WO2020124763A1 - Procédé et dispositif d'accès aléatoire - Google Patents

Procédé et dispositif d'accès aléatoire Download PDF

Info

Publication number
WO2020124763A1
WO2020124763A1 PCT/CN2019/075125 CN2019075125W WO2020124763A1 WO 2020124763 A1 WO2020124763 A1 WO 2020124763A1 CN 2019075125 W CN2019075125 W CN 2019075125W WO 2020124763 A1 WO2020124763 A1 WO 2020124763A1
Authority
WO
WIPO (PCT)
Prior art keywords
pusch
message
resource
rnti
random access
Prior art date
Application number
PCT/CN2019/075125
Other languages
English (en)
Chinese (zh)
Inventor
徐伟杰
贺传峰
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN201980026333.2A priority Critical patent/CN111989978B/zh
Publication of WO2020124763A1 publication Critical patent/WO2020124763A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • Embodiments of the present application relate to the field of communications, and more specifically, to random access methods and devices.
  • the random access (Random Access, RA) process of the 5G system or New Radio (NR) system allows 2-step random access (2-step RA).
  • messages Message, abbreviated as "Msg" 1 and Msg 3 in the 4-step random access (4-step RA) process can be sent as the first message, and Send Msg2 and Msg4 in the 4-step random access process as the second message.
  • RNTI Radio Network Interconnect
  • Embodiments of the present application provide a random access method and device, which can effectively obtain RA-RNTI in a 2-step random access process.
  • a random access method including: a terminal device generating a first RA-RNTI according to RAPID and PUSCH resource information in a first message of a 2-step random access process.
  • the method further includes: the terminal device using the first RA-RNTI to scramble the PUSCH, and/or using the first RA-RNTI to descramble the 2-step random access process PDCCH in the second message.
  • a random access method which includes: a network device generating a first RA-RNTI according to RAPID and PUSCH resource information in a first message of a 2-step random access process.
  • the method further includes: the network device using the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process, and/or using the first The RA-RNTI descrambles the PUSCH.
  • a random access method including: a terminal device generating a first RA-RNTI according to PUSCH resource information in a first message of a 2-step random access process.
  • the method further includes: the terminal device generating a scrambling code sequence according to the first RA-RNTI, and scrambling the PUSCH in the first message using the scrambling code sequence; and/ Or, the terminal device uses the first RA-RNTI to descramble the PDCCH in the second message of the 2-step random access process.
  • a random access method which includes: a network device generating a first RA-RNTI according to PUSCH resource information in a first message of a 2-step random access process.
  • the method further includes: the network device using the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process; and/or the network device according to The first RA-RNTI generates a scrambling code sequence, and uses the scrambling code sequence to descramble the PUSCH in the first message.
  • a terminal device which can execute the method in the first aspect or any optional implementation manner of the first aspect.
  • the terminal device may include a functional module for performing the method in the first aspect or any possible implementation manner of the first aspect.
  • a network device which can execute the method in the second aspect or any optional implementation manner of the second aspect.
  • the network device may include a functional module for performing the method in the second aspect or any possible implementation manner of the second aspect.
  • a terminal device which can execute the method in the third aspect or any optional implementation manner of the third aspect.
  • the terminal device may include a functional module for performing the method in the third aspect or any possible implementation manner of the third aspect.
  • a network device which can execute the method in the fourth aspect or any optional implementation manner of the fourth aspect.
  • the network device may include a functional module for performing the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a terminal device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a network device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to perform the method in the second aspect or any possible implementation manner of the second aspect.
  • a terminal device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the third aspect or any possible implementation manner of the third aspect.
  • a network device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a chip for implementing the method in the first aspect or any possible implementation manner of the first aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the first aspect or any possible implementation manner of the first aspect.
  • a chip for implementing the method in the second aspect or any possible implementation manner of the second aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the second aspect or any possible implementation manner of the second aspect.
  • a chip for implementing the method in the third aspect or any possible implementation manner of the third aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the third aspect or any possible implementation manner of the third aspect.
  • a chip for implementing the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • the chip includes a processor for calling and running a computer program from the memory, so that the device installed with the chip executes the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a computer program product including computer program instructions that cause a computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a computer program product including computer program instructions that cause a computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer program product including computer program instructions that cause a computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
  • a computer program product which includes computer program instructions, which cause the computer to execute the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the third aspect or any possible implementation manner of the third aspect.
  • a computer program which when run on a computer, causes the computer to execute the method in the fourth aspect or any possible implementation manner of the fourth aspect.
  • a communication system including a terminal device and a network device.
  • the terminal device is used to generate the first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the first RA-RNTI is used to scramble the PUSCH, and/or to descramble the PDCCH in the second message of the 2-step random access process.
  • the network device is used to generate RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the RA-RNTI is used to scramble the physical downlink control channel PDCCH in the second message of the 2-step random access process, and/or to descramble the PUSCH.
  • a communication system including a terminal device and a network device.
  • the terminal device is used for: the terminal device generates the first RA-RNTI according to the PUSCH resource information in the first message of the 2-step random access process.
  • the first RA-RNTI is used to descramble the PDCCH in the second message of the 2-step random access process, and/or to generate a scrambling code sequence, and the scrambling code sequence is used to Scrambling the PUSCH in the first message.
  • the network device is used to generate the first RA-RNTI according to the PUSCH resource information in the first message of the 2-step random access process.
  • the first RA-RNTI is used to scramble the PDCCH in the second message of the 2-step random access process, and/or to generate a scrambling code sequence, and the scrambling code sequence is used to Descramble the PUSCH in the first message.
  • the terminal device and the network device determine the first RA-RNTI according to the resource information of RAPID and PUSCH, so as to effectively obtain the RA-RNTI in the 2-step random access process.
  • the first RA-RNTI can uniquely identify the terminal device, thereby completing the descrambling of the first message and the second message in the 2-step random access process, further ensuring the effectiveness of the channel in the 2-step random access process transmission.
  • FIG. 1 is a schematic diagram of a possible wireless communication system applied in an embodiment of the present application.
  • FIG. 2 is a schematic flow interaction diagram of 4-step random access.
  • Figure 3 is a schematic process interaction diagram of 2-step random access
  • FIG. 4 is a schematic flowchart of a random access method according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a random access method according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a random access method according to an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of a random access method according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of transmission of the first message in a 2-step random access process according to an embodiment of the present application.
  • FIG. 10 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 11 is a schematic block diagram of a network device according to an embodiment of the present application.
  • FIG. 12 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 13 is a schematic block diagram of a network device according to an embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • 15 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • 16 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • 17 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • GSM Global System
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • LTE-A Advanced Long Term Evolution
  • NR New Radio
  • NR Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • D2D Device to Device
  • M2M machine-to-machine
  • MTC machine-type communication
  • V2V vehicle-to-vehicle
  • the communication system in the embodiments of the present application may be applied in scenarios such as carrier aggregation (CA), dual connectivity (DC), and standalone (SA) networking.
  • CA carrier aggregation
  • DC dual connectivity
  • SA standalone networking
  • the wireless communication system 100 may include a network device 110.
  • the network device 110 may be a device that communicates with a terminal device.
  • the network device 110 can provide communication coverage for a specific geographic area, and can communicate with terminal devices located within the coverage area.
  • the network device 100 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system (Evolutional Node B, eNB or eNodeB), or the network side device in the NR system, or the wireless controller in the Cloud Radio Access Network (CRAN), or the network device can be a relay station, Incoming points, in-vehicle devices, wearable devices, network-side devices in next-generation networks, or network devices in future public land mobile networks (Public Land Mobile Network, PLMN), etc.
  • BTS Base Transceiver Station
  • NodeB, NB base station
  • LTE Long Term Evolutional Node B
  • eNB evolved Node B
  • eNodeB evolved base station
  • the network side device in the NR system
  • the wireless controller in the Cloud Radio Access Network or the network device can be a relay station, Incoming points,
  • the wireless communication system 100 further includes at least one terminal device 120 located within the coverage of the network device 110.
  • the terminal device 120 may be mobile or fixed.
  • the terminal device 120 may refer to an access terminal, user equipment (User Equipment, UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication Device, user agent, or user device.
  • User Equipment User Equipment
  • Access terminals can be cellular phones, cordless phones, Session Initiation Protocol (SIP) phones, wireless local loop (Wireless Local Loop, WLL) stations, personal digital processing (Personal Digital Assistant (PDA), wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in future 5G networks, or terminal devices in future evolved PLMNs, etc.
  • the terminal devices 120 may also perform terminal direct connection (Device to Device, D2D) communication.
  • the network device 110 may provide services to a cell, and the terminal device 120 communicates with the network device 110 through transmission resources (eg, frequency domain resources, or spectrum resources) used by the cell, and the cell may be the network device 110 (eg, base station)
  • the cell may belong to a macro base station, or a base station corresponding to a small cell (Small cell), where the small cell may include, for example, a metro cell, a micro cell, and a pico cell , Femtocells, etc.
  • These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • FIG. 1 exemplarily shows one network device and two terminal devices.
  • the wireless communication system 100 may include multiple network devices and each network device may include other numbers of terminal devices within the coverage area. The application examples do not limit this.
  • the wireless communication system 100 may further include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiments of the present application.
  • the terminal device After the cell search process, the terminal device has achieved downlink synchronization with the cell, so the terminal device can receive downlink data. However, the terminal device can perform uplink transmission only if it has achieved uplink synchronization with the cell.
  • the terminal device can establish a connection with the cell and obtain uplink synchronization through a random access procedure (Random Access Procedure, RAR). That is to say, through random access, the terminal device can obtain uplink synchronization, and obtain the unique identifier assigned to it by the network device, namely the Cell Radio Network Temporary Identity (C-RNTI). Therefore, random access can be applied not only in initial access, but also in the case where the user's uplink synchronization is lost. For ease of understanding, the random access process will be briefly described below in conjunction with FIGS. 2 and 3.
  • RAR Random Access Procedure
  • the random access process can usually be triggered by one of the following 6 types of trigger events:
  • the terminal equipment will enter the RRC connected state (RRC_CONNECTED) from the Radio Resource Control (RRC) idle state (RRC_IDLE state).
  • RRC Radio Resource Control
  • the terminal device When the terminal device needs to establish uplink synchronization with the new cell, it needs to initiate random access in the new cell.
  • the terminal equipment re-establishes a wireless connection after a radio link failure (Radio Link Failure, RLF) occurs.
  • RLF Radio Link Failure
  • the terminal device needs to reply (Acknowledgement, ACK) or negative response (Negative Acknowledgement, NACK).
  • the uplink In the RRC connected state, when the uplink data arrives, the uplink is in the "out-of-sync" state or no physical uplink control channel (Physical Uplink Control Channel, PUCCH) resources are available for scheduling request (SR) transmission.
  • PUCCH Physical Uplink Control Channel
  • the terminal device may initiate a random access procedure; Access (Channel, RACH) to replace the role of SR, then when the uplink is in the "out of sync" state, the terminal device can initiate a random access process.
  • Access Channel, RACH
  • Timing Advance In the RRC connected state, in order to locate, it is necessary to obtain the timing advance (TAming Advance).
  • random access may also be triggered due to RRC active state (RRC_INACTIVE) transition, requesting other system information (Other System Information), or beam failure recovery (beam failure recovery).
  • RRC_INACTIVE RRC active state
  • other system information Other System Information
  • beam failure recovery beam failure recovery
  • FIG. 2 is a flow interaction diagram of 4-step random access. As shown in Figure 2, the 4-step random access process may include the following four steps:
  • Step 1 The terminal device sends Msg1.
  • the terminal device sends Msg1 to the network device to tell the network device that the terminal device initiated a random access request.
  • the Msg1 carries a random access preamble (Random Access Preamble, RAP), or random access preamble, Preamble, preamble, etc.
  • RAP Random Access Preamble
  • Msg1 can also be used for network equipment to estimate the transmission delay between it and the terminal equipment and to calibrate the uplink time.
  • Step 2 The network device sends Msg2.
  • the network device After receiving the Msg1 sent by the terminal device, the network device sends Msg2, a random access response (Random Access Response, RAR) message, to the terminal device.
  • the Msg2 can be scrambled by a random access wireless network temporary identity (Random Access Radio Network Temporary Identity, RA-RNTI).
  • the terminal device can monitor the physical downlink control channel (Physical Downlink Control Channel, PDCCH) in the RAR window (RAR window) to receive the RAR message scrambled by the RA-RNTI, without considering the possible measurement interval (measurement gap) .
  • PDCCH Physical Downlink Control Channel
  • the terminal device may stop listening to the RAR message. Among them, the terminal device uses RA-RNTI to descramble the RAR message.
  • the RAR message may include corresponding messages for multiple terminal devices that send preambles, and the response message for each terminal device includes the random access preamble index (Random Access Preamble Identify, RAPID ), Msg3 resource allocation information, time advancement (TA) adjustment information, and temporary cell wireless network temporary identification (Temporary Cell-Radio Network Temporary Identity, TC-RNTI), etc.
  • RAPID Random Access Preamble Identify
  • Msg3 resource allocation information Msg3 resource allocation information
  • TA time advancement
  • TC-RNTI temporary cell wireless network temporary identification
  • the RAR message can be scheduled using a Download Control (Information, DCI) format (DCI) 1-0, and the PDCCH scheduling the RAR message can be scrambled using the above-mentioned RA-RNTI.
  • DCI Download Control
  • Step 3 The terminal device sends Msg3.
  • the terminal device After receiving the RAR message, the terminal device determines whether the RAR is its own RAR message. For example, the terminal device can use the preamble identifier to check. After determining that it is its own RAR message, it generates Msg3 at the RRC layer and sends The network device sends Msg3. It needs to carry the identification information of the terminal device, etc.
  • the Msg 3 sent by the terminal device in step 3 in the 4-step random access process may include different content.
  • Msg3 includes an RRC connection request message (RRC Connection Request) generated by the RRC layer, which carries at least the non-access Stratum (NAS) identification information of the terminal device.
  • RRC Connection Request RRC Connection Request
  • NAS non-access Stratum
  • Msg3 can also carry, for example, a serving temporary mobile subscriber identity (Serving-Temporary Mobile Subscriber Identity, S-TMSI) or random number of the terminal device.
  • S-TMSI Serving-Temporary Mobile Subscriber Identity
  • Msg3 includes an RRC connection re-establishment request message (RRC Connection Re-establishment Request) generated by the RRC layer and does not carry any NAS message.
  • RRC Connection Re-establishment Request RRC Connection Re-establishment Request
  • Msg3 can also carry cell radio network temporary identifier (Cell Radio Network Identifier, C-RNTI) and protocol control information (Protocol Control Information, PCI).
  • C-RNTI Cell Radio Network Identifier
  • PCI Protocol Control Information
  • Msg3 includes an RRC handover confirmation message (RRC Handover Confirm) generated by the RRC layer, which carries the C-RNTI of the terminal device.
  • RRC Handover Confirm RRC handover confirmation message
  • Msg3 can also carry information such as Buffer Status Report (Buffer Status Report, BSR).
  • BSR Buffer Status Report
  • Msg3 needs to include at least the C-RNTI of the terminal device.
  • uplink transmission usually uses terminal device-specific information, such as C-RNTI to scramble data carried in an uplink shared channel (Uplink Shared Channel, UL-SCH). But at this time the conflict has not been resolved, so when scrambling Msg3 cannot be based on C-RNTI, but can only use TC-RNTI.
  • C-RNTI Uplink Shared Channel
  • Step 4. The network device sends Msg4.
  • the network device sends Msg4 to the terminal device, and the terminal device correctly receives Msg4 to complete Contention Resolution.
  • Msg 4 may carry the RRC connection establishment message.
  • the terminal device in step 3 will carry its own unique identification in Msg3, such as C-RNTI or identification information from the core network (such as S-TMSI or a random number), the network device will Carry the unique identification of the terminal equipment in Msg4 to designate the terminal equipment that won the competition. And other terminal devices that do not win in the contention resolution will re-initiate random access.
  • the PDCCH of Msg4 can be scrambled using TC-RNTI.
  • a 2-step random access method can also be used.
  • One possible method is to send the messages Msg1 and Msg3 in the 4-step random access process as the first message in the 2-step random access process; send the Msg2 and 4 in the 4-step random access process Msg4 is sent as the second message in the 2-step random access process.
  • the 2-step random access process may include the following two steps:
  • Step 1 The terminal device sends the first message.
  • the first message (also called “Msg A or New Msg 1 (New_Msg 1)) may include a preamble and uplink data.
  • the uplink data may be carried on an uplink channel, and the uplink channel may be, for example, a physical uplink shared channel (Physical Uplink Shared Channel, PUSCH).
  • the uplink channel may carry the identification information of the terminal device and the reason of the RRC request, for example.
  • the first message may carry some or all of the information carried in Msg1 and Msg3 in the 4-step random access process.
  • Step 2 The network device sends a second message.
  • the network device If the network device successfully receives the first message sent by the terminal device, it sends a second message to the terminal device.
  • the second message (also referred to as "Msg B or New Msg 2 (New_Msg 2)) may include conflict resolution information, C-RNTI allocation information, TA adjustment information, etc., for example.
  • the second message may carry some or all of the information carried in Msg 2 and Msg 4 during the 4-step random access process.
  • the second message carries conflict resolution information for a single terminal device (including information related to the identification of the terminal device sent by the terminal device in the first message), C-RNTI allocation information, TA adjustment information, etc.
  • the second message may also carry an RRC connection establishment message and so on.
  • FIG. 2 or FIG. 3 is merely an example. Since the two-step random access process has not yet entered the standardization stage, here is only introduced as an example in Figure 3, there are other possibilities for the definition of each random access message involved, and does not limit the two-step random access Other definitions of each random access message in the process. The method described in the embodiment of the present application is applicable to all other 2-step random access processes.
  • the embodiments of the present application provide a random access method, which can effectively obtain the RA-RNTI in the 2-step random access process, and further realize the effective transmission of the channel.
  • the first message and the second message in the 2-step random access process are also referred to as "Msg A or new Msg 1 (New_Msg 1)" and “Msg B or new Msg 2 (New_Msg 2)", the first message to the fourth message in the 4-step random access process are also called "Msg1, Msg2, Msg3, and Msg4", respectively.
  • MsgA may include some or all of the information carried in Msg1 and Msg3.
  • Msg B may include some or all of the information carried in Msg 2 and Msg 4.
  • the RA-RNTI in the 2-step random access process in the embodiment of the present application may be referred to as a first RA-RNTI or a new RA-RNTI (New_RA- RNTI), etc., not limited here.
  • FIG. 4 is a schematic flowchart of a random access method 400 according to an embodiment of the present application.
  • the method described in FIG. 4 may be executed by a terminal device, and the terminal device may be, for example, the terminal device 120 shown in FIG. 1.
  • the random access method 400 may include some or all of the following steps. among them:
  • the terminal device generates the first RA-RNTI according to the RAPID in the first message of the two-step random access process and the resource information of the physical uplink shared channel (Physical Uplink Shared Channel, PUSCH).
  • the physical uplink shared channel Physical Uplink Shared Channel, PUSCH
  • the method further includes 420.
  • the terminal device uses the first RA-RNTI to scramble the PUSCH in the first message; and/or, the terminal device uses the first RA-RNTI to descramble the second message of the 2-step random access process In the PDCCH.
  • the first message of the 2-step random access process may include, for example, a preamble and/or data channel.
  • the first message may carry some or all of the information in Msg1 and Msg3 in the 4-step random access process.
  • the data channel can be scrambled and descrambled using the first RA-RNTI, for example.
  • the first RA-RNTI may be used to descramble and schedule the data
  • the control channel of the channel is, for example, PDCCH.
  • the terminal device scrambling the PUSCH using the first RA-RNTI includes: the terminal device generating a scrambling code sequence according to the first RA-RNTI; the terminal device uses The scrambling code sequence scrambles the PUSCH in the first message.
  • the initial value of the scrambling code sequence is:
  • c init n RNTI ⁇ 2 15 +n ID .
  • I a physical cell identity (Identity, ID)
  • n RNTI is the first RA-RNTI.
  • the second message of the 2-step random access process includes, for example, a RAR message and/or a conflict resolution message.
  • the second message may carry some or all of the information in Msg 2 and Msg 4 during the 4-step random access process.
  • all the information can be carried in a data channel such as PDSCH, and the control channel for scheduling the data channel such as PDCCH can be scrambled and descrambled using the first RA-RNTI.
  • the terminal device may generate the first RA-RNTI according to the RAPID and/or PUSCH resource information in the first message of the 2-step random access process. And use the first RA-RNTI to scramble the PUSCH in the first message, and/or descramble the PDCCH in the second message of the 2-step random access process. Therefore, when the network device does not allocate the RNTI to the terminal device, the terminal device can be identified, and the channel can be scrambled and descrambled to ensure the effective transmission of the channel in the 2-step random access process.
  • the terminal device may use the first RA-RNTI to descramble the cyclic redundancy check (Cyclic Redundancy Check, CRC) check bits of the PDCCH in the second message.
  • CRC Cyclic Redundancy Check
  • the terminal device may use the first RA-RNTI to scramble the encoded information bits on the PUSCH in the first message.
  • the "PDCCH in the second message" may be understood as that the PDCCH is used to schedule the PDSCH in the second message, that is, the PDCCH is used to schedule the bearer of RAR messages and/or PDSCH of the conflict resolution message.
  • the PDCCH used for scheduling the PDSCH in the second message is taken as a part of the second message, but the application is not limited to this, and the second message may also be considered to include only the data channel .
  • the resources of the PUSCH in the first message may include, for example, resources for transmitting the PUSCH and resources of the demodulation reference signal (DMRS) corresponding to the PUSCH, which refers to the PUSCH
  • the time-frequency resource includes the time-frequency resource used to transmit the PUSCH and the time-frequency resource of the DMRS.
  • the terminal device may randomly select a preamble for random access among multiple preambles. Since the terminal device randomly selects the preamble, different terminal devices can greatly reduce the probability of collision of preamble sequences while selecting among multiple preamble sequences. Alternatively, the terminal device may also select the preamble based on other methods.
  • one preamble can correspond to multiple PUSCH resources; one PUSCH resource can correspond to multiple preambles; or, there is a one-to-one correspondence between the preamble and PUSCH resources.
  • the terminal device may generate the first RA-RNTI according to RAPID.
  • the terminal device needs to generate the first RA-RNTI according to the RAPID and PUSCH resource information at the same time to ensure that the first RA-RNTI corresponding to the terminal device is unique.
  • the terminal device determines its corresponding first RA-RNTI according to the RAPID and PUSCH resource information, and uses the first RA-RNTI to scramble the first message in the 2-step random access process, and /Or, descramble the second message in the 2-step random access process. Therefore, when the network device does not allocate the RNTI to it, it can realize the identification of the terminal device, complete the addition and descrambling of the channel, and ensure the effective transmission of the channel in the 2-step random access process.
  • the resource information of the PUSCH includes the resource index of the PUSCH.
  • the resource index of the PUSCH is, for example, an index of a demodulation reference signal (DMRS) corresponding to the PUSCH.
  • DMRS demodulation reference signal
  • the index of each PUSCH resource is the index of the DMRS corresponding to the PUSCH transmitted on the PUSCH resource.
  • the PUSCH time-frequency resource can support a maximum of 12 PUSCH transmissions, and the resource index values of these 12 PUSCHs It can be 0, 1, ..., 11 or 1, 2, ..., 12 in sequence.
  • the 12 PUSCH resources with different indexes are located in the same time-frequency position, and the PUSCH transmitted on the PUSCH resources with different indexes are distinguished by different DMRS.
  • the resource index of the PUSCH is, for example, the resource number of the PUSCH resource in the multiple PUSCH resources in the first message.
  • the RAPID selected by the terminal device corresponds to N PUSCH resources, and the indexes of the N PUSCH resources are index 0, index 1, ..., and index N in this order. If the terminal device uses the second PUSCH resource among the N PUSCH resources, the resource index used to calculate the PUSCH used by the first RA-RNTI is index 1.
  • the terminal device generates the first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process, which includes: the terminal device according to the first message in the first message
  • the resource information of the RAPID and PUSCH and the resource information of the physical random access channel (Physical Random Access Channel, PRACH) used to send the preamble generate the first RA-RNTI.
  • PRACH Physical Random Access Channel
  • the PRACH resource information includes, for example, at least one of the following information: the position of the Orthogonal Frequency Division Multiplexing (OFDM) symbol occupied by the PRACH resource in the time domain, and the PRACH resource in the system frame The position of the time slot occupied in, the number of the resource occupied by the PRACH resource in the frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
  • OFDM Orthogonal Frequency Division Multiplexing
  • the terminal device may generate the first RA-RNTI based on the following formula:
  • the first RA-RNTI 1+PUSCH_index+PUSCH_number ⁇ RAP_id+PUSCH_number ⁇ preamble_number ⁇ s_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ t_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ slot_number ⁇ f_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ frequency_number ⁇ frequency_number ⁇ symbol_number
  • RAP_id is the index of the preamble sent by the terminal device, that is, RAPID, 0 ⁇ RAP_id ⁇ preamble_number
  • s_id is the first OFDM of the PRACH resource used to send the random access preamble Symbol, 0 ⁇ s_id ⁇ symbol_number
  • t_id is the index of the first slot of the PRACH resource used to send the random access preamble, 0 ⁇ t_id ⁇ slot_number
  • f_id is the PRACH resource in the frequency domain Resource number, 0 ⁇ f_id ⁇ frequency_number
  • preamble_number is the total number of preambles used for 2-step random access within a PRACH opportunity
  • PUSCH_number is the number of PUSCH resources corresponding to the preamble sent by the terminal device, where the current preamble and PUSCH resources are the same
  • PUSCH_number 1
  • symbol_number is the total possible index number of the starting symbol of PRACH occupation used in 2-step random access
  • slot_number is used in 2-step random access The total number of indexes of the first slot index in the slot where PRACHoccasion is located
  • frequency_number is the total number of frequency domain indexes of PRACHoccasion used in 2-step random access.
  • the terminal device may substitute its preamble index and PUSCH resource information into the formula according to the formula, so as to obtain the first RA-RNTI.
  • the first RA-RNTI 1+RAP_id+64 ⁇ s_id+64 ⁇ 14 ⁇ t_id+64 ⁇ 14 ⁇ 80 ⁇ f_id+64 ⁇ 14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id.
  • PUSCH_index, PUSCH_number, preamble_number, symbol_number, slot_number, frequency_number and other parameters may also be other values.
  • all or part of these parameter values may be determined and configured by the network device to the terminal device, or agreed in advance in the protocol; or, some of these parameter values may be determined and configured by the network device to the terminal device , And the value of another part of the parameter can be agreed by the agreement.
  • the terminal device may generate the first RA-RNTI based on the following formula:
  • the first RA-RNTI PUSCH_index ⁇ RAP_id; or,
  • the first RA-RNTI PUSCH_index ⁇ RAP_id+RNTI_offset.
  • RAP_id is the index of the preamble sent by the terminal device, that is, RAPID, 0 ⁇ RAP_id ⁇ preamble_number, where preamble_number ⁇ 63;
  • PUSCH_index is the index of the DMRS corresponding to the PUSCH in the first message.
  • RNTI_offset is an offset value, which may be configured by the network device to the terminal device through signaling, or may be stipulated in the agreement by the network device and the terminal device in advance.
  • the RAP_id may be replaced by a synchronization signal block (Synchronizing Signal/PBCH Block, SSB or SS/PBCH Block) index (SSB index), so that the terminal device can
  • the first RA-RNTI is generated according to the SSB index and/or PUSCH resource information in the first message.
  • the terminal device may determine the RA-RNTI according to the following formula:
  • the first RA-RNTI 1+PUSCH_index+PUSCH_number ⁇ SSB_index+PUSCH_number ⁇ SSB_number ⁇ s_id+PUSCH_number ⁇ SSB_number ⁇ symbol_number ⁇ t_id+PUSCH_number ⁇ SSB_number ⁇ symbol_number ⁇ slot_number ⁇ f_id+PUSCH_number ⁇ SSB_number ⁇ symbol_number ⁇ frequency_number ⁇ symbol_number ⁇ frequency_number ⁇ symbol_number ⁇ symbol_number ⁇ frequency_number ⁇ symbol_number
  • SSB_index is the SSB index of the terminal device, 0 ⁇ SSB_index ⁇ SSB_number;
  • s_id is the first OFDM symbol of the PRACH resource used to send the random access preamble, 0 ⁇ s_id ⁇ symbol_number;
  • t_id is the index of the first slot of the PRACH resource used to send the random access preamble, 0 ⁇ t_id ⁇ slot_number;
  • f_id is the resource number of the PRACH resource in the frequency domain, 0 ⁇ f_id ⁇ frequency_number;
  • ul_carrier_id
  • SSB_number is the total number of SSB indexes used in an SSB cluster set (SSB burst);
  • symbol_number is the total possible index number of the starting symbol of the PRACH occupation used in 2-step random access, slot_number is the PRACH occupation used in 2-step random access
  • the total index number of the first slot index in the slot where frequency is; frequency_number is the total number of frequency domain indexes of the PRACHoccasion used for 2-step random access.
  • the terminal device may generate the first RA-RNTI based on the following formula:
  • First RA-RNTI PUSCH_index ⁇ SSB_index; or,
  • the first RA-RNTI PUSCH_index ⁇ SSB_index+RNTI_offset.
  • SSB_index is the SSB index of the terminal device
  • PUSCH_index is the index of the DMRS corresponding to the PUSCH in the first message.
  • FIG. 5 is a schematic flowchart of a random access method 500 according to an embodiment of the present application.
  • the method described in FIG. 5 may be performed by a network device, and the network device may be, for example, the network device 110 shown in FIG. 1.
  • the random access method 500 may include some or all of the following steps. among them:
  • the network device generates the first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the method further includes 520.
  • the network device uses the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process; and/or, the network device uses the first RA-RNTI to descramble the PUSCH.
  • the network device using the first RA-RNTI to descramble the PUSCH includes: the network device generating a scrambling code sequence according to the first RA-RNTI; the network device uses The scrambling code sequence descrambles the PUSCH in the first message.
  • the initial value of the scrambling code sequence is:
  • c init n RNTI ⁇ 2 15 +n ID .
  • n RNTI is the first RA-RNTI.
  • the network device may generate the first RA-RNTI according to the RAPID and/or PUSCH resource information in the first message of the 2-step random access process. And use the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process, and/or use the first RA-RNTI to descramble the PUSCH. Therefore, when the network device does not allocate the RNTI to the terminal device, the identification of the terminal device can be realized, and the channel can be added and descrambled to ensure the effective transmission of the channel in the 2-step random access process.
  • the network device may use the first RA-RNTI to scramble the CRC check bits of the PDCCH in the second message. For example, after encoding the original information of the PDCCH, the network device performs a CRC check on the encoded information through a CRC check code, and uses the first RA-RNTI to scramble the CRC check bits of the PDCCH.
  • the network device may use the first RA-RNTI to descramble the encoded information bits on the PUSCH in the first message.
  • the first RA-RNTI may be used to scramble to schedule the data
  • the control channel of the channel is, for example, PDCCH.
  • the PUSCH resources in the first message may include, for example, resources for transmitting the PUSCH and DMRS resources corresponding to the PUSCH.
  • the time-frequency resources of the PUSCH include the time-frequency resources for transmitting the PUSCH Resources and time-frequency resources of the DMRS.
  • one preamble can correspond to multiple PUSCH resources; one PUSCH resource can correspond to multiple preambles; or, there is a one-to-one correspondence between the preamble and PUSCH resources.
  • the network device may generate the first RA-RNTI according to the RAPID in the first message.
  • the network device needs to generate the first RA-RNTI according to the RAPID and PUSCH resource information at the same time, to ensure that the first RA-RNTI corresponding to the terminal device is unique.
  • the resource information of the PUSCH includes the resource index of the PUSCH.
  • the resource index of the PUSCH is, for example, the index of the DMRS corresponding to the PUSCH.
  • the DMRS is used to demodulate the PUSCH.
  • the index of each PUSCH resource is the index of the DMRS corresponding to the PUSCH transmitted on the PUSCH resource.
  • the PUSCH time-frequency resource can support a maximum of 12 PUSCH transmissions, and the resource index values of these 12 PUSCHs It can be 0, 1, ..., 11 or 1, 2, ..., 12 in sequence.
  • the 12 PUSCH resources with different indexes are located in the same time-frequency position, and the PUSCH transmitted on the PUSCH resources with different indexes are distinguished by different DMRS.
  • the resource index of the PUSCH is, for example, the resource number of the PUSCH resource in the multiple PUSCH resources in the first message.
  • the RAPID selected by the terminal device corresponds to N PUSCH resources, and the indexes of the N PUSCH resources are index 0, index 1, ..., index N in this order. If the terminal device uses the second PUSCH resource among the N PUSCH resources, the resource index used to calculate the PUSCH used by the first RA-RNTI is index 1.
  • the network device generates the first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process, including: the network device according to the RAPID and PUSCH in the first message The resource information of PR and the resource information of PRACH used to transmit the preamble, to generate the first RA-RNTI.
  • the PRACH resource information includes at least one of the following information: the position of the OFDM symbol occupied by the PRACH resource in the time domain, the position of the time slot occupied by the PRACH resource in the system frame, and the PRACH resource at The number of resources occupied in the frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
  • the network device may generate the first RA-RNTI based on the following formula:
  • the first RA-RNTI 1+PUSCH_index+PUSCH_number ⁇ RAP_id+PUSCH_number ⁇ preamble_number ⁇ s_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ t_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ slot_number ⁇ f_id+PUSCH_number ⁇ preamble_number ⁇ symbol_number ⁇ frequency_number ⁇ frequency_number ⁇ symbol_number
  • the network device may generate the first RA-RNTI based on the following formula:
  • the first RA-RNTI PUSCH_index ⁇ RAP_id; or,
  • the first RA-RNTI PUSCH_index ⁇ RAP_id+RNTI_offset.
  • RAP_id is the index of the preamble sent by the terminal device, that is, RAPID, 0 ⁇ RAP_id ⁇ preamble_number, where preamble_number ⁇ 63;
  • PUSCH_index is the index of the DMRS corresponding to the PUSCH in the first message.
  • RNTI_offset is an offset value, which may be configured by the network device to the terminal device through signaling, or may be stipulated in the agreement by the network device and the terminal device in advance.
  • FIG. 6 is a schematic flowchart of a random access method 600 according to an embodiment of the present application.
  • the method described in FIG. 6 may be executed by a terminal device, and the terminal device may be, for example, the terminal device 120 shown in FIG. 1.
  • the random access method 600 may include some or all of the following steps. among them:
  • the terminal device generates the first RA-RNTI according to the PUSCH resource information in the first message of the 2-step random access process.
  • the method further includes 620.
  • the terminal device uses the first RA-RNTI to scramble the PUSCH; and/or, the terminal device uses the first RA-RNTI to descramble the second step of the random access procedure PDCCH in two messages.
  • the terminal device using the first RA-RNTI to scramble the PUSCH includes: the terminal device generating a scrambling code sequence according to the first RA-RNTI; the terminal device uses The scrambling code sequence scrambles the PUSCH in the first message.
  • the initial value of the scrambling code sequence is:
  • c init n RNTI ⁇ 2 15 +n ID .
  • n RNTI is the first RA-RNTI.
  • the terminal device may generate the first RA-RNTI according to the PUSCH resource information in the first message of the 2-step random access process. And generating a scrambling code sequence based on the first RA-RNTI to scramble the PUSCH in the first message using the scrambling code sequence, and/or descrambling the 2-step random access process based on the first RA-RNTI PDCCH in the second message. Therefore, when the network device does not allocate the RNTI to the terminal device, the identification of the terminal device can be realized, and the channel can be added and descrambled to ensure the effective transmission of the channel in the 2-step random access process.
  • the terminal device may use the first RA-RNTI to descramble the CRC check bit of the PDCCH in the second message.
  • the terminal device may use the first RA-RNTI to scramble the encoded information bits on the PUSCH in the first message.
  • the time-frequency resource of the PUSCH in the first message may include, for example, the time-frequency resource for transmitting the PUSCH, and the time-frequency resource of the DMRS corresponding to the PUSCH.
  • the DMRS corresponding to the PUSCH is used to demodulate the PUSCH.
  • the resource information of the PUSCH in the first message includes the resource index of the PUSCH.
  • the resource index of the PUSCH is, for example, the index of the DMRS corresponding to the PUSCH.
  • the DMRS is used to demodulate the PUSCH.
  • the index of each PUSCH resource is the index of the DMRS corresponding to the PUSCH transmitted on the PUSCH resource.
  • the PUSCH time-frequency resource can support a maximum of 12 PUSCH transmissions, and the resource index values of these 12 PUSCHs It can be 0, 1, ..., 11 or 1, 2, ..., 12 in sequence.
  • the 12 PUSCH resources with different indexes are located in the same time-frequency position, and the PUSCH transmitted on the PUSCH resources with different indexes are distinguished by different DMRS.
  • the terminal device generates the first RA-RNTI according to the PUSCH resource index in the first message of the two-step random access process, thereby completing the addition and descrambling of the channel in the two-step random access process, It ensures the effective transmission of the channel in the 2-step random access process.
  • the terminal device may generate the first RA-RNTI based on the following formula:
  • First RA-RNTI PUSCH_index
  • the first RA-RNTI PUSCH_index+RNTI_offset.
  • PUSCH_index is the resource index of the PUSCH in the first message, for example, the index of the DMRS corresponding to the PUSCH;
  • RNTI_offset is the preset offset value.
  • the resources of the PUSCH in the first message uniquely correspond to the preamble in the first message; or, the resources of the PUSCH in the first message correspond to multiple A preamble, the plurality of preambles includes the preamble in the first message; or, the preamble in the first message corresponds to multiple PUSCH resources, and the multiple PUSCH resources include the first PUSCH resources in a message.
  • one preamble can correspond to multiple PUSCH resources; one PUSCH resource can correspond to multiple preambles; or, there is a one-to-one correspondence between the preamble and PUSCH resources.
  • the correspondence between the preamble and the PUSCH resource means that the PUSCH resource used by the PUSCH in the first message should be the PUSCH resource corresponding to the preamble in the first message Or, the preamble index in the first message should be the preamble index corresponding to the PUSCH resource used by the PUSCH in the first message.
  • the terminal device if the resource of the PUSCH in the first message corresponds to multiple preambles, optionally, in 610, the terminal device according to the PUSCH in the first message of the 2-step random access process Resource information to generate the first RA-RNTI, including:
  • the terminal device generates the first RA according to the resource index of the PUSCH in the first message and the number of the preamble in the plurality of preambles in the first message -RNTI.
  • the number of the preamble in the first message in the plurality of preambles is the preamble in the preamble group formed by at least one preamble corresponding to the PUSCH resource in the first message Numbering.
  • the resources of the PUSCH in the first message correspond to M preambles, and the numbers of the M preambles are 0, 1, ..., M in sequence. If the terminal device uses the second preamble in the M preamble resources, the number of the preamble in the first message is 1. In other words, the RAPID of the preamble can be used to modulo M to obtain the number of the preamble in the M preambles.
  • the terminal device may generate the first RA-RNTI based on the following formula:
  • First RA-RNTI PUSCH_index ⁇ RAP_id_inPUSCH; or,
  • the first RA-RNTI PUSCH_index ⁇ RAP_id_inPUSCH+RNTI_offset.
  • PUSCH_index is the index of the DMRS corresponding to the PUSCH in the first message.
  • the RAP_id_inPUSCH is the number of the preamble in the first message in the multiple preambles.
  • RAP_id_inPUSCH Is 1 and the above formula can also be modified to:
  • First RA-RNTI PUSCH_inde
  • the first RA-RNTI PUSCH_index+RNTI_offset.
  • RNTI_offset is an offset value, which may be configured by the network device to the terminal device through signaling, or may be stipulated in the agreement by the network device and the terminal device in advance.
  • FIG. 7 is a schematic flowchart of a random access method 700 according to an embodiment of the present application.
  • the method described in FIG. 7 may be performed by a network device, and the network device may be, for example, the network device 110 shown in FIG. 1.
  • the random access method 700 may include some or all of the following steps. among them:
  • the network device generates the first RA-RNTI according to the PUSCH resource information in the first message of the 2-step random access process.
  • the method further includes 720.
  • the network device uses the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process; and/or, the network device uses the first RA-RNTI to descramble the PUSCH.
  • the network device using the first RA-RNTI to descramble the PUSCH includes: the network device generating a scrambling code sequence according to the first RA-RNTI; the network device uses The scrambling code sequence descrambles the PUSCH in the first message.
  • the initial value of the scrambling code sequence is:
  • c init n RNTI ⁇ 2 15 +n ID .
  • n RNTI is the first RA-RNTI.
  • the network device may generate the first RA-RNTI according to the PUSCH resource information in the first message of the 2-step random access process. And use the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process, and/or use the first RA-RNTI to generate a scrambling code sequence to descramble the scrambling code sequence PUSCH. Therefore, when the network device does not allocate the RNTI to the terminal device, the identification of the terminal device can be realized, and the channel can be added and descrambled to ensure the effective transmission of the channel in the 2-step random access process.
  • the network device may use the first RA-RNTI to scramble the CRC check bits of the PDCCH in the second message. For example, after encoding the original information of the PDCCH, the network device performs a CRC check on the encoded information through a CRC check code, and uses the first RA-RNTI to scramble the CRC check bits of the PDCCH.
  • the network device may use the first RA-RNTI to descramble the encoded information bits on the PUSCH in the first message.
  • the first RA-RNTI may be used to scramble to schedule the data
  • the control channel of the channel is, for example, PDCCH.
  • the time-frequency resource of the PUSCH in the first message may include, for example, the time-frequency resource for transmitting the PUSCH, and the time-frequency resource of the DMRS corresponding to the PUSCH.
  • the DMRS corresponding to the PUSCH is used to demodulate the PUSCH.
  • the resource information of the PUSCH in the first message includes the resource index of the PUSCH.
  • the resource index of the PUSCH is, for example, the index of the DMRS corresponding to the PUSCH.
  • the DMRS is used to demodulate the PUSCH.
  • the index of each PUSCH resource is the index of the DMRS corresponding to the PUSCH transmitted on the PUSCH resource.
  • the PUSCH time-frequency resource can support a maximum of 12 PUSCH transmissions, and the resource index values of these 12 PUSCHs It can be 0, 1, ..., 11 or 1, 2, ..., 12 in sequence.
  • the 12 PUSCH resources with different indexes are located in the same time-frequency position, and the PUSCH transmitted on the PUSCH resources with different indexes are distinguished by different DMRS.
  • the network device generates the first RA-RNTI according to the PUSCH resource index in the first message of the 2-step random access process, thereby completing the scrambling and descrambling of the channel in the 2-step random access process, It ensures the effective transmission of the channel in the 2-step random access process.
  • the network device may generate the first RA-RNTI based on the following formula:
  • First RA-RNTI PUSCH_index
  • the first RA-RNTI PUSCH_index+RNTI_offset.
  • PUSCH_index is the resource index of the PUSCH in the first message, for example, the index of the DMRS corresponding to the PUSCH;
  • RNTI_offset is the preset offset value.
  • the resources of the PUSCH in the first message uniquely correspond to the preamble in the first message; or, the resources of the PUSCH in the first message correspond to multiple A preamble, the plurality of preambles includes the preamble in the first message; or, the preamble in the first message corresponds to multiple PUSCH resources, and the multiple PUSCH resources include the first PUSCH resources in a message.
  • one preamble can correspond to multiple PUSCH resources; one PUSCH resource can correspond to multiple preambles; or, there is a one-to-one correspondence between the preamble and PUSCH resources.
  • the network device according to the PUSCH in the first message of the 2-step random access process Resource information to generate the first RA-RNTI, including:
  • the network device generates the first RA according to the resource index of the PUSCH in the first message and the number of the preamble in the plurality of preambles in the first message -RNTI.
  • the number of the preamble in the first message in the plurality of preambles is the preamble in the preamble group formed by at least one preamble corresponding to the PUSCH resource in the first message Numbering.
  • the resources of the PUSCH in the first message correspond to M preambles, and the numbers of the M preambles are 0, 1, ..., M in sequence. If the terminal device uses the second preamble in the M preamble resources, the number of the preamble in the first message is 1. In other words, the RAPID of the preamble can be used to modulo M to obtain the number of the preamble in the M preambles.
  • the terminal device may generate the first RA-RNTI based on the following formula:
  • First RA-RNTI PUSCH_index ⁇ RAP_id_inPUSCH; or,
  • the first RA-RNTI PUSCH_index ⁇ RAP_id_inPUSCH+RNTI_offset.
  • PUSCH_index is the index of the DMRS corresponding to the PUSCH in the first message.
  • the RAP_id_inPUSCH is the number of the preamble in the first message in the multiple preambles.
  • RAP_id_inPUSCH Is 1 and the above formula can also be modified to:
  • First RA-RNTI PUSCH_inde
  • the first RA-RNTI PUSCH_index+RNTI_offset.
  • RNTI_offset is an offset value, which may be configured by the network device to the terminal device through signaling, or may be stipulated in the agreement by the network device and the terminal device in advance.
  • FIG. 8 is a schematic diagram of the transmission of the first message in the 2-step random access process.
  • the terminal device determines the first RA-RNTI
  • the terminal device uses the first RA-RNTI to scramble the PUSCH in the first message in the 2-step random access process
  • the terminal device sends the first message to the network device
  • the network device receives the first message
  • the network device determines the first RA-RNTI
  • the network device uses the first RA-RNTI to descramble the PUSCH in the first message.
  • FIG. 9 is a schematic diagram of the transmission of the second message in the 2-step random access process.
  • the network device determines the first RA-RNTI
  • the network device uses the first RA-RNTI to scramble the PDCCH in the second message in the 2-step random access process, where the PDCCH is used to schedule the PDSCH in the second message;
  • the network device sends the second message to the terminal device
  • the terminal device receives the second message
  • the terminal device determines the first RA-RNTI
  • the terminal device uses the first RA-RNTI to descramble the PUSCH in the second message.
  • both the PUSCH in the first message and the PDCCH in the second message may use the first RA-RNTI for scrambling and scrambling, that is, the same RA-RNTI is used for the first message and the second
  • the channels in the two messages are scrambled and descrambled.
  • the first message and the second message can be transmitted between the terminal device and the network device according to the methods shown in FIGS. 8 and 9.
  • the PDCCH in the second message may be scrambled and descrambled using the first RA-RNTI.
  • the PUSCH in the first message can use the RA-RNTI in the 4-step random access process.
  • the RA-RNTI in the 4-step random access process is, for example:
  • RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id.
  • the terminal device may determine the first RA-RNTI based on the RAPID and PUSCH resource information, or may obtain the first RA-RNTI from the network device. For example, the network device determines the first RA-RNTI according to the resource information of RAPID and PUSCH, and notifies the terminal device. This embodiment of the present application does not limit this.
  • the method of the embodiment of the present application may be applied to each random access process rather than just the initial access process. Moreover, the method of the embodiment of the present application can be applied to a contention-based random access procedure (contention-based RACH) and a non-contention-based random access procedure (contention-free RACH).
  • contention-based RACH contention-based random access procedure
  • contention-free RACH non-contention-based random access procedure
  • the size of the sequence numbers of the above processes does not mean that the execution order is sequential, and the execution order of each process should be determined by its function and inherent logic, and should not correspond to the implementation process of the embodiments of the present application Constitute any limitation.
  • FIG. 10 is a schematic block diagram of a terminal device 1000 according to an embodiment of the present application. As shown in FIG. 10, the terminal device 1000 includes a processing unit 1010, and the processing unit 1010 is used to:
  • the first RA-RNTI is generated according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the processing unit 1010 is further configured to: use the first RA-RNTI to scramble the PUSCH; and/or use the first RA-RNTI to descramble the second step of the 2-step random access process PDCCH in two messages.
  • the terminal device and the network device determine the first RA-RNTI according to the resource information of RAPID and PUSCH, so as to effectively obtain the RA-RNTI in the 2-step random access process.
  • the first RA-RNTI can uniquely identify the terminal device, thereby completing the descrambling of the first message and the second message in the 2-step random access process, further ensuring the effectiveness of the channel in the 2-step random access process transmission.
  • the processing unit 1010 is specifically configured to: generate a scrambling code sequence according to the first RA-RNTI; and use the scrambling code sequence to descramble the PUSCH in the first message.
  • the processing unit 1010 is specifically configured to generate the first RA-RNTI according to the RAPID and PUSCH resource information in the first message and the PRACH resource information used to send the preamble.
  • the PRACH resource information includes at least one of the following information: the position of the OFDM symbol occupied by the PRACH resource in the time domain, the position of the time slot occupied by the PRACH resource in the system frame, and The number of the resource occupied by the PRACH resource in the frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
  • the resource information of the PUSCH includes the resource index of the PUSCH.
  • the resource index of the PUSCH is the resource number of the PUSCH resource in the multiple PUSCH resources.
  • the resources of the PUSCH include resources for transmitting the PUSCH and resources of the DMRS corresponding to the PUSCH.
  • the time-frequency resources of the PUSCH include the time-frequency resources for transmitting the PUSCH and the Time-frequency resources of DMRS.
  • the terminal device may perform the corresponding operation performed by the terminal device in the method 400 of the embodiment of the present application.
  • FIG. 11 is a schematic block diagram of a network device 1100 according to an embodiment of the present application. As shown in FIG. 11, the network device 1100 includes a processing unit 1110, and the processing unit 1110 is configured to:
  • the first RA-RNTI is generated according to the RAPID and PUSCH resource information in the first message of the 2-step random access process.
  • the processing unit 1110 is further configured to: use the first RA-RNTI to scramble the PDCCH in the second message of the 2-step random access process; and/or use the first RA- The RNTI descrambles the PUSCH.
  • the terminal device and the network device determine the first RA-RNTI according to the resource information of RAPID and PUSCH, so as to effectively obtain the RA-RNTI in the 2-step random access process.
  • the first RA-RNTI can uniquely identify the terminal device, thereby completing the descrambling of the first message and the second message in the 2-step random access process, further ensuring the effectiveness of the channel in the 2-step random access process transmission.
  • the processing unit 1110 is specifically configured to: generate a scrambling code sequence according to the first RA-RNTI; and use the scrambling code sequence to descramble the PUSCH in the first message.
  • the processing unit 1110 is specifically configured to generate the first RA-RNTI according to the resource information of RAPID and PUSCH in the first message and the resource information used to send PRACH.
  • the PRACH resource information includes at least one of the following information: the position of the OFDM symbol occupied by the PRACH resource in the time domain, the position of the time slot occupied by the PRACH resource in the system frame, and The number of the resource occupied by the PRACH resource in the frequency domain, and whether the PRACH resource uses a normal uplink carrier or a single uplink carrier in the frequency domain.
  • the resource information of the PUSCH includes the resource index of the PUSCH.
  • the resource index of the PUSCH is the resource number of the PUSCH resource in the multiple PUSCH resources.
  • the resources of the PUSCH include resources for transmitting the PUSCH and resources of the demodulation reference signal DMRS corresponding to the PUSCH, where the time-frequency resources of the PUSCH include the time for transmitting the PUSCH Frequency resources and time-frequency resources of the DMRS.
  • the network device may perform the corresponding operation performed by the network device in the method 500 of the embodiment of the present application.
  • the terminal device 1200 includes a processing unit 1210, and the processing unit 1210 is configured to:
  • the first RA-RNTI is generated according to the PUSCH resource information in the first message of the 2-step random access process.
  • the terminal device may determine the first RA-RNTI according to the PUSCH resource information, so as to effectively obtain the RA-RNTI in the 2-step random access process.
  • the first RA-RNTI can uniquely identify the terminal device, thereby completing the descrambling of the first message and the second message in the 2-step random access process, further ensuring the effectiveness of the channel in the 2-step random access process transmission.
  • the processing unit 1210 is further configured to: generate a scrambling code sequence according to the first RA-RNTI, and use the scrambling code sequence to scramble the PUSCH in the first message; and/ Or, use the first RA-RNTI to descramble the physical downlink control channel PDCCH in the second message of the 2-step random access process.
  • the resource information of the PUSCH in the first message includes the resource index of the PUSCH.
  • the resource index of the PUSCH is the index of the DMRS corresponding to the PUSCH.
  • the resources of the PUSCH in the first message uniquely correspond to the preamble in the first message; or, the resources of the PUSCH in the first message correspond to multiple Preamble; or, the preamble in the first message corresponds to multiple PUSCH resources.
  • the processing unit 1210 is specifically configured to: according to the resource index of the PUSCH in the first message, And the number of the preamble in the plurality of preambles in the first message to generate the first RA-RNTI.
  • the time-frequency resources of the PUSCH in the first message include: time-frequency resources for transmitting the PUSCH, and time-frequency resources of the DMRS corresponding to the PUSCH.
  • the terminal device may perform the corresponding operation performed by the terminal device in the method 600 of the embodiment of the present application.
  • FIG. 13 is a schematic block diagram of a network device 1300 according to an embodiment of the present application. As shown in FIG. 13, the network device 1300 includes a processing unit 1310, and the processing unit 1310 is configured to:
  • the first RA-RNTI is generated according to the PUSCH resource information in the first message of the 2-step random access process.
  • the network device determines the first RA-RNTI according to the resource information of RAPID and PUSCH, so as to effectively obtain the RA-RNTI in the 2-step random access process.
  • the first RA-RNTI can uniquely identify the terminal device, thereby completing the descrambling of the first message and the second message in the 2-step random access process, further ensuring the effectiveness of the channel in the 2-step random access process transmission.
  • the processing unit 1310 is further configured to: use the first RA-RNTI to scramble the physical downlink control channel PDCCH in the second message of the 2-step random access process; and/or, according to The first RA-RNTI generates a scrambling code sequence, and uses the scrambling code sequence to descramble the PUSCH in the first message.
  • the resource information of the PUSCH in the first message includes the resource index of the PUSCH.
  • the resource index of the PUSCH is the index of the DMRS corresponding to the PUSCH.
  • the resources of the PUSCH in the first message uniquely correspond to the preamble in the first message; or, the resources of the PUSCH in the first message correspond to multiple Preamble; or, the preamble in the first message corresponds to multiple PUSCH resources.
  • the processing unit 1310 is specifically configured to: according to the resource index of the PUSCH in the first message, And the number of the preamble in the plurality of preambles in the first message to generate the first RA-RNTI.
  • the time-frequency resources of the PUSCH in the first message include: time-frequency resources for transmitting the PUSCH, and time-frequency resources of the DMRS corresponding to the PUSCH.
  • the network device may perform the corresponding operation performed by the network device in the method 700 of the embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a communication device 1400 provided by an embodiment of the present application.
  • the communication device 1400 shown in FIG. 14 includes a processor 1410.
  • the processor 1410 can call and run a computer program from the memory to implement the method in the embodiments of the present application.
  • the communication device 1400 may further include a memory 1420.
  • the processor 1410 can call and run a computer program from the memory 1420 to implement the method in the embodiments of the present application.
  • the memory 1420 may be a separate device independent of the processor 1410, or may be integrated in the processor 1410.
  • the communication device 1400 may further include a transceiver 1430, and the processor 1410 may control the transceiver 1430 to communicate with other devices, specifically, may send information or data to other devices, or receive other Information or data sent by the device.
  • the processor 1410 may control the transceiver 1430 to communicate with other devices, specifically, may send information or data to other devices, or receive other Information or data sent by the device.
  • the transceiver 1430 may include a transmitter and a receiver.
  • the transceiver 1430 may further include antennas, and the number of antennas may be one or more.
  • the communication device 1400 may specifically be the terminal device of the embodiment of the present application, and the communication device 1400 may implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application. .
  • the communication device 1400 may specifically be a network device according to an embodiment of the present application, and the communication device 1400 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. .
  • the chip 1500 shown in FIG. 15 includes a processor 1510, and the processor 1510 can call and run a computer program from the memory to implement the method in the embodiments of the present application.
  • the chip 1500 may further include a memory 1520.
  • the processor 1510 can call and run a computer program from the memory 1520 to implement the method in the embodiments of the present application.
  • the memory 1520 may be a separate device independent of the processor 1510, or may be integrated in the processor 1510.
  • the chip 1500 may further include an input interface 1530.
  • the processor 1510 can control the input interface 1530 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
  • the chip 1500 may further include an output interface 1540.
  • the processor 1510 can control the output interface 1540 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
  • the chip can be applied to the terminal device in the embodiments of the present application, and the chip can implement the corresponding process implemented by the terminal device in each method of the embodiments of the present application.
  • the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the chip described in the embodiments of the present application may also be referred to as a system-level chip, a system chip, a chip system, or a system-on-chip chip.
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capabilities.
  • each step of the foregoing method embodiment may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the aforementioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an existing programmable gate array (Field Programmable Gate Array, FPGA), or other available Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application may be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied and executed by a hardware decoding processor, or may be executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a mature storage medium in the art, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, and registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electronically Erasable programmable read only memory (Electrically, EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • Synchlink DRAM SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiments of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous Dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data) SDRAM (DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic Random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on.
  • static random access memory static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous Dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • double data SDRAM double data rate synchronous dynamic random access memory
  • DDR SDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • synchronous connection dynamic Random access memory switch link DRAM, SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • FIG. 16 is a schematic block diagram of a communication system 1600 according to an embodiment of the present application. As shown in FIG. 16, the communication system 1600 includes a terminal device 1610 and a network device 1620.
  • the terminal device 1610 is configured to: generate a first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process; use the first RA-RNTI to scramble the PUSCH, and/or, use the first RA-RNTI to descramble the PDCCH in the second message of the 2-step random access process.
  • the network device 1620 is configured to: generate a first RA-RNTI according to the RAPID and PUSCH resource information in the first message of the 2-step random access process; use the first RA-RNTI to scramble the 2 steps The PDCCH in the second message of the random access process, and/or, descrambles the PUSCH using the first RA-RNTI.
  • the terminal device 1610 may be used to implement the corresponding functions implemented by the terminal device in the method 400 of the embodiment of the present application, and the composition of the terminal device 1610 may be as shown in the terminal device 1000 in FIG. This will not be repeated here.
  • the network device 1620 may be used to implement the corresponding functions implemented by the network device in the method 500 of the embodiment of the present application, and the composition of the network device 1620 may be as shown in the network device 1100 in FIG. This will not be repeated here.
  • FIG. 17 is a schematic block diagram of a communication system 1700 according to an embodiment of the present application. As shown in FIG. 17, the communication system 1700 includes a terminal device 1710 and a network device 1720.
  • the terminal device 1710 is configured to: generate a first RA-RNTI according to the PUSCH resource information in the first message of the 2-step random access process; generate and use a scrambling code sequence according to the first RA-RNTI The scrambling code sequence scrambles the PUSCH in the first message, and/or, uses the first RA-RNTI to descramble the physical downlink in the second message of the 2-step random access process Control channel PDCCH.
  • the network device 1720 is configured to: generate a first RA-RNTI according to the PUSCH resource information in the first message of the 2-step random access process; use the first RA-RNTI to scramble the 2-step random access
  • the PDCCH in the second message of the incoming process and/or, generates a scrambling code sequence according to the first RA-RNTI, and uses the scrambling code sequence to descramble the PUSCH in the first message.
  • the terminal device 1710 may be used to implement the corresponding functions implemented by the terminal device in the method 600 of the embodiment of the present application, and the composition of the terminal device 1710 may be as shown in the terminal device 1200 in FIG. 12. This will not be repeated here.
  • the network device 1720 may be used to implement the corresponding functions implemented by the network device in the method 700 of the embodiment of the present application, and the composition of the network device 1720 may be as shown in the network device 1300 in FIG. 13, for simplicity, in This will not be repeated here.
  • Embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium can be applied to the network device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding process implemented by the network device in each method of the embodiments of the present application.
  • the computer-readable storage medium can be applied to the terminal device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. Repeat.
  • An embodiment of the present application also provides a computer program product, including computer program instructions.
  • the computer program product can be applied to the network device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program product can be applied to the terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application. Repeat again.
  • An embodiment of the present application also provides a computer program.
  • the computer program can be applied to the network device in the embodiment of the present application.
  • the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. And will not be repeated here.
  • the computer program can be applied to the terminal device in the embodiments of the present application.
  • the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. And will not be repeated here.
  • system and "network” in the embodiments of the present invention are often used interchangeably herein.
  • the term “and/or” in this article is just an association relationship that describes an associated object, which means that there can be three kinds of relationships, for example, A and/or B, which can mean: A exists alone, A and B exist at the same time, exist alone B these three cases.
  • the character "/" in this article generally indicates that the related objects before and after are in an "or” relationship.
  • B corresponding to (corresponding to) A means that B is associated with A, and B can be determined according to A.
  • determining B based on A does not mean determining B based on A alone, and B may also be determined based on A and/or other information.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or may Integration into another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical, or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé d'accès aléatoire, permettant de réaliser une transmission efficace d'un canal dans un processus d'accès aléatoire en deux étapes. Le procédé comprend les étapes suivantes : un dispositif réseau génère un premier identifiant temporaire de réseau radio à accès aléatoire (RA-RNTI) selon un indice de préambule d'accès aléatoire (RAPID) et des informations de ressource d'un canal partagé de liaison montante physique (PUSCH) dans un premier message d'un processus d'accès aléatoire en deux étapes ; et le dispositif réseau utilise le premier RA-RNTI pour brouiller un canal de commande de liaison descendante physique (PDCCH) dans un second message du processus d'accès aléatoire en deux étapes, et/ou utilise le premier RA-RNTI pour désembrouiller le PUSCH.
PCT/CN2019/075125 2018-12-21 2019-02-14 Procédé et dispositif d'accès aléatoire WO2020124763A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201980026333.2A CN111989978B (zh) 2018-12-21 2019-02-14 随机接入的方法和设备

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/122864 WO2020124598A1 (fr) 2018-12-21 2018-12-21 Procédé et dispositif d'accès aléatoire
CNPCT/CN2018/122864 2018-12-21

Publications (1)

Publication Number Publication Date
WO2020124763A1 true WO2020124763A1 (fr) 2020-06-25

Family

ID=71099975

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2018/122864 WO2020124598A1 (fr) 2018-12-21 2018-12-21 Procédé et dispositif d'accès aléatoire
PCT/CN2019/075125 WO2020124763A1 (fr) 2018-12-21 2019-02-14 Procédé et dispositif d'accès aléatoire

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/122864 WO2020124598A1 (fr) 2018-12-21 2018-12-21 Procédé et dispositif d'accès aléatoire

Country Status (2)

Country Link
CN (1) CN111989978B (fr)
WO (2) WO2020124598A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220150956A1 (en) * 2019-03-28 2022-05-12 Samsung Electronics Co., Ltd. Method and apparatus for resource determination
WO2022267871A1 (fr) * 2021-06-22 2022-12-29 华为技术有限公司 Procédés et appareil d'accès aléatoire

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111050400B (zh) * 2018-10-12 2023-01-13 华为技术有限公司 信息处理的方法和装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180124822A1 (en) * 2016-11-01 2018-05-03 Qualcomm Incorporated Two step random access procedure
CN108282901A (zh) * 2017-01-06 2018-07-13 电信科学技术研究院 一种随机接入响应方法和装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10034308B2 (en) * 2014-03-11 2018-07-24 Lg Electronics Inc. Method for allocating temporary identifier to terminal in random access procedure in wireless communication system and apparatus therefor
CN108076532A (zh) * 2016-11-14 2018-05-25 北京信威通信技术股份有限公司 一种随机接入方法
CN108282902B (zh) * 2017-01-06 2023-11-07 北京三星通信技术研究有限公司 随机接入方法、基站和用户设备
WO2018132843A1 (fr) * 2017-01-13 2018-07-19 Motorola Mobility Llc Procédé et appareil de mise en œuvre d'un accès aléatoire basé sur la contention dans une fréquence porteuse
US10568007B2 (en) * 2017-03-22 2020-02-18 Comcast Cable Communications, Llc Handover random access

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180124822A1 (en) * 2016-11-01 2018-05-03 Qualcomm Incorporated Two step random access procedure
CN108282901A (zh) * 2017-01-06 2018-07-13 电信科学技术研究院 一种随机接入响应方法和装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CATT: "Further Details on NR 4-step RA Procedure", 3GPP TSG RAN WG1 MEETING #91, R1-1720174, 1 December 2017 (2017-12-01), XP051369810 *
OPPO: "2-steps RACH Procedure for NR-U", 3GPP TSG-RAN WG2 MEETING #104, R2-1816263, 16 November 2018 (2018-11-16), XP051555863 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220150956A1 (en) * 2019-03-28 2022-05-12 Samsung Electronics Co., Ltd. Method and apparatus for resource determination
WO2022267871A1 (fr) * 2021-06-22 2022-12-29 华为技术有限公司 Procédés et appareil d'accès aléatoire

Also Published As

Publication number Publication date
CN111989978B (zh) 2022-03-18
WO2020124598A1 (fr) 2020-06-25
CN111989978A (zh) 2020-11-24

Similar Documents

Publication Publication Date Title
WO2020020270A1 (fr) Procédé d'accès aléatoire, et dispositif de communication
CN113905453B (zh) 随机接入的方法和设备
CN111869306B (zh) 随机接入的方法、终端设备和网络设备
CN113490288B (zh) 随机接入的方法、设备和计算机可读存储介质
WO2020063828A1 (fr) Procédé d'accès aléatoire et appareil de communication
WO2020191679A1 (fr) Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau
WO2020124763A1 (fr) Procédé et dispositif d'accès aléatoire
TW202008835A (zh) 隨機存取的方法和通訊設備
CN112740808B (zh) 消息传输的方法和设备
WO2020172777A1 (fr) Procédé et appareil d'accès aléatoire
WO2020024616A1 (fr) Procédé d'accès aléatoire et dispositif associé
EP3624382B1 (fr) Procédé de réception de canal de liaison descendante, et appareil terminal
WO2022067519A1 (fr) Procédés et terminaux d'accès aléatoire
US20230129426A1 (en) Wireless communication method and terminal device
WO2022099634A1 (fr) Procédé de communication sans fil, dispositif terminal, et dispositif de réseau
CN113812191B (zh) 发送或接收反馈信息的方法和装置
CN112997575B (zh) 无线通信方法、终端设备和网络设备
CN113115423B (zh) 控制功率攀升计数器的方法和终端设备
US20240080817A1 (en) Wireless communication method, terminal device, and network device
US20220225433A1 (en) Wireless communication method, terminal device, and network device
WO2020206597A1 (fr) Procédé de distribution de puissance et dispositif terminal
KR20220035874A (ko) 무선 통신 방법, 단말 장치 및 네트워크 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19899737

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19899737

Country of ref document: EP

Kind code of ref document: A1