WO2020024614A1 - 一种随机接入的方法、设备及计算机存储介质 - Google Patents
一种随机接入的方法、设备及计算机存储介质 Download PDFInfo
- Publication number
- WO2020024614A1 WO2020024614A1 PCT/CN2019/081996 CN2019081996W WO2020024614A1 WO 2020024614 A1 WO2020024614 A1 WO 2020024614A1 CN 2019081996 W CN2019081996 W CN 2019081996W WO 2020024614 A1 WO2020024614 A1 WO 2020024614A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- rnti
- identification information
- pdcch
- identifier
- rar message
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 149
- 230000004044 response Effects 0.000 claims abstract description 6
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 claims description 50
- 238000013507 mapping Methods 0.000 claims description 26
- 238000004590 computer program Methods 0.000 claims description 14
- 238000012544 monitoring process Methods 0.000 claims description 14
- 238000001514 detection method Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000011084 recovery Methods 0.000 claims 4
- 238000004891 communication Methods 0.000 description 30
- 238000010586 diagram Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 7
- 230000001360 synchronised effect Effects 0.000 description 6
- 230000001413 cellular effect Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000011664 signaling Effects 0.000 description 4
- 101100533725 Mus musculus Smr3a gene Proteins 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 101100274486 Mus musculus Cited2 gene Proteins 0.000 description 1
- 101150096622 Smr2 gene Proteins 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
- H04W72/1263—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
- H04W72/1268—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/21—Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
- H04W72/232—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal the control data signalling from the physical layer, e.g. DCI signalling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
- H04W74/004—Transmission of channel access control information in the uplink, i.e. towards network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
- H04W74/006—Transmission of channel access control information in the downlink, i.e. towards the terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/27—Transitions between radio resource control [RRC] states
Definitions
- Embodiments of the present application relate to the field of wireless communication technologies, and in particular, to a method, a device, and a computer storage medium for random access.
- wireless communication systems may be multiple-access systems capable of supporting communication with multiple users by sharing available system resources (e.g., time, frequency, and power).
- a wireless multiple-access communication system may include several base stations, and each base station simultaneously supports communication of multiple communication devices, and these communication devices may be additionally referred to as User Equipment (UE).
- the base station may communicate with the communication device on a downlink channel (e.g., for transmission from the base station to the UE) and an uplink channel (e.g., for transmission from the UE to the base station).
- a downlink channel e.g., for transmission from the base station to the UE
- an uplink channel e.g., for transmission from the UE to the base station.
- wireless devices can be implemented through random access procedures.
- System access may include contention-based random access procedures and non-contention-based random access procedures.
- ms milliseconds
- the embodiments of the present application provide a random access method, device, and computer storage medium, which can reduce the delay of the random access process and improve the time efficiency of the random access process.
- a random access method is provided.
- the method is applied to a UE.
- the method includes: receiving a Random Access Response (RAR) message based on first identification information; wherein the RAR The message carries second identification information; within a preset time window, a physical downlink control channel is detected based on the second identification information or third identification information that is associated with the second identification information. , PDCCH); wherein the PDCCH is scrambled by using the second identification information or the third identification information.
- RAR Random Access Response
- PDCCH Physical Downlink control channel
- a random access method is provided.
- the method is applied to a network device.
- the method includes: scramble a RAR message to a UE after scrambled with first identification information, wherein the RAR message carries There is second identification information; scramble the PDCCH to be transmitted according to the second identification information or third identification information having an association relationship with the second identification information; and send the scrambled PDCCH to the UE.
- a UE which may include: a first receiving part and a detecting part;
- the first detection section is configured to receive a RAR message based on the first identification information; wherein the RAR message carries second identification information;
- the detecting section is configured to detect a PDCCH according to the second identification information or third identification information having an association relationship with the second identification information within a preset time window, wherein the PDCCH passes the first The second identification information or the third identification information is scrambled.
- a network device which may include: a scrambling part and a second sending part;
- the scrambling section is configured to scramble the RAR message by using the first identification information
- the second sending part is configured to send a scrambled RAR message to the UE; wherein the RAR message carries second identification information;
- the scrambling section is further configured to scramble the PDCCH to be transmitted according to the second identification information or third identification information having an association relationship with the second identification information;
- the second sending part is further configured to send the scrambled PDCCH to the UE.
- a user equipment includes: a first network interface, a first memory, and a first processor; wherein the first network interface is configured to communicate with other external network elements. Receiving and sending signals during the process of receiving and sending information; the first memory is used to store a computer program capable of running on the first processor; the first processor is used to run the computer program When performing the steps of the method described in the first aspect.
- a network device includes a second network interface, a second memory, and a second processor.
- the second network interface is configured to communicate with other external network elements. Receiving and sending signals during the process of sending and receiving information; the second memory is used to store a computer program capable of running on a second processor; and the second processor is used when running the computer program, Perform the steps of the method described in the second aspect.
- a computer storage medium stores a random access program, and the random access program implements the random access according to the first aspect or the second aspect when executed by at least one processor. Steps of the method of access.
- the UE After the UE completes sending the preamble, it detects the PDCCH based on the second identification information in the RAR, so as to determine whether the contention conflict is resolved. There is no need to send a Radio Resource Control (RRC) message to the network device as in the four-procedure random access process, and then receive a conflict resolution (Contention Resolution) message for the RRC signaling feedback from the network device to determine the conflict resolution. So that it can complete the contention-based random access process through the two-message procedure, reduce the delay of the random access process, and improve the time efficiency of the random access process.
- RRC Radio Resource Control
- FIG. 1 is an exemplary diagram of a wireless communication system according to an embodiment of the present application.
- FIG. 2 is a schematic diagram of a random access process of a four-message protocol in the related art
- FIG. 3 is a schematic flowchart of a random access method according to an embodiment of the present application.
- FIG. 5 is a schematic diagram of a specific process of random access according to an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a UE according to an embodiment of the present application.
- FIG. 7 is a schematic structural diagram of another UE according to an embodiment of the present application.
- FIG. 8 is a schematic diagram of a specific hardware structure of a UE according to an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a network device according to an embodiment of the present application.
- FIG. 10 is a schematic structural diagram of another network device according to an embodiment of the present application.
- FIG. 11 is a schematic diagram of a specific hardware structure of another network device according to an embodiment of the present application.
- the communication system 100 may include a network device 110, a network device 110 It may be a device that communicates with the terminal device 120 (or referred to as a communication terminal, terminal).
- the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located within the coverage area.
- the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, or a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system.
- BTS Base Transceiver Station
- NodeB, NB base station
- the network device may be a mobile switching center, relay station, access point, vehicle equipment, Wearable devices, hubs, switches, bridges, routers, network-side devices or 5G base stations (gNB) in 5G networks, or network devices in public land mobile networks (PLMN) that are evolving in the future.
- gNB 5G base stations
- PLMN public land mobile networks
- the communication system 100 further includes at least one terminal device 120 located within a coverage area of the network device 110.
- terminal equipment used herein includes, but is not limited to, connection via wired lines, such as via Public Switched Telephone Networks (PSTN), Digital Subscriber Line (DSL), digital cable, direct cable connection ; And / or another data connection / network; and / or via a wireless interface, such as for cellular networks, Wireless Local Area Networks (WLAN), digital television networks such as DVB-H networks, satellite networks, AM- FM broadcast transmitter; and / or another terminal device configured to receive / transmit communication signals; and / or Internet of Things (IoT) devices.
- PSTN Public Switched Telephone Networks
- DSL Digital Subscriber Line
- WLAN Wireless Local Area Networks
- DVB-H Digital Video Broadband
- satellite networks satellite networks
- AM- FM broadcast transmitter AM- FM broadcast transmitter
- IoT Internet of Things
- a terminal device configured to communicate through a wireless interface may be referred to as a “wireless communication terminal”, a “wireless terminal”, or a “mobile terminal”.
- mobile terminals include, but are not limited to, satellite or cellular phones; personal communications systems (PCS) terminals that can combine cellular radiotelephones with data processing, facsimile, and data communications capabilities; can include radiotelephones, pagers, Internet / internal PDA with network access, web browser, notepad, calendar, and / or Global Positioning System (GPS) receiver; and conventional laptop and / or palm-type receivers or others including radiotelephone transceivers Electronic device.
- PCS personal communications systems
- GPS Global Positioning System
- a terminal device can refer to an access terminal, user equipment (User Equipment), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or User device.
- the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Processing (PDA), and wireless communication.
- terminal devices 120 may perform terminal direct device (D2D) communication.
- D2D terminal direct device
- the 5G system or the 5G network may also be referred to as a New Radio (NR) system or an NR network.
- NR New Radio
- FIG. 1 exemplarily shows one network device and two terminal devices.
- the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
- the terminal device 120 may have a need to access the network device 90, thereby triggering a random access process.
- the event that triggers the random access process may include but is not limited to the following: when the terminal device 120 initially accesses the wireless communication system 100, and when the terminal device 120 is not synchronized with the wireless communication system 100, In a certain switching process in which the terminal device 120 is switched between different network devices 90, in the case that the RRC connection (Connection) is re-established between the terminal device 120 and the network device 90, the terminal device 120 is changed from an inactive state by RRC_INACTIVE In the case of migration, or in the case where the terminal device 120 is instructed by other system information (System Information).
- System Information System Information
- the network device 90 may be a gNB and a terminal device. 120 may be a UE, and a specific process thereof is shown in FIG. 2:
- the UE sends the selected random access preamble on the selected physical random access channel (PRACH) resources;
- PRACH physical random access channel
- the UE can send the random access preamble through the first message Msg1.
- the gNB can transmit the uplink time (Timing) and the terminal to the third message (Msg3) based on the preamble.
- the required grant size is estimated.
- S220 gNB sends RAR to UE
- the gNB can send the RAR through the second message (Msg2).
- Msg2 the second message
- the UE will open a RAR time window (RAR window), and monitor the PDCCH in the RAR window, and after detecting the PDCCH To obtain a physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) scheduled by the PDCCH, which includes the RAR. If the UE does not obtain an RAR within the RAR window, the random access procedure fails this time.
- RAR window RAR time window
- PDSCH Physical Downlink Shared Channel
- S230 The UE sends an RRC message
- the RRC message may be sent through a third message (Msg3), and Msg3 is mainly used to notify the network of what event the RACH process is triggered by. For example, if it is an initial access random process, the UE ID and establishment cause establishment will be carried in msg3; if it is RRC reconstruction, it will carry the connected UE identity and establishment cause;
- Msg3 is mainly used to notify the network of what event the RACH process is triggered by. For example, if it is an initial access random process, the UE ID and establishment cause establishment will be carried in msg3; if it is RRC reconstruction, it will carry the connected UE identity and establishment cause;
- the ID carried by msg3 can make the contention conflicts resolved in S240.
- S240 The gNB feeds back a contention resolution message to the UE;
- the Contention Resolution can be transmitted through the fourth message (Msg4), and Msg4 has two functions, one is for the resolution of the contention conflict; the second is to transmit the RRC configuration message to the UE; for the contention conflict
- Msg4 has two functions, one is for the resolution of the contention conflict; the second is to transmit the RRC configuration message to the UE; for the contention conflict
- Method 1 If the UE carries a Cell Radio Network Temporary Identifier (C-RNTI) in S230, Msg4 can be scheduled using C-RNTI scrambled PDCCH;
- C-RNTI Cell Radio Network Temporary Identifier
- Method 2 If the UE does not carry a C-RNTI in S230, such as in the case of initial access, Msg4 uses the temporary C-RNTI (TC-RNTI) scrambled PDCCH scheduling; the conflict is resolved through the UE receiving Msg4 PDSCH, by matching the service data unit (Common Control Channel Service Data Unit, CCCH) of the common control channel in the PDSCH.
- TC-RNTI temporary C-RNTI
- CCCH Common Control Channel Service Data Unit
- the four-message procedure will increase the delay of the random access process, which will adversely affect the low-latency services in the 5G system. Therefore, it is currently expected that the random access procedure of the original four-message procedure can be realized through the two-message procedure.
- the two-message protocol to implement contention-based random access the following issues need to be resolved: how to resolve contention conflicts, and under the two-message protocol, the two messages need to be transmitted separately.
- FIG. 3 shows a random access method provided by an embodiment of the present application.
- the method can be applied to user equipment UE, such as the terminal device 120 shown in FIG.
- the method may include:
- S301 Receive a RAR message based on the first identification information; wherein the RAR message carries second identification information;
- S302 Detect a PDCCH according to the second identification information or third identification information having an association relationship with the second identification information within a preset time window, where the PDCCH passes the second identification information or all the identification information.
- the third identification information is scrambled.
- the UE detects the PDCCH according to the second identification information carried in the RAR or the third identification information associated with the second identification information, and after successfully descrambling the PDCCH, receives the PDSCH scheduled by the PDCCH. Therefore, when the UE receives the RAR message, the contention conflict is solved, so that the contention-based random access process can be completed through the two message procedures, the delay of the random access process is reduced, and the time efficiency of the random access process is improved.
- the UE before S301, the UE also needs to send a preamble to a network device, such as an eNB or gNB. Therefore, in an implementation manner, the method may further include:
- the UE identity it can be used to characterize the uniqueness of the UE.
- the UE identity may include any of the following: 5G SAE Temporary Mobile Subscriber Identity (5G-S-TMSI); Part of 5G-S-TMSI; C-RNTI; C-RNTI, Physical Cell Identifier (PCI) and Short Media Access Control Identifier (short MAC I); and Resume ID).
- 5G SAE Temporary Mobile Subscriber Identity 5G-S-TMSI
- Part of 5G-S-TMSI C-RNTI
- C-RNTI C-RNTI
- PCI Physical Cell Identifier
- short MAC I Short Media Access Control Identifier
- the UE identifier can uniquely distinguish the UE, there is a mapping relationship between the above identifiers. That is, taking C-RNTI as an example, for the same UE, All identities other than the C-RNTI can be mapped to the C-RNTI. For these identifiers, 5G-S-TMSI can uniquely distinguish UEs, but the length of 5G-S-TMSI is usually longer.
- the UE can negotiate with the network device to pass A part of the 5G-S-TMSI uniquely distinguishes the UE; in addition, optionally, the network device may configure a part of the 5G-S-TMSI for the UE to uniquely distinguish the UE.
- the Resume ID may be a UE identifier that is convenient for retrieving a UE context in a network device, and is usually used when the UE switches from an RRC inactive state to an RRC connected state.
- the configured uplink resources may include physical uplink control channel (PUCCH) resources and / or physical uplink shared channel (PUSCH) resources, understandably
- PUCCH physical uplink control channel
- PUSCH physical uplink shared channel
- the configured uplink resources have a mapping relationship with the PRACH resources, that is, when the UE sends a preamble through a PRACH resource, it can be based on the The mapping relationship determines an uplink resource corresponding to the PRACH resource and used to transmit and send the UE identity.
- the first identification information may be a Random Access Radio Network Temporary Identifier (RA-RNTI).
- RA-RNTI Random Access Radio Network Temporary Identifier
- the UE may send a PRACH resource based on a preamble, such as a time domain resource. , Frequency domain resources, and code domain resources to determine RA-RNTI.
- the first identifier information may include the C-RNTI accordingly.
- the receiving the RAR message based on the first identification information includes: receiving the RAR message according to the C-RNTI.
- the method further includes: after receiving the RAR message, stopping detecting the PDCCH scrambled by the second identification information or the third identification information.
- the second identification information may also be used to uniquely distinguish Based on this, the second identification information may include any of the following: 5G-S-TMSI; a portion of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC; and, restoration of the identification (Resume ID).
- the selectable range of the second identification information is consistent with the selectable range of the UE identification. Since this information can uniquely distinguish the UE, for example, both 5G-S-TMSI and C-RNTI can uniquely distinguish the UE, therefore, The content included in the second identification information may be inconsistent with the content included in the sent UE identification.
- the preset time window in S302 may be a RAR window for the RAR to be monitored by the UE after the preamble is sent, or a time window configured by a network device. This embodiment will not repeat them here.
- this step can implement a contention conflict. Therefore, for S302, the following can be specifically implemented through the following optional examples.
- Optional example 1 Detecting a PDCCH according to the second identification information includes:
- the PDCCH is monitored through the C-RNTI or other identifiers associated with the C-RNTI; corresponding to success When the PDCCH is detected, conflict resolution is determined.
- the network device scrambles the PDCCH by using the C-RNTI or other identifiers associated with the C-RNTI. Then, if the UE identifier sent by the UE on the configured uplink resource is C-RNTI , Then the network device can directly use the C-RNTI to scramble the PDCCH, so when the UE successfully descrambles the PDCCH through the C-RNTI, it indicates that the contention conflict is resolved.
- Optional example 2 Detecting a PDCCH according to the second identification information includes:
- the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message is a C-RNTI
- monitoring is performed through the C-RNTI or other identifiers associated with the C-RNTI PDCCH; corresponding to the successful monitoring of the PDCCH, and the identifier in the CCCH SDU transmitted by the PDSCH scheduled to be monitored by the PDCCH is consistent with the UE identifier transmitted by the uplink resource, it is determined that the conflict is resolved.
- the UE identifier sent by the UE on the configured uplink resource is not a C-RNTI, but is, for example, 5G-S-TMSI or part of 5G-S-TMSI, but the network device uses C- The RNTI or other identifiers associated with the C-RNTI scramble the PDCCH. Therefore, the second identifier information carried in the RAR message is the other identifiers associated with the C-RNTI or C-RNTI, and then the UE terminal may use the second identifier information.
- C-RNTI or other identifiers associated with the C-RNTI monitor the PDCCH; if the PDCCH is successfully monitored, the PDSCH is scheduled based on the PDCCH. When determining the identifier in the CCCH SDU transmitted by the PDSCH and the UE sent by the configured uplink resource If the identities are consistent, the UE determines that the contention conflict is resolved.
- the above-mentioned “consistent” may include two meanings: one: the “consistent” may be expressed as that the identifier in the CCCH and SDU transmitted by the PDSCH is completely consistent with the UE identifier sent by the configured uplink resource; the second, The “consistent” can be regarded as aiming at a certain degree of consistency, that is, “considered as consistent”, that is, when the first N bits (for example, 48 bits) in the CCCH SDU transmitted by the PDSCH and the If the first N bits transmitted on the uplink resource are the same, the two can be considered to be “consistent”.
- Optional example 3 Detecting a PDCCH according to third identification information that is associated with the second identification information includes:
- the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message matches the other identifier, determining conflict resolution; and
- the C-RNTI whose two identification information has a mapping relationship monitors the PDCCH.
- the UE identity sent by the UE on the configured uplink resource is not a C-RNTI, but is, for example, 5G-S-TMSI; but the second identity information carried in the RAR message is the same as 5G- S-TMSI matches other identifiers, such as some 5G-S-TMSI. Then the UE can determine the conflict resolution at this time.
- the UE can obtain a C-RNTI with a mapping relationship, such as some 5G-S-TMSI, so as to continue to monitor the PDCCH by using the C-RNTI. It should be noted that the mapping relationship may be considered as a special closer relationship.
- the mapping relationship may be configured for the UE in advance through a network device, and may also be determined according to a rule stipulated by an existing protocol.
- the UE After the UE completes sending the preamble, it detects the PDCCH based on the second identification information in the RAR, so as to determine whether the contention conflict is resolved. It is not necessary to send an RRC message to the network device as in the four-procedure random access process, and then receive a conflict resolution (Contention Resolution) message for the RRC signaling feedback from the network device to determine the conflict resolution. So that it can complete the contention-based random access process through the two-message procedure, reduce the delay of the random access process, and improve the time efficiency of the random access process.
- conflict resolution Contention Resolution
- FIG. 4 illustrates a random access method provided by an embodiment of the present application.
- the method can be applied to a network device, such as a base station eNB or gNB shown in FIG. 1.
- the method may include:
- S401 Send the RAR message to the UE after scrambling with the first identification information; wherein the RAR message carries the second identification information;
- S402 Scramble the PDCCH to be transmitted according to the second identification information or the third identification information having an association relationship with the second identification information.
- S403 Send the scrambled PDCCH to the UE.
- the network device sends the scrambled PDCCH to the UE.
- the UE can successfully descramble the PDCCH according to the second identification information or the third identification information, the competitive access is explained.
- Conflict resolution so that the contention-based random access process can be completed through the two-message procedure, which reduces the delay of the random access process and improves the time efficiency of the random access process.
- the method further includes:
- the UE identity can be used to characterize the uniqueness of the UE.
- the UE identity can include any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI and short MAC; and Resume ID.
- the UE identifier can uniquely distinguish the UE, there is a mapping relationship between the above identifiers. That is, taking C-RNTI as an example, for the same UE, All identities other than the C-RNTI can be mapped to the C-RNTI.
- the configured uplink resources may include PUCCH resources and / or PUSCH resources.
- the configured uplink resource has a mapping relationship with the PRACH resource, that is, when the UE sends a preamble through a PRACH resource, then the mapping corresponding to the PRACH resource can be determined according to the mapping relationship for transmission and transmission.
- the first identification information may be RA-RNTI.
- the second identification information may also be used for uniquely distinguishing in order to resolve the contention conflict.
- the second identification information includes any of the following: 5G-S-TMSI; part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC ID; and, recovering the identification ( Resume ID).
- the selectable range of the second identification information is consistent with the selectable range of the UE identification. Since this information can uniquely distinguish the UE, for example, both 5G-S-TMSI and C-RNTI can uniquely distinguish the UE, therefore, The content included in the second identification information may be inconsistent with the content included in the sent UE identification.
- the UE may perform the PDCCH by using the second identification information or the third identification information associated with the second identification information.
- the descrambling is performed to resolve the contention conflict. Therefore, for S402, the PDCCH to be transmitted is scrambled according to the second identification information or the third identification information having an association relationship with the second identification information. Choose an example.
- the scrambling of the PDCCH to be sent according to the second identification information or the third identification information having an association relationship with the second identification information may include:
- the PDCCH to be transmitted is added through the C-RNTI or other identifiers associated with the C-RNTI. Disturb.
- the scrambling of the PDCCH to be sent according to the second identification information or the third identification information having an association relationship with the second identification information may include:
- the UE identifier transmitted by the uplink resource is another identifier other than C-RNTI, and the second identifier information carried in the RAR message is C-RNTI, it is treated through the other identifiers associated with C-RNTI or C-RNTI
- the transmitted PDCCH is scrambled.
- the scrambling of the PDCCH to be sent according to the second identification information or the third identification information having an association relationship with the second identification information may include:
- the UE identifier transmitted by the uplink resource is another identifier other than the C-RNTI, and the second identifier information carried in the RAR message matches the other identifier, a mapping with the second identifier information is used.
- the related C-RNTI scrambles the PDCCH to be transmitted.
- the network device may re-ran the random access procedure with the UE.
- the network device scrambles the PDCCH based on the second identification information in the RAR, so that the UE detects the PDCCH based on the second identification information, thereby determining whether the contention conflict is resolved. It is not necessary to send an RRC message to the network device as in the four-procedure random access process, and then receive a conflict resolution (Contention Resolution) message for the RRC signaling feedback from the network device to determine the conflict resolution. So that it can complete the contention-based random access process through the two-message procedure, reduce the delay of the random access process, and improve the time efficiency of the random access process.
- conflict resolution Contention Resolution
- FIG. 5 illustrates a specific procedure of random access provided by an embodiment of the present application.
- This procedure can be applied to a UE and a base station, such as a gNB or an eNB. :
- the UE sends a preamble on the configured PRACH resources, and sends a UE identity on the configured PUCCH resources and / or PUSCH resources.
- the configured PUCCH resources and / or PUSCH resources may correspond to the configured PRACH resources, that is, when the UE sends a preamble through a PRACH resource, then the mapping may be based on the mapping The relationship determines an uplink resource corresponding to the PRACH resource for transmitting and sending the UE identity.
- the UE identity can be used to characterize the uniqueness of the UE.
- the UE identity can include any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C- RNTI, PCI, and short MAC ID; and Resume ID.
- 5G-S-TMSI 5G-S-TMSI
- C-RNTI C-RNTI
- C- RNTI C-RNTI, PCI, and short MAC ID
- Resume ID Resume ID
- the base station After receiving the preamble, the base station determines the second identification information for scrambling the PDCCH according to the UE identity, and carries the second identification information in the RAR message scrambled by the RA-RNTI.
- the base station determines the second identification information for scrambling the PDCCH, it can implement the solution to the contention conflict.
- the second identification information may include any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC ; And, Resume ID.
- the selectable range of the second identification information is consistent with the selectable range of the UE identification. Since this information can uniquely distinguish the UE, for example, both 5G-S-TMSI and C-RNTI can uniquely distinguish the UE, therefore, optionally, based on the uniqueness of distinguishing the UE, the content included in the second identification information may be inconsistent with the content included in the UE identification sent by the UE.
- the base station sends the RAR message scrambled by the RA-RNTI to the UE;
- the RAR message carries second identification information.
- the base station uses the second identification information or the third identification information associated with the second identification information to scramble the PDCCH to be sent;
- the PDCCH to be transmitted is added through the C-RNTI or other identifiers associated with the C-RNTI. Disturb.
- the UE identifier transmitted by the uplink resource is another identifier other than C-RNTI, and the second identifier information carried in the RAR message is C-RNTI, it is treated through the other identifiers associated with C-RNTI or C-RNTI
- the transmitted PDCCH is scrambled.
- the UE identifier transmitted by the uplink resource is another identifier other than the C-RNTI, and the second identifier information carried in the RAR message matches the other identifier, a mapping with the second identifier information is used.
- the related C-RNTI scrambles the PDCCH to be transmitted.
- the base station sends the scrambled PDCCH to the UE.
- S506 The UE receives the RAR message according to the RA-CNTI, and obtains the second identification information.
- S507 The UE detects a PDCCH according to the second identification information.
- the UE can detect the PDCCH within a preset time window, and the preset time window can be the RAR window for the UE to monitor the RAR after the preamble is sent; it can also be a time window configured by the base station .
- S507 can also be implemented by the corresponding three examples:
- the UE identifier transmitted by the uplink resource is a C-RNTI
- the second identifier information carried in the RAR message is a C-RNTI, monitoring the PDCCH through the C-RNTI or other identifiers associated with the C-RNTI;
- the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message is a C-RNTI, monitoring is performed through the C-RNTI or other identifiers associated with the C-RNTI PDCCH;
- the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message matches the other identifier, determining conflict resolution; and
- the C-RNTI whose two identification information has a mapping relationship monitors the PDCCH.
- the UE if the UE cannot detect the PDCCH within a preset time window, it indicates that the contention conflict resolution has failed. Therefore, the UE and the base station can perform the random access procedure again.
- the base station For the base station, if the base station does not receive feedback from the UE for PDCCH detection within a preset time window, then it is determined that the contention conflict resolution fails, and at this time, the base station may perform a random access process with the UE again.
- the terminal After the terminal finishes sending the preamble, the terminal detects the PDCCH based on the second identification information in the RAR, so as to determine whether the contention conflict is resolved. It is not necessary to send an RRC message to the base station as in the four-procedure random access process, and then receive a conflict resolution (Contention Resolution) message for the RRC signaling feedback from the base station to determine the conflict resolution. So that it can complete the contention-based random access process through the two-message procedure, reduce the delay of the random access process, and improve the time efficiency of the random access process.
- conflict resolution Contention Resolution
- FIG. 6 shows a composition of a user equipment UE60 provided by an embodiment of the present application, which may include: a first receiving part 601 and detection Section 602; of which
- the first receiving section 601 is configured to receive a random access response RAR message based on the first identification information; wherein the RAR message carries second identification information;
- the detecting section 602 is configured to detect a PDCCH according to the second identification information or third identification information having an association relationship with the second identification information within a preset time window, wherein the PDCCH passes the The second identification information or the third identification information is scrambled.
- the method may further include: a first sending part 603 configured to send a preamble on a configured PRACH resource, and Send the UE identity on the configured uplink resource.
- the UE identity includes any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC; and, Resume ID.
- the configured uplink resources may include PUCCH resources and / or PUSCH resources.
- the configured uplink resource and the PRACH resource have a mapping relationship.
- the first identification information includes RA-RNTI.
- the first receiving section 602 is configured to receive the RAR message according to the C-RNTI.
- the detecting portion 602 is further configured to stop detecting the scrambling by the second identification information or the third identification information after the first receiving portion 602 receives the RAR message. PDCCH.
- the second identification information includes any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI and short MAC; and Resume ID.
- the content included in the second identification information has a possibility of being inconsistent with the content included in the UE identification.
- the preset time window includes an RAR window for monitoring RAR messages, or a time window configured through a network device.
- the detection section 602 is configured to: if the UE identifier transmitted by the uplink resource is a C-RNTI, and the RAR message carries the second identifier information as a C-RNTI, then pass the C-RNTI or C -Other identifiers associated with the RNTI monitor the PDCCH; corresponding to the successful monitoring of the PDCCH, it is determined that the conflict is resolved.
- the detecting portion 602 is configured to: if the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message is a C-RNTI, C-RNTI or other identifiers associated with the C-RNTI monitor the PDCCH; corresponding to the successful monitoring of the PDCCH and the identifier in the CCCH transmitted by the PDSCH scheduled by the PDCCH is consistent with the UE identifier transmitted by the uplink resource, it is determined Conflict resolution.
- the detecting section 602 is configured to: if the UE identifier transmitted by the uplink resource is other identifier than C-RNTI, and the second identifier information carried in the RAR message is related to the other identifier If they match, determine conflict resolution; and monitor the PDCCH by using a C-RNTI that has a mapping relationship with the second identification information.
- the “part” may be a part of a circuit, a part of a processor, a part of a program or software, etc., of course, it may be a unit, a module, or a non-modular.
- each component in this embodiment may be integrated into one processing unit, or each unit may exist separately physically, or two or more units may be integrated into one unit.
- the above integrated unit may be implemented in the form of hardware or in the form of software functional modules.
- the integrated unit is implemented in the form of a software functional module and is not sold or used as an independent product, it may be stored in a computer-readable storage medium.
- the technical solution of this embodiment is essentially or It is said that a part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product.
- the computer software product is stored in a storage medium and includes several instructions for making a computer device (can It is a personal computer, a server, or a network device) or a processor that executes all or part of the steps of the method described in this embodiment.
- the foregoing storage media include: U disks, mobile hard disks, read-only memory (ROM), random access memory (RAM), magnetic disks, or optical disks, which can store program codes.
- this embodiment provides a computer storage medium that stores a random access program, and the random access program implements the random access method shown in FIG. 3 when the random access program is executed by at least one processor. A step of.
- FIG. 8 shows a specific hardware structure of a UE 60 provided in an embodiment of the present application, which may include: a first network interface 801, a first memory 802, and a first processor 803; the components are coupled together by a bus system 804.
- the bus system 804 is used to implement connection and communication between these components.
- the bus system 804 includes a data bus, a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are marked as the bus system 804 in FIG. 8.
- the first network interface 801 is configured to receive and send signals during a process of transmitting and receiving information with other external network elements.
- a first memory 802 configured to store a computer program that can run on a first processor 803;
- the first processor 803 is configured to, when running the computer program, execute: receiving a RAR message based on the first identification information; wherein the RAR message carries second identification information; within a preset time window, according to Detecting the PDCCH by using the second identification information or third identification information having an association relationship with the second identification information, wherein the PDCCH is scrambled by using the second identification information or the third identification information.
- the first memory 802 in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both a volatile and a non-volatile memory.
- the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), and an electronic memory. Erase programmable read-only memory (EPROM, EEPROM) or flash memory.
- the volatile memory may be Random Access Memory (RAM), which is used as an external cache.
- RAM Static Random Access Memory
- DRAM Dynamic Random Access Memory
- Synchronous Dynamic Random Access Memory Synchronous Dynamic Random Access Memory
- SDRAM double data rate synchronous dynamic random access memory
- Double Data Rate SDRAM DDRSDRAM
- enhanced SDRAM ESDRAM
- synchronous connection dynamic random access memory Synchronous DRAM, SLDRAM
- Direct RAMbus RAM Direct RAMbus RAM, DRRAM
- the first memory 802 of the systems and methods described herein is intended to include, but is not limited to, these and any other suitable types of memory.
- the first processor 803 may be an integrated circuit chip and has a signal processing capability. In the implementation process, each step of the foregoing method may be completed by using hardware integrated logic circuits or instructions in a software form in the first processor 803.
- the above-mentioned first processor 803 may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), and a ready-made programmable gate array (Field Programmable Gate Array, FPGA). Or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
- DSP digital signal processor
- ASIC application-specific integrated circuit
- FPGA ready-made programmable gate array
- FPGA Field Programmable Gate Array
- a general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
- the steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
- the software module may be located in a mature storage medium such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory, a register, and the like.
- the storage medium is located in the first memory 802, and the first processor 803 reads the information in the first memory 802 and completes the steps of the foregoing method in combination with its hardware.
- the embodiments described herein may be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof.
- the processing unit can be implemented in one or more application-specific integrated circuits (ASICs), digital signal processors (DSP), digital signal processing devices (DSPD), programmable Logic device (Programmable Logic Device, PLD), Field Programmable Gate Array (FPGA), general purpose processor, controller, microcontroller, microprocessor, other for performing the functions described in this application Electronic unit or combination thereof.
- ASICs application-specific integrated circuits
- DSP digital signal processors
- DSPD digital signal processing devices
- PLD programmable Logic Device
- FPGA Field Programmable Gate Array
- controller microcontroller
- microprocessor other for performing the functions described in this application Electronic unit or combination thereof.
- the techniques described herein can be implemented through modules (e.g., procedures, functions, etc.) that perform the functions described herein.
- Software codes may be stored in a memory and executed by a processor.
- the memory may be implemented in the processor or external to the processor.
- the first processor 803 in the UE 60 is further configured to execute the random access method steps described in the foregoing technical solution shown in FIG. 3 when running a computer program, and details are not described herein again.
- FIG. 9 it illustrates a composition of a network device 90 provided in an embodiment of the present application, which may include a scrambling section 901 and a second sending Section 902; of which
- the scrambling section 901 is configured to scramble the RAR message by using the first identification information
- the second sending part 902 is configured to send a scrambled RAR message to the UE; wherein the RAR message carries second identification information;
- the scrambling section 901 is further configured to scramble a PDCCH to be transmitted according to the second identification information or third identification information having an association relationship with the second identification information;
- the second sending section 902 is further configured to send the scrambled PDCCH to the UE.
- the method may further include a second receiving section 903 configured to receive a preamble sent by the UE, and The UE identity is received on the configured uplink resource.
- the UE identity includes any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC; and, Resume ID.
- the first identification information includes RA-RNTI.
- the second identification information includes any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI , PCI and short MAC ID; and, Resume ID.
- the content included in the second identification information has a possibility of being inconsistent with the content included in the UE identification.
- the scrambling section 901 is configured to: if the UE identifier transmitted by the uplink resource is a C-RNTI, and the RAR message carries the second identifier information as a C-RNTI, then the C-RNTI or The other identifiers associated with the C-RNTI are scrambled for the PDCCH to be transmitted.
- the scrambling section 901 is configured to: if the UE identifier transmitted by the uplink resource is an identifier other than C-RNTI, and the second identifier information carried in the RAR message is C-RNTI, then The C-RNTI or other identifiers associated with the C-RNTI are scrambled for the PDCCH to be transmitted.
- the scrambling section 901 is configured to: if the UE identifier transmitted by the uplink resource is other identifier than C-RNTI, and the second identifier information carried in the RAR message and the other identifier If they match, the PDCCH to be transmitted is scrambled by using the C-RNTI having a mapping relationship with the second identification information.
- this embodiment provides a computer storage medium that stores a randomly accessed program that is implemented in the technical solution shown in FIG. 4 when the randomly accessed program is executed by at least one processor. Steps of the method.
- the computer storage medium For the specific description of the computer storage medium, refer to the corresponding description in the foregoing technical solution, which is not repeated here.
- FIG. 11 shows a specific hardware structure of a network device 90 according to an embodiment of the present application, including: a second network interface 1101, a second memory 1102, and a second process. 1103; the various components are coupled together by a bus system 1104.
- the bus system 1104 is used to implement connection and communication between these components.
- the bus system 1104 includes a power bus, a control bus, and a status signal bus in addition to a data bus.
- various buses are marked as the bus system 1104 in FIG. 11. among them,
- the second network interface 1101 is configured to receive and send signals during a process of sending and receiving information with other external network elements.
- the second processor 1103 is configured to, when running the computer program, execute: scramble the RAR message to the user equipment UE after being scrambled with the first identification information; wherein the RAR message carries the second identification information; The second identification information or the third identification information having an association relationship with the second identification information is used to scramble the PDCCH to be transmitted; and the scrambled PDCCH is sent to the UE.
- the components of the specific hardware structure of the network device 90 in this embodiment are similar to the corresponding parts described in the foregoing technical solutions, and are not described herein again.
- the second processor 1103 in the network device 90 is further configured to execute the method steps described in the foregoing technical solution shown in FIG. 4 when the computer program is run, and details are not described herein again.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Quality & Reliability (AREA)
Abstract
Description
Claims (49)
- 一种随机接入的方法,所述方法应用于用户设备UE,所述方法包括:基于第一标识信息接收随机接入响应RAR消息;其中,所述RAR消息中携带有第二标识信息;在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测物理下行控制信道PDCCH;其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。
- 根据权利要求1所述的方法,其中,所述方法还包括:在已配置的PRACH资源上发送前导码preamble,并在已配置的上行资源上发送UE标识。
- 根据权利要求2所述的方法,其中,所述UE标识包括以下任一项:5G临时移动用户识别码5G-S-TMSI;5G-S-TMSI的一部分;小区无线网络临时标识C-RNTI;C-RNTI、物理小区标识PCI和短介质访问控制标识short MAC I;以及,恢复标识Resume ID。
- 根据权利要求2所述的方法,其中,所述已配置的上行资源包括物理上行链路控制信道PUCCH资源和/或物理上行共享信道PUSCH资源。
- 根据权利要求2所述的方法,其中,所述已配置的上行资源与所述PRACH资源具有映射关系。
- 根据权利要求1所述的方法,其中,所述第一标识信息包括随机接入无线网络临时标识符RA-RNTI。
- 根据权利要求2所述的方法,其中,相应于所述UE标识为C-RNTI,所述基于第一标识信息接收随机接入响应RAR消息,包括:根据所述C-RNTI接收所述RAR消息。
- 根据权利要求7所述的方法,其中,所述方法还包括:在接收到所述RAR消息后,停止继续检测通过所述第二标识信息或所述第三标识信息加扰的PDCCH。
- 根据权利要求1所述的方法,其中,所述第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识Resume ID。
- 根据权利要求9所述的方法,其中,所述第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
- 根据权利要求1所述的方法,其中,所述预设的时间窗口包括针对RAR消息 进行监测的RAR窗口,或者通过网络设备配置的一个时间窗口。
- 根据权利要求1至11任一项所述的方法,其中,所述根据所述第二标识信息检测PDCCH,包括:若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,则确定冲突解决。
- 根据权利要求1至11任一项所述的方法,其中,所述根据所述第二标识信息检测PDCCH,包括:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,且所PDCCH所调度的PDSCH所传输的CCCH SDU中的标识与所述上行资源传输的UE标识一致,则确定冲突解决。
- 根据权利要求1至11任一项所述的方法,其中,所述根据与所述第二标识信息具有关联关系的第三标识信息检测PDCCH,包括:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则确定冲突解决;并且利用与所述第二标识信息具有映射关系的C-RNTI监测PDCCH。
- 一种随机接入的方法,所述方法应用于网络设备,所述方法包括:将随机接入响应RAR消息通过第一标识信息加扰后,向用户设备UE发送;其中,所述RAR消息携带有第二标识信息;根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰;将加扰后的PDCCH向所述UE发送。
- 根据权利要求15所述的方法,其中,所述方法还包括:接收所述UE发送的前导码preamble,并在已配置的上行资源上接收UE标识。
- 根据权利要求16所述的方法,其中,所述UE标识包括以下任一项:5G临时移动用户识别码5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、物理小区标识PCI和短介质访问控制标识short MAC I;以及,恢复标识Resume ID。
- 根据权利要求15所述的方法,其中,所述第一标识信息包括随机接入无线网络临时标识符RA-RNTI。
- 根据权利要求15所述的方法,其中,所述第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识Resume ID。
- 根据权利要求19所述的方法,其中,所述第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
- 根据权利要求15至20任一项所述的方法,其中,所述根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,包括:若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
- 根据权利要求15至20任一项所述的方法,其中,所述根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,包括:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
- 根据权利要求15至20任一项所述的方法,其中,所述根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,可以包括:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则利用与所述第二标识信息具有映射关系的C-RNTI对待发送的PDCCH进行加扰。
- 一种用户设备,所述用户设备包括:第一网络接口,第一存储器和第一处理器;其中,所述第一网络接口,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;所述第一存储器,用于存储能够在所述第一处理器上运行的计算机程序;所述第一处理器,用于在运行所述计算机程序时,执行权利要求1至14任一项所述方法的步骤。
- 一种网络设备,所述网络设备包括:第二网络接口、第二存储器和第二处理器;其中,所述第二网络接口,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;所述第二存储器,用于存储能够在第二处理器上运行的计算机程序;所述第二处理器,用于在运行所述计算机程序时,执行权利要求15至23任一项所述方法的步骤。
- 一种计算机存储介质,所述计算机存储介质存储有随机接入的程序,所述随机接入的程序被至少一个处理器执行时实现权利要求1至14任一项或权利要求15至23任一项所述随机接入的方法的步骤。
- 一种用户设备,所述用户设备包括:第一接收部分和检测部分;其中,所述第一检测部分,配置为基于第一标识信息接收RAR消息;其中,所述RAR消息中携带有第二标识信息;所述检测部分,配置为在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测PDCCH;其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。
- 根据权利要求27所述的用户设备,其中,所述用户设备还包括第一发送部分,配置为:在已配置的PRACH资源上发送前导码,并在已配置的上行资源上发送UE标 识。
- 根据权利要求28所述的用户设备,其中,所述UE标识包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,Resume ID。
- 根据权利要求28所述的用户设备,其中,所述已配置的上行资源包括PUCCH资源和/或PUSCH资源。
- 根据权利要求28所述的用户设备,其中,所述已配置的上行资源与所述PRACH资源具有映射关系。
- 根据权利要求27所述的用户设备,其中,所述第一标识信息包括RA-RNTI。
- 根据权利要求28所述的用户设备,其中,相应于所述UE标识为C-RNTI,所述第一接收部分,配置为:根据所述C-RNTI接收所述RAR消息。
- 根据权利要求33所述的用户设备,其中,所述检测部分,还配置为:在所述第一接收部分接收到所述RAR消息后,停止继续检测通过所述第二标识信息或所述第三标识信息加扰的PDCCH。
- 根据权利要求27所述的用户设备,其中,所述第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,Resume ID。
- 根据权利要求35所述的用户设备,其中,所述第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
- 根据权利要求27所述的用户设备,其中,所述预设的时间窗口包括针对RAR消息进行监测的RAR窗口,或者通过网络设备配置的一个时间窗口。
- 根据权利要求27至37任一项所述的用户设备,其中,所述检测部分,配置为:若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,则确定冲突解决。
- 根据权利要求27至37任一项所述的用户设备,其中,所述检测部分,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,且所PDCCH所调度的PDSCH所传输的CCCH SDU中的标识与所述上行资源传输的UE标识一致,则确定冲突解决。
- 根据权利要求27至37任一项所述的用户设备,其中,所述检测部分,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则确定冲突解决;并且利用与所述第二标识信息具有映射关系的C-RNTI监测PDCCH。
- 一种网络设备,所述网络设备包括:加扰部分和第二发送部分;其中,所述加扰部分,配置为将RAR消息通过第一标识信息加扰;所述第二发送部分,配置为向UE发送加扰后的RAR消息;其中,所述RAR消息携带有第二标识信息;所述加扰部分,还配置为根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰;所述第二发送部分,还配置为将加扰后的PDCCH向所述UE发送。
- 根据权利要求41所述的网络设备,其中,所述网络设备还包括第二接收部分,配置为:接收所述UE发送的前导码,并在已配置的上行资源上接收UE标识。
- 根据权利要求42所述的网络设备,其中,所述UE标识包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,Resume ID。
- 根据权利要求41所述的网络设备,其中,所述第一标识信息包括RA-RNTI。
- 根据权利要求41所述的网络设备,其中,所述第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,Resume ID。
- 根据权利要求45所述的网络设备,其中,所述第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
- 根据权利要求41至46任一项所述的网络设备,其中,所述加扰部分,配置为:若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
- 根据权利要求41至46任一项所述的网络设备,其中,所述加扰部分,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
- 根据权利要求41至46任一项所述的网络设备,其中,所述加扰部分,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则利用与所述第二标识信息具有映射关系的C-RNTI对待发送的PDCCH进行加扰。
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020217005663A KR20210038627A (ko) | 2018-08-01 | 2019-04-10 | 랜덤 액세스 방법, 기기 및 컴퓨터 저장 매체 |
CN202110343095.7A CN113068274B (zh) | 2018-08-01 | 2019-04-10 | 一种随机接入的方法及设备 |
EP19845035.5A EP3817500B1 (en) | 2018-08-01 | 2019-04-10 | Random access method and device, and computer storage medium |
JP2021505282A JP7297867B2 (ja) | 2018-08-01 | 2019-04-10 | ランダムアクセス方法、装置及びコンピュータ記憶媒体 |
SG11202100969PA SG11202100969PA (en) | 2018-08-01 | 2019-04-10 | Random access method and device, and computer storage medium |
CN201980051390.6A CN112534948A (zh) | 2018-08-01 | 2019-04-10 | 一种随机接入的方法、设备及计算机存储介质 |
AU2019314850A AU2019314850A1 (en) | 2018-08-01 | 2019-04-10 | Random access method and device, and computer storage medium |
TW108127346A TW202008743A (zh) | 2018-08-01 | 2019-08-01 | 隨機接入的方法、設備及電腦儲存媒介 |
US17/153,876 US20210144771A1 (en) | 2018-08-01 | 2021-01-20 | Random access method and device, and computer storage medium |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810866886.6 | 2018-08-01 | ||
CN201810866886 | 2018-08-01 | ||
CN201810936190.6 | 2018-08-16 | ||
CN201810936190 | 2018-08-16 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/153,876 Continuation US20210144771A1 (en) | 2018-08-01 | 2021-01-20 | Random access method and device, and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020024614A1 true WO2020024614A1 (zh) | 2020-02-06 |
Family
ID=69231394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/081996 WO2020024614A1 (zh) | 2018-08-01 | 2019-04-10 | 一种随机接入的方法、设备及计算机存储介质 |
Country Status (9)
Country | Link |
---|---|
US (1) | US20210144771A1 (zh) |
EP (1) | EP3817500B1 (zh) |
JP (1) | JP7297867B2 (zh) |
KR (1) | KR20210038627A (zh) |
CN (2) | CN113068274B (zh) |
AU (1) | AU2019314850A1 (zh) |
SG (1) | SG11202100969PA (zh) |
TW (1) | TW202008743A (zh) |
WO (1) | WO2020024614A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220124830A1 (en) * | 2019-02-22 | 2022-04-21 | Nokia Technologies Oy | Contention resolution in random access procedure |
CN114269026B (zh) * | 2022-03-01 | 2022-05-10 | 成都爱瑞无线科技有限公司 | 随机接入信号处理方法、随机接入方法、装置及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102014516A (zh) * | 2010-11-18 | 2011-04-13 | 北京邮电大学 | Lte-a系统中的随机接入方法 |
WO2017127126A1 (en) * | 2016-01-19 | 2017-07-27 | Intel IP Corporation | Devices and methods for providing 5g uplink request |
CN108289337A (zh) * | 2017-01-09 | 2018-07-17 | 北京三星通信技术研究有限公司 | 上行调度请求的方法及用户设备、基站设备 |
CN108353323A (zh) * | 2015-10-29 | 2018-07-31 | 夏普株式会社 | 终端装置、基站装置、通信方法以及集成电路 |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5221753B2 (ja) * | 2008-04-14 | 2013-06-26 | エルジー エレクトロニクス インコーポレイティド | ランダムアクセス手順を行う方法及び装置 |
US9288028B2 (en) * | 2011-06-28 | 2016-03-15 | Lg Electronics Inc. | Method and apparatus for transmitting/receiving uplink signal, and method and apparatus for transmitting/receiving downlink signal |
US20130083739A1 (en) * | 2011-10-04 | 2013-04-04 | Sharp Laboratories Of America, Inc. | Devices for random access response scheduling |
KR102133785B1 (ko) * | 2012-05-10 | 2020-07-15 | 삼성전자주식회사 | 메시지 송수신 방법 및 장치 |
EP2947797B1 (en) * | 2013-01-17 | 2018-10-10 | LG Electronics Inc. | Method for receiving control information in wireless communication system and apparatus therefor |
WO2015008956A1 (en) * | 2013-07-16 | 2015-01-22 | Lg Electronics Inc. | Method and apparatus for performing random access procedure in wireless communication system |
JP6114468B2 (ja) * | 2013-07-19 | 2017-04-12 | エルジー エレクトロニクス インコーポレイティド | 無線通信システムにおけるランダムアクセス手順を実行するための方法及び装置 |
WO2015137632A1 (en) | 2014-03-11 | 2015-09-17 | Lg Electronics Inc. | Method for allocating temporary identifier to terminal in random access procedure in wireless communication system and apparatus tehrefor |
KR20160150611A (ko) * | 2015-06-22 | 2016-12-30 | 삼성전자주식회사 | 무선 통신 시스템에서 반영구 스케줄링 기반의 통신 기법 |
US11700641B2 (en) * | 2015-08-19 | 2023-07-11 | Lg Electronics Inc. | Random access procedure performing method in wireless communication system, and apparatus therefor |
CN107852266B (zh) * | 2015-08-19 | 2020-09-15 | 富士通株式会社 | 支持多种传输时间间隔的随机接入方法、装置以及通信系统 |
CN106993335B (zh) * | 2016-01-21 | 2022-03-01 | 中兴通讯股份有限公司 | 前导码发送、接收方法、装置、用户设备及基站 |
EP3691348A1 (en) * | 2016-04-01 | 2020-08-05 | KYOCERA Corporation | Base station and radio terminal |
US11277866B2 (en) * | 2016-05-27 | 2022-03-15 | Ntt Docomo, Inc. | Communication device and random access control method |
WO2018064367A1 (en) | 2016-09-28 | 2018-04-05 | Idac Holdings, Inc. | Random access in next generation wireless systems |
CN117042198A (zh) | 2016-10-07 | 2023-11-10 | 三星电子株式会社 | 用于基于增强竞争的随机接入程序的方法和装置 |
US10405342B2 (en) * | 2016-11-01 | 2019-09-03 | Qualcomm Incorporated | Two step random access procedure |
CN108282899B (zh) * | 2017-01-05 | 2020-03-06 | 电信科学技术研究院 | 一种两步竞争随机接入方法和装置 |
CN108282901B (zh) * | 2017-01-06 | 2019-08-09 | 电信科学技术研究院 | 一种随机接入响应方法和装置 |
EP3607801B1 (en) * | 2017-04-04 | 2021-12-22 | LG Electronics Inc. | Apparatus and method for performing a random access procedure |
CN110603887B (zh) * | 2017-05-05 | 2023-10-20 | 诺基亚技术有限公司 | 关于多prach前导码和随机接入响应 |
CN110831241B (zh) * | 2017-08-11 | 2020-09-29 | 华为技术有限公司 | 传输随机接入响应的方法、接入网设备和终端设备 |
US10555338B2 (en) * | 2017-08-11 | 2020-02-04 | Mediatek Inc. | NR-PRACH multiple Msg1 transmission |
CN109962756A (zh) * | 2017-12-22 | 2019-07-02 | 华为技术有限公司 | 通信方法和装置 |
WO2019164302A1 (ko) * | 2018-02-21 | 2019-08-29 | 엘지전자 주식회사 | 무선 통신 시스템에서 bwp 또는 빔 전환에 따라 제어 채널을 구성하는 방법 및 장치 |
WO2019191262A1 (en) * | 2018-03-30 | 2019-10-03 | Ofinno, Llc | Bandwidthpart (bwp) switching during beam failure recovery |
BR112020022686A2 (pt) * | 2018-05-15 | 2021-02-09 | Ntt Docomo, Inc. | terminal, aparelho de estação base e método de comunicação |
JP7271097B2 (ja) * | 2018-07-17 | 2023-05-11 | シャープ株式会社 | 基地局装置、端末装置、および、通信方法 |
JP2020014082A (ja) * | 2018-07-17 | 2020-01-23 | シャープ株式会社 | 基地局装置、端末装置、通信方法、および、集積回路 |
-
2019
- 2019-04-10 AU AU2019314850A patent/AU2019314850A1/en not_active Abandoned
- 2019-04-10 CN CN202110343095.7A patent/CN113068274B/zh active Active
- 2019-04-10 EP EP19845035.5A patent/EP3817500B1/en active Active
- 2019-04-10 CN CN201980051390.6A patent/CN112534948A/zh active Pending
- 2019-04-10 WO PCT/CN2019/081996 patent/WO2020024614A1/zh unknown
- 2019-04-10 KR KR1020217005663A patent/KR20210038627A/ko not_active Application Discontinuation
- 2019-04-10 JP JP2021505282A patent/JP7297867B2/ja active Active
- 2019-04-10 SG SG11202100969PA patent/SG11202100969PA/en unknown
- 2019-08-01 TW TW108127346A patent/TW202008743A/zh unknown
-
2021
- 2021-01-20 US US17/153,876 patent/US20210144771A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102014516A (zh) * | 2010-11-18 | 2011-04-13 | 北京邮电大学 | Lte-a系统中的随机接入方法 |
CN108353323A (zh) * | 2015-10-29 | 2018-07-31 | 夏普株式会社 | 终端装置、基站装置、通信方法以及集成电路 |
WO2017127126A1 (en) * | 2016-01-19 | 2017-07-27 | Intel IP Corporation | Devices and methods for providing 5g uplink request |
CN108289337A (zh) * | 2017-01-09 | 2018-07-17 | 北京三星通信技术研究有限公司 | 上行调度请求的方法及用户设备、基站设备 |
Also Published As
Publication number | Publication date |
---|---|
US20210144771A1 (en) | 2021-05-13 |
TW202008743A (zh) | 2020-02-16 |
EP3817500B1 (en) | 2023-08-16 |
SG11202100969PA (en) | 2021-03-30 |
AU2019314850A1 (en) | 2021-02-25 |
CN112534948A (zh) | 2021-03-19 |
CN113068274A (zh) | 2021-07-02 |
EP3817500A4 (en) | 2021-09-08 |
JP7297867B2 (ja) | 2023-06-26 |
EP3817500A1 (en) | 2021-05-05 |
CN113068274B (zh) | 2023-10-31 |
JP2021533627A (ja) | 2021-12-02 |
KR20210038627A (ko) | 2021-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220007426A1 (en) | Random access method and device | |
WO2020019230A1 (zh) | 一种资源配置方法及装置、终端设备、网络设备 | |
WO2020107416A1 (zh) | 随机接入过程选择方法、装置、芯片及计算机程序 | |
WO2020186466A1 (zh) | 无线通信的方法、终端设备和网络设备 | |
WO2020024614A1 (zh) | 一种随机接入的方法、设备及计算机存储介质 | |
WO2020024616A1 (zh) | 一种随机接入方法及相关设备 | |
WO2020191561A1 (zh) | 一种随机接入方法及装置、用户设备、网络设备 | |
WO2020191592A1 (zh) | 一种寻呼时机配置方法及装置、终端、网络设备 | |
WO2020061945A1 (zh) | 用于随机接入的方法、网络设备和终端设备 | |
CN112567873B (zh) | 一种信息传输的方法、设备及计算机存储介质 | |
WO2020248143A1 (zh) | 监听控制信道的方法、终端设备和网络设备 | |
WO2020206643A1 (zh) | 一种随机接入方法、设备及存储介质 | |
WO2020191632A1 (zh) | 一种功率控制方法及装置、终端、网络设备 | |
WO2020019182A1 (zh) | 一种信号传输方法及装置、终端设备、网络设备 | |
CN113678560A (zh) | 随机接入过程中传输信息的方法、终端设备和网络设备 | |
US20210144754A1 (en) | Method and device for information transmission | |
WO2021159541A1 (zh) | 确定激活期方法和装置 | |
WO2020082394A1 (zh) | 随机接入的方法、终端设备和网络设备 | |
WO2020191760A1 (zh) | 一种信道传输方法、电子设备及存储介质 | |
WO2024109723A1 (zh) | 随机接入方法及装置、终端、网络设备 | |
WO2020198988A1 (zh) | 一种随机接入方法、电子设备及存储介质 | |
WO2022236499A1 (zh) | Cg资源维护方法、终端设备和网络设备 | |
CN114222350B (zh) | 一种随机接入方法及装置、用户设备、网络设备 | |
WO2020186408A1 (zh) | 一种资源管理方法、设备及存储介质 | |
WO2021012286A1 (zh) | 一种随机接入方法及装置、终端 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19845035 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021505282 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019845035 Country of ref document: EP Effective date: 20210126 |
|
ENP | Entry into the national phase |
Ref document number: 20217005663 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2019314850 Country of ref document: AU Date of ref document: 20190410 Kind code of ref document: A |