WO2020024614A1 - 一种随机接入的方法、设备及计算机存储介质 - Google Patents

一种随机接入的方法、设备及计算机存储介质 Download PDF

Info

Publication number
WO2020024614A1
WO2020024614A1 PCT/CN2019/081996 CN2019081996W WO2020024614A1 WO 2020024614 A1 WO2020024614 A1 WO 2020024614A1 CN 2019081996 W CN2019081996 W CN 2019081996W WO 2020024614 A1 WO2020024614 A1 WO 2020024614A1
Authority
WO
WIPO (PCT)
Prior art keywords
rnti
identification information
pdcch
identifier
rar message
Prior art date
Application number
PCT/CN2019/081996
Other languages
English (en)
French (fr)
Inventor
石聪
尤心
卢前溪
徐伟杰
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to KR1020217005663A priority Critical patent/KR20210038627A/ko
Priority to CN202110343095.7A priority patent/CN113068274B/zh
Priority to EP19845035.5A priority patent/EP3817500B1/en
Priority to JP2021505282A priority patent/JP7297867B2/ja
Priority to SG11202100969PA priority patent/SG11202100969PA/en
Priority to CN201980051390.6A priority patent/CN112534948A/zh
Priority to AU2019314850A priority patent/AU2019314850A1/en
Priority to TW108127346A priority patent/TW202008743A/zh
Publication of WO2020024614A1 publication Critical patent/WO2020024614A1/zh
Priority to US17/153,876 priority patent/US20210144771A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1263Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
    • H04W72/1268Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/21Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • H04W72/232Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal the control data signalling from the physical layer, e.g. DCI signalling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Definitions

  • Embodiments of the present application relate to the field of wireless communication technologies, and in particular, to a method, a device, and a computer storage medium for random access.
  • wireless communication systems may be multiple-access systems capable of supporting communication with multiple users by sharing available system resources (e.g., time, frequency, and power).
  • a wireless multiple-access communication system may include several base stations, and each base station simultaneously supports communication of multiple communication devices, and these communication devices may be additionally referred to as User Equipment (UE).
  • the base station may communicate with the communication device on a downlink channel (e.g., for transmission from the base station to the UE) and an uplink channel (e.g., for transmission from the UE to the base station).
  • a downlink channel e.g., for transmission from the base station to the UE
  • an uplink channel e.g., for transmission from the UE to the base station.
  • wireless devices can be implemented through random access procedures.
  • System access may include contention-based random access procedures and non-contention-based random access procedures.
  • ms milliseconds
  • the embodiments of the present application provide a random access method, device, and computer storage medium, which can reduce the delay of the random access process and improve the time efficiency of the random access process.
  • a random access method is provided.
  • the method is applied to a UE.
  • the method includes: receiving a Random Access Response (RAR) message based on first identification information; wherein the RAR The message carries second identification information; within a preset time window, a physical downlink control channel is detected based on the second identification information or third identification information that is associated with the second identification information. , PDCCH); wherein the PDCCH is scrambled by using the second identification information or the third identification information.
  • RAR Random Access Response
  • PDCCH Physical Downlink control channel
  • a random access method is provided.
  • the method is applied to a network device.
  • the method includes: scramble a RAR message to a UE after scrambled with first identification information, wherein the RAR message carries There is second identification information; scramble the PDCCH to be transmitted according to the second identification information or third identification information having an association relationship with the second identification information; and send the scrambled PDCCH to the UE.
  • a UE which may include: a first receiving part and a detecting part;
  • the first detection section is configured to receive a RAR message based on the first identification information; wherein the RAR message carries second identification information;
  • the detecting section is configured to detect a PDCCH according to the second identification information or third identification information having an association relationship with the second identification information within a preset time window, wherein the PDCCH passes the first The second identification information or the third identification information is scrambled.
  • a network device which may include: a scrambling part and a second sending part;
  • the scrambling section is configured to scramble the RAR message by using the first identification information
  • the second sending part is configured to send a scrambled RAR message to the UE; wherein the RAR message carries second identification information;
  • the scrambling section is further configured to scramble the PDCCH to be transmitted according to the second identification information or third identification information having an association relationship with the second identification information;
  • the second sending part is further configured to send the scrambled PDCCH to the UE.
  • a user equipment includes: a first network interface, a first memory, and a first processor; wherein the first network interface is configured to communicate with other external network elements. Receiving and sending signals during the process of receiving and sending information; the first memory is used to store a computer program capable of running on the first processor; the first processor is used to run the computer program When performing the steps of the method described in the first aspect.
  • a network device includes a second network interface, a second memory, and a second processor.
  • the second network interface is configured to communicate with other external network elements. Receiving and sending signals during the process of sending and receiving information; the second memory is used to store a computer program capable of running on a second processor; and the second processor is used when running the computer program, Perform the steps of the method described in the second aspect.
  • a computer storage medium stores a random access program, and the random access program implements the random access according to the first aspect or the second aspect when executed by at least one processor. Steps of the method of access.
  • the UE After the UE completes sending the preamble, it detects the PDCCH based on the second identification information in the RAR, so as to determine whether the contention conflict is resolved. There is no need to send a Radio Resource Control (RRC) message to the network device as in the four-procedure random access process, and then receive a conflict resolution (Contention Resolution) message for the RRC signaling feedback from the network device to determine the conflict resolution. So that it can complete the contention-based random access process through the two-message procedure, reduce the delay of the random access process, and improve the time efficiency of the random access process.
  • RRC Radio Resource Control
  • FIG. 1 is an exemplary diagram of a wireless communication system according to an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a random access process of a four-message protocol in the related art
  • FIG. 3 is a schematic flowchart of a random access method according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a specific process of random access according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a UE according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of another UE according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of a specific hardware structure of a UE according to an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a network device according to an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of another network device according to an embodiment of the present application.
  • FIG. 11 is a schematic diagram of a specific hardware structure of another network device according to an embodiment of the present application.
  • the communication system 100 may include a network device 110, a network device 110 It may be a device that communicates with the terminal device 120 (or referred to as a communication terminal, terminal).
  • the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located within the coverage area.
  • the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, or a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system.
  • BTS Base Transceiver Station
  • NodeB, NB base station
  • the network device may be a mobile switching center, relay station, access point, vehicle equipment, Wearable devices, hubs, switches, bridges, routers, network-side devices or 5G base stations (gNB) in 5G networks, or network devices in public land mobile networks (PLMN) that are evolving in the future.
  • gNB 5G base stations
  • PLMN public land mobile networks
  • the communication system 100 further includes at least one terminal device 120 located within a coverage area of the network device 110.
  • terminal equipment used herein includes, but is not limited to, connection via wired lines, such as via Public Switched Telephone Networks (PSTN), Digital Subscriber Line (DSL), digital cable, direct cable connection ; And / or another data connection / network; and / or via a wireless interface, such as for cellular networks, Wireless Local Area Networks (WLAN), digital television networks such as DVB-H networks, satellite networks, AM- FM broadcast transmitter; and / or another terminal device configured to receive / transmit communication signals; and / or Internet of Things (IoT) devices.
  • PSTN Public Switched Telephone Networks
  • DSL Digital Subscriber Line
  • WLAN Wireless Local Area Networks
  • DVB-H Digital Video Broadband
  • satellite networks satellite networks
  • AM- FM broadcast transmitter AM- FM broadcast transmitter
  • IoT Internet of Things
  • a terminal device configured to communicate through a wireless interface may be referred to as a “wireless communication terminal”, a “wireless terminal”, or a “mobile terminal”.
  • mobile terminals include, but are not limited to, satellite or cellular phones; personal communications systems (PCS) terminals that can combine cellular radiotelephones with data processing, facsimile, and data communications capabilities; can include radiotelephones, pagers, Internet / internal PDA with network access, web browser, notepad, calendar, and / or Global Positioning System (GPS) receiver; and conventional laptop and / or palm-type receivers or others including radiotelephone transceivers Electronic device.
  • PCS personal communications systems
  • GPS Global Positioning System
  • a terminal device can refer to an access terminal, user equipment (User Equipment), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or User device.
  • the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Processing (PDA), and wireless communication.
  • terminal devices 120 may perform terminal direct device (D2D) communication.
  • D2D terminal direct device
  • the 5G system or the 5G network may also be referred to as a New Radio (NR) system or an NR network.
  • NR New Radio
  • FIG. 1 exemplarily shows one network device and two terminal devices.
  • the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
  • the terminal device 120 may have a need to access the network device 90, thereby triggering a random access process.
  • the event that triggers the random access process may include but is not limited to the following: when the terminal device 120 initially accesses the wireless communication system 100, and when the terminal device 120 is not synchronized with the wireless communication system 100, In a certain switching process in which the terminal device 120 is switched between different network devices 90, in the case that the RRC connection (Connection) is re-established between the terminal device 120 and the network device 90, the terminal device 120 is changed from an inactive state by RRC_INACTIVE In the case of migration, or in the case where the terminal device 120 is instructed by other system information (System Information).
  • System Information System Information
  • the network device 90 may be a gNB and a terminal device. 120 may be a UE, and a specific process thereof is shown in FIG. 2:
  • the UE sends the selected random access preamble on the selected physical random access channel (PRACH) resources;
  • PRACH physical random access channel
  • the UE can send the random access preamble through the first message Msg1.
  • the gNB can transmit the uplink time (Timing) and the terminal to the third message (Msg3) based on the preamble.
  • the required grant size is estimated.
  • S220 gNB sends RAR to UE
  • the gNB can send the RAR through the second message (Msg2).
  • Msg2 the second message
  • the UE will open a RAR time window (RAR window), and monitor the PDCCH in the RAR window, and after detecting the PDCCH To obtain a physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) scheduled by the PDCCH, which includes the RAR. If the UE does not obtain an RAR within the RAR window, the random access procedure fails this time.
  • RAR window RAR time window
  • PDSCH Physical Downlink Shared Channel
  • S230 The UE sends an RRC message
  • the RRC message may be sent through a third message (Msg3), and Msg3 is mainly used to notify the network of what event the RACH process is triggered by. For example, if it is an initial access random process, the UE ID and establishment cause establishment will be carried in msg3; if it is RRC reconstruction, it will carry the connected UE identity and establishment cause;
  • Msg3 is mainly used to notify the network of what event the RACH process is triggered by. For example, if it is an initial access random process, the UE ID and establishment cause establishment will be carried in msg3; if it is RRC reconstruction, it will carry the connected UE identity and establishment cause;
  • the ID carried by msg3 can make the contention conflicts resolved in S240.
  • S240 The gNB feeds back a contention resolution message to the UE;
  • the Contention Resolution can be transmitted through the fourth message (Msg4), and Msg4 has two functions, one is for the resolution of the contention conflict; the second is to transmit the RRC configuration message to the UE; for the contention conflict
  • Msg4 has two functions, one is for the resolution of the contention conflict; the second is to transmit the RRC configuration message to the UE; for the contention conflict
  • Method 1 If the UE carries a Cell Radio Network Temporary Identifier (C-RNTI) in S230, Msg4 can be scheduled using C-RNTI scrambled PDCCH;
  • C-RNTI Cell Radio Network Temporary Identifier
  • Method 2 If the UE does not carry a C-RNTI in S230, such as in the case of initial access, Msg4 uses the temporary C-RNTI (TC-RNTI) scrambled PDCCH scheduling; the conflict is resolved through the UE receiving Msg4 PDSCH, by matching the service data unit (Common Control Channel Service Data Unit, CCCH) of the common control channel in the PDSCH.
  • TC-RNTI temporary C-RNTI
  • CCCH Common Control Channel Service Data Unit
  • the four-message procedure will increase the delay of the random access process, which will adversely affect the low-latency services in the 5G system. Therefore, it is currently expected that the random access procedure of the original four-message procedure can be realized through the two-message procedure.
  • the two-message protocol to implement contention-based random access the following issues need to be resolved: how to resolve contention conflicts, and under the two-message protocol, the two messages need to be transmitted separately.
  • FIG. 3 shows a random access method provided by an embodiment of the present application.
  • the method can be applied to user equipment UE, such as the terminal device 120 shown in FIG.
  • the method may include:
  • S301 Receive a RAR message based on the first identification information; wherein the RAR message carries second identification information;
  • S302 Detect a PDCCH according to the second identification information or third identification information having an association relationship with the second identification information within a preset time window, where the PDCCH passes the second identification information or all the identification information.
  • the third identification information is scrambled.
  • the UE detects the PDCCH according to the second identification information carried in the RAR or the third identification information associated with the second identification information, and after successfully descrambling the PDCCH, receives the PDSCH scheduled by the PDCCH. Therefore, when the UE receives the RAR message, the contention conflict is solved, so that the contention-based random access process can be completed through the two message procedures, the delay of the random access process is reduced, and the time efficiency of the random access process is improved.
  • the UE before S301, the UE also needs to send a preamble to a network device, such as an eNB or gNB. Therefore, in an implementation manner, the method may further include:
  • the UE identity it can be used to characterize the uniqueness of the UE.
  • the UE identity may include any of the following: 5G SAE Temporary Mobile Subscriber Identity (5G-S-TMSI); Part of 5G-S-TMSI; C-RNTI; C-RNTI, Physical Cell Identifier (PCI) and Short Media Access Control Identifier (short MAC I); and Resume ID).
  • 5G SAE Temporary Mobile Subscriber Identity 5G-S-TMSI
  • Part of 5G-S-TMSI C-RNTI
  • C-RNTI C-RNTI
  • PCI Physical Cell Identifier
  • short MAC I Short Media Access Control Identifier
  • the UE identifier can uniquely distinguish the UE, there is a mapping relationship between the above identifiers. That is, taking C-RNTI as an example, for the same UE, All identities other than the C-RNTI can be mapped to the C-RNTI. For these identifiers, 5G-S-TMSI can uniquely distinguish UEs, but the length of 5G-S-TMSI is usually longer.
  • the UE can negotiate with the network device to pass A part of the 5G-S-TMSI uniquely distinguishes the UE; in addition, optionally, the network device may configure a part of the 5G-S-TMSI for the UE to uniquely distinguish the UE.
  • the Resume ID may be a UE identifier that is convenient for retrieving a UE context in a network device, and is usually used when the UE switches from an RRC inactive state to an RRC connected state.
  • the configured uplink resources may include physical uplink control channel (PUCCH) resources and / or physical uplink shared channel (PUSCH) resources, understandably
  • PUCCH physical uplink control channel
  • PUSCH physical uplink shared channel
  • the configured uplink resources have a mapping relationship with the PRACH resources, that is, when the UE sends a preamble through a PRACH resource, it can be based on the The mapping relationship determines an uplink resource corresponding to the PRACH resource and used to transmit and send the UE identity.
  • the first identification information may be a Random Access Radio Network Temporary Identifier (RA-RNTI).
  • RA-RNTI Random Access Radio Network Temporary Identifier
  • the UE may send a PRACH resource based on a preamble, such as a time domain resource. , Frequency domain resources, and code domain resources to determine RA-RNTI.
  • the first identifier information may include the C-RNTI accordingly.
  • the receiving the RAR message based on the first identification information includes: receiving the RAR message according to the C-RNTI.
  • the method further includes: after receiving the RAR message, stopping detecting the PDCCH scrambled by the second identification information or the third identification information.
  • the second identification information may also be used to uniquely distinguish Based on this, the second identification information may include any of the following: 5G-S-TMSI; a portion of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC; and, restoration of the identification (Resume ID).
  • the selectable range of the second identification information is consistent with the selectable range of the UE identification. Since this information can uniquely distinguish the UE, for example, both 5G-S-TMSI and C-RNTI can uniquely distinguish the UE, therefore, The content included in the second identification information may be inconsistent with the content included in the sent UE identification.
  • the preset time window in S302 may be a RAR window for the RAR to be monitored by the UE after the preamble is sent, or a time window configured by a network device. This embodiment will not repeat them here.
  • this step can implement a contention conflict. Therefore, for S302, the following can be specifically implemented through the following optional examples.
  • Optional example 1 Detecting a PDCCH according to the second identification information includes:
  • the PDCCH is monitored through the C-RNTI or other identifiers associated with the C-RNTI; corresponding to success When the PDCCH is detected, conflict resolution is determined.
  • the network device scrambles the PDCCH by using the C-RNTI or other identifiers associated with the C-RNTI. Then, if the UE identifier sent by the UE on the configured uplink resource is C-RNTI , Then the network device can directly use the C-RNTI to scramble the PDCCH, so when the UE successfully descrambles the PDCCH through the C-RNTI, it indicates that the contention conflict is resolved.
  • Optional example 2 Detecting a PDCCH according to the second identification information includes:
  • the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message is a C-RNTI
  • monitoring is performed through the C-RNTI or other identifiers associated with the C-RNTI PDCCH; corresponding to the successful monitoring of the PDCCH, and the identifier in the CCCH SDU transmitted by the PDSCH scheduled to be monitored by the PDCCH is consistent with the UE identifier transmitted by the uplink resource, it is determined that the conflict is resolved.
  • the UE identifier sent by the UE on the configured uplink resource is not a C-RNTI, but is, for example, 5G-S-TMSI or part of 5G-S-TMSI, but the network device uses C- The RNTI or other identifiers associated with the C-RNTI scramble the PDCCH. Therefore, the second identifier information carried in the RAR message is the other identifiers associated with the C-RNTI or C-RNTI, and then the UE terminal may use the second identifier information.
  • C-RNTI or other identifiers associated with the C-RNTI monitor the PDCCH; if the PDCCH is successfully monitored, the PDSCH is scheduled based on the PDCCH. When determining the identifier in the CCCH SDU transmitted by the PDSCH and the UE sent by the configured uplink resource If the identities are consistent, the UE determines that the contention conflict is resolved.
  • the above-mentioned “consistent” may include two meanings: one: the “consistent” may be expressed as that the identifier in the CCCH and SDU transmitted by the PDSCH is completely consistent with the UE identifier sent by the configured uplink resource; the second, The “consistent” can be regarded as aiming at a certain degree of consistency, that is, “considered as consistent”, that is, when the first N bits (for example, 48 bits) in the CCCH SDU transmitted by the PDSCH and the If the first N bits transmitted on the uplink resource are the same, the two can be considered to be “consistent”.
  • Optional example 3 Detecting a PDCCH according to third identification information that is associated with the second identification information includes:
  • the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message matches the other identifier, determining conflict resolution; and
  • the C-RNTI whose two identification information has a mapping relationship monitors the PDCCH.
  • the UE identity sent by the UE on the configured uplink resource is not a C-RNTI, but is, for example, 5G-S-TMSI; but the second identity information carried in the RAR message is the same as 5G- S-TMSI matches other identifiers, such as some 5G-S-TMSI. Then the UE can determine the conflict resolution at this time.
  • the UE can obtain a C-RNTI with a mapping relationship, such as some 5G-S-TMSI, so as to continue to monitor the PDCCH by using the C-RNTI. It should be noted that the mapping relationship may be considered as a special closer relationship.
  • the mapping relationship may be configured for the UE in advance through a network device, and may also be determined according to a rule stipulated by an existing protocol.
  • the UE After the UE completes sending the preamble, it detects the PDCCH based on the second identification information in the RAR, so as to determine whether the contention conflict is resolved. It is not necessary to send an RRC message to the network device as in the four-procedure random access process, and then receive a conflict resolution (Contention Resolution) message for the RRC signaling feedback from the network device to determine the conflict resolution. So that it can complete the contention-based random access process through the two-message procedure, reduce the delay of the random access process, and improve the time efficiency of the random access process.
  • conflict resolution Contention Resolution
  • FIG. 4 illustrates a random access method provided by an embodiment of the present application.
  • the method can be applied to a network device, such as a base station eNB or gNB shown in FIG. 1.
  • the method may include:
  • S401 Send the RAR message to the UE after scrambling with the first identification information; wherein the RAR message carries the second identification information;
  • S402 Scramble the PDCCH to be transmitted according to the second identification information or the third identification information having an association relationship with the second identification information.
  • S403 Send the scrambled PDCCH to the UE.
  • the network device sends the scrambled PDCCH to the UE.
  • the UE can successfully descramble the PDCCH according to the second identification information or the third identification information, the competitive access is explained.
  • Conflict resolution so that the contention-based random access process can be completed through the two-message procedure, which reduces the delay of the random access process and improves the time efficiency of the random access process.
  • the method further includes:
  • the UE identity can be used to characterize the uniqueness of the UE.
  • the UE identity can include any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI and short MAC; and Resume ID.
  • the UE identifier can uniquely distinguish the UE, there is a mapping relationship between the above identifiers. That is, taking C-RNTI as an example, for the same UE, All identities other than the C-RNTI can be mapped to the C-RNTI.
  • the configured uplink resources may include PUCCH resources and / or PUSCH resources.
  • the configured uplink resource has a mapping relationship with the PRACH resource, that is, when the UE sends a preamble through a PRACH resource, then the mapping corresponding to the PRACH resource can be determined according to the mapping relationship for transmission and transmission.
  • the first identification information may be RA-RNTI.
  • the second identification information may also be used for uniquely distinguishing in order to resolve the contention conflict.
  • the second identification information includes any of the following: 5G-S-TMSI; part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC ID; and, recovering the identification ( Resume ID).
  • the selectable range of the second identification information is consistent with the selectable range of the UE identification. Since this information can uniquely distinguish the UE, for example, both 5G-S-TMSI and C-RNTI can uniquely distinguish the UE, therefore, The content included in the second identification information may be inconsistent with the content included in the sent UE identification.
  • the UE may perform the PDCCH by using the second identification information or the third identification information associated with the second identification information.
  • the descrambling is performed to resolve the contention conflict. Therefore, for S402, the PDCCH to be transmitted is scrambled according to the second identification information or the third identification information having an association relationship with the second identification information. Choose an example.
  • the scrambling of the PDCCH to be sent according to the second identification information or the third identification information having an association relationship with the second identification information may include:
  • the PDCCH to be transmitted is added through the C-RNTI or other identifiers associated with the C-RNTI. Disturb.
  • the scrambling of the PDCCH to be sent according to the second identification information or the third identification information having an association relationship with the second identification information may include:
  • the UE identifier transmitted by the uplink resource is another identifier other than C-RNTI, and the second identifier information carried in the RAR message is C-RNTI, it is treated through the other identifiers associated with C-RNTI or C-RNTI
  • the transmitted PDCCH is scrambled.
  • the scrambling of the PDCCH to be sent according to the second identification information or the third identification information having an association relationship with the second identification information may include:
  • the UE identifier transmitted by the uplink resource is another identifier other than the C-RNTI, and the second identifier information carried in the RAR message matches the other identifier, a mapping with the second identifier information is used.
  • the related C-RNTI scrambles the PDCCH to be transmitted.
  • the network device may re-ran the random access procedure with the UE.
  • the network device scrambles the PDCCH based on the second identification information in the RAR, so that the UE detects the PDCCH based on the second identification information, thereby determining whether the contention conflict is resolved. It is not necessary to send an RRC message to the network device as in the four-procedure random access process, and then receive a conflict resolution (Contention Resolution) message for the RRC signaling feedback from the network device to determine the conflict resolution. So that it can complete the contention-based random access process through the two-message procedure, reduce the delay of the random access process, and improve the time efficiency of the random access process.
  • conflict resolution Contention Resolution
  • FIG. 5 illustrates a specific procedure of random access provided by an embodiment of the present application.
  • This procedure can be applied to a UE and a base station, such as a gNB or an eNB. :
  • the UE sends a preamble on the configured PRACH resources, and sends a UE identity on the configured PUCCH resources and / or PUSCH resources.
  • the configured PUCCH resources and / or PUSCH resources may correspond to the configured PRACH resources, that is, when the UE sends a preamble through a PRACH resource, then the mapping may be based on the mapping The relationship determines an uplink resource corresponding to the PRACH resource for transmitting and sending the UE identity.
  • the UE identity can be used to characterize the uniqueness of the UE.
  • the UE identity can include any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C- RNTI, PCI, and short MAC ID; and Resume ID.
  • 5G-S-TMSI 5G-S-TMSI
  • C-RNTI C-RNTI
  • C- RNTI C-RNTI, PCI, and short MAC ID
  • Resume ID Resume ID
  • the base station After receiving the preamble, the base station determines the second identification information for scrambling the PDCCH according to the UE identity, and carries the second identification information in the RAR message scrambled by the RA-RNTI.
  • the base station determines the second identification information for scrambling the PDCCH, it can implement the solution to the contention conflict.
  • the second identification information may include any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC ; And, Resume ID.
  • the selectable range of the second identification information is consistent with the selectable range of the UE identification. Since this information can uniquely distinguish the UE, for example, both 5G-S-TMSI and C-RNTI can uniquely distinguish the UE, therefore, optionally, based on the uniqueness of distinguishing the UE, the content included in the second identification information may be inconsistent with the content included in the UE identification sent by the UE.
  • the base station sends the RAR message scrambled by the RA-RNTI to the UE;
  • the RAR message carries second identification information.
  • the base station uses the second identification information or the third identification information associated with the second identification information to scramble the PDCCH to be sent;
  • the PDCCH to be transmitted is added through the C-RNTI or other identifiers associated with the C-RNTI. Disturb.
  • the UE identifier transmitted by the uplink resource is another identifier other than C-RNTI, and the second identifier information carried in the RAR message is C-RNTI, it is treated through the other identifiers associated with C-RNTI or C-RNTI
  • the transmitted PDCCH is scrambled.
  • the UE identifier transmitted by the uplink resource is another identifier other than the C-RNTI, and the second identifier information carried in the RAR message matches the other identifier, a mapping with the second identifier information is used.
  • the related C-RNTI scrambles the PDCCH to be transmitted.
  • the base station sends the scrambled PDCCH to the UE.
  • S506 The UE receives the RAR message according to the RA-CNTI, and obtains the second identification information.
  • S507 The UE detects a PDCCH according to the second identification information.
  • the UE can detect the PDCCH within a preset time window, and the preset time window can be the RAR window for the UE to monitor the RAR after the preamble is sent; it can also be a time window configured by the base station .
  • S507 can also be implemented by the corresponding three examples:
  • the UE identifier transmitted by the uplink resource is a C-RNTI
  • the second identifier information carried in the RAR message is a C-RNTI, monitoring the PDCCH through the C-RNTI or other identifiers associated with the C-RNTI;
  • the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message is a C-RNTI, monitoring is performed through the C-RNTI or other identifiers associated with the C-RNTI PDCCH;
  • the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message matches the other identifier, determining conflict resolution; and
  • the C-RNTI whose two identification information has a mapping relationship monitors the PDCCH.
  • the UE if the UE cannot detect the PDCCH within a preset time window, it indicates that the contention conflict resolution has failed. Therefore, the UE and the base station can perform the random access procedure again.
  • the base station For the base station, if the base station does not receive feedback from the UE for PDCCH detection within a preset time window, then it is determined that the contention conflict resolution fails, and at this time, the base station may perform a random access process with the UE again.
  • the terminal After the terminal finishes sending the preamble, the terminal detects the PDCCH based on the second identification information in the RAR, so as to determine whether the contention conflict is resolved. It is not necessary to send an RRC message to the base station as in the four-procedure random access process, and then receive a conflict resolution (Contention Resolution) message for the RRC signaling feedback from the base station to determine the conflict resolution. So that it can complete the contention-based random access process through the two-message procedure, reduce the delay of the random access process, and improve the time efficiency of the random access process.
  • conflict resolution Contention Resolution
  • FIG. 6 shows a composition of a user equipment UE60 provided by an embodiment of the present application, which may include: a first receiving part 601 and detection Section 602; of which
  • the first receiving section 601 is configured to receive a random access response RAR message based on the first identification information; wherein the RAR message carries second identification information;
  • the detecting section 602 is configured to detect a PDCCH according to the second identification information or third identification information having an association relationship with the second identification information within a preset time window, wherein the PDCCH passes the The second identification information or the third identification information is scrambled.
  • the method may further include: a first sending part 603 configured to send a preamble on a configured PRACH resource, and Send the UE identity on the configured uplink resource.
  • the UE identity includes any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC; and, Resume ID.
  • the configured uplink resources may include PUCCH resources and / or PUSCH resources.
  • the configured uplink resource and the PRACH resource have a mapping relationship.
  • the first identification information includes RA-RNTI.
  • the first receiving section 602 is configured to receive the RAR message according to the C-RNTI.
  • the detecting portion 602 is further configured to stop detecting the scrambling by the second identification information or the third identification information after the first receiving portion 602 receives the RAR message. PDCCH.
  • the second identification information includes any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI and short MAC; and Resume ID.
  • the content included in the second identification information has a possibility of being inconsistent with the content included in the UE identification.
  • the preset time window includes an RAR window for monitoring RAR messages, or a time window configured through a network device.
  • the detection section 602 is configured to: if the UE identifier transmitted by the uplink resource is a C-RNTI, and the RAR message carries the second identifier information as a C-RNTI, then pass the C-RNTI or C -Other identifiers associated with the RNTI monitor the PDCCH; corresponding to the successful monitoring of the PDCCH, it is determined that the conflict is resolved.
  • the detecting portion 602 is configured to: if the UE identifier transmitted by the uplink resource is an identifier other than the C-RNTI, and the second identifier information carried in the RAR message is a C-RNTI, C-RNTI or other identifiers associated with the C-RNTI monitor the PDCCH; corresponding to the successful monitoring of the PDCCH and the identifier in the CCCH transmitted by the PDSCH scheduled by the PDCCH is consistent with the UE identifier transmitted by the uplink resource, it is determined Conflict resolution.
  • the detecting section 602 is configured to: if the UE identifier transmitted by the uplink resource is other identifier than C-RNTI, and the second identifier information carried in the RAR message is related to the other identifier If they match, determine conflict resolution; and monitor the PDCCH by using a C-RNTI that has a mapping relationship with the second identification information.
  • the “part” may be a part of a circuit, a part of a processor, a part of a program or software, etc., of course, it may be a unit, a module, or a non-modular.
  • each component in this embodiment may be integrated into one processing unit, or each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional modules.
  • the integrated unit is implemented in the form of a software functional module and is not sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the technical solution of this embodiment is essentially or It is said that a part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes several instructions for making a computer device (can It is a personal computer, a server, or a network device) or a processor that executes all or part of the steps of the method described in this embodiment.
  • the foregoing storage media include: U disks, mobile hard disks, read-only memory (ROM), random access memory (RAM), magnetic disks, or optical disks, which can store program codes.
  • this embodiment provides a computer storage medium that stores a random access program, and the random access program implements the random access method shown in FIG. 3 when the random access program is executed by at least one processor. A step of.
  • FIG. 8 shows a specific hardware structure of a UE 60 provided in an embodiment of the present application, which may include: a first network interface 801, a first memory 802, and a first processor 803; the components are coupled together by a bus system 804.
  • the bus system 804 is used to implement connection and communication between these components.
  • the bus system 804 includes a data bus, a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are marked as the bus system 804 in FIG. 8.
  • the first network interface 801 is configured to receive and send signals during a process of transmitting and receiving information with other external network elements.
  • a first memory 802 configured to store a computer program that can run on a first processor 803;
  • the first processor 803 is configured to, when running the computer program, execute: receiving a RAR message based on the first identification information; wherein the RAR message carries second identification information; within a preset time window, according to Detecting the PDCCH by using the second identification information or third identification information having an association relationship with the second identification information, wherein the PDCCH is scrambled by using the second identification information or the third identification information.
  • the first memory 802 in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both a volatile and a non-volatile memory.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), and an electronic memory. Erase programmable read-only memory (EPROM, EEPROM) or flash memory.
  • the volatile memory may be Random Access Memory (RAM), which is used as an external cache.
  • RAM Static Random Access Memory
  • DRAM Dynamic Random Access Memory
  • Synchronous Dynamic Random Access Memory Synchronous Dynamic Random Access Memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDRSDRAM
  • enhanced SDRAM ESDRAM
  • synchronous connection dynamic random access memory Synchronous DRAM, SLDRAM
  • Direct RAMbus RAM Direct RAMbus RAM, DRRAM
  • the first memory 802 of the systems and methods described herein is intended to include, but is not limited to, these and any other suitable types of memory.
  • the first processor 803 may be an integrated circuit chip and has a signal processing capability. In the implementation process, each step of the foregoing method may be completed by using hardware integrated logic circuits or instructions in a software form in the first processor 803.
  • the above-mentioned first processor 803 may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), and a ready-made programmable gate array (Field Programmable Gate Array, FPGA). Or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA ready-made programmable gate array
  • FPGA Field Programmable Gate Array
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a mature storage medium such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory, a register, and the like.
  • the storage medium is located in the first memory 802, and the first processor 803 reads the information in the first memory 802 and completes the steps of the foregoing method in combination with its hardware.
  • the embodiments described herein may be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof.
  • the processing unit can be implemented in one or more application-specific integrated circuits (ASICs), digital signal processors (DSP), digital signal processing devices (DSPD), programmable Logic device (Programmable Logic Device, PLD), Field Programmable Gate Array (FPGA), general purpose processor, controller, microcontroller, microprocessor, other for performing the functions described in this application Electronic unit or combination thereof.
  • ASICs application-specific integrated circuits
  • DSP digital signal processors
  • DSPD digital signal processing devices
  • PLD programmable Logic Device
  • FPGA Field Programmable Gate Array
  • controller microcontroller
  • microprocessor other for performing the functions described in this application Electronic unit or combination thereof.
  • the techniques described herein can be implemented through modules (e.g., procedures, functions, etc.) that perform the functions described herein.
  • Software codes may be stored in a memory and executed by a processor.
  • the memory may be implemented in the processor or external to the processor.
  • the first processor 803 in the UE 60 is further configured to execute the random access method steps described in the foregoing technical solution shown in FIG. 3 when running a computer program, and details are not described herein again.
  • FIG. 9 it illustrates a composition of a network device 90 provided in an embodiment of the present application, which may include a scrambling section 901 and a second sending Section 902; of which
  • the scrambling section 901 is configured to scramble the RAR message by using the first identification information
  • the second sending part 902 is configured to send a scrambled RAR message to the UE; wherein the RAR message carries second identification information;
  • the scrambling section 901 is further configured to scramble a PDCCH to be transmitted according to the second identification information or third identification information having an association relationship with the second identification information;
  • the second sending section 902 is further configured to send the scrambled PDCCH to the UE.
  • the method may further include a second receiving section 903 configured to receive a preamble sent by the UE, and The UE identity is received on the configured uplink resource.
  • the UE identity includes any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI, PCI, and short MAC; and, Resume ID.
  • the first identification information includes RA-RNTI.
  • the second identification information includes any of the following: 5G-S-TMSI; a part of 5G-S-TMSI; C-RNTI; C-RNTI , PCI and short MAC ID; and, Resume ID.
  • the content included in the second identification information has a possibility of being inconsistent with the content included in the UE identification.
  • the scrambling section 901 is configured to: if the UE identifier transmitted by the uplink resource is a C-RNTI, and the RAR message carries the second identifier information as a C-RNTI, then the C-RNTI or The other identifiers associated with the C-RNTI are scrambled for the PDCCH to be transmitted.
  • the scrambling section 901 is configured to: if the UE identifier transmitted by the uplink resource is an identifier other than C-RNTI, and the second identifier information carried in the RAR message is C-RNTI, then The C-RNTI or other identifiers associated with the C-RNTI are scrambled for the PDCCH to be transmitted.
  • the scrambling section 901 is configured to: if the UE identifier transmitted by the uplink resource is other identifier than C-RNTI, and the second identifier information carried in the RAR message and the other identifier If they match, the PDCCH to be transmitted is scrambled by using the C-RNTI having a mapping relationship with the second identification information.
  • this embodiment provides a computer storage medium that stores a randomly accessed program that is implemented in the technical solution shown in FIG. 4 when the randomly accessed program is executed by at least one processor. Steps of the method.
  • the computer storage medium For the specific description of the computer storage medium, refer to the corresponding description in the foregoing technical solution, which is not repeated here.
  • FIG. 11 shows a specific hardware structure of a network device 90 according to an embodiment of the present application, including: a second network interface 1101, a second memory 1102, and a second process. 1103; the various components are coupled together by a bus system 1104.
  • the bus system 1104 is used to implement connection and communication between these components.
  • the bus system 1104 includes a power bus, a control bus, and a status signal bus in addition to a data bus.
  • various buses are marked as the bus system 1104 in FIG. 11. among them,
  • the second network interface 1101 is configured to receive and send signals during a process of sending and receiving information with other external network elements.
  • the second processor 1103 is configured to, when running the computer program, execute: scramble the RAR message to the user equipment UE after being scrambled with the first identification information; wherein the RAR message carries the second identification information; The second identification information or the third identification information having an association relationship with the second identification information is used to scramble the PDCCH to be transmitted; and the scrambled PDCCH is sent to the UE.
  • the components of the specific hardware structure of the network device 90 in this embodiment are similar to the corresponding parts described in the foregoing technical solutions, and are not described herein again.
  • the second processor 1103 in the network device 90 is further configured to execute the method steps described in the foregoing technical solution shown in FIG. 4 when the computer program is run, and details are not described herein again.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Quality & Reliability (AREA)

Abstract

本申请实施例公开了一种随机接入的方法、设备及计算机存储介质;该方法可以包括:基于第一标识信息接收随机接入响应(RAR)消息;其中,所述RAR消息中携带有第二标识信息;在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测物理下行控制信道(PDCCH);其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。

Description

一种随机接入的方法、设备及计算机存储介质 技术领域
本申请实施例涉及无线通信技术领域,尤其涉及一种随机接入的方法、设备及计算机存储介质。
背景技术
目前,无线通信系统可以是能够通过共享可用系统资源(例如,时间、频率和功率)来支持与多个用户通信的多址系统。作为示例,无线多址通信系统可包括数个基站,每个基站同时支持多个通信设备的通信,这些通信设备可另外被称为用户设备(User Equipment,UE)。基站可在下行链路信道(例如,用于从基站至UE的传输)和上行链路信道(例如,用于从UE至基站的传输)上与通信设备通信。
在一些无线通信系统,比如长期演进(Long Term Evolution,LTE)系统、第五代(5th Generation,5G)系统或新无线(New Radio,NR)系统中,无线设备可通过随机接入过程以实现系统接入。目前,已有的随机接入过程可以包括基于竞争的随机接入过程和基于非竞争的随机接入过程。为了实现基于竞争的随机接入过程,目前采用的是四消息随机接入规程,而现有的四消息随机接入规程的期望时延通常达到40毫秒(ms),从而导致目前的四消息随机接入规程无法适应5G系统或NG系统中低时延业务的需求。
发明内容
本申请实施例提供一种随机接入的方法、设备及计算机存储介质,能够降低随机接入过程的时延,提高随机接入过程的时间效率。
本申请的技术方案是这样实现的:
第一方面,提供了一种随机接入的方法,所述方法应用于UE,所述方法包括:基于第一标识信息接收随机接入响应(Random Access Response,RAR)消息;其中,所述RAR消息中携带有第二标识信息;在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测物理下行控制信道(Physical Downlink Control CHannel,PDCCH);其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。
第二方面,提供了一种随机接入的方法,所述方法应用于网络设备,所述方法包括:将RAR消息通过第一标识信息加扰后,向UE发送;其中,所述RAR消息携带有第二标识信息;根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待 发送的PDCCH进行加扰;将加扰后的PDCCH向所述UE发送。
第三方面,提供了一种UE,可以包括:第一接收部分和检测部分;其中,
所述第一检测部分,配置为基于第一标识信息接收RAR消息;其中,所述RAR消息中携带有第二标识信息;
所述检测部分,配置为在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测PDCCH;其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。
第四方面,提供了一种网络设备,可以包括:加扰部分和第二发送部分;其中,
所述加扰部分,配置为将RAR消息通过第一标识信息加扰;
所述第二发送部分,配置为向UE发送加扰后的RAR消息;其中,所述RAR消息携带有第二标识信息;
所述加扰部分,还配置为根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰;
所述第二发送部分,还配置为将加扰后的PDCCH向所述UE发送。
第五方面,提供了一种用户设备,所述用户设备包括:第一网络接口,第一存储器和第一处理器;其中,所述第一网络接口,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;所述第一存储器,用于存储能够在所述第一处理器上运行的计算机程序;所述第一处理器,用于在运行所述计算机程序时,执行第一方面所述方法的步骤。
第六方面,提供了一种网络设备,所述网络设备包括:第二网络接口、第二存储器和第二处理器;其中,所述第二网络接口,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;所述第二存储器,用于存储能够在第二处理器上运行的计算机程序;所述第二处理器,用于在运行所述计算机程序时,执行第二方面所述方法的步骤。
第七方面,提供了一种计算机存储介质,所述计算机存储介质存储有随机接入的程序,所述随机接入的程序被至少一个处理器执行时实现第一方面或第二方面所述随机接入的方法的步骤。
通过上述技术方案,UE在发送完成preamble之后,基于RAR中的第二标识信息对PDCCH进行检测,从而确定竞争冲突是否解决。无需如四规程随机接入过程一样再向网络设备发送无线资源控制(Radio Resource Control,RRC)消息,随后接收网络设备针对RRC信令反馈的冲突解决(Contention Resolution)消息来确定冲突解决。以至于能够通过两消息规程完成基于竞争的随机接入过程,降低随机接入过程的时延,提高随机接入过程的时间效率。
附图说明
图1为本申请实施例提供的一种无线通信系统示例图;
图2为相关技术中四消息规程的随机接入流程示意图;
图3为本申请实施例提供的一种随机接入的方法流程示意图;
图4为本申请实施例提供的另一种随机接入的方法流程示意图;
图5为本申请实施例提供的一种随机接入的具体过程示意图;
图6为本申请实施例提供的一种UE的组成示意图;
图7为本申请实施例提供的另一种UE的组成示意图;
图8为本申请实施例提供的一种UE的具体硬件结构示意图;
图9为本申请实施例提供的一种网络设备的组成示意图;
图10为本申请实施例提供的另一种网络设备的组成示意图;
图11为本申请实施例提供的另一种网络设备的具体硬件结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
参见图1,其示出了本申请实施例提供的一种能够应用于在无线通信中降低随机接入过程时延的无线通信系统100示例,该通信系统100可以包括网络设备110,网络设备110可以是与终端设备120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备进行通信。可选地,该网络设备110可以是GSM系统或CDMA系统中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或5G基站(gNB)、或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络设备等。
该通信系统100还包括位于网络设备110覆盖范围内的至少一个终端设备120。作为在此使用的“终端设备”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络 的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端设备的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端设备可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端设备可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端设备或者未来演进的PLMN中的终端设备等。
可选地,终端设备120之间可以进行终端直连(Device to Device,D2D)通信。
可选地,5G系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。
图1示例性地示出了一个网络设备和两个终端设备,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。
对于图1所示的无线通信系统100,终端设备120可能存在接入网络设备90的需求,从而触发随机接入过程。举例来说,触发随机接入过程的事件可以包括但不限于以下几种:当终端设备120初始接入无线通信系统100的情况下,在终端设备120与无线通信系统100不同步的情况下,在终端设备120在不同的网络设备90之间切换的某些切换过程中,在终端设备120与网络设备90之间重新建立RRC连接(Connection)的情况下,在终端设备120由非激活态RRC_INACTIVE迁移的情况下,或者终端设备120被其他系统信息(System Information,SI)指示的情况下。
相应于随机接入过程被触发,那么目前相关标准或协议中通常采用四消息规程来实现基于竞争的随机接入,以无线通信系统100是5G系统为例,网络设备90可以是gNB,终端设备120可以是UE,其具体过程参见图2所示:
S210:UE在选择的物理随机接入信道(Physical Random Access Channel,PRACH)资源上发送选择的随机接入前导码(Random Access Preamble);
可以理解地,该步骤中,UE可以将随机接入前导码通过第一消息Msg1进行发送,gNB在接收到Msg1后,基于Preamble可以对上行时间(Timing)以及终端传输第三消息(Msg3)所需要的授权(grant)大小进行估计。
S220:gNB向UE发送RAR;
需要说明的是,gNB可以通过第二消息(Msg2)发送RAR,UE在发送完Msg1之后,会开启一个RAR时间窗(RAR Window),并在该RAR Window内监测PDCCH,并在检测到PDCCH之后,获得该PDCCH调度的物理下行共享信道(Physical Downlink Shared Channel,PDSCH),其中包含了RAR。如果UE在该RAR Window内没有获得RAR,则此次随机接入过程失败。
S230:UE发送RRC消息;
需要说明的是,该RRC消息可以通过第三消息(Msg3)来发送,而Msg3主要用于通知网络该RACH过程是由什么事件触发。比如,如果是初始接入随机过程,则在msg3中会携带UE ID和建立原因establishment cause;如果是RRC重建,则会携带连接态UE标示和establishment cause;
同时,msg3携带的ID可以使得竞争冲突在S240中得到解决。
S240:gNB向UE反馈冲突解决(Contention Resolution)消息;
可以理解地,本步骤中,Contention Resolution可以通过第四消息(Msg4)来传输,而Msg4有两个作用,一个是用于竞争冲突的解决;第二是向UE传输RRC配置消息;对于竞争冲突解决,可以采用以下两种方式:
方式一:如果UE在S230中携带了小区无线网络临时标识(Cell Radio Network Temporary Identifier,C-RNTI),则Msg4可以用C-RNTI加扰的PDCCH调度;
方式二:如果UE在S230中没有携带C-RNTI,比如初始接入的情况下,则Msg4用临时的C-RNTI(TC-RNTI)加扰的PDCCH调度;冲突的解决是通过UE接收Msg4的PDSCH,通过匹配PDSCH中的公共控制信道的服务数据单元(Common Control Channel Service Data Unit,CCCH SDU)。
通过图2所示的随机接入过程可以看出,四消息规程会增加随机接入过程的时延,对于5G系统中的低时延业务来说会产生不利的影响。因此,目前期望能够通过两消息规程来实现原先四消息规程的随机接入过程。对于两消息规程来实现基于竞争的随机接入,就需要解决以下问题:如何解决竞争冲突,以及两消息规程下,两个消息都分别需要传输的内容。
基于上述两个需要解决的问题,参见图3,其示出了本申请实施例提供的一种随机接入的方法,该方法可以应用于用户设备UE,比如图1中所示的终端设备120,该方法可以包括:
S301:基于第一标识信息接收RAR消息;其中,所述RAR消息中携带有第二标识信息;
S302:在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测PDCCH;其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。
通过图3所示的技术方案,UE根据RAR中携带的第二标识信息或者根据第二标识信息相关联的第三标识信息检测PDCCH,成功对PDCCH解扰后,接收PDCCH所调度 的PDSCH。从而在UE接收RAR消息时就实现了竞争冲突的解决,以至于能够通过两消息规程完成基于竞争的随机接入过程,降低随机接入过程的时延,提高随机接入过程的时间效率。
对于图3所示的技术方案,在S301之前,UE还需要向网络设备,比如eNB或gNB发送前导码(preamble),因此,在一种实现方式中,该方法还可以包括:
在已配置的PRACH资源上发送preamble,并在已配置的上行资源上发送UE标识。
对于UE标识来说,其能够用来表征UE的唯一性,具体来说,UE标识可以包括以下任一项:5G临时移动用户识别码(5G SAE Temporary Mobile Subscriber Identity,5G-S-TMSI);5G-S-TMSI的一部分;C-RNTI;C-RNTI、物理小区标识(Physical Cell Identifier,PCI)和短介质访问控制标识(short Media Access Control Identifier,short MAC I);以及,恢复标识(Resume ID)。
对于上述UE标识,需要说明的是,由于上述UE标识均能够唯一地区分UE,因此,上述各项标识之间具有映射关系,也就是说,以C-RNTI为例,针对同一UE来说,可以将除C-RNTI以外的其他标识均映射到该C-RNTI。对于这些标识来说,5G-S-TMSI能够唯一的区分UE,但是5G-S-TMSI的长度通常较长,为了减少5G-S-TMSI的长度,可选地,UE可以和网络设备协商通过5G-S-TMSI的一部分来唯一区分UE;此外,可选地网络设备可以预先为UE配置5G-S-TMSI的一部分来唯一区分UE。而Resume ID可以是在网络设备中便于检索UE上下文的UE标识,通常会在UE从RRC inactive状态切换到RRC connectted状态时使用。
在上述实现方式中,所述已配置的上行资源可以包括物理上行链路控制信道(Physical Uplink Control Channel,PUCCH)资源和/或物理上行共享信道(Physical Uplink Shared Channel,PUSCH)资源,可以理解地,UE标识作为控制信息的一种,可以通过PUCCH传输,而PUSCH即可以传输数据,又可以传输控制信息,因此,UE标识也可以通过PUSCH向网络设备传输。
对于上述两种已配置的上行资源,需要说明的是,所述已配置的上行资源与所述PRACH资源具有映射关系,也就是说,当UE通过某个PRACH资源发送preamble,那么就可以根据该映射关系确定与该PRACH资源对应的,用于传输发送UE标识的上行资源。
对于图3所示的技术方案,第一标识信息可选为随机接入无线网络临时标识符(Random Access Radio Network Temporary Identifier,RA-RNTI),UE可以基于发送preamble的PRACH资源,比如时域资源、频域资源和码域资源来确定RA-RNTI。
对于上述技术方案,作为一种可能的实现方式,若发送的UE标识为C-RNTI,那么相应地,第一标识信息就可以包括C-RNTI。此时,所述基于第一标识信息接收RAR消息,包括:根据所述C-RNTI接收所述RAR消息。
在成功接收到所述RAR消息后,也已说明UE已经成功完成了随机接入,此时,UE可能不会继续监测用第二标识信息或第三标识信息加扰的PDCCH。因此,所述方法 还包括:在接收到所述RAR消息后,停止继续检测通过所述第二标识信息或所述第三标识信息加扰的PDCCH。
对于图3所示的技术方案,由于通过第二标识信息或者第二标识信息关联的第三标识信息对PDCCH进行加扰,那么,为了解决竞争冲突,第二标识信息也可以是用于唯一区分UE的标识,基于此,第二标识信息可以包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识(Resume ID)。
可以看出,第二标识信息的可选范围与UE标识的可选范围一致,由于这些信息都能够唯一地区分UE,比如5G-S-TMSI与C-RNTI都能够唯一地区分UE,因此,第二标识信息所包含的内容可以与发送的UE标识所包含的内容不一致。
对于图3所示的技术方案中,S302中预设的时间窗口可以是UE在发送完成preamble之后,针对RAR进行监测的RAR窗口,也可以是通过网络设备配置的一个时间窗口。本实施例对此不做赘述。
而对于S302所述的根据所述第二标识信息检测PDCCH,而UE可以通过第二标识信息或第二标识信息相关联的第三标识信息对PDCCH进行解扰,那么该步骤就能够实现竞争冲突的解决,因此,对于S302来说,具体可以通过以下可选示例实现。
可选示例一,根据所述第二标识信息检测PDCCH,包括:
若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,则确定冲突解决。
对于该示例,详细来说,通常网络设备会利用C-RNTI或C-RNTI相关联的其他标识对PDCCH进行加扰,那么,如果UE在已配置的上行资源所发送的UE标识为C-RNTI,那么网络设备可以直接利用该C-RNTI对PDCCH进行加扰,从而当UE通过该C-RNTI对PDCCH解扰成功时,说明竞争冲突解决。
可选示例二,根据所述第二标识信息检测PDCCH,包括:
若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,且被监测到PDCCH所调度的PDSCH所传输的CCCH SDU中的标识与所述上行资源传输的UE标识一致,则确定冲突解决。
对于该示例,举例来说,UE在已配置的上行资源所发送的UE标识不为C-RNTI,而是比如为5G-S-TMSI或者为部分5G-S-TMSI,但网络设备利用C-RNTI或C-RNTI相关联的其他标识对PDCCH进行加扰,因此,RAR消息中携带的第二标识信息为C-RNTI或C-RNTI相关联的其他标识,那么UE终端可以采用第二标识信息的C-RNTI或C-RNTI相关联的其他标识监测PDCCH;如果成功监测到PDCCH,则基于该PDCCH调度PDSCH,当确定PDSCH所传输的CCCH SDU中的标识与已配置的上行资源所发送的UE标识一致,则UE确定竞争冲突解决。
具体来说,上述“一致”可以包括两种含义,其一:该“一致”可以表述为PDSCH 所传输的CCCH SDU中的标识与已配置的上行资源所发送的UE标识完全一致;其二,该“一致”可以被认为是针对某种特定程度的一致性,也就是“视为一致”,即,当PDSCH所传输的CCCH SDU中的前N个比特(bit),例如48个bit,与上行资源上所传输的前N个bit一样,则可以认为两者是“一致”的。
可选示例三,根据与所述第二标识信息具有关联关系的第三标识信息检测PDCCH,包括:
若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则确定冲突解决;并且利用与所述第二标识信息具有映射关系的C-RNTI监测PDCCH。
对于该示例,举例来说,UE在已配置的上行资源所发送的UE标识不为C-RNTI,而是比如为5G-S-TMSI;但RAR消息中携带的第二标识信息为与5G-S-TMSI相匹配的其他标识,例如部分5G-S-TMSI。则此时UE可以确定冲突解决。UE可以获取如部分5G-S-TMSI具有映射关系的C-RNTI,从而利用C-RNTI继续监测PDCCH。需要说明的是,该映射关系可以认为是特殊的更为紧密的关联关系,该映射关系可以通过网络设备提前为UE进行配置,还可以根据已有协议所规定的规则进行确定。
对于图3所示的技术方案,需要说明的是,如果UE在预设的时间窗口内无法检测到PDCCH,则说明竞争冲突解决失败。因此,UE与网络设备可以重新进行随机接入过程。
通过上述随机接入的方法,可以看出,UE在发送完成preamble之后,基于RAR中的第二标识信息对PDCCH进行检测,从而确定竞争冲突是否解决。无需如四规程随机接入过程一样再向网络设备发送RRC消息,随后接收网络设备针对RRC信令反馈的冲突解决(Contention Resolution)消息来确定冲突解决。以至于能够通过两消息规程完成基于竞争的随机接入过程,降低随机接入过程的时延,提高随机接入过程的时间效率。
基于前述技术方案相同的申请构思,参见图4,其示出了本申请实施例提供的一种随机接入的方法,该方法可以应用于网络设备,比如图1中所示的基站eNB或gNB,该方法可以包括:
S401:将RAR消息通过第一标识信息加扰后,向UE发送;其中,所述RAR消息携带有第二标识信息;
S402:根据第二标识信息或与第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰;
S403:将加扰后的PDCCH向所述UE发送。
需要说明的是,针对图4所示的技术方案,网络设备向UE发送加扰后的PDCCH,当UE能够根据第二标识信息或第三标识信息对PDCCH进行成功解扰,则说明竞争接入冲突解决,从而能够通过两消息规程完成基于竞争的随机接入过程,降低随机接入过程的时延,提高随机接入过程的时间效率。
对于图4所示的技术方案,在一种可能的实现方式中,在S401之前,所述方法还 包括:
接收所述UE发送的前导码(preamble),并在已配置的上行资源上接收UE标识。
对于UE标识来说,能够用来表征UE的唯一性,具体来说,UE标识可以包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识(Resume ID)。
对于上述UE标识,需要说明的是,由于上述UE标识均能够唯一地区分UE,因此,上述各项标识之间具有映射关系,也就是说,以C-RNTI为例,针对同一UE来说,可以将除C-RNTI以外的其他标识均映射到该C-RNTI。
在上述实现方式中,所述已配置的上行资源可以包括PUCCH资源和/或PUSCH资源。并且所述已配置的上行资源与所述PRACH资源具有映射关系,也就是说,当UE通过某个PRACH资源发送preamble,那么就可以根据该映射关系确定与该PRACH资源对应的,用于传输发送UE标识的上行资源。
对于图4所示的技术方案,第一标识信息可选为RA-RNTI。
对于图4所示的技术方案,由于通过第二标识信息或者第二标识信息关联的第三标识信息对PDCCH进行加扰,那么,为了解决竞争冲突,第二标识信息也可以是用于唯一区分UE的标识,基于此,第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识(Resume ID)。
可以看出,第二标识信息的可选范围与UE标识的可选范围一致,由于这些信息都能够唯一地区分UE,比如5G-S-TMSI与C-RNTI都能够唯一地区分UE,因此,第二标识信息所包含的内容可以与发送的UE标识所包含的内容不一致。
对于图4所示的技术方案,需要说明的是,在将加扰后的PDCCH向所述UE发送后,UE可以通过第二标识信息或第二标识信息相关联的第三标识信息对PDCCH进行解扰,从而实现竞争冲突的解决,因此,对于S402,所述根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,可以通过以下可选示例实现。
可选示例一
根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,可以包括:
若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
可选示例二
根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,可以包括:
若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
可选示例三
根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,可以包括:
若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则利用与所述第二标识信息具有映射关系的C-RNTI对待发送的PDCCH进行加扰。
可以理解地,在本技术方案中,上述三个可选示例与图3所示技术方案中的可选示例相对应,具体不再赘述。
对于图4所示的技术方案,在一种可能的实现方式中,如果网络设备在预设的时间窗口内没有接收到UE针对PDCCH检测的反馈,那么就确定竞争冲突解决失败,此时,网络设备可以与UE重新进行随机接入过程。
通过上述随机接入的方法,可以看出,网络设备基于RAR中的第二标识信息对PDCCH进行加扰,使得UE基于第二标识信息对PDCCH进行检测,从而确定竞争冲突是否解决。无需如四规程随机接入过程一样再向网络设备发送RRC消息,随后接收网络设备针对RRC信令反馈的冲突解决(Contention Resolution)消息来确定冲突解决。以至于能够通过两消息规程完成基于竞争的随机接入过程,降低随机接入过程的时延,提高随机接入过程的时间效率。
基于前述技术方案相同的申请构思,参见图5,其示出了本申请实施例提供的一种随机接入的具体过程,该过程可以应用于UE和基站,例如gNB或eNB,该过程可以包括:
S501:UE在已配置的PRACH资源上发送preamble,并在已配置的PUCCH资源和/或PUSCH资源上发送UE标识。
需要说明的是,在本技术方案中,已配置的PUCCH资源和/或PUSCH资源可以与已配置的PRACH资源对应,也就是说,当UE通过某个PRACH资源发送preamble,那么就可以根据该映射关系确定与该PRACH资源对应的,用于传输发送UE标识的上行资源。
而对于UE标识来说,其能够用来表征UE的唯一性,具体来说,UE标识可以包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识(Resume ID)。对于上述UE标识,需要说明的是,由于上述UE标识均能够唯一地区分UE,因此,上述各项标识之间具有映射关系,也就是说,以C-RNTI为例,针对同一UE来说,可以将除C-RNTI以外的其他标识均映射到该C-RNTI。
S502:基站在接收到preamble后,根据UE标识确定用于加扰PDCCH的第二标识信息,并将第二标识信息携带于通过RA-RNTI加扰的RAR消息中。
需要说明的是,当基站确定用于加扰PDCCH的第二标识信息后,就可以实现针对竞争冲突的解决。由于第二标识信息由UE标识确定,因此,第二标识信息可以包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I; 以及,恢复标识(Resume ID)。
可以看出,第二标识信息的可选范围与UE标识的可选范围一致,由于这些信息都能够唯一地区分UE,比如5G-S-TMSI与C-RNTI都能够唯一地区分UE,因此,可选地,基于区分UE的唯一性,第二标识信息所包含的内容可以与UE所发送的UE标识所包含的内容不一致。
S503:基站将通过RA-RNTI加扰的RAR消息发送至UE;
其中,RAR消息中携带有第二标识信息。
S504:基站利用第二标识信息或第二标识信息关联的第三标识信息对待发送的PDCCH进行加扰;
对于S504,可以通过以下示例实现:
示例一
若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
示例二
若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
示例三
若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则利用与所述第二标识信息具有映射关系的C-RNTI对待发送的PDCCH进行加扰。
S505:基站将加扰后的PDCCH向所述UE发送;
S506:UE根据RA-CNTI接收RAR消息,获取第二标识信息;
S507:UE根据所述第二标识信息检测PDCCH;
需要说明的是,UE可以在预设的时间窗口内检测PDCCH,而预设的时间窗口可以是UE在发送完成preamble之后,针对RAR进行监测的RAR窗口;也可以是通过基站配置的一个时间窗口。
相应于S504所述的三种示例,S507也可以通过对应的三个示例来实现:
示例一
若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;
相应于成功监测到PDCCH,则确定冲突解决。
示例二
若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;
相应于成功监测到PDCCH,且所述被监测到PDCCH所调度的PDSCH所传输的CCCH SDU中的标识与所述上行资源传输的UE标识一致,则确定冲突解决。
示例三
若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则确定冲突解决;并且利用与所述第二标识信息具有映射关系的C-RNTI监测PDCCH。
需要说明的是,对于UE来说,如果UE在预设的时间窗口内无法检测到PDCCH,则说明竞争冲突解决失败。因此,UE与基站可以重新进行随机接入过程。
对于基站来说,如果基站在预设的时间窗口内没有接收到UE针对PDCCH检测的反馈,那么就确定竞争冲突解决失败,此时,基站可以与UE重新进行随机接入过程。
本技术方案所提供的随机接入的具体过程,终端在发送完成preamble之后,基于RAR中的第二标识信息对PDCCH进行检测,从而确定竞争冲突是否解决。无需如四规程随机接入过程一样再向基站发送RRC消息,随后接收基站针对RRC信令反馈的冲突解决(Contention Resolution)消息来确定冲突解决。以至于能够通过两消息规程完成基于竞争的随机接入过程,降低随机接入过程的时延,提高随机接入过程的时间效率。
基于前述图3至图5所示的技术方案相同的申请构思,参见图6,其示出了本申请实施例提供的一种用户设备UE 60的组成,可以包括:第一接收部分601和检测部分602;其中,
所述第一接收部分601,配置为基于第一标识信息接收随机接入响应RAR消息;其中,所述RAR消息中携带有第二标识信息;
所述检测部分602,配置为在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测PDCCH;其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。
基于图6所示的UE 60,在一种可能的实现方式中,参见图7,还可以包括:第一发送部分603,配置为:在已配置的PRACH资源上发送前导码(preamble),并在已配置的上行资源上发送UE标识。
在上述实现方式中,可选地,所述UE标识包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识(Resume ID)。
在上述实现方式中,可选地,所述已配置的上行资源可以包括PUCCH资源和/或PUSCH资源。
在上述实现方式中,可选地,所述已配置的上行资源与所述PRACH资源具有映射关系。
基于图6所示的UE 60,在一种可能的实现方式中,第一标识信息包括RA-RNTI。
基于上述UE60,相应于所述UE标识为C-RNTI,所述第一接收部分602,配置为:根据所述C-RNTI接收所述RAR消息。
在此基础上,所述检测部分602,还配置为:在所述第一接收部分602接收到所述 RAR消息后,停止继续检测通过所述第二标识信息或所述第三标识信息加扰的PDCCH。
基于图6所示的UE 60,在一种可能的实现方式中,第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识(Resume ID)。
在上述实现方式中,可选地,第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
基于图6所示的UE 60,在一种可能的实现方式中,预设的时间窗口包括针对RAR消息进行监测的RAR窗口,或者通过网络设备配置的一个时间窗口。
基于上述方案,所述检测部分602,配置为:若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,则确定冲突解决。
基于上述方案,所述检测部分602,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,且所PDCCH所调度的PDSCH所传输的CCCH SDU中的标识与所述上行资源传输的UE标识一致,则确定冲突解决。
基于上述方案,所述检测部分602,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则确定冲突解决;并且利用与所述第二标识信息具有映射关系的C-RNTI监测PDCCH。
可以理解地,在本实施例中,“部分”可以是部分电路、部分处理器、部分程序或软件等等,当然也可以是单元,还可以是模块也可以是非模块化的。
另外,在本实施例中的各组成部分可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
所述集成的单元如果以软件功能模块的形式实现并非作为独立的产品进行销售或使用时,可以存储在一个计算机可读取存储介质中,基于这样的理解,本实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
因此,本实施例提供了一种计算机存储介质,该计算机存储介质存储有随机接入的程序,所述随机接入的程序被至少一个处理器执行时实现上述图3所示随机接入的方法的步骤。
基于上述UE 60以及计算机存储介质,参见图8,其示出了本申请实施例提供的一种UE 60的具体硬件结构,可以包括:第一网络接口801、第一存储器802和第一处理器803;各个组件通过总线系统804耦合在一起。可理解,总线系统804用于实现这些组件之间的连接通信。总线系统804除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图8中将各种总线都标为总线系统804。其中,第一网络接口801,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;
第一存储器802,用于存储能在第一处理器803上运行的计算机程序;
第一处理器803,用于在运行所述计算机程序时,执行:基于第一标识信息接收RAR消息;其中,所述RAR消息中携带有第二标识信息;在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测PDCCH;其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。
可以理解,本申请实施例中的第一存储器802可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本文描述的系统和方法的第一存储器802旨在包括但不限于这些和任意其它适合类型的存储器。
而第一处理器803可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过第一处理器803中的硬件的集成逻辑电路或者软件形式的指令完成。上述的第一处理器803可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于第一存储器802,第一处理器803读取第 一存储器802中的信息,结合其硬件完成上述方法的步骤。
可以理解的是,本文描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在一个或多个专用集成电路(Application Specific Integrated Circuits,ASIC)、数字信号处理器(Digital Signal Processing,DSP)、数字信号处理设备(DSP Device,DSPD)、可编程逻辑设备(Programmable Logic Device,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本申请所述功能的其它电子单元或其组合中。
对于软件实现,可通过执行本文所述功能的模块(例如过程、函数等)来实现本文所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。
具体来说,UE 60中的第一处理器803还配置为运行计算机程序时,执行前述图3所示技术方案中所述的随机接入的方法步骤,这里不再进行赘述。
基于前述图3至图5所示的技术方案相同的申请构思,参见图9,其示出了本申请实施例提供的一种网络设备90的组成,可以包括:加扰部分901和第二发送部分902;其中,
所述加扰部分901,配置为将RAR消息通过第一标识信息加扰;
所述第二发送部分902,配置为向UE发送加扰后的RAR消息;其中,所述RAR消息携带有第二标识信息;
所述加扰部分901,还配置为根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰;
所述第二发送部分902,还配置为将加扰后的PDCCH向所述UE发送。
基于图9所述的网络设备90,在一种可能的实现方式中,参见图10,还可以包括:第二接收部分903,配置为:接收所述UE发送的前导码(preamble),并在已配置的上行资源上接收UE标识。
在上述实现方式中,可选地,所述UE标识包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识(Resume ID)。
基于图9所述的网络设备90,在一种可能的实现方式中,所述第一标识信息包括RA-RNTI。
基于图9所述的网络设备90,在一种可能的实现方式中,第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识(Resume ID)。
在上述实现方式中,可选地,所述第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
基于上述方案,所述加扰部分901,配置为:若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI 相关联的其他标识对待发送的PDCCH进行加扰。
基于上述方案,所述加扰部分901,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
基于上述方案,所述加扰部分901,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则利用与所述第二标识信息具有映射关系的C-RNTI对待发送的PDCCH进行加扰。
另外,本实施例提供了一种计算机存储介质,该计算机存储介质存储有随机接入的程序,所述随机接入的程序被至少一个处理器执行时实现上述图4所示技术方案中所述的方法的步骤。针对计算机存储介质的具体阐述,参见前述技术方案中的相应说明,在此不再赘述。
基于上述网络设备90以及计算机存储介质,参见图11,其示出了本申请实施例提供的一种网络设备90的具体硬件结构,包括:第二网络接口1101、第二存储器1102和第二处理器1103;各个组件通过总线系统1104耦合在一起。可理解,总线系统1104用于实现这些组件之间的连接通信。总线系统1104除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图11中将各种总线都标为总线系统1104。其中,
其中,所述第二网络接口1101,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;
第二存储器1102,用于存储能够在第二处理器1103上运行的计算机程序;
第二处理器1103,用于在运行所述计算机程序时,执行:将RAR消息通过第一标识信息加扰后,向用户设备UE发送;其中,所述RAR消息携带有第二标识信息;根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰;将加扰后的PDCCH向所述UE发送。
可以理解地,本实施例中网络设备90的具体硬件结构中的组成部分,与前述技术方案中所描述的相应部分类似,在此不做赘述。
具体来说,网络设备90中的第二处理器1103,还配置为运行所述计算机程序时,执行前述上述图4所示技术方案中所述方法步骤,这里不再进行赘述。
需要说明的是:本申请实施例所记载的技术方案之间,在不冲突的情况下,可以任意组合。
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。

Claims (49)

  1. 一种随机接入的方法,所述方法应用于用户设备UE,所述方法包括:
    基于第一标识信息接收随机接入响应RAR消息;其中,所述RAR消息中携带有第二标识信息;
    在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测物理下行控制信道PDCCH;其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    在已配置的PRACH资源上发送前导码preamble,并在已配置的上行资源上发送UE标识。
  3. 根据权利要求2所述的方法,其中,所述UE标识包括以下任一项:
    5G临时移动用户识别码5G-S-TMSI;
    5G-S-TMSI的一部分;
    小区无线网络临时标识C-RNTI;
    C-RNTI、物理小区标识PCI和短介质访问控制标识short MAC I;
    以及,恢复标识Resume ID。
  4. 根据权利要求2所述的方法,其中,所述已配置的上行资源包括物理上行链路控制信道PUCCH资源和/或物理上行共享信道PUSCH资源。
  5. 根据权利要求2所述的方法,其中,所述已配置的上行资源与所述PRACH资源具有映射关系。
  6. 根据权利要求1所述的方法,其中,所述第一标识信息包括随机接入无线网络临时标识符RA-RNTI。
  7. 根据权利要求2所述的方法,其中,相应于所述UE标识为C-RNTI,所述基于第一标识信息接收随机接入响应RAR消息,包括:
    根据所述C-RNTI接收所述RAR消息。
  8. 根据权利要求7所述的方法,其中,所述方法还包括:
    在接收到所述RAR消息后,停止继续检测通过所述第二标识信息或所述第三标识信息加扰的PDCCH。
  9. 根据权利要求1所述的方法,其中,所述第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识Resume ID。
  10. 根据权利要求9所述的方法,其中,所述第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
  11. 根据权利要求1所述的方法,其中,所述预设的时间窗口包括针对RAR消息 进行监测的RAR窗口,或者通过网络设备配置的一个时间窗口。
  12. 根据权利要求1至11任一项所述的方法,其中,所述根据所述第二标识信息检测PDCCH,包括:
    若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;
    相应于成功监测到PDCCH,则确定冲突解决。
  13. 根据权利要求1至11任一项所述的方法,其中,所述根据所述第二标识信息检测PDCCH,包括:
    若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;
    相应于成功监测到PDCCH,且所PDCCH所调度的PDSCH所传输的CCCH SDU中的标识与所述上行资源传输的UE标识一致,则确定冲突解决。
  14. 根据权利要求1至11任一项所述的方法,其中,所述根据与所述第二标识信息具有关联关系的第三标识信息检测PDCCH,包括:
    若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则确定冲突解决;并且利用与所述第二标识信息具有映射关系的C-RNTI监测PDCCH。
  15. 一种随机接入的方法,所述方法应用于网络设备,所述方法包括:
    将随机接入响应RAR消息通过第一标识信息加扰后,向用户设备UE发送;其中,所述RAR消息携带有第二标识信息;
    根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰;
    将加扰后的PDCCH向所述UE发送。
  16. 根据权利要求15所述的方法,其中,所述方法还包括:
    接收所述UE发送的前导码preamble,并在已配置的上行资源上接收UE标识。
  17. 根据权利要求16所述的方法,其中,所述UE标识包括以下任一项:5G临时移动用户识别码5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、物理小区标识PCI和短介质访问控制标识short MAC I;以及,恢复标识Resume ID。
  18. 根据权利要求15所述的方法,其中,所述第一标识信息包括随机接入无线网络临时标识符RA-RNTI。
  19. 根据权利要求15所述的方法,其中,所述第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,恢复标识Resume ID。
  20. 根据权利要求19所述的方法,其中,所述第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
  21. 根据权利要求15至20任一项所述的方法,其中,所述根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,包括:
    若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
  22. 根据权利要求15至20任一项所述的方法,其中,所述根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,包括:
    若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
  23. 根据权利要求15至20任一项所述的方法,其中,所述根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰,可以包括:
    若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则利用与所述第二标识信息具有映射关系的C-RNTI对待发送的PDCCH进行加扰。
  24. 一种用户设备,所述用户设备包括:第一网络接口,第一存储器和第一处理器;其中,所述第一网络接口,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;所述第一存储器,用于存储能够在所述第一处理器上运行的计算机程序;所述第一处理器,用于在运行所述计算机程序时,执行权利要求1至14任一项所述方法的步骤。
  25. 一种网络设备,所述网络设备包括:第二网络接口、第二存储器和第二处理器;其中,所述第二网络接口,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;所述第二存储器,用于存储能够在第二处理器上运行的计算机程序;所述第二处理器,用于在运行所述计算机程序时,执行权利要求15至23任一项所述方法的步骤。
  26. 一种计算机存储介质,所述计算机存储介质存储有随机接入的程序,所述随机接入的程序被至少一个处理器执行时实现权利要求1至14任一项或权利要求15至23任一项所述随机接入的方法的步骤。
  27. 一种用户设备,所述用户设备包括:第一接收部分和检测部分;其中,
    所述第一检测部分,配置为基于第一标识信息接收RAR消息;其中,所述RAR消息中携带有第二标识信息;
    所述检测部分,配置为在预设的时间窗口内,根据所述第二标识信息或与所述第二标识信息具有关联关系的第三标识信息检测PDCCH;其中,所述PDCCH通过所述第二标识信息或所述第三标识信息加扰。
  28. 根据权利要求27所述的用户设备,其中,所述用户设备还包括第一发送部分,配置为:在已配置的PRACH资源上发送前导码,并在已配置的上行资源上发送UE标 识。
  29. 根据权利要求28所述的用户设备,其中,所述UE标识包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,Resume ID。
  30. 根据权利要求28所述的用户设备,其中,所述已配置的上行资源包括PUCCH资源和/或PUSCH资源。
  31. 根据权利要求28所述的用户设备,其中,所述已配置的上行资源与所述PRACH资源具有映射关系。
  32. 根据权利要求27所述的用户设备,其中,所述第一标识信息包括RA-RNTI。
  33. 根据权利要求28所述的用户设备,其中,相应于所述UE标识为C-RNTI,所述第一接收部分,配置为:根据所述C-RNTI接收所述RAR消息。
  34. 根据权利要求33所述的用户设备,其中,所述检测部分,还配置为:在所述第一接收部分接收到所述RAR消息后,停止继续检测通过所述第二标识信息或所述第三标识信息加扰的PDCCH。
  35. 根据权利要求27所述的用户设备,其中,所述第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,Resume ID。
  36. 根据权利要求35所述的用户设备,其中,所述第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
  37. 根据权利要求27所述的用户设备,其中,所述预设的时间窗口包括针对RAR消息进行监测的RAR窗口,或者通过网络设备配置的一个时间窗口。
  38. 根据权利要求27至37任一项所述的用户设备,其中,所述检测部分,配置为:若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,则确定冲突解决。
  39. 根据权利要求27至37任一项所述的用户设备,其中,所述检测部分,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识监测PDCCH;相应于成功监测到PDCCH,且所PDCCH所调度的PDSCH所传输的CCCH SDU中的标识与所述上行资源传输的UE标识一致,则确定冲突解决。
  40. 根据权利要求27至37任一项所述的用户设备,其中,所述检测部分,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则确定冲突解决;并且利用与所述第二标识信息具有映射关系的C-RNTI监测PDCCH。
  41. 一种网络设备,所述网络设备包括:加扰部分和第二发送部分;其中,
    所述加扰部分,配置为将RAR消息通过第一标识信息加扰;
    所述第二发送部分,配置为向UE发送加扰后的RAR消息;其中,所述RAR消息携带有第二标识信息;
    所述加扰部分,还配置为根据第二标识信息或与所述第二标识信息具有关联关系的第三标识信息对待发送的PDCCH进行加扰;
    所述第二发送部分,还配置为将加扰后的PDCCH向所述UE发送。
  42. 根据权利要求41所述的网络设备,其中,所述网络设备还包括第二接收部分,配置为:接收所述UE发送的前导码,并在已配置的上行资源上接收UE标识。
  43. 根据权利要求42所述的网络设备,其中,所述UE标识包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,Resume ID。
  44. 根据权利要求41所述的网络设备,其中,所述第一标识信息包括RA-RNTI。
  45. 根据权利要求41所述的网络设备,其中,所述第二标识信息包括以下任一项:5G-S-TMSI;5G-S-TMSI的一部分;C-RNTI;C-RNTI、PCI和short MAC I;以及,Resume ID。
  46. 根据权利要求45所述的网络设备,其中,所述第二标识信息所包含的内容具有与所述UE标识所包含的内容不一致的可能性。
  47. 根据权利要求41至46任一项所述的网络设备,其中,所述加扰部分,配置为:若所述上行资源传输的UE标识为C-RNTI,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
  48. 根据权利要求41至46任一项所述的网络设备,其中,所述加扰部分,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带第二标识信息为C-RNTI,则通过C-RNTI或C-RNTI相关联的其他标识对待发送的PDCCH进行加扰。
  49. 根据权利要求41至46任一项所述的网络设备,其中,所述加扰部分,配置为:若所述上行资源传输的UE标识为除C-RNTI以外的其他标识,且所述RAR消息中携带的第二标识信息与所述其他标识相匹配,则利用与所述第二标识信息具有映射关系的C-RNTI对待发送的PDCCH进行加扰。
PCT/CN2019/081996 2018-08-01 2019-04-10 一种随机接入的方法、设备及计算机存储介质 WO2020024614A1 (zh)

Priority Applications (9)

Application Number Priority Date Filing Date Title
KR1020217005663A KR20210038627A (ko) 2018-08-01 2019-04-10 랜덤 액세스 방법, 기기 및 컴퓨터 저장 매체
CN202110343095.7A CN113068274B (zh) 2018-08-01 2019-04-10 一种随机接入的方法及设备
EP19845035.5A EP3817500B1 (en) 2018-08-01 2019-04-10 Random access method and device, and computer storage medium
JP2021505282A JP7297867B2 (ja) 2018-08-01 2019-04-10 ランダムアクセス方法、装置及びコンピュータ記憶媒体
SG11202100969PA SG11202100969PA (en) 2018-08-01 2019-04-10 Random access method and device, and computer storage medium
CN201980051390.6A CN112534948A (zh) 2018-08-01 2019-04-10 一种随机接入的方法、设备及计算机存储介质
AU2019314850A AU2019314850A1 (en) 2018-08-01 2019-04-10 Random access method and device, and computer storage medium
TW108127346A TW202008743A (zh) 2018-08-01 2019-08-01 隨機接入的方法、設備及電腦儲存媒介
US17/153,876 US20210144771A1 (en) 2018-08-01 2021-01-20 Random access method and device, and computer storage medium

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201810866886.6 2018-08-01
CN201810866886 2018-08-01
CN201810936190.6 2018-08-16
CN201810936190 2018-08-16

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/153,876 Continuation US20210144771A1 (en) 2018-08-01 2021-01-20 Random access method and device, and computer storage medium

Publications (1)

Publication Number Publication Date
WO2020024614A1 true WO2020024614A1 (zh) 2020-02-06

Family

ID=69231394

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/081996 WO2020024614A1 (zh) 2018-08-01 2019-04-10 一种随机接入的方法、设备及计算机存储介质

Country Status (9)

Country Link
US (1) US20210144771A1 (zh)
EP (1) EP3817500B1 (zh)
JP (1) JP7297867B2 (zh)
KR (1) KR20210038627A (zh)
CN (2) CN113068274B (zh)
AU (1) AU2019314850A1 (zh)
SG (1) SG11202100969PA (zh)
TW (1) TW202008743A (zh)
WO (1) WO2020024614A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220124830A1 (en) * 2019-02-22 2022-04-21 Nokia Technologies Oy Contention resolution in random access procedure
CN114269026B (zh) * 2022-03-01 2022-05-10 成都爱瑞无线科技有限公司 随机接入信号处理方法、随机接入方法、装置及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014516A (zh) * 2010-11-18 2011-04-13 北京邮电大学 Lte-a系统中的随机接入方法
WO2017127126A1 (en) * 2016-01-19 2017-07-27 Intel IP Corporation Devices and methods for providing 5g uplink request
CN108289337A (zh) * 2017-01-09 2018-07-17 北京三星通信技术研究有限公司 上行调度请求的方法及用户设备、基站设备
CN108353323A (zh) * 2015-10-29 2018-07-31 夏普株式会社 终端装置、基站装置、通信方法以及集成电路

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5221753B2 (ja) * 2008-04-14 2013-06-26 エルジー エレクトロニクス インコーポレイティド ランダムアクセス手順を行う方法及び装置
US9288028B2 (en) * 2011-06-28 2016-03-15 Lg Electronics Inc. Method and apparatus for transmitting/receiving uplink signal, and method and apparatus for transmitting/receiving downlink signal
US20130083739A1 (en) * 2011-10-04 2013-04-04 Sharp Laboratories Of America, Inc. Devices for random access response scheduling
KR102133785B1 (ko) * 2012-05-10 2020-07-15 삼성전자주식회사 메시지 송수신 방법 및 장치
EP2947797B1 (en) * 2013-01-17 2018-10-10 LG Electronics Inc. Method for receiving control information in wireless communication system and apparatus therefor
WO2015008956A1 (en) * 2013-07-16 2015-01-22 Lg Electronics Inc. Method and apparatus for performing random access procedure in wireless communication system
JP6114468B2 (ja) * 2013-07-19 2017-04-12 エルジー エレクトロニクス インコーポレイティド 無線通信システムにおけるランダムアクセス手順を実行するための方法及び装置
WO2015137632A1 (en) 2014-03-11 2015-09-17 Lg Electronics Inc. Method for allocating temporary identifier to terminal in random access procedure in wireless communication system and apparatus tehrefor
KR20160150611A (ko) * 2015-06-22 2016-12-30 삼성전자주식회사 무선 통신 시스템에서 반영구 스케줄링 기반의 통신 기법
US11700641B2 (en) * 2015-08-19 2023-07-11 Lg Electronics Inc. Random access procedure performing method in wireless communication system, and apparatus therefor
CN107852266B (zh) * 2015-08-19 2020-09-15 富士通株式会社 支持多种传输时间间隔的随机接入方法、装置以及通信系统
CN106993335B (zh) * 2016-01-21 2022-03-01 中兴通讯股份有限公司 前导码发送、接收方法、装置、用户设备及基站
EP3691348A1 (en) * 2016-04-01 2020-08-05 KYOCERA Corporation Base station and radio terminal
US11277866B2 (en) * 2016-05-27 2022-03-15 Ntt Docomo, Inc. Communication device and random access control method
WO2018064367A1 (en) 2016-09-28 2018-04-05 Idac Holdings, Inc. Random access in next generation wireless systems
CN117042198A (zh) 2016-10-07 2023-11-10 三星电子株式会社 用于基于增强竞争的随机接入程序的方法和装置
US10405342B2 (en) * 2016-11-01 2019-09-03 Qualcomm Incorporated Two step random access procedure
CN108282899B (zh) * 2017-01-05 2020-03-06 电信科学技术研究院 一种两步竞争随机接入方法和装置
CN108282901B (zh) * 2017-01-06 2019-08-09 电信科学技术研究院 一种随机接入响应方法和装置
EP3607801B1 (en) * 2017-04-04 2021-12-22 LG Electronics Inc. Apparatus and method for performing a random access procedure
CN110603887B (zh) * 2017-05-05 2023-10-20 诺基亚技术有限公司 关于多prach前导码和随机接入响应
CN110831241B (zh) * 2017-08-11 2020-09-29 华为技术有限公司 传输随机接入响应的方法、接入网设备和终端设备
US10555338B2 (en) * 2017-08-11 2020-02-04 Mediatek Inc. NR-PRACH multiple Msg1 transmission
CN109962756A (zh) * 2017-12-22 2019-07-02 华为技术有限公司 通信方法和装置
WO2019164302A1 (ko) * 2018-02-21 2019-08-29 엘지전자 주식회사 무선 통신 시스템에서 bwp 또는 빔 전환에 따라 제어 채널을 구성하는 방법 및 장치
WO2019191262A1 (en) * 2018-03-30 2019-10-03 Ofinno, Llc Bandwidthpart (bwp) switching during beam failure recovery
BR112020022686A2 (pt) * 2018-05-15 2021-02-09 Ntt Docomo, Inc. terminal, aparelho de estação base e método de comunicação
JP7271097B2 (ja) * 2018-07-17 2023-05-11 シャープ株式会社 基地局装置、端末装置、および、通信方法
JP2020014082A (ja) * 2018-07-17 2020-01-23 シャープ株式会社 基地局装置、端末装置、通信方法、および、集積回路

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014516A (zh) * 2010-11-18 2011-04-13 北京邮电大学 Lte-a系统中的随机接入方法
CN108353323A (zh) * 2015-10-29 2018-07-31 夏普株式会社 终端装置、基站装置、通信方法以及集成电路
WO2017127126A1 (en) * 2016-01-19 2017-07-27 Intel IP Corporation Devices and methods for providing 5g uplink request
CN108289337A (zh) * 2017-01-09 2018-07-17 北京三星通信技术研究有限公司 上行调度请求的方法及用户设备、基站设备

Also Published As

Publication number Publication date
US20210144771A1 (en) 2021-05-13
TW202008743A (zh) 2020-02-16
EP3817500B1 (en) 2023-08-16
SG11202100969PA (en) 2021-03-30
AU2019314850A1 (en) 2021-02-25
CN112534948A (zh) 2021-03-19
CN113068274A (zh) 2021-07-02
EP3817500A4 (en) 2021-09-08
JP7297867B2 (ja) 2023-06-26
EP3817500A1 (en) 2021-05-05
CN113068274B (zh) 2023-10-31
JP2021533627A (ja) 2021-12-02
KR20210038627A (ko) 2021-04-07

Similar Documents

Publication Publication Date Title
US20220007426A1 (en) Random access method and device
WO2020019230A1 (zh) 一种资源配置方法及装置、终端设备、网络设备
WO2020107416A1 (zh) 随机接入过程选择方法、装置、芯片及计算机程序
WO2020186466A1 (zh) 无线通信的方法、终端设备和网络设备
WO2020024614A1 (zh) 一种随机接入的方法、设备及计算机存储介质
WO2020024616A1 (zh) 一种随机接入方法及相关设备
WO2020191561A1 (zh) 一种随机接入方法及装置、用户设备、网络设备
WO2020191592A1 (zh) 一种寻呼时机配置方法及装置、终端、网络设备
WO2020061945A1 (zh) 用于随机接入的方法、网络设备和终端设备
CN112567873B (zh) 一种信息传输的方法、设备及计算机存储介质
WO2020248143A1 (zh) 监听控制信道的方法、终端设备和网络设备
WO2020206643A1 (zh) 一种随机接入方法、设备及存储介质
WO2020191632A1 (zh) 一种功率控制方法及装置、终端、网络设备
WO2020019182A1 (zh) 一种信号传输方法及装置、终端设备、网络设备
CN113678560A (zh) 随机接入过程中传输信息的方法、终端设备和网络设备
US20210144754A1 (en) Method and device for information transmission
WO2021159541A1 (zh) 确定激活期方法和装置
WO2020082394A1 (zh) 随机接入的方法、终端设备和网络设备
WO2020191760A1 (zh) 一种信道传输方法、电子设备及存储介质
WO2024109723A1 (zh) 随机接入方法及装置、终端、网络设备
WO2020198988A1 (zh) 一种随机接入方法、电子设备及存储介质
WO2022236499A1 (zh) Cg资源维护方法、终端设备和网络设备
CN114222350B (zh) 一种随机接入方法及装置、用户设备、网络设备
WO2020186408A1 (zh) 一种资源管理方法、设备及存储介质
WO2021012286A1 (zh) 一种随机接入方法及装置、终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19845035

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021505282

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019845035

Country of ref document: EP

Effective date: 20210126

ENP Entry into the national phase

Ref document number: 20217005663

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2019314850

Country of ref document: AU

Date of ref document: 20190410

Kind code of ref document: A