WO2020156247A1 - Method and device for communication node for use in radio communication - Google Patents
Method and device for communication node for use in radio communication Download PDFInfo
- Publication number
- WO2020156247A1 WO2020156247A1 PCT/CN2020/072795 CN2020072795W WO2020156247A1 WO 2020156247 A1 WO2020156247 A1 WO 2020156247A1 CN 2020072795 W CN2020072795 W CN 2020072795W WO 2020156247 A1 WO2020156247 A1 WO 2020156247A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- wireless signal
- information
- random access
- generate
- type
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
- H04W74/08—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
- H04W74/0833—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0053—Allocation of signaling, i.e. of overhead other than pilot signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
- H04W16/28—Cell structures using beam steering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
- H04W74/08—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/27—Transitions between radio resource control [RRC] states
Definitions
- This application relates to transmission methods and devices in wireless communication systems, and in particular to random access transmission schemes and devices.
- the non-orthogonal multiple access (NoMA, Non-orthogonal Multiple Access) research project under NR was also passed at the 3GPP RAN#76 plenary meeting.
- the two-step random access (2-step RACH) WI under NR was passed.
- both two-step random access and the traditional 4-step random access process can be used. And in accordance with the requirements of the WI of the two-step random access, the user equipment can switch between the 2-step random access and the 4-step random access or fall back from the 2-step random access to the 4-step random access. Since the application scenarios for 2-step random access and 4-step random access are different, the performance requirements for 2-step random access and 4-step random access may also be different, such as different delay requirements. Coverage requirements, different capacity requirements, etc.
- Uplink transmission in the 3GPP 5G NR system can support two waveforms (Waveform), one is DFT-S-OFDM (Discrete Fourier Transform-Spread-Orthogonal Frequency Division Multiplexing, Discrete Fourier Transform Extended Orthogonal Frequency Division Multiplexing) Use), the other is OFDM (Orthogonal Frequency Division Multiplexing, Orthogonal Frequency Division Multiplexing), supporting two waveforms at the same time can meet different coverage requirements and different complexity requirements.
- these two waveforms are implemented by whether Transform Precoding is used when generating the uplink signal.
- an uplink transmission waveform is related to the waveform used during random access.
- This application discloses a method used in a first communication node in wireless communication, which is characterized in that it includes:
- the first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used Determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, and the second type Random access is different from the first type of random access.
- the node device configures whether to use transform precoding for uplink transmission, the coverage performance of uplink transmission during fallback is guaranteed, and transmission efficiency is improved.
- the Msg-A in the first type of random access and the Msg-3 in the second type of random access use different uplink transmission waveforms, the coverage and interference caused by the different waveforms are avoided. Link performance is not matched.
- the waveform at the time of the fallback of the second wireless signal is determined according to whether the first type random access and the second type random access are successful, so as to support the first type random access Access is smoothly switched (Switch) or fallback (Fallback) to the second type of random access, which improves random access performance.
- the above method is characterized in that the air interface resources occupied by the first sequence, the time-frequency resources occupied by the first wireless signal, the modulation and coding method used by the first wireless signal, At least one of the redundancy versions adopted by the first wireless signal is associated.
- the above method is characterized in that third information is further received, and the third information is used to determine whether the first type of random access is successful.
- the above method is characterized in that a third wireless signal is also sent, the third wireless signal is used for the second type of random access, and the second information is used to determine whether to use a transform Precoding generates the third wireless signal, and whether transform precoding is used to generate the third wireless signal is used to determine whether transform precoding is used to generate the second wireless signal.
- the above method is characterized in that first signaling is further received, and the first signaling is used to determine the time-frequency resources occupied by the second wireless signal and the location of the second wireless signal. Modulation and coding mode adopted; the format adopted by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal.
- the above method is characterized in that fourth information is further received, the fourth information is specific to the first communication node device, and the fourth information includes whether transform precoding is used to generate the first communication node. 2. Information other than the wireless signal, where the fourth information includes a frequency domain resource allocation type of the second wireless signal.
- This application discloses a method used in a second communication node in wireless communication, which is characterized in that it includes:
- the first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used Determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, and the second type Random access is different from the first type of random access.
- the above method is characterized in that the air interface resources occupied by the first sequence, the time-frequency resources occupied by the first wireless signal, the modulation and coding method used by the first wireless signal, At least one of the redundancy versions adopted by the first wireless signal is associated.
- the above method is characterized in that third information is further sent, and the third information is used to determine whether the first type of random access is successful.
- the above method is characterized in that a third wireless signal is also received, the third wireless signal is used for the second type of random access, and the second information is used to determine whether to use transformation Precoding generates the third wireless signal, and whether transform precoding is used to generate the third wireless signal is used to determine whether transform precoding is used to generate the second wireless signal.
- the above method is characterized in that first signaling is also sent, and the first signaling is used to determine the time-frequency resources occupied by the second wireless signal and the location of the second wireless signal. Modulation and coding mode adopted; the format adopted by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal.
- the above method is characterized in that fourth information is further sent, the fourth information is specific to the sender of the first wireless signal, and the fourth information includes whether to use transform precoding to generate the Information other than the second wireless signal, the fourth information includes a frequency domain resource allocation type of the second wireless signal.
- This application discloses a first communication node device used in wireless communication, which is characterized in that it includes:
- the first receiver receives the first information and the second information
- a first transmitter transmitting a first sequence and a first wireless signal, where the first sequence and the first wireless signal are used for the first type of random access;
- the second transmitter sends a second wireless signal
- the first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used Determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, and the second type Random access is different from the first type of random access.
- This application discloses a second communication node device used in wireless communication, which is characterized in that it includes:
- the third transmitter sends the first information and the second information
- a second receiver receiving a first sequence and a first wireless signal, where the first sequence and the first wireless signal are used for the first type of random access;
- the third receiver receives the second wireless signal
- the first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used Determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, and the second type Random access is different from the first type of random access.
- this application includes the following technical advantages:
- the waveform of uplink transmission in the RRC connection state is determined based on whether the 2-step random access and the 4-step random access are successful, which ensures the coverage performance of the uplink transmission during fallback and improves The transmission efficiency.
- the method in this application can support 2-step random access smooth switching (Switch) or fallback (Fallback) to 4-step random access, which improves the random access performance.
- Switch smooth switching
- Fallback fallback
- Figure 1 shows a flow chart of first information, second information, first sequence, first wireless signal, and second wireless signal according to an embodiment of the present application
- Figure 2 shows a schematic diagram of a network architecture according to an embodiment of the present application
- FIG. 3 shows a schematic diagram of a wireless protocol architecture of a user plane and a control plane according to an embodiment of the present application
- Fig. 4 shows a schematic diagram of a first communication node and a second communication node according to an embodiment of the present application
- FIG. 5 shows a wireless signal transmission flowchart according to an embodiment of the present application
- Fig. 6 shows a wireless signal transmission flowchart according to another embodiment of the present application.
- Fig. 7 shows a schematic diagram of the relationship between the first sequence and the first wireless signal according to an embodiment of the present application
- FIG. 8 shows a schematic diagram of the relationship between the second wireless signal and the third wireless signal according to an embodiment of the present application
- FIG. 9 shows a schematic diagram of the relationship between the second wireless signal and the first signaling according to an embodiment of the present application.
- FIG. 10 shows a schematic diagram of the relationship between the second wireless signal and the fourth information according to an embodiment of the present application
- Fig. 11 shows a structural block diagram of a processing device in a first communication node device according to an embodiment of the present application
- Fig. 12 shows a structural block diagram of a processing device in a second communication node device according to an embodiment of the present application.
- Embodiment 1 illustrates a flow chart of first information, second information, first sequence, first wireless signal and second wireless signal according to an embodiment of the present application, as shown in FIG. 1.
- each box represents a step.
- the order of the steps in the box does not represent a specific time sequence between the steps.
- the first communication node device in this application receives the first information and the second information in step 101, sends the first sequence and the first wireless signal in step 102, and sends the first sequence and the first wireless signal in step 103.
- Two wireless signals, the first sequence and the first wireless signal are used for the first type of random access; the first information is used to determine whether to use transform precoding to generate the first wireless signal; If the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used to determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the first wireless signal
- the second information is used to determine whether to use transform precoding to generate the second wireless signal, and the second type of random access is different from the first type of random access.
- the first communication node device is in the RRC_IDLE state when sending the first wireless signal, and the first communication node device is in the RRC_CONNECTED state when sending the second wireless signal.
- the first communication node device is in the RRC_INACTIVE state when sending the first wireless signal, and the first communication node device is in the RRC_CONNECTED state when sending the second wireless signal.
- the first communication node device is in the RRC_INACTIVE state when sending the first wireless signal, and the first communication node device is in the RRC_INACTIVE state when sending the second wireless signal.
- the first communication node device is in the RRC_IDLE state when sending the first wireless signal, and the first communication node device is in the RRC_IDLE state when sending the second wireless signal.
- the first information and the second information are transmitted through an air interface.
- the first information and the second information are transmitted through a Uu interface.
- the first information and the second information are transmitted through a wireless interface.
- the first information is transmitted through higher layer signaling.
- the first information is transmitted through physical layer signaling.
- the first information includes all or part of a high-layer signaling.
- the first information includes all or part of a physical layer signaling.
- the first information is transmitted through DL-SCH (Downlink Shared Channel, downlink shared channel).
- DL-SCH Downlink Shared Channel, downlink shared channel
- the first information is transmitted through PDSCH (Physical Downlink Shared Channel, Physical Downlink Shared Channel).
- PDSCH Physical Downlink Shared Channel, Physical Downlink Shared Channel
- the first information includes all or part of an IE (Information Element, information element) in an RRC (Radio Resource Control, radio resource control) signaling.
- IE Information Element, information element
- RRC Radio Resource Control, radio resource control
- the first information includes all or part of a field (Field) in an IE (Information Element, information element) in an RRC (Radio Resource Control, Radio Resource Control) signaling.
- Field Information Element, information element
- RRC Radio Resource Control, Radio Resource Control
- the first information includes one or more fields in a SIB (System Information Block, System Information Block).
- SIB System Information Block, System Information Block
- the first information is broadcast.
- the first information is unicast.
- the first information is cell specific (Cell Specific).
- the first information is user equipment specific (UE-specific).
- the first information is transmitted through PDCCH (Physical Downlink Control Channel, Physical Downlink Control Channel).
- PDCCH Physical Downlink Control Channel, Physical Downlink Control Channel
- the first information includes all or part of a field of a DCI (Downlink Control Information) signaling.
- DCI Downlink Control Information
- the second information is transmitted through higher layer signaling.
- the second information is transmitted through physical layer signaling.
- the second information includes all or part of a high-level signaling.
- the second information includes all or part of a physical layer signaling.
- the second information is transmitted through DL-SCH (Downlink Shared Channel, downlink shared channel).
- DL-SCH Downlink Shared Channel, downlink shared channel
- the second information is transmitted through PDSCH (Physical Downlink Shared Channel, physical downlink shared channel).
- PDSCH Physical Downlink Shared Channel, physical downlink shared channel
- the second information includes all or part of an IE (Information Element, information element) in an RRC (Radio Resource Control, radio resource control) signaling.
- IE Information Element, information element
- RRC Radio Resource Control, radio resource control
- the second information includes all or part of a field in an IE (Information Element, information element) in an RRC (Radio Resource Control, radio resource control) signaling.
- IE Information Element, information element
- RRC Radio Resource Control, radio resource control
- the second information includes one or more fields in a SIB (System Information Block, system information block).
- SIB System Information Block, system information block
- the second information is broadcast.
- the second information is unicast.
- the second information is cell specific (Cell Specific).
- the second information is user equipment specific (UE-specific).
- the second information is transmitted through PDCCH (Physical Downlink Control Channel, Physical Downlink Control Channel).
- PDCCH Physical Downlink Control Channel, Physical Downlink Control Channel
- the second information includes all or part of a field of DCI (Downlink Control Information) signaling.
- DCI Downlink Control Information
- the second information includes the "RACH-ConfigCommon” IE (Information Element, information element) in 3GPP TS38.331 (v15.4.0 or later).
- the second information includes the "msg3-transformPrecoder" field in the "RACH-ConfigCommon” IE (Information Element, information element) in 3GPP TS38.331 (v15.4.0 or later).
- the first information and the second information are transmitted through two different signalings.
- the first information and the second information are two different fields in the same signaling.
- the first information and the second information are transmitted through two different RRC signaling.
- the first information and the second information are two different IEs in the same RRC signaling.
- the first information and the second information are two different fields in the same IE in the same RRC signaling.
- both the first information and the second information belong to the "BWP-UplinkCommon" IE (Information Element, information element) in 3GPP TS38.331 (v15.4.0 or later).
- the above sentence “the first information is used to determine whether to use transform precoding to generate the first wireless signal” includes the following meaning: the first information is used by the first communication node to determine whether The first wireless signal is generated by adopting Transform Precoding (Transform Precoding).
- the above sentence "the first information is used to determine whether to use transform precoding to generate the first wireless signal” includes the following meaning: the first information is used to directly indicate whether to use transform precoding to generate The first wireless signal.
- the above sentence "the first information is used to determine whether to use transform precoding to generate the first wireless signal” includes the following meaning: the first information is used to indirectly indicate whether to use transform precoding to generate The first wireless signal.
- the above sentence "the first information is used to determine whether to use transform precoding to generate the first wireless signal” includes the following meaning: the first information is used to explicitly indicate whether to use transform precoding.
- the first wireless signal is generated by encoding.
- the above sentence "the first information is used to determine whether to use transform precoding to generate the first wireless signal” includes the following meaning: the first information is used to implicitly indicate whether to use transform precoding.
- the first wireless signal is generated by encoding.
- the above sentence "the first information is used to determine whether to use transform precoding to generate the first wireless signal” includes the following meaning: the first information includes whether to use transform precoding to generate the first wireless signal.
- Wireless signal switch (Enable/Disable).
- the above sentence "the second information is used to determine whether to use transform precoding to generate the second wireless signal” includes the following meaning: the second information is used by the first communication node to determine whether The second wireless signal is generated using transform precoding.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the second wireless signal” includes the following meaning: the second information is used to directly indicate whether to use transform precoding to generate The second wireless signal.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the second wireless signal” includes the following meaning: the second information is used to indirectly indicate whether to use transform precoding to generate The second wireless signal.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the second wireless signal” includes the following meaning: the second information is used to explicitly indicate whether to use transform precoding.
- the second wireless signal is generated by encoding.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the second wireless signal” includes the following meaning: the second information is used to implicitly indicate whether to use transform precoding.
- the second wireless signal is generated by encoding.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the second wireless signal” includes the following meaning: the second information includes whether to use transform precoding to generate the second wireless signal.
- Wireless signal switch (Enable/Disable).
- the first sequence is a preamble.
- the first sequence is a pseudo-random sequence.
- the first sequence is a Zadoff-Chu (ZC) sequence.
- the first sequence includes all elements of a Zadoff-Chu (ZC) sequence.
- ZC Zadoff-Chu
- the first sequence only includes a partial element of a Zadoff-Chu (ZC) sequence.
- ZC Zadoff-Chu
- the first sequence is a Zadoff-Chu (ZC) sequence with a length of 839.
- ZC Zadoff-Chu
- the first sequence is a Zadoff-Chu (ZC) sequence with a length of 139.
- ZC Zadoff-Chu
- all elements in the first sequence are the same.
- two elements in the first sequence are different.
- all elements in the first sequence are 1.
- the first sequence includes CP (Cyclic Prefix).
- the first sequence is transmitted through PRACH (Physical Random Access Channel, Physical Random Access Channel).
- PRACH Physical Random Access Channel, Physical Random Access Channel
- the first sequence is a preamble sequence in 2-step random access.
- the first sequence is a preamble sequence in 4-step random access.
- the first sequence is a preamble sequence (Preamble) in MsgA (message A) in 2-step random access.
- Preamble a preamble sequence in MsgA (message A) in 2-step random access.
- the first sequence and the first wireless signal together constitute MsgA (message A).
- both the first sequence and the first wireless signal belong to MsgA (message A).
- both the first sequence and the first wireless signal belong to MsgA (message A) in 2-Step random access (2-Step).
- the first wireless signal is transmitted through UL-SCH (Uplink Shared Channel, uplink shared channel).
- UL-SCH Uplink Shared Channel, uplink shared channel
- the first wireless signal is transmitted through PUSCH (Physical Uplink Shared Channel, Physical Uplink Shared Channel).
- PUSCH Physical Uplink Shared Channel, Physical Uplink Shared Channel
- a transport block (TB, Transport Block) is added (CRC Insertion), channel coding (Channel Coding), rate matching (Rate Matching), scrambling (Scrambling), modulation (Modulation), and layer mapping in sequence. (Layer Mapping), Precoding (Precoding), Mapping to Virtual Resource Blocks, Mapping from Virtual to Physical Resource Blocks, OFDM Baseband Signal Generation (OFDM Baseband) Signal Generation), the first wireless signal is obtained after Modulation and Upconversion (Modulation and Upconversion).
- a transport block sequentially undergoes CRC insertion (CRC Insertion), segmentation (Segmentation), coding block-level CRC insertion (CRC Insertion), channel coding (Channel Coding), and rate matching (Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Precoding, Mapping to Virtual Resource Blocks, Mapping to Virtual Resource Blocks To physical resource blocks (Mapping from Virtual to Physical Resource Blocks), OFDM baseband signal generation (OFDM Baseband Signal Generation), modulation and upconversion (Modulation and Upconversion), the first wireless signal is obtained.
- a transport block (TB, Transport Block) is added (CRC Insertion), channel coding (Channel Coding), rate matching (Rate Matching), scrambling (Scrambling), modulation (Modulation), and layer mapping in sequence. (Layer Mapping), Transform Precoding, Precoding, Map to Virtual Resource Blocks (Mapping to Virtual Resource Blocks), Mapping from Virtual to Physical Resource Blocks (Mapping from Virtual to Physical Resource Blocks) OFDM baseband signal generation (OFDM Baseband Signal Generation), and modulation and upconversion (Modulation and Upconversion) to obtain the first wireless signal.
- a transport block sequentially undergoes CRC insertion (CRC Insertion), segmentation (Segmentation), coding block level CRC insertion (CRC Insertion), channel coding (Channel Coding), and rate matching (Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Transform Precoding, Precoding, Mapping to Virtual Resource Block (Mapping to Virtual Resource) Blocks, Mapping from Virtual to Physical Resource Blocks, OFDM Baseband Signal Generation, Modulation and Upconversion to obtain the first wireless signal.
- the first wireless signal includes PUSCH (Physical Uplink Shared Channel, physical uplink shared channel) and DMRS (Demodulation Reference Signal, demodulation reference signal).
- PUSCH Physical Uplink Shared Channel, physical uplink shared channel
- DMRS Demodulation Reference Signal, demodulation reference signal
- the first wireless signal only includes PUSCH (Physical Uplink Shared Channel, Physical Uplink Shared Channel).
- PUSCH Physical Uplink Shared Channel, Physical Uplink Shared Channel
- the first type of random access is 2-Step Random Access (2-Step Random Access).
- the first type of random access is a two-step random access defined in the 3GPP R16 version.
- the first type of random access is random access including Msg-A (message A) and Msg-B (message B).
- the first type of random access is random access that only includes Msg-A (message A) and Msg-B (message B).
- the first type of random access is a random access different from the traditional random access defined in the 3GPP R15 version.
- the first type of random access is used to establish an RRC connection.
- the first step in the first type of random access is to send a preamble sequence (Preamble) and PUSCH (Physical Uplink Shared Channel, physical uplink shared channel).
- Preamble Physical Uplink Shared Channel
- PUSCH Physical Uplink Shared Channel, physical uplink shared channel
- the first type of random access is random access that does not send Msg-3 (message 3) and is used to establish an RRC connection.
- the first type of random access does not include sending Msg-3 (message 3).
- the first type of random access does not include sending Msg-4 (message 4).
- the first type of random access is random access that only includes Msg-A (message A) and Msg-B (message B) before the RRC connection is established.
- the transform precoding includes DFT (Discrete Fourier Transform, Discrete Fourier Transform).
- the transform precoding (Transform Precoding) is implemented according to section 6.3.1.4 of 3GPP TS38.211 (v15.4.0).
- the transform precoding (Transform Precoding) is implemented according to section 5.3.3 of 3GPP TS36.211 (v15.4.0).
- the transform precoding includes FFT (Fast Fourier Transform, Fast Fourier Transform).
- the waveform of the first wireless signal is DFT-s-OFDM (Discrete Fourier Transform-Spread-Orthogonal Frequency Division Multiplexing, Discrete Fourier Transform-Spread-Orthogonal Frequency Division Multiplexing). Orthogonal frequency division multiplexing extended by the inner leaf transform).
- the waveform of the first wireless signal is SC-FDMA (Single Carrier-Frequency Division Multiple Access, Single Carrier Frequency Division Multiple Access) .
- the waveform (Waveform) of the first wireless signal is OFDM (Orthogonal Frequency Division Multiplexing, Orthogonal Frequency Division Multiplexing).
- the second wireless signal is transmitted through UL-SCH (Uplink Shared Channel, uplink shared channel).
- UL-SCH Uplink Shared Channel, uplink shared channel
- the second wireless signal is transmitted through PUSCH (Physical Uplink Shared Channel, Physical Uplink Shared Channel).
- PUSCH Physical Uplink Shared Channel, Physical Uplink Shared Channel
- a transport block (TB, Transport Block) is added (CRC Insertion), channel coding (Channel Coding), rate matching (Rate Matching), scrambling (Scrambling), modulation (Modulation), and layer mapping in sequence. (Layer Mapping), Precoding (Precoding), Mapping to Virtual Resource Blocks, Mapping from Virtual to Physical Resource Blocks, OFDM Baseband Signal Generation (OFDM Baseband) Signal Generation), the second wireless signal is obtained after Modulation and Upconversion (Modulation and Upconversion).
- a transport block sequentially undergoes CRC insertion (CRC Insertion), segmentation (Segmentation), coding block-level CRC insertion (CRC Insertion), channel coding (Channel Coding), and rate matching (Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Precoding, Mapping to Virtual Resource Blocks, Mapping to Virtual Resource Blocks To physical resource blocks (Mapping from Virtual to Physical Resource Blocks), OFDM baseband signal generation (OFDM Baseband Signal Generation), modulation and upconversion (Modulation and Upconversion), the second wireless signal is obtained.
- a transport block (TB, Transport Block) is added (CRC Insertion), channel coding (Channel Coding), rate matching (Rate Matching), scrambling (Scrambling), modulation (Modulation), and layer mapping in sequence. (Layer Mapping), Transform Precoding, Precoding, Map to Virtual Resource Blocks (Mapping to Virtual Resource Blocks), Mapping from Virtual to Physical Resource Blocks (Mapping from Virtual to Physical Resource Blocks) OFDM baseband signal generation (OFDM Baseband Signal Generation), modulation and upconversion (Modulation and Upconversion) to obtain the second wireless signal.
- a transport block sequentially undergoes CRC insertion (CRC Insertion), segmentation (Segmentation), coding block-level CRC insertion (CRC Insertion), channel coding (Channel Coding), and rate matching (Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Transform Precoding, Precoding, Mapping to Virtual Resource Block (Mapping to Virtual Resource) Blocks, Mapping from Virtual to Physical Resource Blocks, OFDM Baseband Signal Generation, Modulation and Upconversion to obtain the second wireless signal.
- the second wireless signal includes PUSCH (Physical Uplink Shared Channel) and DMRS (Demodulation Reference Signal, demodulation reference signal).
- PUSCH Physical Uplink Shared Channel
- DMRS Demodulation Reference Signal, demodulation reference signal
- the second wireless signal only includes PUSCH (Physical Uplink Shared Channel, Physical Uplink Shared Channel).
- PUSCH Physical Uplink Shared Channel, Physical Uplink Shared Channel
- the waveform (Waveform) of the second wireless signal is DFT-s-OFDM (Discrete Fourier Transform-Spread-Orthogonal Frequency Division Multiplexing, Discrete Fourier Transform-Spread-Orthogonal Frequency Division Multiplexing). Orthogonal frequency division multiplexing extended by the inner leaf transform).
- the waveform (Waveform) of the second wireless signal is SC-FDMA (Single Carrier-Frequency Division Multiple Access, Single Carrier Frequency Division Multiple Access) .
- the waveform (Waveform) of the second wireless signal is OFDM (Orthogonal Frequency Division Multiplexing, Orthogonal Frequency Division Multiplexing).
- the above sentence "the first type of random access is successful" includes the following meaning: through the first type of random access, the first communication node device enters RRC_CONNECTED from the RRC_IDLE (RRC idle) state. )state.
- the above sentence "the first type of random access is successful” includes the following meaning: Msg-B (message B) in the two-step random access is used by the first communication node device to determine the slave RRC_IDLE ( RRC idle) state enters RRC_CONNECTED (RRC connected) state.
- the above sentence "the first type of random access is successful” includes the following meaning: through the first type of random access, the first communication node device enters RRC_CONNECTED (RRC_INACTIVE) from the RRC_INACTIVE (RRC inactive) state. Connected) state.
- the above sentence "the first type of random access is successful” includes the following meaning: Msg-B (message B) in the two-step random access is used by the first communication node device to determine the slave RRC_INACTIVE ( RRC inactive) state enters RRC_CONNECTED (RRC connected) state.
- the above sentence "the first type of random access is successful” includes the following meaning: Msg-B (message B) in the two-step random access includes the RRC connection establishment of the first communication node device ( RRC Connection Establishment) information.
- the above sentence “the first type of random access is successful” includes the following meaning: Msg-B (message B) in the two-step random access includes the conflict of the first communication node device Resolved feature identification.
- the above sentence "the first type of random access is successful” includes the following meaning: the Msg-B (message B) in the two-step random access includes the IMSI (International Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number).
- IMSI International Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number
- Msg-B messages B in the two-step random access includes the S-TMSI of the first communication node device (SAE (System Architecture Evolution)-Temporary Mobile Subscriber Identity, system architecture evolution temporary mobile subscriber identity).
- SAE System Architecture Evolution
- Temporary Mobile Subscriber Identity system architecture evolution temporary mobile subscriber identity
- the above sentence "the first type of random access is successful" includes the following meaning: Msg-B (message B) in the two-step random access includes that the first communication node device is in Msg-A The feature identifier used for conflict resolution carried in.
- the above sentence "the first type of random access is successful" includes the following meaning: Msg-B (message B) in the two-step random access includes that the first communication node device is in Msg-A The ID of the first communication node device used for conflict resolution carried in.
- the above sentence “whether transform precoding is used to generate the first wireless signal is used to determine whether transform precoding is used to generate the second wireless signal” includes the following meaning: whether transform precoding is used to generate the first wireless signal A wireless signal is used by the first communication node device to determine whether to use transform precoding to generate the second wireless signal.
- the above sentence "whether transform precoding is used to generate the first wireless signal is used to determine whether transform precoding is used to generate the second wireless signal” includes the following meaning: when transform precoding is used to generate the first wireless signal For a wireless signal, transform precoding is used to generate the second wireless signal; when transform precoding is not used to generate the first wireless signal, change precoding is not used to generate the second wireless signal.
- the above sentence “whether transform precoding is used to generate the first wireless signal is used to determine whether transform precoding is used to generate the second wireless signal” includes the following meaning: when transform precoding is not used to generate the For the first wireless signal, transform precoding is used to generate the second wireless signal; when transform precoding is used to generate the first wireless signal, change precoding is not used to generate the second wireless signal.
- the second type of random access is a type of random access other than the first type of random access.
- the second type of random access is random access of the first type of random access fallback.
- the first type of random access can be smoothly converted to the second type of random access.
- the second type of random access is 2-Step Random Access (2-Step Random Access).
- the second type of random access is a four-step random access defined in the 3GPP NR R15 version.
- the second type of random access is random access including Msg-1 (message 1), Msg-2 (message 2), Msg-3 (message 3) and Msg-4 (message 4) .
- the second type of random access is traditional random access defined in the 3GPP NR R15 version.
- the second type of random access is used to establish an RRC connection.
- the first step in the second type of random access is to send only a preamble sequence (Preamble).
- the first step in the second type of random access is to send a preamble sequence (Preamble) and a PUSCH (Physical Uplink Shared Channel, physical uplink shared channel).
- Preamble a preamble sequence
- PUSCH Physical Uplink Shared Channel, physical uplink shared channel
- the second type of random access includes sending Msg-3 (message 3).
- the second type of random access includes sending Msg-4 (message 4).
- the second type of random access is random access including Msg-3 (message 3) used to establish an RRC connection.
- the second type of random access is random access including Msg-3 (message 3) and Msg-4 (message 4) used to establish an RRC connection.
- the second type of random access is random access defined in section 5.1 of 3GPP TS38.321 (v15.4.0 version).
- the difference between the first type of random access and the second type of random access includes: the first type of random access does not include sending Msg-3 (message 3), and the second type of random access Random access involves sending Msg-3 (message 3).
- the difference between the first type of random access and the second type of random access includes: the first type of random access does not include receiving Msg-4 (message 4), and the second type of random access Random access includes receiving Msg-4 (message 4).
- the difference between the first type of random access and the second type of random access includes: the first type of random access does not include 5.1 in 3GPP TS38.321 (v15.4.0 version).
- the conflict resolution in section 5 the second type of random access includes the conflict resolution in section 5.1.5 in 3GPP TS38.321 (v15.4.0 version).
- the above sentence "the second type of random access is successful" includes the following meaning: through the second type of random access, the first communication node device enters RRC_CONNECTED from the RRC_IDLE (RRC idle) state. )state.
- the above sentence "the second type of random access is successful” includes the following meaning: Msg-4 (message 4) in the four-step random access is used by the first communication node device to determine the slave RRC_IDLE ( RRC idle) state enters RRC_CONNECTED (RRC connected) state.
- the above sentence "the second type of random access is successful" includes the following meaning: Msg-4 (message 4) in the four-step random access includes the RRC connection establishment of the first communication node device ( RRC Connection Establishment) information.
- the above sentence "the second type of random access is successful” includes the following meaning: the conflict resolution in the four-step random access is used by the first communication node device to determine to enter from the RRC_IDLE (RRC idle) state RRC_CONNECTED (RRC connected) state.
- the above sentence "the second type of random access is successful” includes the following meaning: through the second type of random access, the first communication node device enters the RRC_INACTIVE (RRC inactive) state and enters the RRC_CONNECTED (RRC) state. Connected) state.
- the above sentence "the second type of random access is successful” includes the following meaning: Msg-4 (message 4) in the four-step random access is used by the first communication node device to determine the slave RRC_INACTIVE ( RRC inactive) state enters RRC_CONNECTED (RRC connected) state.
- the above sentence "the second type of random access is successful” includes the following meaning: the conflict resolution in the four-step random access is used by the first communication node device to determine from the RRC_INACTIVE (RRC inactive) state Enter RRC_CONNECTED (RRC connected) state.
- the above sentence "the second type of random access is successful" includes the following meaning: Msg-4 (message 4) in the four-step random access includes the conflicting function of the first communication node device Resolved feature identification.
- the above sentence "the second type of random access is successful" includes the following meaning: the Msg-4 (message 4) in the four-step random access includes the IMSI (International Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number).
- the above sentence "the second type of random access is successful" includes the following meaning: Msg-4 (message 4) in the four-step random access includes the S-TMSI of the first communication node device (SAE (System Architecture Evolution)-Temporary Mobile Subscriber Identity, system architecture evolution temporary mobile subscriber identity).
- SAE System Architecture Evolution
- TMSI System Architecture Evolution-Temporary Mobile Subscriber Identity
- the contention resolution in the four-step random access includes the conflict resolution of the first communication node device The feature identification.
- the contention resolution in the four-step random access includes the IMSI (International Mobile) of the first communication node device. Subscriber Identification Number, International Mobile Subscriber Identification Number).
- the contention resolution in the four-step random access includes the S-TMSI of the first communication node device (Contention Resolution) SAE (System Architecture Evolution)-Temporary Mobile Subscriber Identity, system architecture evolution temporary mobile subscriber identity).
- the above sentence "the second type of random access is successful" includes the following meaning: Msg-4 (message 4) in the four-step random access includes the first communication node device in Msg-3 The feature identifier used for conflict resolution carried in.
- the above sentence "the second type of random access is successful" includes the following meaning: Msg-4 (message 4) in the four-step random access includes the first communication node device in Msg-3 The ID of the first communication node device used for conflict resolution carried in.
- the above sentence "the second type of random access is successful" includes the following meaning: the contention resolution in the four-step random access includes that the first communication node device is in Msg-3 The carried feature identifier used for conflict resolution.
- the contention resolution in the four-step random access includes that the first communication node device is in Msg-3 The carried ID of the first communication node device used for conflict resolution.
- the first information, the second information and the first sequence are all transmitted through an air interface.
- the first information, the second information and the first sequence are all transmitted through a wireless interface.
- the first information, the second information and the first sequence are all transmitted through a Uu interface.
- the first information, the second information and the first sequence are all transmitted through an interface between the base station and the user equipment.
- Embodiment 2 illustrates a schematic diagram of a network architecture according to the present application, as shown in FIG. 2.
- FIG. 2 is a diagram illustrating the system network architecture 200 of NR 5G, LTE (Long-Term Evolution) and LTE-A (Long-Term Evolution Advanced, enhanced long-term evolution).
- the NR 5G or LTE network architecture 200 may be called EPS (Evolved Packet System) 200.
- EPS Evolved Packet System
- EPS 200 may include one or more UE (User Equipment) 201, NG-RAN (Next Generation Radio Access Network) 202, EPC (Evolved Packet Core, Evolved Packet Core)/5G-CN (5G-Core Network) , 5G core network) 210, HSS (Home Subscriber Server, home subscriber server) 220 and Internet service 230.
- EPS can be interconnected with other access networks, but these entities/interfaces are not shown for simplicity. As shown in the figure, EPS provides packet switching services, but those skilled in the art will readily understand that various concepts presented throughout this application can be extended to networks that provide circuit switching services or other cellular networks.
- NG-RAN includes NR Node B (gNB) 203 and other gNB 204.
- gNB203 provides user and control plane protocol termination towards UE201.
- the gNB203 can be connected to other gNB204 via an Xn interface (for example, backhaul).
- gNB203 can also be called a base station, base transceiver station, radio base station, radio transceiver, transceiver function, basic service set (BSS), extended service set (ESS), TRP (transmit and receive node) or some other suitable terminology.
- BSS basic service set
- ESS extended service set
- TRP transmit and receive node
- gNB203 can be a satellite, an aircraft, or a ground base station relayed by satellite.
- gNB203 provides UE201 with an access point to EPC/5G-CN210.
- UE201 examples include cellular phones, smart phones, Session Initiation Protocol (SIP) phones, laptop computers, personal digital assistants (PDAs), satellite radios, global positioning systems, multimedia devices, video devices, digital audio players ( For example, MP3 players), cameras, game consoles, drones, aircraft, NB-IoT devices, machine-type communication devices, land vehicles, automobiles, wearable devices, or any other similar functional devices.
- UE201 can also refer to UE201 as a mobile station, subscriber station, mobile unit, subscriber unit, wireless unit, remote unit, mobile device, wireless device, wireless communication device, remote device, mobile subscriber station, access terminal, Mobile terminal, wireless terminal, remote terminal, handset, user agent, mobile client, client or some other suitable term.
- the gNB203 is connected to EPC/5G-CN210 through the S1/NG interface.
- the EPC/5G-CN210 includes MME/AMF/UPF 211, other MME/AMF/UPF 214, S-GW (Service Gateway) 212, and P-GW (Packet Date Network Gateway) 213.
- MME/AMF/UPF211 is a control node that processes the signaling between UE201 and EPC/5G-CN210.
- MME/AMF/UPF211 provides bearer and connection management. All user IP (Internet Protocol, Internet Protocol) packets are transmitted through S-GW212, and S-GW212 itself is connected to P-GW213.
- P-GW213 provides UE IP address allocation and other functions.
- the P-GW213 is connected to the Internet service 230.
- the Internet service 230 includes the corresponding Internet protocol service of the operator, and specifically may include the Internet, an intranet, IMS (IP Multimedia Subsystem, IP Multimedia Subsystem), and packet switching service.
- the UE201 corresponds to the first communication node device in this application.
- the UE 201 supports 2-step random access.
- the gNB203 corresponds to the second communication node device in this application.
- the gNB203 supports 2-step random access.
- Embodiment 3 shows a schematic diagram of an embodiment of a wireless protocol architecture of a user plane and a control plane according to the present application, as shown in FIG. 3.
- Figure 3 is a schematic diagram illustrating an embodiment of the radio protocol architecture for the user plane and the control plane.
- Figure 3 shows three layers for the first communication node device (UE) and the second communication node device (gNB, eNB or medium Relay) radio protocol architecture: layer 1, layer 2, and layer 3.
- Layer 1 (L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions.
- the L1 layer will be referred to as PHY301 herein.
- Layer 2 (L2 layer) 305 is above PHY301 and is responsible for the link between the first communication node device and the second communication node device through PHY301.
- the L2 layer 305 includes MAC (Medium Access Control) sublayer 302, RLC (Radio Link Control, radio link control protocol) sublayer 303, and PDCP (Packet Data Convergence Protocol), packet data Convergence protocol) sublayers 304, these sublayers terminate at the second communication node device on the network side.
- the first communication node device may have several upper layers above the L2 layer 305, including a network layer (for example, an IP layer) terminating at the P-GW on the network side and another terminating at the connection.
- Application layer at one end for example, remote UE, server, etc.
- the PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels.
- the PDCP sublayer 304 also provides header compression for upper layer data packets to reduce radio transmission overhead, provides security by encrypting data packets, and provides cross-zone between the second communication node device and the first communication node device Mobile support.
- the RLC sublayer 303 provides segmentation and reassembly of upper layer data packets, retransmission of lost data packets, and reordering of data packets to compensate for disordered reception caused by HARQ.
- the MAC sublayer 302 provides multiplexing between logical and transport channels. The MAC sublayer 302 is also responsible for allocating various radio resources (e.g., resource blocks) in a cell among the first communication node devices. The MAC sublayer 302 is also responsible for HARQ operations.
- the radio protocol architectures for the first communication node device and the second communication node device are substantially the same for the physical layer 301 and the L2 layer 305, but there is no header compression function for the control plane.
- the control plane also includes an RRC (Radio Resource Control, radio resource control) sublayer 306 in layer 3 (L3 layer).
- the RRC sublayer 306 is responsible for obtaining radio resources (ie, radio bearers) and configuring the lower layer using RRC signaling between the second communication node device and the first communication node device.
- the wireless protocol architecture in FIG. 3 is applicable to the first communication node device in this application.
- the wireless protocol architecture in FIG. 3 is applicable to the second communication node device in this application.
- the first information in this application is generated in the RRC306.
- the first information in this application is generated in the MAC302.
- the first information in this application is generated in the PHY301.
- the second information in this application is generated in the RRC306.
- the second information in this application is generated in the MAC302.
- the second information in this application is generated in the PHY301
- the first sequence in this application is generated in the RRC306.
- the first sequence in this application is generated in the MAC302.
- the first sequence in this application is generated in the PHY301.
- the first wireless signal in this application is generated in the RRC306.
- the first wireless signal in this application is generated in the MAC302.
- the first wireless signal in this application is generated in the PHY301.
- the second wireless signal in this application is generated in the RRC306.
- the second wireless signal in this application is generated in the MAC302.
- the second wireless signal in this application is generated in the PHY301.
- the third information in this application is generated in the RRC306.
- the third information in this application is generated in the MAC302.
- the third information in this application is generated in the PHY301.
- the fourth information in this application is generated in the RRC306.
- the fourth information in this application is generated in the MAC302.
- the fourth information in this application is generated in the PHY301
- the third wireless signal in this application is generated in the RRC306.
- the third wireless signal in this application is generated in the MAC302.
- the third wireless signal in this application is generated in the PHY301.
- the first signaling in this application is generated in the MAC302.
- the first signaling in this application is generated in the PHY301.
- Embodiment 4 shows a schematic diagram of a base station equipment and a given user equipment according to the present application, as shown in FIG. 4.
- FIG. 4 is a block diagram of gNB/eNB 410 communicating with UE 450 in the access network.
- the user equipment includes a controller/processor 490, a memory 480, a receiving processor 452, a transmitter/receiver 456, a transmitting processor 455 and a data source 467, and the transmitter/receiver 456 includes an antenna 460.
- the data source 467 provides upper layer packets to the controller/processor 490, and the controller/processor 490 provides header compression and decompression, encryption and decryption, packet segment connection and reordering, and multiplexing and demultiplexing between logic and transmission channels It is used to implement the L2 layer protocol for the user plane and the control plane.
- the upper layer packet can include data or control information, such as DL-SCH or UL-SCH.
- the transmission processor 455 implements various signal transmission processing functions for the L1 layer (ie, physical layer) including coding, interleaving, scrambling, modulation, power control/allocation, precoding, and physical layer control signaling generation, etc.
- the reception processor 452 implements various signal reception processing functions for the L1 layer (i.e., physical layer) including decoding, deinterleaving, descrambling, demodulation, deprecoding, physical layer control signaling extraction, and the like.
- the transmitter 456 is used for converting the baseband signal provided by the transmitting processor 455 into a radio frequency signal and transmitting it via the antenna 460, and the receiver 456 is used for converting the radio frequency signal received by the antenna 460 into a baseband signal and providing it to the receiving processor 452.
- the base station equipment (410) may include a controller/processor 440, a memory 430, a receiving processor 412, a transmitter/receiver 416, and a transmitting processor 415.
- the transmitter/receiver 416 includes an antenna 420.
- the upper layer packet arrives at the controller/processor 440.
- the controller/processor 440 provides header compression and decompression, encryption and decryption, packet segmentation connection and reordering, and multiplexing and demultiplexing between logic and transmission channels to implement L2 layer protocol for user plane and control plane.
- the upper layer packet may include data or control information, such as DL-SCH or UL-SCH.
- the transmission processor 415 implements various signal transmission processing functions for the L1 layer (ie, physical layer) including coding, interleaving, scrambling, modulation, power control/distribution, precoding, and physical layer signaling (including synchronization signals and reference Signal etc.) generation etc.
- the reception processor 412 implements various signal reception processing functions for the L1 layer (ie, physical layer) including decoding, deinterleaving, descrambling, demodulation, deprecoding, physical layer signaling extraction, and the like.
- the transmitter 416 is used for converting the baseband signal provided by the transmitting processor 415 into a radio frequency signal and transmitting it via the antenna 420, and the receiver 416 is used for converting the radio frequency signal received by the antenna 420 into a baseband signal and providing it to the receiving processor 412.
- upper layer packets (such as the first information, second information, third information, and upper layer packets to which the fourth information belongs in this application) and those included in the first signaling (if included) High-level information) is provided to the controller/processor 440.
- the controller/processor 440 implements the functions of the L2 layer.
- the controller/processor 440 provides header compression, encryption, packet segmentation and reordering, multiplexing between logic and transport channels, and radio resource allocation to UE 450 based on various priority metrics.
- the controller/processor 440 is also responsible for HARQ operations, retransmission of lost packets, and signaling to the UE 450, such as the first information, second information, third information, fourth information, and first signaling in this application.
- the included high-level information is generated in the controller/processor 440.
- the transmit processor 415 implements various signal processing functions for the L1 layer (ie, the physical layer) and the generation of L1 layer signaling (including the first signaling).
- the signal processing functions include decoding and interleaving to facilitate pre-processing at the UE 450.
- FEC Forward error correction
- BPSK binary phase shift keying
- QPSK quadrature phase shift keying
- each receiver 456 receives the radio frequency signal through its corresponding antenna 460, and each receiver 456 recovers the baseband information modulated onto the radio frequency carrier and provides the baseband information to the receiving processor 452.
- the receiving processor 452 implements various signal receiving and processing functions of the L1 layer and receiving L1 layer signaling.
- the signal reception processing function includes the reception of the physical layer signal and the first signaling of the wireless signal carrying the first information, the second information, the third information and the fourth information in this application, etc., through the multi-carrier in the multi-carrier symbol stream Symbols undergo demodulation based on various modulation schemes (for example, binary phase shift keying (BPSK), quadrature phase shift keying (QPSK)), followed by decoding and deinterleaving to recover the data transmitted by gNB410 on the physical channel or Control, and then provide data and control signals to the controller/processor 490.
- BPSK binary phase shift keying
- QPSK quadrature phase shift keying
- the controller/processor 490 implements the L2 layer, and the controller/processor 490 responds to the first information, the second information, the third information, the fourth information, and the higher layers included in the first signaling (if included) in this application. Interpret the information.
- the controller/processor may be associated with a memory 480 that stores program codes and data.
- the memory 480 may be referred to as a computer-readable medium.
- the data source 467 is used to provide the relevant configuration data of the signal to the controller/processor 490.
- the data source 467 represents all protocol layers above the L2 layer.
- the first wireless signal, the second wireless signal, and the third wireless signal in this application are generated in the data source 467.
- the controller/processor 490 implements the L2 layer for the user plane and the control plane by providing header compression, encryption, packet segmentation and reordering, and multiplexing between logic and transport channels based on gNB410 configuration allocation protocol.
- the controller/processor 490 is also responsible for HARQ operations, retransmission of lost packets, and signaling to gNB410.
- the transmission processor 455 implements various signal transmission processing functions for the L1 layer (ie, physical layer) and signaling of the L1 layer, such as the first sequence in this application.
- Signal transmission processing functions include encoding, modulation, etc., dividing the modulation symbols into parallel streams and mapping each stream to the corresponding multi-carrier sub-carrier and/or multi-carrier symbol for baseband signal generation, and then mapping by the transmitting processor 455 via the transmitter 456
- the antenna 460 is transmitted in the form of a radio frequency signal, and the physical layer signal (including the first sequence in this application, the processing of the first wireless signal, the second wireless signal and the third wireless signal in the physical layer) is generated by the transmit processor 455.
- the receivers 416 receive radio frequency signals through their corresponding antennas 420, and each receiver 416 recovers the baseband information modulated on the radio frequency carrier, and provides the baseband information to the receiving processor 412.
- the receiving processor 412 implements various signal reception processing functions for the L1 layer (ie, physical layer) and L1 layer signaling, including the reception of the first sequence in this application, the physical layer reception of the first wireless signal, and the first The physical layer reception of the second wireless signal and the physical layer reception of the third wireless signal.
- the signal reception processing function includes obtaining a multi-carrier symbol stream, and then demodulating the multi-carrier symbols in the multi-carrier symbol stream based on various modulation schemes, and then Decoding to recover the data and/or control signals originally transmitted by the UE 450 on the physical channel.
- the data and/or control signals are then provided to the controller/processor 440.
- the receiving processor controller/processor 440 implements the L2 layer.
- the controller/processor may be associated with a memory 430 that stores program codes and data.
- the memory 430 may be a computer-readable medium.
- the UE 450 corresponds to the first communication node device in this application.
- the gNB410 corresponds to the second communication node device in this application.
- the UE450 device includes: at least one processor and at least one memory, the at least one memory includes computer program code; the at least one memory and the computer program code are configured to interact with the at least one processor
- the UE450 device at least: receives the first information and the second information; sends the first sequence and the first wireless signal, and the first sequence and the first wireless signal are used for the first type of random access Send a second wireless signal; wherein, the first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the The first wireless signal is used to determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal. Signal, the second type of random access is different from the first type of random access.
- the UE 450 includes: a memory storing a computer-readable program of instructions, the computer-readable program of instructions generates actions when executed by at least one processor, and the actions include: receiving first information and Two information; sending a first sequence and a first wireless signal, the first sequence and the first wireless signal are used for the first type of random access; sending a second wireless signal; wherein the first information is used In determining whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used to determine whether to use transform precoding to generate the The second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, the second type of random access and the first type Random access is not the same.
- the gNB410 device includes: at least one processor and at least one memory, the at least one memory includes computer program code; the at least one memory and the computer program code are configured to interact with the at least one processor Use together with the device.
- the gNB410 device at least: sends first information and second information; receives a first sequence and a first wireless signal, and the first sequence and the first wireless signal are used for the first type of random access; Wireless signal; wherein the first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal Is used to determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, the The second type of random access is different from the first type of random access.
- the gNB410 includes: a memory storing a computer-readable instruction program, the computer-readable instruction program generates actions when executed by at least one processor, and the actions include: sending first information and Second information; receiving the first sequence and the first wireless signal, the first sequence and the first wireless signal are used for the first type of random access; receiving the second wireless signal; wherein the first information is used In determining whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used to determine whether to use transform precoding to generate the The second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, the second type of random access and the first type Random access is not the same.
- the receiver 456 (including the antenna 460), the receiving processor 452, and the controller/processor 490 are used to receive the first information in this application.
- the receiver 456 (including the antenna 460), the receiving processor 452 and the controller/processor 490 are used to receive the second information in this application.
- the receiver 456 (including the antenna 460), the receiving processor 452, and the controller/processor 490 are used in this application to receive the third information.
- the receiver 456 (including the antenna 460), the receiving processor 452 and the controller/processor 490 are used in this application to receive the fourth information.
- the receiver 456 (including the antenna 460), the receiving processor 452 and the controller/processor 490 are used in this application to receive the first signaling.
- the transmitter 456 (including the antenna 460) and the transmission processor 452 are used to transmit the first sequence in this application.
- the transmitter 456 (including the antenna 460), the transmission processor 452 and the controller/processor 490 are used to transmit the first wireless signal in this application.
- the transmitter 456 (including the antenna 460), the transmission processor 452 and the controller/processor 490 are used to transmit the second wireless signal in this application.
- the transmitter 456 (including the antenna 460), the transmission processor 452 and the controller/processor 490 are used to transmit the third wireless signal in this application.
- the transmitter 416 (including the antenna 420), the transmission processor 415, and the controller/processor 440 are used to transmit the first information in this application.
- the transmitter 416 (including the antenna 420), the transmission processor 415, and the controller/processor 440 are used to transmit the second information in this application.
- the transmitter 416 (including the antenna 420), the transmission processor 415, and the controller/processor 440 are used to transmit the third information in this application.
- the transmitter 416 (including the antenna 420), the transmission processor 415, and the controller/processor 440 are used to transmit the fourth information in this application.
- the transmitter 416 (including the antenna 420), the transmission processor 415, and the controller/processor 440 are used to send the first signaling in this application.
- the receiver 416 (including the antenna 420) and the receiving processor 412 are used to receive the first sequence in this application.
- the receiver 416 (including the antenna 420), the receiving processor 412 and the controller/processor 440 are used to receive the first wireless signal in this application.
- the receiver 416 (including the antenna 420), the receiving processor 412 and the controller/processor 440 are used to receive the second wireless signal in this application.
- the receiver 416 (including the antenna 420), the receiving processor 412 and the controller/processor 440 are used to receive the third wireless signal in this application.
- Embodiment 5 illustrates a wireless signal transmission flow chart according to an embodiment of the present application, as shown in FIG. 5.
- the second communication node N1 is a maintenance base station of the serving cell of the first communication node U2, and the sequence in this example does not limit the signal transmission sequence and implementation sequence in this application.
- a first transmission information in step S11 transmitting second information in step S12, receiving a first sequence in step S13, the first radio signal received in step S14, in step S15 the first transmission Three messages, the fourth message is sent in step S16, the first signal is sent in step S17, and the second wireless signal is received in step S18.
- step S21 For the first communication node U2, received in step S21 the first information, the second information received in step S22, the transmission sequence in a first step S23, it transmits a first radio signal in a step S24, in step S25 receives the first Three messages, the fourth message is received in step S26, the first signaling is received in step S27, and the second wireless signal is sent in step S28.
- the first sequence in this application and the first wireless signal in this application are used for the first type of random access; the first information in this application is used to determine whether Use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used to determine whether to use transform precoding to generate the second wireless signal Signal; when the second type of random access is successful, the second information in this application is used to determine whether to use transform precoding to generate the second wireless signal, the second type of random access and the first Types of random access are not the same; the third information in this application is used to determine whether the first type of random access is successful; the first signaling in this application is used to determine the second wireless The time-frequency resources occupied by the signal and the modulation and coding method used by the second wireless signal; the format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal; this application
- the fourth information in is specific to the first communication node device, the fourth information includes information other than whether transform precoding
- the air interface resources occupied by the first sequence, the time-frequency resources occupied by the first wireless signal, the modulation and coding method used by the first wireless signal, and the first wireless signal used Is associated with at least one of the redundant versions.
- the third information is transmitted through higher layer signaling.
- the third information is transmitted through physical layer signaling.
- the third information includes all or part of a high-level signaling.
- the third information includes all or part of a physical layer signaling.
- the third information includes all or part of an IE (Information Element, information element) in an RRC (Radio Resource Control, radio resource control) signaling.
- IE Information Element, information element
- RRC Radio Resource Control, radio resource control
- the third information includes all or part of a field (Field) in an IE (Information Element) in an RRC (Radio Resource Control, radio resource control) signaling.
- Field Information Element
- RRC Radio Resource Control, radio resource control
- the third information includes all or part of fields in a MAC (Medium Access Control) layer signaling.
- MAC Medium Access Control
- the third information includes all or part of a MAC (Medium Access Control) CE (Control Element, control element).
- MAC Medium Access Control
- CE Control Element, control element
- the third information includes all or part of a MAC (Medium Access Control) header (Header).
- MAC Medium Access Control
- the third information includes all or part of a MAC payload (payload) in a RAR (Random Access Response).
- the third information includes all or part of a MAC PDU (Protocol Data Unit, Protocol Data Unit) in a RAR (Random Access Response, Random Access Response).
- MAC PDU Protocol Data Unit
- RAR Random Access Response
- the third information includes all or part of a subheader (Subheader) in a RAR (Random Access Response, random access response).
- Subheader a subheader
- RAR Random Access Response, random access response
- the third information includes all or part of a MAC CE (Control Element, control element) in a RAR (Random Access Response, Random Access Response).
- MAC CE Control Element, control element
- RAR Random Access Response, Random Access Response
- the third information includes all or part of a contention resolution (Contention Resolution) in a 2-step random access.
- the third information includes all or part of MsgB (message B) in 2-Step Random Access (2-Step RACH).
- the third information includes all or part of the MAC payload (payload) in the MsgB (message B) in 2-Step Random Access (2-Step RACH).
- the three pieces of information include all or part of MAC PDU (Protocol Data Unit) in MsgB (Message B) in 2-Step Random Access (2-Step RACH).
- MAC PDU Protocol Data Unit
- MsgB Message B
- 2-Step RACH 2-Step Random Access
- the third information includes all or part of MAC SDU (Service Data Unit) in MsgB (Message B) in 2-Step Random Access (2-Step RACH).
- MAC SDU Service Data Unit
- MsgB Message B
- 2-Step RACH 2-Step Random Access
- the third information includes all or part of a subheader (Subheader) in MsgB (message B) in 2-Step Random Access (2-Step RACH).
- the third information includes all or part of a MAC CE (Control Element, control element) in MsgB (message B) in 2-Step Random Access (2-Step RACH).
- the third information is transmitted through a PDSCH (Physical Downlink Shared Channel, physical downlink shared channel), RA-RNTI (Random Access Radio Network Temporary Identity, Random Access Radio Network Temporary Identity) and TC-RNTI ( An identifier other than Temporary Cell Radio Network Temporary Identity (Temporary Cell Radio Network Temporary Identity) is used to generate the initial value of the generator of the scrambling code sequence of the PDSCH carrying the third information.
- PDSCH Physical Downlink Shared Channel, physical downlink shared channel
- RA-RNTI Random Access Radio Network Temporary Identity
- TC-RNTI An identifier other than Temporary Cell Radio Network Temporary Identity (Temporary Cell Radio Network Temporary Identity) is used to generate the initial value of the generator of the scrambling code sequence of the PDSCH carrying the third information.
- the third information is transmitted through a PDSCH (Physical Downlink Shared Channel), and MsgB-RNTI (message B radio network temporary identifier) is used to generate the PDSCH carrying the third information The initial value of the generator of the scrambling code sequence.
- PDSCH Physical Downlink Shared Channel
- MsgB-RNTI messages B radio network temporary identifier
- the sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used by the first communication node device to determine the Whether the first type of random access is successful.
- the sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used to directly indicate the first type of random access whether succeed.
- the above sentence “the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used to indirectly indicate the first type of random access whether succeed.
- the above sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used to explicitly indicate the first type of random access Whether the access is successful.
- the above sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used to implicitly indicate the first type of random access Whether the access is successful.
- the above sentence "the third information is used to determine whether the first type of random access is successful" includes the following meaning: whether the third information includes the Msg- of the first type of random access A (message A) carries a feature identifier used for conflict resolution.
- the above sentence "the third information is used to determine whether the first type of random access is successful" includes the following meaning: whether the third information includes the Msg- of the first type of random access The information corresponding to the feature identifier used for conflict resolution carried in A (message A).
- the above sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: whether the third information includes the Msg- of the first type of random access The ID of the first communication point device used for conflict resolution carried in A (message A).
- the third information is transmitted through a PDSCH (Physical Downlink Shared Channel), and RA-RNTI (Random Access Radio Network Temporary Identity, Random Access Radio Network Temporary Identity) is used to generate and carry The initial value of the generator of the PDSCH scrambling code sequence of the third information.
- PDSCH Physical Downlink Shared Channel
- RA-RNTI Random Access Radio Network Temporary Identity, Random Access Radio Network Temporary Identity
- Embodiment 6 illustrates a wireless signal transmission flowchart according to another embodiment of the present application, as shown in FIG. 6.
- the second communication node N3 is a maintenance base station of the serving cell of the first communication node U4.
- the sequence in this example does not limit the signal transmission sequence and implementation sequence in this application.
- the second communication node N3 is transmitted in step S31 the first information, second information transmitted in step S32, receiving the first sequence in the step S33, the first radio signal received in step S34, in step S35, the receiving section Three wireless signals, the third information is sent in step S36, the fourth information is sent in step S37, the first signaling is sent in step S38, and the second wireless signal is received in step S39.
- the first communication node U4 received at step S41, the first information, the second information received in step S42, the transmission sequence in a first step S43, it transmits a first radio signal in a step S44, at step S45, the transmission section Three wireless signals, the third information is received in step S46, the fourth information is received in step S47, the first signaling is received in step S48, and the second wireless signal is sent in step S49.
- the first sequence in this application and the first wireless signal in this application are used for the first type of random access; the first information in this application is used to determine whether Use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used to determine whether to use transform precoding to generate the second wireless signal Signal; when the second type of random access is successful, the second information in this application is used to determine whether to use transform precoding to generate the second wireless signal, the second type of random access and the first Types of random access are not the same; the third information in this application is used to determine whether the first type of random access is successful; the third wireless signal in this application is used for the second type of random access Access, the second information is used to determine whether to use transform precoding to generate the third wireless signal, and whether to use transform precoding to generate the third wireless signal is used to determine whether to use transform precoding to generate the first wireless signal Two wireless signals; the first signaling in this application is used to determine the time-frequency resources occupied by the
- the third information includes all or part of an Msg4 (message 4).
- the third information includes all or part of Msg4 in a 4-step random access.
- the third information includes all or part of the contention resolution (Contention Resolution).
- the third information includes all or part of a contention resolution (Contention Resolution) in a 4-step random access.
- a contention resolution Contention Resolution
- the third information is transmitted through a DL-SCH (Downlink Shared Channel, downlink shared channel).
- DL-SCH Downlink Shared Channel, downlink shared channel
- the third information is transmitted through a PDSCH (Physical Downlink Shared Channel, physical downlink shared channel).
- PDSCH Physical Downlink Shared Channel, physical downlink shared channel
- the third information is transmitted through a PDSCH (Physical Downlink Shared Channel), and TC-RNTI (Temporary Cell Radio Network Temporary Identity, Temporary Cell Radio Network Temporary Identity) is used to generate the port The initial value of the generator of the PDSCH scrambling code sequence of the third information.
- PDSCH Physical Downlink Shared Channel
- TC-RNTI Temporary Cell Radio Network Temporary Identity, Temporary Cell Radio Network Temporary Identity
- the third information is broadcast.
- the third information is unicast.
- the third information is cell specific (Cell Specific).
- the third information is user equipment specific (UE-specific).
- the third information is user equipment group-specific (UE group-specific).
- the third information is transmitted through PDCCH (Physical Downlink Control Channel, narrowband physical downlink control channel).
- PDCCH Physical Downlink Control Channel, narrowband physical downlink control channel
- the third information includes all or part of a field of DCI (Downlink Control Information) signaling.
- DCI Downlink Control Information
- the sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used by the first communication node device to determine the Whether the first type of random access is successful.
- the above sentence “the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used to directly indicate the first type of random access whether succeed.
- the above sentence “the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used to indirectly indicate the first type of random access whether succeed.
- the above sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used to explicitly indicate the first type of random access Whether the access is successful.
- the above sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: the third information is used to implicitly indicate the first type of random access Whether the access is successful.
- the above sentence "the third information is used to determine whether the first type of random access is successful" includes the following meaning: whether the third information includes the Msg- of the first type of random access A (message A) carries a feature identifier used for conflict resolution.
- the above sentence "the third information is used to determine whether the first type of random access is successful" includes the following meaning: whether the third information includes the Msg- of the first type of random access The information corresponding to the feature identifier used for conflict resolution carried in A (message A).
- the above sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: whether the third information includes the Msg- of the first type of random access The ID of the first communication point device used for conflict resolution carried in A (message A).
- the sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: whether the third information includes the IMSI (International All or part of the Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number.
- the above sentence "the third information is used to determine whether the first type of random access is successful” includes the following meaning: whether the third information includes the S-TMSI of the first communication point device All or part of (SAE (System Architecture Evolution)-Temporary Mobile Subscriber Identity, system architecture evolution temporary mobile subscriber identity).
- SAE System Architecture Evolution
- Embodiment 7 illustrates a schematic diagram of the relationship between the first sequence and the first wireless signal according to an embodiment of the present application, as shown in FIG. 7.
- the horizontal axis represents the time domain
- the horizontal vertical axis represents the frequency domain
- the vertical axis represents the code domain
- the rectangle filled with dots represents the empty resource block occupied by the first sequence
- the rectangle filled with cross lines represents the first sequence.
- the air interface resources occupied by the first sequence include time-frequency resources occupied by the first sequence.
- the air interface resources occupied by the first sequence include code domain resources occupied by the first sequence.
- the air interface resources occupied by the first sequence include sequence resources occupied by the first sequence.
- the air interface resources occupied by the first sequence include time-frequency resources occupied by the first sequence and code domain resources occupied by the first sequence.
- the “association of at least one of the redundancy versions used by the signal” includes the following meaning: the air interface resource occupied by the first sequence is associated with the time-frequency resource occupied by the first wireless signal.
- the “association of at least one of the redundancy versions used by the signal” includes the following meanings: the air interface resources occupied by the first sequence and the modulation and coding scheme (MCS, Modulation and Coding Scheme) used by the first wireless signal Associated.
- MCS modulation and coding scheme
- the "association of at least one of the redundancy versions used by the signal” includes the following meaning: the air interface resources occupied by the first sequence are associated with the redundancy version (RV, Redundancy Version) used by the first wireless signal .
- the “association with at least one of the redundancy versions used by the signal” includes the following meanings: the air interface resources occupied by the first sequence, the time-frequency resources occupied by the first wireless signal, and the first wireless signal
- the modulation and coding method used is related.
- the “association with at least one of the redundancy versions used by the signal” includes the following meanings: the air interface resources occupied by the first sequence, the time-frequency resources occupied by the first wireless signal, and the first wireless signal The adopted redundancy version is associated.
- the “association with at least one of the redundancy versions used by the signal” includes the following meanings: the air interface resources occupied by the first sequence, the time-frequency resources occupied by the first wireless signal, and the first wireless signal The adopted redundancy version is associated.
- the “association with at least one of the redundant versions used by the signal” includes the following meanings: air interface resources occupied by the first sequence and time-frequency resources occupied by the first wireless signal, The modulation and coding method adopted and the redundancy version adopted by the first wireless signal are all related.
- the “association with at least one of the redundant versions used by the signal” includes the following meanings: air interface resources occupied by the first sequence and time-frequency resources occupied by the first wireless signal, At least one of the adopted modulation and coding method and the redundancy version adopted by the first wireless signal has a mapping relationship.
- the "association with at least one of the redundancy versions used by the signal” includes the following meaning: the air interface resources occupied by the first sequence are used by the receiver of the first sequence to determine the amount occupied by the first wireless signal At least one of a time-frequency resource, a modulation and coding method adopted by the first wireless signal, and a redundancy version adopted by the first wireless signal.
- the sentence "air interface resources occupied by the first sequence and time-frequency resources occupied by the first wireless signal, modulation and coding method used by the first wireless signal, and the first wireless signal “Associated with at least one of the redundancy versions used by the signal” includes the following meanings: the air interface resources occupied by the first sequence are used to indicate the time-frequency resources occupied by the first wireless signal, At least one of the modulation and coding method adopted by the wireless signal and the redundancy version adopted by the first wireless signal.
- the “association with at least one of the redundant versions used by the signal” includes the following meanings: air interface resources occupied by the first sequence and time-frequency resources occupied by the first wireless signal, At least one of the adopted modulation and coding method and the redundancy version adopted by the first wireless signal has a corresponding relationship.
- Embodiment 8 illustrates a schematic diagram of the relationship between the second wireless signal and the third wireless signal of an embodiment of the present application, as shown in FIG. 8.
- each rectangle represents an operation, and each diamond represents a judgment.
- the first information and the second information are received in 802, the first sequence and the first wireless signal are sent in 803, and whether the first type of random access is successful is judged in 804, and in 805 Determine whether to use transform precoding to generate the first wireless signal.
- transform precoding is used to generate the second wireless signal.
- transform precoding is not used to generate the second wireless signal.
- the second type of random access is determined. Whether it is successful or not, it is judged in 809 whether transform precoding is used to generate the third wireless signal, transform precoding is used to generate the second wireless signal in 810, and transform precoding is not used to generate the second wireless signal in 811.
- the third wireless signal in this application is used for the second type of random access, and the second information in this application is used to determine whether to use transform precoding to generate the first Three wireless signals, whether to use transform precoding to generate the third wireless signal is used to determine whether to use transform precoding to generate the second wireless signal in this application.
- the first transmitter when the first sequence in this application and the first type of random access to which the first wireless signal belongs fails, the first transmitter sends the third wireless signal.
- the first transmitter abandons sending the third wireless signal.
- the first transmitter when the first sequence in this application and the first type of random access to which the first wireless signal belongs are successful, the first transmitter sends the third wireless signal.
- whether to use transform precoding to generate the third wireless signal is used to determine whether to use transform precoding to generate the second wireless signal.
- whether to use transform precoding to generate the third wireless signal is not used to determine whether to use transform precoding to generate the second wireless signal.
- whether to use transform precoding to generate the third wireless signal is used to determine whether to use transform precoding to generate The second wireless signal.
- whether the second type of random access is successful or not complies with section 5.1.5 of 3GPP TS38.321 (v15.4.0 version).
- the third wireless signal carries the third information in this application.
- the third wireless signal does not carry the third information in this application.
- the third wireless signal is used to carry Msg-3 (random access information 3).
- the third wireless signal is used for 4-step random access to carry Msg-3 (random access information 3).
- the third wireless signal is used in a random access procedure.
- the third wireless signal is used for random access procedures in R15 (3GPP Release 15, Release 15) and later versions.
- the third wireless signal is used in a 4-step random access process (4-step Random Access).
- the third wireless signal carries high-level information.
- the third wireless signal is used to transmit higher layer signaling (Higher Layer Signaling).
- the third wireless signal carries one of SR (Scheduling Request) and BSR (Buffer Status Report, Buffer Status Report).
- the third wireless signal carries an RRC connection establishment request (Establishment Request).
- the third wireless signal is transmitted through UL-SCH (Uplink Shared Channel, uplink shared channel).
- UL-SCH Uplink Shared Channel, uplink shared channel
- the third wireless signal is transmitted through PUSCH (Physical Uplink Shared Channel, Physical Uplink Shared Channel).
- PUSCH Physical Uplink Shared Channel, Physical Uplink Shared Channel
- a transport block (TB, Transport Block) is added (CRC Insertion), channel coding (Channel Coding), rate matching (Rate Matching), scrambling (Scrambling), modulation (Modulation), and layer mapping in sequence. (Layer Mapping), precoding (Precoding), mapping to virtual resource blocks (Mapping to Virtual Resource Blocks), mapping from virtual resource blocks to physical resource blocks (Mapping from Virtual to Physical Resource Blocks), OFDM baseband signal generation (OFDM Baseband) Signal Generation), the third wireless signal is obtained after Modulation and Upconversion (Modulation and Upconversion).
- a transport block sequentially undergoes CRC insertion (CRC Insertion), segmentation (Segmentation), coding block-level CRC insertion (CRC Insertion), channel coding (Channel Coding), and rate matching (Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Precoding, Mapping to Virtual Resource Blocks, Mapping to Virtual Resource Blocks To physical resource blocks (Mapping from Virtual to Physical Resource Blocks), OFDM baseband signal generation (OFDM Baseband Signal Generation), modulation and upconversion (Modulation and Upconversion), the third wireless signal is obtained.
- a transport block (TB, Transport Block) is added (CRC Insertion), channel coding (Channel Coding), rate matching (Rate Matching), scrambling (Scrambling), modulation (Modulation), and layer mapping in sequence. (Layer Mapping), Transform Precoding, Precoding, Mapping to Virtual Resource Blocks, Mapping from Virtual to Physical Resource Blocks OFDM baseband signal generation (OFDM Baseband Signal Generation), and modulation and upconversion (Modulation and Upconversion) to obtain the third wireless signal.
- a transport block sequentially undergoes CRC insertion (CRC Insertion), segmentation (Segmentation), coding block-level CRC insertion (CRC Insertion), channel coding (Channel Coding), and rate matching (Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Transform Precoding, Precoding, Mapping to Virtual Resource Block (Mapping to Virtual Resource) Blocks, Mapping from Virtual to Physical Resource Blocks, OFDM Baseband Signal Generation, Modulation and Upconversion to obtain the third wireless signal.
- the third wireless signal includes PUSCH (Physical Uplink Shared Channel) and DMRS (Demodulation Reference Signal, demodulation reference signal).
- PUSCH Physical Uplink Shared Channel
- DMRS Demodulation Reference Signal, demodulation reference signal
- the third wireless signal only includes PUSCH (Physical Uplink Shared Channel, Physical Uplink Shared Channel).
- PUSCH Physical Uplink Shared Channel, Physical Uplink Shared Channel
- the sentence "the second information is used to determine whether to use transform precoding to generate the second wireless signal” in this application includes the following meaning: the second information is used to determine whether to use transform precoding.
- the third wireless signal is generated by encoding, and whether transform precoding is used to generate the third wireless signal is used to determine whether to use transform precoding to generate the second wireless signal.
- the above sentence “the second information is used to determine whether to use transform precoding to generate the third wireless signal” includes the following meaning: the second information is used by the first communication node to determine whether The third wireless signal is generated using transform precoding.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the third wireless signal” includes the following meaning: the second information is used to directly indicate whether to use transform precoding to generate The third wireless signal.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the third wireless signal” includes the following meaning: the second information is used to indirectly indicate whether to use transform precoding to generate The third wireless signal.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the third wireless signal” includes the following meaning: the second information is used to explicitly indicate whether to use transform precoding.
- the third wireless signal is generated by encoding.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the third wireless signal” includes the following meaning: the second information is used to implicitly indicate whether to use transform precoding.
- the third wireless signal is generated by encoding.
- the above sentence "the second information is used to determine whether to use transform precoding to generate the third wireless signal” includes the following meaning: the second information includes whether to use transform precoding to generate the third wireless signal.
- Wireless signal switch (Enable/Disable).
- the above sentence “whether transform precoding is used to generate the third wireless signal is used to determine whether transform precoding is used to generate the second wireless signal” includes the following meaning: whether transform precoding is used to generate the second wireless signal Three wireless signals are used by the first communication node to determine whether to use transform precoding to generate the second wireless signal.
- the above sentence "whether transform precoding is used to generate the third wireless signal is used to determine whether transform precoding is used to generate the second wireless signal” includes the following meaning: when transform precoding is used to generate the second wireless signal In the case of three wireless signals, transform precoding is used to generate the second wireless signal; when transform precoding is not used to generate the third wireless signal, transform precoding is not used to generate the second wireless signal.
- the above sentence "whether transform precoding is used to generate the third wireless signal is used to determine whether transform precoding is used to generate the second wireless signal” includes the following meaning: when transform precoding is used to generate the second wireless signal For three wireless signals, transform precoding is not used to generate the second wireless signal; when transform precoding is not used to generate the third wireless signal, transform precoding is used to generate the second wireless signal.
- Embodiment 9 illustrates a schematic diagram of the relationship between the second wireless signal and the first signaling according to an embodiment of the present application, as shown in FIG. 9.
- each rectangle represents an operation, and each diamond represents a judgment.
- the first signaling in this application is used to determine the time-frequency resources occupied by the second wireless signal in this application and the modulation and coding method used by the second wireless signal;
- the format adopted by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal.
- the first signaling is physical layer signaling.
- the first signaling is transmitted through PDCCH (Physical Downlink Control Channel, Physical Downlink Control Channel).
- PDCCH Physical Downlink Control Channel, Physical Downlink Control Channel
- the first signaling includes all or part of the fields in DCI (Downlink Control Information).
- DCI Downlink Control Information
- the first signaling includes all or part of the fields (Field) in a given DCI (Downlink Control Information) format (Format).
- Field Downlink Control Information
- Form Downlink Control Information
- the first signaling includes all or part of the fields in the DCI (Downlink Control Information) of the DCI format (Format) 0-0.
- the first signaling includes all or part of fields in DCI (Downlink Control Information) of DCI format (Format) 0-1.
- the format adopted by the first signaling refers to a DCI format (Format).
- the format adopted by the first signaling is one of a DCI format (Format) other than DCI Format 0-0 and DCI Format 0-0.
- the format adopted by the first signaling is one of DCI Format 0-0 and DCI Format 0-1.
- the above sentence "the first signaling is used to determine the time-frequency resources occupied by the second wireless signal and the modulation and coding method used by the second wireless signal” includes the following meanings: The first signaling is used by the first communication node device to determine the time-frequency resource occupied by the second wireless signal and the modulation and coding method used by the second wireless signal.
- the above sentence "the first signaling is used to determine the time-frequency resources occupied by the second wireless signal and the modulation and coding method used by the second wireless signal” includes the following meanings:
- the first signaling is used by the first communication node device to directly indicate the time-frequency resources occupied by the second wireless signal and the modulation and coding method adopted by the second wireless signal.
- the above sentence "the first signaling is used to determine the time-frequency resources occupied by the second wireless signal and the modulation and coding method used by the second wireless signal” includes the following meanings:
- the first signaling is used by the first communication node device to indirectly indicate the time-frequency resources occupied by the second wireless signal and the modulation and coding method adopted by the second wireless signal.
- the above sentence "the first signaling is used to determine the time-frequency resources occupied by the second wireless signal and the modulation and coding method used by the second wireless signal” includes the following meanings:
- the first signaling is used by the first communication node device to explicitly indicate the time-frequency resource occupied by the second wireless signal and the modulation and coding method used by the second wireless signal.
- the above sentence "the first signaling is used to determine the time-frequency resources occupied by the second wireless signal and the modulation and coding method used by the second wireless signal” includes the following meanings:
- the first signaling is used by the first communication node device to implicitly indicate the time-frequency resource occupied by the second wireless signal and the modulation and coding method adopted by the second wireless signal.
- the above sentence "The format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal” includes the following meaning: the format used by the first signaling is The first communication node device is used to determine whether to use transform precoding to generate the second wireless signal.
- the above sentence "The format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal" includes the following meaning: when the format used by the first signaling When it is the downlink control information format (DCI Format) 0-0, whether to use transform precoding to generate the first wireless signal is used to determine whether to use transform precoding to generate the second wireless signal.
- DCI Format downlink control information format
- the above sentence "The format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal" includes the following meaning: when the format used by the first signaling When it is the downlink control information format (DCI Format) 0-0, whether to use transform precoding to generate the third wireless signal is used to determine whether to use transform precoding to generate the second wireless signal.
- DCI Format downlink control information format
- the above sentence "The format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal” includes the following meaning: when the format used by the first signaling When it is the downlink control information format (DCI Format) 0-0 and the first sequence in this application and the first type of random access to which the first wireless signal belongs are successful, whether to use transform precoding to generate the The first wireless signal is used to determine whether to use transform precoding to generate the second wireless signal.
- DCI Format downlink control information format
- the above sentence "The format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal" includes the following meaning: when the format used by the first signaling When it is the downlink control information format (DCI Format) 0-0 and the first sequence in this application and the first type of random access to which the first wireless signal belongs fails and the first sequence in this application When the second type of random access to which the third wireless signal belongs is successful, whether to use transform precoding to generate the third wireless signal is used to determine whether to use transform precoding to generate the second wireless signal.
- DCI Format downlink control information format
- the above sentence "The format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal" includes the following meaning: when the format used by the first signaling When it is the downlink control information format (DCI Format) 0-1, whether to use transform precoding to generate the second wireless signal is configured through user-specific (UE-specific) signaling.
- DCI Format downlink control information format
- the above sentence "The format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal" includes the following meaning: when the format used by the first signaling When it is a downlink control information format (DCI Format) 0-1, whether to use transform precoding to generate the second wireless signal is configured through the fourth information in this application.
- DCI Format downlink control information format
- Embodiment 10 illustrates a schematic diagram of the relationship between the second wireless signal and the fourth information according to an embodiment of the present application, as shown in FIG. 10.
- each rectangle represents an operation
- each diamond represents a judgment.
- the first information and the second information are received in 1002
- the first sequence and the first wireless signal are transmitted in 1003
- whether the first type of random access is successful is determined in 1004
- 1005 Determine whether the format used by the first signaling is DCI Format 0-0, determine whether to use transform precoding to generate the first wireless signal in 1006, use transform precoding to generate the second wireless signal in 1007, and not use it in 1008 Transform precoding generates the second wireless signal.
- the second wireless signal is generated by encoding.
- transform precoding is not used to generate the second wireless signal.
- 1017 whether transform is used according to the configuration. The precoding generates a second wireless signal.
- the fourth information in this application is specific to the first communication node device, and the fourth information includes whether transform precoding is used to generate the second wireless signal in this application.
- the fourth information includes the frequency domain resource allocation type of the second wireless signal.
- the fourth information is user equipment specific (UE-specific or UE-dedicated).
- the above sentence “the fourth information is specific to the first communication node device” includes the following meaning: node devices other than the first communication node device are not configured by the fourth information.
- the above sentence “the fourth information is specific to the first communication node device” includes the following meaning: node devices other than the first communication node device cannot read the fourth information.
- the above sentence “the fourth information is specific to the first communication node device” includes the following meaning: node devices other than the first communication node device do not follow the configuration of the fourth information.
- the above sentence “the fourth information is specific to the first communication node device” includes the following meaning: node devices other than the first communication node device are not indicated by the fourth information.
- the above sentence “the fourth information is specific to the first communication node device” includes the following meaning: only the first communication node device is configured by the fourth information.
- the above sentence “the fourth information is specific to the first communication node device” includes the following meaning: only the first communication node device reads the fourth information.
- the fourth information is transmitted through higher layer signaling.
- the fourth information is transmitted through physical layer signaling.
- the fourth information includes all or part of a high-level signaling.
- the fourth information includes all or part of a physical layer signaling.
- the fourth information is transmitted through DL-SCH (Downlink Shared Channel, downlink shared channel).
- DL-SCH Downlink Shared Channel, downlink shared channel
- the fourth information is transmitted through PDSCH (Physical Downlink Shared Channel, physical downlink shared channel).
- PDSCH Physical Downlink Shared Channel, physical downlink shared channel.
- the fourth information includes all or part of an IE (Information Element, information element) in an RRC (Radio Resource Control, radio resource control) signaling.
- IE Information Element, information element
- RRC Radio Resource Control, radio resource control
- the fourth information includes all or part of a field in an IE (Information Element, information element) in an RRC (Radio Resource Control, radio resource control) signaling.
- IE Information Element, information element
- RRC Radio Resource Control, radio resource control
- the fourth information is unicast.
- the fourth information is transmitted through PDCCH (Physical Downlink Control Channel, Physical Downlink Control Channel).
- PDCCH Physical Downlink Control Channel, Physical Downlink Control Channel
- the fourth information includes all or part of a field of DCI (Downlink Control Information) signaling.
- DCI Downlink Control Information
- the fourth information includes all or part of the fields (Fields) in the IE (Information Element) "configuredGrantConfig" in 3GPP TS38.331 (v15.4.0).
- the fourth information includes all or part of the fields in the IE (Information Element) "pusch-Config" in 3GPP TS38.331 (v15.4.0).
- the above sentence "the fourth information includes whether to use transform precoding to generate information other than the second wireless signal” includes the following meaning: the fourth information does not include whether to use transform precoding to generate information The instruction information of the second wireless signal.
- the above sentence "the fourth information includes whether transform precoding is used to generate information other than the second wireless signal” includes the following meaning: the fourth information is used to indicate whether transform precoding is used
- the field in which the second wireless signal is generated is not configured for the first communication node device.
- the fourth information includes whether transform precoding is used to generate information other than the second wireless signal
- the fourth information includes 3GPP TS38.331 (v15.4.0) IE (Information Element) "configuredGrantConfig” in the IE (Information Element) "configuredGrantConfig” in the fourth information is not configured for the first communication. Node device.
- the fourth information includes whether transform precoding is used to generate information other than the second wireless signal
- the fourth information includes 3GPP TS38.331 (v15.4.0) IE (Information Element) "pusch-Config” in the IE (Information Element) "pusch-Config” in the fourth information
- the field “transformPrecoder” in the IE (Information Element) "pusch-Config” in the fourth information is not configured for all The first communication node device.
- the frequency domain resource allocation type of the second wireless signal includes the uplink resource allocation type 0 and the uplink resource allocation types in the section 6.1.2.2.1 and section 6.1.2.2.2 in 3GPP TS38.214 (v15.4.0 version) Uplink resource allocation type 1.
- the frequency domain resource allocation type of the second wireless signal includes a resource allocation type that allocates frequency domain resources according to a bitmap and a resource allocation type that allocates frequency domain resources according to a frequency domain starting position and length.
- the frequency domain resource allocation type of the second wireless signal includes a resource allocation type that allocates frequency domain resources according to a bitmap and a resource allocation type that allocates frequency domain resources according to RIV (Resource Indicator Value).
- the fourth information further includes ⁇ the processing value of the scrambling code generator of the second wireless signal, the resource mapping type of the demodulation reference signal (DMRS) of the second wireless signal, and the second 2.
- the power configuration of the wireless signal, the frequency hopping type of the second wireless signal, the time domain resource configuration of the second wireless signal, the modulation and coding scheme (MCS, Modulation Coding Scheme) used by the second wireless signal belongs to The MCS table for the second wireless signal, the codebook subset used by the second wireless signal, the number of uplink HARQ processes of the first communication node device, and the first communication node device sending the PUSCH of the Configured Grant (Physical Uplink Shared Channel, physical uplink shared channel) at least one of the number of repetitions ⁇ .
- MCS Modulation Coding Scheme
- Embodiment 11 illustrates a structural block diagram of a processing device in a first communication node device, as shown in FIG. 11.
- the first communication node device processing apparatus 1100 includes a first receiver 1101, a first transmitter 1102, and a second transmitter 1103.
- the first receiver 1101 includes the transmitter/receiver 456 (including the antenna 460) in Figure 4 of the present application, the receiving processor 452 and the controller/processor 490; the first transmitter 1102 includes the transmitter/receiver 456 in Figure 4 of the present application The transmitter/receiver 456 (including the antenna 460), the transmitting processor 455 and the controller/processor 490; the second transmitter 1103 includes the transmitter/receiver 456 (including the antenna 460) in Figure 4 of the present application, transmitting Processor 455 and controller/processor 490.
- the first receiver 1101 receives the first information and the second information; the first transmitter 1102 transmits the first sequence and the first wireless signal, and the first sequence and the first wireless signal are used for The first type of random access; the second transmitter 1103 sends a second wireless signal; wherein the first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access If the input is successful, whether to use transform precoding to generate the first wireless signal is used to determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine Whether to use transform precoding to generate the second wireless signal, the second type of random access is different from the first type of random access.
- the air interface resources occupied by the first sequence, the time-frequency resources occupied by the first wireless signal, the modulation and coding method used by the first wireless signal, and the first wireless signal used Is associated with at least one of the redundant versions.
- the first receiver 1101 also receives third information, and the third information is used to determine whether the first type of random access is successful.
- the first transmitter 1102 also sends a third wireless signal, the third wireless signal is used for the second type of random access, and the second information is used to determine whether to use transform precoding to generate For the third wireless signal, whether transform precoding is used to generate the third wireless signal is used to determine whether to use transform precoding to generate the second wireless signal.
- the first receiver 1101 also receives first signaling, which is used to determine the time-frequency resource occupied by the second wireless signal and the modulation used by the second wireless signal Coding mode; the format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal.
- the first receiver 1101 further receives fourth information, the fourth information is specific to the first communication node device, and the fourth information includes whether transform precoding is used to generate the second wireless signal Other information, the fourth information includes the frequency domain resource allocation type of the second wireless signal.
- Embodiment 12 illustrates a structural block diagram of a processing device in a second communication node device, as shown in FIG. 12.
- the second communication node device processing apparatus 1200 includes a third transmitter 1201, a second receiver 1202, and a third receiver 1203.
- the third transmitter 1201 includes the transmitter/receiver 416 (including the antenna 420), the transmission processor 415 and the controller/processor 440 in Figure 4 of the present application;
- the second receiver 1202 includes the transmitter/receiver 416 in Figure 4 of the present application The transmitter/receiver 416 (including the antenna 420), the receiving processor 412 and the controller/processor 440;
- the third receiver 1203 includes the transmitter/receiver 416 (including the antenna 420) in Figure 4 of the present application, receiving The processor 412 and the controller/processor 440.
- the third transmitter 1201 transmits the first information and the second information; the second receiver 1202 receives the first sequence and the first wireless signal, and the first sequence and the first wireless signal are used for The first type of random access; the third receiver 1203 receives the second wireless signal; wherein, the first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access If the input is successful, whether to use transform precoding to generate the first wireless signal is used to determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine Whether to use transform precoding to generate the second wireless signal, the second type of random access is different from the first type of random access.
- the air interface resources occupied by the first sequence, the time-frequency resources occupied by the first wireless signal, the modulation and coding method used by the first wireless signal, and the first wireless signal used Is associated with at least one of the redundant versions.
- the third transmitter 1201 also sends third information, which is used to determine whether the first type of random access is successful.
- the second receiver 1202 also receives a third wireless signal, the third wireless signal is used for the second type of random access, and the second information is used to determine whether to use transform precoding to generate For the third wireless signal, whether transform precoding is used to generate the third wireless signal is used to determine whether to use transform precoding to generate the second wireless signal.
- the third transmitter 1201 also sends first signaling, which is used to determine the time-frequency resources occupied by the second wireless signal and the modulation used by the second wireless signal Coding mode; the format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal.
- the third transmitter 1201 also sends fourth information, the fourth information is specific to the sender of the first wireless signal, and the fourth information includes whether transform precoding is used to generate the second Information other than the wireless signal, where the fourth information includes a frequency domain resource allocation type of the second wireless signal.
- the first type of communication node device or UE or terminal in this application includes but is not limited to mobile phones, tablets, notebooks, network cards, low-power devices, eMTC devices, NB-IoT devices, in-vehicle communication devices, aircraft, airplanes, etc.
- Wireless communication equipment such as man-machine, remote control aircraft.
- the second type of communication node equipment or base station or network side equipment in this application includes but is not limited to macro cell base station, micro cell base station, home base station, relay base station, eNB, gNB, transmission receiving node TRP, relay satellite, satellite base station , Wireless communication equipment such as air base stations.
Abstract
Description
Claims (9)
- 一种用于无线通信中的第一通信节点设备,其特征在于,包括:A first communication node device used in wireless communication, characterized in that it comprises:第一接收机,接收第一信息和第二信息;The first receiver receives the first information and the second information;第一发射机,发送第一序列和第一无线信号,所述第一序列和所述第一无线信号被用于第一类随机接入;A first transmitter, transmitting a first sequence and a first wireless signal, where the first sequence and the first wireless signal are used for the first type of random access;第二发射机,发送第二无线信号;The second transmitter sends a second wireless signal;其中,所述第一信息被用于确定是否采用变换预编码生成所述第一无线信号;当所述第一类随机接入成功,是否采用变换预编码生成所述第一无线信号被用于确定是否采用变换预编码生成所述第二无线信号;当第二类随机接入成功,所述第二信息被用于确定是否采用变换预编码生成所述第二无线信号,所述第二类随机接入和所述第一类随机接入不相同。The first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used Determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, and the second type Random access is different from the first type of random access.
- 根据权利要求1所述的第一通信节点设备,其特征在于,所述第一序列所占用的空口资源和所述第一无线信号所占用的时频资源、所述第一无线信号所采用的调制编码方式、所述第一无线信号所采用的冗余版本中的至少之一相关联。The first communication node device according to claim 1, wherein the air interface resource occupied by the first sequence, the time-frequency resource occupied by the first wireless signal, and the air interface resource occupied by the first wireless signal At least one of the modulation and coding scheme and the redundancy version adopted by the first wireless signal are associated.
- 根据权利要求1或2中任一权利要求所述的第一通信节点设备,其特征在于,所述第一接收机还接收第三信息,所述第三信息被用于确定所述第一类随机接入是否成功。The first communication node device according to any one of claims 1 or 2, wherein the first receiver further receives third information, and the third information is used to determine the first type Whether the random access is successful.
- 根据权利要求1至3中任一权利要求所述的第一通信节点设备,其特征在于,所述第一发射机还发送第三无线信号,所述第三无线信号被用于所述第二类随机接入,所述第二信息被用于确定是否采用变换预编码生成所述第三无线信号,是否采用变换预编码生成所述第三无线信号被用于确定是否采用变换预编码生成所述第二无线信号。The first communication node device according to any one of claims 1 to 3, wherein the first transmitter also sends a third wireless signal, and the third wireless signal is used for the second Similar to random access, the second information is used to determine whether to use transform precoding to generate the third wireless signal, and whether to use transform precoding to generate the third wireless signal is used to determine whether to use transform precoding to generate the third wireless signal. Mentioned second wireless signal.
- 根据权利要求1至4中任一权利要求所述的第一通信节点设备,其特征在于,所述第一接收机还接收第一信令,所述第一信令被用于确定所述第二无线信号所占用的时频资源和所述第二无线信号所采用的调制编码方式;所述第一信令所采用的格式被用于确定是否采用变换预编码生成所述第二无线信号。The first communication node device according to any one of claims 1 to 4, wherein the first receiver also receives first signaling, and the first signaling is used to determine the first Second, the time-frequency resources occupied by the wireless signal and the modulation and coding method used by the second wireless signal; the format used by the first signaling is used to determine whether to use transform precoding to generate the second wireless signal.
- 根据权利要求1至5中的任一权利要求所述的第一通信节点设备,其特征在于,所述第一接收机还接收第四信息,所述第四信息是所述第一通信节点设备特定的,所述第四信息包括是否采用变换预编码生成所述第二无线信号之外的信息,所述第四信息包括所述第二无线信号的频域资源分配类型。The first communication node device according to any one of claims 1 to 5, wherein the first receiver further receives fourth information, and the fourth information is the first communication node device Specifically, the fourth information includes information other than whether transform precoding is used to generate the second wireless signal, and the fourth information includes a frequency domain resource allocation type of the second wireless signal.
- 一种用于无线通信中的第二通信节点设备,其特征在于,包括:A second communication node device used in wireless communication, characterized in that it comprises:第三发射机,发送第一信息和第二信息;The third transmitter sends the first information and the second information;第二接收机,接收第一序列和第一无线信号,所述第一序列和所述第一无线信号被用于第一类随机接入;A second receiver, receiving a first sequence and a first wireless signal, where the first sequence and the first wireless signal are used for the first type of random access;第三接收机,接收第二无线信号;The third receiver receives the second wireless signal;其中,所述第一信息被用于确定是否采用变换预编码生成所述第一无线信号;当所述第一类随机接入成功,是否采用变换预编码生成所述第一无线信号被用于确定是否采用变换预编码生成所述第二无线信号;当第二类随机接入成功,所述第二信息被用于确定是否采用变换预编码生成所述第二无线信号,所述第二类随机接入和所述第一类随机接入不相同。The first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used Determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, and the second type Random access is different from the first type of random access.
- 一种用于无线通信中的第一通信节点中的方法,其特征在于,包括:A method used in a first communication node in wireless communication, characterized in that it comprises:接收第一信息和第二信息;Receiving the first information and the second information;发送第一序列和第一无线信号,所述第一序列和所述第一无线信号被用于第一类随机接入;Sending a first sequence and a first wireless signal, where the first sequence and the first wireless signal are used for the first type of random access;发送第二无线信号;Sending the second wireless signal;其中,所述第一信息被用于确定是否采用变换预编码生成所述第一无线信号;当所述第一类随机接入成功,是否采用变换预编码生成所述第一无线信号被用于确定是否采用变换预编码生成所述第二无线信号;当第二类随机接入成功,所述第二信息被用于确定是否采用变换预编码生成所述第二无线信号,所述第二类随机接入和所述第一类随机 接入不相同。The first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used Determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, and the second type Random access is different from the first type of random access.
- 一种用于无线通信中的第二通信节点中的方法,其特征在于,包括:A method used in a second communication node in wireless communication, characterized in that it comprises:发送第一信息和第二信息;Send the first message and the second message;接收第一序列和第一无线信号,所述第一序列和所述第一无线信号被用于第一类随机接入;Receiving a first sequence and a first wireless signal, where the first sequence and the first wireless signal are used for the first type of random access;接收第二无线信号;Receiving the second wireless signal;其中,所述第一信息被用于确定是否采用变换预编码生成所述第一无线信号;当所述第一类随机接入成功,是否采用变换预编码生成所述第一无线信号被用于确定是否采用变换预编码生成所述第二无线信号;当第二类随机接入成功,所述第二信息被用于确定是否采用变换预编码生成所述第二无线信号,所述第二类随机接入和所述第一类随机接入不相同。The first information is used to determine whether to use transform precoding to generate the first wireless signal; when the first type of random access is successful, whether to use transform precoding to generate the first wireless signal is used Determine whether to use transform precoding to generate the second wireless signal; when the second type of random access is successful, the second information is used to determine whether to use transform precoding to generate the second wireless signal, and the second type Random access is different from the first type of random access.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910109033.2A CN111526601B (en) | 2019-02-03 | 2019-02-03 | Method and device in communication node for wireless communication |
CN201910109033.2 | 2019-02-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020156247A1 true WO2020156247A1 (en) | 2020-08-06 |
Family
ID=71841608
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/072795 WO2020156247A1 (en) | 2019-02-03 | 2020-01-17 | Method and device for communication node for use in radio communication |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111526601B (en) |
WO (1) | WO2020156247A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114285533A (en) * | 2020-09-27 | 2022-04-05 | 上海朗帛通信技术有限公司 | Method and apparatus in a node used for wireless communication |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018075256A1 (en) * | 2016-10-19 | 2018-04-26 | Qualcomm Incorporated | Enhanced random access channel (rach) procedure |
WO2018081385A1 (en) * | 2016-10-26 | 2018-05-03 | Qualcomm Incorporated | Waveform-dependent random access channel procedure |
CN108271214A (en) * | 2017-01-04 | 2018-07-10 | 华为技术有限公司 | A kind of communication means and its terminal device, the network equipment |
CN108702698A (en) * | 2016-02-26 | 2018-10-23 | 高通股份有限公司 | It was found that reference signal transmission windows detecting and random access procedure selection |
CN108810976A (en) * | 2017-05-05 | 2018-11-13 | 华为技术有限公司 | The method and its device of transmission data |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018085726A1 (en) * | 2016-11-04 | 2018-05-11 | Intel IP Corporation | Performing 2-step random access channel (rach) procedures |
CN108282899B (en) * | 2017-01-05 | 2020-03-06 | 电信科学技术研究院 | Two-step competition random access method and device |
-
2019
- 2019-02-03 CN CN201910109033.2A patent/CN111526601B/en active Active
-
2020
- 2020-01-17 WO PCT/CN2020/072795 patent/WO2020156247A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108702698A (en) * | 2016-02-26 | 2018-10-23 | 高通股份有限公司 | It was found that reference signal transmission windows detecting and random access procedure selection |
WO2018075256A1 (en) * | 2016-10-19 | 2018-04-26 | Qualcomm Incorporated | Enhanced random access channel (rach) procedure |
WO2018081385A1 (en) * | 2016-10-26 | 2018-05-03 | Qualcomm Incorporated | Waveform-dependent random access channel procedure |
CN108271214A (en) * | 2017-01-04 | 2018-07-10 | 华为技术有限公司 | A kind of communication means and its terminal device, the network equipment |
CN108810976A (en) * | 2017-05-05 | 2018-11-13 | 华为技术有限公司 | The method and its device of transmission data |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114285533A (en) * | 2020-09-27 | 2022-04-05 | 上海朗帛通信技术有限公司 | Method and apparatus in a node used for wireless communication |
CN114285533B (en) * | 2020-09-27 | 2023-08-15 | 上海朗帛通信技术有限公司 | Method and apparatus in a node for wireless communication |
Also Published As
Publication number | Publication date |
---|---|
CN111526601B (en) | 2022-06-21 |
CN111526601A (en) | 2020-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11696264B2 (en) | Method and device in communication node used for wireless communication | |
WO2019149050A1 (en) | Method and device used for communication node of wireless communication | |
WO2019119411A1 (en) | Method and device for communication node in wireless communication | |
US20210345400A1 (en) | Method and device used for wireless communication | |
US11297585B2 (en) | Method and device in communication node used for wireless communication | |
WO2018141231A1 (en) | Ue and base station method and apparatus for wireless communication | |
WO2019228410A1 (en) | Method and apparatus used in communications node for wireless communications | |
US20210345425A1 (en) | Method and device for use in communication node for wireless communication | |
WO2020233406A1 (en) | Method and device for use in communication node for wireless communication | |
US20220166574A1 (en) | Method and device in nodes used for wireless communication | |
CN114126031A (en) | Method and device in communication node for wireless communication | |
WO2020156247A1 (en) | Method and device for communication node for use in radio communication | |
US20220279510A1 (en) | Method and device in nodes used for wireless communication | |
CN113259898B (en) | Method and device for wireless communication of discontinuous reception | |
WO2020244385A1 (en) | Method and apparatus for communication node in radio communication | |
WO2021139551A1 (en) | Method and apparatus used in node for wireless communication | |
CN113207172B (en) | Method and apparatus in a node used for wireless communication | |
US20230276281A1 (en) | Method and device in nodes used for wireless communication | |
CN113709803B (en) | Method and device for wireless communication of sidelink | |
CN113497686B (en) | Method and apparatus in a node for wireless communication | |
WO2023138485A1 (en) | Method and apparatus used in node for wireless communication | |
WO2023185520A1 (en) | Method and apparatus used for wireless communication | |
CN116133132A (en) | Method and apparatus in a node for wireless communication | |
CN117320064A (en) | Method and apparatus for wireless communication | |
CN114599114A (en) | Method and device used in relay wireless communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20749566 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20749566 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20749566 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21/01/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20749566 Country of ref document: EP Kind code of ref document: A1 |