CN117730614A - Random access method, terminal equipment and network equipment - Google Patents

Random access method, terminal equipment and network equipment Download PDF

Info

Publication number
CN117730614A
CN117730614A CN202180100344.8A CN202180100344A CN117730614A CN 117730614 A CN117730614 A CN 117730614A CN 202180100344 A CN202180100344 A CN 202180100344A CN 117730614 A CN117730614 A CN 117730614A
Authority
CN
China
Prior art keywords
random access
access procedure
slice
information
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202180100344.8A
Other languages
Chinese (zh)
Inventor
付喆
林雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN117730614A publication Critical patent/CN117730614A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access

Abstract

The present application relates to a random access method, a terminal device, a network device, a chip, a computer readable storage medium, a computer program product, a computer program and a communication system, the method comprising: the terminal equipment determines whether to execute rollback from a first random access procedure to a second random access procedure based on first information sent by the network equipment; wherein the first information is used to indicate whether or not to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether or not to support or perform a fallback from the first random access procedure to the third random access procedure. By utilizing the embodiment of the application, the rollback of the random access process can be correctly realized.

Description

Random access method, terminal equipment and network equipment Technical Field
The present application relates to the field of communications, and more particularly, to a random access method, a terminal device, a network device, a chip, a computer readable storage medium, a computer program product, a computer program and a communication system.
Background
The strong demands of the vertical industry for wireless communications are witnessed, and in order to meet the demands of the vertical industry for delay, mobility, reliability, location accuracy, etc., the radio access network (Radio Access Network, RAN) needs to enhance how vertical traffic is supported at the access network. One way is to provide services with lower latency, more targeting, greater flexibility and higher scalability for multiple services with different requirements based on network slicing. More specifically, the introduction of network slicing allows application providers to participate in the design, deployment, and operation of custom RANs to better support the services of the application providers. Further, enhancements to the slice by the access network may be introduced, such as random access channel (Random Access Channel, RACH) configuration for the slice. How to implement handover or backoff between different RACHs is a problem to be solved.
Disclosure of Invention
In view of this, embodiments of the present application provide a random access method, a terminal device, a network device, a chip, a computer readable storage medium, a computer program product, a computer program, and a communication system, which can be used for rollback of a random access procedure.
The embodiment of the application provides a random access method, which comprises the following steps:
the terminal equipment determines whether to execute rollback from a first random access procedure to a second random access procedure based on first information sent by the network equipment;
wherein the first information is used to indicate whether or not to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether or not to support or perform a fallback from the first random access procedure to the third random access procedure.
The embodiment of the application provides a random access method, which comprises the following steps:
the network device sends first information to the terminal device so that the terminal device determines whether to execute rollback from the first random access procedure to the second random access procedure based on the first information;
wherein the first information is used to indicate whether or not to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether or not to support or perform a fallback from the first random access procedure to the third random access procedure.
The embodiment of the application also provides a terminal device, which comprises:
a first processing module, configured to determine, based on first information sent by the network device, whether to perform a backoff from the first random access procedure to the second random access procedure;
wherein the first information is used to indicate whether or not to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether or not to support or perform a fallback from the first random access procedure to the third random access procedure.
The embodiment of the application also provides a network device, which comprises:
a first communication module configured to send first information to the terminal device, so that the terminal device determines whether to perform a fallback from the first random access procedure to the second random access procedure based on the first information;
wherein the first information is used to indicate whether or not to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether or not to support or perform a fallback from the first random access procedure to the third random access procedure.
The embodiment of the application also provides a terminal device, which comprises: the random access method comprises a processor and a memory, wherein the memory is used for storing a computer program, and the processor calls and runs the computer program stored in the memory to execute the random access method of any embodiment of the application.
The embodiment of the application also provides a network device, which comprises: the random access method comprises a processor and a memory, wherein the memory is used for storing a computer program, and the processor calls and runs the computer program stored in the memory to execute the random access method of any embodiment of the application.
The embodiment of the application also provides a chip, which comprises: and a processor for calling and running the computer program from the memory, so that the device with the chip installed performs the random access method of any embodiment of the present application.
The embodiment of the application also provides a computer readable storage medium for storing a computer program, where the computer program causes a computer to execute the random access method of any embodiment of the application.
Embodiments of the present application also provide a computer program product comprising computer program instructions, wherein the computer program instructions cause a computer to perform the random access method of any of the embodiments of the present application.
The embodiment of the application also provides a computer program, which enables a computer to execute the random access method of any embodiment of the application.
The embodiment of the application also provides a communication system which comprises a terminal device and a network device for executing the random access method of any embodiment of the application.
According to the technical solution of the embodiment of the present application, whether the terminal device performs the backoff from the first random access procedure to the second random access procedure is determined based on whether the network device supports or instructs the terminal device to perform the backoff to the second random access procedure, or based on whether the network device supports or instructs the terminal device to perform the backoff to other random access procedures. Thus, the terminal equipment can correctly realize the rollback of the random access process.
Drawings
Fig. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
Fig. 2A is a schematic flow chart of four-step random access according to an embodiment of the present application.
Fig. 2B is a schematic flow chart of two-step random access according to an embodiment of the present application.
Fig. 3 is a schematic flow chart of MsgB-based backoff in two-step random access according to an embodiment of the present application.
Fig. 4 is a schematic flow chart of a random access method of one embodiment of the present application.
Fig. 5 is a schematic flow chart of a random access method according to another embodiment of the present application.
Fig. 6 is an interaction diagram of an application example one of the random access method of the embodiment of the present application;
fig. 7 is an interaction diagram of an application example two of the random access method of the embodiment of the present application;
Fig. 8 is a schematic block diagram of a terminal device according to an embodiment of the present application.
Fig. 9 is a schematic block diagram of a network device according to another embodiment of the present application.
Fig. 10 is a schematic block diagram of a communication device of an embodiment of the present application.
Fig. 11 is a schematic block diagram of a chip of an embodiment of the present application.
Fig. 12 is a schematic block diagram of a communication system of an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
The technical solution of the embodiment of the application can be applied to various communication systems, for example: global system for mobile communications (Global System of Mobile communication, GSM), code division multiple access (Code Division Multiple Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system, general packet Radio service (General Packet Radio Service, GPRS), long term evolution (Long Term Evolution, LTE) system, advanced long term evolution (Advanced long term evolution, LTE-a) system, new Radio (NR) system, evolved system of NR system, LTE-based access to unlicensed spectrum, LTE-U) system over unlicensed spectrum, NR (NR-based access to unlicensed spectrum, NR-U) system over unlicensed spectrum, non-terrestrial communication network (Non-Terrestrial Networks, NTN) system, universal mobile communication system (Universal Mobile Telecommunication System, UMTS), wireless local area network (Wireless Local Area Networks, WLAN), wireless fidelity (Wireless Fidelity, wiFi), fifth Generation communication (5 th-Generation, 5G) system, or other communication system, etc.
Generally, the number of connections supported by the conventional communication system is limited and easy to implement, however, with the development of communication technology, the mobile communication system will support not only conventional communication but also, for example, device-to-Device (D2D) communication, machine-to-machine (Machine to Machine, M2M) communication, machine type communication (Machine Type Communication, MTC), inter-vehicle (Vehicle to Vehicle, V2V) communication, or internet of vehicles (Vehicle to everything, V2X) communication, etc., and the embodiments of the present application may also be applied to these communication systems.
Optionally, the communication system in the embodiment of the present application may be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, a dual connectivity (Dual Connectivity, DC) scenario, and a Stand Alone (SA) fabric scenario.
Embodiments of the present application describe various embodiments in connection with network devices and terminal devices, where a terminal device may also be referred to as a User Equipment (UE), access terminal, subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, user Equipment, or the like.
The terminal device may be a Station (ST) in a WLAN, may be a cellular telephone, a cordless telephone, a session initiation protocol (Session Initiation Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital assistant (Personal Digital Assistant, PDA) device, a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, a vehicle device, a wearable device, a terminal device in a next generation communication system such as an NR network, or a terminal device in a future evolved public land mobile network (Public Land Mobile Network, PLMN) network, etc.
In embodiments of the present application, the terminal device may be deployed on land, including indoor or outdoor, hand-held, wearable or vehicle-mounted; can also be deployed on the water surface (such as ships, etc.); but may also be deployed in the air (e.g., on aircraft, balloon, satellite, etc.).
In the embodiment of the present application, the terminal device may be a Mobile Phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented Reality (Augmented Reality, AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in unmanned driving (self driving), a wireless terminal device in remote medical (remote medical), a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation security (transportation safety), a wireless terminal device in smart city (smart city), or a wireless terminal device in smart home (smart home), and the like.
By way of example, and not limitation, in embodiments of the present application, the terminal device may also be a wearable device. The wearable device can also be called as a wearable intelligent device, and is a generic name for intelligently designing daily wear by applying wearable technology and developing wearable devices, such as glasses, gloves, watches, clothes, shoes and the like. The wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also can realize a powerful function through software support, data interaction and cloud interaction. The generalized wearable intelligent device includes full functionality, large size, and may not rely on the smart phone to implement complete or partial functionality, such as: smart watches or smart glasses, etc., and focus on only certain types of application functions, and need to be used in combination with other devices, such as smart phones, for example, various smart bracelets, smart jewelry, etc. for physical sign monitoring.
In this embodiment of the present application, the network device may be a device for communicating with a mobile device, where the network device may be an Access Point (AP) in WLAN, a base station (Base Transceiver Station, BTS) in GSM or CDMA, a base station (NodeB, NB) in WCDMA, an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, a relay station or an Access Point, a vehicle device, a wearable device, a network device (gNB) in NR network, or a network device in a PLMN network of future evolution, etc.
By way of example and not limitation, in embodiments of the present application, a network device may have a mobile nature, e.g., the network device may be a mobile device. Alternatively, the network device may be a satellite, a balloon station. For example, the satellite may be a Low Earth Orbit (LEO) satellite, a medium earth orbit (medium earth orbit, MEO) satellite, a geosynchronous orbit (geostationary earth orbit, GEO) satellite, a high elliptical orbit (High Elliptical Orbit, HEO) satellite, or the like. Alternatively, the network device may be a base station disposed on land, in a water area, or the like.
In this embodiment of the present application, a network device may provide a service for a cell, where a terminal device communicates with the network device through a transmission resource (e.g., a frequency domain resource, or a spectrum resource) used by the cell, where the cell may be a cell corresponding to a network device (e.g., a base station), and the cell may belong to a macro base station, or may belong to a base station corresponding to a Small cell (Small cell), where the Small cell may include: urban cells (Metro cells), micro cells (Micro cells), pico cells (Pico cells), femto cells (Femto cells) and the like, and the small cells have the characteristics of small coverage area and low transmitting power and are suitable for providing high-rate data transmission services.
Fig. 1 schematically shows a wireless communication system 1000 comprising one network device 1100 and two terminal devices 1200. Alternatively, the wireless communication system 1000 may include a plurality of network devices 1100, and the coverage area of each network device 1100 may include other numbers of terminal devices, which are not limited by the embodiments of the present application. Optionally, the wireless communication system 1000 shown in fig. 1 may further include other network entities such as a mobility management entity (Mobility Management Entity, MME), an access and mobility management function (Access and Mobility Management Function, AMF), and the embodiment of the present application is not limited thereto.
It should be understood that a device having a communication function in a network/system in an embodiment of the present application may be referred to as a communication device. Taking the communication system shown in fig. 1 as an example, the communication device may include a network device and a terminal device with a communication function, where the network device and the terminal device may be specific devices in the embodiments of the present application, and are not described herein again; the communication device may also include other devices in the communication system, such as a network controller, a mobility management entity, and other network entities, which are not limited in this embodiment of the present application.
It should be understood that the terms "system" and "network" are often used interchangeably herein. The term "and/or" is used herein to describe association of associated objects, for example, to indicate that there may be three relationships between the associated objects, for example, a and/or B, may indicate: three cases of A alone, A and B together, and B alone exist. The character "/" herein generally indicates that the context associated object is an "or" relationship.
It should be understood that, in the embodiments of the present application, the "indication" may be a direct indication, an indirect indication, or an indication having an association relationship. For example, a indicates B, which may mean that a indicates B directly, e.g., B may be obtained by a; it may also indicate that a indicates B indirectly, e.g. a indicates C, B may be obtained by C; it may also be indicated that there is an association between a and B.
In the description of the embodiments of the present application, the term "corresponding" may indicate that there is a direct correspondence or an indirect correspondence between the two, or may indicate that there is an association between the two, or may indicate a relationship between the two and the indicated, configured, or the like.
In order to facilitate understanding of the technical solutions of the embodiments of the present application, the following description will describe related technologies of the embodiments of the present application, and the following related technologies may be arbitrarily combined with the technical solutions of the embodiments of the present application as an alternative, which all belong to the protection scope of the embodiments of the present application.
RACH (one)
The random access procedure is a basic procedure defined by a MAC (Medium Access Control ) layer, and NR MAC follows a contention-based four-step random access procedure and a non-contention-based random access procedure of LTE.
In the evolution of the subsequent standard, in order to further optimize the random access procedure, a two-step random access procedure based on contention and a two-step random access procedure based on non-contention are introduced, with the purpose of reducing the delay and signaling overhead in the random access procedure. In addition, considering that NR also needs to support unlicensed spectrum, the two-step random access process can further reduce the number of times of channel preemption compared with the four-step random access process, thereby improving the spectrum utilization rate. Taking a contention-based random access procedure as an example, a four-step random access procedure is shown in fig. 2A, and a two-step random access procedure is shown in fig. 2B.
As shown in fig. 2A, the contention-based four-step random access procedure requires four signaling interactions.
The first step: the UE selects a random access resource and transmits a preamble, this step of message is called a first step message (Msg 1). Before transmitting Msg1, the UE needs to measure the quality of the reference signal, so as to select a relatively good reference signal and the corresponding random access resource and preamble.
And a second step of: the UE receives the RAR (Random Access Response ) sent by the network in a pre-configured receive window, this step message being referred to as a second step message (Msg 2). The RAR contains timing advance for subsequent uplink data transmission, uplink grant, TC-RNTI (Temporary Cell-Radio Network Temporary Identifier), temporary Cell radio network Temporary identifier.
And a third step of: the UE performs uplink transmission according to the scheduling information in the random access response, namely, the transmission of a third step message (Msg 3), and the Msg3 carries the UE identifier for subsequent contention conflict resolution; generally, this identity will be different depending on the RRC (Radio Resource Control ) state the UE is in. The UE in RRC connected state will carry the C-RNTI in Msg3, while the UE in RRC idle and inactive states will carry the UE identity of one RRC layer in Msg 3. Whatever the form of identification, this identification allows the network to uniquely identify the UE.
Fourth step: after the UE transmits Msg3, the UE receives the contention conflict resolution message transmitted by the network within a specified time. Generally, if the network is able to successfully receive the Msg3 sent by the UE, the network has identified this UE, that is to say the contention conflict is resolved on the network side. For the UE side, if the UE is able to detect the contention conflict resolution identity in the fourth step message (Msg 4) of the network scheduling, this means that the conflict is resolved also at the UE side.
Based on the four-step random access based on the contention, the NR further introduces a two-step random access procedure based on the contention, which only involves two signaling interactions. Specifically, as shown in fig. 2B, the first message is called message a (MsgA), where MsgA includes a preamble transmitted on a random access resource and load information transmitted on PUSCH (Physical Uplink Shared Channel ), and may correspond to Msg1 and Msg3 in a contention-based four-step random access procedure. The second message is called message B (MsgB), which may correspond to Msg2 and Msg4 in a contention-based four-step random access procedure.
After selecting the two-step random access procedure and transmitting the MsgA, the UE needs to monitor the MsgB within a configured window. With reference to the design of contention-based four-step random access, there are different MsgB listening behavior for UEs in different RRC connected states. In general, when the UE is in RRC connected state, that is, the UE carries the C-RNTI in the MsgA, the UE listens to the C-RNTI scrambled PDCCH (Physical Downlink Control Channel ) and the MsgB-RNTI scrambled PDCCH. When the UE is in an RRC idle state or an inactive state, no specific RNTI exists, so that the UE carries an RRC message in the MsgA as an identifier and monitors a PDCCH scrambled by the MsgB-RNTI. The computation of the MsgB-RNTI refers to the design of the RA-RNTI (Random Access-Radio Network Temporary Identifier, random Access radio network temporary identifier) for scheduling the RAR in the four-step Random Access procedure, i.e. based on the time-frequency location of the Random Access resource selected by the UE when transmitting the MsgA. Considering that the two-step random access resource and the four-step random access resource can be reused, in order to avoid confusion generated when different types of UE receive network feedback, the MsgB-RNTI is added with a bias amount on the basis of the RA-RNTI.
For the MsgB message, as before, it corresponds to Msg2 and Msg4 in a contention-based four-step random access procedure, so its design needs to consider the functions of Msg2 and Msg 4. In one aspect, the MsgB is to support resolution of contention conflicts, such as contention conflict resolution identification and RRC messages for the corresponding UE. On the other hand, msgB also supports the content of Msg2, such as random back-off indication and the content in RAR. The reason here is mainly that, for the network side, when receiving the decoded MsgA, on the one hand, the network may be able to successfully decode all contents of the MsgA, such as the preamble and the load message of the MsgA, so that the network may send a contention conflict resolution message through the MsgB, that is, a function corresponding to the Msg 4. Yet another possibility is that the network only solves the preamble in MsgA but does not solve the load in MsgA, for which case the network does not recognize the UE, but the network can still instruct this UE to continue to send Msg3 by Msg b (corresponding to the function of Msg 2) without re-transmitting MsgA again. This fallback may also be referred to as MsgB-based fallback, as shown in fig. 3.
If the UE has not yet succeeded in accessing after receiving the back-off indication of the MsgB and transmitting Msg3 based on the scheduled resources included in the back-off indication, the terminal may retry the transmission of MsgA. In addition, the network may configure the maximum number of attempts of MsgA (MsgA-TransMax) for the terminal, and when the number of MsgA attempts by the terminal exceeds this configured maximum number, the terminal may switch/fall back to the contention-based four-step random access procedure to continue with the access attempt.
Enhancement of slices by access network
The strong demands of the vertical industry for wireless communications are witnessed, and in order to meet the demands of the vertical industry for delay, mobility, reliability, location accuracy, etc., the RAN needs to enhance how vertical traffic is supported in the access network. One way is to provide services with lower latency, more targeting, greater flexibility and higher scalability for multiple services with different requirements based on network slicing. More specifically, the introduction of network slicing allows application providers to participate in the design, deployment, and operation of custom RANs to better support the services of the application providers. Release 17 thus introduces enhancements to the slice by the access network, in particular to mechanisms for enabling the UE to quickly access cells supporting the desired slice, including:
cell reselection based on slice under network control;
slice-based RACH configuration or access restriction.
The random access procedure for a slice (R17 slice-specific RACH) supports a fallback from a two-step random access procedure for a slice to a four-step random access procedure for a slice or from a two-step random access procedure for a slice to a four-step generic random access procedure.
However, technical details of the fall-back from the two-step random access procedure for the slice to the four-step random access procedure or the four-step general random access procedure for the slice are not explicitly known in the related art.
The solution provided by the embodiments of the present application is mainly used for solving at least one of the above problems.
For a more complete understanding of the nature and the technical content of the embodiments of the present invention, reference should be made to the following detailed description of embodiments of the invention, taken in conjunction with the accompanying drawings, which are meant to be illustrative only and not limiting of the embodiments of the invention.
Fig. 4 is a schematic flow chart of a random access method according to an embodiment of the present application. The method may alternatively be applied to the system shown in fig. 1, but is not limited thereto. The method comprises the following steps:
s110, the terminal equipment determines whether to execute rollback from a first random access procedure to a second random access procedure based on first information sent by the network equipment;
wherein the first information is used to indicate whether or not to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether or not to support or perform a fallback from the first random access procedure to the third random access procedure.
In correspondence with the above method, fig. 5 is a schematic flow chart of a random access method according to another embodiment of the present application. The method may alternatively be applied to the system shown in fig. 1, but is not limited thereto. The method comprises the following steps:
s210, the network equipment sends first information to the terminal equipment so that the terminal equipment can determine whether to execute rollback from a first random access procedure to a second random access procedure based on the first information;
wherein the first information is used to indicate whether or not to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether or not to support or perform a fallback from the first random access procedure to the third random access procedure.
Note that, in the embodiment of the present application, the backoff of the random access procedure may also be referred to as handover of the random access procedure.
In the embodiment of the application, the first information has various implementation manners.
One exemplary implementation is that the first information may be information for fallback to the second random access procedure. It may indicate whether or not the terminal device is supported to fall back from the first random access procedure to the second random access procedure, or whether or not to perform fall back from the first random access procedure to the second random access procedure. The terminal device may perform a backoff from the first random access procedure to the second random access procedure when the first information indicates support or execution. When the first information indicates that the first random access procedure is not supported or not executed, the terminal equipment does not execute rollback from the first random access procedure to the second random access procedure; alternatively, the terminal device may perform a fallback from the first random access procedure to the third random access procedure.
Another exemplary implementation is that the first information may also be information for fallback to the third random access procedure. It may indicate whether or not the terminal device is supported to fall back from the first random access procedure to the third random access procedure, or whether or not to perform fall back from the first random access procedure to the third random access procedure. The terminal device may perform a backoff from the first random access procedure to the second random access procedure when the first information indicates that it is not supported or not performed. When the first information indicates support or execution, the terminal equipment does not execute rollback from the first random access procedure to the second random access procedure; alternatively, the terminal device may perform a fallback from the first random access procedure to the third random access procedure.
Alternatively, the first information from the network device may indicate directly or indirectly whether random access backoff is supported or performed. The following describes in detail an example in which the first information is information for the fallback to the second random access procedure. It will be appreciated that a similar implementation may be employed in case the first information is information for fallback to the third random access procedure.
The first information may be, for example, acknowledgement information (true) or non-acknowledgement information (false). The first information has a value of true, and represents that the network device supports the rollback of the terminal device from the first random access procedure to the second random access procedure, or the network device instructs the terminal device to execute the rollback from the first random access procedure to the second random access procedure. The first information has a false value, which represents that the network device does not support the fallback of the terminal device from the first random access procedure to the second random access procedure, or the network device indicates that the terminal device does not execute the fallback from the first random access procedure to the second random access procedure. For example, the first information may be 1-bit information, and the value of 1 is acknowledgement information, and the value of 0 is non-acknowledgement information; alternatively, a value of 1 is non-acknowledgement information, and a value of 0 is acknowledgement information.
For example, the first information may be sent when the network device supports or the network device needs to instruct the terminal device to perform a backoff from the first random access procedure to the second random access procedure. When the terminal device receives the first information, it may be determined that the network device supports or the network device instructs the terminal device to perform a backoff from the first random access procedure to the second random access procedure. When the terminal device does not receive the first information, it may be determined that the network device does not support or that the network device indicates that the terminal device does not perform a fallback from the first random access procedure to the second random access procedure.
Illustratively, in the case where the network device supports or instructs the terminal device to perform a backoff from the first random access procedure to the second random access procedure, the first information is included in a first message sent by the network device to the terminal device; in case the network device does not support or the network device instructs the terminal device not to perform a backoff from the first random access procedure to the second random access procedure, the first information is not included in the first message sent by the network device to the terminal device. In this way, the terminal device may determine whether to perform a backoff from the first random access procedure to the second random access procedure according to whether the first information appears in the received first message.
The first information may also include, for example, a maximum number of transmissions and/or resources for the random access procedure. For example, the first information may be configuration information of the maximum transmission number, or resource configuration information. Here, the resources of the random access procedure may include a preamble group and/or a random access opportunity (RO). The first information indirectly indicates whether a backoff from the first random access procedure to the second random access procedure or the third random access procedure is supported or performed based on the maximum number of transmissions and/or the resources.
For example, in a case where the first information includes a maximum number of transmissions for the second random access procedure, and/or the first information does not include a maximum number of transmissions for the third random access procedure, and/or the maximum number of transmissions for the second random access procedure in the first information is 1 or more, the first information is used to instruct the supporting terminal device to perform a backoff from the first random access procedure to the second random access procedure, or is used to instruct the non-supporting terminal device to perform a backoff from the first random access procedure to the third random access procedure.
For another example, in a case where the first information includes a maximum number of transmissions for the third random access procedure, and/or the first information does not include a maximum number of transmissions for the second random access procedure, and/or the maximum number of transmissions for the third random access procedure in the first information is 1 or more, the first information is used to instruct the supporting terminal device to perform a backoff from the first random access procedure to the third random access procedure, or is used to instruct the non-supporting terminal device to perform a backoff from the first random access procedure to the second random access procedure.
For another example, in the case that the first information includes the maximum number of transmissions for the third random access procedure and/or the maximum number of transmissions for the third random access procedure in the first information is greater than or equal to 1, if the first information does not include the resource for the third random access procedure, the first information is used to instruct the supporting terminal device to perform the backoff from the first random access procedure to the second random access procedure.
For another example, in the case that the first information includes a maximum number of transmissions for the third random access procedure and/or the maximum number of transmissions for the third random access procedure in the first information is 1 or more, if the first information includes a resource for the second random access procedure, the first information is used to instruct the supporting terminal device to perform a backoff from the first random access procedure to the second random access procedure.
For another example, in a case where the first information includes a maximum number of transmissions for the second random access procedure and the first information indicates that the maximum number of transmissions for the second random access procedure is not used for a third random access procedure, the terminal device performs backoff from the first random access procedure to the second random access procedure, or the terminal device does not perform backoff from the first random access procedure to the third random access procedure, or the terminal device does not perform backoff from the first random access procedure.
For another example, in a case where the first information includes a maximum number of transmissions for the second random access procedure, and the first information indicates that the maximum number of transmissions for the second random access procedure is not used to fall back to the third random access procedure, the terminal device performs fall back from the first random access procedure to the second random access procedure, or the terminal device does not perform fall back from the first random access procedure to the third random access procedure, or the terminal device does not perform fall back from the first random access procedure.
For another example, in a case where the first information includes a maximum number of transmissions for a random access procedure, and the first information indicates that the maximum number of transmissions for a random access procedure is not used for the third random access procedure, the terminal device performs backoff from the first random access procedure to the second random access procedure, or the terminal device does not perform backoff from the first random access procedure to the third random access procedure, or the terminal device does not perform backoff from the first random access procedure.
It should be noted that the first information may include a plurality of kinds of information. For example, the first information includes direct indication information and/or a maximum number of transmissions and/or resources. As another example, the first information includes a plurality of maximum transmission times. Alternatively, the above-mentioned plurality of information may be carried in the first information or may be carried in different information.
Alternatively, the first random access procedure may comprise a random access procedure for a slice.
In an exemplary implementation, the second random access procedure may include a random access procedure for non-slices, or a random access procedure for common resources, or a common random access procedure. Optionally, the third random access procedure comprises a random access procedure for a slice.
Wherein, by way of example and not limitation, the first random access procedure may comprise a two-step random access procedure for a slice, and the third random access procedure may comprise a four-step random access procedure for a slice.
The second random access procedure may include, by way of example and not limitation, a four-step random access procedure for non-sliced, or a four-step random access procedure for universal resources, or a four-step universal random access procedure.
In another exemplary implementation, the second random access procedure may include a random access procedure for a slice. Alternatively, the third random access procedure may comprise a random access procedure for non-slice, or a random access procedure for common resources, or a common random access procedure.
Therein, by way of example and not limitation, the first random access procedure may comprise a two-step random access procedure for a slice, and the second random access procedure may comprise a four-step random access procedure for a slice.
The third random access procedure may include, by way of example and not limitation, a four-step random access procedure for non-sliced, or a four-step random access procedure for universal resources, or a four-step universal random access procedure.
In a specific implementation, in a case where the second random access procedure is a random access procedure for a slice, the maximum number of transmissions for the second random access procedure is the maximum number of transmissions for the slice. Similarly, in the case where the third random access procedure is a random access procedure for a slice, the aforementioned maximum number of transmissions for the third random access procedure is the maximum number of transmissions for the slice.
It should be noted that the maximum transmission number of random access for a slice is different from the maximum transmission number (parameter msgA-TransMax) of the message A in the two-step random access procedure in the related art. Optionally, the maximum number of transmissions for a slice is one of positive integers greater than or equal to 1. Alternatively, the maximum number of transmissions for random access of a slice may be a parameter common to each slice or a different parameter for different slices.
Optionally, the first information corresponds to one of the plurality of slices, the first information being applicable to its corresponding slice. For example, the first information may include the aforementioned maximum number of random access transmissions for a slice, each slice corresponds to one maximum number of random access transmissions for a slice, and the maximum number of random access transmissions for a slice corresponding to a different slice may be different.
Optionally, the first information corresponds to one of a plurality of slice groups, and the first information is applicable to a plurality of slices of its corresponding slice group. For example, the first information may include the aforementioned maximum number of random access transmissions for a slice, each slice group corresponds to one maximum number of random access transmissions for a slice, and each slice in the same slice group corresponds to the same maximum number of random access transmissions for a slice; the maximum number of random access transmissions for a slice may be different for different slice groups.
Alternatively, the first information is applicable to a plurality of slices or a plurality of slice groups, that is, the first information is common to the individual slices.
It can be seen that, according to the random access method of the embodiment of the present application, whether the terminal device performs the backoff from the first random access procedure to the second random access procedure is determined based on whether the network device supports or instructs the terminal device to perform the backoff to the second random access procedure, or based on whether the network device supports or instructs the terminal device to perform the backoff to the other random access procedure. Thus, the terminal equipment can correctly realize the rollback of the random access process. In practical applications, the terminal device may determine whether the first condition is satisfied based on the first information, so as to determine whether to perform a backoff from the first random access procedure to the second random access procedure according to whether the first condition is satisfied. I.e. the first condition is that the terminal device falls back to the second random access procedure.
Specifically, the terminal device determines, based on first information sent by the network device, whether to perform backoff from the first random access procedure to the second random access procedure, including:
the terminal device performs a backoff from the first random access procedure to the second random access procedure in a case where it is determined that the first condition is satisfied based on the first information.
Optionally, the determining, by the terminal device, whether to perform the backoff from the first random access procedure to the second random access procedure based on the first information sent by the network device may further include:
the terminal device does not perform a backoff from the first random access procedure to the second random access procedure in a case where it is determined that the first condition is not satisfied based on the first information.
In practical application, the terminal device may further determine whether to perform a fallback from the first random access procedure to the third random access procedure according to whether the first condition is satisfied.
The terminal device may determine that the first condition is satisfied based on the first information, and may not perform fallback from the first random access procedure to the third random access procedure.
The terminal device may perform a fallback from the first random access procedure to the third random access procedure, if the first condition is determined not to be satisfied based on the first information.
Taking the first random access procedure as a two-step random access procedure (2-step slice-specific RACH) for a slice, the second random access procedure as a four-step universal random access procedure (4-step common RACH), the third random access procedure as a four-step random access procedure (4-step slice-specific RACH) for a slice as an example, the first condition is a condition to fall back to the universal random access procedure. In case the first condition is fulfilled, for example, the first information indicates that a fallback to a generic random access procedure is supported, the first information indicates that a fallback to a random access procedure for a slice is not supported, a maximum number of transmissions of the generic random access procedure is configured or a maximum number of transmissions of a random access for a slice is not configured, etc., the terminal device may determine that a fallback from a two-step random access procedure for a slice to a four-step generic random access procedure instead of a four-step random access procedure for a slice. In case the first condition is not met, the terminal device may determine that the fallback from the two-step random access procedure for the slice is a four-step random access procedure for the slice instead of a four-step generic random access procedure.
Taking the first random access procedure as a two-step random access procedure (2-step slice-specific RACH) for a slice, the second random access procedure as a four-step random access procedure (4-step slice-specific RACH) for a slice, the third random access procedure as a four-step universal random access procedure (4-step common RACH) as an example, the first condition is a condition to fall back to the four-step random access procedure for a slice. In case the first condition is met, for example, the first information indicates that the fallback to the random access procedure for the slice is supported, the first information indicates that the fallback to the general random access procedure is not supported, the maximum number of random access transmissions for the slice is configured or the maximum number of transmissions of the general random access procedure is not configured, etc., the terminal device may determine that the fallback to the four-step random access procedure for the slice from the two-step random access procedure for the slice is not the four-step general random access procedure. In case the first condition is not met, the terminal device may determine that the fallback from the two-step random access procedure for the slice is a four-step generic random access procedure instead of the four-step random access procedure for the slice.
Alternatively, the first information may be used in some specific cases to determine whether to fall back to the second random access procedure.
Illustratively, the above method may further comprise:
under the condition that the preamble group configured by the first random access process is different from the preamble group configured by the second random access process, or the preamble group selection threshold configured by the first random access process is different from the preamble group selection threshold configured by the second random access process, the terminal equipment backs to the second random access process or determines whether the first condition is met based on the first information;
or,
under the condition that the preamble group configured by the first random access process is different from the preamble group configured by the third random access process, or the preamble group selection threshold configured by the first random access process is different from the preamble group selection threshold configured by the third random access process, the terminal equipment backs to the second random access process or determines whether the first condition is met based on the first information;
or,
under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the second random access process, or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the second random access process, the terminal equipment backs to the second random access process or determines whether the first condition is met based on the first information;
Or,
and under the condition that the preamble group configured by the first random access procedure is the same as the preamble group configured by the third random access procedure, or the preamble group selection threshold configured by the first random access procedure is the same as the preamble group selection threshold configured by the third random access procedure, the terminal equipment backs to the second random access procedure or determines whether the first condition is met based on the first information.
Wherein, the preamble groups configured by the two random access processes are different, which means that the preamble groups configured by the two random access processes are not identical. For example, a preamble group a and a preamble group B are configured for a two-step random access procedure (2-step slice-specific RACH) of a slice, but a four-step general random access procedure (4-step common RACH) only configures the preamble group a or the preamble group B, and a preamble group configured by the 2-step slice-specific RACH is different from a preamble group configured by the 4-step common RACH. For another example, the 2-step slice-specific RACH is configured with only preamble group a or preamble group B, but the 4-step common RACH is configured with preamble group a and preamble group B, and the preamble group configured by the 2-step slice-specific RACH is different from the preamble group configured by the 4-step common RACH.
It can be seen that the terminal device can directly determine to fall back to the second random access procedure in case the preamble group configuration of the random access procedure satisfies the condition. Or, in case the preamble group configuration of the random access procedure satisfies the condition, the terminal device needs to determine whether the first condition, e.g., whether the network supports, whether the network instructs the execution, is satisfied using the first information to determine whether to fall back to the second random access procedure.
Accordingly, for the network device, the network device sends first information to the terminal device, including:
the network equipment sends first information to the terminal equipment under the condition that a preamble group configured in a first random access process is different from a preamble group configured in a second random access process or a preamble group selection threshold configured in the first random access process is different from a preamble group selection threshold configured in the second random access process;
or,
the network equipment sends first information to the terminal equipment under the condition that a preamble group configured in the first random access process is different from a preamble group configured in the third random access process or a preamble group selection threshold configured in the first random access process is different from a preamble group selection threshold configured in the third random access process;
Or,
the network equipment sends first information to the terminal equipment under the condition that the preamble group configured in the first random access process is the same as the preamble group configured in the second random access process or the preamble group selection threshold configured in the first random access process is the same as the preamble group selection threshold configured in the second random access process;
or,
and the network equipment sends the first information to the terminal equipment under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the third random access process or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the third random access process.
Optionally, the method may further include: and under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the third random access process, or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the third random access process, the terminal equipment rolls back to the third random access process. That is, in some cases, the terminal device may fall back directly to the third random access procedure.
Alternatively, the first condition may include at least one of the following conditions 1 to 11:
condition 1: first information is received.
For example, the first information is sent if the network device supports fallback to the second random access procedure, and the first condition comprises condition 1.
Condition 2: the first information appears in a first message sent by the network device.
For example, in case the network device supports fallback to the second random access procedure, the network device would send a first message carrying the first information, the first condition comprises condition 2.
Condition 3: the first information indicates that the supporting terminal device performs a backoff from the first random access procedure to the second random access procedure.
For example, in the case where the first information is a direct indication or an indirect indication of whether or not a fallback from the first random access procedure to the second random access procedure is supported, the first condition includes condition 3.
Condition 4: the first information includes a maximum number of transmissions for the second random access procedure.
For example, in the case where the first information is used to configure the maximum number of transmissions, the first condition includes condition 4 in which whether or not a backoff from the first random access procedure to the second random access procedure is supported is indicated based on the maximum number of transmissions.
Condition 5: the first information does not include a maximum number of transmissions for the third random access procedure.
For example, in the case where the first information is used to configure the maximum number of transmissions, the first condition includes condition 5 in which whether or not a backoff from the first random access procedure to the second random access procedure is supported is indicated based on the maximum number of transmissions.
Condition 6: the first information does not include a random access maximum number of transmissions for the slice.
For example, in the case where the second random access procedure is a general random access procedure and the first information is used to configure the maximum number of transmissions, the first condition includes condition 6 in which whether or not a backoff from the first random access procedure to the second random access procedure is supported is indicated based on the maximum number of transmissions.
Condition 7: resources for the third random access procedure are not configured.
For example, in the case where the first information transmitted by the network device is resource configuration information, the first condition includes condition 7 based on whether or not the resource of the third random access procedure is configured to indicate whether or not the backoff from the first random access procedure to the second random access procedure is supported.
Condition 8: the first information includes a random access maximum number of transmissions for a slice.
For example, in a case where the second random access procedure is a random access procedure for a slice, and the first information is used to configure the maximum number of transmissions, the first condition includes condition 8 based on whether or not the maximum number of transmissions indicates that a backoff from the first random access procedure to the second random access procedure is supported.
Condition 9: the maximum number of random access transmissions for a slice is less than 1.
For example, in the case where the second random access procedure is a general random access procedure and the first information is used to configure the maximum number of transmissions, the first condition includes condition 9 in which whether or not a backoff from the first random access procedure to the second random access procedure is supported is indicated based on the maximum number of transmissions.
Condition 10: resources for the second random access procedure are configured.
For example, the first information sent by the network device is resource configuration information, and the first condition includes condition 10 in the case where the resource indication of the second random access procedure is based on whether or not the resource indication of the second random access procedure is supported or not.
Condition 11: the use condition of the first information is satisfied.
For example, in case the first information sent by the network device indicates that the supporting terminal device performs a backoff from the first random access procedure to the second random access procedure, the condition 11 needs to be satisfied to perform the backoff, i.e., the first condition includes the condition 11.
It will be appreciated that the above conditions 1 to 11 may be used alone or simultaneously.
For example, in case the first information is a direct indication of whether a fallback from the first random access procedure to the second random access procedure is supported, the first condition may comprise the above conditions 1, 3, 11 at the same time.
For another example, in the case where the second random access procedure is a general random access procedure and the first information is used to configure the maximum number of transmissions, the first condition may include both the above conditions 4, 5, 11, or both the above conditions 4, 6, 11, or both the above conditions 8 and 9.
Alternatively, the condition of use of the first information may include at least one of the following conditions a to K:
condition a: the preamble transmission times of the first random access process are larger than the maximum random access transmission times for the slice;
condition B: resources for the third random access procedure are not configured;
condition C: the preamble set configured by the first random access process is the same as the preamble set configured by the second random access process;
condition D: the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
condition E: configuring resources for a second random access procedure;
condition F: configuring the maximum transmission times for the second random access process;
condition G: the maximum transmission times for the third random access process are not configured;
condition H: the maximum transmission times of random access for the slice are not configured;
Condition I: configuring the maximum transmission times aiming at a third random access process;
condition J: configuring the maximum transmission times of random access for slices;
condition K: the maximum number of transmissions for random access of the slice or the maximum number of transmissions for the third random access procedure is greater than or equal to 1.
It will be appreciated that the above conditions A-K may be used alone or in combination.
For example, in case the second random access procedure is a general random access procedure, the first condition may include both the above conditions a-G or both the above conditions a-F and H.
It can be seen that in the embodiments of the present application, it is described above from a different perspective how the terminal device determines whether to perform a fallback from the first random access procedure to the second random access procedure. Optionally, the embodiment of the present application may further include a step of obtaining a MAC PDU (Protocol Data Unit ) in the second random access procedure in case of performing a backoff from the first random access procedure to the second random access procedure.
Illustratively, the above method further comprises:
in case of performing a backoff from the first random access procedure to the second random access procedure, the terminal device obtains a MAC PDU of the third step message in the second random access procedure based on the MAC PDU of the message a in the first random access procedure.
Therein, by way of example and not limitation, the first random access procedure may be a two-step random access procedure, such as a two-step random access procedure for slicing. The second random access procedure may be a four-step random access procedure such as a four-step generic random access procedure, a four-step random access procedure for non-slices, or a four-step random access procedure for slices, etc. Accordingly, the message a may be MsgA in a two-step random access procedure, and the third-step message may be Msg 3 in a four-step random access procedure.
Illustratively, the terminal device obtains the MAC PDU of the third step message in the second random access process based on the MAC PDU of the message a in the first random access process, including:
if the second condition is met, the terminal equipment takes the MAC PDU of the message A in the first random access process as the MAC PDU of the third message in the second random access process;
and/or the number of the groups of groups,
and if the third condition is met, the terminal equipment carries out packet reassembly based on the MAC PDU of the message A in the first random access process, and the MAC PDU in the third message in the second random access process is obtained.
Illustratively, the second condition includes at least one of:
the preamble set configured by the first random access process is the same as the preamble set configured by the second random access process;
The preamble group selection threshold configured in the first random access process is the same as the preamble group selection threshold configured in the second random access process;
the grant size of the third message of the second random access procedure is the same as the MAC PDU size of message a in the first random access procedure.
Illustratively, the third condition may include at least one of:
the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure;
the preamble group selection threshold configured in the first random access process is different from the preamble group selection threshold configured in the second random access process;
the grant size of the message of the third step of the second random access procedure is different from the MAC PDU size of the message a in the first random access procedure.
Optionally, in the process of reassembling packets based on the MAC PDU of the message a in the first random access procedure, the terminal device multiplexes the data and/or the MAC CE according to the priority of the data and/or the priority of the MAC CE.
For example, the terminal device may multiplex the data and/or MAC CE according to logical channel priorities (Logical channel priority, LCP), including priorities of the data and/or priorities of the MAC CEs.
Optionally, in the process of reassembling packets based on the MAC PDU of message a in the first random access procedure, the terminal device preferentially multiplexes the data. For example, the priority of data is higher than the priority of MAC CE, and the terminal device multiplexes data preferentially.
Optionally, in the process that the terminal device reassembles the packet based on the MAC PDU of the message a in the first random access procedure, if the resource size of the message a in the third step in the second random access procedure is greater than the authorized size of the message a in the first random access procedure, the terminal device fills the remaining space of the PDU based on the preset bit or the new data. Wherein the preset bit is, for example, 0 or 1.
Optionally, before the terminal device obtains the MAC PDU of the third message in the second random access procedure based on the MAC PDU of the medium access control protocol data unit of the message a in the first random access procedure, the method may further include:
the terminal device acquires the MAC PDU of message a in the message a buffer.
Optionally, the method may further include:
the terminal device stores the MAC PDU of the third step message in the second random access process obtained based on the MAC PDU of the message A in the first random access process in the third step message buffer.
Illustratively, the above method further comprises:
in case of performing a backoff from the first random access procedure to the third random access procedure, the terminal device obtains a MAC PDU of the third step message in the third random access procedure based on the MAC PDU of the medium access control protocol data unit of message a in the first random access procedure.
Therein, by way of example and not limitation, the first random access procedure may be a two-step random access procedure, such as a two-step random access procedure for slicing. The third random access procedure may be a four-step random access procedure such as a four-step random access procedure for slicing, a four-step generic random access procedure, or a four-step random access procedure for non-slicing, etc. Accordingly, the message a may be MsgA in a two-step random access procedure, and the third-step message may be Msg 3 in a four-step random access procedure.
Optionally, the second condition includes at least one of:
the preamble set configured by the first random access process is the same as the preamble set configured by the third random access process;
the preamble group selection threshold configured in the first random access process is the same as the preamble group selection threshold configured in the third random access process;
The grant size of the third step message of the third random access procedure is the same as the MAC PDU size of message a in the first random access procedure.
Optionally, the third condition includes at least one of:
the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
the preamble group selection threshold configured in the first random access process is different from the preamble group selection threshold configured in the third random access process;
the grant size of the third step message of the third random access procedure is different from the MAC PDU size of message a in the first random access procedure.
Optionally, in the process of reassembling packets based on the MAC PDU of the message a in the first random access procedure, the terminal device multiplexes the data and/or the MAC CE according to the priority of the data and/or the priority of the MAC CE.
For example, the terminal device may multiplex the data and/or MAC CE according to the LCP (including the priority of the data and/or the priority of the MAC CE).
Optionally, in the process of reassembling packets based on the MAC PDU of message a in the first random access procedure, the terminal device preferentially multiplexes the data. For example, the priority of data is higher than the priority of MAC CE, and the terminal device multiplexes data preferentially.
Optionally, in the process of reassembling the packet based on the MAC PDU of the message a in the first random access procedure, if the resource size of the third message in the third random access procedure is greater than the authorized size of the message a in the first random access procedure, the terminal device fills the remaining space of the PDU based on the preset bit or the new data.
Optionally, before the terminal device obtains the MAC PDU of the third step message in the third random access process based on the MAC PDU of the media access control protocol data unit of the message a in the first random access process, the method further includes:
the terminal device acquires the MAC PDU of message a in the message a buffer.
Optionally, the method further comprises:
the terminal device stores the MAC PDU of the third step message in the third random access process obtained based on the MAC PDU of the message A in the first random access process in the third step message buffer.
It can be seen that in the embodiments of the present application, it is described from a different angle how the terminal device obtains the MAC PDU in the second random access procedure or the third random access procedure in the case of performing the backoff from the first random access procedure to the second random access procedure or the third random access procedure. Optionally, the embodiments of the present application may also provide a way to stop random access, stop performing backoff of random access procedure, or determine random access failure.
Illustratively, the above method further comprises:
in case the fourth condition is fulfilled, the terminal device stops random access, stops performing a backoff from the first random access procedure to the second random access procedure or determines that the random access fails.
Illustratively, the method further comprises:
in case the fourth condition is fulfilled, the terminal device stops random access, stops performing a backoff from the first random access procedure to the third random access procedure or determines a random access failure.
Optionally, the fourth condition includes:
condition L: the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure;
condition M: the preamble group selection threshold configured in the first random access process is different from the preamble group selection threshold configured in the second random access process;
condition N: the grant size of the third message of the second random access procedure is different from the MAC PDU size of message a in the first random access procedure;
condition O: the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
condition P: the preamble group selection threshold configured in the first random access process is different from the preamble group selection threshold configured in the third random access process;
Condition Q: the grant size of the third step message of the third random access procedure is different from the MAC PDU size of message a in the first random access procedure.
The above conditions may be used alone or in combination.
For example, if the terminal device stops performing the backoff from the first random access procedure to the second random access procedure in case the fourth condition is satisfied, the fourth condition may simultaneously include the above-mentioned condition L-M. For another example, if the terminal device stops performing the backoff from the first random access procedure to the third random access procedure in case the fourth condition is satisfied, the fourth condition may include the above-mentioned condition O-Q at the same time. For another example, if the terminal device stops random access or determines that random access fails in the case that the fourth condition is satisfied, the fourth condition may include the above-mentioned condition L-Q at the same time.
It can be seen that how to stop random access, stop performing backoff of random access procedure, or determine random access failure in the embodiments of the present application are described above from different angles. Optionally, a configuration manner of a random access resource is further provided in the embodiments of the present application, and the configuration manner of the random access resource may be combined with the foregoing random access method or may be implemented independently.
Illustratively, the above method further comprises:
the terminal equipment acquires random access resources based on resource configuration information sent by the network equipment; wherein the random access resources comprise general random access resources and/or random access resources for slices.
Accordingly, for a network device, the method further comprises:
the network device sends resource configuration information to the terminal device, wherein the resource configuration information is used for indicating random access resources, and the random access resources comprise universal random access resources and/or random access resources for slicing.
Alternatively, in the case where the random access resource does not include a random access resource for slicing, the terminal device performs a random access procedure using a general random access resource.
For example, in the case where only the general random access resource is configured and the random access resource for the slice is not configured, the terminal device may fall back from the two-step random access resource for the slice to the four-step general random access procedure and perform the four-step general random access procedure using the general random access resource.
For another example, in the case where only the general random access resource is configured and the random access resource for the slice is not configured, the terminal device may perform the general random access procedure or the random access procedure for the slice using the general random access resource.
Optionally, the random access resource for a slice is applicable to a plurality of slices in its corresponding slice or corresponding slice group.
For example, the network configures a corresponding random access resource for each slice, and each configured random access resource is only applicable to its corresponding slice, and the random access resources used by different slices may be different.
For another example, the network configures a corresponding random access resource for each slice group, and each configured random access resource is applicable to a plurality of slices in its corresponding slice group, and the random access resources used by different slice groups may be different.
Optionally, the random access resource for a slice corresponds to at least one slice or at least one slice group.
That is, the network may configure one or more slice-specific RA resources, where one slice-specific RA resource may be associated with one or more slices/slice groups.
Optionally, each slice or group of slices corresponds to only one random access resource for a slice.
That is, one slice or group of slices can only be associated with one slice-specific RA resource. Based on the above, the terminal device can uniquely determine the corresponding random access resource according to the slice information of the current trigger random access.
Illustratively, the above random access method further includes:
and if the slice information triggering the random access is the first slice, the terminal equipment determines the slice group to which the first slice belongs based on the mapping relation between the slice and the slice group, and performs the random access based on the random access resource corresponding to the slice group.
The mapping relation between the slices and the slice groups is used for representing which slices are included in one slice group or which slice group one slice belongs to. Specifically, if one slice group (slice group) includes a plurality of slices (slices), if slice information triggering RA from a Non-Access Stratum (NAS) to an Access Stratum (AS) of the UE is slice, the UE needs to determine a slice group to which the UE belongs according to a mapping relationship between slice and slice group, and perform random Access with RA resources corresponding to the slice group. Further, the RA resource and RA resource parameter used by each slice in the slice group are the same. Alternatively, the mapping relationship between the slice and the slice group may be stored for the UE AS, or may be given by the UE NAS.
Illustratively, the above random access method further includes:
and under the condition that the random access resource for the slice configured by the resource configuration information is suitable for the slice group corresponding to the random access resource, if the slice information triggering random access is the first slice, the terminal equipment determines the slice group to which the first slice belongs based on the mapping relation between the slice and the slice group, and performs random access based on the random access resource corresponding to the slice group.
Specifically, if one slice group includes a plurality of slices and the slice-specific RA resource indicated by the network is for a slice group, if slice information of the UE NAS to the AS that triggers RA is slice, the UE needs to determine the slice group to which the UE belongs according to a mapping relationship between slice and slice group, and perform random access with the RA resource corresponding to slice group. Further, the RA resource and RA resource parameter used by each slice in the slice group are the same.
Illustratively, the above random access method further includes:
and under the condition that the random access resource for the slice configured by the resource configuration information is suitable for the slice group corresponding to the random access resource, if the slice information triggering the random access is a first slice group, the terminal equipment performs the random access based on the random access resource corresponding to the first slice group.
Specifically, if one slice group includes a plurality of slices and the slice-specific RA resource indicated by the network is for a slice group, if slice information of an AS for triggering RA given by the UE NAS is a slice group, the UE performs random access using the RA resource corresponding to the slice group.
Optionally, the resource configuration information is included in a system information block (System Information Block, SIB) and/or RRC signaling. I.e. the resource configuration information may be carried by SIB or RRC signaling.
Optionally, in the case that the first random access procedure is a random access procedure for a slice, the method further includes:
the terminal device performs a first random access procedure based on the random access resource for the slice.
Optionally, in the random access resource, if the preamble set configured for the two-step random access procedure of the slice includes a first preamble set, the preamble set configured for the four-step random access procedure includes the first preamble set.
For example, if 2step slice-specific RA is configured with preamble group B, 4step RA is also configured with preamble group B. Here, 4step RA includes, but is not limited to, 4step slice-specific RA, and/or 4step common RA.
Optionally, in the case of supporting the back-off of the two-step random access procedure or supporting the back-off of the two-step random access procedure for the slice, if the preamble group configured for the two-step random access procedure for the slice includes the first preamble group, the preamble group configured for the four-step random access procedure includes the first preamble group.
For example, when supporting 2step RA or 2step slice-specific RA rollbacks, if 2step slice-specific RA is configured with preamble group B, 4step RA is also configured with preamble group B
Optionally, the four-step random access procedure includes at least one of: a four-step random access procedure for slicing, a four-step random access procedure for non-slicing, a four-step random access procedure for universal resources, a four-step universal random access procedure.
Optionally, if the random access resource includes a resource of a two-step random access procedure for a slice and includes a resource of a four-step random access procedure for a slice, the four-step random access procedure is a four-step random access procedure for a slice.
That is, if a 4-step slice-specific RA resource is also configured when a 2-step slice-specific RA resource is configured, the 4-step RA may be a 4-step slice-specific RA.
Optionally, if the random access resource includes a resource of a two-step random access procedure for a slice but does not include a resource of a four-step random access procedure for a slice, or if the random access resource includes a resource of a two-step random access procedure for a slice but only a universal random access resource is configured in a resource of a four-step random access procedure in the random access resource, the four-step random access procedure is a four-step random access procedure for a non-slice or a four-step random access procedure or a four-step universal random access procedure for a universal resource.
That is, if 4step slice-specific RA resources are not configured when 2step slice-specific RA resources are configured, or only common RA resources are configured for 4step RAs when 2step slice-specific RA resources are configured, the 4step RA may be a 4step common RA.
Optionally, the random access method further includes:
in case it is determined that the random access resource for the slice is not configured, the Access Stratum (AS) of the terminal device transmits second information to the non-access stratum (NAS) of the terminal device, the second information being for indicating that the non-access stratum does not transmit slice information to the access stratum.
Optionally, the embodiment of the application further provides a cell reselection method, which can be combined with the random access method or can be independently implemented. The method comprises the following steps:
the network equipment sends cell reselection information for slicing to the terminal equipment, and/or the terminal equipment acquires the cell reselection information (slice-specific cell reselection) configured by the network equipment and used for slicing; wherein the cell reselection information for a slice is applicable to its corresponding slice or a corresponding slice group.
That is, the network may configure cell reselection information for the slice. Here, the cell reselection information for a slice may be cell reselection information used for a specific slice or cell reselection information used for a specific slice group. The cell reselection information also includes cell reselection parameters. Illustratively, the network may configure one or more cell reselection information for the slice.
Optionally, the cell reselection information for a slice corresponds to at least one slice or at least one slice group.
That is, parameters or information of one slice-specific cell reselection may be associated with one or more slices/slice groups.
Optionally, each slice or group of slices corresponds to only one cell reselection information for a slice.
That is, one slice or group of slices can only correlate parameters or information of one slice-specific cell reselection. Based on this, the terminal device can uniquely determine the parameters or information of the corresponding slice-specific cell reselection based on the slice information triggering the reselection.
Optionally, the method further comprises:
and if the slice information triggering the cell reselection is the second slice, the terminal equipment determines a slice group to which the second slice belongs based on the mapping relation between the slice and the slice group, and performs the cell reselection based on the cell reselection information corresponding to the slice group.
Specifically, if one slice group includes a plurality of slices, if slice information of an AS given by a UE NAS and triggering cell reselection (cell reselection) is a slice, the UE needs to determine a slice group to which the UE belongs according to a mapping relationship between the slice and the slice group, and perform cell reselection by using parameters or information of reselection corresponding to the slice group. Further, parameters or information of the reselection used by each slice in the slice group are the same. Alternatively, the mapping relationship between the slice and the slice group may be stored for the UE AS, or may be given by the UE NAS.
Optionally, the method further comprises:
and under the condition that the cell reselection information aiming at the slice is suitable for the corresponding slice group, if the slice information triggering the cell reselection is a second slice, the terminal equipment determines the slice group of the second slice based on the mapping relation between the slice and the slice group and performs cell reselection based on the cell reselection information corresponding to the slice group.
Specifically, if one slice group includes a plurality of slices and parameters or information of a slice-specific reselection indicated by a network are for a slice group, if slice information of a slice to an AS, which triggers a cell reselection, is slice, the UE needs to determine a slice group to which the UE belongs according to a mapping relationship between the slice and the slice group, and reselect a cell by using parameters or information of a reselection corresponding to the slice group. Further, parameters or information of the reselection used by each slice in the slice group are the same. Alternatively, the mapping relationship between the slice and the slice group may be stored for the UE AS, or may be given by the UE NAS.
Optionally, the method further comprises:
and if the slice information triggering the cell reselection is a second slice group under the condition that the cell reselection information aiming at the slice is suitable for the corresponding slice group, the terminal equipment performs cell reselection based on the cell reselection information corresponding to the second slice group.
Specifically, if one slice group includes a plurality of slices and parameters or information of a slice-specific reselection indicated by the network are for a slice group, if slice information of a slice to an AS, which triggers a cell reselection, is the slice group, the UE reselects a cell by using parameters or information of a reselection corresponding to the slice group.
Optionally, the method further comprises:
and if the slice information triggering the cell reselection is a second slice under the condition that the cell reselection information aiming at the slice is suitable for the corresponding slice, the terminal equipment performs cell reselection based on the cell reselection information corresponding to the second slice.
Specifically, if the parameters or information of the slice-specific reselection indicated by the network are slice-specific, if slice information of the UE NAS to the AS that triggers cell reselection is slice, the UE performs cell reselection by using the parameters or information of the slice-specific reselection.
Optionally, the method further comprises:
and if the cell reselection information for the slice is suitable for the corresponding slice, determining a second slice in the second slice group based on the mapping relation between the slice and the slice group by the terminal equipment if the slice information triggering the cell reselection is the second slice group, and performing cell reselection based on the cell reselection information corresponding to the second slice.
For example, the terminal device may randomly select one slice in the second slice group as the second slice, or select the slice at the first position in the group as the second slice, or select the slice with the highest priority in the group as the second slice, or select the slice with the last position in the group as the second slice, or select the slice with the lowest priority in the group as the second slice, or select the slice with the smallest slice identifier in the group as the second slice, or select the slice with the largest slice identifier in the group as the second slice. Specifically, if one slice group includes a plurality of slices and parameters or information of a slice-specific reselection indicated by the network are for a slice group, if slice information of a slice triggering a cell reselection given by the UE NAS to the AS is the slice group, the terminal device selects one slice in the slice group, and performs cell reselection by using parameters or information of a reselection corresponding to the selected slice.
Optionally, the cell reselection information for the slice includes a frequency point corresponding to the slice or a cell corresponding to the slice.
Optionally, the cell reselection information for a slice is carried by SIB or dedicated signaling.
Optionally, in the case that the slice supported by the cell is the same as the slice supported by the serving frequency point, the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice. That is, only the frequency point corresponding to the cell may be indicated when the supported slice is indicated, without indicating the identity of the cell or the physical cell identity (Physical Cell Identifier, PCI).
Optionally, in a case that the slice supported by the Cell is different from the slice supported by the serving frequency point, the Cell reselection information for the slice includes a frequency point of the Cell corresponding to the slice and a Cell Identifier (CI) or PCI corresponding to the slice. Or the cell reselection information for slicing comprises a cell identifier CI or PCI corresponding to the cell, a frequency point corresponding to the cell and slicing information supported by the cell. Or the cell reselection information for slicing comprises a cell identifier CI or PCI corresponding to the cell and slicing information supported by the cell. The slice information comprises at least one of slice identification, slice group identification and frequency point priority corresponding to the slice. That is, in the case where the slice supported by the cell is not the same as the slice supported by the serving frequency point, the cell reselection information for the slice is indicated to the cell granularity, including information for identifying the cell and information for identifying the slice supported by the cell.
Optionally, the slice information supported by the serving cell is the same as the slice supported by the serving frequency point.
Correspondingly, in the case that the slice supported by the cell is the same as the slice supported by the serving cell, the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice. That is, only the frequency point corresponding to the cell may be indicated when the supported slice is indicated, without indicating the identity or PCI of the cell.
Correspondingly, in the case that the slice supported by the cell is different from the slice supported by the serving cell, the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identifier or PCI corresponding to the slice.
Optionally, the method applied to cell reselection is also applicable to a cell selection (cell selection) process, that is, the embodiment of the present application further provides a cell selection method, where the method may be combined with the random access method and the cell reselection method, or may be implemented independently. The method refers specifically to the following alternatives.
Optionally, the method comprises:
the method comprises the steps that network equipment sends cell selection information for slicing to terminal equipment, and/or the terminal equipment obtains the cell selection information for slicing configured by the network equipment; wherein the cell selection information for a slice is applicable to its corresponding slice or a corresponding slice group.
Optionally, the cell selection information for a slice corresponds to at least one slice or at least one slice group.
Optionally, each slice or group of slices corresponds to only one cell selection information for a slice.
Optionally, the method further comprises: and if the slice information triggering the cell selection is a third slice, the terminal equipment determines a slice group to which the third slice belongs based on the mapping relation between the slice and the slice group, and performs cell selection based on the cell selection information corresponding to the slice group.
Optionally, the method further comprises: and if the cell selection information for the slice is suitable for the corresponding slice group, determining the slice group of the third slice based on the mapping relation between the slice and the slice group by the terminal equipment and performing cell selection based on the cell selection information corresponding to the slice group if the slice information triggering cell selection is the third slice.
Optionally, the method further comprises: and if the cell selection information for the slice is applicable to the corresponding slice group, if the cell selection triggering slice information is a third slice group, the terminal equipment performs cell selection based on the cell selection information corresponding to the third slice group.
Optionally, the method further comprises: and if the cell selection information for the slice is suitable for the corresponding slice, if the slice information triggering cell selection is a third slice, the terminal equipment performs cell selection based on the cell selection information corresponding to the third slice.
Optionally, the method further comprises: and if the cell selection information for the slice is suitable for the corresponding slice, determining a third slice in the third slice group by the terminal equipment based on the mapping relation between the slice and the slice group, and performing cell selection based on the cell selection information corresponding to the third slice by the terminal equipment if the cell selection triggering slice information is the third slice group.
For example, the terminal device may randomly select one slice in the third slice group as the third slice, or select the slice at the first position in the group as the third slice, or select the slice with the highest priority in the group as the third slice, or select the slice with the last position in the group as the third slice, or select the slice with the lowest priority in the group as the third slice, or select the slice with the smallest slice identifier in the group as the third slice, or select the slice with the largest slice identifier in the group as the third slice.
Optionally, the cell selection information for a slice includes a frequency point corresponding to the slice or a cell corresponding to the slice.
Optionally, the cell selection information for a slice is carried by SIB or dedicated signaling.
Optionally, in the case that the slice supported by the cell is the same as the slice supported by the serving frequency point, the cell selection information for the slice includes the frequency point of the cell corresponding to the slice. That is, only the frequency point corresponding to the cell may be indicated when the supported slice is indicated, without indicating the identity or PCI of the cell.
Optionally, in the case that the slice supported by the cell is different from the slice supported by the serving frequency point, the cell selection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identifier CI or the physical cell identifier PCI corresponding to the slice. Or the cell reselection information for slicing comprises a cell identifier CI or PCI corresponding to the cell, a frequency point corresponding to the cell and slicing information supported by the cell. Or the cell reselection information for slicing comprises a cell identifier CI or PCI corresponding to the cell and slicing information supported by the cell. The slice information comprises at least one of slice identification, slice group identification and frequency point priority corresponding to the slice.
Correspondingly, in the case that the slice supported by the cell is the same as the slice supported by the serving cell, the cell selection information for the slice includes the frequency point of the cell corresponding to the slice. That is, only the frequency point corresponding to the cell may be indicated when the supported slice is indicated, without indicating the identity or PCI of the cell.
Correspondingly, in the case that the slice supported by the cell is different from the slice supported by the serving cell, the cell selection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identifier CI or the physical cell identifier PCI corresponding to the slice.
A number of application examples of embodiments of the present application are provided below.
Application example one
In this application example, in case that the first condition is satisfied, the UE performs backoff or handover from a first random access procedure (2-step-specific RACH for a two-step random access procedure of a slice) to a second random access procedure (four-step general random access procedure, four-step random access procedure for a general resource, 4-step common RACH).
Referring to fig. 6, the specific implementation procedure of the present application example is as follows:
1. the network configures RACH resources. Reference is made to one or more of the following implementation details:
a. The RACH resources include common RACH resources and/or RACH resources for slices.
Wherein, optionally, if the RACH resource of the corresponding slice is not configured by the slice, the common RACH resource is used on behalf of the UE.
b. The RACH resource for a slice may be a RACH resource for a slice group.
Wherein, optionally, all slices belonging to the same slice group use the same RACH resource
c. RACH resources for the slice are configured by SIB and/or dedicated RRC signaling (dedicated RRC), e.g., RRC release message.
d. The network indicates first information indicating whether the UE is supported to perform a backoff or handover of the 2-step slice-specific RACH to the 4-step common RACH:
optionally, the first information is for each slice (per slice) or for each slice group (per slice group). Alternatively, the first information is slice/slice group generic (slice/slice group common).
Optionally, the first information is a MsgA maximum transmission number for a slice, and the parameter is different from the MsgA-TransMax parameter in the related art. Optionally, the MsgA maximum transmission number for a slice is one of positive integers greater than or equal to 1. Alternatively, the maximum number of transmissions of MsgA for a slice may be common to the slice, or may be different for different slices.
Optionally, the first information is used when a preamble (preamble) set configured by the 2-step slice-specific RACH and the 4-step common RACH is different. Or, the first information is used when the preamble groups configured by the 2-step slice-specific RACH and the 4-step slice-specific RACH are different. Or vice versa (used when the preamble groups of the 2-step slice-specific RACH and the 4-step common RACH configurations are the same or the first information is used when the preamble groups of the 2-step slice-specific RACH and the 4-step slice-specific RACH configurations are the same).
For example, 2-step slice-specific RACH configures preamble group A and preamble group B, but 4-step common RACH configures only preamble group A or preamble group B, i.e. 2-step slice-specific RACH and 4-step slice-specific RACH configure preamble groups differently.
For example, the 2-step slice-specific RACH is configured with only preamble group a or preamble group B, but the 4-step common RACH is configured with preamble group a and preamble group B, i.e., the 2-step slice-specific RACH and the 4-step slice-specific RACH are configured with different preamble groups.
2. And the UE acquires the RACH configuration and executes RACH transmission of the slice-specific according to the RACH resources corresponding to the slice. For example, the UE performs a 2-step slice-specific RACH when a 2-step slice-specific RACH transmission is satisfied.
3. In case the first condition is met, the UE performs a backoff or handover of the 2-step slice-specific RACH to the 4-step common RACH.
a. The first condition includes at least one of: receiving first information, wherein the first information appears, the first information is set to true, the value of the first information is greater than or equal to 1, and the use condition of the first information is met.
b. The usage condition of the first information may include at least one of:
PREAMBLE TRANSMISSION number (preamble_transmission_counter) =msga maximum TRANSMISSION number for slice +1;
4-step slice-specific RACH resources for the slice are not configured;
the preamble groups configured by the 2-step slice-specific RACH and the 4-step common RACH are the same (for example, preamble group A and preamble group B are both configured, and/or the selection threshold of the preamble group A and the preamble group B is the same);
the preamble groups of the 2-step slice-specific RACH and the 4-step slice-specific RACH are different (e.g., preamble group a and preamble group B are not both configured and/or the selection thresholds of preamble group a and preamble group B are different).
For example, when the MsgA maximum number of transmissions for a slice is configured and the 4-step slice-specific RACH resource is not configured, the UE rolls back to the 4-step common RACH when the 2-step slice-specific RACH of the UE reaches the maximum number of transmissions.
4. The UE performs a subsequent RACH procedure.
It can be seen that the present application example provides details of how to fall back to the 4-step common RACH.
Application example two
In this application example, in the case of backing from the first random access procedure (two-step random access procedure for slice, 2-step slice-specific RACH) to the second random access procedure (four-step generic random access procedure, four-step random access procedure for generic resource, or four-step random access procedure for slice, 4-step common RACH or 4-step slice-specific RACH), the MAC PDU (Msg 3MAC PDU) of the third step message in the second random access procedure is acquired.
Referring to fig. 7, the specific implementation procedure of the present application example is as follows:
1. the network configures RACH resources. Reference is made to one or more of the following implementation details:
a. the RACH resources include common RACH resources and/or RACH resources for slices.
Wherein, optionally, if the RACH resource of the corresponding slice is not configured by the slice, the common RACH resource is used on behalf of the UE.
b. The RACH resource for a slice may be a RACH resource for a slice group.
Wherein, optionally, all slices belonging to the same slice group use the same RACH resource
c. RACH resources for the slice are configured by SIB and/or dedicated RRC signaling (dedicated RRC), e.g., RRC release message.
2. And the UE acquires the RACH configuration and executes RACH transmission of the slice-specific according to the RACH resources corresponding to the slice. For example, the UE performs a 2-step slice-specific RACH when a 2-step slice-specific RACH transmission is satisfied.
3. The UE acquires the Msg3MAC PDU when performing RACH backoff or handover. In particular, reference is made to one or more of the following implementation details:
a. the MAC PDU of message a (MsgA MAC PDU) is obtained from the message a buffer (MsgA buffer).
b. Alternatively, when a preamble set is selected for a 4step RACH, the same preamble set as a 2-step RACH is selected.
For example, if group A is selected by the 2-step slice-specific RACH, group A is also selected by the 4-step common RACH.
c. Optionally, under the second condition, the MsgA MAC PDU is stored in a third step message buffer (Msg 3 buffer), that is, the Msg3MAC PDU is the MsgA MAC PDU.
Wherein the second condition comprises at least one of:
the preamble groups configured by the 2-step slice-specific RACH and the 4-step common RACH are the same (for example, preamble group A and preamble group B are both configured, for example, only preamble group A or preamble group B are both configured);
The preamble group selection threshold of the 2-step slice-specific RACH and the 4-step common RACH are the same (for example, the selection threshold of the 2-step slice-specific RACH and the 4-step common RACH on preamble group A and preamble group B are the same);
the preamble groups configured by the 2-step slice-specific RACH and the 4-step slice-specific RACH are the same (for example, preamble group A and preamble group B are both configured, for example, only preamble group A or preamble group B are both configured;
the preamble group selection thresholds of the 2-step slice-specific RACH and the 4-step slice-specific RACH are the same (for example, the selection thresholds of the 2-step slice-specific RACH and the 4-step slice-specific RACH on preamble group A and preamble group B are the same);
the grant size of Msg3 is the same as the MsgA MAC PDU size.
d. Optionally, under the third condition, the MsgA MAC PDU is reassembled, and the MAC PDU after the reassembly is stored in the Msg3buffer, that is, the Msg3MAC PDU is the MAC PDU of the MsgA MAC PDU reassembly packet.
Wherein the third condition comprises at least one of:
the preamble groups configured by the 2-step slice-specific RACH and the 4-step common RACH are different (for example, preamble group A and preamble group B are not configured;
The preamble selection thresholds of the 2-step slice-specific RACH and the 4-step common RACH are different (for example, the selection thresholds of the 2-step slice-specific RACH and the 4-step common RACH on preamble group A and preamble group B are different);
the preamble groups configured by the 2-step slice-specific RACH and the 4-step slice-specific RACH are different (for example, preamble group A and preamble group B are not configured;
the preamble group selection thresholds of the 2-step slice-specific RACH and the 4-step slice-specific RACH are different (for example, the selection thresholds of the 2-step slice-specific RACH and the 4-step slice-specific RACH on preamble group A and preamble group B are different);
the Msg3grant size is different from the MsgA MAC PDU size.
Wherein, regarding the reorganization package, optional:
how packets are reassembled may depend on the UE implementation;
when reorganizing packets, high-priority data and/or high-priority MAC CEs (according to LCP priority) are multiplexed (multiplexed) preferentially;
when the packet is reassembled, the multiplex data is prioritized
When the packet is reassembled, if the resource size is larger than the MsgA grant size, the remaining space is filled with 0, or multiple new data.
4. The UE performs a subsequent RACH procedure.
It can be seen that the present application example provides a way how to acquire an Msg3MAC PDU.
Application example three
In this application example, in the case of RACH backoff, if the fourth condition is satisfied, the UE stops the RACH transmission this time, or the UE stops RACH backoff/handover, or the UE considers that the RACH procedure fails.
Referring to fig. 7, the specific implementation procedure of the present application example is as follows:
1. the network configures RACH resources. Reference is made to one or more of the following implementation details:
a. the RACH resources include common RACH resources and/or RACH resources for slices.
Wherein, optionally, if the RACH resource of the corresponding slice is not configured by the slice, the common RACH resource is used on behalf of the UE.
b. The RACH resource for a slice may be a RACH resource for a slice group.
Wherein, optionally, all slices belonging to the same slice group use the same RACH resource
c. RACH resources for the slice are configured by SIB and/or dedicated RRC signaling (dedicated RRC), e.g., RRC release message.
2. And the UE acquires the RACH configuration and executes RACH transmission of the slice-specific according to the RACH resources corresponding to the slice. For example, the UE performs a 2-step slice-specific RACH when a 2-step slice-specific RACH transmission is satisfied.
3. In the case of slice-based RACH backoff, if the fourth condition is satisfied, the UE stops the current RACH transmission, or the UE stops RACH backoff/handover, or the UE considers the RACH procedure to fail. Specific:
a. Acquiring a message A MAC PDU (MsgA MAC PDU) from a message A buffer zone (MsgA buffer);
b. if the fourth condition is satisfied, the UE stops the RACH transmission, or the UE stops RACH backoff/handover, or the UE considers that the RACH procedure fails.
The fourth condition is at least one of:
the preamble groups configured by the 2-step slice-specific RACH and the 4-step common RACH are different (for example, preamble group A and preamble group B are not configured;
the preamble selection thresholds of the 2-step slice-specific RACH and the 4-step common RACH are different (for example, the selection thresholds of the 2-step slice-specific RACH and the 4-step common RACH on preamble group A and preamble group B are different);
the Msg3grant size is different from the MsgA MAC PDU size.
It can be seen that the present application example provides a way to stop RACH or stop RACH backoff.
Application example four
In the present application example, in the case of configuring the maximum number of transmissions of the random access procedure for a slice, the UE performs backoff or handover from a two-step random access procedure for a slice (2-step slice-specific RACH) to a four-step random access procedure for a slice (4-step slice-specific RACH) based on the number.
The specific implementation process of the application example is as follows:
1. The network configures RACH resources. Reference is made to one or more of the following implementation details:
a. the RACH resources include common RACH resources and/or RACH resources for slices.
Wherein, optionally, if the RACH resource of the corresponding slice is not configured by the slice, the common RACH resource is used on behalf of the UE.
b. The RACH resource for a slice may be a RACH resource for a slice group.
Wherein, optionally, all slices belonging to the same slice group use the same RACH resource
c. RACH resources for the slice are configured by SIB and/or dedicated RRC signaling (dedicated RRC), e.g., RRC release message.
d. The network indicates the first information. The first information is a random access maximum transmission number (MsgA maximum transmission number) for a slice, which is different from the MsgA-TransMax parameter in the related art described above. Optionally, the MsgA maximum transmission number for a slice is one of positive integers greater than or equal to 1. Alternatively, the maximum number of transmissions of MsgA for a slice may be common to the slice, or may be different for different slices.
2. And the UE acquires the RACH configuration and executes RACH transmission of the slice-specific according to the RACH resources corresponding to the slice. For example, the UE performs a 2-step slice-specific RACH when a 2-step slice-specific RACH transmission is satisfied.
3. In case that the PREAMBLE TRANSMISSION number (preamble_transmission_counter) reaches the MsgA maximum TRANSMISSION number for a slice, the UE performs a backoff or handover from the 2-step-specific RACH to the 4-step-specific RACH.
4. The UE performs a subsequent RACH procedure.
Application example five
In this application example, in the case where the maximum number of transmissions of the random access procedure for a slice is not configured, the UE performs backoff or handover from a two-step random access procedure (2-step slice-specific RACH) to a four-step random access procedure (4-step slice-specific RACH or 4-step common RACH) based on msgA-TransMax in the related art.
The specific implementation process of the application example is as follows:
1. the network configures RACH resources. Reference is made to one or more of the following implementation details:
a. the RACH resources include common RACH resources and/or RACH resources for slices.
Wherein, optionally, if the RACH resource of the corresponding slice is not configured by the slice, the common RACH resource is used on behalf of the UE.
b. The RACH resource for a slice may be a RACH resource for a slice group.
Wherein, optionally, all slices belonging to the same slice group use the same RACH resource
c. RACH resources for the slice are configured by SIB and/or dedicated RRC signaling (dedicated RRC), e.g., RRC release message.
d. The network is configured with only msgA-TransMax, and no random access maximum number of transmissions for a slice (MsgA maximum number of transmissions).
2. And the UE acquires the RACH configuration and executes RACH transmission of the slice-specific according to the RACH resources corresponding to the slice. For example, the UE performs a 2-step slice-specific RACH when a 2-step slice-specific RACH transmission is satisfied.
3. In case that the PREAMBLE TRANSMISSION number (preamble_transmission_counter) reaches msgA-TransMax, the UE performs a backoff or handover from 2-step slice-specific RACH to 4-step slice-specific RACH or 4-step common RACH.
4. The UE performs a subsequent RACH procedure.
Application example six
In this application example, in the case where the maximum number of transmissions of the random access procedure for a slice is not configured, the UE performs backoff or handover from a two-step random access procedure (2-step slice-specific RACH) to a four-step random access procedure (4-step slice-specific RACH or 4-step common RACH) based on msgA-TransMax in the related art.
The specific implementation process of the application example is as follows:
1. The network configures RACH resources. Reference is made to one or more of the following implementation details:
a. the RACH resources include common RACH resources and/or RACH resources for slices.
Wherein, optionally, if the RACH resource of the corresponding slice is not configured by the slice, the common RACH resource is used on behalf of the UE.
b. The RACH resource for a slice may be a RACH resource for a slice group.
Wherein, optionally, all slices belonging to the same slice group use the same RACH resource
c. RACH resources for the slice are configured by SIB and/or dedicated RRC signaling (dedicated RRC), e.g., RRC release message.
d. The network is configured with only msgA-TransMax, and no random access maximum number of transmissions for a slice (MsgA maximum number of transmissions).
f. The network indicates that random access backoff for the slice may be performed using or also using configured msgA-TransMax.
2. And the UE acquires the RACH configuration and executes RACH transmission of the slice-specific according to the RACH resources corresponding to the slice. For example, the UE performs a 2-step slice-specific RACH when a 2-step slice-specific RACH transmission is satisfied.
3. In case that the PREAMBLE TRANSMISSION number (preamble_transmission_counter) reaches msgA-TransMax, the UE performs a backoff or handover from 2-step slice-specific RACH to 4-step slice-specific RACH or 4-step common RACH.
4. The UE performs a subsequent RACH procedure.
Application example seven
In this example, UE capabilities for the slice are added, which capabilities belong to optional features (optional features without UE radio access capability parameters) outside the UE radio access capability parameters. The solution for introducing the capability provided by the application example may be implemented in combination with the foregoing methods, or may be implemented independently. Alternatively, this capability is introduced separately for cell reselection of the slice and RACH of the slice.
Wherein for sliced RACH, at least one of the capabilities of supporting RACH partitioning (RACH partitioning), supporting RACH fallback (RACH fallback), supporting RACH prioritization (RACH prioritization), supporting slice-based RACH procedure, supporting slice-based RACH resource selection can be further introduced. I.e., at least one of which is a stand-alone capability or an integrated capability.
Optionally, the capability of frequency point priority and/or frequency point sub priority for slice is introduced for cell reselection of slices.
For example, in features for slicing, introduce:
application example eight
In this example, UE capability is added to the slice, which belongs to the UE radio access capability parameter (UE radio access capability parameters). The solution for introducing the capability provided by the application example may be implemented in combination with the foregoing methods, or may be implemented independently.
Optionally, the capability is introduced separately for cell reselection of the slice, and/or for RACH of the slice.
The method comprises the steps of carrying out cell reselection for slices, and introducing the capability of frequency point priority and/or frequency point sub priority for slices. I.e., at least one of which is a stand-alone capability, or an integrated capability.
Wherein, for the RACH of the slice, at least one of the capability of supporting RACH partitioning, the capability of supporting RACH fallback, the capability of supporting RACH prioritization, the capability of supporting the RACH procedure based on the slice, and the capability of supporting RACH resource selection based on the slice may be further introduced. I.e., at least one of which is a stand-alone capability or an integrated capability.
Optionally, the capability is whether the UE supports receiving slice related information in a scheduled RRC, such as RRCrelease. Optionally, the slice related information may be cell selection information for a slice, and/or cell reselection information for a slice, and/or RACH information for a slice, such as RACH backoff based on a slice, RACH selection based on a slice, RA priority parameter selection based on a slice, RACH procedure based on a slice, the aforementioned maximum number of transmissions, and so on.
For example, the capability is whether the UE supports receiving reselection priorities and/or sub-priorities for the slices in a scheduled RRC, such as RRCrelease.
Alternatively, the capability is based on UE or BC (band combination).
Optionally, this capability is optional.
Alternatively, this capability does not distinguish between FDD (Frequency Division Duplexing, frequency division duplex) and TDD (Time Division Duplexing, time division duplex), or between FDD-TDD.
Alternatively, the capability does not distinguish between frequency bands or frequency bands, e.g., does not distinguish between FR1 and FR2, or distinguishes between FR1 and FR2.
For example, physical layer parameters (Physical layer parameters) among UE radio access capability parameters are introduced:
the specific arrangements and implementations of the embodiments of the present application have been described above from a variety of angles by way of various embodiments. With at least one of the embodiments described above, whether the terminal device performs a backoff from the first random access procedure to the second random access procedure is determined based on whether the network device supports or instructs the terminal device to perform a backoff to the second random access procedure, or based on whether the network device supports or instructs the terminal device to perform a backoff to other random access procedures. Thus, the terminal equipment can correctly realize the rollback of the random access process.
Corresponding to the processing method of at least one embodiment described above, the embodiment of the present application further provides a terminal device 100, referring to fig. 8, which includes:
a first processing module 110, configured to determine, based on first information sent by the network device, whether to perform a backoff from the first random access procedure to the second random access procedure;
wherein the first information is used for indicating whether to support or execute a fallback from the first random access procedure to the second random access procedure, or whether to support or execute a fallback from the first random access procedure to a third random access procedure.
Optionally, the first random access procedure comprises a random access procedure for a slice.
Optionally, the second random access procedure includes a random access procedure for non-slice, or a random access procedure for universal resources, or a universal random access procedure.
Optionally, the third random access procedure comprises a random access procedure for a slice.
Optionally, the first random access procedure comprises a two-step random access procedure for a slice, and the third random access procedure comprises a four-step random access procedure for a slice.
Optionally, the second random access procedure includes a four-step random access procedure for non-slice, or a four-step random access procedure for universal resources, or a four-step universal random access procedure.
Optionally, the first information includes a maximum number of transmissions and/or resources for a random access procedure.
Optionally, in a case that the first information includes a maximum number of transmissions for the second random access procedure, and/or the first information does not include a maximum number of transmissions for the third random access procedure, and/or the maximum number of transmissions for the second random access procedure in the first information is greater than or equal to 1, the first information is used to indicate that the terminal device is supported to execute a backoff from the first random access procedure to the second random access procedure.
Optionally, in a case that the first information includes a maximum number of transmissions for the third random access procedure, and/or the first information does not include a maximum number of transmissions for the second random access procedure, and/or the maximum number of transmissions for the third random access procedure in the first information is greater than or equal to 1, the first information is used to indicate that the terminal device is supported to execute a backoff from the first random access procedure to the third random access procedure.
Optionally, in the case that the first information includes a maximum number of transmissions for the third random access procedure and/or the maximum number of transmissions for the third random access procedure in the first information is greater than or equal to 1, if the first information does not include a resource for the third random access procedure, the first information is used to indicate to support the terminal device to execute a backoff from the first random access procedure to the second random access procedure.
Optionally, in the case that the first information includes a maximum number of transmissions for the third random access procedure and/or the maximum number of transmissions for the third random access procedure in the first information is greater than or equal to 1, if the first information includes a resource for the second random access procedure, the first information is used to indicate that the terminal device is supported to execute a backoff from the first random access procedure to the second random access procedure.
Optionally, the first information corresponds to one slice of the plurality of slices, and the first information is applicable to its corresponding slice.
Optionally, the first information corresponds to one slice group of the plurality of slice groups, and the first information is applicable to a plurality of slices of the corresponding slice group.
Optionally, the first information is applicable to a plurality of slices or a plurality of slice groups.
Optionally, the first processing module 110 is configured to:
in case it is determined that the first condition is satisfied based on the first information, a backoff from the first random access procedure to the second random access procedure is performed.
Optionally, the first processing module 110 is configured to:
in case it is determined that the first condition is satisfied based on the first information, a backoff from the first random access procedure to the third random access procedure is not performed.
Optionally, the first processing module 110 is configured to:
in case it is determined that the first condition is not satisfied based on the first information, a backoff from the first random access procedure to the second random access procedure is not performed.
Optionally, the first processing module 110 is configured to:
in case it is determined that the first condition is not satisfied based on the first information, a backoff from the first random access procedure to the third random access procedure is performed.
Optionally, the first processing module 110 is further configured to:
in the case that the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure, or the preamble set selection threshold configured by the first random access procedure is different from the preamble set selection threshold configured by the second random access procedure, the terminal device rolls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
Or,
in the case that the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure, or the preamble set selection threshold configured by the first random access procedure is different from the preamble set selection threshold configured by the third random access procedure, the terminal device rolls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
or,
in the case that the preamble set configured by the first random access procedure is the same as the preamble set configured by the second random access procedure, or the preamble set selection threshold configured by the first random access procedure is the same as the preamble set selection threshold configured by the second random access procedure, the terminal device rolls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
or,
and under the condition that the preamble group configured by the first random access procedure is the same as the preamble group configured by the third random access procedure, or the preamble group selection threshold configured by the first random access procedure is the same as the preamble group selection threshold configured by the third random access procedure, the terminal equipment backs to the second random access procedure or determines whether the first condition is met based on the first information.
Optionally, the first processing module 110 is further configured to:
and the terminal equipment rolls back to the third random access process under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the third random access process, or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the third random access process.
Optionally, the first condition includes at least one of:
receiving the first information;
the first information appears in a first message sent by the network equipment;
the first information indicates to support the terminal device to perform a backoff from the first random access procedure to the second random access procedure;
the first information includes a maximum number of transmissions for the second random access procedure;
the first information does not include a maximum number of transmissions for the third random access procedure;
the first information does not include a random access maximum number of transmissions for a slice;
not configuring resources for the third random access procedure;
the first information comprises a maximum number of random access transmissions for a slice;
The maximum transmission times of the random access for the slice is less than 1;
configuring resources for the second random access procedure;
the use condition of the first information is satisfied.
Optionally, the usage condition of the first information includes at least one of:
the preamble transmission times of the first random access process are larger than the maximum random access transmission times for the slice;
not configuring resources for the third random access procedure;
the preamble set configured by the first random access process is the same as the preamble set configured by the second random access process;
the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
configuring resources for the second random access procedure;
configuring a maximum number of transmissions for the second random access procedure;
the maximum transmission times for the third random access process are not configured;
the maximum transmission times of random access for the slice are not configured;
configuring the maximum transmission times aiming at a third random access process;
configuring the maximum transmission times of random access for slices;
the maximum number of transmissions for random access of the slice or the maximum number of transmissions for the third random access procedure is greater than or equal to 1.
Optionally, the first processing module 110 is further configured to:
and under the condition of executing the rollback from the first random access procedure to the second random access procedure, the terminal equipment obtains the MAC PDU of the third message in the second random access procedure based on the MAC PDU of the message A in the first random access procedure.
Optionally, the first processing module 110 is configured to:
if the second condition is met, the MAC PDU of the message A in the first random access process is used as the MAC PDU of the third message in the second random access process;
and/or the number of the groups of groups,
and if the third condition is met, carrying out packet reassembly based on the MAC PDU of the message A in the first random access process to obtain the MAC PDU in the third message in the second random access process.
Optionally, in the process of reassembling packets based on the MAC PDU of the message a in the first random access procedure, if the resource size of the third message in the second random access procedure is greater than the grant size of the message a in the first random access procedure, the terminal device fills the remaining space of the PDU based on a preset bit or new data.
Optionally, the first processing module 110 is further configured to:
and acquiring the MAC PDU of the message A in a buffer zone of the message A.
Optionally, the first processing module 110 is further configured to:
and storing the MAC PDU of the third step message in the second random access process obtained based on the MAC PDU of the message A in the first random access process in a third step message buffer.
Optionally, the first processing module 110 is further configured to:
and under the condition of executing the rollback from the first random access procedure to the third random access procedure, the terminal equipment obtains the MAC PDU of the third message in the third random access procedure based on the MAC PDU of the media access control protocol data unit of the message A in the first random access procedure.
Optionally, the first processing module 110 is specifically configured to:
if the second condition is met, the MAC PDU of the message A in the first random access process is used as the MAC PDU of the third message in the third random access process;
and/or the number of the groups of groups,
and if the third condition is met, carrying out packet reassembly based on the MAC PDU of the message A in the first random access process to obtain the MAC PDU of the third message in the third random access process.
Optionally, in the process of reassembling packets based on the MAC PDU of the message a in the first random access procedure, if the resource size of the third step message in the third random access procedure is greater than the grant size of the message a in the first random access procedure, the terminal device fills the remaining space of the PDU based on a preset bit or new data.
Optionally, the first processing module 110 is further configured to:
and acquiring the MAC PDU of the message A in a buffer zone of the message A.
Optionally, the first processing module 110 is further configured to:
and storing the MAC PDU of the third step message in the third random access process obtained based on the MAC PDU of the message A in the first random access process in a third step message buffer.
Optionally, the second condition includes at least one of:
the preamble set configured by the first random access process is the same as the preamble set configured by the second random access process;
the preamble group selection threshold configured in the first random access process is the same as the preamble group selection threshold configured in the second random access process;
the grant size of the third message of the second random access procedure is the same as the MAC PDU size of message a in the first random access procedure;
The preamble set configured by the first random access process is the same as the preamble set configured by the third random access process;
the preamble group selection threshold configured in the first random access process is the same as the preamble group selection threshold configured in the third random access process;
the grant size of the third step message of the third random access procedure is the same as the MAC PDU size of message a in the first random access procedure.
Optionally, the third condition includes at least one of:
the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure;
the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
the grant size of the third message of the second random access procedure is different from the MAC PDU size of message a in the first random access procedure;
the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
The grant size of the third step message of the third random access procedure is different from the MAC PDU size of message a in the first random access procedure.
Optionally, in the process of reassembling packets based on the MAC PDU of the message a in the first random access process, the terminal device multiplexes the data and/or the MAC CE according to the priority of the data and/or the priority of the MAC CE.
Optionally, in the process of packet reassembly based on the MAC PDU of the message a in the first random access procedure, the terminal device preferentially multiplexes data.
Optionally, the first processing module 110 is further configured to:
in case the fourth condition is met, the terminal device stops random access, stops performing backoff from the first random access procedure to the second random access procedure, or determines a random access failure.
Optionally, the first processing module 110 is further configured to:
in case the fourth condition is met, the terminal device stops random access, stops performing backoff from the first random access procedure to the third random access procedure, or determines a random access failure.
Optionally, the fourth condition includes:
the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure;
The preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
the grant size of the third message of the second random access procedure is different from the MAC PDU size of message a in the first random access procedure;
the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
the grant size of the third step message of the third random access procedure is different from the MAC PDU size of message a in the first random access procedure.
Optionally, the first processing module 110 is further configured to:
acquiring random access resources based on resource configuration information sent by network equipment; wherein the random access resources comprise general random access resources and/or random access resources for slices.
Optionally, the first processing module 110 is further configured to:
in case the random access resource does not comprise a random access resource for a slice, a random access procedure is performed using a generic random access resource.
Optionally, the random access resource for a slice is applicable to a plurality of slices in its corresponding slice or corresponding slice group.
Optionally, the first processing module 110 is further configured to: if the slice information triggering the random access is the first slice, determining a slice group to which the first slice belongs based on the mapping relation between the slice and the slice group, and performing the random access based on the random access resource corresponding to the slice group.
Optionally, the first processing module 110 is further configured to: and if the slice information triggering random access is the first slice under the condition that the random access resource for the slice configured by the resource configuration information is suitable for the corresponding slice group, determining the slice group to which the first slice belongs based on the mapping relation between the slice and the slice group, and performing random access based on the random access resource corresponding to the slice group.
Optionally, the first processing module 110 is further configured to: and under the condition that the random access resource for the slice configured by the resource configuration information is suitable for the slice group corresponding to the random access resource, if the slice information triggering the random access is a first slice group, the terminal equipment performs the random access based on the random access resource corresponding to the first slice group.
Optionally, the resource configuration information is included in a system information block SIB and/or radio resource control RRC signaling.
Optionally, the first processing module 110 is further configured to:
the first random access procedure is performed based on the random access resources for the slice.
Optionally, the first processing module 110 is further configured to: acquiring cell reselection information configured by the network equipment and aiming at slicing; wherein the cell reselection information for a slice is applicable to its corresponding slice or a corresponding slice group.
Optionally, the cell reselection information for a slice corresponds to at least one slice or at least one slice group.
Optionally, each slice or group of slices corresponds to only one cell reselection information for a slice.
Optionally, the method further comprises:
and if the slice information triggering the cell reselection is the second slice, the terminal equipment determines a slice group to which the second slice belongs based on the mapping relation between the slice and the slice group, and performs the cell reselection based on the cell reselection information corresponding to the slice group.
Optionally, the first processing module 110 is further configured to: and if the cell reselection information for the slice is suitable for the corresponding slice group, determining the slice group of the second slice based on the mapping relation between the slice and the slice group if the slice information triggering the cell reselection is the second slice, and performing cell reselection based on the cell reselection information corresponding to the slice group.
Optionally, the first processing module 110 is further configured to: and if the slice information triggering the cell reselection is a second slice group under the condition that the cell reselection information aiming at the slice is applicable to the corresponding slice group, performing cell reselection based on the cell reselection information corresponding to the second slice group.
Optionally, the first processing module 110 is further configured to: and if the slice information triggering the cell reselection is a second slice under the condition that the cell reselection information aiming at the slice is suitable for the corresponding slice, performing cell reselection based on the cell reselection information corresponding to the second slice.
Optionally, the first processing module 110 is further configured to: and if the cell reselection information for the slice is suitable for the corresponding slice, determining a second slice in the second slice group based on the mapping relation between the slice and the slice group if the slice information triggering the cell reselection is the second slice group, and performing cell reselection based on the cell reselection information corresponding to the second slice.
For example, the terminal device may randomly select one slice in the second slice group as the second slice, or select the slice at the first position in the group as the second slice, or select the slice with the highest priority in the group as the second slice, or select the slice with the last position in the group as the second slice, or select the slice with the lowest priority in the group as the second slice, or select the slice with the smallest slice identifier in the group as the second slice, or select the slice with the largest slice identifier in the group as the second slice.
Optionally, the cell reselection information for the slice includes a frequency point corresponding to the slice or a cell corresponding to the slice.
Optionally, the cell reselection information for a slice is carried by SIB or dedicated signaling.
Optionally, in the case that the slice supported by the cell is the same as the slice supported by the serving frequency point, the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice. That is, only the frequency point corresponding to the cell may be indicated when the supported slice is indicated, without indicating the identity or PCI of the cell.
Optionally, in a case that the slice supported by the cell is different from the slice supported by the serving frequency point, the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identifier CI or the physical cell identifier PCI corresponding to the slice. Or the cell reselection information for slicing comprises a cell identifier CI or PCI corresponding to the cell, a frequency point corresponding to the cell and slicing information supported by the cell. Or the cell reselection information for slicing comprises a cell identifier CI or PCI corresponding to the cell and slicing information supported by the cell. The slice information comprises at least one of slice identification, slice group identification and frequency point priority corresponding to the slice.
Optionally, the slice information supported by the serving cell is the same as the slice supported by the serving frequency point.
Correspondingly, in the case that the slice supported by the cell is the same as the slice supported by the serving cell, the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice. That is, only the frequency point corresponding to the cell may be indicated when the supported slice is indicated, without indicating the identity or PCI of the cell.
Correspondingly, in the case that the slice supported by the cell is different from the slice supported by the serving cell, the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identifier or PCI corresponding to the slice.
Optionally, the first processing module 110 is further configured to: acquiring cell selection information configured by the network equipment and aiming at slicing; wherein the cell selection information for a slice is applicable to its corresponding slice or a corresponding slice group.
Optionally, the cell selection information for a slice corresponds to at least one slice or at least one slice group.
Optionally, each slice or group of slices corresponds to only one cell selection information for a slice.
Optionally, the method further comprises:
And if the slice information triggering the cell selection is a third slice, the terminal equipment determines a slice group to which the third slice belongs based on the mapping relation between the slice and the slice group, and performs cell selection based on the cell selection information corresponding to the slice group.
Optionally, the first processing module 110 is further configured to: and if the cell selection information for the slice is suitable for the corresponding slice group, determining the slice group of the third slice based on the mapping relation between the slice and the slice group if the slice information triggering the cell selection is the third slice, and performing cell selection based on the cell selection information corresponding to the slice group.
Optionally, the first processing module 110 is further configured to: and if the cell selection information for the slice is applicable to the corresponding slice group, if the slice information triggering the cell selection is a third slice group, performing cell selection based on the cell selection information corresponding to the third slice group.
Optionally, the first processing module 110 is further configured to: and if the cell selection information for the slice is suitable for the corresponding slice, if the slice information triggering the cell selection is a third slice, performing cell selection based on the cell selection information corresponding to the third slice.
Optionally, the first processing module 110 is further configured to: and if the cell selection information for the slice is suitable for the corresponding slice, determining a third slice in the third slice group based on the mapping relation between the slice and the slice group if the cell selection triggering slice information is the third slice group, and performing cell selection based on the cell selection information corresponding to the third slice.
For example, the terminal device may randomly select one slice in the third slice group as the third slice, or select the slice at the first position in the group as the third slice, or select the slice with the highest priority in the group as the third slice, or select the slice with the last position in the group as the third slice, or select the slice with the lowest priority in the group as the third slice, or select the slice with the smallest slice identifier in the group as the third slice, or select the slice with the largest slice identifier in the group as the third slice.
Optionally, the cell selection information for a slice includes a frequency point corresponding to the slice or a cell corresponding to the slice.
Optionally, the cell selection information for a slice is carried by SIB or dedicated signaling.
Optionally, in the case that the slice supported by the cell is the same as the slice supported by the serving frequency point, the cell selection information for the slice includes the frequency point of the cell corresponding to the slice. That is, only the frequency point corresponding to the cell may be indicated when the supported slice is indicated, without indicating the identity or PCI of the cell.
Optionally, in the case that the slice supported by the cell is different from the slice supported by the serving frequency point, the cell selection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identifier CI or the physical cell identifier PCI corresponding to the slice. Or the cell reselection information for slicing comprises a cell identifier CI or PCI corresponding to the cell, a frequency point corresponding to the cell and slicing information supported by the cell. Or the cell reselection information for slicing comprises a cell identifier CI or PCI corresponding to the cell and slicing information supported by the cell. The slice information comprises at least one of slice identification, slice group identification and frequency point priority corresponding to the slice.
Optionally, in a case that the slice supported by the cell is the same as the slice supported by the serving cell, the cell selection information for the slice includes a frequency point of the cell corresponding to the slice. That is, only the frequency point corresponding to the cell may be indicated when the supported slice is indicated, without indicating the identity or PCI of the cell.
Optionally, in a case that the slice supported by the cell is different from the slice supported by the serving cell, the cell selection information for the slice includes a frequency point of the cell corresponding to the slice and a cell identifier CI or a physical cell identifier PCI corresponding to the slice.
Optionally, the first processing module 110 is further configured to:
and in the case that the random access resource for slicing is not configured, the access layer of the terminal equipment sends second information to the non-access layer of the terminal equipment, wherein the second information is used for indicating that the non-access layer does not send slicing information to the access layer.
The terminal device 100 in this embodiment of the present application may implement the corresponding functions of the terminal device in the foregoing method embodiment, and the flow, the functions, the implementation manner and the beneficial effects corresponding to each module (sub-module, unit or component, etc.) in the terminal device 100 may refer to the corresponding descriptions in the foregoing method embodiment, which are not repeated herein. It should be noted that, regarding the functions described in each module (sub-module, unit, or component, etc.) in the terminal device 100 of the embodiment of the present application, the functions may be implemented by different modules (sub-module, unit, or component, etc.), or may be implemented by the same module (sub-module, unit, or component, etc.), for example, the first sending module and the second sending module may be different modules, or may be the same module, and all the functions thereof in the embodiment of the present application may be implemented. In addition, the communication module in the embodiment of the application may be implemented by a transceiver of the device, and part or all of the remaining modules may be implemented by a processor of the device.
Fig. 9 is a schematic block diagram of a network device 200 according to an embodiment of the present application. The network device 200 may include:
a first communication module 210, configured to send first information to a terminal device, so that the terminal device determines, based on the first information, whether to perform a fallback from a first random access procedure to a second random access procedure;
wherein the first information is used for indicating whether to support or execute a fallback from the first random access procedure to the second random access procedure, or whether to support or execute a fallback from the first random access procedure to a third random access procedure.
Optionally, the first communication module 210 is specifically configured to:
transmitting the first information to the terminal equipment under the condition that the preamble group configured by the first random access process is different from the preamble group configured by the second random access process or the preamble group selection threshold configured by the first random access process is different from the preamble group selection threshold configured by the second random access process;
or,
transmitting the first information to the terminal equipment under the condition that a preamble group configured in the first random access process is different from a preamble group configured in a third random access process or a preamble group selection threshold configured in the first random access process is different from a preamble group selection threshold configured in the third random access process;
Or,
transmitting the first information to the terminal equipment under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the second random access process or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the second random access process;
or,
and sending the first information to the terminal equipment under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the third random access process or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the third random access process.
Optionally, the first communication module 210 is further configured to:
and sending resource configuration information to the terminal equipment, wherein the resource configuration information is used for indicating random access resources, and the random access resources comprise universal random access resources and/or random access resources for slicing.
Optionally, the random access resource for a slice is applicable to a plurality of slices in its corresponding slice or corresponding slice group.
Optionally, the resource configuration information is included in a system information block SIB and/or radio resource control RRC signaling.
Optionally, the first communication module 210 is further configured to: transmitting cell reselection information for slicing to the terminal equipment; wherein the cell reselection information for a slice is applicable to its corresponding slice or a corresponding slice group.
Optionally, the cell reselection information for a slice corresponds to at least one slice or at least one slice group.
Optionally, each slice or group of slices corresponds to only one cell reselection information for a slice.
Optionally, the cell reselection information for the slice includes a frequency point corresponding to the slice or a cell corresponding to the slice.
Optionally, the cell reselection information for a slice is carried by SIB or dedicated signaling.
Optionally, in the case that the slice supported by the cell is the same as the slice supported by the serving frequency point, the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice.
Optionally, in a case that the slice supported by the cell is different from the slice supported by the serving frequency point, the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identifier CI or the physical cell identifier PCI corresponding to the slice.
Optionally, the first communication module 210 is further configured to: transmitting cell selection information for slicing to the terminal equipment; wherein the cell selection information for a slice is applicable to its corresponding slice or a corresponding slice group.
Optionally, the cell selection information for a slice corresponds to at least one slice or at least one slice group.
Optionally, each slice or group of slices corresponds to only one cell selection information for a slice.
Optionally, the cell selection information for a slice includes a frequency point corresponding to the slice or a cell corresponding to the slice.
Optionally, the cell selection information for a slice is carried by SIB or dedicated signaling.
Optionally, in the case that the slice supported by the cell is the same as the slice supported by the serving frequency point, the cell selection information for the slice includes the frequency point of the cell corresponding to the slice.
Optionally, in the case that the slice supported by the cell is different from the slice supported by the serving frequency point, the cell selection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identifier CI or the physical cell identifier PCI corresponding to the slice.
The network device 200 of the embodiment of the present application can implement the corresponding functions of the network device in the foregoing method embodiment. The flow, function, implementation and beneficial effects corresponding to each module (sub-module, unit or assembly, etc.) in the network device 200 can be referred to the corresponding description in the above method embodiments, which are not repeated here. It should be noted that, regarding the functions described in each module (sub-module, unit, or component, etc.) in the network device 200 of the application embodiment, the functions may be implemented by different modules (sub-module, unit, or component, etc.), or may be implemented by the same module (sub-module, unit, or component, etc.), for example, the first sending module and the second sending module may be different modules, or may be the same module, and all the functions thereof in the embodiments of the application may be implemented. In addition, the communication module in the embodiment of the application may be implemented by a transceiver of the device, and part or all of the remaining modules may be implemented by a processor of the device.
Fig. 10 is a schematic block diagram of a communication device 600 according to an embodiment of the present application, wherein the communication device 600 includes a processor 610, and the processor 610 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, the communication device 600 may further comprise a memory 620. Wherein the processor 610 may call and run a computer program from the memory 620 to implement the methods in embodiments of the present application.
The memory 620 may be a separate device from the processor 610 or may be integrated into the processor 610.
Optionally, the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices, and in particular, may send information or data to other devices, or receive information or data sent by other devices.
The transceiver 630 may include a transmitter and a receiver, among others. Transceiver 630 may further include antennas, the number of which may be one or more.
Optionally, the communication device 600 may be a network device in the embodiment of the present application, and the communication device 600 may implement a corresponding flow implemented by the network device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the communication device 600 may be a terminal device in the embodiment of the present application, and the communication device 600 may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Fig. 11 is a schematic block diagram of a chip 700 according to an embodiment of the present application, wherein the chip 700 includes a processor 710, and the processor 710 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, chip 700 may also include memory 720. Wherein the processor 710 may call and run a computer program from the memory 720 to implement the methods in embodiments of the present application.
Wherein the memory 720 may be a separate device from the processor 710 or may be integrated into the processor 710.
Optionally, the chip 700 may also include an input interface 730. The processor 710 may control the input interface 730 to communicate with other devices or chips, and in particular, may obtain information or data sent by other devices or chips.
Optionally, the chip 700 may further include an output interface 740. The processor 710 may control the output interface 740 to communicate with other devices or chips, and in particular, may output information or data to other devices or chips.
Optionally, the chip may be applied to a network device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the network device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the chip may be applied to a terminal device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like.
The processors mentioned above may be general purpose processors, digital signal processors (digital signal processor, DSP), off-the-shelf programmable gate arrays (field programmable gate array, FPGA), application specific integrated circuits (application specific integrated circuit, ASIC) or other programmable logic devices, transistor logic devices, discrete hardware components, etc. The general-purpose processor mentioned above may be a microprocessor or any conventional processor.
The memory mentioned above may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM).
It should be understood that the above memory is exemplary but not limiting, and for example, the memory in the embodiments of the present application may be Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), direct RAM (DR RAM), and the like. That is, the memory in embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
Fig. 12 is a schematic block diagram of a communication system 800 according to an embodiment of the present application, the communication system 800 comprising a terminal device 810 and a network device 820.
Wherein the terminal device 810 may be used to implement the corresponding functions implemented by the terminal device in the methods of the various embodiments of the present application, and the network device 820 may be used to implement the corresponding functions implemented by the network device in the methods of the various embodiments of the present application. For brevity, the description is omitted here.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working processes of the above-described systems, apparatuses and units may refer to corresponding processes in the foregoing method embodiments, which are not described herein again.
The foregoing is merely a specific embodiment of the present application, but the protection scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions should be covered in the protection scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (148)

  1. A random access method, comprising:
    the terminal equipment determines whether to execute rollback from a first random access procedure to a second random access procedure based on first information sent by the network equipment;
    wherein the first information is used for indicating whether to support or execute a fallback from the first random access procedure to the second random access procedure, or whether to support or execute a fallback from the first random access procedure to a third random access procedure.
  2. The method of claim 1, wherein the first random access procedure comprises a random access procedure for a slice.
  3. The method according to claim 1 or 2, wherein the second random access procedure comprises a random access procedure for non-slices, or a random access procedure for common resources, or a common random access procedure.
  4. A method according to any of claims 1-3, wherein the third random access procedure comprises a random access procedure for a slice.
  5. The method of any of claims 1-4, wherein the first random access procedure comprises a two-step random access procedure for a slice and the third random access procedure comprises a four-step random access procedure for a slice.
  6. The method of any of claims 1-5, wherein the second random access procedure comprises a four-step random access procedure for non-sliced, or a four-step random access procedure for universal resources, or a four-step universal random access procedure.
  7. The method according to any of claims 1-6, wherein the first information comprises a maximum number of transmissions and/or resources for a random access procedure.
  8. The method of claim 7, wherein the first information is used to indicate support for the terminal device to perform a backoff from the first random access procedure to the second random access procedure if the first information includes a maximum number of transmissions for the second random access procedure and/or the first information does not include a maximum number of transmissions for the third random access procedure and/or the maximum number of transmissions for the second random access procedure in the first information is equal to or greater than 1.
  9. The method of claim 7, wherein, in a case where the first information includes a maximum number of transmissions for the third random access procedure, and/or the first information does not include a maximum number of transmissions for the second random access procedure, and/or the maximum number of transmissions for the third random access procedure in the first information is greater than or equal to 1, the first information is used to indicate support for the terminal device to perform backoff from the first random access procedure to the third random access procedure.
  10. The method of claim 7, wherein, if the first information includes a maximum number of transmissions for the third random access procedure and/or the maximum number of transmissions for the third random access procedure in the first information is 1 or more, the first information is used to indicate support of the terminal device to perform backoff from the first random access procedure to the second random access procedure if the first information does not include resources for the third random access procedure.
  11. The method of claim 7, wherein, if the first information includes a maximum number of transmissions for the third random access procedure and/or the maximum number of transmissions for the third random access procedure in the first information is 1 or more, the first information is used to indicate to support the terminal device to perform a backoff from the first random access procedure to the second random access procedure if the first information includes resources for the second random access procedure.
  12. The method of claim 7, wherein the first information includes a maximum number of transmissions for the second random access procedure, and the first information indicates that the maximum number of transmissions for the second random access procedure is not used for a third random access procedure, the terminal device performs backoff from the first random access procedure to the second random access procedure, or the terminal device does not perform backoff from the first random access procedure to the third random access procedure, or the terminal device does not perform backoff from the first random access procedure.
  13. The method of claim 7, wherein the terminal device performs backoff from the first random access procedure to the second random access procedure, or the terminal device does not perform backoff from the first random access procedure to the third random access procedure, or the terminal device does not perform backoff from the first random access procedure, in a case where the first information includes a maximum number of transmissions for the second random access procedure, and the first information indicates that the maximum number of transmissions for the second random access procedure is not used to backoff to the third random access procedure.
  14. The method of claim 7, wherein the first information includes a maximum number of transmissions for a random access procedure and indicates that the maximum number of transmissions for a random access procedure is not for the third random access procedure, the terminal device performs backoff from the first random access procedure to the second random access procedure, or the terminal device does not perform backoff from the first random access procedure to the third random access procedure, or the terminal device does not perform backoff from the first random access procedure.
  15. The method of claim 7, wherein the terminal device performs a backoff from the first random access procedure to the third random access procedure or the terminal device performs a backoff from the first random access procedure if the first information comprises a maximum number of transmissions for a random access procedure and the first information indicates that the maximum number of transmissions for a random access procedure is also used for the third random access procedure.
  16. The method of claim 7, wherein the terminal device performs backoff from the first random access procedure to the third random access procedure or vice versa, if the first information comprises a maximum number of transmissions for a second random access procedure and the first information indicates that the maximum number of transmissions for a random access procedure is also used to backoff to the third random access procedure.
  17. The method of any of claims 1-16, wherein the first information corresponds to one of a plurality of slices, the first information being applicable to its corresponding slice.
  18. The method of any of claims 1-16, wherein the first information corresponds to one of a plurality of slice groups, the first information being applicable to a plurality of slices in its corresponding slice group.
  19. The method of any of claims 1-16, the first information being applicable to a plurality of slices or a plurality of slice groups.
  20. The method according to any of claims 1-19, wherein the terminal device determining whether to perform a backoff from the first random access procedure to the second random access procedure based on the first information sent by the network device comprises:
    the terminal device performs backoff from a first random access procedure to a second random access procedure in a case where it is determined that a first condition is satisfied based on the first information.
  21. The method of any one of claims 1-20, wherein the method further comprises:
    the terminal device does not perform backoff from the first random access procedure to the third random access procedure in a case where it is determined that the first condition is satisfied based on the first information.
  22. The method of any of claims 1-21, wherein the terminal device determining whether to perform a backoff from the first random access procedure to the second random access procedure based on the first information sent by the network device comprises:
    The terminal device does not perform backoff from the first random access procedure to the second random access procedure in a case where it is determined that the first condition is not satisfied based on the first information.
  23. The method of any one of claims 1-22, wherein the method further comprises:
    the terminal device performs backoff from a first random access procedure to the third random access procedure in a case where it is determined that the first condition is not satisfied based on the first information.
  24. The method of any of claims 20-23, wherein the method further comprises:
    in the case that the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure, or the preamble set selection threshold configured by the first random access procedure is different from the preamble set selection threshold configured by the second random access procedure, the terminal device rolls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
    or,
    in the case that the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure, or the preamble set selection threshold configured by the first random access procedure is different from the preamble set selection threshold configured by the third random access procedure, the terminal device rolls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
    Or,
    in the case that the preamble set configured by the first random access procedure is the same as the preamble set configured by the second random access procedure, or the preamble set selection threshold configured by the first random access procedure is the same as the preamble set selection threshold configured by the second random access procedure, the terminal device rolls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
    or,
    and under the condition that the preamble group configured by the first random access procedure is the same as the preamble group configured by the third random access procedure, or the preamble group selection threshold configured by the first random access procedure is the same as the preamble group selection threshold configured by the third random access procedure, the terminal equipment backs to the second random access procedure or determines whether the first condition is met based on the first information.
  25. The method of any one of claims 1-24, wherein the method further comprises:
    and the terminal equipment rolls back to the third random access process under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the third random access process, or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the third random access process.
  26. The method of any of claims 20-24, wherein the first condition comprises at least one of:
    receiving the first information;
    the first information appears in a first message sent by the network equipment;
    the first information indicates to support the terminal device to perform a backoff from the first random access procedure to the second random access procedure;
    the first information includes a maximum number of transmissions for the second random access procedure;
    the first information does not include a maximum number of transmissions for the third random access procedure;
    the first information does not include a random access maximum number of transmissions for a slice;
    not configuring resources for the third random access procedure;
    the first information comprises a maximum number of random access transmissions for a slice;
    the maximum transmission times of the random access for the slice is less than 1;
    configuring resources for the second random access procedure;
    the use condition of the first information is satisfied.
  27. The method of claim 26, wherein the conditions of use of the first information include at least one of:
    the preamble transmission times of the first random access process are larger than the maximum random access transmission times for the slice;
    Not configuring resources for the third random access procedure;
    the preamble set configured by the first random access process is the same as the preamble set configured by the second random access process;
    the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
    configuring resources for the second random access procedure;
    configuring a maximum number of transmissions for the second random access procedure;
    the maximum transmission times for the third random access process are not configured;
    the maximum transmission times of random access for the slice are not configured;
    configuring the maximum transmission times aiming at a third random access process;
    configuring the maximum transmission times of random access for slices;
    the maximum number of transmissions for random access of the slice or the maximum number of transmissions for the third random access procedure is greater than or equal to 1.
  28. The method of any one of claims 1-27, wherein the method further comprises:
    and under the condition of executing the rollback from the first random access procedure to the second random access procedure, the terminal equipment obtains the MAC PDU of the third message in the second random access procedure based on the MAC PDU of the message A in the first random access procedure.
  29. The method of claim 28, wherein the obtaining, by the terminal device, the MAC PDU of the third message in the second random access procedure based on the MAC PDU of the message a in the first random access procedure, comprises:
    if the second condition is met, the terminal equipment takes the MAC PDU of the message A in the first random access process as the MAC PDU of the third message in the second random access process;
    and/or the number of the groups of groups,
    and if the third condition is met, the terminal equipment carries out packet reassembly based on the MAC PDU of the message A in the first random access process, and the MAC PDU in the third message in the second random access process is obtained.
  30. The method of claim 29, wherein, in the process that the terminal device reassembles packets based on MAC PDUs of message a in the first random access procedure, if a resource size of a third message in the second random access procedure is greater than an authorized size of message a in the first random access procedure, the terminal device fills a remaining space of PDUs based on preset bits or new data.
  31. The method according to any of claims 28-30, wherein before the terminal device obtains a MAC PDU of the third step message in the second random access procedure based on a MAC PDU of a media access control protocol data unit of message a in the first random access procedure, the method further comprises:
    And the terminal equipment acquires the MAC PDU of the message A in the buffer zone of the message A.
  32. The method of any of claims 28-31, wherein the method further comprises:
    and the terminal equipment stores the MAC PDU of the third step message in the second random access process obtained based on the MAC PDU of the message A in the first random access process in a third step message buffer zone.
  33. The method of any one of claims 1-32, wherein the method further comprises:
    and under the condition of executing the rollback from the first random access procedure to the third random access procedure, the terminal equipment obtains the MAC PDU of the third message in the third random access procedure based on the MAC PDU of the media access control protocol data unit of the message A in the first random access procedure.
  34. The method of claim 33, wherein the obtaining, by the terminal device, the MAC PDU of the third step message in the third random access procedure based on the MAC PDU of message a in the first random access procedure includes:
    if the second condition is met, the terminal equipment takes the MAC PDU of the message A in the first random access process as the MAC PDU of the third message in the third random access process;
    And/or the number of the groups of groups,
    and if the third condition is met, the terminal equipment carries out packet reassembly based on the MAC PDU of the message A in the first random access process, and the MAC PDU of the third message in the third random access process is obtained.
  35. The method of claim 34, wherein in the process of reassembling packets based on the MAC PDU of message a in the first random access procedure, if the resource size of the third step message in the third random access procedure is greater than the grant size of message a in the first random access procedure, the terminal device fills the remaining space of the PDU based on preset bits or new data.
  36. The method according to any of claims 33-35, wherein before the terminal device obtains a MAC PDU of a third step message in the third random access procedure based on a MAC PDU of a media access control protocol data unit of message a in the first random access procedure, the method further comprises:
    and the terminal equipment acquires the MAC PDU of the message A in the buffer zone of the message A.
  37. The method of any of claims 33-36, wherein the method further comprises:
    and the terminal equipment stores the MAC PDU of the third step message in the third random access process obtained based on the MAC PDU of the message A in the first random access process in a third step message buffer zone.
  38. The method of any one of claims 29, 30, 34, 35, wherein the second condition comprises at least one of:
    the preamble set configured by the first random access process is the same as the preamble set configured by the second random access process;
    the preamble group selection threshold configured in the first random access process is the same as the preamble group selection threshold configured in the second random access process;
    the grant size of the third message of the second random access procedure is the same as the MAC PDU size of message a in the first random access procedure;
    the preamble set configured by the first random access process is the same as the preamble set configured by the third random access process;
    the preamble group selection threshold configured in the first random access process is the same as the preamble group selection threshold configured in the third random access process;
    the grant size of the third step message of the third random access procedure is the same as the MAC PDU size of message a in the first random access procedure.
  39. The method of any one of claims 29, 30, 34, 35, 38, wherein the third condition comprises at least one of:
    the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure;
    The preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
    the grant size of the third message of the second random access procedure is different from the MAC PDU size of message a in the first random access procedure;
    the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
    the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
    the grant size of the third step message of the third random access procedure is different from the MAC PDU size of message a in the first random access procedure.
  40. The method according to any of claims 29, 30, 34, 35, 38, 39, wherein in reassembling packets based on MAC PDUs of message a in the first random access procedure, the terminal device multiplexes data and/or MAC CEs according to their priority and/or priority.
  41. The method of any of claims 29, 30, 34, 35, 38-40, wherein the terminal device preferentially multiplexes data in reassembling packets based on MAC PDUs of message a in the first random access procedure.
  42. The method of any one of claims 1-41, wherein the method further comprises:
    in case the fourth condition is met, the terminal device stops random access, stops performing backoff from the first random access procedure to the second random access procedure, or determines a random access failure.
  43. The method of any one of claims 1-42, wherein the method further comprises:
    in case the fourth condition is met, the terminal device stops random access, stops performing backoff from the first random access procedure to the third random access procedure, or determines a random access failure.
  44. The method of claim 42 or 43, wherein the fourth condition comprises:
    the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure;
    the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
    the grant size of the third message of the second random access procedure is different from the MAC PDU size of message a in the first random access procedure;
    The preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
    the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
    the grant size of the third step message of the third random access procedure is different from the MAC PDU size of message a in the first random access procedure.
  45. The method of any one of claims 1-44, wherein the method further comprises:
    the terminal equipment acquires random access resources based on resource configuration information sent by the network equipment; wherein the random access resources comprise general random access resources and/or random access resources for slices.
  46. The method of claim 45, wherein the method further comprises:
    in case the random access resource does not comprise a random access resource for a slice, the terminal device performs a random access procedure using a generic random access resource.
  47. The method of claim 44 or 45, wherein the random access resource for a slice is applicable to a plurality of slices in its corresponding slice or corresponding slice group.
  48. The method of claim 47, wherein the random access resource for a slice corresponds to at least one slice or at least one slice group.
  49. The method of claim 47 or 48, wherein each slice or group of slices corresponds to only one random access resource for a slice.
  50. The method of any one of claims 47-49, wherein the method further comprises:
    and if the slice information triggering the random access is the first slice, the terminal equipment determines the slice group to which the first slice belongs based on the mapping relation between the slice and the slice group, and performs the random access based on the random access resource corresponding to the slice group.
  51. The method of any one of claims 47-49, wherein the method further comprises:
    and under the condition that the random access resource for the slice configured by the resource configuration information is suitable for the slice group corresponding to the random access resource, if the slice information triggering random access is the first slice, the terminal equipment determines the slice group to which the first slice belongs based on the mapping relation between the slice and the slice group, and performs random access based on the random access resource corresponding to the slice group.
  52. The method of any one of claims 47-49, wherein the method further comprises:
    and under the condition that the random access resource for the slice configured by the resource configuration information is suitable for the slice group corresponding to the random access resource, if the slice information triggering the random access is a first slice group, the terminal equipment performs the random access based on the random access resource corresponding to the first slice group.
  53. The method according to any of claims 45-52, wherein the resource configuration information is comprised in a system information block, SIB, and/or radio resource control, RRC, signaling.
  54. The method of any one of claims 45-53, wherein the method further comprises:
    the terminal device performs the first random access procedure based on the random access resource for the slice.
  55. The method of claim 45, wherein in the random access resource, if a preamble set configured for a two-step random access procedure of a slice includes a first preamble set, a preamble set configured for a four-step random access procedure includes the first preamble set.
  56. The method of claim 55, wherein, in the case of supporting a two-step random access procedure backoff or supporting a two-step random access procedure backoff for a slice, the four-step random access procedure configured preamble set comprises the first preamble set if the two-step random access procedure configured preamble set for a slice comprises the first preamble set.
  57. The method of claim 55 or 56, wherein the four-step random access procedure comprises at least one of: a four-step random access procedure for slicing, a four-step random access procedure for non-slicing, a four-step random access procedure for universal resources, a four-step universal random access procedure.
  58. The method of any of claims 55-57, wherein the four-step random access procedure is a four-step random access procedure for a slice if the random access resources comprise resources of a two-step random access procedure for a slice and comprise resources of a four-step random access procedure for a slice.
  59. The method of any of claims 55-58, wherein the four-step random access procedure is a four-step random access procedure for non-sliced or a four-step random access procedure for a common resource or a four-step common random access procedure if the random access resources comprise resources for a two-step random access procedure for sliced but only a common random access resource is configured in the resources of the four-step random access procedure in the random access resources.
  60. The method of any one of claims 1-59, wherein the method further comprises:
    the terminal equipment acquires cell reselection information configured by the network equipment and aiming at slicing; wherein the cell reselection information for a slice is applicable to its corresponding slice or a corresponding slice group.
  61. The method of claim 60, wherein the cell reselection information for a slice corresponds to at least one slice or at least one slice group.
  62. The method of claim 60 or 61, wherein each slice or each slice group corresponds to only one cell reselection information for a slice.
  63. The method of any one of claims 60-62, wherein the method further comprises:
    and if the slice information triggering the cell reselection is the second slice, the terminal equipment determines a slice group to which the second slice belongs based on the mapping relation between the slice and the slice group, and performs the cell reselection based on the cell reselection information corresponding to the slice group.
  64. The method of any one of claims 60-62, wherein the method further comprises:
    and under the condition that the cell reselection information aiming at the slice is suitable for the corresponding slice group, if the slice information triggering the cell reselection is a second slice, the terminal equipment determines the slice group of the second slice based on the mapping relation between the slice and the slice group and performs cell reselection based on the cell reselection information corresponding to the slice group.
  65. The method of any one of claims 60-62, wherein the method further comprises:
    and if the slice information triggering the cell reselection is a second slice group under the condition that the cell reselection information aiming at the slice is suitable for the corresponding slice group, the terminal equipment performs cell reselection based on the cell reselection information corresponding to the second slice group.
  66. The method of any one of claims 60-62, wherein the method further comprises:
    and if the slice information triggering the cell reselection is a second slice under the condition that the cell reselection information aiming at the slice is suitable for the corresponding slice, the terminal equipment performs cell reselection based on the cell reselection information corresponding to the second slice.
  67. The method of any one of claims 60-62, wherein the method further comprises:
    and if the cell reselection information for the slice is suitable for the corresponding slice, determining a second slice in the second slice group based on the mapping relation between the slice and the slice group by the terminal equipment if the slice information triggering the cell reselection is the second slice group, and performing cell reselection based on the cell reselection information corresponding to the second slice.
  68. The method of any of claims 60-67, wherein the slice-specific cell reselection information comprises a frequency point corresponding to a slice or a cell corresponding to a slice.
  69. The method of any of claims 60-68, wherein the cell reselection information for a slice is carried by a SIB or dedicated signaling.
  70. The method of any of claims 60-69, wherein the cell reselection information for a slice comprises a frequency point of a cell to which the slice corresponds in the case where the slice supported by the cell is the same as a slice supported by a serving frequency point.
  71. The method according to any of claims 60-70, wherein, in case that a slice supported by a cell is not identical to a slice supported by a serving frequency point, the cell reselection information for the slice includes a frequency point of the cell corresponding to the slice and a cell identity CI or a physical cell identity PCI corresponding to the slice, or the cell reselection information for the slice includes a cell identity CI or PCI corresponding to the cell and a slice information supported by the cell.
  72. The method of any of claims 70-71, wherein serving cell supported slice information is the same as serving frequency point supported slices.
  73. The method of any one of claims 1-72, wherein the method further comprises:
    the terminal equipment acquires cell selection information configured by the network equipment and aiming at slicing; wherein the cell selection information for a slice is applicable to its corresponding slice or a corresponding slice group.
  74. The method of claim 73, wherein the cell selection information for a slice corresponds to at least one slice or at least one slice group.
  75. A method according to claim 72 or 73, wherein each slice or group of slices corresponds to only one cell selection information for a slice.
  76. The method of any one of claims 72-75, wherein the method further comprises:
    and if the slice information triggering the cell selection is a third slice, the terminal equipment determines a slice group to which the third slice belongs based on the mapping relation between the slice and the slice group, and performs cell selection based on the cell selection information corresponding to the slice group.
  77. The method of any one of claims 72-75, wherein the method further comprises:
    And if the cell selection information for the slice is suitable for the corresponding slice group, determining the slice group of the third slice based on the mapping relation between the slice and the slice group by the terminal equipment and performing cell selection based on the cell selection information corresponding to the slice group if the slice information triggering cell selection is the third slice.
  78. The method of any one of claims 72-75, wherein the method further comprises:
    and if the cell selection information for the slice is applicable to the corresponding slice group, if the cell selection triggering slice information is a third slice group, the terminal equipment performs cell selection based on the cell selection information corresponding to the third slice group.
  79. The method of any one of claims 72-75, wherein the method further comprises:
    and if the cell selection information for the slice is suitable for the corresponding slice, if the slice information triggering cell selection is a third slice, the terminal equipment performs cell selection based on the cell selection information corresponding to the third slice.
  80. The method of any one of claims 72-75, wherein the method further comprises:
    And if the cell selection information for the slice is suitable for the corresponding slice, determining a third slice in the third slice group by the terminal equipment based on the mapping relation between the slice and the slice group, and performing cell selection based on the cell selection information corresponding to the third slice by the terminal equipment if the cell selection triggering slice information is the third slice group.
  81. The method of any of claims 72-80, wherein the cell selection information for a slice comprises a frequency point for which a slice corresponds or a cell for which a slice corresponds.
  82. The method of any of claims 72-81, wherein the cell selection information for a slice is carried by SIB or dedicated signaling.
  83. The method of any of claims 72-82, wherein the cell selection information for a slice includes a frequency point of a cell to which the slice corresponds, in a case where the slice supported by the cell is the same as a slice supported by a serving frequency point.
  84. The method of any one of claims 72-83, wherein, in a case where a slice supported by a cell is different from a slice supported by a serving frequency point, the cell selection information for the slice includes a frequency point of the cell corresponding to the slice and a cell identity CI or a physical cell identity PCI corresponding to the slice, or the cell reselection information for the slice includes the cell identity CI or PCI corresponding to the cell and the slice information supported by the cell.
  85. The method of any of claims 72-84, wherein serving cell supported slice information is the same as serving frequency point supported slices.
  86. The method of any one of claims 1-85, wherein the method further comprises:
    and in the case that the random access resource for slicing is not configured, the access layer of the terminal equipment sends second information to the non-access layer of the terminal equipment, wherein the second information is used for indicating that the non-access layer does not send slicing information to the access layer.
  87. A random access method, comprising:
    the network equipment sends first information to the terminal equipment so that the terminal equipment can determine whether to execute rollback from a first random access process to a second random access process or not based on the first information;
    wherein the first information is used for indicating whether to support or execute a fallback from the first random access procedure to the second random access procedure, or whether to support or execute a fallback from the first random access procedure to a third random access procedure.
  88. The method of claim 87, wherein the network device sending first information to a terminal device comprises:
    The network device sends the first information to the terminal device under the condition that the preamble group configured by the first random access process is different from the preamble group configured by the second random access process or the preamble group selection threshold configured by the first random access process is different from the preamble group selection threshold configured by the second random access process;
    or,
    the network device sends the first information to the terminal device under the condition that a preamble group configured in the first random access process is different from a preamble group configured in a third random access process or a preamble group selection threshold configured in the first random access process is different from a preamble group selection threshold configured in the third random access process;
    or,
    the network device sends the first information to the terminal device under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the second random access process or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the second random access process;
    Or,
    and the network equipment sends the first information to the terminal equipment under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the third random access process or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the third random access process.
  89. The method of claim 87 or 88, wherein the method further comprises:
    the network device sends resource configuration information to the terminal device, wherein the resource configuration information is used for indicating random access resources, and the random access resources comprise universal random access resources and/or random access resources for slicing.
  90. The method of any of claims 87-89, wherein the method further comprises:
    the network equipment sends cell reselection information for slicing to the terminal equipment; wherein the cell reselection information for a slice is applicable to its corresponding slice or a corresponding slice group.
  91. The method of claims 87-90, wherein the method further comprises:
    the network equipment sends cell selection information for slicing to the terminal equipment; wherein the cell selection information for a slice is applicable to its corresponding slice or a corresponding slice group.
  92. A terminal device, comprising:
    a first processing module, configured to determine, based on first information sent by the network device, whether to perform a backoff from the first random access procedure to the second random access procedure;
    wherein the first information is used for indicating whether to support or execute a fallback from the first random access procedure to the second random access procedure, or whether to support or execute a fallback from the first random access procedure to a third random access procedure.
  93. The terminal device of claim 92, wherein said first random access procedure comprises a random access procedure for a slice.
  94. The terminal device of claim 92 or 93, wherein the second random access procedure comprises a random access procedure for non-slice, or a random access procedure for common resources, or a common random access procedure.
  95. The terminal device of any of claims 92-94, wherein the third random access procedure comprises a random access procedure for a slice.
  96. The terminal device of any of claims 92-95, wherein the first random access procedure comprises a two-step random access procedure for a slice and the third random access procedure comprises a four-step random access procedure for a slice.
  97. The terminal device of any of claims 92-96, wherein the second random access procedure comprises a four-step random access procedure for non-sliced, or a four-step random access procedure for universal resources, or a four-step universal random access procedure.
  98. The terminal device of any of claims 92-97, wherein the first information includes a maximum number of transmissions and/or resources for a random access procedure.
  99. The terminal device of claim 98, wherein, in a case where the first information includes a maximum number of transmissions for the second random access procedure, and/or the first information does not include a maximum number of transmissions for the third random access procedure, and/or the maximum number of transmissions for the second random access procedure in the first information is greater than or equal to 1, the first information is used to indicate support for the terminal device to perform backoff from the first random access procedure to the second random access procedure.
  100. The terminal device of claim 98, wherein, in a case where the first information includes a maximum number of transmissions for the third random access procedure, and/or the first information does not include a maximum number of transmissions for the second random access procedure, and/or the maximum number of transmissions for the third random access procedure in the first information is 1 or more, the first information is used to indicate support for the terminal device to perform a backoff from the first random access procedure to the third random access procedure.
  101. The terminal device of claim 98, wherein, in a case where the first information includes a maximum number of transmissions for the third random access procedure and/or the first information includes a maximum number of transmissions for the third random access procedure that is equal to or greater than 1, the first information is used to indicate support for the terminal device to perform a backoff from the first random access procedure to the second random access procedure if the first information does not include resources for the third random access procedure.
  102. The terminal device of claim 98, wherein, in a case where the first information includes a maximum number of transmissions for the third random access procedure and/or the first information includes a maximum number of transmissions for the third random access procedure that is equal to or greater than 1, the first information is used to indicate support for the terminal device to perform a backoff from the first random access procedure to the second random access procedure if the first information includes resources for the second random access procedure.
  103. The terminal device of any of claims 92-102, wherein the first information corresponds to one of a plurality of slices, the first information being applicable to its corresponding slice.
  104. The terminal device of any of claims 92-102, wherein the first information corresponds to one of a plurality of slice groups, the first information being applicable to a plurality of slices in its corresponding slice group.
  105. The terminal device of any of claims 92-102, the first information being applicable to a plurality of slices or a plurality of slice groups.
  106. The terminal device of any of claims 92-105, wherein the first processing module is configured to:
    in case it is determined that the first condition is satisfied based on the first information, a backoff from the first random access procedure to the second random access procedure is performed.
  107. The terminal device of any of claims 92-106, wherein the first processing module is configured to:
    in case it is determined that the first condition is satisfied based on the first information, a backoff from the first random access procedure to the third random access procedure is not performed.
  108. The terminal device of any of claims 92-107, wherein the first processing module is configured to:
    in case it is determined that the first condition is not satisfied based on the first information, a backoff from the first random access procedure to the second random access procedure is not performed.
  109. The terminal device of any of claims 92-108, wherein the first processing module is configured to:
    in case it is determined that the first condition is not satisfied based on the first information, a backoff from the first random access procedure to the third random access procedure is performed.
  110. The terminal device of any of claims 106-109, wherein the first processing module is further configured to:
    in the case that the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure, or the preamble set selection threshold configured by the first random access procedure is different from the preamble set selection threshold configured by the second random access procedure, the terminal device rolls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
    or,
    in the case that the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure, or the preamble set selection threshold configured by the first random access procedure is different from the preamble set selection threshold configured by the third random access procedure, the terminal device rolls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
    Or,
    in the case that the preamble set configured by the first random access procedure is the same as the preamble set configured by the second random access procedure, or the preamble set selection threshold configured by the first random access procedure is the same as the preamble set selection threshold configured by the second random access procedure, the terminal device rolls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
    or,
    and under the condition that the preamble group configured by the first random access procedure is the same as the preamble group configured by the third random access procedure, or the preamble group selection threshold configured by the first random access procedure is the same as the preamble group selection threshold configured by the third random access procedure, the terminal equipment backs to the second random access procedure or determines whether the first condition is met based on the first information.
  111. The terminal device of any of claims 92-110, wherein the first processing module is further configured to:
    and the terminal equipment rolls back to the third random access process under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the third random access process, or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the third random access process.
  112. The terminal device of any of claims 106-110, wherein the first condition includes at least one of:
    receiving the first information;
    the first information appears in a first message sent by the network equipment;
    the first information indicates to support the terminal device to perform a backoff from the first random access procedure to the second random access procedure;
    the first information includes a maximum number of transmissions for the second random access procedure;
    the first information does not include a maximum number of transmissions for the third random access procedure;
    the first information does not include a random access maximum number of transmissions for a slice;
    not configuring resources for the third random access procedure;
    the first information comprises a maximum number of random access transmissions for a slice;
    the maximum transmission times of the random access for the slice is less than 1;
    configuring resources for the second random access procedure;
    the use condition of the first information is satisfied.
  113. The terminal device of claim 112, wherein the condition of use of the first information includes at least one of:
    the preamble transmission times of the first random access process are larger than the maximum random access transmission times for the slice;
    Not configuring resources for the third random access procedure;
    the preamble set configured by the first random access process is the same as the preamble set configured by the second random access process;
    the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
    configuring resources for the second random access procedure;
    configuring a maximum number of transmissions for the second random access procedure;
    the maximum transmission times for the third random access process are not configured;
    the maximum transmission times of random access for the slice are not configured;
    configuring the maximum transmission times aiming at a third random access process;
    configuring the maximum transmission times of random access for slices;
    the maximum number of transmissions for random access of the slice or the maximum number of transmissions for the third random access procedure is greater than or equal to 1.
  114. The terminal device of any of claims 92-113, wherein the first processing module is further configured to:
    and under the condition of executing the rollback from the first random access procedure to the second random access procedure, the terminal equipment obtains the MAC PDU of the third message in the second random access procedure based on the MAC PDU of the message A in the first random access procedure.
  115. The terminal device of claim 114, wherein said first processing module is configured to:
    if the second condition is met, the MAC PDU of the message A in the first random access process is used as the MAC PDU of the third message in the second random access process;
    and/or the number of the groups of groups,
    and if the third condition is met, carrying out packet reassembly based on the MAC PDU of the message A in the first random access process to obtain the MAC PDU in the third message in the second random access process.
  116. The terminal device of claim 115, wherein, in reassembling packets based on MAC PDUs of message a in the first random access procedure, if the resource size of the third step message in the second random access procedure is greater than the grant size of message a in the first random access procedure, the terminal device fills the remaining space of PDUs based on preset bits or new data.
  117. The terminal device of any of claims 114-116, wherein the first processing module is further configured to:
    and acquiring the MAC PDU of the message A in a buffer zone of the message A.
  118. The terminal device of any of claims 114-117, wherein the first processing module is further configured to:
    And storing the MAC PDU of the third step message in the second random access process obtained based on the MAC PDU of the message A in the first random access process in a third step message buffer.
  119. The terminal device of any of claims 92-118, wherein the first processing module is further configured to:
    and under the condition of executing the rollback from the first random access procedure to the third random access procedure, the terminal equipment obtains the MAC PDU of the third message in the third random access procedure based on the MAC PDU of the media access control protocol data unit of the message A in the first random access procedure.
  120. The terminal device of claim 119, wherein the first processing module is specifically configured to:
    if the second condition is met, the MAC PDU of the message A in the first random access process is used as the MAC PDU of the third message in the third random access process;
    and/or the number of the groups of groups,
    and if the third condition is met, carrying out packet reassembly based on the MAC PDU of the message A in the first random access process to obtain the MAC PDU of the third message in the third random access process.
  121. The terminal device of claim 120, wherein, in reassembling packets based on MAC PDUs of message a in the first random access procedure, if a resource size of a third step message in the third random access procedure is greater than an authorized size of message a in the first random access procedure, the terminal device fills a remaining space of PDUs based on preset bits or new data.
  122. The terminal device of any of claims 119-121, wherein the first processing module is further configured to:
    and acquiring the MAC PDU of the message A in a buffer zone of the message A.
  123. The terminal device of any of claims 119-122, wherein the first processing module is further configured to:
    and storing the MAC PDU of the third step message in the third random access process obtained based on the MAC PDU of the message A in the first random access process in a third step message buffer.
  124. The terminal device of any of claims 115, 116, 120, 121, wherein the second condition comprises at least one of:
    the preamble set configured by the first random access process is the same as the preamble set configured by the second random access process;
    the preamble group selection threshold configured in the first random access process is the same as the preamble group selection threshold configured in the second random access process;
    the grant size of the third message of the second random access procedure is the same as the MAC PDU size of message a in the first random access procedure;
    the preamble set configured by the first random access process is the same as the preamble set configured by the third random access process;
    The preamble group selection threshold configured in the first random access process is the same as the preamble group selection threshold configured in the third random access process;
    the grant size of the third step message of the third random access procedure is the same as the MAC PDU size of message a in the first random access procedure.
  125. The terminal device of any of claims 115, 116, 120, 121, 124, wherein the third condition comprises at least one of:
    the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure;
    the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
    the grant size of the third message of the second random access procedure is different from the MAC PDU size of message a in the first random access procedure;
    the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
    the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
    The grant size of the third step message of the third random access procedure is different from the MAC PDU size of message a in the first random access procedure.
  126. The terminal device of any one of claims 115, 116, 120, 121, 124, 125, wherein in reassembling packets based on MAC PDUs of message a in the first random access procedure, the terminal device multiplexes data and/or MAC CEs according to their priority and/or priority.
  127. The terminal device of any of claims 115, 116, 120, 121, 124-126, wherein the terminal device preferentially multiplexes data in reassembling packets based on MAC PDUs of message a in the first random access procedure.
  128. The terminal device of any of claims 92-127, wherein the first processing module is further configured to:
    in case the fourth condition is met, the terminal device stops random access, stops performing backoff from the first random access procedure to the second random access procedure, or determines a random access failure.
  129. The terminal device of any of claims 92-128, wherein the first processing module is further configured to:
    In case the fourth condition is met, the terminal device stops random access, stops performing backoff from the first random access procedure to the third random access procedure, or determines a random access failure.
  130. The terminal device of claim 128 or 129, wherein the fourth condition includes:
    the preamble set configured by the first random access procedure is different from the preamble set configured by the second random access procedure;
    the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
    the grant size of the third message of the second random access procedure is different from the MAC PDU size of message a in the first random access procedure;
    the preamble set configured by the first random access procedure is different from the preamble set configured by the third random access procedure;
    the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
    the grant size of the third step message of the third random access procedure is different from the MAC PDU size of message a in the first random access procedure.
  131. The terminal device of any of claims 92-130, wherein the first processing module is further configured to:
    acquiring random access resources based on resource configuration information sent by network equipment; wherein the random access resources comprise general random access resources and/or random access resources for slices.
  132. The terminal device of claim 131, wherein said first processing module is further configured to:
    in case the random access resource does not comprise a random access resource for a slice, a random access procedure is performed using a generic random access resource.
  133. The terminal device of claim 131 or 132, wherein the slice-specific random access resources are applicable to a plurality of slices in its corresponding slice or corresponding slice group.
  134. The terminal device of any of claims 131-133, wherein the resource configuration information is included in a system information block, SIB, and/or radio resource control, RRC, signaling.
  135. The terminal device of any of claims 131-134, wherein the first processing module is further configured to:
    the first random access procedure is performed based on the random access resources for the slice.
  136. The terminal device of any of claims 92-135, wherein the first processing module is further configured to:
    and in the case that the random access resource for slicing is not configured, the access layer of the terminal equipment sends second information to the non-access layer of the terminal equipment, wherein the second information is used for indicating that the non-access layer does not send slicing information to the access layer.
  137. A network device, comprising:
    a first communication module, configured to send first information to a terminal device, so that the terminal device determines whether to perform a fallback from a first random access procedure to a second random access procedure based on the first information;
    wherein the first information is used for indicating whether to support or execute a fallback from the first random access procedure to the second random access procedure, or whether to support or execute a fallback from the first random access procedure to a third random access procedure.
  138. The network device of claim 137, wherein the first communication module is specifically configured to:
    transmitting the first information to the terminal equipment under the condition that the preamble group configured by the first random access process is different from the preamble group configured by the second random access process or the preamble group selection threshold configured by the first random access process is different from the preamble group selection threshold configured by the second random access process;
    Or,
    transmitting the first information to the terminal equipment under the condition that a preamble group configured in the first random access process is different from a preamble group configured in a third random access process or a preamble group selection threshold configured in the first random access process is different from a preamble group selection threshold configured in the third random access process;
    or,
    transmitting the first information to the terminal equipment under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the second random access process or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the second random access process;
    or,
    and sending the first information to the terminal equipment under the condition that the preamble group configured by the first random access process is the same as the preamble group configured by the third random access process or the preamble group selection threshold configured by the first random access process is the same as the preamble group selection threshold configured by the third random access process.
  139. The network device of claim 137 or 138, wherein the first communication module is further configured to:
    And sending resource configuration information to the terminal equipment, wherein the resource configuration information is used for indicating random access resources, and the random access resources comprise universal random access resources and/or random access resources for slicing.
  140. The network device of claim 139, wherein the random access resource for a slice is applicable to a plurality of slices in its corresponding slice or corresponding slice group.
  141. The network device of claim 139 or 140, wherein the resource configuration information is included in system information block, SIB, and/or radio resource control, RRC, signaling.
  142. A terminal device, comprising: a processor and a memory for storing a computer program, the processor invoking and running the computer program stored in the memory to perform the steps of the method of any of claims 1 to 86.
  143. A network device, comprising: a processor and a memory for storing a computer program, the processor invoking and running the computer program stored in the memory to perform the steps of the method of any of claims 87 to 91.
  144. A chip, comprising:
    A processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to perform the steps of the method of any one of claims 1 to 91.
  145. A computer readable storage medium storing a computer program, wherein,
    the computer program causes a computer to perform the steps of the method of any one of claims 1 to 91.
  146. A computer program product comprising computer program instructions, wherein,
    the computer program instructions cause a computer to perform the steps of the method of any one of claims 1 to 91.
  147. A computer program which causes a computer to perform the steps of the method of any one of claims 1 to 91.
  148. A communication system, comprising:
    a terminal device for performing the method of any one of claims 1 to 86;
    a network device for performing the method of any one of claims 87 to 91.
CN202180100344.8A 2021-10-21 2021-10-21 Random access method, terminal equipment and network equipment Pending CN117730614A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/125411 WO2023065244A1 (en) 2021-10-21 2021-10-21 Random access method, terminal device, and network device

Publications (1)

Publication Number Publication Date
CN117730614A true CN117730614A (en) 2024-03-19

Family

ID=86058650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202180100344.8A Pending CN117730614A (en) 2021-10-21 2021-10-21 Random access method, terminal equipment and network equipment

Country Status (2)

Country Link
CN (1) CN117730614A (en)
WO (1) WO2023065244A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111263462B (en) * 2019-01-30 2022-02-22 维沃移动通信有限公司 Random access method and device
WO2020154992A1 (en) * 2019-01-30 2020-08-06 Qualcomm Incorporated Random access procedure based on two-step random access channel procedure and four-step random access channel procedure
US11064537B2 (en) * 2019-02-01 2021-07-13 Qualcomm Incorporated Random access procedure fallback
CN111757529B (en) * 2019-03-29 2022-07-22 华为技术有限公司 Communication method, device and equipment

Also Published As

Publication number Publication date
WO2023065244A1 (en) 2023-04-27

Similar Documents

Publication Publication Date Title
CN113068271B (en) Random access method and device, network equipment and terminal
CN111837446B (en) Random access method and communication equipment
JP7182002B2 (en) Random access method and apparatus
CN112806088B (en) Random access method, terminal equipment and network equipment
EP3879883A1 (en) Random access process selection method and apparatus, chip, and computer program
US20230239774A1 (en) Network slicing information processing method, terminal device, and network device
JP7297866B2 (en) Random access method and related equipment
CN111989978A (en) Random access method and equipment
WO2020248944A1 (en) Random access method and apparatus
US20230217503A1 (en) Random access method and terminal device
US20230129426A1 (en) Wireless communication method and terminal device
WO2022126667A1 (en) Method for processing random access response, and network device and terminal device
CN112205061A (en) Resource association method and device, terminal and network equipment
WO2022067614A1 (en) Wireless communication method, terminal device, and network device
CN112997575B (en) Wireless communication method, terminal device and network device
WO2023065244A1 (en) Random access method, terminal device, and network device
EP3619991B1 (en) A communications device, method and copmputer program for transmission of a message in response to a random access response comprising multiple grants
CN114246013A (en) Wireless communication method and terminal device
US20220225433A1 (en) Wireless communication method, terminal device, and network device
WO2022099634A1 (en) Wireless communication method, terminal device, and network device
WO2023019409A1 (en) Information indication method, terminal device, network device, chip, and storage medium
CN110583060B (en) Communication device for message transmission in response to random access response and method thereof
CN116803141A (en) Wireless communication method, terminal equipment and network equipment
CN116783922A (en) Information indicating method, terminal device, network device, chip and storage medium
CN115299165A (en) Data transmission method, terminal equipment and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination