WO2020124598A1 - Procédé et dispositif d'accès aléatoire - Google Patents

Procédé et dispositif d'accès aléatoire Download PDF

Info

Publication number
WO2020124598A1
WO2020124598A1 PCT/CN2018/122864 CN2018122864W WO2020124598A1 WO 2020124598 A1 WO2020124598 A1 WO 2020124598A1 CN 2018122864 W CN2018122864 W CN 2018122864W WO 2020124598 A1 WO2020124598 A1 WO 2020124598A1
Authority
WO
WIPO (PCT)
Prior art keywords
pusch
random access
resource
rnti
message
Prior art date
Application number
PCT/CN2018/122864
Other languages
English (en)
Chinese (zh)
Inventor
徐伟杰
贺传峰
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2018/122864 priority Critical patent/WO2020124598A1/fr
Priority to PCT/CN2019/075125 priority patent/WO2020124763A1/fr
Priority to CN201980026333.2A priority patent/CN111989978B/zh
Publication of WO2020124598A1 publication Critical patent/WO2020124598A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • Embodiments of the present application relate to the field, and more specifically, to random access methods and devices.
  • the random access (Random Access, RA) process of the 5G system or New Radio (NR) system allows 2-step random access (2-step RA).
  • messages Message, abbreviated as "Msg" 1 and Msg 3 in the 4-step random access (4-step RA) process can be sent as the first message, and Send Msg2 and Msg4 in the 4-step random access process as the second message.
  • RNTI Radio Network Interconnect
  • Embodiments of the present application provide a random access method and device, which can effectively obtain RA-RNTI in a 2-step random access process.
  • a random access method including: a terminal device generating a first RA-RNTI according to RAPID and PUSCH resource information in a first message of a 2-step random access process.
  • the method further includes: the terminal device using the first RA-RNTI to scramble the PUSCH, and/or using the first RA-RNTI to descramble the 2-step random access process PDCCH in the second message.
  • a random access method which includes: a network device generating a first RA-RNTI according to RAPID and PUSCH resource information in a first message of a 2-step random access process.
  • the method further includes: the network device using the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process, and/or using the first The RA-RNTI descrambles the PUSCH.
  • a terminal device which can execute the method in the first aspect or any optional implementation manner of the first aspect.
  • the terminal device may include a functional module for performing the method in the first aspect or any possible implementation manner of the first aspect.
  • a network device which can execute the method in the second aspect or any optional implementation manner of the second aspect.
  • the network device may include a functional module for performing the method in the second aspect or any possible implementation manner of the second aspect.
  • a terminal device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a network device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a chip for implementing the above-mentioned first aspect or the method in any possible implementation manner of the first aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the first aspect or any possible implementation manner of the first aspect.
  • a chip for implementing the method in the second aspect or any possible implementation manner of the second aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer program product including computer program instructions, which cause the computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a computer program product including computer program instructions, which cause the computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a communication system including terminal equipment and network equipment.
  • the terminal device is used to generate the first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the first RA-RNTI is used to scramble the PUSCH, and/or to descramble the PDCCH in the second message of the 2-step random access process.
  • the network device is used to generate RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the RA-RNTI is used to scramble the physical downlink control channel PDCCH in the second message of the 2-step random access process, and/or to descramble the PUSCH.
  • the terminal device and the network device determine the first RA-RNTI according to the resource information of RAPID and PUSCH, so as to effectively obtain the RA-RNTI in the 2-step random access process.
  • the first RA-RNTI can uniquely identify the terminal device, thereby completing the descrambling of the first message and the second message in the 2-step random access process, further ensuring the effectiveness of the channel in the 2-step random access process transmission.
  • FIG. 1 is a schematic diagram of a possible wireless communication system applied in an embodiment of the present application.
  • FIG. 2 is a schematic flow interaction diagram of 4-step random access.
  • Figure 3 is a schematic process interaction diagram of 2-step random access
  • FIG. 4 is a schematic flowchart of a random access method according to an embodiment of the present application.
  • Figure 5 is a schematic flowchart of a random access method according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of the transmission of the first message in the 2-step random access process of the embodiment of the present application.
  • FIG. 7 is a schematic diagram of transmission of a second message in a 2-step random access process according to an embodiment of the present application.
  • FIG. 8 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 9 is a schematic block diagram of a network device according to an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • FIG. 12 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • GSM Global System
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • LTE-A Advanced Long Term Evolution
  • NR New Radio
  • NR Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • D2D Device to Device
  • M2M machine-to-machine
  • MTC machine-type communication
  • V2V vehicle-to-vehicle
  • the communication system in the embodiments of the present application may be applied in scenarios such as carrier aggregation (CA), dual connectivity (DC), and standalone (SA) networking.
  • CA carrier aggregation
  • DC dual connectivity
  • SA standalone networking
  • the wireless communication system 100 may include a network device 110.
  • the network device 110 may be a device that communicates with a terminal device.
  • the network device 110 can provide communication coverage for a specific geographic area, and can communicate with terminal devices located within the coverage area.
  • the network device 100 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system (Evolutional Node B, eNB or eNodeB), or the network side device in the NR system, or the wireless controller in the Cloud Radio Access Network (CRAN), or the network device can be a relay station, Incoming points, in-vehicle devices, wearable devices, network-side devices in next-generation networks, or network devices in future public land mobile networks (Public Land Mobile Network, PLMN), etc.
  • BTS Base Transceiver Station
  • NodeB, NB base station
  • LTE Long Term Evolutional Node B
  • eNB evolved Node B
  • eNodeB evolved base station
  • the network side device in the NR system
  • the wireless controller in the Cloud Radio Access Network or the network device can be a relay station, Incoming points,
  • the wireless communication system 100 further includes at least one terminal device 120 located within the coverage of the network device 110.
  • the terminal device 120 may be mobile or fixed.
  • the terminal device 120 may refer to an access terminal, user equipment (User Equipment, UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication Device, user agent, or user device.
  • User Equipment User Equipment
  • Access terminals can be cellular phones, cordless phones, Session Initiation Protocol (SIP) phones, wireless local loop (Wireless Local Loop, WLL) stations, personal digital processing (Personal Digital Assistant (PDA), wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in future 5G networks, or terminal devices in future evolved PLMNs, etc.
  • the terminal devices 120 may also perform terminal direct connection (Device to Device, D2D) communication.
  • the network device 110 may provide services to a cell, and the terminal device 120 communicates with the network device 110 through transmission resources (eg, frequency domain resources, or spectrum resources) used by the cell, and the cell may be the network device 110 (eg, base station)
  • the cell may belong to a macro base station, or a base station corresponding to a small cell (Small cell), where the small cell may include, for example, a metro cell, a micro cell, and a pico cell , Femtocells, etc.
  • These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • FIG. 1 exemplarily shows one network device and two terminal devices.
  • the wireless communication system 100 may include multiple network devices and each network device may include other numbers of terminal devices within the coverage area. The application examples do not limit this.
  • the wireless communication system 100 may further include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiments of the present application.
  • the terminal device After the cell search process, the terminal device has achieved downlink synchronization with the cell, so the terminal device can receive downlink data. However, the terminal device can perform uplink transmission only if it has achieved uplink synchronization with the cell.
  • the terminal device can establish a connection with the cell and obtain uplink synchronization through a random access procedure (Random Access Procedure, RAR). That is to say, through random access, the terminal device can obtain uplink synchronization, and obtain the unique identifier assigned to it by the network device, namely the Cell Radio Network Temporary Identity (C-RNTI). Therefore, random access can be applied not only in initial access, but also in the case where the user's uplink synchronization is lost. For ease of understanding, the random access process will be briefly described below in conjunction with FIGS. 2 and 3.
  • RAR Random Access Procedure
  • the random access process can usually be triggered by one of the following 6 types of trigger events:
  • the terminal equipment will enter the RRC connected state (RRC_CONNECTED) from the Radio Resource Control (RRC) idle state (RRC_IDLE state).
  • RRC Radio Resource Control
  • the terminal device When the terminal device needs to establish uplink synchronization with the new cell, it needs to initiate random access in the new cell.
  • the terminal equipment re-establishes a wireless connection after a radio link failure (Radio Link Failure, RLF) occurs.
  • RLF Radio Link Failure
  • the terminal device needs to reply (Acknowledgement, ACK) or negative response (Negative Acknowledgement, NACK).
  • the uplink In the RRC connected state, when the uplink data arrives, the uplink is in the "out-of-sync" state or no physical uplink control channel (Physical Uplink Control Channel, PUCCH) resources are available for scheduling request (SR) transmission.
  • PUCCH Physical Uplink Control Channel
  • the terminal device may initiate a random access procedure; Access (Channel, RACH) to replace the role of SR, then when the uplink is in the "out of sync" state, the terminal device can initiate a random access process.
  • Access Channel, RACH
  • Timing Advance In the RRC connected state, in order to locate, it is necessary to obtain the timing advance (TAming Advance).
  • random access may also be triggered due to RRC active state (RRC_INACTIVE) transition, requesting other system information (Other System Information), or beam failure recovery (beam failure recovery).
  • RRC_INACTIVE RRC active state
  • other system information Other System Information
  • beam failure recovery beam failure recovery
  • FIG. 2 is a flow interaction diagram of 4-step random access. As shown in Figure 2, the 4-step random access process may include the following four steps:
  • Step 1 The terminal device sends Msg1.
  • the terminal device sends Msg1 to the network device to tell the network device that the terminal device initiated a random access request.
  • the Msg1 carries a random access preamble (Random Access Preamble, RAP), or random access preamble, Preamble, preamble, etc.
  • RAP Random Access Preamble
  • Msg1 can also be used for network equipment to estimate the transmission delay between it and the terminal equipment and to calibrate the uplink time.
  • Step 2 The network device sends Msg2.
  • the network device After receiving the Msg1 sent by the terminal device, the network device sends Msg2, a random access response (Random Access Response, RAR) message, to the terminal device.
  • the Msg2 can be scrambled by a random access wireless network temporary identity (Random Access Radio Network Temporary Identity, RA-RNTI).
  • the terminal device can monitor the physical downlink control channel (Physical Downlink Control Channel, PDCCH) in the RAR window (RAR window) to receive the RAR message scrambled by the RA-RNTI, without considering the possible measurement interval (measurement gap) .
  • PDCCH Physical Downlink Control Channel
  • the terminal device may stop listening to the RAR message. Among them, the terminal device uses RA-RNTI to descramble the RAR message.
  • the RAR message may include corresponding messages for multiple terminal devices that send preambles, and the response message for each terminal device includes the random access preamble index (Random Access Preamble Identify, RAPID ), Msg3 resource allocation information, time advancement (TA) adjustment information, and temporary cell wireless network temporary identification (Temporary Cell-Radio Network Temporary Identity, TC-RNTI), etc.
  • RAPID Random Access Preamble Identify
  • Msg3 resource allocation information Msg3 resource allocation information
  • TA time advancement
  • TC-RNTI temporary cell wireless network temporary identification
  • the RAR message can be scheduled using a Download Control (Information, DCI) format (DCI) 1-0, and the PDCCH scheduling the RAR message can be scrambled using the above-mentioned RA-RNTI.
  • DCI Download Control
  • Step 3 The terminal device sends Msg3.
  • the terminal device After receiving the RAR message, the terminal device determines whether the RAR is its own RAR message. For example, the terminal device can use the preamble identifier to check. After determining that it is its own RAR message, it generates Msg3 at the RRC layer and sends The network device sends Msg3. It needs to carry the identification information of the terminal equipment.
  • the Msg 3 sent by the terminal device in step 3 in the 4-step random access process may include different content.
  • Msg3 includes an RRC connection request message (RRC Connection Request) generated by the RRC layer, which carries at least the non-access Stratum (NAS) identification information of the terminal device.
  • RRC Connection Request RRC Connection Request
  • NAS non-access Stratum
  • Msg3 can also carry, for example, a serving temporary mobile subscriber identity (Serving-Temporary Mobile Subscriber Identity, S-TMSI) or random number of the terminal device.
  • S-TMSI Serving-Temporary Mobile Subscriber Identity
  • Msg3 includes an RRC connection re-establishment request message (RRC Connection Re-establishment Request) generated by the RRC layer and does not carry any NAS message.
  • RRC Connection Re-establishment Request RRC Connection Re-establishment Request
  • Msg3 can also carry cell radio network temporary identifier (Cell Radio Network Identifier, C-RNTI) and protocol control information (Protocol Control Information, PCI).
  • C-RNTI Cell Radio Network Identifier
  • PCI Protocol Control Information
  • Msg3 includes an RRC handover confirmation message (RRC Handover Confirm) generated by the RRC layer, which carries the C-RNTI of the terminal device.
  • RRC Handover Confirm RRC handover confirmation message
  • Msg3 can also carry information such as Buffer Status Report (Buffer Status Report, BSR).
  • BSR Buffer Status Report
  • Msg3 needs to include at least the C-RNTI of the terminal device.
  • uplink transmission usually uses terminal device-specific information, such as C-RNTI to scramble data carried in an uplink shared channel (Uplink Shared Channel, UL-SCH). But at this time the conflict has not been resolved, so when scrambling Msg3 cannot be based on C-RNTI, but can only use TC-RNTI.
  • C-RNTI Uplink Shared Channel
  • Step 4. The network device sends Msg4.
  • the network device sends Msg4 to the terminal device, and the terminal device correctly receives Msg4 to complete Contention Resolution.
  • Msg 4 may carry the RRC connection establishment message.
  • the terminal device in step 3 will carry its own unique identification in Msg3, such as C-RNTI or identification information from the core network (such as S-TMSI or a random number), the network device will Carry the unique identification of the terminal equipment in Msg4 to designate the terminal equipment that won the competition. And other terminal devices that do not win in the contention resolution will re-initiate random access.
  • the PDCCH of Msg4 can be scrambled using TC-RNTI.
  • a 2-step random access method can also be used.
  • One possible method is to send the messages Msg1 and Msg3 in the 4-step random access process as the first message in the 2-step random access process; send the Msg2 and 4 in the 4-step random access process Msg4 is sent as the second message in the 2-step random access process.
  • the 2-step random access process may include the following two steps:
  • Step 1 The terminal device sends the first message.
  • the first message (also called “Msg A or New Msg 1 (New_Msg 1)) may include a preamble and uplink data.
  • the uplink data may be carried on an uplink channel, and the uplink channel may be, for example, a physical uplink shared channel (Physical Uplink Shared Channel, PUSCH).
  • the uplink channel may carry the identification information of the terminal device and the reason of the RRC request, for example.
  • the first message may carry some or all of the information carried in Msg1 and Msg3 in the 4-step random access process.
  • Step 2 The network device sends a second message.
  • the network device If the network device successfully receives the first message sent by the terminal device, it sends a second message to the terminal device.
  • the second message (also referred to as "Msg B or New Msg 2 (New_Msg 2)) may include conflict resolution information, C-RNTI allocation information, TA adjustment information, etc., for example.
  • the second message may carry some or all of the information carried in Msg 2 and Msg 4 during the 4-step random access process.
  • the second message carries conflict resolution information for a single terminal device (including information related to the identification of the terminal device sent by the terminal device in the first message), C-RNTI allocation information, TA adjustment information, etc.
  • the second message may also carry an RRC connection establishment message and so on.
  • FIG. 2 or FIG. 3 is merely an example. Since the two-step random access process has not yet entered the standardization stage, here is only introduced as an example in Figure 3, there are other possibilities for the definition of each random access message involved, and does not limit the two-step random access Other definitions of each random access message in the process. The method described in the embodiment of the present application is applicable to all other 2-step random access processes.
  • the network device can allocate wireless network temporary identification (Radio Network Temporary Identity, RNTI) information to the terminal device through Msg2, while in the 2-step random access process, the terminal device receives the second Before the message, the RNTI information configured by the network device may not be received, so the terminal device cannot be identified during the transmission of the first message and the second message, and the first message and the second message cannot be effectively transmitted.
  • RNTI Radio Network Temporary Identity
  • the embodiments of the present application provide a random access method, which can effectively obtain the RA-RNTI in the 2-step random access process, and further realize the effective transmission of the channel.
  • the first message and the second message in the 2-step random access process are also referred to as "Msg A or new Msg 1 (New_Msg 1)" and “Msg B or new Msg 2 (New_Msg 2)", the first message to the fourth message in the 4-step random access process are also called "Msg1, Msg2, Msg3, and Msg4", respectively.
  • MsgA may include some or all of the information carried in Msg1 and Msg3.
  • Msg B may include some or all of the information carried in Msg 2 and Msg 4.
  • the RA-RNTI in the 2-step random access process in the embodiment of the present application may be referred to as a first RA-RNTI or a new RA-RNTI (New_RA- RNTI), etc., not limited here.
  • FIG. 4 is a schematic flowchart of a random access method 400 according to an embodiment of the present application.
  • the method described in FIG. 4 may be executed by a terminal device, and the terminal device may be, for example, the terminal device 120 shown in FIG. 1.
  • the random access method 400 may include some or all of the following steps. among them:
  • the terminal device generates the first RA-RNTI according to the RAPID in the first message of the two-step random access process and the resource information of the physical uplink shared channel (Physical Uplink Shared Channel, PUSCH).
  • the physical uplink shared channel Physical Uplink Shared Channel, PUSCH
  • the method further includes 420.
  • the terminal device uses the first RA-RNTI to scramble the PUSCH in the first message; and/or, the terminal device uses the first RA-RNTI to descramble the second message of the 2-step random access process In the PDCCH.
  • the first message of the 2-step random access process may include, for example, a preamble and/or data channel.
  • the first message may carry some or all of the information in Msg1 and Msg3 in the 4-step random access process.
  • the data channel can be scrambled and descrambled using the first RA-RNTI, for example.
  • the first RA-RNTI may be used to descramble and schedule the data
  • the control channel of the channel is, for example, PDCCH.
  • the second message of the 2-step random access process includes, for example, a RAR message and/or a conflict resolution message.
  • the second message may carry some or all of the information in Msg 2 and Msg 4 during the 4-step random access process.
  • all the information can be carried in a data channel such as PDSCH, and the control channel for scheduling the data channel such as PDCCH can be scrambled and descrambled using the first RA-RNTI.
  • the terminal device may generate the first RA-RNTI according to the RAPID and/or PUSCH resource information in the first message of the 2-step random access process. And use the first RA-RNTI to scramble the PUSCH in the first message, and/or descramble the PDCCH in the second message of the 2-step random access process. Therefore, when the network device does not allocate the RNTI to the terminal device, the identification of the terminal device can be realized, and the channel can be added and descrambled to ensure the effective transmission of the channel in the 2-step random access process.
  • the terminal device may use the first RA-RNTI to descramble the cyclic redundancy check (Cyclic Redundancy Check, CRC) check bits of the PDCCH in the second message.
  • CRC Cyclic Redundancy Check
  • the terminal device may use the first RA-RNTI to scramble the encoded information bits on the PUSCH in the first message.
  • the "PDCCH in the second message" may be understood as that the PDCCH is used to schedule the PDSCH in the second message, that is, the PDCCH is used to schedule the bearer of RAR messages and/or PDSCH of the conflict resolution message.
  • the PDCCH used for scheduling the PDSCH in the second message is taken as a part of the second message, but the application is not limited to this, and the second message may also be considered to include only the data channel .
  • the resources of the PUSCH in the first message may include, for example, resources for transmitting the PUSCH and resources of demodulation reference signals (DMRS) corresponding to the PUSCH.
  • DMRS demodulation reference signals
  • the terminal device may randomly select a preamble for random access among multiple preambles. Since the terminal device randomly selects the preamble, different terminal devices can greatly reduce the probability of collision of preamble sequences while selecting among multiple preamble sequences. Alternatively, the terminal device may also select the preamble based on other methods.
  • one preamble can correspond to multiple PUSCH resources; one PUSCH resource can correspond to multiple preambles; or, there is a one-to-one correspondence between the preamble and PUSCH resources.
  • the terminal device may generate the first RA-RNTI according to RAPID.
  • the terminal device needs to generate the first RA-RNTI according to the RAPID and PUSCH resource information at the same time to ensure that the first RA-RNTI corresponding to the terminal device is unique.
  • the terminal device determines its corresponding first RA-RNTI according to the RAPID and PUSCH resource information, and uses the first RA-RNTI to scramble the first message in the 2-step random access process, and /Or, descramble the second message in the 2-step random access process. Therefore, when the network device does not allocate the RNTI to it, it can realize the identification of the terminal device, complete the addition and descrambling of the channel, and ensure the effective transmission of the channel in the 2-step random access process.
  • the resource information of the PUSCH includes the resource index of the PUSCH.
  • the resource index of the PUSCH is the resource number of the PUSCH resource in the multiple PUSCH resources in the first message.
  • the RAPID selected by the terminal device corresponds to N PUSCH resources, and the indexes of the N PUSCH resources are index 0, index 1, ..., and index N in this order. If the terminal device uses the second PUSCH resource among the N PUSCH resources, the resource index used to calculate the PUSCH used by the first RA-RNTI is index 1.
  • the terminal device generates the first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process, which includes: the terminal device according to the first message in the first message
  • the resource information of the RAPID and PUSCH and the resource information of the physical random access channel (Physical Random Access Channel, PRACH) used to send the preamble generate the first RA-RNTI.
  • PRACH Physical Random Access Channel
  • the PRACH resource information includes, for example, at least one of the following information: the position of the Orthogonal Frequency Division Multiplexing (OFDM) symbol occupied by the PRACH resource in the time domain, and the PRACH resource in the system frame The position of the time slot occupied in, the number of the resource occupied by the PRACH resource in the frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
  • OFDM Orthogonal Frequency Division Multiplexing
  • the terminal device may generate the first RA-RNTI based on the following formula:
  • the first RA-RNTI 1+PUSCH_index+PUSCH_number ⁇ RAP_id+PUSCH_number ⁇ preamble_number ⁇ s_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ t_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ slot_number ⁇ f_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ frequency_number ⁇ frequency_number ⁇ symbol_number
  • RAP_id is the index of the preamble sent by the terminal device, that is, RAPID, 0 ⁇ RAP_id ⁇ preamble_number
  • s_id is the first OFDM of the PRACH resource used to send the random access preamble Symbol, 0 ⁇ s_id ⁇ symbol_number
  • t_id is the index of the first slot of the PRACH resource used to send the random access preamble, 0 ⁇ t_id ⁇ slot_number
  • f_id is the PRACH resource in the frequency domain Resource number, 0 ⁇ f_id ⁇ frequency_number
  • preamble_number is the total number of preambles used for 2-step random access within a PRACH opportunity
  • PUSCH_number is the number of PUSCH resources corresponding to the preamble sent by the terminal device, where the current preamble and PUSCH resources are the same
  • PUSCH_number 1
  • symbol_number is the total possible index number of the starting symbol of PRACH occupation used in 2-step random access
  • slot_number is used in 2-step random access The total number of indexes of the first slot index in the slot where PRACHoccasion is located
  • frequency_number is the total number of frequency domain indexes of PRACHoccasion used in 2-step random access.
  • the terminal device may substitute its preamble index and PUSCH resource information into the formula according to the formula, so as to obtain the first RA-RNTI.
  • the first RA-RNTI 1+RAP_id+64 ⁇ s_id+64 ⁇ 14 ⁇ t_id+64 ⁇ 14 ⁇ 80 ⁇ f_id+64 ⁇ 14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id.
  • PUSCH_index, PUSCH_number, preamble_number, symbol_number, slot_number, frequency_number and other parameters may also be other values.
  • all or part of these parameter values may be determined and configured by the network device to the terminal device, or agreed in advance in the protocol; or, some of these parameter values may be determined and configured by the network device to the terminal device , And the value of another part of the parameter can be agreed by the agreement.
  • the RAP_id may be replaced by a synchronization signal block (Synchronizing Signal/PBCH Block, SSB or SS/PBCH Block) index (SSB index), so that the terminal device can
  • the first RA-RNTI is generated according to the SSB index and/or PUSCH resource information in the first message.
  • the terminal device may determine the RA-RNTI according to the following formula:
  • the first RA-RNTI 1+PUSCH_index+PUSCH_number ⁇ SSB_index+PUSCH_number ⁇ SSB_number ⁇ s_id+PUSCH_number ⁇ SSB_number ⁇ symbol_number ⁇ t_id+PUSCH_number ⁇ SSB_number ⁇ symbol_number ⁇ slot_number ⁇ f_id+PUSCH_number ⁇ SSB_number ⁇ symbol_number ⁇ frequency_number ⁇ symbol_number ⁇ frequency_number ⁇ symbol_number ⁇ symbol_number ⁇ frequency_number ⁇ symbol_number
  • SSB_index is the SSB index of the terminal device, 0 ⁇ SSB_index ⁇ SSB_number;
  • s_id is the first OFDM symbol of the PRACH resource used to send the random access preamble, 0 ⁇ s_id ⁇ symbol_number;
  • t_id is the index of the first slot of the PRACH resource used to send the random access preamble, 0 ⁇ t_id ⁇ slot_number;
  • f_id is the resource number of the PRACH resource in the frequency domain, 0 ⁇ f_id ⁇ frequency_number;
  • ul_carrier_id
  • SSB_number is the total number of SSB indexes used in an SSB cluster set (SSB burst);
  • symbol_number is the total possible index number of the starting symbol of the PRACH occupation used in 2-step random access, slot_number is the PRACH occupation used in 2-step random access
  • the total index number of the first slot index in the slot where frequency is; frequency_number is the total number of frequency domain indexes of the PRACHoccasion used for 2-step random access.
  • FIG. 5 is a schematic flowchart of a random access method 500 according to an embodiment of the present application.
  • the method described in FIG. 5 may be performed by a network device, and the network device may be, for example, the network device 110 shown in FIG. 1.
  • the random access method 500 may include some or all of the following steps. among them:
  • the network device generates the first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the method further includes 520.
  • the network device uses the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process; and/or, the network device uses the first RA-RNTI to descramble the PUSCH.
  • the network device may generate the first RA-RNTI according to the RAPID and/or PUSCH resource information in the first message of the 2-step random access process. And use the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process, and/or use the first RA-RNTI to descramble the PUSCH. Therefore, when the network device does not allocate the RNTI to the terminal device, the identification of the terminal device can be realized, and the channel can be added and descrambled to ensure the effective transmission of the channel in the 2-step random access process.
  • the network device may use the first RA-RNTI to scramble the CRC check bits of the PDCCH in the second message. For example, after encoding the original information of the PDCCH, the network device performs a CRC check on the encoded information through a CRC check code, and uses the first RA-RNTI to scramble the CRC check bits of the PDCCH.
  • the network device may use the first RA-RNTI to descramble the encoded information bits on the PUSCH in the first message.
  • the first RA-RNTI may be used to scramble to schedule the data
  • the control channel of the channel is, for example, PDCCH.
  • the PUSCH resources in the first message may include, for example, resources for transmitting the PUSCH and DMRS resources corresponding to the PUSCH.
  • one preamble can correspond to multiple PUSCH resources; one PUSCH resource can correspond to multiple preambles; or, there is a one-to-one correspondence between the preamble and PUSCH resources.
  • the network device may generate the first RA-RNTI according to the RAPID in the first message.
  • the network device needs to generate the first RA-RNTI according to the RAPID and PUSCH resource information at the same time, to ensure that the first RA-RNTI corresponding to the terminal device is unique.
  • the resource information of the PUSCH includes the resource index of the PUSCH.
  • the resource index of the PUSCH is the resource number of the PUSCH resource in the multiple PUSCH resources in the first message.
  • the RAPID selected by the terminal device corresponds to N PUSCH resources, and the indexes of the N PUSCH resources are index 0, index 1, ..., and index N in this order. If the terminal device uses the first PUSCH resource among the N PUSCH resources, the resource index used by the network device to calculate the PUSCH used by the first RA-RNTI is index 0.
  • the network device generates the first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process, including: the network device according to the RAPID and PUSCH in the first message The resource information of PR and the resource information of PRACH used to transmit the preamble, to generate the first RA-RNTI.
  • the PRACH resource information includes at least one of the following information: the position of the OFDM symbol occupied by the PRACH resource in the time domain, the position of the time slot occupied by the PRACH resource in the system frame, and the PRACH resource at The number of resources occupied in the frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
  • the network device may generate the first RA-RNTI based on the following formula:
  • the first RA-RNTI 1+PUSCH_index+PUSCH_number ⁇ RAP_id+PUSCH_number ⁇ preamble_number ⁇ s_id+PUSCH_number ⁇ preamble_number ⁇ symbol_nu mber ⁇ t_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ slot_number ⁇ f_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ symbol_number ⁇ symbol_number ⁇ symbol_number ⁇ symbol .
  • Figure 6 shows a schematic diagram of the transmission of the first message in the 2-step random access process.
  • the terminal device determines the first RA-RNTI
  • the terminal device uses the first RA-RNTI to scramble the PUSCH in the first message in the 2-step random access process;
  • the terminal device sends the first message to the network device
  • the network device receives the first message
  • the network device determines the first RA-RNTI
  • the network device uses the first RA-RNTI to descramble the PUSCH in the first message.
  • FIG. 7 is a schematic diagram of the transmission of the second message in the 2-step random access process.
  • the network device determines the first RA-RNTI
  • the network device uses the first RA-RNTI to scramble the PDCCH in the second message in the 2-step random access process, where the PDCCH is used to schedule the PDSCH in the second message;
  • the network device sends the second message to the terminal device
  • the terminal device receives the second message
  • the terminal device determines the first RA-RNTI
  • the terminal device uses the first RA-RNTI to descramble the PUSCH in the second message.
  • both the PUSCH in the first message and the PDCCH in the second message may use the first RA-RNTI for scrambling and scrambling, that is, the same RA-RNTI is used for the first message and the second
  • the channels in the two messages are scrambled and descrambled.
  • the first message and the second message can be transmitted between the terminal device and the network device according to the methods shown in FIGS. 6 and 7.
  • the PDCCH in the second message may be scrambled and descrambled using the first RA-RNTI.
  • the PUSCH in the first message can use the RA-RNTI in the 4-step random access process.
  • the RA-RNTI in the 4-step random access process is, for example:
  • RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id.
  • the terminal device may determine the first RA-RNTI based on the RAPID and PUSCH resource information, or may obtain the first RA-RNTI from the network device. For example, the network device determines the first RA-RNTI according to the resource information of RAPID and PUSCH, and notifies the terminal device. This embodiment of the present application does not limit this.
  • the method of the embodiment of the present application may be applied to each random access process rather than just the initial access process. Moreover, the method of the embodiment of the present application can be applied to a contention-based random access procedure (contention-based RACH) and a non-contention-based random access procedure (contention-free RACH).
  • contention-based RACH contention-based random access procedure
  • contention-free RACH non-contention-based random access procedure
  • the size of the sequence numbers of the above processes does not mean that the execution order is sequential, and the execution order of each process should be determined by its function and inherent logic, and should not correspond to the implementation process of the embodiments of the present application Constitute any limitation.
  • the terminal device 800 includes a processing unit 810, and the processing unit 810 is configured to:
  • the first RA-RNTI is generated according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the processing unit 810 is further configured to: use the first RA-RNTI to scramble the PUSCH; and/or use the first RA-RNTI to descramble the second step of the 2-step random access process PDCCH in two messages.
  • the terminal device and the network device determine the first RA-RNTI according to the resource information of RAPID and PUSCH, so as to effectively obtain the RA-RNTI in the 2-step random access process.
  • the first RA-RNTI can uniquely identify the terminal device, thereby completing the descrambling of the first message and the second message in the 2-step random access process, further ensuring the effectiveness of the channel in the 2-step random access process transmission.
  • the processing unit is specifically configured to generate the first RA-RNTI according to the resource information of RAPID and PUSCH in the first message and the resource information of PRACH used to send a preamble.
  • the PRACH resource information includes at least one of the following information: the position of the OFDM symbol occupied by the PRACH resource in the time domain, the position of the time slot occupied by the PRACH resource in the system frame, and The number of the resource occupied by the PRACH resource in the frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
  • the resource information of the PUSCH includes the resource index of the PUSCH.
  • the resource index of the PUSCH is the resource number of the PUSCH resource in the multiple PUSCH resources.
  • the resources of the PUSCH include resources for transmitting the PUSCH and resources of the DMRS corresponding to the PUSCH.
  • terminal device may perform the corresponding operation performed by the terminal device in the method of the embodiment of the present application, and for the sake of brevity, details are not described here.
  • FIG. 9 is a schematic block diagram of a network device 900 according to an embodiment of the present application.
  • the network device 900 includes a processing unit 910, and the processing unit 910 is configured to:
  • the first RA-RNTI is generated according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the processing unit 910 is further configured to: use the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process; and/or use the first RA- The RNTI descrambles the PUSCH.
  • the terminal device and the network device determine the first RA-RNTI according to the resource information of RAPID and PUSCH, so as to effectively obtain the RA-RNTI in the 2-step random access process.
  • the first RA-RNTI can uniquely identify the terminal device, thereby completing the descrambling of the first message and the second message in the 2-step random access process, further ensuring the effectiveness of the channel in the 2-step random access process transmission.
  • the processing unit is specifically configured to generate the first RA-RNTI according to the RAPID and PUSCH resource information in the first message and PRACH resource information.
  • the PRACH resource information includes at least one of the following information: the position of the OFDM symbol occupied by the PRACH resource in the time domain, the position of the time slot occupied by the PRACH resource in the system frame, and The number of the resource occupied by the PRACH resource in the frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
  • the resource information of the PUSCH includes the resource index of the PUSCH.
  • the resource index of the PUSCH is the resource number of the PUSCH resource in the multiple PUSCH resources.
  • the resources of the PUSCH include resources for transmitting the PUSCH and resources of a demodulation reference signal DMRS corresponding to the PUSCH.
  • the network device may perform the corresponding operations performed by the network device in the method of the embodiments of the present application, and for the sake of brevity, no further details are provided here.
  • FIG. 10 is a schematic structural diagram of a communication device 1000 provided by an embodiment of the present application.
  • the communication device 1000 shown in FIG. 10 includes a processor 1010, and the processor 1010 can call and run a computer program from a memory to implement the method in the embodiments of the present application.
  • the communication device 1000 may further include a memory 1020.
  • the processor 1010 can call and run a computer program from the memory 1020 to implement the method in the embodiments of the present application.
  • the memory 1020 may be a separate device independent of the processor 1010, or may be integrated in the processor 1010.
  • the communication device 1000 may further include a transceiver 1030, and the processor 1010 may control the transceiver 1030 to communicate with other devices, specifically, may send information or data to other devices, or receive other Information or data sent by the device.
  • the processor 1010 may control the transceiver 1030 to communicate with other devices, specifically, may send information or data to other devices, or receive other Information or data sent by the device.
  • the transceiver 1030 may include a transmitter and a receiver.
  • the transceiver 1030 may further include antennas, and the number of antennas may be one or more.
  • the communication device 1000 may specifically be a terminal device according to an embodiment of the present application, and the communication device 1000 may implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application. .
  • the communication device 1000 may specifically be a network device according to an embodiment of the present application, and the communication device 1000 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. .
  • FIG. 11 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the chip 1100 shown in FIG. 11 includes a processor 1110, and the processor 1110 can call and run a computer program from the memory to implement the method in the embodiments of the present application.
  • the chip 1100 may further include a memory 1120.
  • the processor 1110 can call and run the computer program from the memory 1120 to implement the method in the embodiments of the present application.
  • the memory 1120 may be a separate device independent of the processor 1110, or may be integrated in the processor 1110.
  • the chip 1100 may further include an input interface 1130.
  • the processor 1110 can control the input interface 1130 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
  • the chip 1100 may further include an output interface 1140.
  • the processor 1110 can control the output interface 1140 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
  • the chip can be applied to the terminal device in the embodiments of the present application, and the chip can implement the corresponding process implemented by the terminal device in each method of the embodiments of the present application.
  • the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the chip described in the embodiments of the present application may also be referred to as a system-level chip, a system chip, a chip system, or a system-on-chip chip.
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capabilities.
  • each step of the foregoing method embodiment may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the aforementioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an existing programmable gate array (Field Programmable Gate Array, FPGA), or other available Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application may be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied and executed by a hardware decoding processor, or may be executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a mature storage medium in the art, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, and registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electronically Erasable programmable read only memory (Electrically, EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • Synchlink DRAM SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiments of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous Dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data) SDRAM (DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic Random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on.
  • static random access memory static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous Dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • double data SDRAM double data rate synchronous dynamic random access memory
  • DDR SDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • synchronous connection dynamic Random access memory switch link DRAM, SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • FIG. 12 is a schematic block diagram of a communication system 1200 according to an embodiment of the present application. As shown in FIG. 12, the communication system 1200 includes a terminal device 1210 and a network device 1220.
  • the terminal device 1210 is configured to: generate a first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process; use the first RA-RNTI to scramble the PUSCH, and/or, use the first RA-RNTI to descramble the PDCCH in the second message of the 2-step random access process.
  • the network device 1220 is configured to: generate a first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process; use the first RA-RNTI to scramble the 2 steps The PDCCH in the second message of the random access process, and/or, descrambles the PUSCH using the first RA-RNTI.
  • the terminal device 1210 may be used to implement the corresponding functions implemented by the terminal device in the method of the embodiment of the present application, and the composition of the terminal device 1210 may be as shown in the terminal device 800 in FIG. 8, for simplicity, here No longer.
  • the network device 1220 may be used to implement the corresponding functions implemented by the network device in the method of the embodiments of the present application, and the composition of the network device 1220 may be as shown in the network device 900 in FIG. 9, for simplicity, here No longer.
  • Embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium can be applied to the network device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding process implemented by the network device in each method of the embodiments of the present application.
  • the computer-readable storage medium can be applied to the terminal device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. Repeat.
  • An embodiment of the present application also provides a computer program product, including computer program instructions.
  • the computer program product can be applied to the network device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program product can be applied to the terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application. Repeat again.
  • An embodiment of the present application also provides a computer program.
  • the computer program can be applied to the network device in the embodiment of the present application.
  • the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. And will not be repeated here.
  • the computer program can be applied to the terminal device in the embodiments of the present application.
  • the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. And will not be repeated here.
  • system and "network” in the embodiments of the present invention are often used interchangeably herein.
  • the term “and/or” in this article is just an association relationship that describes an associated object, which means that there can be three kinds of relationships, for example, A and/or B, which can mean: A exists alone, A and B exist at the same time, exist alone B these three cases.
  • the character "/" in this article generally indicates that the related objects before and after are in an "or” relationship.
  • B corresponding to (corresponding to) A means that B is associated with A, and B can be determined according to A.
  • determining B based on A does not mean determining B based on A alone, and B may also be determined based on A and/or other information.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or may Integration into another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical, or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
  • the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé d'accès aléatoire apte à réaliser une transmission de canal efficace dans un processus d'accès aléatoire en deux étapes. Le procédé comprend les étapes suivantes : un dispositif de réseau génère un premier identificateur temporaire de réseau radio à accès aléatoire (RA-RNTI) selon un indice de préambule d'accès aléatoire (RAPID) et des informations de ressource d'un canal physique partagé de liaison montante (PUSCH) dans un premier message transmis dans un processus d'accès aléatoire en deux étapes ; et le dispositif de réseau utilise le premier RA-RNTI pour embrouiller un canal physique partagé de liaison descendante (PDCCH) dans un second message transmis dans le processus d'accès aléatoire en 2 étapes, et/ou utilise le premier RA-RNTI pour désembrouiller le PUSCH.
PCT/CN2018/122864 2018-12-21 2018-12-21 Procédé et dispositif d'accès aléatoire WO2020124598A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/CN2018/122864 WO2020124598A1 (fr) 2018-12-21 2018-12-21 Procédé et dispositif d'accès aléatoire
PCT/CN2019/075125 WO2020124763A1 (fr) 2018-12-21 2019-02-14 Procédé et dispositif d'accès aléatoire
CN201980026333.2A CN111989978B (zh) 2018-12-21 2019-02-14 随机接入的方法和设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/122864 WO2020124598A1 (fr) 2018-12-21 2018-12-21 Procédé et dispositif d'accès aléatoire

Publications (1)

Publication Number Publication Date
WO2020124598A1 true WO2020124598A1 (fr) 2020-06-25

Family

ID=71099975

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2018/122864 WO2020124598A1 (fr) 2018-12-21 2018-12-21 Procédé et dispositif d'accès aléatoire
PCT/CN2019/075125 WO2020124763A1 (fr) 2018-12-21 2019-02-14 Procédé et dispositif d'accès aléatoire

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/075125 WO2020124763A1 (fr) 2018-12-21 2019-02-14 Procédé et dispositif d'accès aléatoire

Country Status (2)

Country Link
CN (1) CN111989978B (fr)
WO (2) WO2020124598A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3860273A4 (fr) * 2018-10-12 2021-12-15 Huawei Technologies Co., Ltd. Procédé et appareil de traitement d'informations

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111757503A (zh) * 2019-03-28 2020-10-09 北京三星通信技术研究有限公司 一种资源确定方法和装置
CN115515249A (zh) * 2021-06-22 2022-12-23 华为技术有限公司 一种随机接入方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106105366A (zh) * 2014-03-11 2016-11-09 Lg 电子株式会社 在无线通信系统中在随机接入过程中将临时标识符分配给终端的方法及其装置
WO2018085428A1 (fr) * 2016-11-01 2018-05-11 Qualcomm Incorporated Procédure d'accès aléatoire en deux étapes
CN108282902A (zh) * 2017-01-06 2018-07-13 北京三星通信技术研究有限公司 随机接入方法、基站和用户设备
US20180205516A1 (en) * 2017-01-13 2018-07-19 Motorola Mobility Llc Method and Apparatus for Performing Contention Based Random Access in a Carrier Frequency

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108076532A (zh) * 2016-11-14 2018-05-25 北京信威通信技术股份有限公司 一种随机接入方法
CN108282901B (zh) * 2017-01-06 2019-08-09 电信科学技术研究院 一种随机接入响应方法和装置
US10568007B2 (en) * 2017-03-22 2020-02-18 Comcast Cable Communications, Llc Handover random access

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106105366A (zh) * 2014-03-11 2016-11-09 Lg 电子株式会社 在无线通信系统中在随机接入过程中将临时标识符分配给终端的方法及其装置
WO2018085428A1 (fr) * 2016-11-01 2018-05-11 Qualcomm Incorporated Procédure d'accès aléatoire en deux étapes
CN108282902A (zh) * 2017-01-06 2018-07-13 北京三星通信技术研究有限公司 随机接入方法、基站和用户设备
US20180205516A1 (en) * 2017-01-13 2018-07-19 Motorola Mobility Llc Method and Apparatus for Performing Contention Based Random Access in a Carrier Frequency

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
INTERDIGITAL: "2-Step RACH Procedure", 3GPP TSG-RAN WG2 MEETING # 103BIS, R2-1814008, 12 October 2018 (2018-10-12), XP051523471 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3860273A4 (fr) * 2018-10-12 2021-12-15 Huawei Technologies Co., Ltd. Procédé et appareil de traitement d'informations

Also Published As

Publication number Publication date
CN111989978A (zh) 2020-11-24
CN111989978B (zh) 2022-03-18
WO2020124763A1 (fr) 2020-06-25

Similar Documents

Publication Publication Date Title
WO2020020270A1 (fr) Procédé d'accès aléatoire, et dispositif de communication
CN111869306B (zh) 随机接入的方法、终端设备和网络设备
CN113490288B (zh) 随机接入的方法、设备和计算机可读存储介质
CN112806088B (zh) 随机接入方法、终端设备和网络设备
WO2020124598A1 (fr) Procédé et dispositif d'accès aléatoire
CN111972032B (zh) 随机接入的方法和设备
WO2020210963A1 (fr) Procédé et dispositif de transmission de message
WO2021077343A1 (fr) Procédé de communication sans fil et dispositif terminal
WO2022067519A1 (fr) Procédés et terminaux d'accès aléatoire
CN113812191B (zh) 发送或接收反馈信息的方法和装置
CN112997575B (zh) 无线通信方法、终端设备和网络设备
CN113115423B (zh) 控制功率攀升计数器的方法和终端设备
US20240080817A1 (en) Wireless communication method, terminal device, and network device
US20220225433A1 (en) Wireless communication method, terminal device, and network device
KR20220035874A (ko) 무선 통신 방법, 단말 장치 및 네트워크 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18943794

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18943794

Country of ref document: EP

Kind code of ref document: A1