CN115843464A - Wireless communication method, terminal equipment and network equipment - Google Patents

Wireless communication method, terminal equipment and network equipment Download PDF

Info

Publication number
CN115843464A
CN115843464A CN202080103164.0A CN202080103164A CN115843464A CN 115843464 A CN115843464 A CN 115843464A CN 202080103164 A CN202080103164 A CN 202080103164A CN 115843464 A CN115843464 A CN 115843464A
Authority
CN
China
Prior art keywords
random access
access type
terminal device
contention
logical channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202080103164.0A
Other languages
Chinese (zh)
Inventor
于新磊
李海涛
胡奕
卢前溪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN115843464A publication Critical patent/CN115843464A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a wireless communication method, terminal equipment and network equipment, wherein the method comprises the following steps: the method comprises the steps that terminal equipment obtains first configuration information of the terminal equipment, wherein the first configuration information is used for determining a first random access type of the terminal equipment; the terminal device performs random access according to the first random access type, so that the reliability of the random access can be improved.

Description

Wireless communication method, terminal equipment and network equipment Technical Field
The embodiments of the present application relate to the field of communications, and in particular, to a wireless communication method, a terminal device, and a network device.
Background
There are currently contention-based random access and non-contention-based random access, and contention-based random access includes: four-step random access based on contention and two-step random access based on contention. Before performing random access, a terminal device first selects a random access type, and in a New Radio (NR) system, the terminal device selects the random access type based on Reference Signal Received Power (RSRP) measurement. When the RSRP measured by the terminal equipment is higher than the RSRP threshold value configured by the network, the terminal equipment uses two-step random access; otherwise, the terminal equipment uses four-step random access.
In a Non-Terrestrial network (NTN) system, because the distance between a satellite and a ground gateway and between the satellite and a terminal device is long, the interaction time delay of a random access process of the terminal device is more prominent, and the network time delay can be effectively reduced by adopting two-step random access. However, the "near-far effect" is not obvious in the NTN system, that is, since the network device is far from each terminal device, the RSRP difference measured by the network device and the terminal devices at different positions is not obvious, and based on this, if the mode of determining the random access type in the NR system is still adopted, the situation that the random access type is difficult to determine is caused, and the random access reliability is further reduced.
Disclosure of Invention
The embodiment of the application provides a wireless communication method, terminal equipment and network equipment, so that the random access type of the terminal equipment can be determined, and the reliability of random access can be improved.
In a first aspect, a wireless communication method is provided, including: the method comprises the steps that terminal equipment obtains first configuration information of the terminal equipment, wherein the first configuration information is used for determining a first random access type of the terminal equipment; and the terminal equipment carries out random access according to the first random access type.
In a second aspect, a wireless communication method is provided, including: the network equipment sends first configuration information of the terminal equipment to the terminal equipment, and the first configuration information is used for determining a first random access type of the terminal equipment.
In a third aspect, a terminal device is provided, configured to perform the method in the first aspect or each implementation manner thereof.
Specifically, the terminal device includes a functional module for executing the method in the first aspect or each implementation manner thereof.
In a fourth aspect, a network device is provided for performing the method of the second aspect or its implementation manners.
In particular, the network device comprises functional modules for performing the methods of the second aspect or its implementations described above.
In a fifth aspect, a terminal device is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory, and executing the method in the first aspect or each implementation manner thereof.
In a sixth aspect, a network device is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory, and executing the method of the second aspect or each implementation mode thereof.
In a seventh aspect, an apparatus is provided for implementing the method in any one of the first to second aspects or implementations thereof.
Specifically, the apparatus includes: a processor configured to call and run the computer program from the memory, so that the device on which the apparatus is installed performs the method according to any one of the first aspect to the second aspect or the implementation manner thereof.
In an eighth aspect, a computer-readable storage medium is provided for storing a computer program, the computer program causing a computer to perform the method of any one of the first to second aspects or implementations thereof.
In a ninth aspect, there is provided a computer program product comprising computer program instructions to cause a computer to perform the method of any one of the first to second aspects or implementations thereof.
A tenth aspect provides a computer program which, when run on a computer, causes the computer to perform the method of any one of the first to second aspects or implementations thereof.
Through the technical scheme, the terminal device can determine the first random access type of the terminal device according to the first configuration information, and because the network device either directly carries the first random access type in the first configuration information or the terminal device determines the first random access type according to any one of the first logical channel list, the second logical channel list and the corresponding relationship and the logical channel where the BSR triggered by the uplink data of the terminal device is located, the method can not depend on the RSRP measured by the terminal device or not only on the RSRP measured by the terminal device, that is, even if the near-far effect in the NTN system is not obvious, the situation that the first random access type cannot be determined is avoided, so that the reliability of random access is improved, and two-step random access can be effectively utilized to reduce access delay.
Drawings
Fig. 1A is a schematic architecture diagram of a communication system according to an embodiment of the present application;
fig. 1B is a schematic architecture diagram of another communication system according to an embodiment of the present application;
fig. 2 is a flow interaction diagram of a contention-based four-step random access procedure;
fig. 3 is a flow interaction diagram of a non-contention based four-step random access procedure;
fig. 4A is a flow interaction diagram of a contention-based two-step random access procedure;
fig. 4B is a flow interaction diagram of a non-contention based two-step random access procedure;
FIG. 5 is a schematic diagram of the "near-far effect" in the NR system;
FIG. 6 is a schematic diagram of the "near-far effect" in the NTN system;
fig. 7 is an interaction flow diagram of a wireless communication method according to an embodiment of the present application;
fig. 8 shows a schematic block diagram of a terminal device 800 according to an embodiment of the application;
FIG. 9 shows a schematic block diagram of a network device 900 according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a communication device 1000 according to an embodiment of the present application;
FIG. 11 is a schematic block diagram of an apparatus according to an embodiment of the present application;
fig. 12 is a schematic block diagram of a communication system 1200 provided in an embodiment of the present application.
Detailed Description
Technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art without making any creative effort with respect to the embodiments in the present application belong to the protection scope of the present application.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a Global System for Mobile communications (GSM) System, a Code Division Multiple Access (CDMA) System, a Wideband Code Division Multiple Access (WCDMA) System, a General Packet Radio Service (GPRS), a Long Term Evolution (Long Term Evolution, LTE) System, an Advanced Long Term Evolution (LTE-a) System, an NR System, an Evolution System of an NR System, an LTE (LTE-based Access to unlicensed spectrum, LTE-U) System on an unlicensed spectrum, an NR-based Access to unlicensed spectrum, an NR-U) System, an NTN System, a Universal Mobile Telecommunications System (UMTS), a Wireless Local Area Network (WLAN) System, a Wireless Local Area network (5) System, a Wireless Local Area network (WiFi) System, a Wireless Local Area Network (WLAN) System, a Wireless Local Area network (5-5) System, and the like.
Generally, the conventional Communication system supports a limited number of connections and is easy to implement, however, with the development of Communication technology, the mobile Communication system will support not only conventional Communication but also, for example, device-to-Device (D2D) Communication, machine-to-Machine (M2M) Communication, machine Type Communication (MTC), and Vehicle-to-Vehicle (V2V) Communication, or Vehicle networking V2X Communication, and the embodiments of the present application can also be applied to these Communication systems.
Optionally, the communication system in the embodiment of the present application may be applied to a Carrier Aggregation (CA) scenario, may also be applied to a Dual Connectivity (DC) scenario, and may also be applied to an independent (SA) networking scenario.
Optionally, the embodiments of the present application may be applied to an unlicensed spectrum, and may also be applied to a licensed spectrum. The unlicensed spectrum may also be considered as a shared spectrum, and the licensed spectrum may also be considered as an unshared spectrum.
Optionally, the embodiments of the present application may be applied to an NTN system, and may also be applied to a Terrestrial Network (TN) system.
The embodiments of the present application have been described with reference to a network device and a terminal device, where: a terminal device may also be referred to as a User Equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a User terminal, a wireless communication device, a User agent, or a User Equipment, etc. The terminal device may be a Station (ST) in a WLAN, and may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with Wireless communication function, a computing device or other processing device connected to a Wireless modem, a vehicle-mounted device, a wearable device, and a next generation communication system, for example, a terminal device in an NR Network or a terminal device in a future-evolution Public Land Mobile Network (PLMN) Network, and the like.
In the embodiment of the application, the terminal equipment can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted; can also be deployed on the water surface (such as a ship and the like); and may also be deployed in the air (e.g., airplanes, balloons, satellites, etc.).
In the embodiment of the present application, the terminal device may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal in industrial control (industrial control), a vehicle-mounted terminal device, a wireless terminal in self driving (self driving), a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation safety (transportation safety), a wireless terminal in city (smart city), a wireless terminal in smart home (smart home), a wearable terminal device, and the like. The terminal device according to the embodiments of the present application may also be referred to as a terminal, a User Equipment (UE), an access terminal device, a vehicle-mounted terminal, an industrial control terminal, a UE unit, a UE station, a mobile station, a remote terminal device, a mobile device, a UE terminal device, a wireless communication device, a UE agent, or a UE apparatus. The terminal equipment may also be fixed or mobile.
By way of example and not limitation, in the embodiments of the present application, the terminal device may also be a wearable device. Wearable equipment can also be called wearable intelligent equipment, is the general term of equipment that uses wearable technique to carry out intelligent design, develop can dress to daily wearing, such as glasses, gloves, wrist-watch, dress and shoes. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
The network device may be a device for communicating with the mobile device. The network device may be an Access Point (AP) in a WLAN, a Base Station (BTS) in GSM or CDMA, a Base Station (NodeB, NB) in WCDMA, an evolved Node B (eNB or eNodeB) in LTE, a relay Station or an Access Point, or a vehicle-mounted device, a wearable device, a network device (gNB) in an NR network, or a network device in a future evolved PLMN network.
The network device may have mobile characteristics, for example, the network device may be a mobile device. Alternatively, the network device may be a satellite, balloon station. For example, the satellite may be a Low Earth Orbit (LEO) satellite, a Medium Earth Orbit (MEO) satellite, a geosynchronous Orbit (GEO) satellite, a High Elliptic Orbit (HEO) satellite, and the like. Alternatively, the network device may be a base station installed on land, water, or the like.
In this embodiment of the present application, a network device may provide a service for a cell, and a terminal device communicates with the network device through a transmission resource (e.g., a frequency domain resource or a spectrum resource) used by the cell, where the cell may be a cell corresponding to the network device (e.g., a base station), and the cell may belong to a macro base station or a base station corresponding to a Small cell (Small cell), where the Small cell may include: urban cells (Metro cells), micro cells (Micro cells), pico cells (Pico cells), femto cells (Femto cells), and the like, and the small cells have the characteristics of small coverage area and low transmission power, and are suitable for providing high-rate data transmission services.
The architecture of the communication system in the present application is described below with reference to fig. 1A to 1B.
Fig. 1A is a schematic architecture diagram of a communication system according to an embodiment of the present application. Referring to fig. 1A, terminal device 1101 and satellite 1102 are included, and wireless communication is enabled between terminal device 1101 and satellite 1102. The network formed between terminal device 1101 and satellite 1102 may also be referred to as an NTN. In the architecture of the communication system shown in fig. 1A, a satellite 1102 may function as a base station, and direct communication may be performed between a terminal device 1101 and the satellite 1102. Under the system architecture, the satellite 1102 may be referred to as a network device. Optionally, the communication system may include a plurality of network devices 1102, and each network device 1102 may include other number of terminal devices within a coverage area thereof, which is not limited in this embodiment of the present application.
Fig. 1B is a schematic architecture diagram of another communication system according to an embodiment of the present application. Referring to fig. 1B, terminal device 1201, satellite 1202, and base station 1203 are included, and terminal device 1201 and satellite 1202 may communicate wirelessly, and satellite 1202 and base station 1203 may communicate wirelessly. The network formed between terminal device 1201, satellite 1202, and base station 1203 may also be referred to as an NTN. In the architecture of the communication system shown in fig. 1B, the satellite 1202 may not have the function of a base station, and the communication between the terminal apparatus 1201 and the base station 1203 requires relay through the satellite 1202. Under this system architecture, base station 1203 may be referred to as a network device. Optionally, the communication system may include a plurality of network devices 1203, and the coverage area of each network device 1203 may include other number of terminal devices, which is not limited in this embodiment of the present application.
It should be noted that fig. 1A-1B illustrate only an exemplary system to which the present application is applied, but of course, the method shown in the embodiment of the present application may also be applied to other systems, for example, a 5G communication system, an LTE communication system, and the like, and the embodiment of the present application is not limited to this specifically.
Optionally, the wireless communication system shown in fig. 1A-1B may further include other network entities such as a Mobility Management Entity (MME), an Access and Mobility Management Function (AMF), and the like, which is not limited in this embodiment of the present invention.
It should be understood that the terms "system" and "network" are often used interchangeably herein.
In the description of the embodiments of the present application, the term "correspond" may indicate that there is a direct correspondence or an indirect correspondence between the two, may also indicate that there is an association between the two, and may also indicate and be indicated, configure and configured, and so on.
In order to clearly illustrate the idea of the embodiments of the present application, first, related technical contents of the embodiments of the present application are briefly described. Embodiments of the present application include at least some of the following.
1. The random access procedure is mainly triggered by the following events:
(1) Initial access (initial access): the terminal device goes from a Radio Resource Control (RRC) IDLE state (RRC _ IDLE) to an RRC CONNECTED state (RRC _ CONNECTED).
(2) RRC Connection reestablishment (RRC Connection Re-establishment).
(3) Handover (handover), i.e. the terminal device needs to establish uplink synchronization with the new cell.
(4) Under RRC _ CONNECTED, downlink (DL) data arrives while Uplink (UL) is in an out-of-sync state.
(5) Under RRC _ CONNECTED, UL data arrives while the UL is out of sync.
(6) Under RRC _ CONNECTED, UL data arrives, and there is no Physical Uplink Control Channel (PUCCH) resource available for Scheduling Request (SR) transmission. At this time, the terminal device already in the uplink synchronization state may be allowed to use a Random Access Channel (RACH) instead of the role of the SR.
(7) A synchronous reconfiguration request from RRC.
(8) The terminal transitions from an RRC INACTIVE state (RRC _ INACTIVE) to an ACTIVE state (RRC _ ACTIVE).
(9) Time alignment is established during a Secondary serving Cell (SCell) addition.
(10) The terminal device requests Other System Information (OSI).
(11) And (4) recovering the beam failure of the terminal equipment.
2. And (3) random access process:
in Release NR (Release) -15, the following two random access methods, a contention-based random access method and a non-contention-based random access method, are mainly supported.
For ease of understanding, the random access procedure will be briefly described below in conjunction with fig. 2 and 3.
Fig. 2 is a flow interaction diagram of a contention-based four-step random access procedure.
As shown in fig. 2, the random access procedure may include the following four steps:
step 1, msg1.
The terminal device sends Msg1 to the base station to tell the network device that the terminal device has initiated a Random Access request, where the Msg1 carries a Random Access Preamble (RAP), or is called a Random Access Preamble sequence, a Preamble, and the like. Meanwhile, the Msg1 can also be used for the network device to estimate the transmission delay between the network device and the terminal device and calibrate the uplink time.
Specifically, the terminal device selects a preamble index (index) and a PRACH resource for transmitting a preamble; and then the terminal equipment transmits a Preamble on the PRACH. The network device may notify all terminal devices through broadcasting a System Information Block (SIB), and allow preamble to be transmitted on which time-frequency resources, for example, SIB1.
Step 2, msg 2.
After receiving the Msg1 sent by the terminal device, the network device sends Msg 2, that is, a Random Access Response (RAR) message to the terminal device. The Msg 2 may carry, for example, a Time Advance (TA), an uplink grant instruction, such as configuration of an uplink resource, a Temporary Cell-Radio Network Temporary Identity (TC-RNTI), and the like.
The terminal device monitors a Physical Downlink Control Channel (PDCCH) in a random access response time window (RAR window) for receiving an RAR message replied by the network device. The RAR message may be descrambled using a corresponding Random Access Radio Network Temporary Identifier (RA-RNTI).
And if the terminal equipment does not receive the RAR message replied by the network equipment in the RAR time window, the random access process is considered to fail.
If the terminal device successfully receives an RAR message and a preamble index (preamble index) carried in the RAR message is the same as the preamble index sent by the terminal device through Msg1, it is considered that the RAR is successfully received, and at this time, the terminal device may stop monitoring within the RAR time window.
The Msg 2 may include RAR messages for multiple terminal devices, and the RAR message of each terminal device may include a random access preamble identifier (RAP identity, RAPID), information of resources used for transmitting Msg 3, TA adjustment information, TC-RNTI, and the like, which are used by the terminal device.
Step 3, msg 3.
After receiving the RAR message, the terminal device determines whether the RAR is an RAR message belonging to the terminal device, for example, the terminal device may perform a check by using a preamble identifier, and after determining that the RAR message belongs to the terminal device, the terminal device generates Msg 3 in an RRC layer and sends Msg 3 to the network device. Wherein identification information of the terminal device, etc. needs to be carried.
Specifically, the Msg 3 in step 3 of the 4-step random access procedure may include different contents for different random access trigger events to perform Scheduled Transmission (Scheduled Transmission).
For example, for the initial Access scenario, msg 3 may include an RRC Connection Request (RRC Connection Request) generated by an RRC layer, where at least Non-Access Stratum (NAS) identification information of the terminal device is carried, and may also carry, for example, a service-Temporary Mobile Subscriber Identity (S-TMSI) or a random number of the terminal device.
For another example, for a Connection reestablishment scenario, msg 3 may include an RRC Connection reestablishment Request (RRC Connection Re-establishment Request) generated by the RRC layer and not carry any NAS message, and may also carry, for example, a Cell Radio Network Temporary Identifier (C-RNTI) and Protocol Control Information (PCI), etc.
For another example, for a Handover scenario, the Msg 3 may include an RRC Handover complete message (RRC Handover Confirm) generated by the RRC layer and a C-RNTI of the terminal device, and may also carry, for example, a Buffer Status Report (BSR); for other triggering events such as the scene of uplink/downlink data arrival, msg 3 at least needs to include the C-RNTI of the terminal device.
Step 4, msg 4.
The network device sends Msg 4 to the terminal device, and the terminal device correctly receives Msg 4 to complete Contention Resolution (Contention Resolution). For example, in the RRC connection establishment procedure, the Msg 4 may carry an RRC connection establishment message.
Since the terminal device in step 3 will carry its unique identity in Msg 3, such as C-RNTI or identification information from the core network (e.g. S-TMSI or a random number), the network device will carry the unique identity of the terminal device in Msg 4 in the contention resolution mechanism to designate the terminal device that wins the contention. While other terminal devices that have not won contention resolution will re-initiate random access.
Fig. 3 is a flow interaction diagram of a non-contention based four-step random access procedure.
As shown in fig. 3, the random access procedure may include the first two steps in fig. 2 (i.e., step 1 and step 2 in fig. 2). Wherein:
step 0, the network device sends a random access Preamble assignment (RA Preamble assignment) message to the terminal device.
Step 1, msg1.
The terminal device sends Msg1 to the base station to inform the network device that the terminal device initiates a random access request, wherein the Msg1 carries a random access preamble.
Step 2, msg 2.
After receiving the Msg1 sent by the terminal device, the network device sends Msg 2, namely an RAR message, to the terminal device. The Msg 2 may carry TA information, an uplink grant instruction such as configuration of uplink resources, and TC-RNTI and other information, for example.
And if the terminal equipment does not receive the RAR message replied by the network equipment in the RAR time window, the random access process is considered to be failed. If the terminal device successfully receives an RAR message and the preamble index carried in the RAR message is the same as the preamble index sent by the terminal device through Msg1, the terminal device determines that the RAR message is successfully received, and at this time, the terminal device can stop monitoring the RAR message.
For Msg1 and Msg 2 in the non-contention random access process, reference may be specifically made to the foregoing description of Msg1 and Msg 2 in the contention-based random access process, and for brevity, details are not described here again.
The NR Rel-16 version introduces a two-step random access procedure, the introduction of which can reduce latency while reducing signaling overhead. Fig. 4A is a flow interaction diagram of a contention-based two-step random access procedure, which may include, as shown in fig. 4A:
step 1, msg A.
Wherein the MsgA comprises: a Preamble transmitted on the PRACH and load information transmitted on a Physical Uplink Shared Channel (PUSCH).
Step 2, msgB.
After MsgA transmission, the terminal device monitors the response of the network side in a configured window, and if an indication of successful contention resolution issued by the network is received, the terminal device ends the random access process.
Fig. 4B is a flow interaction diagram of a non-contention based two-step random access procedure, which may include, as shown in fig. 4B:
step 0, the network device sends a random access Preamble assignment (RA Preamble assignment) message to the terminal device.
Step 1, msg a.
Wherein the MsgA comprises: preamble transmitted on PRACH and load information transmitted on PUSCH.
Step 2, msgB.
After the MsgA transmission, the terminal device receives the MsgB, i.e. the random access response.
As described above, in the NR system, the terminal device selects a random access type based on RSRP measurement. When the RSRP measured by the terminal equipment is higher than the RSRP threshold value configured by the network, the terminal equipment uses two-step random access; otherwise, the terminal equipment uses four-step random access. As shown in fig. 5, the "near-far effect" is significant in the NR system. As shown in fig. 6, the "near-far effect" is not obvious in the NTN, and based on this, if the method for determining the random access type in the NR system is still adopted, on one hand, it is difficult to set an appropriate RSRP threshold for random access type selection, and on the other hand, since the capability difference between terminal devices is significant in the NTN system, the method for selecting the random access type based on RSRP measurement is likely to cause the terminal device to select an inappropriate random access type. For example: for terminal equipment with high performance, due to low measured RSRP, four-step random access is selected, so that the random access time delay is increased; for a terminal device with low performance, due to high measured RSRP, two-step random access is selected, and after two-step random access is tried for several times, the terminal device is unsuccessful, and finally, the terminal device has to fall back to four-step random access or directly causes random access failure, which seriously affects user experience. In a word, the random access type is selected based on RSRP measurement, which causes a situation that the random access type is difficult to determine, and further reduces the reliability of random access.
In order to solve the technical problem, the random access type can be determined through configuration information sent by the network device to the terminal device, and then the random access process is realized.
The technical solution of the present application will be explained by the following specific examples:
fig. 7 is an interaction flowchart of a wireless communication method according to an embodiment of the present application, and as shown in fig. 7, the method includes the following steps:
step S710: the network equipment sends first configuration information to the terminal equipment, wherein the first configuration information is used for determining a first random access type of the terminal equipment.
Step S720: and the terminal equipment carries out random access according to the first random access type.
The following describes step S710:
optionally, the first configuration information may include any one of, but is not limited to:
(1) A first random access type.
(2) And a first logic channel list corresponding to the two-step random access mode based on competition.
(3) And a second logic channel list corresponding to the four-step random access mode based on competition.
(4) A first logic channel list corresponding to the contention-based two-step random access mode and a second logic channel list corresponding to the contention-based four-step random access mode.
(5) A correspondence of at least one logical channel and at least one random access type.
It should be understood that the first logical channel list corresponding to the contention-based two-step random access scheme represents: the logical channel and the random access method have a correspondence relationship, for example: logical channel 1 corresponds to contention-based two-step random access, and channel 2 corresponds to contention-based four-step random access. And the random access modes corresponding to the logical channels in the first logical channel list are both contention-based two-step random access modes.
It should be understood that the second logical channel list corresponding to the contention-based four-step random access scheme represents: the logical channel and the random access mode have a corresponding relationship. And the random access modes corresponding to the logical channels in the second logical channel list are all four-step random access modes based on competition.
It should be understood that the correspondence relationship between at least one logical channel and at least one random access type may be that the at least one logical channel corresponds to a contention-based two-step random access manner, or that the at least one logical channel corresponds to a contention-based four-step random access manner, or that a part of the logical channels in the at least one logical channel corresponds to a contention-based two-step random access manner and another part of the logical channels corresponds to a contention-based four-step random access manner. The present application does not limit the correspondence relationship.
Optionally, if the first configuration information carries the first random access type. The first random access type may be determined according to the capabilities of the terminal device.
Optionally, the length of the first random access type carried by the first configuration information may be 1 bit, or may be other lengths, which is not limited in this application.
It should be understood that the capability of the terminal device can be measured by various software and hardware parameters of the terminal device, and the software and hardware parameters herein are not limited by the present application.
Optionally, if the capability of the terminal device satisfies a preset condition, such as that the above software and hardware parameters satisfy a threshold value greater than or less than a corresponding preset threshold value, the first random access type may be a contention-based two-step random access type. In contrast, the first random access type may be a contention-based four-step random access type. Or, the capability level of the terminal device may be determined according to various software and hardware parameters of the terminal device, and the capability level has a corresponding relationship with the random access type, so that the network device may also determine the first random access type according to the corresponding relationship. In summary, the present application does not limit how the first random access type is determined according to the capability of the terminal device.
Optionally, if the first configuration information carries a first logical channel list, and a logical channel where a Buffer Status Report (BSR) triggered by uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type. Otherwise, the first random access type is a contention-based four-step random access type, that is, if the logical channel where the BSR triggered by the uplink data of the terminal device is located is not in the first logical channel list, the first random access type is a contention-based four-step random access type.
Optionally, if the first configuration information carries a second logical channel list and a logical channel where a BSR triggered by uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type. Otherwise, the first random access type is a contention-based two-step random access type, that is, if the logical channel where the BSR triggered by the uplink data of the terminal device is located is not in the second logical channel list, the first random access type is a contention-based two-step random access type.
Optionally, if the first configuration information includes: and if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type. Or, if the first configuration information includes: and if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type.
Optionally, if the first configuration information includes: a correspondence of at least one logical channel and at least one random access type. And the at least one logical channel includes a logical channel where the BSR triggered by the uplink data of the terminal device is located, and correspondingly, the first random access type is determined according to the logical channel where the BSR triggered by the uplink data of the terminal device is located and the corresponding relationship. For example: the correspondence between at least one logical channel and at least one random access type is shown in table 1.
TABLE 1
Logical channel Type of random access
First kindLogical channel Contention-based two-step random access type
Logical channels of the second type Four-step random access type based on competition
Assuming that a logical channel where a BSR triggered by uplink data of the terminal device is located is a logical channel 1, the first random access type is a contention-based two-step random access type.
Optionally, the first configuration information may not include the first logical channel list but include an identifier of the first logical channel list, and likewise, the first configuration information may not include the second logical channel list but include an identifier of the second logical channel list.
Optionally, the length of the identifier of the first logical channel list may be 1 bit, or may be other lengths, which is not limited in this application.
Optionally, the length of the identifier of the second logical channel list may be 1 bit, or may be other lengths, which is not limited in this application.
Optionally, the first configuration information may also include any combination of the following items: (1) a first random access type. (2) And a first logic channel list corresponding to the two-step random access mode based on competition. (3) And a second logic channel list corresponding to the four-step random access mode based on competition. (4) A first logic channel list corresponding to the contention-based two-step random access mode and a second logic channel list corresponding to the contention-based four-step random access mode. (5) A correspondence of at least one logical channel and at least one random access type.
If the first configuration information includes any combination of the above items, the terminal device and the network device may negotiate which way to determine the first random access type, and the present application does not limit how the terminal device and the network device negotiate.
Optionally, the first random access type is a contention-based two-step random access type or a contention-based four-step random access type.
Optionally, the first configuration information is carried in RRC signaling, for example: the first configuration information may also be carried in other signaling, such as a Media Access Control Element (MAC CE), which is not limited in this application.
Optionally, the RRC signaling may be RRC reconfiguration signaling.
Optionally, the network device may further send the contention based two-step random access resource configuration and the contention based four-step random access resource configuration to the terminal device.
It should be understood that the contention-based two-step random access resource configuration is a contention-based two-step random access MsgA resource configuration, including a RACH resource configuration of MsgA and a PUSCH resource configuration of MsgA.
It should be understood that the contention based four-step random access resource configuration is a RACH resource configuration of the contention based four-step random access.
Step S720 is explained as follows:
alternatively, the case that the first configuration information carries the first random access type may be applicable to any random access procedure, and therefore, the terminal device determines whether it is configured with the non-contention based random access resource before performing step S720. If the non-contention based random access resource is configured, the terminal device may adopt the non-contention based random access scheme, that is, without performing step S720, and if the non-contention based random access resource is configured, the terminal device may adopt the contention based random access scheme, that is, without performing step S720.
Optionally, the first configuration information carries the first logical channel list, or carries the second logical channel list, or carries the first logical channel list and the second logical channel list, or carries the correspondence between at least one logical channel and at least one random access type. I.e. these are all related to logical channels, these are related to uplink resource applications, which do not involve non-contention based random access procedures, so that the terminal device does not need to determine whether it is configured with non-contention based random access resources.
It should be understood that no matter what information is carried by the first configuration information, if the random access procedure is for uplink resource application, i.e. UL data arrives under RRC _ CONNECTED, there is no available PUCCH resource for Scheduling Request (SR) transmission. At this time, the terminal device may be allowed to use the RACH instead of the role of SR. That is, when the terminal device fails to request uplink resources through the BSR and the SR, the terminal device performs random access according to the first random access type.
It should be understood that, the failure of the terminal device to request uplink resources through the BSR and SR is also described as SR request failure, and the SR request failure may be no SR resources or SR up to the maximum number of retransmissions, but is not limited thereto.
Optionally, the terminal device performs random access according to the first random access type, which may be implemented by any one of the following manners, but is not limited to this:
(1) And the terminal equipment carries out random access by adopting a random access mode corresponding to the first random access type.
(2) And the terminal equipment performs random access according to the measured RSRP and the first random access type.
Description will be made with respect to (1):
if the first random access type is a contention-based two-step random access type, the terminal device performs random access by using the contention-based two-step random access type. If the first random access type is a contention-based four-step random access type, the terminal device performs random access by using the contention-based four-step random access type.
Description will be made with respect to (2):
optionally, if the first random access type is a contention-based two-step random access type, and the measured RSRP is greater than or equal to the RSRP threshold, a contention-based two-step random access manner is adopted for random access. And if the first random access type is a competition-based four-step random access type or the measured RSRP is smaller than the RSRP threshold, performing random access by adopting a competition-based four-step random access mode. Alternatively, the first and second electrodes may be,
optionally, if the first random access type is a contention-based two-step random access type, and the measured RSRP is greater than the RSRP threshold, a contention-based two-step random access manner is adopted for random access. And if the first random access type is a competition-based four-step random access type, or the measured RSRP is less than or equal to the RSRP threshold, performing random access by adopting a competition-based four-step random access mode. Alternatively, the first and second electrodes may be,
optionally, if the first random access type is a contention-based four-step random access type and the measured RSRP is less than or equal to the RSRP threshold, performing random access in a contention-based four-step random access manner. And if the first random access type is a competition-based two-step random access type, or the measured RSRP is larger than the RSRP threshold value, performing random access by adopting a competition-based two-step random access mode. Alternatively, the first and second liquid crystal display panels may be,
optionally, if the first random access type is a contention-based four-step random access type and the measured RSRP is smaller than the RSRP threshold, performing random access in a contention-based four-step random access manner. And if the first random access type is a competition-based two-step random access type, or the measured RSRP is greater than or equal to the RSRP threshold, performing random access by adopting a competition-based two-step random access mode.
Optionally, the RSRP threshold may be predefined by the network device or the terminal device, or obtained by negotiation of the network device or the terminal device, which is not limited in this application.
Optionally, if the terminal device determines to perform random access by using a contention-based two-step random access method, the terminal device selects an RACH resource of one MsgA and a PUSCH resource of one MsgA from an MsgA resource pool of two-step random access configured by the network, and sends the MsgA on the selected resources.
Optionally, if the terminal device determines to perform random access in a contention-based four-step random access manner, the terminal device selects an RACH resource from a RACH resource pool of four-step random access configured by the network, and sends Msg1 on the selected resource.
To sum up, in the present application, the terminal device may determine the first random access type of the terminal device according to the first configuration information, and since the network device either directly carries the first random access type in the first configuration information, or the terminal device determines the first random access type according to any one of the first logical channel list, the second logical channel list, and the correspondence relationship, and the logical channel where the BSR triggered by the uplink data of the terminal device is located, this way may not depend on the RSRP measured by the terminal device or not only on the RSRP measured by the terminal device, that is, even if the "near-far effect" in the NTN system is not obvious, the situation that the first random access type cannot be determined is not caused, so that the reliability of random access is improved, and meanwhile, the two-step random access can be effectively utilized to reduce the access delay.
While method embodiments of the present application are described in detail above with reference to fig. 7, apparatus embodiments of the present application are described in detail below with reference to fig. 8-12, it being understood that apparatus embodiments correspond to method embodiments and that similar descriptions may refer to method embodiments.
Fig. 8 shows a schematic block diagram of a terminal device 800 according to an embodiment of the application. As shown in fig. 8, the terminal apparatus 800 includes: the terminal device comprises a communication unit 810 and a processing unit 820, wherein the communication unit 810 is configured to obtain first configuration information of the terminal device, and the first configuration information is used for determining a first random access type of the terminal device. The processing unit 820 is configured to perform random access according to a first random access type.
Optionally, the first configuration information includes: a first random access type.
Optionally, the communication unit 810 is further configured to report the capability of the terminal device to the network device. Wherein the capabilities of the terminal device are used to determine the first random access type.
Optionally, the first configuration information includes: and a first logic channel list corresponding to the two-step random access mode based on competition. Correspondingly, if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type. Otherwise, the first random access type is a four-step random access type based on competition.
Optionally, the first configuration information includes: and a second logic channel list corresponding to the four-step random access mode based on competition. Correspondingly, if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type. Otherwise, the first random access type is a contention-based two-step random access type.
Optionally, the first configuration information includes: a first logic channel list corresponding to the contention-based two-step random access mode and a second logic channel list corresponding to the contention-based four-step random access mode. Correspondingly, if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type. And if the logical channel where the BSR triggered by the uplink data of the terminal equipment is located is in the second logical channel list, the first random access type is a contention-based four-step random access type.
Optionally, the first configuration information includes: a correspondence of at least one logical channel and at least one random access type. Correspondingly, the first random access type is determined according to the logical channel and the corresponding relationship where the BSR triggered by the uplink data of the terminal device is located.
Optionally, the processing unit 820 is specifically configured to: and performing random access by adopting a random access mode corresponding to the first random access type. Or performing random access according to the measured RSRP and the first random access type.
Optionally, the processing unit 820 is specifically configured to: and if the first random access type is a competition-based two-step random access type and the measured RSRP is greater than or equal to the RSRP threshold, performing random access by adopting a competition-based two-step random access mode. Otherwise, random access is carried out by adopting a four-step random access mode based on competition.
Optionally, the processing unit 820 is specifically configured to: and if the first random access type is a competition-based four-step random access type and the measured RSRP is less than or equal to the RSRP threshold, performing random access by adopting a competition-based four-step random access mode. Otherwise, random access is carried out by adopting a two-step random access mode based on competition.
Optionally, the processing unit 820 is specifically configured to: and when the terminal equipment fails to request uplink resources through the BSR and the SR, performing random access according to the first random access type.
Optionally, the communication unit 810 is further configured to obtain a contention based two-step random access resource configuration and a contention based four-step random access resource configuration.
Optionally, the first configuration information is carried in RRC signaling.
Optionally, the first random access type is a contention-based two-step random access type or a contention-based four-step random access type.
Optionally, in some embodiments, the communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system on a chip. The processing unit may be one or more processors.
It should be understood that the terminal device 800 according to the embodiment of the present application may correspond to the terminal device in the embodiment of the method of the present application, and the above and other operations and/or functions of each unit in the terminal device 800 are respectively for implementing the corresponding flow of the terminal device in the method shown in fig. 7, and are not described herein again for brevity.
Fig. 9 shows a schematic block diagram of a network device 900 according to an embodiment of the application. As shown in fig. 9, the network device 900 includes: a communication unit 910, configured to send first configuration information of a terminal device to the terminal device, where the first configuration information is used to determine a first random access type of the terminal device.
Optionally, the first configuration information includes: a first random access type.
Optionally, the communication unit 910 is further configured to obtain the capability of the terminal device. Wherein the capabilities of the terminal device are used to determine the first random access type.
Optionally, the first configuration information includes: and a first logic channel list corresponding to the two-step random access mode based on competition. Correspondingly, if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type. Otherwise, the first random access type is a four-step random access type based on competition.
Optionally, the first configuration information includes: and a second logic channel list corresponding to the four-step random access mode based on competition. Correspondingly, if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type. Otherwise, the first random access type is a contention-based two-step random access type.
Optionally, the first configuration information includes: a first logic channel list corresponding to the contention-based two-step random access mode and a second logic channel list corresponding to the contention-based four-step random access mode. Correspondingly, if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type. And if the logical channel where the BSR triggered by the uplink data of the terminal equipment is located is in the second logical channel list, the first random access type is a contention-based four-step random access type.
Optionally, the first configuration information includes: a correspondence of at least one logical channel and at least one random access type. Correspondingly, the first random access type is determined according to the logical channel and the corresponding relationship where the BSR triggered by the uplink data of the terminal device is located.
Optionally, the communication unit 910 is further configured to send the contention based two-step random access resource configuration and the contention based four-step random access resource configuration to the terminal device.
Optionally, the first configuration information is carried in RRC signaling.
Optionally, the first random access type is a contention-based two-step random access type or a contention-based four-step random access type.
Optionally, in some embodiments, the communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system on a chip.
It should be understood that the network device 900 according to the embodiment of the present application may correspond to a network device in the embodiment of the method of the present application, and the above and other operations and/or functions of each unit in the network device 900 are respectively for implementing a corresponding flow of the network device in the method shown in fig. 7, and are not described herein again for brevity.
Fig. 10 is a schematic structural diagram of a communication device 1000 according to an embodiment of the present application. The communication device 1000 shown in fig. 10 includes a processor 1010, and the processor 1010 may call and execute a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 10, the communication device 1000 may further include a memory 1020. From the memory 1020, the processor 1010 may call and execute a computer program to implement the method in the embodiment of the present application.
The memory 1020 may be a separate device from the processor 1010 or may be integrated into the processor 1010.
Optionally, as shown in fig. 10, the communication device 1000 may further include a transceiver 1030, and the processor 1010 may control the transceiver 1030 to communicate with other devices, and specifically, may transmit information or data to the other devices or receive information or data transmitted by the other devices.
The transceiver 1030 may include a transmitter and a receiver, among others. The transceiver 1030 may further include an antenna, and the number of antennas may be one or more.
Optionally, the communication device 1000 may specifically be a network device in the embodiment of the present application, and the communication device 1000 may implement a corresponding process implemented by the network device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Optionally, the communication device 1000 may specifically be a terminal device in the embodiment of the present application, and the communication device 1000 may implement a corresponding process implemented by the terminal device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Fig. 11 is a schematic configuration diagram of an apparatus according to an embodiment of the present application. The apparatus 1100 shown in fig. 11 includes a processor 1110, and the processor 1110 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 11, the apparatus 1100 may further include a memory 1120. From the memory 1120, the processor 1110 can call and run a computer program to implement the method in the embodiment of the present application.
The memory 1120 may be a separate device from the processor 1110, or may be integrated into the processor 1110.
Optionally, the apparatus 1100 may also include an input interface 1130. The processor 1110 may control the input interface 1130 to communicate with other devices or chips, and in particular, may obtain information or data sent by other devices or chips.
Optionally, the apparatus 1100 may also include an output interface 1140. The processor 1110 may control the output interface 1140 to communicate with other devices or chips, and in particular, may output information or data to the other devices or chips.
Optionally, the apparatus may be applied to the network device in the embodiment of the present application, and the apparatus may implement the corresponding process implemented by the network device in each method in the embodiment of the present application, and for brevity, details are not described herein again.
Optionally, the apparatus may be applied to the terminal device in the embodiment of the present application, and the apparatus may implement the corresponding process implemented by the terminal device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Alternatively, the device mentioned in the embodiments of the present application may also be a chip. For example, it may be a system-on-chip, a system-on-chip or a system-on-chip, etc.
Fig. 12 is a schematic block diagram of a communication system 1200 provided in an embodiment of the present application. As shown in fig. 12, the communication system 1200 includes a terminal device 1210 and a network device 1220.
The terminal device 1210 may be configured to implement corresponding functions implemented by the terminal device in the foregoing method, and the network device 1220 may be configured to implement corresponding functions implemented by the network device or the base station in the foregoing method, which is not described herein again for brevity.
It should be understood that the processor of the embodiments of the present application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in ram, flash, rom, prom, or eprom, registers, etc. as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It will be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), double Data Rate Synchronous Dynamic random access memory (DDR SDRAM), enhanced Synchronous SDRAM (ESDRAM), synchronous link SDRAM (SLDRAM), and Direct Rambus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood that the above memories are exemplary but not limiting illustrations, for example, the memories in the embodiments of the present application may also be Static Random Access Memory (SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (enhanced SDRAM, ESDRAM), synchronous Link DRAM (SLDRAM), direct Rambus RAM (DR RAM), and the like. That is, the memory in the embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
The embodiment of the application also provides a computer readable storage medium for storing the computer program.
Optionally, the computer-readable storage medium may be applied to the network device or the base station in the embodiment of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the network device or the base station in the methods in the embodiments of the present application, which are not described herein again for brevity.
Optionally, the computer-readable storage medium may be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method in the embodiment of the present application, which is not described herein again for brevity.
Embodiments of the present application also provide a computer program product comprising computer program instructions.
Optionally, the computer program product may be applied to the network device or the base station in the embodiment of the present application, and the computer program instructions enable the computer to execute corresponding processes implemented by the network device or the base station in the methods in the embodiments of the present application, which are not described herein again for brevity.
Optionally, the computer program product may be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program instruction causes the computer to execute a corresponding process implemented by the mobile terminal/terminal device in each method in the embodiment of the present application, which is not described herein again for brevity.
The embodiment of the application also provides a computer program.
Optionally, the computer program may be applied to the network device or the base station in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute corresponding processes implemented by the network device or the base station in the methods in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the computer program may be applied to the mobile terminal/terminal device in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute the corresponding process implemented by the mobile terminal/terminal device in each method in the embodiment of the present application, which is not described herein again for brevity.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. With regard to such understanding, the technical solutions of the present application may be essentially implemented or contributed to by the prior art, or may be implemented in a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (54)

  1. A method of wireless communication, comprising:
    the method comprises the steps that terminal equipment acquires first configuration information of the terminal equipment, wherein the first configuration information is used for determining a first random access type of the terminal equipment;
    and the terminal equipment carries out random access according to the first random access type.
  2. The method of claim 1, wherein the first configuration information comprises: the first random access type; before the terminal device obtains the first configuration information of the terminal device, the method further includes:
    the terminal equipment reports the capacity of the terminal equipment to network equipment;
    wherein the capability of the terminal device is used to determine the first random access type.
  3. The method of claim 1, wherein the first configuration information comprises: and a first logic channel list corresponding to the two-step random access mode based on competition.
    If the logical channel where the Buffer Status Report (BSR) triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type;
    otherwise, the first random access type is a four-step random access type based on competition.
  4. The method of claim 1, wherein the first configuration information comprises: a second logic channel list corresponding to a four-step random access mode based on competition;
    if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type;
    otherwise, the first random access type is a contention-based two-step random access type.
  5. The method of claim 1, wherein the first configuration information comprises: a first logic channel list corresponding to the two-step random access mode based on competition and a second logic channel list corresponding to the four-step random access mode based on competition;
    if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type;
    and if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type.
  6. The method of claim 1, wherein the first configuration information comprises: a correspondence of at least one logical channel and at least one random access type;
    and the first random access type is determined according to the corresponding relation and a logical channel where a BSR (buffer status report) triggered by uplink data of the terminal equipment is located.
  7. The method according to any of claims 1-6, wherein the terminal device performs random access according to the first random access type, comprising:
    the terminal equipment carries out random access by adopting a random access mode corresponding to the first random access type; alternatively, the first and second electrodes may be,
    and the terminal equipment performs random access according to the Reference Signal Received Power (RSRP) obtained by measurement and the first random access type.
  8. The method of claim 7, wherein the performing random access by the terminal device according to the measured RSRP and the first random access type comprises:
    if the first random access type is a contention-based two-step random access type and the measured RSRP is greater than or equal to the RSRP threshold, the terminal equipment performs random access by adopting a contention-based two-step random access mode;
    otherwise, the terminal equipment adopts a four-step random access mode based on competition to carry out random access.
  9. The method of claim 7, wherein the performing random access by the terminal device according to the measured RSRP and the first random access type comprises:
    if the first random access type is a contention-based four-step random access type and the measured RSRP is less than or equal to the RSRP threshold, performing random access by adopting a contention-based four-step random access mode;
    otherwise, the terminal equipment adopts a competition-based two-step random access mode to carry out random access.
  10. The method according to any of claims 1-9, wherein the terminal device performs random access according to the first random access type, comprising:
    and when the terminal equipment fails to request uplink resources through the BSR and the scheduling request SR, the terminal equipment performs random access according to the first random access type.
  11. The method of any one of claims 1-10, further comprising:
    the terminal equipment obtains two-step random access resource configuration based on competition and four-step random access resource configuration based on competition.
  12. The method according to any of claims 1-11, wherein the first configuration information is carried in radio resource control, RRC, signaling.
  13. The method according to any of claims 1-12, wherein the first random access type is a contention based two-step random access type or a contention based four-step random access type.
  14. A method of wireless communication, comprising:
    the network equipment sends first configuration information of the terminal equipment to the terminal equipment, wherein the first configuration information is used for determining a first random access type of the terminal equipment.
  15. The method of claim 14, wherein the first configuration information comprises: the first random access type; before the network device sends the first configuration information of the terminal device to the terminal device, the method further includes:
    the network equipment acquires the capability of the terminal equipment;
    wherein the capability of the terminal device is used to determine the first random access type.
  16. The method of claim 14, wherein the first configuration information comprises: and a first logic channel list corresponding to the two-step random access mode based on competition.
    If the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type;
    otherwise, the first random access type is a four-step random access type based on competition.
  17. The method of claim 14, wherein the first configuration information comprises: a second logic channel list corresponding to a four-step random access mode based on competition;
    if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type;
    otherwise, the first random access type is a contention-based two-step random access type.
  18. The method of claim 14, wherein the first configuration information comprises: a first logic channel list corresponding to the competition-based two-step random access mode and a second logic channel list corresponding to the competition-based four-step random access mode;
    if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type;
    and if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type.
  19. The method of claim 14, wherein the first configuration information comprises: a correspondence of at least one logical channel and at least one random access type;
    and the first random access type is determined according to the corresponding relation and a logical channel where a BSR (buffer status report) triggered by uplink data of the terminal equipment is located.
  20. The method of any one of claims 14-19, further comprising:
    and the network equipment sends the two-step random access resource configuration based on competition and the four-step random access resource configuration based on competition to the terminal equipment.
  21. The method of any one of claims 14-20, wherein the first configuration information is carried in RRC signaling.
  22. The method according to any of claims 14-21, wherein the first random access type is a contention based two-step random access type or a contention based four-step random access type.
  23. A terminal device, comprising:
    the communication unit is used for acquiring first configuration information of terminal equipment, wherein the first configuration information is used for determining a first random access type of the terminal equipment;
    and the processing unit is used for carrying out random access according to the first random access type.
  24. The terminal device of claim 23, wherein the first configuration information comprises: the first random access type; the communication unit is also used for reporting the capability of the terminal equipment to network equipment;
    wherein the capability of the terminal device is used to determine the first random access type.
  25. The terminal device of claim 23, wherein the first configuration information comprises: and a first logic channel list corresponding to the two-step random access mode based on competition.
    If the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type;
    otherwise, the first random access type is a four-step random access type based on competition.
  26. The terminal device of claim 23, wherein the first configuration information comprises: a second logic channel list corresponding to a four-step random access mode based on competition;
    if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type;
    otherwise, the first random access type is a contention-based two-step random access type.
  27. The terminal device of claim 23, wherein the first configuration information comprises: a first logic channel list corresponding to the two-step random access mode based on competition and a second logic channel list corresponding to the four-step random access mode based on competition;
    if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type;
    and if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type.
  28. The terminal device of claim 23, wherein the first configuration information comprises: a correspondence of at least one logical channel and at least one random access type;
    and the first random access type is determined according to the corresponding relation and a logical channel where a BSR (buffer status report) triggered by uplink data of the terminal equipment is located.
  29. The terminal device according to any one of claims 23 to 28, wherein the processing unit is specifically configured to:
    random access is carried out by adopting a random access mode corresponding to the first random access type; alternatively, the first and second electrodes may be,
    and performing random access according to the measured RSRP and the first random access type.
  30. The terminal device of claim 29, wherein the processing unit is specifically configured to:
    if the first random access type is a competition-based two-step random access type and the measured RSRP is greater than or equal to the RSRP threshold, performing random access by adopting a competition-based two-step random access mode;
    otherwise, random access is carried out by adopting a four-step random access mode based on competition.
  31. The terminal device of claim 29, wherein the processing unit is specifically configured to:
    if the first random access type is a contention-based four-step random access type and the measured RSRP is less than or equal to the RSRP threshold, performing random access by adopting a contention-based four-step random access mode;
    otherwise, random access is carried out by adopting a two-step random access mode based on competition.
  32. The terminal device according to any one of claims 23 to 31, wherein the processing unit is specifically configured to:
    and when the terminal equipment fails to request uplink resources through the BSR and the SR, performing random access according to the first random access type.
  33. The terminal device according to any of claims 23-32,
    the communication unit is further configured to acquire a contention-based two-step random access resource configuration and a contention-based four-step random access resource configuration.
  34. The terminal device according to any of claims 23-33, wherein the first configuration information is carried in RRC signaling.
  35. The terminal device according to any of claims 23-34, wherein the first random access type is a contention-based two-step random access type or a contention-based four-step random access type.
  36. A network device, comprising:
    the communication unit is used for sending first configuration information of the terminal equipment to the terminal equipment, wherein the first configuration information is used for determining a first random access type of the terminal equipment.
  37. The network device of claim 36, wherein the first configuration information comprises: the first random access type; the communication unit is also used for acquiring the capability of the terminal equipment;
    wherein the capability of the terminal device is used to determine the first random access type.
  38. The network device of claim 36, wherein the first configuration information comprises: and a first logic channel list corresponding to the two-step random access mode based on competition.
    If the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type;
    otherwise, the first random access type is a four-step random access type based on competition.
  39. The network device of claim 36, wherein the first configuration information comprises: a second logic channel list corresponding to a four-step random access mode based on competition;
    if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type;
    otherwise, the first random access type is a contention-based two-step random access type.
  40. The network device of claim 36, wherein the first configuration information comprises: a first logic channel list corresponding to the competition-based two-step random access mode and a second logic channel list corresponding to the competition-based four-step random access mode;
    if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the first logical channel list, the first random access type is a contention-based two-step random access type;
    and if the logical channel where the BSR triggered by the uplink data of the terminal device is located is in the second logical channel list, the first random access type is a contention-based four-step random access type.
  41. The network device of claim 36, wherein the first configuration information comprises: a correspondence of at least one logical channel and at least one random access type;
    and the first random access type is determined according to the corresponding relation and a logical channel where a BSR (buffer status report) triggered by uplink data of the terminal equipment is located.
  42. The network device of any one of claims 36-41,
    the communication unit is further configured to send a contention-based two-step random access resource configuration and a contention-based four-step random access resource configuration to the terminal device.
  43. The network device of any of claims 36-42, wherein the first configuration information is carried in RRC signaling.
  44. The network device of any of claims 36-43, wherein the first random access type is a contention-based two-step random access type or a contention-based four-step random access type.
  45. A terminal device, comprising: a processor and a memory, the memory for storing a computer program, the processor for invoking and executing the computer program stored in the memory, performing the method of any one of claims 1 to 13.
  46. A network device, comprising: a processor and a memory, the memory for storing a computer program, the processor for invoking and executing the computer program stored in the memory, performing the method of any one of claims 14 to 22.
  47. An apparatus, comprising: a processor for calling and running a computer program from a memory so that a device on which the apparatus is installed performs the method of any one of claims 1 to 13.
  48. An apparatus, comprising: a processor for invoking and running a computer program from a memory, causing a device in which the apparatus is installed to perform the method of any of claims 14 to 22.
  49. A computer-readable storage medium for storing a computer program which causes a computer to perform the method of any one of claims 1 to 13.
  50. A computer-readable storage medium for storing a computer program which causes a computer to perform the method of any one of claims 14 to 22.
  51. A computer program product comprising computer program instructions for causing a computer to perform the method of any one of claims 1 to 13.
  52. A computer program product comprising computer program instructions for causing a computer to perform the method of any one of claims 14 to 22.
  53. A computer program, characterized in that the computer program causes a computer to perform the method according to any of claims 1-13.
  54. A computer program, characterized in that the computer program causes a computer to perform the method according to any of claims 14-22.
CN202080103164.0A 2020-09-30 2020-09-30 Wireless communication method, terminal equipment and network equipment Pending CN115843464A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/119192 WO2022067614A1 (en) 2020-09-30 2020-09-30 Wireless communication method, terminal device, and network device

Publications (1)

Publication Number Publication Date
CN115843464A true CN115843464A (en) 2023-03-24

Family

ID=80951076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080103164.0A Pending CN115843464A (en) 2020-09-30 2020-09-30 Wireless communication method, terminal equipment and network equipment

Country Status (2)

Country Link
CN (1) CN115843464A (en)
WO (1) WO2022067614A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20220088337A (en) * 2020-12-18 2022-06-27 아서스테크 컴퓨터 인코포레이션 Method and apparatus for determining whether to use buffer status report enhancement in a wireless communication system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282895B (en) * 2017-01-06 2019-12-20 电信科学技术研究院 Random access method and terminal
CN111436137B (en) * 2019-02-02 2022-06-24 维沃移动通信有限公司 Random access method, device, equipment and medium
CN111565473A (en) * 2019-02-14 2020-08-21 华为技术有限公司 Random access method and device

Also Published As

Publication number Publication date
WO2022067614A1 (en) 2022-04-07

Similar Documents

Publication Publication Date Title
CN111869306B (en) Random access method, terminal equipment and network equipment
EP4207873A1 (en) Network slicing information processing method, terminal device, and network device
CN112806088A (en) Random access method, terminal equipment and network equipment
CN115699951A (en) Wireless communication method and terminal equipment
CN114246013A (en) Wireless communication method and terminal device
WO2022027238A1 (en) Wireless communication method, terminal device, and network device
WO2022067519A1 (en) Random access methods and terminals
EP4171162A1 (en) Data transmission method and terminal device
US20240040627A1 (en) Wireless comminication method, and electronic device
WO2022067614A1 (en) Wireless communication method, terminal device, and network device
CN113711680A (en) Random access method and communication equipment
WO2022040867A1 (en) Random access method, terminal device and network device
CN112997575B (en) Wireless communication method, terminal device and network device
CN116569642A (en) Method for transmitting data channel, terminal equipment and network equipment
CN115669186A (en) Wireless communication method, terminal equipment and network equipment
CN112514515A (en) Random access method, terminal equipment and network equipment
US20240080817A1 (en) Wireless communication method, terminal device, and network device
WO2023133839A1 (en) Communication method and device
US20230042104A1 (en) Wireless communication method, terminal device, and network device
CN113115423B (en) Method and terminal device for controlling power ramp counter
WO2024040598A1 (en) Wireless communication method and terminal device
WO2023019409A1 (en) Information indication method, terminal device, network device, chip, and storage medium
US20220225433A1 (en) Wireless communication method, terminal device, and network device
CN116803141A (en) Wireless communication method, terminal equipment and network equipment
CN117413591A (en) Wireless communication method, terminal equipment and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination