WO2019238110A1 - —种接入方法及设备 - Google Patents

—种接入方法及设备 Download PDF

Info

Publication number
WO2019238110A1
WO2019238110A1 PCT/CN2019/091208 CN2019091208W WO2019238110A1 WO 2019238110 A1 WO2019238110 A1 WO 2019238110A1 CN 2019091208 W CN2019091208 W CN 2019091208W WO 2019238110 A1 WO2019238110 A1 WO 2019238110A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
message
identifier
mac
network device
Prior art date
Application number
PCT/CN2019/091208
Other languages
English (en)
French (fr)
Inventor
邝奕如
姚楚婷
王键
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2019238110A1 publication Critical patent/WO2019238110A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • H04W74/085Random access procedures, e.g. with 4-step access with collision treatment collision avoidance

Definitions

  • the embodiments of the present application relate to the field of communications, and in particular, to an access method and device.
  • Terminal equipment usually needs to perform a random access procedure to access and access network equipment.
  • each terminal device needs to send its own identity to the network device through message 3, and the network device can resolve the competition based on the identity of each terminal device.
  • the network device sends a message 4 to the terminal device, and the message 4 carries the identifier of the terminal device that has successfully competed.
  • the 5G core network will assign a 5G SAE temporary mobile subscription identity (5G SAE-Temporary Mobile Subscriber Identity) to each terminal device.
  • 5G SAE-Temporary Mobile Subscriber Identity 5G SAE temporary mobile subscription identity
  • S-TMSI is used as the terminal's identity.
  • the length of 5G-S-TMSI is 48 bits. Because message 3 in Long Term Evolution (LTE) can only accommodate a 40-bit identity, the terminal device will use 5G-S- The 40 bits of TMSI are sent to the network device through message 3, and the remaining 8 bits of 5G-S-TMSI are sent to the network device through message 5.
  • message 4 cannot completely resolve the competition in the random access process of each terminal device.
  • the two terminal devices have different 5G-S-TMSI, but the first 40 bits of the 5G-S-TMSI of the two terminal devices are the same.
  • the message 4 includes the 5G-S of the two terminal devices.
  • -The first 40 bits of TMSI so after message 4, these two terminal devices consider themselves competing to successfully access the network, and will use the same configuration information (such as the same C-RNTI), causing confusion in subsequent scheduling. It can be seen that the prior art cannot completely solve the competition problem in the random access process of multiple terminal devices.
  • the embodiments of the present application provide an access method and device, which can completely solve the competition problem in the random access process of multiple terminal devices, and ensure that the terminal devices can perform normal communication.
  • an access method including: a terminal device first sending a first message to a network device, where the first message includes a first part of an identification of the terminal device; and subsequently, the terminal device receives a second message sent by the network device, The second message indicates whether the terminal device can resolve the competition; the terminal device can determine that it can resolve the competition according to the second message, and sends a third message to the network device.
  • the third message includes the second part of the identification of the terminal device, and the complete identification of the terminal device. It consists of the first part of the identification of the terminal device and the second part of the identification of the terminal device.
  • the terminal device receives a fourth message sent by the network device, and the fourth message indicates whether the terminal device can resolve the competition. If the terminal device determines that the competition can be resolved according to the fourth message, the terminal device accesses the network device.
  • the terminal device sends a part of its identity (such as 5G-S-TMSI) to the network device through a first message, and the network device receives the first message sent by each terminal device. It is not yet possible to completely distinguish between different terminal devices. Subsequently, the network device sends a second message to the terminal device. At this time, the competition of the terminal devices is not actually resolved. Further, the remaining part of the 5G-S-TMSI is sent to the network device in a third message, and the network device can completely distinguish the different terminal devices after receiving the remaining part of the 5G-S-TMSI sent by the terminal device, and further send it to the terminal device.
  • 5G-S-TMSI a part of its identity
  • the fourth message indicates whether the competition is resolved, and may specifically indicate the identity of the terminal that resolves the competition. In this way, after receiving the fourth message, the terminal device may determine whether it is competitively resolved by identifying the identifier in the fourth message. At this point, the competition for random access of terminal equipment can be completely resolved.
  • the terminal device determines that the competition cannot be resolved according to the fourth message, the connection with the network device is released.
  • the terminal device may determine that the competition fails according to the fourth message, and cannot successfully access the network, thereby releasing the connection with the network device, and then may initiate random access again.
  • the second possible implementation of the first aspect of the fourth message includes a first media access control MAC control unit CE, and the first MAC CE includes a terminal device.
  • the second part of the identification, or the first MAC CE includes the identification of the terminal device, or the first MAC CE includes part or the entire content of the third message, wherein the partial content of the third message includes at least the identification of the terminal device The second part.
  • the network device can completely distinguish each terminal device after receiving the third message sent by each terminal device. Therefore, the network device can indicate the second part of the identity of the terminal device whose competition is completely resolved or the competition is complete through the MAC CE. The identification of the resolved terminal device. Further, after receiving the fourth message, the terminal device can determine whether the competition can be completely resolved according to the MAC and CE therein.
  • the fourth message further includes a first logical channel identification value, and the first logical channel identification value is used to indicate the first MAC CE.
  • a special logical channel identification value is also designated to indicate the MAC CE included in the fourth message, so that the terminal device can identify the fourth message according to the channel identification value, and then determine whether the competition can be completely resolved.
  • the fourth message is a radio resource control RRC message, and the RRC message includes the first identifier of the terminal device. Part two, or the RRC message includes the identity of the terminal device, or the RRC message includes part or all of the third message, where the part of the third message includes at least the second part of the identity of the terminal device.
  • the network device can completely distinguish each terminal device after receiving the third message sent by each terminal device. Therefore, the network device can indicate the second part of the identity of the terminal device whose competition is completely resolved or the competition is complete through the RRC message. The identification of the resolved terminal device. After receiving the RRC message sent by the network device, the terminal device can determine whether the competition can be completely resolved.
  • the second message indicates whether the terminal device can resolve the competition.
  • the second message includes the second MAC CE, and the second MAC CE includes the first message. Partial content or all content, where the partial content of the first message includes at least the first part of the identification of the terminal device.
  • the network device may indicate the first part of the identity of the terminal device for contention resolution through MAC CE. After receiving the RRC message sent by the network device, the terminal device may determine whether the contention can be resolved. The contention resolution mentioned here is not completely resolved, because the first part of multiple terminal devices may be the same. After receiving the first message sent by each terminal, the network device does not completely distinguish all terminal devices, and the identifier indicated by the second message It may correspond to multiple terminal devices, and these terminal devices cannot completely resolve the competition after receiving the second message.
  • the identifier of the terminal device is X bits
  • the terminal device The first part of the identity of Y is Y bits
  • the second part of the identity of the terminal device is Z bits
  • X is equal to Y plus Z.
  • the identification of the terminal device may be divided into two parts, each part including several bits, and the two part bits are sent to the network device through the first message and the third message, respectively.
  • the method further includes: the terminal device sends a fifth message to the network device, the fifth message includes a random access preamble; the terminal device receives a sixth message sent by the network device, and the sixth message includes a random access response.
  • the terminal device sends a random access preamble to the network device, so that the network device can calculate the transmission delay between the terminal device and the terminal device according to the random access preamble, and the network device can update the foregoing by a random access response.
  • the transmission delay is sent to the terminal device, and the terminal device can calibrate the uplink timing according to the transmission delay.
  • the random access response includes a temporary cell wireless network temporary identification TC-RNTI
  • the method further includes: the terminal device according to the first After the four messages determine that the competition can be resolved, the terminal device sets the value of the TC-RNTI to the value of the cell wireless network temporary identity C-RNTI.
  • the terminal device after receiving the fourth message, determines that the contention can be resolved, and then sets the TC-RNT sent by the network device through the sixth message to the C-RNTI, which can be subsequently used for communication with the network device.
  • an access method including: a network device first receiving a first message sent by a terminal device, where the first message includes a first part of an identification of the terminal device; and then, the network device sends a second message to the terminal device, The second message indicates whether the terminal device can resolve the competition; the network device can also receive a third message sent by the terminal device.
  • the third message is sent to the network device after the terminal device determines that the competition can be resolved according to the second message.
  • the third message includes the terminal The second part of the identification of the device, the first part of the identification of the terminal device and the second part of the identification of the terminal device constitute the identification of the terminal device.
  • the network device sends a fourth message to the terminal device, and the fourth message indicates whether the terminal device can resolve the competition, so that the terminal device can determine whether it can access the network device according to the fourth message.
  • the terminal device sends a part of its identity (such as 5G-S-TMSI) to the network device through a first message, and the network device receives the first message sent by each terminal device. It is not yet possible to completely distinguish between different terminal devices. Subsequently, the network device sends a second message to the terminal device. At this time, the competition of the terminal devices is not actually resolved. Further, the remaining part of the 5G-S-TMSI is sent to the network device in a third message, and the network device can completely distinguish the different terminal devices after receiving the remaining part of the 5G-S-TMSI sent by the terminal device, and further send it to the terminal device.
  • 5G-S-TMSI a part of its identity
  • the fourth message indicates whether the competition is resolved, and may specifically indicate the identity of the terminal that resolves the competition. In this way, after receiving the fourth message, the terminal device may determine whether it is competitively resolved by identifying the identifier in the fourth message. At this point, the competition for random access of terminal equipment can be completely resolved.
  • the fourth message includes a first media access control MAC control unit CE, and the first MAC CE includes a second part of an identifier of the terminal device, or The first MAC CE includes the identity of the terminal device, or the first MAC CE includes part or all of the content of the third message, where the part of the third message includes at least the second part of the identity of the terminal device.
  • the fourth message further includes a first logical channel identification value, and the first logical channel identification value is used to indicate the first MAC CE.
  • the fourth message is a radio resource control RRC message
  • the RRC message includes the second part of the identity of the terminal device, or the RRC message includes the identity of the terminal device
  • the RRC message includes a part or all of the third message, where the part of the third message includes at least a second part of the identity of the terminal device.
  • the second message indicates whether the terminal device can resolve the competition.
  • the second message includes the second MAC CE, and the second MAC CE includes the first message. Partial content or all content, where the partial content of the first message includes at least the first part of the identification of the terminal device.
  • the identifier of the end device is X bits
  • the terminal device The first part of the identity of Y is Y bits
  • the second part of the identity of the terminal device is Z bits
  • X is equal to Y plus Z.
  • the method further includes: the network device receives a fifth message sent by the terminal device, the fifth message includes a random access preamble; the network device sends a sixth message to the terminal device, and the sixth message includes a random access response.
  • a terminal device including: a sending unit for sending a first message to a network device, the first message including a first part of an identification of the terminal device; and a receiving unit for receiving a second message sent by the network device Message, the second message indicates whether the terminal device can resolve the competition; the processing unit is configured to determine that the competition can be resolved according to the second message; and the sending unit is further configured to send the first to the network device when the processing unit determines that the competition can be resolved according to the second message
  • the third message includes the second part of the identification of the terminal device, and the complete identification of the terminal device is composed of the first part of the identification of the terminal device and the second part of the identification of the terminal device.
  • the receiving unit is further configured to receive a fourth message sent by the network device, where the fourth message indicates whether the terminal device can resolve the competition, and if the terminal device determines that the competition can be resolved according to the fourth message, access the network device.
  • the terminal device provided in the embodiment of the present invention sends a part of its own identity (for example, 5G-S-TMSI) to the network device through a first message, and the network device cannot fully distinguish the first message sent by each terminal device. For different terminal devices, the network device then sends a second message to the terminal device. At this time, the competition of the terminal devices is not actually resolved. Further, the remaining part of the 5G-S-TMSI is sent to the network device in a third message, and the network device can completely distinguish the different terminal devices after receiving the remaining part of the 5G-S-TMSI sent by the terminal device, and further send it to the terminal device.
  • the fourth message indicates whether the competition is resolved, and may specifically indicate the identity of the terminal that resolves the competition. In this way, after receiving the fourth message, the terminal device may determine whether it is competitively resolved by identifying the identifier in the fourth message. At this point, the competition for random access of terminal equipment can be completely resolved.
  • the processing unit is further configured to release the connection with the network device if it is determined according to the fourth message that the competition cannot be resolved.
  • the second possible implementation of the third aspect includes a fourth message including a first media access control MAC control unit CE, and the first MAC CE includes a terminal device.
  • the second part of the identification, or the first MAC CE includes the identification of the terminal device, or the first MAC CE includes part or the entire content of the third message, wherein the partial content of the third message includes at least the identification of the terminal device The second part.
  • the fourth message further includes a first logical channel identification value, and the first logical channel identification value is used to indicate the first MAC CE.
  • the fourth message is a radio resource control RRC message, and the RRC message includes the first identifier of the terminal device. Part two, or the RRC message includes the identity of the terminal device, or the RRC message includes part or all of the third message, where the part of the third message includes at least the second part of the identity of the terminal device.
  • the second message indicates whether the terminal device can resolve the competition.
  • the second message includes the second MAC CE, and the second MAC CE includes the first message. Partial content or all content, where the partial content of the first message includes at least the first part of the identification of the terminal device.
  • the identifier of the terminal device is X bits
  • the terminal device The first part of the identity of Y is Y bits
  • the second part of the identity of the terminal device is Z bits
  • X is equal to Y plus Z.
  • the sending unit is further configured to send the first to the network device. Before a message, a fifth message is sent to the network device, and the fifth message includes a random access preamble; the receiving unit is further configured to receive a sixth message sent by the network device, and the sixth message includes a random access response.
  • the random access response includes a temporary cell wireless network temporary identifier TC-RNTI
  • the processing unit is further configured to: After determining that the contention can be resolved in the fourth message, the value of the TC-RNTI is set to the value of the cell radio network temporary identity C-RNTI.
  • a network device including: a receiving unit configured to receive a first message sent by a terminal device, where the first message includes a first portion of an identification of the terminal device; a processing unit generating a second message and a second message Indicates whether the terminal device can resolve the competition; the sending unit is configured to send a second message to the terminal device; the receiving unit is further configured to receive a third message sent by the terminal device; the third message is determined by the terminal device based on the second message to resolve the competition
  • the third message sent back to the network device includes the second part of the identity of the terminal device, the first part of the identity of the terminal device and the second part of the identity of the terminal device form the identity of the terminal device.
  • the sending unit is further configured to send a fourth message to the terminal device, where the fourth message indicates whether the terminal device can resolve the competition, so that the terminal device can determine whether it can access the network device according to the fourth message.
  • the network device receives a first message sent by a terminal device, and obtains a part of an identifier of the terminal device (for example, 5G-S-TMSI).
  • the network device cannot fully receive the first message sent by each terminal device Differentiate different terminal devices.
  • the network device sends a second message to the terminal device.
  • the competition of the terminal devices is not actually resolved.
  • the remaining part of the 5G-S-TMSI is sent to the network device in a third message, and the network device can completely distinguish the different terminal devices after receiving the remaining part of the 5G-S-TMSI sent by the terminal device, and further send it to the terminal device.
  • the fourth message indicates whether the competition is resolved, and may specifically indicate the identity of the terminal that resolves the competition. In this way, after receiving the fourth message, the terminal device may determine whether it is competitively resolved by identifying the identifier in the fourth message. At this point, the competition for random access of terminal equipment can be completely resolved.
  • the fourth message includes a first media access control MAC control unit CE, and the first MAC CE includes a second part of an identifier of the terminal device, or, The first MAC CE includes the identity of the terminal device, or the first MAC CE includes part or all of the content of the third message, where the part of the third message includes at least the second part of the identity of the terminal device.
  • the fourth message further includes a first logical channel identification value, and the first logical channel identification value is used to indicate the first MAC CE.
  • the fourth message is a radio resource control RRC message, and the RRC message includes the second part of the identity of the terminal device, or the RRC message includes the identity of the terminal device Or, the RRC message includes a part or all of the third message, where the part of the third message includes at least a second part of the identity of the terminal device.
  • the second message indicates whether the terminal device can resolve the competition.
  • the second message includes the second MAC CE and the second MAC CE includes the first message. Partial content or all content, where the partial content of the first message includes at least the first part of the identification of the terminal device.
  • the identifier of the end device is X bits
  • the terminal device The first part of the identity of Y is Y bits
  • the second part of the identity of the terminal device is Z bits
  • X is equal to Y plus Z.
  • the receiving unit is further configured to receive the data sent by the terminal device.
  • the party receives a fifth message sent by the terminal device, where the fifth message includes a random access preamble; the sending unit is further configured to send a sixth message to the terminal device, and the sixth message includes a random access response.
  • a terminal device including: a transceiver configured to send a first message to a network device, where the first message includes a first portion of an identification of the terminal device; and a transceiver configured to receive a second message sent by the network device Message, the second message indicates whether the terminal device can resolve the competition; the processor is configured to determine that the competition can be resolved according to the second message; and the transceiver is further configured to send the first to the network device when the processor determines that the competition can be resolved according to the second message.
  • the third message includes the second part of the identification of the terminal device, and the complete identification of the terminal device is composed of the first part of the identification of the terminal device and the second part of the identification of the terminal device.
  • the transceiver is further configured to receive a fourth message sent by the network device, where the fourth message indicates whether the terminal device can resolve the competition, and if the terminal device determines that the competition can be resolved according to the fourth message, access the network device.
  • the terminal device provided in the embodiment of the present invention sends a part of its own identity (for example, 5G-S-TMSI) to the network device through a first message, and the network device cannot fully distinguish the first message sent by each terminal device. For different terminal devices, the network device then sends a second message to the terminal device. At this time, the competition of the terminal devices is not actually resolved. Further, the remaining part of the 5G-S-TMSI is sent to the network device in a third message, and the network device can completely distinguish the different terminal devices after receiving the remaining part of the 5G-S-TMSI sent by the terminal device, and further send it to the terminal device.
  • the fourth message indicates whether the competition is resolved, and may specifically indicate the identity of the terminal that resolves the competition. In this way, after receiving the fourth message, the terminal device may determine whether it is competitively resolved by identifying the identifier in the fourth message. At this point, the competition for random access of terminal equipment can be completely resolved.
  • the processor is further configured to release the connection with the network device if it is determined according to the fourth message that the competition cannot be resolved.
  • the second possible implementation of the fifth aspect includes a fourth message including a first media access control MAC control unit CE, and the first MAC CE includes a terminal device.
  • the second part of the identification, or the first MAC CE includes the identification of the terminal device, or the first MAC CE includes part or the entire content of the third message, wherein the partial content of the third message includes at least the identification of the terminal device The second part.
  • the fourth message further includes a first logical channel identification value, and the first logical channel identification value is used to indicate the first MAC CE.
  • the fourth message is a radio resource control RRC message, and the RRC message includes the first identifier of the terminal device. Part two, or the RRC message includes the identity of the terminal device, or the RRC message includes part or all of the third message, where the part of the third message includes at least the second part of the identity of the terminal device.
  • the second message indicates whether the terminal device can resolve the competition.
  • the second message includes the second MAC CE and the second MAC CE includes the first message. Partial content or all content, where the partial content of the first message includes at least the first part of the identification of the terminal device.
  • the identifier of the terminal device is X bits
  • the terminal device The first part of the identity of Y is Y bits
  • the second part of the identity of the terminal device is Z bits
  • X is equal to Y plus Z.
  • the transceiver is further configured to send the first to the network device. Before a message, a fifth message is sent to the network device, and the fifth message includes a random access preamble; the transceiver is further configured to receive a sixth message sent by the network device, and the sixth message includes a random access response.
  • the foregoing random access response includes a temporary cell wireless network temporary identifier TC-RNTI
  • the processor is further configured to: After determining that the contention can be resolved in the fourth message, the value of the TC-RNTI is set to the value of the cell radio network temporary identity C-RNTI.
  • a network device including: a transceiver for receiving a first message sent by a terminal device, the first message including a first part of an identification of the terminal device; a processor, generating a second message, and a second message Indicates whether the terminal device can resolve the competition; the transceiver is used to send a second message to the terminal device; the transceiver is also used to receive a third message sent by the terminal device, where the third message is determined by the terminal device to be able to resolve the competition according to the second message
  • the third message sent back to the network device includes the second part of the identity of the terminal device, the first part of the identity of the terminal device and the second part of the identity of the terminal device form the identity of the terminal device.
  • the transceiver is further configured to send a fourth message to the terminal device, where the fourth message indicates whether the terminal device can resolve the competition, so that the terminal device can determine whether it can access the network device according to the fourth message.
  • the network device receives a first message sent by a terminal device, and obtains a part of an identifier of the terminal device (for example, 5G-S-TMSI).
  • the network device cannot fully receive the first message sent by each terminal device Differentiate different terminal devices.
  • the network device sends a second message to the terminal device.
  • the competition of the terminal devices is not actually resolved.
  • the remaining part of the 5G-S-TMSI is sent to the network device in a third message, and the network device can completely distinguish the different terminal devices after receiving the remaining part of the 5G-S-TMSI sent by the terminal device, and further send it to the terminal device.
  • the fourth message indicates whether the competition is resolved, and may specifically indicate the identity of the terminal that resolves the competition. In this way, after receiving the fourth message, the terminal device may determine whether it is competitively resolved by identifying the identifier in the fourth message. At this point, the competition for random access of terminal equipment can be completely resolved.
  • the fourth message includes a first media access control MAC control unit CE, and the first MAC CE includes a second part of an identifier of the terminal device, or The first MAC CE includes the identity of the terminal device, or the first MAC CE includes part or all of the content of the third message, where the part of the third message includes at least the second part of the identity of the terminal device.
  • the fourth message further includes a first logical channel identification value, and the first logical channel identification value is used to indicate the first MAC CE.
  • the fourth message is a radio resource control RRC message
  • the RRC message includes the second part of the identity of the terminal device, or the RRC message includes the identity of the terminal device
  • the RRC message includes a part or all of the third message, where the part of the third message includes at least a second part of the identity of the terminal device.
  • the second message indicates whether the terminal device can resolve the competition.
  • the second message includes the second MAC CE and the second MAC CE includes the first message. Partial content or all content, where the partial content of the first message includes at least the first part of the identification of the terminal device.
  • the identifier of the end device is X bits
  • the terminal device The first part of the identity of Y is Y bits
  • the second part of the identity of the terminal device is Z bits
  • X is equal to Y plus Z.
  • the transceiver is further configured to receive the data sent by the terminal device. Before the first message, the party receives a fifth message sent by the terminal device, where the fifth message includes a random access preamble; the transceiver is further configured to send a sixth message to the terminal device, and the sixth message includes a random access response.
  • a computer-readable storage medium including: the computer-readable storage medium stores instructions; when the computer-readable storage medium is in the third aspect and any one of the third aspect and the fifth aspect, And when running on the terminal device described in any one of the implementation methods of the fifth aspect, the terminal device is caused to execute the implementation of the first aspect and any one of the implementation methods of the first aspect, the second aspect, and any one of the implementation methods of the second aspect. Access method described above.
  • a computer-readable storage medium including: the computer-readable storage medium stores instructions; when the computer-readable storage medium is in the fourth aspect and any one of the implementation manners of the fourth aspect, and the sixth
  • the network device When running on the network device according to any one of the implementation methods of the sixth aspect and the sixth aspect, the network device is caused to execute the first aspect and any one of the implementation methods of the first aspect, the second aspect, and any one of the implementation methods of the second aspect.
  • the access method is disclosed, including: the computer-readable storage medium stores instructions; when the computer-readable storage medium is in the fourth aspect and any one of the implementation manners of the fourth aspect, and the sixth When running on the network device according to any one of the implementation methods of the sixth aspect and the sixth aspect, the network device is caused to execute the first aspect and any one of the implementation methods of the first aspect, the second aspect, and any one of the implementation methods of the second aspect.
  • the access method including: the computer-readable storage medium stores instructions; when the computer-readable storage medium is in the fourth aspect and any one of the implementation
  • a wireless communication device including: the wireless communication device stores instructions; when the wireless communication device is in the third aspect and any one of the third aspect implementation manners, the fifth aspect, and any one of the fifth aspect
  • the terminal device When implemented on the terminal device, the terminal device is caused to execute the access method according to the foregoing first aspect and any one of the implementation methods of the first aspect, the second aspect, and any one of the implementation methods of the second aspect, wirelessly.
  • the communication device is a chip.
  • a wireless communication device including: the wireless communication device stores instructions; when the wireless communication device is in any one of the fourth aspect and the fourth aspect, the sixth aspect and the sixth aspect are arbitrary When running on the network device according to one implementation manner, the network device is caused to execute the access method according to the foregoing first aspect and any one implementation manner of the first aspect, the second aspect, and any implementation manner of the second aspect.
  • the wireless communication device is a chip. .
  • FIG. 1 is an architecture diagram of a communication network provided by an embodiment of the present invention according to an embodiment of the present application;
  • FIG. 3 is a structural block diagram of a network device according to an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of an access method according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a first MAC CE included in a fourth message according to an embodiment of the present invention.
  • FIG. 6 is another schematic diagram of a first MAC CE included in a fourth message according to an embodiment of the present invention.
  • FIG. 7 is another schematic diagram of a first MAC CE included in a fourth message according to an embodiment of the present invention.
  • FIG. 8 is another schematic flowchart of an access method according to an embodiment of the present invention.
  • FIG. 9 is another structural block diagram of a network device according to an embodiment of the present invention.
  • FIG. 10 is another structural block diagram of a network device according to an embodiment of the present invention.
  • FIG. 11 is a structural block diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 12 is another structural block diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 13 is another structural block diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 1 it is a structural diagram of a communication network provided by an embodiment of the present invention.
  • the network device is connected to a 5G core network.
  • the network device may be a 4G network device or a 5G network device.
  • RRC Radio Resource Control
  • the terminal equipment in the Radio Resource Control (RRC) idle state has uplink data to send, or the terminal equipment receives a paging message sent by the network equipment, the paging message indicates that the terminal needs to receive downlink data, and the terminal The device first communicates with the network device in advance. For example, the terminal device needs to access the network device before performing operations such as making a call, receiving a call, uploading data, or downloading data. Different terminal devices can establish connections with network devices through a competitive random access method. Referring to FIG.
  • the terminal device that resolves the competition can establish a connection with the network device, that is, it can further communicate with the network device.
  • the terminal device that does not resolve the competition cannot temporarily establish a connection with the network device, and can initiate random access again. Establish a connection with a network device.
  • the network device broadcasts a system message
  • the terminal device can obtain a random access preamble according to the system message broadcast by the network device in order to initiate random access.
  • a terminal device 1, a terminal device 2, and a terminal device 3 are taken as examples to describe a random access process in the prior art.
  • the random access process in the prior art includes the following five steps:
  • Step 201 The terminal device sends a random access request to the network device, and the random access request includes a random access preamble.
  • the random access preamble in the random access request is used to notify the network device that there is a random access request, and at the same time enables the network device to estimate the transmission delay between the terminal device and the terminal device and to calibrate the uplink timing.
  • the random access request may be referred to as message 1.
  • a PRACH resource is a physical resource used to send a random access preamble.
  • Step 202 The network device sends a random access response (Random Access Response (RAR)) to the terminal device.
  • RAR Random Access Response
  • the network device replies a random access response to multiple terminal devices that send random access requests, such as: terminal device 1, terminal device 2, and terminal device 3 in FIG.
  • the random access response may be referred to as message 2.
  • the message 2 may include a MAC Subprotocol Data Unit (subPDU) consisting of a Medium Access Control (MAC) subheader and a MACRAR, and one or more MAC subPDUs. Can form a MAC PDU.
  • the MAC RAR may include at least one of a timing advance (Timing, advance command), an uplink resource allocated to the message 3, and a temporary cell radio network temporary network (Temporary Identifier) assigned to the terminal device.
  • the terminal device receiving the RAR may perform uplink synchronization according to the TA, or may use the uplink resource allocated to the message 3 to send the message 3 to the network device.
  • the terminal device can change the TC-RNTI into a Cell Radio Network Temporary Identifier (C-RNTI).
  • C-RNTI Cell Radio Network Temporary Identifier
  • the terminal device After the terminal device sends the message 1 to the network device, it will receive the message 2 sent by the network device within the RAR time window (RA Response Window). If the terminal device does not receive the message 2 from the network device within this RAR time window, the terminal device considers that the random access process has failed. If the terminal device receives the message 2 returned by the network device within this RAR time window, step 203 is performed.
  • RAR time window RA Response Window
  • Step 203 The terminal device sends a message 3 to the network device, and the message 3 needs to include an identifier of each terminal device.
  • the terminal device that receives the random access response sends a message 3 to the network device, such as the terminal device 1, the terminal device 2, and the terminal device 3 in FIG.
  • message 3 may also be different according to different terminal device states and different application scenarios.
  • message 3 is the RRC Connection Request message (RRC Connection Request).
  • RRC Connection Request the RRC Connection Request message
  • the unique identifier of the terminal device carried in Message 3 may be the SAE-Temporary Mobile Subscriber Identity (SAE-Temporary Mobile Subscriber Identity, S). -TMSI) or a random number.
  • the network device that the terminal device requests to access is connected to the 5G core network.
  • the 5G core network will allocate 5G-S-TMSI as the terminal identity for each terminal device.
  • the terminal device identity is 48 bits in length 5G-S-TMSI.
  • message 3 needs to meet the requirements of the 4G network.
  • the size of message 3 in the 4G network is 56 bits, which can only accommodate identifiers with a length of 40 bits, such as 4G network SAE temporary Mobile subscription identity (SAE-Temporary Mobile Subscriber Identity, S-TMSI).
  • SAE-Temporary Mobile Subscriber Identity S-TMSI
  • the message 3 sent by the terminal device to the network device may follow the message 3 in the 4G network, and its length and format cannot be changed. It can only accommodate a 40-bit identifier. Such as S-TMSI of 4G network.
  • message 3 cannot send the complete 5G-S-TMSI, and only a part of 5G-S-TMSI can be sent to the network device through message 3. For example, send 40 bits of 5G-S-TMSI, and then send the rest of 5G-S-TMSI to the network device through other messages, such as sending the remaining 8 bits of 5G-S-TMSI.
  • Step 204 The network device sends a message 4 to the terminal device, and the message 4 carries the identifier of the terminal device for which the contention is resolved.
  • the network device sends a message 4 to a plurality of terminal devices that send the message 3, and indicates the terminal device that resolves the competition.
  • the network device in FIG. 2 sends the message 4 to the terminal device 1, the terminal device 2, and the terminal device 3.
  • each terminal device can determine whether the competition can be resolved by comparing the identifier in the message 4 with its own identifier. If the terminal device determines that the identifier in the message 4 is the same as the corresponding part of its own identifier, it determines that the competition can be resolved, that is, the terminal device can successfully access the network device after the competition is successful. If the identifier in message 4 is different from the corresponding part of its own identifier, that is, the terminal device cannot resolve the competition, that is, the terminal device fails to access the network device after the competition fails, and the terminal device can re-initiate random access.
  • message 4 also carries a part of the 5G-S-TMSI to specify the terminal equipment that successfully resolves the network device that has successfully entered the competition.
  • message 3 carries the right-most 40 bits of the 5G-S-TMSI of the terminal device that is settled by the competition.
  • each terminal device After each terminal device receives message 4, it determines that the 40-bit identifier is the most significant of its 5G-S-TMSI. Are the 40 bits on the right the same? If they are the same, the terminal device considers the contention resolved and can successfully access the network. Conversely, if they are not the same, the terminal device considers the competition unresolved and cannot successfully access the network.
  • Step 205 After receiving the message 4, the terminal device that has been settled by the competition needs to send a message 5 to the network device to notify the network device of the remaining part of its 5G-S-TMSI.
  • the terminal devices that are settled by competition may be terminal device 2 and terminal device 3.
  • the terminal devices that are settled by competition are not limited to terminal device 2 and terminal device 3, and are only used as an example here.
  • the embodiment of the present invention does not limit the terminal device for contention resolution.
  • the terminal device sends a part of the 5G-S-TMSI in the message 3 to the network device, and then sends the rest of the 5G-S-TMSI to the network device in the message 5, so that the terminal device finishes sending After message 5, the network equipment or core network can know the complete 5G-S-TMSI of the terminal equipment.
  • message 4 cannot completely resolve the competition of random access of all terminal devices. After message 4, there may be competition of multiple terminal devices that are not resolved. For example, two terminal devices have different 5G-S-TMSI, but a part of 5G-S-TMSI may be the same. If the message 4 sent by the network device carries the 5G-S of the two terminal devices -The same part of TMSI, after receiving the message 4, both terminals think that they have resolved the competition, successfully connected to the network, and will use the same configuration information, such as the same cell wireless network temporary identity C-RNTI, Causes confusion in subsequent scheduling.
  • An embodiment of the present invention provides an access method.
  • a terminal device sends a part of its 5G-S-TMSI to a network device through a first message. After receiving the first message sent by each terminal device, the network device cannot completely distinguish the difference. Then, the network device sends a second message to the terminal device. At this time, the competition of the terminal device is not actually resolved. Further, the remaining part of the 5G-S-TMSI is sent to the network device in a third message, and the network device can completely distinguish the different terminal devices after receiving the remaining part of the 5G-S-TMSI sent by the terminal device, and further send it to the terminal device.
  • the fourth message indicates whether the competition is resolved, and may specifically indicate the identity of the terminal that resolves the competition. In this way, after receiving the fourth message, the terminal device may determine whether it is competitively resolved by identifying the identifier in the fourth message. At this point, the competition for random access of terminal equipment can be completely resolved.
  • An embodiment of the present invention provides a network device 30.
  • the network device 30 includes an embodiment of the present invention.
  • the access method provided by the embodiment of the present invention can be applied to the network device shown in FIG.
  • the terminal device may include at least one processor 301, a memory 302, a transceiver 303, and a communication bus 304.
  • the processor 301 is a control center of a terminal device, and may be a processor or a collective name of multiple processing elements.
  • the processor 301 is a central processing unit (CPU), may also be a specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits configured to implement an embodiment of the present invention
  • CPU central processing unit
  • ASIC Application Specific Integrated Circuit
  • microprocessors digital signal processors, DSPs
  • FPGAs Field Programmable Gate Arrays
  • the processor 301 can execute various functions of the terminal device by running or executing a software program stored in the memory 302 and calling data stored in the memory 302.
  • the processor 301 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 3.
  • the terminal device may include multiple processors, such as the processor 301 and the processor 305 shown in FIG. 3. Each of these processors can be a single-core processor (single-CPU) or a multi-core processor (multi-CPU).
  • a processor herein may refer to one or more terminal devices, circuits, and / or processing cores for processing data (such as computer program instructions).
  • the memory 302 may be a read-only memory (ROM) or other type of static storage terminal device that can store static information and instructions, a random access memory (random access memory, RAM), or other information that can store information and instructions.
  • Type of dynamic storage terminal equipment can also be electrically erasable and programmable read-only memory (Erasable, Programmable, Read-Only Memory, EEPROM), Compact Disc (Read-Only Memory, CD-ROM) or other optical disk storage, Optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage terminal devices, or can be used to carry or store the desired program code in the form of instructions or data structures and Any other medium that can be accessed by a computer, but is not limited to this.
  • the memory 302 may exist independently, and is connected to the processor 301 through a communication bus 304.
  • the memory 302 may also be integrated with the processor 301.
  • the memory 302 is configured to store a software program that executes the solution of the present invention, and is controlled and executed by the processor 301.
  • the transceiver 303 uses a terminal device such as any transceiver for communication between other terminal devices.
  • the transceiver 303 can also be used to communicate with communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), and the like.
  • the transceiver 303 may include a receiving unit to implement a receiving function, and a transmitting unit to implement a transmitting function.
  • the communication bus 304 may be an Industry Standard Architecture (ISA) bus, an External Terminal Component (PCI) bus, or an Extended Industry Standard Architecture (EISA) bus.
  • ISA Industry Standard Architecture
  • PCI External Terminal Component
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only a thick line is used in FIG. 3, but it does not mean that there is only one bus or one type of bus.
  • the structure of the terminal device shown in FIG. 3 does not constitute a limitation on the terminal device, and may include more or less components than shown in the figure, or some components may be combined, or different component arrangements may be provided.
  • the network device 30 receives a first message sent by a terminal device, and the first message includes a first part of an identifier of the terminal device. Further, the network device 30 sends a second message to the terminal device, and the second message indicates whether the terminal device can resolve the competition. It should be noted that after receiving the first message sent by each terminal device, the network device 30 cannot completely distinguish different terminal devices, so the second message cannot completely resolve the random access competition of each terminal device. There are still some terminal devices. Competition is not resolved. After this, the network device 30 may also receive a third message sent by the terminal device, the third message includes the second part of the identification of the terminal device, the first part of the identification of the terminal device and the second part of the identification of the terminal device constitute the terminal device Logo.
  • the third message is sent by the terminal device to the network device after determining that the contention can be resolved according to the second message.
  • the network device 30 may also send a fourth message to the terminal device, and the fourth message indicates whether the terminal device can resolve the competition, so that the terminal device can determine whether it can access the network device according to the fourth message.
  • the network device 30 can completely distinguish the different terminal devices only after receiving the third message sent by the terminal device, and further sends a fourth message to the terminal device to indicate whether the competition is resolved. Specifically, the identifier of the terminal that the competition is resolved can be indicated. After the fourth message, you can determine whether you are competing to resolve by identifying the identifier in the fourth message. At this point, the competition for random access of terminal equipment can be completely resolved.
  • An embodiment of the present invention provides an access method. As shown in FIG. 4, the method includes the following steps:
  • Step 401 The terminal device sends a fifth message to the network device, where the fifth message includes a random access preamble.
  • the fifth message according to the embodiment of the present invention may be the message 1 shown in FIG. 2 of the embodiment of the present invention, and the network device is notified of the random access request of the terminal device by carrying a random access preamble.
  • Step 402 The network device sends a sixth message to the terminal device, where the sixth message includes a random access response.
  • the sixth message may be message 2 shown in FIG. 2.
  • the sixth message may include a MAC subPDU composed of a MAC subheader and a MAC RAR, and one or more MAC subPDUs constitute a MAC PDU.
  • the MAC RAR may include a timing advance (Timing, advance command), an uplink resource allocated to the first message, and a temporary cell wireless network temporary network identifier (Temporary Identifier, TC-RNTI) allocated to the terminal device. At least one.
  • the terminal device After the terminal device sends the fifth message to the network device, it will receive the sixth message sent by the network device within the RAR time window (RA Response Window). If the terminal device does not receive the sixth message from the network device within this RAR time window, the terminal device considers that the random access process has failed. If the terminal device receives the sixth message from the network device within this RAR time window, step 403 is performed.
  • Step 403 The terminal device sends a first message to the network device, where the first message includes a first part of the identifier of the terminal device.
  • the first message in the embodiment of the present invention may be message 3 shown in FIG. 2 in the embodiment of the present invention.
  • the first message is an RRC Connection Request message
  • the first message includes a first part of the identity of the terminal device.
  • the first part of the identity of the terminal device may be Part of 5G-S-TMSI for terminal equipment.
  • the first message may further include an establishment cause, which is used to indicate a reason for initiating an RRC connection request.
  • the network device is connected to a 5G core network, and the identifier of the terminal device may be a 5G-S-TMSI with a length of 48 bits.
  • the network device is an LTE network device or an NR network device.
  • the first message sent by the terminal device to the network device can only carry a 40-bit terminal device identifier, so the first message cannot carry the complete 5G-S-TMSI.
  • a part of the identifier of the terminal device may be sent to the network device through a first message, such as: the first part of the identifier of the terminal device according to the embodiment of the present invention, and of course, the first part of the identifier of the terminal device
  • the length is less than or equal to 40 bits, that is, it needs to be within the range of the first message.
  • the identifier of the terminal device is X bits
  • the first part of the identifier of the terminal device is Y bits
  • Y is an integer less than or equal to 40
  • the second part of the identifier of the terminal device is Z bits.
  • X is equal to Y plus Z.
  • the first part of the identifier of the terminal device may be Y consecutive bits or Y discontinuous bits.
  • the second part of the identifier of the terminal device may be Z consecutive bits or Z discontinuous bits.
  • the embodiments of the present invention are not limited in comparison, and the first part of the identification of the terminal device and the second part of the identification of the terminal device may constitute the identification of the terminal device.
  • the first part of the identity of the terminal device may be the rightmost 40 bits of the 5G-S-TMSI
  • the second part of the identity of the terminal device may be the remaining 8 bits of the 5G-S-TMSI.
  • the identification of the terminal device is "1101101" and the length is 7 bits.
  • the first part of the identification of the terminal device can be the rightmost 4 bits "1101"
  • the second part of the identification of the terminal device can be The remaining 3 bits are "110".
  • the terminal device identifiers may also be different.
  • the first message is an RRC connection request message, and the identity of the terminal device may be 5G-S-TMSI or a random number
  • the first message is an RRC connection reconstruction message
  • the identity of the terminal device may also be C-RNTI.
  • the network device sends a second message to the terminal device, and the second message indicates whether the terminal device can resolve the competition.
  • the second message in the embodiment of the present invention may be message 4 shown in FIG. 2.
  • the second message includes a second Medium Access Control (MAC) control element (CE), and the second MAC CE includes part or all of the first message.
  • a part of the content of the first message includes at least a first part of the identification of the terminal device.
  • the terminal device since the terminal device sends only a part of the 5G-S-TMSI to the network device through the first message, after receiving the first message sent by each terminal device, the network device can only know to send the first message. Part of the identification of each terminal is not able to completely distinguish all terminal devices.
  • part of the identifier carried by the network device in the second message may correspond to multiple terminal devices, for example, the rightmost 40 bits of the 5G-S-TMSI of multiple terminal devices are the same, and the second message carries these 40 Bits. Therefore, the terminal device can only resolve the random access competition of a part of the terminal devices by sending the second message.
  • the terminal device After receiving the second message sent by the network device, the terminal device can parse the second message to obtain the identifier therein. Further, the obtained identification may be compared with its own identification. If the identification in the second message is the same as the corresponding part of the identification of the terminal device, the competition is considered to be resolved and step 405 is performed; if the identification in the second message is identical to the terminal The corresponding part of the device's own identifier is different, it is considered that the competition is not resolved, and the network device cannot be successfully accessed, and random access can be re-initiated.
  • the corresponding part of the identifier in the second message and the identifier of the terminal device itself can be understood as: which bits of the terminal device ’s identifier are carried in the first message by the terminal device, and the second message is received After the message, it needs to be compared with these bits accordingly.
  • the first message carries the rightmost 40 bits of 5G-S-TMSI.
  • the terminal device parses the identifier in the second message, it needs to compare with the rightmost 40 bits of its 5G-S-TMSI. If they are the same, the competition is considered to be resolved and step 405 is performed. Conversely, if they are different, the competition is considered unsolved.
  • Step 405 The terminal device determines that the competition can be resolved, and then sends a third message to the network device, where the third message includes a second part of the identity of the terminal device.
  • the third message in the embodiment of the present invention may be the message 5 shown in FIG. 2.
  • the message 5 needs to contain the remaining part of the identity of the terminal device.
  • the first message carries the 5G-S-TMSI rightmost 40 bits
  • the third message carries the remaining 8 bits of 5G-S-TMSI.
  • the network device can know the identity of each terminal device after receiving the third message sent by each terminal device. The entire content of 5G-S-TMSI can completely distinguish each terminal device that sends the third message.
  • the network device sends a fourth message to the terminal device, and the fourth message indicates whether the terminal device can resolve the competition.
  • the network device specifies the terminal device that successfully accesses the network, that is, the terminal device that resolves the competition, in the fourth message. After the network device receives the third message sent by the terminal device, it can completely distinguish each terminal device that sends the third message. Further, the identifier carried in the fourth message may correspond to only one terminal device, that is, resolved by the competition specified in the fourth message. There is only one terminal device. In this way, the competition for random access of all terminal devices can be completely solved.
  • the fourth message may include a first media access control MAC control unit CE, the first MAC CE includes a second part of the identifier of the terminal device, or the first MAC CE includes the terminal The identifier of the device, or the first MAC CE includes part or all of the content of the third message, where the content of the third message includes at least a second part of the identifier of the terminal device.
  • the fourth message includes a first MAC CE
  • the MAC CE includes the second part of the identification of the contention-resolved terminal device designated by the network device.
  • the first part of the identity of the terminal device is the rightmost 40 bits of the 5G-S-TMSI of the terminal device
  • the second part of the identity of the terminal device is the remaining 8 bits of the 5G-S-TMSI of the terminal device.
  • the MAC CE One possible format is shown in Figure 5.
  • the length of the MAC CE is one byte (Octet, Oct), and this MAC CE includes the remaining 8 bits of 5G-S-TMSI.
  • the fourth message includes a first MAC CE, which contains the first part of the identity of the terminal device and the second part of the identity of the terminal device, that is, the complete 5G-S-TMSI.
  • a possible format of the MAC CE is shown in Figure 6.
  • the length of the MAC CE is 8 bytes.
  • This MAC CE includes a 48-bit complete 5G-S-TMSI, and a 48-bit complete 5G-S-
  • the TMSI is divided into 8 parts in turn, and each part is 8 bits in length.
  • the 8 bytes included in the MAC CE include the 8 parts of 5G-S-TMSI, and the first byte of the MAC CE includes 5G- The first 8 bits of S-TMSI, the second byte of MAC CE includes the second 8 bits of 5G-S-TMSI, and the third byte of MAC CE includes the third 8 of 5G-S-TMSI Bits, the fourth byte of MAC CE includes the fourth 8 bits of 5G-S-TMSI, the fifth byte of MAC CE includes the fifth 8 bits of 5G-S-TMSI, and the sixth byte of MAC CE The byte includes the sixth 8-bit of 5G-S-TMSI, the seventh byte of MAC CE includes the seventh 8-bit of 5G-S-TMSI, and the eighth byte of MAC CE includes 5G-S-TMSI The eighth bit.
  • the fourth message includes a first MAC CE, which includes part or all of the content of the third message.
  • the MAC CE includes q bits of the third message, or the MAC CE includes the Dedicated Control Channel (DCCH) Service Data Unit (SDU) of the third message.
  • DCCH Dedicated Control Channel
  • SDU Service Data Unit
  • One bit, that is, the fourth message includes only part of the content of the third message.
  • the q bits described in the embodiment of the present invention may refer to the rightmost q bits. These q bits need to include at least the second part of the identifier of the terminal device, so that the terminal device can confirm whether it can resolve the competition after receiving the fourth message.
  • the MAC CE may also include the entire content of the third message.
  • 5G-S-TMSI can be indicated through part of the third message to indicate different terminal devices, the fourth message needs to be able to reflect this part of the third message.
  • the length of the MAC CE may be 2 bytes.
  • This MAC CE includes the first 16 bits of the third message, that is, the rightmost 16 bits of the third message.
  • the first 16 bits of the third message are divided into 2 parts in order from right to left, and each part is 8 bits in length.
  • the 2 bytes included in the MAC CE are divided into 2 parts, each Each part consists of 8 bits, which are called the first 8 bits and the second 8 bits in order from right to left.
  • the first byte of the MAC CE includes the first 8 bits, which is the rightmost 8 bits of the third message, and the second byte of the MAC CE includes the second 8 bits, which is of the rightmost 16 bits of the third message 8 bits other than the first 8 bits mentioned above.
  • the fourth message may further include a first logical channel identification value (LCID), where the first logical channel identification value is used to indicate a first MAC CE in the fourth message, as shown in FIG. 5
  • different logical channel identifier values may indicate different MAC CEs.
  • the logical channel identifier value corresponding to the first MAC CE in the fourth message is one of the original reserved LCID values.
  • the logical channel identification value corresponding to the first MAC CE is the value 110110 of the original reserved LCID values 100010-110101.
  • the first logical channel identification value is in the MAC subheader in the MAC subPDU in the MAC PDU of the fourth message.
  • the MAC subheader in the MAC subPDU includes the first logical channel identification value, it indicates that the MAC subsubPDU includes The first MAC CE, where the format of the first MAC CE may be the format of the first MAC CE shown in FIG. 5, FIG. 6, or FIG. 7.
  • the fourth message may also be an RRC message, where the RRC message includes a second part of the identity of the terminal device, or the RRC message includes the identity of the terminal device, or the The RRC message includes part or all of the third message, wherein the part of the third message includes at least a second part of the identity of the terminal device.
  • the RRC message includes q bits in the third message, or the MAC CE includes the dedicated control channel (Dedicated Control Channel, DCCH) service data unit (SDU) in the third message.
  • Bit that is, the fourth message includes only part of the content of the third message.
  • the q bits may refer to the rightmost q bits.
  • the RRC message may also include the entire content of the third message. It should be noted that if 5G-S-TMSI can be indicated through part of the third message to indicate different terminal devices, the RRC message needs to be able to reflect this part of the third message.
  • the terminal device determines that it can resolve the competition according to the fourth message, and then accesses the network device.
  • the terminal device After receiving the fourth message, the terminal device can parse the fourth message to obtain the identifier or content therein.
  • the obtained identity may be compared with its own identity. If the identity in the second message is the same as the corresponding part of the identity of the terminal device, it is considered that the competition can be resolved and the network device can be successfully accessed; If the identification in the fourth message is different from the corresponding part of the identification of the terminal device itself, it is considered that the competition is not resolved and the network device cannot be successfully accessed, and random access can be re-initiated. It should be noted that the corresponding part of the identification in the fourth message and the identification of the terminal device itself can be understood as: which bits of the identification of the terminal device are carried in the fourth message by the terminal device, and the terminal device needs to correspondingly Compare with these bits identified by itself.
  • the fourth message carries the remaining 8 bits of 5G-S-TMSI. After the terminal device parses the identifier in the fourth message, it needs to compare with the remaining 8 bits of itself, or the fourth message carries It is the complete 48 bits of 5G-S-TMSI. After the terminal device parses the identifier in the fourth message, it needs to compare with the 48 bits of its 5G-S-TMSI.
  • the terminal device may also compare the content obtained through the fourth message with part or all of the content of the third message sent by itself. If the content in the second message is the same as part or all of the third message sent by the terminal device, it is considered that the competition can be resolved and the network device can be successfully accessed; if the content in the fourth message is the same as the first message sent by the terminal device If some or all of the three messages are different, it is considered that the competition is not resolved, and the network equipment cannot be successfully accessed, and random access can be re-initiated.
  • the fourth message carries q bits in the third message. After the terminal device parses out the content in the fourth message, it needs to compare with the q bits in the third message sent by itself.
  • the contention resolution in this step is a complete contention resolution, that is, the contention resolution is performed for message 5. After the contention resolution in this step, there will be no conflicting two terminal devices, and the network device can correctly identify each Terminal Equipment.
  • the terminal device can continue to communicate with the network device in the RRC connection state.
  • the terminal device may further change the value of the TC-RNTI in the message 2 to the value of the C-RNTI, that is, change the TC-RNTI to the C-RNTI.
  • the network device may use The C-RNTI scrambles the downlink message. After receiving the downlink message, the terminal device can use the C-RNTI to descramble to ensure normal communication with the network device.
  • the terminal device to be accessed is UE1, UE2, UE3 as an example, and an access method provided by an embodiment of the present invention is introduced. Referring to FIG. 8, the method includes the following steps:
  • S1, UE1, UE2, and UE3 receive the broadcast message of the base station, and obtain a random access preamble in the broadcast message.
  • identifiers of UE1, UE2, and UE3 are 0001111, 0011111, and 0110110, respectively. Among them, UE1, UE2, and UE3 have selected the same random access preamble and PRACH resource.
  • S2, UE1, UE2, and UE3 send message 1 to the base station, including a random access preamble.
  • the base station sends message 2 to UE1, UE2, and UE3, and message 2 includes a random access response.
  • S4 UE1, UE2, and UE3 send message 3 to the base station, which respectively carry the four rightmost bits of their respective identifiers.
  • the message 3 sent by UE1 carries "1111”
  • the message 3 sent by UE2 carries “1111”
  • the message 3 sent by UE3 carries "1010”.
  • the base station sends message 4 to UE1, UE2, and UE3, carrying "1111".
  • the base station designates the terminal device corresponding to "1111" as the terminal device for resolving the competition. Therefore, the message 4 sent by the base station to UE1, UE2, and UE3 all carries "1111".
  • S6, UE1, UE2 sends a message 5 to the base station, carrying "000” and "001", respectively.
  • the UE1 parses the message 4 to obtain the identifier "1111".
  • the "1111” is the same as the first four bits of the identifier "1111000", determines that it can resolve the competition, and indicates its own to the base station. The remainder of the label is "000”.
  • the UE2 parses the message 4 to obtain the identifier "1111”.
  • the "1111” is the same as the rightmost four bits of the identifier "1111001". It determines that it can resolve the competition and indicates the identity of the identifier to the base station. The remaining part is "001”.
  • UE3 parses the message 4 to obtain the identifier "1111”.
  • the "1111” is different from the rightmost four bits of its identifier "1010011”. It determines that it cannot resolve the competition and can then re-initiate random access. .
  • the base station sends a message 6 to UE1 and UE2, carrying "000".
  • the base station designates the terminal device corresponding to "000" as the terminal device for resolving the competition. Therefore, the message 6 sent by the base station to UE1, UE2, and UE3 all carries "000".
  • the UE1 parses the message 6 to obtain the identifier "000", and "000” is the same as its own identifier "1111000" with the remaining 3 bits "000” except the rightmost 4 bits, and determines itself. Able to resolve competition.
  • FIG. 5 shows a possible structural diagram of the foregoing network device.
  • the network device includes a receiving unit 901, a processing unit 902, and a sending unit 903.
  • the receiving unit 901 is configured to support the network device to perform step 401 in the foregoing embodiment, and / or other processes used in the technology described herein.
  • a processing unit 902 configured to support the network device to generate the second message, the fourth message, and the sixth message according to the embodiment of the present invention, and / or other processes used in the technology described herein;
  • a sending unit 903 is configured to support the network device to perform steps 402, 404, and 406 in the foregoing embodiments, and / or other processes used in the technology described herein;
  • the network device includes a processing module 1001 and a communication module 1002.
  • the processing module 1001 is configured to control and manage the actions of the network device, for example, to execute the steps performed by the processing unit 902 described above, and / or to perform other processes of the technology described herein.
  • the communication module 1002 is configured to support interaction between a network device and other devices. For example, the steps performed by the receiving unit 901 and the sending unit 903 described above are performed.
  • the network device may further include a storage module 1003.
  • the storage module 1003 is configured to store program code and data of the network device.
  • the network device may be the network device shown in FIG. 3.
  • FIG. 11 illustrates a possible structural diagram of a terminal device involved in the foregoing embodiment.
  • the terminal device includes a sending unit 1101, a receiving unit 1102, and a processing unit 1103.
  • the receiving unit 1101 is configured to support the terminal device to perform steps 402, 404, and 406 in the foregoing embodiments, and / or other processes used in the technology described herein;
  • the sending unit 1102 is configured to support the terminal device to perform the sending processes in steps 401, 403, and 405 in the above embodiments, and / or other processes used in the technology described herein;
  • the processing unit 1103 is configured to support the terminal device to perform a process determined in step 405 in the foregoing embodiment that can resolve the competition, and / or other processes used in the technology described herein.
  • the terminal device includes a processing module 1201 and a communication module 1202.
  • the processing module 1201 is configured to control and manage the actions of the terminal device, for example, to execute the steps performed by the processing unit 1103 described above, and / or to perform other processes of the technology described herein.
  • the communication module 1202 is configured to support interaction between the terminal device and other devices, for example, execute the steps performed by the receiving unit 1101 and the sending unit 1102, and perform various interactions with network devices.
  • the terminal device may further include a storage module 1203.
  • the storage module 1203 is configured to store program code and data of the terminal device.
  • the terminal device is the terminal device shown in FIG. 13.
  • the terminal device may include at least one processor 1301, a memory 1302, a transceiver 1303, and a communication bus 1304.
  • the processor 1301, the memory 1302, and the transceiver 1303 are connected through a communication bus 1304.
  • the processor 1301 is a control center of the terminal device.
  • the processor 1301 can execute various functions of the terminal device by running or executing a software program stored in the memory 1302 and calling data stored in the memory 1302.
  • the processor 1301 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 13.
  • the terminal device may include multiple processors, such as the processor 1301 and the processor 1305 shown in FIG. 13. Each of these processors can be a single-core processor (single-CPU) or a multi-core processor (multi-CPU).
  • a processor herein may refer to one or more terminal devices, circuits, and / or processing cores for processing data (e.g., computer program instructions).
  • the transceiver 1303 uses a terminal device such as any transceiver for communication between other devices, such as communication with a terminal device.
  • a terminal device such as any transceiver for communication between other devices, such as communication with a terminal device.
  • the transceiver 1303 can also be used to communicate with a communication network.
  • the structure of the terminal device shown in FIG. 13 does not constitute a limitation on the terminal device, and may include more or fewer components than those shown in the figure, or some components may be combined, or different components may be arranged.
  • An embodiment of the present invention also provides a computer-readable storage medium, where the computer-readable storage medium stores instructions; when the computer-readable storage medium is run on the network device shown in FIG. 9, FIG. 10, and FIG. 3, The terminal device executes the access method shown in FIG. 4.
  • An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores instructions; including: the computer-readable storage medium stores instructions; when the computer-readable storage medium is shown in FIGS. 11 and 12 And when running on the terminal device shown in FIG. 13, the terminal device is caused to execute the access method shown in FIG. 4.
  • An embodiment of the present invention further provides a wireless communication device, and the wireless communication device stores instructions; when the wireless communication device is running on the network device shown in FIG. 9, FIG. 10, and FIG. 3, the wireless communication device is executed according to FIG. 4. Access method shown.
  • the wireless communication device may be a chip.
  • An embodiment of the present invention further provides a wireless communication device.
  • the wireless communication device stores instructions.
  • the wireless communication device executes the diagram.
  • the wireless communication device may be a chip.
  • the disclosed database access device and method can be implemented in other ways.
  • the embodiments of the database access device described above are merely schematic.
  • the division of the modules or units is only a logical function division.
  • Components can be combined or integrated into another device, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, database access devices or units, and may be electrical, mechanical or other forms.
  • the unit described as a separate component may or may not be physically separated, and the component displayed as a unit may be a physical unit or multiple physical units, that is, may be located in one place, or may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
  • the integrated unit When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a readable storage medium.
  • the technical solutions of the embodiments of the present application essentially or partly contribute to the existing technology or all or part of the technical solutions may be embodied in the form of a software product, which is stored in a storage medium
  • the instructions include a number of instructions for causing a device (which can be a single-chip microcomputer, a chip, or the like) or a processor to execute all or part of the steps of the method described in the embodiments of the present application.
  • the foregoing storage medium includes various media that can store program codes, such as a U disk, a mobile hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例公开了一种接入方法及设备,涉及通信领域,能够完全解决多个终端设备随机接入过程中的竞争问题,保证终端设备能够进行正常的通信。包括:终端设备向网络设备发送第一消息,第一消息包括终端设备的标识的第一部分;终端设备接收网络设备发送的第二消息,第二消息指示终端设备是否能够解决竞争;终端设备根据第二消息确定能够解决竞争,则向网络设备发送第三消息,第三消息包括终端设备的标识的第二部分,终端设备的标识的第一部分和终端设备的标识的第二部分组成终端设备的标识;终端设备接收网络设备发送的第四消息,第四消息指示终端设备是否能够解决竞争;终端设备根据第四消息确定能够解决竞争,则接入网络设备。

Description

[根据细则91更正 25.09.2019] —种接入方法及设备 技术领域
本申请实施例涉通信领域,尤其涉及一种接入方法及设备。
背景技术
终端设备(User equipment,UE)通常需要进行随机接入过程过程才能接入接入网络设备。在基于竞争的(Contention based)随机接入过程中,各个终端设备需要通过消息3将自己的标识发送给网络设备,网络设备可以基于各个终端设备的标识解决竞争。具体地,网络设备向终端设备发送消息4,消息4中携带竞争成功的终端设备的标识。
在第五代(5 Generation,5G)新接入(New Radio,NR)系统中,5G核心网会为每个终端设备分配5G SAE临时移动订阅标识(5 Generation SAE-Temporary Mobile Subscriber Identity,5G-S-TMSI)作为终端的标识,5G-S-TMSI的长度为48比特,由于长期演进技术(Long Term Evolution,LTE)中的消息3只能容纳40比特的标识,终端设备将5G-S-TMSI的40比特通过消息3发送给网络设备,将5G-S-TMSI的其余8比特通过消息5发送给网络设备。
但是消息4并不能完全解决各个终端设备随机接入过程中的竞争,在消息4之后还可能存在多个终端设备的竞争没有解决。示例的,两个终端设备具有不同的5G-S-TMSI,但是这两个终端设备的5G-S-TMSI的前40比特是相同的,假设消息4中包括这两个终端设备的5G-S-TMSI的前40比特,因此在消息4之后这两个终端设备都认为自己竞争成功接入了网络,并且会使用相同的配置信息(如相同的C-RNTI),造成后续调度的混乱。可见,现有技术并不能完全解决多个终端设备随机接入过程中的竞争问题。
发明内容
本申请实施例提供一种接入方法及设备,能完全解决多个终端设备随机接入过程中的竞争问题,保证终端设备能够进行正常的通信。
为达到上述目的,本申请实施例采用如下技术方案:
第一方面,公开了一种接入方法,包括:终端设备首先向网络设备发送第一消息,第一消息包括终端设备的标识的第一部分;随后,终端设备接收网络设备发送的第二消息,第二消息指示终端设备是否能够解决竞争;终端设备可以根据第二消息确定能够解决竞争,并向网络设备发送第三消息,第三消息包括终端设备的标识的第二部分,终端设备完整的标识由上述终端设备的标识的第一部分和终端设备的标识的第二部分组成。进一步,终端设备接收网络设备发送的第四消息,第四消息指示终端设备是否能够解决竞争,如果终端设备根据第四消息确定能够解决竞争,则接入网络设备。
本发明实施例提供的接入方法中,终端设备将自己的标识(如:5G-S-TMSI)的一部分在通过第一消息发送给网络设备,网络设备接收各个终端设备发送的第一消息后还不能完全区分不同的终端设备,随后,网络设备向终端设备发送第二消息,此时终端设备的竞争实际上没有解决。进一步,5G-S-TMSI的剩余部分放在第三消息中发送给网络设备,网络设备接收到终端设备发送的5G-S-TMSI的剩余部分才能完全区分不同的终端设备,进一步向终端设备发送第四消息指示竞争是否解决,具体可以指示竞争解决的终端的标识,如此,终端设备接收到第四消息后,可以通过识别第四消息中的标识确定自己是否竞争解决。至此,才能完全解决终端设备随机接入的竞争。
结合第一方面,在第一方面的第一种可能的实现方式中,若终端设备根据第四消息确定不能解决竞争,则释放与网络设备的连接。
在本发明实施例中,终端设备可以根据第四消息确定竞争失败,不能成功接入网络,进而可以释放 与网络设备的连接,之后可以再次发起随机接入。
结合第一方面或第一方面的第一种可能的实现方式,在第一方面的第二种可能的实现第四消息包括第一媒体接入控制MAC控制单元CE,第一MAC CE包括终端设备的标识的第二部分,或者,第一MAC CE包括终端设备的标识,或者,第一MAC CE包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
本发明实施例中,网络设备接收到各个终端设备发送的第三消息后才能完全区别各个终端设备,因此,网络设备可以通过MAC CE指示竞争完全解决的终端设备的标识的第二部分或竞争完全解决的终端设备的标识,进一步,终端设备接收第四消息后可以根据其中的MAC CE判断是否能够完全解决竞争。
结合第一方面的第二种可能的实现方式,在第一方面的第三种可能的实现方式中,第四消息还包括第一逻辑信道标识值,第一逻辑信道标识值用于指示第一MAC CE。
本发明实施例中还指定了专门的逻辑信道标识值来指示第四消息包括的MAC CE,以便终端设备可以根据辑信道标识值来识别第四消息,进而判断是否能够完全解决竞争。
结合第一方面或第一方面的第一种可能的实现方式,在第一方面的第四种可能的实现方式中,第四消息为无线资源控制RRC消息,RRC消息包括终端设备的标识的第二部分,或者,RRC消息包括终端设备的标识,或者,RRC消息包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
本发明实施例中,网络设备接收到各个终端设备发送的第三消息后才能完全区别各个终端设备,因此,网络设备可以通过RRC消息指示竞争完全解决的终端设备的标识的第二部分或竞争完全解决的终端设备的标识,终端设备接收网络设备发送的这个RRC消息后可以判断是否能够完全解决竞争。
结合第一方面,在第一方面的第五种可能的实现方式中,第二消息指示终端设备是否能够解决竞争具体包括:第二消息包括第二MAC CE,第二MAC CE包括第一消息的部分内容或全部内容,其中,第一消息的部分内容至少包括终端设备的标识的第一部分。
本发明实施例中,网络设备可以通过MAC CE指示竞争解决的终端设备的标识的第一部分,终端设备接收网络设备发送的这个RRC消息后可以判断是否能够解决竞争。这里所说的竞争解决并不完全解决,因为有可能多个终端设备的第一部分相同,网络设备收到各个终端发送的第一消息后并不完全区分所有终端设备,通过第二消息指示的标识可能对应多个终端设备,这些终端设备接收到第二消息后并不能完全解决竞争。
结合第一方面或第一方面的第一至第五种可能的实现方式中的任意一种,在第一方面的第六种可能的实现方式中,终端设备的标识为X个比特,终端设备的标识的第一部分为Y个比特,终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
在本发明实施例中,可以将终端设备的标识分成两部分,每一部分包括若干个比特,分别通过第一消息、第三消息将两部分比特发送给网络设备。
结合第一方面或第一方面的第一至第六种可能的实现方式中的任意一种,在第一方面的第七种可能的实现方式中,终端设备向网络设备发送第一消息之前,方法还包括:终端设备向网络设备发送第五消息,第五消息包括随机接入前导码;终端设备接收网络设备发送的第六消息,第六消息包括随机接入响应。
在本发明实施例中,终端设备向网络设备发送随机接入前导码,使得网络设备可以根据随机接入前导码计算与终端设备之间的传输时延,网络设备可以通过随机接入响应将上述传输时延发送给终端设备,终端设备可以根据该传输时延校准上行定时。
结合第一方面的第七种可能的实现方式,在第一方面的第八种可能的实现方式中,随机接入响应包 括暂时小区无线网络临时标识TC-RNTI,方法还包括:终端设备根据第四消息确定能够解决竞争之后,终端设备将TC-RNTI的值设为小区无线网络临时标识C-RNTI的值。
本发明实施例中,终端设备在接收第四消息后,确定能够解决竞争,才将网络设备通过第六消息发送的TC-RNT设置为C-RNTI,后续可用于和网络设备的通信。
第二方面,公开了一种接入方法,包括:网络设备首先接收终端设备发送的第一消息,第一消息包括终端设备的标识的第一部分;随后,网络设备向终端设备发送第二消息,第二消息指示终端设备是否能够解决竞争;网络设备还可以接收终端设备发送的第三消息,第三消息是终端设备根据第二消息确定能够解决竞争后向网络设备发送的,第三消息包括终端设备的标识的第二部分,终端设备的标识的第一部分和终端设备的标识的第二部分组成终端设备的标识。最后,网络设备向终端设备发送第四消息,第四消息指示终端设备是否能够解决竞争,以便述终端设备根据第四消息判断是否能够接入网络设备。
本发明实施例提供的接入方法中,终端设备将自己的标识(如:5G-S-TMSI)的一部分在通过第一消息发送给网络设备,网络设备接收各个终端设备发送的第一消息后还不能完全区分不同的终端设备,随后,网络设备向终端设备发送第二消息,此时终端设备的竞争实际上没有解决。进一步,5G-S-TMSI的剩余部分放在第三消息中发送给网络设备,网络设备接收到终端设备发送的5G-S-TMSI的剩余部分才能完全区分不同的终端设备,进一步向终端设备发送第四消息指示竞争是否解决,具体可以指示竞争解决的终端的标识,如此,终端设备接收到第四消息后,可以通过识别第四消息中的标识确定自己是否竞争解决。至此,才能完全解决终端设备随机接入的竞争。
结合第二方面,在第二方面的第一种可能的实现方式中,第四消息包括第一媒体接入控制MAC控制单元CE,第一MAC CE包括终端设备的标识的第二部分,或者,第一MAC CE包括终端设备的标识,或者,第一MAC CE包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第二方面的第一种可能的实现方式,在第二方面的第二种可能的实现方式中,第四消息还包括第一逻辑信道标识值,第一逻辑信道标识值用于指示第一MAC CE。
结合第二方面,在第二方面的第三种可能的实现方式中,第四消息为无线资源控制RRC消息,RRC消息包括终端设备的标识的第二部分,或者,RRC消息包括终端设备的标识,或者,RRC消息包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第二方面,在第二方面的第四种可能的实现方式中,第二消息指示终端设备是否能够解决竞争具体包括:第二消息包括第二MAC CE,第二MAC CE包括第一消息的部分内容或全部内容,其中,第一消息的部分内容至少包括终端设备的标识的第一部分。
结合第二方面或第二方面的第一至第四种可能的实现方式中的任意一种,在第二方面的第五种可能的实现方式中,端设备的标识为X个比特,终端设备的标识的第一部分为Y个比特,终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
结合第二方面或第二方面的第一至第五种可能的实现方式中的任意一种,在第二方面的第六种可能的实现方式中,网络设备接收终端设备发送的第一消息之前,方法还包括:网络设备接收终端设备发送的第五消息,第五消息包括随机接入前导码;网络设备向终端设备发送第六消息,第六消息包括随机接入响应。
第三方面,公开了一种终端设备,包括:发送单元,用于向网络设备发送第一消息,第一消息包括终端设备的标识的第一部分;接收单元,用于接收网络设备发送的第二消息,第二消息指示终端设备是否能够解决竞争;处理单元,用于根据第二消息确定能够解决竞争;发送单元还用于,当处理单元根据第二消息确定能够解决竞争则向网络设备发送第三消息,第三消息包括终端设备的标识的第二部分,终 端设备完整的标识由上述终端设备的标识的第一部分和终端设备的标识的第二部分组成。进一步,接收单元还用于,接收网络设备发送的第四消息,第四消息指示终端设备是否能够解决竞争,如果终端设备根据第四消息确定能够解决竞争,则接入网络设备。
本发明实施例提供的终端设备,将自己的标识(如:5G-S-TMSI)的一部分在通过第一消息发送给网络设备,网络设备接收各个终端设备发送的第一消息后还不能完全区分不同的终端设备,随后,网络设备向终端设备发送第二消息,此时终端设备的竞争实际上没有解决。进一步,5G-S-TMSI的剩余部分放在第三消息中发送给网络设备,网络设备接收到终端设备发送的5G-S-TMSI的剩余部分才能完全区分不同的终端设备,进一步向终端设备发送第四消息指示竞争是否解决,具体可以指示竞争解决的终端的标识,如此,终端设备接收到第四消息后,可以通过识别第四消息中的标识确定自己是否竞争解决。至此,才能完全解决终端设备随机接入的竞争。
结合第三方面,在第三方面的第一种可能的实现方式中,处理单元还用于,若根据第四消息确定不能解决竞争,则释放与网络设备的连接。
结合第三方面或第三方面的第一种可能的实现方式,在第三方面的第二种可能的实现第四消息包括第一媒体接入控制MAC控制单元CE,第一MAC CE包括终端设备的标识的第二部分,或者,第一MAC CE包括终端设备的标识,或者,第一MAC CE包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第三方面的第二种可能的实现方式,在第三方面的第三种可能的实现方式中,第四消息还包括第一逻辑信道标识值,第一逻辑信道标识值用于指示第一MAC CE。
结合第三方面或第三方面的第一种可能的实现方式,在第三方面的第四种可能的实现方式中,第四消息为无线资源控制RRC消息,RRC消息包括终端设备的标识的第二部分,或者,RRC消息包括终端设备的标识,或者,RRC消息包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第三方面,在第三方面的第五种可能的实现方式中,第二消息指示终端设备是否能够解决竞争具体包括:第二消息包括第二MAC CE,第二MAC CE包括第一消息的部分内容或全部内容,其中,第一消息的部分内容至少包括终端设备的标识的第一部分。
结合第三方面或第三方面的第一至第五种可能的实现方式中的任意一种,在第三方面的第六种可能的实现方式中,终端设备的标识为X个比特,终端设备的标识的第一部分为Y个比特,终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
结合第三方面或第三方面的第一至第六种可能的实现方式中的任意一种,在第三方面的第七种可能的实现方式中,发送单元还用于,向网络设备发送第一消息之前,向网络设备发送第五消息,第五消息包括随机接入前导码;接收单元还用于,接收网络设备发送的第六消息,第六消息包括随机接入响应。
结合第三方面的第七种可能的实现方式,在第三方面的第八种可能的实现方式中,上述随机接入响应包括暂时小区无线网络临时标识TC-RNTI,处理单元还用于,根据第四消息确定能够解决竞争之后,将TC-RNTI的值设为小区无线网络临时标识C-RNTI的值。
第四方面,公开了一种网络设备,包括:接收单元,用于接收终端设备发送的第一消息,第一消息包括终端设备的标识的第一部分;处理单元,生成第二消息,第二消息指示终端设备是否能够解决竞争;发送单元,用于向终端设备发送第二消息;接收单元还用于,接收终端设备发送的第三消息,第三消息是终端设备根据第二消息确定能够解决竞争后向网络设备发送的,第三消息包括终端设备的标识的第二部分,终端设备的标识的第一部分和终端设备的标识的第二部分组成终端设备的标识。发送单元还用于,向终端设备发送第四消息,第四消息指示终端设备是否能够解决竞争,以便述终端设备根据第四消息判 断是否能够接入网络设备。
本发明实施例提供的网络设备,接收终端设备发送的第一消息,获取终端设备的标识(如:5G-S-TMSI)的一部分,网络设备接收各个终端设备发送的第一消息后还不能完全区分不同的终端设备,随后,网络设备向终端设备发送第二消息,此时终端设备的竞争实际上没有解决。进一步,5G-S-TMSI的剩余部分放在第三消息中发送给网络设备,网络设备接收到终端设备发送的5G-S-TMSI的剩余部分才能完全区分不同的终端设备,进一步向终端设备发送第四消息指示竞争是否解决,具体可以指示竞争解决的终端的标识,如此,终端设备接收到第四消息后,可以通过识别第四消息中的标识确定自己是否竞争解决。至此,才能完全解决终端设备随机接入的竞争。
结合第四方面,在第四方面的第一种可能的实现方式中,第四消息包括第一媒体接入控制MAC控制单元CE,第一MAC CE包括终端设备的标识的第二部分,或者,第一MAC CE包括终端设备的标识,或者,第一MAC CE包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第四方面的第一种可能的实现方式,在第四方面的第二种可能的实现方式中,第四消息还包括第一逻辑信道标识值,第一逻辑信道标识值用于指示第一MAC CE。
结合第四方面,在第四方面的第三种可能的实现方式中,第四消息为无线资源控制RRC消息,RRC消息包括终端设备的标识的第二部分,或者,RRC消息包括终端设备的标识,或者,RRC消息包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第四方面,在第四方面的第四种可能的实现方式中,第二消息指示终端设备是否能够解决竞争具体包括:第二消息包括第二MAC CE,第二MAC CE包括第一消息的部分内容或全部内容,其中,第一消息的部分内容至少包括终端设备的标识的第一部分。
结合第四方面或第四方面的第一至第四种可能的实现方式中的任意一种,在第四方面的第五种可能的实现方式中,端设备的标识为X个比特,终端设备的标识的第一部分为Y个比特,终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
结合第四方面或第四方面的第一至第五种可能的实现方式中的任意一种,在第四方面的第六种可能的实现方式中,接收单元还用于,接收终端设备发送的第一消息之前,方接收终端设备发送的第五消息,第五消息包括随机接入前导码;发送单元还用于,向终端设备发送第六消息,第六消息包括随机接入响应。
第五方面,公开了一种终端设备,包括:收发器,用于向网络设备发送第一消息,第一消息包括终端设备的标识的第一部分;收发器,用于接收网络设备发送的第二消息,第二消息指示终端设备是否能够解决竞争;处理器,用于根据第二消息确定能够解决竞争;收发器还用于,当处理器根据第二消息确定能够解决竞争则向网络设备发送第三消息,第三消息包括终端设备的标识的第二部分,终端设备完整的标识由上述终端设备的标识的第一部分和终端设备的标识的第二部分组成。进一步,收发器还用于,接收网络设备发送的第四消息,第四消息指示终端设备是否能够解决竞争,如果终端设备根据第四消息确定能够解决竞争,则接入网络设备。
本发明实施例提供的终端设备,将自己的标识(如:5G-S-TMSI)的一部分在通过第一消息发送给网络设备,网络设备接收各个终端设备发送的第一消息后还不能完全区分不同的终端设备,随后,网络设备向终端设备发送第二消息,此时终端设备的竞争实际上没有解决。进一步,5G-S-TMSI的剩余部分放在第三消息中发送给网络设备,网络设备接收到终端设备发送的5G-S-TMSI的剩余部分才能完全区分不同的终端设备,进一步向终端设备发送第四消息指示竞争是否解决,具体可以指示竞争解决的终端的标识,如此,终端设备接收到第四消息后,可以通过识别第四消息中的标识确定自己是否竞争解决。至 此,才能完全解决终端设备随机接入的竞争。
结合第五方面,在第五方面的第一种可能的实现方式中,处理器还用于,若根据第四消息确定不能解决竞争,则释放与网络设备的连接。
结合第五方面或第五方面的第一种可能的实现方式,在第五方面的第二种可能的实现第四消息包括第一媒体接入控制MAC控制单元CE,第一MAC CE包括终端设备的标识的第二部分,或者,第一MAC CE包括终端设备的标识,或者,第一MAC CE包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第五方面的第二种可能的实现方式,在第五方面的第三种可能的实现方式中,第四消息还包括第一逻辑信道标识值,第一逻辑信道标识值用于指示第一MAC CE。
结合第五方面或第五方面的第一种可能的实现方式,在第五方面的第四种可能的实现方式中,第四消息为无线资源控制RRC消息,RRC消息包括终端设备的标识的第二部分,或者,RRC消息包括终端设备的标识,或者,RRC消息包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第五方面,在第五方面的第五种可能的实现方式中,第二消息指示终端设备是否能够解决竞争具体包括:第二消息包括第二MAC CE,第二MAC CE包括第一消息的部分内容或全部内容,其中,第一消息的部分内容至少包括终端设备的标识的第一部分。
结合第五方面或第五方面的第一至第五种可能的实现方式中的任意一种,在第五方面的第六种可能的实现方式中,终端设备的标识为X个比特,终端设备的标识的第一部分为Y个比特,终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
结合第五方面或第五方面的第一至第六种可能的实现方式中的任意一种,在第五方面的第七种可能的实现方式中,收发器还用于,向网络设备发送第一消息之前,向网络设备发送第五消息,第五消息包括随机接入前导码;收发器还用于,接收网络设备发送的第六消息,第六消息包括随机接入响应。
结合第五方面的第七种可能的实现方式,在第五方面的第八种可能的实现方式中,上述随机接入响应包括暂时小区无线网络临时标识TC-RNTI,处理器还用于,根据第四消息确定能够解决竞争之后,将TC-RNTI的值设为小区无线网络临时标识C-RNTI的值。
第六方面,公开了一种网络设备,包括:收发器,用于接收终端设备发送的第一消息,第一消息包括终端设备的标识的第一部分;处理器,生成第二消息,第二消息指示终端设备是否能够解决竞争;收发器,用于向终端设备发送第二消息;收发器还用于,接收终端设备发送的第三消息,第三消息是终端设备根据第二消息确定能够解决竞争后向网络设备发送的,第三消息包括终端设备的标识的第二部分,终端设备的标识的第一部分和终端设备的标识的第二部分组成终端设备的标识。收发器还用于,向终端设备发送第四消息,第四消息指示终端设备是否能够解决竞争,以便述终端设备根据第四消息判断是否能够接入网络设备。
本发明实施例提供的网络设备,接收终端设备发送的第一消息,获取终端设备的标识(如:5G-S-TMSI)的一部分,网络设备接收各个终端设备发送的第一消息后还不能完全区分不同的终端设备,随后,网络设备向终端设备发送第二消息,此时终端设备的竞争实际上没有解决。进一步,5G-S-TMSI的剩余部分放在第三消息中发送给网络设备,网络设备接收到终端设备发送的5G-S-TMSI的剩余部分才能完全区分不同的终端设备,进一步向终端设备发送第四消息指示竞争是否解决,具体可以指示竞争解决的终端的标识,如此,终端设备接收到第四消息后,可以通过识别第四消息中的标识确定自己是否竞争解决。至此,才能完全解决终端设备随机接入的竞争。
结合第六方面,在第六方面的第一种可能的实现方式中,第四消息包括第一媒体接入控制MAC控 制单元CE,第一MAC CE包括终端设备的标识的第二部分,或者,第一MAC CE包括终端设备的标识,或者,第一MAC CE包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第六方面的第一种可能的实现方式,在第六方面的第二种可能的实现方式中,第四消息还包括第一逻辑信道标识值,第一逻辑信道标识值用于指示第一MAC CE。
结合第六方面,在第六方面的第三种可能的实现方式中,第四消息为无线资源控制RRC消息,RRC消息包括终端设备的标识的第二部分,或者,RRC消息包括终端设备的标识,或者,RRC消息包括第三消息的部分内容或全部内容,其中,第三消息的部分内容至少包括终端设备的标识的第二部分。
结合第六方面,在第六方面的第四种可能的实现方式中,第二消息指示终端设备是否能够解决竞争具体包括:第二消息包括第二MAC CE,第二MAC CE包括第一消息的部分内容或全部内容,其中,第一消息的部分内容至少包括终端设备的标识的第一部分。
结合第六方面或第六方面的第一至第四种可能的实现方式中的任意一种,在第六方面的第五种可能的实现方式中,端设备的标识为X个比特,终端设备的标识的第一部分为Y个比特,终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
结合第六方面或第六方面的第一至第五种可能的实现方式中的任意一种,在第六方面的第六种可能的实现方式中,收发器还用于,接收终端设备发送的第一消息之前,方接收终端设备发送的第五消息,第五消息包括随机接入前导码;收发器还用于,向终端设备发送第六消息,第六消息包括随机接入响应。
第七方面,公开了一种计算机可读存储介质,包括:计算机可读存储介质中存储有指令;当计算机可读存储介质在上述第三方面以及第三方面任意一种实现方式、第五方面以及第五方面任意一种实现方式所述的终端设备上运行时,使得终端设备执行如上述第一方面以及第一方面任意一种实现方式、第二方面以及第二方面任意一种实现方式所述的接入方法。
第八方面,公开了一种计算机可读存储介质,包括:计算机可读存储介质中存储有指令;当计算机可读存储介质在上述第四方面以及第四方面任意一种实现方式、上述第六方面以及第六方面任意一种实现方式所述的网络设备上运行时,使得网络设备执行如上述第一方面以及第一方面任意一种实现方式、第二方面以及第二方面任意一种实现方式所述的接入方法。
第九方面,公开了一种无线通信装置,包括:无线通信装置中存储有指令;当无线通信装置在上述第三方面以及第三方面任意一种实现方式、第五方面以及第五方面任意一种实现方式所述终端设备上运行时,使得终端设备执行如上述第一方面以及第一方面任意一种实现方式、第二方面以及第二方面任意一种实现方式所述的接入方法,无线通信装置为芯片。
第十方面,公开了一种无线通信装置,包括:无线通信装置中存储有指令;当无线通信装置在上述第四方面以及第四方面任意一种实现方式、上述第六方面以及第六方面任意一种实现方式所述的网络设备上运行时,使得网络设备执行如上述第一方面以及第一方面任意一种实现方式、第二方面以及第二方面任意一种实现方式所述的接入方法,无线通信装置为芯片。。
附图说明
图1为本申请实施例提供的本发明实施例提供的通信网络的架构图;
图2为现有技术中随机接入过程的流程示意图;
图3为本发明实施例提供的网络设备的结构框图;
图4为本发明实施例提供的接入方法的流程示意图;
图5为本发明实施例提供的第四消息包括的第一MAC CE示意图;
图6为本发明实施例提供的第四消息包括的第一MAC CE另一示意图;
图7为本发明实施例提供的第四消息包括的第一MAC CE另一示意图;
图8为本发明实施例提供的接入方法的另一流程示意图;
图9为本发明实施例提供的网络设备的另一结构框图;
图10为本发明实施例提供的网络设备的另一结构框图;
图11为本发明实施例提供的终端设备的结构框图;
图12为本发明实施例提供的终端设备的另一结构框图;
图13为本发明实施例提供的终端设备的另一结构框图。
具体实施方式
如图1所示,是本发明实施例提供的通信网络的架构图,网络设备与5G核心网连接,网络设备可以是4G网络设备,也可以是5G网络设备。当处于无线资源控制(Radio Resource Control,RRC)空闲态的终端设备有上行数据需要发送,或者,终端设备接收到网络设备发送的寻呼消息,该寻呼消息指示有终端需要接收下行数据,终端设备首先预先与网络设备例如,终端设备需要进行打电话、接电话、上传数据或下载数据等操作之前,首先需要接入网络设备。不同的终端设备可以通过竞争的随机接入方式与网络设备建立连接。参考图1,竞争解决的终端设备可以与网络设备建立连接,即可以进一步与网络设备进行通信,竞争未解决的终端设备暂时不能与网络设备建立连接,可以再次发起随机接入,竞争解决后才能与网络设备建立连接。
具体地,网络设备会广播系统消息(System information),终端设备可以根据网络设备广播的系统消息获得随机接入前导码(Random Access Preamble)以便发起随机接入。参考图2,以终端设备1、终端设备2以及终端设备3作为示例,介绍现有技术的随机接入过程。具体地,现有技术中随机接入过程包括以下5个步骤:
步骤201:终端设备向网络设备发送随机接入请求,该随机接入请求包括随机接入前导码。
具体地,可以有多个终端设备向网络设备发送随机接入请求,如:图2中的终端设备1、终端设备2以及终端设备3。其中,随机接入请求中的随机接入前导码用于通知网络设备有一个随机接入请求,同时使得网络设备能估计其与终端设备之间的传输时延并以此校准上行定时。在本发明实施例中,可以将随机接入请求称为消息1。
需要说明的是,由于各个终端设备随机选择随机接入前导码和物理随机接入控制信道(Physical Random Access Control Channel,PRACH)资源,可能导致多个终端设备选择相同的随机接入前导码和PRACH资源,即多个终端设备出现冲突或竞争,从而使得网络设备无法从消息1区分出不同的终端设备,因此需要后续步骤中的消息3和消息4进行竞争的解决。PRACH资源为发送随机接入前导码使用的物理资源。
步骤202:网络设备向终端设备发送随机接入响应(Random Access Response,RAR)。
具体地,网络设备是向多个发送随机接入请求的终端设备回复随机接入响应,如:图2中的终端设备1、终端设备2以及终端设备3。
本发明实施例中,随机接入响应可以称为消息2。具体地,消息2中可以包括由媒体接入控制(Medium Access Control,MAC)子头(subheader)和MAC RAR组成的MAC子协议数据单元(sub Protocol Data Unit,subPDU),一个或多个MAC subPDU可以组成一个MAC PDU。其中,MAC RAR可以包括定时提前量(Timing advance command)、分配给消息3的上行资源以及分配给终端设备的暂时小区无线网路临时标识(Temporary Cell Radio Network Temporary Identifier,TC-RNTI)中的至少一个。
其中,接收到RAR的终端设备可以根据TA进行上行同步,也可以使用分配给消息3的上行资源 向网络设备发送消息3。另外,终端竞争解决后,终端设备可以将TC-RNTI变成小区无线网路临时标识(Cell Radio Network Temporary Identifier,C-RNTI)。
需要说明的是,终端设备向网络设备发送了消息1之后,将在RAR时间窗(RA Response window)内接收网络设备发送的消息2。如果终端设备在此RAR时间窗内没有接收到网络设备回复的消息2,终端设备则认为此次随机接入过程失败。如果终端设备在此RAR时间窗内接收到了网络设备回复的消息2,则执行步骤203。
步骤203:终端设备向网络设备发送消息3,消息3中需要包含每个终端设备的标识。
具体地,是接收到随机接入响应的终端设备向网络设备发送消息3,如:图2中的终端设备1、终端设备2以及终端设备3。
需要说明的是,根据终端设备状态的不同和应用场景的不同,消息3的内容也可能不同。例如:如果是初始接入场景,消息3为RRC连接请求消息(RRC Connection Request),此时消息3中携带的终端设备唯一的标识可以为SAE临时移动订阅标识(SAE-Temporary Mobile Subscriber Identity,S-TMSI)或一个随机数。
需要说明的是,参考图1,终端设备请求接入的网络设备与5G核心网连接。在5G NR系统中,5G核心网会为每个终端设备分配5G-S-TMSI作为终端的标识,只要终端设备请求接入的网络设备与5G核心网连接,终端设备的标识就是长度为48比特的5G-S-TMSI。
当终端设备请求接入的网络设备为4G网络设备,消息3需要满足4G网络的要求,4G网络中消息3的大小为56比特,只能容纳长度为40比特的标识,如4G网络的SAE临时移动订阅标识(SAE-Temporary Mobile Subscriber Identity,S-TMSI)。
当终端设备请求接入的网络设备为5G网络设备,终端设备向网络设备发送的消息3可能沿用4G网络中的消息3,其长度和格式都无法改变,只能容纳长度为40比特的标识,如4G网络的S-TMSI。
可见,由于5G-S-TMSI的长度相比S-TMSI多了8比特,消息3无法发送完整的5G-S-TMSI,只能将5G-S-TMSI的一部分通过消息3发送给网络设备,如发送5G-S-TMSI其中的40比特,再将5G-S-TMSI的剩余部分通过其他消息发送给网络设备,如发送5G-S-TMSI剩余的8比特。
步骤204:网络设备向终端设备发送消息4,消息4携带竞争解决的终端设备的标识。
具体地,网络设备是向发送消息3的多个终端设备回复消息4,指示竞争解决的终端设备,如:图2中网络设备向终端设备1、终端设备2以及终端设备3发送消息4。
各个终端设备接收到消息4后通过将消息4中的标识与自身的标识进行对比就可以确定是否能够解决竞争。如果终端设备确定消息4中的标识与自身的标识的对应部分相同,则确定能够解决竞争,即该终端设备竞争成功能够接入网络设备。如果消息4中的标识与自身的标识的对应部分不同,即该终端设备不能解决竞争,即该终端设备竞争失败不能接入网络设备,终端设备可以重新发起随机接入。
需要说明的是,由于消息3中只携带了5G-S-TMSI的一部分,因此消息4中携带的也是5G-S-TMSI的一部分以指定竞争解决成功接入网络设备的终端设备。示例的,消息3中携带的是竞争解决的终端设备的5G-S-TMSI最右边的40比特,各个终端设备接收消息4后,判断其中40比特的标识与自己的5G-S-TMSI的最右边40比特是否相同,如果相同,终端设备则认为竞争解决,能够成功接入网络。反之,如果不相同,终端设备则认为竞争未解决,不能成功接入网络。
步骤205:接收到消息4后竞争解决的终端设备还需要向网络设备发送消息5,将自己的5G-S-TMSI的剩余部分通知给给网络设备。
参考图2,接收到消息4后竞争解决的终端设备可以是终端设备2以及终端设备3,当然竞争解决的终端设备不仅仅局限于终端设备2以及终端设备3,在此仅仅作为一种示例,本发明实施例对竞争解 决的终端设备不做限制。
也就是说,终端设备将5G-S-TMSI的一部分放在消息3中发送给网络设备,再将5G-S-TMSI的剩余部分放在消息5中发送给网络设备,这样在终端设备发送完消息5之后,网络设备或核心网就可以知道终端设备完整的5G-S-TMSI。
由于消息3只包括了5G-S-TMSI的一部分,所以消息4并不能完全解决所有终端设备随机接入的竞争,在消息4之后还可能存在多个终端设备的竞争没有解决。示例的,两个个终端设备具有不同的5G-S-TMSI,但是5G-S-TMSI的一部分可能是相同的,如果网络设备发送的消息4中携带的是这两个终端设备的5G-S-TMSI的相同部分,这两个终端收到消息4后都认为自己解决了竞争,成功接入了网络,并且会使用相同的配置信息,如:相同的小区无线网路临时标识C-RNTI,造成后续调度的混乱。
本发明实施例提供一种接入方法,终端设备将自己的5G-S-TMSI的一部分在通过第一消息发送给网络设备,网络设备接收各个终端设备发送的第一消息后还不能完全区分不同的终端设备,随后,网络设备向终端设备发送第二消息,此时终端设备的竞争实际上没有解决。进一步,5G-S-TMSI的剩余部分放在第三消息中发送给网络设备,网络设备接收到终端设备发送的5G-S-TMSI的剩余部分才能完全区分不同的终端设备,进一步向终端设备发送第四消息指示竞争是否解决,具体可以指示竞争解决的终端的标识,如此,终端设备接收到第四消息后,可以通过识别第四消息中的标识确定自己是否竞争解决。至此,才能完全解决终端设备随机接入的竞争。
本发明实施例提供一种网络设备30,如图3所示,所述网络设备30包括本发明实施例本发明实施例提供的接入方法可应用于是图3中所示的网络设备。如图3所示,该终端设备可以包括至少一个处理器301,存储器302、收发器303以及通信总线304。
下面结合图3对该终端设备的各个构成部件进行具体的介绍:
处理器301是终端设备的控制中心,可以是一个处理器,也可以是多个处理元件的统称。例如,处理器301是一个中央处理器(central processing unit,CPU),也可以是特定集成电路(Application Specific Integrated Circuit,ASIC),或者是被配置成实施本发明实施例的一个或多个集成电路,例如:一个或多个微处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(Field Programmable Gate Array,FPGA)。
其中,处理器301可以通过运行或执行存储在存储器302内的软件程序,以及调用存储在存储器302内的数据,执行终端设备的各种功能。
在具体的实现中,作为一种实施例,处理器301可以包括一个或多个CPU,例如图3中所示的CPU0和CPU1。
在具体实现中,作为一种实施例,终端设备可以包括多个处理器,例如图3中所示的处理器301和处理器305。这些处理器中的每一个可以是一个单核处理器(single-CPU),也可以是一个多核处理器(multi-CPU)。这里的处理器可以指一个或多个终端设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
存储器302可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储终端设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储终端设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储终端设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器302可以是独立存在,通过通信总线304与处理器301相连接。 存储器302也可以和处理器301集成在一起。
其中,所述存储器302用于存储执行本发明方案的软件程序,并由处理器301来控制执行。
收发器303,使用任何收发器一类的终端设备,用于其他终端设备之间的通信。当然,收发器303还可以用于与通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(Wireless Local Area Networks,WLAN)等。收发器303可以包括接收单元实现接收功能,以及发送单元实现发送功能。
通信总线304,可以是工业标准体系结构(Industry Standard Architecture,ISA)总线、外部终端设备互连(Peripheral Component,PCI)总线或扩展工业标准体系结构(Extended Industry Standard Architecture,EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。为便于表示,图3中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
图3中示出的终端设备结构并不构成对终端设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
本发明实施例中网络设备30接收终端设备发送的第一消息,该第一消息包括终端设备的标识的第一部分。进一步,网络设备30向终端设备发送第二消息,第二消息指示终端设备是否能够解决竞争。需要说明的是,网络设备30接收各个终端设备发送的第一消息后还不能完全区分不同的终端设备,因此第二消息并不能完全解决各个终端设备的随机接入竞争,仍有一部分终端设备的竞争没有被解决。在此之后,网络设备30还可以接收终端设备发送的第三消息,第三消息包括终端设备的标识的第二部分,终端设备的标识的第一部分和终端设备的标识的第二部分组成终端设备的标识。另外,第三消息是终端设备根据第二消息确定能够解决竞争后向网络设备发送的。网络设备30还可以向终端设备发送第四消息,第四消息指示终端设备是否能够解决竞争,以便述终端设备根据第四消息判断是否能够接入网络设备。网络设备30接收到终端设备发送的第三消息后才能完全区分不同的终端设备,进一步向终端设备发送第四消息指示竞争是否解决,具体可以指示竞争解决的终端的标识,如此,终端设备接收到第四消息后,可以通过识别第四消息中的标识确定自己是否竞争解决。至此,才能完全解决终端设备随机接入的竞争。
本发明实施例提供一种接入方法,如图4所示,所述方法包括以下步骤:
步骤401、终端设备向网络设备发送第五消息,所述第五消息包括随机接入前导码。
需要说明的是,本发明实施例所述的第五消息可以为本发明实施例图2所示的消息1,通过携带一个随机接入前导码以向网络设备通知终端设备的随机接入请求。
步骤402、网络设备向终端设备发送第六消息,所述第六消息包括随机接入响应。
本发明实施例所述的第六消息可以为图2所示的消息2。具体地,第六消息中可以包括由MAC子头和MAC RAR组成的MAC subPDU,一个或多个MAC subPDU组成一个MAC PDU。其中,MAC RAR中可以包括定时提前量(Timing advance command)、分配给第一消息的上行资源、分配给终端设备的暂时小区无线网路临时标识(Temporary Cell Radio Network Temporary Identifier,TC-RNTI)中的至少一个。
需要说明的是,终端设备向网络设备发送了第五消息之后,将在RAR时间窗(RA Response window)内接收网络设备发送的第六消息。如果终端设备在此RAR时间窗内没有接收到网络设备回复的第六消息,终端设备则认为此次随机接入过程失败。如果终端设备在此RAR时间窗内接收到了网络设备回复的第六消息,则执行步骤403。
步骤403、终端设备向网络设备发送第一消息,第一消息包括所述终端设备的标识的第一部分。
本发明实施例中的第一消息可以为本发明实施例图2所示的消息3。具体地,在初始接入场景,第一消息为RRC连接请求消息(RRC Connection Request),第一消息包括所述终端设备的标识的第一部分, 例如,所述终端设备的标识的第一部分可以为终端设备的5G-S-TMSI的一部分。另外,第一消息还可以包括建立原因(establishment cause),用于指示发起RRC连接请求的原因。
本发明实施例中,网络设备连接的是5G核心网,终端设备的标识可以是长度为48比特的5G-S-TMSI。通常,网络设备是LTE网络设备,也可以是NR网络设备,终端设备发送给网络设备的第一消息只能携带40比特的终端设备标识,因此第一消息无法携带完整的5G-S-TMSI,在本发明实施例中可以将终端设备的标识的一部分通过第一消息发送给网络设备,如:本发明实施例所述的终端设备的标识的第一部分,当然,终端设备的标识的第一部分的长度小于等于40比特,即需要在第一消息容纳范围以内。示例的,所述终端设备的标识为X个比特,所述终端设备的标识的第一部分为Y个比特,Y为小于等于40的整数,所述终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
需要说明的是,所述终端设备的标识的第一部分可以是Y个连续比特,也可以是Y个不连续比特。同样,所述终端设备的标识的第二部分可以是Z个连续比特,也可以是Z个不连续比特。本发明实施例对比不做限制,所述终端设备的标识的第一部分和所述终端设备的标识的第二部分组成终端设备的标识即可。示例的,所述终端设备的标识的第一部分可以是5G-S-TMSI最右边40个比特,所述终端终端设备的标识的第二部分可以是5G-S-TMSI的剩余的8个比特。以一个简单的示例为例,终端设备的标识为“1101101”,长度为7比特,终端设备的标识的第一部分可以是最右边4个比特“1101”,终端设备的标识的第二部分可以是剩余的3个比特“110”。
在本发明实施例中,根据终端设备状态的不同和应用场景的不同,终端设备的标识也可能不同。例如:如果是初始接入场景,第一消息为RRC连接请求消息,终端设备的标识可以为5G-S-TMSI或一个随机数;如果是RRC连接重建场景,第一消息为RRC连接重建消息,如果是终端设备处于RRC连接态的其他场景,终端设备的标识也可以为C-RNTI。
404、网络设备向终端设备发送第二消息,第二消息指示所述终端设备是否能够解决竞争。
本发明实施例中的第二消息可以为图2所示的消息4。所述第二消息包括第二媒体接入控制(Medium Access Control,MAC)控制单元(Control Element,CE),所述第二MAC CE包括所述第一消息的部分内容或全部内容,其中,所述第一消息的部分内容至少包括所述终端设备的标识的第一部分。在本发明实施例中,由于终端设备仅仅将5G-S-TMSI的一部分通过第一消息发送给网络设备,因此网络设备接收到各个终端设备发送的第一消息后,只能知道发送第一消息的各个终端的标识的一部分,并不能够完全区分所有终端设备。也就是说,网络设备在第二消息中携带的部分标识可能对应多个终端设备,如:多个终端设备的5G-S-TMSI最右边的40比特相同,第二消息携带的是这40个比特。因此,终端设备通过发送第二消息只能解决一部分终端设备随机接入的竞争。
终端设备接收到网络设备发送的第二消息后,可以解析第二消息获得其中的标识。进一步,还可以将获得标识与自己的标识进行对比,如果第二消息中的标识与终端设备自身的标识的对应部分相同,则认为竞争解决,执行步骤405;如果第二消息中的标识与终端设备自身的标识的对应部分不同,则认为竞争没有解决,不能成功接入网络设备,可以重新发起随机接入。需要说明的是,第二消息中的标识与终端设备自身的标识的对应部分可以理解为:终端设备在第一消息中携带的是终端设备自身的标识的哪几个比特位,接收到第二消息后也需要相应地和这几个比特位进行对比。示例的,第一消息中携带的是5G-S-TMSI最右边的40比特,终端设备解析出第二消息中的标识后,需要与自己的5G-S-TMSI最右边的40比特进行比对,如果相同,则认为竞争解决,执行步骤405。反之,如果不同,则认为竞争没有解决。
步骤405、终端设备确定能够解决竞争,则向网络设备发送第三消息,第三消息包括所述终端设备的标识的第二部分。
在本发明实施例中的第三消息可以为图2所示的消息5,消息5中需要包含终端设备的标识的剩余部分,如:第一消息携带的是5G-S-TMSI最右边的的40比特,第三消息携带的是5G-S-TMSI的剩余8比特。由于所述终端设备的标识的第二部分和所述终端设备的标识的第一部分组成所述终端设备的标识,因此,网络设备接收到各个终端设备发送的第三消息后可以知道各个终端设备的5G-S-TMSI的全部内容,也就可以完全区分发送第三消息的各个终端设备。
406、网络设备向终端设备发送第四消息,第四消息指示所述终端设备是否能够解决竞争。
本发明实施例中,网络设备会在第四消息指定成功接入网络的终端设备,即竞争解决的终端设备。由于网络设备接收到终端设备发送的第三消息后可以完全区分发送第三消息的各个终端设备,进一步可以第四消息携带的标识可以仅对应一个终端设备,即通过第四消息指定的竞争解决的终端设备仅有一个,如此,可以完全解决所有终端设备随机接入的竞争。
具体实现中,第四消息可以包括第一媒体接入控制MAC控制单元CE,所述第一MAC CE包括所述终端设备的标识的第二部分,或者,所述第一MAC CE包括所述终端设备的标识,或者,所述第一MAC CE包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
以下结合附图介绍第四消息的几种可能的实现,具体包括:
(1)第四消息中包括一个第一MAC CE,该MAC CE中包含网络设备指定的竞争解决的终端设备的标识的第二部分。示例的,终端设备的标识的第一部分是终端设备的5G-S-TMSI最右边的40比特,终端设备的标识的第二部分是终端设备的5G-S-TMSI的剩余8比特,该MAC CE一种可能的格式如图5所示,该MAC CE的长度为一个字节(Octet,Oct),这一个MAC CE包括了5G-S-TMSI的剩余8比特。
(2)第四消息中包括一个第一MAC CE,该MAC CE中包含终端设备的标识的第一部分和终端设备的标识的第二部分,即包括完整的5G-S-TMSI。该MAC CE一种可能的格式如图6所示,该MAC CE的长度为8个字节,这一个MAC CE包括了48比特完整的5G-S-TMSI,将48比特完整的5G-S-TMSI依次划分为8个部分,每个部分的长度为8比特,该MAC CE包括的8个字节分别包括5G-S-TMSI的这8个部分,MAC CE的第一个字节包括5G-S-TMSI的第一个8比特,MAC CE的第二个字节包括5G-S-TMSI的第二个8比特,MAC CE的第三个字节包括5G-S-TMSI的第三个8比特,MAC CE的第四个字节包括5G-S-TMSI的第四个8比特,MAC CE的第五个字节包括5G-S-TMSI的第五个8比特,MAC CE的第六个字节包括5G-S-TMSI的第六个8比特,MAC CE的第七个字节包括5G-S-TMSI的第七个8比特,MAC CE的第八个字节包括5G-S-TMSI的第八个8比特。
(3)第四消息包括一个第一MAC CE,该MAC CE包括上述第三消息的部分内容或全部内容。具体地,该MAC CE中包含第三消息的其中q个比特,或者该MAC CE中包含第三消息的专用控制信道(Dedicated Control Channel,DCCH)服务数据单元(Service Data Unit,SDU)的其中q个比特,即第四消息只包括第三消息的部分内容。需要说明的是,本发明实施例所述的其中q个比特可以指的是最右边的q个比特。这q个比特至少需要包括上述终端设备的标识的第二部分,使得终端设备接收到第四消息后能够确认自己是否能够解决竞争。当然,如果q足够大,该MAC CE也可以包含第三消息的全部内容。需要说明的是,如果通过第三消息的部分内容就可以指示出不同5G-S-TMSI,以指示不同的终端设备,第四消息需要能够体现出第三消息的这部分内容。
以终端设备的标识的第二部分为终端设备的5G-S-TMSI最右边的8比特,q=16为例,该MAC CE一种可能的格式如图7所示。该MAC CE的长度可以为2个字节,这一个MAC CE包括了第三消息的前16个比特,即第三消息最右边的16个比特。将第三消息的前16个比特按照从右到左的顺序依次划分为2个部分,每个部分的长度为8比特,该MAC CE包括的2个字节分别包括划分为2个部分,每个部分 包括8个比特,从右到左依次称为第一个8比特和第二个8比特。MAC CE的第一字节包括第一个8比特,即第三消息最右边的8个比特,MAC CE的第二字节包括第二个8比特,即第三消息最右边的16个比特中除上述第一个8比特外的8个比特。
在一些实施例中,第四消息还可以包括第一逻辑信道标识值(Logical Channel Identification,LCID),所述第一逻辑信道标识值用于指示第四消息中的第一MAC CE,如图5、图6或图7所示的第一MAC CE。参考表1,不同的逻辑信道标识值可以指示不同的MAC CE,本发明实施例中第四消息中的第一MAC CE对应的逻辑信道标识值为原预留的LCID值中的某一个值,如第一MAC CE对应的逻辑信道标识值为原预留的LCID值100010–110101中的110101值。
表1
Index(索引) LCID values(LCID值)
100010–110100 预留
110101 第一MAC CE
…… 用于指示其他内容,如:C-RNTI
具体地,第一逻辑信道标识值在第四消息的MAC PDU中的MAC subPDU中的MAC子头中,当MAC subPDU中的MAC子头包括第一逻辑信道标识值,则指示该MAC subPDU包括了第一MAC CE,其中,第一MAC CE的格式可以为图5、图6或图7所示的第一MAC CE的格式。
在一些实施例中,第四消息也可以是为RRC消息,所述RRC消息包括所述终端设备的标识的第二部分,或者,所述RRC消息包括所述终端设备的标识,或者,所述RRC消息包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。同样,该RRC消息中包含第三消息其中的q个比特,或者该MAC CE中包含第三消息的专用控制信道(Dedicated Control Channel,DCCH)服务数据单元(Service Data Unit,SDU)其中的q个比特,即第四消息只包括第三消息的部分内容。需要说明的是,需要说明的是,本发明实施例所述的其中q个比特可以指的是最右边的q个比特。这q个比特至少需要包括上述终端设备的标识的第二部分,使得终端设备接收到第四消息后能够确认自己是否能够解决竞争。当然,如果q足够大,该RRC消息也可以包含第三消息的全部内容。需要说明的是,如果通过第三消息的部分内容就可以指示出不同5G-S-TMSI,以指示不同的终端设备,该RRC消息需要能够体现出第三消息的这部分内容。
407、终端设备根据第四消息确定能够解决竞争,则接入网络设备。
终端设备接收第四消息后,可以解析第四消息获得其中的标识或内容。
可选的,进一步,还可以将获得标识与自己的标识进行对比,如果第二消息中的标识与终端设备自身的标识的对应部分相同,则认为能够解决竞争,进而可以成功接入网络设备;如果第四消息中的标识与终端设备自身的标识的对应部分不同,则认为竞争没有解决,不能成功接入网络设备,可以重新发起随机接入。需要说明的是,第四消息中的标识与终端设备自身的标识的对应部分可以理解为:终端设备在第四消息中携带的是终端设备的标识的哪几个比特位,终端设备需要相应地和自身标识的这几个比特位进行对比。示例的,第四消息中携带的是5G-S-TMSI的剩余8比特,终端设备解析出第四消息中的标识后,需要与自己的剩余8比特进行比对,或者,第四消息中携带的是完整5G-S-TMSI的48比特,终端设备解析出第四消息中的标识后,需要与自己的5G-S-TMSI的48比特进行比对。
可选的,进一步,终端设备还可以将通过第四消息获得的内容与自己发送的第三消息的部分内容或全部内容进行对比。如果第二消息中的内容与终端设备发送的第三消息的部分内容或全部内容相同,则认为能够解决竞争,进而可以成功接入网络设备;如果第四消息中的内容与终端设备发送的第三消息的部分内容或全部内容不同,则认为竞争没有解决,不能成功接入网络设备,可以重新发起随机接入。 示例的,第四消息中携带的是第三消息其中的q个比特,终端设备解析出第四消息中的内容后,需要与自己发送的第三消息其中的q个比特进行比对。
需要说明的是,该步骤的竞争解决是完全的竞争解决,即针对消息5进行竞争解决,经过该步骤的竞争解决之后,不会出现冲突的两个终端设备,网络设备能够正确的识别每一个终端设备。
步骤407中终端设备竞争解决后,终端设备可以继续保持在RRC连接态与网络设备进行通信。
在一些实施例中,步骤407之后终端设备还可以将消息2中的TC-RNTI的值变成C-RNTI的值,即将TC-RNTI变成C-RNTI,在后续过程中,网络设备可以利用C-RNTI对下行消息进行加扰,终端设备接收到下行消息后可以利用C-RNTI解扰,保证与网络设备之间的正常通信。
以下以待接入的终端设备为UE1、UE2、UE3作为示例,介绍本发明实施例提供的接入方法,参考图8,所述方法包括以下步骤:
S1、UE1、UE2、UE3接收基站的广播消息,获取广播消息中的随机接入前导码。
需要说明的是,UE1、UE2、UE3的标识分别为0001111、0011111、0111010,其中UE1、UE2、UE3都选择了相同的随机接入前导码和PRACH资源。
S2、UE1、UE2、UE3向基站发送消息1,包括随机接入前导码。
S3、基站向UE1、UE2、UE3发送消息2,消息2包括随机接入响应。
S4、UE1、UE2、UE3向基站发送消息3,分别携带各自标识最右边的4个比特。
具体地,UE1发送的消息3中携带“1111”,UE2发送的消息3中携带“1111”,UE3发送的消息3中携带“1010”。
S5、基站向UE1、UE2、UE3发送消息4,携带“1111”。
具体地,基站指定“1111”对应的终端设备为解决竞争的终端设备,因此,基站向UE1、UE2、UE3发送的消息4均携带“1111”。
S6、UE1、UE2向基站发送消息5,分别携带“000”、“001”。
具体地,UE1接收到消息4后,解析消息4获取其中的标识“1111”,“1111”与自己的标识“1111000”的前四个比特相同,确定自己能够解决竞争,并向基站指示自己的标识的剩余部分“000”。UE2接收到消息4后,解析消息4获取其中的标识“1111”,“1111”与自己的标识“1111001”最右边的四个比特相同,确定自己能够解决竞争,并向基站指示自己的标识的剩余部分“001”。UE3接收到消息4后,解析消息4获取其中的标识“1111”,“1111”与自己的标识“1010011”最右边的四个比特不相同,确定自己不能解决竞争,随后可以重新发起随机接入。
S7、基站向UE1、UE2发送消息6,携带“000”。
具体地,基站指定“000”对应的终端设备为解决竞争的终端设备,因此,基站向UE1、UE2、UE3发送的消息6均携带“000”。
S8、UE1确定能够解决竞争,成功接入网络设备。
具体地,UE1接收到消息6后,解析消息6获取其中的标识“000”,“000”与自己的标识“1111000”除最右边4个比特外的剩余3个比特“000”相同,确定自己能够解决竞争。
本发明实施例提供一种网络设备,所述网络设备可以是本发明实施例涉及的网络设备,如图1所示通信系统中的网络设备。在采用对应各个功能划分各个功能模块的情况下,图5示出了上述网络设备的一种可能的结构示意图。如图9所示,所述网络设备包括接收单元901、处理单元902以及发送单元903。
接收单元901,用于支持所述网络设备执行上述实施例中的步骤401,和/或用于本文所描述的技术的其它过程。
处理单元902,用于支持所述网络设备生成本发明实施例所述的第二消息、第四消息以及第六消息,和/或用于本文所描述的技术的其它过程;
发送单元903,用于支持所述网络设备执行上述实施例中的步骤402、步骤404以及步骤406,和/或用于本文所描述的技术的其它过程;
需要说明的是,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
示例性的,在采用集成的单元的情况下,本申请实施例提供的网络设备的结构示意图如图10所示。在图10中,该网络设备包括:处理模块1001和通信模块1002。处理模块1001用于对网络设备的动作进行控制管理,例如,执行上述处理单元902所执行的步骤,和/或用于执行本文所描述的技术的其它过程。通信模块1002用于支持网络设备与其他设备之间的交互,例如,执行上述接收单元901、发送单元903所执行的步骤。如图10所示,网络设备还可以包括存储模块1003,存储模块1003用于存储网络设备的程序代码和数据。
当处理模块1001为处理器,通信模块1002为收发器,存储模块1003为存储器时,网络设备可以为图3所示的网络设备。
在采用对应各个功能划分各个功能模块的情况下,图11示出上述实施例中所涉及的终端设备的一种可能的结构示意图。如图11所示,终端设备包括发送单元1101、接收单元1102以及处理单元1103。
接收单元1101,用于支持该终端设备执行上述实施例中的步骤402、步骤404以及步骤406,和/或用于本文所描述的技术的其它过程;
发送单元1102,用于支持该终端设备执行上述实施例中的步骤401、步骤403以及步骤405中的发送流程,和/或用于本文所描述的技术的其它过程;
处理单元1103,用于支持该终端设备执行上述实施例中的步骤405中确定能够解决竞争的流程,和/或用于本文所描述的技术的其它过程。
需要说明的是,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
示例性的,在采用集成的单元的情况下,本申请实施例提供的终端设备的结构示意图如图12所示。在图12中,该终端设备包括:处理模块1201和通信模块1202。处理模块1201用于对终端设备的动作进行控制管理,例如,执行上述处理单元1103执行的步骤,和/或用于执行本文所描述的技术的其它过程。通信模块1202用于支持终端设备与其他设备之间的交互,如,执行上述接收单元1101、发送单元1102执行的步骤,以及与网络设备之间的各种交互。如图12所示,终端设备还可以包括存储模块1203,存储模块1203用于存储终端设备的程序代码和数据。
当处理模块1201为处理器,通信模块1202为收发器,存储模块1203为存储器时,终端设备为图13所示的终端设备。参考图13,该终端设备可以包括至少一个处理器1301,存储器1302、收发器1303以及通信总线1304。处理器1301,存储器1302以及收发器1303之间通过通信总线1304连接。
下面结合图13对该终端设备的各个构成部件进行具体的介绍:
处理器1301是终端设备的控制中心,其中,处理器1301可以通过运行或执行存储在存储器1302内的软件程序,以及调用存储在存储器1302内的数据,执行终端设备的各种功能。
在具体的实现中,作为一种实施例,处理器1301可以包括一个或多个CPU,例如图13中所示的CPU0和CPU1。
终端设备可以包括多个处理器,例如图13中所示的处理器1301和处理器1305。这些处理器中的每一个可以是一个单核处理器(single-CPU),也可以是一个多核处理器(multi-CPU)。这里的处理器可 以指一个或多个终端设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
收发器1303,使用任何收发器一类的终端设备,用于其他设备之间的通信,如与终端设备之间的通信。当然,收发器1303还可以用于与通信网络通信。
图13中示出的终端设备结构并不构成对终端设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
本发明实施例还提供一种计算机可读存储介质,该计算机可读存储介质中存储有指令;当计算机可读存储介质在图9、图10以及图3所示的网络设备上运行时,使得终端设备执行图4所示的接入方法。
本发明实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令;包括:计算机可读存储介质中存储有指令;当计算机可读存储介质在图11、图12以及图13所示的终端设备上运行时,使得终端设备执行图4所示的接入方法。
本发明实施例还了一种无线通信装置,该无线通信装置中存储有指令;当无线通信装置在图9、图10以及图3所示的网络设备上运行时,使得无线通信装置执行图4所示的接入方法。无线通信装置可以为芯片。
本发明实施例还提供了一种无线通信装置,该无线通信装置中存储有指令;当无线通信装置在图11、图12以及图13所示的终端设备上运行时,使得无线通信装置执行图4所示的接入方法。无线通信装置可以为芯片。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将数据库访问装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。
在本申请所提供的几个实施例中,应该理解到,所揭露的数据库访问装置和方法,可以通过其它的方式实现。例如,以上所描述的数据库访问装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,数据库访问装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (56)

  1. 一种接入方法,其特征在于,包括:
    终端设备向网络设备发送第一消息,所述第一消息包括所述终端设备的标识的第一部分;
    所述终端设备接收所述网络设备发送的第二消息,所述第二消息指示所述终端设备是否能够解决竞争;
    所述终端设备根据所述第二消息确定能够解决竞争,则向所述网络设备发送第三消息,所述第三消息包括所述终端设备的标识的第二部分,所述终端设备的标识的第一部分和所述终端设备的标识的第二部分组成所述终端设备的标识;
    所述终端设备接收所述网络设备发送的第四消息,所述第四消息指示所述终端设备是否能够解决竞争;
    所述终端设备根据所述第四消息确定能够解决竞争,则接入所述网络设备。
  2. 根据权利要求1所述的接入方法,其特征在于,所述终端设备根据所述第四消息确定不能解决竞争,则释放与所述网络设备的连接。
  3. 根据权利要求1或2所述的接入方法,其特征在于,所述第四消息包括第一媒体接入控制MAC控制单元CE,所述第一MAC CE包括所述终端设备的标识的第二部分,或者,所述第一MAC CE包括所述终端设备的标识,或者,所述第一MAC CE包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  4. 根据权利要求3所述的接入方法,其特征在于,所述第四消息还包括第一逻辑信道标识值,所述第一逻辑信道标识值用于指示所述第一MAC CE。
  5. 根据权利要求1或2所述的接入方法,其特征在于,所述第四消息为无线资源控制RRC消息,所述RRC消息包括所述终端设备的标识的第二部分,或者,所述RRC消息包括所述终端设备的标识,或者,所述RRC消息包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  6. 根据权利要求1所述的接入方法,其特征在于,所述第二消息指示所述终端设备是否能够解决竞争具体包括:
    所述第二消息包括第二MAC CE,所述第二MAC CE包括所述第一消息的部分内容或全部内容,其中,所述第一消息的部分内容至少包括所述终端设备的标识的第一部分。
  7. 根据权利要求1-6任一项所述的接入方法,其特征在于,所述终端设备的标识为X个比特,所述终端设备的标识的第一部分为Y个比特,所述终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
  8. 根据权利要求1-7任一项所述的接入方法,其特征在于,所述终端设备向网络设备发送第一消息之前,所述方法还包括:
    所述终端设备向所述网络设备发送第五消息,所述第五消息包括随机接入前导码;
    所述终端设备接收所述网络设备发送的第六消息,所述第六消息包括随机接入响应。
  9. 根据权利要求8所述的接入方法,其特征在于,所述随机接入响应包括暂时小区无线网络临时标识TC-RNTI,所述方法还包括:
    所述终端设备根据所述第四消息确定能够解决竞争之后,所述终端设备将所述TC-RNTI的值设为小区无线网络临时标识C-RNTI的值。
  10. 一种接入方法,其特征在于,包括:
    网络设备接收终端设备发送的第一消息,所述第一消息包括所述终端设备的标识的第一部分;
    所述网络设备向所述终端设备发送第二消息,所述第二消息指示所述终端设备是否能够解决竞争;
    所述网络设备接收所述终端设备发送的第三消息,所述第三消息是所述终端设备根据所述第二消息确定能够解决竞争后向所述网络设备发送的,所述第三消息包括所述终端设备的标识的第二部分,所述终端设备的标识的第一部分和所述终端设备的标识的第二部分组成所述终端设备的标识;
    所述网络设备向所述终端设备发送第四消息,所述第四消息指示所述终端设备是否能够解决竞争,以便所述述终端设备根据所述第四消息判断是否能够接入所述网络设备。
  11. 根据权利要求10所述的接入方法,其特征在于,所述第四消息包括第一媒体接入控制MAC控制单元CE,所述第一MAC CE包括所述终端设备的标识的第二部分,或者,所述第一MAC CE包括所述终端设备的标识,或者,所述第一MAC CE包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  12. 根据权利要求11所述的接入方法,其特征在于,所述第四消息还包括第一逻辑信道标识值,所述第一逻辑信道标识值用于指示所述第一MAC CE。
  13. 根据权利要求10所述的接入方法,其特征在于,所述第四消息为无线资源控制RRC消息,所述RRC消息包括所述终端设备的标识的第二部分,或者,所述RRC消息包括所述终端设备的标识,或者,所述RRC消息包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  14. 根据权利要求10所述的接入方法,其特征在于,所述第二消息指示所述终端设备是否能够解决竞争具体包括:
    所述第二消息包括第二MAC CE,所述第二MAC CE包括所述第一消息的部分内容或全部内容,其中,所述第一消息的部分内容至少包括所述终端设备的标识的第一部分。
  15. 根据权利要求10-14任一项所述的接入方法,其特征在于,所述终端设备的标识为X个比特,所述终端设备的标识的第一部分为Y个比特,所述终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
  16. 根据权利要求10-15任一项所述的接入方法,其特征在于,所述网络设备接收终端设备发送的第一消息之前,所述方法还包括:
    所述网络设备接收所述终端设备发送的第五消息,所述第五消息包括随机接入前导码;
    所述网络设备向所述终端设备发送第六消息,所述第六消息包括随机接入响应。
  17. 一种计算机可读存储介质,其特征在于,包括:所述计算机可读存储介质中存储有指令;当所述计算机可读存储介质在终端设备上运行时,使得所述终端设备执行如权利要求1-16任一项所述的接入方法。
  18. 一种无线通信装置,其特征在于,包括:所述无线通信装置中存储有指令;当所述无线通信装置在终端设备上运行时,使得所述终端设备执行如权利要求1-16任一项所述的接入方法,所述无线通信装置为芯片。
  19. 一种终端设备,其特征在于,包括:一个或多个处理器和一个或多个存储器;
    所述一个或多个存储器与所述一个或多个处理器耦合,所述一个或多个存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,当所述一个或多个处理器执行所述计算机指令时,使得所述终端设备执行如权利要求1-16任一项所述的接入方法。
  20. 一种网络设备,其特征在于,包括:一个或多个处理器和一个或多个存储器;
    所述一个或多个存储器与所述一个或多个处理器耦合,所述一个或多个存储器用于存储计算机程 序代码,所述计算机程序代码包括计算机指令,当所述一个或多个处理器执行所述计算机指令时,使得所述网络设备执行如权利要求1-16任一项所述的接入方法。
  21. 一种终端设备,其特征在于,包括:
    发送单元,用于向网络设备发送第一消息,第一消息包括所述终端设备的标识的第一部分;
    接收单元,用于接收所述网络设备发送的第二消息,第二消息指示所述终端设备是否能够解决竞争;
    处理单元,用于根据第二消息确定能够解决竞争;
    所述发送单元还用于,当处理单元根据第二消息确定能够解决竞争,则向所述网络设备发送第三消息,所述第三消息包括所述终端设备的标识的第二部分,所述终端设备的标识由所述终端设备的标识的第一部分和所述终端设备的标识的第二部分组成;
    所述接收单元还用于,接收所述网络设备发送的第四消息,第四消息指示所述终端设备是否能够解决竞争,若所述终端设备根据第四消息确定能够解决竞争,则接入所述网络设备。
  22. 根据权利要求21所述的终端设备,其特征在于,所述处理单元还用于,若所述根据第四消息确定不能解决竞争,则释放与网络设备的连接。
  23. 根据权利要求21或22所述的终端设备,其特征在于,所述第四消息包括第一媒体接入控制MAC控制单元CE,所述第一MAC CE包括所述终端设备的标识的第二部分,或者,所述第一MAC CE包括所述终端设备的标识,或者,所述第一MAC CE包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  24. 根据权利要求23所述的终端设备,其特征在于,所述第四消息还包括第一逻辑信道标识值,所述第一逻辑信道标识值用于指示所述第一MAC CE。
  25. 根据权利要求21或22所述的终端设备,所述第四消息为无线资源控制RRC消息,所述RRC消息包括所述终端设备的标识的第二部分,或者,所述RRC消息包括所述终端设备的标识,或者,所述RRC消息包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  26. 根据权利要求21所述的终端设备,其特征在于,所述第二消息指示所述终端设备是否能够解决竞争具体包括:
    所述第二消息包括第二MAC CE,所述第二MAC CE包括所述第一消息的部分内容或全部内容,其中,所述第一消息的部分内容至少包括所述终端设备的标识的第一部分。
  27. 根据权利要求21-26任一项所述的终端设备,其特征在于,所述终端设备的标识为X个比特,所述终端设备的标识的第一部分为Y个比特,所述终端设备的标识的第二部分为Z个比特,X等于Y加Z。
  28. 根据权利要求21-27任一项所述的终端设备,其特征在于,
    所述发送单元还用于,向所述网络设备发送所述第一消息之前,向所述网络设备发送第五消息,所述第五消息包括随机接入前导码;
    所述接收单元还用于,接收所述网络设备发送的第六消息,所述第六消息包括随机接入响应。
  29. 根据权利要求28所述的终端设备,其特征在于,所述随机接入响应包括暂时小区无线网络临时标识TC-RNTI,所述方法还包括:
    所述终端设备根据所述第四消息确定能够解决竞争之后,所述终端设备将所述TC-RNTI的值设为小区无线网络临时标识C-RNTI的值。
  30. 一种网络设备,其特征在于,包括:
    接收单元,用于接收终端设备发送的第一消息,所述第一消息包括所述终端设备的标识的第一部分;
    处理单元,生成第二消息,所述第二消息指示所述终端设备是否能够解决竞争;
    发送单元,用于向所述终端设备发送所述第二消息;
    所述接收单元还用于,接收所述终端设备发送的第三消息,所述第三消息是所述终端设备根据所述第二消息确定能够解决竞争后向所述网络设备发送的,所述第三消息包括所述终端设备的标识的第二部分,所述终端设备的标识的第一部分和所述终端设备的标识的第二部分组成所述终端设备的标识;
    所述发送单元还用于,向所述终端设备发送第四消息,所述第四消息指示所述终端设备是否能够解决竞争,以便所述述终端设备根据所述第四消息判断是否能够接入所述网络设备。
  31. 根据权利要求30所述的网络设备,其特征在于,所述第四消息包括第一媒体接入控制MAC控制单元CE,所述第一MAC CE包括所述终端设备的标识的第二部分,或者,所述第一MAC CE包括所述终端设备的标识,或者,所述第一MAC CE包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  32. 根据权利要求31所述的网络设备,其特征在于,所述第四消息还包括第一逻辑信道标识值,所述第一逻辑信道标识值用于指示所述第一MAC CE。
  33. 根据权利要求30所述的网络设备,其特征在于,所述第四消息为无线资源控制RRC消息,所述RRC消息包括所述终端设备的标识的第二部分,或者,所述RRC消息包括所述终端设备的标识,或者,所述RRC消息包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  34. 根据权利要求30所述的网络设备,其特征在于,所述第二消息指示所述终端设备是否能够解决竞争具体包括:
    所述第二消息包括第二MAC CE,所述第二MAC CE包括所述第一消息的部分内容或全部内容,其中,所述第一消息的部分内容至少包括所述终端设备的标识的第一部分。
  35. 根据权利要求30-34任一项所述的网络设备,其特征在于,所述终端设备的标识为X个比特,所述终端设备的标识的第一部分为Y个比特,所述终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
  36. 根据权利要求30-35任一项所述的网络设备,其特征在于,所述接收单元还用于,接收终端设备发送的第一消息之前,接收所述终端设备发送的第五消息,所述第五消息包括随机接入前导码;所述发送单元还用于,向所述终端设备发送第六消息,所述第六消息包括随机接入响应。
  37. 一种终端设备,其特征在于,包括:
    收发器,用于向网络设备发送第一消息,第一消息包括所述终端设备的标识的第一部分;
    所述收发器,还用于接收所述网络设备发送的第二消息,第二消息指示所述终端设备是否能够解决竞争;
    处理器,用于根据第二消息确定能够解决竞争;
    所述收发器,还用于当处理器根据第二消息确定能够解决竞争,则向所述网络设备发送第三消息,所述第三消息包括所述终端设备的标识的第二部分,所述终端设备的标识由所述终端设备的标识的第一部分和所述终端设备的标识的第二部分组成;
    所述接收单元还用于,接收所述网络设备发送的第四消息,第四消息指示所述终端设备是否能够解决竞争,若所述终端设备根据第四消息确定能够解决竞争,则接入所述网络设备。
  38. 根据权利要求37所述的终端设备,其特征在于,所述处理器还用于,若根据所述第四消息确 定不能解决竞争,则释放与网络设备的连接。
  39. 根据权利要求37或38所述的终端设备,其特征在于,所述第四消息包括第一媒体接入控制MAC控制单元CE,所述第一MAC CE包括所述终端设备的标识的第二部分,或者,所述第一MAC CE包括所述终端设备的标识,或者,所述第一MAC CE包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  40. 根据权利要求39所述的终端设备,其特征在于,所述第四消息还包括第一逻辑信道标识值,所述第一逻辑信道标识值用于指示所述第一MAC CE。
  41. 根据权利要求37或38所述的终端设备,所述第四消息为无线资源控制RRC消息,所述RRC消息包括所述终端设备的标识的第二部分,或者,所述RRC消息包括所述终端设备的标识,或者,所述RRC消息包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  42. 根据权利要求37所述的终端设备,其特征在于,所述第二消息指示所述终端设备是否能够解决竞争具体包括:
    所述第二消息包括第二MAC CE,所述第二MAC CE包括所述第一消息的部分内容或全部内容,其中,所述第一消息的部分内容至少包括所述终端设备的标识的第一部分。
  43. 根据权利要求37-42任一项所述的终端设备,其特征在于,所述终端设备的标识为X个比特,所述终端设备的标识的第一部分为Y个比特,所述终端设备的标识的第二部分为Z个比特,X等于Y加Z。
  44. 根据权利要求37-43任一项所述的终端设备,其特征在于,
    所述发送单元还用于,向所述网络设备发送所述第一消息之前,向所述网络设备发送第五消息,所述第五消息包括随机接入前导码;
    所述接收单元还用于,接收所述网络设备发送的第六消息,所述第六消息包括随机接入响应。
  45. 根据权利要求44所述的终端设备,其特征在于,所述随机接入响应包括暂时小区无线网络临时标识TC-RNTI,所述方法还包括:
    所述终端设备根据所述第四消息确定能够解决竞争之后,所述终端设备将所述TC-RNTI的值设为小区无线网络临时标识C-RNTI的值。
  46. 一种网络设备,其特征在于,包括:
    收发器,用于接收终端设备发送的第一消息,所述第一消息包括所述终端设备的标识的第一部分;
    处理器,生成第二消息,所述第二消息指示所述终端设备是否能够解决竞争;
    所述收发器,还用于向所述终端设备发送所述第二消息;
    所述收发器还用于,接收所述终端设备发送的第三消息,所述第三消息是所述终端设备根据所述第二消息确定能够解决竞争后向所述网络设备发送的,所述第三消息包括所述终端设备的标识的第二部分,所述终端设备的标识的第一部分和所述终端设备的标识的第二部分组成所述终端设备的标识;
    所述收发器还用于,向所述终端设备发送第四消息,所述第四消息指示所述终端设备是否能够解决竞争,以便所述述终端设备根据所述第四消息判断是否能够接入所述网络设备。
  47. 根据权利要求46所述的网络设备,其特征在于,所述第四消息包括第一媒体接入控制MAC控制单元CE,所述第一MAC CE包括所述终端设备的标识的第二部分,或者,所述第一MAC CE包括所述终端设备的标识,或者,所述第一MAC CE包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  48. 根据权利要求47所述的网络设备,其特征在于,所述第四消息还包括第一逻辑信道标识值, 所述第一逻辑信道标识值用于指示所述第一MAC CE。
  49. 根据权利要求46所述的网络设备,其特征在于,所述第四消息为无线资源控制RRC消息,所述RRC消息包括所述终端设备的标识的第二部分,或者,所述RRC消息包括所述终端设备的标识,或者,所述RRC消息包括所述第三消息的部分内容或全部内容,其中,所述第三消息的部分内容至少包括所述终端设备的标识的第二部分。
  50. 根据权利要求46所述的网络设备,其特征在于,所述第二消息指示所述终端设备是否能够解决竞争具体包括:
    所述第二消息包括第二MAC CE,所述第二MAC CE包括所述第一消息的部分内容或全部内容,其中,所述第一消息的部分内容至少包括所述终端设备的标识的第一部分。
  51. 根据权利要求46-50任一项所述的网络设备,其特征在于,所述终端设备的标识为X个比特,所述终端设备的标识的第一部分为Y个比特,所述终端终端设备的标识的第二部分为Z个比特,X等于Y加Z。
  52. 根据权利要求46-51任一项所述的网络设备,其特征在于,所述收发器还用于,接收终端设备发送的第一消息之前,接收所述终端设备发送的第五消息,所述第五消息包括随机接入前导码;
    所述收发器还用于,向所述终端设备发送第六消息,所述第六消息包括随机接入响应。
  53. 一种计算机可读存储介质,其特征在于,包括:所述计算机可读存储介质中存储有指令;当所述计算机可读存储介质在如权利要求21-29、权利要求37-45任一项所述的终端设备上运行时,使得终端设备执行如权利要求1-16任一项所述的接入方法。
  54. 一种计算机可读存储介质,其特征在于,包括:所述计算机可读存储介质中存储有指令;当所述计算机可读存储介质在如权利要求30-36、权利要求46-52任一项所述的终端设备上运行时,使得终端设备执行如权利要求1-16任一项所述的接入方法。
  55. 一种无线通信装置,包括:无线通信装置中存储有指令;当所述无线通信装置在如权利要求21-29、权利要求37-45任一项所述的终端设备上运行时,使得终端设备执行如权利要求1-16任一项所述的接入方法,所述无线通信装置为芯片。
  56. 一种无线通信装置,包括:无线通信装置中存储有指令;当所述无线通信装置在如权利要求30-36、权利要求46-52任一项所述的终端设备上运行时,使得终端设备执行如权利要求1-16任一项所述的接入方法,所述无线通信装置为芯片。
PCT/CN2019/091208 2018-06-14 2019-06-14 —种接入方法及设备 WO2019238110A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810615839.4A CN110611960A (zh) 2018-06-14 2018-06-14 一种接入方法及设备
CN201810615839.4 2018-06-14

Publications (1)

Publication Number Publication Date
WO2019238110A1 true WO2019238110A1 (zh) 2019-12-19

Family

ID=68841695

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/091208 WO2019238110A1 (zh) 2018-06-14 2019-06-14 —种接入方法及设备

Country Status (2)

Country Link
CN (1) CN110611960A (zh)
WO (1) WO2019238110A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023082067A1 (zh) * 2021-11-09 2023-05-19 Oppo广东移动通信有限公司 通信方法及通信装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546981A (zh) * 2012-07-16 2014-01-29 普天信息技术研究院有限公司 竞争式随机接入的实现方法和装置
CN106255223A (zh) * 2015-06-09 2016-12-21 电信科学技术研究院 一种进行随机接入的方法和设备
WO2017162004A1 (zh) * 2016-03-25 2017-09-28 大唐移动通信设备有限公司 一种竞争式随机接入的方法及装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155382A (zh) * 2006-09-25 2008-04-02 北京三星通信技术研究有限公司 发送用户设备标识和用户信息的设备和方法
EP3482599A4 (en) * 2016-08-10 2019-05-29 Samsung Electronics Co., Ltd. METHOD AND DEVICE FOR SUPPORTING THE FLEXIBLE BANDWIDTH OF A USER DEVICE IN A NEXT-GENERATION COMMUNICATION SYSTEM

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546981A (zh) * 2012-07-16 2014-01-29 普天信息技术研究院有限公司 竞争式随机接入的实现方法和装置
CN106255223A (zh) * 2015-06-09 2016-12-21 电信科学技术研究院 一种进行随机接入的方法和设备
WO2017162004A1 (zh) * 2016-03-25 2017-09-28 大唐移动通信设备有限公司 一种竞争式随机接入的方法及装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Message 3. 5 in LTE connected to 5GC", 3GPP TSG-RAN WG2 #100, R2-1713273, 1 December 2017 (2017-12-01), XP051371221 *
INTEL CORPORATION: "Extending 5G-S-TMSI to 48 bits", 3GPP TSG-RAN WG2 MEETING #101BIS, R2-1805049, 20 April 2018 (2018-04-20), XP051428738 *

Also Published As

Publication number Publication date
CN110611960A (zh) 2019-12-24

Similar Documents

Publication Publication Date Title
WO2018127240A1 (zh) 一种随机接入响应方法和装置
JP4938847B2 (ja) 無線移動通信システムにおけるメッセージ分離を利用する無線アクセス情報送受信方法
CN109922508B (zh) 资源重配方法、基站及用户设备
WO2017084236A1 (zh) 随机接入的方法及装置
CN111565473A (zh) 一种随机接入方法和装置
WO2010121446A1 (zh) 随机接入方法、终端
WO2019184807A1 (zh) 一种信息处理方法和设备
CN107690172B (zh) 一种无线网络中的接入方法及设备
CN110300455B (zh) 随机接入资源指示、随机接入方法、基站、终端及装置
US10477551B2 (en) Uplink data transmission resource allocation method and apparatus using load balancing
WO2018171527A1 (en) Data transmission in rrc inactive state
WO2014196908A1 (en) Telecommunications apparatus and method relating to a random access procedure
KR20210043664A (ko) 자원의 할당 방법 및 장치
KR101435688B1 (ko) 이동통신시스템에서의 효과적으로 무선자원할당요청을 보내는 방법
WO2019238110A1 (zh) —种接入方法及设备
JP2021177662A (ja) アクセス制御方法および関連製品
WO2020164527A1 (zh) 一种随机接入方法和装置
CN108141895B (zh) 用户设备ue接入网络的方法、网络设备及第一ue
US20130115992A1 (en) Method and apparatus for controlling wireless devices
WO2018086472A1 (zh) 一种面向业务的mtc设备动态接入控制方法与装置
WO2021218682A1 (zh) 通信方法、装置及系统
WO2017148281A1 (zh) 连接建立方法、用户设备、网络设备及计算机存储介质
WO2020233135A1 (zh) 一种数据处理的方法、装置和系统
CN111819902B (zh) 一种随机接入方法及装置
JP7083849B2 (ja) 通信方法、装置、およびシステム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19818922

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19818922

Country of ref document: EP

Kind code of ref document: A1