WO2020156395A1 - Procédé et dispositif d'accès aléatoire - Google Patents

Procédé et dispositif d'accès aléatoire Download PDF

Info

Publication number
WO2020156395A1
WO2020156395A1 PCT/CN2020/073650 CN2020073650W WO2020156395A1 WO 2020156395 A1 WO2020156395 A1 WO 2020156395A1 CN 2020073650 W CN2020073650 W CN 2020073650W WO 2020156395 A1 WO2020156395 A1 WO 2020156395A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
terminal device
target
network side
response message
Prior art date
Application number
PCT/CN2020/073650
Other languages
English (en)
Chinese (zh)
Inventor
马玥
吴昱民
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2020156395A1 publication Critical patent/WO2020156395A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Definitions

  • the present disclosure relates to the field of communication technology, and in particular to a random access method and device.
  • the random access (Random Access) process refers to a process in which a terminal device sends a random access preamble to the network side device to try to establish a signaling connection with the network. Random access is used in multiple events such as initial access, radio resource control (Radio Resource Control, RRC) connection recovery, and handover (handover), and is a very important process in the network system.
  • RRC Radio Resource Control
  • Random access based on contention includes four-step random access (4-step RACH) and two-step random access (2-step RACH).
  • the four-step random access process includes: the terminal device sends a random access request (Msg1) to the network side device, and the network side sends a random access response (Random Access Response, RAR) to the terminal device after receiving the Msg1 sent by the terminal device.
  • Msg1 random access request
  • RAR Random Access Response
  • Msg2 carries an uplink grant (UL grant) and a temporary cell radio network temporary identifier (Temple CellRadioNetworkTemporaryIdentifier, TC-RNTI) used to scramble Msg3; the terminal device executes according to the uplink grant in Msg2
  • the Medium Access Control (MAC) layer package function generates a Media Access Control Protocol Data Unit (MAC Protocol Data Unit, MAC PDU), and stores the MAC PDU in the Msg3 buffer, and then the terminal device automatically mixes it
  • the Hybrid Automatic Repeat reQuest (HARQ) process sends the MAC PDU in the Msg3 buffer to the network side device; after the network side device receives the Msg3 sent by the terminal device, it sends Msg4 to the terminal device; finally, the terminal device determines whether to compete based on Msg4 The solution was successful.
  • the network side device does not receive the Msg3 sent by the terminal device, the network side device
  • the two-step random access process includes: the terminal device sends a random access request message (MsgA) to the network side device, where MsgA contains the information carried by Msg1 and Msg3; the network side device sends the MsgA sent by the terminal device to the terminal The device sends a confirmation message (MsgB), where MsgB contains information carried by Msg2 and Msg4, and finally the terminal device determines whether the contention resolution is successful based on the MsgB.
  • the terminal device may need to retransmit the Physical Uplink Shared Channel (PUSCH) part of MsgA.
  • PUSCH Physical Uplink Shared Channel
  • the embodiments of the present disclosure provide a random access method and device to solve the problem of how to retransmit the PUSCH part in MsgA.
  • embodiments of the present disclosure provide a random access method, which is applied to a terminal device, and the method includes:
  • a third message Msg3 is sent to the network side device, where Msg3 is the third message in the four-step random access, and The RV version used by Msg3 is the target RV version.
  • the embodiments of the present disclosure provide a random access method, which is applied to a network side device, and the method includes:
  • the random access response message is a random access response message in two-step random access, and the random access response message carries a target RV version corresponding to the terminal device;
  • the terminal device performs the two-step random access back to the four-step random access
  • the third message Msg3 sent by the terminal device is received, and the Msg3 is the third message in the four-step random access.
  • the RV version used by Msg3 is the target RV version.
  • a terminal device including:
  • the receiving unit is configured to receive a random access response message sent by a network side device, where the random access response message is a random access response message in two-step random access, and the random access response message carries the corresponding The target RV version of the terminal device;
  • the sending unit is configured to send a third message Msg3 to the network side device when the terminal device performs two-step random access to four-step random access fallback, where Msg3 is the first message in the four-step random access Three messages, the RV version used by the Msg3 is the target RV version.
  • embodiments of the present disclosure provide a network-side device, including:
  • the sending unit is configured to send a random access response message to a terminal device, where the random access response message is a random access response message in two-step random access, and the random access response message carries a message corresponding to the terminal device
  • the target RV version
  • the receiving unit is configured to receive the third message Msg3 sent by the terminal device when the terminal device performs the two-step random access back to the four-step random access, where the Msg3 is the first message in the four-step random access Three messages, the RV version used by the Msg3 is the target RV version.
  • the embodiments of the present disclosure provide a terminal device, including a processor, a memory, and a computer program stored on the memory and running on the processor, the computer program being executed by the processor When implementing the steps of the random access method as described in the first aspect.
  • the embodiments of the present disclosure provide a network-side device, including a processor, a memory, and a computer program stored on the memory and running on the processor, and the computer program is used by the processor
  • the steps of the random access method as described in the second aspect are implemented during execution.
  • embodiments of the present disclosure provide a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the method described in the first or second aspect is implemented. Steps of random access method.
  • the terminal device first receives the random access response message sent by the network side device, and then, when the terminal device performs two-step random access to four-step random access, back off , Send Msg3 to the network side device; wherein the random access response message is a random access response message in two-step random access, and the random access response message carries the target RV version corresponding to the terminal device,
  • the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version; because the terminal device performs the two-step random access back to the four-step random access , Use the target RV version carried in the random access response message to send Msg3 to the network side device, so the network side device can determine the content of the retransmission carried in Msg3 according to the target RV version, so the embodiment of the present disclosure can solve the problem of performing two-step random access The problem of how to retransmit the PUSCH part in MsgA when
  • FIG. 1 is a schematic diagram of a possible structure of a communication system involved in an embodiment of the disclosure
  • FIG. 2 is one of the interaction flowcharts of the random access method provided by the embodiments of the disclosure.
  • FIG. 3 is the second interaction flowchart of the random access method provided by an embodiment of the disclosure.
  • FIG. 4 is a schematic structural diagram of a terminal device provided by an embodiment of the disclosure.
  • FIG. 5 is a schematic diagram of a hardware structure of a terminal device provided by an embodiment of the disclosure.
  • FIG. 6 is a schematic structural diagram of a network side device provided by an embodiment of the disclosure.
  • FIG. 7 is a schematic diagram of a hardware structure of a network side device provided by an embodiment of the disclosure.
  • 4-step RACH (that is, the general RACH process referring to related technologies) generally includes the following five steps:
  • Step 1 The terminal device sends Msg1 (random access preamble) to the network side device.
  • Step 2 After receiving Msg1, the network side device will send Msg2 to the terminal device. That is, the random access response (Random Access Response, RAR) message, RAR uses random access radio network temporary identity (Random Access Radio Network Tempory Identity, RA-RNTI) scrambling, contains backoff indicator (Backoff Indicator, BI), Uplink authorization (Uplink grant, UL grant), Random Access preamble Identification (RAPID), Temporary Cell Radio Network Tempory Identity (TC-RNTI), etc.
  • RAR Random Access Response
  • RA-RNTI Random Access Radio Network Tempory Identity
  • BI Backoff Indicator
  • RAPID Random Access preamble Identification
  • TC-RNTI Temporary Cell Radio Network Tempory Identity
  • Step 3 The terminal device that detects the RAPID corresponding to the preamble sent by itself, sends Msg3 according to the position of the UL grant (the terminal device that does not detect the RAPID sent by itself uses the BI delayed access).
  • Step 4 The terminal device receives the Msg4 sent by the network side.
  • the Msg4 contains the contention resolution identifier, and upgrades the TC-RNTI to the cell radio network temporary identity (C-RNTI).
  • C-RNTI cell radio network temporary identity
  • the subsequent network side can use C -RNTI schedules the terminal equipment.
  • Step 5 Generally, the terminal device needs to send Msg5. That is, the access complete message.
  • the four-step access generally referred to mainly refers to the completion of the first four steps of contention resolution, and the first four steps usually represent the random access process of the conventional wireless network.
  • the random access process of the terminal equipment includes:
  • the terminal device sends Msg1 to the network side device, that is, the terminal device sends a random access request message to the network side device; the network side device; after receiving Msg1, it sends Msg2 to the terminal device, that is The network side device sends a RAR message to the terminal device, and the message carries UL grant information.
  • the terminal device performs the Medium Access Control (MAC) layer grouping function to generate a MAC protocol data unit (Protocol Data Unit, PDU), and stores the MAC PDU in the Msg3 cache, and then the terminal The device sends the MAC PDU in the Msg3 buffer through a hybrid automatic repeat request (Hybrid Automatic Repeat Request, HARQ) process.
  • the network side device After receiving Msg3, the network side device sends Msg4 (for example, contention resolution identification) to the terminal device.
  • Msg4 for example, contention resolution identification
  • the terminal device receives Msg4 and judges whether the contention resolution is successful, if it succeeds, the random access process is successful, otherwise the random access process is re-initiated.
  • the terminal device For the re-initiated random access process, when the terminal device receives the UL grant in Msg2 again, the terminal device directly retrieves the previously stored MAC PDU from the Msg3 buffer and sends it through the HARQ process. The terminal device will clear the HARQ buffer of Msg3 transmission in the random access process after the random access process is completed.
  • the terminal device sends Msg1 to the network side device, that is, the terminal device sends a random access request to the network side device.
  • the network side device After receiving Msg1, the network side device sends Msg2 to the terminal device, that is, the network side device sends a RAR message to the terminal device.
  • the message carries the UL grant information and the identification information of the terminal device (for example, the random access preamble of Msg1). )Numbering). If the number of the random access preamble is the same as the number of the random access preamble sent by the Msg1 of the terminal device, the terminal device considers that the random access process is successful, otherwise the random access process is re-initiated.
  • each time the terminal device initiates (or re-initiates) the random access process it will be based on the corresponding downlink signal quality of each random access Msg1 resource (for example, the synchronization signal block (Synchronous Signal Block, SSB) reference symbol reception strength) (Reference Symbol Received Power, RSRP)) to select random access resources, thereby increasing the success rate of random access. Therefore, each time a terminal device initiates (or re-initiates) a random access procedure, the terminal device may select a "random access procedure based on contention" or a "random access procedure based on non-contention".
  • the terminal device may select a "random access procedure based on contention" or a "random access procedure based on non-contention".
  • 2-step RACH specifically includes the following two steps:
  • Step 1 The terminal device triggers a 2-step RACH process and sends a request message (MsgA) to the network side device. For example, it is sent through a physical uplink shared channel (Physical Uplink Shared Channel, PUSCH) + preamble.
  • MsgA request message
  • Step 2 The network side sends a confirmation message (MsgB) to the terminal device.
  • MsgB confirmation message
  • the terminal device If the terminal device fails to receive MsgB (failure means not receiving the RAPID or contention resolution identifier corresponding to the MsgA sent by the terminal device itself), the terminal device resends Msg1 (MsgA, Msg3 or Msg1 can also be resent, depending on the usage scenario determine).
  • the network side device will configure two-step random access configuration information for the terminal device.
  • the configuration information includes the transmission resource information corresponding to MsgA and MsgB.
  • MsgA in two-step random access includes Msg1 and Msg3 in four-step random access
  • MsgB in two-step random access includes Msg2 and Msg4 in four-step random access.
  • the network side device will configure two-step random access configuration information for the terminal device, such as the transmission resource information corresponding to MsgA and MsgB.
  • words such as “first” and “second” are used to distinguish the same items or similar items with basically the same functions or functions.
  • the skilled person can understand that the words “first” and “second” do not limit the number and execution order.
  • words such as “exemplary” or “for example” are used as examples, illustrations, or illustrations. Any embodiment or design solution described as “exemplary” or “for example” in the embodiments of the present disclosure should not be construed as being more preferable or advantageous than other embodiments or design solutions. To be precise, words such as “exemplary” or “for example” are used to present related concepts in a specific manner. In the embodiments of the present disclosure, unless otherwise specified, the meaning of "plurality" means two or more.
  • the terminal device may need to retransmit the PUSCH part of the MsgA.
  • the network side device does not configure the TC-RNTI for the terminal device, the TC-RNTI cannot schedule the retransmission of the PUSCH part of the MsgA.
  • a terminal device first receives a random access response message sent by a network side device, and then performs two steps on the terminal device
  • Msg3 is sent to the network side device
  • the random access response message is the random access response message in the two-step random access
  • the random access The response message carries the target RV version corresponding to the terminal device
  • the Msg3 is the third message in four-step random access
  • the RV version used by the Msg3 is the target RV version
  • the embodiments of the present disclosure can solve the problem of how to
  • the technical solutions provided by the present disclosure can be applied to various wireless communication systems, for example, 5G communication systems, future evolution systems, or multiple communication convergence systems, and so on. It can include multiple application scenarios, such as machine to machine (Machine to Machine, M2M), D2M, macro and micro communications, enhanced Mobile Broadband (eMBB), ultra-high reliability and ultra-low latency communications (ultra Reliable&Low Latency Communication, uRLLC) and Massive Machine Type Communication (mMTC) and other scenarios. These scenarios include, but are not limited to: the communication between the terminal device and the terminal device, or the communication between the network side device and the network side device, or the communication between the network side device and the terminal device, and other scenarios.
  • M2M Machine to Machine
  • eMBB enhanced Mobile Broadband
  • uRLLC ultra-high reliability and ultra-low latency communications
  • mMTC Massive Machine Type Communication
  • These scenarios include, but are not limited to: the communication between the terminal device and the terminal device, or the communication between the network side device and the
  • Fig. 1 shows a schematic diagram of a possible architecture of a communication system involved in an embodiment of the present disclosure.
  • the communication system may include: a terminal device 11 and a network side device 12.
  • the terminal device 11 and the network side device 12 can perform information transmission through a wireless network.
  • the terminal device 11 in the communication system shown in FIG. 1 may be a wireless terminal device.
  • the wireless terminal device may be a device that provides voice and/or other service data connectivity to the user, a handheld device with a wireless communication function, a computing device, or a connection Other processing equipment to wireless modems, in-vehicle equipment, wearable equipment, terminal equipment in the future 5G network or terminal equipment in the future evolved PLMN network, etc.
  • a wireless terminal device can communicate with one or more core networks via a radio access network (RAN).
  • the wireless terminal device can be a mobile terminal, such as a mobile phone (or "cellular" phone) and a mobile terminal.
  • the computer can be a portable, pocket-sized, handheld, built-in computer or vehicle-mounted mobile device, which exchanges language and/or data with the wireless access network, and personal communication service (PCS) telephone, Cordless phones, Session Initiation Protocol (SIP) phones, Wireless Local Loop (WLL) stations, Personal Digital Assistants (PDAs) and other devices.
  • Wireless terminals can also be mobile devices, UEs Terminal, access terminal, wireless communication equipment, terminal unit, terminal station, mobile station (Mobile Station), mobile station (Mobile), remote station (Remote Station), remote station, remote terminal (Remote terminal), subscriber unit (Subscriber) Unit), subscriber station (Subscriber Station), user agent (User Agent), terminal device, etc.
  • FIG. 1 shows that the terminal device is a mobile phone as an example.
  • the network side device 12 in the communication system shown in FIG. 1 may be a base station, a core network device, a transmission and reception point (Transmission and Reception Point, TRP), a relay station, or an access point.
  • the network-side equipment can be the base station transceiver station (BTS) in the Global System for Mobile communication (GSM) or Code Division Multiple Access (CDMA) network, or it can be broadband
  • the NB (NodeB) in Wideband Code Division Multiple Access (WCDMA) may also be the eNB or eNodeB (evolutional NodeB) in LTE.
  • the network side device may also be a wireless controller in a cloud radio access network (Cloud Radio Access Network, CRAN) scenario.
  • CRAN Cloud Radio Access Network
  • the network side device may also be a network side device in a 5G communication system or a network side device in a future evolution network.
  • the names of devices with base station functions may be different.
  • NodeB In the third-generation mobile communication (3-Generation, 3G) network, it is called NodeB; In the LTE system, it is called eNodeB; in the fifth generation mobile communication (5G) network, it is called gNB and so on.
  • the name "base station” may change.
  • FIG. 2 shows an interaction flowchart of the random access method provided by the embodiment of the present disclosure.
  • the random access method may include:
  • the network side device sends a random access response message to the terminal device.
  • the terminal device receives the random access response message sent by the network side device.
  • the random access response message is a random access response message in two-step random access, and the random access response message carries a target RV version corresponding to the terminal device.
  • step S21 may be that the network side device sends the MsgB in two-step random access to the terminal device.
  • the terminal device performs a fallback from the two-step random access to the four-step random access, the terminal device sends Msg3 to the network side device.
  • the network side device receives the Msg3 sent by the terminal device.
  • the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version.
  • the MsgB in the two-step random access sent by the network side device to the terminal device carries the target RV version, and the Msg3 retransmission is scheduled through the target RV version.
  • the terminal device may perform a two-step random access fallback to a four-step random access in the following scenario a and/or scenario b.
  • Scenario a The terminal device fails to receive the random access response message (MsgB) in the two-step random access.
  • the failure of the terminal device to receive the random access response message includes: the terminal device does not receive the RAPID or contention resolution ID corresponding to the random access request message (MsgA) sent by the terminal device, or the terminal device fails to receive the RAPID.
  • the corresponding contention resolution ID is received, or one or more of the uplink grants pre-configured for uplink Msg3 transmission are received.
  • the random access response message carries target information, and the target information is used to instruct the terminal device to perform two-step random access to fall back to four-step random access.
  • the target information in the foregoing embodiment may implicitly indicate to instruct the terminal device to perform two-step random access to fall back to four-step random access, or it may explicitly instruct the terminal device to perform two-step random access. Four-step random access fallback.
  • the target information explicitly instructs the terminal device to perform the two-step random access back to the four-step random access.
  • the specific implementation manner may be: the network side device indicates the terminal corresponding to RAPID under RA-RNTI through the X bit The device performs two-step random access back to four-step random access; where X can be a positive integer.
  • the target information implicitly instructs the terminal device to perform a two-step random access to a four-step random access fallback.
  • the specific implementation manner may be: the network-side device sends the RA-RNTI to the terminal device corresponding to RAPID (not Receiving the corresponding contention resolution ID) a UL grant, instructing the terminal device to retransmit the PUSCH part of the MsgA; or the network side device provides other parameters, and it can be determined that the terminal device retransmits the PUSCH part of the MsgA through other combination conditions.
  • the terminal device first receives the random access response message sent by the network side device, and then, when the terminal device performs two-step random access to four-step random access, back off , Send Msg3 to the network side device; wherein the random access response message is a random access response message in two-step random access, and the random access response message carries the target RV version corresponding to the terminal device,
  • the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version; because the terminal device performs the two-step random access back to the four-step random access , Use the target RV version carried in the random access response message to send Msg3 to the network side device, so the network side device can determine the content of the retransmission carried in Msg3 according to the target RV version, so the embodiment of the present disclosure can solve the problem of performing two-step random access The problem of how to retransmit the PUSCH part in MsgA when
  • the random access method provided in the embodiment of the present disclosure further includes:
  • the terminal device sends a random access request message to the network side device.
  • the network side device before the network side device sends the random access response message to the terminal device, the network side device also receives the random access request message sent by the terminal device.
  • the random access request message is a random access request message in two-step random access.
  • the terminal device sends the MsgA in the two-step random access to the network side device.
  • the terminal device may send MsgA to the network side device through PUSCH+Preamble.
  • the random access request message carries a target preamble; correspondingly, the random access response message also carries a target uplink authorization, and the target uplink authorization may correspond to the identifier of the target preamble Uplink authorization.
  • the terminal device sending Msg3 to the network side device may specifically be: the terminal device uses the target uplink authorization to send the Msg3 to the network side device.
  • the terminal device when the terminal device sends a random access request message to the network side device, the terminal device must first select an appropriate resource. That is, before sending the random access request message to the network side device, the method further includes:
  • the terminal equipment determines the target resource
  • the target resource includes: at least one of a preamble (Preamble), a random access opportunity (RACH Occasion), and a PUSCH.
  • Preamble a preamble
  • RACH Occasion a random access opportunity
  • PUSCH a PUSCH
  • the terminal device sending a random access request message to the network side device in the above step S31 may specifically be:
  • the terminal device sends a random access request message to the network side device through the target HARQ process.
  • the terminal device can send the MsgA in the two-step random access to the network side device through the HARQ process.
  • the terminal device sending Msg3 to the network-side device in step S22 includes:
  • the terminal device sends the Msg3 to the network side device through the target HARQ process.
  • the terminal device sends the identification of the HARQ process of MsgA in two-step random access and the identification of the HARQ process of sending Msg3 in four-step random access; or the terminal device uses the same HARQ process to send MsgA to retransmit Msg3 .
  • the network side device can determine that Msg3 is a retransmission of the random access request message according to the identification of the HARQ process that sent MsgA and the identification of the HARQ process that sent Msg3 .
  • the identifier of the target HARQ process is a preset value, or the identifier of the target HARQ process is configured by the network side device for the terminal device, or the identifier of the target HARQ process is configured by a broadcast message.
  • the terminal device sends the identification of the HARQ process of MsgA in the two-step random access can be preset, or configured by the network side device in advance for the terminal device, or configured by the broadcast message for the terminal device.
  • the identifier of the target HARQ process may be 0.
  • the Msg3 carries a target MAC PDU
  • the target MAC PDU is a MAC PDU carried by the PUSCH in the random access request message.
  • the Msg3 sent to the network side device is a retransmission of the PUSCH part in the MsgA.
  • the terminal device Since the terminal device needs to carry the target MAC PDU in the Msg3, the terminal device needs to first obtain the target MAC PDU before sending the Msg3.
  • the method for the terminal device to obtain the target MAC PDU may be:
  • the terminal device reads the target MAC PDU from the HARQ buffer.
  • the terminal device can obtain the target MAC PDU by reading the target MAC PDU from the HARQ buffer, after the random access is successful, the MAC PDU in the HARQ buffer needs to be cleared to avoid The MAC PDU read in the HARQ buffer is the MAC PDU buffered in other random access processes.
  • Some embodiments of the present disclosure may divide the terminal device into functional modules according to the foregoing method examples.
  • each function module can be divided corresponding to each function, or two or more functions can be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in some embodiments of the present disclosure is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • FIG. 4 shows a possible structural schematic diagram of the terminal device involved in the foregoing embodiment, and the terminal device 400 includes:
  • the receiving unit 41 is configured to receive a random access response message sent by a network side device, where the random access response message is a random access response message in two-step random access, and the random access response message carries the corresponding The target RV version of the terminal device;
  • the sending unit 42 is configured to send a third message Msg3 to the network side device when the terminal device performs two-step random access back to the four-step random access, where the Msg3 is the one in the four-step random access
  • the third message is that the RV version used by the Msg3 is the target RV version.
  • the sending unit 42 is further configured to send a random access request message to the network side device before the receiving unit receives the random access response message sent by the network side device, the random access request
  • the message is a random access request message in two-step random access.
  • the sending unit 42 is specifically configured to send a random access request message to the network side device through the target HARQ process.
  • the sending unit 42 is specifically configured to send the Msg3 to the network side device through the target HARQ process.
  • the identifier of the target HARQ process is a preset value, or the identifier of the target HARQ process is configured by the network side device for the terminal device, or the identifier of the target HARQ process is configured by a broadcast message.
  • the identifier of the target HARQ process is 0.
  • the Msg3 carries a target media access control MAC protocol data unit PDU
  • the target MAC PDU is a MAC PDU carried by the physical uplink shared channel PUSCH in the random access request message.
  • the sending unit 42 is further configured to read the target MAC PDU from the HARQ buffer before sending the third message Msg3 to the network side device.
  • the random access request message carries a target preamble
  • the random access response message also carries a target uplink grant, and the target uplink grant is an uplink grant corresponding to the identifier of the target preamble.
  • the sending unit 42 is specifically configured to use the target uplink authorization to send the Msg3 to the network side device.
  • the sending unit 42 is further configured to determine the target resource before sending the random access request message to the network side device;
  • the target resource includes: at least one of a preamble, a random access occasion, and a PUSCH.
  • the random access response message also carries target information, and the target information is used to instruct the terminal device to perform two-step random access to fall back to four-step random access.
  • the scenario of triggering the terminal device to perform two-step random access to four-step random access fallback includes:
  • the terminal device fails to receive the random access response message
  • the random access response message carries target information, and the target information is used to instruct the terminal device to perform two-step random access back to four-step random access.
  • the terminal device first receives the random access response message sent by the network-side device, and then sends Msg3 to the network-side device when the terminal device performs two-step random access to four-step random access fallback; where
  • the random access response message is the random access response message in the two-step random access, the random access response message carries the target RV version corresponding to the terminal device, and the Msg3 is the first one in the four-step random access.
  • the third message, the RV version used by the Msg3 is the target RV version; because the terminal device uses the target RV carried in the random access response message when performing two-step random access to four-step random access fallback
  • the version sends Msg3 to the network-side device, so the network-side device can determine the content of the retransmission carried by the Msg3 according to the target RV version. Therefore, the embodiments of the present disclosure can solve the problem of how to perform the two-step random access fallback to the four-step random access.
  • the problem of retransmission of the PUSCH part in MsgA thereby increasing the probability of solving the payload of the PUSCH part in MsgA, and increasing the success rate of random access.
  • the terminal device 100 includes but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, and a display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, power supply 111 and other components.
  • the terminal device 100 further includes: a computer program stored in the memory 109 and capable of running on the processor 110, and when the computer program is executed by the processor 110, each process executed by the terminal device in the above random access method is implemented.
  • the processor 110 is configured to control the radio frequency unit 101 to receive a random access response message sent by a network-side device, and perform a two-step random access to a four-step random access fallback on the terminal device In this case, the radio frequency unit 101 is controlled to send a third message Msg3 to the network side device.
  • the random access response message is a random access response message in two-step random access, the random access response message carries a target RV version corresponding to the terminal device, and the Msg3 is a four-step random access In the third message entered, the RV version used by the Msg3 is the target RV version.
  • the terminal device first receives the random access response message sent by the network-side device, and then sends Msg3 to the network-side device when the terminal device performs two-step random access to four-step random access fallback; where
  • the random access response message is the random access response message in the two-step random access, the random access response message carries the target RV version corresponding to the terminal device, and the Msg3 is the first one in the four-step random access.
  • the third message, the RV version used by the Msg3 is the target RV version; because the terminal device uses the target RV carried in the random access response message when performing two-step random access to four-step random access fallback
  • the version sends Msg3 to the network-side device, so the network-side device can determine the content of the retransmission carried by the Msg3 according to the target RV version. Therefore, the embodiments of the present disclosure can solve the problem of how to perform the two-step random access fallback to the four-step random access.
  • the problem of retransmission of the PUSCH part in MsgA thereby increasing the probability of solving the payload of the PUSCH part in MsgA, and increasing the success rate of random access.
  • the terminal device 100 shown in FIG. 5 can implement each process implemented by the terminal device in the above random method, and can achieve the same technical effect. In order to avoid repetition, it will not be repeated here.
  • terminal devices include, but are not limited to, mobile phones, tablet computers, notebook computers, palmtop computers, vehicle-mounted terminals, wearable devices, and pedometers.
  • the radio frequency unit 101 can be used for receiving and sending signals in the process of sending and receiving information or talking. Specifically, the downlink data from the base station is received and processed by the processor 110; in addition, Uplink data is sent to the base station.
  • the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio frequency unit 101 can also communicate with the network and other devices through a wireless communication system.
  • the terminal device provides users with wireless broadband Internet access through the network module 102, such as helping users to send and receive emails, browse web pages, and access streaming media.
  • the audio output unit 103 can convert the audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into audio signals and output them as sounds. Moreover, the audio output unit 103 may also provide audio output related to a specific function performed by the terminal device 100 (for example, call signal reception sound, message reception sound, etc.).
  • the audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
  • the input unit 104 is used to receive audio or video signals.
  • the input unit 104 may include a graphics processing unit (GPU) 1041 and a microphone 1042, and the graphics processor 1041 is configured to monitor images of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed.
  • the processed image frame can be displayed on the display unit 106.
  • the image frame processed by the graphics processor 1041 may be stored in the memory 109 (or other storage medium) or sent via the radio frequency unit 101 or the network module 102.
  • the microphone 1042 can receive sound, and can process such sound into audio data.
  • the processed audio data can be converted into a format that can be sent to the mobile communication base station via the radio frequency unit 101 for output in the case of a telephone call mode.
  • the terminal device 100 further includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor includes an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 1061 according to the brightness of the ambient light.
  • the proximity sensor can close the display panel 1061 and the display panel 1061 when the terminal device 100 is moved to the ear. / Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three-axis), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the terminal device (such as horizontal and vertical screen switching, related games , Magnetometer attitude calibration), vibration recognition related functions (such as pedometer, percussion), etc.; the sensor 105 can also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, Infrared sensors, etc., will not be repeated here.
  • the display unit 106 is used to display information input by the user or information provided to the user.
  • the display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • the user input unit 107 may be used to receive inputted numeric or character information and generate key signal input related to user settings and function control of the terminal device.
  • the user input unit 107 includes a touch panel 1071 and other input devices 1072.
  • the touch panel 1071 also called a touch screen, can collect the user's touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 1071 or near the touch panel 1071. operating).
  • the touch panel 1071 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 110, the command sent by the processor 110 is received and executed.
  • the touch panel 1071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave.
  • the user input unit 107 may also include other input devices 1072.
  • other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
  • the touch panel 1071 can be overlaid on the display panel 1061.
  • the touch panel 1071 detects a touch operation on or near it, it is transmitted to the processor 110 to determine the type of the touch event.
  • the type of event provides corresponding visual output on the display panel 1061.
  • the touch panel 1071 and the display panel 1061 are used as two independent components to implement the input and output functions of the terminal device, in some embodiments, the touch panel 1071 and the display panel 1061 can be integrated
  • the implementation of the input and output functions of the terminal device is not specifically limited here.
  • the interface unit 108 is an interface for connecting an external device with the terminal device 100.
  • the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc.
  • the interface unit 108 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the terminal device 100 or can be used to connect to the terminal device 100 and external Transfer data between devices.
  • the memory 109 can be used to store software programs and various data.
  • the memory 109 may mainly include a program storage area and a data storage area.
  • the program storage area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data (such as audio data, phone book, etc.) created by the use of mobile phones.
  • the memory 109 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the processor 110 is the control center of the terminal device. It uses various interfaces and lines to connect various parts of the entire terminal device. By running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, Perform various functions of the terminal device and process data, thereby monitoring the terminal device as a whole.
  • the processor 110 may include one or more processing units; optionally, the processor 110 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, application programs, etc., and the modem
  • the adjustment processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 110.
  • the terminal device 100 may also include a power source 111 (such as a battery) for supplying power to various components.
  • a power source 111 such as a battery
  • the power source 111 may be logically connected to the processor 110 through a power management system, so as to manage charging, discharging and power consumption management through the power management system. And other functions.
  • the terminal device 100 includes some functional modules not shown, which will not be repeated here.
  • Some embodiments of the present disclosure may divide the network side device into functional modules according to the foregoing method examples.
  • each function module can be divided corresponding to each function, or two or more functions can be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in some embodiments of the present disclosure is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • FIG. 6 shows a schematic diagram of a possible structure of the network-side device involved in the foregoing embodiment, and the network-side device 600 includes:
  • the sending unit 61 is configured to send a random access response message to the terminal device, where the random access response message is a random access response message in two-step random access, and the random access response message carries a message corresponding to the terminal The target RV version of the device;
  • the receiving unit 62 is configured to receive a third message Msg3 sent by the terminal device when the terminal device performs two-step random access back to four-step random access, where the Msg3 is the one in the four-step random access
  • the third message is that the RV version used by the Msg3 is the target RV version.
  • the receiving unit 62 is further configured to receive a random access request message sent by the terminal device before the sending unit sends a random access response message to the terminal device, where the random access request message is Random access request message in two-step random access.
  • the random access response message also carries target information, and the target information is used to instruct the terminal device to perform two-step random access to fall back to four-step random access.
  • the embodiment of the present disclosure also provides a network side device.
  • the network side device includes: a processor 71, a memory 72, a computer program stored in the memory 72 and running on the processor 71, the computer
  • the program When the program is executed by the processor 71, each process performed by the network side device in the above random access method is realized, and the same technical effect can be achieved. To avoid repetition, details are not described here.
  • the embodiments of the present disclosure also provide a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the computer program When the computer program is executed by a processor, it realizes multiple processes of the random access method in the above-mentioned embodiment and can To achieve the same technical effect, in order to avoid repetition, I will not repeat them here.
  • the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, etc.
  • the technical solution of the present disclosure can be embodied in the form of a software product in essence or the part that contributes to the related technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk). ) Includes several instructions to make a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network side device, etc.) execute the methods described in the multiple embodiments of the present disclosure.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Des modes de réalisation de la présente invention concernent un procédé et un dispositif d'accès aléatoire. Le procédé consiste : à recevoir un message de réponse d'accès aléatoire envoyé par un appareil côté réseau, le message de réponse d'accès aléatoire étant un message de réponse d'accès aléatoire transmis dans une procédure d'accès aléatoire en deux étapes, et le message de réponse d'accès aléatoire transportant une version de redondance cible (RV) utilisée par un appareil terminal correspondant ; et si l'appareil terminal repasse d'une procédure d'accès aléatoire en deux étapes à une procédure d'accès aléatoire à quatre étapes, à envoyer un troisième message (Msg3) à l'appareil côté réseau, le Msg3 étant un troisième message transmis dans une procédure d'accès aléatoire à quatre étapes, et une RV utilisée pour transmettre le Msg3 étant la RV cible. Les modes de réalisation de la présente invention sont applicables à un accès aléatoire.
PCT/CN2020/073650 2019-01-30 2020-01-21 Procédé et dispositif d'accès aléatoire WO2020156395A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910093589.7A CN111263462B (zh) 2019-01-30 2019-01-30 一种随机接入方法及装置
CN201910093589.7 2019-01-30

Publications (1)

Publication Number Publication Date
WO2020156395A1 true WO2020156395A1 (fr) 2020-08-06

Family

ID=70953801

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/073650 WO2020156395A1 (fr) 2019-01-30 2020-01-21 Procédé et dispositif d'accès aléatoire

Country Status (2)

Country Link
CN (1) CN111263462B (fr)
WO (1) WO2020156395A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938901A (zh) * 2020-06-29 2022-01-14 华为技术有限公司 一种信息传输方法、通信装置及计算机可读存储介质
WO2023065244A1 (fr) * 2021-10-21 2023-04-27 Oppo广东移动通信有限公司 Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018064367A1 (fr) * 2016-09-28 2018-04-05 Idac Holdings, Inc. Accès aléatoire dans des systèmes sans fil de prochaine génération

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282899B (zh) * 2017-01-05 2020-03-06 电信科学技术研究院 一种两步竞争随机接入方法和装置
US11057935B2 (en) * 2017-03-22 2021-07-06 Comcast Cable Communications, Llc Random access process in new radio

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018064367A1 (fr) * 2016-09-28 2018-04-05 Idac Holdings, Inc. Accès aléatoire dans des systèmes sans fil de prochaine génération

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
ASUSTEK: "Consideration on Fallback of 2-Step RACH Procedure", 3GPP TSG-RAN WG2 MEETING #NR AD HOC R2-1700024, 19 January 2017 (2017-01-19), XP051203593, DOI: 20200407114034Y *
CMCC: "Discussion on Procedure for 2-step RACH", 3GPP TSG RAN WG1 #97 R1-1906512, 17 May 2019 (2019-05-17), XP051727962, DOI: 20200407113804PX *
LG ELECTRONICS INC.: "2-Step RACH Procedure for NR-U", 3GPP TSG-RAN WG2 #103BIS R2-1818098, 16 November 2018 (2018-11-16), XP051481976, DOI: 20200407113846Y *
SAMSUNG: "Corrections on PRACH Procedure", 3GPP TSG RAN WG1 MEETING #92 R1-1801951, 2 March 2018 (2018-03-02), XP051397096, DOI: 20200407114153A *
ZTE: "Considerations on Channel Access Procedure for NR-U", 3GPP TSG RAN WG2 MEETING #102 R2-1807253, 25 May 2018 (2018-05-25), XP051443662, DOI: 20200407113918Y *

Also Published As

Publication number Publication date
CN111263462A (zh) 2020-06-09
CN111263462B (zh) 2022-02-22

Similar Documents

Publication Publication Date Title
WO2020164516A1 (fr) Procédé et dispositif de détermination
WO2021008382A1 (fr) Procédé de repli de processus d'accès aléatoire, et dispositifs et système
US20210153259A1 (en) Random access method and related device
WO2020151703A1 (fr) Procédé et appareil d'accès aléatoire, et dispositif de communication
CN110167041B (zh) 波束失败恢复请求发送方法及用户设备
US20210352744A1 (en) Random access method and device
US20230300897A1 (en) Random access method, terminal, and network device
WO2021057655A1 (fr) Procédé, dispositif, et système d'indication d'informations
WO2020156395A1 (fr) Procédé et dispositif d'accès aléatoire
US20210360709A1 (en) Data processing method and user equipment
US20210204329A1 (en) Random access method and terminal
WO2020164515A1 (fr) Procédé de transmission de signal, dispositif et système
WO2020151708A1 (fr) Procédé de transmission d'informations et terminal
WO2020063230A1 (fr) Procédé de transmission de signaux, équipement d'utilisateur et dispositif de réseau
CN111800831B (zh) 路径变换方法、设备、通信系统及计算机可读存储介质
US12004230B2 (en) Random access method and related device
JP7474241B2 (ja) ランダムアクセス方法及び端末装置
US20210153263A1 (en) Random access method and related device
CN112788772B (zh) 波束失败恢复的确认方法、终端设备及存储介质
US20220150977A1 (en) Method for selecting random access request resource, terminal, and network device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20748102

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20748102

Country of ref document: EP

Kind code of ref document: A1