CN114223308A - Random access method, electronic device and storage medium - Google Patents

Random access method, electronic device and storage medium Download PDF

Info

Publication number
CN114223308A
CN114223308A CN201980099354.7A CN201980099354A CN114223308A CN 114223308 A CN114223308 A CN 114223308A CN 201980099354 A CN201980099354 A CN 201980099354A CN 114223308 A CN114223308 A CN 114223308A
Authority
CN
China
Prior art keywords
identification information
rar
terminal device
random access
rar message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201980099354.7A
Other languages
Chinese (zh)
Inventor
石聪
王淑坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN114223308A publication Critical patent/CN114223308A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]

Abstract

The application discloses a random access method, which comprises the following steps: the terminal equipment determines whether a Random Access Response (RAR) message is the RAR message aiming at the terminal equipment according to identification information carried in the received RAR message. The application also discloses another random access method, electronic equipment and a storage medium.

Description

Random access method, electronic device and storage medium Technical Field
The present application relates to the field of wireless communications technologies, and in particular, to a random access method, an electronic device, and a storage medium.
Background
In the Random Access procedure, in a case that a window time for a terminal device to receive a Random Access Response (RAR) message is greater than 10ms, how the terminal device determines whether the received RAR message is an RAR message for itself is not clear yet.
Disclosure of Invention
In order to solve the foregoing technical problems, embodiments of the present application provide a random access method, an electronic device, and a storage medium.
In a first aspect, an embodiment of the present application provides a random access method, including: and the terminal equipment determines whether the RAR message is the RAR message aiming at the terminal equipment according to the identification information carried in the received RAR message. .
In a second aspect, an embodiment of the present application provides a random access method, including: the method comprises the steps that network equipment sends an RAR message to terminal equipment, wherein the RAR message carries identification information, and the identification information is used for the terminal equipment to determine whether the RAR message is the RAR message aiming at the terminal equipment.
In a third aspect, an embodiment of the present application provides a terminal device, where the terminal device includes: and the processing unit is configured to determine whether the RAR message is the RAR message for the terminal device according to the identification information carried in the received RAR message.
In a fourth aspect, an embodiment of the present application provides a network device, where the network device includes: a sending unit, configured to send an RAR message to a terminal device, where the RAR message carries identification information, and the identification information is used for the terminal device to determine whether the RAR message is an RAR message for the terminal device.
In a fifth aspect, an embodiment of the present application provides a terminal device, including a processor and a memory, where the memory is used for storing a computer program that can be executed on the processor, and the processor is configured to execute, when executing the computer program, the steps of the random access method executed by the terminal device.
In a sixth aspect, an embodiment of the present application provides a network device, including a processor and a memory, where the memory is used for storing a computer program that can be executed on the processor, and the processor is configured to execute the steps of the random access method executed by the network device when the processor executes the computer program.
In a seventh aspect, an embodiment of the present application provides a computer storage medium, which stores an executable program, and when the executable program is executed by a processor, the random access method executed by the terminal device is implemented.
In an eighth aspect, an embodiment of the present application provides a computer storage medium, which stores an executable program, and when the executable program is executed by a processor, the random access method performed by the network device is implemented.
In a ninth aspect, an embodiment of the present application provides a chip, including: and the processor is used for calling and running the computer program from the memory so that the equipment provided with the chip executes the random access method executed by the terminal equipment or the random access method executed by the network equipment.
In a tenth aspect, an embodiment of the present application provides a computer program product, which includes computer program instructions, where the computer program instructions enable a computer to execute a random access method executed by the terminal device or a random access method executed by the network device.
In an eleventh aspect, an embodiment of the present application provides a computer program, where the computer program enables a computer to execute a random access method executed by the terminal device or a random access method executed by the network device.
The random access method provided by the embodiment of the application comprises the following steps: and the terminal equipment determines whether the RAR message is the RAR message aiming at the terminal equipment according to the identification information carried in the received RAR message. Therefore, the network device can determine whether the RAR message is the RAR message aiming at the network device according to the identification information by carrying the identification information in the RAR message, and avoid the terminal device from transmitting the Msg3 according to the indication not aiming at the RAR message, thereby reducing the conflict of random access.
Drawings
Fig. 1 is a diagram illustrating a contention random access procedure according to the present application;
fig. 2 is a schematic diagram of a format of the RAR of the present application;
FIG. 3 is a schematic format diagram of a subheader of the present application;
FIG. 4 is a diagram illustrating the structure of a MAC PDU according to the present application;
FIG. 5 is a diagram illustrating RACH collision according to the present application;
fig. 6 is a schematic structural diagram of a communication system according to an embodiment of the present application;
fig. 7 is a schematic diagram of an alternative processing flow of a random access method according to an embodiment of the present application;
fig. 8 is a schematic diagram illustrating that identification information is carried in a MAC RAR according to an embodiment of the present application;
fig. 9 is a diagram illustrating a radio frame with a maximum RAR time window of 20ms and an RAR time window according to an embodiment of the present application;
FIG. 10 is a schematic diagram illustrating identification information carried in a BI subheader according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a network device according to an embodiment of the present application;
fig. 13 is a schematic diagram of a hardware component structure of an electronic device according to an embodiment of the present application.
Detailed Description
So that the manner in which the features and elements of the present embodiments can be understood in detail, a more particular description of the embodiments, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings.
Before describing the random access method provided in the embodiments of the present application in detail, a brief description of random access in the related art is provided.
With the pursuit of speed, latency, high-speed mobility, energy efficiency, and the diversity and complexity of services in future life, the 3GPP international standards organization began to develop 5G. The main application scenarios of 5G are: enhanced Mobile Ultra wide band (eMBB), Low Latency high reliability Communications (URLLC), and Massive Machine Type Communications (mMTC).
The eMBB still targets users to obtain multimedia content, services and data, and its demand is growing very rapidly. On the other hand, because the eMBB may be deployed in different scenarios, such as indoor, urban, rural, etc., and the difference between the capabilities and the requirements is relatively large, it cannot be said in a general way, and it is necessary to analyze in detail in combination with a specific deployment scenario. Typical applications of URLLC include: industrial automation, electric power automation, remote medical operation (surgery), traffic safety, and the like. Typical characteristics of mtc include: high connection density, small data volume, insensitive time delay service, low cost and long service life of the module, etc.
In early deployments of New Radio (NR), complete NR network coverage is difficult to acquire, so typical network coverage modes are Long Term Evolution (LTE) coverage over wide area and islanding coverage mode of NR. Moreover, the frequency spectrum for LTE is mostly deployed below 6GHz, and the frequency spectrum below 6GHz available for NR is very few. NR must therefore be studied for spectrum applications above 6 GHz; however, the coverage of the high frequency band is limited, the signal fading is fast; meanwhile, in order to protect the investment of the mobile operator in the LTE in the early stage, a working mode of tight interworking (light interworking) between the LTE and the NR is provided. Of course, NRs may also be deployed independently.
NR may also operate in unlicensed bands in the following operating scenarios:
a carrier aggregation scenario: a Primary Cell (PCell) is a licensed spectrum, and Secondary cells (scells) operating on an unlicensed spectrum are aggregated by a carrier aggregation manner.
Double-connection working scene: the PCell is an LTE authorized spectrum, and the PScell is an NR unauthorized spectrum.
Independent working scene: the NR operates as an independent cell in unlicensed spectrum.
Generally, the operating Band (Band) of the NR-Unlicensed spectrum (NR-U) is 5GHz Unlicensed spectrum and 6GHz Unlicensed spectrum, such as: US 5925-7125 MHz, European 5925-6425 MHz, or other frequency bands; on unlicensed spectrum, the design of NR-U should guarantee fairness with other systems already operating on these unlicensed spectrum, e.g., with WiFi and the like. The principle of fairness is that the impact of NR-U on systems already deployed on unlicensed spectrum (e.g., WiFi) cannot exceed the impact between systems already deployed on unlicensed spectrum.
In order to ensure fair coexistence between systems over unlicensed spectrum, energy detection has been agreed as a basic coexistence mechanism. A general energy detection mechanism is a Listen Before Talk (LBT) mechanism, and a basic principle of the LBT mechanism is that a network device or a terminal device (and a transmission end device) needs to Listen for a period of time according to a rule Before transmitting data on an unlicensed spectrum. If the listening result indicates that the channel is in an idle state, the transmitting end device may transmit data to the receiving end. If the interception result indicates that the channel is in an occupied state, the transmission end device needs to back off for a period of time according to the specification and then continue to intercept the channel, and the channel interception result is known to be in an idle state, so that the data can be transmitted to the receiving end device.
In channel Access of an unlicensed-Assisted Access (LAA) frequency band of an LTE Licensed spectrum, for downlink data transmission, a network device needs to perform LBT; in LAA, the priority of channel access is determined by the following table 1.
Figure PCTCN2019110463-APPB-000001
TABLE 1
Wherein m ispThere is a relation to the listening channel time for performing channel access. Specifically, the network device needs to perform channel sensing for a time Td, where Td is 16us + mp×9us。
CW min,pAnd CWmax,pIt is related to the random channel sensing time in the channel access process. Specifically, when the network device listens that the Td time channel is idle, it is necessary to listen to the channel N times again, and the listening time duration is 9us each time. Wherein N is a random number from 0 to CWp, andCW min,p≤CW p≤CW max,p
T mcot,pthe longest time for occupying the channel after the network device occupies the channel is related to the priority of the channel adopted by the network device, for example, if the priority is 1, the channel occupies 2ms at most after the channel interception is successful.
Therefore, for the terminal device, the network device needs to complete data transmission to the terminal device within a Maximum Channel Occupancy Time (MCOT); if the network device does not preempt the channel, i.e. outside the MCOT time, the terminal device does not receive the scheduling data from the network device to the terminal device.
The random access is an important process for establishing wireless connection between the terminal equipment and the network equipment, and the random access terminal equipment can obtain uplink synchronization with the network equipment to apply for uplink resources. The random access procedure is divided into contention random access and non-contention random access.
Contention random access procedure, as shown in fig. 1:
step 1, the terminal equipment sends a random access preamble (preamble) to the network equipment.
Specifically, the terminal device determines a relationship between a Synchronization Signal Block (SSB) and a Physical Random Access CHannel (PRACH) resource through high-level configuration; receiving a group of SSBs, determining Reference Signal Receiving Power (RSRP) values of the SSBs, and selecting a proper SSB according to a threshold; determining the PRACH resource based on the selected SSB and the corresponding relation between the SSB and the PRACH resource; selecting a preamble group (preamble group) according to the size of the Msg 3;
setting target receiving POWER equal to preamberbeceivedTargetPower + DELTA _ PREAMBLE + (PREAMBLE _ POWER _ RAMPING _ COUNTER-1) multiplied by POWER RAMPING Step; the sequence is sent over Msg1 on PRACH time-frequency domain resources.
And step 2, the network equipment sends an RAR message to the terminal equipment.
Specifically, an RA-RNTI is determined according to PRACH time-frequency domain resources sent by the terminal equipment Msg 1; wherein RA-RNTI is 1+ s _ id +14 × t _ id +14 × 80 × f _ id +14 × 80 × 8 × ul _ carrier _ id. And the network equipment sends an RAR message corresponding to the RA-RNTI to the terminal equipment through the Msg 2.
The terminal device starts an RAR time Window (RACH-Response Window) at a PDCCH (Physical Downlink Control Channel) timing (acquisition) after sending the Preamble and monitors the PDCCH during the time Window operation to receive an RAR message corresponding to the RA-RNTI. If the terminal equipment does not receive the RAR message in the RAR monitoring window, the terminal equipment retransmits msg 1; and if the terminal equipment receives the RAR message in the RAR monitoring window, the terminal equipment transmits the Msg3 according to the indication of the RAR message.
And step 3, the terminal equipment transmits the Msg3 based on the uplink authorization in the RAR message.
After the Msg3 is transmitted, the terminal equipment starts a random access contention resolution timer (ra-ContentionResolutionTimer) and monitors the PDCCH during the running of the timer; restarting the timer when the Msg3 performs Hybrid Automatic Repeat reQuest (HARQ) retransmission; the terminal device will always monitor the PDCCH until the timer expires or stops.
And 4, resolving the conflict.
And if the terminal equipment receives the DCI format 1_0 scrambled by the C-RNTI and the corresponding PDSCH, finishing the random access. Or, if the terminal equipment receives the DCI format 1_0 scrambled by the TC-RNTI and the PDSCH corresponding to the DCI format 1_0, the contents are compared successfully, and the random access is finished.
In the step 2, the time length of the RAR time window started by the terminal device is less than or equal to 10 ms. A format diagram of the RAR, as shown in fig. 2, includes a subheader (subheader), RAPID, payload, UpLink (UpLink, UL) grant (grant), and Temporary C-RNTI; the format of the subheader is shown in fig. 3, where BI is used to indicate a backoff time of the retransmission Msg 1. A schematic structural diagram of a Media Access Control Protocol Data Unit (MAC PDU) composed of RARs, as shown in fig. 4, where one RAP ID corresponds to one MAC RAR.
In the NR-U, in the process of initiating random access by the terminal device, whether contention random access or non-contention random access exists, there is a case that the network device cannot send Msg2 (i.e., RAR response message) within 10ms due to unsuccessful channel preemption of the terminal device. Therefore, in NR-U, the RAR window needs to be further enlarged in size so that the RAR window is larger than 10 ms.
If the size of the RAR time window is greater than 10ms, it may cause the network device to be able to calculate the same RA-RNTI based on random access opportunity (RO) resources selected by two different terminal devices in at least two 10ms system frames. When the network equipment sends an RAR message carrying RA-RNTI to the terminal equipment, the terminal equipment can not determine whether the RAR message is the RAR message aiming at the terminal equipment; which in turn leads to a further increase in RACH collision. For example, as shown in fig. 5, the RACH collision is illustrated, where the first terminal device sends a Preamble at a first time slot of the first radio frame, and a RAR time window opened by the first terminal device is 20ms after an initial time of a third time slot of the first radio frame; and the second terminal equipment sends a Preamble at the first time slot of the second wireless frame, and the second terminal equipment starts an RAR time window which is 20ms after the starting time of the third time slot of the second wireless frame. The RA-RNTI determined according to the PRACH resource of the Preamble sent by the first terminal equipment may be the same as the RA-RNTI determined according to the PRACH resource of the Preamble sent by the second terminal equipment; at the location indicated by the hatched part in fig. 5, the first terminal device and the second terminal device may receive RAR messages carrying the same RA-RNTI. At this time, the first terminal device and the second terminal device cannot determine whether the RAR message is an RAR message for themselves. When any one terminal device performs Msg3 transmission according to an indication not for its RAR message, the random access collision will be further increased.
The present application provides a random access method, which can be applied to various communication systems, for example: a Global System for Mobile communications (GSM) System, a Code Division Multiple Access (CDMA) System, a Wideband Code Division Multiple Access (WCDMA) System, a General Packet Radio Service (GPRS), an LTE System, an LTE Frequency Division Duplex (FDD) System, an LTE Time Division Duplex (TDD), a Universal Mobile Telecommunications System (UMTS), a Worldwide Interoperability for Microwave Access (WiMAX) communication System, or a 5G System.
Illustratively, the embodiment of the present application is applied to a communication system 100, as shown in fig. 6. The communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or referred to as a communication terminal, a terminal). Network device 110 may provide communication coverage for a particular geographic area and may communicate with terminal devices located within that coverage area. Optionally, the Network device 110 may be a Base Transceiver Station (BTS) in a GSM system or a CDMA system, a Base Station (NodeB, NB) in a WCDMA system, an evolved Node B (eNB or eNodeB) in an LTE system, or a wireless controller in a Cloud Radio Access Network (CRAN), or may be a Network device in a Mobile switching center, a relay Station, an Access point, a vehicle-mounted device, a wearable device, a hub, a switch, a bridge, a router, a Network-side device in a 5G Network, or a Network device in a Public Land Mobile Network (PLMN) for future evolution, or the like.
The communication system 100 further comprises at least one terminal device 120 located within the coverage area of the network device 110. As used herein, "terminal equipment" includes, but is not limited to, connections via wireline, such as Public Switched Telephone Network (PSTN), Digital Subscriber Line (DSL), Digital cable, direct cable connection; and/or another data connection/network; and/or via a Wireless interface, e.g., to a cellular Network, a Wireless Local Area Network (WLAN), a digital television Network such as a DVB-H Network, a satellite Network, an AM-FM broadcast transmitter; and/or means of another terminal device arranged to receive/transmit communication signals; and/or Internet of Things (IoT) devices. A terminal device arranged to communicate over a wireless interface may be referred to as a "wireless communication terminal", "wireless terminal", or "mobile terminal". Examples of mobile terminals include, but are not limited to, satellite or cellular telephones; personal Communications Systems (PCS) terminals that may combine cellular radiotelephones with data processing, facsimile, and data Communications capabilities; PDAs that may include radiotelephones, pagers, internet/intranet access, Web browsers, notepads, calendars, and/or Global Positioning System (GPS) receivers; and conventional laptop and/or palmtop receivers or other electronic devices that include a radiotelephone transceiver. Terminal Equipment may refer to an access terminal, User Equipment (UE), subscriber unit, subscriber station, mobile station, remote terminal, mobile device, User terminal, wireless communication device, User agent, or User Equipment. An access terminal may be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device having Wireless communication capabilities, a computing device or other processing device connected to a Wireless modem, a vehicle mounted device, a wearable device, a terminal device in a 5G network, or a terminal device in a future evolved PLMN, etc.
Optionally, a Device to Device (D2D) communication may be performed between the terminal devices 120.
Alternatively, the 5G system or the 5G network may also be referred to as an NR system or an NR network.
Fig. 6 exemplarily shows one network device and two terminal devices, and optionally, the communication system 100 may include a plurality of network devices and may include other numbers of terminal devices within the coverage of each network device, which is not limited in this embodiment of the present application.
Optionally, the communication system 100 may further include other network entities such as a network controller, a mobility management entity, and the like, which is not limited in this embodiment.
It should be understood that a device having a communication function in a network/system in the embodiments of the present application may be referred to as a communication device. Taking the communication system 100 shown in fig. 6 as an example, the communication device may include a network device 110 and a terminal device 120 having a communication function, and the network device 110 and the terminal device 120 may be the specific devices described above, which are not described herein again; the communication device may also include other devices in the communication system 100, such as other network entities, for example, a network controller, a mobility management entity, and the like, which is not limited in this embodiment.
As shown in fig. 7, an optional processing flow of the random access method provided in the embodiment of the present application includes the following steps:
step S201, the terminal device receives an RAR message sent by the network device.
Step S202, the terminal device determines, according to the identifier information carried in the RAR message, whether the RAR message is an RAR message for the terminal device.
In some embodiments, the identification information is a radio frame identification (frame id).
In some embodiments, when a terminal device determines, according to identification information carried in a received RAR message, whether the RAR message is an RAR message for the terminal device, the terminal device determines that the RAR message is an RAR message for the terminal device when a value obtained by modulo operation of a System Frame Number (SFN) included in a RAR time window by a System Frame Number (SFN) of a preamble transmitted by the terminal device matches a value corresponding to the identification information; and under the condition that the value obtained by performing modulo operation on the number of the system frames contained in an RAR time window by the system frame number of the lead code transmitted by the terminal equipment is not matched with the value corresponding to the identification information, the terminal equipment determines that the RAR message is not the RAR message aiming at the terminal equipment. The matching may also be understood as being equal, that is, in a case that a value obtained by performing a modulo operation on the number of system frames included in an RAR time window by using the system frame number of the preamble transmitted by the terminal device is equal to a value corresponding to the identification information, the terminal device determines that the RAR message is an RAR message for the terminal device; and under the condition that the value obtained by performing modulo operation on the number of the system frames contained in an RAR time window by the system frame number of the lead code transmitted by the terminal equipment is not equal to the value corresponding to the identification information, the terminal equipment determines that the RAR message is not the RAR message aiming at the terminal equipment.
The value corresponding to the identification information may be a value obtained by converting a value representing a bit of the identification information into a decimal value; for example, if the value of the bit representing the identification information is 00, the value corresponding to the identification information is 0; if the value of the bit representing the identification information is 01, the value corresponding to the identification information is 1; if the value of the bit of the identification information is 10, the value corresponding to the identification information is 2; and if the value of the bit of the identification information is 11, the value corresponding to the identification information is 3.
In specific implementation, the system frame number of the preamble transmitted by the terminal device is 5; if the RAR time window is 40ms, the number of system frames contained in the RAR time window is 4; the value obtained by performing modulo operation on the number of the system frames contained in the RAR time window by the system frame number of the preamble transmitted by the terminal device is 1. And if the value of the bit representing the identification information is 1 or the value of the bit representing the identification information is 10, the value corresponding to the identification information is 1. In this scenario, a value obtained by modulo operation of a system frame number included in an RAR time window by a system frame number of a preamble transmitted by a terminal device is equal to a value corresponding to the identification information, and the terminal device determines that the RAR message is an RAR message for the terminal device. And if the value of the bit representing the identification information is 0 or the value of the bit representing the identification information is 00, the value corresponding to the identification information is 0. In this scenario, a value obtained by modulo operation of a system frame number included in an RAR time window by a system frame number of a preamble transmitted by a terminal device is not equal to a value corresponding to the identification information, and the terminal device determines that the RAR message is not an RAR message for the terminal device.
In an optional implementation, the identification information is carried in a MAC RAR; since the MAC RAR is included in the MAC sub pdu, it can also be understood that the identification information is carried in the MAC sub pdu. In specific implementation, the identification information is carried in a schematic diagram of the MAC RAR, and as shown in fig. 8, the identification information is represented by a value of a reserved bit (R bit) in the MAC RAR. For example, when the value of the R bit is 0, the identification information is 0; when the value of the R bit is 1, the identification information is 1. Since the MAC RAR has only one R bit, the case where the identifier is carried in the MAC RAR is applicable to a scenario where the RAR time window is 20ms at most. Fig. 9 shows a radio frame with a RAR window of at most 20ms and a RAR window. By applying the embodiment of the application, the RO resources in the time slot marked by the shaded part in FIG. 9 can be distinguished
Since one RAR message includes a plurality of MAC RARs, the terminal device first searches for a MAC RAR corresponding to an index (preamble index) of a preamble transmitted by the terminal device in the MAC RAR; the terminal equipment traverses the searched MAC RAR; until the system frame number of the lead code transmitted by the terminal equipment is matched with the value corresponding to the identification information carried in the MAC RAR, the value obtained by performing modulo operation on the number of the system frames contained in the RAR time window is obtained; or, when the value obtained by performing modulo operation on the number of the system frames included in the RAR time window by the system frame number of the preamble transmitted by the terminal device is not matched with the value corresponding to the identification information carried in the MAC RAR, traversing all the found MAC RARs. The MAC RAR corresponding to the preamble index transmitted by the terminal device may be an MAC RAR including a Random Access preamble Identifier (RAP ID) equal to an index of a preamble transmitted by the terminal device; therefore, the RAP ID included in the MAC RAR searched by the terminal device is equal to the index of the preamble transmitted by the terminal device.
That is, the terminal device searches for the identification information carried in the first MAC RAR included in the RAR, and compares a value obtained by modulo operation of the system frame number of the preamble transmitted by the terminal device on the system frame number included in the RAR time window with a value corresponding to the identification information carried in the first MAC RAR; if the comparison result is not matched, the terminal searches for identification information carried in a second MAC RAR included in the RAR message, and compares a value obtained by performing modulo operation on the number of system frames contained in the RAR time window by using the system frame number of the lead code transmitted by the terminal equipment with a value corresponding to the identification information carried in the second MAC RAR; if the comparison result is matching, the terminal equipment determines that the RAR message is the RAR message aiming at the terminal equipment; if the comparison result is not matched, the terminal device continues to search the identification information carried in the MAC RAR, which is included in the RAR message, except the first MAC RAR and the second MAC RAR, until the values corresponding to the identification information carried in all the MAC RAR included in the RAR message are not matched with the values obtained by modulo operation of the system frame number of the preamble transmitted by the terminal device on the system frame number included in the RAR time window, and the terminal device determines that the RAR message is not the RAR message for itself.
In another alternative embodiment, the identification information is carried in a fallback Indicator (BI) subheader (subheader). In specific implementation, the identification information is carried in a schematic diagram of the BI sub header, and as shown in fig. 10, the identification information is represented by a value of reserved bits (R bits) in the BI sub header. For example, when the value of the R bit is 00, the identification information is 0; when the value of the R bit is 01, the identification information is 1; when the value of the R bit is 10, the identification information is 2; when the value of the R bit is 11, the identification information is 3. Since there are two R bits in the BI subheader, the case where the indicated identification information is carried in the MAC RAR is applicable to a scenario where the RAR time window is maximum 40 ms.
The identification information is carried in the BI subheader, so that the terminal equipment can determine whether the RAR message is the RAR message for the terminal equipment, and when the terminal equipment determines that the RAR message is the RAR message for the terminal equipment, the terminal equipment further decodes the MAC subPDU corresponding to the BI subheader. And if the terminal equipment determines that the RAR message is not the RAR message for the terminal equipment, the terminal equipment does not decode the MAC subPDU corresponding to the BI subheader.
In yet another alternative embodiment, the identification information is carried in a first sub-header, and the first sub-header is different from the BI sub-header. It is understood that the first sub is a new sub different from the existing sub; the first sub-header comprises some fields in the existing sub-headers, such as E/T/RAPID, and at least one bit is added, and the identification information is represented by the value of the at least one bit in the first sub-header. Since the number of bits representing the identification information in the first sub-header is at least one, the method can be applied to an RAR time window with a larger size as the number of bits representing the identification information increases.
The terminal equipment can determine whether the RAR message is the RAR message aiming at the terminal equipment or not by carrying the identification information in the first subheader, and when the terminal equipment determines that the RAR message is the RAR message aiming at the terminal equipment, the terminal equipment further decodes the MAC subPDU corresponding to the first subheader. And if the terminal equipment determines that the RAR message is not the RAR message for the terminal equipment, the terminal equipment does not decode the MAC subPDU corresponding to the first subheader.
In the embodiment of the application, the RAR message carries the identification information, so that the terminal device can determine whether the RAR message is a RAR message for itself according to the identification information, and avoid the terminal device from transmitting Msg3 according to an instruction in the RAR message not for itself, thereby reducing the collision of random access.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In order to implement the foregoing random access method, an embodiment of the present application provides a terminal device, where a structure of the terminal device 300, as shown in fig. 11, includes:
the processing unit 301 is configured to determine, according to the identifier information carried in the received RAR message, whether the RAR message is an RAR message for the terminal device.
In some embodiments, the identification information is a radio frame identification.
In some embodiments, the identification information is carried in a MAC RAR.
In some embodiments, the identification information is characterized by a value of a reserved bit in the MAC RAR.
In some embodiments, the identification information is carried in a BI subheader.
In some embodiments, the identification information is characterized by a value of a reserved bit in the BI subheader.
In some embodiments, the identification information is carried in a first sub-header, the first sub-header being different from the BI sub-header.
In some embodiments, the identification information is characterized by a value of at least one bit in the first sub.
In some embodiments, the processing unit 301 is configured to determine that the RAR message is an RAR message for the terminal device when a value obtained by performing a modulo operation on the number of system frames included in an RAR time window by a system frame number of a preamble transmitted by the terminal device matches a value corresponding to the identification information;
or, when the value obtained by performing a modulo operation on the number of system frames included in an RAR time window by the system frame number of the preamble transmitted by the terminal device is not matched with the value corresponding to the identification information, determining that the RAR message is not an RAR message for the terminal device.
In some embodiments, the processing unit 301 is configured to, when the identification information is carried in a MAC RAR, the terminal device searches for the MAC RAR corresponding to an index of a preamble transmitted by the terminal device in the MAC RAR included in the RAR message;
traversing the searched MAC RAR until the terminal equipment transmits a system frame number of the lead code to obtain a value obtained by performing modulo operation on the number of the system frames contained in the RAR time window, wherein the value is matched with the value corresponding to the identification information; or until all found MAC RARs are traversed.
In order to implement the foregoing random access method, an embodiment of the present application provides a network device, where a structure of the network device 400, as shown in fig. 12, includes:
a sending unit 401, configured to send an RAR message to a terminal device, where the RAR message carries identification information, and the identification information is used for the terminal device to determine whether the RAR message is an RAR message for the terminal device.
In some embodiments, the identification information is a radio frame identification.
In some embodiments, the identification information is carried in a MAC RAR.
In some embodiments, the identification information is characterized by a value of a reserved bit in the MAC RAR.
In some embodiments, the identification information is carried in a BI subheader.
In some embodiments, the identification information is characterized by a value of a reserved bit in the BI subheader.
In some embodiments, the identification information is carried in a first sub-header, the first sub-header being different from the BI sub-header.
In some embodiments, the identification information is characterized by a value of at least one bit in the first sub.
The embodiment of the present application further provides a terminal device, which includes a processor and a memory for storing a computer program capable of running on the processor, where the processor is configured to execute the steps of the random access method executed by the terminal device when running the computer program.
The embodiment of the present application further provides a network device, which includes a processor and a memory for storing a computer program capable of running on the processor, where the processor is configured to execute the steps of the random access method executed by the network device when running the computer program.
Fig. 13 is a schematic diagram of a hardware composition structure of electronic devices (a terminal device and a network device) according to an embodiment of the present application, where the electronic device 700 includes: at least one processor 701, a memory 702, and at least one network interface 704. The various components in the electronic device 700 are coupled together by a bus system 705. It is understood that the bus system 705 is used to enable communications among the components. The bus system 705 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for clarity of illustration the various busses are labeled in figure 13 as the bus system 705.
It will be appreciated that the memory 702 can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. The non-volatile Memory may be ROM, Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), magnetic random access Memory (FRAM), Flash Memory (Flash Memory), magnetic surface Memory, optical Disc, or Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), Enhanced Synchronous Dynamic Random Access Memory (Enhanced DRAM), Synchronous Dynamic Random Access Memory (SLDRAM), Direct Memory (DRmb Access), and Random Access Memory (DRAM). The memory 702 described in embodiments herein is intended to comprise, without being limited to, these and any other suitable types of memory.
The memory 702 in the embodiments of the present application is used to store various types of data to support the operation of the electronic device 700. Examples of such data include: any computer program for operating on electronic device 700, such as application 7022. A program for implementing the methods according to embodiments of the present application may be included in application 7022.
The method disclosed in the embodiments of the present application may be applied to the processor 701, or implemented by the processor 701. The processor 701 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 701. The Processor 701 may be a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor 701 may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in the memory 702, and the processor 701 may read the information in the memory 702 and perform the steps of the aforementioned methods in conjunction with its hardware.
In an exemplary embodiment, the electronic Device 700 may be implemented by one or more Application Specific Integrated Circuits (ASICs), DSPs, Programmable Logic Devices (PLDs), Complex Programmable Logic Devices (CPLDs), FPGAs, general purpose processors, controllers, MCUs, MPUs, or other electronic components for performing the foregoing methods.
The embodiment of the application also provides a computer storage medium for storing the executable program.
Optionally, the computer storage medium may be applied to the terminal device in the embodiment of the present application, and the executable program enables the computer to execute corresponding processes in each method in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the computer storage medium may be applied to the network device in the embodiment of the present application, and the executable program enables the computer to execute corresponding processes in each method in the embodiment of the present application, which is not described herein again for brevity.
The embodiment of the present application provides a chip, including: and the processor is used for calling and running the computer program from the memory so that the equipment provided with the chip executes the random access method executed by the terminal equipment or the random access method executed by the network equipment.
An embodiment of the present application provides a computer program product, which includes computer program instructions, where the computer program instructions enable a computer to execute a random access method executed by the terminal device or a random access method executed by the network device.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present application and should not be taken as limiting the scope of the present application, as any modifications, equivalents, improvements, etc. made within the spirit and principle of the present application should be included in the scope of the present application.

Claims (46)

  1. A random access method, the method comprising:
    the terminal equipment determines whether the RAR message is the RAR message aiming at the terminal equipment according to the identification information carried in the received random access response RAR message.
  2. The method of claim 1, wherein the identification information is a radio frame identification.
  3. The method according to claim 1 or 2, wherein the identification information is carried in a medium access control random access response, MAC RAR.
  4. The method according to claim 3, wherein the identification information is characterized by a value of a reserved bit in the MAC RAR.
  5. The method according to claim 1 or 2, wherein the identification information is carried in a fallback indication subheader BI subheader.
  6. The method of claim 5, wherein the identification information is characterized by a value of a reserved bit in the BI subheader.
  7. The method of claim 1 or 2, wherein the identification information is carried in a first subheader, the first subheader being different from a BI subheader.
  8. The method of claim 7, wherein the identification information is characterized by a value of at least one bit in the first subheader.
  9. The method according to any one of claims 1 to 8, wherein the determining, by the terminal device, whether the RAR message is an RAR message for the terminal device according to the identification information carried in the received RAR message includes:
    the terminal device determines that the RAR message is the RAR message for the terminal device when a value obtained by performing a modulo operation on the number of system frames contained in an RAR time window by the system frame number of the lead code transmitted by the terminal device is matched with a value corresponding to the identification information;
    or, the terminal device determines that the RAR message is not an RAR message for the terminal device when a value obtained by modulo operation of a system frame number included in an RAR time window by a system frame number of the preamble transmitted by the terminal device is not matched with a value corresponding to the identification information.
  10. The method according to claim 9, wherein the determining, by the terminal device, whether the RAR message is an RAR message for the terminal device according to the identification information carried in the received RAR message includes:
    under the condition that the identification information is carried by the MAC RAR, the terminal equipment searches the MAC RAR corresponding to the index of the lead code transmitted by the terminal equipment in the MAC RAR included in the RAR message;
    traversing the searched MAC RAR until a value obtained by performing modulo operation on the number of the system frames contained in the RAR time window by the system frame number of the lead code transmitted by the terminal equipment is matched with a value corresponding to the identification information; or until all found MAC RARs are traversed.
  11. A random access method, the method comprising:
    the method comprises the steps that network equipment sends a Random Access Response (RAR) message to terminal equipment, wherein the RAR message carries identification information, and the identification information is used for the terminal equipment to determine whether the RAR message is the RAR message aiming at the terminal equipment.
  12. The method of claim 11, wherein the identification information is a radio frame identification.
  13. The method according to claim 11 or 12, wherein the identification information is carried in a medium access control random access response, MAC RAR.
  14. The method of claim 13, wherein the identification information is characterized by a value of a reserved bit in the MAC RAR.
  15. The method according to claim 11 or 12, wherein the identification information is carried in a fallback indication subheader BI subheader.
  16. The method of claim 15, wherein the identification information is characterized by a value of a reserved bit in the BI subheader.
  17. The method of claim 11 or 12, wherein the identification information is carried in a first subheader, the first subheader being different from a BI subheader.
  18. The method of claim 17, wherein the identification information is characterized by a value of at least one bit in the first subheader.
  19. A terminal device, the terminal device comprising:
    and the processing unit is configured to determine whether the RAR message is the RAR message for the terminal device according to the identification information carried in the received RAR message.
  20. The terminal device of claim 19, wherein the identification information is a radio frame identification.
  21. The terminal device according to claim 19 or 20, wherein the identification information is carried in a medium access control random access response, MAC RAR.
  22. The terminal device of claim 21, wherein the identification information is characterized by a value of a reserved bit in the MAC RAR.
  23. The terminal device according to claim 19 or 20, wherein the identification information is carried in a fallback indication subheader BI subheader.
  24. The terminal device of claim 23, wherein the identification information is characterized by a value of a reserved bit in the BI subheader.
  25. The terminal device of claim 19 or 20, wherein the identification information is carried in a first sub-header, the first sub-header being different from a BI sub-header.
  26. The terminal device of claim 25, wherein the identification information is characterized by a value of at least one bit in the first sub.
  27. The terminal device according to any one of claims 19 to 26, wherein the processing unit is configured to determine that the RAR message is an RAR message for the terminal device when a value obtained by modulo operation of a system frame number included in an RAR time window by a system frame number of a preamble transmitted by the terminal device matches a value corresponding to the identification information;
    or, when the value obtained by performing a modulo operation on the number of system frames included in an RAR time window by the system frame number of the preamble transmitted by the terminal device is not matched with the value corresponding to the identification information, determining that the RAR message is not an RAR message for the terminal device.
  28. The terminal device according to claim 27, wherein the processing unit is configured to, in a case where the identification information is carried by a MAC RAR, look up a MAC RAR corresponding to an index of a preamble transmitted by the terminal device from the MAC RAR included in the RAR message;
    traversing the searched MAC RAR until a value obtained by performing modulo operation on the number of the system frames contained in the RAR time window by the system frame number of the lead code transmitted by the terminal equipment is matched with a value corresponding to the identification information; or until all found MAC RARs are traversed.
  29. A network device, the network device comprising:
    a sending unit, configured to send a random access response RAR message to a terminal device, where the RAR message carries identification information, and the identification information is used for the terminal device to determine whether the RAR message is an RAR message for the terminal device.
  30. The network device of claim 29, wherein the identification information is a radio frame identification.
  31. The network device of claim 29 or 30, wherein the identification information is carried in a media access control random access response, MAC RAR.
  32. The network device of claim 31, wherein the identification information is characterized by a value of a reserved bit in the MAC RAR.
  33. The network device of claim 29 or 30, wherein the identification information is carried in a fallback indication subheader BI subheader.
  34. The network device of claim 33, wherein the identification information is characterized by a value of a reserved bit in the BI subheader.
  35. The network device of claim 29 or 30, wherein the identification information is carried in a first sub-header, the first sub-header being different from a BI sub-header.
  36. The network device of claim 35, wherein the identification information is characterized by a value of at least one bit in the first subheader.
  37. A terminal device comprising a processor and a memory for storing a computer program capable of running on the processor, wherein,
    the processor is adapted to perform the steps of the random access method of any of claims 1 to 10 when running the computer program.
  38. A network device comprising a processor and a memory for storing a computer program capable of running on the processor, wherein,
    the processor is adapted to perform the steps of the random access method of any of claims 11 to 18 when running the computer program.
  39. A computer storage medium storing an executable program which, when executed by a processor, implements the random access method of any one of claims 1 to 10.
  40. A computer storage medium storing an executable program which, when executed by a processor, implements the random access method of any one of claims 11 to 18.
  41. A computer program product comprising computer program instructions to cause a computer to perform the random access method of any one of claims 1 to 10.
  42. A computer program product comprising computer program instructions to cause a computer to perform the random access method of any one of claims 11 to 18.
  43. A computer program for causing a computer to execute the random access method according to any one of claims 1 to 10.
  44. A computer program for causing a computer to perform the random access method of any one of claims 11 to 18.
  45. A chip, comprising: a processor for calling and running a computer program from a memory so that a device in which the chip is installed performs the random access method according to any one of claims 1 to 10.
  46. A chip, comprising: a processor for calling and running a computer program from a memory so that a device in which the chip is installed performs the random access method according to any one of claims 11 to 18.
CN201980099354.7A 2019-10-10 2019-10-10 Random access method, electronic device and storage medium Pending CN114223308A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/110463 WO2021068172A1 (en) 2019-10-10 2019-10-10 Random access method, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN114223308A true CN114223308A (en) 2022-03-22

Family

ID=75436899

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980099354.7A Pending CN114223308A (en) 2019-10-10 2019-10-10 Random access method, electronic device and storage medium

Country Status (2)

Country Link
CN (1) CN114223308A (en)
WO (1) WO2021068172A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113543352B (en) * 2021-07-14 2023-05-30 上海擎昆信息科技有限公司 Random access response determination method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018102966A1 (en) * 2016-12-05 2018-06-14 广东欧珀移动通信有限公司 Method for random access, network device, and terminal device
CN109691216A (en) * 2016-12-02 2019-04-26 Oppo广东移动通信有限公司 For the method for random access, terminal device and the network equipment
CN109788575A (en) * 2017-11-15 2019-05-21 维沃移动通信有限公司 Method of reseptance, sending method, terminal and the network equipment of random access response
CN109803340A (en) * 2017-11-17 2019-05-24 中兴通讯股份有限公司 Method for message transmission, user equipment, base station and computer readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107360628B (en) * 2016-05-10 2020-06-12 中国移动通信有限公司研究院 Random access method, base station and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109691216A (en) * 2016-12-02 2019-04-26 Oppo广东移动通信有限公司 For the method for random access, terminal device and the network equipment
WO2018102966A1 (en) * 2016-12-05 2018-06-14 广东欧珀移动通信有限公司 Method for random access, network device, and terminal device
CN109788575A (en) * 2017-11-15 2019-05-21 维沃移动通信有限公司 Method of reseptance, sending method, terminal and the network equipment of random access response
CN109803340A (en) * 2017-11-17 2019-05-24 中兴通讯股份有限公司 Method for message transmission, user equipment, base station and computer readable storage medium

Also Published As

Publication number Publication date
WO2021068172A1 (en) 2021-04-15

Similar Documents

Publication Publication Date Title
CN113207188B (en) Information transmission method, electronic equipment and storage medium
WO2020056721A1 (en) Random access method and apparatus, network device, and terminal
CN114025433B (en) Method, terminal equipment and network equipment for two-step random access
US20210168857A1 (en) Load control method and apparatus, network device, and terminal
CN116916426A (en) Channel monitoring method, electronic equipment and storage medium
WO2020056736A1 (en) Random access control method and apparatus, network device, and terminal
WO2020024616A1 (en) Random access method and related device
CN113597809A (en) Random access method and device, user equipment and network equipment
CN112806086B (en) Random access method, equipment and storage medium
CN112789939B (en) Power control method and device, terminal and network equipment
US20230129426A1 (en) Wireless communication method and terminal device
CN112205061B (en) Resource association method and device, terminal and network equipment
CN114223308A (en) Random access method, electronic device and storage medium
CN113678560A (en) Method for transmitting information in random access process, terminal equipment and network equipment
US20220015153A1 (en) Channel transmission method, electronic device, and storage medium
CN113170514B (en) Random access method and device, terminal and network equipment
WO2021174467A1 (en) Data transmission method, electronic device, and storage medium
WO2020082394A1 (en) Random access method, terminal device and network device
TW202008765A (en) Information transmission method and apparatus, terminal device, and network device
CN112806068B (en) Resource management method, equipment and storage medium
US20230363007A1 (en) Methods for channel transmission and terminal device
CN114222350B (en) Random access method and device, user equipment and network equipment
WO2021208048A1 (en) Data transmission method, terminal device and storage medium
WO2020220252A1 (en) Random access method and device and storage medium
WO2020186468A1 (en) Random access method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination