WO2020057262A1 - 随机接入方法及终端 - Google Patents

随机接入方法及终端 Download PDF

Info

Publication number
WO2020057262A1
WO2020057262A1 PCT/CN2019/098175 CN2019098175W WO2020057262A1 WO 2020057262 A1 WO2020057262 A1 WO 2020057262A1 CN 2019098175 W CN2019098175 W CN 2019098175W WO 2020057262 A1 WO2020057262 A1 WO 2020057262A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
data content
access process
data
sent
Prior art date
Application number
PCT/CN2019/098175
Other languages
English (en)
French (fr)
Inventor
吴昱民
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Priority to CA3112923A priority Critical patent/CA3112923C/en
Priority to SG11202102609VA priority patent/SG11202102609VA/en
Priority to JP2021514349A priority patent/JP7385654B2/ja
Priority to EP19863664.9A priority patent/EP3855852A4/en
Priority to KR1020217010828A priority patent/KR102589489B1/ko
Priority to RU2021109159A priority patent/RU2769097C1/ru
Priority to AU2019342158A priority patent/AU2019342158B2/en
Publication of WO2020057262A1 publication Critical patent/WO2020057262A1/zh
Priority to US17/199,118 priority patent/US20210204329A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1822Automatic repetition systems, e.g. Van Duuren systems involving configuration of automatic repeat request [ARQ] with parallel processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0015Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the adaptation strategy
    • H04L1/0017Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the adaptation strategy where the mode-switching is based on Quality of Service requirement
    • H04L1/0018Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the adaptation strategy where the mode-switching is based on Quality of Service requirement based on latency requirement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1812Hybrid protocols; Hybrid automatic repeat request [HARQ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1812Hybrid protocols; Hybrid automatic repeat request [HARQ]
    • H04L1/1819Hybrid protocols; Hybrid automatic repeat request [HARQ] with retransmission of additional or different redundancy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1867Arrangements specially adapted for the transmitter end
    • H04L1/1874Buffer management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • H04W28/14Flow control between communication endpoints using intermediate storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1829Arrangements specially adapted for the receiver end
    • H04L1/1835Buffer management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Definitions

  • Embodiments of the present disclosure relate to the field of communication technologies, and in particular, to a random access method and a terminal.
  • a two-step random access (2-step RACH) process can send user data to a network-side device through a first random access request message.
  • the terminal needs to continuously initiate random access process attempts, and the two adjacent random access process attempts by the terminal include two-step random access process attempts. There is no relevant solution for the data processing method between the two random access attempts.
  • the embodiments of the present disclosure provide a random access method and a terminal, and propose a solution for a data processing manner between two adjacent random access process attempts including a two-step random access process attempt.
  • an embodiment of the present disclosure provides a random access method, which includes:
  • the first data in the first data content is sent; the first data content is the data content buffered in the i-1th random access process, and the i-th random access At least one of the process and the (i-1) th random access process is a two-step random access process, where i is an integer greater than 1.
  • an embodiment of the present disclosure provides a random access method, which includes:
  • the third data content in the two-step random access process is generated, and the third data content is buffered.
  • an embodiment of the present disclosure further provides a terminal, where the terminal includes:
  • a first sending module configured to send the first data in the first data content during the i-th random access process; the first data content is the data content buffered in the i-1th random access process, so At least one of the i-th random access process and the i-1th random access process is a two-step random access process, and i is an integer greater than 1.
  • an embodiment of the present disclosure further provides a terminal, where the terminal includes:
  • the buffering module is configured to generate a third data content in the two-step random access process and buffer the third data content in the two-step random access process.
  • an embodiment of the present disclosure further provides a terminal.
  • the terminal includes a processor, a memory, and a computer program stored on the memory and executable on the processor.
  • the computer program is processed by the processor. When executed, the steps of the random access method as described above are implemented.
  • an embodiment of the present disclosure further provides a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, implements the steps of the random access method as described above. .
  • the terminal buffers the first data content in the i-1th random access process, and sends the first data in the first data content during the ith random access process.
  • it can reduce the data loss rate in the random access process and improve the reliability of data transmission.
  • FIG. 1 is a structural diagram of a network system applicable to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of a random access process according to an embodiment of the present disclosure
  • FIG. 3 is one of the flowcharts of the random access method provided by the embodiment of the present disclosure.
  • FIG. 5 is one of the structural diagrams of a terminal provided by an embodiment of the present disclosure.
  • FIG. 6 is a second structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 7 is a third structural diagram of a terminal provided by an embodiment of the present disclosure.
  • FIG. 1 is a structural diagram of a network system applicable to an embodiment of the present disclosure. As shown in FIG. 1, it includes a terminal 11 and a network-side device 12. For communication.
  • the terminal 11 may also be referred to as a UE (User Equipment).
  • the terminal 11 may be a mobile phone, a tablet computer, a laptop computer, a personal computer, or a personal computer.
  • Terminal-side devices such as Personal Assistant (PDA), Mobile Internet Device (MID), Wearable Device (Wearable Device), or in-vehicle device. It should be noted that this is not the case in the embodiments of the present disclosure.
  • a specific type of the terminal 11 is defined.
  • the network-side device 12 may be a base station, a relay, or an access point.
  • the base station may be a base station of 5G and later versions (for example, 5G NR, NB), or a base station in other communication systems (for example, eNB (Evolutionary Node B, evolved base station)).
  • 5G NR, NB 5G NR
  • eNB Evolutionary Node B, evolved base station
  • the specific type of the network-side device 12 is not limited.
  • the traditional random access process may include a contention-based random access process and a non-contention-based random access process.
  • the contention-based random access process can be expressed as a four-step random access (4-step RACH) process.
  • the UE sends Msg1 (random access request message) to the network-side device.
  • Msg2 Random Access Response
  • the UE performs a MAC (Medium Access Control) layer packet function to generate a MAC PDU (Protocol Data Unit), and stores the MAC PDU in the Msg3 cache, and then The UE sends the MAC PDU in the Msg3 buffer through the HARQ process.
  • MAC Medium Access Control
  • the network-side device After receiving the Msg3, the network-side device sends Msg4 (for example, a contention resolution identifier) to the UE. After receiving the Msg4, the UE determines whether the contention resolution is successful. If it is successful, the random access process is successful, otherwise, the random access process is re-initiated.
  • Msg4 for example, a contention resolution identifier
  • the UE can directly retrieve the previously stored MAC PDU from the Msg3 cache and send it through the HARQ process.
  • the UE clears the HARQ buffer of the Msg3 transmission in the random access process.
  • the UE sends Msg1 to the network-side device.
  • the network-side device After receiving the Msg1, the network-side device sends the Msg2 to the UE, and the Msg2 carries the uplink authorization information and the identification information of the UE (such as a random access preamble number in the Msg1). If the number of the random access preamble is the same as the number of the random access preamble carried in the Msg1 of the UE, the UE considers that the random access process is successful, otherwise the random access process is re-initiated.
  • the UE may choose a "contention-based random access procedure" or "non-contention-based random access procedure".
  • the types of the i-th random access process and the i-1th random access process may be the same or may change, where i is greater than 1. Integer.
  • the two-step random access procedure may include the following steps:
  • Step 201 The network-side device configures two-step random access configuration information (2-Step RACH configuration) for the UE.
  • the configuration information may include transmission resource information corresponding to MsgA and MsgB.
  • Step 202 The UE sends MsgA to the network-side device. Thereby triggering the 2-Step RACH process.
  • the UE may send the MsgA through a PUSCH (Physical Uplink Shared Channel).
  • PUSCH Physical Uplink Shared Channel
  • MsgA may include a data portion and a non-data portion. As shown in FIG. 2, MsgA may carry data (Data) and a first UE identifier (UE-ID1).
  • Data data
  • UE-ID1 first UE identifier
  • Step 203 The network-side device sends a feedback message MsgB to the UE.
  • the MsgB may carry a second UE identification (UE-ID2) and an acknowledgement indication (Acknowledge Indication, ACK Indication for short).
  • UE-ID2 second UE identification
  • ACK Indication acknowledgement indication
  • the UE after receiving the MsgB, the UE finds that the second UE identifier carried in the MsgB does not match the first UE identifier carried in the MsgA sent by the UE, it can be regarded as receiving MsgB failure, and the UE needs to resend the MsgA , That is, re-initiating the random access process.
  • the MsgA sent in step 202 is equivalent to the combination of Msg1 and Msg3 in the four-step random access process
  • the MsgB sent in step 203 is equivalent to the four-step random access process.
  • Msg2 and Msg4 in. It should be understood that, in practical applications, MsgA in the two-step random access process may be referred to as Msg1, and MsgB may be referred to as Msg2, which may be specifically determined according to actual conditions, which is not limited in the embodiments of the present disclosure.
  • FIG. 3 is one of the flowcharts of the random access method according to an embodiment of the present disclosure. As shown in FIG. 3, the random access method in this embodiment includes the following steps:
  • Step 301 In the i-th random access process, send the first data in the first data content.
  • the first data content is data content buffered in the i-1th random access process, and at least one of the i-th random access process and the i-1th random access process is a two-step random access.
  • i is an integer greater than 1.
  • At least one of the i-th random access process and the i-1th random access process is a two-step random access process.
  • it may include but is not limited to the following embodiments: 1.
  • the i-1th random access process and the i-th random access process may both be two-step random access processes; 2.
  • the i-1th The second random access process may be a two-step random access process, the i-th random access process may be a four-step random access process; the third, the i-1th random access process may be a four-step random access process,
  • the i-th random access process may be a two-step random access process;
  • the i-th random access process may be a two-step random access process, and the i-th random access process may be a non-competitive random access process. .
  • the i-1th random access process is a two-step random access process
  • the i-th random access process is a four-step random access process
  • the UE can re-initiate the four-step random access procedure, resend message 1 of the four-step random access procedure, or convert the two random access procedures to the four-step random access procedure.
  • the message 3 of the four-step random access process is re-sent, which may be specifically determined according to actual needs, which is not limited in the embodiment of the present disclosure.
  • the two-step random access process, the four-step random access process, and the non-contention random access process belong to different types of random access processes, respectively.
  • the UE When the UE performs the i-1th random access procedure, it may buffer the first data content in the i-1th random access procedure. In this way, on the one hand, the data processing method between two adjacent random access procedures is standardized, and on the other hand, when the i-1th random access procedure fails and the ith random access procedure is performed, it is possible to The first data is extracted from the buffered first data content, and the first data is sent, so that the data loss rate can be reduced and the reliability of data transmission can be improved.
  • the first data in the first data content may be carried in the target data content and sent.
  • the target data content may be the first data content (that is, the data content buffered in the i-1th random access process), or the second data content (that is, the data content generated in the i-th random access process).
  • the data content corresponds to the size of the sent data packet (or called the size of the sending resource), and when the sizes of the sent data packets during the two random access processes are different, the two The data content corresponding to the size of the sent data packet in the two random access processes may be different; in the case that the size of the sent data packet in the two random access processes is the same, the size of the data packet sent in the two random access processes corresponds
  • the data content can be the same.
  • the data content may be used to send a first message, and a specific expression form of the first message may be determined based on a expression form of a random access process.
  • the first message may be MsgA in the two-step random access process; if the random access process is a four-step random access process, the first message It can be Msg3 in a four-step random access process.
  • the above data content can be expressed as a MAC PDU, but it is not limited to this.
  • the size of the sent data packet may be determined according to the uplink authorization information.
  • the specific manifestation of the above target data content may be determined according to a comparison result between the size of the sent data packet of the i-th random access process and the size of the sent data packet of the i-1th random access process.
  • Scenario 1 The comparison result is different, that is, the size of the data packet sent in the i-th random access process is different from the size of the data packet sent in the i-1th random access process.
  • sending the first data in the first data content includes:
  • the terminal can regenerate the second data content including the first data, and send the first data through the second data content, thereby improving the success rate of sending the first data.
  • the target data content is expressed as the second data content, that is, the data content generated by the i-th random access process.
  • the size of the transmission resource may be expressed as TBS (Transport Block Size). Therefore, optionally, the size of the sent data packet in the i-th random access process is the same as the size of the first packet. In the case that the size of the data packet sent during the i-1 random access processes is different, the second data content including the first data is regenerated, and the second data content is sent, which can be specifically expressed as:
  • the method further includes:
  • the i-th random access process fails and the terminal re-initiates the i + 1-th random access process, it can send data included in the second data content, which can reduce the data loss rate and improve the reliability of data transmission. .
  • the terminal caches the second data content to a cache position corresponding to the i-th random access process, and caches the first data content to the cache position corresponding to the i-1th random access process.
  • the cache position corresponding to the i-th random access process and the cache position corresponding to the i-1th random access process may be the same or different. Therefore, the cache position of the second data content and the cache position of the first data content may be the same or different.
  • the cache position of the second data content is the same as or different from the cache position of the first data content.
  • the cache position corresponding to the i-th random access process and the i-1th random access process is the same, and the cache location of the second data content is the same as the cache location of the first data content.
  • the second data content may be stored in a buffer location corresponding to the two-step random access process.
  • the i-th random access process and the i-1th random access process are not of the same type of random access process, but the type of the random access process to which the i-th random access process belongs is the same as the i-1th random access process.
  • the random access process to which the access process belongs uses the same cache location to store data content
  • the cache position corresponding to the i-th random access process is the same as the cache position corresponding to the i-1th random access process
  • the second data The cache position of the content is the same as the cache position of the first data content.
  • the two-step random access process and the i-1th random access process is a two-step random access process, and the other is a four-step random access process, but the two-step random access process and The four-step random access process uses the same cache location (such as the second RACH cache location) to store data content, and the second data content can be cached to the same cache location corresponding to the two-step random access process and the four-step random access process in.
  • the same cache location such as the second RACH cache location
  • the i-th random access process and the i-1th random access process are not of the same type of random access process, and the type of the random access process to which the i-th random access process belongs is the same as the i-1th random access process.
  • the random access process to which the access process belongs uses different cache locations to store data content
  • the cache position corresponding to the i-th random access process is different from the cache position corresponding to the i-1th random access process
  • the second data The cache position of the content is different from the cache position of the first data content.
  • the i-th random access process is a two-step random access process
  • the i-1th random access process is a four-step random access process
  • the buffer position corresponding to the two-step random access process is MsgA Cache location.
  • the cache location corresponding to the four-step random access process is the Msg3 cache location, and the second data content can be stored in the Msg3 cache location.
  • the UE may send the second data content in multiple ways.
  • the sending the second data content includes:
  • the i-th random access process is a two-step random access process
  • the two-step random access process supports HARQ (Hybrid Automatic Automatic Repeat Request)
  • the first The second data content is stored in the HARQ cache and sent through the HARQ process; if the two-step random access process does not support the HARQ process, the second data content can be sent to the bottom layer of the protocol layer corresponding to the second data content and sent through the bottom layer
  • the second data content is, for example, a MAC content PDU, and the protocol layer corresponding to the second data content is the MAC layer, and the second data content is sent through the physical layer.
  • the second data content may be stored in a HARQ buffer and sent through a HARQ process.
  • Scenario 2 The comparison result is the same, that is, the size of the data packet sent in the i-th random access process is the same as the size of the data packet sent in the i-1th random access process.
  • the sending the first data in the first data content includes:
  • the size of the data packet sent in the i-th random access process is the same as the size of the data packet sent in the i-1th random access process
  • buffering is performed from the i-1th random access process.
  • the first data content is fetched and sent.
  • the terminal may directly fetch and send the first data content from a buffer location where the first data content is buffered in the i-1th random access process. In this way, compared with the first scenario, the first data can be sent directly through the first data content without generating the second data content, which can simplify the operation.
  • the target data content is represented as the first data content, that is, the data content buffered in the i-1th random access process.
  • the size of the sent data packet in the i-th random access process is the same as the size of the sent data packet in the i-1th random access process.
  • fetching and sending the first data content from the buffer location where the first data content is buffered in the i-1th random access process may specifically be expressed as:
  • the TBS used in the i-th random access process is different from the TBS used in the i-1th random access process, buffering the data from the i-1th random access process In the cache position of the first data content, the first data content is fetched and sent.
  • the UE may store the first data content from the buffer location where the first data content is cached in the i-1th random access process, and then store the first data content to In the cache position corresponding to the i-th random access process, in this way, when the i-th random access process fails and the terminal re-initiates the i + 1-th random access process, the first data content that the terminal can send to the cache includes Data, which can reduce the data loss rate and improve the reliability of data transmission.
  • the buffer location where the first data content is stored in the i-th random access process may be the same as or different from the cache location where the first data content is stored in the i-1th random access process. The relevant descriptions in Section 1 will not be repeated here.
  • the manner in which the UE sends the first data content in the scenario 2 is the same as the manner in which the UE sends the second data content in the scenario 1.
  • the description of the related content in the scenario 2 which is not described here again.
  • Embodiment 1 Both the i-1th random access process and the ith random access process may be two-step random access processes.
  • Step 0 When the UE fails the i-1th random access procedure attempt, the UE will try the random access procedure again before reaching the maximum number of random access procedure attempts, that is, the i-1th random access is performed. The process tries.
  • Step 1.1 When the UE performs the i-1th random access procedure attempt, the UE performs corresponding processing according to the size of the uplink transmission resource, and then sends uplink data.
  • the processing method of the UE includes any one of the following:
  • the UE When the size of the resource for the UE to send MsgA data does not change (for example, the TBS generated according to the uplink authorization information is the same as the TBS for the previous MsgA data transmission), the UE directly uses the first data content stored before (for example, MAC (PDU) to send MsgA data.
  • the first data content stored before for example, MAC (PDU)
  • the UE regenerates the second data content,
  • the second data content is stored in a buffer location corresponding to the two-step random access process (for example, RACH buffer or MsgA buffer), and the second data content is used for MsgA data transmission.
  • Step 1.2 According to whether the MsgA in the two-step random access process supports HARQ process sending, the processing behavior of the UE includes any of the following:
  • the UE obtains the target data content (the first data content or the second data content) and then sends the target data content It is stored in the HARQ buffer and sent by the corresponding HARQ process.
  • the MsgA of the two-step random access process does not support HARQ process sending, when the UE is sending MsgA data, after obtaining the target data content, the UE sends the target data content to the protocol layer corresponding to the target data content.
  • the bottom layer performs data transmission (for example, the MAC layer of the UE takes out the first data content from the MsgA Buffer and sends it to the physical layer for data transmission).
  • Embodiment 2 The i-1th random access process may be a two-step random access process, and the i-th random access process may be a four-step random access process.
  • Step 0 When the UE fails the i-1th random access procedure attempt, the UE will try the random access procedure again before reaching the maximum number of random access procedure attempts, that is, the i-1th random access is performed. The process tries.
  • Step 1.1 When the UE performs the i-1th random access procedure attempt, the UE performs corresponding processing according to the size of the uplink transmission resource, and then sends uplink data.
  • the processing method of the UE includes any one of the following:
  • the UE When the size of the resource for the UE to send Msg3 data does not change (for example, the TBS generated according to the uplink authorization information is the same as the TBS for the previous MsgA data transmission), the UE directly uses the previously stored first data content (for example, MAC (PDU) to send Msg3 data.
  • the previously stored first data content for example, MAC (PDU)
  • the UE regenerates the second data content, The second data content is used to send Msg3 data.
  • the UE may store the first data content buffered in the two-step random access process or the regenerated second data content for Msg3 transmission in the "four-step random access"
  • the buffer location for example, Msg3Buffer
  • the four-step random access process and the two-step random access process use the same buffer location (eg, RACH buffer) to store data used for uplink transmission during the random access process (eg, MsgA of 2-step RACH); 4-step RACH Msg3).
  • RACH buffer e.g, RACH buffer
  • Step 1.2 When sending Msg3 data in the four-step random access process, after obtaining the target data content, the UE stores the target data content in the HARQ cache and sends it through the corresponding HARQ process.
  • Embodiment 3 The i-1th random access process may be a four-step random access process, and the i-th random access process may be a two-step random access process.
  • Step 0 When the UE performs the i-1th random access procedure attempt, the UE performs corresponding processing according to the size of the uplink transmission resource, and then sends uplink data.
  • the processing method of the UE includes any one of the following:
  • the UE When the size of the resource for the UE to send MsgA data does not change (for example, the TBS generated according to the uplink authorization information is the same as the TBS for the previous Msg3 data transmission), the UE directly uses the previously stored first data content (for example, MAC (PDU) to send Msg3 data.
  • the previously stored first data content for example, MAC (PDU)
  • the UE regenerates the second data content, The second data content is used to send MsgA data.
  • the UE may store the first data content buffered in the four-step random access process or the regenerated second data content for MsgA transmission in the two-step random access process.
  • the corresponding buffer eg, MsgA Buffer.
  • the four-step random access process and the two-step random access process use the same buffer location (eg, RACH buffer) to store data used for uplink transmission during the random access process (eg, MsgA of 2-step RACH); 4-step RACH Msg3).
  • RACH buffer e.g, RACH buffer
  • Step 1.2 The processing behavior of the UE is the same as the processing behavior of the UE in the first embodiment, and details are not described herein again.
  • Embodiment 4 The i-1th random access process may be a two-step random access process, and the i-th random access process may be a non-competitive random access process.
  • Step 0 When the UE fails the i-1th random access procedure attempt, the UE will try the random access procedure again before reaching the maximum number of random access procedure attempts, that is, the i-1th random access is performed. The process tries.
  • Step 1.1 When the UE performs the i-1th random access procedure attempt, the UE performs corresponding processing according to the size of the uplink transmission resource, and then sends uplink data.
  • the processing method of the UE includes any one of the following:
  • the UE After the UE performs the non-competitive random access procedure, the size of the data transmission resource specified in Msg2 does not change (for example, the TBS generated according to the uplink authorization information is the same as the TBS that was used for the previous MsgA data transmission), then the UE directly The first data content (eg, MAC PDU) stored before is used for data transmission.
  • the first data content eg, MAC PDU
  • the size of the resource for data transmission specified in Msg2 changes (for example, the TBS generated according to the uplink authorization information is the same as the TBS that was used for the previous MsgA data transmission. ), The UE regenerates the second data content, and uses the second data content to send data.
  • Step 1.2 After acquiring the target data content, the UE stores the target data content in the HARQ cache, and sends it through the corresponding HARQ process.
  • a random access method is also provided, which is used to determine a UE's processing behavior of data content generated in a two-step random access process.
  • FIG. 4 is a second flowchart of a random access method according to an embodiment of the present disclosure.
  • the random access method in this embodiment may include the following steps:
  • Step 401 In the two-step random access process, generate third data content in the two-step random access process, and buffer the third data content.
  • the above two-step random access procedure may be the Nth random access procedure attempt, which is a positive integer.
  • N is equal to 1
  • the above two-step random access procedure is the first random access procedure attempt.
  • the UE stores the third data content in a buffer location corresponding to the two-step random access process, such as Msg3Buffer or RACH buffer.
  • the terminal can send the data included in the buffered third data content, thereby reducing the data loss rate and increasing the data. Reliability of transmission.
  • the method further includes:
  • the manner in which the UE controls the transmission of the third data content is the same as the manner in which the UE controls the transmission of the second data content in scenario 1 of the method embodiment corresponding to FIG. 3.
  • the UE controls the transmission of the second data content in scenario 1 of the method embodiment corresponding to FIG. 3.
  • the description of related content in the method embodiment corresponding to FIG. Will not repeat them here.
  • Step 0 The network-side device configures two-step random access configuration information for the UE, such as sending resource information corresponding to Msg1 and Msg2.
  • Step 1.1 The UE triggers a two-step random access procedure. Send Msg1 to the network-side device, for example, through PUSCH.
  • the UE When the two-step random access procedure is performed for the first time, the UE generates third data content (for example, MAC PDU) for the two-step random access procedure, and stores the third data content in the corresponding two-step random access procedure.
  • Cache location eg, RACH buffer or MsgA buffer.
  • Step 1.2 According to whether the MsgA in the two-step random access process supports HARQ process sending, the processing behavior of the UE includes any of the following:
  • the UE obtains the target data content (the first data content or the second data content) and then sends the target data content It is stored in the HARQ buffer and sent by the corresponding HARQ process.
  • the MsgA of the two-step random access process does not support HARQ process sending, when the UE is sending MsgA data, after obtaining the target data content, the UE sends the target data content to the protocol layer corresponding to the target data content.
  • the bottom layer performs data transmission (for example, the MAC layer of the UE takes out the first data content from the MsgA Buffer and sends it to the physical layer for data transmission).
  • FIG. 5 is one of the structural diagrams of a terminal provided by an embodiment of the present disclosure. As shown in FIG. 5, the terminal 500 includes:
  • a first sending module 501 configured to send first data in the first data content during the i-th random access process; the first data content is data content buffered in the i-1th random access process, At least one of the i-th random access process and the i-1th random access process is a two-step random access process, and i is an integer greater than 1.
  • the first sending module 501 is specifically configured to:
  • the size of the data packet sent in the i-th random access process is the same as the size of the data packet sent in the i-1th random access process
  • buffering is performed from the i-1th random access process.
  • the first data content is fetched and sent.
  • the first sending module 501 is specifically configured to:
  • the terminal 500 further includes:
  • the buffering module is configured to buffer the second data content after the second data content including the first data is regenerated and before the second data content is sent.
  • the cache position of the second data content is the same as or different from the cache position of the first data content.
  • the first sending module 501 is specifically configured to:
  • the size of the sent data packet of the i-th random access process is different from the size of the sent data packet of the i-1th random access process, regenerating the second data content including the first data Storing the second data content in a HARQ cache and sending it through a HARQ process; or sending the second data content through a lower layer of a protocol layer corresponding to the second data content.
  • the method embodiment corresponding to FIG. 3 and the method embodiment corresponding to FIG. 4 may be implemented independently or in combination, which is not limited in this embodiment of the present disclosure.
  • the terminal 500 can implement each process in the method embodiment corresponding to FIG. 3 of the present disclosure and achieve the same beneficial effects. To avoid repetition, details are not described herein again.
  • FIG. 6 is a second structural diagram of a terminal provided by an embodiment of the present disclosure. As shown in FIG. 6, the terminal 600 includes:
  • the buffering module 601 is configured to generate a third data content in the two-step random access process and buffer the third data content in the two-step random access process.
  • the terminal 600 further includes:
  • a second sending module configured to store the third data content in a HARQ cache after buffering the third data content, and send the third data content through a HARQ process; or use a protocol layer corresponding to the third data content
  • the bottom layer sends the third data content.
  • the terminal 600 can implement the processes in the method embodiment corresponding to FIG. 4 in the present disclosure and achieve the same beneficial effects. To avoid repetition, details are not described herein again.
  • FIG. 7 is a third structural diagram of a terminal provided by an embodiment of the present disclosure.
  • the terminal may be a schematic diagram of a hardware structure of a terminal that implements various embodiments of the present disclosure.
  • the terminal 700 includes, but is not limited to, a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, and processing 710, power supply 711 and other components.
  • a radio frequency unit 701 a radio frequency unit 701
  • a network module 702 an audio output unit 703
  • an input unit 704 a sensor 705
  • processing 710 power supply 711 and other components.
  • the terminal 7 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or some components may be combined, or different component arrangements.
  • the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a car terminal, a wearable device, a pedometer, and the like.
  • the radio frequency unit 701 is configured to:
  • the first data in the first data content is sent; the first data content is the data content buffered in the i-1th random access process, and the i-th random access At least one of the process and the (i-1) th random access process is a two-step random access process, where i is an integer greater than 1.
  • the radio frequency unit 701 is further configured to:
  • the size of the data packet sent in the i-th random access process is the same as the size of the data packet sent in the i-1th random access process
  • buffering is performed from the i-1th random access process.
  • the first data content is fetched and sent.
  • the radio frequency unit 701 is further configured to:
  • the processor 710 is configured to:
  • the second data content including the first data is regenerated, the second data content is buffered before the second data content is transmitted.
  • the cache position of the second data content is the same as or different from the cache position of the first data content.
  • the radio frequency unit 701 is further configured to:
  • the processor 710 is configured to:
  • the third data content in the two-step random access process is generated, and the third data content is buffered.
  • the radio frequency unit 701 is configured to:
  • the radio frequency unit 701 may be used to receive and send signals during the transmission and reception of information or during a call. Specifically, the downlink data from the base station is received and processed by the processor 710; The uplink data is sent to the base station.
  • the radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio frequency unit 701 can also communicate with a network and other devices through a wireless communication system.
  • the terminal provides users with wireless broadband Internet access through the network module 702, such as helping users to send and receive email, browse web pages, and access streaming media.
  • the audio output unit 703 may convert audio data received by the radio frequency unit 701 or the network module 702 or stored in the memory 709 into audio signals and output them as sound. Moreover, the audio output unit 703 may also provide audio output (for example, a call signal reception sound, a message reception sound, etc.) related to a specific function performed by the terminal 700.
  • the audio output unit 703 includes a speaker, a buzzer, a receiver, and the like.
  • the input unit 704 is configured to receive an audio or video signal.
  • the input unit 704 may include a graphics processing unit (GPU) 7041 and a microphone 7042.
  • the graphics processor 7041 pairs images of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed.
  • the processed image frames may be displayed on a display unit 706.
  • the image frames processed by the graphics processor 7041 may be stored in the memory 709 (or other storage medium) or transmitted via the radio frequency unit 701 or the network module 702.
  • the microphone 7042 can receive sound, and can process such sound into audio data.
  • the processed audio data can be converted into a format that can be transmitted to a mobile communication base station via the radio frequency unit 701 in the case of a telephone call mode.
  • the terminal 700 further includes at least one sensor 705, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor includes an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 7061 according to the brightness of the ambient light.
  • the proximity sensor can close the display panel 7061 and / when the terminal 700 is moved to the ear. Or backlight.
  • an accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes).
  • sensor 705 can also include fingerprint sensor, pressure sensor, iris sensor, molecular sensor, gyroscope, barometer, hygrometer, thermometer, infrared The sensors and the like are not repeated here.
  • the display unit 706 is configured to display information input by the user or information provided to the user.
  • the display unit 706 may include a display panel 7061, and the display panel 7061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • the user input unit 707 may be used to receive inputted numeric or character information, and generate key signal inputs related to user settings and function control of the terminal.
  • the user input unit 707 includes a touch panel 7071 and other input devices 7072.
  • Touch panel 7071 also known as touch screen, can collect user's touch operations on or near it (for example, the user uses a finger, stylus, etc. any suitable object or accessory on touch panel 7071 or near touch panel 7071 operating).
  • the touch panel 7071 may include two parts, a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, and detects the signal caused by the touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into contact coordinates, and sends it To the processor 710, receive the command sent by the processor 710 and execute it.
  • various types such as resistive, capacitive, infrared, and surface acoustic wave can be used to implement the touch panel 7071.
  • the user input unit 707 may further include other input devices 7072.
  • other input devices 7072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, and details are not described herein again.
  • the touch panel 7071 may be overlaid on the display panel 7061.
  • the touch panel 7071 detects a touch operation on or near the touch panel 7071, the touch panel 7071 transmits the touch operation to the processor 710 to determine the type of the touch event.
  • the type of event provides corresponding visual output on the display panel 7061.
  • the touch panel 7071 and the display panel 7061 are implemented as two independent components to implement the input and output functions of the terminal, in some embodiments, the touch panel 7071 and the display panel 7061 can be integrated and Implement the input and output functions of the terminal, which are not limited here.
  • the interface unit 708 is an interface through which an external device is connected to the terminal 700.
  • the external device may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, and audio input / output (I / O) port, video I / O port, headphone port, and more.
  • the interface unit 708 may be used to receive an input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal 700 or may be used between the terminal 700 and an external device. Transfer data.
  • the memory 709 may be used to store software programs and various data.
  • the memory 709 may mainly include a storage program area and a storage data area, where the storage program area may store an operating system, an application program (such as a sound playback function, an image playback function, etc.) required for at least one function; the storage data area may store data according to Data (such as audio data, phone book, etc.) created by the use of mobile phones.
  • the memory 709 may include a high-speed random access memory, and may further include a non-volatile memory, for example, at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the processor 710 is a control center of the terminal, and uses various interfaces and lines to connect various parts of the entire terminal.
  • the processor 710 runs or executes software programs and / or modules stored in the memory 709, and calls data stored in the memory 709 to execute Various functions and processing data of the terminal, so as to monitor the terminal as a whole.
  • the processor 710 may include one or more processing units; optionally, the processor 710 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, and an application program, etc.
  • the tuning processor mainly handles wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 710.
  • the terminal 700 may further include a power source 711 (such as a battery) for supplying power to various components.
  • a power source 711 such as a battery
  • the power source 711 may be logically connected to the processor 710 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system. And other functions.
  • the terminal 700 includes some functional modules that are not shown, and details are not described herein again.
  • an embodiment of the present disclosure further provides a terminal, including a processor 710, a memory 709, and a computer program stored on the memory 709 and executable on the processor 710.
  • a terminal including a processor 710, a memory 709, and a computer program stored on the memory 709 and executable on the processor 710.
  • the computer program is executed by the processor 710.
  • An embodiment of the present disclosure further provides a computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, each process of the foregoing random access method embodiment is implemented, and the same can be achieved.
  • the computer-readable storage medium is, for example, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.
  • the methods in the above embodiments can be implemented by means of software plus a necessary universal hardware platform, and of course, also by hardware, but in many cases the former is better.
  • Implementation Based on this understanding, the technical solution of the present disclosure that is essentially or contributes to the existing technology can be embodied in the form of a software product that is stored in a storage medium (such as ROM / RAM, magnetic disk, The optical disc) includes several instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in the embodiments of the present disclosure.
  • a terminal which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开提供一种随机接入方法及终端,该方法包括:在第i次随机接入过程中,发送第一数据内容中的第一数据;所述第一数据内容为第i-1次随机接入过程缓存的数据内容,所述第i次随机接入过程和第i-1次随机接入过程中的至少一个为两步随机接入过程,所述i为大于1的整数。

Description

随机接入方法及终端
相关申请的交叉引用
本申请主张在2018年9月18日在中国提交的中国专利申请No.201811089695.X的优先权,其全部内容通过引用包含于此。
技术领域
本公开实施例涉及通信技术领域,尤其涉及一种随机接入方法及终端。
背景技术
目前,随机接入过程引入一种新的随机接入过程类型,两步随机接入(2-step RACH)过程,可以通过第一条随机接入请求消息将用户数据发送给网络侧设备。
然而,在随机接入成功率低,终端需要持续发起随机接入过程尝试,且终端进行的相邻两次随机接入过程尝试中包括两步随机接入过程尝试的场景中,对于上述相邻两次随机接入过程尝试之间数据的处理方式,目前还没有相关的解决方案。
发明内容
本公开实施例提供一种随机接入方法及终端,以针对包括两步随机接入过程尝试的相邻两次随机接入过程尝试之间数据的处理方式提出解决方案。
本公开是这样实现的:
第一方面,本公开实施例提供了一种随机接入方法,该方法包括:
在第i次随机接入过程中,发送第一数据内容中的第一数据;所述第一数据内容为第i-1次随机接入过程缓存的数据内容,所述第i次随机接入过程和第i-1次随机接入过程中的至少一个为两步随机接入过程,所述i为大于1的整数。
第二方面,本公开实施例提供了一种随机接入方法,该方法包括:
在两步随机接入过程中,生成所述两步随机接入过程中的第三数据内容, 并缓存所述第三数据内容。
第三方面,本公开实施例还提供一种终端,该终端包括:
第一发送模块,用于在第i次随机接入过程中,发送第一数据内容中的第一数据;所述第一数据内容为第i-1次随机接入过程缓存的数据内容,所述第i次随机接入过程和第i-1次随机接入过程中的至少一个为两步随机接入过程,所述i为大于1的整数。
第四方面,本公开实施例还提供一种终端,该终端包括:
缓存模块,用于在两步随机接入过程中,生成所述两步随机接入过程中的第三数据内容,并缓存所述第三数据内容。
第五方面,本公开实施例还提供一种终端,该终端包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如上所述的随机接入方法的步骤。
第六方面,本公开实施例还提供一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如上所述的随机接入方法的步骤。
在本公开实施例中,终端缓存第i-1次随机接入过程中的第一数据内容,并在第i次随机接入过程中,发送上述第一数据内容中的第一数据,一方面,规范了相邻两次随机接入过程尝试之间数据的处理方式,另一方面,可以降低随机接入过程中的数据丢失率,提高数据传输的可靠性。
附图说明
为了更清楚地说明本公开实施例的技术方案,下面将对本公开实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本公开实施例可应用的一种网络系统的结构图;
图2是本公开实施例提供的随机接入过程的示意图;
图3是本公开实施例提供的随机接入方法的流程图之一;
图4是本公开实施例提供的随机接入方法的流程图之二;
图5是本公开实施例提供的终端的结构图之一;
图6是本公开实施例提供的终端的结构图之二;
图7是本公开实施例提供的终端的结构图之三。
具体实施方式
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
本申请中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。此外,本申请中使用“和/或”表示所连接对象的至少其中之一,例如A和/或B和/或C,表示包含单独A,单独B,单独C,以及A和B都存在,B和C都存在,A和C都存在,以及A、B和C都存在的7种情况。
请参见图1,图1是本公开实施例可应用的一种网络系统的结构图,如图1所示,包括终端11和网络侧设备12,其中,终端11和网络侧设备12之间可以进行通信。
在本公开实施例中,终端11也可以称作UE(User Equipment,用户终端),具体实现时,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)、个人数字助理(Personal Digital Assistant,PDA)、移动上网装置(Mobile Internet Device,MID)、可穿戴式设备(Wearable Device)或车载设备等终端侧设备,需要说明的是,在本公开实施例中并不限定终端11的具体类型。
网络侧设备12可以是基站、中继或接入点等。基站可以是5G及以后版本的基站(例如:5G NR NB),或者其他通信系统中的基站(例如:eNB(Evolutional Node B,演进型基站),需要说明的是,在本公开实施例中并不 限定网络侧设备12的具体类型。
为了便于描述,以下对本公开实施例涉及的一些内容进行说明:
一、传统随机接入过程
传统随机接入过程可以包括:基于竞争的随机接入过程和基于非竞争的随机接入过程。其中,基于竞争的随机接入过程可以表现为四步随机接入(4-step RACH)过程。
对于“基于竞争的随机接入过程”,UE发送Msg1(随机接入请求消息)给网络侧设备。网络侧设备接收到Msg1后给UE发送Msg2(RAR(Random Access Response,随机接入响应)消息)给UE,Msg2中携带了上行授权信息。UE根据Msg2中的上行授权信息,执行MAC(Medium Access Control,媒体接入控制)层组包功能生成MAC PDU(Protocol Data Unit,协议数据单元),并将该MAC PDU存储在Msg3缓存中,然后UE将Msg3缓存中的MAC PDU通过HARQ进程进行发送。网络侧设备接收到Msg3后发送Msg4(如,竞争解决标识)给UE。UE接收到Msg4判断是否竞争解决成功,如果成功则随机接入过程成功,否则重新发起随机接入过程。
对于重新发起的随机接入过程,当UE又接收到Msg2中的上行授权信息后,UE可以直接从Msg3缓存中取出之前存储的MAC PDU,并通过HARQ进程进行发送。UE在随机接入过程完成(如随机接入过程成功或随机接入过程失败)后会清空随机接入过程的Msg3传输的HARQ缓存。
对于“基于非竞争的随机接入过程”,UE发送Msg1给网络侧设备。网络侧设备接收到Msg1后给UE发送Msg2给UE,Msg2中携带了上行授权信息,和UE的标识信息(如Msg1中的随机接入前导(preamble)编号)。如果,该随机接入前导的编号与UE的Msg1中携带的随机接入前导的编号相同,UE认为该随机接入过程成功,否则重新发起随机接入过程。
UE在每次发起(或重新发起)随机接入过程的时候,会根据各随机接入过程中Msg1资源的对应的下行信号质量(如,SSB(Synchronous Signal Block,同步信号块)的RSRP(Reference Symbol Received Power,参考符号接收强度))进行随机接入资源的选择,从而提高随机接入的成功过率。因此,UE在每次发起(或重新发起)随机接入过程的时候,UE可能会选择“基于竞争 的随机接入过程”或“基于非竞争的随机接入过程”。另一方面,UE在重新发起第i次随机接入过程时,第i次随机接入过程和第i-1次随机接入过程的类型可能相同,也可能发生变化其中,i为大于1的整数。
二、两步随机接入(2-Step RACH)过程:
在本公开实施例中,如图2所示,两步随机接入过程可以包括以下步骤:
步骤201、网络侧设备给UE配置两步随机接入的配置信息(2-Step RACH configuration)。其中,配置信息可以包括MsgA和MsgB对应的发送资源信息。
步骤202、UE向网络侧设备发送MsgA。从而触发2-Step RACH过程。其中,UE可以通过PUSCH(Physical Uplink Shared Channel,物理上行共享信道)发送MsgA。
需要说明的是,在本公开实施例中,MsgA可以包括数据部分和非数据部分。如图2所示,MsgA中可以携带有数据(Data)和第一UE标识(UE-ID1)。
步骤203、网络侧设备向UE发送反馈消息MsgB。
如图2所示,MsgB中可以携带第二UE标识(UE-ID2)和确认指示(Acknowledge Indication,简称ACK Indication)。
需要说明的是,若UE接收到MsgB后,解析发现MsgB中携带的第二UE标识与UE发送的MsgA中携带的第一UE标识不匹配,则可以视为接收MsgB失败,UE需要重新发送MsgA,即重新发起随机接入过程。
在本公开实施例的两步随机接入过程中,步骤202中发送的MsgA相当于四步随机接入过程中的Msg1和Msg3的合并,步骤203中发送的MsgB相当于四步随机接入过程中的Msg2和Msg4的合并。应理解的是,在实际应用中,两步随机接入过程中的MsgA中可以称为Msg1,MsgB可以称为Msg2,具体可根据实际情况确定,本公开实施例对此不作限定。
以下对本公开实施例的随机接入方法进行说明。
参见图3,图3是本公开实施例提供的随机接入方法的流程图之一。如图3所示,本实施例的随机接入方法包括以下步骤:
步骤301、在第i次随机接入过程中,发送第一数据内容中的第一数据。
其中,所述第一数据内容为第i-1次随机接入过程缓存的数据内容,所 述第i次随机接入过程和第i-1次随机接入过程中的至少一个为两步随机接入过程,所述i为大于1的整数。
在本实施例中,所述第i次随机接入过程和第i-1次随机接入过程中的至少一个为两步随机接入过程。具体实现时,可以但不仅限于包括以下几种实施方式:一、第i-1次随机接入过程和第i次随机接入过程都可以是两步随机接入过程;二、第i-1次随机接入过程可以是两步随机接入过程,第i次随机接入过程可以是四步随机接入过程;三、第i-1次随机接入过程可以是四步随机接入过程,第i次随机接入过程可以是两步随机接入过程;四、第i-1次随机接入过程可以是两步随机接入过程,第i次随机接入过程可以是非竞争随机接入过程。
需要说明的是,在本公开实施例中,在第i-1次随机接入过程是两步随机接入过程,第i次随机接入过程是四步随机接入过程的实施方式中,在第i-1次随机接入过程失败后,UE可以重新发起四步随机接入过程,重新发送四步随机接入过程的消息1,或者,将两次随机接入过程转换为四步随机接入过程,重新发送四步随机接入过程的消息3,具体可以根据实际需要决定,本公开实施例对此不作限定。
另外,在本公开实施例中,两步随机接入过程、四步随机接入过程和非竞争随机接入过程分别属于不同的随机接入过程类型。
UE在进行第i-1次随机接入过程时,可以缓存第i-1次随机接入过程中的第一数据内容。这样,一方面,规范了相邻两次随机接入过程尝试之间数据的处理方式,另一方面,当第i-1次随机接入过程失败,进行第i次随机接入过程时,可以从缓存的第一数据内容中提取出第一数据,并发送所述第一数据,从而可以降低数据丢失率,提高数据传输的可靠性。
在实际应用中,在第i次随机接入过程中,可以将第一数据内容中的第一数据携带于目标数据内容中发送。其中,目标数据内容可以是第一数据内容(即第i-1次随机接入过程缓存的数据内容),或者第二数据内容(即第i次随机接入过程生成的数据内容)。
需要说明的是,在本公开实施例中,数据内容与发送数据包大小(或称为发送资源大小)对应,且在两次随机接入过程中的发送数据包大小不同的 情况下,该两次随机接入过程的发送数据包大小所对应的数据内容可以不同;在两次随机接入过程中的发送数据包大小相同的情况下,该两次随机接入过程的发送数据包大小所对应的数据内容可以相同。
其中,上述数据内容可以用于发送第一消息,上述第一消息的具体表现形式可以基于随机接入过程的表现形式确定。示例性的,若随机接入过程为两步随机接入过程,则第一消息可以是两步随机接入过程中的MsgA;若随机接入过程为四步随机接入过程,则第一消息可以是四步随机接入过程中的Msg3。具体实现时,上述数据内容可以表现为MAC PDU,但不仅限于此。上述发送数据包大小可以根据上行授权信息确定。
因此,上述目标数据内容的具体表现形式可以根据第i次随机接入过程的发送数据包大小与第i-1次随机接入过程的发送数据包大小的比较结果确定。
场景一、比较结果为不同,即第i次随机接入过程的发送数据包大小与第i-1次随机接入过程的发送数据包大小不同。
可选地,发送第一数据内容中的第一数据,包括:
在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小不同的情况下,重新生成包括所述第一数据的第二数据内容,并发送所述第二数据内容。
在该场景中,由于所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小不同,可知,第i次随机接入过程的发送数据包大小对应的数据内容与第i-1次随机接入过程的发送数据包大小对应的数据内容不同。因此,终端可以重新生成包括第一数据的第二数据内容,并通过第二数据内容发送第一数据,从而可以提高发送第一数据的成功率。
可见,在场景一中,目标数据内容表现为第二数据内容,即第i次随机接入过程生成的数据内容。
在本实施例中,发送资源大小可以表现为TBS(Transport Block Size,传输块大小),因此,可选地,所述在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小不同的情况下,重新生成包括所述第一数据的第二数据内容,并发送所述第二数据内容,具体可以表现 为:
在所述第i次随机接入过程中使用的TBS与所述第i-1次随机接入过程中使用的TBS不同的情况下,重新生成包括所述第一数据的第二数据内容,并发送所述第二数据内容。
进一步地,所述重新生成包括所述第一数据的第二数据内容之后,所述发送所述第二数据内容之前,还包括:
缓存所述第二数据内容。
这样,当第i次随机接入过程失败,终端重新发起第i+1次随机接入过程时,可以发送第二数据内容中包括的数据,从而可以降低数据丢失率,提高数据传输的可靠性。
具体实现时,终端将第二数据内容缓存至第i次随机接入过程对应的缓存位置,将第一数据内容缓存至第i-1次随机接入过程对应的缓存位置。而在实际应用中,第i次随机接入过程对应的缓存位置与第i-1次随机接入过程对应的缓存位置可以相同,也可以不同。因此,所述第二数据内容的缓存位置与所述第一数据内容的缓存位置可以相同,也可以不同。
可选地,所述第二数据内容的缓存位置与所述第一数据内容的缓存位置相同或不相同。
具体地,在第i次随机接入过程和第i-1次随机接入过程属于同一类型的随机接入过程的情况下,第i次随机接入过程对应的缓存位置和第i-1次随机接入过程对应的缓存位置相同,第二数据内容的缓存位置与所述第一数据内容的缓存位置相同。示例性的,若第i次随机接入过程和第i-1次随机接入过程均为两步随机接入过程,则可以将第二数据内容存储至两步随机接入过程对应的缓存位置,第一RACH缓存位置或MsgA缓存位置。
在第i次随机接入过程和第i-1次随机接入过程不属于同一类型的随机接入过程,但第i次随机接入过程所属的随机接入过程类型与第i-1次随机接入过程所属的随机接入过程使用同一缓存位置存储数据内容的情况下,第i次随机接入过程对应的缓存位置和第i-1次随机接入过程对应的缓存位置相同,第二数据内容的缓存位置与所述第一数据内容的缓存位置相同。示例性的,若第i次随机接入过程和第i-1次随机接入过程中一个为两步随机接入过程, 另一个为四步随机接入过程,但两步随机接入过程与四步随机接入过程使用同一个缓存位置(如第二RACH缓存位置)存储数据内容,则可以将第二数据内容缓存至两步随机接入过程与四步随机接入过程对应的同一缓存位置中。
在第i次随机接入过程和第i-1次随机接入过程不属于同一类型的随机接入过程,且第i次随机接入过程所属的随机接入过程类型与第i-1次随机接入过程所属的随机接入过程使用不同缓存位置存储数据内容的情况下,第i次随机接入过程对应的缓存位置和第i-1次随机接入过程对应的缓存位置不同,第二数据内容的缓存位置与第一数据内容的缓存位置不同。示例性的,若第i次随机接入过程为两步随机接入过程,第i-1次随机接入过程为四步随机接入过程,且两步随机接入过程对应的缓存位置为MsgA缓存位置,四步随机接入过程对应的缓存位置为Msg3缓存位置,则可以将第二数据内容存储至Msg3缓存位置。
在本实施例中,UE可以通过多种方式发送第二数据内容。可选地,所述发送所述第二数据内容,包括:
将所述第二数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第二数据内容对应的协议层的底层发送所述第二数据内容。
具体实现时,在第i次随机接入过程为两步随机接入过程的情况下,若两步随机接入过程支持HARQ(Hybrid Automatic Repeat Request,混合自动重传请求)进行,则可以将第二数据内容存储于HARQ缓存中,通过HARQ进程进行发送;若两步随机接入过程不支持HARQ进程,则可以将第二数据内容发送至第二数据内容对应的协议层的底层,通过底层发送第二数据内容,示例性的,数据内容表现为MAC PDU,则第二数据内容对应的协议层为MAC层,通过物理层发送第二数据内容。
在第i次随机接入过程为四步随机接入过程或非竞争的随机竞争的情况下,可以将所述第二数据内容存储于HARQ缓存中,通过HARQ进程进行发送。
场景二、比较结果相同,即第i次随机接入过程的发送数据包大小与第i-1次随机接入过程的发送数据包大小相同。
可选地,所述发送第一数据内容中的第一数据,包括:
在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小相同的情况下,从所述第i-1次随机接入过程缓存所述第一数据内容的缓存位置中,取出并发送所述第一数据内容。
在该场景中,由于所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小相同,可知,第i次随机接入过程的发送数据包大小对应的数据内容与第i-1次随机接入过程的发送数据包大小对应的数据内容相同。因此,终端可以直接从所述第i-1次随机接入过程缓存所述第一数据内容的缓存位置中,取出并发送所述第一数据内容。这样,相比于场景一,可以直接通过第一数据内容发送第一数据,无需生成第二数据内容,可以简化操作。
可见,在场景二中,目标数据内容表现为第一数据内容,即第i-1次随机接入过程缓存的数据内容。
在场景二中,类似于场景一,可选地,所述在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小相同的情况下,从所述第i-1次随机接入过程缓存所述第一数据内容的缓存位置中,取出并发送所述第一数据内容,具体可以表现为:
在所述第i次随机接入过程中使用的TBS与所述第i-1次随机接入过程中使用的TBS不同的情况下,从所述第i-1次随机接入过程缓存所述第一数据内容的缓存位置中,取出并发送所述第一数据内容。
需要说明的是,在场景一中,UE从所述第i-1次随机接入过程缓存所述第一数据内容的缓存位置中,取出第一数据内容后,可以将第一数据内容存储至第i次随机接入过程对应的缓存位置中,这样,当第i次随机接入过程失败,终端重新发起第i+1次随机接入过程时,终端可以发送缓存的第一数据内容中包括的数据,从而可以降低数据丢失率,提高数据传输的可靠性。
应理解的是,第i次随机接入过程存储第一数据内容的缓存位置,与第i-1次随机接入过程存储第一数据内容的缓存位置可以相同,也可以不同,具体可以根据场景一中的相关描述,此处不再赘述。
另外,场景二中UE发送第一数据内容的方式与场景一中UE发送第二数 据内容的方式相同,具体可以参考场景二中相关内容的描述,此处不再赘述。
需要说明的是,本实施例中介绍的多种可选的实施方式,彼此可以相互结合实现,也可以单独实现,对此本公开实施例不作限定。
为方便理解,以下结合各实施方式进行说明。
实施方式一、第i-1次随机接入过程和第i次随机接入过程都可以是两步随机接入过程。
步骤0:当UE进行第i-1次随机接入过程尝试失败,则UE会在达到随机接入过程最大尝试次数前,再次进行随机接入过程尝试,即进行第i-1次随机接入过程尝试。
步骤1.1:UE在进行第i-1次随机接入过程尝试的时候,UE根据上行发送资源大小进行对应的处理后,再进行上行数据的发送。其中,UE的处理方法包括以下任意一种:
1)、当UE进行MsgA数据发送的资源大小没有变化(如,根据上行授权信息生成的TBS与前一次进行MsgA数据发送的TBS相同),则UE直接使用之前存储的第一数据内容(如,MAC PDU)进行MsgA数据发送。
2)、当UE进行MsgA数据发送的资源大小发生变化(如,根据上行授权信息生成的TBS与前一次进行MsgA数据发送的TBS相同不同,增加或减少),则UE重新生成第二数据内容,并将第二数据内容存储在两步随机接入过程对应的缓存位置中(如,RACH buffer或MsgA buffer),以及使用第二数据内容进行MsgA数据发送。
步骤1.2:根据两步随机接入过程的MsgA是否支持HARQ进程发送,UE的处理行为包括以下任意一种:
1)、如果两步随机接入过程的MsgA支持HARQ进程发送,则UE在进行MsgA数据发送的时候,UE在获取目标数据内容(第一数据内容或第二数据内容)后,将目标数据内容存储于HARQ缓存中,通过对应的HARQ进程进行发送。
2)、如果两步随机接入过程的MsgA不支持HARQ进程发送,则UE在进行MsgA数据发送的时候,UE在获取目标数据内容后,将目标数据内容发送给目标数据内容对应的协议层的底层进行数据发送(如,UE的MAC层从 MsgA Buffer中取出第一数据内容后,发送给物理层进行数据发送)。
实施方式二、第i-1次随机接入过程可以是两步随机接入过程,第i次随机接入过程可以是四步随机接入过程。
步骤0:当UE进行第i-1次随机接入过程尝试失败,则UE会在达到随机接入过程最大尝试次数前,再次进行随机接入过程尝试,即进行第i-1次随机接入过程尝试。
步骤1.1:UE在进行第i-1次随机接入过程尝试的时候,UE根据上行发送资源大小进行对应的处理后,再进行上行数据的发送。其中,UE的处理方法包括以下任意一种:
1)、当UE进行Msg3数据发送的资源大小没有变化(如,根据上行授权信息生成的TBS与前一次进行MsgA数据发送的TBS相同),则UE直接使用之前存储的第一数据内容(如,MAC PDU)进行Msg3数据发送。
2)、当UE进行Msg3数据发送的资源大小发生变化(如,根据上行授权信息生成的TBS与前一次进行MsgA数据发送的TBS相同不同,增加或减少),则UE重新生成第二数据内容,并使用第二数据内容进行Msg3数据发送。
额外地,在四步随机接入过程中,UE可以将两步随机接入过程中缓存的第一数据内容或重新生成的用于Msg3发送的第二数据内容,存储于“四步随机接入过程对应的缓存位置(如,Msg3Buffer)中。
或者,四步随机接入过程和两步随机接入过程使用同一个缓存位置(如,RACH buffer),存储随机接入过程中的用于上行发送的数据(如,2-step RACH的MsgA;4-step RACH的Msg3)。
步骤1.2:进行四步随机接入过程的Msg3数据发送时,UE在获取目标数据内容后,将目标数据内容存储于HARQ缓存中,通过对应的HARQ进程进行发送。
实施方式三、第i-1次随机接入过程可以是四步随机接入过程,第i次随机接入过程可以是两步随机接入过程。
步骤0:UE在进行第i-1次随机接入过程尝试的时候,UE根据上行发送资源大小进行对应的处理后,再进行上行数据的发送。其中,UE的处理方 法包括以下任意一种:
1)、当UE进行MsgA数据发送的资源大小没有变化(如,根据上行授权信息生成的TBS与前一次进行Msg3数据发送的TBS相同),则UE直接使用之前存储的第一数据内容(如,MAC PDU)进行Msg3数据发送。
2)、当UE进行MsgA数据发送的资源大小发生变化(如,根据上行授权信息生成的TBS与前一次进行Msg3数据发送的TBS相同不同,增加或减少),则UE重新生成第二数据内容,并使用第二数据内容进行MsgA数据发送。
额外地,在两步随机接入过程中,UE可以将四步随机接入过程中缓存的第一数据内容或重新生成的用于MsgA发送的第二数据内容,存储于两步随机接入过程对应的缓存(如,MsgA Buffer)中。
或者,四步随机接入过程和两步随机接入过程使用同一个缓存位置(如,RACH buffer),存储随机接入过程中的用于上行发送的数据(如,2-step RACH的MsgA;4-step RACH的Msg3)。
步骤1.2:UE的处理行为同实施方式一中UE的处理行为,此处不再赘述。
实施方式四、第i-1次随机接入过程可以是两步随机接入过程,第i次随机接入过程可以是非竞争随机接入过程。
步骤0:当UE进行第i-1次随机接入过程尝试失败,则UE会在达到随机接入过程最大尝试次数前,再次进行随机接入过程尝试,即进行第i-1次随机接入过程尝试。
步骤1.1:UE在进行第i-1次随机接入过程尝试的时候,UE根据上行发送资源大小进行对应的处理后,再进行上行数据的发送。其中,UE的处理方法包括以下任意一种:
1)、当UE进行非竞争随机接入过程后,Msg2中指定的数据发送的资源大小没有变化(如,根据上行授权信息生成的TBS与前一次进行MsgA数据发送的TBS相同),则UE直接使用之前存储的第一数据内容(如,MAC PDU)进行数据发送。
2)、当UE进行非竞争随机接入过程后,Msg2中指定的数据发送的资源 大小发生变化(如,根据上行授权信息生成的TBS与前一次进行MsgA数据发送的TBS相同不同,增加或减少),则UE重新生成第二数据内容,并使用第二数据内容进行数据发送。
步骤1.2:UE在获取目标数据内容后,将目标数据内容存储于HARQ缓存中,通过对应的HARQ进程进行发送。
在本公开实施例中,还提供了一种随机接入方法,用于确定UE对两步随机接入过程中生成的数据内容的处理行为。
请参阅图4,图4是本公开实施例提供的随机接入方法的流程图之二。如图4所示,本实施例的随机接入方法可以包括以下步骤:
步骤401、在两步随机接入过程中,生成所述两步随机接入过程中的第三数据内容,并缓存所述第三数据内容。
在本实施例中,上述两步随机接入过程可以是第N次随机接入过程尝试,为正整数。当N等于1时,上述两步随机接入过程为首次随机接入过程尝试。
具体实现时,UE将第三数据内容存储至两步随机接入过程对应的缓存位置中,如Msg3Buffer或RACH Buffer。
这样,当上述两步随机接入过程失败,终端重新发起第N+1次随机接入过程尝试时,终端可以发送缓存的第三数据内容中包括的数据,从而可以降低数据丢失率,提高数据传输的可靠性。
可选地,所述缓存所述第三数据内容之后,还包括:
将所述第三数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第三数据内容对应的协议层的底层发送所述第三数据内容。
其中,UE控制第三数据内容发送的方式,与图3对应的方法实施例的场景一中UE控制第二数据内容发送的方式相同,具体可以参考图3对应的方法实施例中相关内容的描述,此处不再赘述。
需要说明的是,本实施例中介绍的多种可选的实施方式,彼此可以相互结合实现,也可以单独实现,对此本公开实施例不作限定。
为方便理解,以下以两步随机接入过程是首次随机接入过程尝试为例进行说明。
步骤0:网络侧设备给UE配置两步随机接入的配置信息,如Msg1和 Msg2对应的发送资源信息。
步骤1.1:UE触发两步随机接入过程。将Msg1发送给网络侧设备,如通过PUSCH发送。
当首次进行两步随机接入过程的时候,UE生成用于两步随机接入过程的第三数据内容(如,MAC PDU),并将第三数据内容存储在两步随机接入过程对应的缓存位置(如,RACH Buffer或MsgA Buffer)中。
步骤1.2:根据两步随机接入过程的MsgA是否支持HARQ进程发送,UE的处理行为包括以下任意一种:
1)、如果两步随机接入过程的MsgA支持HARQ进程发送,则UE在进行MsgA数据发送的时候,UE在获取目标数据内容(第一数据内容或第二数据内容)后,将目标数据内容存储于HARQ缓存中,通过对应的HARQ进程进行发送。
2)、如果两步随机接入过程的MsgA不支持HARQ进程发送,则UE在进行MsgA数据发送的时候,UE在获取目标数据内容后,将目标数据内容发送给目标数据内容对应的协议层的底层进行数据发送(如,UE的MAC层从MsgA Buffer中取出第一数据内容后,发送给物理层进行数据发送)。
参见图5,图5是本公开实施例提供的终端的结构图之一。如图5所示,终端500包括:
第一发送模块501,用于在第i次随机接入过程中,发送第一数据内容中的第一数据;所述第一数据内容为第i-1次随机接入过程缓存的数据内容,所述第i次随机接入过程和第i-1次随机接入过程中的至少一个为两步随机接入过程,所述i为大于1的整数。
可选地,所述第一发送模块501,具体用于:
在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小相同的情况下,从所述第i-1次随机接入过程缓存所述第一数据内容的缓存位置中,取出并发送所述第一数据内容。
可选地,所述第一发送模块501,具体用于:
在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小不同的情况下,重新生成包括所述第一数据的第二数据 内容,并发送所述第二数据内容。
可选地,终端500还包括:
缓存模块,用于在重新生成包括所述第一数据的第二数据内容之后,所述发送所述第二数据内容之前,缓存所述第二数据内容。
可选地,所述第二数据内容的缓存位置与所述第一数据内容的缓存位置相同或不同。
可选地,所述第一发送模块501,具体用于:
在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小不同的情况下,重新生成包括所述第一数据的第二数据内容,将所述第二数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第二数据内容对应的协议层的底层发送所述第二数据内容。
需要说明的是,在本公开实施例中,图3对应的方法实施例与图4对应的方法实施例可以独立实现,也可以结合实现,对此本公开实施例不作限定。
终端500能够实现本公开图3对应的方法实施例中的各个过程,以及达到相同的有益效果,为避免重复,这里不再赘述。
参见图6,图6是本公开实施例提供的终端的结构图之二。如图6所示,终端600包括:
缓存模块601,用于在两步随机接入过程中,生成所述两步随机接入过程中的第三数据内容,并缓存所述第三数据内容。
可选地,终端600还包括:
第二发送模块,用于在缓存所述第三数据内容之后,将所述第三数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第三数据内容对应的协议层的底层发送所述第三数据内容。
终端600能够实现本公开图4对应的方法实施例中的各个过程,以及达到相同的有益效果,为避免重复,这里不再赘述。
请参考图7,图7是本公开实施例提供的终端的结构图之三,该终端可以为实现本公开各个实施例的一种终端的硬件结构示意图。如图7所示,终端700包括但不限于:射频单元701、网络模块702、音频输出单元703、输入单元704、传感器705、显示单元706、用户输入单元707、接口单元708、 存储器709、处理器710、以及电源711等部件。本领域技术人员可以理解,图7中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。在本公开实施例中,终端包括但不限于手机、平板电脑、笔记本电脑、掌上电脑、车载终端、可穿戴设备、以及计步器等。
其中,当终端700为能够实现本公开图3对应的方法实施例中的各个过程,以及达到相同的有益效果的终端时,射频单元701,用于:
在第i次随机接入过程中,发送第一数据内容中的第一数据;所述第一数据内容为第i-1次随机接入过程缓存的数据内容,所述第i次随机接入过程和第i-1次随机接入过程中的至少一个为两步随机接入过程,所述i为大于1的整数。
可选地,射频单元701,还用于:
在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小相同的情况下,从所述第i-1次随机接入过程缓存所述第一数据内容的缓存位置中,取出并发送所述第一数据内容。
可选地,射频单元701,还用于:
在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小不同的情况下,重新生成包括所述第一数据的第二数据内容,并发送所述第二数据内容。
可选地,处理器710,用于:
在重新生成包括所述第一数据的第二数据内容之后,发送所述第二数据内容之前,缓存所述第二数据内容。
可选地,所述第二数据内容的缓存位置与所述第一数据内容的缓存位置相同或不同。
可选地,射频单元701,还用于:
将所述第二数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第二数据内容对应的协议层的底层发送所述第二数据内容。
当终端700为能够实现本公开图4对应的方法实施例中的各个过程,以及达到相同的有益效果的终端时,处理器710,用于:
在两步随机接入过程中,生成所述两步随机接入过程中的第三数据内容,并缓存所述第三数据内容。
可选地,射频单元701,用于:
将所述第三数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第三数据内容对应的协议层的底层发送所述第三数据内容。
应理解的是,本公开实施例中,射频单元701可用于收发信息或通话过程中,信号的接收和发送,具体的,将来自基站的下行数据接收后,给处理器710处理;另外,将上行的数据发送给基站。通常,射频单元701包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元701还可以通过无线通信系统与网络和其他设备通信。
终端通过网络模块702为用户提供了无线的宽带互联网访问,如帮助用户收发电子邮件、浏览网页和访问流式媒体等。
音频输出单元703可以将射频单元701或网络模块702接收的或者在存储器709中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元703还可以提供与终端700执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元703包括扬声器、蜂鸣器以及受话器等。
输入单元704用于接收音频或视频信号。输入单元704可以包括图形处理器(Graphics Processing Unit,GPU)7041和麦克风7042,图形处理器7041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元706上。经图形处理器7041处理后的图像帧可以存储在存储器709(或其它存储介质)中或者经由射频单元701或网络模块702进行发送。麦克风7042可以接收声音,并且能够将这样的声音处理为音频数据。处理后的音频数据可以在电话通话模式的情况下转换为可经由射频单元701发送到移动通信基站的格式输出。
终端700还包括至少一种传感器705,比如光传感器、运动传感器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板7061的亮度,接近传感器 可在终端700移动到耳边时,关闭显示面板7061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别终端姿态(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;传感器705还可以包括指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等,在此不再赘述。
显示单元706用于显示由用户输入的信息或提供给用户的信息。显示单元706可包括显示面板7061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板7061。
用户输入单元707可用于接收输入的数字或字符信息,以及产生与终端的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元707包括触控面板7071以及其他输入设备7072。触控面板7071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板7071上或在触控面板7071附近的操作)。触控面板7071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器710,接收处理器710发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板7071。除了触控面板7071,用户输入单元707还可以包括其他输入设备7072。具体地,其他输入设备7072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
进一步地,触控面板7071可覆盖在显示面板7061上,当触控面板7071检测到在其上或附近的触摸操作后,传送给处理器710以确定触摸事件的类型,随后处理器710根据触摸事件的类型在显示面板7061上提供相应的视觉输出。虽然在图7中,触控面板7071与显示面板7061是作为两个独立的部件来实现终端的输入和输出功能,但是在某些实施例中,可以将触控面板7071与显示面板7061集成而实现终端的输入和输出功能,具体此处不做限定。
接口单元708为外部装置与终端700连接的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(I/O)端口、视频I/O端口、耳机端口等等。接口单元708可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接收到的输入传输到终端700内的一个或多个元件或者可以用于在终端700和外部装置之间传输数据。
存储器709可用于存储软件程序以及各种数据。存储器709可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器709可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
处理器710是终端的控制中心,利用各种接口和线路连接整个终端的各个部分,通过运行或执行存储在存储器709内的软件程序和/或模块,以及调用存储在存储器709内的数据,执行终端的各种功能和处理数据,从而对终端进行整体监控。处理器710可包括一个或多个处理单元;可选地,处理器710可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器710中。
终端700还可以包括给各个部件供电的电源711(比如电池),可选地,电源711可以通过电源管理系统与处理器710逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
另外,终端700包括一些未示出的功能模块,在此不再赘述。
可选地,本公开实施例还提供一种终端,包括处理器710,存储器709,存储在存储器709上并可在所述处理器710上运行的计算机程序,该计算机程序被处理器710执行时实现上述随机接入方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本公开实施例还提供一种计算机可读存储介质,计算机可读存储介质上 存储有计算机程序,该计算机程序被处理器执行时实现上述随机接入方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本公开各个实施例所述的方法。
上面结合附图对本公开的实施例进行了描述,但是本公开并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本公开的启示下,在不脱离本公开宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本公开的保护之内。

Claims (18)

  1. 一种随机接入方法,应用于终端,其中,所述随机接入方法包括:
    在第i次随机接入过程中,发送第一数据内容中的第一数据;所述第一数据内容为第i-1次随机接入过程缓存的数据内容,所述第i次随机接入过程和第i-1次随机接入过程中的至少一个为两步随机接入过程,所述i为大于1的整数。
  2. 根据权利要求1所述的方法,其中,所述发送第一数据内容中的第一数据,包括:
    在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小相同的情况下,从所述第i-1次随机接入过程缓存所述第一数据内容的缓存位置中,取出并发送所述第一数据内容。
  3. 根据权利要求1所述的方法,其中,所述发送第一数据内容中的第一数据,包括:
    在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小不同的情况下,重新生成包括所述第一数据的第二数据内容,并发送所述第二数据内容。
  4. 根据权利要求3所述的方法,其中,所述重新生成包括所述第一数据的第二数据内容之后,所述发送所述第二数据内容之前,还包括:
    缓存所述第二数据内容。
  5. 根据权利要求4所述的方法,其中,所述第二数据内容的缓存位置与所述第一数据内容的缓存位置相同或不同。
  6. 根据权利要求3至5中任一项所述的方法,其中,所述发送所述第二数据内容,包括:
    将所述第二数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第二数据内容对应的协议层的底层发送所述第二数据内容。
  7. 一种随机接入方法,应用于终端,其中,所述随机接入方法包括:
    在两步随机接入过程中,生成所述两步随机接入过程中的第三数据内容,并缓存所述第三数据内容。
  8. 根据权利要求7所述的方法,其中,所述缓存所述第三数据内容之后,还包括:
    将所述第三数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第三数据内容对应的协议层的底层发送所述第三数据内容。
  9. 一种终端,包括:
    第一发送模块,用于在第i次随机接入过程中,发送第一数据内容中的第一数据;所述第一数据内容为第i-1次随机接入过程缓存的数据内容,所述第i次随机接入过程和第i-1次随机接入过程中的至少一个为两步随机接入过程,所述i为大于1的整数。
  10. 根据权利要求9所述的终端,其中,所述第一发送模块,具体用于:
    在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小相同的情况下,从所述第i-1次随机接入过程缓存所述第一数据内容的缓存位置中,取出并发送所述第一数据内容。
  11. 根据权利要求9所述的终端,其中,所述第一发送模块,具体用于:
    在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小不同的情况下,重新生成包括所述第一数据的第二数据内容,并发送所述第二数据内容。
  12. 根据权利要求11所述的终端,还包括:
    缓存模块,用于在重新生成包括所述第一数据的第二数据内容之后,所述发送所述第二数据内容之前,缓存所述第二数据内容。
  13. 根据权利要求12所述的终端,其中,所述第二数据内容的缓存位置与所述第一数据内容的缓存位置相同或不同。
  14. 根据权利要求11至13中任一项所述的终端,其中,所述第一发送模块,具体用于:
    在所述第i次随机接入过程的发送数据包大小与所述第i-1次随机接入过程的发送数据包大小不同的情况下,重新生成包括所述第一数据的第二数据内容,将所述第二数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第二数据内容对应的协议层的底层发送所述第二数据内容。
  15. 一种终端,包括:
    缓存模块,用于在两步随机接入过程中,生成所述两步随机接入过程中的第三数据内容,并缓存所述第三数据内容。
  16. 根据权利要求15所述的终端,还包括:
    第二发送模块,用于在缓存所述第三数据内容之后,将所述第三数据内容存储于HARQ缓存中,通过HARQ进程进行发送;或者,通过所述第三数据内容对应的协议层的底层发送所述第三数据内容。
  17. 一种终端,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求1至6中任一项所述的随机接入方法的步骤,或者,如权利要求7或8所述的随机接入方法的步骤。
  18. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至6中任一项所述的随机接入方法的步骤,或者,如权利要求7或8所述的随机接入方法的步骤。
PCT/CN2019/098175 2018-09-18 2019-07-29 随机接入方法及终端 WO2020057262A1 (zh)

Priority Applications (8)

Application Number Priority Date Filing Date Title
CA3112923A CA3112923C (en) 2018-09-18 2019-07-29 Random access method and terminal
SG11202102609VA SG11202102609VA (en) 2018-09-18 2019-07-29 Random access method and terminal
JP2021514349A JP7385654B2 (ja) 2018-09-18 2019-07-29 ランダムアクセス方法及び端末
EP19863664.9A EP3855852A4 (en) 2018-09-18 2019-07-29 RANDOM ACCESS PROCESS, AND TERMINAL
KR1020217010828A KR102589489B1 (ko) 2018-09-18 2019-07-29 랜덤 액세스 방법 및 단말 장치
RU2021109159A RU2769097C1 (ru) 2018-09-18 2019-07-29 Способ произвольного доступа к данным и оконечное устройство для произвольного доступа к данным
AU2019342158A AU2019342158B2 (en) 2018-09-18 2019-07-29 Random access method and terminal
US17/199,118 US20210204329A1 (en) 2018-09-18 2021-03-11 Random access method and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811089695.X 2018-09-18
CN201811089695.XA CN110913498B (zh) 2018-09-18 2018-09-18 一种随机接入方法及终端

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/199,118 Continuation US20210204329A1 (en) 2018-09-18 2021-03-11 Random access method and terminal

Publications (1)

Publication Number Publication Date
WO2020057262A1 true WO2020057262A1 (zh) 2020-03-26

Family

ID=69813685

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/098175 WO2020057262A1 (zh) 2018-09-18 2019-07-29 随机接入方法及终端

Country Status (10)

Country Link
US (1) US20210204329A1 (zh)
EP (1) EP3855852A4 (zh)
JP (1) JP7385654B2 (zh)
KR (1) KR102589489B1 (zh)
CN (1) CN110913498B (zh)
AU (1) AU2019342158B2 (zh)
CA (1) CA3112923C (zh)
RU (1) RU2769097C1 (zh)
SG (1) SG11202102609VA (zh)
WO (1) WO2020057262A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113852989A (zh) * 2020-06-28 2021-12-28 华为技术有限公司 确定数据传输方式的方法及装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534565A (zh) * 2008-03-14 2009-09-16 华硕电脑股份有限公司 处理一竞争式随机存取程序的方法及其相关通讯装置
CN106385712A (zh) * 2015-07-27 2017-02-08 中兴通讯股份有限公司 一种数据传输方法及系统

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101514841B1 (ko) * 2007-08-10 2015-04-23 엘지전자 주식회사 효율적인 랜덤 액세스 재시도를 수행하는 방법
TWM355510U (en) 2008-01-04 2009-04-21 Interdigital Patent Holdings Apparatus for performing an enhanced random access channel procedure in a CELL_FACH state
CN101483892A (zh) * 2008-01-08 2009-07-15 华为技术有限公司 一种切换命令的发送方法及基站
KR100939722B1 (ko) * 2008-08-11 2010-02-01 엘지전자 주식회사 데이터 전송 방법 및 이를 위한 사용자 기기
KR100949972B1 (ko) * 2009-01-02 2010-03-29 엘지전자 주식회사 단말의 임의접속 수행 기법
CN101931516B (zh) 2009-06-25 2013-03-20 中兴通讯股份有限公司 一种无线链路控制层确认模式下快速重传的方法及装置
WO2011122904A2 (en) * 2010-04-01 2011-10-06 Samsung Electronics Co., Ltd. Enhanced random access mechanism in wireless communication system
CN103327637A (zh) * 2012-03-19 2013-09-25 上海贝尔股份有限公司 随机接入从小区的方法和接收数据的方法
WO2013187605A1 (ko) * 2012-06-15 2013-12-19 엘지전자 주식회사 무선 통신 시스템에서 단말 간 직접 통신을 위한 단말 검출 방법 및 이를 위한 장치
JP6346958B2 (ja) * 2014-02-16 2018-06-20 エルジー エレクトロニクス インコーポレイティド 無線通信システムにおけるアップリンクデータ転送方法及びそのための装置
WO2015137632A1 (en) * 2014-03-11 2015-09-17 Lg Electronics Inc. Method for allocating temporary identifier to terminal in random access procedure in wireless communication system and apparatus tehrefor
CN106576352A (zh) 2014-07-31 2017-04-19 华为技术有限公司 一种确定数据传输的方法及装置
WO2016163827A1 (ko) * 2015-04-08 2016-10-13 엘지전자 주식회사 무선 통신 시스템에서 단말의 사이드링크 단말 정보 전송 방법 및 상기 방법을 이용하는 단말
CN107041014A (zh) * 2016-02-03 2017-08-11 中国移动通信集团公司 一种随机接入方法、基站和终端
CN107872899B (zh) * 2016-09-23 2022-12-06 中兴通讯股份有限公司 一种随机接入方法、装置和设备
WO2018064367A1 (en) 2016-09-28 2018-04-05 Idac Holdings, Inc. Random access in next generation wireless systems
CN107889273B (zh) * 2016-09-30 2023-12-29 北京三星通信技术研究有限公司 随机接入的方法及相应设备
CN117042198A (zh) * 2016-10-07 2023-11-10 三星电子株式会社 用于基于增强竞争的随机接入程序的方法和装置
US20180124830A1 (en) * 2016-11-03 2018-05-03 Huawei Technologies Co., Ltd. Random access channel design, methods, and apparatus
CN108271275B (zh) * 2017-01-04 2021-02-05 电信科学技术研究院 一种竞争随机接入的方法和装置
CN108282899B (zh) * 2017-01-05 2020-03-06 电信科学技术研究院 一种两步竞争随机接入方法和装置
CN108282901B (zh) * 2017-01-06 2019-08-09 电信科学技术研究院 一种随机接入响应方法和装置
CN108282895B (zh) * 2017-01-06 2019-12-20 电信科学技术研究院 一种随机接入方法及终端
US10568007B2 (en) * 2017-03-22 2020-02-18 Comcast Cable Communications, Llc Handover random access
CN108093451B (zh) * 2018-01-30 2021-02-26 Oppo广东移动通信有限公司 随机接入的控制方法、装置及存储介质和移动终端

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534565A (zh) * 2008-03-14 2009-09-16 华硕电脑股份有限公司 处理一竞争式随机存取程序的方法及其相关通讯装置
CN106385712A (zh) * 2015-07-27 2017-02-08 中兴通讯股份有限公司 一种数据传输方法及系统

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GEMALTO N.V.: "R2-1712961: 2-Step RACH Support for Small Cells", 3GPP TSG-RAN WG2 # 100, 1 December 2017 (2017-12-01), XP051371815 *
LG ELECTRONICS: "R1-1808508: Initial Access and Mobility for NR Unlicensed Operation", 3GPP TSG RAN WGI MEETING #94, 24 August 2018 (2018-08-24), XP051515886 *

Also Published As

Publication number Publication date
SG11202102609VA (en) 2021-04-29
EP3855852A4 (en) 2021-12-08
AU2019342158A1 (en) 2021-05-13
CN110913498A (zh) 2020-03-24
KR20210057793A (ko) 2021-05-21
KR102589489B1 (ko) 2023-10-13
AU2019342158B2 (en) 2022-07-14
US20210204329A1 (en) 2021-07-01
EP3855852A1 (en) 2021-07-28
CA3112923C (en) 2023-07-25
RU2769097C1 (ru) 2022-03-28
JP2022500929A (ja) 2022-01-04
CA3112923A1 (en) 2020-03-26
JP7385654B2 (ja) 2023-11-22
CN110913498B (zh) 2021-07-06

Similar Documents

Publication Publication Date Title
US20210153259A1 (en) Random access method and related device
WO2021037148A1 (zh) 数据传输方法及终端
WO2019233283A1 (zh) 小区管理方法、触发条件配置方法、终端设备及网络侧设备
US11690122B2 (en) Connection re-establishment method and related device
WO2019154023A1 (zh) 波束失败恢复请求发送方法及用户设备
WO2021068876A1 (zh) 信息传输、接收方法、终端及网络侧设备
WO2020063852A1 (zh) 终端设备能力信息处理方法、终端设备及网络侧设备
WO2021228226A1 (zh) 随机接入处理方法和终端
US11219071B2 (en) System information transmission method and user terminal
WO2021175244A1 (zh) 授权和策略参数配置方法、终端及网络功能
WO2021136519A1 (zh) 随机接入报告的上报方法、终端及网络侧设备
WO2020057262A1 (zh) 随机接入方法及终端
WO2021031907A1 (zh) 非授权频段的随机接入消息发送方法和终端
WO2020029766A1 (zh) 随机接入方法及终端设备
CN111818655A (zh) 传输方法、终端和网络设备
WO2021088791A1 (zh) 波束失败恢复的确认方法、终端设备及存储介质
WO2021023219A1 (zh) 随机接入请求资源的选择方法、终端及网络设备
WO2021190543A1 (zh) 随机接入方法、随机接入处理方法、终端及网络设备
WO2020207436A1 (zh) 终端切换方法及通信设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19863664

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2101001342

Country of ref document: TH

ENP Entry into the national phase

Ref document number: 2021514349

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 3112923

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20217010828

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2019863664

Country of ref document: EP

Effective date: 20210419

ENP Entry into the national phase

Ref document number: 2019342158

Country of ref document: AU

Date of ref document: 20190729

Kind code of ref document: A