CN115119330A - Method and arrangement in a communication node used for wireless communication - Google Patents

Method and arrangement in a communication node used for wireless communication Download PDF

Info

Publication number
CN115119330A
CN115119330A CN202110299999.4A CN202110299999A CN115119330A CN 115119330 A CN115119330 A CN 115119330A CN 202110299999 A CN202110299999 A CN 202110299999A CN 115119330 A CN115119330 A CN 115119330A
Authority
CN
China
Prior art keywords
rnti
message
mac
default value
random access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110299999.4A
Other languages
Chinese (zh)
Inventor
于巧玲
张晓博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Langbo Communication Technology Co Ltd
Original Assignee
Shanghai Langbo Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Langbo Communication Technology Co Ltd filed Critical Shanghai Langbo Communication Technology Co Ltd
Priority to CN202110299999.4A priority Critical patent/CN115119330A/en
Publication of CN115119330A publication Critical patent/CN115119330A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method and arrangement in a communication node for wireless communication is disclosed. The communication node sends a first message; monitoring the second message; the first message and the second message belong to the same random access process; judging whether the same random access process is completed according to whether the second message is detected or not: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; otherwise, judging that the same random access process is not completed; the second message includes a first DCI identified by a first RNTI; the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; otherwise, the second message includes the first MAC field equal to the default value; the first set of reference RNTIs includes C-RNTIs.

Description

Method and arrangement in a communication node used for wireless communication
Technical Field
The present application relates to a transmission method and apparatus in a wireless communication system, and more particularly, to a transmission method and apparatus for small packet data service.
Background
NR (New Radio, New air interface) supports RRC (Radio Resource Control) INACTIVE (RRC _ INACTIVE) State (State) until 3GPP Rel-16 release, where the RRC INACTIVE State does not support data transmission. When a User Equipment (UE) has a periodic or aperiodic infrequent small packet to be transmitted in an RRC _ INACTIVE state, the UE needs to recover (Resume) the connection first, i.e., transition to an RRC connection (RRC _ CONNECTED) state, and then transition to the RRC _ INACTIVE state after the data transmission is completed. The 3GPP RAN #86 conference decides to launch a "NR INACTIVE state (INACTIVE state) Small Data Transmission (SDT)" Work Item (Work Item, WI), and studies a Small Data packet Transmission technology in an RRC _ INACTIVE state, including sending Uplink Data on a preconfigured PUSCH (Physical Uplink Shared Channel) resource, or using a Message 3(Message 3, Msg3) or a Message B (Message B, MsgB) in a Random Access (RA) procedure to carry Data.
Disclosure of Invention
In the process of transmitting a data packet through a DRB in an RRC _ INACTIVE state, if new data arrives, the UE needs to send an indication to the base station and monitor a PDCCH corresponding to the indication, the MAC entity does not necessarily have a C-RNTI in the process of transmitting the data packet through the DRB in the RRC _ INACTIVE state, and the problem that the new data arrives in the process of transmitting the data packet through the DRB in the RRC _ INACTIVE state needs to be enhanced.
In view of the above, the present application provides a solution. In the description of the above problem, an NR scenario is taken as an example; the method and the device are also applicable to scenarios such as LTE (Long Term Evolution) or NB-IoT (NarrowBand band Internet of Things), and achieve technical effects similar to those in NR scenarios. In addition, the adoption of a unified solution for different scenarios also helps to reduce hardware complexity and cost.
As an example, the interpretation of the term (Terminology) in the present application refers to the definition of the specification protocol TS36 series of 3 GPP.
As an example, the interpretation of the terms in the present application refers to the definitions of the 3GPP specification protocol TS38 series.
As an example, the interpretation of terms in the present application refers to the definitions of the series of 3GPP specification protocols TS 37.
As an example, the terms in the present application are explained with reference to the definition of the specification protocol of IEEE (Institute of Electrical and Electronics Engineers).
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments in any node of the present application may be applied to any other node. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.
The application discloses a method in a first node used for wireless communication, characterized by comprising:
sending a first message;
monitoring the second message; the first message and the second message belong to the same random access process;
judging whether the same random access process is finished according to whether the second message is detected or not;
wherein the act of determining whether the same random access procedure is complete based on whether the second message is detected comprises: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an embodiment, the problem to be solved by the present application includes: in the process of transmitting the data packet through the DRB in the RRC _ INACTIVE state, if the problem of new data arrival is solved.
As an embodiment, the problem to be solved by the present application includes: in the process of transmitting data packets through the DRB in the RRC _ INACTIVE state, if new data arrives, how to indicate uplink resources to the base station.
As an embodiment, the problem to be solved by the present application includes: how to handle if new data arrives and there is no uplink resource during the transmission of data packets through DRB in RRC _ INACTIVE state.
As an embodiment, the problem to be solved by the present application includes: which RNTI (Radio Network Temporary Identifier) is used if new data arrives as indicated by Msg3 during transmission of a packet through DRB in RRC _ INACTIVE state.
As an embodiment, the characteristics of the above method include: during the RRC _ INACTIVE state transmitting the data packet through the DRB, new data arrival is indicated through a random access procedure.
As an embodiment, the characteristics of the above method include: and in the process of transmitting the data packet through the DRB in the RRC _ INACTIVE state, if no available uplink resource exists, indicating that new data arrives through a random access process.
As an embodiment, the characteristics of the above method include: the second message includes the first MAC field equal to the default value when the first RNTI is not a C-RNTI.
As an embodiment, the characteristics of the above method include: when the first RNTI is not a C-RNTI, the second message includes the first MAC field equal to the default value and the second message does not include the MAC CE associated with the first MAC field equal to the default value.
As an example, the benefits of the above method include: and reusing the current RNTI of the UE to avoid the understanding error between the UE and the base station.
As an example, the benefits of the above method include: only one MAC subheader including the first MAC field equal to the default value is used for Contention Resolution, reducing signaling overhead caused by the UE context Resolution Identity MAC CE.
According to one aspect of the present application, wherein the first MAC domain comprises at least one of an LCID domain or an eLCID domain, the default value indicates a first type of MAC CE, and the second message does not include the first type of MAC CE; wherein the first RNTI does not belong to the first set of reference RNTIs.
As an embodiment, the characteristics of the above method include: when the first RNTI is not the C-RNTI, the second message includes an LCID field, the LCID field is set to 62, and the second message does not include a UE context Resolution Identity MAC CE.
As an embodiment, the characteristics of the above method include: when the first RNTI is a given reference RNTI, the second message includes one LCID field which is set to 62, and the second message does not include UE context Resolution Identity MAC CE.
As an embodiment, the characteristics of the above method include: when the first RNTI is a given reference RNTI, the second message includes one LCID field set to 62, or 63, or one of 35, 36, 37.., 42, or one of 64, 65, 66.., 308 and does not include UE context Resolution Identity MAC CE.
According to an aspect of the application, the first set of reference RNTIs comprises a given reference RNTI, which is different from the C-RNTI.
As an embodiment, the characteristics of the above method include: the second message does not include the first MAC field equal to the default value when the first RNTI is a given reference RNTI.
As an embodiment, the characteristics of the above method include: the second message does not include the first MAC field equal to the default value when the first RNTI is a given reference RNTI.
As an embodiment, the characteristics of the above method include: the second message does not include an LCID field set to 62 when the first RNTI is a given reference RNTI.
According to an aspect of the application, the first message includes the given reference RNTI, the first RNTI being the given reference RNTI.
As an embodiment, the characteristics of the above method include: the first message includes C-RNTI MAC CE, and the C-RNTI field in the C-RNTI MAC CE is set to the given reference RNTI.
As an embodiment, the characteristics of the above method include: the first message includes the first type of MAC CE, and an LCID field in the first type of MAC CE is set to the given reference RNTI.
As an example, the benefits of the above method include: the given reference RNTI except the current C-RNTI of the UE is carried in the C-RNTI MAC CE, and the auxiliary base station identifies the UE.
As an example, the benefits of the above method include: and indicating the given reference RNTI through one MAC CE of the first type to assist the base station to identify the UE.
According to one aspect of the application, the method is characterized by comprising the following steps:
receiving first signaling used to indicate whether the first message includes the given reference RNTI;
wherein the first RNTI is the given reference RNTI.
As an embodiment, the characteristics of the above method include: determining whether the first message includes the given reference RNTI according to the first signaling.
According to one aspect of the application, the method is characterized by comprising the following steps:
setting the C-RNTI as the given reference RNTI.
As an embodiment, the characteristics of the above method include: setting the C-RNTI to the given reference RNTI before the first message is transmitted.
As an embodiment, the characteristics of the above method include: after the first message is transmitted, before the second message is received, and the C-RNTI is set to the given reference RNTI.
As an embodiment, the characteristics of the above method include: setting the C-RNTI to the given reference RNTI after receiving the second message.
According to one aspect of the application, the method is characterized by comprising the following steps:
setting the given reference RNTI to a second RNTI;
wherein the second RNTI is received in a first random access response, which does not belong to the same random access procedure to which the first message and the second message belong.
As an embodiment, the characteristics of the above method include: keeping the C-RNTI stored in the UE Context the same as the given reference RNTI.
The application discloses a method in a second node used for wireless communication, characterized by comprising:
receiving a first message;
sending a second message;
wherein the first message and the second message belong to the same random access process; the same random access process is judged whether to be completed or not according to whether the second message is detected or not; the phrase that the same random access procedure is judged to be completed according to whether the second message is detected or not comprises: when the second message is detected in the first time unit set, the same random access process is judged to be successfully completed; when the second message is not detected in the first time unit set, the same random access process is judged to be incomplete; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
According to one aspect of the present application, wherein the first MAC domain comprises at least one of an LCID domain or an eLCID domain, the default value indicates a first type of MAC CE, and the second message does not include the first type of MAC CE; wherein the first RNTI does not belong to the first set of reference RNTIs.
According to an aspect of the application, the first set of reference RNTIs comprises a given reference RNTI, which is different from the C-RNTI.
According to an aspect of the application, the first message includes the given reference RNTI, and the first RNTI is the given reference RNTI.
According to one aspect of the application, the method is characterized by comprising the following steps:
transmitting first signaling used to indicate whether the first message includes the given reference RNTI;
wherein the first RNTI is the given reference RNTI.
According to an aspect of the application, C-RNTI is set to the given reference RNTI.
According to an aspect of the application, characterized in that the given reference RNTI is set to a second RNTI; wherein the second RNTI is received in a first random access response that does not belong to the same random access procedure to which the first message and the second message belong.
The present application discloses a first node for wireless communication, comprising:
a first transmitter to transmit a first message;
a first receiver to monitor for a second message; the first message and the second message belong to the same random access process; judging whether the same random access process is finished according to whether the second message is detected or not;
wherein the act of determining whether the same random access procedure is complete based on whether the second message is detected comprises: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
The present application discloses a second node for wireless communication, comprising:
a second receiver receiving the first message;
a second transmitter for transmitting a second message;
wherein the first message and the second message belong to the same random access process; the same random access process is judged whether to be completed or not according to whether the second message is detected or not; the phrase whether the same random access procedure is judged to be completed according to whether the second message is detected or not comprises the following steps: when the second message is detected in the first time unit set, the same random access process is judged to be successfully completed; when the second message is not detected in the first time unit set, the same random access process is judged to be incomplete; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an example, compared with the conventional scheme, the method has the following advantages:
reusing the current RNTI of the UE;
reducing UE implementation complexity;
avoid misinterpretation between UE and base station;
reducing the signalling overhead.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of transmission of a first message and a second message according to one embodiment of the present application;
FIG. 2 shows a schematic diagram of a network architecture according to an embodiment of the present application;
figure 3 shows a schematic diagram of an embodiment of a radio protocol architecture for the user plane and the control plane according to an embodiment of the present application;
FIG. 4 shows a schematic diagram of a first communication device and a second communication device according to an embodiment of the present application;
FIG. 5 shows a flow diagram of wireless signal transmission according to one embodiment of the present application;
fig. 6 shows a schematic diagram of a second message not including a first type of MAC CE according to an embodiment of the present application;
figure 7 shows a schematic diagram in which a first set of reference RNTIs comprises a given reference RNTI, according to one embodiment of the present application;
figure 8 shows a schematic diagram of a first message comprising a given reference RNTI according to one embodiment of the present application;
figure 9 shows a schematic diagram of setting a given reference RNTI to a second RNTI according to one embodiment of the present application;
fig. 10 shows a schematic diagram of a second message including a first MAC field equal to a default value and not including a first type of MAC CE according to an embodiment of the present application;
FIG. 11 illustrates a schematic diagram of C-RNTI MAC CE according to an embodiment of the present application;
fig. 12 shows a schematic view of a first RNTI MAC CE according to an embodiment of the present application;
FIG. 13 shows a block diagram of a processing device for use in a first node according to an embodiment of the present application;
fig. 14 shows a block diagram of a processing arrangement for use in a second node according to an embodiment of the present application.
Detailed Description
The technical solutions of the present application will be further described in detail with reference to the accompanying drawings, and it should be noted that the embodiments and features of the embodiments in the present application can be arbitrarily combined with each other without conflict.
Example 1
Embodiment 1 illustrates a flow chart of transmission of a first message and a second message according to an embodiment of the present application, as shown in fig. 1. In fig. 1, each block represents a step, and it is particularly emphasized that the sequence of the blocks in the figure does not represent a chronological relationship between the represented steps.
In embodiment 1, a first node in the present application sends a first message in step 101; in step 102, monitoring for a second message; the first message and the second message belong to the same random access process; judging whether the same random access process is finished according to whether the second message is detected or not; wherein the act of determining whether the same random access procedure is complete based on whether the second message is detected comprises: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As one embodiment, the first message is transmitted at a first serving cell and the second message is received at the first serving cell.
As an embodiment, the same random access procedure is associated to the first serving cell.
As an embodiment, the first RNTI is associated with the first serving cell.
As an embodiment, the first Serving Cell includes a Serving Cell (Serving Cell).
As an embodiment, the first serving Cell includes a Special Cell (SpCell).
As a sub-embodiment of this embodiment, the SpCell includes a PCell (Primary Cell) of an MCG (Master Cell Group).
As a sub-embodiment of this embodiment, the SpCell includes a PSCell (Primary SCG Cell, Primary Cell of SCG) of one SCG (Secondary Cell Group).
As an embodiment, the first serving Cell includes a Secondary Cell (SCell).
As an embodiment, the C-rnti (cell rnti) is associated with the first node and the first serving cell.
As an embodiment, the C-RNTI is a C-RNTI in the first serving cell for the first node.
As an embodiment, the given reference RNTI is associated with the first node and the first serving cell.
As an embodiment, the given reference RNTI is a given reference RNTI in the first serving cell for the first node.
As one embodiment, when the first message is triggered, the first node is performing Small Data Transmission (SDT).
As a sub-embodiment of this embodiment, the SDT includes transmitting a small Data packet (IDT) in an RRC (Radio Resource Control) INACTIVE state.
As a sub-embodiment of this embodiment, the SDT includes transmitting a Data packet through a DRB (Data Radio Bearer) in an RRC inactive state.
As a sub-embodiment of this embodiment, the SDT includes transmitting the data packet through one or more DRBs in the RRC inactive state.
As a sub-embodiment of this embodiment, the SDT includes recovering one or more DRBs in an RRC inactive state and transmitting the data packet through the one or more DRBs.
As a sub-embodiment of this embodiment, the SDT includes sending the packet in an RRC inactive state through at least one of a Message 3(Message 3, Msg3) or a Message a (Message a, MsgA) in a Random Access (RA) procedure.
As a sub-embodiment of this embodiment, the SDT includes sending the data packet on a resource block configured in rrcreelease in the RRC inactive state.
As an embodiment, when the first message is triggered, the first node is in RRC _ INACTIVE state and a DRB has been restored (resume).
As an embodiment, when the first message is triggered, the first node sends a rrcresemequest message and does not receive a response to the rrcresemequest message.
As an example, when the first message is triggered, the first node is in RRC _ INACTIVE state and SRB1 has been restored.
As an embodiment, the first timer is running when the first message is triggered.
As a sub-embodiment of this embodiment, the first timer is started when a RRCResumeRequest message is to be sent.
As a sub-embodiment of this embodiment, the first timer is started in preparation for performing the SDT procedure.
As a sub-embodiment of this embodiment, one RRC recovery procedure is initiated, the first timer is started, and the one RRC recovery procedure is associated with the SDT.
As a sub-embodiment of this embodiment, the receipt of a rrcreelease message is used to determine to stop the first timer.
As a sub-embodiment of this embodiment, receipt of a rrcresum message is used to determine to stop the first timer.
As a sub-embodiment of this embodiment, the phrase first timer being run includes: a running time of the first timer is not greater than an expiration value of the first timer, the expiration value of the first timer being preconfigured.
As an embodiment, the means that the first message is triggered includes: generating the first message.
As an embodiment, the means that the first message is triggered includes: setting the content in the first message.
As an embodiment, the means that the first message is triggered includes: a request is received to resume the suspended RRC connection from a higher layer, including the protocol layer above the RRC, or from the AS.
As an embodiment, the first message is triggered by an RB (Radio Bearer) associated to the SDT other than the DRB.
In one embodiment, the first message comprises a first RRC message.
As an embodiment, the first RRC message is used to request recovery of an RRC connection.
As an embodiment, the first RRC message is used to indicate non-SDT (non-SDT) data.
In one embodiment, the first RRC message includes an RRCResumeRequest.
For one embodiment, the first RRC message includes RRCResumeRequest 1.
For one embodiment, the first RRC message includes RRCResumeRequest 2.
As an embodiment, the name of the first RRC message includes at least one of RRC, SDT, Inactive, Small, Data, non, Resume, or Request, and the first RRC message is not rrcresemequest or rrcresemequest 1.
As an embodiment, the first RRC message includes a Field (Field) in one RRC message, the Field indicating a reason for requesting recovery of the RRC connection.
As a sub-embodiment of this embodiment, only the one field is included in the first RRC message.
As a sub-embodiment of this embodiment, the name of the domain includes ResumeCalase.
As a sub-embodiment of this embodiment, the name of the domain includes at least one of Resume, Cause, SDT, Inactive, Small, Data, or non.
As a sub-embodiment of this embodiment, the value of the one domain includes one of emergency or highPriorityAccess or mt-Access or mo-signaling or mo-Data or mo-VoiceCall or mo-VideoCall or mo-SMS or rna-Update or mps-PriorityAccess or mcs-PriorityAccess.
As a sub-embodiment of this embodiment, the one domain occupies K2 bits, the K2 being a positive integer.
As an additional embodiment of this sub-embodiment, said K2 is equal to 4.
As a sub-embodiment of this sub-embodiment, said K2 is smaller than 4.
As an embodiment, the first RRC message includes a field in one RRC message, and the field indicates a user identity.
As a sub-embodiment of this embodiment, the name of the one domain includes resume identity.
As a sub-embodiment of this embodiment, the Value of the one field includes ShortI-RNTI-Value.
As a sub-embodiment of this embodiment, the Value of the one field includes I-RNTI-Value.
As a sub-embodiment of this embodiment, the one field is set to the given reference RNTI.
As a sub-embodiment of this embodiment, the name of the one domain includes the C-RNTI.
As an additional embodiment of this sub-embodiment, the C-RNTI is set to the given reference RNTI.
As a subsidiary embodiment of this sub-embodiment, the C-RNTI is set to a C-RNTI stored in a UE Context (Context).
As an additional embodiment of this sub-embodiment, the C-RNTI is set to the current C-RNTI of the UE.
As a sub-embodiment of this embodiment, the name of the one domain comprises the given reference RNTI.
As an embodiment, a Signaling Radio Bearer (SRB) of the first RRC message includes at least one of SRB0, or SRB1, or SRB2, or SRB3, or SL-SRB 3.
As an embodiment, the Logical Channel (Logical Channel) corresponding to the first RRC message includes at least one of a DCCH (Common Control Channel), or a BCCH (Broadcast Control Channel), or a CCCH, or a SBCCH (Sidelink Broadcast Control Channel), or an SCCH (Sidelink Control Channel).
As an embodiment, the first RRC message is generated at an RRC layer and delivered to a lower layer of the RRC layer, and the first message is sent at a MAC layer, where the first message includes at least some bits in a MAC SDU corresponding to the first RRC message.
As a sub-embodiment of this embodiment, the first message includes an SDU to which the first RRC message is delivered to a MAC layer.
As a sub-embodiment of this embodiment, the lower layer of the RRC layer includes at least one of a MAC layer, or an RLC layer or a PDCP layer.
As a sub-embodiment of this embodiment, the lower layer of the RRC layer is a MAC layer.
As a sub-embodiment of this embodiment, the act of sending the first message at a MAC layer comprises: the MAC layer delivers the first message to a lower layer of the MAC layer.
As a sub-embodiment of this embodiment, the lower layer of the MAC layer includes a PHY layer.
As a sub-embodiment of this embodiment, the phrase that the first message includes at least some bits of the MAC SDU corresponding to the first RRC message includes: the first message includes a MAC SDU corresponding to the first RRC message.
As a sub-embodiment of this embodiment, the phrase that the first message includes at least part of bits in a MAC SDU corresponding to the first RRC message includes: the first message includes a portion of a MAC SDU to which the first RRC message corresponds.
As an embodiment, the first RRC message corresponds to one DCCH SDU.
As an embodiment, the first RRC message corresponds to a CCCH SDU.
As an embodiment, the RRC layer sends an indication to a lower layer of the RRC layer, and triggers a MAC CE (Control Element) in response to receiving the indication, where the first message includes the MAC CE, and the lower layer includes the MAC layer.
As a sub-embodiment of this embodiment, the one MAC CE is used to request recovery of the RRC connection.
As a sub-embodiment of this embodiment, the one MAC CE is used to indicate non-SDT data.
For one embodiment, the first message is transmitted over an air interface.
For one embodiment, the first message is sent through an antenna port.
As an embodiment, the first message is transmitted through higher layer signaling.
As an embodiment, the first message is transmitted by higher layer signaling.
For one embodiment, the first message includes an Uplink (UL) signal.
As an embodiment, the first message includes a Sidelink (SL) signal.
As one embodiment, the first message is used to trigger the second message.
As an embodiment, the first message is a first transmission.
As an embodiment, the first message is a retransmission.
For one embodiment, the number of times the first message is resent is not greater than N1, the N1 is a positive integer, and the N1 is not greater than 2048.
As an embodiment, the first Message comprises Message a (Message a, MsgA).
For one embodiment, the first Message comprises Message 3(Message 3, Msg 3).
For one embodiment, the first message comprises an RRC layer message.
For one embodiment, the first message comprises a MAC layer message.
As an embodiment, the first message includes one MAC PDU (Protocol Data Unit).
As an embodiment, the first message comprises a part of one MAC PDU.
As an embodiment, the first message includes one MAC SDU (Service Data Unit).
For an embodiment, the first message includes a CCCH SDU.
As an embodiment, the first message includes a DCCH SDU.
As an embodiment, the first message includes one MAC CE.
For one embodiment, the first message includes a MAC subheader (subheader).
As an embodiment, the first message includes one CCCH (Common Control Channel) SDU and does not include the C-RNTI MAC CE.
As an embodiment, said first message comprises a DCCH SDU and does not comprise said C-RNTI MAC CE.
For one embodiment, the first message includes C-RNTI MAC CE.
For one embodiment, the C-RNTI MAC CE refers to section 6.1.3.2 in 3GPP TS 38.321.
As an embodiment, the first message includes the MAC subheaders corresponding to the C-RNTI MAC CE and the C-RNTI MAC CE, and the MAC subheader corresponding to the C-RNTI MAC CE includes an LCID (Logical Channel Identity) field, and the LCID field is set to 58.
For one embodiment, the first message includes a CCCH SDU and the C-RNTI MAC CE.
As an embodiment, the first message includes one DCCH SDU and the C-RNTI MAC CE.
For one embodiment, the first message includes the C-RNTI MAC CE and does not include a CCCH SDU.
As an embodiment, the first message includes the C-RNTI MAC CE and does not include a DCCH SDU.
In one embodiment, the first message does not include a CCCH SDU.
As an embodiment, the first message does not include DCCH SDU.
For one embodiment, the first message does not include C-RNTI MAC CE.
For one embodiment, the first message does not include a MAC subheader with LCID field set to 58.
For one embodiment, the LCID index of C-RNTI MAC CE is equal to 58.
For one embodiment, the C-RNTI MAC CE includes a C-RNTI field that includes the C-RNTI of a MAC entity.
As an embodiment, the first message does not include the one CCCH SDU and the one DCCH SDU at the same time.
In an embodiment, all of the first RRC message is included in the one CCCH SDU.
As an embodiment, the one CCCH SDU includes a portion in the first RRC message.
As an embodiment, all of the first RRC message is included in the one DCCH SDU.
As an embodiment, the one DCCH SDU includes a portion in the first RRC message.
As an example, the monitoring means comprises a search.
As an example, the monitoring means includes monitoring (monitor).
As an example, the monitoring means passing a CRC (Cyclic Redundancy Check) Check.
As one embodiment, the behavior monitoring second message includes: determining whether the second message is present through energy monitoring.
As one embodiment, the behavior monitoring second message includes: determining whether the second message is present by coherent detection.
As one embodiment, the behavior monitoring second message includes: determining whether the second message is present by wideband detection.
As one embodiment, the behavior monitoring second message includes: determining whether the second message exists through correlation detection.
As one embodiment, the behavior monitoring second message includes: determining whether the second message exists through synchronous detection.
As one embodiment, the behavior monitoring second message includes: determining whether the second message is present by waveform detection.
As one embodiment, the behavior monitoring second message includes: determining whether the second message is present by maximum likelihood detection.
As one embodiment, the behavior monitoring second message includes: monitoring a Physical Downlink Control Channel (PDCCH) to determine whether there is a PDCCH transmission scrambled by the first RNTI, the PDCCH transmission including a Downlink Control Information (DCI).
As a sub-embodiment of this embodiment, the first RNTI comprises a C-RNTI.
As a sub-embodiment of this embodiment, the first RNTI comprises the given reference RNTI.
As a sub-embodiment of this embodiment, the first RNTI comprises a TEMPORARY _ C-RNTI.
As a sub-embodiment of this embodiment, the first RNTI comprises an MSGB-RNTI.
As a sub-embodiment of this embodiment, the first RNTI comprises an RA-RNTI.
For one embodiment, the second message is transmitted over an air interface.
For one embodiment, the second message is sent through an antenna port.
As an embodiment, the second message is transmitted by higher layer signaling.
As an embodiment, the second message is transmitted by higher layer signaling.
For one embodiment, the second message includes a Downlink (DL) signal.
As an embodiment, the second message includes a Sidelink (SL) signal.
For one embodiment, the second Message comprises Message 4(Message 4, Msg 4).
As an embodiment, the second Message comprises Message B (Message B, MsgB).
For one embodiment, the second message comprises an RRC message.
For one embodiment, the second message comprises one RRC message, and the one RRC message comprises a rrcreelease message.
For one embodiment, the second message comprises one RRC message, and the one RRC message comprises a rrcresum message.
In one embodiment, the second message comprises one RRC message, and the one RRC message comprises a RRCSetup message.
For one embodiment, the second message comprises one RRC message, and the one RRC message comprises a RRCReject message.
For one embodiment, the second message comprises a MAC layer message.
As an embodiment, the second message includes one MAC PDU.
As an embodiment, the second message includes one MAC PDU, and the one MAC PDU includes a UE context Resolution Identity field.
As an embodiment, the second message does not include a UE context Resolution Identity field.
As an embodiment, the second message comprises a part of one MAC PDU.
As an embodiment, the second message includes one MAC SDU.
For an embodiment, the second message includes a CCCH SDU.
As an embodiment, the second message comprises a DCCH SDU.
As an embodiment, the second message includes a MAC CE.
As an embodiment, the second message includes one MAC CE, and the one MAC CE is a UE context Resolution Identity MAC CE.
As an embodiment, the second message does not include a UE context Resolution Identity MAC CE.
For one embodiment, the second message includes a MAC subheader.
For one embodiment, the second message includes a physical layer information.
In one embodiment, the second message includes a PDCCH.
As an embodiment, the second message includes a first DCI, the first DCI being identified by a first RNTI.
As an embodiment, the phrase that the first message and the second message belong to the same random access procedure includes: and monitoring the second message at the beginning of the first symbol when the first message is sent out or the first symbol is sent out again.
As an embodiment, the phrase that the first message and the second message belong to the same random access procedure includes: the first message and the second message are two different messages in the same random access procedure.
As an embodiment, the phrase that the first message and the second message belong to the same random access procedure includes: the second message is a response to the first message.
As an embodiment, the phrase that the first message and the second message belong to the same random access procedure includes: the first message triggers the second message.
As an embodiment, the phrase that the first message and the second message belong to the same random access procedure includes: the PREAMBLE _ transition _ COUNTER when the first message is sent is the same as PREAMBLE _ transition _ COUNTER when the second message starts to be monitored.
As an embodiment, the same random access procedure includes the same scheduling procedure.
As an embodiment, the same random access procedure refers to a dynamic scheduling procedure.
As an embodiment, the same random access procedure refers to a one-time configuration scheduling procedure.
As an embodiment, the same random access procedure includes one uplink transmission and a downlink acknowledgement for the one uplink transmission.
As an embodiment, the monitoring for the second message is started at a first symbol after the first message is transmitted, where the second message includes the first DCI.
As an embodiment, the second message is monitored at the first symbol after the retransmission of the first message is finished, and the second message includes the first DCI.
As an embodiment, the determining, by the behavior according to whether the second message is detected, whether the same random access procedure is completed includes: whether the same random access procedure is completed or not is related to whether the second message is detected or not.
As an embodiment, the determining, by the behavior according to whether the second message is detected, whether the same random access procedure is completed includes: whether the second message is detected is used to determine whether the same random access procedure is completed.
As an embodiment, the determining, by the behavior according to whether the second message is detected, whether the same random access procedure is completed includes: when the second message is detected in the first time unit set, it is determined that the same random access procedure is successfully completed.
As an embodiment, the determining, by the behavior according to whether the second message is detected, whether the same random access procedure is completed includes: and when the second message is not detected in the first time unit set, judging that the same random access process is not completed.
As one embodiment, the phrase the second message detected in the first set of time units comprises: the second message is a response to the first message.
As one embodiment, the phrase the second message detected in the first set of time units comprises: and monitoring the PDCCH when the ra-contentionResolutionTimer corresponding to one time unit in the first time unit set runs.
As one embodiment, the phrase the second message detected in the first set of time units comprises: a notification (notification) of receipt of a PDCCH transmission (transmission) from a lower layer is received in a first set of time units.
As one embodiment, the phrase the second message detected in the first set of time units comprises: receiving a notification of receipt of a PDCCH transmission from a lower layer in a first set of time units, and the PDCCH transmission is sent to the first RNTI.
As an embodiment, the act of determining that the same random access procedure is successfully completed includes: the same random access procedure is considered to be successfully completed.
As an embodiment, the act of determining that the same random access procedure is successfully completed includes: and considering that the same random access process is successfully completed, wherein the same random access process comprises the first message and the second message.
As an embodiment, the act of determining that the same random access procedure is successfully completed includes: ceasing to monitor the second message in the first set of time units.
As an embodiment, the behavior determining that the same random access procedure is successfully completed includes: the contention resolution is considered complete.
As an embodiment, the act of determining that the same random access procedure is successfully completed includes: stopping the ra-ContentionResolutionTimer, the ra-ContentionResolutionTimer being one time unit of the first set of time units.
As an embodiment, the act of determining that the same random access procedure is successfully completed includes: TEMPORARY _ C-RNTI is discarded.
As a sub-embodiment of this embodiment, the TEMPORARY _ C-RNTI is configured in the same random access procedure.
As a sub-embodiment of this embodiment, one RAR (Random Access Response) in the same Random Access procedure includes the TEMPORARY _ C-RNTI.
As a sub-embodiment of this embodiment, a Message 2(Message 2, Msg2) in the same random access procedure includes the TEMPORARY _ C-RNTI.
As one embodiment, the phrase that the second message was not detected in the first set of time units comprises: the second message is not a response to the first message.
As one embodiment, the phrase that the second message was not detected in the first set of time units comprises: the ra-contentresourcesolutiontimer corresponding to one time unit of the first set of time units associated with the first message expires.
As one embodiment, the phrase that the second message was not detected in the first set of time units comprises: receiving a notification of receipt of a PDCCH transmission from a lower layer in a first set of time units, and the PDCCH transmission is sent to one RNTI other than the first RNTI.
As an embodiment, the behavior determining that the same random access procedure is not completed includes: contention resolution was not considered successful.
As an embodiment, the behavior determining that the same random access procedure is not completed includes: contention resolution is considered unsuccessful and successfully decoded MAC PDUs are discarded.
As an embodiment, the behavior determining that the same random access procedure is not completed includes: the first counter is incremented by 1.
As an embodiment, the behavior determining that the same random access procedure is not completed includes: and if the first counter is smaller than the first value, retransmitting a random access Preamble (Preamble).
As an embodiment, the behavior determining that the same random access procedure is not completed includes: if the first counter equals a first value, a random access problem is indicated to upper layers.
As an embodiment, the behavior determining that the same random access procedure is not completed includes: selecting a random access preamble before the act of re-transmitting the random access preamble.
As an embodiment, the first counter is used to record the number of transmissions of the random access preamble, and the first value is configurable.
As an embodiment, the first COUNTER is PREAMBLE _ transition _ COUNTER, and the first expiration value is equal to the sum of PREAMBLE transmax plus 1.
As an embodiment, the upper layer is an RRC layer.
As an embodiment, the starting time of the first time unit set includes a first symbol after the first message is sent.
As an embodiment, the starting time of the first set of time units includes a first symbol after one HARQ retransmission of the first message is finished being transmitted.
For one embodiment, the first set of time units comprises a time interval.
For one embodiment, the first set of time units includes a timer.
For one embodiment, the first set of time units includes a ra-ContentionResolutionTimer.
For one embodiment, the first set of time units includes one or more ra-contentionresolutiontimers.
As an embodiment, the first time unit set includes at least one timeslot, and the timeslot includes at least one of a solt, a subframe, a Radio Frame, a Frame, an Orthogonal Frequency Division Multiplexing (OFDM) symbol, or a Single Carrier Frequency Division Multiple Access (SC-FDMA) symbol. .
As an embodiment, the number of time units comprised in the first set of time units is configurable.
As an embodiment, the duration of each time unit in the first set of time units is the same.
As an embodiment, all time units in the first set of time units are consecutive.
As an embodiment, the duration of each time unit in the first set of time units is 1 millisecond.
As an embodiment, the duration of each time unit in the first set of time units is 1 timeslot.
As one embodiment, the duration of the first set of time units does not exceed 40 milliseconds.
As an embodiment, one time unit in the first time unit set is a time interval in which the ra-ContentionResolutionTimer runs.
As an embodiment, one time unit of the first set of time units comprises a time interval from a time at which the ra-ContentionResolutionTimer is started or restarted to a first time; a time interval between the first time and the time at which the ra-ContentionResolutionTimer is started or restarted is equal to or greater than an outdated value of the ra-ContentionResolutionTimer.
As an embodiment, the first DCI is transmitted through a PDCCH.
As one embodiment, the first DCI includes one DCI or a plurality of DCIs.
As one embodiment, the phrase that the second message includes the first DCI includes: the first DCI is one of the second messages.
As one embodiment, the phrase that the second message includes the first DCI includes: the second message includes at least the first DCI.
As an embodiment, the phrase that the first DCI is identified by a first RNTI includes: the first RNTI is used for a scrambling code of the first DCI.
As an embodiment, the phrase that the first DCI is identified by a first RNTI includes: the first RNTI is used to scramble the CRC of the first DCI.
As an embodiment, the phrase that the first DCI is identified by a first RNTI includes: the first RNTI is used to generate a first scrambling sequence used to scramble information bits in the first DCI.
As an embodiment, the phrase that the first DCI is identified by a first RNTI includes: the first RNTI is used to generate a CRC of the first DCI.
As an embodiment, the phrase that the first DCI is identified by a first RNTI includes: the first RNTI is used to determine PDCCH candidates occupied by the first DCI.
As an embodiment, the phrase that the first DCI is identified by a first RNTI includes: the first RNTI is used for determining the time-frequency resources occupied by the first DCI.
As an embodiment, the first RNTI includes a C-RNTI.
As an embodiment, the first RNTI comprises a TEMPORARY _ C-RNTI.
As an embodiment, the first RNTI includes a CS-RNTI (Configured Scheduling RNTI).
As an embodiment, the first RNTI includes CG C-RNTI (Configured Grant C-RNTI).
As an embodiment, the first RNTI includes a PUR C-RNTI (preconfigurated Uplink Resource C-RNTI, Preconfigured Uplink Resource C-RNTI).
As an embodiment, the first RNTI includes a CS C-RNTI (Configured Scheduling C-RNTI).
As an embodiment, the first RNTI includes the given reference RNTI.
As an embodiment, the first RNTI occupies 16 bits.
As an embodiment, the first RNTI includes one integer.
As one embodiment, the first RNTI is for a first serving cell.
As an embodiment, the first RNTI is assigned by a base station.
As an embodiment, the first RNTI is calculated by the UE.
As an embodiment, the first RNTI is preconfigured.
As an embodiment, the default value is not configurable.
As an embodiment, the default value is independent of the first message.
As an embodiment, the default value is pre-configured.
As an embodiment, the default value is predefined.
As an embodiment, the default value indicates a UE Contention Resolution Identity (UE Contention Resolution Identity).
As an embodiment, the default value is used to indicate that the UE contention resolution is successful.
As an embodiment, the default value is equal to an index of an LCID of a contention resolution identity of the UE.
As one embodiment, the default value is indexed to an LCID.
As one embodiment, the default value indicates a value of an LCID.
As an example, the default value is an Index (Index).
As an embodiment, the default value comprises a value of Codepoint or Index in section 6.2.1 in 3GPP TS 38.321.
As an embodiment, the default value is a positive integer.
As one embodiment, the default value is a positive integer no greater than 64.
As an example, the default value is 62.
As an embodiment, the first MAC field belongs to a MAC Subheader (Subheader).
For one embodiment, the first MAC field includes a MAC subheader.
As an embodiment, the first MAC field is a MAC subheader.
As an embodiment, the first MAC field is a field in one MAC PDU.
For one embodiment, the first MAC field is one of MAC sub-pdus (sub-pdus).
For one embodiment, the first MAC field is a field in a MAC subheader (subheader).
As a sub-embodiment of this embodiment, the MAC sub-header includes the first MAC field, or an R field, or at least one of an F field and an L field, and the R field, the F field, and the L field refer to section 6.1.2 in 3GPP TS 38.321.
As a sub-embodiment of this embodiment, the one MAC subheader includes at least one byte.
As a sub-embodiment of this embodiment, the MAC sub-header includes 1 byte, or 2 bytes, or 3 bytes, or 4 bytes, or 5 bytes, or 6 bytes.
As a sub-embodiment of this embodiment, the one MAC subheader comprises a MAC subheader of MsgB.
As a sub-embodiment of this embodiment, the MAC sub-header includes at least one of the first MAC field, the E field, the T1 field, the T2 field, the S field, the R field, the BI field, or the RAPID field, and the E field, the T1 field, the T2 field, the S field, the R field, the BI field, and the RAPID field refer to section 6.2.2a in 3GPP TS 38.321.
As an embodiment, the first MAC domain is one domain in MsgB.
As a sub-embodiment of this embodiment, the MsgB comprises successRAR.
As a sub-embodiment of this embodiment, the first MAC field is a UE context Resolution Identity field.
As a sub-embodiment of this embodiment, the first MAC field is a UE context Resolution Identity field, and the UE context Resolution Identity field includes an LCID or an UL CCCH SDU.
As a sub-embodiment of this embodiment, the first MAC field is a UE context Resolution Identity field, and the UE context Resolution Identity field includes a UL DCCH SDU.
As an embodiment, the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs.
As an embodiment, the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs.
As an embodiment, the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: whether the second message includes a first MAC field equal to a default value is related to at least the first RNTI.
As an embodiment, the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: whether the second message includes a first MAC field equal to a default value is related to the first RNTI.
As an embodiment, the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: at least the name of the first RNTI or the value of the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value.
As an embodiment, the first MAC field equal to the default value is: LCID equals LCID field of 62.
As an embodiment, the first MAC domain equal to the default value is: LCID is equal to LCID field of the default value.
As an embodiment, the first MAC field equal to the default value is: the first MAC field is one of one MAC PDU, the first MAC field being set to the default value.
As an embodiment, the first MAC domain equal to the default value is: the value in the first MAC domain is set to the default value.
As an embodiment, the first MAC field equal to the default value is: the first MAC domain
As an embodiment, the phrase the first RNTI belonging to a first set of reference RNTIs includes: the first RNTI is one RNTI in the first reference RNTI.
As an embodiment, the phrase the first RNTI belonging to a first set of reference RNTIs includes: the first set of reference RNTIs includes the first RNTI.
As an embodiment, the phrase the first RNTI belonging to a first set of reference RNTIs includes: the name of the first RNTI is the same as the name of one RNTI in the first reference RNTI set.
As an embodiment, the phrase the first RNTI belonging to a first set of reference RNTIs includes: the value of the first RNTI is the same as the value of one RNTI in the first reference RNTI set.
As an embodiment, the phrase the first RNTI belonging to a first set of reference RNTIs includes: the name of the first RNTI is the same as the name of one RNTI in the first reference RNTI set, and the value of the first RNTI is the same as the value of one RNTI in the first reference RNTI set.
As an embodiment, the phrase the first RNTI belonging to a first set of reference RNTIs includes: the first RNTI is the same as one RNTI in the first reference RNTI set.
As an embodiment, the phrase that the first RNTI does not belong to a first set of reference RNTIs includes: the first reference set of RNTIs does not include the first RNTI.
As an embodiment, the phrase that the first RNTI does not belong to a first set of reference RNTIs includes: the name of the first RNTI is different from the name of any RNTI in the first reference RNTI set.
As an embodiment, the phrase that the first RNTI does not belong to a first set of reference RNTIs includes: the value of the first RNTI is different from the value of any RNTI in the first reference RNTI set.
As an embodiment, the phrase that the first RNTI does not belong to a first set of reference RNTIs includes: the name of the first RNTI is different from the name of any RNTI in the first reference RNTI set, and the value of the first RNTI is different from the value of any RNTI in the first reference RNTI set.
As an embodiment, the phrase the first RNTI belonging to a first set of reference RNTIs includes: any RNTI in the first RNTI and the first reference RNTI set is different.
As an embodiment, the C-RNTI is defined with reference to 3GPP TS 38.300 or 3GPP TS 36.300.
As an embodiment, the C-RNTI is defined with reference to 3GPP TS 38.331 or 3GPP TS 36.331.
As an embodiment, the C-RNTI is defined with reference to 3GPP TS38.321 or 3GPP TS 36.321.
As an embodiment, the RNTI includes a user identity.
As an embodiment, the RNTI includes a Radio Network Temporary identity (Radio Network Temporary identity).
As an embodiment, the first set of reference RNTIs comprises at least one RNTI.
As an embodiment, the first set of reference RNTIs includes K1 RNTIs, the C-RNTI is one RNTI of the K1 RNTIs, and the K1 is a positive integer.
As a sub-embodiment of this embodiment, said K1 is equal to 1.
As a sub-embodiment of this embodiment, the K1 is greater than 1.
As a sub-embodiment of this embodiment, said K1 is equal to 2.
As a sub-embodiment of this embodiment, the K1 is not greater than 8.
As a sub-embodiment of this embodiment, the K1 is not greater than 64.
As an embodiment, the phrase the first set of reference RNTIs comprises at least C-RNTIs comprising: only the C-RNTI is included in the first set of reference RNTIs.
As a sub-embodiment of this embodiment, said K1 is equal to 1.
As a sub-embodiment of this embodiment, the C-RNTI is included in the first set of reference RNTIs, and the given reference RNTI in this application is not included in the first set of reference RNTIs.
As a sub-embodiment of this embodiment, the phrase that the first RNTI belongs to a first set of reference RNTIs includes: the first RNTI is a C-RNTI.
As a sub-embodiment of this embodiment, the phrase that the first RNTI belongs to a first set of reference RNTIs includes: the value of the first RNTI is equal to the value of the C-RNTI.
As an embodiment, the phrase the first set of reference RNTIs comprises at least C-RNTIs comprising: the first reference RNTI set comprises the C-RNTI and at least one RNTI except the C-RNTI.
As an embodiment, the phrase the first set of reference RNTIs comprises at least C-RNTIs comprising: the first reference RNTI set comprises C-RNTI and the given reference RNTI in the application.
As one embodiment, the phrase the second message not including the first MAC field equal to the default value includes: there is not one of the first MAC fields in the second message equal to the default value.
As one embodiment, the phrase the second message not including the first MAC field equal to the default value includes: the first MAC field is present in the second message, and a value of the first MAC field is not equal to the default value.
As one embodiment, the phrase the second message not including the first MAC field equal to the default value includes: the first MAC domain is absent in the second message.
As one embodiment, the phrase the second message not including the first MAC field equal to the default value includes: the first MAC domain is absent from the second message, the first MAC domain being identified by the default value.
As an embodiment, when the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value and does not include one MAC CE indexed to the default value.
As an embodiment, when the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value and does not include one MAC CE having an LCID index number equal to the default value.
As one embodiment, the phrase the second message including the first MAC field equal to the default value includes: a first MAC field exists in the second message, the value of the first MAC field being equal to the default value.
As one embodiment, the phrase the second message including the first MAC field equal to the default value includes: a first MAC field exists in the second message, the first MAC field being set to the default value.
As one embodiment, the phrase the second message including the first MAC field equal to the default value includes: and a first MAC domain exists in the second message, and the first MAC domain carries the default value.
As an embodiment, the second message only includes the first MAC field and the first DCI equal to the default value when the first RNTI does not belong to a first set of reference RNTIs.
As an embodiment, when the first RNTI does not belong to a first set of reference RNTIs, the second message only includes the MAC subheader to which the first MAC domain belongs and the first DCI equal to the default value.
As an embodiment, when the first RNTI does not belong to the first set of reference RNTIs, the second message includes a MAC subheader to which the first MAC field belongs equal to the default value, but does not include one MAC CE indicated by the default value.
As an embodiment, when the first RNTI does not belong to the first reference RNTI set, the second message includes a MAC subheader to which the first MAC field equal to the default value belongs and padding indicated by the default value.
As an embodiment, when the first RNTI does not belong to the first reference RNTI set, the second message includes a MAC subheader to which the first MAC field equal to the default value belongs and padding indicated by the default value.
As an embodiment, when the first RNTI does not belong to a first set of reference RNTIs, the second message includes a MAC subheader and padding to which the first MAC domain equal to the default value belongs.
As an embodiment, the indication by the first DCI of the scheduling information of the physical layer data channel occupied by the first MAC domain with the phrase equal to the default value comprises: and determining the scheduling information of the physical layer data channel occupied by the first MAC domain equal to the default value according to the first DCI.
As an embodiment, the indication by the first DCI of the scheduling information of the physical layer data channel occupied by the first MAC domain with the phrase equal to the default value comprises: determining the first MAC field equal to the default value according to the scheduling information of the physical layer data channel in the first DCI.
As an embodiment, the Physical layer data Channel includes a PDSCH (Physical Downlink Shared Channel).
As an embodiment, the physical layer data channel includes sPDSCH (short PDSCH).
As an embodiment, the physical layer data channel includes NPDSCH (Narrowband PDSCH).
As an embodiment, the indicating, by the first DCI, the scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value comprises: the first DCI includes scheduling information for transmission of a physical layer channel of the first MAC field equal to the default value.
As one embodiment, the first DCI explicitly indicates scheduling information for transmitting a physical layer channel of the first MAC domain equal to the default value.
As one embodiment, the first DCI implicitly indicates scheduling information for transmitting a physical layer channel of the first MAC domain equal to the default value.
As an embodiment, the scheduling information includes occupied time domain resources.
As an embodiment, the scheduling information includes occupied frequency domain resources.
As an embodiment, the scheduling information includes an Antenna Port (S)).
As one embodiment, the Antenna Port is determined according to one field in the first signaling, the one field including an Antenna Port field (Antenna Port(s) filtered).
As an embodiment, the scheduling information includes at least one of MCS (Modulation and Coding Scheme, Modulation and Coding format), RV (Redundancy Version), NDI (New Data Indicator), HARQ (Hybrid Automatic Repeat Request) Process number (Process Identity).
As an embodiment, the scheduling information includes at least one of a time domain position, a frequency domain position, an MCS, an RV, an NDI, or an HARQ process number.
As a sub-embodiment of this embodiment, the phrase that the scheduling information includes at least one of a time domain position, a frequency domain position, an MCS, an RV, an NDI, or an HARQ process number includes: the scheduling information is used to determine at least one of the time domain location, the frequency domain location, the MCS, the RV, the NDI, or the HARQ process number.
As a sub-embodiment of this embodiment, the phrase that the scheduling information includes at least one of a time domain position, a frequency domain position, an MCS, an RV, an NDI, or an HARQ process number includes: and determining at least one of the time domain position, the frequency domain position, the MCS, the RV, the NDI or the HARQ process number according to the scheduling information.
As a sub-embodiment of this embodiment, the phrase that the scheduling information includes at least one of a time domain position, a frequency domain position, an MCS, an RV, an NDI, or an HARQ process number includes: the scheduling information includes one or more of the time domain position, the frequency domain position, the MCS, the RV, the NDI, or the HARQ process number.
As an embodiment, at least one of the time domain position, the frequency domain position, the MCS, the RV, the NDI, or the HARQ process number is determined according to one or more fields in the first DCI.
As an embodiment, at least one of the time domain position, the frequency domain position, the MCS, the RV, the NDI, or the HARQ process number is directly or indirectly obtained according to one or more fields in the first DCI.
As an embodiment, the physical layer channel includes a downlink physical channel.
As an embodiment, the physical layer channel includes a Sidelink (SL) physical channel.
As an embodiment, the Physical layer channel includes a PDSCH (Physical downlink shared channel).
As an embodiment, the Physical layer channel includes a psch (Physical Sidelink shared channel).
As an embodiment, the time domain location comprises a Resource allocation in time domain in the time domain.
As one embodiment, the time domain location includes a slot assignment.
As one embodiment, the time domain position includes a symbol allocation.
As an example, the time domain position is calculated from section 5.1.2.1 in TS 38.214.
As an embodiment, the Time domain position is calculated according to one domain in the first signaling, where the one domain includes a Time domain resource assignment domain.
As an embodiment, the Time domain position is determined according to a Time domain resource assignment field.
As an embodiment, the time domain location is determined according to a PDSCH-timedomainresource allocation field.
For one embodiment, the time domain location is determined from table 5.1.2.1.1-1 in TS 38.214.
As an embodiment, one field in the first signaling indicates an m value, which is used to determine the time domain position, indicating a row index (row index) m +1 of table 5.1.2.1.1-1 in TS 38.214.
As one embodiment, the Time domain resource assignment field indicates the value of m.
As an embodiment, the row index m +1 is used to determine at least one of a slot offset (slot offset) K0, or a Start and Length Indicator (SLIV), or a direct start symbol S, or an allocation length L, or a PDSCH mapping type.
As an embodiment, the frequency domain location comprises a Resource allocation in frequency domain (Resource allocation in frequency domain) on the frequency domain.
As an example, the frequency domain position is calculated from section 5.1.2.2.2 in TS 38.214.
As an embodiment, the Frequency domain position is calculated according to a domain in the first signaling, where the domain includes a Frequency domain resource assignment domain.
As an embodiment, the frequency domain position is determined according to a Downlink resource allocation (Downlink resource allocation) mode 0(type 0).
As an embodiment, the frequency domain position is determined according to Downlink resource allocation (Downlink resource allocation) mode 1(type 1).
As an embodiment, the frequency domain position is determined by a bitmap (bitmap), where the bitmap indicates Resource Block Groups (RBGs), and one Resource Block group includes a group of continuous virtual Resource blocks (virtual Resource blocks).
As one embodiment, one field in the first signaling indicates a Resource Indication Value (RIV) indicating a start of a virtual Resource Block (RB) start ) And length (L) in units of resource blocks allocated consecutively RBs )。
As one embodiment, the Frequency domain resource assignment field indicates the RIV.
As an embodiment, the MCS is determined according to one field in the first signaling, the one field including a modulation and coding scheme field (IMCS).
As one embodiment, the MCS includes at least one of a modulation order (Qm) or a target code rate (R).
As an embodiment, the NDI is determined according to one field in the first signaling, the one field comprising an NDI field (NDI field).
As an embodiment, the HARQ process number includes a HARQ process number.
As an embodiment, the HARQ process number is determined according to one field in the first signaling, and the one field includes a HARQ process number field (HARQ process number field).
As one embodiment, the RV is determined according to one field in the first signaling, the one field including a redundancy version field (RV).
As an embodiment, the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs.
As an embodiment, the second message comprises the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs.
As an embodiment, the first node sends a first message; monitoring the second message; the first message and the second message belong to the same random access process; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; wherein the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; the first RNTI does not belong to a first set of reference RNTIs, the second message comprises the first MAC field equal to the default value; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an embodiment, the first node sends a first message; monitoring the second message; the first message and the second message belong to the same random access process; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; wherein the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an embodiment, the first node sends a first message; monitoring the second message; the first message and the second message belong to the same random access process; when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; wherein the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; the first RNTI does not belong to a first set of reference RNTIs, the second message comprises the first MAC field equal to the default value; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an embodiment, the first node sends a first message; monitoring the second message; the first message and the second message belong to the same random access process; when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; wherein the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
Example 2
Embodiment 2 illustrates a schematic diagram of a network architecture according to an embodiment of the present application, as shown in fig. 2. Fig. 2 illustrates a diagram of a network architecture 200 of a 5G NR (New Radio, New air interface), LTE (Long-Term Evolution ), and LTE-a (Long-Term Evolution Advanced) system. The 5G NR or LTE network architecture 200 may be referred to as a 5GS (5G System)/EPS (Evolved Packet System) 200 or some other suitable terminology. The 5GS/EPS 200 may include one or more UEs (User Equipment) 201, NG-RANs (next generation radio access networks) 202, 5 GCs (5G Core networks )/EPCs (Evolved Packet cores) 210, HSS (Home Subscriber Server)/UDMs (Unified Data Management) 220, and internet services 230. The 5GS/EPS may interconnect with other access networks, but these entities/interfaces are not shown for simplicity. As shown, the 5GS/EPS provides packet switched services, however those skilled in the art will readily appreciate that the various concepts presented throughout this application may be extended to networks providing circuit switched services or other cellular networks. The NG-RAN includes NR node b (gNB)203 and other gnbs 204. The gNB203 provides user and control plane protocol termination towards the UE 201. The gnbs 203 may be connected to other gnbs 204 via an Xn interface (e.g., backhaul). The gNB203 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a Basic Service Set (BSS), an Extended Service Set (ESS), a TRP (transmit receive node), or some other suitable terminology. The gNB203 provides the UE201 with an access point to the 5GC/EPC 210. Examples of the UE201 include a cellular phone, a smart phone, a Session Initiation Protocol (SIP) phone, a laptop, a Personal Digital Assistant (PDA), a satellite radio, non-terrestrial base station communications, satellite mobile communications, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, a drone, an aircraft, a narrowband internet of things device, a machine type communication device, a terrestrial vehicle, an automobile, a wearable device, or any other similar functioning device. Those skilled in the art may also refer to UE201 as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless communication device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. The gNB203 is connected to the 5GC/EPC210 through an S1/NG interface. The 5GC/EPC210 includes MME (Mobility Management Entity)/AMF (Authentication Management domain)/SMF (Session Management Function) 211, other MME/AMF/SMF214, S-GW (serving Gateway)/UPF (User Plane Function) 212, and P-GW (Packet data Network Gateway)/UPF 213. The MME/AMF/SMF211 is a control node that handles signaling between the UE201 and the 5GC/EPC 210. In general, the MME/AMF/SMF211 provides bearer and connection management. All user IP (Internet protocol) packets are transported through the S-GW/UPF212, and the S-GW/UPF212 itself is connected to the P-GW/UPF 213. The P-GW provides UE IP address assignment as well as other functions. The P-GW/UPF213 is connected to the internet service 230. The internet service 230 includes an operator-corresponding internet protocol service, and may specifically include the internet, an intranet, an IMS (IP Multimedia Subsystem), and a packet-switched streaming service.
As an embodiment, the UE201 corresponds to the first node in this application.
As an embodiment, the UE201 is a User Equipment (UE).
As an embodiment, the gNB203 corresponds to the second node in this application.
As an embodiment, the gNB203 is a base station equipment (BS).
As an embodiment, the gNB203 is a user equipment.
As an embodiment, the gNB203 is a relay.
As an embodiment, the gNB203 is a Gateway (Gateway).
As an embodiment, the user equipment supports transmission of a Non-Terrestrial Network (NTN).
As an embodiment, the user equipment supports transmission of a non-Terrestrial Network (Terrestrial Network).
As an embodiment, the user equipment supports transmission in a large delay-difference network.
As an embodiment, the user equipment supports Dual Connection (DC) transmission.
As one embodiment, the user device comprises an aircraft.
As an embodiment, the user equipment includes a vehicle-mounted terminal.
As one embodiment, the user equipment comprises a watercraft.
As an embodiment, the user equipment includes an internet of things terminal.
As an embodiment, the user equipment comprises a terminal of an industrial internet of things.
For one embodiment, the user equipment comprises a device supporting low-latency high-reliability transmission.
As an embodiment, the user equipment comprises a test equipment.
As an embodiment, the user equipment comprises a signaling tester.
As one embodiment, the base station apparatus supports transmission in a non-terrestrial network.
As an embodiment, the base station apparatus supports transmission in a large delay-difference network.
As an embodiment, the base station apparatus supports transmission of a terrestrial network.
As an embodiment, the base station device includes a macro Cellular (Marco Cellular) base station.
As an embodiment, the base station device includes a Micro Cell (Micro Cell) base station.
As one embodiment, the base station apparatus includes a Pico Cell (Pico Cell) base station.
As an embodiment, the base station device includes a home base station (Femtocell).
As an embodiment, the base station apparatus includes a base station apparatus supporting a large delay difference.
As one embodiment, the base station device includes a flying platform device.
As one embodiment, the base station apparatus includes a satellite apparatus.
As an embodiment, the base station device includes a TRP (Transmitter Receiver Point).
As an embodiment, the base station apparatus includes a CU (Centralized Unit).
As an embodiment, the base station apparatus includes a DU (Distributed Unit).
As an embodiment, the base station device comprises a test device.
As one embodiment, the base station apparatus includes a signaling tester.
In one embodiment, the base station device includes an iab (integrated Access and backhaul) -node.
For one embodiment, the base station equipment comprises an IAB-donor.
For one embodiment, the base station equipment includes an IAB-donor-CU.
As an embodiment, the base station equipment comprises an IAB-donor-DU.
As an embodiment, the base station device comprises an IAB-DU.
For one embodiment, the base station device includes an IAB-MT.
As one embodiment, the relay includes a relay.
As one embodiment, the relay includes an L3 relay.
For one embodiment, the relay includes an L2 relay.
For one embodiment, the relay includes a router.
As one embodiment, the relay includes a switch.
As one embodiment, the relay includes a user equipment.
As one embodiment, the relay includes a base station apparatus.
Example 3
Embodiment 3 shows a schematic diagram of an embodiment of a radio protocol architecture for a user plane and a control plane according to the present application, as shown in fig. 3. Fig. 3 is a schematic diagram illustrating an embodiment of a radio protocol architecture for the user plane 350 and the control plane 300, fig. 3 showing the radio protocol architecture for the control plane 300 with three layers: layer 1, layer 2 and layer 3. Layer 1(L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions. The L1 layer will be referred to herein as PHY 301. Above the PHY301, a layer 2(L2 layer) 305 includes a MAC (Medium Access Control) sublayer 302, an RLC (Radio Link Control Protocol) sublayer 303, and a PDCP (Packet Data Convergence Protocol) sublayer 304. The PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels. The PDCP sublayer 304 also provides security by ciphering packets and provides handover support. The RLC sublayer 303 provides segmentation and reassembly of upper layer packets, retransmission of lost packets, and reordering of packets to compensate for out-of-order reception due to HARQ. The MAC sublayer 302 provides multiplexing between logical and transport channels. The MAC sublayer 302 is also responsible for allocating various radio resources (e.g., resource blocks) in one cell. The MAC sublayer 302 is also responsible for HARQ operations. The RRC (Radio Resource Control) sublayer 306 in layer 3 (layer L3) in the Control plane 300 is responsible for obtaining Radio resources (i.e., Radio bearers) and configuring the lower layers using RRC signaling. The radio protocol architecture of the user plane 350, which includes layer 1(L1 layer) and layer 2(L2 layer), is substantially the same in the user plane 350 as the corresponding layers and sublayers in the control plane 300 for the physical layer 351, the PDCP sublayer 354 in the L2 layer 355, the RLC sublayer 353 in the L2 layer 355, and the MAC sublayer 352 in the L2 layer 355, but the PDCP sublayer 354 also provides header compression for upper layer packets to reduce radio transmission overhead. The L2 layer 355 in the user plane 350 further includes a Service Data Adaptation Protocol (SDAP) sublayer 356, and the SDAP sublayer 356 is responsible for mapping between QoS streams and Data Radio Bearers (DRBs) to support diversity of services.
As an example, the wireless protocol architecture in fig. 3 is applicable to the first node in this application.
As an example, the radio protocol architecture in fig. 3 is applicable to the second node in this application.
As an embodiment, the first message in this application is generated in the RRC 306.
As an embodiment, the first message in the present application is generated in the PDCP304 or PDCP 354.
As an embodiment, the first message in this application is generated in the RLC303 or the RLC 353.
As an embodiment, the first message in this application is generated in the MAC302 or the MAC 352.
As an embodiment, the first message in the present application is generated in the PHY301 or the PHY 351.
As an embodiment, the second message in this application is generated in the RRC 306.
As an embodiment, the second message in the present application is generated in the PDCP304 or PDCP 354.
As an embodiment, the second message in this application is generated in the RLC303 or the RLC 353.
As an embodiment, the second message in this application is generated in the MAC302 or the MAC 352.
As an embodiment, the second message in the present application is generated in the PHY301 or the PHY 351.
As an embodiment, the first signaling in this application is generated in the RRC 306.
As an embodiment, the first signaling in this application is generated in the MAC302 or the MAC 352.
As an embodiment, the first signaling in the present application is generated in the PHY301 or the PHY 351.
Example 4
Embodiment 4 shows a schematic diagram of a first communication device and a second communication device according to the present application, as shown in fig. 4. Fig. 4 is a block diagram of a first communication device 450 and a second communication device 410 communicating with each other in an access network.
The first communications device 450 includes a controller/processor 459, a memory 460, a data source 467, a transmit processor 468, a receive processor 456, a multi-antenna transmit processor 457, a multi-antenna receive processor 458, a transmitter/receiver 454, and an antenna 452.
The second communication device 410 includes a controller/processor 475, a memory 476, a receive processor 470, a transmit processor 416, a multiple antenna receive processor 472, a multiple antenna transmit processor 471, a transmitter/receiver 418, and an antenna 420.
In transmission from the second communication device 410 to the first communication device 450, at the second communication device 410, upper layer data packets from the core network are provided to a controller/processor 475. The controller/processor 475 implements the functionality of layer L2. In transmissions from the second communications device 410 to the first communications device 450, the controller/processor 475 provides header compression, encryption, packet segmentation and reordering, multiplexing between logical and transport channels, and radio resource allocation to the first communications device 450 based on various priority metrics. The controller/processor 475 is also responsible for retransmission of lost packets, and signaling to the first communication device 450. The transmit processor 416 and the multi-antenna transmit processor 471 implement various signal processing functions for the L1 layer (i.e., the physical layer). The transmit processor 416 implements coding and interleaving to facilitate Forward Error Correction (FEC) at the second communication device 410, as well as mapping of signal constellation based on various modulation schemes (e.g., Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK), M-phase shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM)). The multi-antenna transmit processor 471 performs digital spatial precoding, including codebook-based precoding and non-codebook based precoding, and beamforming processing on the coded and modulated symbols to generate one or more spatial streams. Transmit processor 416 then maps each spatial stream to subcarriers, multiplexes with reference signals (e.g., pilots) in the time and/or frequency domain, and then uses an Inverse Fast Fourier Transform (IFFT) to generate the physical channels carrying the time-domain multicarrier symbol streams. The multi-antenna transmit processor 471 then performs transmit analog precoding/beamforming operations on the time domain multi-carrier symbol stream. Each transmitter 418 converts the baseband multicarrier symbol stream provided by the multi-antenna transmit processor 471 into a radio frequency stream that is then provided to a different antenna 420.
In a transmission from the second communications apparatus 410 to the first communications apparatus 450, each receiver 454 receives a signal through its respective antenna 452 at the first communications apparatus 450. Each receiver 454 recovers information modulated onto a radio frequency carrier and converts the radio frequency stream into a baseband multi-carrier symbol stream that is provided to a receive processor 456. Receive processor 456 and multi-antenna receive processor 458 implement the various signal processing functions of the L1 layer. A multi-antenna receive processor 458 performs receive analog precoding/beamforming operations on the baseband multi-carrier symbol stream from the receiver 454. Receive processor 456 converts the baseband multicarrier symbol stream after the receive analog precoding/beamforming operation from the time domain to the frequency domain using a Fast Fourier Transform (FFT). In the frequency domain, the physical layer data signals and the reference signals to be used for channel estimation are demultiplexed by the receive processor 456, and the data signals are subjected to multi-antenna detection in the multi-antenna receive processor 458 to recover any spatial streams destined for the first communication device 450. The symbols on each spatial stream are demodulated and recovered at a receive processor 456 and soft decisions are generated. The receive processor 456 then decodes and deinterleaves the soft decisions to recover the upper layer data and control signals transmitted by the second communications device 410 on the physical channel. The upper layer data and control signals are then provided to a controller/processor 459. The controller/processor 459 implements the functionality of the L2 layer. The controller/processor 459 may be associated with a memory 460 that stores program codes and data. Memory 460 may be referred to as a computer-readable medium. In transmissions from the second communications device 410 to the second communications device 450, the controller/processor 459 provides demultiplexing between transport and logical channels, packet reassembly, deciphering, header decompression, control signal processing to recover upper layer packets from the core network. The upper layer packet is then provided to all protocol layers above the L2 layer. Various control signals may also be provided to L3 for L3 processing.
In a transmission from the first communications device 450 to the second communications device 410, a data source 467 is used at the first communications device 450 to provide upper layer data packets to a controller/processor 459. Data source 467 represents all protocol layers above the L2 layer. Similar to the send function at the second communications apparatus 410 described in the transmission from the second communications apparatus 410 to the first communications apparatus 450, the controller/processor 459 implements header compression, encryption, packet segmentation and reordering, and multiplexing between logical and transport channels based on radio resource allocation, implementing L2 layer functions for the user plane and control plane. The controller/processor 459 is also responsible for retransmission of lost packets and signaling to said second communications device 410. The transmit processor 468 performs modulation mapping, channel coding, and digital multi-antenna spatial precoding, including codebook-based precoding and non-codebook-based precoding, and beamforming, by the multi-antenna transmit processor 457, and then the transmit processor 468 modulates the resulting spatial streams into multi-carrier/single-carrier symbol streams, which are provided to the different antennas 452 via the transmitter 454 after analog precoding/beamforming in the multi-antenna transmit processor 457. Each transmitter 454 first converts the baseband symbol stream provided by the multi-antenna transmit processor 457 into a radio frequency symbol stream that is provided to the antenna 452.
In a transmission from the first communication device 450 to the second communication device 410, the functionality at the second communication device 410 is similar to the receiving functionality at the first communication device 450 described in the transmission from the second communication device 410 to the first communication device 450. Each receiver 418 receives an rf signal through its respective antenna 420, converts the received rf signal to a baseband signal, and provides the baseband signal to a multi-antenna receive processor 472 and a receive processor 470. The receive processor 470 and the multiple antenna receive processor 472 collectively implement the functionality of the L1 layer. Controller/processor 475 implements the L2 layer functions. The controller/processor 475 can be associated with a memory 476 that stores program codes and data. Memory 476 may be referred to as a computer-readable medium. In transmission from the first communications device 450 to the second communications device 410, the controller/processor 475 provides demultiplexing between transport and logical channels, packet reassembly, deciphering, header decompression, control signal processing to recover upper layer packets from the UE 450. Upper layer data packets from the controller/processor 475 may be provided to a core network.
As an embodiment, the first communication device 450 includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code configured to, for use with the at least one processor, the first communication device 450 at least: sending a first message; monitoring the second message; the first message and the second message belong to the same random access process; judging whether the same random access process is finished according to whether the second message is detected; wherein the act of determining whether the same random access procedure is complete based on whether the second message is detected comprises: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an embodiment, the first communication device 450 includes: a memory storing a program of computer readable instructions that when executed by at least one processor result in actions comprising: sending a first message; monitoring the second message; the first message and the second message belong to the same random access process; judging whether the same random access process is finished according to whether the second message is detected or not; wherein the act of determining whether the same random access procedure is complete based on whether the second message is detected comprises: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an embodiment, the second communication device 410 includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 at least: receiving a first message; sending a second message; wherein the first message and the second message belong to the same random access process; the same random access process is judged whether to be completed or not according to whether the second message is detected or not; the phrase that the same random access procedure is judged to be completed according to whether the second message is detected or not comprises: when the second message is detected in the first time unit set, the same random access process is judged to be successfully completed; when the second message is not detected in the first time unit set, the same random access process is judged to be incomplete; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; when the first RNTI does not belong to a first set of reference RNTIs, the second message comprises the first MAC field equal to the default value; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an embodiment, the second communication device 410 includes: a memory storing a program of computer readable instructions that when executed by at least one processor result in actions comprising: receiving a first message; sending a second message; wherein the first message and the second message belong to the same random access process; the same random access process is judged whether to be completed or not according to whether the second message is detected or not; the phrase that the same random access procedure is judged to be completed according to whether the second message is detected or not comprises: when the second message is detected in the first time unit set, the same random access process is judged to be successfully completed; when the second message is not detected in the first time unit set, the same random access process is judged to be incomplete; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
For one embodiment, the antenna 452, the receiver 454, the receive processor 456, the controller/processor 459 are configured to monitor for or receive a second message; at least one of the antenna 420, the transmitter 418, the transmit processor 416, and the controller/processor 475 is configured to send a second message.
As one implementation, the antenna 452, the transmitter 454, the transmit processor 468, the controller/processor 459 are configured to send a first message; at least one of the antenna 420, the receiver 418, the receive processor 470, the controller/processor 475 is configured to receive a first message.
For one embodiment, the antenna 452, the receiver 454, the receive processor 456, the controller/processor 459 are configured to receive a first signaling; at least one of the antenna 420, the transmitter 418, the transmit processor 416, and the controller/processor 475 is configured to send first signaling.
As an embodiment, the first communication device 450 corresponds to a first node in the present application.
As an embodiment, the second communication device 410 corresponds to a second node in the present application.
For one embodiment, the first communication device 450 is a user device.
For one embodiment, the first communication device 450 is a user equipment supporting a large delay difference.
As an embodiment, the first communication device 450 is a user equipment supporting NTN.
As an example, the first communication device 450 is an aircraft device.
For one embodiment, the first communication device 450 is location-enabled.
As an example, the first communication device 450 does not have a capability specification.
As an embodiment, the first communication device 450 is a TN-capable user equipment.
As an embodiment, the second communication device 410 is a base station device (gNB/eNB/ng-eNB).
As an embodiment, the second communication device 410 is a base station device supporting large delay inequality.
As an embodiment, the second communication device 410 is a base station device supporting NTN.
For one embodiment, the second communication device 410 is a satellite device.
For one embodiment, the second communication device 410 is a flight platform device.
As an embodiment, the second communication device 410 is a base station device supporting TN.
Example 5
Embodiment 5 illustrates a wireless signal transmission flow chart according to an embodiment of the present application, as shown in fig. 5. It is specifically noted that the order in this example does not limit the order of signal transmission and the order of implementation in this application.
For theFirst node U01In step S5101, receiving a first signaling; in step S5102, the C-RNTI is set as the given reference RNTI; in step S5103, a first message is sent; in step S5104, a second message is monitored; in step S5105, a second message is received; in step S5106, determining whether the second message is detected, determining whether the same random access procedure is completed according to whether the second message is detected, and entering step S5107 when the second message is detected in the first time unit set; when the second message is not detected in the first set of time units, proceed to step S5109; in step S5107, when the second message is detected in the first time unit set, it is determined that the same random access procedure is successfully completed; in step S5108, the C-RNTI is set to the given reference RNTI; in step S5109, when the second message is not detected in the first time unit set, it is determined that the same random access procedure is not completed.
For theSecond node N02In step S5201, the first signaling is transmitted; in step S5202, receiving the first message; in step S5203, the second message is transmitted.
In embodiment 5, the first message and the second message belong to the same random access procedure; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI; the first signaling is used to indicate whether the first message includes the given reference RNTI.
As an embodiment, the first signaling is received in the RRC CONNECTED (RRC _ CONNECTED) state.
As one embodiment, the first signaling is received in the RRC INACTIVE (RRC INACTIVE) state.
As an embodiment, the first signaling is transmitted over an air interface.
As an embodiment, the first signaling is sent through an antenna port.
As an embodiment, the first signaling is transmitted through higher layer signaling.
As an embodiment, the first signaling is transmitted by higher layer signaling.
As an embodiment, the first signaling comprises a downlink signal.
As an embodiment, the first signaling comprises a sidelink signal.
As an embodiment, the first signaling comprises all or part of higher layer signaling.
As an embodiment, the first signaling comprises all or part of higher layer signaling.
As an embodiment, the first signaling comprises an RRC message.
As one embodiment, the first signaling includes a rrcreelease message.
As an embodiment, the name of the first signaling includes at least one of RRC, Release, Connection, idt, edt, inactive, small, data, early, transmission, or Complete.
In one embodiment, the first signaling comprises MIB messages.
For one embodiment, the first signaling comprises a SIB1 message.
As an embodiment, the first signaling comprises all or part of an IE of an RRC message.
As an embodiment, the first signaling comprises all or part of a field in one IE of an RRC message.
As an embodiment, the first signaling comprises a field in an RRC message; the one RRC message includes a rrcreelease message.
As an embodiment, the first signaling comprises a field in an RRC message; the one RRC message includes a rrcreeconfiguration message.
As an embodiment, the first signaling comprises a field in an RRC message; the name of the RRC message comprises at least one of RRC, Release, Connection, idt, edt, inactive, small, data, early, transmission and Complete.
As an embodiment, the first signaling comprises an IE in an RRC message; the one RRC message includes an MIB message.
As an embodiment, the first signaling comprises an IE in an RRC message; the one RRC message includes a SIB1 message.
As an embodiment, the Signaling Radio Bearer (SRB) of the first Signaling includes one of SRB0, or SRB1, or SRB2, or SRB3, or SL-SRB 3.
As an embodiment, the Logical Channel (Logical Channel) corresponding to the first signaling includes one of a DCCH (Common Control Channel), or a BCCH (Broadcast Control Channel), or a CCCH, or an SBCCH (Sidelink Broadcast Control Channel), or an SCCH (Sidelink Control Channel).
As an embodiment, the phrase the first signaling is used to indicate whether the first message includes the given reference RNTI comprises: the first signaling indicates that the first message includes the given reference RNTI.
As an embodiment, the phrase the first signaling is used to indicate whether the first message includes the given reference RNTI comprises: the first signaling indicates that the first message does not include the given reference RNTI.
As an embodiment, the phrase the first signaling used to indicate whether the first message includes the given reference RNTI comprises: the first signaling indicates whether the first message includes the given reference RNTI.
As an embodiment, the phrase the first signaling is used to indicate whether the first message includes the given reference RNTI comprises: the first signaling is used to determine whether the first message includes the given reference RNTI.
As an embodiment, the phrase the first signaling is used to indicate whether the first message includes the given reference RNTI comprises: the first message includes the given reference RNTI when the first signaling is set; the first message does not include the given reference RNTI when the first signaling is not set.
As an embodiment, the phrase the first signaling is used to indicate whether the first message includes the given reference RNTI comprises: the first message includes the given reference RNTI when the first signaling is set to tune or 1; the first message does not include the given reference RNTI when the first signaling is set to false or 0.
As an embodiment, the phrase the first signaling is used to indicate whether the first message includes the given reference RNTI comprises: the first message includes the given reference RNTI when the first signaling is set to setup; the first message does not include the given reference RNTI when the first signaling is set to release.
As an embodiment, the phrase the first signaling used to indicate whether the first message includes the given reference RNTI comprises: the first signaling is used to indicate whether the C-RNTI is set to the given reference RNTI; the first message includes the given reference RNTI when the first signaling indicates that the C-RNTI is set to the given reference RNTI; the first message does not include the given reference RNTI when the first signaling indicates that the C-RNTI is not set to the given reference RNTI.
As an embodiment, the first signaling is used to indicate whether the first message includes the given reference RNTI; wherein the first RNTI is the given reference RNTI.
As an embodiment, "one RNTI is set as another RNTI" or "one RNTI is set as another RNTI" means including: setting the value of the one RNTI to the value of the other RNTI.
As an embodiment, the meaning of "one RNTI is set as another RNTI" or "one RNTI is set as another RNTI" includes: setting the one RNTI to a value of the other RNTI.
As an embodiment, the meaning of "one RNTI is set as another RNTI" or "one RNTI is set as another RNTI" includes: applying the value of the other RNTI to the one RNTI.
As an embodiment, "one RNTI is set as another RNTI" or "one RNTI is set as another RNTI" means including: the value of the one RNTI is made equal to the value of the other RNTI.
As an embodiment, the meaning of "one RNTI is set as another RNTI" or "one RNTI is set as another RNTI" includes: initializing the one RNTI to a value of the other RNTI.
As an embodiment, the first node U01 sets the C-RNTI to the given reference RNTI before the first message is sent.
As an embodiment, the first node U01 sets the C-RNTI to the given reference RNTI after the first message is sent and before the second message is received.
As an embodiment, the first node U01 sets the C-RNTI to the given reference RNTI after receiving the second message.
As an embodiment, the first node U01 sets the C-RNTI to the given reference RNTI when the first message is triggered.
As an embodiment, the first node U01 sets the C-RNTI to the given reference RNTI when an RRC Resume procedure is initiated during operation of the first timer.
As an embodiment, the first node U01 sets the C-RNTI to the given reference RNTI when the first message is set.
As an embodiment, the first node U01 sets the C-RNTI to the given reference RNTI before the first message is set.
As an embodiment, when the second message is received and a rrcreesume message or a RRCSetup message is included in the second message, the first node U01 sets the C-RNTI to the given reference RNTI.
As an embodiment, the C-RNTI is set to the given reference RNTI; the first message includes the C-RNTI.
As an embodiment, the C-RNTI is set to the given reference RNTI; the first RNTI is the C-RNTI.
As an embodiment, the first node U01 sets the C-RNTI to the given reference RNTI; sending a first message; monitoring the second message; the first message and the second message belong to the same random access process; judging whether the same random access process is finished according to whether the second message is detected or not; wherein the act of determining whether the same random access procedure is complete based on whether the second message is detected comprises: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As one embodiment, only C-RNTIs are included in the first set of reference RNTIs.
As a sub-embodiment of this embodiment, the phrase that the first RNTI belongs to a first set of reference RNTIs includes: the first RNTI is a C-RNTI.
As a sub-embodiment of this embodiment, the phrase that the first RNTI does not belong to a first set of reference RNTIs includes: the first RNTI is not a C-RNTI.
As a sub-embodiment of this embodiment, the first RNTI is a C-RNTI; the second message does not include the first MAC field equal to the default value.
As a sub-embodiment of this embodiment, the first RNTI is not a C-RNTI; the second message includes the first MAC field equal to the default value.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value" includes: when the first RNTI is a C-RNTI, the second message does not include an LCID field equal to the default value.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value" includes: when the first RNTI is a C-RNTI, the second message does not include an LCID field equal to 62 and does not include a UE context Resolution Identity MAC CE.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI does not belong to the first set of reference RNTIs, the second message includes the first MAC field equal to the default value" includes: when the first RNTI is not the C-RNTI, the second message includes an LCID field equal to 62 and includes a UE context Resolution Identity MAC CE.
As a subsidiary embodiment of this sub-embodiment, said first RNTI is said given reference RNTI.
As an additional embodiment of this sub-embodiment, the first RNTI is a Temporary C-RNTI or a TEMPORARY _ C-RNTI or a TC-RNTI.
As an additional embodiment of this sub-embodiment, the first RNTI is an MSGB-RNTI.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI does not belong to the first set of reference RNTIs, the second message includes the first MAC field equal to the default value" includes: when the first RNTI is not a C-RNTI, the second message includes an LCID field equal to the default value and does not include a UE context Resolution Identity MAC CE.
As a subsidiary embodiment of this sub-embodiment, said first RNTI is said given reference RNTI.
As an additional embodiment of this sub-embodiment, the first RNTI is a Temporary C-RNTI or a TEMPORARY _ C-RNTI or a TC-RNTI.
As an additional embodiment of this sub-embodiment, the first RNTI is an MSGB-RNTI.
For one embodiment, the LCID field equal to the default value includes an E field, a T1 field, a T2 field, and a field other than an S field in a success MAC header; the default value is equal to at least one of 0, or 1, or 00, or 01, or 11, or 10.
As a sub-embodiment of this embodiment, said LCID field equal to said default value comprises a T3 field.
As a sub-embodiment of this embodiment, the LCID field equal to the default value indicates whether or not there is a UE context Resolution Identity.
As an additional embodiment of this sub-embodiment, the second message comprises padding associated with the default value.
As an embodiment, the first reference RNTI set comprises C-RNTIs and given reference RNTIs.
As a sub-embodiment of this embodiment, the phrase that the first RNTI belongs to a first set of reference RNTIs includes: the first RNTI is a C-RNTI or the first RNTI is the given reference RNTI.
As a sub-embodiment of this embodiment, the phrase that the first RNTI does not belong to a first set of reference RNTIs includes: the first RNTI is not a C-RNTI and the first RNTI is not the given reference RNTI.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value" includes: the second message does not include an LCID field equal to the default value when the first RNTI is the C-RNTI or the given reference RNTI.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value" includes: when the first RNTI is the C-RNTI or the given reference RNTI, the second message does not include an LCID field equal to 62 and does not include a UE context Resolution Identity MAC CE.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI does not belong to a first set of reference RNTIs, the second message includes the first MAC field equal to the default value" includes: when the first RNTI is not a C-RNTI and the first RNTI is not a given reference RNTI, the second message includes an LCID field equal to 62 and includes a UE context Resolution Identity MAC CE.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI does not belong to the first set of reference RNTIs, the second message includes the first MAC field equal to the default value" includes: when the first RNTI is not a C-RNTI and the first RNTI is not a given reference RNTI, the second message includes an LCID field equal to the default value and does not include a UE context Resolution Identity MAC CE.
As an embodiment, the dashed box F5.1 is optional.
As an embodiment the dashed box F5.2 is optional.
As an embodiment the dashed box F5.3 is optional.
As an embodiment, the dashed box F5.4 is optional.
As an embodiment, the dashed box F5.5 is optional.
As an embodiment, the dashed box F5.6 is optional.
As an example, the dashed box F5.1 exists.
As an example, the dashed box F5.1 is not present.
As an example, the dashed box F5.2 exists.
As an example, the dashed box F5.2 is not present.
As an example, the dashed box F5.3 exists.
As an example, the dashed box F5.3 is not present.
As an example, the dashed box F5.4 exists.
As an example, the dashed box F5.4 is not present.
As an example, the dashed box F5.5 exists.
As an example, the dashed box F5.5 is not present.
As an example, the dashed box F5.6 exists.
As an example, the dashed box F5.6 is not present.
As an embodiment, at least one of said dashed box F5.2 and said dashed box F5.6 is absent.
As a sub-embodiment of this embodiment, the dashed box F5.2 is present and the dashed box F5.6 is absent.
As a sub-embodiment of this embodiment, the dashed box F5.2 is not present and the dashed box F5.6 is present.
As a sub-embodiment of this embodiment, the dashed box F5.2 is not present, and the dashed box F5.6 is not present.
As an example, when the dashed box F5.3 is absent, the dashed box F5.4 is absent and the dashed box F5.5 is absent.
As an example, when the dashed box F5.3 is present and the dashed box F5.4 is absent, the dashed box F5.5 is absent.
As an example, the dashed box F5.3 is present, the dashed box F5.4 is present, and the dashed box F5.5 is not present.
As an example, the dashed box F5.3 exists, the dashed box F5.4 exists, and the dashed box F5.5 exists.
As an embodiment, when the second message is not detected in the first set of time units, at least one of the dashed box F5.3, or the dashed box F5.4, or the dashed box F5.5 is absent.
As an embodiment, the dashed box F5.3 exists, the dashed box F5.4 exists, and the dashed box F5.5 exists when the second message is not detected in the first set of time units.
Example 6
Embodiment 6 illustrates a schematic diagram that the second message does not include the first type MAC CE according to an embodiment of the present application, as shown in fig. 6.
In embodiment 6, the first MAC domain includes at least one of an LCID domain or an eLCID domain, the default value indicates a first type of MAC CE, and the second message does not include the first type of MAC CE.
As an embodiment, the first MAC domain includes at least one of an LCID domain or an eLCID domain, the default value indicates a first type of MAC CE, the second message does not include the first type of MAC CE; wherein the first RNTI does not belong to the first set of reference RNTIs.
For one embodiment, the LCID field refers to a Logical Channel identification field (Logical Channel ID field).
As an embodiment, the etlcid field refers to an Extended logical channel identification field (Extended LCID).
As an embodiment, the LCID field or the eLCID field is used to identify a type of a corresponding MAC SDU or MAC CE of the DL-SCH or UL-SCH or a logical channel instance (logical channel instance) of padding (padding).
For one embodiment, the first MAC domain is an LCID domain.
For one embodiment, the first MAC domain is an etlcid domain.
For one embodiment, the first MAC domain includes an LCID domain and an eLCID domain.
For one embodiment, the phrase that the first MAC domain is an LCID domain includes: the first MAC domain indicates an LCID.
As one embodiment, the phrase that the first MAC domain is an etlci domain includes: the first MAC domain indicates the etlcid.
For one embodiment, the first MAC domain includes an LCID domain and an eLCID domain.
For one embodiment, the LCID field includes 6 bits.
For one embodiment, the LCID field includes 7 bits.
For one embodiment, the LCID field includes 8 bits.
As an embodiment, the etlcid field includes 8 bits.
As an embodiment, the elicid field includes 16 bits.
As an embodiment, when the LCID field is set to 34, the first MAC field is an eLCID field, and the eLCID field includes one byte.
As an embodiment, when the LCID field is set to 33, the first MAC field is an eLCID field, which includes two bytes.
For an embodiment, when the LCID field is set to 34, the first MAC field includes an eLCID field.
In one embodiment, when the LCID field is set to 33, the first MAC field comprises an erlcid field.
For one embodiment, the first MAC domain is an LCID domain.
As a sub-embodiment of the described embodiment, the default value is 62.
As a sub-embodiment of the described embodiment, the default value is 63.
As a sub-embodiment of the described embodiment, the default value is one of 35, 36, 37.
As a sub-embodiment of the embodiment, the default value is 62, the first message includes a CCCH SDU, and the MAC CE associated with the first MAC field equal to the default value does not include the CCCH SDU.
As a sub-embodiment of the embodiment, the default value is 62, the first message includes a DCCH SDU, and the DCCH SDU is not included in the MAC CE associated with the first MAC field equal to the default value.
As a sub-embodiment of the described embodiment, the default value is 0.
For one embodiment, the first MAC domain is an etlcid domain.
As a sub-embodiment of the described embodiment, the default value is one of 64, 65, 66.
As one embodiment, the phrase the default value indicates that the first type of MAC CE includes: the default value is associated to the first type of MAC CE.
As one embodiment, the phrase the default value indicates that the first type of MAC CE includes: the default value is an Index (Index) of the first type of MAC CE.
As one embodiment, the phrase the default value indicates that the first type of MAC CE includes: the default value includes a Codepoint or Index of section 6.2.1 in 3GPP TS38.321, and the first MAC CE is associated with an LCID value corresponding to the Codepoint or Index.
For one embodiment, the first type of MAC CE is a UE context Resolution Identity MAC CE, and the default value is 62.
As an embodiment, the first type MAC CE is success rar.
As an embodiment, the first type MAC CE is a fallback rar.
As an embodiment, the MAC CE of the first type includes one MAC CE of the UE context Resolution Identity field.
As an embodiment, the MAC CE of the first type includes a RAR of the UE context Resolution Identity field.
As an embodiment, all or part of the UL CCCH SDU is included in the first MAC CE.
As an embodiment, all or part of the UL DCCH SDU is included in the first type MAC CE.
As an embodiment, the second message does not carry the first MAC CE.
As an embodiment, the second message does not include a UE context Resolution Identity MAC CE.
As an embodiment, the first MAC domain includes at least one of an LCID domain or an eLCID domain, the default value indicates a first type of MAC CE, the second message includes the first MAC domain equal to the default value, the second message does not include the first type of MAC CE; wherein the first RNTI does not belong to the first set of reference RNTIs.
As an embodiment, the first MAC domain comprises an LCID domain, the default value indicates a first type of MAC CE, the second message comprises the first MAC domain equal to the default value, the second message does not comprise the first type of MAC CE; wherein the first RNTI does not belong to the first reference RNTI set; the first type of MAC CE is a UE context Resolution Identity MAC CE, and the default value is equal to 62.
As an embodiment, the second message includes an LCID field set to 62, and the second message does not include a UE context Resolution Identity MAC CE.
As an embodiment, the second message includes a MAC subheader, the LCID field in the MAC subheader is set to 62, and the second message does not include UE context Resolution Identity MAC CE.
As a sub-embodiment of this embodiment, the first message includes the C-RNTI.
As a sub-embodiment of this embodiment, the first message comprises the given reference RNTI.
As a sub-embodiment of this embodiment, the first message includes the C-RNTI and a CCCH SDU.
As a sub-embodiment of this embodiment, the first message comprises the given reference RNTI and one CCCH SDU.
As a sub-embodiment of this embodiment, the first message includes the C-RNTI and a DCCH SDU.
As a sub-embodiment of this embodiment, the first message comprises the given reference RNTI and one DCCH SDU.
As an embodiment, the second message includes a MAC subheader, the LCID field in the MAC subheader is set to 62, and the second message includes UE context Resolution Identity MAC CE.
As a sub-embodiment of this embodiment, the UE context Resolution Identity field in the UE context Resolution Identity MAC CE includes all or part of a DCCH SDU.
As a sub-embodiment of this embodiment, the UE context Resolution Identity field in the UE context Resolution Identity MAC CE includes all or part of one CCCH SDU.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value" includes: when the first RNTI is a C-RNTI, the second message does not include an LCID field equal to 62 and does not include a UE context Resolution Identity MAC CE.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI does not belong to the first set of reference RNTIs, the second message includes the first MAC field equal to the default value" includes: when the first RNTI is not a C-RNTI, the second message includes an LCID field equal to the default value and does not include a UE context Resolution Identity MAC CE.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC field equal to the default value" includes: when the first RNTI is the C-RNTI or the given reference RNTI, the second message does not include an LCID field equal to the default value and does not include a UE context Resolution Identity MAC CE.
As a sub-embodiment of this embodiment, the sentence "when the first RNTI does not belong to a first set of reference RNTIs, the second message includes the first MAC field equal to the default value" includes: when the first RNTI is not a C-RNTI and the first RNTI is not a given reference RNTI, the second message includes an LCID field equal to the default value and does not include a UE context Resolution Identity MAC CE.
As an embodiment, when the first RNTI belongs to a first set of reference RNTIs, the second message does not include the first MAC domain equal to the default value, and the second message does not include the first type MAC CE.
As a sub-embodiment of this embodiment, the first RNTI is the given reference RNTI, and the given reference RNTI is included in the first set of reference RNTIs.
As a sub-embodiment of this embodiment, the first RNTI is the C-RNTI, and the first reference RNTI set includes the C-RNTI.
As an embodiment, when the first RNTI does not belong to a first set of reference RNTIs, the second message includes the first MAC domain equal to the default value and the second message does not include the first type of MAC CE.
As a sub-embodiment of this embodiment, the first RNTI is the given reference RNTI, and the given reference RNTI is not included in the first set of reference RNTIs.
As a sub-embodiment of this embodiment, the first RNTI is a TEMPORARY _ C-RNTI, and the TEMPORARY _ C-RNTI is not included in the first set of reference RNTIs.
As an embodiment, when the first RNTI does not belong to a first set of reference RNTIs, the second message includes the first MAC domain equal to the default value and the second message includes the first type MAC CE.
As a sub-embodiment of this embodiment, the first RNTI is the given reference RNTI, and the given reference RNTI is not included in the first set of reference RNTIs.
As an auxiliary embodiment of this sub-embodiment, the first MAC CE includes all or part of the CCCH SDU carried in the first message.
As an auxiliary embodiment of this sub-embodiment, the first MAC CE includes all or part of the DCCH SDU carried in the first message.
As a sub-embodiment of this embodiment, the first RNTI is a TEMPORARY _ C-RNTI, and the TEMPORARY _ C-RNTI is not included in the first set of reference RNTIs.
As an embodiment, the first MAC domain includes at least one of an LCID domain or an eLCID domain, the default value indicates a first type of MAC CE, the second message does not include the first type of MAC CE; wherein the first RNTI belongs to the first reference RNTI set.
As an embodiment, the second message does not include the first MAC domain equal to the default value and the second message does not include the first type of MAC CE, the first MAC domain including at least one of an LCID domain or an elicid domain, the default value indicating the first type of MAC CE.
As an embodiment, the first RNTI is the given reference RNTI.
As an embodiment, the first type of MAC CE includes all or part of DCCH SDU; the first message includes the DCCH SDU.
As an embodiment, the first MAC CE includes all or part of CCCH SDUs; the first message includes the CCCH SDU.
Example 7
Embodiment 7 illustrates a schematic diagram where a first set of reference RNTIs includes a given reference RNTI according to one embodiment of the present application, as shown in fig. 7.
In embodiment 7, the first set of reference RNTIs includes a given reference RNTI, which is different from the C-RNTI.
As an embodiment, one rrcreelease message is received in RRC _ CONNECTED state, one field of the one rrcreelease message including the given reference RNTI.
As an embodiment, one rrcreelease message is received in RRC _ INACTIVE state, one field of the one rrcreelease message including the given reference RNTI.
As a sub-embodiment of this embodiment, the value of the given reference RNTI is configured as a C-RNTI.
As a sub-embodiment of this embodiment, the value of the given reference RNTI is configured as the value of the C-RNTI.
As a sub-embodiment of this embodiment, the value of the given reference RNTI is configured as an integer of 0001-FFF 2 (hexadecimal).
As an embodiment, the given reference RNTI has a range of values 0001-FFF 2.
As an embodiment, the given reference RNTI is a non-negative integer with a value range no greater than 65536.
As an embodiment, the range of values for the given reference RNTI is a positive integer no greater than 65522.
As an embodiment, the value range of the given reference RNTI is the same as the value range of the C-RNTI.
As an embodiment, the given reference RNTI is used for unicast transmission.
As an embodiment, the given reference RNTI is used to configure a scheduled unicast transmission (Configured scheduled unicast transmission).
As an embodiment, the given reference RNTI is used for transmission of Msg 3.
As an embodiment, the given reference RNTI is used for transmissions using the first resource pool.
As a sub-embodiment of this embodiment, the first resource pool comprises a Configured Grant.
As a sub-embodiment of this embodiment, the first Resource pool includes a PUR (Preconfigured Uplink Resource).
As a sub-embodiment of this embodiment, the first resource pool comprises SPS (Semi-Persistent Scheduling).
As a sub-embodiment of this embodiment, the first resource pool includes at least one of time domain resources, frequency domain resources, spatial domain resources, and code domain resources.
As an embodiment, the first uplink PUSCH of the SDT is sent through the first resource pool.
For one embodiment, the first resource pool is used for SDT.
As an embodiment, the given reference RNTI is used for at least one of a DL-SCH or an UL-SCH.
As an embodiment, the given reference RNTI is used for at least one of a CCCH or a DCCH or a DTCH.
As an embodiment, the given reference RNTI is not a C-RNTI.
As an embodiment, the given reference RNTI comprises a PUR C-RNTI.
As an embodiment, the given reference RNTI comprises a CG C-RNTI.
As an embodiment, the given reference RNTI comprises a CS C-RNTI.
As an embodiment, the given reference RNTI comprises an IDT C-RNTI.
As an embodiment, the given reference RNTI comprises an SDT C-RNTI.
As an embodiment, the given reference RNTI comprises an ICS C-RNTI.
As an embodiment, the given reference RNTI comprises a SCS C-RNTI.
As an embodiment, the phrase the first set of reference RNTIs comprises a given reference RNTI comprising: one RNTI in the first set of reference RNTIs is the given reference RNTI.
As an embodiment, the phrase the first set of reference RNTIs comprises a given reference RNTI comprising: the given reference RNTI is included in the first set of reference RNTIs in addition to the C-RNTI.
As an embodiment, the phrase the first set of reference RNTIs comprises a given reference RNTI comprising: the given reference RNTI is one RNTI in the first set of reference RNTIs.
As an embodiment, the phrase the first set of reference RNTIs comprises at least C-RNTIs comprising: the first reference RNTI set comprises the C-RNTI and at least a given reference RNTI.
As a sub-embodiment of this embodiment, the K1 is greater than 1.
As a sub-embodiment of this embodiment, the C-RNTI and the given reference RNTI are included in the first set of reference RNTIs.
As a sub-embodiment of this embodiment, the first set of reference RNTIs includes the C-RNTI, the given reference RNTI, and at least one RNTI other than the C-RNTI and the given reference RNTI.
As a sub-embodiment of this embodiment, the phrase that the first RNTI belongs to a first set of reference RNTIs includes: the first RNTI is the C-RNTI.
As a sub-embodiment of this embodiment, the phrase that the first RNTI belongs to a first set of reference RNTIs includes: the first RNTI is the given reference RNTI.
As a sub-embodiment of this embodiment, the phrase that the first RNTI belongs to a first set of reference RNTIs includes: the first RNTI is the C-RNTI or the given reference RNTI.
As a sub-embodiment of this embodiment, the phrase that the first RNTI belongs to a first set of reference RNTIs includes: the value of the first RNTI and the value of the C-RNTI or the value of the given reference RNTI are equal.
As an embodiment, the phrase that the given reference RNTI is different from the C-RNTI includes: the value of the given reference RNTI and the value of the C-RNTI are different.
As an embodiment, the phrase that the given reference RNTI is different from the C-RNTI includes: the given reference RNTI name is not the C-RNTI.
As an embodiment, the phrase that the given reference RNTI is different from the C-RNTI includes: the given reference RNTI name includes letters other than the C-RNTI.
As an embodiment, the phrase that the given reference RNTI is different from the C-RNTI includes: the given reference RNTI and the C-RNTI are different in name.
As an embodiment, the phrase that the given reference RNTI is different from the C-RNTI includes: the given reference RNTI is not the C-RNTI.
Example 8
Embodiment 8 illustrates a schematic diagram in which a first message according to an embodiment of the present application includes a given reference RNTI, as shown in fig. 8.
In embodiment 8, the first message includes the given reference RNTI, and the first RNTI is the given reference RNTI.
As an embodiment, the phrase the first message including the given reference RNTI comprises: the given reference RNTI is carried in the first message.
As an embodiment, the phrase the first message including the given reference RNTI comprises: the first message carries a value of the given reference RNTI.
As an embodiment, the phrase the first message including the given reference RNTI comprises: one field in the first message is set to the value of the given reference RNTI.
As an embodiment, the phrase the first message including the given reference RNTI comprises: setting the C-RNTI as the given reference RNTI, the first message including the C-RNTI.
As an embodiment, the phrase the first message including the given reference RNTI comprises: the first message includes a first RNTI MAC CE, the first RNTI MAC CE indicating the given reference RNTI.
As a sub-embodiment of this embodiment, the first RNTI MAC CE is C-RNTI MAC CE.
As an additional embodiment of this sub-embodiment, the C-RNTI field in the C-RNTI MAC CE is set to the given reference RNTI.
As an additional embodiment of this sub-embodiment, the C-RNTI field in the C-RNTI MAC CE is set to the C-RNTI.
As a sub-embodiment of this embodiment, the first RNTI MAC CE is not C-RNTI MAC CE.
As an adjunct embodiment to this sub-embodiment, the LCID index of the first RNTI MAC CE is not 58.
As an auxiliary embodiment of this sub-embodiment, the first message includes a first RNTI MAC CE MAC subheader corresponding to the first RNTI MAC CE, and the MAC subheader corresponding to the first RNTI MAC CE includes an LCID field, and the LCID field is set to a value other than 58.
As a subordinate embodiment of this subordinate embodiment, the value other than 58 does not include 58.
As a subordinate embodiment of the subsidiary embodiment, the values other than 58 include integers not less than 35 and not more than 44.
As a subordinate embodiment of the subsidiary embodiment, the values other than 58 include integers not less than 64 and not more than 313.
As an additional embodiment of this sub-embodiment, the first RNTI MAC CE comprises a given reference RNTI field comprising the given reference RNTI of a MAC entity.
Example 9
Embodiment 9 illustrates a schematic diagram of setting a given reference RNTI as a second RNTI according to one embodiment of the present application, as shown in fig. 9.
In embodiment 9, the given reference RNTI is set as a second RNTI; wherein the second RNTI is received in a first random access response, which does not belong to the same random access procedure to which the first message and the second message belong.
As an embodiment, the act of setting the given reference RNTI to a second RNTI includes: setting a C-RNTI to a value of the second RNTI and setting the given reference RNTI to a value of the C-RNTI.
As one embodiment, the act of setting the given reference RNTI to a second RNTI includes: and when the C-RNTI is set as the value of the second RNTI, the given reference RNTI is set as the value of the second RNTI.
As an embodiment, the phrase the second RNTI being received in a first random access response includes: the first random access response includes the second RNTI.
As an embodiment, the phrase the second RNTI being received in the first random access response includes: the second RNTI is indicated in the first random access response.
As an embodiment, the phrase that the first random access response does not belong to the same random access procedure to which the first message and the second message belong includes: the first random access response is received in a random access procedure other than the same random access procedure to which the first message and the second message belong.
As an embodiment, the phrase that the first random access response does not belong to the same random access procedure to which the first message and the second message belong includes: the first message and the second message are independent of the first random access response.
As an embodiment, the first random access response comprises a MAC RAR.
As an embodiment, the first random access response includes a fallback rar.
As an embodiment, the first random access response includes a success rar.
As an embodiment, the second RNTI includes one TEMPORARY _ C-RNTI.
As an embodiment, the second RNTI comprises a Temporary C-RNTI.
As an embodiment, the second RNTI includes one C-RNTI.
As an embodiment, one field in the first random access response indicates the second RNTI; wherein the first random access response is a MAC RAR, the one field is a Temporary C-RNTI field, and the second RNTI is a TEMPORARY _ C-RNTI or a Temporary C-RNTI or a TC-RNTI.
As an embodiment, one field in the first random access response indicates the second RNTI; the first random access response is a fallback RAR, the domain is a Temporary C-RNTI domain, and the second RNTI is a TEMPORARY _ C-RNTI or a Temporary C-RNTI or a TC-RNTI.
As an embodiment, one field in the first random access response indicates the second RNTI; the first random access response is success RAR, the domain is a C-RNTI domain, and the second RNTI is a C-RNTI.
As an embodiment, the phrase one field in the first random access response indicates that the second RNTI comprises: the second RNTI is set to a value of the one field in the first random access response.
As an embodiment, the phrase one field in the first random access response indicates that the second RNTI comprises: the value of the second RNTI is a value of the one field in the first random access response.
As an embodiment, the first node transmits a third message, the third message comprising a CCCH SDU; starting a ra-ContentionResolutionTimer after the third message is sent or retransmitted; receiving a fourth message during the ra-ContentionResolutionTimer operation; setting the given reference RNTI to a second RNTI in response to receiving the fourth message as the action; wherein the fourth message comprises a first PDCCH associated to a TEMPORARY _ C-RNTI; the fourth message comprises UE context Resolution Identity MAC CE, and the UE context Resolution Identity in the UE context Resolution Identity MAC CE is matched with the CCCH SDU in the third message; the third message is sent in a random access procedure; the third message is not used to request SI; the second RNTI is received in a first random access response that does not belong to the same random access procedure to which the first message and the second message belong.
As a sub-embodiment of this embodiment, the act of setting the given reference RNTI to a second RNTI includes: and setting the given reference RNTI as the second RNTI, wherein the second RNTI is TEMPORARY _ C-RNTI or TEMPORary C-RNTI or TC-RNTI.
As a sub-embodiment of this embodiment, the act of setting the given reference RNTI to a second RNTI comprises: setting C-RNTI as the second RNTI; setting the given reference RNTI to the C-RNTI in response to the act setting a C-RNTI to the second RNTI; the second RNTI is TEMPORARY _ C-RNTI or TEMPORary C-RNTI or TC-RNTI.
As a sub-embodiment of this embodiment, in response to the behavior receiving the fourth message, the C-RNTI stored in the UE Context is updated to the value of the second RNTI; wherein the fourth message comprises a RRCRelease message comprising a suspendConfig, and the RRCRelease message is a response to a RRCResemerRequest message or a RRCResemerRequest 1 message.
As a sub-embodiment of this embodiment, the given reference RNTI is set to the second RNTI if a timer associated with the TA is running in response to the act receiving the fourth message.
As an embodiment, the first node transmits a fifth message, the fifth message including a CCCH SDU; after the fifth message is sent or retransmitted, starting msgB-ResponseWindow; receiving a sixth message during msgB-ResponseWindow operation; setting the given reference RNTI to a second RNTI in response to receiving the sixth message as the action; wherein the sixth message comprises a second PDCCH associated to a MSGB-RNTI; the sixth message comprises a success RAR MAC sub PDU, and the UE context Resolution Identity in the success RAR MAC sub PDU is matched with the CCCH SDU in the fifth message; the success RAC MAC sub PDU comprises a C-RNTI domain; the fifth message is sent in a random access procedure; the fifth message is not used to request SI; the second RNTI is received in a first random access response that does not belong to the same random access procedure to which the first message and the second message belong.
As a sub-embodiment of this embodiment, the act of setting the given reference RNTI to a second RNTI comprises: and setting the given reference RNTI as the second RNTI, wherein the second RNTI is the value of a C-RNTI domain in the success RAR MAC subpPDU.
As a sub-embodiment of this embodiment, the act of setting the given reference RNTI to a second RNTI comprises: setting the C-RNTI as the value of the C-RNTI domain in the success RAC MAC sub PDU; setting the given reference RNTI to the C-RNTI in response to the act setting a C-RNTI to the second RNTI; the second RNTI is a C-RNTI.
As a sub-embodiment of this embodiment, in response to the behavior receiving the sixth message, the C-RNTI stored in the UE Context is updated to the value of the second RNTI; wherein the fourth message comprises a RRCRelease message comprising a suspendConfig, and the RRCRelease message is a response to a RRCResemerRequest message or a RRCResemerRequest 1 message.
As a sub-embodiment of this embodiment, the given reference RNTI is set to the second RNTI if a timer associated with the TA is running in response to the act receiving the sixth message.
As an embodiment, the third message or the fifth message is used to resume a suspended RRC connection.
As one embodiment, the third message or the fifth message includes a RRCResumeRequest message.
As an embodiment, the third message or the fifth message is used to initiate an RNA update.
As an embodiment, a resumecuse is included in the third message or the fifth message, and the resumecuse indicates an rn-Update.
As an example, the third message comprises one Msg 3.
As an embodiment, the fifth message comprises one MsgA.
As an embodiment, the fourth message comprises one Msg 4.
As an embodiment, the sixth message comprises one MsgB.
As an embodiment, the act of setting the given reference RNTI to the second RNTI occurs before the first message is sent.
As an embodiment, the act of setting the given reference RNTI to the second RNTI occurs after the first message is sent.
As an embodiment, receiving a Timing Advance Command MAC CE is used to start or restart the one timer associated with the TA.
As an embodiment, receiving a message comprising a Timing Advance Command field is used to start or restart the one timer associated with the TA.
For one embodiment, the configuration of receiving one of the timers associated with the TA is used to start the one timer associated with the TA.
Example 10
Embodiment 10 illustrates a schematic diagram of a second message including a first MAC field equal to a default value and not including a first type of MAC CE according to an embodiment of the application, as shown in fig. 10. In fig. 10, the diamond-filled boxes represent one MAC sub-PDU, and the second message includes the one MAC sub-PDU; the vertical line filled box represents a MAC sub-header, and the MAC sub-header is included in the MAC sub-PDU; the boxes filled with horizontal lines represent a first MAC domain, which is included in the one MAC subheader.
In embodiment 10, the second message includes the first MAC domain equal to the default value, the first MAC domain including at least one of an LCID domain or an eLCID domain, the default value indicating a first type of MAC CE, the second message not including the first type of MAC CE; wherein the first RNTI does not belong to a first reference RNTI set.
As an embodiment, the default value is equal to 62, the first type MAC CE is a UE context Resolution Identity MAC CE, the first RNTI is the given reference RNTI, and the given reference RNTI is not included in the first set of reference RNTIs.
As an example, the size of the blocks in FIG. 10 and the location between different blocks does not limit the implementation of the scheme.
Example 11
Embodiment 11 illustrates a schematic diagram of C-RNTI MAC CE according to an embodiment of the present application, as shown in fig. 11. In fig. 11, two blank boxes represent one C-RNTI field, which includes 2 bytes, namely, byte 1(Oct 1) and byte 2(Oct 2), each byte including 8 bits.
For one embodiment, the C-RNTI field comprises a C-RNTI of a MAC entity.
As an embodiment, the C-RNTI is set to the given reference RNTI, the C-RNTI field including a C-RNTI of a MAC entity.
As an embodiment, the C-RNTI is set to the given reference RNTI when the first timer is running, the C-RNTI field including a C-RNTI of a MAC entity.
As an embodiment, the C-RNTI field includes the given reference RNTI of a MAC entity.
As an embodiment, the first message includes the C-RNTI MAC CE, the C-RNTI field of the C-RNTI MAC CE includes the given reference RNTI of a MAC entity, and the first RNTI is the given reference RNTI.
As an embodiment, the C-RNTI field includes the given reference RNTI of a MAC entity when the first timer is running.
Example 12
Embodiment 12 illustrates a schematic diagram of a first RNTI MAC CE according to an embodiment of the present application, as shown in fig. 12. In fig. 12, two blank boxes represent a given reference RNTI field that includes 2 bytes, namely byte 1(Oct 1) and byte 2(Oct 2), each byte including 8 bits.
As an embodiment, the given reference field comprises the given reference RNTI of a MAC entity.
As an embodiment, the first message comprises the first RNTI MAC CE, the given reference RNTI field of the first RNTI MAC CE comprises the given reference RNTI of a MAC entity, the first RNTI is the given reference RNTI.
As an embodiment, the given reference RNTI field includes the given reference RNTI of a MAC entity when the first timer is running.
Example 13
Embodiment 13 illustrates a block diagram of a processing apparatus for use in a first node according to an embodiment of the present application; as shown in fig. 13. In fig. 13, a processing arrangement 1300 in a first node comprises a first receiver 1301 and a first transmitter 1302.
A first transmitter 1302 that transmits a first message;
the first receiver 1301, monitoring for the second message; the first message and the second message belong to the same random access process; judging whether the same random access process is finished according to whether the second message is detected or not;
in embodiment 13, the determining, by the behavior according to whether the second message is detected, whether the same random access procedure is completed includes: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an embodiment, the first MAC domain includes at least one of an LCID domain or an eLCID domain, the default value indicates a first type of MAC CE, the second message does not include the first type of MAC CE; wherein the first RNTI does not belong to the first set of reference RNTIs.
As an embodiment, the first set of reference RNTIs comprises a given reference RNTI, which is different from the C-RNTI.
As an embodiment, the first message includes the given reference RNTI, the first RNTI being the given reference RNTI.
As an embodiment, the first receiver 1301, receives a first signaling, where the first signaling is used to indicate whether the first message includes the given reference RNTI; wherein the first RNTI is the given reference RNTI.
As an embodiment, the first receiver 1301 sets the C-RNTI to the given reference RNTI.
As an embodiment, the first receiver 1301 sets the given reference RNTI as a second RNTI; wherein the second RNTI is received in a first random access response that does not belong to the same random access procedure to which the first message and the second message belong.
For one embodiment, the first receiver 1301 includes the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, the controller/processor 459, the memory 460, and the data source 467 of fig. 4.
For one embodiment, the first receiver 1301 includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, and the receiving processor 456 of fig. 4.
For one embodiment, the first receiver 1301 includes the antenna 452, the receiver 454, and the receiving processor 456 in fig. 4.
For one embodiment, the first transmitter 1302 includes the antenna 452, the transmitter 454, the multi-antenna transmit processor 457, the transmit processor 468, the controller/processor 459, the memory 460, and the data source 467 of fig. 4.
For one embodiment, the first transmitter 1302 includes the antenna 452, the transmitter 454, the multi-antenna transmit processor 457, and the transmit processor 468 of fig. 4.
For one embodiment, the first transmitter 1302 includes the antenna 452, the transmitter 454, and the transmitting processor 468 of fig. 4.
Example 14
Embodiment 14 illustrates a block diagram of a processing apparatus for use in a second node according to an embodiment of the present application; as shown in fig. 14. In fig. 14, the processing means 1400 in the second node comprises a second transmitter 1401 and a second receiver 1402.
A second receiver 1402 receiving the first message;
a second transmitter 1401 for transmitting a second message;
in embodiment 14, the first message and the second message belong to the same random access procedure; the same random access process is judged whether to be completed or not according to whether the second message is detected or not; the phrase that the same random access procedure is judged to be completed according to whether the second message is detected or not comprises: when the second message is detected in the first time unit set, the same random access process is judged to be successfully completed; when the second message is not detected in the first time unit set, the same random access process is judged to be incomplete; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; when the first RNTI does not belong to a first set of reference RNTIs, the second message comprises the first MAC field equal to the default value; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
As an embodiment, the first MAC domain includes at least one of an LCID domain or an eLCID domain, the default value indicates a first type of MAC CE, the second message does not include the first type of MAC CE; wherein the first RNTI does not belong to the first set of reference RNTIs.
As an embodiment, the first set of reference RNTIs comprises a given reference RNTI, which is different from the C-RNTI.
As an embodiment, the first message includes the given reference RNTI, the first RNTI being the given reference RNTI.
As an embodiment, the second transmitter 141, sends a first signaling, which is used to indicate whether the first message includes the given reference RNTI; wherein the first RNTI is the given reference RNTI.
As an embodiment, the C-RNTI is set to the given reference RNTI.
As an embodiment, the given reference RNTI is set to a second RNTI; wherein the second RNTI is received in a first random access response that does not belong to the same random access procedure to which the first message and the second message belong.
For one embodiment, the second transmitter 1401 includes the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, the controller/processor 475, and the memory 476 of fig. 4 of the present application.
The second transmitter 1401 includes, as an embodiment, the antenna 420, the transmitter 418, the multi-antenna transmission processor 471 and the transmission processor 416 in fig. 4 of the present application.
The second transmitter 1401, for one embodiment, includes the antenna 420, the transmitter 418, and the transmission processor 416 of fig. 4.
The second receiver 1402, for one embodiment, includes the antenna 420, the receiver 418, the multiple antenna receive processor 472, the receive processor 470, the controller/processor 475, and the memory 476 of fig. 4 of the present application.
For one embodiment, the second receiver 1402 includes the antenna 420, the receiver 418, the multi-antenna receive processor 472, and the receive processor 470 shown in fig. 4.
The second receiver 1402 includes the antenna 420, the receiver 418, and the receive processor 470 shown in fig. 4 of the present application, as an example.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a hard disk or an optical disk. Alternatively, all or part of the steps of the above embodiments may be implemented by using one or more integrated circuits. Accordingly, the module units in the above embodiments may be implemented in a hardware form, or may be implemented in a form of software functional modules, and the present application is not limited to any specific form of combination of software and hardware. User equipment, terminal and UE in this application include but not limited to unmanned aerial vehicle, Communication module on the unmanned aerial vehicle, remote control plane, the aircraft, small aircraft, the cell-phone, the panel computer, the notebook, vehicle-mounted Communication equipment, wireless sensor, network card, thing networking terminal, the RFID terminal, NB-IOT terminal, Machine Type Communication (MTC) terminal, eMTC (enhanced MTC) terminal, the data card, network card, vehicle-mounted Communication equipment, low-cost cell-phone, wireless Communication equipment such as low-cost panel computer. The base station or the system device in the present application includes, but is not limited to, a macro cell base station, a micro cell base station, a home base station, a relay base station, a gNB (NR node B) NR node B, a TRP (Transmitter Receiver Point), and other wireless communication devices.
The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A first node configured for wireless communication, comprising:
a first transmitter to transmit a first message;
a first receiver to monitor for a second message; the first message and the second message belong to the same random access process; judging whether the same random access process is finished according to whether the second message is detected or not;
wherein the act of determining whether the same random access procedure is complete based on whether the second message is detected comprises: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
2. The first node of claim 1, wherein the first MAC domain comprises at least one of an LCID domain or an eLCID domain, wherein the default value indicates a first type of MAC CE, and wherein the second message does not include the first type of MAC CE; wherein the first RNTI does not belong to the first set of reference RNTIs.
3. The first node of claim 1 or 2, wherein the first set of reference RNTIs comprises a given reference RNTI that is different from the C-RNTI.
4. The first node of claim 3, wherein the first message includes the given reference RNTI, and wherein the first RNTI is the given reference RNTI.
5. The first node according to claim 3 or 4, comprising:
the first receiver receiving first signaling used to indicate whether the first message includes the given reference RNTI;
wherein the first RNTI is the given reference RNTI.
6. The first node according to any of claims 3 to 5, comprising:
the first receiver sets the C-RNTI as the given reference RNTI.
7. The first node according to any of claims 3 to 6, comprising:
the first receiver sets the given reference RNTI as a second RNTI;
wherein the second RNTI is received in a first random access response that does not belong to the same random access procedure to which the first message and the second message belong.
8. A second node configured for wireless communication, comprising:
a second receiver receiving the first message;
a second transmitter for transmitting a second message;
wherein the first message and the second message belong to the same random access process; the same random access process is judged whether to be completed or not according to whether the second message is detected or not; the phrase that the same random access procedure is judged to be completed according to whether the second message is detected or not comprises: when the second message is detected in the first time unit set, the same random access process is judged to be successfully completed; when the second message is not detected in the first time unit set, the same random access process is judged to be incomplete; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
9. A method in a first node used for wireless communication, comprising:
sending a first message;
monitoring the second message; the first message and the second message belong to the same random access process;
judging whether the same random access process is finished according to whether the second message is detected or not;
wherein the act of determining whether the same random access procedure is complete based on whether the second message is detected comprises: when the second message is detected in the first time unit set, judging that the same random access process is successfully completed; when the second message is not detected in the first time unit set, judging that the same random access process is not completed; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
10. A method in a second node used for wireless communication, comprising:
receiving a first message;
sending a second message;
wherein the first message and the second message belong to the same random access process; the same random access process is judged whether to be completed or not according to whether the second message is detected or not; the phrase that the same random access procedure is judged to be completed according to whether the second message is detected or not comprises: when the second message is detected in the first time unit set, the same random access process is judged to be successfully completed; when the second message is not detected in the first time unit set, the same random access process is judged to be incomplete; the first set of time units comprises at least one time unit; the second message includes a first DCI identified by a first RNTI; at least the first RNTI is used to determine whether the second message includes a first MAC field equal to a default value; the phrase at least the first RNTI being used to determine whether the second message includes a first MAC field equal to a default value includes: the second message does not include the first MAC field equal to the default value when the first RNTI belongs to a first set of reference RNTIs; the second message includes the first MAC field equal to the default value when the first RNTI does not belong to a first set of reference RNTIs; the first set of reference RNTIs comprises at least C-RNTIs; scheduling information of a physical layer data channel occupied by the first MAC domain equal to the default value is indicated by the first DCI.
CN202110299999.4A 2021-03-22 2021-03-22 Method and arrangement in a communication node used for wireless communication Pending CN115119330A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110299999.4A CN115119330A (en) 2021-03-22 2021-03-22 Method and arrangement in a communication node used for wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110299999.4A CN115119330A (en) 2021-03-22 2021-03-22 Method and arrangement in a communication node used for wireless communication

Publications (1)

Publication Number Publication Date
CN115119330A true CN115119330A (en) 2022-09-27

Family

ID=83323184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110299999.4A Pending CN115119330A (en) 2021-03-22 2021-03-22 Method and arrangement in a communication node used for wireless communication

Country Status (1)

Country Link
CN (1) CN115119330A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018175597A1 (en) * 2017-03-23 2018-09-27 Sharp Laboratories Of America, Inc. User equipments, base stations and methods
WO2020167024A1 (en) * 2019-02-15 2020-08-20 Lg Electronics Inc. Method and apparatus for backhaul status reporting in wireless communication system
WO2020231104A1 (en) * 2019-05-14 2020-11-19 Samsung Electronics Co., Ltd. Method and apparatus for performing embedded radio resource control connection resume procedure in wireless communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018175597A1 (en) * 2017-03-23 2018-09-27 Sharp Laboratories Of America, Inc. User equipments, base stations and methods
WO2020167024A1 (en) * 2019-02-15 2020-08-20 Lg Electronics Inc. Method and apparatus for backhaul status reporting in wireless communication system
WO2020231104A1 (en) * 2019-05-14 2020-11-19 Samsung Electronics Co., Ltd. Method and apparatus for performing embedded radio resource control connection resume procedure in wireless communication system

Similar Documents

Publication Publication Date Title
CN114641092A (en) Method and arrangement in a communication node used for wireless communication
CN115209569A (en) Method and arrangement in a communication node used for wireless communication
CN113853028A (en) Method and arrangement in a communication node used for wireless communication
US20220240343A1 (en) Method and device used in communication node for wireless communication
CN115226252A (en) Method and arrangement in a communication node used for wireless communication
CN114268971A (en) Method and arrangement in a communication node used for wireless communication
CN115119330A (en) Method and arrangement in a communication node used for wireless communication
WO2022179590A1 (en) Method and device used in communication node for wireless communication
WO2024007870A1 (en) Method and apparatus used in communication node for wireless communication
CN113207172B (en) Method and apparatus in a node used for wireless communication
WO2024046155A1 (en) Method and apparatus used in communication node for wireless communication
WO2024114346A1 (en) Method and apparatus for communication node used for wireless communication
CN114630451A (en) Method and arrangement in a communication node used for wireless communication
CN115720379A (en) Method and arrangement in a communication node used for wireless communication
CN115603873A (en) Method and arrangement in a communication node used for wireless communication
CN116828624A (en) Method and apparatus in a communication node for wireless communication
CN117580187A (en) Method and apparatus in a communication node for wireless communication
CN117156594A (en) Method and apparatus in a communication node for wireless communication
CN117939708A (en) Method and apparatus in a communication node for wireless communication
CN117098252A (en) Method and apparatus in a communication node for wireless communication
CN117544203A (en) Method and apparatus in a communication node for wireless communication
CN117479337A (en) Method and apparatus in a communication node for wireless communication
CN116828579A (en) Method and apparatus in a communication node for wireless communication
CN114980367A (en) Method and arrangement in a communication node used for wireless communication
CN116684047A (en) Method and apparatus in a communication node for wireless communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination