WO2020156188A1 - 一种随机接入方法、设备及装置 - Google Patents

一种随机接入方法、设备及装置 Download PDF

Info

Publication number
WO2020156188A1
WO2020156188A1 PCT/CN2020/072321 CN2020072321W WO2020156188A1 WO 2020156188 A1 WO2020156188 A1 WO 2020156188A1 CN 2020072321 W CN2020072321 W CN 2020072321W WO 2020156188 A1 WO2020156188 A1 WO 2020156188A1
Authority
WO
WIPO (PCT)
Prior art keywords
step rach
terminal
base station
initiating
random access
Prior art date
Application number
PCT/CN2020/072321
Other languages
English (en)
French (fr)
Inventor
谌丽
皮埃尔
Original Assignee
电信科学技术研究院有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 电信科学技术研究院有限公司 filed Critical 电信科学技术研究院有限公司
Publication of WO2020156188A1 publication Critical patent/WO2020156188A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/541Allocation or scheduling criteria for wireless resources based on quality criteria using the level of interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/542Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Definitions

  • This application relates to the field of wireless communication technology, and in particular to a random access method, equipment and device.
  • Random access in LTE (Long Term Evolution) and NR (New Radio) systems is divided into two types: competitive random access and non-competitive random access. The process is as follows:
  • FIG. 1 is a schematic diagram of the competitive random access process, as shown in the figure, it is mainly divided into four steps, called 4-step RACH (four-step random access; RACH: Random Access Channel, random access channel):
  • Msg1 UE (User Equipment, terminal) selects random access preamble (random access preamble) and PRACH (Physical Random Access Channel, physical random access channel) resources and uses the PRACH resource to send the selected resources to the base station Random access preamble.
  • Random access preamble random access preamble
  • PRACH Physical Random Access Channel, physical random access channel
  • Msg2 The base station receives the preamble and sends a random access response.
  • Random access response includes two parts: MAC (Media Access Control) header and MAC RAR (Random Access Response, random access response).
  • the MAC header contains multiple subheaders, and its main content is RAPID (Random Access Preamble ID) and backoff parameter BI (Backoff Indicator, backoff indication).
  • Figure 2 is a schematic diagram of the MAC subheader with RAPID.
  • FIG. 3 is a schematic diagram of MAC RAR, including timing advance TAC (Time Advance Command), uplink resource grant (UL Grant) for Msg3, and Temporary C-RNTI (temporary C-RNTI; C-RNTI) allocated by the network side : Cell-Radio Network Temporary Identifier, cell wireless network temporary identifier).
  • the PDCCH physical downlink control channel
  • RA-RNTI Random Access-Radio Network Temporary Identity, random access wireless network temporary identification
  • RA-RNTI is used in the UE to receive Msg2 window
  • the long term uniquely corresponds to the time-frequency resource for sending Msg1.
  • the UE determines through the RA-RNTI and the preamble ID that the Msg2 corresponds to the Msg1 it sends.
  • Msg3 The UE sends uplink transmission on the UL grant specified by Msg2.
  • the content of Msg3 uplink transmission is different for different random access reasons. For example, for initial access, Msg3 transmits an RRC (Radio Resource Control, radio resource control) connection establishment request. What the connected UE sends in Msg3 is C-RNTI MAC CE (Control Element, control element).
  • RRC Radio Resource Control, radio resource control
  • Msg4 Contention resolution message.
  • the UE can judge whether the random access is successful according to Msg4.
  • Msg4 For idle UEs (UEs in idle state) or inactive UEs (UEs in inactive state), Msg4 carries CCCH (Common Control Channel) MAC CE corresponding to the RRC signaling of Msg3.
  • Msg4 is The PDCCH with the C-RNTI uniquely identified in the UE cell is used for contention resolution.
  • the temporary C-RNTI is converted to the unique UE identification C-RNTI of the UE in the cell after the contention is resolved successfully.
  • FIG. 4 is a schematic diagram of the non-competitive random access process.
  • the non-competitive random access is shown in the figure, which is mainly divided into three steps:
  • Msg0 The base station allocates a dedicated preamble for non-contention random access and PRACH resources for random access to the UE.
  • Msg1 The UE sends the designated dedicated preamble to the base station on the designated PRACH resource according to the instruction of Msg0. After receiving Msg1, the base station calculates uplink TA (Timing Advance) according to Msg1.
  • the base station sends a random access response to the UE.
  • the random access response contains timing advance information and UL grant for subsequent uplink transmission resource allocation.
  • the timing advance is used for the timing relationship of the UE's subsequent uplink transmission.
  • a two-step random access process (2-step RACH) is derived on the basis of 4-step RACH (Random access).
  • Figure 5 is a schematic diagram of the 2-step RACH access process. , The process is shown in the figure.
  • 2-step RACH is a contention random access, and contention resolution needs to be completed.
  • the 2-step RACH resource occupancy and failure probability are both large. If it is not restricted, it will cause a large random access failure probability and radio resource occupancy. At the same time, it will cause uplink interference to other terminals and reduce the overall network transmission efficiency.
  • This application provides a random access method, equipment, and device to prevent problems caused by 2-step RACH without restriction.
  • the embodiment of the application provides a random access method, which includes: configuring a rule that allows the use of two-step random access (2-step RACH) for the terminal; when the terminal initiates random access according to the rule, perform random access for the terminal Access.
  • the rule is configured to the terminal in one of the following ways or a combination:
  • the base station informs the terminal whether the cell supports 2-step RACH in the system message, so that the terminal can initiate 2-step RACH when the base station supports 2-step RACH;
  • the base station notifies the terminal of the conditions for initiating 2-step RACH in the system message, so that the terminal can initiate 2-step RACH when the conditions are met;
  • the base station allocates 2-step RACH resources to the terminal through RRC dedicated signaling, so that when the terminal is in the connected state, it can initiate a 2-step RACH.
  • the base station informs the terminal whether the cell supports 2-step RACH in the system message, it further includes:
  • the base station configures the msgA preamble code and PRACH resource in the 2-step RACH in the system message, and the corresponding PUSCH resource.
  • the base station notifies the terminal to initiate a 2-step RACH condition in a system message including one of the following conditions or a combination:
  • the probability threshold p for initiating 2-step RACH enables the terminal to calculate the random number a when initiating competitive random access. If a ⁇ p, then 2-step RACH can be initiated;
  • the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling becomes invalid under one of the following conditions or a combination:
  • the 2-step RACH resource becomes invalid when the uplink timing between the terminal and the base station is out of synchronization
  • the 2-step RACH resource becomes invalid when the terminal leaves the connected state or leaves the cell configured with 2-step RACH resource;
  • the base station configures the effective duration when performing 2-step RACH resource configuration. If the effective duration is exceeded, the 2-step RACH resource becomes invalid.
  • the embodiment of the present application provides a random access method, including: determining that a base station configures a rule for allowing the use of 2-step RACH for a terminal; and initiating a 2-step RACH or a 4-step RACH according to the rule.
  • determining that the base station configures a rule that allows the use of two-step random access 2-step RACH for the terminal, and initiating a 2-step RACH according to the rule includes one of the following operations:
  • the terminal determines whether the base station supports 2-step RACH according to whether the cell supports 2-step RACH notified by the base station in the system message, it can initiate 2-step RACH;
  • the terminal determines that the terminal can initiate 2-step RACH when the conditions are met;
  • the terminal can initiate a 2-step RACH when it is in the connected state.
  • the method further includes: receiving the 2-step RACH configured by the base station in the system message The preamble code and PRACH resource of msgA, and the corresponding PUSCH resource.
  • the terminal determines to initiate a 2-step RACH when the condition is met according to the condition for initiating 2-step RACH notified by the base station in the system message, including one of the following operations:
  • the terminal receives the probability threshold p of initiating 2-step RACH notified by the base station in the system message.
  • the terminal calculates the random number a when initiating competitive random access, and if a ⁇ p, it can initiate 2-step RACH;
  • the terminal receives the terminal speed threshold for initiating 2-step RACH notified by the base station in the system message, and can initiate a 2-step RACH when the speed is lower than the speed threshold;
  • the terminal receives the terminal type for initiating 2-step RACH notified by the base station in the system message, and when the type is satisfied, it can initiate 2-step RACH;
  • the terminal receives the terminal access level for initiating 2-step RACH notified by the base station in the system message, and when the access level is higher than the access level, it can initiate 2-step RACH;
  • the terminal receives the NR COT threshold for initiating 2-step RACH notified by the base station in the system message, and can initiate 2-step RACH when the NR COT is lower than the NR COT threshold.
  • the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling becomes invalid under one of the following conditions or a combination:
  • the 2-step RACH resource becomes invalid when the uplink timing between the terminal and the base station is out of synchronization
  • the 2-step RACH resource becomes invalid when the terminal leaves the connected state or leaves the cell configured with 2-step RACH resource;
  • the base station configures the effective duration when performing 2-step RACH resource configuration. If the effective duration is exceeded, the 2-step RACH resource becomes invalid.
  • An embodiment of the present application provides a base station, including: a memory, a processor, and a transceiver; wherein the memory stores computer instructions, and the processor is configured to read the computer instructions in the memory and execute the following process:
  • Transceiver used to receive and send data under the control of the processor.
  • the rule is configured to the terminal in one of the following ways or a combination:
  • the processor is further used to: if the base station supports 2-step RACH, configure the preamble code of msgA in the 2-step RACH in the system message And PRACH resources, and corresponding PUSCH resources.
  • the conditions for informing the terminal to initiate 2-step RACH in the system message include one or a combination of the following conditions:
  • the probability p threshold of initiating 2-step RACH the terminal calculates the random number a when initiating a competitive random access, if a ⁇ p, it can initiate a 2-step RACH;
  • the type of terminal that initiates 2-step RACH when the terminal type is satisfied, it can initiate 2-step RACH;
  • the terminal can initiate a 2-step RACH.
  • the 2-step RACH resource allocated to the terminal through RRC dedicated signaling becomes invalid under one of the following conditions or a combination:
  • the 2-step RACH resource becomes invalid when the uplink timing between the terminal and the base station is out of synchronization
  • the 2-step RACH resource becomes invalid when the terminal leaves the connected state or leaves the cell configured with 2-step RACH resource;
  • the base station configures the effective duration when performing 2-step RACH resource configuration. If the effective duration is exceeded, the 2-step RACH resource becomes invalid.
  • the embodiment of the present application of the present invention provides a terminal, including: a memory, a processor, and a transceiver; wherein the memory stores computer instructions, and the processor is configured to read the computer instructions in the memory and execute the following process :
  • Transceiver used to receive and send data under the control of the processor.
  • the rules include one or a combination of the following methods:
  • the base station informs the terminal whether the cell supports 2-step RACH in the system message, and the terminal can initiate 2-step RACH when the base station supports it;
  • the base station informs the terminal of the conditions for initiating 2-step RACH in the system message, and the terminal can initiate 2-step RACH when the conditions are met;
  • the base station allocates 2-step RACH resources to the terminal through RRC dedicated signaling.
  • the terminal When the terminal is in the connected state, it can initiate a 2-step RACH.
  • the terminal when the terminal is notified in the system message whether the cell supports 2-step RACH, it further includes:
  • the base station supports 2-step RACH, receive the preamble code and PRACH resource of msgA in the 2-step RACH configured by the base station in the system message, and the corresponding PUSCH resource.
  • the base station notifies the terminal to initiate a 2-step RACH condition in a system message including one of the following conditions or a combination:
  • the probability p threshold of initiating 2-step RACH the terminal calculates the random number a when initiating a competitive random access, if a ⁇ p, it can initiate a 2-step RACH;
  • the type of terminal that initiates 2-step RACH when the terminal type is satisfied, it can initiate 2-step RACH;
  • the terminal can initiate a 2-step RACH.
  • the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling becomes invalid under one of the following conditions or a combination:
  • the 2-step RACH resource becomes invalid when the uplink timing between the terminal and the base station is out of synchronization
  • the 2-step RACH resource becomes invalid when the terminal leaves the connected state or leaves the cell configured with 2-step RACH resource;
  • the base station configures the effective duration when performing 2-step RACH resource configuration. If the effective duration is exceeded, the 2-step RACH resource becomes invalid.
  • the embodiment of the application provides a random access device, which includes: a configuration module, used to configure a rule allowing the use of 2-step RACH for the terminal; a random access module, used when the terminal initiates random access according to the rule , Perform random access for the terminal.
  • the embodiment of the application provides a random access device, which includes: a determining module, configured to determine that a base station configures a rule allowing the use of 2-step RACH for a terminal; an initiating module, configured to initiate a 2-step RACH according to the rule, or Initiate 4-step RACH.
  • An embodiment of the present application provides a computer-readable storage medium, and the computer-readable storage medium stores a computer program that executes the foregoing random access method.
  • the terminal can initiate an initiation according to the rule after determining that the base station configures a rule that allows the use of 2-step RACH for the terminal.
  • 2-step RACH or 4-step RACH is initiated; and the base station performs random access for the terminal when the terminal initiates random access according to the rule. Therefore, since the base station can provide 2-step RACH access rules, the terminal is also optional. Therefore, the success rate of initiating random access can be improved according to the network and terminal conditions, and the 2-step RACH can be reduced or even eliminated.
  • the uplink interference improves the accuracy of uplink data transmission, and because the uplink interference to other terminals is reduced, the transmission efficiency of the entire network can be improved.
  • Figure 1 is a schematic diagram of a competitive random access process in the background technology
  • FIG. 2 is a schematic diagram of a MAC subheader with RAPID in the background art
  • FIG. 3 is a schematic diagram of MAC RAR in the background art
  • Figure 4 is a schematic diagram of a non-competitive random access process in the background art
  • Figure 5 is a schematic diagram of a 2-step RACH access process in the background art
  • FIG. 6 is a schematic diagram of the implementation process of the random access method on the network side in an embodiment of the application
  • FIG. 7 is a schematic diagram of the implementation process of the random access method on the terminal side in an embodiment of the application.
  • FIG. 8 is a schematic diagram of the structure of a base station in an embodiment of the application.
  • FIG. 9 is a schematic diagram of a terminal structure in an embodiment of the application.
  • the first step of 2-step RACH needs to send PUSCH (Physical Uplink Shared Channel) transmission.
  • PUSCH Physical Uplink Shared Channel
  • the terminal and the base station have not yet achieved uplink synchronization.
  • the data sent by the terminal has inter-symbol interference.
  • the transmission of msgA on the PUSCH may not be received correctly.
  • the terminal may also cause interference to other terminals, so that the transmission of other terminals cannot be performed correctly. Therefore, the terminal cannot always successfully initiate a 2-step RACH, so measures need to be taken to control the 2-step RACH.
  • Figure 6 is a schematic diagram of the implementation process of the random access method on the network side. As shown in the figure, it may include:
  • Step 601 Configure a rule that allows the use of 2-step RACH for the terminal;
  • Step 602 When the terminal initiates random access according to the rule, perform random access for the terminal.
  • Figure 7 is a schematic diagram of the implementation process of the random access method on the terminal side. As shown in the figure, it may include:
  • Step 701 Determine that the base station configures a rule that allows the use of 2-step RACH for the terminal;
  • Step 702 Initiate 2-step RACH or 4-step RACH according to the rule.
  • the base station configures a rule that allows the use of 2-step RACH for the terminal, and the terminal chooses to use 2-step RACH or 4-step RACH according to the base station configuration.
  • the rules include one or a combination of the following methods:
  • Method 1 The base station informs the terminal whether the cell supports 2-step RACH in a system message, and the terminal can initiate a 2-step RACH when the base station supports it;
  • Method 2 The base station informs the terminal of the conditions for initiating 2-step RACH in the system message, and the terminal can initiate 2-step RACH when the conditions are met;
  • Method 3 The base station allocates 2-step RACH resources to the terminal through RRC dedicated signaling. When the terminal is in the connected state, it can initiate a 2-step RACH.
  • the base station informs the terminal whether the cell supports 2-step RACH in a system message, and the terminal can initiate a 2-step RACH when the base station supports it.
  • the 2-step RACH configuration can be set to optional (optional). When the resource appears, it means that 2-step RACH can be supported, and when it does not appear, it means it is not allowed. .
  • the "optional" option itself occupies 1 bit (bit).
  • the base station informs the terminal whether the cell supports 2-step RACH in a system message. If supported, the base station configures the preamble code and PRACH resource of the first step message (msgA) in the 2-step RACH in the system message, and the corresponding PUSCH resource.
  • msgA first step message
  • the network side may further include: if the base station supports 2-step RACH, the base station configures the preamble code of msgA in the 2-step RACH in the system message And PRACH resources, and corresponding PUSCH resources.
  • the terminal side may further include: if the base station supports 2-step RACH, receiving the msgA preamble code and PRACH resource in the 2-step RACH configured by the base station in the system message, and the corresponding PUSCH resource.
  • the base station notifies the terminal of the condition for initiating 2-step RACH in the system message, and the terminal can initiate the 2-step RACH when the condition is met.
  • the base station notifies the terminal to initiate 2-step RACH conditions in a system message, which may include one of the following conditions or a combination:
  • the probability threshold p of initiating 2-step RACH the terminal calculates the random number a when initiating competitive random access, and if a ⁇ p, it can initiate 2-step RACH;
  • the terminal calculates the random number a when initiating a competitive random access, if a ⁇ p, initiate a 2-step RACH, otherwise, initiate a 4-step RACH.
  • This parameter is to limit the uplink interference within the expected range.
  • the terminal speed threshold for initiating 2-step RACH when the speed is lower than the speed threshold, the terminal can initiate 2-step RACH;
  • the terminal speed threshold for 2-step RACH is initiated. If the terminal is lower than this speed, such as the terminal is stationary, a 2-step RACH can be initiated. This is because stationary or low-speed terminals can better estimate the uplink synchronization deviation through downlink timing synchronization, thereby ensuring that the uplink transmission does not exceed the CP (Cyclic Prefix) range and does not cause large interference.
  • CP Cyclic Prefix
  • Condition 3 The type of terminal that initiates 2-step RACH. When the type is met, the terminal can initiate 2-step RACH;
  • the type of terminal that initiates 2-step RACH for example, only machine type, or low-latency and high-reliability terminals can initiate 2-step RACH.
  • Condition 4 Initiate 2-step RACH terminal access level, when the terminal access level is higher than this access level, it can initiate 2-step RACH;
  • the terminal access level that initiates 2-step RACH only terminals higher than the access level can initiate 2-step RACH.
  • the NR COT threshold of the 2-step RACH is initiated, and the COT is Channel Occupied Time.
  • channel detection is required to determine the time period during which the frequency resource can be used.
  • a high COT means that the system can use the unlicensed frequency band for a long time.
  • the system can use the frequency band for a short time. If NR COT is lower than the configured threshold, the NR system can use this frequency band for a short time, and the terminal can initiate a 2-step RACH.
  • the base station allocates 2-step RACH resources to the terminal through RRC dedicated signaling, and the terminal can initiate a 2-step RACH when it is in the connected state.
  • the base station allocates 2-step RACH resources to the terminal through RRC dedicated signaling.
  • the terminal receiving the configuration can initiate a 2-step RACH.
  • the basis of this method is that even if the connected terminal has uplink out-of-synchronization, due to its prior information, the deviation of out-of-synchronization will not be too large, and the uplink transmission is more likely to remain in the CP (Cyclic Prefix).
  • the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling becomes invalid under one or a combination of the following conditions: the 2-step RACH resource becomes invalid when the uplink timing between the terminal and the base station is out of synchronization ; Or, the 2-step RACH resource becomes invalid when the terminal leaves the connected state or leaves the cell configured with 2-step RACH resources; or, the configuration takes effect when the base station performs the 2-step RACH resource configuration, and the effective time exceeds the effective time. 2-step RACH resource is invalid.
  • the base station uses a system message to inform whether the cell supports 2-step RACH.
  • Base station side The base station sends system messages to inform whether the cell supports 2-step RACH. If it supports, the base station configures the preamble code and PRACH resource of msgA in 2-step RACH in the system message, and the corresponding PUSCH resource.
  • Terminal side Receive system messages, determine whether 2-step RACH can be initiated in the cell, and if allowed, determine 2-step RACH resources.
  • the base station uses a system message to notify the conditions for initiating 2-step RACH.
  • the base station sends a system message, configures the preamble code and PRACH resource of msgA in 2-step RACH, and the corresponding PUSCH resource in the system message; and configures the usage conditions for the configured 2-step RACH resource, which can be specific One or a combination of the following:
  • the probability threshold p for initiating 2-step RACH is the probability threshold p for initiating 2-step RACH.
  • the type of terminal that initiates 2-step RACH is the type of terminal that initiates 2-step RACH.
  • Terminal side Receive system messages, determine 2-step RACH resources and their use conditions, and determine whether the terminal meets the use conditions of 2-step RACH, if they are met, then initiate 2-step RACH, otherwise, initiate 4-step RACH.
  • the base station uses RRC dedicated signaling to allocate 2-step RACH resources to the terminal.
  • Base station side allocate 2-step RACH resources to the terminal through RRC dedicated signaling.
  • the failure condition of the 2-step RACH resource is one or a combination of the following:
  • This resource only becomes invalid when the uplink timing between the terminal and the base station is out of synchronization
  • the resource becomes invalid when the terminal leaves the connected state or leaves the cell configured with 2-step RACH resources;
  • the base station configures the effective duration when performing 2-step RACH resource configuration. If the duration is exceeded, the resource becomes invalid.
  • Terminal side Receive 2-step RACH resources allocated by dedicated RRC signaling on the base station side. When random access needs to be initiated, if the resources are valid, 2-step RACH is initiated.
  • the embodiments of this application also provide a base station, terminal, random access device, and storage medium. Since the principles of these devices to solve the problem are similar to the random access method, the implementation of these devices can be found in the method Implementation, the repetition will not be repeated.
  • FIG. 8 is a schematic diagram of the base station structure. As shown in the figure, the base station includes:
  • the processor 800 is configured to read computer instructions in the memory 820 and execute the following process:
  • the transceiver 810 is configured to receive and send data under the control of the processor 800.
  • the rules include one or a combination of the following methods:
  • the base station informs the terminal whether the cell supports 2-step RACH in the system message, and the terminal can initiate 2-step RACH when the base station supports it;
  • the base station informs the terminal of the conditions for initiating 2-step RACH in the system message, and the terminal can initiate 2-step RACH when the conditions are met;
  • the base station allocates 2-step RACH resources to the terminal through RRC dedicated signaling.
  • the terminal When the terminal is in the connected state, it can initiate a 2-step RACH.
  • the base station when the base station notifies the terminal whether the cell supports 2-step RACH in the system message, it further includes:
  • the base station configures the preamble code and PRACH resource of msgA in 2-step RACH in the system message, and the corresponding PUSCH resource.
  • the base station notifies the terminal to initiate a 2-step RACH condition in a system message including one of the following conditions or a combination:
  • the probability p threshold of initiating 2-step RACH the terminal calculates the random number a when initiating a competitive random access, if a ⁇ p, it can initiate a 2-step RACH;
  • the type of terminal that initiates 2-step RACH when the terminal type is satisfied, it can initiate 2-step RACH;
  • the terminal can initiate a 2-step RACH.
  • the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling becomes invalid under one of the following conditions or a combination:
  • the 2-step RACH resource becomes invalid when the uplink timing between the terminal and the base station is out of synchronization
  • the 2-step RACH resource becomes invalid when the terminal leaves the connected state or leaves the cell configured with 2-step RACH resource;
  • the base station configures the effective duration when performing 2-step RACH resource configuration. If the effective duration is exceeded, the 2-step RACH resource becomes invalid.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 800 and various circuits of the memory represented by the memory 820 are linked together.
  • the bus architecture can also link various other circuits such as peripherals, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, no further description will be given herein.
  • the bus interface provides the interface.
  • the transceiver 810 may be a plurality of elements, that is, including a transmitter and a transceiver, and provide a unit for communicating with various other devices on a transmission medium.
  • the processor 800 is responsible for managing the bus architecture and general processing, and the memory 820 can store data used by the processor 800 when performing operations.
  • Figure 9 is a schematic diagram of the terminal structure, as shown in the figure, including:
  • the processor 900 is configured to read computer instructions in the memory 920 and execute the following process:
  • the transceiver 910 is configured to receive and send data under the control of the processor 900.
  • the rules include one or a combination of the following methods:
  • the base station informs the terminal whether the cell supports 2-step RACH in the system message, and the terminal can initiate 2-step RACH when the base station supports it;
  • the base station informs the terminal of the conditions for initiating 2-step RACH in the system message, and the terminal can initiate 2-step RACH when the conditions are met;
  • the base station allocates 2-step RACH resources to the terminal through RRC dedicated signaling.
  • the terminal When the terminal is in the connected state, it can initiate a 2-step RACH.
  • the base station when the base station notifies the terminal whether the cell supports 2-step RACH in the system message, it further includes:
  • the base station supports 2-step RACH, receive the preamble code and PRACH resource of msgA in the 2-step RACH configured by the base station in the system message, and the corresponding PUSCH resource.
  • the base station notifies the terminal to initiate a 2-step RACH condition in a system message including one of the following conditions or a combination:
  • the probability p threshold of initiating 2-step RACH the terminal calculates the random number a when initiating a competitive random access, if a ⁇ p, it can initiate a 2-step RACH;
  • the type of terminal that initiates 2-step RACH when the terminal type is satisfied, it can initiate 2-step RACH;
  • the terminal can initiate a 2-step RACH.
  • the 2-step RACH resource allocated by the base station to the terminal through RRC dedicated signaling becomes invalid under one of the following conditions or a combination:
  • the 2-step RACH resource becomes invalid when the uplink timing between the terminal and the base station is out of synchronization
  • the 2-step RACH resource becomes invalid when the terminal leaves the connected state or leaves the cell configured with 2-step RACH resource;
  • the base station configures the effective duration when performing 2-step RACH resource configuration. If the effective duration is exceeded, the 2-step RACH resource becomes invalid.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 900 and various circuits of the memory represented by the memory 920 are linked together.
  • the bus architecture can also link various other circuits such as peripherals, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, no further description will be given herein.
  • the bus interface provides the interface.
  • the transceiver 910 may be a plurality of elements, that is, include a transmitter and a receiver, and provide a unit for communicating with various other devices on a transmission medium.
  • the user interface 930 may also be an interface capable of connecting externally and internally with the required equipment.
  • the connected equipment includes but not limited to a keypad, a display, a speaker, a microphone, a joystick, and the like.
  • the processor 900 is responsible for managing the bus architecture and general processing, and the memory 920 can store data used by the processor 900 when performing operations.
  • the embodiment of the present application provides a random access device, including: a configuration module, used to configure the terminal to allow the use of two-step random access 2-step RACH rules; random access module, used in the terminal according to the rules When random access is initiated, random access is performed for the terminal. For details, see the implementation of the random access method on the network side.
  • the embodiment of the application provides a random access device, which includes: a determining module, configured to determine that a base station configures a rule allowing the use of 2-step RACH for a terminal; an initiating module, configured to initiate a 2-step RACH according to the rule, or Initiate 4-step RACH.
  • a determining module configured to determine that a base station configures a rule allowing the use of 2-step RACH for a terminal
  • an initiating module configured to initiate a 2-step RACH according to the rule, or Initiate 4-step RACH.
  • An embodiment of the present application provides a computer-readable storage medium, and the computer-readable storage medium stores a computer program that executes the foregoing random access method. For details, see the implementation of the random access method on the network side and the terminal side.
  • each part of the above-mentioned device is divided into various modules or units by function and described separately.
  • the functions of each module or unit can be implemented in the same or multiple software or hardware.
  • the base station configures a rule that allows the use of 2-step RACH for the terminal, and the terminal selects whether to use 2-step RACH or 4-step RACH according to the configuration of the base station.
  • the base station informs the terminal whether the cell supports 2-step RACH in the system message. If it supports, the base station configures the preamble code and PRACH resource of msgA in 2-step RACH in the system message, and the corresponding PUSCH resource. The base station informs the terminal of the conditions for initiating 2-step RACH in the system message and the limited content of the specific conditions. The base station allocates 2-step RACH resources to the terminal through RRC dedicated signaling, and the conditions for the 2-step RACH to take effect.
  • this application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, optical storage, etc.) containing computer-usable program codes.
  • a computer-usable storage media including but not limited to disk storage, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can direct a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种随机接入方法、设备及装置,包括:基站为终端配置允许使用两步随机接入的规则;在终端按所述规则发起随机接入时,为终端执行随机接入。终端确定基站为终端配置允许使用两步随机接入的规则;根据所述规则发起两步随机接入,或发起四步随机接入。采用本申请,可以根据网络和终端的情况提高发起随机接入的成功率,降低甚至消除由于两步随机接入造成的上行干扰,提高上行数据传输正确率,并且由于降低了对其他终端的上行干扰,可以提高整个网络的传输效率。

Description

一种随机接入方法、设备及装置
本申请要求在2019年2月1日提交中国专利局、申请号为201910102928.3、发明名称为“一种随机接入方法、设备及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及无线通信技术领域,特别涉及一种随机接入方法、设备及装置。
背景技术
LTE(Long Term Evolution,长期演进)和NR(New Radio,新空口)系统的随机接入分为竞争随机接入和非竞争随机接入两种。其过程分别如下:
图1为竞争随机接入过程示意图,如图所示,主要分为四步,称为4-step RACH(四步随机接入;RACH:Random Access Channel,随机接入信道):
Msg1:UE(User Equipment,用户设备,即终端)选择随机接入preamble(随机接入前导码)和PRACH(Physical Random Access Channel,物理随机接入信道)资源并利用该PRACH资源向基站发送所选的随机接入preamble。
Msg2:基站接收到preamble,发送随机接入响应。随机接入响应包含两部分:MAC(Media Access Control,媒体接入控制)头和MAC RAR(Random Access Response,随机接入响应)。MAC头包含多个子头,其主要内容为RAPID(Random Access Preamble ID,随机接入前导码标识)和回退参数BI(Backoff Indicator,回退指示),图2为带RAPID的MAC子头示意图。图3为MAC RAR示意图,包括定时提前量TAC(Time Advance Command,定时提前命令)、针对Msg3的上行资源授权(UL Grant)和网络侧分配的Temporary C-RNTI(临时C-RNTI;C-RNTI:Cell-Radio Network Temporary Identifier,小区无线网络临时标识)。承载Msg2调度信息的PDCCH(physical downlink control channel,物理下行控制信道)用RA-RNTI(Random Access-Radio Network Temporary Identity,随机接入无线网络临时识别)加扰,RA-RNTI在UE接收Msg2的窗长内与发送Msg1的时频资源唯一对应。UE接收Msg2时,通过RA-RNTI和preamble ID确定该Msg2是与其发送的Msg1对应的。
Msg3:UE在Msg2指定的UL grant上发送上行传输,不同随机接入原因Msg3上行传输的内容不同,比如对于初始接入,Msg3传输的是RRC(Radio Resource Control,无线资源控制)连接建立请求,连接态UE在Msg3中发送的是C-RNTI MAC CE(Control Element, 控制单元)。
Msg4:竞争解决消息,UE根据Msg4可以判断随机接入是否成功。对idle UE(空闲态UE)或inactive UE(非激活态UE),Msg4携带的是与Msg3的RRC信令对应的CCCH(Common Control Channel,公共控制信道)MAC CE,对于连接态UE,Msg4是用带UE小区内唯一标识C-RNTI的PDCCH进行竞争解决。对于idle UE或inactive UE,竞争解决成功后临时C-RNTI转化为UE在该小区的唯一UE标识C-RNTI。
图4为非竞争随机接入过程示意图,非竞争随机接入如图所示,主要分为三步:
Msg0:基站向UE分配用于非竞争随机接入的专用preamble以及随机接入使用的PRACH资源。
Msg1:UE根据Msg0的指示,在指定的PRACH资源上向基站发送指定的专用preamble。基站接收到Msg1后根据Msg1计算上行TA(Timing Advance,定时提前量)。
Msg2:基站向UE发送随机接入响应,随机接入响应中包含定时提前量信息、后续上行传输资源分配UL grant,定时提前量用于UE后续上行传输的定时关系。
在新一代无线网络NR系统中,在4-step RACH(Random access,随机接入)基础上引申出两步随机接入过程(2-step RACH),图5为2-step RACH接入过程示意图,其过程如图所示。2-step RACH是竞争随机接入,需要完成竞争解决。
2-step RACH资源占用和失败概率都较大,如果不加限制,会造成较大的随机接入失败概率和无线资源占用,同时造成对其他终端的上行干扰,造成整体网络传输效率下降。
发明内容
本申请提供了一种随机接入方法、设备及装置,用以对2-step RACH不加限制造成的问题。
本申请实施例提供了一种随机接入方法,包括:为终端配置允许使用两步随机接入(2-step RACH)的规则;在终端按所述规则发起随机接入时,为终端执行随机接入。
实施中,所述规则通过以下方式之一或者其组合配置给所述终端:
基站在系统消息中通知终端本小区是否支持2-step RACH,使得终端在基站支持2-step RACH时,则可发起2-step RACH;
基站在系统消息中通知终端发起2-step RACH的条件,使得终端在满足该条件时,则可发起2-step RACH;
基站通过RRC专用信令为终端分配2-step RACH资源,使得终端在处于连接态时,则可发起2-step RACH。
实施中,如果基站在系统消息中通知终端本小区是否支持2-step RACH,则进一步包括:
如果基站支持2-step RACH,则基站在系统消息中配置2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。
实施中,基站在系统消息中通知终端发起2-step RACH的条件包括如下条件之一或者其组合:
发起2-step RACH的概率门限p,使得终端在发起竞争随机接入时计算随机数a,如果a<p,则可发起2-step RACH;
发起2-step RACH的终端速度门限,使得终端在速度低于该速度门限时,则可发起2-step RACH;
发起2-step RACH的终端类型,使得终端在类型满足时,则可发起2-step RACH;
发起2-step RACH的终端接入等级,使得终端在接入等级高于该接入等级时,则可发起2-step RACH;
发起2-step RACH的NR信道占用时间NR COT门限,使得终端在NR COT低于该NR COT门限时,则可发起2-step RACH。
实施中,基站通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:
该2-step RACH资源在终端与基站之间上行定时失步时失效;
终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;
基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
本申请实施例提供了一种随机接入方法,包括:确定基站为终端配置允许使用2-step RACH的规则;根据所述规则发起2-step RACH,或发起4-step RACH。
实施中,确定基站为终端配置允许使用两步随机接入2-step RACH的规则,以及根据所述规则发起2-step RACH,包括以下操作之一:
若终端根据基站在系统消息中通知的本小区是否支持2-step RACH,确定在基站支持2-step RACH时,则可发起2-step RACH;
终端根据基站在系统消息中通知的发起2-step RACH的条件,确定终端在满足该条件时,则可发起2-step RACH;
终端根据基站通过RRC专用信令为终端分配的2-step RACH资源,在处于连接态时,则可发起2-step RACH。
实施中,若终端根据基站在系统消息中通知的本小区是否支持2-step RACH,确定基站支持2-step RACH,则所述方法进一步包括:接收基站在系统消息中配置的2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。
实施中,终端根据基站在系统消息中通知的发起2-step RACH的条件,确定在满足该条件时,发起2-step RACH,包括以下操作之一:
终端接收基站在系统消息中通知的发起2-step RACH的概率门限p,终端在发起竞争随机接入时计算随机数a,如果a<p,则可发起2-step RACH;
终端接收基站在系统消息中通知的发起2-step RACH的终端速度门限,在速度低于该速度门限时,则可发起2-step RACH;
终端接收基站在系统消息中通知的发起2-step RACH的终端类型,在类型满足时,则可发起2-step RACH;
终端接收基站在系统消息中通知的发起2-step RACH的终端接入等级,在接入等级高于该接入等级时,则可发起2-step RACH;
终端接收基站在系统消息中通知的发起2-step RACH的NR COT门限,在NR COT低于该NR COT门限时,则可发起2-step RACH。
实施中,基站通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:
该2-step RACH资源在终端与基站之间上行定时失步时失效;
终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;
基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
本申请实施例提供了一种基站,包括:存储器、处理器和收发机;其中,所述存储器存储有计算机指令,所述处理器被配置为读取存储器中的计算机指令,执行下列过程:
为终端配置允许使用2-step RACH的规则;
在终端按所述规则发起随机接入时,为终端执行随机接入;
收发机,用于在处理器的控制下接收和发送数据。
实施中,所述规则通过以下方式之一或者其组合配置给所述终端:
在系统消息中通知终端本小区是否支持2-step RACH,使得终端在基站支持2-step RACH时可发起2-step RACH;或,在系统消息中通知终端发起2-step RACH的条件,使得终端在满足该条件时可发起2-step RACH;或,通过RRC专用信令为终端分配2-step RACH资源,使得终端在处于连接态时可发起2-step RACH。
实施中,如果在系统消息中通知终端本小区是否支持2-step RACH时,则处理器进一步用于:如果基站支持2-step RACH,则在系统消息中配置2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。
实施中,在系统消息中通知终端发起2-step RACH的条件包括如下条件之一或者其组合:
发起2-step RACH的概率p门限,终端在发起竞争随机接入时计算随机数a,如果a<p,则可发起2-step RACH;
发起2-step RACH的终端速度门限,终端在速度低于该速度门限时,则可发起2-step RACH;
发起2-step RACH的终端类型,终端在类型满足时,则可发起2-step RACH;
发起2-step RACH的终端接入等级,终端在接入等级高于该接入等级时,则可发起2-step RACH;
发起2-step RACH的NR COT门限,终端在NR COT低于该NR COT门限时,则可发起2-step RACH。
实施中,通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:
该2-step RACH资源在终端与基站之间上行定时失步时失效;
终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;
基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
本发明本申请实施例提供了一种终端,包括:存储器、处理器和收发机;其中,所述存储器存储有计算机指令,所述处理器被配置为读取存储器中的计算机指令,执行下列过程:
确定基站为终端配置允许使用2-step RACH的规则;
根据所述规则发起2-step RACH,或发起4-step RACH;
收发机,用于在处理器的控制下接收和发送数据。
实施中,所述规则包括以下方式之一或者其组合:
基站在系统消息中通知终端本小区是否支持2-step RACH,终端在基站支持时,则可发起2-step RACH;
基站在系统消息中通知终端发起2-step RACH的条件,终端在满足该条件时,则可发起2-step RACH;
基站通过RRC专用信令为终端分配2-step RACH资源,终端在处于连接态时,则可发起2-step RACH。
实施中,在系统消息中通知终端本小区是否支持2-step RACH时,进一步包括:
如果基站支持2-step RACH,接收基站在系统消息中配置的2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。
实施中,基站在系统消息中通知终端发起2-step RACH的条件包括如下条件之一或者其组合:
发起2-step RACH的概率p门限,终端在发起竞争随机接入时计算随机数a,如果a<p,则可发起2-step RACH;
发起2-step RACH的终端速度门限,终端在速度低于该速度门限时,则可发起2-step RACH;
发起2-step RACH的终端类型,终端在类型满足时,则可发起2-step RACH;
发起2-step RACH的终端接入等级,终端在接入等级高于该接入等级时,则可发起2-step RACH;
发起2-step RACH的NR COT门限,终端在NR COT低于该NR COT门限时,则可发起2-step RACH。
实施中,基站通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:
该2-step RACH资源在终端与基站之间上行定时失步时失效;
终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;
基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
本申请实施例提供了一种随机接入装置,包括:配置模块,用于为终端配置允许使用2-step RACH的规则;随机接入模块,用于在终端按所述规则发起随机接入时,为终端执行随机接入。
本申请实施例提供了一种随机接入装置,包括:确定模块,用于确定基站为终端配置允许使用2-step RACH的规则;发起模块,用于根据所述规则发起2-step RACH,或发起4-step RACH。
本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储有执行上述随机接入方法的计算机程序。
在本申请实施例提供的技术方案中,由于基站为终端配置允许使用2-step RACH的规则, 一方面终端在确定基站为终端配置允许使用2-step RACH的规则后,可以根据所述规则发起2-step RACH或发起4-step RACH;而基站在终端按所述规则发起随机接入时,为终端执行随机接入。因此,由于基站能够提供2-step RACH接入的规则,终端也因此具有可选性,所以,可以根据网络和终端的情况提高发起随机接入的成功率,降低甚至消除由于2-step RACH造成的上行干扰,提高上行数据传输正确率,并且由于降低了对其他终端的上行干扰,可以提高整个网络的传输效率。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。
图1为背景技术中竞争随机接入过程示意图;
图2为背景技术中带RAPID的MAC子头示意图;
图3为背景技术中MAC RAR示意图;
图4为背景技术中非竞争随机接入过程示意图;
图5为背景技术中2-step RACH接入过程示意图;
图6为本申请实施例中网络侧随机接入方法实施流程示意图;
图7为本申请实施例中终端侧随机接入方法实施流程示意图;
图8为本申请实施例中基站结构示意图;
图9为本申请实施例中终端结构示意图。
具体实施方式
2-step RACH的第一步需要发送PUSCH(Physical Uplink Shared Channel,物理上行链路共享信道)传输,此时终端与基站还未实现上行同步,一来终端发送的数据有符号间干扰,基站很可能不能正确接收msgA在PUSCH上的传输,二来该终端还可能对其他终端造成干扰,使得其他终端的传输不能正确进行。所以,终端不能总是成功发起2-step RACH,因此需要采取措施对2-step RACH进行控制。
基于此,本申请提供了一种随机接入方案,下面结合附图对本申请的具体实施方式进行说明。
在说明过程中,将分别从终端与基站侧的实施进行说明,然后还将给出二者配合实施的实例以更好地理解本申请实施例中给出的方案的实施。这样的说明方式并不意味着二者必须配合实施、或者必须单独实施,实际上,当终端与基站分开实施时,其也各自解决终 端侧、基站侧的问题,而二者结合使用时,会获得更好的技术效果。
图6为网络侧随机接入方法实施流程示意图,如图所示,可以包括:
步骤601、为终端配置允许使用2-step RACH的规则;
步骤602、在终端按所述规则发起随机接入时,为终端执行随机接入。
图7为终端侧随机接入方法实施流程示意图,如图所示,可以包括:
步骤701、确定基站为终端配置允许使用2-step RACH的规则;
步骤702、根据所述规则发起2-step RACH,或发起4-step RACH。
实施中,基站为终端配置允许使用2-step RACH的规则,终端则根据基站配置选择使用2-step RACH还是4-step RACH。
实施中,所述规则包括以下方式之一或者其组合:
方式一、基站在系统消息中通知终端本小区是否支持2-step RACH,终端在基站支持时,则可发起2-step RACH;
方式二、基站在系统消息中通知终端发起2-step RACH的条件,终端在满足该条件时,则可发起2-step RACH;
方式三、基站通过RRC专用信令为终端分配2-step RACH资源,终端在处于连接态时,则可发起2-step RACH。
下面分别进行说明。
在上述方式一中,基站在系统消息中通知终端本小区是否支持2-step RACH,终端在基站支持时,则可发起2-step RACH。
具体实施中。在RRC IE(Information Element,信息单元)组织里,可以将2-step RACH配置设置为可选(optional),当该资源出现时,则表示可以支持2-step RACH,未出现时则表示不允许。其中“optional”选项本身占用1比特(bit)。
具体实施中,基站在系统消息中通知终端本小区是否支持2-step RACH。如果支持,基站在系统消息中配置2-step RACH中第一步消息(msgA)的preamble码和PRACH资源,以及与之对应的PUSCH资源。
也即,基站在系统消息中通知终端本小区是否支持2-step RACH时,网络侧还可以进一步包括:如果基站支持2-step RACH,基站在系统消息中配置2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。
相应的,在终端侧可以进一步包括:如果基站支持2-step RACH,接收基站在系统消息中配置的2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。
在上述方式二中,基站在系统消息中通知终端发起2-step RACH的条件,终端在满足该条件时,则可发起2-step RACH。
实施中,基站在系统消息中通知终端发起2-step RACH的条件可以包括如下条件之一或者其组合:
条件1、发起2-step RACH的概率门限p,终端在发起竞争随机接入时计算随机数a,如果a<p,则可发起2-step RACH;
该方式下,终端在发起竞争随机接入时计算随机数a,如果a<p,则发起2-step RACH,否则发起4-step RACH。这个参数是为了将上行干扰限制在预期范围内。
条件2、发起2-step RACH的终端速度门限,终端在速度低于该速度门限时,则可发起2-step RACH;
该方式下,发起2-step RACH的终端速度门限。如果终端低于这个速度,如终端静止,则可以发起2-step RACH。这是因为静止或低速的终端可以更好地通过下行定时同步估计上行同步偏差,从而保证上行传输不超过CP(Cyclic prefix,循环前缀)范围,不造成较大干扰。
条件3、发起2-step RACH的终端类型,终端在类型满足时,则可发起2-step RACH;
该方式下,发起2-step RACH的终端类型,例如只有机器类,或低时延高可靠需求终端可以发起2-step RACH。
条件4、发起2-step RACH的终端接入等级,终端在接入等级高于该接入等级时,则可发起2-step RACH;
该方式下,发起2-step RACH的终端接入等级,只有高于该接入等级的终端可以发起2-step RACH。
条件5、发起2-step RACH的NR COT门限,终端在NR COT低于该NR COT门限时,则可发起2-step RACH;
该方式下,发起2-step RACH的NR COT门限,COT即Channel Occupied Time(信道占用时间)。对于非授权频段的系统,需要进行信道检测,确定可以使用该频率资源的时间段,COT高即系统可以使用非授权频段的时间长,反之,系统可以使用该频段的时间短。如果NR COT低于配置门限,则NR系统可以使用该频段的时间短,终端可以发起2-step RACH。
在上述方式三中,基站通过RRC专用信令为终端分配2-step RACH资源,终端在处于连接态时,则可发起2-step RACH。
具体实施中,基站通过RRC专用信令为终端分配2-step RACH资源。这种方式下,只 有连接态,接收到该配置的终端可以发起2-step RACH。这种方式的依据是连接态终端即使发生上行失步,由于其有先验信息,失步的偏差不会太大,上行传输保持在CP(Cyclic Prefix,循环前缀)内的可能性较大。
因此,实施中,基站通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:该2-step RACH资源在终端与基站之间上行定时失步时失效;或,终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;或,基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
下面通过几个示例进行说明。
示例一
本例中,基站用系统消息通知本小区是否支持2-step RACH。
基站侧:基站发送系统消息,通知本小区是否支持2-step RACH。如果支持,基站在系统消息中配置2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。
终端侧:接收系统消息,确定是否可以在本小区发起2-step RACH,如果允许,确定2-step RACH的资源。
示例二
本例中,基站用系统消息通知发起2-step RACH的条件。
基站侧:基站发送系统消息,在系统消息中配置2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源;并针对配置的2-step RACH资源,配置使用条件,具体可以为以下一种或多种的组合:
发起2-step RACH的概率门限p。
发起2-step RACH的终端速度门限。
发起2-step RACH的终端类型。
发起2-step RACH的终端接入等级。
发起2-step RACH的NR COT门限。
终端侧:接收系统消息,确定2-step RACH资源及其使用条件,判断本终端是否满足使用2-step RACH的使用条件,如果满足,则发起2-step RACH,否则,发起4-step RACH。
示例三
本例中,基站用RRC专用信令为终端分配2-step RACH资源。
基站侧:通过RRC专用信令为终端分配2-step RACH资源。
该2-step RACH资源的失效条件为以下一种或多种的组合:
该资源只有在终端与基站之间上行定时失步时失效;
终端离开连接态或离开配置了2-step RACH资源的小区时该资源失效;
基站在进行2-step RACH资源配置的时候配置生效时长,超过该时长则该资源失效。
终端侧:接收基站侧用专用RRC信令分配的2-step RACH资源,当需要发起随机接入的时候,如果该资源有效,则发起2-step RACH。
基于同一发明构思,本申请实施例中还提供了一种基站、终端、随机接入装置、存储介质,由于这些设备解决问题的原理与随机接入方法相似,因此这些设备的实施可以参见方法的实施,重复之处不再赘述。
在实施本申请实施例提供的技术方案时,可以按如下方式实施。
图8为基站结构示意图,如图所示,基站中包括:
处理器800,用于读取存储器820中的计算机指令,执行下列过程:
为终端配置允许使用2-step RACH的规则;
在终端按所述规则发起随机接入时,为终端执行随机接入;
收发机810,用于在处理器800的控制下接收和发送数据。
实施中,所述规则包括以下方式之一或者其组合:
基站在系统消息中通知终端本小区是否支持2-step RACH,终端在基站支持时,则可发起2-step RACH;
基站在系统消息中通知终端发起2-step RACH的条件,终端在满足该条件时,则可发起2-step RACH;
基站通过RRC专用信令为终端分配2-step RACH资源,终端在处于连接态时,则可发起2-step RACH。
实施中,基站在系统消息中通知终端本小区是否支持2-step RACH时,进一步包括:
如果基站支持2-step RACH,基站在系统消息中配置2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。
实施中,基站在系统消息中通知终端发起2-step RACH的条件包括如下条件之一或者其组合:
发起2-step RACH的概率p门限,终端在发起竞争随机接入时计算随机数a,如果a<p,则可发起2-step RACH;
发起2-step RACH的终端速度门限,终端在速度低于该速度门限时,则可发起2-step RACH;
发起2-step RACH的终端类型,终端在类型满足时,则可发起2-step RACH;
发起2-step RACH的终端接入等级,终端在接入等级高于该接入等级时,则可发起2-step RACH;
发起2-step RACH的NR COT门限,终端在NR COT低于该NR COT门限时,则可发起2-step RACH。
实施中,基站通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:
该2-step RACH资源在终端与基站之间上行定时失步时失效;
终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;
基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
其中,在图8中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器800代表的一个或多个处理器和存储器820代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机810可以是多个元件,即包括发送机和收发机,提供用于在传输介质上与各种其他装置通信的单元。处理器800负责管理总线架构和通常的处理,存储器820可以存储处理器800在执行操作时所使用的数据。
图9为终端结构示意图,如图所示,包括:
处理器900,用于读取存储器920中的计算机指令,执行下列过程:
确定基站为终端配置允许使用2-step RACH的规则;
根据所述规则发起2-step RACH,或发起4-step RACH;
收发机910,用于在处理器900的控制下接收和发送数据。
实施中,所述规则包括以下方式之一或者其组合:
基站在系统消息中通知终端本小区是否支持2-step RACH,终端在基站支持时,则可发起2-step RACH;
基站在系统消息中通知终端发起2-step RACH的条件,终端在满足该条件时,则可发起2-step RACH;
基站通过RRC专用信令为终端分配2-step RACH资源,终端在处于连接态时,则可发起2-step RACH。
实施中,基站在系统消息中通知终端本小区是否支持2-step RACH时,进一步包括:
如果基站支持2-step RACH,接收基站在系统消息中配置的2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。
实施中,基站在系统消息中通知终端发起2-step RACH的条件包括如下条件之一或者其组合:
发起2-step RACH的概率p门限,终端在发起竞争随机接入时计算随机数a,如果a<p,则可发起2-step RACH;
发起2-step RACH的终端速度门限,终端在速度低于该速度门限时,则可发起2-step RACH;
发起2-step RACH的终端类型,终端在类型满足时,则可发起2-step RACH;
发起2-step RACH的终端接入等级,终端在接入等级高于该接入等级时,则可发起2-step RACH;
发起2-step RACH的NR COT门限,终端在NR COT低于该NR COT门限时,则可发起2-step RACH。
实施中,基站通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:
该2-step RACH资源在终端与基站之间上行定时失步时失效;
终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;
基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
其中,在图9中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器900代表的一个或多个处理器和存储器920代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机910可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。针对不同的用户设备,用户接口930还可以是能够外接内接需要设备的接口,连接的设备包括但不限于小键盘、显示器、扬声器、麦克风、操纵杆等。
处理器900负责管理总线架构和通常的处理,存储器920可以存储处理器900在执行操作时所使用的数据。
本申请实施例提供了一种随机接入装置,包括:配置模块,用于为终端配置允许使用两步随机接入2-step RACH的规则;随机接入模块,用于在终端按所述规则发起随机接入时,为终端执行随机接入。具体可以参见网络侧的随机接入方法的实施。
本申请实施例提供了一种随机接入装置,包括:确定模块,用于确定基站为终端配置允许使用2-step RACH的规则;发起模块,用于根据所述规则发起2-step RACH,或发起4-step RACH。具体可以参见终端侧的随机接入方法的实施。
本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储有执行上述随机接入方法的计算机程序。具体可以参见网络侧与终端侧的随机接入方法的实施。
为了描述的方便,以上所述装置的各部分以功能分为各种模块或单元分别描述。当然,在实施本申请时可以把各模块或单元的功能在同一个或多个软件或硬件中实现。
综上所述,本申请实施例提供的技术方案中,基站为终端配置允许使用2-step RACH的规则,终端根据基站配置选择使用2-step RACH还是4-step RACH。
具体还提供了基站在系统消息中通知终端本小区是否支持2-step RACH。如果支持,基站在系统消息中配置2-step RACH中msgA的preamble码和PRACH资源,以及与之对应的PUSCH资源。基站在系统消息中通知终端发起2-step RACH的条件,以及具体条件的限定内容。基站通过RRC专用信令为终端分配2-step RACH资源,以及该2-step RACH的生效条件。
采用该方案,可以降低甚至消除由于2-step RACH造成的上行干扰,从而提高随机接入成功概率和上行数据传输正确率。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个 方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (27)

  1. 一种随机接入方法,其特征在于,包括:
    为终端配置允许使用两步随机接入2-step RACH的规则;
    在终端按所述规则发起随机接入时,为终端执行随机接入。
  2. 如权利要求1所述的方法,其特征在于,所述规则通过以下方式之一或者其组合配置给所述终端:
    基站在系统消息中通知终端本小区是否支持2-step RACH,使得终端在基站支持2-step RACH时发起2-step RACH;
    基站在系统消息中通知终端发起2-step RACH的条件,使得终端在满足该条件时发起2-step RACH;
    基站通过无线资源控制RRC专用信令为终端分配2-step RACH资源,使得终端在处于连接态时发起2-step RACH。
  3. 如权利要求2所述的方法,其特征在于,如果基站在系统消息中通知终端本小区是否支持2-step RACH,则所述方法进一步包括:
    如果基站支持2-step RACH,则基站在系统消息中配置2-step RACH中第一步消息的前导码和物理随机接入信道PRACH资源,以及与之对应的物理上行链路共享信道PUSCH资源。
  4. 如权利要求2所述的方法,其特征在于,基站在系统消息中通知终端发起2-step RACH的条件包括如下条件之一或者其组合:
    发起2-step RACH的概率门限,使得终端在发起竞争随机接入时计算随机数,如果随机数小于概率门限,则发起2-step RACH;
    发起2-step RACH的终端速度门限,使得终端在速度低于该速度门限时发起2-step RACH;
    发起2-step RACH的终端类型,使得终端在类型满足时发起2-step RACH;
    发起2-step RACH的终端接入等级,使得终端在接入等级高于该接入等级时发起2-step RACH;
    发起2-step RACH的NR信道占用时间NR COT门限,使得终端在NR COT低于该NR COT门限时发起2-step RACH。
  5. 如权利要求2所述的方法,其特征在于,基站通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:
    该2-step RACH资源在终端与基站之间上行定时失步时失效;
    终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;
    基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
  6. 一种随机接入方法,其特征在于,包括:
    确定基站为终端配置允许使用两步随机接入2-step RACH的规则;
    根据所述规则发起2-step RACH,或发起四步随机接入4-step RACH。
  7. 如权利要求6所述的方法,其特征在于,确定基站为终端配置允许使用两步随机接入2-step RACH的规则,以及根据所述规则发起2-step RACH,包括:
    若终端根据基站在系统消息中通知的本小区是否支持2-step RACH,确定基站支持2-step RACH,则发起2-step RACH;或,
    终端根据基站在系统消息中通知的发起2-step RACH的条件,确定在满足该条件时发起2-step RACH;或,
    终端根据基站通过RRC专用信令为终端分配的2-step RACH资源,在处于连接态时发起2-step RACH。
  8. 如权利要求7所述的方法,其特征在于,若终端根据基站在系统消息中通知的本小区是否支持2-step RACH,确定基站支持2-step RACH,则所述方法进一步包括:
    接收基站在系统消息中配置的2-step RACH中第一步消息的前导码和物理随机接入信道PRACH资源,以及与之对应的物理上行链路共享信道PUSCH资源。
  9. 如权利要求7所述的方法,其特征在于,终端根据基站在系统消息中通知的发起2-step RACH的条件,确定在满足该条件时,发起2-step RACH,包括:
    终端接收基站在系统消息中通知的发起2-step RACH的概率门限,在发起竞争随机接入时计算随机数,如果所述随机数小于所述概率门限,则发起2-step RACH;或,
    终端接收基站在系统消息中通知的发起2-step RACH的终端速度门限,在速度低于该速度门限时发起2-step RACH;或,
    终端接收基站在系统消息中通知的发起2-step RACH的终端类型,在类型满足时,发起2-step RACH;或,
    终端接收基站在系统消息中通知的发起2-step RACH的终端接入等级,在接入等级高于该接入等级时发起2-step RACH;或,
    终端接收基站在系统消息中通知的发起2-step RACH的NR COT门限,在NR COT低于该NR COT门限时发起2-step RACH。
  10. 如权利要求7所述的方法,其特征在于,基站通过RRC专用信令为终端分配的 2-step RACH资源,在以下条件之一或者其组合时失效:
    该2-step RACH资源在终端与基站之间上行定时失步时失效;或,
    终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;或,
    基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
  11. 一种基站,其特征在于,包括:存储器、处理器和收发机;
    所述存储器,存储有计算机指令;
    所述处理器被配置为读取所述存储器中的计算机指令,执行以下操作:
    为终端配置允许使用两步随机接入2-step RACH的规则;
    在终端按所述规则发起随机接入时,为终端执行随机接入;
    所述收发机,用于在处理器的控制下接收和发送数据。
  12. 如权利要求11所述的基站,其特征在于,所述规则通过以下方式之一配置给所述终端:
    在系统消息中通知终端本小区是否支持2-step RACH,使得终端在基站支持2-step RACH时发起2-step RACH;
    在系统消息中通知终端发起2-step RACH的条件,使得终端在满足该条件时发起2-step RACH;
    通过无线资源控制RRC专用信令为终端分配2-step RACH资源,使得终端在处于连接态时发起2-step RACH。
  13. 如权利要求12所述的基站,其特征在于,如果在系统消息中通知终端本小区是否支持2-step RACH,则所述操作进一步包括:
    如果所述基站支持2-step RACH,则在系统消息中配置2-step RACH中第一步消息的前导码和物理随机接入信道PRACH资源,以及与之对应的物理上行链路共享信道PUSCH资源。
  14. 如权利要求12所述的基站,其特征在于,在系统消息中通知终端发起2-step RACH的条件包括如下条件之一或者其组合:
    发起2-step RACH的概率门限,使得终端在发起竞争随机接入时计算随机数,如果随机数小于概率门限,则发起2-step RACH;
    发起2-step RACH的终端速度门限,使得终端在速度低于该速度门限时发起2-step RACH;
    发起2-step RACH的终端类型,使得终端在类型满足时发起2-step RACH;
    发起2-step RACH的终端接入等级,使得终端在接入等级高于该接入等级时发起2-step RACH;
    发起2-step RACH的NR COT门限,使得终端在NR COT低于该NR COT门限时发起2-step RACH。
  15. 如权利要求12所述的基站,其特征在于,通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:
    该2-step RACH资源在终端与基站之间上行定时失步时失效;或,
    终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;或,
    基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
  16. 一种终端,其特征在于,包括:存储器、处理器和收发机;
    所述存储器,存储有计算机指令;
    所述处理器被配置为读取所述存储器中的计算机指令,执行以下操作:
    确定基站为终端配置允许使用两步随机接入2-step RACH的规则;
    根据所述规则发起2-step RACH,或发起四步随机接入4-step RACH;
    所述收发机,用于在所述处理器的控制下接收和发送数据。
  17. 如权利要求16所述的终端,其特征在于,所述操作具体包括:
    若根据基站在系统消息中通知的本小区是否支持2-step RACH,确定基站支持2-step RACH,则发起2-step RACH;或,
    若根据基站在系统消息中通知的发起2-step RACH的条件,确定在满足该条件时发起2-step RACH;或,
    根据基站通过RRC专用信令为终端分配的2-step RACH资源,在处于连接态时发起2-step RACH。
  18. 如权利要求17所述的终端,其特征在于,所述操作进一步包括:
    若根据基站在系统消息中通知的本小区是否支持2-step RACH,确定基站支持2-step RACH,则接收基站在系统消息中配置的2-step RACH中第一步消息的前导码和物理随机接入信道PRACH资源,以及与之对应的物理上行链路共享信道PUSCH资源。
  19. 如权利要求17所述的终端,其特征在于,所述操作中,根据基站在系统消息中通知的发起2-step RACH的条件,确定在满足该条件时,发起2-step RACH,包括:
    接收基站在系统消息中通知的发起2-step RACH的概率门限,在发起竞争随机接入时计算随机数,如果所述随机数小于所述概率门限,则发起2-step RACH;或,
    接收基站在系统消息中通知的发起2-step RACH的终端速度门限,在速度低于该速度门限时发起2-step RACH;或,
    接收基站在系统消息中通知的发起2-step RACH的终端类型,在类型满足时发起2-step RACH;或,
    接收基站在系统消息中通知的发起2-step RACH的终端接入等级,在接入等级高于该接入等级时可发起2-step RACH;或,
    接收基站在系统消息中通知的发起2-step RACH的NR COT门限,在NR COT低于该NR COT门限时发起2-step RACH。
  20. 如权利要求17所述的终端,其特征在于,基站通过RRC专用信令为终端分配的2-step RACH资源,在以下条件之一或者其组合时失效:
    该2-step RACH资源在终端与基站之间上行定时失步时失效;或,
    终端离开连接态或离开配置了2-step RACH资源的小区时该2-step RACH资源失效;或,
    基站在进行2-step RACH资源配置的时候配置生效时长,超过该生效时长则该2-step RACH资源失效。
  21. 一种随机接入装置,其特征在于,包括:
    配置模块,用于为终端配置允许使用两步随机接入2-step RACH的规则;
    随机接入模块,用于在终端按所述规则发起随机接入时,为终端执行随机接入。
  22. 如权利要求21所述的装置,其特征在于,所述配置模块,具体用于通过以下方式之一或者其组合将所述规则配置给所述终端:
    在系统消息中通知终端本小区是否支持2-step RACH,使得终端在基站支持2-step RACH时发起2-step RACH;
    在系统消息中通知终端发起2-step RACH的条件,使得终端在满足该条件时发起2-step RACH;
    通过无线资源控制RRC专用信令为终端分配2-step RACH资源,使得终端在处于连接态时发起2-step RACH。
  23. 如权利要求22所述的装置,其特征在于,在系统消息中通知终端发起2-step RACH的条件包括如下条件之一或者其组合:
    发起2-step RACH的概率门限,使得终端在发起竞争随机接入时计算随机数,如果随 机数小于概率门限,则发起2-step RACH;
    发起2-step RACH的终端速度门限,使得终端在速度低于该速度门限时发起2-step RACH;
    发起2-step RACH的终端类型,使得终端在类型满足时发起2-step RACH;
    发起2-step RACH的终端接入等级,使得终端在接入等级高于该接入等级时发起2-step RACH;
    发起2-step RACH的NR信道占用时间NR COT门限,使得终端在NR COT低于该NR COT门限时发起2-step RACH。
  24. 一种随机接入装置,其特征在于,包括:
    确定模块,用于确定基站为终端配置允许使用两步随机接入2-step RACH的规则;
    发起模块,用于根据所述规则发起2-step RACH,或发起四步随机接入4-step RACH。
  25. 如权利要求24所述的装置,其特征在于:
    所述确定模块若根据基站在系统消息中通知的本小区是否支持2-step RACH,确定基站支持2-step RACH,则所述发起模块发起2-step RACH;或,
    所述确定模块若根据基站在系统消息中通知的发起2-step RACH的条件,确定满足该条件,则所述发起模块发起2-step RACH;或,
    所述确定模块根据基站通过RRC专用信令为终端分配的2-step RACH资源,所述发起模块在处于连接态时发起2-step RACH。
  26. 如权利要求25所述的装置,其特征在于:
    所述确定模块接收基站在系统消息中通知的发起2-step RACH的概率门限,所述发起模块在发起竞争随机接入时计算随机数,如果所述随机数小于所述概率门限,则发起2-step RACH;或,
    所述确定模块接收基站在系统消息中通知的发起2-step RACH的终端速度门限,所述发起模块在速度低于该速度门限时发起2-step RACH;或,
    所述确定模块接收基站在系统消息中通知的发起2-step RACH的终端类型,所述发起模块在类型满足时,发起2-step RACH;或,
    所述确定模块接收基站在系统消息中通知的发起2-step RACH的终端接入等级,所述发起模块在接入等级高于该接入等级时发起2-step RACH;或,
    所述确定模块接收基站在系统消息中通知的发起2-step RACH的NR COT门限,所述发起模块在NR COT低于该NR COT门限时发起2-step RACH。
  27. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机 可执行指令,所述计算机可执行指令用于使所述计算机执行权利要求1至5或6至10任一所述方法。
PCT/CN2020/072321 2019-02-01 2020-01-15 一种随机接入方法、设备及装置 WO2020156188A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910102928.3 2019-02-01
CN201910102928.3A CN111526582A (zh) 2019-02-01 2019-02-01 一种随机接入方法、设备及装置

Publications (1)

Publication Number Publication Date
WO2020156188A1 true WO2020156188A1 (zh) 2020-08-06

Family

ID=71840237

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/072321 WO2020156188A1 (zh) 2019-02-01 2020-01-15 一种随机接入方法、设备及装置

Country Status (2)

Country Link
CN (2) CN111526582A (zh)
WO (1) WO2020156188A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116569640A (zh) * 2020-11-24 2023-08-08 联想(北京)有限公司 用于执行随机接入的方法及设备

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11770855B2 (en) * 2016-10-19 2023-09-26 Qualcomm Incorporated Random access channel (RACH) procedure design
WO2018085726A1 (en) * 2016-11-04 2018-05-11 Intel IP Corporation Performing 2-step random access channel (rach) procedures
CN108282816A (zh) * 2017-01-05 2018-07-13 中兴通讯股份有限公司 一种接入方法及接入装置
SG11201906123VA (en) * 2017-01-05 2019-08-27 Guangdong Oppo Mobile Telecommunications Corp Ltd Method for random access and terminal device
BR112019014484A2 (pt) * 2017-01-13 2020-02-11 Motorola Mobility Llc Método e aparelho para realizar acesso aleatório com base em contenção em uma frequência de portadora
CN111405675B (zh) * 2019-01-02 2022-06-03 中国移动通信有限公司研究院 随机接入方法、终端及网络设备

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HUAWEI ET AL.: "Two-step RACH procedure for NR-U", 3GPP TSG-RAN WG2 MEETING #104 R2-1816617, 12 November 2018 (2018-11-12), XP051556187, DOI: 20200309111212X *
NOKIA ET AL.: "Network control of 2-step CBRA procedure", 3GPP TSG-RAN WG2 MEETING #104 R2-1817195, 12 November 2018 (2018-11-12), XP051556737, DOI: 20200309111023X *

Also Published As

Publication number Publication date
CN117750518A (zh) 2024-03-22
CN111526582A (zh) 2020-08-11

Similar Documents

Publication Publication Date Title
US11979916B2 (en) Method and apparatus for determining RA-RNTI
KR102261171B1 (ko) 랜덤 액세스 백오프 후의 랜덤 액세스를 위한 방법 및 장치, 및 랜덤 액세스 백오프를 지시하기 위한 방법 및 장치
US11751255B2 (en) Data transmission method in a wireless communication network
EP3714654B1 (en) Method and related device for handling random access procedure in bandwidth part switching operation
US11470647B2 (en) Method and device for two-step contention based random access
US10499355B2 (en) Processing method and device for obtaining synchronization
US20210168894A1 (en) State transitions for idle mode transmissions using pre-configured dedicated resources
US10779329B2 (en) Random access response transmission method and device
WO2017194018A1 (zh) 随机接入方法、装置及用户设备、存储介质
CN110022607B (zh) 一种波束失败恢复方法、装置及设备
US11503643B2 (en) Random access method and device
EP3874865B1 (en) Method and apparatus for handling bwp switching in random access procedure
US20160249386A1 (en) Random Access Method and Related Apparatus
EP3876654A1 (en) Uplink transmission method and device, computer readable storage medium and terminal
KR20200117022A (ko) 빔 실패 복구 방법 및 사용자 단말기
CN110691415A (zh) 一种随机接入方法及终端
WO2020156188A1 (zh) 一种随机接入方法、设备及装置
CN110012539B (zh) 一种资源指示方法及基站
CN111526597B (zh) 一种两步随机接入方法、设备及装置
CN114449677A (zh) 基于竞争的随机接入方法、终端及基站
TWI738732B (zh) 一種終端發起的資料傳輸方法及裝置
WO2024032800A1 (zh) 数据传输方法、装置、设备、存储介质及程序产品
CN117835449A (zh) 波束失败恢复方法及装置、存储介质、终端、网络设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20748873

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20748873

Country of ref document: EP

Kind code of ref document: A1