CN116602040A - Communication method and device - Google Patents
Communication method and device Download PDFInfo
- Publication number
- CN116602040A CN116602040A CN202180082065.3A CN202180082065A CN116602040A CN 116602040 A CN116602040 A CN 116602040A CN 202180082065 A CN202180082065 A CN 202180082065A CN 116602040 A CN116602040 A CN 116602040A
- Authority
- CN
- China
- Prior art keywords
- random access
- rnti
- type
- access procedure
- index
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 297
- 238000004891 communication Methods 0.000 title claims abstract description 107
- 230000008569 process Effects 0.000 claims abstract description 61
- 230000004044 response Effects 0.000 claims abstract description 28
- 230000000977 initiatory effect Effects 0.000 claims abstract description 9
- 238000012545 processing Methods 0.000 claims description 32
- 238000004590 computer program Methods 0.000 claims description 11
- 238000003860 storage Methods 0.000 claims description 11
- 125000004122 cyclic group Chemical group 0.000 claims description 8
- 238000001228 spectrum Methods 0.000 abstract description 10
- 230000006870 function Effects 0.000 description 33
- 230000005540 biological transmission Effects 0.000 description 14
- 230000002776 aggregation Effects 0.000 description 13
- 238000004220 aggregation Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 239000000872 buffer Substances 0.000 description 5
- 230000007774 longterm Effects 0.000 description 4
- 238000011144 upstream manufacturing Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 239000000969 carrier Substances 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 230000003595 spectral effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method and apparatus for communication, wherein the method comprises: transmitting a preamble to a network device; the preamble is used for initiating a first type random access procedure; receiving scheduling information according to the first RNTI, wherein the scheduling information is used for scheduling response information of the preamble; the value of the first RNTI is in a first value range, no intersection exists between the first value range and a second value range, and the second value range is the value range of the RNTI used by the second type terminal equipment in the first type random access process. According to the method, the network equipment transmits the scheduling information scrambled by RNTI with different value ranges to different types of terminal equipment in the random access process. Therefore, the first type terminal equipment does not receive the scheduling information scrambled by the RNTI in the second value range, and the network equipment can schedule the response message according to the capability of each type of terminal equipment, so that the spectrum efficiency can be improved.
Description
The present application relates to the field of wireless communications technologies, and in particular, to a communication method and apparatus.
In a mobile communication system such as a long term evolution (long term evolution, LTE) system and a New Radio (NR) system, a terminal device needs to establish a radio connection with a network device through a random access procedure, so as to achieve uplink synchronization. As the communication standard evolves, the communication standard will support, in addition to legacy (legacy) terminal devices, terminal devices of a lower capability than legacy terminal devices, which type may be referred to as low capability (reduced capability, REDCAP) terminal devices. The REDCAP terminal device is mainly characterized by a reduced or limited terminal capability, e.g. limited bandwidth capability, the maximum bandwidth will be reduced to 20MHz compared to conventional terminal devices.
Since the capabilities of the legacy terminal device and the REDCAP terminal device are different, if resource scheduling is performed in the same manner, spectrum efficiency is reduced.
Disclosure of Invention
The embodiment of the application aims to provide a communication method and a communication device which are used for distinguishing different types of terminal equipment in a random access process.
In a first aspect, the present application provides a communication method, which is suitable for a scenario in which a terminal device establishes a wireless connection with a network device through a random access procedure. The execution body of the method is a terminal device or a module in the terminal device, and the terminal device is taken as an execution body for example. The method comprises the following steps: transmitting a preamble to the network device, the preamble being used to initiate a first type of random access procedure; receiving scheduling information according to a first Radio Network Temporary Identifier (RNTI), wherein the scheduling information is used for scheduling response information of a preamble; the first RNTI is located in a first value range, no intersection exists between the first value range and a second value range, and the second value range is the value range of the RNTI used by the second type terminal equipment in the first type random access process.
In the above process, the range of the values of the RNTIs used by different types of terminal devices in the random access process is different, and the network device can send the scheduling information scrambled by the RNTIs with different ranges of the values to the different types of terminal devices in the random access process. Thus, the first type terminal device does not receive the scheduling information scrambled with the RNTI of the second value range, and the first type terminal device cannot receive the PDSCH scheduled with the scheduling information scrambled with the RNTI of the second value range, and vice versa. Therefore, for different types of terminal equipment, the network equipment can schedule the PDSCH carrying the response message according to the capability of the corresponding type of terminal equipment, and the spectrum efficiency can be improved. In addition, the method is simple to implement, does not increase the complexity of network equipment scheduling, and does not influence the behavior of the second type of terminal equipment.
In one possible implementation, when the value of the first RNTI is within the first value range, the first RNTI satisfies the first formula; the first formula includes parameters M and N, where N is the number of physical random access channel occasions RO for frequency domain medium frequency division multiplexing, and M is determined according to a subcarrier spacing SCS used in the random access procedure.
In one possible implementation, the method further includes: first indication information is received from the network device, the first indication information being used for determining the first RNTI or for indicating that the first RNTI is determined using the first formula.
In the method, the network equipment directly instructs the terminal equipment to determine the first formula of the first RNTI, so that the terminal equipment can determine the determination mode of the first RNTI, and the RNTI with the same value range as that of the second type terminal equipment is avoided.
In one possible implementation, the method further includes: receiving resource indication information from network equipment, wherein the resource indication information is used for indicating random access resources; and determining the first RNTI according to the random access resource.
In the method, no additional signaling is needed, the implementation is simple, and excessive occupation of system resources is avoided.
In one possible implementation, the first type of random access procedure is a two-step random access procedure; determining a first RNTI according to the random access resource, including: when the random access resource comprises a two-step random access resource configured for the first type of terminal equipment and a two-step random access resource configured for the second type of terminal equipment, the first RNTI is determined by adopting a first formula.
In one possible implementation, the first formula is:
RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4;
wherein, the RNTI represents a first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where a preamble is located in a slot; t_id represents the index of the slot in which the RO is located in the system frame; f_id represents an index of RO in a frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process; the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
In one possible implementation, when the first type of random access procedure is a four-step random access procedure, the first formula is: rnti=1+s_id+14×t_id+14×m×f_id+14×m×n×ul_carrier_id+14×80×8×4;
wherein, the RNTI represents a first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where a preamble is located in a slot; t_id represents the index of the slot in which the RO is located in the system frame; f_id represents an index of RO in a frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;
the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
In one possible implementation, when the first type of random access procedure is a two-step random access procedure, the first formula is: msgB-rnti=1+s_id+14×t_id+14×m ' ×f_id+14×m ' ×n ' ×ul_carrier_id+14×80×8×4+14×10×m×n;
Wherein the MsgB-RNTI represents a first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where a preamble is located in a slot; t_id represents the index of the slot in which the RO is located in the system frame; f_id represents an index of RO on a frequency domain, N is the number of frequency division multiplexing RO, M is determined according to a subcarrier interval SCS used in a random access process, and M 'and N' are values configured by network equipment; the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
In one possible implementation, the method further includes: and receiving second indication information from the network equipment, wherein the second indication information is used for indicating the values of M and N.
In one possible implementation, when the first type of random access procedure is a two-step random access procedure, the first range of values is [8c01, fff2], and the second range of values is [4601,8C00].
In one possible implementation, when the first type of random access procedure is a four-step random access procedure, the first value range is [4601,8C00] or [8c01, fff2], and the second value range is [1,4600].
In a second aspect, the present application provides a communication method, which is suitable for a scenario in which a terminal device establishes a wireless connection with a network device through a random access procedure. The execution body of the method is a network device or a module in the network device, and the terminal device is taken as the execution body for example. The method comprises the following steps: receiving a preamble from a terminal device; the terminal equipment is first type terminal equipment; the preamble is used for initiating a first type random access procedure; transmitting scheduling information to the terminal equipment according to the first radio network temporary identifier RNTI, wherein the scheduling information is used for scheduling response information of the preamble; the first RNTI is located in a first value range, no intersection exists between the first value range and a second value range, and the second value range is the value range of the RNTI used by the second type terminal equipment in the first type random access process.
In one possible implementation, when the value of the first RNTI is within the first value range, the first RNTI satisfies the first formula; the first formula includes parameters M and N, where N is the number of physical random access channel occasions RO for frequency domain medium frequency division multiplexing, and M is determined according to a subcarrier spacing SCS used in the random access procedure.
In one possible implementation, the method further includes: and sending first indication information to the terminal equipment, wherein the first indication information is used for determining the first RNTI or is used for indicating that the first RNTI is determined by adopting a first formula.
In one possible implementation, the method further includes: and determining the first RNTI according to the random access resource.
In one possible implementation, the first type of random access procedure is a two-step random access procedure;
determining a first RNTI according to the random access resource, including: when the random access resource comprises a two-step random access resource configured for the first type of terminal equipment and a two-step random access resource configured for the second type of terminal equipment, the first RNTI is determined by adopting a first formula.
In one possible implementation, the first formula is: rnti=1+s_id+14×t_id+14×m×f_id+14×m×n×ul_carrier_id+14×80×8×4;
Wherein, the RNTI represents a first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where a preamble is located in a slot; t_id represents the index of the slot in which the RO is located in the system frame; f_id represents an index of RO in a frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process; the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
In one possible implementation, when the first type of random access procedure is a four-step random access procedure, the first formula is: rnti=1+s_id+14×t_id+14×m×f_id+14×m×n×ul_carrier_id+14×80×8×4;
wherein, the RNTI represents a first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where a preamble is located in a slot; t_id represents the index of the slot in which the RO is located in the system frame; f_id represents an index of RO in a frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;
the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
In one possible implementation, when the first type of random access procedure is a two-step random access procedure, the first formula is: msgB-rnti=1+s_id+14×t_id+14×m ' ×f_id+14×m ' ×n ' ×ul_carrier_id+14×80×8×4+14×10×m×n;
Wherein the MsgB-RNTI represents a first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where a preamble is located in a slot; t_id represents the index of the slot in which the RO is located in the system frame; f_id represents an index of RO on a frequency domain, N is the number of frequency division multiplexing RO, M is determined according to a subcarrier interval SCS used in a random access process, and M 'and N' are values configured by network equipment; the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
In one possible implementation, the method further includes: and sending second indicating information to the terminal equipment, wherein the second indicating information is used for indicating the values of M and N.
In one possible implementation, when the first type of random access procedure is a two-step random access procedure, the first range of values is [8c01, fff2], and the second range of values is [4601,8C00].
In one possible implementation, when the first type of random access procedure is a four-step random access procedure, the first value range is [4601,8C00] or [8c01, fff2], and the second value range is [1,4600].
In a third aspect, the present application provides a communication method, which is suitable for a scenario in which a terminal device establishes a wireless connection with a network device through a random access procedure. The execution body of the method is a terminal device or a module in the terminal device, and the terminal device is taken as an execution body for example. The method comprises the following steps: receiving scheduling information from a network device; the scheduling information is used for scheduling the downlink message; the search space of the physical downlink control channel PDCCH corresponding to the scheduling information is a public search space; descrambling scheduling information according to the first scrambling code; wherein the first scrambling code is determined from a radio network temporary identity, RNTI, that scrambles cyclic redundancy check, CRC, bits of the scheduling information.
In one possible implementation, the downlink message scheduled by the scheduling information is a random access response message or a paging message or a system information block.
In a fourth aspect, the present application provides a communication method, which is suitable for a scenario in which a terminal device establishes a wireless connection with a network device through a random access procedure. The execution body of the method is a network device or a module in the network device, and the terminal device is taken as the execution body for example. The method comprises the following steps: scrambling the scheduling information according to the first scrambling code; the scheduling information is used for scheduling the downlink message; the search space of the physical downlink control channel PDCCH corresponding to the scheduling information is a public search space; the first scrambling code is determined according to an RNTI scrambling cyclic redundancy check CRC bits of the scheduling information; and sending the scheduling information to the terminal equipment.
In the above process, different scrambling codes are configured for different types of terminal equipment, so that the different types of terminal equipment obtain scheduling information scrambled by the different scrambling codes, and therefore, when the network equipment performs scheduling, the network equipment can perform scheduling according to the capability of the different types of terminal equipment, and the scheduling information of the different types of terminal equipment is not affected.
In one possible implementation, the downlink message scheduled by the scheduling information is a random access response message or a paging message or a system information block.
In a fifth aspect, the present application also provides a communications device having means to implement any one of the methods provided in the first or third aspects above. The communication device may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more units or modules corresponding to the functions described above.
In one possible implementation, the communication device includes: a processor configured to support the communication device to perform the corresponding functions of the terminal device in the method shown above. The communication device may also include a memory, which may be coupled to the processor, that holds the program instructions and data necessary for the communication device. Optionally, the communication apparatus further comprises an interface circuit for supporting communication between the communication apparatus and a device such as a network device.
In one possible implementation manner, the communication device includes corresponding functional modules, each for implementing the steps in the above method. The functions may be realized by hardware, or may be realized by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In a possible implementation manner, the communication apparatus includes a processing unit and a communication unit in a structure, where the units may perform corresponding functions in the foregoing method examples, and specific reference is made to the description in the method provided in the first aspect or the third aspect, which is not repeated herein.
In a sixth aspect, the present application also provides a communications device having means to implement any one of the methods provided in the second or fourth aspects above. The communication device may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more units or modules corresponding to the functions described above.
In one possible implementation, the communication device includes: a processor configured to support the communication apparatus to perform the corresponding functions of the network device in the method shown above. The communication device may also include a memory, which may be coupled to the processor, that holds the program instructions and data necessary for the communication device. Optionally, the communication device further comprises an interface circuit for supporting communication between the communication device and a terminal equipment or the like.
In one possible implementation manner, the communication device includes corresponding functional modules, each for implementing the steps in the above method. The functions may be realized by hardware, or may be realized by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In a possible implementation manner, the communication apparatus includes a processing unit and a communication unit in a structure, where the units may perform corresponding functions in the foregoing method examples, and specific reference is made to the description in the method provided in the second aspect or the fourth aspect, which is not described herein.
In a seventh aspect, there is provided a communication device comprising a processor and interface circuitry for receiving signals from other communication devices than the communication device and transmitting signals from the processor to the processor or transmitting signals from the processor to other communication devices than the communication device, the processor being operable to implement the method of any of the foregoing first or third aspects, and any possible implementation of any of the foregoing aspects, by logic circuitry or executing code instructions.
In an eighth aspect, there is provided a communication device comprising a processor and interface circuitry for receiving signals from or transmitting signals to the processor from or transmitting signals to other communication devices than the communication device, the processor being operable to implement the functional modules of any of the foregoing second or fourth aspects, and any possible implementation of the method of any of the foregoing second or fourth aspects, by logic circuitry or execution of code instructions.
A ninth aspect provides a computer readable storage medium having stored therein a computer program or instructions which, when executed by a processor, implement the method of any of the preceding first to fourth aspects, and any possible implementation of any of the preceding aspects.
In a tenth aspect, there is provided a computer program product storing instructions which, when executed by a processor, implement the method of any of the preceding first to fourth aspects, and any possible implementation of any of the preceding aspects.
An eleventh aspect provides a chip system comprising a processor and further comprising a memory for implementing the method of any of the foregoing first to fourth aspects and any possible implementation of any of the foregoing aspects. The chip system may be formed of a chip or may include a chip and other discrete devices.
In a twelfth aspect, there is provided a communication system comprising an apparatus (e.g. a terminal device) according to the fifth aspect and an apparatus (e.g. a network device) according to the sixth aspect.
FIG. 1 is a schematic diagram of a network architecture to which the present application is applicable;
FIG. 2 is a schematic diagram of a four-step random access procedure;
FIG. 3 is a schematic diagram of a two-step random access procedure;
fig. 4 is a schematic flow chart of a communication method according to an embodiment of the present application;
fig. 5 is a schematic flow chart of a communication method according to an embodiment of the present application;
fig. 6 is a schematic flow chart of a communication method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a communication device according to an embodiment of the present application.
Embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The technical scheme of the embodiment of the application can be applied to various communication systems, such as: the long term evolution (long term evolution, LTE) system, NR system, next generation communication system, etc. formulated by the third generation partnership project (the 3rd generation partnership project,3GPP) are not limited herein.
In the embodiment of the present application, the terminal device may be a device having a wireless transceiver function or a chip that may be disposed in any device, and may also be referred to as a User Equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user equipment. The terminal device in the embodiment of the present application may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal, an augmented reality (augmented reality, AR) terminal, a wireless terminal in an industrial control (industrial control), a wireless terminal in an unmanned (self driving), or the like. The network device may be a next generation base station (next Generation node B, gNB) in an NR system, an evolved base station (evolutional node B, eNB) in an LTE system, or the like.
The terminal device in the present application may be a first type terminal device or a second type terminal device, and the first type terminal device and the second type terminal device may have at least one of the following distinguishing features:
1. the bandwidth capabilities are different. Bandwidth capability may be expressed in terms of baseband maximum bandwidth processing capability. For example, the baseband bandwidth of the first type of terminal device is not greater than 40MHz, e.g., at least one of 40MHz, 20MHz, 15MHz, 10MHz, or 5MHz, and the baseband bandwidth of the second type of terminal device is greater than 40MHz, e.g., 100MHz, 200MHz, etc.
2. The number of the transmitting antennas is different. For example, the first type of terminal device may support 2-receive 1-transmit (2 receive antennas and 1 transmit antenna), or 1-receive 1-transmit (1 receive antenna and 1 transmit antenna). The second type of terminal device may support 4-receive 2-transmit (4 receive antennas and 2 transmit antennas). It can be understood that, under the condition of realizing the same data transmission rate, the number of the transceiving antennas of the first type of terminal equipment is smaller than that of the transceiving antennas of the second type of terminal equipment, so that the maximum coverage range which can be realized by the data transmission between the first type of terminal equipment and the base station is smaller than the maximum coverage range which can be realized by the data transmission between the second type of terminal equipment and the base station when other conditions such as frequency spectrum efficiency, channel coding code rate and the like are the same. In other words, if the coverage capability (typically expressed as maximum link loss) of the first type of terminal device and the second terminal device is the same, the spectral efficiency of the base station to communicate with the first terminal device will be lower than the communication spectral efficiency of the base station to the second terminal device.
3. The uplink maximum transmit power is different. For example, the uplink maximum transmit power of the first type of terminal device may be one of 4 decibel milliwatts (dBm) to 20 dBm. The maximum uplink transmit power of the second type of terminal device may be 23dBm or 26dBm.
4. The protocol versions are different. The first type of terminal device may be a terminal device in NR version 17 (release-17, rel-17) or in a later version of NR Rel-17. The second type of terminal device may be, for example, a terminal device in NR version 15 (release-15, rel-15) or NR version 16 (release-16, rel-16). The second type of terminal device may also be referred to as an NR legacy (NR legacy) terminal device.
5. Carrier aggregation capabilities are different. For example, the first type of terminal device may not support carrier aggregation and the second type of terminal device may support carrier aggregation. For another example, both the first type of terminal device and the second type of terminal device may support carrier aggregation, but the maximum number of carrier aggregation supported by the first type of terminal device at the same time is smaller than the maximum number of carrier aggregation supported by the second type of terminal device at the same time, e.g., the first type of terminal device supports aggregation of 2 carriers at the same time at the maximum, and the second type of terminal device may support aggregation of 5 carriers or 32 carriers at the same time at the maximum.
6. Duplex capability is different. For example, a first type of terminal device supports half duplex frequency division duplexing (frequency division duplexing, FDD). The second type of terminal device supports full duplex FDD.
7. The processing time capabilities of the data are different. For example, the minimum time delay between the first type of terminal device receiving the downstream data and transmitting feedback for the downstream data is greater than the minimum time delay between the second type of terminal device receiving the downstream data and transmitting feedback for the downstream data; and/or the minimum time delay between the first type terminal equipment sending the uplink data and receiving the feedback of the uplink data is larger than the minimum time delay between the second type terminal equipment sending the uplink data and receiving the feedback of the uplink data.
8. Processing power (availability/capability) is different. For example, the baseband processing capability of the first type of terminal device is lower than the baseband processing capability of the second type of terminal device. Wherein the baseband processing capability may include at least one of: the maximum MIMO layer number supported by the terminal equipment when the terminal equipment performs data transmission, the number of HARQ processes supported by the terminal equipment, and the maximum transmission block size (transmission block size, TBS) supported by the terminal equipment.
9. The peak rates of the uplink and/or downlink transmissions are different. The transmission peak rate refers to the maximum data transmission rate that the terminal device can reach per unit time (e.g., per second). The uplink peak rate supported by the first type of terminal device may be lower than the uplink peak rate supported by the second type of terminal device and/or the downlink peak rate supported by the first type of terminal device may be lower than the downlink peak rate supported by the second type of terminal device. For example, the upstream peak rate of the first type terminal device is less than or equal to 50Mbps, the downstream peak rate is less than or equal to 150Mbps, the upstream peak rate of the second type terminal device is greater than or equal to 50Mbps, and the downstream peak rate is greater than or equal to 150Mbps. For another example, the upstream peak rate or downstream peak rate of the first type of terminal device is on the order of hundred Mbps, and the upstream peak rate or downstream peak rate of the second type of terminal device is on the order of Gbps.
10. The buffers (buffers) vary in size. buffer can be understood as the Layer 2 (L2) buffer total size, which means the sum of the number of bytes buffered in the radio link control (radio link control, RLC) transmit and receive and reordering windows and the number of bytes buffered in the packet convergence protocol (packet data convergence protocol, PDCP) reordering window for all radio bearers. Alternatively, buffer may be understood as the total number of soft channel bits that can be used by the HARQ process.
Alternatively, the first type of terminal device may refer to a REDCAP terminal device, or the first type of terminal device may also refer to a low capability terminal device, a reduced capability terminal device, a REDCAP UE, reduced Capacity UE, a narrowband NR (NB-NR) UE, or the like. The second type of terminal device may refer to a legacy or normal or high capability terminal device, which may also be referred to as a legacy (legacy) terminal device or a normal (normal) terminal device, having but not limited to the above-described distinguishing features from the first type of terminal device.
Fig. 1 is a schematic diagram of a network architecture to which the present application is applied. As shown in fig. 1, the terminal device may access to the network device to obtain services of an external network (e.g., a Data Network (DN)) through the network device, or communicate with other devices through the network device, such as may communicate with other terminal devices.
In fig. 1, before a terminal device accesses a network device, it first searches a synchronization signal block (synchronization signal block, SSB) broadcasted by the network device, obtains downlink synchronization, and obtains a control resource set (control resource set, core) #0 and a common search space (common search space, CSS) according to an instruction of the SSB. The terminal device then blindly detects the downlink control information (downlink control information, DCI) scrambled with the system information radio network temporary identity (system information radio network temporary identity, SI-RNTI) in CORESET #0 and CSS. The DCI scheduled physical downlink shared channel (physical downlink shared channel, PDSCH) carries system information blocks (system information block, SIBs). The SIB indicates random access resources including, but not limited to, physical random access channel (physical random access channel, PRACH) resources, and the like. And finally, the terminal equipment initiates a random access process through the random access resource.
The random access procedure is of two types, namely a two-step random access procedure and a four-step random access procedure. When the SIB indicates the random access resource of the two-step random access procedure and the random access resource of the four-step random access procedure, the network device may further reconfigure a reference signal received power (reference signal received power, RSRP) threshold, and when the RSRP value measured by the terminal device is greater than or equal to the RSRP threshold, the terminal device may perform the two-step random access procedure, and when the RSRP value measured by the terminal device is less than the RSRP threshold, the terminal device may perform the four-step random access procedure. These two random access procedures are described below, respectively.
As shown in fig. 2, the four-step random access procedure includes four steps, respectively:
step 201: the terminal device transmits a random access preamble (preamble) to the network device.
The random access preamble will be hereinafter simply referred to as preamble. In a four-step random access procedure, the preamble is also called message 1 (msg 1). The timing of transmitting the preamble is called PRACH timing (RO).
The preamble is a bit sequence, which is used to inform the network device of a random access request, and enables the network device to estimate a transmission delay between the terminal device and the network device according to the preamble, so that the network device calibrates an uplink timing (uplink timing) of the terminal device, and informs the terminal device of calibration information through a Timing Advance (TA) instruction.
Step 202: the network device sends a random access response (random access response, RAR) to the terminal device.
In a four-step random access procedure, RAR is also called message 2 (msg 2). The RAR may include information such as an index (Preamble index), TA, and UpLink grant (UL grant) of the Preamble. The TA is used for the terminal equipment to adjust uplink timing so as to ensure uplink synchronization.
Before transmitting the RAR, the network device needs to transmit DCI to the terminal device, where the DCI is used to schedule the PDSCH, and the PDSCH carries the RAR thereon. The cyclic redundancy check (cyclic redundancy check, CRC) bits of the DCI are scrambled with a random access radio network temporary identity (random access radio network temporary identity, RA-RNTI). Correspondingly, the terminal equipment receives the DCI by adopting the same RA-RNTI, and if the DCI is successfully received, the RAR is received in the DCI scheduling PDSCH.
The calculation formula of the RA-RNTI can be as follows:
RA-RNTI=1+s_id+14×t_id+14×80×f_id+14×80×8×ul_carrier_id···(1)
wherein: the value range of s_id is [0,13], which indicates the index of the first symbol of the RO where the preamble is located in the slot (slot). In the embodiment of the present application, the symbol may refer to an orthogonal frequency division multiplexing (orthogonal frequency division multiplexing, OFDM) symbol.
the value range of t_id is [0,79], which indicates the index of slots where ROs where the preamble is located are in one system frame (system frame), and the number of slots in one system frame is related to the subcarrier spacing (subcarrier spacing, SCS), for example, when scs=120 kHz, the number of slots in the system frame is 80.
The value range of f_id is [0,7], which indicates the index (index) of the RO of the preamble in the frequency domain, and the current protocol supports that at most 8 RO multiplexing is performed on the same time unit in the frequency domain.
The value range of ul_carrier_id is [0,1], which indicates the type of carrier selected by the terminal equipment, when the carrier selected in the random access process of the terminal equipment is Uplink (UL) carrier, the value of ul_carrier_id is 0; when the carrier selected in the random access process of the terminal equipment is a supplementary uplink (supplimentary uplink, SUL) carrier, the value of ul_carrier_id is 1.
According to the calculation formula, the range of the RA-RNTI can be calculated and is represented as [1,4600] in hexadecimal.
Step 203: the terminal device sends a message 3 (message 3, msg 3) to the network device according to the RAR.
It should be noted that, after the terminal receives the RAR, if it is determined that the index of the preamble carried in the RAR is the same as the index of the preamble sent by the terminal device in step 201, the terminal device determines that the RAR is a response to its own preamble, and sends a message 3 in the resource indicated by the UL grant in the RAR after timing adjustment according to the TA in the RAR, where the message 3 carries the unique identifier of the terminal device.
Step 204: the network device sends a contention resolution (contention resolution) message, which may also be referred to as message 4 (msg 4), to the terminal device.
The network device carries the unique identification from the terminal device of message 3 in the collision resolution message to specify the terminal device that was successfully accessed, while other terminal devices that were not successfully accessed will re-initiate random access.
As shown in fig. 3, the two-step random access procedure includes two steps, namely:
step 301: the terminal device transmits a preamble and a physical uplink shared channel (physical uplink shared channel, PUSCH) to the network device.
In a two-step random access procedure, this message is also called message a (Msg a).
The PUSCH may carry uplink data that needs to be sent by the terminal device.
Step 302: the network device sends the RAR to the terminal device.
In a two-step random access procedure, the RAR is also called message B (Msg B).
Before transmitting the RAR, the network device needs to transmit DCI to the terminal device, where the DCI is used to schedule the PDSCH, and the PDSCH carries the RAR thereon. The CRC bits of the DCI are scrambled with an MsgB-RNTI. Correspondingly, the terminal equipment receives the DCI by adopting the same MsgB-RNTI, and if the DCI is successfully received, the RAR is received in the DCI scheduling PDSCH.
The calculation formula of the MsgB-RNTI can be as follows:
MsgB-RNTI=1+s_id+14×t_id+14×80×f_id+14×80×8×ul_carrier_id+14×80×8×2···(2)
the specific meanings of s_id, t_id, f_id and ul_carrier_id can be described in the formula (1), and the value range of the MsgB-RNTI determined according to the formula (2) is represented by [4601,8C00] in hexadecimal.
Since the capabilities of the first type system terminal device and the second type terminal device are different, in particular, the antenna capabilities of the first type system terminal device and the second type terminal device are different, if resource scheduling is performed in the same manner, spectrum efficiency may be reduced. For example, taking a first type of system terminal device as a REDCAP terminal device and a second type of system terminal device as a legacy terminal device as an example, if the antenna capability of the REDCAP terminal device is single-transmission single-reception, the antenna capability of the legacy terminal device is two-transmission two-reception or four-transmission four-reception, etc. The downlink receiving performance of REDCAP terminal equipment is limited due to the single-shot antenna capability, and the code rate of PDSCH channel coding is reduced and/or modulation access is reduced when the same performance is required, so that the spectrum efficiency is influenced. If the base station performs resource scheduling on the REDCAP terminal and the legacy terminal indiscriminately, for example, when the REDCAP terminal and the RAR of the legacy terminal are carried in one Transmission Block (TB), if resources are scheduled according to the capability of the legacy terminal device, the REDCAP terminal device cannot correctly receive the TB; if the resources are scheduled according to the capabilities of the REDCAP terminal equipment, the traditional terminal equipment can obtain the transmission resources exceeding the transmission requirements of the traditional terminal equipment, and the spectrum efficiency is reduced. The application provides a method, which can enable network equipment to scramble scheduling information sent to different types of terminal equipment through RA-RNTI or MsgB-RNTI with different value ranges in the random access process, so that the network equipment can respectively schedule resources according to the capabilities of the different types of terminal equipment, thereby improving the frequency spectrum efficiency, and the method is described in detail below.
The network architecture and the service scenario described in the present application are for more clearly describing the technical solution of the present application, and do not constitute a limitation to the technical solution provided by the present application, and those skilled in the art can know that the technical solution provided by the present application is equally applicable to similar technical problems with evolution of the network architecture and occurrence of new service scenarios.
In the present application, the interaction between the network device and the terminal device is taken as an example, and the operation performed by the network device may be performed by a chip or a module inside the network device, and the operation performed by the terminal device may be performed by a chip or a module inside the terminal device.
With reference to the foregoing description, as shown in fig. 4, a schematic flow chart of a communication method according to an embodiment of the present application is provided.
It should be noted that the flow shown in fig. 4 may be applied to a scenario in which the first type terminal device and the second terminal device share the RO and the DCI carrying the scheduling RAR. In the scene, the RO of the first type terminal equipment transmitting the preamble is the same as the RO of the second type terminal equipment transmitting the preamble; the search space for the first type terminal device to receive DCI is the same as the search space for the second type terminal device to receive DCI. Referring to fig. 4, the method includes:
S401: the terminal device sends the preamble to the network device.
The preamble is a random access request for initiating a first type of random access procedure to the network device. The terminal device may be a first type of terminal device, e.g. a REDCAP terminal device. The first type random access process may be a two-step random access process or a four-step random access process, and is specifically determined according to the actual situation.
It should be noted that, before the terminal device sends the preamble, the terminal device may also receive the resource indication information from the network device. The resource indication information indicates a random access resource carrying a preamble, and the resource indication information may be carried by SIB.
In the embodiment of the application, the random access resources indicated by the resource indication information at least comprise four-step random access resources configured for the first type of terminal equipment and four-step random access resources configured for the second type of terminal equipment. Optionally, the random access resource may further include at least one of the following resources:
two-step random access resources configured for the first type of terminal device or two-step random access resources configured for the second type of terminal device.
It should be noted that the two-step random access resource may include a resource used by the terminal device to transmit the preamble in the two-step random access process; the four-step random access resource may include a resource used by the terminal device to transmit the preamble in the four-step random access procedure. The contents specifically included in the two-step random access resource and the four-step random access resource are not limited, and specific reference may be made to the description in the existing protocol, which is not repeated here.
S402: the network equipment receives the preamble from the terminal equipment and sends scheduling information to the terminal equipment according to the first RNTI.
The scheduling information is used for scheduling response information of the preamble, and the first RNTI is used for scrambling CRC bits of the scheduling information. The response message may refer to the RAR, and correspondingly, the scheduling information may refer to DCI that schedules the RAR.
The DCI scheduling RAR may refer to DCI scheduling PDSCH carrying RAR.
The network device may determine resources included in the PDSCH carrying the response message according to the capability of the terminal device, and indicate the resources to the terminal device through the scheduling information.
S403: and the terminal equipment receives scheduling information according to the first RNTI, wherein the scheduling information is used for scheduling response information of the preamble.
Specifically, the terminal device may descramble the received scheduling information by using the first RNTI, and if the descrambling is successful, receive a response message scheduled by the scheduling information.
The method comprises the steps that the value of RNTI used by first type terminal equipment in the random access process is located in a first value range, and the value of RNTI used by second type terminal equipment in the random access process is located in a second value range; it should be noted that, when the value ranges of the RNTIs used by the first type terminal device and the second type terminal device in the same type of random access process are different, for example, both refer to a two-step random access process or a four-step random access process, there is no intersection between the first value range and the second value range, and further the first type terminal device may receive the scheduling information through the RNTI of the first value range, and may not need to receive the scheduling information corresponding to the RNTI of the second value range, thereby saving power consumption.
In combination with the foregoing description, when the terminal device is a first type terminal device, the value of the first RNTI is located in the first value range.
It should be noted that, if the terminal device initiates a two-step random access procedure through the preamble, after the terminal device receives the response message, if the terminal device determines that the response message includes the unique identifier of the terminal device, it determines that the random access is successful, otherwise, it determines that the random access is failed. If the terminal device initiates a four-two step random access procedure through the preamble, the terminal device may send a message 3 to the network device and receive a message 4 after receiving the response message. Specific procedures may be referred to the foregoing description and will not be repeated here.
In the above process, the range of the values of the RNTIs used by different types of terminal devices in the random access process is different, and the network device can send the scheduling information scrambled by the RNTIs with different ranges of the values to the different types of terminal devices in the random access process. Thus, the first type terminal device does not receive the scheduling information scrambled with the RNTI of the second value range, and the first type terminal device cannot receive the PDSCH scheduled with the scheduling information scrambled with the RNTI of the second value range, and vice versa. Therefore, for different types of terminal equipment, the network equipment can schedule the PDSCH carrying the response message according to the capability of the corresponding type of terminal equipment, and the spectrum efficiency can be improved. In addition, the method is simple to implement, does not increase the complexity of network equipment scheduling, and does not influence the behavior of the second type of terminal equipment.
In the embodiment of the present application, when the value of the first RNTI is within the first value range, the first RNTI may be determined according to a first formula, and a specific form of the first formula will be described later. The first value range may also have a correspondence with the number of random access resources, for example, the larger the number of random access resources configured by the network device is, the smaller the range of the first value range is, and the smaller the number of random access resources configured by the network device is, the smaller the range of the first value range is, so that the first value range is more reasonable, and excessive RNTI occupation or too small RNTI occupation is avoided.
How the terminal device determines the first RNTI in what case using the first formula, a plurality of implementations are possible. In a first implementation manner, the network device may send first indication information to the terminal device, where the first indication information is used to instruct the terminal device to determine the first RNTI by using the first formula. The first indication information may be carried by SIB or other signaling, which is not limited by the present application.
In a second implementation, the terminal device may determine the first RNTI according to the random access resource, which is described in different cases below.
It should be noted that, the network device may determine the first RNTI by using a method corresponding to the terminal device, and various situations described below are applicable to the network device. In the following description of case one to case four, the terminal device refers to the first type of terminal device if not explicitly stated.
Case one: the random access resources configured by the network device include: four-step random access resources configured for the first type of terminal equipment, four-step random access resources configured for the second type of terminal equipment, two-step random access resources configured for the first type of terminal equipment, and two-step random access resources configured for the second type of terminal equipment.
In the first case, if the terminal device initiates the two-step random access procedure, as known from the foregoing description, since the terminal device initiates the two-step random access procedure when the measured RSRP value is greater than or equal to the RSRP threshold, the downlink coverage performance of the terminal device may be considered to be better, and the network device may not need to distinguish between different types of terminal devices, that is, the network device may schedule the PDSCH of the first type of terminal device and the PDSCH of the second type of terminal device in the same scheduling manner, where the terminal device may determine the first RNTI by using the first formula, or determine the first RNTI by using the second formula, where the second formula refers to the foregoing formula (2). At this time, it may be predetermined whether the first RNTI is preferentially determined by the first formula or the second formula.
In case of initiating a two-step random access procedure, the first RNTI determined according to the first formula may satisfy the following form:
MsgB-RNTI=1+s_id+14×t_id+14×M’×f_id+14×M’×N’×ul_carrier_id+14×80×8×4+14×10×M×N···(3)
wherein the MsgB-RNTI represents a first RNTI; s_id represents the index of the first symbol of the RO in which the preamble is located in the slot, and the value range of s_id is [0,13].
t_id represents the index of the time slot where the RO is located in the system frame, the value range of t_id is [0,10×m ], and the value of M can be indicated by the network device.
f_id represents the index of the RO on the frequency domain, the value range of f_id is [0, N ], and the value of N can be indicated by network equipment.
The ul_carrier_id is determined according to the type of the carrier used in the random access process, and when the carrier selected by the terminal equipment in the random access process is an UL carrier, the value of the ul_carrier_id is 0; when the carrier selected by the terminal device in the random access process is the SUL carrier, the value of ul_carrier_id is 1.
In the first case, in the two-step random access process, when the first RNTI is determined according to the first formula, the first value range of the first RNTI may be [8c01, fff2]; correspondingly, the second range of values for RNTI determined conventionally, i.e. according to equation (2), is [4601,8C00]. In the following description, the first and second value ranges are expressed in hexadecimal form, if they are not specifically described.
Equation (3) may be predefined, i.e. both the terminal device and the network device may predefine the specific form of equation (3). N may be the number of frequency division multiplexing ROs and M may be determined according to SCS used by the random access procedure. For example, when scs=15 kHz, m=10; when scs=30 kHz, m=20; when scs=60 kHz, m=40; when scs=120 kHz, m=80, and the other cases are not illustrated one by one.
M and N may also be values of the network device configuration. For example, the network device transmits second indication information for indicating the values of M and N. When M 'and N' are values configured by the network device, the second indication information may further indicate values of M 'and N'. The network device may ensure that the first RNTI is within the first range of values by configuring M, N, M 'and N'. For example, m=20 and n=8 may be configured such that the value range of the first RNTI determined by the formula (3) is [909e,9539]. The network device may configure the values of M 'and N', M 'and N' according to the number of SCS and frequency division multiplexing ROs used by the terminal device, respectively, and may be greater than or equal to the minimum value required for the number of SCS and frequency division multiplexing ROs used by the terminal device. For example, when scs=30 kHz and the number of frequency division multiplexing ROs is 4, M' is at least 20, and may be configured to have a value of 30 or 40; n' is at least 4, and can be 5 or 6. The method can enable the network equipment to flexibly allocate the RNTI value, and avoid conflict with RNTI configured by the network equipment to other functions.
In case one, if the terminal device initiates a four-step random access procedure, the first RNTI may be determined using the first formula. For example, the first RNTI determined according to the first formula may satisfy the following form:
RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4···(4)
or, rnti=1+s_id+14×t_id+14×m×f_id+14×m×n×ul_carrier_id+14×80×8×4· (5)
Wherein, the RNTI represents a first RNTI; specific meanings of M, N, M ', N', s_id, t_id, f_id and ul_carrier_id can be referred to the description in formula (3).
In the first case, in the four-step random access procedure, when the first RNTI is determined according to the first formula (4) or formula (5)), the first value range of the first RNTI may be [8c01, fff2]; correspondingly, the second range of values for RNTI determined conventionally, i.e. according to equation (1), is [1,4600].
It should be noted that, by configuring M, N, M 'and N', the network can ensure that the first RNTI determined according to the formula (4) or the formula (5) is located within the first value range. For example, m=20 and n=8 may be configured such that the value range of the first RNTI determined by the formula (5) is [8C01,909D ].
And a second case: the random access resources configured by the network device include: four-step random access resources configured for the first type of terminal equipment, four-step random access resources configured for the second type of terminal equipment, and two-step random access resources configured for the second type of terminal equipment.
In the second case, since the two-step random access resource is not configured for the first type of terminal device, the first type of terminal device cannot initiate the two-step random access, so only how to distinguish the different types of terminal devices in the four-step random access process needs to be considered.
Specifically, in the second case, if the terminal device initiates the four-step random access procedure, the first RNTI may be determined by using the first formula. The first RNTI determined according to the first formula may satisfy formula (4) or formula (5), and will not be described herein.
In the second case, in the four-step random access process, the first value range of the first RNTI determined according to the first formula may be [8c01, fff2]; correspondingly, the second range of values for RNTI determined conventionally, i.e. according to equation (1), is [1,4600].
And a third case: the random access resources configured by the network device include: four-step random access resources configured for the first type of terminal equipment, four-step random access resources configured for the second type of terminal equipment, and two-step random access resources configured for the first type of terminal equipment.
In the third case, since the two-step random access resource is not configured for the second type terminal device, the second type terminal device cannot initiate the two-step random access, so if the terminal device (the first type terminal device) initiates the two-step random access procedure, the first RNTI may be determined using the formula (2).
If the terminal device initiates a four-step random access procedure, a first formula may be employed to determine the first RNTI. The first RNTI determined according to the first formula may satisfy formula (4) or formula (5), and will not be described herein.
In the third case, in the four-step random access process, the first value range of the first RNTI determined according to the first formula is [8c01, fff2]; correspondingly, the second range of values for RNTI determined conventionally, i.e. according to equation (1), is [1,4600].
Case four: the random access resources configured by the network device include: and the four-step random access resource is configured for the first type terminal equipment and the four-step random access resource is configured for the second type terminal equipment.
In the fourth case, since two-step random access resources are not configured for the first type of terminal device and the second type of terminal device, neither the first type of terminal device nor the second type of terminal device can initiate two-step random access, so only how to distinguish different types of terminal devices in the four-step random access process needs to be considered.
Since no all types of terminal devices can initiate two-step random access, the terminal device may also determine the first RNTI according to equation (2), i.e. the first equation is equation (2) described above. At the moment, the first value range of the first RNTI determined according to the first formula is [4601,8C00]; correspondingly, the second range of values for RNTI determined conventionally, i.e. according to equation (1), is [1,4600].
In addition, in the fourth case, if the terminal device initiates the four-step random access procedure, the first RNTI may also be according to equation (4) or equation (5), i.e., the first equation is equation (4) or equation (5) described above. At this time, the first value range of the first RNTI determined according to the first formula is [8C01, FFF2]; correspondingly, the second range of values for RNTI determined conventionally, i.e. according to equation (1), is [1,4600].
Optionally, in the fourth case, if the terminal device initiates a four-step random access procedure, when the RSRP obtained by the terminal device is greater than or equal to a preset threshold, the terminal device determines the first RNTI according to formula (2); when the RSRP obtained by the terminal device is smaller than the preset threshold, the terminal device determines the first RNTI according to formula (4) or formula (5). The preset threshold may be configured by the network device or may be predefined, and the present application is not limited thereto.
In the embodiment of the application, a method is also provided, which can enable the network equipment to schedule the PDSCH according to the capability of different types of terminal equipment, the method does not need to limit the RNTI of different types of terminal equipment to use different value ranges, namely the method can be applied to the scene that the first type of terminal equipment and the second type of terminal equipment use the RA-RNTI or the MsgB-RNTI of the same value range in the random access process, and the search space of the first type of terminal equipment for receiving the DCI is the same as the search space of the second type of terminal equipment for receiving the DCI, and the detailed description is below.
Fig. 5 is a schematic flow chart of a communication method according to an embodiment of the present application.
S501: the network device scrambles the scheduling information according to the first scrambling code and transmits the scheduling information to the terminal device.
The terminal device may be a first type of terminal device, e.g. a REDCAP terminal device.
S502: the terminal device receives the scheduling information from the network device and descrambles the scheduling information according to the first scrambling code.
The scheduling information is used for scheduling downlink messages, for example, the scheduling information may be DCI, and the downlink messages scheduled by the scheduling information may be a random access response message or paging message (paging) or SIB, etc.
Further, if the terminal device successfully descrambles the scheduling information according to the first scrambling code, the downlink message scheduled by the terminal device can be received according to the scheduling information, and the specific process is not repeated.
Wherein, the search space of the physical downlink control channel (physical downlink control channel, PDCCH) corresponding to the scheduling information is a public search space (common search space, CSS). The PDCCH corresponding to the scheduling information may refer to a PDCCH carrying the scheduling information.
One common search space set contains at least one PDCCH candidate. One PDCCH candidate may refer to a set of time-frequency resources, and one PDCCH candidate may or may not include a PDCCH. The terminal device may detect the PDCCH candidates to determine whether there is an own PDCCH in the PDCCH candidates.
After the CRC bits of the scheduling information are scrambled by the RNTI, the scheduling information is channel-coded. The channel coded bit stream needs to be modulated into the PDCCH for transmission. In the embodiment of the present application, the scrambling schedule information according to the first scrambling code may refer to a bit stream after performing channel coding on the schedule information according to the first scrambling code scrambling.
For example, scrambling may be performed in the following manner:
c(n)=(x 1 (n+N C )+x 2 (n+N C ))mod2
x 1 (n+31)=(x 1 (n+3)+x 1 (n))mod 2 ···(7)
x 2 (n+31)=(x 2 (n+3)+x 2 (n+2)+x 2 (n+1)+x 2 (n))mod2
wherein N is C =1600, mod is a modulo operation.
x 1 (0)=1,x 1 (n)=0,n=1,2,...,30 ···(8)
B (i) in the formula (6) is a bit before scrambling, c (i) is a scrambling code,for the scrambled bits, the scrambling codes are determined by formulas (7) to (8), and the initial values of the scrambling codes are determined by formula (9). For second type of terminal equipment, e.g. legacy terminal equipment, initial parameters of scrambling codeRepresenting cell identity, n RNTI =0。
In the embodiment of the present application, the first type terminal device may use a different scrambling code from the second type terminal device, that is, the first scrambling code, the second type terminal device uses scrambling codes determined by formulas (7) to (8), and the scrambling code initial parameters used by the second type terminal devicen RNTI The scrambling code used by the second type terminal device is hereinafter referred to as a second scrambling code=0. Because the scrambling codes used by different types of terminal devices are different, the first type of terminal device cannot receive the scheduling information scrambled by the second scrambling code, and cannot receive the PDSCH scheduled by the scheduling information, and vice versa.
In the embodiment of the application, the first scrambling code can have various implementation manners. In a first implementation, the first scrambling code may be determined from an RNTI that scrambles CRC bits of the scheduling information. Specifically, the first scrambling code is determined by formulas (7) to (8), and the initial parameter n of the first scrambling code RNTI RNTI for scrambling CRC bits of the scheduling information. Another initial parameter
For example, when the scheduling information is used for scheduling a random access response message, the CRC bits of the scheduling information are scrambled with RA-RNTI or MsgB-RNTI, n RNTI =ra-RNTI or MsgB-RNTI.
For example, when the scheduling information is used for scheduling paging messages, the CRC bits of the scheduling information are scrambled with a paging radio network temporary identity (paging radio network temporary identity, P-RNTI), n RNTI =P-RNTI。
For example, when the scheduling information is used for scheduling SIB, the CRC bits of the scheduling information are scrambled with SI-RNTI, n RNTI =SI-RNTI。
In a second implementation, the first scrambling code is determined by formulas (7) to (8), and the initial parameter n of the first scrambling code ID Not equal toFor example n ID =0. Another initial parameter n RNTI =0。
In a third implementation, the first scrambling code is determined by formulas (7) to (8), and the initial parameter n of the first scrambling code ID Not equal to For example n ID =0. Another initial parameter n RNTI Not equal to 0, exampleSuch as n RNTI Is equal to the RNTI scrambling the CRC bits of the scheduling information.
It should be noted that, initial parameter n for generating first scrambling code ID And n RNTI The specific value of (2) may be configured by the network device through a system message, may be predefined, may be determined in other manners, and the present application is not limited.
The above is merely an example, and other implementations of the first scrambling code may exist, and only the determined first RNTI and the second scrambling code need be different, which are not illustrated one by one.
In the embodiment of the application, the scheduling information sent by the network equipment to the different types of terminal equipment can be distinguished in other modes, so that the first type of terminal equipment cannot receive the scheduling information of the second type of terminal equipment, and the second type of terminal equipment cannot receive the scheduling information of the first type of terminal equipment.
Fig. 6 is a schematic flow chart of a communication method according to an embodiment of the present application. The method comprises the following steps:
s601: the network device sends first scheduling information to the terminal device.
The first scheduling information is used for scheduling downlink messages, and the downlink messages scheduled by the first scheduling information can be random access response messages, paging messages, SIB (SIB) or the like.
S602: the terminal device receives first scheduling information from the network device.
Further, the terminal device may receive the downlink message according to the first scheduling information.
The terminal device may be a first type terminal device, for example, a REDCAP terminal device, and the search space of the PDCCH corresponding to the first scheduling information is CSS. The PDCCH corresponding to the first scheduling information may refer to a PDCCH carrying the first scheduling information.
In the flow shown in fig. 6, the aggregation level of the PDCCH carrying the first scheduling information is different from the aggregation level of the PDCCH carrying the second scheduling information; the second scheduling information is used for scheduling the downlink message for the second type of terminal equipment. The search space of the PDCCH corresponding to the second scheduling information is CSS.
For example, the second type of terminal device, e.g., legacy terminal device, may support aggregation levels of 1, 2, 4, 8, 16, and the first type of terminal device may use a different aggregation level than the second type of terminal device, e.g., the first type of terminal device may support aggregation levels of 6, 10, etc. When the network equipment transmits the second scheduling information, the first type terminal equipment cannot read the second scheduling information of the second type terminal equipment, namely the scheduling information which is not transmitted to the first type terminal equipment is considered, and the method does not influence the second type terminal equipment to receive the second scheduling information. Therefore, for different types of terminal equipment, the network equipment can schedule the PDSCH through the scheduling information according to the capability of the corresponding type of terminal equipment, and the spectrum efficiency can be improved.
In the embodiment provided by the application, the method provided by the embodiment of the application is introduced from the interaction angle among the devices. In order to implement the functions in the method provided by the embodiment of the present application, the network device or the terminal device may include a hardware structure and/or a software module, and implement the functions in the form of a hardware structure, a software module, or a hardware structure plus a software module. Some of the functions described above are performed in a hardware configuration, a software module, or a combination of hardware and software modules, depending on the specific application of the solution and design constraints.
The division of the modules in the embodiment of the application is schematic, only one logic function is divided, and other division modes can be adopted in actual implementation. In addition, each functional module in the embodiments of the present application may be integrated in one processor, or may exist alone physically, or two or more modules may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules.
As with the above concept, as shown in fig. 7, an embodiment of the present application further provides an apparatus 700 for implementing the functions of the network device or the terminal device in the above method. For example, the apparatus may be a software module or a system on a chip. In the embodiment of the application, the chip system can be formed by a chip, and can also comprise the chip and other discrete devices. The apparatus 700 may include: a processing unit 701 and a communication unit 702.
In the embodiment of the present application, the communication unit may also be referred to as a transceiver unit, and may include a transmitting unit and/or a receiving unit, which are configured to perform the steps of transmitting and receiving by the network device or the terminal device in the foregoing method embodiment, respectively.
The following describes in detail the communication device provided in the embodiment of the present application with reference to fig. 7 to 8. It should be understood that the descriptions of the apparatus embodiments and the descriptions of the method embodiments correspond to each other, and thus, descriptions of details not described may be referred to the above method embodiments, which are not repeated herein for brevity.
The communication unit may also be referred to as a transceiver, transceiving means, etc. The processing unit may also be called a processor, a processing board, a processing module, a processing device, etc. Alternatively, the device for implementing the receiving function in the communication unit 702 may be regarded as a receiving unit, and the device for implementing the transmitting function in the communication unit 702 may be regarded as a transmitting unit, i.e. the communication unit 702 includes a receiving unit and a transmitting unit. The communication unit may also be referred to as a transceiver, transceiver circuitry, or the like. The receiving unit may also be referred to as a receiver, or receiving circuit, among others. The transmitting unit may also sometimes be referred to as a transmitter, or a transmitting circuit, etc.
The communication apparatus 700 performs the functions of the terminal device in the flow shown in fig. 4 in the above embodiment:
a communication unit for transmitting a preamble to a network device, the preamble being used for initiating a first type random access procedure;
a processing unit, configured to receive scheduling information through the communication unit according to a first radio network temporary identifier RNTI, where the scheduling information is used to schedule a response message of the preamble;
the first RNTI is located in a first value range, no intersection exists between the first value range and a second value range, and the second value range is the value range of the RNTI used by the second type terminal equipment in the first type random access process.
The communication apparatus 700 performs the functions of the network device in the flow shown in fig. 4 in the above embodiment:
a communication unit for receiving a preamble from a terminal device; the terminal equipment is first type terminal equipment; the preamble is used for initiating a first type random access procedure;
the processing unit is used for sending scheduling information to the terminal equipment through the communication unit according to the first RNTI, wherein the scheduling information is used for scheduling response information of the preamble;
The first RNTI is located in a first value range, no intersection exists between the first value range and a second value range, and the second value range is the value range of the RNTI used by the second type terminal equipment in the first type random access process.
The communication apparatus 700 performs the functions of the terminal device in the flow shown in fig. 5 in the above embodiment:
a communication unit for receiving scheduling information from a network device; the scheduling information is used for scheduling downlink messages; the search space of the PDCCH corresponding to the scheduling information is a public search space;
the processing unit is used for descrambling the scheduling information according to the first scrambling code;
wherein the first scrambling code is determined from an RNTI scrambling CRC bits of the scheduling information.
The communication apparatus 700 performs the functions of the network device in the flow shown in fig. 5 in the above embodiment:
the processing unit is used for scrambling the scheduling information according to the first scrambling code; the scheduling information is used for scheduling downlink messages; the search space of the PDCCH corresponding to the scheduling information is a public search space; the first scrambling code is determined according to an RNTI scrambling CRC bits of the scheduling information;
And the communication unit is used for sending the scheduling information to the terminal equipment.
The foregoing is merely an example, and the processing unit 701 and the communication unit 702 may perform other functions, and a more detailed description may refer to related descriptions in the method embodiments shown in fig. 4 to 5, which are not repeated herein.
Fig. 8 illustrates an apparatus 800 according to an embodiment of the present application, where the apparatus illustrated in fig. 8 may be an implementation of a hardware circuit of the apparatus illustrated in fig. 7. The communication device may be adapted to perform the functions of the terminal device or the network device in the above-described method embodiments in the flowcharts shown above. For convenience of explanation, fig. 8 shows only major components of the communication apparatus.
As shown in fig. 8, the communication device 800 includes a processor 810 and an interface circuit 820. Processor 810 and interface circuit 820 are coupled to each other. It is understood that the interface circuit 820 may be a transceiver or an input-output interface. Optionally, the communication device 800 may further comprise a memory 830 for storing instructions to be executed by the processor 810 or for storing input data required by the processor 810 to execute instructions or for storing data generated after the processor 810 executes instructions.
When the communication device 800 is used to implement the method shown in fig. 4 to 5, the processor 810 is used to implement the functions of the processing unit 701, and the interface circuit 820 is used to implement the functions of the communication unit 702.
When the communication device is a chip applied to the terminal equipment, the terminal equipment chip realizes the functions of the terminal equipment in the embodiment of the method. The terminal device chip receives information from other modules (such as a radio frequency module or an antenna) in the terminal device, and the information is sent to the terminal device by the network device; alternatively, the terminal device chip sends information to other modules (e.g., radio frequency modules or antennas) in the terminal device, which is sent by the terminal device to the network device.
When the communication device is a chip applied to the network equipment, the network equipment chip realizes the functions of the network equipment in the embodiment of the method. The network device chip receives information from other modules (such as a radio frequency module or an antenna) in the network device, and the information is sent to the network device by the terminal device; alternatively, the network device chip sends information to other modules (e.g., radio frequency modules or antennas) in the network device, which the network device sends to the terminal device.
It is to be appreciated that the processor in embodiments of the application may be a central processing unit (Central Processing Unit, CPU), other general purpose processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. The general purpose processor may be a microprocessor, but in the alternative, it may be any conventional processor.
The processor in embodiments of the present application may be in random access Memory (Random Access Memory, RAM), flash Memory, read-Only Memory (ROM), programmable ROM (PROM), erasable Programmable ROM (EPROM), electrically Erasable Programmable EPROM (EEPROM), registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. In addition, the ASIC may reside in a network device or terminal device. The processor and the storage medium may reside as discrete components in a network device or terminal device.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. The present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
Claims (52)
- A communication method, applied to a first type of terminal device, comprising:transmitting a preamble to a network device, the preamble being used to initiate a first type of random access procedure;receiving scheduling information according to a first wireless network temporary identifier (RNTI), wherein the scheduling information is used for scheduling response messages of the preamble;the first RNTI is located in a first value range, no intersection exists between the first value range and a second value range, and the second value range is the value range of the RNTI used by the second type terminal equipment in the first type random access process.
- The method of claim 1, wherein the first RNTI satisfies a first formula when the value of the first RNTI is within the first range of values; the first formula includes parameters M and N, where N is the number of physical random access channel occasions RO for frequency domain medium frequency division multiplexing, and M is determined according to a subcarrier spacing SCS used in a random access procedure.
- The method according to claim 2, wherein the method further comprises:and receiving first indication information from the network equipment, wherein the first indication information is used for determining the first RNTI or is used for indicating that the first RNTI is determined by adopting the first formula.
- The method according to claim 2, wherein the method further comprises:receiving resource indication information from the network equipment, wherein the resource indication information is used for indicating random access resources;and determining the first RNTI according to the random access resource.
- The method of claim 4, wherein the first type of random access procedure is a two-step random access procedure;the determining the first RNTI according to the random access resource includes:and when the random access resource comprises a two-step random access resource configured for the first type terminal equipment and a two-step random access resource configured for the second type terminal equipment, determining to adopt the first formula to determine the first RNTI.
- The method of any one of claims 2 to 5, wherein the first formula is:RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4;wherein RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The method according to any one of claims 2 to 5, wherein when the first type of random access procedure is a four-step random access procedure, the first formula is:RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4;wherein RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The method according to any one of claims 2 to 5, wherein when the first type of random access procedure is a two-step random access procedure, the first formula is:MsgB-RNTI=1+s_id+14×t_id+14×M’×f_id+14×M’×N’×ul_carrier_id+14×80×8×4+14×10×M×N;wherein the MsgB-RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, M is determined according to a subcarrier interval SCS used in a random access process, and M 'and N' are values configured by network equipment;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The method according to any one of claims 6 to 8, further comprising:and receiving second indicating information from the network equipment, wherein the second indicating information is used for indicating the values of M and N.
- The method according to any of claims 1 to 9, wherein when the first type of random access procedure is a two-step random access procedure, the first value range is [8c01, fff2], and the second value range is [4601,8C00].
- The method according to any of claims 1 to 9, wherein when the first type of random access procedure is a four-step random access procedure, the first value range is [4601,8C00] or [8c01, fff2], and the second value range is [1,4600].
- A method of communication, for use with a network device, comprising:receiving a preamble from a terminal device; the terminal equipment is first type terminal equipment; the preamble is used for initiating a first type random access procedure;Transmitting scheduling information to the terminal equipment according to a first Radio Network Temporary Identifier (RNTI), wherein the scheduling information is used for scheduling response information of the preamble;the first RNTI is located in a first value range, no intersection exists between the first value range and a second value range, and the second value range is the value range of the RNTI used by the second type terminal equipment in the first type random access process.
- The method of claim 12, wherein the first RNTI satisfies a first formula when the value of the first RNTI is within the first range of values; the first formula includes parameters M and N, where N is the number of physical random access channel occasions RO for frequency domain medium frequency division multiplexing, and M is determined according to a subcarrier spacing SCS used in a random access procedure.
- The method of claim 13, wherein the method further comprises:and sending first indication information to the terminal equipment, wherein the first indication information is used for determining the first RNTI or is used for indicating to determine the first RNTI by adopting the first formula.
- The method of claim 13, wherein the method further comprises:And determining the first RNTI according to the random access resource.
- The method according to claim 15, wherein the first type of random access procedure is a two-step random access procedure;the determining the first RNTI according to the random access resource includes:and when the random access resource comprises a two-step random access resource configured for the first type terminal equipment and a two-step random access resource configured for the second type terminal equipment, determining to adopt the first formula to determine the first RNTI.
- The method of any one of claims 13 to 16, wherein the first formula is:RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4;wherein RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The method according to any one of claims 13 to 16, wherein when the first type of random access procedure is a four-step random access procedure, the first formula is:RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4;Wherein RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The method according to any one of claims 13 to 16, wherein when the first type of random access procedure is a two-step random access procedure, the first formula is:MsgB-RNTI=1+s_id+14×t_id+14×M’×f_id+14×M’×N’×ul_carrier_id+14×80×8×4+14×10×M×N;wherein the MsgB-RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, M is determined according to a subcarrier interval SCS used in a random access process, and M 'and N' are values configured by network equipment;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The method according to any one of claims 17 to 19, further comprising:and sending second indicating information to the terminal equipment, wherein the second indicating information is used for indicating the values of M and N.
- The method according to any of the claims 12 to 20, wherein when the first type of random access procedure is a two-step random access procedure, the first value range is [8c01, fff2], and the second value range is [4601,8C00].
- The method according to any of the claims 12 to 20, wherein when the first type of random access procedure is a four-step random access procedure, the first value range is [4601,8C00] or [8c01, fff2], and the second value range is [1,4600].
- A communication method, applied to a terminal device, comprising:receiving scheduling information from a network device; the scheduling information is used for scheduling downlink messages; the search space of the physical downlink control channel PDCCH corresponding to the scheduling information is a public search space;descrambling the scheduling information according to a first scrambling code;wherein the first scrambling code is determined according to a radio network temporary identity, RNTI, scrambling cyclic redundancy check, CRC, bits of the scheduling information.
- A method of communication, for use with a network device, comprising:scrambling the scheduling information according to the first scrambling code; the scheduling information is used for scheduling downlink messages; the search space of the physical downlink control channel PDCCH corresponding to the scheduling information is a public search space; the first scrambling code is determined according to a radio network temporary identifier RNTI scrambling cyclic redundancy check CRC bits of the scheduling information;and sending the scheduling information to the terminal equipment.
- A communication device, comprising:a communication unit for transmitting a preamble to a network device, the preamble being used for initiating a first type random access procedure;a processing unit, configured to receive scheduling information through the communication unit according to a first radio network temporary identifier RNTI, where the scheduling information is used to schedule a response message of the preamble;the first RNTI is located in a first value range, no intersection exists between the first value range and a second value range, and the second value range is the value range of the RNTI used by the second type terminal equipment in the first type random access process.
- The apparatus of claim 25, wherein the first RNTI satisfies a first formula when the value of the first RNTI is within the first range of values; the first formula includes parameters M and N, where N is the number of physical random access channel occasions RO for frequency domain medium frequency division multiplexing, and M is determined according to a subcarrier spacing SCS used in a random access procedure.
- The apparatus of claim 26, wherein the communication unit is further configured to:and receiving first indication information from the network equipment, wherein the first indication information is used for determining the first RNTI or is used for indicating that the first RNTI is determined by adopting the first formula.
- The apparatus of claim 26, wherein the communication unit is further configured to:receiving resource indication information from the network equipment, wherein the resource indication information is used for indicating random access resources;the processing unit is further configured to determine the first RNTI according to the random access resource.
- The apparatus of claim 28, wherein the first type of random access procedure is a two-step random access procedure;the processing unit is specifically configured to:and when the random access resource comprises a two-step random access resource configured for the first type terminal equipment and a two-step random access resource configured for the second type terminal equipment, determining to adopt the first formula to determine the first RNTI.
- The apparatus of any one of claims 26 to 29, wherein the first formula is:RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4;Wherein RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel (RO) in which the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The apparatus according to any one of claims 26 to 30, wherein when the first type of random access procedure is a four-step random access procedure, the first formula is:RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4;wherein RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The apparatus according to any one of claims 26 to 30, wherein when the first type of random access procedure is a two-step random access procedure, the first formula is:MsgB-RNTI=1+s_id+14×t_id+14×M’×f_id+14×M’×N’×ul_carrier_id+14×80×8×4+14×10×M×N;Wherein the MsgB-RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, M is determined according to a subcarrier interval SCS used in a random access process, and M 'and N' are values configured by network equipment;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The apparatus according to any one of claims 30 to 32, wherein the communication unit is further configured to:and receiving second indicating information from the network equipment, wherein the second indicating information is used for indicating the values of M and N.
- The apparatus of any of claims 25-33, wherein the first range of values is [8c01, fff2] and the second range of values is [4601,8C00] when the first type of random access procedure is a two-step random access procedure.
- The apparatus of any one of claims 25 to 33, wherein when the first type of random access procedure is a four-step random access procedure, the first range of values is [4601,8C00] or [8c01, fff2], and the second range of values is [1,4600].
- A communication device, comprising:a communication unit for receiving a preamble from a terminal device; the terminal equipment is first type terminal equipment; the preamble is used for initiating a first type random access procedure;a processing unit, configured to send scheduling information to the terminal device through the communication unit according to a first radio network temporary identifier RNTI, where the scheduling information is used to schedule a response message of the preamble;the first RNTI is located in a first value range, no intersection exists between the first value range and a second value range, and the second value range is the value range of the RNTI used by the second type terminal equipment in the first type random access process.
- The apparatus of claim 36, wherein the first RNTI satisfies a first formula when the value of the first RNTI is within the first range of values; the first formula includes parameters M and N, where N is the number of physical random access channel occasions RO for frequency domain medium frequency division multiplexing, and M is determined according to a subcarrier spacing SCS used in a random access procedure.
- The apparatus of claim 37, wherein the communication unit is further configured to:And sending first indication information to the terminal equipment, wherein the first indication information is used for determining the first RNTI or is used for indicating to determine the first RNTI by adopting the first formula.
- The apparatus of claim 37, wherein the processing unit is further configured to:and determining the first RNTI according to the random access resource.
- The apparatus of claim 39, wherein the first type of random access procedure is a two-step random access procedure;the processing unit is specifically configured to:and when the random access resource comprises a two-step random access resource configured for the first type terminal equipment and a two-step random access resource configured for the second type terminal equipment, determining to adopt the first formula to determine the first RNTI.
- The apparatus of any one of claims 37 to 40, wherein the first formula is:RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4;wherein RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;The ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The apparatus of any one of claims 37 to 40, wherein when the first type of random access procedure is a four-step random access procedure, the first formula is:RNTI=1+s_id+14×t_id+14×M×f_id+14×M×N×ul_carrier_id+14×80×8×4;wherein RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, and M is determined according to a subcarrier interval SCS used in a random access process;the ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The apparatus of any one of claims 37 to 40, wherein when the first type of random access procedure is a two-step random access procedure, the first formula is:MsgB-RNTI=1+s_id+14×t_id+14×M’×f_id+14×M’×N’×ul_carrier_id+14×80×8×4+14×10×M×N;wherein the MsgB-RNTI represents the first RNTI; s_id represents an index of a first symbol of a physical random access channel occasion RO where the preamble is located in a slot;t_id represents an index of a time slot in which the RO is located in a system frame;f_id represents the index of the RO on the frequency domain, N is the number of frequency division multiplexing RO, M is determined according to a subcarrier interval SCS used in a random access process, and M 'and N' are values configured by network equipment;The ul_carrier_id is determined according to the type of carrier used by the random access procedure.
- The apparatus of any one of claims 41 to 43, wherein the communication unit is further configured to:and sending second indicating information to the terminal equipment, wherein the second indicating information is used for indicating the values of M and N.
- The apparatus of any one of claims 36 to 44, wherein when the first type of random access procedure is a two-step random access procedure, the first range of values is [8c01, fff2], and the second range of values is [4601,8C00].
- The apparatus of any one of claims 36 to 44, wherein when the first type of random access procedure is a four-step random access procedure, the first range of values is [4601,8C00] or [8c01, fff2], and the second range of values is [1,4600].
- A communication device, comprising:a communication unit for receiving scheduling information from a network device; the scheduling information is used for scheduling downlink messages; the search space of the physical downlink control channel PDCCH corresponding to the scheduling information is a public search space;the processing unit is used for descrambling the scheduling information according to the first scrambling code;Wherein the first scrambling code is determined according to a radio network temporary identity, RNTI, scrambling cyclic redundancy check, CRC, bits of the scheduling information.
- A communication device, comprising:the processing unit is used for scrambling the scheduling information according to the first scrambling code; the scheduling information is used for scheduling downlink messages; the search space of the physical downlink control channel PDCCH corresponding to the scheduling information is a public search space; the first scrambling code is determined according to a radio network temporary identifier RNTI scrambling cyclic redundancy check CRC bits of the scheduling information;and the communication unit is used for sending the scheduling information to the terminal equipment.
- A communication device comprising a processor and a memory:the processor for executing a computer program or instructions stored in the memory, which, when executed, performs the method of any one of claims 1 to 22.
- A chip comprising a processor coupled to a memory for executing a computer program or instructions stored in the memory, which when executed by the processor, performs the method of any of claims 1 to 22.
- A computer readable storage medium storing instructions which, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 22.
- A computer program product, characterized in that computer readable instructions are stored which, when read and executed by a communication device, cause the communication device to perform the method of any of claims 1 to 22.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/071811 WO2022151176A1 (en) | 2021-01-14 | 2021-01-14 | Communication method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116602040A true CN116602040A (en) | 2023-08-15 |
Family
ID=82447771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202180082065.3A Pending CN116602040A (en) | 2021-01-14 | 2021-01-14 | Communication method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116602040A (en) |
WO (1) | WO2022151176A1 (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102054357B1 (en) * | 2015-08-19 | 2019-12-11 | 후지쯔 가부시끼가이샤 | Random access method and apparatus for supporting multiple transmission time intervals, and communication system |
CN106941730A (en) * | 2016-01-05 | 2017-07-11 | 中兴通讯股份有限公司 | The control method and device of Stochastic accessing |
CN110035520B (en) * | 2018-01-12 | 2021-10-15 | 维沃移动通信有限公司 | Data transmission method, descrambling method, demodulation method and equipment |
CN111278151B (en) * | 2018-12-24 | 2021-09-28 | 维沃移动通信有限公司 | Random access method, network side equipment and terminal |
CN116347652A (en) * | 2019-04-28 | 2023-06-27 | 大唐移动通信设备有限公司 | Random access method and equipment |
JP7520163B2 (en) * | 2020-06-24 | 2024-07-22 | 北京小米移動軟件有限公司 | Information transmission method, device, communication device, and storage medium |
-
2021
- 2021-01-14 CN CN202180082065.3A patent/CN116602040A/en active Pending
- 2021-01-14 WO PCT/CN2021/071811 patent/WO2022151176A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2022151176A1 (en) | 2022-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112544113B (en) | Method and user equipment for generating MAC PDU | |
US9894654B2 (en) | Defining sub-subchannels for data communication using separately provided frequency and time resources and related wireless terminals and network nodes | |
US10477578B2 (en) | Uplink data transmission method and user equipment, and uplink data reception method and base station | |
CN114071750B (en) | Method, device and storage medium for determining frequency domain resources | |
WO2020221264A1 (en) | Random access method, apparatus, and storage medium | |
US10412758B2 (en) | Handling number of repetitions in coverage extension mode | |
US10798716B2 (en) | Network device, terminal device, and resource allocation method | |
CN113711678B (en) | Network node, user Equipment (UE) and related methods for scheduling UEs by network node | |
CN113785527A (en) | Method for transmitting PUSCH, user equipment, device and storage medium, and method and base station for receiving PUSCH | |
US20220304059A1 (en) | Method and Apparatus for Sharing Channel Occupancy Time on Unlicensed Spectrum | |
CN108347778A (en) | Communication means and device | |
US20220369291A1 (en) | Terminal and communication method | |
US20210258057A1 (en) | Method and apparatus for transmitting channel state information | |
WO2020052573A1 (en) | Communication method and apparatus, and computer storage medium | |
JP2023134476A (en) | Time resources for uplink channels | |
CN114731696A (en) | Method and apparatus for multiple PUSCH transmissions on unlicensed spectrum | |
US20220132506A1 (en) | User equipment and scheduling device | |
EP3609261B1 (en) | Data transmission method, terminal device and network device | |
CN111436085B (en) | Communication method and device | |
CN112840722A (en) | Communication device, method of operating a communication device, infrastructure equipment and method | |
JP2022517065A (en) | Communication devices, how communication devices work, infrastructure equipment and methods | |
CN114467355A (en) | Method for monitoring uplink cancel command, user equipment, device, computer readable storage medium, method for sending uplink cancel command and base station | |
CN116158164A (en) | User equipment and base station | |
CN111465113A (en) | Method and apparatus in a node used for wireless communication | |
US11122601B2 (en) | Buffer status report sending method, terminal device, and network device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |