uplink transmission power contained in the message A of the two-step random access reaches the maximum transmission power.
2. The random access method according to claim 1, wherein the determining whether the uplink transmission power of the physical uplink shared channel, PUSCH, included in the message a of the two-step random access reaches the maximum transmission power comprises:
in a random access receiving window after sending the PUSCH, receiving and decoding a Physical Downlink Control Channel (PDCCH) to obtain a decoding result;
and under the condition that the terminal can continue to transmit the message A of the two-step random access on the first beam, determining whether the uplink transmission power of the PUSCH reaches the maximum transmission power or not according to the decoding result.
3. The random access method of claim 2, wherein the first beam is a Synchronization Signal Block (SSB) or a channel state information reference signal (CSI-RS) beam, and the first beam is the same as a transmission beam of a message A corresponding to a PDCCH received by a terminal within the random access reception window.
4. The random access method according to claim 2, wherein the determining whether the uplink transmission power of the PUSCH reaches the maximum transmission power according to the decoding result comprises:
and under the condition that the physical layer of the terminal indicates that the terminal cannot continuously increase the uplink transmission power of the PUSCH, if the terminal does not decode in the PDCCH to obtain the random access preamble, determining that the uplink transmission power of the PUSCH reaches the maximum transmission power.
5. The random access method of claim 4, wherein the random access preamble is scrambled with a random access radio network temporary identity, RA-RNTI.
6. The random access method of claim 1, wherein the performing a four-step random access procedure comprises:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
7. A random access method is applied to network side equipment, and is characterized by comprising the following steps:
receiving a first message of four-step random access sent by a terminal;
the terminal sends the message under the condition that the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access is determined to reach the maximum transmission power.
8. A random access method applied to a terminal is characterized by comprising the following steps:
when the initial transmission of the message A in the two-step random access process is carried out, selecting a first target resource from a first resource set for PUSCH transmission;
if the message A is not successfully transmitted, selecting a second target resource from a second resource set for PUSCH transmission when the message A is retransmitted;
wherein the resources in the first set of resources and the second set of resources do not overlap.
9. The random access method according to claim 8, wherein if the message a is not successfully transmitted, selecting a second target resource from a second set of resources for PUSCH transmission when the message a is retransmitted, comprises:
receiving a Physical Downlink Control Channel (PDCCH) in a random access receiving window after the PUSCH is sent;
and if the terminal does not decode in the PDCCH to obtain the random access preamble scrambled by using the random access radio network temporary identifier RA-RNTI, selecting a second target resource from the second resource set for PUSCH transmission.
10. The random access method according to claim 8, wherein if the message a is not successfully transmitted, and when the message a is retransmitted, after selecting a second target resource from a second set of resources for PUSCH transmission, the method further comprises:
and if the retransmission times of the message A aiming at the same synchronous signal block SSB or the channel state information reference signal CSI-RS wave beam exceed a preset threshold value or the uplink transmission power of the PUSCH cannot be increased, executing a four-step random access process.
11. The random access method of claim 10, wherein the performing a four-step random access procedure comprises:
and selecting random access resources and lead codes corresponding to the four-step random access, and sending a message I of the four-step random access to the network side equipment.
12. A random access method is applied to network side equipment, and is characterized by comprising the following steps:
the method comprises the steps that a receiving terminal utilizes a PUSCH sent by a first target resource when carrying out initial transmission of a message A in a two-step random access process, and receives a PUSCH sent by a second target resource when carrying out retransmission of the message A in the two-step random access process;
wherein the first target resource is selected by the terminal in a first resource set, the second target resource is selected by the terminal in a second resource set, and the first resource set is not overlapped with the resources in the second resource set.
13. A terminal, comprising:
a determining module, configured to determine whether uplink transmission power of a physical uplink shared channel PUSCH included in the message a of the two-step random access reaches a maximum transmission power;
a first executing module, configured to execute a four-step random access procedure when PUSCH uplink transmission power included in the message a of the two-step random access reaches a maximum transmission power.
14. A terminal, characterized in that the terminal comprises a transceiver and a processor;
the processor is configured to determine whether uplink transmission power of a physical uplink shared channel PUSCH included in the message a of the two-step random access reaches maximum transmission power;
and executing a four-step random access process under the condition that the PUSCH uplink transmission power contained in the message A of the two-step random access reaches the maximum transmission power.
15. A terminal, comprising:
the first sending module is used for selecting a first target resource from the first resource set to send the PUSCH when the message A of the two-step random access process is initially transmitted;
a second sending module, configured to select a second target resource from the second resource set for PUSCH sending when the message a is retransmitted if the message a is not successfully sent;
wherein the resources in the first set of resources and the second set of resources do not overlap.
16. A terminal, characterized in that the terminal comprises a transceiver and a processor;
the transceiver is used for selecting a first target resource from a first resource set to transmit PUSCH when the initial transmission of the message A in the two-step random access process is carried out;
if the message A is not successfully transmitted, selecting a second target resource from a second resource set for PUSCH transmission when the message A is retransmitted;
wherein the resources in the first set of resources and the second set of resources do not overlap.
17. A terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the random access method according to any of claims 1-6, 8-11 when executing the program.
18. A network-side device, comprising:
the first receiving module is used for receiving a first message of four-step random access sent by a terminal;
the terminal sends the message under the condition that the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access is determined to reach the maximum transmission power.
19. A network-side device, comprising: the network side equipment comprises a transceiver and a processor;
the transceiver is used for receiving a first message of four-step random access sent by a terminal;
the terminal sends the message under the condition that the uplink transmission power of a Physical Uplink Shared Channel (PUSCH) contained in the message A of the two-step random access is determined to reach the maximum transmission power.
20. A network-side device, comprising:
the second receiving module is used for receiving the PUSCH sent by the first target resource when the terminal performs initial transmission of the message A in the two-step random access process, and receiving the PUSCH sent by the second target resource when the terminal performs retransmission of the message A in the two-step random access process;
wherein the first target resource is selected by the terminal in a first resource set, the second target resource is selected by the terminal in a second resource set, and the first resource set is not overlapped with the resources in the second resource set.
21. A network-side device, comprising: the network side equipment comprises a transceiver and a processor;
the transceiver is used for receiving the PUSCH sent by the first target resource when the terminal performs initial transmission of the message A in the two-step random access process, and receiving the PUSCH sent by the second target resource when the terminal performs retransmission of the message A in the two-step random access process;
wherein the first target resource is selected by the terminal in a first resource set, the second target resource is selected by the terminal in a second resource set, and the first resource set is not overlapped with the resources in the second resource set.
22. A network side device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the random access method according to claim 7 or 12 when executing the program.
23. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the random access method according to any one of claims 1 to 12.
CN202010258050.5A 2020-04-03 2020-04-03 Random access method, terminal and network side equipment Pending CN113498212A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010258050.5A CN113498212A (en) 2020-04-03 2020-04-03 Random access method, terminal and network side equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010258050.5A CN113498212A (en) 2020-04-03 2020-04-03 Random access method, terminal and network side equipment

Publications (1)

Publication Number Publication Date
CN113498212A true CN113498212A (en) 2021-10-12

Family

ID=77994697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010258050.5A Pending CN113498212A (en) 2020-04-03 2020-04-03 Random access method, terminal and network side equipment

Country Status (1)

Country Link
CN (1) CN113498212A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180279376A1 (en) * 2017-03-23 2018-09-27 Comcast Cable Communications, Llc Power Control For Random Access
US20190059110A1 (en) * 2017-08-18 2019-02-21 Qualcomm Incorporated Random access procedure with cross band downlink/uplink pairing
WO2020032742A1 (en) * 2018-08-09 2020-02-13 엘지전자 주식회사 Method and apparatus for transmitting or receiving wireless signal in wireless communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180279376A1 (en) * 2017-03-23 2018-09-27 Comcast Cable Communications, Llc Power Control For Random Access
US20190059110A1 (en) * 2017-08-18 2019-02-21 Qualcomm Incorporated Random access procedure with cross band downlink/uplink pairing
WO2020032742A1 (en) * 2018-08-09 2020-02-13 엘지전자 주식회사 Method and apparatus for transmitting or receiving wireless signal in wireless communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NOKIA: ""R1-1911457 Feature lead summary#21 on 2 step RACH procedures"", 3GPP TSG RAN WG1 #98BIS, 22 October 2019 (2019-10-22), pages 31 *

Similar Documents

Publication Publication Date Title
KR102600808B1 (en) Method and apparatus for performing random access procedure
US11523433B2 (en) System and method of handling bandwidth part inactivity timer
US11751245B2 (en) Method and wireless communication system for handling timer operation
US11363645B2 (en) Method and device for random access and instruction after random access rollback
US11844135B2 (en) State transitions for idle mode transmissions using pre-configured dedicated resources
EP3337247A1 (en) Random access response transmission method and device
CN110603887B (en) Multiple PRACH preamble and random access response
US11743946B2 (en) Dynamic estimation of random access response repetitions
US11202322B2 (en) Random access method and terminal device
JP7182002B2 (en) Random access method and apparatus
WO2020220323A1 (en) Random access method and apparatus, and communication system
CN113767677B (en) Random access message retransmission in unlicensed bands
CN115699909A (en) Wireless communication method and terminal equipment
US20220022265A1 (en) Communicating between a terminal and a wireless network node
WO2020248944A1 (en) Random access method and apparatus
JP2022528329A (en) Random access response reception method, device and communication system
CN113519200A (en) Method, terminal equipment and network equipment for two-step random access
CN113301660A (en) Determination of contention resolution timer
US20230138947A1 (en) Random access method and apparatus, and network-side device
CN109565741A (en) Acquisition methods, the apparatus and system of system information
TWI674028B (en) T w o - p h a s e b a c k o f f m e t h o d a n d u s e r e q u i p m e n t f o r a c c e s s p r o c e d u r e i n w i r e l e s s c o m m u n i c a t i o n s y s t e m s
JP2022531344A (en) Conflict resolution in random access procedures
CN114503771B (en) Termination of a monitoring window during random access
CN113498212A (en) Random access method, terminal and network side equipment
CN113439467A (en) Communication between a terminal and a radio network node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination