CN114285533A - Method and apparatus in a node used for wireless communication - Google Patents

Method and apparatus in a node used for wireless communication Download PDF

Info

Publication number
CN114285533A
CN114285533A CN202011032439.4A CN202011032439A CN114285533A CN 114285533 A CN114285533 A CN 114285533A CN 202011032439 A CN202011032439 A CN 202011032439A CN 114285533 A CN114285533 A CN 114285533A
Authority
CN
China
Prior art keywords
identity
message
signaling
time window
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011032439.4A
Other languages
Chinese (zh)
Other versions
CN114285533B (en
Inventor
蒋琦
张晓博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Langbo Communication Technology Co Ltd
Original Assignee
Shanghai Langbo Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Langbo Communication Technology Co Ltd filed Critical Shanghai Langbo Communication Technology Co Ltd
Priority to CN202310929750.6A priority Critical patent/CN117675149A/en
Priority to CN202011032439.4A priority patent/CN114285533B/en
Priority to PCT/CN2021/118435 priority patent/WO2022057817A1/en
Publication of CN114285533A publication Critical patent/CN114285533A/en
Priority to US18/120,437 priority patent/US20230216563A1/en
Application granted granted Critical
Publication of CN114285533B publication Critical patent/CN114285533B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A method and apparatus in a node used for wireless communication is disclosed. A node first sends a first message over an air interface, the first message comprising a first identity; subsequently monitoring for first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities; when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window. The method and the device for optimizing the design of the RNTI are used for improving the mobility performance.

Description

Method and apparatus in a node used for wireless communication
Technical Field
The present application relates to transmission methods and apparatus in wireless communication systems, and more particularly, to design schemes and apparatus related to tentative radio network identification in wireless communication.
Background
In LTE systems, inter-cell Handover (Handover) is controlled by the base station based on UE (User Equipment) measurements. The mechanism in LTE is basically followed for inter-cell handover in 3GPP (3rd Generation Partner Project) R (Release) 15. In NR (New Radio) systems, more application scenarios need to be supported, and some application scenarios, such as URLLC (Ultra-Reliable and Low Latency Communications), place high demands on Latency, and also place New challenges on inter-cell handover.
In the NR system, large-scale (Massive) MIMO (Multiple Input Multiple Output) is an important technical feature. In large-scale MIMO, multiple antennas form a narrow beam pointing to a specific direction by beamforming to improve communication quality. The beams formed by multi-antenna beamforming are generally narrow, and the beams of both communication parties need to be aligned for effective communication.
Disclosure of Invention
The inventors have found through research that beam-based communication can negatively affect inter-cell handover, such as additional delay and ping-pong effects. How to reduce these negative effects, improve the terminal switching speed, and further improve the performance of the cell border users to meet the requirements of various application scenarios is a problem to be solved.
In view of the above, the present application discloses a solution. It should be noted that although the above description uses the large-scale MIMO and beam-based communication scenarios as examples, the present application is also applicable to other scenarios such as LTE multi-antenna systems and achieves similar technical effects as in the large-scale MIMO and beam-based communication scenarios. Furthermore, the adoption of a unified solution for different scenarios (including but not limited to large scale MIMO, beam-based communication and LTE multi-antenna systems) also helps to reduce hardware complexity and cost. Without conflict, embodiments and features of embodiments in any node of the present application may be applied to any other node and vice versa. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.
In response to the above problems, the present application discloses a method and apparatus for inter-cell handover and mobility management of layer 1/2. It should be noted that, without conflict, the embodiments and features in the embodiments in the user equipment of the present application may be applied to the base station, and vice versa. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict. Further, although the purpose of the present application is for cellular networks, the present application can also be used for internet of things and car networking. Further, although the present application was originally directed to multi-carrier communication, the present application can also be applied to single-carrier communication. Further, although the present application was originally directed to multi-antenna communication, the present application can also be applied to single-antenna communication. Further, although the original intention of the present application is directed to the terminal and base station scenario, the present application is also applicable to the terminal and terminal, the terminal and relay, the Non-Terrestrial network (NTN), and the communication scenario between the relay and the base station, and similar technical effects in the terminal and base station scenario are obtained. Furthermore, the adoption of a unified solution for different scenarios (including but not limited to the communication scenario of the terminal and the base station) also helps to reduce hardware complexity and cost.
Further, without conflict, embodiments and features of embodiments in a first node device of the present application may apply to a second node device and vice versa. In particular, the terms (telematics), nouns, functions, variables in the present application may be explained (if not specifically stated) with reference to the definitions in the 3GPP specification protocol TS (technical specification)36 series, TS38 series, TS37 series.
The application discloses a method in a first node for wireless communication, comprising:
transmitting a first message over an air interface, the first message comprising a first identity;
monitoring for first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
the first identity is a C-RNTI (Cell-Radio Network Temporary identity), the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI (Radio Network Temporary identity); the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, one technical feature of the above method is that: in order to improve the handover speed and avoid the interaction of layer three, the first node maintains Identity (Identity) in multiple cells, that is, the first Identity set is multiple RNTIs maintained by the first node in multiple cells, and then any one of the RNTIs in the first Identity set can be used as the feedback of random access when the first node moves among multiple cells, so that the speed of random access of the terminal is improved, and the handover efficiency is improved.
According to an aspect of the application, the second receiver receives a second message when the first signaling is detected in the first time window; the first signaling comprises configuration information of a channel occupied by the second message, and the second message comprises any identity in the first identity set.
As an embodiment, one technical feature of the above method is that: the identities included in the first identity set are used for subsequent scheduling of the first node, so that the number of interactions is reduced, and the switching efficiency is improved.
According to an aspect of the application, the behavior monitoring the first signaling over the air interface in the first time window comprises: monitoring the first signaling in a first set of REs (Resource Elements) and a second set of REs in the first time window, respectively; the first identity is used for the monitoring behavior in the first set of REs, a second identity is used for the monitoring behavior in the second set of REs, the first set of identities including the first identity and the second identity.
As an embodiment, one technical feature of the above method is that: and respectively corresponding the first RE set and the second RE set to different cells to realize the purpose of receiving the feedback of the first message on time-frequency resources corresponding to different cells, thereby realizing the purpose of fast switching.
According to one aspect of the application, comprising:
transmitting the first characteristic sequence;
receiving a third message;
wherein the first signature sequence is used to trigger the third message, which is used to trigger the first message.
According to one aspect of the application, comprising:
receiving a first information block;
wherein the first information block is used to indicate a first identity set.
According to an aspect of the present application, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and an identifier corresponding to the first cell is different from an identifier corresponding to the second cell.
According to an aspect of the application, the first identity and the second identity are assigned to the first node and a second terminal, respectively, the first node and the second terminal being two different terminals.
As an embodiment, one technical feature of the above method is that: if a group host (group transmission) mode is adopted in the Internet of vehicles, one terminal can share the identities of a plurality of terminals, and then a plurality of identities can be used for responding and scheduling of one terminal, so that the transmission efficiency is improved.
According to an aspect of the application, any identity comprised by the first set of identities can be used by the first node to determine whether the first signaling is correctly received only if the first message is associated to downlink radio signal resources of a second cell.
As an embodiment, one technical feature of the above method is that: and the first node determines whether to initiate random access to a source cell or initiate random access to a new cell according to the selected time-frequency resource or beam information associated with the first message, and determines whether to detect the first signaling according to all identities in the first identity set or only according to the first identity, so that the blind detection efficiency is improved, and the false detection is avoided.
The application discloses a method in a second node for wireless communication, comprising:
receiving a first message over an air interface, the first message comprising a first identity;
transmitting first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, a sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
According to one aspect of the application, comprising:
sending a second message;
wherein the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the any identity in the first identity set.
According to an aspect of the application, the second node sends the first signaling in at least one of a first set of REs or a second set of REs in the first time window; the first identity is used to scramble a CRC included in the first signaling when the first signaling is transmitted in the first set of REs; when the first signaling is sent in the second set of REs, a second identity is used to scramble a CRC included in the first signaling; the first set of identities includes the first identity and the second identity.
According to one aspect of the application, comprising:
receiving a first signature sequence;
sending a third message;
wherein the first signature sequence is used to trigger the third message, which is used to trigger the first message.
According to one aspect of the application, comprising:
transmitting a first information block;
wherein the first information block is used to indicate the first identity set.
According to an aspect of the present application, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and an identifier corresponding to the first cell is different from an identifier corresponding to the second cell.
According to an aspect of the present application, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and an identifier corresponding to the first cell is different from an identifier corresponding to the second cell.
According to an aspect of the application, the first identity and the second identity are assigned to the first node and a second terminal, respectively, the first node and the second terminal being two different terminals.
According to an aspect of the application, any identity comprised by the first set of identities can be used by the second node to scramble a CRC comprised by the first signaling only if the first message is associated to downlink radio signal resources of a second cell.
The application discloses a first node for wireless communication, including:
a first transceiver to transmit a first message over an air interface, the first message comprising a first identity;
a first receiver to monitor for first signaling over an air interface in a first time window, the first signaling identified by any one of a first set of identities;
the second receiver judges that the random access process to which the first message belongs is successful when the first signaling is detected in the first time window; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
The application discloses a second node for wireless communication, including:
a second transceiver to receive a first message over an air interface, the first message comprising a first identity;
a first transmitter to transmit first signaling over an air interface in a first time window, the first signaling being identified by any one of a first set of identities;
when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, a sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an example, compared with the conventional scheme, the method has the following advantages:
in order to increase the handover speed and avoid the interaction of layer three, the first node maintains identities in multiple cells, that is, the first identity set is multiple RNTIs maintained by the first node in multiple cells, and then any one of the RNTIs in the first identity set can be used as a feedback for random access when the first node moves among multiple cells, so as to increase the speed of random access of the terminal, thereby increasing the handover efficiency;
if a Groupcast mode is adopted in the internet of vehicles, one terminal can share identities of a plurality of terminals, and then the identities can be used for responding and scheduling of the terminal so as to improve the transmission efficiency;
the first node determines whether to initiate random access to a source cell or to initiate random access to a new cell according to the selected time-frequency resource or beam information associated with the first message, and determines whether to detect the first signaling according to all identities in the first identity set or only according to the first identity, thereby improving blind detection efficiency and avoiding false detection.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof with reference to the accompanying drawings in which:
FIG. 1 illustrates a process flow diagram of a first node according to one embodiment of the present application;
FIG. 2 shows a schematic diagram of a network architecture according to an embodiment of the present application;
figure 3 shows a schematic diagram of an embodiment of a radio protocol architecture for the user plane and the control plane according to an embodiment of the present application;
FIG. 4 shows a schematic diagram of a first communication device and a second communication device according to an embodiment of the present application;
fig. 5 shows a flow diagram of first signaling according to an embodiment of the application;
FIG. 6 shows a flow diagram of a second message according to one embodiment of the present application;
FIG. 7 shows a flow diagram of a first sequence of features according to an embodiment of the present application;
fig. 8 shows a schematic diagram of a first RE set and a second RE set according to an embodiment of the present application;
figure 9 shows a schematic diagram of a first cell and a second cell according to an embodiment of the present application;
FIG. 10 shows a block diagram of a processing arrangement in a first node device according to an embodiment of the present application;
fig. 11 shows a block diagram of a processing apparatus in a second node device according to an embodiment of the present application.
Detailed Description
The technical solutions of the present application will be further described in detail with reference to the accompanying drawings, and it should be noted that the embodiments and features of the embodiments of the present application can be arbitrarily combined with each other without conflict.
Example 1
Embodiment 1 illustrates a processing flow diagram of a first node, as shown in fig. 1. In 100 shown in fig. 1, each block represents a step. In embodiment 1, a first node in the present application sends a first message over an air interface in step 101; monitoring 102 for first signaling over an air interface in a first time window; when the first signaling is detected in the first time window in step 103, determining that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
in embodiment 1, the first message includes a first identity, and the first signaling is identified by any identity in a first identity set; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an example, the meaning over the air interface includes: by wireless signal transmission.
As an example, the meaning over the air interface includes: transmitted over a cellular link.
As an example, the meaning over the air interface includes: transmission over Sidelink.
As an example, the meaning over the air interface includes: the first message is transmitted via a wireless signal.
As an example, the meaning over the air interface includes: the recipient of the first message and the first node are Non-Quasi Co-located.
As an example, the meaning over the air interface includes: there is no wired connection between the recipient of the first message and the first node.
For one embodiment, the air interface includes a PC-5 interface.
For one embodiment, the air interface comprises a Uu interface.
As one embodiment, the monitoring includes blind detection.
As an embodiment, the monitoring includes a CRC (Cyclic Redundancy Check) Check.
As one embodiment, the monitoring includes receiving.
As one embodiment, the monitoring includes demodulating.
As one embodiment, the monitoring includes coherent detection.
As one embodiment, the monitoring includes energy detection.
As an embodiment, the first message is used to trigger the first signaling.
As an embodiment, the Physical layer CHannel carrying the first message includes a PUSCH (Physical Uplink Shared CHannel).
As an embodiment, the Physical layer Channel carrying the first message includes a PRACH (Physical Random Access Channel).
As an example, the above phrase that the first message includes the meaning of the first identity includes: the first message indicates the first identity.
As an example, the above phrase that the first message includes the meaning of the first identity includes: the first identity is used to generate a wireless signal carrying the first message.
As an example, the above phrase that the first message includes the meaning of the first identity includes: the first identity is used to generate a Preamble carrying the first message.
As an example, the above phrase that the first message includes the meaning of the first identity includes: the first identity is used to generate a sequence carrying the first message.
As an example, the above phrase that the first message includes the meaning of the first identity includes: an air interface resource occupied by the first message is used for indicating the first identity, and the air interface resource comprises at least one of a frequency domain resource, a time domain resource or a code domain resource.
As one embodiment, the first message is Msg1 (message 1).
As one embodiment, the first message is Msg3 (message 3).
As an embodiment, the first message is MsgA (message a).
As an embodiment, the first message includes C-RNTI MAC (Medium Access Control) CE (Control Elements).
As an embodiment, the first message includes a UE collision Resolution Identity (context Resolution Identity) MAC CE.
As an embodiment, the first time window is a ra-ContentionResolutionTimer.
As an embodiment, the start time of the first time window is a start time of ra-ContentionResolutionTimer, and the end time of the first time window is a time when ra-ContentionResolutionTimer expires.
As an embodiment, the start time of the first time window is the start time of the ra-ContentionResolutionTimer, and the end time of the first time window is the time at which the ra-ContentionResolutionTimer is stopped (Stop).
As an embodiment, the starting time of the first time window is the starting time of msgB-ResponseWindow.
As an embodiment, the expiration time of the first time window is the time when msgB-ResponseWindow expires.
As an embodiment, the cut-off time of the first time window is the time at which msgB-ResponseWindow is stopped (Stop).
As one embodiment, the first identity is a non-negative integer.
As an example, the first Identity is an Identity.
As an example, the first identity is represented by a four-digit 16-ary number.
As one embodiment, the first identity is used to identify the first node.
As an embodiment, the first identity is used to uniquely identify the first node in a cell.
As an embodiment, the first identity is used to uniquely identify the first node in a group of terminals.
As one embodiment, the first set of identities includes the first identity.
As an embodiment, the first identity does not comprise the first identity.
As one embodiment, the first set of identities includes K1 identities, the K1 being a positive integer greater than 1.
As a sub-embodiment of this embodiment, any of the K1 identities is a C-RNTI.
As a sub-embodiment of this embodiment, any of the K1 identities is an RNTI.
As a sub-embodiment of this embodiment, any of the K1 identities is a Member identity (Member ID).
As a sub-embodiment of this embodiment, any one of the K1 identities is a Destination identity (Destination ID).
As a sub-embodiment of this embodiment, the K1 identities are the identities of the first node in K1 cells, respectively.
As a sub-embodiment of this embodiment, the K1 identities are the identities of the first node in K1 base stations, respectively.
As a sub-embodiment of this embodiment, the K1 identities are the identities of the first node in K1 TRPs (transmitting and receiving nodes), respectively.
As a sub-embodiment of this embodiment, the K1 identities respectively correspond to K1 different terminals, the first node is one terminal of the K1 different terminals, and the K1 different terminals belong to a terminal group.
As an embodiment, the first set of identities only comprises the first identity and the second identity in this application.
As an embodiment, the act of determining that the random access procedure to which the first message belongs is unsuccessful comprises: and reinitiating a new random access process.
As an embodiment, the act of determining that the random access procedure to which the first message belongs is unsuccessful comprises: the first counter is incremented by 1.
As a sub-embodiment of this embodiment, the first counter is maintained at the MAC layer.
As a sub-embodiment of this embodiment, the first COUNTER is PREAMBLE _ transition _ COUNTER.
As a sub-embodiment of this embodiment, higher layers are notified of random access problems when the first counter reaches a first threshold.
As a sub-embodiment of this embodiment, when the first counter reaches a first threshold, a Radio Link Failure (RLF) is determined.
As a sub-embodiment of this embodiment, the first threshold in this application is equal to the sum of preambleTransMax and 1.
As an embodiment, the random access is used for access initiated by the first node to a base station.
As an embodiment, the random access is used for access initiated by the first node to a terminal.
As an embodiment, the random access is used for access initiated by the first node to an RSU (Road Side Unit).
As one embodiment, the random access is used for access initiated by the first node to a Group Head (Group Head).
As an embodiment, when the first signaling is identified by a given identity, the CRC included in the first signaling is scrambled by the given identity.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to generate an RS (Reference Signal) sequence of a DMRS (Demodulation Reference Signal) of a channel occupied by the first signaling.
As an embodiment, the first signaling indicates a given identity when the first signaling is identified by the given identity.
As an embodiment, when the first signaling is identified by a given identity, the data channel scheduled by the first signaling indicates the given identity.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a set of REs (Resource elements) occupied by the first signaling.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a Control Resource Set (core Set) to which the first signaling belongs.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a Set of Search spaces (Search Space Set) to which the first signaling belongs.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a control resource set Pool (CORESET Pool) to which the first signaling belongs.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a Search Space Set Pool (Search Space Set Pool) to which the first signaling belongs.
As an embodiment, the given identity in this application is any identity in the first set of identities.
As an embodiment, the given identity in this application is one identity in the first set of identities.
As an embodiment, the Physical layer Channel occupied by the first signaling includes a PDCCH (Physical Downlink Control Channel).
As an embodiment, the Physical layer Channel occupied by the first signaling includes a PSCCH (Physical Sidelink Control Channel).
As an embodiment, the determining that the time domain resource occupied by the first message in the sentence is used for determining the meaning of the first time window includes: the time Slot (Slot) occupied by the first message is used to determine a starting time Slot occupied by the first time window in the time domain.
As an embodiment, the determining that the time domain resource occupied by the first message in the sentence is used for determining the meaning of the first time window includes: the time slot occupied by the first message is used for determining the cut-off time slot occupied by the first time window in the time domain.
As an embodiment, the determining that the time domain resource occupied by the first message in the sentence is used for determining the meaning of the first time window includes: the first message occupies an nth time slot, the starting time slot occupied by the first time window is an N + N1 th time slot, the N1 is fixed, or the N1 is configured through RRC signaling; both said N and said N1 are non-negative integers.
As an example, the first time window occupies a positive integer number of consecutive milliseconds in the time domain.
As an embodiment, the first time window occupies a positive integer number of consecutive time slots in the time domain.
As an embodiment, the first identity and the second identity are used for data transmission on a first radio bearer and a second radio bearer, respectively.
As a sub-embodiment of this embodiment, an RLC (Radio Link Control, Radio Link layer Control protocol) bearer in the first Radio bearer and an RLC bearer in the second Radio bearer are configured by two different CellGroupConfig IEs, respectively.
As an embodiment, the first signaling is a DCI (Downlink Control Information).
As an embodiment, the first signaling is a SCI (Sidelink Control Information).
Example 2
Embodiment 2 illustrates a schematic diagram of a network architecture, as shown in fig. 2.
Fig. 2 illustrates a diagram of a network architecture 200 for 5G NR, LTE (Long-Term Evolution), and LTE-a (Long-Term Evolution-enhanced) systems. The 5G NR or LTE network architecture 200 may be referred to as EPS (Evolved Packet System) 200 or some other suitable terminology. The EPS 200 may include a UE (User Equipment) 201, an NG-RAN (next generation radio access Network) 202, an EPC (Evolved Packet Core)/5G-CN (5G-Core Network,5G Core Network) 210, an HSS (Home Subscriber Server) 220, and an internet service 230. The EPS may interconnect with other access networks, but these entities/interfaces are not shown for simplicity. As shown, the EPS provides packet-switched services, however those skilled in the art will readily appreciate that the various concepts presented throughout this application may be extended to networks providing circuit-switched services or other cellular networks. The NG-RAN includes NR node b (gNB)203 and other gnbs 204. The gNB203 provides user and control plane protocol termination towards the UE 201. The gnbs 203 may be connected to other gnbs 204 via an Xn interface (e.g., backhaul). The gNB203 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a Basic Service Set (BSS), an Extended Service Set (ESS), a TRP (transmitting receiving node), or some other suitable terminology. The gNB203 provides an access point for the UE201 to the EPC/5G-CN 210. Examples of the UE201 include a cellular phone, a smart phone, a Session Initiation Protocol (SIP) phone, a laptop, a Personal Digital Assistant (PDA), a satellite radio, non-terrestrial base station communications, satellite mobile communications, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, a drone, an aircraft, a narrowband internet of things device, a machine type communication device, a terrestrial vehicle, an automobile, a wearable device, or any other similar functioning device. Those skilled in the art may also refer to UE201 as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless communication device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. The gNB203 connects to the EPC/5G-CN210 through the S1/NG interface. The EPC/5G-CN210 includes MME (Mobility Management Entity)/AMF (Authentication Management Domain)/UPF (User Plane Function) 211, other MMEs/AMF/UPF 214, S-GW (Service Gateway) 212, and P-GW (Packet data Network Gateway) 213. MME/AMF/UPF211 is a control node that handles signaling between UE201 and EPC/5G-CN 210. In general, the MME/AMF/UPF211 provides bearer and connection management. All user IP (Internet protocol) packets are transmitted through S-GW212, and S-GW212 itself is connected to P-GW 213. The P-GW213 provides UE IP address allocation as well as other functions. The P-GW213 is connected to the internet service 230. The internet service 230 includes an operator-corresponding internet protocol service, and may specifically include the internet, an intranet, an IMS (IP Multimedia Subsystem), and a packet-switched streaming service.
As an embodiment, the UE201 corresponds to the first node in this application.
As an embodiment, the UE201 is a terminal with inter-cell handover capability triggering L1/L2.
As an embodiment, the UE201 is a terminal with the capability of monitoring multiple beams simultaneously.
As an embodiment, the UE201 is a terminal supporting Massive-MIMO.
As an embodiment, the UE201 is a terminal supporting V2X (Vehicle-to-event).
As an embodiment, the gNB203 corresponds to the second node in this application.
As an embodiment, the gNB203 supports inter-cell handover functionality of L1/L2.
As an embodiment, the gNB203 supports multi-beam transmission.
As an embodiment, the gNB203 supports Massive-MIMO based transmission.
Example 3
Embodiment 3 shows a schematic diagram of an embodiment of a radio protocol architecture for the user plane and the control plane according to the present application, as shown in fig. 3. Fig. 3 is a schematic diagram illustrating an embodiment of radio protocol architecture for the user plane 350 and the control plane 300, fig. 3 showing the radio protocol architecture for the control plane 300 between a first communication node device (UE, RSU in gbb or V2X) and a second communication node device (gbb, RSU in UE or V2X) in three layers: layer 1, layer 2 and layer 3. Layer 1(L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions. The L1 layer will be referred to herein as PHY 301. Layer 2(L2 layer) 305 is above PHY301 and is responsible for the link between the first communication node device and the second communication node device through PHY 301. The L2 layer 305 includes a MAC (Medium Access Control) sublayer 302, an RLC (Radio Link Control) sublayer 303, and a PDCP (Packet Data Convergence Protocol) sublayer 304, which terminate at the second communication node device. The PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels. The PDCP sublayer 304 also provides security by ciphering data packets, and the PDCP sublayer 304 also provides handover support for a first communication node device to a second communication node device. The RLC sublayer 303 provides segmentation and reassembly of upper layer packets, retransmission of lost packets, and reordering of packets to compensate for out-of-order reception due to HARQ. The MAC sublayer 302 provides multiplexing between logical and transport channels. The MAC sublayer 302 is also responsible for allocating various radio resources (e.g., resource blocks) in one cell between the first communication node devices. The MAC sublayer 302 is also responsible for HARQ operations. A RRC (Radio resource Control) sublayer 306 in layer 3 (layer L3) in the Control plane 300 is responsible for obtaining Radio resources (i.e., Radio bearers) and configuring the lower layers using RRC signaling between the second communication node device and the first communication node device. The radio protocol architecture of the user plane 350 comprises layer 1(L1 layer) and layer 2(L2 layer), the radio protocol architecture in the user plane 350 for the first and second communication node devices being substantially the same for the physical layer 351, the PDCP sublayer 354 in the L2 layer 355, the RLC sublayer 353 in the L2 layer 355 and the MAC sublayer 352 in the L2 layer 355 as the corresponding layers and sublayers in the control plane 300, but the PDCP sublayer 354 also provides header compression for upper layer packets to reduce radio transmission overhead. The L2 layer 355 in the user plane 350 further includes an SDAP (Service Data Adaptation Protocol) sublayer 356, and the SDAP sublayer 356 is responsible for mapping between QoS streams and Data Radio Bearers (DRBs) to support diversity of services. Although not shown, the first communication node device may have several upper layers above the L2 layer 355, including a network layer (e.g., IP layer) that terminates at the P-GW on the network side and an application layer that terminates at the other end of the connection (e.g., far end UE, server, etc.).
As an example, the wireless protocol architecture in fig. 3 is applicable to the first node in this application.
As an example, the radio protocol architecture in fig. 3 is applicable to the second node in this application.
As an embodiment, the PDCP304 of the second communication node device is used to generate a schedule for the first communication node device.
As an embodiment, the PDCP354 of the second communication node device is used to generate a schedule for the first communication node device.
As an embodiment, the first message in the present application is generated in the PHY301 or the PHY 351.
As an embodiment, the first message in this application is generated in the MAC302 or the MAC 352.
As an embodiment, the first message in this application is generated in the RRC 306.
As an embodiment, the first signaling in the present application is generated in the PHY301 or the PHY 351.
As an embodiment, the first signaling in this application is generated in the MAC302 or the MAC 352.
As an embodiment, the first signaling in this application is generated in the RRC 306.
As an embodiment, the second message in the present application is generated in the PHY301 or the PHY 351.
As an embodiment, the second message in this application is generated in the MAC302 or the MAC 352.
As an embodiment, the second message in this application is generated in the RRC 306.
As an embodiment, the third message in the present application is generated in the PHY301 or the PHY 351.
As an embodiment, the third message in this application is generated in the MAC302 or the MAC 352.
As an embodiment, the third message in this application is generated in the RRC 306.
As an embodiment, the first signature sequence in this application is generated in the PHY301 or the PHY 351.
As an embodiment, the first signature sequence in this application is generated in the MAC302 or the MAC 352.
As an embodiment, the first information block in the present application is generated in the MAC302 or the MAC 352.
As an embodiment, the first information block in this application is generated in the RRC 306.
As an embodiment, the first node is a terminal.
As an embodiment, the second node is a terminal.
As an embodiment, the second node is an RSU.
As an embodiment, the second node is a Grouphead.
As an embodiment, the second node is a TRP (Transmitter Receiver Point).
As an embodiment, the second node is an eNB.
As an embodiment, the second node is a base station.
Example 4
Embodiment 4 shows a schematic diagram of a first communication device and a second communication device according to the present application, as shown in fig. 4. Fig. 4 is a block diagram of a first communication device 450 and a second communication device 410 communicating with each other in an access network.
The first communications device 450 includes a controller/processor 459, a memory 460, a data source 467, a transmit processor 468, a receive processor 456, a multi-antenna transmit processor 457, a multi-antenna receive processor 458, a transmitter/receiver 454, and an antenna 452.
The second communication device 410 includes a controller/processor 475, a memory 476, a receive processor 470, a transmit processor 416, a multiple antenna receive processor 472, a multiple antenna transmit processor 471, a transmitter/receiver 418, and an antenna 420.
In the transmission from the second communication device 410 to the first communication device 450, at the second communication device 410, upper layer data packets from the core network are provided to the controller/processor 475. The controller/processor 475 implements the functionality of layer L2. In transmissions from the second communications device 410 to the first communications device 450, the controller/processor 475 provides header compression, encryption, packet segmentation and reordering, multiplexing between logical and transport channels, and radio resource allocation to the first communications device 450 based on various priority metrics. The controller/processor 475 is also responsible for retransmission of lost packets, and signaling to the first communication device 450. The transmit processor 416 and the multi-antenna transmit processor 471 implement various signal processing functions for the L1 layer (i.e., the physical layer). The transmit processor 416 implements coding and interleaving to facilitate Forward Error Correction (FEC) at the second communication device 410, as well as mapping of signal constellation based on various modulation schemes (e.g., Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK), M-phase shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM)). The multi-antenna transmit processor 471 performs digital spatial precoding, including codebook-based precoding and non-codebook based precoding, and beamforming processing on the coded and modulated symbols to generate one or more spatial streams. Transmit processor 416 then maps each spatial stream to subcarriers, multiplexes with reference signals (e.g., pilots) in the time and/or frequency domain, and then uses an Inverse Fast Fourier Transform (IFFT) to generate the physical channels carrying the time-domain multicarrier symbol streams. The multi-antenna transmit processor 471 then performs transmit analog precoding/beamforming operations on the time domain multi-carrier symbol stream. Each transmitter 418 converts the baseband multicarrier symbol stream provided by the multi-antenna transmit processor 471 into a radio frequency stream that is then provided to a different antenna 420.
In a transmission from the second communications apparatus 410 to the first communications apparatus 450, each receiver 454 receives a signal through its respective antenna 452 at the first communications apparatus 450. Each receiver 454 recovers information modulated onto a radio frequency carrier and converts the radio frequency stream into a baseband multi-carrier symbol stream that is provided to a receive processor 456. Receive processor 456 and multi-antenna receive processor 458 implement the various signal processing functions of the L1 layer. A multi-antenna receive processor 458 performs receive analog precoding/beamforming operations on the baseband multi-carrier symbol stream from the receiver 454. Receive processor 456 converts the baseband multicarrier symbol stream after the receive analog precoding/beamforming operation from the time domain to the frequency domain using a Fast Fourier Transform (FFT). In the frequency domain, the physical layer data signals and the reference signals to be used for channel estimation are demultiplexed by the receive processor 456, and the data signals are subjected to multi-antenna detection in the multi-antenna receive processor 458 to recover any spatial streams destined for the first communication device 450. The symbols on each spatial stream are demodulated and recovered at a receive processor 456 and soft decisions are generated. The receive processor 456 then decodes and deinterleaves the soft decisions to recover the upper layer data and control signals transmitted by the second communications device 410 on the physical channel. The upper layer data and control signals are then provided to a controller/processor 459. The controller/processor 459 implements the functionality of the L2 layer. The controller/processor 459 may be associated with a memory 460 that stores program codes and data. Memory 460 may be referred to as a computer-readable medium. In transmissions from the second communications device 410 to the second communications device 450, the controller/processor 459 provides demultiplexing between transport and logical channels, packet reassembly, deciphering, header decompression, control signal processing to recover upper layer packets from the core network. The upper layer packet is then provided to all protocol layers above the L2 layer. Various control signals may also be provided to L3 for L3 processing.
In a transmission from the first communications device 450 to the second communications device 410, a data source 467 is used at the first communications device 450 to provide upper layer data packets to a controller/processor 459. Data source 467 represents all protocol layers above the L2 layer. Similar to the send function at the second communications apparatus 410 described in the transmission from the second communications apparatus 410 to the first communications apparatus 450, the controller/processor 459 implements header compression, encryption, packet segmentation and reordering, and multiplexing between logical and transport channels based on radio resource allocation, implementing L2 layer functions for the user plane and control plane. The controller/processor 459 is also responsible for retransmission of lost packets and signaling to said second communications device 410. A transmit processor 468 performs modulation mapping, channel coding, and digital multi-antenna spatial precoding by a multi-antenna transmit processor 457 including codebook-based precoding and non-codebook based precoding, and beamforming, and the transmit processor 468 then modulates the resulting spatial streams into multi-carrier/single-carrier symbol streams, which are provided to different antennas 452 via a transmitter 454 after analog precoding/beamforming in the multi-antenna transmit processor 457. Each transmitter 454 first converts the baseband symbol stream provided by the multi-antenna transmit processor 457 into a radio frequency symbol stream and provides the radio frequency symbol stream to the antenna 452.
In a transmission from the first communication device 450 to the second communication device 410, the functionality at the second communication device 410 is similar to the receiving functionality at the first communication device 450 described in the transmission from the second communication device 410 to the first communication device 450. Each receiver 418 receives an rf signal through its respective antenna 420, converts the received rf signal to a baseband signal, and provides the baseband signal to a multi-antenna receive processor 472 and a receive processor 470. The receive processor 470 and the multiple antenna receive processor 472 collectively implement the functionality of the L1 layer. Controller/processor 475 implements the L2 layer functions. The controller/processor 475 can be associated with a memory 476 that stores program codes and data. Memory 476 may be referred to as a computer-readable medium. In transmission from the first communications device 450 to the second communications device 410, the controller/processor 475 provides demultiplexing between transport and logical channels, packet reassembly, deciphering, header decompression, control signal processing to recover upper layer packets from the UE 450. Upper layer data packets from the controller/processor 475 may be provided to a core network.
As an embodiment, the first communication device 450 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code configured to, for use with the at least one processor, the first communication device 450 apparatus at least: first sending a first message over an air interface, the first message comprising a first identity; secondly monitoring a first signalling over the air interface in a first time window, the first signalling being identified by any identity in a first set of identities; then, when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the first communication device 450 includes: a memory storing a program of computer readable instructions that when executed by at least one processor result in actions comprising: first sending a first message over an air interface, the first message comprising a first identity; secondly monitoring a first signalling over the air interface in a first time window, the first signalling being identified by any identity in a first set of identities; then, when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the second communication device 410 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 means at least: first receiving a first message over an air interface, the first message comprising a first identity; subsequently transmitting first signaling over the air interface in a first time window, the first signaling being identified by any identity in a first set of identities; when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, a sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the second communication device 410 apparatus includes: a memory storing a program of computer readable instructions that when executed by at least one processor result in actions comprising: first receiving a first message over an air interface, the first message comprising a first identity; subsequently transmitting first signaling over the air interface in a first time window, the first signaling being identified by any identity in a first set of identities; when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, a sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the first communication device 450 corresponds to a first node in the present application.
As an embodiment, the second communication device 410 corresponds to a second node in the present application.
For one embodiment, the first communication device 450 is a UE.
For one embodiment, the first communication device 450 is a terminal.
For one embodiment, the second communication device 410 is a base station.
For one embodiment, the second communication device 410 is a UE.
For one embodiment, the second communication device 410 is a network device.
For one embodiment, the second communication device 410 is a serving cell.
For one embodiment, the second communication device 410 is a TRP.
As one implementation, at least the first four of the antenna 452, the transmitter 454, the multi-antenna transmit processor 457, the transmit processor 468, the controller/processor 459 are configured to send a first message over an air interface; at least the first four of the antenna 420, the receiver 418, the multi-antenna receive processor 472, the receive processor 470, the controller/processor 475 are configured to receive a first message over an air interface.
For one embodiment, at least the first four of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, the controller/processor 459 are configured to monitor for first signaling over an air interface during a first time window; at least the first four of the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, the controller/processor 475 are configured to send first signaling over the air interface in a first time window.
For one embodiment, when the first signaling is detected in the first time window, at least the first four of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, and the controller/processor 459 are configured to determine that the random access procedure to which the first message belongs is successful.
For one embodiment, when the first signaling is not detected in the first time window, at least the first four of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, and the controller/processor 459 are configured to determine that the random access procedure to which the first message belongs is unsuccessful.
For one embodiment, at least the first four of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, the controller/processor 459 are configured to receive a second message in a first time window; at least the first four of the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, the controller/processor 475 are used to send a second message.
As one implementation, at least the first four of the antenna 452, the transmitter 454, the multi-antenna transmit processor 457, the transmit processor 468, the controller/processor 459 are used to send a first signature sequence; at least the first four of the antenna 420, the receiver 418, the multi-antenna receive processor 472, the receive processor 470, the controller/processor 475 are configured to receive a first signature sequence.
For one embodiment, at least the first four of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, the controller/processor 459 are configured to receive a third message; at least the first four of the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, the controller/processor 475 are used to send a third message.
For one embodiment, at least the first four of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, the controller/processor 459 are configured to receive a first block of information; at least the first four of the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, the controller/processor 475 are used to send a first information block.
Example 5
Embodiment 5 illustrates a flow chart of the first signaling, as shown in fig. 5. In FIG. 5, a first node U1 communicates with a second node N2 via a wireless link. It should be noted that the sequence in the present embodiment does not limit the signal transmission sequence and the implementation sequence in the present application. Without conflict, the embodiment in embodiment 5, the attached sub-embodiment, and the attached embodiment can be applied to embodiment 6 and embodiment 7. In the figure, the step labeled as block F0 is optional.
For theFirst node U1Receiving a first information block in step S10; transmitting a first message over an air interface in step S11; monitoring for first signaling over the air interface in a first time window in step S12; when the first signaling is detected in the first time window in step S13, determining that the random access procedure to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful.
For theSecond node N2Transmitting the first information block in step S20; receiving a first message over an air interface in step S21; the first signaling is sent over the air interface in a first time window in step S22.
In embodiment 5, the first message includes a first identity, and the first signaling is identified by any identity in a first identity set; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; time domain resources occupied by the first message are used for determining the first time window; the first information block is used to indicate a first identity set.
As one embodiment, the act of monitoring, over the air interface, the first signaling over the first time window comprises: monitoring the first signaling in a first set of REs and a second set of REs, respectively, in the first time window; the first identity is used for the monitoring behavior in the first set of REs, a second identity is used for the monitoring behavior in the second set of REs, the first set of identities including the first identity and the second identity.
As a sub-embodiment of this embodiment, the first RE (Resource Elements) Set includes a CORESET (Control Resource Set).
As a sub-embodiment of this embodiment, the second set of REs includes one CORESET.
As a sub-embodiment of this embodiment, the first set of REs includes a CORESET pool.
As a sub-embodiment of this embodiment, the second set of REs includes a CORESET pool.
As a sub-embodiment of this embodiment, the first RE set and the second RE set both belong to the same CORESET pool.
As a sub-embodiment of this embodiment, the first set of REs comprises a set of search spaces.
As a sub-embodiment of this embodiment, the second set of REs comprises a set of search spaces.
As a sub-embodiment of this embodiment, the first RE set comprises a pool of search space sets.
As a sub-embodiment of this embodiment, the second RE set comprises a pool of search space sets.
As a sub-embodiment of this embodiment, the first RE set and the second RE set both belong to the same search space set pool.
As a sub-embodiment of this embodiment, the first node U1 monitors in the first set of REs with a first spatial reception parameter, and the first node U1 monitors in the second set of REs with a second spatial reception parameter, the first and second spatial reception parameters being associated to different reference signal resources, respectively.
As a sub-embodiment of this embodiment, a TCI (Transmission Configuration Indication) State (State) adopted by the first RE set is different from a TCI State adopted by the second RE set.
As a sub-embodiment of this embodiment, the first set of REs is associated to a first reference signal resource and the second set of REs is associated to a second reference signal resource.
As an additional embodiment of this sub-embodiment, the wireless signal transmitted on the first reference signal resource and the wireless signal transmitted on the second reference signal resource are non-QCL (Quasi Co-located).
As an additional embodiment of this sub-embodiment, the first Reference signal Resource includes a CSI-RS (Channel-State Information Reference Signals) Resource (Resource).
As an additional embodiment of this sub-embodiment, the first reference signal resource comprises an SSB (SS/PBCH Block, synchronization signal/physical broadcast channel Block).
As an additional embodiment of this sub-embodiment, the second reference signal resource comprises a CSI-RS resource.
As an additional embodiment of this sub-embodiment, the second reference signal resource comprises an SSB.
As an additional embodiment of this sub-embodiment, the first reference signal resource and the second reference signal resource are different.
As a sub-embodiment of this embodiment, the first set of REs is associated to the first cell of the present application.
As a sub-embodiment of this embodiment, said second set of REs is associated to said second cell of the present application.
As a sub-embodiment of this embodiment, the sentence above wherein said first identity is used for said monitoring behavior in said first RE set comprises: the first identity is used to descramble the control signaling detected in the first set of REs to determine whether the control signaling is the first signaling.
As a sub-embodiment of this embodiment, the above sentence where the second identity is used for the monitoring behavior in the second RE set comprises: the second identity is used to descramble the control signaling detected in the second set of REs to determine whether the control signaling is the first signaling.
As a sub-embodiment of this embodiment, when the first signaling is transmitted in the first RE set, the CRC included in the first signaling is scrambled by the first identity.
As a sub-embodiment of this embodiment, when the first signaling is transmitted in the second RE set, the CRC included in the first signaling is scrambled by the second identity.
As an embodiment, the signaling carrying the first information block includes RRC signaling.
As an embodiment, the signaling carrying the first information block includes MAC signaling.
As an embodiment, the first information block is used to indicate all identities comprised by the first set of identities.
As an embodiment, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and an identifier corresponding to the first cell is different from an identifier corresponding to the second cell.
As a sub-embodiment of this embodiment, the identifier corresponding to the first Cell is a PCI (Physical Cell Identity).
As a sub-embodiment of this embodiment, the identifier corresponding to the second cell is a PCI.
As a sub-embodiment of this embodiment, the identifier corresponding to the first cell is a cgi (cell Global id).
As a sub-embodiment of this embodiment, the identifier corresponding to the second cell is a CGI.
As a sub-embodiment of this embodiment, the above sentence means that the first identity and the second identity are maintained by a first cell and a second cell, respectively, includes: the first identity is allocated by the first cell and the second identity is allocated by the second cell.
As a sub-embodiment of this embodiment, the above sentence means that the first identity and the second identity are maintained by a first cell and a second cell, respectively, includes: the first cell ensures that the first identity is allocated to only one terminal under the first cell and the second cell ensures that the second identity is allocated to only one terminal under the second cell.
As an embodiment, the first identity and the second identity are assigned to the first node U1 and a second terminal, respectively, the first node U1 and the second terminal being two different terminals.
As a sub-embodiment of this embodiment, the first node U1 is a different terminal than the second terminal.
As a sub-embodiment of this embodiment, the IMSI (International Mobile Subscriber Identity) used by the first node U1 is different from the IMSI used by the second node.
As a sub-embodiment of this embodiment, the S-TMSI (System Architecture Evolution Mobile Subscriber Identity) used by the first node U1 is different from the S-TMSI used by the second terminal.
As a sub-embodiment of this embodiment, the first node U1 and the second terminal belong to the same terminal group.
As an embodiment, any identity comprised by the first set of identities can be used by the first node U1 to determine whether the first signaling is received correctly only if the first message is associated to a downlink radio signal resource of a second cell.
As a sub-embodiment of this embodiment, the first node U1 descrambles a CRC (Cyclic Redundancy Check) of the first signaling with each identity included in the first set of identities to determine whether the first signaling is correctly received.
As a sub-embodiment of this embodiment, any identity included in the first set of identities is capable of descrambling a CRC of the first signaling, and the first node determines that the first signaling is correctly received.
As a sub-embodiment of this embodiment, the above sentence means that the first message is associated to the downlink radio signal resource of the second cell comprises: the time-frequency resources occupied by the first message are associated to downlink radio signal resources of the second cell.
As an additional embodiment of the sub-embodiment, the time-frequency resource occupied by the first message is a time-frequency resource used for random access in the second cell.
As an additional embodiment of the sub-embodiment, the time-frequency resource occupied by the first message is Contention-Free.
As an auxiliary embodiment of the sub-embodiment, the time-frequency resource occupied by the first message is Contention-Based.
As a sub-embodiment of this embodiment, the above sentence means that the first message is associated to the downlink radio signal resource of the second cell comprises: the first message is used to indicate a target set of time-frequency resources belonging to downlink radio signal resources of the second cell.
As a sub-embodiment of this embodiment, the downlink radio signal resource of the second cell includes one CSI-RS resource of the second cell.
As a sub-embodiment of this embodiment, the downlink radio signal resource of the second cell includes an SSB of the second cell.
As a sub-embodiment of this embodiment, the downlink radio signal resource of the second cell corresponds to one CSI-RS resource index of the second cell.
As a sub-embodiment of this embodiment, the downlink radio signal resource of the second cell corresponds to an SSB index of the second cell.
As a sub-embodiment of this embodiment, the first node U1 is configured such that when the first message is associated to a downlink radio signal resource of a first cell, only the first identity comprised by the first set of identities is used by the first node U1 to determine whether the first signaling is correctly received.
As an additional embodiment of this sub-embodiment, the first node U1 descrambles the CRC of the first signaling with the first identity to determine if the first signaling was received correctly.
As an additional embodiment of this sub-embodiment, the first node U1 determines that the first signaling was received correctly when the first identity is able to descramble the CRC of the first signaling.
As an additional embodiment of this sub-embodiment, the above sentence meaning that said first message is associated to a downlink radio signal resource of the first cell includes: the time-frequency resources occupied by the first message are associated to downlink radio signal resources of the first cell.
As an additional embodiment of the sub-embodiment, the time-frequency resource occupied by the first message is a time-frequency resource used for random access in the first cell.
As an additional embodiment of this sub-embodiment, the above sentence meaning that said first message is associated to a downlink radio signal resource of the first cell includes: the first message is used to indicate a target set of time-frequency resources belonging to downlink radio signal resources of the first cell.
As an auxiliary embodiment of the sub-embodiment, the downlink radio signal resource of the first cell includes one CSI-RS resource of the first cell.
As a subsidiary embodiment of the sub-embodiment, the downlink radio signal resource of the first cell includes an SSB of the first cell.
As an auxiliary embodiment of the sub-embodiment, the downlink radio signal resource of the first cell corresponds to a CSI-RS resource index of the first cell.
As an auxiliary embodiment of the sub-embodiment, the downlink radio signal resource of the first cell corresponds to an SSB index of the first cell.
Example 6
Embodiment 6 illustrates a flow chart of a second message, as shown in fig. 6. In FIG. 6, a first node U3 communicates with a second node N4 via a wireless link. It should be noted that the sequence in the present embodiment does not limit the signal transmission sequence and the implementation sequence in the present application. Without conflict, the embodiment in embodiment 6, the attached sub-embodiment, and the attached embodiment can be applied to the embodiment 5 and the embodiment 7.
For theFirst node U3A second message is received when the first signaling is detected in the first time window in step S30.
For theSecond node N4In step S40, a second message is sent.
In embodiment 6, the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the any identity in the first identity set.
As an embodiment, the Channel occupied by the second message includes a PDSCH (Physical Downlink Shared Channel).
As an embodiment, the Channel occupied by the second message includes a psch (Physical Sidelink Shared Channel).
As one embodiment, the second message is Msg4 (message 4).
As an embodiment, the second message is MsgB (message B).
As an example, the second message is a conflict Resolution (Contention Resolution).
As an embodiment, the second message includes a MAC PDU.
As an embodiment, the second message includes a conflict Resolution Identity MAC Control Element (content Resolution Identity MAC Control Element) of the first node U3.
For one embodiment, the second message includes C-RNTI MAC CE.
As an embodiment, the first signaling is used for scheduling PDSCH occupied by the second message.
Example 7
Example 7 illustrates a flow chart of a first sequence of features, as shown in fig. 7. In FIG. 7, a first node U5 communicates with a second node N6 via a wireless link. It should be noted that the sequence in the present embodiment does not limit the signal transmission sequence and the implementation sequence in the present application. Without conflict, the embodiment, the subsidiary sub-embodiment and the subsidiary embodiment in embodiment 7 can be applied to embodiment 5 and embodiment 6.
For theFirst node U5The first signature sequence is sent in step S50 and a third message is received in step S51.
For theSecond node N6The first signature sequence is received in step S60, and a third message is sent in step S61.
In embodiment 7, the first signature sequence is used to trigger the third message, which is used to trigger the first message.
As an embodiment, the first signature sequence is a Preamble.
As an embodiment, the first signature sequence is Msg1 (message 1).
As an embodiment, the physical layer channel carrying the first signature sequence comprises a PRACH.
As an embodiment, the first signature sequence is used for a random access procedure.
As an embodiment, MsgA comprises the first signature sequence.
As an embodiment, the first signature sequence is associated to one CSI-RS resource of the first cell.
As an embodiment, the first signature sequence is associated to an SSB of the first cell.
As an embodiment, the time-frequency resource occupied by the first signature sequence is associated to one CSI-RS resource of the first cell.
As an embodiment, the time-frequency resources occupied by the first signature sequence are associated to one SSB of the first cell.
As one embodiment, the third message is message 2(Msg 2).
As an embodiment, the third message includes a RAR.
As an embodiment, the third message includes a RAR responsive to the first signature sequence.
As an embodiment, the physical layer channel carrying the third message is a PDSCH, and a CRC included in a physical layer control channel scheduling the PDSCH of the third message is scrambled by an RA-RNTI.
As an embodiment, the first signature sequence, the third message number, the first message, and the second message comprise Msg1, Msg2, Msg3, and Msg4, respectively.
As an embodiment, the sending of the first signature sequence is used to trigger the receiving of the third message.
As an embodiment, the reception of the third message is used to trigger the sending of the first message.
Example 8
Example 8 illustrates a schematic diagram of a first RE set and a second RE set, as shown in fig. 8. In fig. 8, the first RE set occupies a positive integer number of REs greater than 1, and the second RE set occupies a positive integer number of REs greater than 1.
As an embodiment, the first RE set and the second RE set are respectively allocated to the first cell and the second cell in this application.
As an embodiment, the first RE set and the second RE set are maintained by the same base station, and the base station simultaneously maintains the first cell and the second cell in this application.
As an embodiment, the first RE set and the second RE set are TDM (Time Division Multiplexing).
As an embodiment, the first set of REs and the second set of REs are FDM (Frequency Division Multiplexing).
As an embodiment, the first RE set and the second RE set are SDM (Space Division Multiplexing).
As an embodiment, the first RE set and the second RE set are CDM (Code Division Multiplexing).
Example 9
Embodiment 9 illustrates a schematic diagram of a first cell and a second cell, as shown in fig. 9. In fig. 9, a first node in the present application resides in a first cell, and a second cell is a neighboring cell of the first cell; the second cell maintains transmission of M1 beams, the M1 beams respectively correspond to M1 candidate reference signal resources, and the second cell respectively sends M1 candidate reference signals on the M1 candidate reference signal resources for terminal side Beam Management (Beam Management); the first cell is configured to transmit N1 beams, the N1 beams respectively correspond to N1 first-class reference signal resources included in a target reference signal resource group, and the first cell respectively transmits N1 first-class reference signals on the N1 first-class reference signal resources for terminal-side beam management. The first node finds that the channel quality detected on all of the N1 first type reference signals is below a first threshold, and that the channel quality detected on at least one of the M1 candidate reference signals is above a particular threshold. The first node starts sending the first message in this application.
As one embodiment, the first cell maintains the first identity.
As one embodiment, the first cell maintains the first set of REs.
As an embodiment, the second cell maintains the second identity.
As one embodiment, the second cell maintains the second set of REs.
As an embodiment, the second cell transmits the first signaling.
As an embodiment, the time-frequency resource occupied by the random access procedure initiated by the first node belongs to the second cell.
Example 10
Embodiment 10 illustrates a block diagram of the structure in a first node, as shown in fig. 10. In fig. 10, a first node 1000 comprises a first transceiver 1001, a first receiver 1002 and a second receiver 1003.
A first transceiver 1001 to transmit a first message over an air interface, the first message comprising a first identity;
a first receiver 1002 for monitoring, over an air interface, for a first signaling in a first time window, the first signaling being identified by any one of a first set of identities;
the second receiver 1003, configured to determine that the random access procedure to which the first message belongs is successful when the first signaling is detected in the first time window; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
in embodiment 10, the first identity is a C-RNTI, the first set of identities includes a plurality of identities, and any identity in the first set of identities is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
For one embodiment, when the first signaling is detected in the first time window, the second receiver 1003 receives a second message; the first signaling comprises configuration information of a channel occupied by the second message, and the second message comprises any identity in the first identity set.
As one embodiment, the act of monitoring, over the air interface, the first signaling over the first time window comprises: monitoring the first signaling in a first set of REs and a second set of REs, respectively, in the first time window; the first identity is used for the monitoring behavior in the first set of REs, a second identity is used for the monitoring behavior in the second set of REs, the first set of identities including the first identity and the second identity.
For one embodiment, the first transceiver 1001 sends a first signature sequence and the first transceiver 1001 receives a third message; the first signature sequence is used to trigger the third message, which is used to trigger the first message.
For one embodiment, the first transceiver 1001 receives a first information block; the first information block is used to indicate the first identity set.
As an embodiment, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and an identifier corresponding to the first cell is different from an identifier corresponding to the second cell.
As an embodiment, the first identity and the second identity are assigned to the first node and a second terminal, respectively, the first node and the second terminal being two different terminals.
As an embodiment, any identity comprised by the first set of identities can be used by the first node to determine whether the first signaling is correctly received only if the first message is associated to a downlink radio signal resource of a second cell.
As one embodiment, the first transceiver 1001 includes at least the first 6 of the antenna 452, the receiver/transmitter 454, the multi-antenna receive processor 458, the multi-antenna transmit processor 457, the receive processor 456, the transmit processor 468, and the controller/processor 459 of embodiment 4.
For one embodiment, the first receiver 1002 includes at least the first 4 of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, and the controller/processor 459 of embodiment 4.
For one embodiment, the second receiver 1003 comprises at least the first 4 of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, and the controller/processor 459 of embodiment 4.
Example 11
Embodiment 11 illustrates a block diagram of the structure in a second node, as shown in fig. 11. In fig. 11, a second node 1100 comprises a second transceiver 1101 and a first transmitter 1102.
A second transceiver 1101 that receives a first message over an air interface, the first message comprising a first identity;
a first transmitter 1102 that transmits first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
in embodiment 11, when the first signaling is detected in the first time window, a sender of the first message determines that a random access procedure to which the first message belongs is successful; when the first signaling is not detected in the first time window, a sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
For one embodiment, the first transmitter 1102 transmits a second message; the first signaling comprises configuration information of a channel occupied by the second message, and the second message comprises any identity in the first identity set.
As an embodiment, the second node sends the first signaling in at least one of a first set of REs or a second set of REs in the first time window; the first identity is used to scramble a CRC included in the first signaling when the first signaling is transmitted in the first set of REs; when the first signaling is sent in the second set of REs, a second identity is used to scramble a CRC included in the first signaling; the first set of identities includes the first identity and the second identity.
For one embodiment, the second transceiver 1101 receives a first signature sequence and the second transceiver 1101 sends a third message; the first signature sequence is used to trigger the third message, which is used to trigger the first message.
For one embodiment, the second transceiver 1101 transmits a first information block; the first information block is used to indicate the first identity set.
As an embodiment, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and an identifier corresponding to the first cell is different from an identifier corresponding to the second cell.
As an embodiment, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and an identifier corresponding to the first cell is different from an identifier corresponding to the second cell.
As an embodiment, the first identity and the second identity are assigned to the first node and a second terminal, respectively, the first node and the second terminal being two different terminals.
As an embodiment, any identity comprised by the first set of identities can be used by the second node to scramble a CRC comprised by the first signaling only when the first message is associated to a downlink radio signal resource of a second cell.
For one embodiment, the second transceiver 1101 includes at least the first 6 of the antenna 420, the receiver 418, the multi-antenna receive processor 472, the receive processor 470, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, and the controller/processor 475 in embodiment 4.
For one embodiment, the first transmitter 1102 includes at least the first 4 of the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, and the controller/processor 475 of embodiment 4.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a hard disk or an optical disk. Alternatively, all or part of the steps of the above embodiments may be implemented by using one or more integrated circuits. Accordingly, the module units in the above embodiments may be implemented in a hardware form, or may be implemented in a form of software functional modules, and the present application is not limited to any specific form of combination of software and hardware. First node and second node in this application include but not limited to cell-phone, panel computer, notebook, network card, low-power consumption equipment, eMTC equipment, NB-IoT equipment, vehicle communication equipment, vehicles, vehicle, RSU, aircraft, unmanned aerial vehicle, wireless communication equipment such as remote control plane. The base station in the present application includes, but is not limited to, a macro cell base station, a micro cell base station, a home base station, a relay base station, an eNB, a gNB, a transmission and reception node TRP, a GNSS, a relay satellite, a satellite base station, an over-the-air base station, an RSU, and other wireless communication devices.
The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (11)

1. A first node for use in wireless communications, comprising:
a first transceiver to transmit a first message over an air interface, the first message comprising a first identity;
a first receiver to monitor for first signaling over an air interface in a first time window, the first signaling identified by any one of a first set of identities;
the second receiver judges that the random access process to which the first message belongs is successful when the first signaling is detected in the first time window; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
2. The first node of claim 1, wherein the second receiver receives a second message when the first signaling is detected in the first time window; the first signaling comprises configuration information of a channel occupied by the second message, and the second message comprises any identity in the first identity set.
3. The first node of claim 1 or 2, wherein the act of monitoring the first signaling over the air interface in the first time window comprises: monitoring the first signaling in a first set of REs and a second set of REs, respectively, in the first time window; the first identity is used for the monitoring behavior in the first set of REs, a second identity is used for the monitoring behavior in the second set of REs, the first set of identities including the first identity and the second identity.
4. The first node of any of claims 1-3, wherein the first transceiver transmits a first signature sequence and the first transceiver receives a third message; the first signature sequence is used to trigger the third message, which is used to trigger the first message.
5. The first node according to any of claims 1-4, wherein the first transceiver receives a first information block; the first information block is used to indicate the first identity set.
6. The first node according to any of claims 1 to 5, wherein the first identity and the second identity are maintained by a first cell and a second cell, respectively, and wherein the identity corresponding to the first cell is different from the identity corresponding to the second cell.
7. The first node according to any of claims 1 to 5, characterized in that the first identity and the second identity are assigned to the first node and a second terminal, respectively, the first node and the second terminal being two different terminals.
8. The first node according to any of claims 1 to 7, wherein any identity comprised by the first set of identities can be used by the first node to determine whether the first signaling was correctly received only if the first message is associated to downlink radio signal resources of a second cell.
9. A second node for use in wireless communications, comprising:
a second transceiver to receive a first message over an air interface, the first message comprising a first identity;
a first transmitter to transmit first signaling over an air interface in a first time window, the first signaling being identified by any one of a first set of identities;
when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, a sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
10. A method in a first node in wireless communication, comprising:
transmitting a first message over an air interface, the first message comprising a first identity;
monitoring for first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
11. A method in a second node in wireless communication, comprising:
receiving a first message over an air interface, the first message comprising a first identity;
transmitting first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, a sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any identity in the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
CN202011032439.4A 2020-09-21 2020-09-27 Method and apparatus in a node for wireless communication Active CN114285533B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN202310929750.6A CN117675149A (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication
CN202011032439.4A CN114285533B (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication
PCT/CN2021/118435 WO2022057817A1 (en) 2020-09-21 2021-09-15 Method and apparatus used in node for wireless communication
US18/120,437 US20230216563A1 (en) 2020-09-21 2023-03-13 Method and device in nodes used for wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011032439.4A CN114285533B (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202310929750.6A Division CN117675149A (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication

Publications (2)

Publication Number Publication Date
CN114285533A true CN114285533A (en) 2022-04-05
CN114285533B CN114285533B (en) 2023-08-15

Family

ID=80867797

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202310929750.6A Pending CN117675149A (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication
CN202011032439.4A Active CN114285533B (en) 2020-09-21 2020-09-27 Method and apparatus in a node for wireless communication

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202310929750.6A Pending CN117675149A (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication

Country Status (1)

Country Link
CN (2) CN117675149A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587812A (en) * 2017-09-28 2019-04-05 中兴通讯股份有限公司 Random access parameter determines method and device
WO2020156247A1 (en) * 2019-02-03 2020-08-06 上海朗帛通信技术有限公司 Method and device for communication node for use in radio communication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587812A (en) * 2017-09-28 2019-04-05 中兴通讯股份有限公司 Random access parameter determines method and device
WO2020156247A1 (en) * 2019-02-03 2020-08-06 上海朗帛通信技术有限公司 Method and device for communication node for use in radio communication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CMCC: "R2-2001471 \"Further discussion on 2-Step CFRA\"" *
SAMSUNG ELECTRONICS CO., LTD: "R2-1905720 \"2 Step RA_MsgB Aspects\"" *

Also Published As

Publication number Publication date
CN117675149A (en) 2024-03-08
CN114285533B (en) 2023-08-15

Similar Documents

Publication Publication Date Title
CN111372321B (en) Method and apparatus in a node used for wireless communication
CN114257276A (en) Method and apparatus in a node used for wireless communication
CN114337741B (en) Method and apparatus in a node used for wireless communication
CN113260049B (en) Method and arrangement in a communication node used for wireless communication
CN114389770A (en) Method and arrangement in a communication node used for wireless communication
CN114430311A (en) Method and apparatus in a node used for wireless communication
CN114793372A (en) Method and arrangement in a communication node used for wireless communication
CN114285533B (en) Method and apparatus in a node for wireless communication
CN114257274B (en) Method and apparatus in a node used for wireless communication
US20230216563A1 (en) Method and device in nodes used for wireless communication
CN112887065B (en) Method and equipment used for wireless communication
WO2024078434A1 (en) Method and apparatus used in communication node for radio communication
CN112994857B (en) Method and equipment used for wireless communication
CN113365367B (en) Method and apparatus in a node used for wireless communication
WO2024114346A1 (en) Method and apparatus for communication node used for wireless communication
CN112312549B (en) Method and apparatus in a node used for wireless communication
CN115603873A (en) Method and arrangement in a communication node used for wireless communication
CN117715226A (en) Method and apparatus in a communication node for wireless communication
CN117715229A (en) Method and apparatus in a communication node for wireless communication
CN117750437A (en) Method and apparatus in a communication node for wireless communication
CN114630451A (en) Method and arrangement in a communication node used for wireless communication
CN117715052A (en) Method and apparatus in a communication node for wireless communication
CN117528822A (en) Method and apparatus in a communication node for wireless communication
CN114205915A (en) Method and device used for wireless communication
CN117580187A (en) Method and apparatus in a communication node for wireless communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant