CN114285533B - Method and apparatus in a node for wireless communication - Google Patents

Method and apparatus in a node for wireless communication Download PDF

Info

Publication number
CN114285533B
CN114285533B CN202011032439.4A CN202011032439A CN114285533B CN 114285533 B CN114285533 B CN 114285533B CN 202011032439 A CN202011032439 A CN 202011032439A CN 114285533 B CN114285533 B CN 114285533B
Authority
CN
China
Prior art keywords
identity
message
signaling
node
cell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011032439.4A
Other languages
Chinese (zh)
Other versions
CN114285533A (en
Inventor
蒋琦
张晓博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Langbo Communication Technology Co Ltd
Original Assignee
Shanghai Langbo Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Langbo Communication Technology Co Ltd filed Critical Shanghai Langbo Communication Technology Co Ltd
Priority to CN202310929750.6A priority Critical patent/CN117675149A/en
Priority to CN202011032439.4A priority patent/CN114285533B/en
Priority to PCT/CN2021/118435 priority patent/WO2022057817A1/en
Publication of CN114285533A publication Critical patent/CN114285533A/en
Priority to US18/120,437 priority patent/US20230216563A1/en
Application granted granted Critical
Publication of CN114285533B publication Critical patent/CN114285533B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A method and apparatus in a node for wireless communication is disclosed. The node first sends a first message through an air interface, wherein the first message comprises a first identity; then monitoring over the air interface for first signaling in a first time window, the first signaling being identified by any identity in the first set of identities; when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window. The application optimizes the design method and device of the RNTI so as to improve the mobility performance.

Description

Method and apparatus in a node for wireless communication
Technical Field
The present application relates to a transmission method and apparatus in a wireless communication system, and more particularly, to a design scheme and apparatus related to a tentative identifier of a wireless network in wireless communication.
Background
In the LTE system, inter-cell Handover (Handover) is controlled by a base station based on UE (User Equipment) measurements. Inter-cell handover in 3GPP (3 rd Generation Partner Project, third generation partnership project) R (Release) 15 basically keeps track of the mechanism in LTE. In an NR (New Radio) system, more application scenarios need to be supported, and some application scenarios, such as URLLC (Ultra-Reliable and Low Latency Communications, ultra high reliability and low latency communication), put high demands on latency and also put New challenges on inter-cell handover.
In the NR system, large-scale (Massive) MIMO (Multiple Input Multiple Output ) is an important technical feature. In large-scale MIMO, multiple antennas are formed by beamforming, so that a narrower beam is formed to point to a specific direction, thereby improving communication quality. The beams formed by multi-antenna beamforming are generally relatively narrow, and the beams of both communicating parties need to be aligned for effective communication.
Disclosure of Invention
The inventors have found through research that beam-based communications can negatively impact inter-cell handover, such as additional delay and ping-pong effects. How to reduce these negative effects, improve the speed of terminal handover, and further improve the performance of cell border users to meet the requirements of various application scenarios is a problem to be solved.
In view of the above, the present application discloses a solution. It should be noted that, although the above description uses a large-scale MIMO and beam-based communication scenario as an example, the present application is also applicable to other scenarios such as an LTE multi-antenna system, and achieves technical effects similar to those in the large-scale MIMO and beam-based communication scenario. Furthermore, the adoption of unified solutions for different scenarios (including but not limited to large-scale MIMO, beam-based communication and LTE multi-antenna systems) also helps to reduce hardware complexity and cost. Embodiments of the application and features in embodiments may be applied to any other node and vice versa without conflict. The embodiments of the application and the features of the embodiments may be combined with each other arbitrarily without conflict.
Aiming at the problems, the application discloses a method and a device for inter-cell handover and mobility management of layer 1/2. It should be noted that embodiments of the user equipment and features of embodiments of the present application may be applied to a base station and vice versa without conflict. The embodiments of the application and the features of the embodiments may be combined with each other arbitrarily without conflict. Further, although the present application is primarily directed to cellular networks, the present application can also be used in internet of things as well as internet of vehicles. Further, while the present application is primarily directed to multi-carrier communications, the present application can also be used for single carrier communications. Further, while the present application is primarily directed to multi-antenna communications, the present application can also be used for single antenna communications. Further, although the present application is primarily directed to the scenario of the terminal and the base station, the present application is also applicable to the scenario of the terminal and the terminal, the terminal and the relay, the Non-terrestrial network (NTN, non-Terrestrial Networks), and the communication scenario between the relay and the base station, and similar technical effects in the scenario of the terminal and the base station are obtained. Furthermore, the adoption of a unified solution for different scenarios, including but not limited to the communication scenario of the terminal and the base station, also helps to reduce hardware complexity and cost.
Further, embodiments of the present application and features of embodiments may be applied to a second node device and vice versa without conflict. In particular, the term (Terminology), noun, function, variable in the present application may be interpreted (if not specifically described) with reference to the definitions in the 3GPP specification protocols TS (Technical Specification) series, TS38 series, TS37 series.
The application discloses a method in a first node for wireless communication, comprising the following steps:
transmitting a first message over an air interface, the first message including a first identity;
monitoring first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
wherein the first identity is a C-RNTI (Cell-Radio Network Temporary Identifier, cell radio network tentative identity), the first set of identities comprises a plurality of identities, and any one of the first set of identities is an RNTI (Radio Network Temporary Identifier, radio network tentative identity); the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the above method is characterized in that: in order to improve the switching speed and avoid the interaction of the third layer, the first node maintains identities (identities) in a plurality of cells, namely, the first Identity set is a plurality of RNTIs maintained by the first node in a plurality of cells, and then any RNTI in the first Identity set can be used as feedback of random access when the first node moves among a plurality of cells, so that the speed of random access of a terminal is improved, and the switching efficiency is improved.
According to one aspect of the application, the second receiver receives a second message when the first signaling is detected in the first time window; the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the any identity in the first identity set.
As an embodiment, the above method is characterized in that: the identities included in the first identity set are used for subsequent scheduling of the first node, so that interaction times are reduced, and switching efficiency is improved.
According to one aspect of the application, the act of monitoring the first signaling over the air interface in a first time window comprises: monitoring the first signaling in a first set of REs (Resource Elements ) and a second set of REs, respectively, in the first time window; the first identity is used for the monitoring behavior in the first RE set and a second identity is used for the monitoring behavior in the second RE set, the first set of identities comprising the first identity and the second identity.
As an embodiment, the above method is characterized in that: and the first RE set and the second RE set are respectively corresponding to different cells, so that the feedback of the first message is received on the time-frequency resources corresponding to the different cells, and further the quick switching is realized.
According to one aspect of the application, it comprises:
transmitting a first feature sequence;
receiving a third message;
wherein the first feature sequence is used to trigger the third message, which is used to trigger the first message.
According to one aspect of the application, it comprises:
receiving a first information block;
wherein the first information block is used to indicate a first set of identities.
According to one aspect of the application, the first identity and the second identity are maintained by a first cell and a second cell, respectively, the identity corresponding to the first cell and the identity corresponding to the second cell being different.
According to one aspect of the application, the first identity and the second identity are assigned to the first node and the second terminal, respectively, the first node and the second terminal being two different terminals.
As an embodiment, the above method is characterized in that: in the internet of vehicles, if a group transmission mode is adopted, one terminal can share identities of a plurality of terminals, and then the identities can be used for response and scheduling of one terminal, so that transmission efficiency is improved.
According to one aspect of the application, any identity comprised by the first set of identities can be used by the first node to determine if the first signaling is received correctly only if the first message is associated to a downlink radio signal resource of a second cell.
As an embodiment, the above method is characterized in that: the first node further determines whether to initiate random access to a source cell or to initiate random access to a new cell according to the time-frequency resource or the wave beam information associated with the selected first message, and determines whether to detect the first signaling according to all identities in a first identity set or only according to the first identity, thereby improving blind detection efficiency and avoiding false detection.
The application discloses a method in a second node for wireless communication, comprising the following steps:
receiving a first message over an air interface, the first message including a first identity;
transmitting first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
According to one aspect of the application, it comprises:
sending a second message;
wherein the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the arbitrary identity in the first identity set.
According to one aspect of the application, the second node transmits the first signaling in at least one of a first set of REs or a second set of REs in the first time window; when the first signaling is sent in the first set of REs, the first identity is used to scramble a CRC included in the first signaling; when the first signaling is sent in the second set of REs, a second identity is used to scramble a CRC included in the first signaling; the first set of identities includes the first identity and the second identity.
According to one aspect of the application, it comprises:
receiving a first feature sequence;
sending a third message;
wherein the first feature sequence is used to trigger the third message, which is used to trigger the first message.
According to one aspect of the application, it comprises:
transmitting a first information block;
wherein the first information block is used to indicate the first set of identities.
According to one aspect of the application, the first identity and the second identity are maintained by a first cell and a second cell, respectively, the identity corresponding to the first cell and the identity corresponding to the second cell being different.
According to one aspect of the application, the first identity and the second identity are maintained by a first cell and a second cell, respectively, the identity corresponding to the first cell and the identity corresponding to the second cell being different.
According to one aspect of the application, the first identity and the second identity are assigned to the first node and the second terminal, respectively, the first node and the second terminal being two different terminals.
According to one aspect of the application, any identity comprised by the first set of identities can be used by the second node for scrambling a CRC comprised by the first signaling only if the first message is associated to a downlink radio signal resource of a second cell.
The application discloses a first node for wireless communication, comprising:
a first transceiver to transmit a first message over an air interface, the first message including a first identity;
a first receiver monitoring first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
The second receiver judges that the random access process to which the first message belongs is successful when the first signaling is detected in the first time window; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
wherein the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
The application discloses a second node for wireless communication, comprising:
a second transceiver that receives a first message over an air interface, the first message including a first identity;
a first transmitter for transmitting first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the present application has the following advantages over the conventional scheme:
in order to improve the switching speed and avoid the interaction of the third layer, the first node maintains identities in a plurality of cells, namely the first identity set is a plurality of RNTI maintained by the first node in the plurality of cells, and any RNTI in the first identity set can be used as feedback of random access when the first node moves among the plurality of cells, so that the speed of random access of a terminal is improved, and the switching efficiency is improved;
if a group cast mode is adopted in the Internet of vehicles, one terminal can share identities of a plurality of terminals, and then the identities can be used for responding and scheduling of one terminal, so that the transmission efficiency is improved;
and the first node determines whether to initiate random access to a source cell or initiate random access to a new cell according to the time-frequency resource or the wave beam information associated with the selected first message, and determines whether to detect the first signaling according to all identities in a first identity set or only according to the first identity, thereby improving blind detection efficiency and avoiding false detection.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings in which:
FIG. 1 illustrates a process flow diagram of a first node according to one embodiment of the application;
FIG. 2 shows a schematic diagram of a network architecture according to one embodiment of the application;
fig. 3 shows a schematic diagram of an embodiment of a radio protocol architecture of a user plane and a control plane according to an embodiment of the application;
FIG. 4 shows a schematic diagram of a first communication device and a second communication device according to one embodiment of the application;
figure 5 shows a flow chart of a first signaling according to an embodiment of the application;
FIG. 6 shows a flow diagram of a second message according to one embodiment of the application;
FIG. 7 shows a flow chart of a first feature sequence according to one embodiment of the application;
FIG. 8 shows a schematic diagram of a first set of REs and a second set of REs, according to one embodiment of the application;
fig. 9 shows a schematic diagram of a first cell and a second cell according to an embodiment of the application;
fig. 10 shows a block diagram of a processing arrangement in a first node device according to an embodiment of the application;
fig. 11 shows a block diagram of the processing means in the second node device according to an embodiment of the application.
Detailed Description
The technical scheme of the present application will be further described in detail with reference to the accompanying drawings, and it should be noted that, without conflict, the embodiments of the present application and features in the embodiments may be arbitrarily combined with each other.
Example 1
Embodiment 1 illustrates a process flow diagram of a first node, as shown in fig. 1. In 100 shown in fig. 1, each block represents a step. In embodiment 1, a first node in the present application sends a first message over an air interface in step 101; monitoring a first signaling over an air interface in a first time window in step 102; in step 103, when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
in embodiment 1, the first message includes a first identity, the first signaling being identified by any identity in a first set of identities; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the meaning of the air interface includes: transmitted by wireless signals.
As an embodiment, the meaning of the air interface includes: transmitted over a cellular link.
As an embodiment, the meaning of the air interface includes: transmitted via a Sidelink.
As an embodiment, the meaning of the air interface includes: the first message is transmitted via a wireless signal.
As an embodiment, the meaning of the air interface includes: the recipient of the first message and the first node are Non-Quasi Co-located.
As an embodiment, the meaning of the air interface includes: there is no wired connection between the recipient of the first message and the first node.
As an embodiment, the air interface comprises a PC-5 interface.
As an embodiment, the air interface comprises a Uu interface.
As one embodiment, the monitoring comprises blind detection.
As an embodiment, the monitoring comprises a CRC (Cyclic Redundancy Check ) check.
As an embodiment, the monitoring comprises receiving.
As an embodiment, the monitoring comprises demodulation.
As an embodiment, the monitoring comprises coherent detection.
As an embodiment, the monitoring comprises energy detection.
As an embodiment, the first message is used to trigger the first signaling.
As an embodiment, the physical layer channel carrying the first message comprises PUSCH (Physical Uplink Shared CHannel ).
As an embodiment, the physical layer channel carrying the first message comprises a PRACH (Physical Random Access Channel ).
As an embodiment, the meaning that the first message includes the first identity includes: the first message indicates the first identity.
As an embodiment, the meaning that the first message includes the first identity includes: the first identity is used to generate a wireless signal carrying the first message.
As an embodiment, the meaning that the first message includes the first identity includes: the first identity is used to generate a Preamble (Preamble) carrying the first message.
As an embodiment, the meaning that the first message includes the first identity includes: the first identity is used to generate a sequence carrying the first message.
As an embodiment, the meaning that the first message includes the first identity includes: an air interface resource occupied by the first message is used to indicate the first identity, the air interface resource comprising at least one of a frequency domain resource, a time domain resource, or a code domain resource.
As an embodiment, the first message is Msg1 (message 1).
As an embodiment, the first message is Msg3 (message 3).
As an embodiment, the first message is MsgA (message a).
As an embodiment, the first message includes a C-RNTI MAC (Medium Access Control ) CE (Control Elements).
As one embodiment, the first message includes a UE collision resolution identity (Contention Resolution Identity) MAC CE.
As an embodiment, the first time window is ra-contentioresolutiontimer.
As an embodiment, the starting time of the first time window is the starting time of ra-contentioresolute, and the ending time of the first time window is the time when ra-contentioresolute expires.
As an embodiment, the starting time of the first time window is the starting time of ra-contentioresolute, and the ending time of the first time window is the time when ra-contentioresolute is stopped (Stop).
As an embodiment, the starting time of the first time window is the starting time of msgB-response window.
As an embodiment, the expiration time of the first time window is the time when msgB-response window expires.
As an embodiment, the cut-off time of the first time window is the time when msgB-response window is stopped (Stop).
As an embodiment, the first identity is a non-negative integer.
As an embodiment, the first Identity is an Identity.
As an embodiment, the first identity is represented by a four-bit 16-ary number.
As an embodiment, the first identity is used to identify the first node.
As an embodiment, the first identity is used to uniquely identify the first node in a cell.
As an embodiment, the first identity is used to uniquely identify the first node in a terminal group.
As an embodiment, the first set of identities comprises the first identity.
As an embodiment, the first identity does not comprise the first identity.
As an embodiment, the first set of identities comprises K1 identities, the K1 being a positive integer greater than 1.
As a sub-embodiment of this embodiment, any one of the K1 identities is a C-RNTI.
As a sub-embodiment of this embodiment, any one of the K1 identities is an RNTI.
As a sub-embodiment of this embodiment, any of the K1 identities is a membership ID.
As a sub-embodiment of this embodiment, any one of the K1 identities is a Destination identity (Destination ID).
As a sub-embodiment of this embodiment, the K1 identities are identities of the first node in K1 cells, respectively.
As a sub-embodiment of this embodiment, the K1 identities are identities of the first node in K1 base stations, respectively.
As a sub-embodiment of this embodiment, the K1 identities are identities of the first node in K1 TRP (transmitting receiving node), respectively.
As a sub-embodiment of this embodiment, the K1 identities correspond to K1 different terminals, respectively, the first node is one terminal of the K1 different terminals, and the K1 different terminals belong to one terminal group.
As an embodiment, the first set of identities only includes the first identity and the second identity in the present application.
As one embodiment, the act of determining that the random access procedure to which the first message belongs is unsuccessful includes: a new random access procedure is restarted.
As one embodiment, the act of determining that the random access procedure to which the first message belongs is unsuccessful includes: the first counter is incremented by 1.
As a sub-embodiment of this embodiment, the first counter is maintained at the MAC layer.
As a sub-embodiment of this embodiment, the first COUNTER is a preamble_transmission_counter.
As a sub-embodiment of this embodiment, higher layer random access problems are notified when the first counter reaches a first threshold.
As a sub-embodiment of this embodiment, a radio link failure (RLF, radio Link Failure) is determined when the first counter reaches a first threshold.
As a sub-embodiment of this embodiment, the first threshold in the present application is equal to the sum of preambleTransMax and 1.
As an embodiment, the random access is used for an access initiated by the first node to a base station.
As an embodiment, the random access is used for an access initiated by the first node to a terminal.
As an embodiment, the random access is used for an access initiated by the first node to an RSU (Road Side Unit).
As an embodiment, the random access is used for an access initiated by the first node towards a Group Head (Group Head).
As an embodiment, the CRC comprised by the first signaling is scrambled by a given identity when the first signaling is identified by the given identity.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to generate a Reference Signal (RS) sequence of DMRS (Demodulation Reference Signal ) of a channel occupied by the first signaling.
As one embodiment, the first signaling indicates a given identity when the first signaling is identified by the given identity.
As one embodiment, when the first signaling is identified by a given identity, the data channel to which the first signaling is scheduled indicates the given identity.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a set of REs (Resource elements) occupied by the first signaling.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a set of control resources (Control Resource Set, CORESET) to which the first signaling belongs.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a Set of Search spaces (Search Space sets) to which the first signaling belongs.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a control resource Pool (CORESET Pool) to which the first signaling belongs.
As an embodiment, when the first signaling is identified by a given identity, the given identity is used to determine a pool of search spaces (Search Space Set Pool) to which the first signaling belongs.
As an embodiment, the given identity in the present application is any identity in the first set of identities.
As an embodiment, the given identity in the present application is one identity of the first set of identities.
As an embodiment, the physical layer channel occupied by the first signaling includes PDCCH (Physical Downlink Control Channel ).
As an embodiment, the physical layer channel occupied by the first signaling comprises a PSCCH (Physical Sidelink Control Channel ).
As an embodiment, the determining the meaning of the first time window includes: the time Slot (Slot) occupied by the first message is used to determine the starting time Slot occupied by the first time window in the time domain.
As an embodiment, the determining the meaning of the first time window includes: the time slot occupied by the first message is used to determine a cut-off time slot occupied by the first time window in the time domain.
As an embodiment, the determining the meaning of the first time window includes: the first message occupies an nth time slot, the initial time slot occupied by the first time window is an n+n1 time slot, the N1 is fixed, or the N1 is configured through RRC signaling; both said N and said N1 are non-negative integers.
As an embodiment, the first time window occupies a positive integer number of consecutive milliseconds in the time domain.
As an embodiment, the first time window occupies a positive integer number of consecutive time slots in the time domain.
As an embodiment, the first identity and the second identity are used for data transmission on a first radio bearer and a second radio bearer, respectively.
As a sub-embodiment of this embodiment, RLC (Radio Link Control, radio link layer control protocol) bearers in the first radio bearer and RLC bearers in the second radio bearer are respectively configured by two different CellGroupConfig IE.
As an embodiment, the first signaling is a DCI (Downlink Control Information ).
As an embodiment, the first signaling is a SCI (Sidelink Control Information ).
Example 2
Embodiment 2 illustrates a schematic diagram of a network architecture, as shown in fig. 2.
Fig. 2 illustrates a diagram of a network architecture 200 of a 5g nr, LTE (Long-Term Evolution) and LTE-a (Long-Term Evolution Advanced, enhanced Long-Term Evolution) system. The 5G NR or LTE network architecture 200 may be referred to as EPS (Evolved Packet System ) 200 as some other suitable terminology. EPS 200 may include a UE (User Equipment) 201, ng-RAN (next generation radio access Network) 202, epc (Evolved Packet Core )/5G-CN (5G Core Network) 210, hss (Home Subscriber Server ) 220, and internet service 230. The EPS may interconnect with other access networks, but these entities/interfaces are not shown for simplicity. As shown, EPS provides packet-switched services, however, those skilled in the art will readily appreciate that the various concepts presented throughout this disclosure may be extended to networks providing circuit-switched services or other cellular networks. The NG-RAN includes NR node bs (gnbs) 203 and other gnbs 204. The gNB203 provides user and control plane protocol termination towards the UE 201. The gNB203 may be connected to other gnbs 204 via an Xn interface (e.g., backhaul). The gNB203 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a Basic Service Set (BSS), an Extended Service Set (ESS), a TRP (transmit receive node), or some other suitable terminology. The gNB203 provides the UE201 with an access point to the EPC/5G-CN 210. Examples of UE201 include a cellular telephone, a smart phone, a Session Initiation Protocol (SIP) phone, a laptop, a Personal Digital Assistant (PDA), a satellite radio, a non-terrestrial base station communication, a satellite mobile communication, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, an drone, an aircraft, a narrowband internet of things device, a machine-type communication device, a land-based vehicle, an automobile, a wearable device, or any other similar functional device. Those of skill in the art may also refer to the UE201 as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless communication device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. The gNB203 is connected to the EPC/5G-CN210 through an S1/NG interface. EPC/5G-CN210 includes MME (Mobility Management Entity )/AMF (Authentication Management Field, authentication management domain)/UPF (User Plane Function ) 211, other MME/AMF/UPF214, S-GW (Service Gateway) 212, and P-GW (Packet Date Network Gateway, packet data network Gateway) 213. The MME/AMF/UPF211 is a control node that handles signaling between the UE201 and the EPC/5G-CN 210. In general, the MME/AMF/UPF211 provides bearer and connection management. All user IP (Internet Protocal, internet protocol) packets are transported through the S-GW212, which S-GW212 itself is connected to P-GW213. The P-GW213 provides UE IP address assignment as well as other functions. The P-GW213 is connected to the internet service 230. Internet services 230 include operator-corresponding internet protocol services, which may include, in particular, the internet, intranets, IMS (IP Multimedia Subsystem ) and packet-switched streaming services.
As an embodiment, the UE201 corresponds to the first node in the present application.
As an embodiment, the UE201 is a terminal with inter-cell handover capability triggering L1/L2.
As an embodiment, the UE201 is a terminal with the capability to monitor multiple beams simultaneously.
As an embodiment, the UE201 is a Massive-MIMO enabled terminal.
As an embodiment, the UE201 is a V2X (Vehicle-to-evaluation) enabled terminal.
As an embodiment, the gNB203 corresponds to the second node in the present application.
As an embodiment, the gNB203 supports an L1/L2 inter-cell handover function.
As an embodiment, the gNB203 supports multi-beam transmission.
As an embodiment, the gNB203 supports Massive-MIMO based transmission.
Example 3
Embodiment 3 shows a schematic diagram of an embodiment of a radio protocol architecture of a user plane and a control plane according to the application, as shown in fig. 3. Fig. 3 is a schematic diagram illustrating an embodiment of a radio protocol architecture for a user plane 350 and a control plane 300, fig. 3 shows the radio protocol architecture for the control plane 300 between a first communication node device (UE, RSU in gNB or V2X) and a second communication node device (gNB, RSU in UE or V2X) in three layers: layer 1, layer 2 and layer 3. Layer 1 (L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions. The L1 layer will be referred to herein as PHY301. Layer 2 (L2 layer) 305 is above PHY301 and is responsible for the link between the first communication node device and the second communication node device through PHY301. The L2 layer 305 includes a MAC (Medium Access Control ) sublayer 302, an RLC (Radio Link Control, radio link layer control protocol) sublayer 303, and a PDCP (Packet Data Convergence Protocol ) sublayer 304, which terminate at the second communication node device. The PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels. The PDCP sublayer 304 also provides security by ciphering the data packets, and the PDCP sublayer 304 also provides handoff support for the first communication node device to the second communication node device. The RLC sublayer 303 provides segmentation and reassembly of upper layer data packets, retransmission of lost data packets, and reordering of data packets to compensate for out of order reception due to HARQ. The MAC sublayer 302 provides multiplexing between logical and transport channels. The MAC sublayer 302 is also responsible for allocating the various radio resources (e.g., resource blocks) in one cell among the first communication node devices. The MAC sublayer 302 is also responsible for HARQ operations. The RRC (Radio Resouce Control, radio resource control) sublayer 306 in layer 3 (L3 layer) in the control plane 300 is responsible for obtaining radio resources (i.e., radio bearers) and configuring the lower layers using RRC signaling between the second communication node device and the first communication node device. The radio protocol architecture of the user plane 350 includes layer 1 (L1 layer) and layer 2 (L2 layer), the radio protocol architecture for the first communication node device and the second communication node device in the user plane 350 is substantially the same for the physical layer 351, PDCP sublayer 354 in the L2 layer 355, RLC sublayer 353 in the L2 layer 355 and MAC sublayer 352 in the L2 layer 355 as the corresponding layers and sublayers in the control plane 300, but the PDCP sublayer 354 also provides header compression for upper layer data packets to reduce radio transmission overhead. Also included in the L2 layer 355 in the user plane 350 is an SDAP (Service Data Adaptation Protocol ) sublayer 356, the SDAP sublayer 356 being responsible for mapping between QoS flows and data radio bearers (DRBs, data Radio Bearer) to support diversity of traffic. Although not shown, the first communication node apparatus may have several upper layers above the L2 layer 355, including a network layer (e.g., IP layer) that terminates at the P-GW on the network side and an application layer that terminates at the other end of the connection (e.g., remote UE, server, etc.).
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the first node in the present application.
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the second node in the present application.
As an embodiment, PDCP304 of the second communication node device is used to generate a schedule for the first communication node device.
As one embodiment, PDCP354 of the second communication node device is used to generate a schedule for the first communication node device.
As an embodiment, the first message in the present application is generated in the PHY301 or the PHY351.
As an embodiment, the first message in the present application is generated in the MAC302 or the MAC352.
As an embodiment, the first message in the present application is generated in the RRC306.
As an embodiment, the first signaling in the present application is generated in the PHY301 or the PHY351.
As an embodiment, the first signaling in the present application is generated in the MAC302 or the MAC352.
As an embodiment, the first signaling in the present application is generated in the RRC306.
As an embodiment, the second message in the present application is generated in the PHY301 or the PHY351.
As an embodiment, the second message in the present application is generated in the MAC302 or the MAC352.
As an embodiment, the second message in the present application is generated in the RRC306.
As an embodiment, the third message in the present application is generated in the PHY301 or the PHY351.
As an embodiment, the third message in the present application is generated in the MAC302 or the MAC352.
As an embodiment, the third message in the present application is generated in the RRC306.
As an embodiment, the first feature sequence in the present application is generated in the PHY301 or the PHY351.
As an embodiment, the first feature sequence in the present application is generated in the MAC302 or the MAC352.
As an embodiment, the first information block in the present application is generated in the MAC302 or the MAC352.
As an embodiment, the first information block in the present application is generated in the RRC306.
As an embodiment, the first node is a terminal.
As an embodiment, the second node is a terminal.
As an embodiment, the second node is an RSU.
As an embodiment, the second node is a Grouphead.
As an embodiment, the second node is a TRP (Transmitter Receiver Point, transmission reception point).
As an embodiment, the second node is an eNB.
As an embodiment, the second node is a base station.
Example 4
Embodiment 4 shows a schematic diagram of a first communication device and a second communication device according to the application, as shown in fig. 4. Fig. 4 is a block diagram of a first communication device 450 and a second communication device 410 communicating with each other in an access network.
The first communication device 450 includes a controller/processor 459, a memory 460, a data source 467, a transmit processor 468, a receive processor 456, a multi-antenna transmit processor 457, a multi-antenna receive processor 458, a transmitter/receiver 454, and an antenna 452.
The second communication device 410 includes a controller/processor 475, a memory 476, a receive processor 470, a transmit processor 416, a multi-antenna receive processor 472, a multi-antenna transmit processor 471, a transmitter/receiver 418, and an antenna 420.
In the transmission from the second communication device 410 to the first communication device 450, upper layer data packets from the core network are provided to a controller/processor 475 at the second communication device 410. The controller/processor 475 implements the functionality of the L2 layer. In the transmission from the second communication device 410 to the first communication device 450, a controller/processor 475 provides header compression, encryption, packet segmentation and reordering, multiplexing between logical and transport channels, and radio resource allocation to the first communication device 450 based on various priority metrics. The controller/processor 475 is also responsible for retransmission of lost packets and signaling to the first communication device 450. The transmit processor 416 and the multi-antenna transmit processor 471 implement various signal processing functions for the L1 layer (i.e., physical layer). Transmit processor 416 performs coding and interleaving to facilitate Forward Error Correction (FEC) at the second communication device 410, as well as mapping of signal clusters based on various modulation schemes, e.g., binary Phase Shift Keying (BPSK), quadrature Phase Shift Keying (QPSK), M-phase shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM). The multi-antenna transmit processor 471 digitally space-precodes the coded and modulated symbols, including codebook-based precoding and non-codebook-based precoding, and beamforming processing, to generate one or more spatial streams. A transmit processor 416 then maps each spatial stream to a subcarrier, multiplexes with reference signals (e.g., pilots) in the time and/or frequency domain, and then uses an Inverse Fast Fourier Transform (IFFT) to generate a physical channel carrying the time domain multicarrier symbol stream. The multi-antenna transmit processor 471 then performs transmit analog precoding/beamforming operations on the time domain multi-carrier symbol stream. Each transmitter 418 converts the baseband multicarrier symbol stream provided by the multiple antenna transmit processor 471 to a radio frequency stream and then provides it to a different antenna 420.
In a transmission from the second communication device 410 to the first communication device 450, each receiver 454 receives a signal at the first communication device 450 through its respective antenna 452. Each receiver 454 recovers information modulated onto a radio frequency carrier and converts the radio frequency stream into a baseband multicarrier symbol stream that is provided to a receive processor 456. The receive processor 456 and the multi-antenna receive processor 458 implement various signal processing functions for the L1 layer. A multi-antenna receive processor 458 performs receive analog precoding/beamforming operations on the baseband multi-carrier symbol stream from the receiver 454. The receive processor 456 converts the baseband multicarrier symbol stream after receiving the analog precoding/beamforming operation from the time domain to the frequency domain using a Fast Fourier Transform (FFT). In the frequency domain, the physical layer data signal and the reference signal are demultiplexed by the receive processor 456, wherein the reference signal is to be used for channel estimation, and the data signal is subjected to multi-antenna detection in the multi-antenna receive processor 458 to recover any spatial stream destined for the first communication device 450. The symbols on each spatial stream are demodulated and recovered in a receive processor 456 and soft decisions are generated. The receive processor 456 then decodes and deinterleaves the soft decisions to recover the upper layer data and control signals that were transmitted by the second communication device 410 on the physical channel. The upper layer data and control signals are then provided to the controller/processor 459. The controller/processor 459 implements the functions of the L2 layer. The controller/processor 459 may be associated with a memory 460 that stores program codes and data. Memory 460 may be referred to as a computer-readable medium. In the transmission from the second communication device 410 to the second communication device 450, the controller/processor 459 provides demultiplexing between transport and logical channels, packet reassembly, decryption, header decompression, control signal processing to recover upper layer data packets from the core network. The upper layer packets are then provided to all protocol layers above the L2 layer. Various control signals may also be provided to L3 for L3 processing.
In the transmission from the first communication device 450 to the second communication device 410, a data source 467 is used at the first communication device 450 to provide upper layer data packets to a controller/processor 459. Data source 467 represents all protocol layers above the L2 layer. Similar to the transmit functions at the second communication device 410 described in the transmission from the second communication device 410 to the first communication device 450, the controller/processor 459 implements header compression, encryption, packet segmentation and reordering, and multiplexing between logical and transport channels based on radio resource allocations, implementing L2 layer functions for the user and control planes. The controller/processor 459 is also responsible for retransmission of lost packets and signaling to the second communication device 410. The transmit processor 468 performs modulation mapping, channel coding, and digital multi-antenna spatial precoding, including codebook-based precoding and non-codebook-based precoding, and beamforming, with the multi-antenna transmit processor 457 performing digital multi-antenna spatial precoding, after which the transmit processor 468 modulates the resulting spatial stream into a multi-carrier/single-carrier symbol stream, which is analog precoded/beamformed in the multi-antenna transmit processor 457 before being provided to the different antennas 452 via the transmitter 454. Each transmitter 454 first converts the baseband symbol stream provided by the multi-antenna transmit processor 457 into a radio frequency symbol stream and provides it to an antenna 452.
In the transmission from the first communication device 450 to the second communication device 410, the function at the second communication device 410 is similar to the receiving function at the first communication device 450 described in the transmission from the second communication device 410 to the first communication device 450. Each receiver 418 receives radio frequency signals through its corresponding antenna 420, converts the received radio frequency signals to baseband signals, and provides the baseband signals to a multi-antenna receive processor 472 and a receive processor 470. The receive processor 470 and the multi-antenna receive processor 472 collectively implement the functions of the L1 layer. The controller/processor 475 implements L2 layer functions. The controller/processor 475 may be associated with a memory 476 that stores program codes and data. Memory 476 may be referred to as a computer-readable medium. In the transmission from the first communication device 450 to the second communication device 410, a controller/processor 475 provides demultiplexing between transport and logical channels, packet reassembly, decryption, header decompression, control signal processing to recover upper layer data packets from the UE 450. Upper layer packets from the controller/processor 475 may be provided to the core network.
As an embodiment, the first communication device 450 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus of the first communication device 450 to at least: first sending a first message over an air interface, the first message comprising a first identity; secondly, monitoring first signaling through an air interface in a first time window, wherein the first signaling is identified by any identity in a first identity set; then, when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the first communication device 450 includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: first sending a first message over an air interface, the first message comprising a first identity; secondly, monitoring first signaling through an air interface in a first time window, wherein the first signaling is identified by any identity in a first identity set; then, when the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the second communication device 410 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 means at least: first receiving a first message over an air interface, the first message comprising a first identity; then transmitting first signaling over the air interface in a first time window, the first signaling being identified by any identity in the first set of identities; when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the second communication device 410 apparatus includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: first receiving a first message over an air interface, the first message comprising a first identity; then transmitting first signaling over the air interface in a first time window, the first signaling being identified by any identity in the first set of identities; when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the first communication device 450 corresponds to a first node in the present application.
As an embodiment, the second communication device 410 corresponds to a second node in the present application.
As an embodiment, the first communication device 450 is a UE.
As an embodiment, the first communication device 450 is a terminal.
As an embodiment, the second communication device 410 is a base station.
As an embodiment, the second communication device 410 is a UE.
As an embodiment, the second communication device 410 is a network device.
As an embodiment, the second communication device 410 is a serving cell.
As an embodiment, the second communication device 410 is a TRP.
As one implementation, the antenna 452, the transmitter 454, the multi-antenna transmit processor 457, the transmit processor 468, at least the first four of the controller/processor 459 are used to send a first message over an air interface; the antenna 420, the receiver 418, the multi-antenna receive processor 472, the receive processor 470, at least the first four of the controllers/processors 475 are used to receive a first message over an air interface.
As one embodiment, the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, at least the first four of the controller/processor 459 are used to monitor for first signaling over an air interface in a first time window; the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, at least the first four of the controllers/processors 475 are used to transmit first signaling over an air interface in a first time window.
As one embodiment, when the first signaling is detected in the first time window, the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, and at least the first four of the controller/processors 459 are used to determine that the random access procedure to which the first message belongs was successful.
As an embodiment, when the first signaling is not detected in the first time window, the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, and at least the first four of the controllers/processors 459 are used to determine that the random access procedure to which the first message belongs is unsuccessful.
As one embodiment, the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, at least the first four of the controller/processors 459 are used to receive a second message in a first time window; the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, at least the first four of the controller/processor 475 are used to send a second message.
As one implementation, the antenna 452, the transmitter 454, the multi-antenna transmit processor 457, the transmit processor 468, at least the first four of the controller/processor 459 are used to transmit a first signature sequence; the antenna 420, the receiver 418, the multi-antenna receive processor 472, the receive processor 470, at least the first four of the controller/processors 475 are used to receive a first sequence of features.
As one embodiment, the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, at least the first four of the controller/processors 459 are used to receive a third message; the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, at least the first four of the controller/processor 475 are used to send a third message.
As an embodiment, the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, at least the first four of the controller/processors 459 are used to receive a first block of information; the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, at least the first four of the controller/processors 475 are used to transmit a first block of information.
Example 5
Embodiment 5 illustrates a flow chart of a first signaling, as shown in fig. 5. In fig. 5, the first node U1 and the second node N2 communicate via a wireless link. It is specifically explained that the order in the present embodiment is not limited to the order of signal transmission and the order of implementation in the present application. Without conflict, the embodiments in embodiment 5, the subordinate sub-embodiments and subordinate embodiments can be applied by embodiment 6 and embodiment 7. In the figure, the step denoted by block F0 is optional.
For the followingFirst node U1Receiving a first information block in step S10; transmitting a first message over an air interface in step S11; monitoring first signaling over an air interface in a first time window in step S12; in step S13, when the first signaling is detected in the first time window, it is determined that the random access procedure to which the first message belongs is successful; and when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful.
For the followingSecond node N2Transmitting a first information block in step S20; receiving a first message over an air interface in step S21; in step S22 first signalling is sent over the air interface in a first time window.
In embodiment 5, the first message includes a first identity, the first signaling being identified by any identity in a first set of identities; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window; the first information block is used to indicate a first set of identities.
As one embodiment, the act of monitoring the first signaling over the air interface in a first time window comprises: monitoring the first signaling in a first RE set and a second RE set in the first time window respectively; the first identity is used for the monitoring behavior in the first RE set and a second identity is used for the monitoring behavior in the second RE set, the first set of identities comprising the first identity and the second identity.
As a sub-embodiment of this embodiment, the first set of REs (Resource Elements ) comprises a core (Control Resource Set, set of control resources).
As a sub-embodiment of this embodiment, the second set of REs comprises a CORESET.
As a sub-embodiment of this embodiment, the first RE set includes a CORESET pool.
As a sub-embodiment of this embodiment, the second set of REs comprises a CORESET pool.
As a sub-embodiment of this embodiment, the first set of REs and the second set of REs all belong to the same CORESET pool.
As a sub-embodiment of this embodiment, the first set of REs comprises a set of search spaces.
As a sub-embodiment of this embodiment, the second set of REs comprises a set of search spaces.
As a sub-embodiment of this embodiment, the first set of REs comprises a pool of search space sets.
As a sub-embodiment of this embodiment, the second set of REs comprises a pool of search space sets.
As a sub-embodiment of this embodiment, the first set of REs and the second set of REs both belong to the same pool of search space sets.
As a sub-embodiment of this embodiment, the first node U1 monitors with a first spatial reception parameter in the first RE set and the first node U1 monitors with a second spatial reception parameter in the second RE set, the first and second spatial reception parameters being associated to different reference signal resources, respectively.
As a sub-embodiment of this embodiment, the TCI (Transmission Configuration Indication, transport configuration indication) State (State) employed by the first set of REs is different from the TCI State employed by the second set of REs.
As a sub-embodiment of this embodiment, the first set of REs is associated with a first reference signal resource and the second set of REs is associated with a second reference signal resource.
As an subsidiary embodiment of this sub-embodiment, the radio signal transmitted on said first reference signal resource and the radio signal transmitted on said second reference signal resource are non-QCL (Quasi Co-located).
As an additional embodiment of this sub-embodiment, the first reference signal Resource comprises a CSI-RS (Channel-State Information Reference Signals, channel state information reference signal) Resource (Resource).
As an subsidiary embodiment of this sub-embodiment, said first reference signal resource comprises SSB (SS/PBCH Block, synchronization signal/physical broadcast channel Block).
As an subsidiary embodiment of this sub-embodiment, said second reference signal resource comprises a CSI-RS resource.
As an subsidiary embodiment of this sub-embodiment, said second reference signal resource comprises an SSB.
As an subsidiary embodiment of this sub-embodiment, said first reference signal resource and said second reference signal resource are different.
As a sub-embodiment of this embodiment, the first set of REs is associated to the first cell of the present application.
As a sub-embodiment of this embodiment, the second set of REs is associated to the second cell of the present application.
As a sub-embodiment of this embodiment, the above sentence said first identity is used for said monitoring behavior in said first RE set comprising: the first identity is used to descramble the control signaling detected in the first set of REs to determine whether the control signaling is the first signaling.
As a sub-embodiment of this embodiment, the above sentence said second identity is used for said monitoring behavior in said second RE set comprising: the second identity is used to descramble the control signaling detected in the second set of REs to determine whether the control signaling is the first signaling.
As a sub-embodiment of this embodiment, when the first signaling is transmitted in the first RE set, the CRC included in the first signaling is scrambled by the first identity.
As a sub-embodiment of this embodiment, when the first signaling is transmitted in the second RE set, the CRC comprised by the first signaling is scrambled by the second identity.
As an embodiment, the signaling carrying the first information block comprises RRC signaling.
As an embodiment, the signaling carrying the first information block comprises MAC signaling.
As an embodiment, the first information block is used to indicate all identities comprised by the first set of identities.
As an embodiment, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and the identity corresponding to the first cell and the identity corresponding to the second cell are different.
As a sub-embodiment of this embodiment, the identity corresponding to the first cell is a PCI (Physical Cell Identity ).
As a sub-embodiment of this embodiment, the identifier corresponding to the second cell is a PCI.
As a sub-embodiment of this embodiment, the identity corresponding to the first cell is one CGI (Cell Global ID).
As a sub-embodiment of this embodiment, the identity corresponding to the second cell is a CGI.
As a sub-embodiment of this embodiment, the meaning of the sentence that the first identity and the second identity are maintained by the first cell and the second cell, respectively, includes: the first identity is assigned by the first cell and the second identity is assigned by the second cell.
As a sub-embodiment of this embodiment, the meaning of the sentence that the first identity and the second identity are maintained by the first cell and the second cell, respectively, includes: the first cell ensures that the first identity is only assigned to one terminal under the first cell and the second cell ensures that the second identity is only assigned to one terminal under the second cell.
As an embodiment, the first identity and the second identity are assigned to the first node U1 and the second terminal, respectively, the first node U1 and the second terminal being two different terminals.
As a sub-embodiment of this embodiment, the first node U1 is a terminal different from the second terminal.
As a sub-embodiment of this embodiment, the IMSI (International Mobile Subscriber Identity, global mobile registration identity) used by the first node U1 and the IMSI used by the second node are different.
As a sub-embodiment of this embodiment, the S-TMSI (System Architecture Evolution Temporary Mobile Subscriber Identity ) employed by the first node U1 is different from the S-TMSI employed by the second terminal.
As a sub-embodiment of this embodiment, the first node U1 and the second terminal belong to the same terminal group.
As an embodiment, any identity comprised by the first set of identities can be used by the first node U1 to determine if the first signaling is received correctly only if the first message is associated to a downlink radio signal resource of a second cell.
As a sub-embodiment of this embodiment, the first node U1 descrambles the CRC (Cyclic Redundancy Check ) of the first signaling by each identity included in the first set of identities to determine if the first signaling was received correctly.
As a sub-embodiment of this embodiment, any identity comprised by the first set of identities is capable of descrambling a CRC of the first signaling, the first node determining that the first signaling was received correctly.
As a sub-embodiment of this embodiment, the meaning of the sentence that the first message is associated with the downlink radio signal resource of the second cell includes: the time-frequency resources occupied by the first message are associated to downlink radio signal resources of the second cell.
As an subsidiary embodiment of this sub-embodiment, the time-frequency resources occupied by said first message are time-frequency resources for random access in said second cell.
As an subsidiary embodiment of this sub-embodiment, the time-frequency resources occupied by said first message are content-Free.
As an subsidiary embodiment of this sub-embodiment, the time-frequency resources occupied by said first message are content-Based.
As a sub-embodiment of this embodiment, the meaning of the sentence that the first message is associated with the downlink radio signal resource of the second cell includes: the first message is used to indicate a set of target time-frequency resources belonging to downlink radio signal resources of the second cell.
As a sub-embodiment of this embodiment, the downlink radio signal resource of the second cell comprises one CSI-RS resource of the second cell.
As a sub-embodiment of this embodiment, the downlink radio signal resource of the second cell comprises an SSB of the second cell.
As a sub-embodiment of this embodiment, the downlink radio signal resource of the second cell corresponds to a CSI-RS resource index of the second cell.
As a sub-embodiment of this embodiment, the downlink radio signal resource of the second cell corresponds to an SSB index of the second cell.
As a sub-embodiment of this embodiment, the first node U1 uses only the first identity comprised by the first set of identities to determine if the first signaling is received correctly when the first message is associated to a downlink radio signal resource of a first cell.
As an subsidiary embodiment of this sub-embodiment, said first node U1 descrambles the CRC of said first signaling by said first identity to determine if said first signaling was received correctly.
As an subsidiary embodiment of this sub-embodiment, said first node U1 determines that said first signaling is received correctly when said first identity is able to descramble the CRC of said first signaling.
As an auxiliary embodiment of this sub-embodiment, the meaning of the first message associated with the downlink radio signal resource of the first cell in the sentence includes: the time-frequency resources occupied by the first message are associated to downlink radio signal resources of the first cell.
As an subsidiary embodiment of this sub-embodiment, the time-frequency resources occupied by said first message are time-frequency resources for random access in said first cell.
As an auxiliary embodiment of this sub-embodiment, the meaning of the first message associated with the downlink radio signal resource of the first cell in the sentence includes: the first message is used to indicate a set of target time-frequency resources belonging to downlink radio signal resources of the first cell.
As an subsidiary embodiment of this sub-embodiment, the downlink radio signal resource of the first cell comprises a CSI-RS resource of the first cell.
As an subsidiary embodiment of this sub-embodiment, said first cell's downlink radio signal resource comprises an SSB of said first cell.
As an auxiliary embodiment of this sub-embodiment, the downlink radio signal resource of the first cell corresponds to a CSI-RS resource index of the first cell.
As an auxiliary embodiment of this sub-embodiment, the downlink radio signal resource of the first cell corresponds to an SSB index of the first cell.
Example 6
Embodiment 6 illustrates a flow chart of a second message, as shown in fig. 6. In fig. 6, the first node U3 and the second node N4 communicate via a wireless link. It is specifically explained that the order in the present embodiment is not limited to the order of signal transmission and the order of implementation in the present application. Without conflict, the embodiments in embodiment 6, the subordinate sub-embodiments and subordinate embodiments can be applied by embodiment 5 and embodiment 7.
For the followingFirst node U3A second message is received in step S30 when the first signaling is detected in the first time window.
For the followingSecond node N4The second message is sent in step S40.
In embodiment 6, the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the any identity in the first set of identities.
As an embodiment, the channel occupied by the second message includes PDSCH (Physical Downlink Shared Channel ).
As an embodiment, the channel occupied by the second message includes a PSSCH (Physical Sidelink Shared Channel ).
As an embodiment, the second message is Msg4 (message 4).
As an embodiment, the second message is MsgB (message B).
As an embodiment, the second message is a conflict resolution (Contention Resolution).
As an embodiment, the second message is a message comprising a MAC PDU.
As an embodiment, the second message comprises a collision resolution identity, MAC, control element (Contention Resolution Identity MAC Control Element) of the first node U3.
As an embodiment, the second message includes C-RNTI MAC CE.
As an embodiment, the first signaling is used to schedule PDSCH occupied by the second message.
Example 7
Embodiment 7 illustrates a flow chart of a first feature sequence, as shown in fig. 7. In fig. 7, the first node U5 and the second node N6 communicate via a wireless link. It is specifically explained that the order in the present embodiment is not limited to the order of signal transmission and the order of implementation in the present application. Without conflict, the embodiments in embodiment 7, the subordinate sub-embodiments and subordinate embodiments can be applied by embodiment 5 and embodiment 6.
For the followingFirst node U5The first signature sequence is transmitted in step S50 and the third message is received in step S51.
For the followingSecond node N6The first signature sequence is received in step S60 and a third message is sent in step S61.
In embodiment 7, the first feature sequence is used to trigger the third message, and the third message is used to trigger the first message.
As an embodiment, the first signature sequence is a Preamble (Preamble).
As an embodiment, the first signature sequence is Msg1 (message 1).
As an embodiment, the physical layer channel carrying the first signature sequence comprises PRACH.
As an embodiment, the first signature sequence is used for a random access procedure.
As an embodiment, msgA comprises the first signature sequence.
As an embodiment, the first signature sequence is associated to one CSI-RS resource of the first cell.
As an embodiment, the first signature sequence is associated to one SSB of the first cell.
As an embodiment, the time-frequency resource occupied by the first signature sequence is associated to one CSI-RS resource of the first cell.
As an embodiment, the time-frequency resources occupied by the first signature sequence are associated to one SSB of the first cell.
As an embodiment, the third message is message 2 (Msg 2).
As an embodiment, the third message comprises a RAR.
As an embodiment, the third message includes a RAR responsive to the first signature sequence.
As an embodiment, the physical layer channel carrying the third message is PDSCH, and the CRC included in the physical layer control channel scheduling the PDSCH of the third message is scrambled by RA-RNTI.
As an embodiment, the first signature sequence, the third message number, the first message and the second message comprise Msg1, msg2, msg3 and Msg4, respectively.
As an embodiment, the transmission of the first signature sequence is used to trigger the reception of the third message.
As an embodiment, the reception of the third message is used to trigger the transmission of the first message.
Example 8
Embodiment 8 illustrates a schematic diagram of a first set of REs and a second set of REs, as shown in fig. 8. In fig. 8, the first set of REs occupies a positive integer number of REs greater than 1, and the second set of REs occupies a positive integer number of REs greater than 1.
As an embodiment, the first set of REs and the second set of REs are allocated to the first cell and the second cell, respectively, in the present application.
As an embodiment, the first RE set and the second RE set are maintained by the same base station, which maintains the first cell and the second cell in the present application at the same time.
As an embodiment, the first set of REs and the second set of REs are TDM (Time Division Multiplexing, time division multiplexed).
As an embodiment, the first set of REs and the second set of REs are FDM (Frequency Division Multiplexing, frequency division multiplexed).
As an embodiment, the first set of REs and the second set of REs are SDM (Space Division Multiplexing, space division multiplexed).
As one embodiment, the first set of REs and the second set of REs are CDM (Code Division Multiplexing, code division multiplexed).
Example 9
Embodiment 9 illustrates a schematic diagram of a first cell and a second cell, as shown in fig. 9. In fig. 9, a first node of the present application resides in a first cell, and a second cell is shown as a neighboring cell to the first cell; the second cell maintains transmission of M1 beams, the M1 beams respectively corresponding to M1 candidate reference signal resources, and the second cell respectively transmits M1 candidate reference signals on the M1 candidate reference signal resources for terminal side Beam Management (Beam Management); the first cell is configured to maintain transmission of N1 beams, where the N1 beams respectively correspond to N1 first type reference signal resources included in the target reference signal resource group, and the first cell respectively sends N1 first type reference signals on the N1 first type reference signal resources for terminal side beam management. The first node finds that the channel quality detected on the N1 first type reference signals is lower than a first threshold, and that the channel quality detected on at least one candidate reference signal among the M1 candidate reference signals is higher than a specific threshold. The first node starts to send the first message in the present application.
As an embodiment, the first cell maintains the first identity.
As an embodiment, the first cell maintains the first set of REs.
As an embodiment, the second cell maintains the second identity.
As an embodiment, the second cell maintains the second set of REs.
As an embodiment, the second cell sends the first signaling.
As an embodiment, the time-frequency resource occupied by the random access procedure initiated by the first node belongs to the second cell.
Example 10
Embodiment 10 illustrates a block diagram of the structure in a first node, as shown in fig. 10. In fig. 10, a first node 1000 includes a first transceiver 1001, a first receiver 1002, and a second receiver 1003.
A first transceiver 1001 that transmits a first message over an air interface, the first message including a first identity;
a first receiver 1002 that monitors over an air interface for first signaling in a first time window, the first signaling being identified by any identity in a first set of identities;
a second receiver 1003, when the first signaling is detected in the first time window, determining that the random access procedure to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
In embodiment 10, the first identity is a C-RNTI, the first set of identities includes a plurality of identities, and any one of the first set of identities is a RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the second receiver 1003 receives a second message when the first signaling is detected in the first time window; the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the any identity in the first identity set.
As one embodiment, the act of monitoring the first signaling over the air interface in a first time window comprises: monitoring the first signaling in a first RE set and a second RE set in the first time window respectively; the first identity is used for the monitoring behavior in the first RE set and a second identity is used for the monitoring behavior in the second RE set, the first set of identities comprising the first identity and the second identity.
As one embodiment, the first transceiver 1001 transmits a first signature sequence and the first transceiver 1001 receives a third message; the first feature sequence is used to trigger the third message, which is used to trigger the first message.
As an embodiment, the first transceiver 1001 receives a first information block; the first information block is used to indicate the first set of identities.
As an embodiment, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and the identity corresponding to the first cell and the identity corresponding to the second cell are different.
As an embodiment, the first identity and the second identity are assigned to the first node and the second terminal, respectively, the first node and the second terminal being two different terminals.
As an embodiment, any identity comprised by the first set of identities can be used by the first node to determine if the first signaling is received correctly only if the first message is associated to a downlink radio signal resource of a second cell.
As one example, the first transceiver 1001 includes at least the first 6 of the antenna 452, the receiver/transmitter 454, the multi-antenna receive processor 458, the multi-antenna transmit processor 457, the receive processor 456, the transmit processor 468, and the controller/processor 459 of example 4.
As an embodiment, the first receiver 1002 includes at least the first 4 of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, and the controller/processor 459 in embodiment 4.
As an embodiment, the second receiver 1003 includes at least the first 4 of the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, and the controller/processor 459 in embodiment 4.
Example 11
Embodiment 11 illustrates a block diagram of the structure in a second node, as shown in fig. 11. In fig. 11, the second node 1100 includes a second transceiver 1101 and a first transmitter 1102.
A second transceiver 1101 receiving a first message over an air interface, the first message comprising a first identity;
a first transmitter 1102 that transmits first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
in embodiment 11, when the first signaling is detected in the first time window, the sender of the first message determines that the random access procedure to which the first message belongs is successful; when the first signaling is not detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI, the first identity set comprises a plurality of identities, and any one of the first identity set is an RNTI; the time domain resources occupied by the first message are used to determine the first time window.
As an embodiment, the first transmitter 1102 transmits a second message; the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the any identity in the first identity set.
As an embodiment, the second node sends the first signaling in at least one of a first set of REs or a second set of REs in the first time window; when the first signaling is sent in the first set of REs, the first identity is used to scramble a CRC included in the first signaling; when the first signaling is sent in the second set of REs, a second identity is used to scramble a CRC included in the first signaling; the first set of identities includes the first identity and the second identity.
For one embodiment, the second transceiver 1101 receives a first sequence of features and the second transceiver 1101 sends a third message; the first feature sequence is used to trigger the third message, which is used to trigger the first message.
For one embodiment, the second transceiver 1101 transmits a first block of information; the first information block is used to indicate the first set of identities.
As an embodiment, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and the identity corresponding to the first cell and the identity corresponding to the second cell are different.
As an embodiment, the first identity and the second identity are maintained by a first cell and a second cell, respectively, and the identity corresponding to the first cell and the identity corresponding to the second cell are different.
As an embodiment, the first identity and the second identity are assigned to the first node and the second terminal, respectively, the first node and the second terminal being two different terminals.
As an embodiment, any identity comprised by the first set of identities can be used by the second node for scrambling CRCs comprised by the first signaling only if the first message is associated to downlink radio signal resources of a second cell.
As one example, the second transceiver 1101 includes at least the first 6 of the antenna 420, the receiver 418, the multi-antenna receive processor 472, the receive processor 470, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, and the controller/processor 475 of example 4.
As one example, the first transmitter 1102 includes at least the first 4 of the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, and the controller/processor 475 of example 4.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described methods may be implemented by a program that instructs associated hardware, and the program may be stored on a computer readable storage medium, such as a read-only memory, a hard disk or an optical disk. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module unit in the above embodiment may be implemented in a hardware form or may be implemented in a software functional module form, and the present application is not limited to any specific combination of software and hardware. The first node and the second node in the application comprise, but are not limited to, mobile phones, tablet computers, notebooks, network cards, low-power consumption devices, eMTC devices, NB-IoT devices, vehicle-mounted communication devices, vehicles, RSUs, aircrafts, unmanned planes, remote control aircrafts and other wireless communication devices. The base station in the present application includes, but is not limited to, a macro cell base station, a micro cell base station, a home base station, a relay base station, an eNB, a gNB, a transmission receiving node TRP, a GNSS, a relay satellite, a satellite base station, an air base station, an RSU, and other wireless communication devices.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (32)

1. A first node for use in wireless communications, comprising:
a first transceiver to transmit a first message over an air interface, the first message including a first identity;
a first receiver monitoring first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
the second receiver judges that the random access process to which the first message belongs is successful when the first signaling is detected in the first time window; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
wherein the first identity is a C-RNTI (Cell-radio network temporary identifier), the first identity set includes a plurality of identities, any one of the first identity set is an RNTI (RadioNetwork TemporaryIdentifier ), and the first identity set is a plurality of RNTIs maintained by the first node in a plurality of cells; the time domain resources occupied by the first message are used to determine the first time window.
2. The first node of claim 1, wherein the second receiver receives a second message when the first signaling is detected in the first time window; the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the any identity in the first identity set.
3. The first node according to claim 1 or 2, wherein the monitoring the first signaling over the air interface in the first time window comprises: monitoring the first signaling in a first RE (resource elements) set and a second RE set in the first time window, respectively; the first identity is used for the monitoring behavior in the first RE set and a second identity is used for the monitoring behavior in the second RE set, the first set of identities comprising the first identity and the second identity.
4. The first node of claim 1 or 2, wherein the first transceiver transmits a first signature sequence and the first transceiver receives a third message; the first feature sequence is used to trigger the third message, which is used to trigger the first message.
5. The first node of claim 1 or 2, wherein the first transceiver receives a first block of information; the first information block is used to indicate the first set of identities.
6. A first node according to claim 3, wherein the first identity and the second identity are maintained by a first cell and a second cell, respectively, the identity corresponding to the first cell being different from the identity corresponding to the second cell.
7. A first node according to claim 3, characterized in that the first identity and the second identity are assigned to the first node and a second terminal, respectively, which are two different terminals.
8. A first node according to claim 1 or 2, characterized in that any identity comprised by the first set of identities can be used by the first node for determining whether the first signaling is received correctly only if the first message is associated to downlink radio signal resources of a second cell.
9. A second node for use in wireless communications, comprising:
a second transceiver that receives a first message over an air interface, the first message including a first identity;
A first transmitter for transmitting first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI (Cell-RadioNetwork TemporaryIdentifier, cell radio network tentative identity), the first set of identities includes a plurality of identities, any one of the first set of identities is a RNTI (radio network tentative identity), and the first set of identities is a plurality of RNTIs maintained by the sender of the first message in a plurality of cells; the time domain resources occupied by the first message are used to determine the first time window.
10. The second node of claim 9, wherein the second node comprises a second node comprising a second node,
the first transmitter transmits a second message; the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the any identity in the first identity set.
11. The second node according to claim 9 or 10, characterized in that the second node transmits the first signaling in at least one of a first set of REs (resource elements) or a second set of REs in the first time window; when the first signaling is transmitted in the first RE set, the first identity is used to scramble a CRC (cyclic redundancy check) included in the first signaling; when the first signaling is sent in the second set of REs, a second identity is used to scramble a CRC included in the first signaling; the first set of identities includes the first identity and the second identity.
12. The second node according to claim 9 or 10, wherein the second transceiver receives the first signature sequence and the second transceiver sends a third message; the first feature sequence is used to trigger the third message, which is used to trigger the first message.
13. The second node according to claim 9 or 10, wherein the second transceiver transmits a first information block; the first information block is used to indicate the first set of identities.
14. The second node of claim 11, wherein the first identity and the second identity are maintained by a first cell and a second cell, respectively, the identity corresponding to the first cell and the identity corresponding to the second cell being different.
15. The second node according to claim 11, characterized in that the first identity and the second identity are assigned to a first node and a second terminal, respectively, the first node and the second terminal being two different terminals, the sender of the first message comprising the first node.
16. The second node according to claim 9 or 10, characterized in that any identity comprised by the first set of identities can be used by the second node for scrambling CRCs comprised by the first signaling only if the first message is associated to downlink radio signal resources of a second cell.
17. A method in a first node for use in wireless communications, comprising:
transmitting a first message over an air interface, the first message including a first identity;
monitoring first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
When the first signaling is detected in the first time window, judging that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, judging that the random access process to which the first message belongs is unsuccessful;
wherein the first identity is a C-RNTI (Cell-radio network temporary identifier), the first identity set includes a plurality of identities, any one of the first identity set is an RNTI (RadioNetwork TemporaryIdentifier ), and the first identity set is a plurality of RNTIs maintained by the first node in a plurality of cells; the time domain resources occupied by the first message are used to determine the first time window.
18. The method in the first node of claim 17, wherein the first node receives a second message when the first signaling is detected in the first time window; the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the any identity in the first identity set.
19. The method in a first node according to claim 17 or 18, wherein monitoring the first signaling over the air interface in a first time window comprises: monitoring the first signaling in a first RE (resource elements) set and a second RE set in the first time window, respectively; the first identity is used for the monitoring behavior in the first RE set and a second identity is used for the monitoring behavior in the second RE set, the first set of identities comprising the first identity and the second identity.
20. A method in a first node according to claim 17 or 18, comprising:
transmitting a first feature sequence;
receiving a third message;
wherein the first feature sequence is used to trigger the third message, which is used to trigger the first message.
21. A method in a first node according to claim 17 or 18, comprising:
receiving a first information block;
wherein the first information block is used to indicate a first set of identities.
22. The method of claim 19, wherein the first identity and the second identity are maintained by a first cell and a second cell, respectively, and wherein the identity corresponding to the first cell and the identity corresponding to the second cell are different.
23. The method in the first node of claim 19, wherein the first identity and the second identity are assigned to the first node and a second terminal, respectively, the first node and the second terminal being two different terminals.
24. A method in a first node according to claim 17 or 18, characterized in that any identity comprised by the first set of identities can be used by the first node for determining whether the first signaling is received correctly only if the first message is associated to downlink radio signal resources of a second cell.
25. A method in a second node for use in wireless communications, comprising:
receiving a first message over an air interface, the first message including a first identity;
transmitting first signaling over an air interface in a first time window, the first signaling being identified by any identity in a first set of identities;
when the first signaling is detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is successful; when the first signaling is not detected in the first time window, the sender of the first message judges that the random access process to which the first message belongs is unsuccessful; the first identity is a C-RNTI (Cell-RadioNetwork TemporaryIdentifier, cell radio network tentative identity), the first set of identities includes a plurality of identities, any one of the first set of identities is a RNTI (radio network tentative identity), and the first set of identities is a plurality of RNTIs maintained by the sender of the first message in a plurality of cells; the time domain resources occupied by the first message are used to determine the first time window.
26. A method in a second node according to claim 25, comprising:
sending a second message;
wherein the first signaling includes configuration information of a channel occupied by the second message, and the second message includes the arbitrary identity in the first identity set.
27. The method in a second node according to claim 25 or 26, wherein the second node sends the first signaling in at least one of a first set of REs (resource elements) or a second set of REs in the first time window; when the first signaling is transmitted in the first RE set, the first identity is used to scramble a CRC (cyclic redundancy check) included in the first signaling; when the first signaling is sent in the second set of REs, a second identity is used to scramble a CRC included in the first signaling; the first set of identities includes the first identity and the second identity.
28. A method in a second node according to claim 25 or 26, comprising:
receiving a first feature sequence;
sending a third message;
Wherein the first feature sequence is used to trigger the third message, which is used to trigger the first message.
29. A method in a second node according to claim 25 or 26, comprising:
transmitting a first information block;
wherein the first information block is used to indicate the first set of identities.
30. The method of claim 27, wherein the first identity and the second identity are maintained by a first cell and a second cell, respectively, and wherein the identity corresponding to the first cell and the identity corresponding to the second cell are different.
31. A method in a second node according to claim 25 or 26, characterized in that a first identity and a second identity are assigned to a first node and a second terminal, respectively, which are two different terminals, the sender of the first message comprising the first node.
32. A method in a second node according to claim 25 or 26, characterized in that any identity comprised by the first set of identities can be used by the second node for scrambling CRCs comprised by the first signaling only if the first message is associated to downlink radio signal resources of a second cell.
CN202011032439.4A 2020-09-21 2020-09-27 Method and apparatus in a node for wireless communication Active CN114285533B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN202310929750.6A CN117675149A (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication
CN202011032439.4A CN114285533B (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication
PCT/CN2021/118435 WO2022057817A1 (en) 2020-09-21 2021-09-15 Method and apparatus used in node for wireless communication
US18/120,437 US20230216563A1 (en) 2020-09-21 2023-03-13 Method and device in nodes used for wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011032439.4A CN114285533B (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202310929750.6A Division CN117675149A (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication

Publications (2)

Publication Number Publication Date
CN114285533A CN114285533A (en) 2022-04-05
CN114285533B true CN114285533B (en) 2023-08-15

Family

ID=80867797

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202011032439.4A Active CN114285533B (en) 2020-09-21 2020-09-27 Method and apparatus in a node for wireless communication
CN202310929750.6A Pending CN117675149A (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202310929750.6A Pending CN117675149A (en) 2020-09-27 2020-09-27 Method and apparatus in a node for wireless communication

Country Status (1)

Country Link
CN (2) CN114285533B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587812A (en) * 2017-09-28 2019-04-05 中兴通讯股份有限公司 Random access parameter determines method and device
WO2020156247A1 (en) * 2019-02-03 2020-08-06 上海朗帛通信技术有限公司 Method and device for communication node for use in radio communication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587812A (en) * 2017-09-28 2019-04-05 中兴通讯股份有限公司 Random access parameter determines method and device
WO2020156247A1 (en) * 2019-02-03 2020-08-06 上海朗帛通信技术有限公司 Method and device for communication node for use in radio communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Samsung Electronics Co., Ltd.R2-1905720 "2 Step RA_MsgB Aspects".3GPP tsg_ran\wg2_rl2.2019,(tsgr2_106),全文. *

Also Published As

Publication number Publication date
CN114285533A (en) 2022-04-05
CN117675149A (en) 2024-03-08

Similar Documents

Publication Publication Date Title
US11757566B2 (en) Method and device in UE and base station for multi-antenna communication
US11950289B2 (en) Method and device used in node for wireless communication
CN116437315A (en) Method and apparatus in a node for wireless communication
CN114337741B (en) Method and apparatus in a node used for wireless communication
CN113260049B (en) Method and arrangement in a communication node used for wireless communication
CN114285533B (en) Method and apparatus in a node for wireless communication
US20230216563A1 (en) Method and device in nodes used for wireless communication
CN114257274B (en) Method and apparatus in a node used for wireless communication
CN113365367B (en) Method and apparatus in a node used for wireless communication
CN112994857B (en) Method and equipment used for wireless communication
CN113891485B (en) Method and apparatus in a node for wireless communication
CN112887065B (en) Method and equipment used for wireless communication
WO2024078434A1 (en) Method and apparatus used in communication node for radio communication
CN117715226A (en) Method and apparatus in a communication node for wireless communication
CN115603873A (en) Method and arrangement in a communication node used for wireless communication
CN116113074A (en) Method and apparatus in a communication node for wireless communication
CN117715229A (en) Method and apparatus in a communication node for wireless communication
CN117715052A (en) Method and apparatus in a communication node for wireless communication
CN117412396A (en) Method and apparatus in a communication node for wireless communication
CN117580187A (en) Method and apparatus in a communication node for wireless communication
CN117750437A (en) Method and apparatus in a communication node for wireless communication
CN116133132A (en) Method and apparatus in a node for wireless communication
CN116234034A (en) Method and apparatus in a node for wireless communication
CN117528822A (en) Method and apparatus in a communication node for wireless communication
CN114630451A (en) Method and arrangement in a communication node used for wireless communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant