CN116347643A - Random access method and device - Google Patents

Random access method and device Download PDF

Info

Publication number
CN116347643A
CN116347643A CN202111605069.3A CN202111605069A CN116347643A CN 116347643 A CN116347643 A CN 116347643A CN 202111605069 A CN202111605069 A CN 202111605069A CN 116347643 A CN116347643 A CN 116347643A
Authority
CN
China
Prior art keywords
random access
time
message
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111605069.3A
Other languages
Chinese (zh)
Inventor
李晨琬
吴毅凌
鲁振伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202111605069.3A priority Critical patent/CN116347643A/en
Priority to PCT/CN2022/137030 priority patent/WO2023116429A1/en
Publication of CN116347643A publication Critical patent/CN116347643A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a random access method and a random access device, which can solve the problem of fusion use of a radio frequency identification technology and a mobile network. The method comprises the following steps: the first device sends a first memory command to the second device or the third device, receives a random access request message from the second device, and sends a random access success message to the second device or the third device. The first disk storage command is used for indicating one or more second devices to perform random access, the random access request message is used for requesting to access the first device, the random access success message is used for indicating that the second devices are successfully accessed to the first device, the random access success message comprises data of an application layer, and/or the first disk storage command comprises data of the application layer.

Description

Random access method and device
Technical Field
The present disclosure relates to the field of communications, and in particular, to a random access method and apparatus.
Background
With the rapid development of wireless communication, a fifth generation (5th generation,5G) mobile communication system has been developed in order to meet and enrich the increasing demands of people. In the 5G mobile communication system, the demand for internet of things (internet of things, ioT) is growing rapidly. Among them, machine-to-machine (machine to machine, M2M) is an important direction of IoT development, and the machines can communicate information and data with each other through wireless networks. In order to reduce device power consumption, the existing internet of things technology proposes a narrowband internet of things (NB-IoT), a low-capability (reduced capability, redCap), and the like. However, the power consumption is still above milliwatt level, and further power consumption cannot be saved.
Passive internet of things (IoT) technology can achieve micro-watt power consumption and ultra-low cost, and is an important branch of future evolution technology of cellular technology. Illustratively, in radio frequency identification (radio frequency identification, RFID) technology, an internet of things terminal device captures and collects energy by collecting radio waves transmitted from a network side and transmits information stored in itself. How to use RFID technology in combination with mobile networks is a challenge.
Disclosure of Invention
The embodiment of the application provides a random access method and a random access device, which can realize the fusion use of an RFID technology and a mobile network.
In order to achieve the above purpose, the present application adopts the following technical scheme:
in a first aspect, a random access method is provided. The random access method comprises the following steps: the first device sends a first memory command to the second device or the third device, the first device receives a random access request message from the second device, and the first device sends a random access success message to the second device or the third device. The first disk storage command is used for indicating one or more second devices to perform random access, and the random access request message is used for requesting to access the first device. The random access success message is used to indicate that the second device has successfully accessed the first device. The random access success message comprises data of the application layer and/or the first disk storage command comprises data of the application layer.
Based on the random access method shown in the first aspect, the first device sends a first disk storage command to the second device, and receives a random access request message from the second device. The first disk storage command is used for indicating one or more second devices to perform random access, the random access request message is used for requesting to access the first device, and the first device sends a random access success message to the second devices. Wherein the first disk storage command comprises data of an application layer, and/or the random access success message comprises data of the application layer. In this way, the first device may send the first disk storage command and the data of the application layer to the second device together, and/or send the random access success message and the data of the application layer to the second device together. In a protocol architecture of layered design, possible transmission time points and flows are defined for application layer data transmission, and the fusion use of the RFID technology and the mobile network can be realized. In addition, when the first disk storage command is sent, the data of the application layer does not need to be issued after the contention resolution is waited, the disk storage time delay can be saved, and the disk storage speed is improved.
For example, the data of the application layer may include instructions of the application layer, such as read instructions, write instructions, read-write instructions, read identifications, and the like.
In one possible design, the first disk storage command may further include one or more group identification information, one group identification information identifying one or more second devices.
Alternatively, a certain group of second devices may be instructed to perform related operations by the group identification information.
In one possible design, one or more sets of group identification information correspond to one or more application layer data.
In one possible design, the data for the application layer may be carried in a radio resource control (radio resource control, RRC) message, or a medium access control (media access control, MAC) packet.
For example, the data of the application layer may be encapsulated in a container (container) of the RRC message or in a MAC packet issued together with the first disk command.
In one possible design, the first disk storage command may include parameter information, and/or time information.
Optionally, the parameter information may include a data transmission rate, a number of repetitions, and/or a coverage level, and the time information is used to indicate a period of time.
That is, the parameter information, and/or the time information may be received by the second device from the first device or the third device.
In one possible design, the random access method provided in the first aspect may further include: after sending the first disk storage command, and in the case that the random access request message is not received in the first time period, the first device continues to wait for the third time period, or stops waiting and sending the next command.
Optionally, the first time period is determined by the first device according to the coding mode and/or the coverage level, or the first time period is preset. The third time period is preset.
In a second aspect, a random access method is provided. The method comprises the following steps: the second device receives the first memory command from the first device or the third device, the second device sends a random access request message to the first device, and the second device receives a random access success message from the first device or the third device. The first disk storage command is used for indicating one or more second devices to perform random access. The random access request message is used to request access to the first device. The random access success message is used to indicate that the second device has successfully accessed the first device. The random access success message comprises data of the application layer and/or the first disk storage command comprises data of the application layer.
In one possible design, the first disk storage command may further include one or more group identification information, one group identification information identifying one or more second devices.
In one possible design, one or more sets of group identification information correspond to one or more application layer data.
In one possible design, the data of the application layer may be carried in a radio resource control RRC message, or a medium access control MAC packet.
In one possible design, the first disk storage command may include parameter information including a data transmission rate, a number of repetitions, and/or a coverage level, and/or time information indicating a period of time.
In one possible design, the random access method provided in the second aspect may further include: and under the condition that the random access request message is sent and the response message is not received after waiting for the second time period, the second equipment determines that the random access fails. The second time period is the time for waiting for the response message after the second device sends the message, and is determined according to the parameter information or the time information, or is preset.
In one possible design, the random access method provided in the second aspect may further include: the second device receives the increased time information, and/or the increased time indication information from the third device. Wherein the increase time information may be used to indicate a time required for transmitting data between the third device and the first device, and the increase time indication information may be used to indicate whether to increase a time required for transmitting data between the third device and the first device when determining a second time period, the second time period being a time for waiting for a response message after the second device transmits the message.
In addition, the technical effects of the random access method described in the second aspect may refer to the technical effects of the random access method described in the first aspect, and are not described herein.
In a third aspect, a random access device is provided. The random access device comprises: a transmitting module and a receiving module.
And the sending module is used for sending the first disk storage command to the second device or the third device. The first disk storage command is used for indicating one or more second devices to perform random access.
And the receiving module is used for receiving the random access request message from the second equipment. Wherein the random access request message is used for requesting access to the random access device.
And the sending module is also used for sending a random access success message to the second equipment or the third equipment. Wherein the random access success message is used to indicate that the second device has successfully accessed the random access means. The random access success message comprises data of the application layer and/or the first disk storage command comprises data of the application layer.
In one possible design, the first disk storage command further includes one or more group identification information, one group identification information being used to identify one or more second devices.
In one possible design, one or more sets of group identification information correspond to one or more application layer data.
In one possible design, the data bearer of the application layer is in a radio resource control RRC message, or a medium access control MAC packet.
In one possible design, the first disk storage command includes parameter information including a data transmission rate, a repetition number, and/or a coverage level, and/or time information indicating a period of time.
In one possible design, after the first disk storage command is sent, and in the case that the random access request message is not received in the first period, the receiving module is further configured to continue waiting for the third period, or stop waiting, and the sending module is further configured to send the next command. The first time period is determined according to the coding mode and/or the coverage level, or the first time period is preset. The third time period is preset.
It should be noted that the receiving module and the transmitting module may be separately provided, or may be integrated into one module, i.e., the transceiver module. The specific implementation manner of the receiving module and the sending module is not specifically limited.
Optionally, the random access device according to the third aspect may further include a processing module and a storage module, where the storage module stores a program or instructions. The program or instructions, when executed by the processing module, enable the random access device according to the third aspect to perform the method according to the first aspect.
The random access apparatus according to the third aspect may be the first device, for example, an access network device, a read/write device, or the like, or may be a chip (system) or other components or assemblies that may be disposed in the first device, which is not limited in this application.
In addition, the technical effects of the random access apparatus according to the third aspect may refer to the technical effects of the random access method according to any possible implementation manner of the first aspect, which are not described herein.
In a fourth aspect, a random access device is provided. The random access device comprises: a transmitting module and a receiving module.
And the receiving module is used for receiving the first disk storage command from the first device or the third device. Wherein the first disk storage command is used for indicating one or more random access devices to perform random access.
And the sending module is used for sending the random access request message to the first equipment. Wherein the random access request message is used for requesting access to the first device.
And the receiving module is also used for receiving the random access success message from the first equipment or the third equipment. Wherein the random access success message is used for indicating that the random access device has successfully accessed the first equipment. The random access success message comprises data of the application layer and/or the first disk storage command comprises data of the application layer.
In one possible design, the first disk storage command further includes one or more group identification information, where one group identification information is used to identify one or more random access devices.
In one possible design, one or more sets of group identification information correspond to one or more application layer data.
In one possible design, the data bearer of the application layer is in a radio resource control RRC message, or a medium access control MAC packet.
In one possible design, the first disk storage command includes parameter information including a data transmission rate, a repetition number, and/or a coverage level, and/or time information indicating a period of time.
In one possible design, the random access device provided in the fourth aspect further includes: and a processing module. And the processing module is used for determining the random access failure when the random access request message is sent and the response message is not received after waiting for the second time period. The second time period is the time for waiting for the response message after the random access device sends the message, and is determined according to the parameter information or the time information, or is preset.
In one possible design, the receiving module is configured to receive the incremental time information and/or the incremental time indication information from the third device. The time increasing information is used for indicating the time required for transmitting data between the third device and the first device, the time increasing indicating information is used for indicating whether the time required for transmitting data between the third device and the first device is increased or not when determining a second time period, and the second time period is the time for waiting for a response message after the random access device sends the message.
It should be noted that the receiving module and the transmitting module may be separately provided, or may be integrated into one module, i.e., the transceiver module. The specific implementation manner of the receiving module and the sending module is not specifically limited.
Optionally, the random access device according to the fourth aspect may further include a processing module and a storage module, where the storage module stores a program or instructions. The program or instructions, when executed by the processing module, enable the random access device according to the fourth aspect to perform the method according to the second aspect.
It should be noted that the random access apparatus according to the fourth aspect may be the second device, for example, the terminal device, or may be a chip (system) or other components or assemblies that may be disposed in the second device, which is not limited in this application.
In addition, the technical effects of the random access apparatus described in the fourth aspect may refer to the technical effects of the random access method described in any possible implementation manner of the second aspect, which are not described herein.
In a fifth aspect, a random access device is provided. The random access device comprises: a processor coupled to a memory for storing a computer program.
The processor is configured to execute a computer program stored in the memory such that the random access method as described in any one of the possible implementations of the first to second aspects is performed.
In one possible design, the random access device according to the fifth aspect may further include a transceiver. The transceiver may be a transceiver circuit or an input/output port. The transceiver may be used for the random access means to communicate with other devices.
The input port may be used to implement the receiving functions of the first to second aspects, and the output port may be used to implement the transmitting functions of the first to second aspects.
In this application, the random access apparatus described in the fifth aspect may be the first device or the second device, or a chip system disposed inside the first device or the second device.
In addition, the technical effects of the random access apparatus according to the fifth aspect may refer to the technical effects of the random access method according to any implementation manner of the first aspect to the second aspect, which are not described herein.
In a sixth aspect, a communication system is provided. The communication system comprises a random access device according to the third aspect and a random access device according to the fourth aspect.
Alternatively, the communication system comprises a random access device according to the fifth aspect for implementing the method according to the first aspect and a random access device according to the fifth aspect for implementing the method according to the second aspect.
Optionally, the communication system may further comprise a third device.
In a seventh aspect, a chip system is provided that includes logic circuitry and an input/output port. Wherein the logic circuit is configured to implement the processing functions according to the first to second aspects, and the input/output port is configured to implement the transceiver functions according to the first to second aspects. In particular, the input port may be used to implement the receiving functions of the first to second aspects, and the output port may be used to implement the transmitting functions of the first to second aspects.
In one possible design, the system-on-chip further includes a memory to store program instructions and data implementing the functions of the first aspect through the second aspect.
The chip system can be composed of chips, and can also comprise chips and other discrete devices.
In an eighth aspect, there is provided a computer readable storage medium storing a computer program or instructions; the computer program or instructions, when run on a computer, cause the random access method of any one of the possible implementations of the first to second aspects to be performed.
A ninth aspect provides a computer program product comprising a computer program or instructions which, when run on a computer, cause the random access method of any one of the possible implementations of the first to second aspects to be performed.
Drawings
Fig. 1 is a schematic architecture diagram of some communication systems according to embodiments of the present application;
fig. 2 is a schematic architecture diagram of another communication system according to an embodiment of the present application;
fig. 3 is a schematic architecture diagram of an RFID system according to an embodiment of the present application;
Fig. 4 is a schematic diagram of an interaction flow between a read-write device and a tag device according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a storage area of a tag device according to an embodiment of the present application;
fig. 6 is a schematic flow chart of a random access method according to an embodiment of the present application;
fig. 7 is a flow chart of another random access method according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a timing sequence provided in an embodiment of the present application;
fig. 9 is a schematic structural diagram of a random access device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of another random access device according to an embodiment of the present application.
Detailed Description
The technical solutions in the present application will be described below with reference to the accompanying drawings.
The technical solution of the embodiments of the present application may be applied to various communication systems, such as a universal mobile telecommunications system (universal mobile telecommunications system, UMTS), a code division multiple access (code division multiple access, CDMA) system, a wireless local area network (wireless local area network, WLAN), a wireless fidelity (wireless fidelity, wi-Fi) system, a wired network, a vehicle-to-arbitrary object (vehicle to everything, V2X) communication system, an inter-device (D2D) communication system, a car networking communication system, a 4th generation (4th generation,4G) mobile communication system, such as a long term evolution (long term evolution, LTE) system, a worldwide interoperability for microwave access (worldwide interoperability for microwave access, wiMAX) communication system, a fifth generation (5th generation,5G) mobile communication system, such as a new air interface (new radio, NR) system, and future communication systems, such as a sixth generation (6th generation,6G) mobile communication system, and the like.
The present application will present various aspects, embodiments, or features about a system that may include multiple devices, components, modules, etc. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. Furthermore, combinations of these schemes may also be used.
In addition, in the embodiments of the present application, words such as "exemplary," "for example," and the like are used to indicate an example, instance, or illustration. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term use of an example is intended to present concepts in a concrete fashion.
In the embodiment of the present application, "information", "signal", "message", "channel", and "signaling" may be used in a mixed manner, and it should be noted that the meaning of the expression is consistent when the distinction is not emphasized. "of", "corresponding" and "corresponding" are sometimes used in combination, and it should be noted that the meaning of the expression is consistent when the distinction is not emphasized.
In the embodiments of the present application, sometimes subscripts such as W 1 May be misidentified as a non-subscripted form such as W1, the meaning it is intended to express being consistent when de-emphasizing the distinction.
The network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of the new service scenario, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
To facilitate understanding of the embodiments of the present application, a communication system suitable for the embodiments of the present application will be described in detail by taking the communication systems shown in fig. 1 and 2 as examples. Fig. 1 and fig. 2 are schematic diagrams of a communication system to which the random access method according to the embodiments of the present application is applicable.
The communication system includes a first device and a second device. The first device may be an access network device (for example, a micro base station (micro base station, micro BS), an access point, an access backhaul integrated (integrated access and backhaul, IAB) node, a macro station (macro BS), or the like in fig. 1), or a read-write device, and the second device may be a terminal device. Optionally, the communication system may further comprise a third device (as shown in fig. 1 (c) or as shown in fig. 2). The third device may be a stimulus source (helper) which may be a terminal device, or an access network device or a small station. The second device, the read-write device, or the third device and the access network device belong to Uu interface transmission, i.e. air interface transmission, such as private-IoT (P-IoT) transmission or side-uplink private internet of things transmission, and may also be wired transmission.
In one scenario, the second device may be deployed in an integrated architecture, with particular reference to fig. 1.
As shown in fig. 1 (a), or fig. 1 (b), taking basic coverage as an example, the first device may be an access network device, the second device is located in a coverage area of one or more cells (carriers) provided by the access network device, and the cells serving the second device may be one or more. When there are multiple serving cells for the second device, the second device may operate in a carrier aggregation (carrier aggregation, CA) (or dual connectivity (dual connectivity, DC) or coordinated multipoint transmission mode, where at least one cell provides more than one parameter set (numerology) while providing radio resources for the second device.
As shown in fig. 1 (c), taking the supplementary coverage as an example, the first device may be a read-write device, the second device may also be located in a coverage area provided by the first device or the third device, and communication between the first device and the second device may be regarded as communication between terminals, or may be communication from a base station or an access backhaul integrated (integrated access and backhaul, IAB) node to a terminal.
In another scenario, the second device may be deployed in a split architecture, as shown in fig. 2, where the third device may be in air-interface transmission with the first device (access network device or read-write device), or may be in wired transmission. Under the separated architecture, the third device and the first device have uplink commands and downlink commands, the third device and the second device have only downlink commands, and the second device and the first device have uplink commands.
In the present application, the integrated architecture and the split architecture can be distinguished according to whether the opposite end of the second device receiving and transmitting signals is the same device. For example, a unified architecture: from the perspective of the second device, the opposite end of the second device that transmits and receives signals is the same device, as shown in fig. 1 (a), (b), and (c). A split architecture: from the perspective of the second device, the opposite end of the second device that receives and transmits signals is not the same device. As shown in fig. 2, the second device receives the signal from the third device and transmits the signal to the first device, and the opposite end for receiving and transmitting the signal is not the same device.
The access network device is a device located at the network side of the communication system and having a wireless transceiving function, or a chip system that can be set in the device, and refers to a wireless access network (radio access network, RAN) node (or device) that accesses a terminal to a wireless network, and may be referred to as a Base Station (BS). The access network device includes, but is not limited to: an Access Point (AP) in a Wi-Fi (wireless fidelity) system, such as a home gateway, router, server, switch, bridge, etc., an evolved Node B (eNB), a radio network controller (radio network controller, RNC), a Node B (Node B, NB), a base station controller (base station controller, BSC), a base transceiver station (base transceiver station, BTS), a home base station (e.g., home evolved NodeB, or home Node B, HNB), a baseband unit (BBU), a wireless relay Node, a wireless backhaul Node, a transmission point (transmission and reception point, TRP, or transmission point, TP), etc., may also be 5G, such as a gNB in a new radio, NR, system, or a transmission point (TRP or TP), an antenna panel or a group (including a plurality of antenna panels) of base stations in a 5G system, or may also be a network Node, such as a baseband unit (BBU), or a Distributed Unit (DU), a Centralized Unit (CU), a RAN device including CU nodes and DU nodes, a roadside unit (RSU) with a base station function, etc., constituting the gNB or the transmission point, or may also be a satellite, or a base station of various forms in the future.
The read-write device may be called a tag reader, a scanner, a reading head, a communicator, a card reader, a reader, or the like, may be a device for reading (or writing) tag information in a hand-held manner or a fixed manner, may be a device for communicating with a tag, may be a terminal, may be a base station, or may be a device having a read-write function.
The terminal equipment is a terminal which is accessed into the communication system and has a wireless receiving and transmitting function or a chip system which can be arranged on the terminal. The terminal device may also be referred to as a User Equipment (UE), a user equipment, an access terminal, a subscriber unit, a subscriber station, a Mobile Station (MS), a remote station, a remote terminal, a mobile device, a user terminal, a terminal unit, a terminal station, a terminal device, a wireless communication device, a user agent, or a user equipment.
For example, the terminal device in the embodiments of the present application may be an electronic tag, a mobile phone (mobile phone), a wireless data card, a personal digital assistant (personal digital assistant, PDA) computer, a laptop (laptop computer), a tablet (Pad), an unmanned aerial vehicle, a computer with a wireless transceiving function, a machine type communication (machine type communication, MTC) terminal, a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, an internet of things (internet of things, ioT) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned aerial vehicle (self driving), a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation security (transportation safety), a wireless terminal in smart city (smart city), a wireless terminal in home (smart home) (e.g., a game machine, a smart television, a sound box, a refrigerator, a fitness terminal, etc.), an RSU with a vehicle-mounted function. An access terminal may be a cellular telephone (cellular phone), cordless telephone, session initiation protocol (session initiation protocol, SIP) phone, wireless local loop (wireless local loop, WLL) station, personal digital assistant (personal digital assistant, PDA), handheld device (handset) with wireless communication capabilities, computing device or other processing device connected to a wireless modem, wearable device, etc.
Wherein the electronic tag may be referred to as a smart tag, a tag device, an RFID tag, an RFID transponder, or an RFID data carrier, etc. Radio frequency identification technology can be divided into three types, active, passive and semi-active. Electronic tags may be classified into active tags (active tags), semi-passive tags (Semi-passive tags), and passive tags, which may also be referred to as passive internet of things devices.
For another example, the terminal device in the embodiment of the present application may be an express terminal in smart logistics (e.g., a device capable of monitoring a position of a cargo vehicle, a device capable of monitoring a temperature and humidity of the cargo, etc.), a wireless terminal in smart agriculture (e.g., a wearable device capable of collecting relevant data of livestock, etc.), a wireless terminal in smart architecture (e.g., a smart elevator, a fire monitoring device, a smart meter, etc.), a wireless terminal in smart medical (e.g., a wearable device capable of monitoring a physiological state of a person or an animal), a wireless terminal in smart transportation (e.g., a smart bus, a smart vehicle, a sharing bicycle, a charging pile monitoring device, a smart traffic light, a smart monitoring and retail parking device, etc.), a wireless terminal in smart (e.g., a vending machine, a self-checkout machine, an unmanned convenience store, etc.). For another example, the terminal device of the present application may be an in-vehicle module, an in-vehicle component, an in-vehicle chip, or an in-vehicle unit that is built in a vehicle as one or more components or units, and the vehicle may implement the method provided in the present application through the in-vehicle module, the in-vehicle component, the in-vehicle chip, or the in-vehicle unit.
The communication system provided by the application can be applied to the fields of logistics, traffic, identity recognition, anti-counterfeiting, asset management, food, information statistics, transaction, consulting application or safety control and the like. For example, the method is applied to book management, logistics management, water, electricity and gas charging, access control management, shelf management or industrial production line management. The application is not limited to specific application scenarios.
It should be noted that, the random access method provided in the embodiment of the present application may be applied between any two nodes shown in fig. 1 and fig. 2, and specific implementation may refer to the following method embodiments, which are not described herein again.
It should be noted that the solution in the embodiments of the present application may also be applied to other communication systems, and the corresponding names may also be replaced by names of corresponding functions in other communication systems.
It should be appreciated that fig. 1 and 2 are simplified schematic diagrams merely for ease of understanding, and that other devices, such as core network elements, may also be included in the communication system, which are not shown in fig. 1 and 2. Optionally, the random access method provided by the embodiment of the application may further relate to communication between the access network device and the core network element.
Technical terms or flows related to the embodiments of the present application are described:
first, the basic working principle of passive RFID technology:
fig. 3 is a schematic architecture diagram of one possible RFID system according to an embodiment of the present application. The RFID system includes a tag device (may be simply referred to as a tag), and a read-write device (may also be referred to as a reader-writer or the like). The read-write equipment is integrated with an antenna, and the antenna is used for receiving and transmitting information. Alternatively, the read-write device is separate from the antenna.
Referring to fig. 3, after the tag device enters the magnetic field, the tag device receives the radio frequency signal sent by the read-write device, and the tag device sends out the product information (passive tag or passive tag) stored in the chip by means of the energy obtained by the induced current, and the read-write device reads and decodes the product information and sends the product information to the central information system for relevant data processing.
Second, inventory:
and the tag equipment receives the mask information and the flag bit appointed by the read-write equipment, and if the storage area information of the tag equipment is matched with the received mask information and the flag bit stored by the tag equipment is consistent with the received flag bit, the tag equipment can enter a inventory process, namely, initiate random access to the read-write equipment and complete corresponding instructions indicated by the read-write equipment.
Thirdly, the interaction flow of the read-write equipment and the tag equipment is as follows:
fig. 4 shows an interaction flow between a tag device and a read-write device. In fig. 4, the read-write device transmits a select command by which a Select (SL) flag (or inventory) flag) and a mask (mask) may be indicated to select a set of tag devices.
The tag device receives the selection command from the read-write device, judges whether the information stored in the corresponding position of the storage area of the tag device is consistent with the mask information in the selection command, and if so, the tag device considers that the tag device meets the selection standard of the read-write device.
As shown in fig. 4 (a) and (b), next, the read-write device sends a Query (Query) command, which carries flag bit information (exampleSuch as a selection identifier or a disk identifier). The tag device conforming to the selection standard of the read-write device determines whether the tag bit information of the tag device is consistent with the tag bit information in the read-write device query command, and if so, the tag device generates (0, 2) Q-1 ) And generates a 16-bit random number or pseudo random number (16-bit random or pseudo-random, RN 16).
In some cases, as shown in (b) in fig. 4, the RN16 fed back by the plurality of tag devices may collide, or the read-write device does not receive the RN16 from the tag device, in which case the read-write device may adjust the Q value by sending a Query Rep command. In response to the repeated inquiry command received from the read-write device, the tag device generates (0, 2 Q-1 ) The tag device executes m=m-1, and when the value of m is 0, the tag device transmits a random number RN16 to the read-write device, and enters a Reply (Reply) state.
In some cases, as shown in (b) in fig. 4, after the read/write device sends the repeat query command, the read/write device does not detect the tag device feedback acknowledgement message (ACK) within a specified period (T2 time in fig. 4), or the RN16 in the received ACK does not match the RN16 of itself, enters an arbitration (Arbitrate) state, and after the counter is reduced to 0000h, it should flip to count from 7FFFh, the read/write device continues to send the repeat query command, and waits for the tag device to feedback the random number RN16.
In other cases, in combination with (a) in fig. 4, the read-write device does not detect the collision, i.e. only one tag device feeds back RN16 at a time, the read-write device feeds back an acknowledgement message to that tag device. And after receiving the effective confirmation message from the read-write equipment, the tag equipment sends the tag information to the read-write equipment. The read-write device receives the label information from the label device, if the label information is valid, the read-write device indicates that the inventory of the note is completed, and the read-write device can start inventory of the next label device, otherwise, if the label information is invalid, the read-write device sends a non-acknowledgement (NACK) message to the label device feeding back the invalid label information.
Wherein the tag information includes, but is not limited to, one or more of the following: protocol Control (PC) bits of the tag device, product electronic code (electronic product code, EPC) and cyclic redundancy check (cyclic redundancy check, CRC-16) of 16 bits.
In other cases, in combination with (b) in fig. 4, after receiving the RN16 from the tag device, the read/write device sends a confirmation message that the confirmation message sent to the tag device is invalid (carries an invalid RN 16), where the tag device does not feed back the tag information to the read/write device, and the read/write device cannot detect the tag information for a period of time. In this case, the reader/writer device continues to send the repeat query command and waits for the tag device to feed back the RN16.
Wherein, the valid acknowledgement message refers to an acknowledgement message carrying a valid RN16. The valid RN16, i.e. the RN16 carried by the tag device in the reply message. Invalid acknowledgement messages, i.e. acknowledgement messages carrying invalid RNs 16. The value of the invalid RN16 is different from the value of the valid RN16.
The times T1, T2, T3, T4 shown in fig. 4 are explained below.
T1: and after the read-write equipment sends a downlink message, waiting for the feedback time of the tag equipment. For example, T1 may be the time after the read-write device sends a command to the tag device to reply to the random number.
T2: after the tag device sends a message, waiting for the maximum time fed back by the read-write device. For example, T2 may be the time after the tag device transmits the random number to receive the read-write device acknowledgement message or the contention resolution message response.
T3: after T1, the read-write device waits for the feedback time of the second device before sending the next command. For example, after the read-write device sends a message, the maximum time waiting for the tag device to feed back is t1+t3.
T4: the minimum time interval between two consecutive downstream commands.
Fourth, the storage area of the tag device:
the memory area of the tag device is divided into four different memory areas, each consisting of one or more memory words. The logical memory map is shown in fig. 5, and these memory areas are respectively:
(1) Reserved memory area (reserved): for storing passwords required for the deactivation and access functions. Wherein, the memory addresses 00h to 1Fh store the deactivation password (kill password), 00h is the least significant bit (least significant bit, LSB), 1Fh is the most significant bit (most significant bit, MSB), and 20h to 3Fh store the access password (access password).
(2) EPC storage area. The memory area of addresses 00h to 0Fh is used to store CRC, the memory area of addresses 10h to 1Fh is used to store PC bits, and addresses 20h and greater than 20h store information for identifying the tag device attached object, such as EPC, optional extended protocol control (optional extended protocol control, optional XPC).
(3) Tag device identification or tag identifier (tag-identification or tag identifier, TID) storage area. Alternatively, addresses 00h through 07h store 8 bits of International organization for standardization and International electrotechnical Commission (international organization for standardization/international electrotechnical commission, ISO/IEC) 15693 assigned class identification code (EPCglobal code 11100010_2). The area above address 07h should contain sufficient identification information to enable the reader device to uniquely identify the custom command and/or the optional command supported by the tag device. For a tag device assigned to ISO/IEC 15693 under the category 11100010_2, this identification information will constitute a tag device mask designer identifier, e.g. 12-bit word length, stored at 08h to 13h, and a tag model code, e.g. 12-bit word length, stored at addresses 14h to 1Fh. The tag device may store unique data of the tag and the provider (e.g., serial number of the tag) in an area having an address greater than 1Fh in the TID area.
(4) A user storage area. Allowing storage of user-specific data, the storage organization of which can be defined by the user.
In the RFID protocol, signaling and data between the read-write device and the tag device are sent in a unified signaling format, and all the signaling and data are in one protocol layer. In a mobile network, a hierarchical design is performed. How to use the RFID technology and the mobile network in a fusion way becomes a problem to be solved. For example, in the RFID protocol, the acknowledgement message and EPC are sent in a unified signaling format. In the scenario of the integration of the RFID technology and the mobile network, the selection command, the query command, the confirmation message and the like belong to the air interface signaling, the EPC belongs to the data of the application layer, and how to send the air interface signaling and the data of the application layer becomes a problem to be solved.
In addition, the timing relationship in the process of accessing the existing tag device to the read/write device is fixed, and is the timing under the integrated architecture, and the supplementary coverage scene (such as the scene shown in (c) of fig. 1) and the separated architecture scene (such as the scene shown in fig. 2) are not considered, so that the existing timing relationship is not suitable for the supplementary coverage scene and the separated architecture scene.
Illustratively, in the prior art, the interaction between the tag device and the read-write device should generally meet the timing requirements of table 1 below, the timing relationship being fixed.
TABLE 1
Figure BDA0003433420980000101
In table 1, RTcal is the length of data symbol 0 and data symbol 1, tpri=1/BLF, tpri is the reflected link pulse repetition interval (backscatter-link pulse-repetition interval), BLF is the reflected link frequency (BLF).
The random access method provided in the embodiments of the present application will be specifically described below with reference to fig. 6 to 8.
Fig. 6 is a schematic flow chart of a random access method according to an embodiment of the present application. The random access method may be applied to communication between any two nodes shown in fig. 1.
As shown in fig. 6, the random access method includes the steps of:
S601, the first device sends a first disk storage command to the second device. Accordingly, the second device receives the first disk storage command from the first device.
For example, a first disk command may be used to instruct one or more second devices to perform random access.
For example, the first disk storage command may include a condition for instructing one or more second devices to perform access, and the second devices satisfying the access condition perform random access.
Illustratively, the first disk storage command may include data of the application layer. In this way, the application layer data can be sent to the second device as soon as possible.
For example, the data of the application layer may include instructions of the application layer, such as read instructions, write instructions, read-write instructions, read identifications, and the like.
In some embodiments, the data of the application layer may be carried in a radio resource control (radio resource control, RRC) message, or a medium access control (media access control, MAC) data packet.
For example, the data of the application layer may be encapsulated in a container (container) of the RRC message or in a MAC packet issued together with the first disk command.
In some embodiments, the first disk storage command may further include one or more group identification information, one group identification information identifying one or more second devices.
For example, the first disc storage command includes group identification information 1 and group identification information 2, the group identification information 1 being used to identify the second device 1 and the second device 2, and the group identification information 2 being used to identify the second device 3 and the second device 4. The first disk command may instruct the second device 1, the second device 2, the second device 3, and the second device 4 to access the first device.
Alternatively, a certain group of second devices may be instructed to perform related operations by the group identification information.
In some embodiments, the one or more group identification information corresponds to one or more application layer data. In this way, the second device corresponding to the group identifier may be instructed to receive the corresponding application layer data, and perform corresponding processing or response according to the application layer data.
Illustratively, assume that the first disk storage command includes group identification information 1 and group identification information 2, the group identification information 1 being used to identify the second device 1 and the second device 2, and the group identification information 2 being used to identify the second device 3 and the second device 4. The group identification information 1 corresponds to a read instruction, and the group identification information 2 corresponds to a write instruction. In this way, the first device can send read instructions to the second device 1 and the second device 2 and write instructions to the second device 3 and the second device 4.
It should be noted that the foregoing is merely an example of the embodiment of the present application, the present application does not limit the number of the group identification information, and does not limit the number of the second devices identified by the group identification information, where the group identification information may identify one second device, and the present application defines the name of the group identification information, and the group identification information may also be referred to as identification information.
Alternatively, the first disk storage command may be, but is not limited to, a Query (Query) command, or a Select (Select) command, a repeat Query command, or a paging passive link (paging passive link) command.
The first device may be a read-write device, or an access network device, for example.
When the first device is a read-write device, the random access method provided in the embodiment of the present application may further include: the access network device sends an inventory command to the first device. Accordingly, the first device receives inventory commands from the access network device.
Alternatively, the inventory command may include data of the application layer, and may also include one or more group identification information.
When the first device is an access network device, the random access method provided in the embodiment of the present application may further include: the core network element sends an inventory command to the first device. Accordingly, the first device receives inventory commands from the core network element.
Alternatively, the inventory command may be application layer triggered. For example inventory commands sent by the application server to the core network element. Or, the first device applies the first disk command triggered by the layer.
S602, the second device sends a random access request message to the first device. Accordingly, the first device receives the random access request message from the second device.
Illustratively, a random access request message may be used to request access to the first device.
In some embodiments, the second device determines a time or a time slot when to initiate random access, for example, initiates random access to the first device by a time slot ALOHA mode or sends a random number for access. The time slot ALOHA mode is an anti-collision algorithm.
Optionally, the random access request message may include the random number RN16, and the specific implementation of the random number RN16 is described with reference to fig. 4, which is not repeated herein.
Alternatively, the random access request message may include one or more group identification information and/or random number information. For example, the random number information may be the random number RN16.
The random access request message may be understood as a response message of the first disc storage command, and the name of the random access request message is not limited in this application.
S603, the first device sends a random access success message to the second device. Accordingly, the second device receives the random access success message from the first device.
For example, the random access success message may be used to indicate that the second device has successfully accessed the first device.
In some embodiments, the random access success message comprises data of the application layer and/or the first disk storage command comprises data of the application layer.
The first disk storage command may include data of an application layer, or the random access success message may include data of an application layer. That is, the application layer data may be addressed to the second device by the first device through the first disk storage command or addressed to the second device through the random access success message.
For example, the first disk command includes data of an application layer, and the random access success message does not include data of the application layer, which may mean that there is data of the application layer to be sent to the second device at S601, and there is no data of the application layer to be sent to the second device at S603.
For example, the first disk command does not include data of the application layer, and the random access success message includes data of the application layer, which may mean that there is no data of the application layer to be transmitted at S601, and there is data of the application layer to be transmitted at S603.
Also illustratively, the first disk storage command includes data of the application layer and the random access success message includes data of the application layer. It may mean that there is data of an application layer to be sent to the second device at S601 and there is data of a new application layer to be sent down at S603.
In some embodiments, similar to S601 described above, in S603, the data of the application layer may be carried in an RRC message, or a MAC packet. For example, the application layer data may be sent to the second device in a MAC packet along with the conflict resolution message.
For example, the data of the application layer may be encapsulated in a container (container) of the RRC message, a non-access stratum (NAS) message such as in the RRC message, or a MAC packet issued together with the random access success message.
Alternatively, the random access success message may be, but is not limited to, a collision resolution message, or an acknowledgement message.
Alternatively, the random access success message may include the random number RN16. The RN16 may be the RN16 in the random access request message.
In one possible design, the first device may send data of the application layer to the second device after sending the random access success message.
For example, the random access success message may not include application layer data, and the first device transmits the application layer data to the second device after contention resolution.
In one possible design manner, the method provided by the embodiment of the application may further include: the second device transmits data to the first device. Accordingly, the first device receives data from the second device.
For example, the second device may send the tag information to the first device, and for a specific implementation of the tag information, reference may be made to the description in fig. 4, which is not repeated herein.
Alternatively, the step of the second device sending data to the first device may be performed after the first device receives a random access success message.
Based on the random access method shown in fig. 6, the first device sends a first disk storage command to the second device and receives a random access request message from the second device. The first disk storage command is used for indicating one or more second devices to perform random access, the random access request message is used for requesting to access the first device, and the first device sends a random access success message to the second devices. Wherein the first disk storage command comprises data of an application layer, and/or the random access success message comprises data of the application layer. In this way, the first device may send the first disk storage command and the data of the application layer to the second device together, and/or send the random access success message and the data of the application layer to the second device together. In a protocol architecture of layered design, possible transmission time points and flows are defined for application layer data transmission, and the fusion use of the RFID technology and the mobile network can be realized. In addition, when the first disk storage command is sent, the data of the application layer does not need to be issued after the contention resolution is waited, the disk storage time delay can be saved, and the disk storage speed is improved.
Fig. 7 is a schematic flow chart of another random access method according to an embodiment of the present application. The random access method may be applied to communication between any two nodes shown in fig. 1 or fig. 2. For example in a communication system comprising a third device.
As shown in fig. 7, the random access method includes the steps of:
s701, the first device sends a first disk storage command to the third device. Accordingly, the third device receives the first disk storage command from the first device.
Illustratively, the first disk storage command is used to instruct the one or more second devices to perform random access.
Illustratively, the first disk storage command may include data of the application layer.
In some embodiments, the first disk storage command further includes one or more group identification information, one group identification information identifying one or more second devices.
In some embodiments, the one or more group identification information corresponds to one or more application layer data.
In some embodiments, the data of the application layer is carried in an RRC message, or a medium access control MAC packet.
It should be noted that, for the specific implementation of the first disc storage command, reference may be made to the corresponding description in S601, which is not repeated herein.
The first device may be a read-write device, or an access network device, for example.
When the first device is a read-write device, the random access method provided in the embodiment of the present application may further include: the access network device sends an inventory command to the first device. Accordingly, the first device receives inventory commands from the access network device.
Alternatively, the inventory command may include data of the application layer, and may also include one or more group identification information.
When the first device is an access network device, the random access method provided in the embodiment of the present application may further include: the core network element sends an inventory command to the first device. Accordingly, the first device receives inventory commands from the core network element.
Alternatively, the inventory command may be application layer triggered. For example inventory commands sent by the application server to the core network element.
S702, the third device sends a first disk storage command to the second device. Accordingly, the second device receives the first disk storage command from the third device.
The first disk storage command received by the third device from the first device may be a command that the third device can interpret, the first disk storage command sent by the third device to the second device may be a command that the second device can interpret, and the content, the function, and the like included in the two commands may be the same or partially the same.
Alternatively, the third device may send data to the second device, for example, the third device has data or a message to send itself to the first device, which may be sent to the second device in the same step as the first disk storage command, or may be sent separately, which is not limited in this application.
S703, the second device sends a random access request message to the first device. Accordingly, the first device receives the random access request message from the second device.
Illustratively, a random access request message may be used to request access to the first device.
It should be noted that, for the specific implementation of S703, reference may be made to S602 described above, which is not repeated here.
S704, the first device sends a random access success message to the third device. Accordingly, the third device receives the random access success message from the first device.
Optionally, the random access success message is used to indicate that the second device has successfully accessed the first device.
In some embodiments, the random access success message comprises data of the application layer and/or the first disk storage command comprises data of the application layer. For specific implementation, reference may be made to S603, which is not described herein.
In some embodiments, in S704, data of the application layer may be carried in an RRC message, or a MAC packet.
It should be noted that, for the specific implementation of the random access success message, reference may be made to S603 above, which is not repeated here.
In one possible design, the first device may send, after sending the random access success message, data of the application layer to the second device through the third device.
For example, the random access success message may not include application layer data, and after contention resolution, the first device transmits the application layer data to the third device, which transmits the application layer data to the second device.
S705, the third device sends a random access success message to the second device. Accordingly, the second device receives the random access success message from the third device.
It should be noted that, similar to the first disk storage command, the random access success message received by the third device from the first device may be a message that can be interpreted by the third device, the random access success message sent by the third device to the second device may be a message that can be interpreted by the second device, and the content, the function, and the like included in the two messages may be the same.
In one possible design manner, the method provided by the embodiment of the application may further include: the second device transmits data to the first device. Accordingly, the first device receives data from the second device.
For example, the second device may send the tag information to the first device, and for a specific implementation of the tag information, reference may be made to the description in fig. 4, which is not repeated herein.
Alternatively, the step of the second device sending data to the first device may be performed after the first device receives a random access success message.
Based on the random access method shown in fig. 7, the first device sends a first disk storage command to the second device through the third device, receives a random access request message from the second device, and sends a random access success message to the second device through the third device. Wherein. The first disk storage command is used for indicating one or more second devices to perform random access, the random access request message is used for requesting to access the first device, the first disk storage command comprises data of an application layer, and/or the random access success message comprises data of the application layer. In this way, the first device may issue the first disk storage command together with the data of the application layer, and/or issue the random access success message together with the data of the application layer. In a protocol architecture of layered design, possible transmission time points and flows are defined for application layer data transmission, and the fusion use of the RFID technology and the mobile network can be realized. In addition, when the first disk storage command is sent, the data of the application layer does not need to be issued after the contention resolution is waited, the disk storage time delay can be saved, and the disk storage speed is improved.
In the communication system provided by the application, signaling or message transmission between the first device, the second device and the third device is required to follow a time sequence relationship, and the time sequence relationship is explained below.
It should be noted that the following implementation of the timing may be used in combination with the methods shown in fig. 6 and fig. 7, or the following implementation of the timing may be used alone.
By way of example, the scenario shown in fig. 1 (a), and fig. 1 (b), and fig. 1 (c) (in the case where the IAB node communicates with the second device) may be referred to as a scenario in which the third device is not included in the communication system, for example, the first device and the second device are included in the communication system, and the third device is not included. The scenario shown in fig. 1 (c) (in the case where the excitation source communicates with the second device and the macro station is the first device) and fig. 2 are referred to as a scenario including the first device, the second device, and the third device in the communication system (hereinafter simply referred to as a scenario including the third device in the communication system).
In an integrated architecture in a scenario where the communication system includes a third device, referring to (c) in fig. 1, the second device needs to receive a message from the first device through the third device, and the second device needs to send a message to the first device through the third device. In the split architecture, as shown in fig. 2, the second device needs to receive the message from the first device through the third device, and the second device directly sends the response message to the first device. The scenario in which the third device is included in the communication system may increase the time required for transmitting data between the third device and the first device by increasing the transmission flow between the first device and the third device during transmission compared to the scenario in which the third device is not included in the communication system.
The implementation of the fourth time period, the first time period, the third time period, and the second time period is explained below.
In one possible design, the minimum time interval between two downlink commands sent by the device is a fourth time period T4, where the value of the fourth time period T4 may be the same in a scenario in which the communication system includes the third device and in a scenario in which the communication system does not include the third device.
Alternatively, the fourth time period T4 may also be understood as a waiting time between two downlink signaling, which may be a time for the second device to process the signaling.
For example, the minimum time interval in which the first device or the third device transmits the selection command and the inquiry command may be the fourth period T4.
For a scenario in which the third device is not included in the communication system, after the first device sends the selection command, the first device sends the query command at intervals of a fourth time period T4.
Fig. 8 is a schematic diagram of a timing sequence in a scenario including a third device in the communication system provided in the embodiment of the present application, where (a) in fig. 8 corresponds to the scenario shown in (c) in fig. 1, and (b) in fig. 8 corresponds to the scenario shown in fig. 2.
For a scenario in which a third device is included in the communication system, as shown in fig. 8 (a) or fig. 8 (b), the first device transmits a selection command to the third device, and the third device receives the selection command and transmits the selection command to the second device. At intervals of a fourth time period T4, the first device transmits a query command to the third device, which receives the query command and transmits the query command to the second device. From the perspective of the first device, the time interval during which the first device sends two commands is not affected by the transmission process between the first device and the third device, and may be the fourth time period T4. From the perspective of the third device, the time interval in which the third device sends two commands is the same as the time interval in which the first device sends two commands, and is not affected by the transmission process between the first device and the third device.
In one possible design, the first period may be a time after sending the downlink message to wait for feedback from the second device.
Alternatively, the first period of time may be a processing delay of the received downlink message by the second device. Or may further include a downlink message transmission time, or may further include a preparation time for a next piece of signaling, or the first time period may include a processing delay of the received command by the second device, and a time required for transmitting data between the first device and the third device.
In some embodiments, the first time period may be determined based on the encoding scheme, and/or the coverage level.
Alternatively, in some embodiments, the first time period may be determined based on the coding scheme and/or coverage level, and the augmentation time information. The first time period is determined, for example, according to the coding scheme, the coverage level, and the increase time information, the first time period is determined according to the coding scheme and the increase time information, and the first time period is determined according to the coverage level and the increase time information.
For example, the overlay may include a base overlay (e.g., (a) in fig. 1, or (b) in fig. 1), or a supplemental overlay (c) in fig. 1, or fig. 2). If the second device is in the coverage scenario shown in fig. 1 (a), or fig. 1 (b), the coverage level may be considered to be higher. If the second device is in the coverage scenario shown in fig. 1 (a), or fig. 2, the coverage level may be considered lower.
For example, if the coverage level is low, the value of the corresponding first time period is greater.
In this way, timing constraints under different coverage can be determined, and different architectures and different scenarios can be better adapted.
Optionally, the increased time information may be used to indicate the time required to transfer data between the third device and the first device.
Alternatively, the increased time information may include a time required for transmitting data between the third device and the first device, and may also include a time for the third device to process the data.
In the embodiment of the present application, the time indicated by the added time information may be denoted by Tb.
For example, the increase time information Tb may be determined by the third device, or the first device, according to an interface, or connection between the third device and the first device.
Alternatively, in other embodiments, the first time period may be preset.
For example, the first time period is a protocol-agreed time. Alternatively, the first time period may be a time determined by the first device itself.
Alternatively, in a scenario where the communication system does not include the third device, the first time period is denoted by T1.
Referring to fig. 4, T1 represents a time for waiting for feedback from the second device after the first device sends a message in a scenario where the communication system does not include the third device.
Optionally, in a scenario in which the communication system includes a third device, for the first device, the first time period is denoted by T1'; for the third device, the first period of time is denoted by T1 ".
In combination with (a) in fig. 8 or (b) in fig. 8, T1' represents a time for waiting for feedback from the second device after the first device transmits a message in a scenario where the communication system includes the third device. T1 "indicates that in a scenario in which the communication system includes a third device, the third device waits for a feedback time from the second device after sending a message.
Optionally, in a scenario where the communication system includes the third device, under the integrated architecture, the second device sends a message to the first device through the third device, as shown in (b) in fig. 8, where, for the first device, t1' =t1+2×tb, tb is a time required for transmitting data between the first device and the third device, and may further include a time for processing data by the third device, and for the third device T1 "=t1. The time for transmitting the inquiry command between the first device and the third device and the time for transmitting the random access request message are increased in T1'.
Optionally, in a scenario where the communication system includes a third device, the second device may send a message directly to the first device in a split architecture, as shown in (b) of fig. 8, for the first device, t1' =t1+tb, tb is the time indicated by the added time information, for the third device T1 "=t1. The time for transmitting the inquiry command between the first device and the third device is increased in T1'.
As such, determining the time to wait for feedback from the second device (the first time period) takes into account the time required to transfer data between the third device and the first device may better adapt to different architectures and different scenarios.
In one possible design, the third period is a time for waiting for feedback from the second device after the first period and before sending the next command.
Alternatively, the third period T3 may be preset.
For example, the third time period may be a protocol-specified, or a first device self-determined time.
Illustratively, in a scenario where the communication system does not include a third device, the maximum time for the first device to wait for feedback from the first device after the first device sends a message is t1+t3. The time may be protocol specified or notified by other devices.
In an exemplary scenario in which the communication system includes a third device, after the first device sends a message in an integrated architecture, the maximum time waiting for feedback from the first device is t1' +t3=t1+t3+2×tb; after the third device sends a message, the maximum time waiting for feedback from the first device is t1 "+t3=t1+t3.
In an exemplary scenario in which the communication system includes a third device, after the first device sends a message in a split architecture, the maximum time waiting for feedback from the first device is t1' +t3=t1+t3+tb; after the third device sends a message, the maximum time waiting for feedback from the first device is t1 "+t3=t1+t3.
In one possible design manner, the random access method provided in the embodiment of the present application may further include: after the first device sends the first disk storage command, if the random access request message is not received in the first time period, the first device continues to wait for the third time period, or stops waiting and sending the next command.
As shown in fig. 4 (b), taking the first disk storage command as the repeated query command as an example, the first device sends the repeated query command, waits for T1 time, does not receive a response message, and continues waiting for T3 time. If the response message is not received after the time T3, the first device may consider that no second device is accessed at this time, and may perform subsequent inventory.
Alternatively, the first device may send a repeat query command, wait for T1 time, not receive a response message, stop waiting, inventory another second device, or send a next command.
In this way, for different architectures and different scenes, the implementation manner of determining the maximum time waiting for the feedback of the first device is proposed, so that the different architectures and the different scenes can be better adapted.
It should be noted that, in the present application, when determining the time to wait for the feedback of the second device (the second period of time) in the scenario including the third device, whether the time required for transmitting data between the first device and the third device must be increased or not is not limited, and whether the time is increased or not may be determined according to a protocol specification, for example.
In one possible design, the second period of time is a time for waiting for a response message after the second device sends the message. It is also understood that the time to wait for a response after the uplink command is sent.
For example, after the second device sends the random access request message, or the first access message, or the response message for the first disk storage command to the first device, the second device waits for the duration of the response message to be the second time period.
Illustratively, the second device may select an access slot in which to send a random access request message, which may include the random number RN16. After the second device sends the random access request message, a timer may be started to wait for feedback, and when the second time period is exceeded, the random access failure is determined.
In some embodiments, the second time period may be determined according to parameter information, or time information, or the second time period may be determined according to parameter information and increasing time information, or the second time period may be preset.
Optionally, the first disk storage command may include parameter information, and/or time information. That is, the parameter information, and/or the time information may be received by the second device from the first device or the third device.
In some embodiments, the second time period is protocol-definable. The first device or the third device sends indication information to the second device, and the indication information can be used for indicating the second device to determine the specific time used from the protocol according to the indication information.
For example, the first disc storage command in S601, S701, and S702 described above may include parameter information, and/or time information.
Optionally, the parameter information may include data transmission rate, repetition number, coding scheme, modulation scheme (e.g., on-off keying (OOK), amplitude Shift Keying (ASK), binary phase shift keying (binary phase shift keying, BPSK), quadrature phase shift keying (quadrature phase shift keying, QPSK)), frame structure type (e.g., long or segmented), and/or coverage level.
For example, the number of repetitions may be the number of repetitions at which the second device transmits a certain message. For example, in the above S602, the second device may transmit the random access request message multiple times, for example, N times, and the repetition number is N, where N is an integer greater than or equal to 0.
In some embodiments, the second time period is equal to a product of the parameter in the parameter information and the coefficient.
For example, assuming that the parameter information includes a data transmission rate, a repetition number, and a coverage level, the second period=data transmission rate×repetition number×coverage level×coefficient. Alternatively, the parameter required to determine the second time period may be one or more of the above parameters. The specific coefficients may be absent.
Alternatively, the coefficients may include, but are not limited to, one or more of the following: tari and Tpri. Where Tari may be a transmission duration corresponding to the character "0" or a transmission duration corresponding to the character "1", tpri=1/BLF.
In this way, considering the data transmission rate, the number of repetitions, and/or the coverage level in determining the second time period, a time constraint at different coverage, different number of repetitions, and/or different transmission rate may be determined, and different architectures and different scenarios may be better adapted.
Assuming that the parameter information includes a data transmission rate, the number of repetitions, and a coverage level, and the coefficients include Tari and Tpri, the second period=transmission rate×the number of repetitions×the coverage level×tari×tpri.
In some embodiments, the second time period is a protocol-specified value or range of values. Specifically, the second device may determine, according to the configuration information sent by the first device or the third device, a value or a value range of a second time period specified in the used protocol.
Illustratively, the configuration information may be at least one of the above parameter information, and the protocol may specify a table of values or a range of values. For example, the second device is instructed to use rate 1 and cover level 2, and then the value or the value range corresponding to the second time period can be found through the protocol lookup table.
In some embodiments, the second time period = time determined from the parameter information + time indicated by the increase time information.
For example, assuming that the parameter information includes at least one of a data transmission rate, a repetition number, and a coverage level, the second period= (data transmission rate×repetition number×coverage level) is at least one of a coefficient+time indicated by the increase time information.
Assuming that the parameter information includes a data transmission rate, the number of repetitions, and a coverage level, and the coefficients include Tari and Tpri, the second period=transmission rate×the number of repetitions×the coverage level×tari×tpri+the time indicated by the increase time information.
For the second time period which can be determined according to the parameter information and the added time information under the split architecture, not only the coverage level, the repetition number and/or the transmission rate are considered, but also the time required for transmitting data between the third device and the first device is considered, so that the split architecture can be better adapted.
In particular, the time indicated by the increased time information may be an additional time required for calculating the second time period, which is specifically required to be increased.
In some embodiments, the second time period = time determined from the parameter information + increasing the time information.
Wherein the time of increase information may be determined based on second parameter configuration information, which may be at least one of the parameter information, e.g. rate, coverage, etc., as described above. An indication of the time level used, etc. may also be included. The second parameter configuration information may be sent by the third device to the second device, where the calculation mode refers to the calculation mode of the second time period.
Alternatively, the augmentation time information may be protocol-specified. The second device may determine the time of final use in the protocol based on the configuration information sent by the third device.
The implementation of the second time period is explained below in connection with fig. 4 and 8.
Alternatively, in a scenario in which the communication system does not include the third device, the second period of time is denoted by T2.
In connection with fig. 4, T2 represents a time for waiting for a response message after a second device transmits a message in a scenario in which the communication system does not include a third device.
Optionally, in a scenario in which the communication system includes a third device, the second time period is denoted by T2'.
In combination with (a) in fig. 8 or (b) in fig. 8, T2' represents a time for waiting for a response message after a second device transmits a message in a scenario where the communication system includes a third device.
Optionally, in a scenario in which the communication system includes the third device, under the integrated architecture, the second device sends a message to the first device through the third device, as shown in (b) of fig. 8, T2' =t2+2×tb, tb being the time indicated by the added time information. The time for transmitting the random access request message between the first device and the third device and the time for transmitting the random access success message are increased in T2'. Alternatively, the second device may determine whether to increase Tb according to the increase time indication information.
Alternatively, the increase time indication information may be used to indicate whether to increase the time required for transmitting data between the third device and the first device in determining the second time period.
Optionally, in a scenario where the communication system includes a third device, the second device may send a message directly to the first device in a split architecture, as shown in (b) of fig. 8, where T2' =t2+tb, tb is the time indicated by the added time information. And increasing the time for transmitting the random access success message between the first device and the third device in T1'. Alternatively, the second device may determine whether to increase Tb according to the increase time indication information.
It should be noted that Tb in (b) of fig. 8 is only schematic, and uplink and downlink transmission times of the same link may be different. In this embodiment of the present application, the Tb value corresponding to the uplink and the Tb value corresponding to the downlink of the same link may be the same or may be different, which is not limited in this application.
In some embodiments, the time information may be used to indicate a period of time.
For example, the first device may send the time (time information) of the second time period used by the second device in the current inventory, and the second device may directly use the duration indicated by the time information as the second time period.
For example, the time information may include a time required for transmitting data between the third device and the first device, and may also include a time for the third device to process the data.
Alternatively, the second device may determine a second period of time from the time information and the time increase information, the second period of time=the time indicated by the time information+the time indicated by the time increase information. For example, the time information may not include the time required to transfer data between the third device and the first device, but may also include the time the third device processes the data.
In some embodiments, the second time period may be preset.
The second time period may be protocol-specified, for example. For example, the protocol specifies a second time period corresponding to a different coverage level or data transmission rate, and the second device uses a value of the second time period corresponding to the coverage level or data transmission rate. For example, the first device indicates the coverage level or data transmission rate to the second device, either by display or implicitly.
For example, the first device indicates the coverage level through the first disc storage command display, for example, indicates that the coverage level is 1, and the second device takes the time corresponding to the coverage level 1 in the protocol as the value of the second time period.
For example, the second device determines the coverage level used based on the received message or data, and if the number of repetitions of use or the coverage level is determined by receiving the message, the corresponding coverage level information is used in the calculation.
For example, the second device may display or implicitly determine the second time period based on information received from the first device or the third device.
In one possible design manner, the random access method provided in the embodiment of the present application may further include: the third device transmits the increase time information and/or the increase time indication information to the second device. Accordingly, the second device receives the increased time information, and/or the increased time indication information from the third device.
Alternatively, the increase time indication information may be used to indicate whether to increase the time required for transmitting data between the third device and the first device in determining the second time period.
For example, the increased time indication information may be used to indicate whether the second device determines the second time period using the increased time information.
For example, if the increase time indication information is "1" indicating that the increase time information is used to determine the second period of time, the second device determines the second period of time according to the parameter information and the increase time information. If the increasing time indication information is '0', the second device determines the second time period according to the parameter information without adopting the increasing time information to determine the second time period.
In one possible embodiment, the second time period may be a time range.
For example, if the second time period is a time range, the second device may not decode the data from the first device until the lower bound of the second time period is reached, and then begin decoding after the lower bound of the second time period is reached. The upper bound for the second period is then the maximum time the second device waits for the first device to send data, or the maximum time to attempt decoding.
In one possible design manner, the random access method provided in the embodiment of the present application may further include: and under the condition that the random access request message is sent and the response message is not received after waiting for the second time period, the second equipment determines that the random access fails.
Optionally, after determining that the random access fails, the second device may wait to enter the next inventory, or perform a subsequent operation according to the instruction of the first device.
It should be noted that, in the flow of transmission between the first device, the second device, and the third device, any signaling or timing relationship between messages involved may be referred to in the foregoing description, and the signaling or messages may not be the signaling or messages mentioned in the foregoing embodiments.
For example, the second time period is a duration of waiting for a response message after the second device transmits the message. If the timeout indicates that the connection is problematic or the decoding is problematic, a state may be entered in which there is no connection to the network.
According to the method, each application scene is fully considered, calculation modes of each time period (time slot) under an integrated architecture and under a separated architecture are provided, and the method is used for determining waiting time periods of the first equipment, the second equipment and the third equipment, so that time requirements under different architectures and different scenes can be adapted.
Throughout this application, unless specifically stated otherwise, identical or similar parts between the various embodiments may be referred to each other. In the various embodiments and the various implementation/implementation methods in the various embodiments in this application, if no special description and logic conflict exist, terms and/or descriptions between different embodiments and between the various implementation/implementation methods in the various embodiments may be consistent and may be mutually referred to, technical features in the different embodiments and the various implementation/implementation methods in the various embodiments may be combined to form new embodiments, implementations, implementation methods, or implementation methods according to their inherent logic relationships. The embodiments of the present application described below do not limit the scope of the present application.
The random access method provided in the embodiment of the present application is described in detail above with reference to fig. 1 to 7. The random access device provided in the embodiments of the present application is described in detail below with reference to fig. 9 to 10.
Fig. 9 is a schematic structural diagram of a random access device that may be used to implement the embodiments of the present application. The random access apparatus 900 may be a first device, a second device, or a third device, or may be a chip or other components with corresponding functions applied to the first device, the second device, or the third device. As shown in fig. 9, the random access apparatus 900 may include a processor 901. Optionally, the random access device 900 may further comprise one or more of a memory 902 and a transceiver 903. Where the processor 901 may be coupled to one or more of the memory 902 and the transceiver 903, such as via a communication bus connection, the processor 901 may also be used alone.
The following describes each component of the random access device in detail with reference to fig. 9:
the processor 901 is a control center of the random access device 900, and may be one processor or a collective term of a plurality of processing elements. For example, processor 901 is one or more central processing units (central processing unit, CPU), but may also be an integrated circuit (application specific integrated circuit, ASIC), or one or more integrated circuits configured to implement embodiments of the present application, such as: one or more microprocessors (digital signal processor, DSPs), or one or more field programmable gate arrays (field programmable gate array, FPGAs).
Among other things, the processor 901 may perform various functions of the random access device 900 by running or executing software programs stored in the memory 902 and invoking data stored in the memory 902.
In a particular implementation, processor 901 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 9, as an embodiment.
In a specific implementation, as an embodiment, the random access device 900 may also include a plurality of processors, such as the processor 901 and the processor 904 shown in fig. 9. Each of these processors may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). A processor herein may refer to one or more communication devices, circuitry, and/or processing cores for processing data (e.g., computer program instructions).
Alternatively, memory 902 may be, but is not limited to, read-only memory (ROM) or other type of static storage communication device capable of storing static information and instructions, random access memory (random access memory, RAM) or other type of dynamic storage communication device capable of storing information and instructions, but may also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), compact disc read-only memory (compact disc read-only memory) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage communication device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 902 may be integrated with the processor 901, or may exist separately, and be coupled to the processor 901 through an input/output port (not shown in fig. 9) of the random access device 900, which is not specifically limited in the embodiment of the present application.
Illustratively, the input port may be used to implement a receive function performed by the first device, the second device, or the third device in any of the method embodiments described above, and the output port may be used to implement a transmit function performed by the first device, the second device, or the third device in any of the method embodiments described above.
The memory 902 may be used to store a software program for executing the present application, and the processor 901 controls the execution. The specific implementation manner may refer to the following method embodiments, which are not described herein.
Optionally, a transceiver 903, for communication with other random access devices. For example, where the random access apparatus 900 is a first device, the transceiver 903 may be configured to communicate with a second device and/or a third device. For another example, where the random access apparatus 900 is a second device, the transceiver 903 may be configured to communicate with the first device, or a third device. For another example, where the random access apparatus 900 is a third device, the transceiver 903 may be configured to communicate with the first device, or the second device. In addition, the transceiver 903 may include a receiver and a transmitter (not separately shown in fig. 9). The receiver is used for realizing the receiving function, and the transmitter is used for realizing the transmitting function. The transceiver 903 may be integrated with the processor 901, or may exist separately, and be coupled to the processor 901 through an input/output port (not shown in fig. 9) of the random access device 900, which is not specifically limited in this embodiment of the present application.
It should be noted that the structure of the random access device 900 shown in fig. 9 is not limited to the random access device, and an actual random access device may include more or less components than those shown, or may combine some components, or may be different in arrangement of components.
The actions of the first device in fig. 2 to 8 may be performed by the processor 901 in the random access apparatus 900 shown in fig. 9, by calling the application program code stored in the memory 902 to instruct the first device.
The above-described actions of the second device in fig. 2 to 8 may be performed by the processor 901 in the random access apparatus 900 shown in fig. 9 by calling the application code stored in the memory 902 to instruct the second device, which is not limited in this embodiment.
When the random access apparatus is the first device, the random access apparatus 900 may perform any one or more of the possible design manners related to the first device in the above method embodiments; when the random access apparatus is the second device, the random access apparatus 900 may perform any one or more of the possible design manners related to the second device in the above method embodiments.
It should be noted that, all relevant contents of each step related to the above method embodiment may be cited to the functional description of the corresponding functional module, which is not described herein.
Fig. 10 is a schematic structural diagram of another random access device according to an embodiment of the present application. For convenience of explanation, fig. 10 shows only major components of the random access apparatus.
The random access device 1000 includes a transmission module 1001 and a reception module 1002. The random access apparatus 1000 may be the first device, the second device, or the third device in the foregoing method embodiment. The transmission module 1001 may also be referred to as a transmission unit, and is configured to implement a transmission function performed by the first device, the second device, or the third device in any of the method embodiments described above. The receiving module 1002 may also be referred to as a receiving unit, and is configured to implement the receiving function performed by the first device, the second device, or the third device in any of the method embodiments described above.
It should be noted that, the transmitting module 1001 and the receiving module 1002 may be separately provided, or may be integrated into one module, i.e., a transceiver module. The specific implementation manner of the receiving module and the sending module is not specifically limited. The transceiver module may be formed by a transceiver circuit, a transceiver, or a communication interface.
Optionally, the random access device 1000 may further comprise a processing module 1003 and a storage module (not shown in fig. 10), which stores programs or instructions. The processing module 1003, when executing the program or instructions, enables the random access device 1000 to perform the method according to any of the method embodiments described above.
The processing module 1003 may be configured to implement a processing function performed by the first device, the second device, or the third device in any of the method embodiments described above. The processing module 1003 may be a processor.
In the present embodiment, the random access device 1000 is presented in a form of dividing each functional module in an integrated manner. A "module" herein may refer to a particular ASIC, an electronic circuit, a processor and memory that execute one or more software or firmware programs, an integrated logic circuit, and/or other device that can provide the described functionality. In a simple embodiment, it will be appreciated by those skilled in the art that the random access device 1000 may take the form of the random access device 900 shown in fig. 9.
For example, the processor 901 in the random access apparatus 900 shown in fig. 9 may cause the random access method in the above-described method embodiment to be performed by calling computer-executable instructions stored in the memory 902.
Specifically, the functions/implementation procedures of the processing module 1003 and the storage module in fig. 10 may be implemented by the transceiver 903 in the random access device 900 shown in fig. 9. The functions/implementation of the processing module 1003 in fig. 10 may be implemented by the processor 901 in the random access device 900 shown in fig. 9 invoking computer executable instructions stored in the memory 902,
Since the random access device 1000 provided in this embodiment can execute the above random access method, the technical effects obtained by the random access device can be referred to the above method embodiments, and will not be described herein.
In one possible design, the random access apparatus 1000 shown in fig. 10 may be adapted to the systems shown in fig. 1-3, and perform the function of the first device in the random access method according to any of the above method embodiments.
A sending module 1001, configured to send a first disk storage command to the second device or the third device. The first disk storage command is used for indicating one or more second devices to perform random access.
A receiving module 1002, configured to receive a random access request message from a second device. Wherein the random access request message is used to request access to the random access device 1000.
The sending module 1001 is further configured to send a random access success message to the second device or the third device. Wherein the random access success message is used to indicate that the second device has successfully accessed the random access apparatus 1000. The random access success message comprises data of the application layer and/or the first disk storage command comprises data of the application layer.
In one possible design, the first disk storage command further includes one or more group identification information, one group identification information being used to identify one or more second devices.
In one possible design, one or more sets of group identification information correspond to one or more application layer data.
In one possible design, the data bearer of the application layer is in a radio resource control RRC message, or a medium access control MAC packet.
In one possible design, the first disk storage command includes parameter information including a data transmission rate, a repetition number, and/or a coverage level, and/or time information indicating a period of time.
In one possible design, after the first disk storage command is sent, and in the case that the random access request message is not received in the first period, the receiving module 1002 is further configured to continue waiting for the third period, or stop waiting, and the sending module 1001 is further configured to send the next command. The first time period is determined according to the coding mode and/or the coverage level, or the first time period is preset. The third time period is preset.
It should be noted that, the receiving module 1002 and the transmitting module 1001 may be separately provided, or may be integrated into one module, i.e., a transceiver module (not shown in fig. 10). The specific implementation manner of the receiving module 1002 and the transmitting module 1001 is not specifically limited in this application.
Optionally, the random access device 1000 may further comprise a processing module 1003 and a storage module (not shown in fig. 10), which stores programs or instructions. The processing module 1003, when executing the program or instructions, enables the random access apparatus 1000 to perform the function of the first device in the random access method according to any of the method embodiments described above.
The random access apparatus 1000 may be a first device, for example, an access network device, a read/write device, or the like, or may be a chip (system) or other components or assemblies that may be provided in the first device, which is not limited in this application.
In addition, the technical effects of the random access apparatus 1000 may refer to the technical effects of the random access method shown in fig. 6 to 8, and will not be described herein.
In a possible design, the random access apparatus 1000 shown in fig. 10 may be adapted to the system shown in fig. 1-3, and perform the function of the second device in the random access method according to any of the above method embodiments.
A receiving module 1002, configured to receive a first disk storage command from a first device or a third device. Wherein the first disk storage command is used to instruct the one or more random access devices 1000 to perform random access.
A sending module 1001 is configured to send a random access request message to a first device. Wherein the random access request message is used for requesting access to the first device.
The receiving module 1002 is further configured to receive a random access success message from the first device, or the third device. Wherein the random access success message is used to indicate that the random access apparatus 1000 has successfully accessed the first device. The random access success message comprises data of the application layer and/or the first disk storage command comprises data of the application layer.
In one possible design, the first disk storage command further includes one or more group identification information, where one group identification information is used to identify one or more random access devices 1000.
In one possible design, one or more sets of group identification information correspond to one or more application layer data.
In one possible design, the data bearer of the application layer is in a radio resource control RRC message, or a medium access control MAC packet.
In one possible design, the first disk storage command includes parameter information including a data transmission rate, a repetition number, and/or a coverage level, and/or time information indicating a period of time.
In one possible design, the random access device 1000 may further include: the processing module 1003. In this case, when the random access request message is sent and no response message is received after waiting for the second period of time, the processing module 1003 is configured to determine that the random access fails this time. The second period of time is a time for waiting for a response message after the random access apparatus 1000 transmits the message, and is determined according to the parameter information or the time information, or is preset.
In one possible design, the receiving module 1002 is configured to receive the incremental time information and/or the incremental time indication information from the third device. The time information is used to indicate a time required for transmitting data between the third device and the first device, and the time indication information is used to indicate whether to increase a time required for transmitting data between the third device and the first device when determining a second time period, where the second time period is a time for waiting for a response message after the random access apparatus 1000 transmits a message.
It should be noted that, the receiving module 1002 and the transmitting module 1001 may be separately provided, or may be integrated into one module, i.e., a transceiver module. The specific implementation manner of the receiving module 1002 and the transmitting module 1001 is not specifically limited in this application.
Alternatively, the random access device 1000 may further include a storage module storing a program or instructions. The processing module 1003, when executing the program or the instruction, makes the random access apparatus 1000 perform the function of the second device in the random access method according to any of the method embodiments described above.
The random access apparatus 1000 may be a second device, for example, a terminal device, or may be a chip (system) or other components or assemblies that may be disposed in the second device, which is not limited in this application.
In addition, the technical effects of the random access apparatus 1000 may refer to the technical effects of the random access method shown in fig. 6 to 8, and will not be described herein.
The embodiment of the application provides a communication system. The communication system includes: a first device and a second device. The first device is configured to perform the actions of the first device in the method embodiment, and the second device is configured to perform the actions of the second device in the method embodiment.
Optionally, the communication system may further include: and a third device. The specific implementation method and process of the third device for implementing the actions of the third device in the above method embodiment may refer to the above method embodiment, and are not described herein again.
Embodiments of the present application provide a chip system including logic circuitry and input/output ports. The logic circuit may be used to implement a processing function related to the random access method provided by the embodiment of the application, and the input/output port may be used to transmit and receive a signal related to the random access method provided by the embodiment of the application.
The input port may be used to implement a receiving function related to the random access method provided by the embodiment of the application, and the output port may be used to implement a transmitting function related to the random access method provided by the embodiment of the application.
Illustratively, the processor in the random access device 900 may be configured to perform, for example and without limitation, baseband related processing, and the transceiver in the random access device 900 may be configured to perform, for example and without limitation, radio frequency transceiving. The above devices may be provided on separate chips, or may be provided at least partially or entirely on the same chip. For example, the processor may be further divided into an analog baseband processor and a digital baseband processor. Wherein the analog baseband processor may be integrated on the same chip as the transceiver and the digital baseband processor may be provided on a separate chip. With the continued development of integrated circuit technology, more and more devices may be integrated on the same chip, for example, a digital baseband processor may be integrated on the same chip with a variety of application processors (e.g., without limitation, graphics processors, multimedia processors, etc.). Such chips may be referred to as system on chips (system on chips). Whether the individual devices are independently disposed on different chips or integrally disposed on one or more chips is often dependent on the specific needs of the product design. The embodiment of the invention does not limit the specific implementation form of the device.
In one possible design, the chip system further includes a memory, where the memory is configured to store program instructions and data for implementing the functions related to the random access method provided in the embodiments of the present application.
The chip system can be composed of chips, and can also comprise chips and other discrete devices.
The embodiments of the present application provide a computer readable storage medium storing a computer program or instructions that, when executed on a computer, cause the random access method provided by the embodiments of the present application to be performed.
Embodiments of the present application provide a computer program product comprising: computer program or instructions which, when run on a computer, cause the random access method provided by the embodiments of the present application to be performed.
It should be appreciated that the processor in embodiments of the present application may be a central processing unit (central processing unit, CPU), which may also be other general purpose processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits (application specific integrated circuit, ASIC), off-the-shelf programmable gate arrays (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It should also be appreciated that the memory in embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM) which acts as an external cache. By way of example but not limitation, many forms of random access memory (random access memory, RAM) are available, such as Static RAM (SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM), synchronous Link DRAM (SLDRAM), and direct memory bus RAM (DR RAM).
The above embodiments may be implemented in whole or in part by software, hardware (e.g., circuitry), firmware, or any other combination. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions or computer programs. When the computer instructions or computer program are loaded or executed on a computer, the processes or functions described in accordance with the embodiments of the present application are all or partially produced. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center by wired (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more sets of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or B may mean: there are three cases, a alone, a and B together, and B alone, wherein a, B may be singular or plural. In addition, the character "/" herein generally indicates that the associated object is an "or" relationship, but may also indicate an "and/or" relationship, and may be understood by referring to the context.
In the present application, "at least one" means one or more, and "a plurality" means two or more. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (29)

1. A random access method, comprising:
the first device sends a first disk storage command to the second device or the third device; the first disk storage command is used for indicating one or more second devices to perform random access;
the first device receives a random access request message from the second device; wherein the random access request message is used for requesting to access the first device;
The first device sends a random access success message to the second device or the third device; wherein the random access success message is used for indicating that the second device has successfully accessed the first device; the random access success message comprises data of an application layer and/or the first disk storage command comprises data of the application layer.
2. The random access method of claim 1, wherein the first disk storage command further includes one or more group identification information, one of the group identification information being used to identify one or more of the second devices.
3. The random access method of claim 2, wherein the one or more group identification information corresponds to the one or more application layer data.
4. A random access method according to any of claims 1-3, characterized in that the data bearer of the application layer is in a radio resource control, RRC, message or a medium access control, MAC, data packet.
5. The random access method according to any of claims 1-4, wherein the first disk storage command comprises parameter information, and/or time information, the parameter information comprising a data transmission rate, a number of repetitions, and/or a coverage level, the time information being indicative of a period of time.
6. The random access method according to any of claims 1-5, characterized in that the method further comprises:
after sending the first disk storage command, and under the condition that the random access request message is not received in the first time period, the first device continues to wait for a third time period, or stops waiting and sends a next command; wherein the first time period is determined by the first device according to a coding mode and/or a coverage level, or the first time period is preset; the third time period is preset.
7. A random access method, comprising:
the second device receives a first disk storage command from the first device or the third device; the first disk storage command is used for indicating one or more second devices to perform random access;
the second device sends a random access request message to the first device; wherein the random access request message is used for requesting to access the first device;
the second device receives a random access success message from the first device or the third device; wherein the random access success message is used for indicating that the second device has successfully accessed the first device; the random access success message comprises data of an application layer and/or the first disk storage command comprises data of the application layer.
8. The random access method of claim 7, wherein the first disk storage command further includes one or more group identification information, one of the group identification information for identifying one or more of the second devices.
9. The random access method of claim 8, wherein the one or more group identification information corresponds to the one or more application layer data.
10. The random access method according to any of claims 7-9, wherein the data bearer of the application layer is in a radio resource control, RRC, message or a medium access control, MAC, data packet.
11. The random access method according to any of claims 7-10, wherein the first disk storage command comprises parameter information, and/or time information, the parameter information comprising a data transmission rate, a number of repetitions, and/or a coverage level, the time information being indicative of a period of time.
12. The random access method according to claim 11, characterized in that the method further comprises:
under the condition that the random access request message is sent and no response message is received after waiting for a second time period, the second equipment determines that the random access fails; the second time period is the time for waiting for a response message after the second device sends the message, and is determined according to parameter information or time information or preset.
13. The random access method according to any of claims 7-12, characterized in that the method further comprises:
the second device receives the increased time information and/or the increased time indication information from the third device; the time increment information is used for indicating the time required for transmitting data between the third device and the first device, the time increment indication information is used for indicating whether the time required for transmitting data between the third device and the first device is increased when a second time period is determined, and the second time period is the time for waiting for a response message after the second device transmits the message.
14. A random access device, comprising: a transmitting module and a receiving module; wherein,,
the sending module is used for sending a first disk storage command to the second equipment or the third equipment; the first disk storage command is used for indicating one or more second devices to perform random access;
the receiving module is configured to receive a random access request message from the second device; wherein the random access request message is used for requesting to access the random access device;
The sending module is further configured to send a random access success message to the second device or the third device; wherein the random access success message is used for indicating that the second device has successfully accessed the random access device; the random access success message comprises data of an application layer and/or the first disk storage command comprises data of the application layer.
15. The random access device of claim 14, wherein the first disk storage command further comprises one or more group identification information, one of the group identification information identifying one or more of the second devices.
16. The random access device of claim 15, wherein the one or more group identification information corresponds to the one or more application layer data.
17. The random access device according to any of claims 14-16, wherein the data bearer of the application layer is in a radio resource control, RRC, message or a medium access control, MAC, data packet.
18. The random access device according to any of claims 14-17, wherein the first disk storage command comprises parameter information, and/or time information, the parameter information comprising a data transmission rate, a number of repetitions, and/or a coverage level, the time information being indicative of a period of time.
19. The random access device according to any of claims 14-18, wherein after sending the first disk storage command and in case the random access request message is not received within the first time period, the receiving module is further configured to continue waiting for a third time period or stop waiting, and the sending module is further configured to send a next command; wherein the first time period is determined according to a coding mode and/or a coverage level, or the first time period is preset; the third time period is preset.
20. A random access device, comprising: a transmitting module and a receiving module; wherein,,
the receiving module is used for receiving a first disk storage command from the first device or the third device; the first disk storage command is used for indicating one or more random access devices to perform random access;
the sending module is used for sending a random access request message to the first equipment; wherein the random access request message is used for requesting to access the first device;
the receiving module is further configured to receive a random access success message from the first device or the third device; wherein the random access success message is used for indicating that the random access device has successfully accessed the first equipment; the random access success message comprises data of an application layer and/or the first disk storage command comprises data of the application layer.
21. The random access device of claim 20, wherein the first disk storage command further includes one or more group identification information, one of the group identification information being used to identify one or more of the random access devices.
22. The random access device of claim 21, wherein the one or more group identification information corresponds to the one or more application layer data.
23. The random access device according to any of claims 20-22, wherein the data bearer of the application layer is in a radio resource control, RRC, message or a medium access control, MAC, data packet.
24. The random access device according to any of the claims 20-23, wherein the first disc storage command comprises parameter information, and/or time information, the parameter information comprising a data transmission rate, a number of repetitions, and/or a coverage level, the time information being indicative of a period of time.
25. The random access device of claim 24, wherein the device further comprises: a processing module; the processing module is configured to determine that the random access fails when the random access request message is sent and no response message is received after waiting for a second period of time; the second time period is a time for waiting for a response message after the random access device sends the message, and is determined according to parameter information or time information or preset.
26. The random access device according to any of the claims 20-25, wherein the receiving means is configured to receive increased time information, and/or increased time indication information, from the third apparatus; the time increment information is used for indicating the time required for transmitting data between the third device and the first device, the time increment indication information is used for indicating whether the time required for transmitting data between the third device and the first device is increased or not when a second time period is determined, and the second time period is the time for waiting for a response message after the random access device transmits the message.
27. A random access device, the random access device comprising: a processor; the processor configured to perform the random access method according to any of claims 1-13.
28. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program or instructions, which, when run on a computer, cause the random access method according to any of claims 1-13 to be performed.
29. A computer program product, the computer program product comprising: computer program or instructions which, when run on a computer, causes the random access method according to any of claims 1-13 to be performed.
CN202111605069.3A 2021-12-24 2021-12-24 Random access method and device Pending CN116347643A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111605069.3A CN116347643A (en) 2021-12-24 2021-12-24 Random access method and device
PCT/CN2022/137030 WO2023116429A1 (en) 2021-12-24 2022-12-06 Random access method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111605069.3A CN116347643A (en) 2021-12-24 2021-12-24 Random access method and device

Publications (1)

Publication Number Publication Date
CN116347643A true CN116347643A (en) 2023-06-27

Family

ID=86877815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111605069.3A Pending CN116347643A (en) 2021-12-24 2021-12-24 Random access method and device

Country Status (2)

Country Link
CN (1) CN116347643A (en)
WO (1) WO2023116429A1 (en)

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR112020009510A2 (en) * 2017-11-16 2020-10-13 Telefonaktiebolaget Lm Ericsson (Publ) method on a base station, method on a terminal device, device on a base station and device on a terminal device
CN112825584B (en) * 2019-11-20 2022-06-14 上海华为技术有限公司 Idle state terminal equipment detection method and related equipment

Also Published As

Publication number Publication date
WO2023116429A1 (en) 2023-06-29

Similar Documents

Publication Publication Date Title
BR112016030272B1 (en) APPARATUS OF A USER EQUIPMENT, APPARATUS OF A BASE STATION AND COMPUTER READABLE HARDWARE STORAGE DEVICES
WO2023077917A1 (en) Communication method and device
KR20230125301A (en) Authentication method and communication device
CN116830766A (en) Communication method and communication device
CN116830112A (en) Method and device for reading data
WO2023046134A1 (en) Communication method and apparatus
WO2023116429A1 (en) Random access method and apparatus
WO2023151045A1 (en) Backscatter communication methods and devices
WO2024088147A1 (en) Communication method and apparatus
CN110662215A (en) Information transmission method and device
WO2024093740A1 (en) Communication method and apparatus
WO2024140533A1 (en) Communication method and apparatus
WO2024037204A1 (en) Communication method, apparatus and system
WO2023124985A1 (en) Identification method and apparatus
WO2024065267A1 (en) Wireless communication method and device
WO2023160201A1 (en) Communication method and apparatus
WO2023231564A1 (en) Paging method and apparatus
WO2024082205A1 (en) Techniques for triggering random access procedures at passive devices
CN113630390B (en) Network security communication method and device of terminal equipment based on big data
WO2022178850A1 (en) Information transmission method and apparatus
WO2023197783A1 (en) Paging method and apparatus
WO2024041309A1 (en) Communication method and apparatus
WO2023167224A1 (en) Communication control method
WO2024120238A1 (en) Communication method, system, and apparatus
WO2024113071A1 (en) Wireless communication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication