WO2020056736A1 - 一种随机接入控制方法及装置、网络设备、终端 - Google Patents

一种随机接入控制方法及装置、网络设备、终端 Download PDF

Info

Publication number
WO2020056736A1
WO2020056736A1 PCT/CN2018/107025 CN2018107025W WO2020056736A1 WO 2020056736 A1 WO2020056736 A1 WO 2020056736A1 CN 2018107025 W CN2018107025 W CN 2018107025W WO 2020056736 A1 WO2020056736 A1 WO 2020056736A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
terminal
access
random access
value
Prior art date
Application number
PCT/CN2018/107025
Other languages
English (en)
French (fr)
Inventor
王淑坤
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to EP18933933.6A priority Critical patent/EP3855794A4/en
Priority to PCT/CN2018/107025 priority patent/WO2020056736A1/zh
Priority to CN201880097314.4A priority patent/CN112673667A/zh
Publication of WO2020056736A1 publication Critical patent/WO2020056736A1/zh
Priority to US17/171,964 priority patent/US11528752B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/002Transmission of channel access control information
    • H04W74/008Transmission of channel access control information with additional processing of random access related information at receiving side
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Definitions

  • the embodiments of the present application relate to the field of mobile communication technologies, and in particular, to a method and device for random access control, a network device, and a terminal.
  • a user equipment accesses a network and acquires a radio resource control (RRC, Radio Resource Control) connection, it first needs to perform a random access process.
  • the current random access process uses a four-step random access process (referred to as 4 step RACH).
  • 4 step RACH a four-step random access process
  • 2 step RACH a two-step random access process
  • MSG3's resources are pre-configured, and the pre-configured resources are limited.
  • the two-step RACH will not be open to all UEs and / or all services, so how to control the UE to use two-step RACH solved problem.
  • the embodiments of the present application provide a random access control method and device, a network device, and a terminal.
  • the network device sends a first system broadcast message, where the first system broadcast message includes first indication information, where the first indication information is used to indicate whether the target cell of the terminal supports a two-step random access process;
  • the first indication information and the access control information are used by the terminal to determine whether a two-step random access procedure can be performed.
  • the terminal receives a first system broadcast message, and the first system broadcast message includes first indication information, where the first indication information is used to indicate whether a target cell of the terminal supports a two-step random access process;
  • the terminal determines whether a two-step random access procedure can be performed based on the first indication information and the access control information.
  • a first sending unit configured to send a first system broadcast message, where the first system broadcast message includes first indication information, where the first indication information is used to indicate whether a target cell of a terminal supports a two-step random access procedure;
  • a second sending unit configured to send a second system broadcast message, where the second system broadcast message includes access control information corresponding to the two-step random access process
  • the first indication information and the access control information are used by the terminal to determine whether a two-step random access procedure can be performed.
  • a first receiving unit configured to receive a first system broadcast message, where the first system broadcast message includes first indication information, where the first indication information is used to indicate whether a target cell of a terminal supports a two-step random access process;
  • a second receiving unit configured to receive a second system broadcast message, where the second system broadcast message includes access control information corresponding to a two-step random access process;
  • a determining unit configured to determine whether a two-step random access procedure can be performed based on the first instruction information and the access control information.
  • the network device provided in the embodiment of the present application includes a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the foregoing random access control method.
  • the terminal provided in the embodiment of the present application includes a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the foregoing random access control method.
  • the chip provided in the embodiment of the present application is used to implement the foregoing random access control method.
  • the chip includes a processor for invoking and running a computer program from a memory, so that a device installed with the chip executes the foregoing random access control method.
  • the computer-readable storage medium provided in the embodiment of the present application is used to store a computer program, and the computer program causes a computer to execute the foregoing random access control method.
  • the computer program product provided in the embodiment of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the foregoing random access control method.
  • the computer program provided in the embodiment of the present application when run on a computer, causes the computer to execute the foregoing random access control method.
  • the network side configures first instruction information and access control information through system broadcast.
  • the first instruction information is used to indicate whether the target cell of the terminal supports the two-step random access process, thereby controlling the terminal to use the two-step random access.
  • the function of the access process achieves the reasonable use of the two-step random access process and guarantees the delay gain brought by the two-step random access process.
  • FIG. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
  • Figure 3 (a) is the format of E / T / R / R / BI MAC subheader
  • Figure 3 (b) is the format of E / T / RAPID MAC subheader
  • Figure 3 (c) is the format of MAC PDUs (including MAC RARs);
  • Figure 3 (d) is a schematic diagram of a MAC RAR
  • FIG. 4 is a first schematic flowchart of a random access control method according to an embodiment of the present application.
  • FIG. 5 is a second schematic flowchart of a random access control method according to an embodiment of the present application.
  • FIG. 6 is a first schematic structural diagram of a random access control device according to an embodiment of the present application.
  • FIG. 7 is a second schematic diagram of the structure and composition of a random access control device according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • FIG. 10 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • GSM Global System for Mobile
  • CDMA Code Division Multiple Access
  • Wideband Code Division Multiple Access Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with the terminal 120 (or a communication terminal or terminal).
  • the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminals located within the coverage area.
  • the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, or a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system.
  • BTS Base Transceiver Station
  • NodeB NodeB
  • the network device may be a mobile switching center, relay station, access point, vehicle equipment, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in public land mobile networks (PLMN) that will evolve in the future.
  • PLMN public land mobile networks
  • the communication system 100 further includes at least one terminal 120 located within a coverage area of the network device 110.
  • terminal used herein includes, but is not limited to, connection via a wired line, such as via a Public Switched Telephone Network (PSTN), Digital Subscriber Line (DSL), digital cable, direct cable connection; And / or another data connection / network; and / or via a wireless interface, such as for cellular networks, wireless local area networks (WLAN), digital television networks such as DVB-H networks, satellite networks, AM-FM A broadcast transmitter; and / or another terminal device configured to receive / transmit communication signals; and / or an Internet of Things (IoT) device.
  • PSTN Public Switched Telephone Network
  • DSL Digital Subscriber Line
  • WLAN wireless local area networks
  • DVB-H networks digital television networks
  • satellite networks satellite networks
  • AM-FM A broadcast transmitter AM-FM A broadcast transmitter
  • IoT Internet of Things
  • a terminal configured to communicate through a wireless interface may be referred to as a "wireless communication terminal", a “wireless terminal”, or a “mobile terminal”.
  • mobile terminals include, but are not limited to, satellite or cellular phones; personal communications systems (PCS) terminals that can combine cellular radiotelephones with data processing, facsimile, and data communications capabilities; can include radiotelephones, pagers, Internet / internal PDA with network access, web browser, notepad, calendar, and / or Global Positioning System (GPS) receiver; and conventional laptop and / or palm-type receivers or others including radiotelephone transceivers Electronic device.
  • PCS personal communications systems
  • GPS Global Positioning System
  • a terminal may refer to an access terminal, user equipment (UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or user Device.
  • the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Processing (PDA), and wireless communication.
  • the terminals 120 may perform terminal direct connection (Device to Device, D2D) communication.
  • D2D Terminal to Device
  • the 5G system or the 5G network may also be referred to as a New Radio (NR) system or an NR network.
  • NR New Radio
  • FIG. 1 exemplarily shows one network device and two terminals.
  • the communication system 100 may include multiple network devices and each network device may include other numbers of terminals within its coverage area. Embodiments of the present application This is not limited.
  • the communication system 100 may further include other network entities such as a network controller, a mobility management entity, and the like in this embodiment of the present application is not limited thereto.
  • network entities such as a network controller, a mobility management entity, and the like in this embodiment of the present application is not limited thereto.
  • a communication device may include a network device 110 and a terminal 120 having a communication function, and the network device 110 and the terminal 120 may be specific devices described above, and are not described herein again; communication
  • the device may also include other devices in the communication system 100, such as other network entities such as a network controller and a mobile management entity, which are not limited in the embodiments of the present application.
  • NR New Radio
  • LTE Long Term Evolution
  • NR New Radio
  • LTE Long Term Evolution
  • NR New Radio
  • LTE Long Term Evolution
  • NR New Radio
  • the technical solution of the embodiment of the present invention is mainly applied to a 5G mobile communication system.
  • the technical solution of the embodiment of the present invention is not limited to the 5G mobile communication system, and can also be applied to other types of mobile communication systems.
  • eMBB targets users to obtain multimedia content, services, and data, and its business demand is growing rapidly. Because eMBB may be deployed in different scenarios, such as indoor, urban, rural, etc., and its service capabilities and requirements vary widely, it is necessary to analyze services in conjunction with specific deployment scenarios.
  • URLLC scenario Typical applications of URLLC include: industrial automation, electric power automation, telemedicine operations, and traffic safety assurance.
  • mMTC scenario The typical characteristics of URLLC include: high connection density, small amount of data, delay-insensitive services, low cost of modules, and long service life.
  • FIG. 2 is a flowchart of a four-step random access process, including the following steps:
  • the UE sends MSG1 to the gNB: Random Access Preamble.
  • the UE selects a PRACH resource, and sends the selected preamble on the PRACH resource.
  • a PRACH resource there are a total of 64 Preambles, and each Preamble corresponds to an index, and the value of the index ranges from 0 to 63.
  • the gNB sends MSG2: Random Access Response (RAR, Random Access Response) to the UE.
  • RAR Random Access Response
  • the gNB responds to MSG1 to send a random access response to the UE, and the UE calculates a random access-radio network temporary identity (RA-RNTI) for scrambling scheduling information of the MSG2 according to the PRACH resource that sent the Preamble.
  • the data format of the media access control (MAC) layer of the RAR is shown in FIG. 3 (a), FIG. 3 (b), FIG. 3 (c), and FIG. 3 (d).
  • FIG. 3 (a) It is the format of E / T / R / R / / BI MAC subheader.
  • Figure 3 (b) is the format of E / T / RAPID MAC subheader.
  • Figure 3 (c) is the format of MAC PDU (including MAC RARs).
  • Figure 3 ( d) is a schematic diagram of MAC RAR.
  • UE sends MSG3 to gNB: Scheduled Transmission
  • the network side allocates uplink resources for sending MSG3 to the UE, and the UE sends MSG3 on the uplink resources (UL grant) allocated by the network side.
  • gNB sends MSG4 to UE: Contention Resolution
  • MSG1 and MSG3 are sent simultaneously or almost simultaneously (MSG3 can be sent without waiting for MSG2 here), and MSG2 and MSG4 are sent together (one PDSCH transmission or two PDSCH transmissions).
  • the resources for sending MSG3 are pre-configured, and the pre-configured resources are limited.
  • the two-step random access process does not configure many resources, and the two-step random access process does not. It will be open to all terminals and / or all services. Therefore, it is necessary to reasonably control the terminal to use the two-step random access process.
  • FIG. 4 is a first schematic flowchart of a random access control method according to an embodiment of the present application. As shown in FIG. 4, the random access control method includes the following steps:
  • Step 401 The network device sends a first system broadcast message, where the first system broadcast message includes first indication information, and the first indication information is used to indicate whether the target cell of the terminal supports a two-step random access process.
  • the network device may be a base station, such as a gNB in 5G and an eNB in 4G.
  • the network device sends a first system broadcast message in a broadcast manner.
  • the first system broadcast message includes first indication information, and the first indication information is used to indicate whether the target cell of the terminal supports two-step random Access process.
  • the target cell refers to a current serving cell of the terminal.
  • the first indication information may be implemented in the following two ways:
  • the first system broadcast message includes a first information field, and the first information field carries the first indication information.
  • the network side broadcasts the first indication information, which is used to indicate whether the current serving cell of the UE supports 2 steps RACH.
  • the first indication information may be implemented by 1 bit, so as to indicate whether the current serving cell of the UE supports 2 steps RACH. For example, if the bit value is 1, it represents the current serving cell of the UE. 2 steps RACH is supported. If the bit value is 0, it means that the current serving cell of the UE does not support 2 steps RACH.
  • the first system broadcast message includes first resource configuration information for the two-step random access process, and the first resource configuration information is used to determine the first indication information.
  • the first resource configuration information is configured with multiple resources for 2 step RACH, and the resource has a relationship with the cell. If the resource selected by the terminal supports 2 step RACH, the cell corresponding to the resource also supports 2 step RACH. The terminal If the selected resource does not support 2-step RACH, the cell corresponding to the resource does not support 2-step RACH.
  • Step 402 The network device sends a second system broadcast message, where the second system broadcast message includes access control information corresponding to a two-step random access process; wherein the first indication information and the access control The information is used by the terminal to determine whether it can perform a two-step random access procedure.
  • the access control information includes first information and / or second information, and the first information is used to indicate whether a terminal corresponding to at least one access control (AC, Access Control) value can perform two operations.
  • Step random access process the second information is used to indicate whether a terminal corresponding to at least one access information can perform a two-step random access process; wherein the first information is used for the terminal based on the terminal's AC
  • the value determines whether the terminal can perform a two-step random access procedure
  • the second information is used by the terminal to determine whether the terminal can perform a two-step random access procedure based on the terminal's access information.
  • Different implementations of the access control information are described below.
  • the access control information includes first information, which is used to indicate whether a terminal corresponding to at least one AC value can perform a two-step random access process; wherein the first information is used for the terminal to The AC value of the terminal determines whether the terminal can perform a two-step random access procedure.
  • the first information indicates that a terminal corresponding to an AC value equal to 11,13,15 can perform a two-step random access procedure. If the terminal's AC value is any of 11,13,15, it can Perform a two-step random access procedure.
  • the first information includes a first bitmap, and each bit in the first bitmap corresponds to an AC value, and the value of the bit is used to indicate the AC corresponding to the bit. Whether the value of the terminal can perform a two-step random access procedure.
  • the first bitmap is an AC bitmap
  • each bit in the AC bitmap corresponds to a 2 step RACH control for a UE with an AC value.
  • the terminal determines whether the current serving cell of the terminal supports 2 RACH based on the first indication information in the broadcast message of the first system. If so, the terminal determines whether it can use 2 based on its AC value combined with the first information in the access control information. step RACH initiates random access.
  • the access control information includes second information, and the second information is used to indicate whether a terminal corresponding to at least one of the access information can perform a two-step random access process; wherein the second information is used for the terminal based on The access information of the terminal determines whether the terminal can perform a two-step random access procedure.
  • the second information includes a second bitmap, and each bit in the second bitmap corresponds to one piece of access information, and a value of the bit is used to indicate that the bit corresponds to Whether the terminal accessing the information can perform a two-step random access procedure.
  • the access information includes at least one of the following: an access reason value, an access service type, indication information of the access cause value, indication information of an access service type, and an access reason. Value and indication of access service type.
  • the cause value of the access is the cause value of the RRC connection establishment, or the cause value of the RRC connection restoration, or the cause value of the RRC connection reestablishment.
  • the access information is obtained through a non-access (NAS, Non-Access Stratum) layer or an access (AS, Access Stratum) layer of the terminal.
  • NAS Non-Access Stratum
  • AS Access Stratum
  • the reason value of the terminal's current access can be defined as "Emergency”, “High Priority Access”, or “MT Access”, “MO Signalling”, or “MO Data”, or “MO Voice Call”, or “MO Video Call”, or “MOSMS”, or “MPS-PriorityAccess”, or “MCS-PriorityAccess”.
  • the type of service currently accessed by the terminal can be enhanced mobile broadband (eMBB, Enhance Mobile Broadband) service, or low latency high reliability (URLLC, Ultra Reliable & Low Latency, Communication) service, voice service, or video (Video) services.
  • eMBB Enhance Mobile Broadband
  • URLLC Ultra Reliable & Low Latency, Communication
  • bitmap ie, the second bitmap
  • Each bit in the bitmap represents whether a cause value can be used. 2 RACH.
  • each bit in the bitmap represents whether a service type can use 2 steps RACH.
  • bitmap that is, a second bitmap
  • Each bit in the bitmap represents a set of reason values and whether the service type can use 2 step RACH.
  • the NAS layer of the UE triggers the RRC layer to initiate RRC connection establishment or RRC connection restoration or RRC connection reestablishment, the NAS layer will pass:
  • Cause value or service type of RRC connection establishment or RRC connection restoration or RRC connection reestablishment ; or indication information or service type indication information for indicating a cause value of RRC connection establishment or RRC connection restoration or RRC connection reestablishment.
  • the terminal determines whether the current serving cell of the terminal supports 2 RACH based on the first indication information in the broadcast message of the first system. If it supports, the terminal determines whether to use 2 according to the information transmitted by the NAS layer and the second information in the access control information. step RACH performs random access.
  • the access control information includes first information and second information, where the first information is used to indicate whether a terminal corresponding to at least one AC value can perform a two-step random access process, and the second information is used to indicate at least one Whether the terminal corresponding to the access information can perform a two-step random access process; wherein the first information is used by the terminal to determine whether the terminal can perform a two-step random access process based on the AC value of the terminal, so The second information is used by the terminal to determine whether the terminal can perform a two-step random access process based on the access information of the terminal.
  • the terminal determines whether the current serving cell of the terminal supports 2step RACH based on the first indication information in the broadcast message of the first system. If so, the terminal combines the first information in the access control information with its own AC value, and according to the NAS layer. The transferred information is combined with the second information in the access control information to determine whether 2 steps RACH is used for random access.
  • FIG. 5 is a second schematic flowchart of a random access control method according to an embodiment of the present application. As shown in FIG. 5, the random access control method includes the following steps:
  • Step 501 The terminal receives a first system broadcast message, and the first system broadcast message includes first indication information, where the first indication information is used to indicate whether a target cell of the terminal supports a two-step random access process.
  • the terminal may be any device capable of communicating with the network, such as a mobile phone, a tablet computer, a vehicle-mounted terminal, and a notebook.
  • the terminal receives a first system broadcast message sent by a network device.
  • the network device may be a base station, such as a gNB in 5G and an eNB in 4G.
  • the first system broadcast message includes first indication information, and the first indication information is used to indicate whether a target cell of the terminal supports a two-step random access process.
  • the target cell refers to a current serving cell of the terminal.
  • the first indication information may be implemented in the following two ways:
  • the first system broadcast message includes a first information field, and the first information field carries the first indication information.
  • the network side broadcasts the first indication information, which is used to indicate whether the current serving cell of the UE supports 2 steps RACH.
  • the first indication information may be implemented by 1 bit, so as to indicate whether the current serving cell of the UE supports 2 steps RACH. For example, if the bit value is 1, it represents the current serving cell of the UE. 2 steps RACH is supported. If the bit value is 0, it means that the current serving cell of the UE does not support 2 steps RACH.
  • the first system broadcast message includes first resource configuration information for the two-step random access process, and the first resource configuration information is used to determine the first indication information.
  • the first resource configuration information is configured with multiple resources for 2 step RACH, and the resource has a relationship with the cell. If the resource selected by the terminal supports 2 step RACH, the cell corresponding to the resource also supports 2 step RACH. The terminal If the selected resource does not support 2-step RACH, the cell corresponding to the resource does not support 2-step RACH.
  • Step 502 The terminal receives a second system broadcast message, and the second system broadcast message includes access control information corresponding to a two-step random access process.
  • the access control information includes first information and / or second information, and the first information is used to indicate whether a terminal corresponding to at least one access control (AC, Access Control) value can perform two operations.
  • Step random access process the second information is used to indicate whether a terminal corresponding to at least one access information can perform a two-step random access process; wherein the first information is used for the terminal based on the terminal's AC
  • the value determines whether the terminal can perform a two-step random access procedure
  • the second information is used by the terminal to determine whether the terminal can perform a two-step random access procedure based on the terminal's access information.
  • Different implementations of the access control information are described below.
  • the access control information includes first information, which is used to indicate whether a terminal corresponding to at least one AC value can perform a two-step random access process; wherein the first information is used for the terminal to The AC value of the terminal determines whether the terminal can perform a two-step random access procedure.
  • the first information indicates that a terminal corresponding to an AC value equal to 11,13,15 can perform a two-step random access procedure. If the terminal's AC value is any of 11,13,15, it can Perform a two-step random access procedure.
  • the first information includes a first bitmap, and each bit in the first bitmap corresponds to an AC value, and the value of the bit is used to indicate the AC corresponding to the bit. Whether the value of the terminal can perform a two-step random access procedure.
  • the first bitmap is an AC bitmap
  • each bit in the AC bitmap corresponds to a 2 step RACH control for a UE with an AC value.
  • the terminal determines whether the current serving cell of the terminal supports 2 RACH based on the first indication information in the broadcast message of the first system. If so, the terminal determines whether it can use 2 based on its AC value combined with the first information in the access control information. step RACH initiates random access.
  • the access control information includes second information, and the second information is used to indicate whether a terminal corresponding to at least one of the access information can perform a two-step random access process; wherein the second information is used for the terminal based on The access information of the terminal determines whether the terminal can perform a two-step random access procedure.
  • the second information includes a second bitmap, and each bit in the second bitmap corresponds to one piece of access information, and a value of the bit is used to indicate that the bit corresponds to Whether the terminal accessing the information can perform a two-step random access procedure.
  • the access information includes at least one of the following: an access reason value, an access service type, indication information of the access cause value, indication information of an access service type, and an access reason. Value and indication of access service type.
  • the cause value of the access is the cause value of the RRC connection establishment, or the cause value of the RRC connection restoration, or the cause value of the RRC connection reestablishment. Further, the access information is obtained through a NAS layer or an AS layer of the terminal.
  • the reason value of the terminal's current access can be defined as "Emergency”, “High Priority Access”, or “MT Access”, “MO Signalling”, or “MO Data”, or “MO Voice Call”, or “MO Video Call”, or “MOSMS”, or “MPS-PriorityAccess”, or “MCS-PriorityAccess”.
  • the service type currently accessed by the terminal may be an enhanced mobile broadband (eMBB) service, a low-latency high-reliability (URLLC) service, a voice service, or a video service.
  • eMBB enhanced mobile broadband
  • URLLC low-latency high-reliability
  • voice service a voice service
  • video service a video service.
  • bitmap ie, the second bitmap
  • Each bit in the bitmap represents whether a cause value can be used. 2 RACH.
  • each bit in the bitmap represents whether a service type can use 2 steps RACH.
  • bitmap that is, a second bitmap
  • Each bit in the bitmap represents a set of reason values and whether the service type can use 2 step RACH.
  • the NAS layer of the UE triggers the RRC layer to initiate RRC connection establishment or RRC connection restoration or RRC connection reestablishment, the NAS layer will pass:
  • Cause value or service type of RRC connection establishment or RRC connection restoration or RRC connection reestablishment ; or indication information or service type indication information for indicating a cause value of RRC connection establishment or RRC connection restoration or RRC connection reestablishment.
  • the terminal determines whether the current serving cell of the terminal supports 2 RACH based on the first indication information in the broadcast message of the first system. If it supports, the terminal determines whether to use 2 according to the information transmitted by the NAS layer and the second information in the access control information. step RACH performs random access.
  • the access control information includes first information and second information, where the first information is used to indicate whether a terminal corresponding to at least one AC value can perform a two-step random access process, and the second information is used to indicate at least one Whether the terminal corresponding to the access information can perform a two-step random access process; wherein the first information is used by the terminal to determine whether the terminal can perform a two-step random access process based on the AC value of the terminal, so The second information is used by the terminal to determine whether the terminal can perform a two-step random access process based on the access information of the terminal.
  • the terminal determines whether the current serving cell of the terminal supports 2step RACH based on the first indication information in the broadcast message of the first system. If so, the terminal combines the first information in the access control information with its own AC value, and according to the NAS layer. The transferred information is combined with the second information in the access control information to determine whether 2 steps RACH is used for random access.
  • Step 503 The terminal determines whether a two-step random access process can be performed based on the first indication information and the access control information.
  • FIG. 6 is a first schematic structural diagram of a random access control apparatus according to an embodiment of the present application, which is applied to a network device, such as a base station. As shown in FIG. 6, the apparatus includes:
  • a first sending unit 601 configured to send a first system broadcast message, where the first system broadcast message includes first indication information, where the first indication information is used to indicate whether a target cell of a terminal supports a two-step random access process;
  • a second sending unit 602 configured to send a second system broadcast message, where the second system broadcast message includes access control information corresponding to a two-step random access process;
  • the first indication information and the access control information are used by the terminal to determine whether a two-step random access procedure can be performed.
  • the first system broadcast message includes first indication information, including:
  • the first system broadcast message includes a first information field, and the first information field carries the first indication information.
  • the first system broadcast message includes first indication information, including:
  • the first system broadcast message includes first resource configuration information for the two-step random access process, and the first resource configuration information is used to determine the first indication information.
  • the access control information includes first information and / or second information, and the first information is used to indicate whether a terminal corresponding to at least one AC value can perform a two-step random access process, the The second information is used to indicate whether the terminal corresponding to the at least one access information can perform a two-step random access process;
  • the first information is used by the terminal to determine whether the terminal can perform a two-step random access process based on the AC value of the terminal, and the second information is used by the terminal to access based on the terminal The information determines whether the terminal can perform a two-step random access procedure.
  • the first information includes a first bitmap, and each bit in the first bitmap corresponds to an AC value, and the value of the bit is used to indicate the AC corresponding to the bit. Whether the value of the terminal can perform a two-step random access procedure.
  • the second information includes a second bitmap, and each bit in the second bitmap corresponds to one piece of access information, and a value of the bit is used to indicate that the bit corresponds to Whether the terminal accessing the information can perform a two-step random access procedure.
  • the access information includes at least one of the following: an access reason value, an access service type, indication information of the access cause value, indication information of an access service type, and an access reason Value and indication of access service type.
  • the reason value of the access is a reason value for establishing an RRC connection, or a cause value for recovering an RRC connection, or a cause value for reestablishing an RRC connection.
  • the access information is obtained through a NAS layer or an AS layer of the terminal.
  • FIG. 7 is a second schematic diagram of the structure and composition of a random access control device according to an embodiment of the present application, which is applied to a terminal. As shown in FIG. 7, the device includes:
  • a first receiving unit 701 configured to receive a first system broadcast message, where the first system broadcast message includes first indication information, where the first indication information is used to indicate whether a target cell of a terminal supports a two-step random access process;
  • a second receiving unit 702 configured to receive a second system broadcast message, where the second system broadcast message includes access control information corresponding to a two-step random access process;
  • a determining unit 703 is configured to determine whether a two-step random access process can be performed based on the first instruction information and the access control information.
  • the first system broadcast message includes first indication information, including:
  • the first system broadcast message includes a first information field, and the first information field carries the first indication information.
  • the first system broadcast message includes first indication information, including:
  • the first system broadcast message includes first resource configuration information for the two-step random access process, and the first resource configuration information is used to determine the first indication information.
  • the access control information includes first information and / or second information, and the first information is used to indicate whether a terminal corresponding to at least one AC value can perform a two-step random access process, the The second information is used to indicate whether the terminal corresponding to the at least one access information can perform a two-step random access process;
  • the first information is used by the terminal to determine whether the terminal can perform a two-step random access process based on the AC value of the terminal, and the second information is used by the terminal to access based on the terminal The information determines whether the terminal can perform a two-step random access procedure.
  • the first information includes a first bitmap, and each bit in the first bitmap corresponds to an AC value, and the value of the bit is used to indicate the AC corresponding to the bit. Whether the value of the terminal can perform a two-step random access procedure.
  • the second information includes a second bitmap, and each bit in the second bitmap corresponds to one piece of access information, and a value of the bit is used to indicate that the bit corresponds to Whether the terminal accessing the information can perform a two-step random access procedure.
  • the access information includes at least one of the following: an access reason value, an access service type, indication information of the access cause value, indication information of an access service type, and an access reason Value and indication of access service type.
  • the reason value of the access is a reason value for establishing an RRC connection, or a cause value for recovering an RRC connection, or a cause value for reestablishing an RRC connection.
  • the access information is obtained through a NAS layer or an AS layer of the terminal.
  • FIG. 8 is a schematic structural diagram of a communication device 600 according to an embodiment of the present application.
  • the communication device may be a network device or a terminal.
  • the communication device 600 shown in FIG. 8 includes a processor 610, and the processor 610 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the communication device 600 may further include a memory 620.
  • the processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
  • the memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
  • the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices, and specifically, may send information or data to other devices, or receive other Information or data sent by the device.
  • the transceiver 630 may include a transmitter and a receiver.
  • the transceiver 630 may further include antennas, and the number of antennas may be one or more.
  • the communication device 600 may specifically be a mobile terminal / terminal of the embodiment of the present application, and the communication device 600 may implement the corresponding process implemented by the mobile terminal / terminal in each method of the embodiment of the present application. For simplicity, in This will not be repeated here.
  • FIG. 9 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the chip 700 shown in FIG. 9 includes a processor 710, and the processor 710 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the chip 700 may further include a memory 720.
  • the processor 710 may call and run a computer program from the memory 720 to implement the method in the embodiment of the present application.
  • the memory 720 may be a separate device independent of the processor 710, or may be integrated in the processor 710.
  • the chip 700 may further include an input interface 730.
  • the processor 710 may control the input interface 730 to communicate with other devices or chips. Specifically, the processor 710 may obtain information or data sent by the other devices or chips.
  • the chip 700 may further include an output interface 740.
  • the processor 710 may control the output interface 740 to communicate with other devices or chips. Specifically, the processor 710 may output information or data to the other devices or chips.
  • the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the chip can be applied to the mobile terminal / terminal in the embodiments of the present application, and the chip can implement the corresponding process implemented by the mobile terminal / terminal in each method of the embodiments of the present application. To repeat.
  • the chip mentioned in the embodiments of the present application may also be referred to as a system-level chip, a system chip, a chip system or a system-on-chip.
  • FIG. 10 is a schematic block diagram of a communication system 900 according to an embodiment of the present application. As shown in FIG. 10, the communication system 900 includes a terminal 910 and a network device 920.
  • the terminal 910 may be used to implement the corresponding functions implemented by the terminal in the foregoing method
  • the network device 920 may be used to implement the corresponding functions implemented by the network device in the foregoing method.
  • details are not described herein again.
  • the processor in the embodiment of the present application may be an integrated circuit chip and has a signal processing capability.
  • each step of the foregoing method embodiment may be completed by using an integrated logic circuit of hardware in a processor or an instruction in a form of software.
  • the above processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (Field, Programmable Gate Array, FPGA), or other Programming logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA off-the-shelf programmable gate array
  • Various methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a mature storage medium such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory, a register, and the like.
  • the storage medium is located in a memory, and the processor reads the information in the memory and completes the steps of the foregoing method in combination with its hardware.
  • the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), and an electronic memory. Erase programmable read-only memory (EPROM, EEPROM) or flash memory.
  • the volatile memory may be Random Access Memory (RAM), which is used as an external cache.
  • RAM Static Random Access Memory
  • DRAM Dynamic Random Access Memory
  • Synchronous Dynamic Random Access Memory Synchronous Dynamic Random Access Memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double SDRAM, DDR SDRAM enhanced synchronous dynamic random access memory
  • Enhanced SDRAM, ESDRAM synchronous connection dynamic random access memory
  • Synchronous DRAM Synchronous Dynamic Random Access Memory
  • Enhanced SDRAM Enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory Synchrobus RAM, SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (Double SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct RAMbus RAM, DR RAM) and so on. That is, the memories in the embodiments of the present application are intended to include, but not limited to, these and any other suitable types of memories.
  • An embodiment of the present application further provides a computer-readable storage medium for storing a computer program.
  • the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method in the embodiment of the present application. For simplicity, here No longer.
  • the computer-readable storage medium may be applied to a mobile terminal / terminal in the embodiments of the present application, and the computer program causes a computer to execute a corresponding process implemented by the mobile terminal / terminal in each method of the embodiments of the present application in order to Concise, I won't repeat them here.
  • An embodiment of the present application further provides a computer program product, including computer program instructions.
  • the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instruction causes the computer to execute a corresponding process implemented by the network device in each method in the embodiment of the present application. More details.
  • the computer program product can be applied to a mobile terminal / terminal in the embodiments of the present application, and the computer program instructions cause the computer to execute a corresponding process implemented by the mobile terminal / terminal in each method of the embodiments of the present application for the sake of brevity , Will not repeat them here.
  • the embodiment of the present application also provides a computer program.
  • the computer program may be applied to a network device in the embodiment of the present application.
  • the computer program When the computer program is run on a computer, the computer is caused to execute a corresponding process implemented by the network device in each method in the embodiment of the present application. , Will not repeat them here.
  • the computer program may be applied to a mobile terminal / terminal in the embodiment of the present application, and when the computer program is run on a computer, the computer is caused to execute the corresponding method implemented by the mobile terminal / terminal in each method of the embodiment of the present application For the sake of brevity, we will not repeat them here.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of this application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory) ROM, random access memory (Random Access Memory, RAM), magnetic disks or optical disks and other media that can store program codes .

Abstract

本申请实施例提供一种随机接入控制方法及装置、网络设备,终端,包括:网络设备发送第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;所述网络设备发送第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;其中,所述第一指示信息和所述接入控制信息用于所述终端确定是否能够执行两步随机接入过程。

Description

一种随机接入控制方法及装置、网络设备、终端 技术领域
本申请实施例涉及移动通信技术领域,具体涉及一种随机接入控制方法及装置、网络设备、终端。
背景技术
用户设备(UE,User Equipment)接入网络以及获取无线资源控制(RRC,Radio Resource Control)连接,首先需要进行随机接入过程。目前的随机接入过程采用四步随机接入过程(简称为4 step RACH)。为了缩短随机接入过程时延,快速进入网络开展业务,提出了两步随机接入过程(简称为2 step RACH)。在2 step RACH中,MSG3的资源是预先配置的,预先配置的资源有限,为了避免资源浪费,2 step RACH不会对所有UE和/或所有业务开放,所以如何控制UE使用2 step RACH是需要解决的问题。
发明内容
本申请实施例提供一种随机接入控制方法及装置、网络设备,终端。
本申请实施例提供的随机接入控制方法,包括:
网络设备发送第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
所述网络设备发送第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
其中,所述第一指示信息和所述接入控制信息用于所述终端确定是否能够执行两步随机接入过程。
本申请实施例提供的随机接入控制方法,包括:
终端接收第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
所述终端接收第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
所述终端基于所述第一指示信息和所述接入控制信息确定是否能够执行两步随机接入过程。
本申请实施例提供的随机接入控制装置,包括:
第一发送单元,用于发送第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
第二发送单元,用于发送第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
其中,所述第一指示信息和所述接入控制信息用于所述终端确定是否能够执行两步随机接入过程。
本申请实施例提供的随机接入控制装置,包括:
第一接收单元,用于接收第一系统广播消息,所述第一系统广播消息中包括第一指 示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
第二接收单元,用于接收第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
确定单元,用于基于所述第一指示信息和所述接入控制信息确定是否能够执行两步随机接入过程。
本申请实施例提供的网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的随机接入控制方法。
本申请实施例提供的终端,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的随机接入控制方法。
本申请实施例提供的芯片,用于实现上述的随机接入控制方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的随机接入控制方法。
本申请实施例提供的计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述的随机接入控制方法。
本申请实施例提供的计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的随机接入控制方法。
本申请实施例提供的计算机程序,当其在计算机上运行时,使得计算机执行上述的随机接入控制方法。
通过上述技术方案,网络侧通过系统广播配置第一指示信息和接入控制信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程,从而控制终端使用两步随机接入过程的功能,达到合理使用两步随机接入过程并保证两步随机接入过程带来的时延增益。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1是本申请实施例提供的一种通信系统架构的示意性图;
图2是四步随机接入过程的流程图;
图3(a)是E/T/R/R/BI MAC subheader的格式;
图3(b)是E/T/RAPID MAC subheader的格式;
图3(c)是MAC PDU(包括MAC RARs)的格式;
图3(d)是MAC RAR的示意图;
图4为本申请实施例提供的随机接入控制方法的流程示意图一;
图5为本申请实施例提供的随机接入控制方法的流程示意图二;
图6为本申请实施例提供的随机接入控制装置的结构组成示意图一;
图7为本申请实施例提供的随机接入控制装置的结构组成示意图二;
图8是本申请实施例提供的一种通信设备示意性结构图;
图9是本申请实施例的芯片的示意性结构图;
图10是本申请实施例提供的一种通信系统的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统或5G系统等。
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端进行通信。可选地,该网络设备110可以是GSM系统或CDMA系统中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络设备等。
该通信系统100还包括位于网络设备110覆盖范围内的至少一个终端120。作为在此使用的“终端”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端或者未来演进的PLMN中的终端等。
可选地,终端120之间可以进行终端直连(Device to Device,D2D)通信。
可选地,5G系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。
图1示例性地示出了一个网络设备和两个终端,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端,本申请实施例对此不做限定。
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端120,网络设备110和终端120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
为了满足人们对业务的速率、延迟、高速移动性、能效的追求,以及未来生活中业务的多样性、复杂性,第三代合作伙伴计划(3GPP,3rd Generation Partnership Project)国际标准组织开始研发第五代(5G,5 th Generation)移动通信技术。
5G移动通信技术的空口部分称为新空口(NR,New Radio),在NR早期部署时,完整的NR覆盖很难达到,所以典型的网络覆盖是长期演进(LTE,Long Term Evolution)覆盖和NR覆盖的结合。此外,为了保护移动运营商前期在LTE上的投资,提出了LTE和NR之间的紧耦合(tight interworking)工作模式。当然,NR小区也可以独立部署。此外,由于各个NR小区都是波束(beam)操作,一个小区有多个beam。
本发明实施例的技术方案主要应用于5G移动通信系统,当然,本发明实施例的技术方案并不局限于5G移动通信系统,还可以应用于其他类型的移动通信系统。以下对5G移动通信系统中的主要应用场景进行说明:
1)eMBB场景:eMBB以用户获得多媒体内容、服务和数据为目标,其业务需求增长十分迅速。由于eMBB可能部署在不同的场景中,例如室内、市区、农村等,其业务能力和需求的差别也比较大,所以必须结合具体的部署场景对业务进行分析。
2)URLLC场景:URLLC的典型应用包括:工业自动化、电力自动化、远程医疗操作、交通安全保障等。
3)mMTC场景:URLLC的典型特点包括:高连接密度、小数据量、时延不敏感业务、模块的低成本和长使用寿命等。
UE接入网络侧获取RRC连接首先需要进行随机接入过程,参照图2,图2为四步随机接入过程的流程图,包括以下步骤:
1、UE向gNB发送MSG1:随机接入前导码(Random Access Preamble)。
具体地,UE选择PRACH资源,在PRACH资源上发送选择的前导码(Preamble),这里,Preamble总共有64个,每个Preamble对应一个索引值(index),index的取值范围从0到63。
2、gNB向UE发送MSG2:随机接入响应(RAR,Random Access Response)。
具体地,gNB回复MSG1向UE发送随机接入响应,UE根据发送Preamble的PRACH资源计算用于加扰MSG2的调度信息的随机接入-无线网络临时标识(RA-RNTI)。RAR的媒体接入控制(MAC,Media Access Control)层数据格式参照图3(a)、图3(b)、图3(c)和图3(d)所示,其中,图3(a)是E/T/R/R/BI MAC subheader的格式,图3(b)是E/T/RAPID MAC subheader的格式,图3(c)是MAC  PDU(包括MAC RARs)的格式,图3(d)是MAC RAR的示意图。
3、UE向gNB发送MSG3:调度传输(Scheduled Transmission)
具体地,在MSG2中网络侧会给UE分配用于发送MSG3的上行资源,UE在网络侧分配的上行资源(UL grant)上发送MSG3。
4、gNB向UE发送MSG4:竞争解决(Contention Resolution)
为了缩短随机接入过程时延,快速进入网络侧开展业务,提出了两步随机接入过程。在两步随机接入过程中,MSG1和MSG3同时或几乎同时发送(MSG3这里不用等待MSG2就可以发送),MSG2和MSG4一起发送(一个PDSCH传输或者两个PDSCH传输)。
在两步随机接入过程中,用于发送MSG3的资源是预先配置的,预先配置的资源有限,为了避免资源浪费,两步随机接入过程不会配置很多资源,两步随机接入过程不会对所有终端和/或所有业务开放,因此,需要合理控制终端使用两步随机接入过程。
图4为本申请实施例提供的随机接入控制方法的流程示意图一,如图4所示,所述随机接入控制方法包括以下步骤:
步骤401:网络设备发送第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程。
本申请实施例中,网络设备可以是基站,例如5G中的gNB,4G中的eNB。
本申请实施例中,网络设备通过广播的方式发送第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程。这里,目标小区是指终端当前的服务小区。
进一步,所述第一指示信息可以通过以下两种方式来实现:
方式一:显式指示方式
所述第一系统广播消息中包括第一信息域,所述第一信息域中承载所述第一指示信息。
具体地,网络侧广播第一指示信息,用于指示UE当前的服务小区是否支持2 step RACH。所述第一指示信息可以通过1个比特(bit)位来实现,从而显示指示UE当前的服务小区是否支持2 step RACH,例如:如果比特位的取值为1,则代表UE当前的服务小区支持2 step RACH,如果比特位的取值为0,则代表UE当前的服务小区不支持2 step RACH。
方式二:隐式指示方式
所述第一系统广播消息中包括针对所述两步随机接入过程的第一资源配置信息,所述第一资源配置信息用于确定所述第一指示信息。
具体地,第一资源配置信息中配置了多个针对2 step RACH的资源,资源与小区具有关联关系,终端选取的资源如果支持2 step RACH,则该资源对应的小区也支持2 step RACH,终端选取的资源如果不支持2 step RACH,则该资源对应的小区也不支持2 step RACH。
步骤402:所述网络设备发送第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;其中,所述第一指示信息和所述接入控制信息用于所述终端确定是否能够执行两步随机接入过程。
本申请实施例中,所述接入控制信息包括第一信息和/或第二信息,所述第一信息用于指示至少一个接入控制(AC,Access Control)值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;其中,所述第一信息用于所述终端基于所述终端的AC值确定所 述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。以下对接入控制信息的不同实现方式进行描述。
实现方式一:
所述接入控制信息包括第一信息,所述第一信息用于指示至少一个AC值对应的终端是否能够执行两步随机接入过程;其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程。
举个例子:所述第一信息指示AC值等于11,13,15对应的终端能够执行两步随机接入过程,如果所述终端的AC值为11,13,15中的任意一个,都可以执行两步随机接入过程。
在一实施方式中,所述第一信息包括第一位图,所述第一位图中的每个比特位对应一个AC值,所述比特位的取值用于指示该比特位对应的AC值的终端是否能够执行两步随机接入过程。
举个例子:第一位图为AC位图(AC bitmap),该AC bitmap中每个bit对应针对一个AC值的UE使用2 step RACH的控制。例如10101表示AC=11到15的UE使用2 step RACH的控制信息,那么,AC=11,13,15的终端在接入时可以使用2 step RACH。
终端基于第一系统广播消息中的第一指示信息判断终端当前的服务小区是否支持2 step RACH,如果支持,则终端根据自己的AC值结合接入控制信息中的第一信息判断是否可以使用2 step RACH发起随机接入。
实现方式二:
所述接入控制信息包括第二信息,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;其中,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
在一实施方式中,所述第二信息包括第二位图,所述第二位图中的每个比特位对应一个接入信息,所述比特位的取值用于指示该比特位对应的接入信息的终端是否能够执行两步随机接入过程。
本申请实施例中,所述接入信息包括以下至少之一:接入的原因值、接入的业务类型、接入的原因值的指示信息、接入的业务类型的指示信息、接入原因值和接入业务类型的指示信息。进一步,所述接入的原因值为RRC连接建立的原因值、或者RRC连接恢复的原因值、或者RRC连接重建的原因值。进一步,所述接入信息通过所述终端的非接入(NAS,Non-Access Stratum)层或者接入(AS,Access Stratum)层获得。
上述方案中,终端当前接入的原因值可以定义为“Emergency”、或“High Priority Access”、或“MT Access”,“MO Signalling”、或“MO Data”、或“MO Voice Call”、或“MO Video Call”、或“MO SMS”、或“MPS-PriorityAccess”、或“MCS-PriorityAccess”。
上述方案中,终端当前接入的业务类型可以是增强移动宽带(eMBB,Enhance Mobile Broadband)业务、或低时延高可靠(URLLC,Ultra Reliable&Low Latency Communication)业务、或语音(voice)业务、或视频(Video)业务等。
举个例子:定义一个原因值的bitmap(即第二位图),bitmap中每个bit代表一个原因值是否可以使用2 step RACH。
再举个例子:定义一个业务类型的bitmap(即第二位图),bitmap中每个bit代表一个业务类型是否可以使用2 step RACH。
又举个例子:定义一个接入类型(access category)的bitmap(即第二位图),bitmap 中每个bit代表一组原因值和业务类型是否可以使用2 step RACH。
需要说明的是,当UE的NAS层触发RRC层发起RRC连接建立或者RRC连接恢复或者RRC连接重建,NAS层会传递:
RRC连接建立或者RRC连接恢复或者RRC连接重建的原因值或者业务类型;或者,用于指示RRC连接建立或者RRC连接恢复或者RRC连接重建的原因值的指示信息或者业务类型的指示信息。
终端基于第一系统广播消息中的第一指示信息判断终端当前的服务小区是否支持2 step RACH,如果支持,则终端根据NAS层传递的信息结合接入控制信息中的第二信息判断是否使用2 step RACH进行随机接入。
实现方式三:
所述接入控制信息包括第一信息和第二信息,所述第一信息用于指示至少一个AC值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
这里,第一信息的具体实现方式可以参照前述实现方式一的描述进行理解,第二信息的具体实现方式可以参照前述实现方式二的描述进行理解,此处不再赘述。
终端基于第一系统广播消息中的第一指示信息判断终端当前的服务小区是否支持2 step RACH,如果支持,则终端根据自己的AC值结合接入控制信息中的第一信息,以及根据NAS层传递的信息结合接入控制信息中的第二信息判断是否使用2 step RACH进行随机接入。
图5为本申请实施例提供的随机接入控制方法的流程示意图二,如图5所示,所述随机接入控制方法包括以下步骤:
步骤501:终端接收第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程。
本申请实施例中,终端可以是手机、平板电脑、车载终端、笔记本等任意能够与网络进行通信的设备。
本申请实施例中,终端接收网络设备发送的第一系统广播消息,这里,网络设备可以是基站,例如5G中的gNB,4G中的eNB。其中,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程。这里,目标小区是指终端当前的服务小区。
进一步,所述第一指示信息可以通过以下两种方式来实现:
方式一:显式指示方式
所述第一系统广播消息中包括第一信息域,所述第一信息域中承载所述第一指示信息。
具体地,网络侧广播第一指示信息,用于指示UE当前的服务小区是否支持2 step RACH。所述第一指示信息可以通过1个比特(bit)位来实现,从而显示指示UE当前的服务小区是否支持2 step RACH,例如:如果比特位的取值为1,则代表UE当前的服务小区支持2 step RACH,如果比特位的取值为0,则代表UE当前的服务小区不支持2 step RACH。
方式二:隐式指示方式
所述第一系统广播消息中包括针对所述两步随机接入过程的第一资源配置信息,所述第一资源配置信息用于确定所述第一指示信息。
具体地,第一资源配置信息中配置了多个针对2 step RACH的资源,资源与小区具有关联关系,终端选取的资源如果支持2 step RACH,则该资源对应的小区也支持2 step RACH,终端选取的资源如果不支持2 step RACH,则该资源对应的小区也不支持2 step RACH。
步骤502:所述终端接收第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息。
本申请实施例中,所述接入控制信息包括第一信息和/或第二信息,所述第一信息用于指示至少一个接入控制(AC,Access Control)值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。以下对接入控制信息的不同实现方式进行描述。
实现方式一:
所述接入控制信息包括第一信息,所述第一信息用于指示至少一个AC值对应的终端是否能够执行两步随机接入过程;其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程。
举个例子:所述第一信息指示AC值等于11,13,15对应的终端能够执行两步随机接入过程,如果所述终端的AC值为11,13,15中的任意一个,都可以执行两步随机接入过程。
在一实施方式中,所述第一信息包括第一位图,所述第一位图中的每个比特位对应一个AC值,所述比特位的取值用于指示该比特位对应的AC值的终端是否能够执行两步随机接入过程。
举个例子:第一位图为AC位图(AC bitmap),该AC bitmap中每个bit对应针对一个AC值的UE使用2 step RACH的控制。例如10101表示AC=11到15的UE使用2 step RACH的控制信息,那么,AC=11,13,15的终端在接入时可以使用2 step RACH。
终端基于第一系统广播消息中的第一指示信息判断终端当前的服务小区是否支持2 step RACH,如果支持,则终端根据自己的AC值结合接入控制信息中的第一信息判断是否可以使用2 step RACH发起随机接入。
实现方式二:
所述接入控制信息包括第二信息,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;其中,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
在一实施方式中,所述第二信息包括第二位图,所述第二位图中的每个比特位对应一个接入信息,所述比特位的取值用于指示该比特位对应的接入信息的终端是否能够执行两步随机接入过程。
本申请实施例中,所述接入信息包括以下至少之一:接入的原因值、接入的业务类型、接入的原因值的指示信息、接入的业务类型的指示信息、接入原因值和接入业务类型的指示信息。进一步,所述接入的原因值为RRC连接建立的原因值、或者RRC连接恢复的原因值、或者RRC连接重建的原因值。进一步,所述接入信息通过所述终端的NAS层或AS层获得。
上述方案中,终端当前接入的原因值可以定义为“Emergency”、或“High Priority Access”、或“MT Access”,“MO Signalling”、或“MO Data”、或“MO Voice Call”、或“MO  Video Call”、或“MO SMS”、或“MPS-PriorityAccess”、或“MCS-PriorityAccess”。
上述方案中,终端当前接入的业务类型可以是增强移动宽带(eMBB)业务、或低时延高可靠(URLLC)业务、或语音(voice)业务、或视频(Video)业务等。
举个例子:定义一个原因值的bitmap(即第二位图),bitmap中每个bit代表一个原因值是否可以使用2 step RACH。
再举个例子:定义一个业务类型的bitmap(即第二位图),bitmap中每个bit代表一个业务类型是否可以使用2 step RACH。
又举个例子:定义一个接入类型(access category)的bitmap(即第二位图),bitmap中每个bit代表一组原因值和业务类型是否可以使用2 step RACH。
需要说明的是,当UE的NAS层触发RRC层发起RRC连接建立或者RRC连接恢复或者RRC连接重建,NAS层会传递:
RRC连接建立或者RRC连接恢复或者RRC连接重建的原因值或者业务类型;或者,用于指示RRC连接建立或者RRC连接恢复或者RRC连接重建的原因值的指示信息或者业务类型的指示信息。
终端基于第一系统广播消息中的第一指示信息判断终端当前的服务小区是否支持2 step RACH,如果支持,则终端根据NAS层传递的信息结合接入控制信息中的第二信息判断是否使用2 step RACH进行随机接入。
实现方式三:
所述接入控制信息包括第一信息和第二信息,所述第一信息用于指示至少一个AC值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
这里,第一信息的具体实现方式可以参照前述实现方式一的描述进行理解,第二信息的具体实现方式可以参照前述实现方式二的描述进行理解,此处不再赘述。
终端基于第一系统广播消息中的第一指示信息判断终端当前的服务小区是否支持2 step RACH,如果支持,则终端根据自己的AC值结合接入控制信息中的第一信息,以及根据NAS层传递的信息结合接入控制信息中的第二信息判断是否使用2 step RACH进行随机接入。
步骤503:所述终端基于所述第一指示信息和所述接入控制信息确定是否能够执行两步随机接入过程。
图6为本申请实施例提供的随机接入控制装置的结构组成示意图一,应用于网络设备,例如基站,如图6所示,所述装置包括:
第一发送单元601,用于发送第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
第二发送单元602,用于发送第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
其中,所述第一指示信息和所述接入控制信息用于所述终端确定是否能够执行两步随机接入过程。
在一实施方式中,所述第一系统广播消息中包括第一指示信息,包括:
所述第一系统广播消息中包括第一信息域,所述第一信息域中承载所述第一指示信息。
在一实施方式中,所述第一系统广播消息中包括第一指示信息,包括:
所述第一系统广播消息中包括针对所述两步随机接入过程的第一资源配置信息,所述第一资源配置信息用于确定所述第一指示信息。
在一实施方式中,所述接入控制信息包括第一信息和/或第二信息,所述第一信息用于指示至少一个AC值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;
其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
在一实施方式中,所述第一信息包括第一位图,所述第一位图中的每个比特位对应一个AC值,所述比特位的取值用于指示该比特位对应的AC值的终端是否能够执行两步随机接入过程。
在一实施方式中,所述第二信息包括第二位图,所述第二位图中的每个比特位对应一个接入信息,所述比特位的取值用于指示该比特位对应的接入信息的终端是否能够执行两步随机接入过程。
在一实施方式中,所述接入信息包括以下至少之一:接入的原因值、接入的业务类型、接入的原因值的指示信息、接入的业务类型的指示信息、接入原因值和接入业务类型的指示信息。
在一实施方式中,所述接入的原因值为RRC连接建立的原因值、或者RRC连接恢复的原因值、或者RRC连接重建的原因值。
在一实施方式中,所述接入信息通过所述终端的NAS层或AS层获得。
本领域技术人员应当理解,本申请实施例的上述随机接入控制装置的相关描述可以参照本申请实施例的随机接入控制方法的相关描述进行理解。
图7为本申请实施例提供的随机接入控制装置的结构组成示意图二,应用于终端,如图7所示,所述装置包括:
第一接收单元701,用于接收第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
第二接收单元702,用于接收第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
确定单元703,用于基于所述第一指示信息和所述接入控制信息确定是否能够执行两步随机接入过程。
在一实施方式中,所述第一系统广播消息中包括第一指示信息,包括:
所述第一系统广播消息中包括第一信息域,所述第一信息域中承载所述第一指示信息。
在一实施方式中,所述第一系统广播消息中包括第一指示信息,包括:
所述第一系统广播消息中包括针对所述两步随机接入过程的第一资源配置信息,所述第一资源配置信息用于确定所述第一指示信息。
在一实施方式中,所述接入控制信息包括第一信息和/或第二信息,所述第一信息用于指示至少一个AC值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;
其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
在一实施方式中,所述第一信息包括第一位图,所述第一位图中的每个比特位对应一个AC值,所述比特位的取值用于指示该比特位对应的AC值的终端是否能够执行两 步随机接入过程。
在一实施方式中,所述第二信息包括第二位图,所述第二位图中的每个比特位对应一个接入信息,所述比特位的取值用于指示该比特位对应的接入信息的终端是否能够执行两步随机接入过程。
在一实施方式中,所述接入信息包括以下至少之一:接入的原因值、接入的业务类型、接入的原因值的指示信息、接入的业务类型的指示信息、接入原因值和接入业务类型的指示信息。
在一实施方式中,所述接入的原因值为RRC连接建立的原因值、或者RRC连接恢复的原因值、或者RRC连接重建的原因值。
在一实施方式中,所述接入信息通过所述终端的NAS层或AS层获得。
本领域技术人员应当理解,本申请实施例的上述随机接入控制装置的相关描述可以参照本申请实施例的随机接入控制方法的相关描述进行理解。
图8是本申请实施例提供的一种通信设备600示意性结构图。该通信设备可以是网络设备,或终端,图8所示的通信设备600包括处理器610,处理器610可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图8所示,通信设备600还可以包括存储器620。其中,处理器610可以从存储器620中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器620可以是独立于处理器610的一个单独的器件,也可以集成在处理器610中。
可选地,如图8所示,通信设备600还可以包括收发器630,处理器610可以控制该收发器630与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器630可以包括发射机和接收机。收发器630还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备600具体可为本申请实施例的网络设备,并且该通信设备600可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备600具体可为本申请实施例的移动终端/终端,并且该通信设备600可以实现本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
图9是本申请实施例的芯片的示意性结构图。图9所示的芯片700包括处理器710,处理器710可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图9所示,芯片700还可以包括存储器720。其中,处理器710可以从存储器720中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器720可以是独立于处理器710的一个单独的器件,也可以集成在处理器710中。
可选地,该芯片700还可以包括输入接口730。其中,处理器710可以控制该输入接口730与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片700还可以包括输出接口740。其中,处理器710可以控制该输出接口740与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的移动终端/终端,并且该芯片可以实现本 申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
图10是本申请实施例提供的一种通信系统900的示意性框图。如图10所示,该通信系统900包括终端910和网络设备920。
其中,该终端910可以用于实现上述方法中由终端实现的相应的功能,以及该网络设备920可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简 洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存 储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (46)

  1. 一种随机接入控制方法,所述方法包括:
    网络设备发送第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
    所述网络设备发送第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
    其中,所述第一指示信息和所述接入控制信息用于所述终端确定是否能够执行两步随机接入过程。
  2. 根据权利要求1所述的方法,其中,所述第一系统广播消息中包括第一指示信息,包括:
    所述第一系统广播消息中包括第一信息域,所述第一信息域中承载所述第一指示信息。
  3. 根据权利要求1所述的方法,其中,所述第一系统广播消息中包括第一指示信息,包括:
    所述第一系统广播消息中包括针对所述两步随机接入过程的第一资源配置信息,所述第一资源配置信息用于确定所述第一指示信息。
  4. 根据权利要求1至3任一项所述的方法,其中,所述接入控制信息包括第一信息和/或第二信息,所述第一信息用于指示至少一个接入控制AC值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;
    其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
  5. 根据权利要求4所述的方法,其中,所述第一信息包括第一位图,所述第一位图中的每个比特位对应一个AC值,所述比特位的取值用于指示该比特位对应的AC值的终端是否能够执行两步随机接入过程。
  6. 根据权利要求4或5所述的方法,其中,所述第二信息包括第二位图,所述第二位图中的每个比特位对应一个接入信息,所述比特位的取值用于指示该比特位对应的接入信息的终端是否能够执行两步随机接入过程。
  7. 根据权利要求4至6任一项所述的方法,其中,所述接入信息包括以下至少之一:接入的原因值、接入的业务类型、接入的原因值的指示信息、接入的业务类型的指示信息、接入原因值和接入业务类型的指示信息。
  8. 根据权利要求7所述的方法,其中,所述接入的原因值为无线资源控制RRC连接建立的原因值、或者RRC连接恢复的原因值、或者RRC连接重建的原因值。
  9. 根据权利要求4至8任一项所述的方法,其中,所述接入信息通过所述终端的非接入NAS或者接入层AS层获得。
  10. 一种随机接入控制方法,所述方法包括:
    终端接收第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
    所述终端接收第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
    所述终端基于所述第一指示信息和所述接入控制信息确定是否能够执行两步随机接入过程。
  11. 根据权利要求10所述的方法,其中,所述第一系统广播消息中包括第一指示信息,包括:
    所述第一系统广播消息中包括第一信息域,所述第一信息域中承载所述第一指示信息。
  12. 根据权利要求10所述的方法,其中,所述第一系统广播消息中包括第一指示信息,包括:
    所述第一系统广播消息中包括针对所述两步随机接入过程的第一资源配置信息,所述第一资源配置信息用于确定所述第一指示信息。
  13. 根据权利要求10至12任一项所述的方法,其中,所述接入控制信息包括第一信息和/或第二信息,所述第一信息用于指示至少一个AC值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;
    其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
  14. 根据权利要求13所述的方法,其中,所述第一信息包括第一位图,所述第一位图中的每个比特位对应一个AC值,所述比特位的取值用于指示该比特位对应的AC值的终端是否能够执行两步随机接入过程。
  15. 根据权利要求13或14所述的方法,其中,所述第二信息包括第二位图,所述第二位图中的每个比特位对应一个接入信息,所述比特位的取值用于指示该比特位对应的接入信息的终端是否能够执行两步随机接入过程。
  16. 根据权利要求13至15任一项所述的方法,其中,所述接入信息包括以下至少之一:接入的原因值、接入的业务类型、接入的原因值的指示信息、接入的业务类型的指示信息、接入原因值和接入业务类型的指示信息。
  17. 根据权利要求16所述的方法,其中,所述接入的原因值为RRC连接建立的原因值、或者RRC连接恢复的原因值、或者RRC连接重建的原因值。
  18. 根据权利要求13至17任一项所述的方法,其中,所述接入信息通过所述终端的NAS层或者AS层获得。
  19. 一种随机接入控制装置,所述装置包括:
    第一发送单元,用于发送第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
    第二发送单元,用于发送第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
    其中,所述第一指示信息和所述接入控制信息用于所述终端确定是否能够执行两步随机接入过程。
  20. 根据权利要求19所述的装置,其中,所述第一系统广播消息中包括第一指示信息,包括:
    所述第一系统广播消息中包括第一信息域,所述第一信息域中承载所述第一指示信息。
  21. 根据权利要求19所述的装置,其中,所述第一系统广播消息中包括第一指示信息,包括:
    所述第一系统广播消息中包括针对所述两步随机接入过程的第一资源配置信息,所述第一资源配置信息用于确定所述第一指示信息。
  22. 根据权利要求19至21任一项所述的装置,其中,所述接入控制信息包括第 一信息和/或第二信息,所述第一信息用于指示至少一个AC值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;
    其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
  23. 根据权利要求22所述的装置,其中,所述第一信息包括第一位图,所述第一位图中的每个比特位对应一个AC值,所述比特位的取值用于指示该比特位对应的AC值的终端是否能够执行两步随机接入过程。
  24. 根据权利要求22或23所述的装置,其中,所述第二信息包括第二位图,所述第二位图中的每个比特位对应一个接入信息,所述比特位的取值用于指示该比特位对应的接入信息的终端是否能够执行两步随机接入过程。
  25. 根据权利要求22至24任一项所述的装置,其中,所述接入信息包括以下至少之一:接入的原因值、接入的业务类型、接入的原因值的指示信息、接入的业务类型的指示信息、接入原因值和接入业务类型的指示信息。
  26. 根据权利要求25所述的装置,其中,所述接入的原因值为RRC连接建立的原因值、或者RRC连接恢复的原因值、或者RRC连接重建的原因值。
  27. 根据权利要求26所述的装置,其中,所述接入信息通过所述终端的NAS层或者AS层获得。
  28. 一种随机接入控制装置,所述装置包括:
    第一接收单元,用于接收第一系统广播消息,所述第一系统广播消息中包括第一指示信息,所述第一指示信息用于指示终端目标小区是否支持两步随机接入过程;
    第二接收单元,用于接收第二系统广播消息,所述第二系统广播消息中包括两步随机接入过程对应的接入控制信息;
    确定单元,用于基于所述第一指示信息和所述接入控制信息确定是否能够执行两步随机接入过程。
  29. 根据权利要求28所述的装置,其中,所述第一系统广播消息中包括第一指示信息,包括:
    所述第一系统广播消息中包括第一信息域,所述第一信息域中承载所述第一指示信息。
  30. 根据权利要求28所述的装置,其中,所述第一系统广播消息中包括第一指示信息,包括:
    所述第一系统广播消息中包括针对所述两步随机接入过程的第一资源配置信息,所述第一资源配置信息用于确定所述第一指示信息。
  31. 根据权利要求28至30任一项所述的装置,其中,所述接入控制信息包括第一信息和/或第二信息,所述第一信息用于指示至少一个AC值对应的终端是否能够执行两步随机接入过程,所述第二信息用于指示至少一个接入信息对应的终端是否能够执行两步随机接入过程;
    其中,所述第一信息用于所述终端基于所述终端的AC值确定所述终端是否能够执行两步随机接入过程,所述第二信息用于所述终端基于所述终端的接入信息确定所述终端是否能够执行两步随机接入过程。
  32. 根据权利要求31所述的装置,其中,所述第一信息包括第一位图,所述第一位图中的每个比特位对应一个AC值,所述比特位的取值用于指示该比特位对应的AC值的终端是否能够执行两步随机接入过程。
  33. 根据权利要求31或32所述的装置,其中,所述第二信息包括第二位图,所述第二位图中的每个比特位对应一个接入信息,所述比特位的取值用于指示该比特位对应的接入信息的终端是否能够执行两步随机接入过程。
  34. 根据权利要求31至33任一项所述的装置,其中,所述接入信息包括以下至少之一:接入的原因值、接入的业务类型、接入的原因值的指示信息、接入的业务类型的指示信息、接入原因值和接入业务类型的指示信息。
  35. 根据权利要求34所述的装置,其中,所述接入的原因值为RRC连接建立的原因值、或者RRC连接恢复的原因值、或者RRC连接重建的原因值。
  36. 根据权利要求31至35任一项所述的装置,其中,所述接入信息通过所述终端的NAS或者AS层层获得。
  37. 一种网络设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至9中任一项所述的方法。
  38. 一种终端,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求10至18中任一项所述的方法。
  39. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至9中任一项所述的方法。
  40. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求10至18中任一项所述的方法。
  41. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至9中任一项所述的方法。
  42. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求10至18中任一项所述的方法。
  43. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至9中任一项所述的方法。
  44. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求10至18中任一项所述的方法。
  45. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至9中任一项所述的方法。
  46. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求10至18中任一项所述的方法。
PCT/CN2018/107025 2018-09-21 2018-09-21 一种随机接入控制方法及装置、网络设备、终端 WO2020056736A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP18933933.6A EP3855794A4 (en) 2018-09-21 2018-09-21 DIRECT ACCESS CONTROL PROCEDURES AND SETUP, NETWORK DEVICE AND TERMINAL DEVICE
PCT/CN2018/107025 WO2020056736A1 (zh) 2018-09-21 2018-09-21 一种随机接入控制方法及装置、网络设备、终端
CN201880097314.4A CN112673667A (zh) 2018-09-21 2018-09-21 一种随机接入控制方法及装置、网络设备、终端
US17/171,964 US11528752B2 (en) 2018-09-21 2021-02-09 Random access control method and apparatus, network device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/107025 WO2020056736A1 (zh) 2018-09-21 2018-09-21 一种随机接入控制方法及装置、网络设备、终端

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/171,964 Continuation US11528752B2 (en) 2018-09-21 2021-02-09 Random access control method and apparatus, network device, and terminal

Publications (1)

Publication Number Publication Date
WO2020056736A1 true WO2020056736A1 (zh) 2020-03-26

Family

ID=69888184

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/107025 WO2020056736A1 (zh) 2018-09-21 2018-09-21 一种随机接入控制方法及装置、网络设备、终端

Country Status (4)

Country Link
US (1) US11528752B2 (zh)
EP (1) EP3855794A4 (zh)
CN (1) CN112673667A (zh)
WO (1) WO2020056736A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021207908A1 (zh) * 2020-04-14 2021-10-21 华为技术有限公司 一种随机接入方法及终端设备
US11528752B2 (en) 2018-09-21 2022-12-13 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Random access control method and apparatus, network device, and terminal

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111565473A (zh) * 2019-02-14 2020-08-21 华为技术有限公司 一种随机接入方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899964A (zh) * 2017-02-09 2017-06-27 北京小米移动软件有限公司 终端能力信息传递方法及装置
CN108064050A (zh) * 2016-11-05 2018-05-22 华为技术有限公司 配置方法及装置
CN108271275A (zh) * 2017-01-04 2018-07-10 电信科学技术研究院 一种竞争随机接入的方法和装置
CN108282899A (zh) * 2017-01-05 2018-07-13 电信科学技术研究院 一种两步竞争随机接入方法和装置
CN108282816A (zh) * 2017-01-05 2018-07-13 中兴通讯股份有限公司 一种接入方法及接入装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2816844B1 (en) * 2013-06-21 2018-01-31 Alcatel Lucent Method and apparatus for providing radio access information
US10791541B2 (en) * 2016-06-22 2020-09-29 Lg Electronics Inc. Method for performing random access and terminal for performing same
US10433342B2 (en) * 2016-10-19 2019-10-01 Qualcomm Incorporated Enhanced random access channel (RACH) procedure
WO2018085726A1 (en) * 2016-11-04 2018-05-11 Intel IP Corporation Performing 2-step random access channel (rach) procedures
KR102626219B1 (ko) * 2017-01-13 2024-01-18 모토로라 모빌리티 엘엘씨 캐리어 주파수에서 경합 기반 랜덤 액세스를 수행하기 위한 방법 및 장치
JP2020047963A (ja) * 2017-01-20 2020-03-26 シャープ株式会社 端末装置、基地局装置、通信方法、および、集積回路
US10568007B2 (en) * 2017-03-22 2020-02-18 Comcast Cable Communications, Llc Handover random access
CA3057464A1 (en) * 2017-03-22 2018-09-27 Comcast Cable Communications, Llc Random access process in new radio
US11057935B2 (en) * 2017-03-22 2021-07-06 Comcast Cable Communications, Llc Random access process in new radio
EP3855794A4 (en) 2018-09-21 2021-11-03 Guangdong Oppo Mobile Telecommunications Corp., Ltd. DIRECT ACCESS CONTROL PROCEDURES AND SETUP, NETWORK DEVICE AND TERMINAL DEVICE

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108064050A (zh) * 2016-11-05 2018-05-22 华为技术有限公司 配置方法及装置
CN108271275A (zh) * 2017-01-04 2018-07-10 电信科学技术研究院 一种竞争随机接入的方法和装置
CN108282899A (zh) * 2017-01-05 2018-07-13 电信科学技术研究院 一种两步竞争随机接入方法和装置
CN108282816A (zh) * 2017-01-05 2018-07-13 中兴通讯股份有限公司 一种接入方法及接入装置
CN106899964A (zh) * 2017-02-09 2017-06-27 北京小米移动软件有限公司 终端能力信息传递方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3855794A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11528752B2 (en) 2018-09-21 2022-12-13 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Random access control method and apparatus, network device, and terminal
WO2021207908A1 (zh) * 2020-04-14 2021-10-21 华为技术有限公司 一种随机接入方法及终端设备

Also Published As

Publication number Publication date
EP3855794A4 (en) 2021-11-03
CN112673667A (zh) 2021-04-16
US20210168877A1 (en) 2021-06-03
US11528752B2 (en) 2022-12-13
EP3855794A1 (en) 2021-07-28

Similar Documents

Publication Publication Date Title
WO2020056721A1 (zh) 一种随机接入方法及装置、网络设备、终端
US11528752B2 (en) Random access control method and apparatus, network device, and terminal
WO2020020332A1 (zh) 一种随机接入方法、终端设备及存储介质
US20210168857A1 (en) Load control method and apparatus, network device, and terminal
US11546945B2 (en) Data transmission method and apparatus, and terminal
WO2020019230A1 (zh) 一种资源配置方法及装置、终端设备、网络设备
JP7301949B2 (ja) ランダムアクセス方法、端末装置、ネットワーク装置及び記憶媒体
WO2019237805A1 (zh) 一种随机接入方法及装置、通信设备
EP3820212B1 (en) Information configuration methods, terminal and network device
WO2020082248A1 (zh) 一种控制终端移动性的方法及装置、终端
WO2020056717A1 (zh) 一种资源关联方法及装置、终端、网络设备
WO2020206643A1 (zh) 一种随机接入方法、设备及存储介质
WO2020147049A1 (zh) 处理上行覆盖弱化的方法及装置、终端、网络设备
WO2020029086A1 (zh) 一种小区搜索方法及装置、终端
WO2021174467A1 (zh) 一种数据传输方法、电子设备及存储介质
WO2020061995A1 (zh) 一种信息传输方法及装置、终端、网络设备
WO2020020348A1 (zh) 一种信息传输方法及装置、终端设备、网络设备
WO2020010612A1 (zh) 波束失败恢复实现方法、装置、芯片及计算机程序
WO2021208048A1 (zh) 一种数据传输方法、终端设备及存储介质
EP3813471B1 (en) Method for indicating channel access type, terminal device and network device
WO2020258182A1 (zh) 数据传输方法、装置和通信设备
WO2020177135A1 (zh) 功率控制方法及随机接入方法、装置、终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18933933

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018933933

Country of ref document: EP

Effective date: 20210421