WO2020156451A1 - 随机接入方法及设备 - Google Patents

随机接入方法及设备 Download PDF

Info

Publication number
WO2020156451A1
WO2020156451A1 PCT/CN2020/073837 CN2020073837W WO2020156451A1 WO 2020156451 A1 WO2020156451 A1 WO 2020156451A1 CN 2020073837 W CN2020073837 W CN 2020073837W WO 2020156451 A1 WO2020156451 A1 WO 2020156451A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
resource
uplink data
terminal device
data
Prior art date
Application number
PCT/CN2020/073837
Other languages
English (en)
French (fr)
Inventor
马玥
吴昱民
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Priority to JP2021544395A priority Critical patent/JP7210755B2/ja
Priority to EP20748986.5A priority patent/EP3920647A4/en
Priority to KR1020217026410A priority patent/KR20210115028A/ko
Publication of WO2020156451A1 publication Critical patent/WO2020156451A1/zh
Priority to US17/385,078 priority patent/US20210352744A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1263Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
    • H04W72/1268Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows

Definitions

  • the embodiments of the present disclosure relate to the field of communication technologies, and in particular, to a random access method and device.
  • the random access process mainly includes two types: one is four-step random access (4-step Random Access Channel, 4-step RACH), and the other is two-step random access (2-step RACH).
  • 4-step RACH Random Access Channel
  • 2-step RACH two-step random access
  • the terminal equipment has completed a Medium Access Control (MAC) protocol data according to the size of the common control channel (CCCH)/uplink data (UL data) Unit (Protocol Data Unit, PDU) package, if a new random access changes the uplink grant information (uplink grant, UL grant) / uplink data shared channel (Physical Uplink Shared Channel, PUSCH) size, then the terminal equipment It is necessary to re-pack the MAC PDU, which leads to random access failure.
  • MAC Medium Access Control
  • the embodiments of the present disclosure provide a random access method and device to solve the problem of random access failure in related technologies.
  • the embodiments of the present disclosure provide a random access method applied to a terminal device, and the method includes:
  • the data size of the first uplink data of the first random access is the same as the data size of the second uplink data of the second random access, and the first uplink data is corresponding to the first resource used by the first random access Uplink data, the second uplink data is uplink data corresponding to the second resource used by the second random access, the first random access includes two-step random access or four-step random access, the The second random access includes two-step random access or four-step random access.
  • the embodiments of the present disclosure provide a random access method applied to a network device, and the method includes:
  • the configuration information includes at least one of the following: the correspondence between M PRACH preamble sets and N third resources, and the correspondence between the N third resources and X PUSCHs; a third The resources include at least one of the following: PRACH preamble and RO, one PRACH preamble set corresponds to at least one third resource, one PUSCH corresponds to at least one third resource, M is an integer greater than 1, and N and X are positive integers.
  • a terminal device including:
  • the execution module is used to initiate a second random access after the first random access fails
  • the data size of the first uplink data of the first random access is the same as the data size of the second uplink data of the second random access, and the first uplink data is corresponding to the first resource used by the first random access Uplink data, the second uplink data is uplink data corresponding to the second resource used by the second random access, the first random access includes two-step random access or four-step random access, the The second random access includes two-step random access or four-step random access.
  • embodiments of the present disclosure provide a network device, including:
  • the sending module is used to send configuration information to the terminal device
  • the configuration information includes at least one of the following: the correspondence between M PRACH preamble sets and N third resources, and the correspondence between the N third resources and X PUSCHs; a third The resources include at least one of the following: PRACH preamble and RO, one PRACH preamble set corresponds to at least one third resource, one PUSCH corresponds to at least one third resource, M is an integer greater than 1, and N and X are positive integers.
  • the embodiments of the present disclosure provide a terminal device, including a processor, a memory, and a computer program stored on the memory and running on the processor, the computer program being executed by the processor When implementing the steps of the random access method as described in the first aspect.
  • the embodiments of the present disclosure provide a network device, including a processor, a memory, and a computer program stored on the memory and capable of running on the processor.
  • a network device including a processor, a memory, and a computer program stored on the memory and capable of running on the processor.
  • embodiments of the present disclosure provide a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the random access method described above are implemented.
  • the first random access used by the second random access is the same as the data size of the uplink data corresponding to the first resource used by the first random access, that is, the data size of the uplink data corresponding to the resource selected by the two random accesses is maintained, Ensure the success of the second random access and improve communication efficiency and effectiveness.
  • FIG. 1 is a schematic diagram of a possible structure of a communication system involved in an embodiment of the disclosure
  • FIG. 2 is a schematic flowchart of a random access method provided by an embodiment of the disclosure
  • FIG. 3 is one of the schematic structural diagrams of a terminal device provided by an embodiment of the disclosure.
  • FIG. 4 is one of the schematic structural diagrams of a network device provided by an embodiment of the disclosure.
  • FIG. 5 is the second structural diagram of a terminal device provided by an embodiment of the disclosure.
  • FIG. 6 is the second structural diagram of a network device provided by an embodiment of the disclosure.
  • 4-step RACH (that is, the general RACH process referring to related technologies) generally includes the following five steps:
  • Step 11 The terminal device sends Msg1 (random access preamble) to the network device.
  • Step 12 After receiving Msg1, the network device will send Msg2 to the terminal device. That is, random access response (Random Access Response, RAR) message, RAR uses random access radio network temporary identity (Random Access Radio Network Tempory Identity, RA-RNTI) to scramble, and contains backoff indicator (BI) , Uplink grant (UL grant), random access preamble identification (Random Access preamble Identification, RAPID), temporary cell radio network temporary identity (Temple Cell Radio Network Tempory Identity, TC-RNTI), etc.
  • RAR random access response
  • RAR Random Access Response
  • RAR Random Access Response
  • RAR Random Access Radio Network Tempory Identity
  • RA-RNTI Random Access Radio Network Tempory Identity
  • BI backoff indicator
  • UL grant Uplink grant
  • RAPID random access preamble identification
  • TC-RNTI temporary cell radio network temporary identity
  • Step 13 The terminal device that detects the RAPID corresponding to the preamble sent by itself, sends Msg3 according to the position of the UL grant (the terminal device that does not detect the RAPID sent by itself uses the BI delayed access).
  • Step 14 The terminal device receives the Msg4 sent by the network side.
  • the Msg4 contains the contention resolution identifier, and upgrades the TC-RNTI to the Cell Radio Network Tempory Identity (C-RNTI).
  • C-RNTI Cell Radio Network Tempory Identity
  • the subsequent network side can use C -RNTI schedules the terminal equipment.
  • Step 15 Generally, the terminal device needs to send Msg5. That is, the access complete message.
  • the four-step access generally referred to mainly refers to the completion of the first four steps of contention resolution, and the first four steps usually represent the random access process of the conventional wireless network.
  • the random access process of the terminal equipment includes:
  • the terminal device For the "random access procedure based on contention", the terminal device sends Msg1 to the network device, that is, the terminal device sends a random access request to the network device; the network device; after receiving Msg1, it sends Msg2 to the terminal device, that is, the network device sends RAR
  • the message is sent to the terminal device, and the message carries UL grant information.
  • the terminal device performs the Medium Access Control (MAC) layer grouping function to generate a MAC protocol data unit (PDU), and stores the MAC PDU in the Msg3 cache, and then The terminal device sends the MAC PDU in the Msg3 buffer through a hybrid automatic repeat request (Hybrid Automatic Repeat Request, HARQ) process.
  • MAC Medium Access Control
  • the network device After receiving Msg3, the network device sends Msg4 (eg, contention resolution identification) to the terminal device.
  • Msg4 eg, contention resolution identification
  • the terminal device receives the Msg4 to determine whether the contention resolution is successful, if it succeeds, the random access process is successful, otherwise the random access process is re-initiated.
  • the terminal device For the re-initiated random access process, when the terminal device receives the UL grant in Msg2 again, the terminal device directly retrieves the previously stored MAC PDU from the Msg3 buffer and sends it through the HARQ process. The terminal device will clear the HARQ buffer of Msg3 transmission in the random access process after the random access process is completed.
  • the terminal device sends Msg1 to the network device, that is, the terminal device sends a random access request to the network device.
  • the network device After receiving Msg1, the network device sends Msg2 to the terminal device, that is, the network device sends a RAR message to the terminal device.
  • the message carries the UL grant information and the identification information of the terminal device (for example, the random access preamble number of Msg1) ). If the number of the random access preamble is the same as the number of the random access preamble sent by the Msg1 of the terminal device, the terminal device considers that the random access process is successful, otherwise the random access process is re-initiated.
  • each time the terminal device initiates (or re-initiates) the random access process it will be based on the corresponding downlink signal quality of each random access Msg1 resource (for example, the synchronization signal block (Synchronous Signal Block, SSB) reference symbol reception strength) (Reference Symbol Received Power, RSRP)) to select random access resources, thereby increasing the success rate of random access. Therefore, each time a terminal device initiates (or re-initiates) a random access procedure, the terminal device may select a "random access procedure based on contention" or a "random access procedure based on non-contention".
  • the terminal device may select a "random access procedure based on contention" or a "random access procedure based on non-contention".
  • 2-step RACH specifically includes the following two steps:
  • Step 21 The UE triggers a 2-step RACH process and sends the request information (MsgA) to the network device. For example, it is sent via PUSCH+preamble.
  • MsgA request information
  • Step 22 The network side sends a confirmation message (MsgB) to the UE.
  • MsgB confirmation message
  • the UE If the UE fails to receive MsgB (failure means not receiving the RAPID or contention resolution ID corresponding to the MsgA sent by the UE), the UE resends Msg1 (MsgA, Msg3 or Msg1 can also be resent, depending on the specific solution).
  • the network device will configure two-step random access configuration information for the UE.
  • the configuration information includes: transmission resource information corresponding to MsgA and MsgB.
  • 2step MsgA contains 4step Msg1 and Msg3
  • 2step MsgB contains 4step Msg2 and Msg4.
  • the network device will configure 2-step RACH configuration information for the UE, such as the transmission resource information corresponding to MsgA and MsgB.
  • preamble sequences for example, each cell has 64 available preamble sequences
  • the available preamble sequences can be divided into two groups, namely, group A and group B .
  • group A and group B correspond to different uplink transmission block sizes:
  • the preamble in group B is used in the random access process; for the uplink data transmission carried by other Msg3, if it exceeds the size of the corresponding uplink transmission block of group A, and If the measured uplink path loss is less than the given calculated value, the preamble in group B is used; otherwise, the preamble in group A is used.
  • the network side After the network side receives different preamble packets, it will assign different uplink UL grants to the UE according to the different clusters of A and B (group A and group B respectively correspond to the minimum grant value configured on the network side).
  • group names of group A and group B mentioned above are only an example, and other group names with similar meanings according to the amount of uplink data carried are also within the protection scope of the embodiments of the present disclosure.
  • the first random access in this article includes two-step random access or four-step random access
  • the second random access in this article includes two-step random access or four-step random access.
  • the first random access and the second random access refer to the same access process, where the same access process mentioned above refers to the fact that after a random access is triggered, if the random access fails or is not completed or fails Success, and the next random access initiated immediately (which can start from Msg1/MsgA or fall back to Msg3), that is, the two/multiple random accesses have the same purpose and are triggered by the same or similar trigger conditions .
  • the above process of triggering two-step random access and directly falling back to four-step random access can be explicitly triggered by the indication carried in MsgB sent by the network side, or it can be triggered by other content carried in MsgB through comprehensive judgment of the terminal equipment Obtained implicitly.
  • the MsgB carries the RAPID corresponding to the terminal to send the preamble, and carries the corresponding UL grant, the terminal device has not obtained the contention resolution ID, etc.
  • the random access method provided in this article is mainly applied to a scenario where the first random access fails.
  • the first random access failure includes at least one of the following: the first random access is not completed, the first random access is not successfully completed, and there is a problem with the first random access.
  • the failed random access process may include: uncompleted or unsuccessful random access process.
  • the failure may be caused by various factors, such as: transmission power (including preamble sequence power and/or PUSCH power) power ramping The maximum power is exceeded; the number of times Msg1/MsgA is sent exceeds the preset maximum value; Msg2 or MsgB or Msg4 (contention resolution ID) is not received over time.
  • the completed random access can also be specifically divided into: successful completion and unsuccessful completion. Therefore, the aforementioned unsuccessful random access also belongs to a type of failed random access.
  • problematic random access can also be regarded as a random access that is not successfully completed, that is, problematic random access is also within the protection scope of the embodiments of the present disclosure.
  • A/B can mean A or B
  • the "and/or" in this article is only an association relationship describing the associated objects, indicating that there can be three relationships, for example, A and/or B can mean: A alone exists, A and B exist at the same time, and B exists alone.
  • words such as “first” and “second” are used to distinguish the same or similar items with basically the same function or effect.
  • the skilled person can understand that the words “first” and “second” do not limit the number and execution order.
  • the first uplink data and the second uplink data are used to distinguish different uplink data, rather than used to describe a specific sequence of the uplink data.
  • the technical solutions provided by the embodiments of the present disclosure can be applied to various communication systems, for example, a 5G communication system, a future evolution system, or multiple communication convergence systems, and so on. It can include multiple application scenarios, such as machine to machine (Machine to Machine, M2M), D2M, macro and micro communications, enhanced Mobile Broadband (eMBB), ultra-high reliability and ultra-low latency communications (ultra Reliable&Low Latency Communication, uRLLC) and Massive Machine Type Communication (mMTC) and other scenarios. These scenarios include, but are not limited to: communication between a terminal device and a terminal device, or a communication between a network device and a network device, or a communication between a network device and a terminal device, and other scenarios.
  • the embodiments of the present disclosure can be applied to communication between a network device and a terminal device in a 5G communication system, or a communication between a terminal device and a terminal device, or a communication between a network device and a network device.
  • Fig. 1 shows a schematic diagram of a possible structure of a communication system involved in an embodiment of the present disclosure.
  • the communication system includes at least one network device 100 (only one is shown in FIG. 1) and one or more terminal devices 200 connected to each network device 100.
  • the aforementioned network device 100 may be a base station, a core network device, a transmission and reception point (Transmission and Reception Point, TRP), a relay station, or an access point.
  • the network equipment 100 may be a base station transceiver station (BTS) in a global system for mobile communication (GSM) or a code division multiple access (Code Division Multiple Access, CDMA) network, or it may be a broadband
  • the NB (NodeB) in Wideband Code Division Multiple Access (WCDMA) may also be the eNB or eNodeB (evolutional NodeB) in LTE.
  • the network device 100 may also be a wireless controller in a cloud radio access network (Cloud Radio Access Network, CRAN) scenario.
  • the network device 100 may also be a network device in a 5G communication system or a network device in a future evolution network.
  • the terms used do not constitute a limitation to the embodiments of the present disclosure.
  • the terminal device 200 may be a wireless terminal device or a wired terminal device.
  • the wireless terminal device may be a device that provides voice and/or other service data connectivity to the user, a handheld device with wireless communication function, a computing device, or a wireless Other processing equipment of the modem, in-vehicle equipment, wearable equipment, terminal equipment in the future 5G network or terminal equipment in the future evolved PLMN network, etc.
  • a wireless terminal device can communicate with one or more core networks via a radio access network (RAN).
  • the wireless terminal device can be a mobile terminal device, such as a mobile phone (or “cellular” phone) and a mobile phone.
  • the computer of the terminal equipment can be a portable, pocket-sized, handheld, built-in computer or vehicle-mounted mobile device, which exchanges language and/or data with the wireless access network, and personal communication service (PCS) Telephones, cordless phones, Session Initiation Protocol (SIP) phones, wireless local loop (Wireless Local Loop, WLL) stations, personal digital assistants (Personal Digital Assistant, PDA) and other equipment, wireless terminal equipment can also be mobile Equipment, User Equipment (UE), UE terminal equipment, access terminal equipment, wireless communication equipment, terminal equipment unit, terminal equipment station, mobile station (Mobile Station), mobile station (Mobile), remote station (Remote Station) ), remote station, remote terminal equipment (Remote Terminal), subscriber unit (Subscriber Unit), subscriber station (Subscriber Station), user agent (User Agent), terminal equipment, etc.
  • FIG. 1 shows that the terminal device is a mobile phone as an example.
  • FIG. 2 shows a schematic flowchart of a random access method provided by an embodiment of the present disclosure. As shown in FIG. 2, the random access method may include the following steps 201:
  • Step 201 After the first random access fails, the terminal device initiates a second random access.
  • the data size of the first uplink data of the first random access and the second uplink data of the second random access are the same, and the first uplink data is the first resource used by the first random access Corresponding uplink data, the second uplink data is the uplink data corresponding to the second resource used by the second random access, the first random access includes two-step random access or four-step random access, and the second random access Including two-step random access or four-step random access.
  • the foregoing second resource includes at least one of the following: a target third resource and PUSCH; the foregoing target third resource includes at least one of the following: a PRACH preamble and an RO.
  • initiating the second random access described above includes:
  • Step 201a The terminal device selects the target PRACH preamble set according to the configuration information and the data size of the first uplink data.
  • Step 201b The terminal device uses the second resource to initiate a second random access.
  • the configuration information is predefined or the network device is configured for the terminal device.
  • step 201a the following steps are further included:
  • Step 201c The network device sends configuration information to the terminal device.
  • the aforementioned configuration information includes at least one of the following: a correspondence between M PRACH preamble sets and N third resources, and a correspondence between N third resources and X PUSCHs.
  • a third resource includes at least one of the following: PRACH preamble and RO, one PRACH preamble set corresponds to at least one third resource, one PUSCH corresponds to at least one third resource, M is an integer greater than 1, and N and X are positive integers .
  • the terminal device may determine the PRACH corresponding to one PRACH according to the correspondence between the M PRACH preamble sets and the N third resources and the correspondence between the N third resources and the X PUSCHs.
  • the preamble set has a pre-configured relationship with the PUSCH of the corresponding size, or the PRACH preamble set corresponding to an RO and the PUSCH of the corresponding size have a pre-configured relationship, or the PRACH preamble set corresponding to a combination of PRACH and RO and the PUSCH of the corresponding size have Pre-configured relationships.
  • a PRACH preamble set is a preamble packet.
  • the terminal device selects from X PUSCHs according to the data size of the first uplink data, which is the same as the data size of the first uplink data PUSCH, and then select a PRACH preamble set from the PRACH preamble set corresponding to these PUSCHs, as the target PRACH preamble set.
  • the target third resource in the foregoing second resources is: at least one third resource corresponding to the target PRACH preamble set. That is, after the terminal device selects the target PRACH preamble set, it can select the target third resource from all the third resources corresponding to the target PRACH preamble set.
  • the terminal device re-initiates 2-step RACH access for the same RACH procedure.
  • step RACH access ie the second random access.
  • the data size of the selected PUSCH ie the PUSCH contained in the initiated MsgA
  • the previous PUSCH ie the PUSCH contained in the MsgA.
  • the data sizes of the above X PUSCHs are the same, that is, the data sizes of the corresponding PUSCHs in the 2-step RACH are pre-configured to be exactly the same.
  • the first uplink data is the first PUSCH, or, in the first random access, it is a four-step random access
  • the first uplink data is the data carried by the first uplink grant information
  • the second uplink data is the second PUSCH, or, in the second
  • the second uplink data is data carried by the second uplink authorization information.
  • the first random access is a two-step random access
  • the second random access is a four-step random access
  • the load size of the first PUSCH is the same as the data size carried by the second uplink grant information.
  • Scenario 1 When both the first random access and the second random access are two-step random access, the above-mentioned first uplink data is the first PUSCH, and the above-mentioned second uplink data is the second PUSCH.
  • the terminal device re-initiates the 2-step RACH connection for the same RACH procedure after the previous 2-step RACH access fails.
  • the Preamble group for example, group A or group B
  • the selected target resource that is, any one of Preamble, RO, Preamble and RO combination
  • the grouping is the same, that is, the size of the PUSCH resources corresponding to the two random accesses should be the same.
  • Scenario 2 When the first random access is two-step random access and the second random access is four-step random access, the above-mentioned first uplink data is the second PUSCH, and the above-mentioned second uplink data is Data carried by the first uplink grant information.
  • the network side broadcasts the relationship between the preamble/RO and PUSCH resources in the 2-step RACH, broadcast configuration 4- Step Preamble A/B grouping in RACH.
  • the terminal device re-initiates 4-step RACH access to the same RACH procedure.
  • the newly selected target resource because If the random access is 4-step RACH, the target resource is Preamble
  • the uplink authorization data amount grant size corresponding to the Preamble group for example, group A or group B
  • the size of the previous 2-step RACH access transmission The size of PUSCH resources of MsgA should be consistent.
  • Scenario 3 In the case where the first random access is a four-step random access and the second random access is a two-step random access, the above-mentioned first uplink data is the data carried by the second uplink authorization information.
  • the second uplink data is the first PUSCH.
  • the terminal device re-initiates the same RACH procedure after the previous 4-step RACH access fails.
  • 2 -Step RACH access the amount of uplink authorized data corresponding to the Preamble group (for example, Group A or Group B) corresponding to the newly selected target resource (ie Preamble, RO, Preamble and RO combination) grant size (ie PUSCH size), which should be the same as the uplink authorization data amount grant size contained in the Preamble packet in the previous 4-step RACH.
  • Scenario 4 A further sub-scenario of scenario 3.
  • the first random access is a two-step random access and the second random access is a four-step random access
  • the two-step random access is triggered, it will directly fall back to With four-step random access, the above-mentioned load size of the first PUSCH is the same as the data size carried by the second uplink grant information.
  • the UE initiates the MsgB of the 2-step RACH access to directly fallback to the Msg3 of the 4-step RACH access to continue transmission.
  • the UL grant size carried in the RAR by the network device should be the same as the payload (load) of the PUSCH corresponding to the Preamble packet corresponding to the resource used when the UE initiates access.
  • the second resource used by the second random access when the terminal device initiates the second random access is the same as the data size of the uplink data corresponding to the first resource used by the first random access, that is, the data size of the uplink data corresponding to the resource selected by the two random accesses is maintained, and the first random access is guaranteed.
  • random access is successful, which improves communication efficiency and effectiveness.
  • FIG. 3 is a schematic diagram of a possible structure for implementing a terminal device provided by an embodiment of the present disclosure.
  • the terminal device 400 includes: an execution module 401, wherein:
  • the execution module 401 is configured to initiate a second random access after the first random access fails.
  • the data size of the first uplink data of the first random access is the same as the data size of the second uplink data of the second random access
  • the above-mentioned first uplink data is the uplink data corresponding to the first resource used by the first random access.
  • the above-mentioned second uplink data is the uplink data corresponding to the second resource used by the second random access
  • the above-mentioned first random access includes two-step random access or four-step random access
  • the above-mentioned second random access Access includes two-step random access or four-step random access.
  • the aforementioned second resource includes at least one of the following: a target third resource and a target random access PUSCH; the aforementioned target third resource includes at least one of the following: a PRACH preamble and an RO.
  • the aforementioned execution module 401 is specifically configured to: select a target PRACH preamble set according to the configuration information and the data size of the first uplink data; use the second resource to initiate a second random access; wherein, the aforementioned configuration information includes At least one of the following: the correspondence between M PRACH preamble sets and N third resources, and the correspondence between N third resources and X PUSCH; a third resource includes at least one of the following: PRACH preamble And RO, one PRACH preamble set corresponds to at least one third resource, one PUSCH corresponds to at least one third resource, the aforementioned target third resource is: at least one third resource corresponding to the target PRACH preamble set, and M is an integer greater than 1, N and X are positive integers.
  • the data sizes of the above X PUSCHs are all the same.
  • the aforementioned configuration information is predefined or the network device is configured for the terminal device.
  • the above-mentioned first uplink data is the first PUSCH, or, when the first random access is a four-step random access, the above The first uplink data is the data carried by the first uplink authorization information; when the second random access is two-step random access, the above-mentioned second uplink data is the second PUSCH, or, in the second random access In the case of four-step random access, the aforementioned second uplink data is data carried by the second uplink grant information.
  • the first random access is a two-step random access and the second random access is a four-step random access
  • the two-step random access is triggered, it will directly fall back to the four-step random access, Then the load size of the first PUSCH is the same as the data size carried by the second uplink grant information.
  • the foregoing first random access failure includes at least one of the following: the first random access is not completed, the first random access is not successfully completed, and there is a problem with the first random access.
  • the second resource used by the second random access corresponds to
  • the data size of the uplink data is the same as the data size of the uplink data corresponding to the first resource used by the first random access, that is, the data size of the uplink data corresponding to the resource selected by the two random accesses is maintained to ensure the second random access Successful access, improve communication efficiency and effectiveness.
  • the terminal device provided in the embodiment of the present disclosure can implement the process shown in the foregoing method embodiment, and in order to avoid repetition, it will not be repeated here.
  • FIG. 4 is a schematic diagram of a possible structure for implementing a network device provided by an embodiment of the present disclosure.
  • the network device 500 includes: a sending module 501, wherein:
  • the sending module 501 is used to send configuration information to a terminal device.
  • the above configuration information includes at least one of the following: the correspondence between M PRACH preamble sets and N third resources, and the correspondence between N third resources and X PUSCHs;
  • one third resource includes the following At least one item: PRACH preamble and RO, one PRACH preamble set corresponds to at least one third resource, one PUSCH corresponds to at least one third resource, M is an integer greater than 1, and N and X are positive integers.
  • the data sizes of the above X PUSCHs are all the same.
  • the network device provided by the embodiment of the present disclosure sends configuration information to the network device, so that the terminal device can select the target PRACH preamble set according to the configuration information and the data size of the first uplink data, and determine based on the target PRACH preamble set
  • the second resource to initiate the second random access, because the data size of the uplink data corresponding to the second resource used by the second random access is the same as the data size of the uplink data corresponding to the first resource used by the first random access.
  • the same that is, the data size of the uplink data corresponding to the resources selected for the two random accesses is maintained, to ensure the success of the second random access, and improve the communication efficiency and effectiveness.
  • the network device provided by the embodiment of the present disclosure can implement the process shown in the foregoing method embodiment, and in order to avoid repetition, it will not be repeated here.
  • the terminal device 100 includes but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, and a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and a power supply 111 and other components.
  • a radio frequency unit 101 for example, a radio frequency unit
  • a network module 102 includes but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, and a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and a power supply 111 and other components.
  • the terminal device 100 includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a vehicle-mounted terminal device, a wearable device, a pedometer, and the like.
  • the processor 110 is configured to initiate a second random access after the first random access fails.
  • the data size of the first uplink data of the first random access is the same as the data size of the second uplink data of the second random access
  • the above-mentioned first uplink data is the uplink data corresponding to the first resource used by the first random access.
  • the above-mentioned second uplink data is the uplink data corresponding to the second resource used by the second random access
  • the above-mentioned first random access includes two-step random access or four-step random access
  • the above-mentioned second random access Access includes two-step random access or four-step random access.
  • the second resource used by the second random access corresponds to
  • the data size of the uplink data is the same as the data size of the uplink data corresponding to the first resource used by the first random access, that is, the data size of the uplink data corresponding to the resource selected by the two random accesses is maintained to ensure the second random access Successful access, improve communication efficiency and effectiveness.
  • the radio frequency unit 101 can be used for receiving and sending signals in the process of sending and receiving information or talking. Specifically, the downlink data from the base station is received and processed by the processor 110; in addition, Uplink data is sent to the base station.
  • the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio frequency unit 101 can also communicate with the network and other devices through a wireless communication system.
  • the terminal device 100 provides users with wireless broadband Internet access through the network module 102, such as helping users to send and receive emails, browse web pages, and access streaming media.
  • the audio output unit 103 can convert the audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into audio signals and output them as sounds. Moreover, the audio output unit 103 may also provide audio output related to a specific function performed by the terminal device 100 (for example, call signal reception sound, message reception sound, etc.).
  • the audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
  • the input unit 104 is used to receive audio or video signals.
  • the input unit 104 may include a graphics processing unit (GPU) 1041 and a microphone 1042, and the graphics processor 1041 is configured to monitor images of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed.
  • the processed image frame can be displayed on the display unit 106.
  • the image frame processed by the graphics processor 1041 may be stored in the memory 109 (or other storage medium) or sent via the radio frequency unit 101 or the network module 102.
  • the microphone 1042 can receive sound, and can process such sound into audio data.
  • the processed audio data can be converted into a format that can be sent to the mobile communication base station via the radio frequency unit 101 for output in the case of a telephone call mode.
  • the terminal device 100 further includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor includes an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 1061 according to the brightness of the ambient light.
  • the proximity sensor can close the display panel 1061 and the display panel 1061 when the terminal device 100 is moved to the ear. / Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three-axis), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the terminal device (such as horizontal and vertical screen switching, related games , Magnetometer attitude calibration), vibration recognition related functions (such as pedometer, percussion), etc.; the sensor 105 can also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, Infrared sensors, etc., will not be repeated here.
  • the display unit 106 is used to display information input by the user or information provided to the user.
  • the display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • the user input unit 107 may be used to receive inputted numeric or character information, and generate key signal inputs related to user settings and function control of the terminal device 100.
  • the user input unit 107 includes a touch panel 1071 and other input devices 1072.
  • the touch panel 1071 also called a touch screen, can collect the user's touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 1071 or near the touch panel 1071. operating).
  • the touch panel 1071 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 110, the command sent by the processor 110 is received and executed.
  • the touch panel 1071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave.
  • the user input unit 107 may also include other input devices 1072.
  • other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
  • the touch panel 1071 can be overlaid on the display panel 1061.
  • the touch panel 1071 detects a touch operation on or near it, it is transmitted to the processor 110 to determine the type of the touch event.
  • the type of event provides corresponding visual output on the display panel 1061.
  • the touch panel 1071 and the display panel 1061 are used as two independent components to implement the input and output functions of the terminal device 100, in some embodiments, the touch panel 1071 and the display panel 1061 may be combined.
  • the input and output functions of the terminal device 100 are realized by integration, which is not specifically limited here.
  • the interface unit 108 is an interface for connecting an external device with the terminal device 100.
  • the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc.
  • the interface unit 108 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the terminal device 100 or can be used to connect to the terminal device 100 and external Transfer data between devices.
  • the memory 109 can be used to store software programs and various data.
  • the memory 109 may mainly include a program storage area and a data storage area.
  • the program storage area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data (such as audio data, phone book, etc.) created by the use of mobile phones.
  • the memory 109 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the processor 110 is the control center of the terminal device 100. It uses various interfaces and lines to connect the various parts of the entire terminal device 100, runs or executes software programs and/or modules stored in the memory 109, and calls and stores them in the memory 109. The data, execute various functions of the terminal device 100 and process data, so as to monitor the terminal device 100 as a whole.
  • the processor 110 may include one or more processing units; optionally, the processor 110 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, and application programs, etc.
  • the adjustment processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 110.
  • the terminal device 100 may also include a power source 111 (such as a battery) for supplying power to various components.
  • a power source 111 such as a battery
  • the power source 111 may be logically connected to the processor 110 through a power management system, so as to manage charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal device 100 includes some functional modules not shown, which will not be repeated here.
  • the network device 800 includes a processor 801, a transceiver 802, a memory 803, a user interface 804, and a bus interface.
  • the transceiver 802 is used for the sending module 501 and used for sending configuration information to the terminal device.
  • the above configuration information includes at least one of the following: the correspondence between M PRACH preamble sets and N third resources, and the correspondence between N third resources and X PUSCHs;
  • one third resource includes the following At least one item: PRACH preamble and RO, one PRACH preamble set corresponds to at least one third resource, one PUSCH corresponds to at least one third resource, M is an integer greater than 1, and N and X are positive integers.
  • the network device provided by the embodiment of the present disclosure sends configuration information to the network device, so that the terminal device can select the target PRACH preamble set according to the configuration information and the data size of the first uplink data, and determine based on the target PRACH preamble set
  • the second resource to initiate the second random access, because the data size of the uplink data corresponding to the second resource used by the second random access is the same as the data size of the uplink data corresponding to the first resource used by the first random access.
  • the same that is, the data size of the uplink data corresponding to the resources selected for the two random accesses is maintained, to ensure the success of the second random access, and improve the communication efficiency and effectiveness.
  • the bus architecture may include any number of interconnected buses and bridges, specifically one or more processors represented by the processor 801 and various circuits of the memory represented by the memory 803 are linked together. .
  • the bus architecture can also link various other circuits such as peripherals, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, no further description will be given herein.
  • the bus interface provides the interface.
  • the transceiver 802 may be a plurality of elements, that is, include a transmitter and a receiver, and provide a unit for communicating with various other devices on a transmission medium.
  • the user interface 804 may also be an interface capable of connecting externally and internally with the required equipment.
  • the connected equipment includes but not limited to a keypad, a display, a speaker, a microphone, a joystick, etc.
  • the processor 801 is responsible for managing the bus architecture and general processing, and the memory 803 can store data used by the processor 801 when performing operations.
  • the network device 800 also includes some functional modules not shown, which will not be repeated here.
  • an embodiment of the present disclosure further provides a terminal device, including a processor, a memory, and a computer program stored on the memory and running on the processor.
  • a terminal device including a processor, a memory, and a computer program stored on the memory and running on the processor.
  • the computer program in the first embodiment is implemented.
  • the process of the random access method can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • an embodiment of the present disclosure further provides a network device, including a processor, a memory, and a computer program stored in the memory and running on the processor.
  • a network device including a processor, a memory, and a computer program stored in the memory and running on the processor.
  • the computer program in the first embodiment is implemented.
  • the process of the random access method can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiments of the present disclosure also provide a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the above-mentioned computer-readable storage medium includes read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disks, or optical disks.
  • the method of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, hardware can also be used, but in many cases the former is better. ⁇ Based on this understanding, the technical solutions of the embodiments of the present disclosure can be embodied in the form of software products in essence or the parts that contribute to the prior art.
  • the computer software products are stored in a storage medium (such as ROM/RAM, magnetic A disc, an optical disc) includes a number of instructions to make a terminal device (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the multiple embodiments of the present disclosure.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例提供一种随机接入方法及设备,涉及通信技术领域,以解决相关技术所存在的随机接入失败的问题。该方法包括:在第一随机接入失败后,发起第二随机接入;其中,第一随机接入的第一上行数据与第二随机接入的第二上行数据的数据大小相同,第一上行数据为第一随机接入所使用的第一资源对应的上行数据,第二上行数据为第二随机接入所使用的第二资源对应的上行数据,第一随机接入包括两步随机接入或四步随机接入,第二随机接入包括两步随机接入或四步随机接入。

Description

随机接入方法及设备
本申请要求于2019年01月30日提交国家知识产权局、申请号为201910094318.3、申请名称为“随机接入方法及设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本公开实施例涉及通信技术领域,尤其涉及一种随机接入方法及设备。
背景技术
目前,随机接入过程主要包括两种:一种是四步随机接入(4-step Random Access Channel,4-step RACH),一种是两部随机接入(2-Step RACH)。在相关技术中,终端设备在使用2-Step RACH/4-step RACH接入网络时,可能遇到接入失败或不成功或未完成的情况,此时,需要终端设备发起重新接入。
然而,在上一次随机接入过程中,终端设备按照公共控制信道(common control channel,CCCH)/上行数据(UL data)的大小已经完成了一次媒体接入控制(Medium Access Control,MAC)协议数据单元(Protocol Data Unit,PDU)的组包,如果新一次随机接入更换了上行授权信息(uplink grant,UL grant)/上行数据共享信道(Physical Uplink Shared Channel,PUSCH)的大小,那么,终端设备便需要重新进行MAC PDU的组包,从而导致随机接入失败。
发明内容
本公开实施例提供一种随机接入方法及设备,以解决相关技术所存在的随机接入失败的问题。
为了解决上述技术问题,本申请是这样实现的:
第一方面,本公开实施例提供了一种随机接入方法,应用于终端设备,该方法包括:
在第一随机接入失败后,发起第二随机接入;
其中,第一随机接入的第一上行数据与第二随机接入的第二上行数据的数据大小相同,所述第一上行数据为所述第一随机接入所使用的第一资源对应的上行数据,所述第二上行数据为所述第二随机接入所使用的第二资源对应的上行数据,所述第一随机接入包括两步随机接入或四步随机接入,所述第二随机接入包括两步随机接入或四步随机接入。
第二方面,本公开实施例提供了一种随机接入方法,应用于网络设备,该方法包括:
向终端设备发送配置信息;
其中,所述配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之间的对应关系,以及所述N个第三资源与X个PUSCH之间的对应关系;一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,M为大于1的整数,N、X为正整数。
第三方面,本公开实施例提供了一种终端设备,包括:
执行模块,用于在第一随机接入失败后,发起第二随机接入;
其中,第一随机接入的第一上行数据与第二随机接入的第二上行数据的数据大小相同,所述第一上行数据为所述第一随机接入所使用的第一资源对应的上行数据,所述第二上行 数据为所述第二随机接入所使用的第二资源对应的上行数据,所述第一随机接入包括两步随机接入或四步随机接入,所述第二随机接入包括两步随机接入或四步随机接入。
第四方面,本公开实施例提供了一种网络设备,包括:
发送模块,用于向终端设备发送配置信息;
其中,所述配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之间的对应关系,以及所述N个第三资源与X个PUSCH之间的对应关系;一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,M为大于1的整数,N、X为正整数。
第五方面,本公开实施例提供了一种终端设备,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如第一方面所述的随机接入方法的步骤。
第六方面,本公开实施例提供一种网络设备,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如第二方面所述的随机接入方法的步骤。
第七方面,本公开实施例提供一种计算机可读存储介质,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现如上述随机接入方法的步骤。
在本公开实施例中,在第一随机接入失败或未完成或未成功后,为了避免终端设备重新组包,终端设备在发起第二随机接入时,第二随机接入所使用的第二资源对应的上行数据的数据大小与第一随机接入所使用的第一资源对应的上行数据的数据大小相同,即保持前后两次随机接入所选择的资源对应的上行数据的数据大小,保证第二随机接入成功,提高通信效率以及效能。
附图说明
图1为本公开实施例所涉及的通信系统的一种可能的结构示意图;
图2为本公开实施例提供的一种随机接入方法的流程示意图;
图3为本公开实施例提供的一种终端设备的结构示意图之一;
图4为本公开实施例提供的一种网络设备的结构示意图之一;
图5为本公开实施例提供的一种终端设备的结构示意图之二;
图6为本公开实施例提供的一种网络设备的结构示意图之二。
具体实施方式
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本公开实施例保护的范围。
下面对本公开实施例中所涉及的部分术语进行解释,以方便读者理解:
1、四步随机接入(4-step RACH)
4-step RACH(即,指代相关技术的普通RACH过程)一般包括如下五个步骤:
步骤11:终端设备发送Msg1(随机接入前导(preamble))至网络设备。
步骤12:网络设备在接收到Msg1后,会向终端设备发送Msg2。即,随机接入响应(Random Access Response,RAR)消息,RAR采用随机接入无线网络临时标识(Random  Access Radio Network Tempory Identity,RA-RNTI)加扰,内含回退指示(Backoff Indicator,BI)、上行授权(Uplink grant,UL grant)、随机接入前导码身份识别码(Random Access preamble Identification,RAPID)、临时小区无线网络临时标识(Temple Cell Radio Network Tempory Identity,TC-RNTI)等。
步骤13:检测到自身发送的preamble对应的RAPID的终端设备,按照UL grant的位置发送Msg3(未检测到对应于自身发送的RAPID的终端设备使用BI延迟接入)。
步骤14:终端设备接收网络侧发送的Msg4,该Msg4中包含竞争解决标识,并把TC-RNTI升级为小区无线网络临时标识(Cell Radio Network Tempory Identity,C-RNTI),后续网络侧可以采用C-RNTI调度该终端设备。
步骤15:一般情况下,终端设备需要发送Msg5。即,接入完成消息。
需要说明的是,通常所说的四步接入主要指前四步竞争解决完成的过程,前四步通常代表了常规无线网络随机接入过程。
更进一步的,对于四步随机接入(4-step RACH),终端设备的随机接入过程包括:
A、基于竞争的随机接入过程;
B、基于非竞争的随机接入过程。
对于“基于竞争的随机接入过程”,终端设备发送Msg1给网络设备,即,终端设备发送随机接入请求给网络设备;网络设备;接收到Msg1后向终端设备发送Msg2,即网络设备发送RAR消息给终端设备,该消息中携带了UL grant信息。终端设备根据Msg2中的UL grant,执行媒体接入控制(Medium Access Control,MAC)层组包功能生成MAC协议数据单元(Protocol Data Unit,PDU),并将该MAC PDU存储在Msg3缓存中,然后终端设备将Msg3缓存中的MAC PDU通过混合自动重传请求(Hybrid Automatic Repeat Request,HARQ)进程进行发送。网络设备接收到Msg3后发送Msg4(如,竞争解决标识)给终端设备。终端设备接收到Msg4判断是否竞争解决成功,如果成功则随机接入过程成功,否则重新发起随机接入过程。对于重新发起的随机接入过程,当终端设备又接收到Msg2中的UL grant后,终端设备直接从Msg3缓存中取出之前存储的MAC PDU并通过HARQ进程进行发送。终端设备在随机接入过程完成后会清空随机接入过程的Msg3传输的HARQ缓存。
对于“基于非竞争的随机接入过程”,终端设备发送Msg1给网络设备,即,终端设备发送随机接入请求给网络设备。网络设备接收到Msg1后给终端设备发送Msg2,即网络设备发送RAR消息给终端设备,该消息中携带了UL grant信息,和终端设备的标识信息(如,Msg1的随机接入前导(preamble)编号)。如果该随机接入前导的编号与终端设备的Msg1发送的随机接入前导的编号相同,终端设备认为该随机接入过程成功,否则重新发起随机接入过程。
终端设备在每次发起(或重新发起)随机接入过程的时候,会根据各随机接入Msg1资源的对应的下行信号质量(如,同步信号块(Synchronous Signal Block,SSB)的参考符号接收强度(Reference Symbol Received Power,RSRP))进行随机接入资源的选择,从而提高随机接入的成功过率。因此,终端设备在每次发起(或重新发起)随机接入过程的时候,终端设备可能会选择“基于竞争的的随机接入过程”或“基于非竞争的随机接入过程”。
2、两步随机接入(2-step RACH)
2-step RACH具体包括如下两个步骤:
步骤21:UE触发2-step RACH过程,将请求信息(MsgA)发送至网络设备。例如,通过PUSCH+preamble发送。
步骤22:网络侧发送确认信息(MsgB)给UE。
如果UE接收MsgB失败(失败指未接收到对应于UE自己发送MsgA中的RAPID或者竞争解决ID),则UE重新发送Msg1(也可重发MsgA,Msg3或者Msg1,视具体方案)。
一般的,在步骤21之前,网络设备会为UE配置两步随机接入的配置信息,例如,该配置信息包括:MsgA和MsgB对应的发送资源信息。
常规情况下,为便于理解,2step的MsgA中包含4step的Msg1和Msg3,2step的MsgB包含4step的Msg2和Msg4。同时,在执行步骤1之前,网络设备会为UE配置2-step RACH的配置信息,如,MsgA和MsgB对应的发送资源信息。
3、preamble分组
由于上行覆盖要求,在LTE和NR中,对preamble序列(例如,每个小区有64个可用的preamble序列)进行了分组,一般可以将可用的preamble序列分为两组,即A组和B组。
其中,A组和B组对应不同的上行传输块的大小:
对于CCCH传输,如果超过A组对应上行传输块的大小,则在随机接入过程中使用B组中的preamble;对于其他Msg3承载的上行数据传输,如果超过A组对应上行传输块的大小,并且测得的上行路损小于给定计算值,则使用B组中的preamble;否则使用A组中的preamble。网络侧在接收到不同的preamble分组后,会根据A,B簇不同,分配给UE不同的上行UL grant(A组和B组分别对应了网络侧配置的最小grant值)。
当然,上述的A组和B组的分组名称仅仅是一种示例,其他按照所承载的上行数据量大小,具有类似意义的分组名称也属于本公开实施例保护的范围。
4、第一随机接入和第二随机接入
本文中的第一随机接入包括两步随机接入或四步随机接入,本文中的第二随机接入包括两步随机接入或四步随机接入。第一随机接入与第二随机接入指代同一接入过程,其中,上述的同一接入过程,指代在一次随机接入被触发之后,如果该次随机接入失败或未完成或未成功,而紧接着发起的(可以从Msg1/MsgA开始或者回退到Msg3开始)下一次随机接入,即该两次/多次随机接入目的相同,是由同样或类似的触发条件触发的。
上述触发二步随机接入直接回退至四步随机接入的过程,可以由网络侧发送的MsgB中携带的指示显式触发,也可以由MsgB中携带的其他内容,经过终端设备的综合判断隐示获得。如:该MsgB中携带有终端对应的发送preamble的RAPID,携带有对应的UL grant,终端设备未获得竞争解决ID,等。
5、第一随机接入失败
本文所提供的随机接入方法主要应用于第一随机接入失败的场景。在本公开实施例中,第一随机接入失败包括以下至少一项:第一随机接入未完成,第一随机接入未成功完成以及第一随机接入存在问题。
具体的,失败的随机接入过程可以包括:未完成或未成功的随机接入过程,失败可能由多种因素导致,如:发送功率(包括前导序列的功率和/或PUSCH的功率)power ramping超过最大功率;发送Msg1/MsgA次数超过预设最大值;超时未收到Msg2或MsgB或Msg4(竞争解决ID)。
一般的,完成的随机接入具体也可分为:成功完成和未成功完成,因此,上述未成功完成的随机接入也属于一种失败的随机接入。
此外,有问题的(problematic)随机接入也可以认为是一种未成功完成的随机接入,即problematic随机接入也在本公开实施例保护范围之内。
6、其他术语
本文中的“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。
为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能或作用基本相同的相同项或相似项进行区分,本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定。例如,第一上行数据和第二上行数据是用于区别不同的上行数据,而不是用于描述上行数据的特定顺序。
本文中的“示例性的”或者“例如”等词用于表示作例子、例证或说明。本公开实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。本文中的“的(英文:of)”,“相应的(英文:corresponding,relevant)”和“对应的(英文:corresponding)”有时可以混用,应当指出的是,在不强调其区别时,其所要表达的含义是一致的。
本文中的“多个”的含义是指两个或两个以上。
结合上述内容,下文将结合附图对本文所提供的方案进行说明。
本公开实施例提供的技术方案可以应用于各种通信系统,例如,5G通信系统,未来演进系统或者多种通信融合系统等等。可以包括多种应用场景,例如,机器对机器(Machine to Machine,M2M)、D2M、宏微通信、增强型移动互联网(enhance Mobile Broadband,eMBB)、超高可靠性与超低时延通信(ultra Reliable&Low Latency Communication,uRLLC)以及海量物联网通信(Massive Machine Type Communication,mMTC)等场景。这些场景包括但不限于:终端设备与终端设备之间的通信,或网络设备与网络设备之间的通信,或网络设备与终端设备间的通信等场景中。本公开实施例可以应用于与5G通信系统中的网络设备与终端设备之间的通信,或终端设备与终端设备之间的通信,或网络设备与网络设备之间的通信。
图1示出了本公开实施例所涉及的通信系统的一种可能的结构示意图。如图1所示,该通信系统包括至少一个网络设备100(图1中仅示出一个)以及每个网络设备100所连接的一个或多个终端设备200。
其中,上述的网络设备100可以为基站、核心网设备、发射接收节点(Transmission and Reception Point,TRP)、中继站或接入点等。网络设备100可以是全球移动通信系统(Global System for Mobile communication,GSM)或码分多址(Code Division Multiple Access,CDMA) 网络中的基站收发信台(Base Transceiver Station,BTS),也可以是宽带码分多址(Wideband Code Division Multiple Access,WCDMA)中的NB(NodeB),还可以是LTE中的eNB或eNodeB(evolutional NodeB)。网络设备100还可以是云无线接入网络(Cloud Radio Access Network,CRAN)场景下的无线控制器。网络设备100还可以是5G通信系统中的网络设备或未来演进网络中的网络设备。然用词并不构成对本公开实施例的限制。
终端设备200可以为无线终端设备也可以为有线终端设备,该无线终端设备可以是指向用户提供语音和/或其他业务数据连通性的设备,具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、未来5G网络中的终端设备或者未来演进的PLMN网络中的终端设备等。无线终端设备可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,无线终端设备可以是移动终端设备,如移动电话(或称为“蜂窝”电话)和具有移动终端设备的计算机,例如,可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语言和/或数据,以及个人通信业务(Personal Communication Service,PCS)电话、无绳电话、会话发起协议(Session Initiation Protocol,SIP)话机、无线本地环路(Wireless Local Loop,WLL)站、个人数字助理(Personal Digital Assistant,PDA)等设备,无线终端设备也可以为移动设备、用户设备(User Equipment,UE)、UE终端设备、接入终端设备、无线通信设备、终端设备单元、终端设备站、移动站(Mobile Station)、移动台(Mobile)、远程站(Remote Station)、远方站、远程终端设备(Remote Terminal)、订户单元(Subscriber Unit)、订户站(Subscriber Station)、用户代理(User Agent)、终端设备装置等。作为一种实例,在本公开实施例中,图1以终端设备是手机为例示出。
图2示出了本公开实施例提供的一种随机接入方法的流程示意图,如图2所示,该随机接入方法可以包括如下步骤201:
步骤201:在第一随机接入失败后,终端设备发起第二随机接入。
在本公开实施例中,第一随机接入的第一上行数据与第二随机接入的第二上行数据的数据大小相同,该第一上行数据为第一随机接入所使用的第一资源对应的上行数据,该第二上行数据为第二随机接入所使用的第二资源对应的上行数据,第一随机接入包括两步随机接入或四步随机接入,第二随机接入包括两步随机接入或四步随机接入。
可选的,在本公开实施例中,上述的第二资源包括以下至少一项:目标第三资源以及PUSCH;上述的目标第三资源包括以下至少一项:PRACH前导以及RO。
可选的,在本公开实施例中,上述发起第二随机接入,包括:
步骤201a:终端设备根据配置信息以及第一上行数据的数据大小,选择出目标PRACH前导集。
步骤201b:终端设备使用第二资源,发起第二随机接入。
在本公开实施例中,配置信息为预定义的或网络设备为终端设备配置的。
在一种示例中,在步骤201a之前还包括如下步骤:
步骤201c:网络设备向终端设备发送配置信息。
示例性的,上述的配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之间的对应关系,以及N个第三资源与X个PUSCH之间的对应关系。
其中,一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,M为大于1的整数,N、X为正整数。示例性的,终端设备可以根据上述的M个PRACH前导集与N个第三资源之间的对应关系以及N个第三资源与X个PUSCH之间的对应关系,确定出:一个PRACH对应的PRACH前导集与相应大小的PUSCH具备预配置关系,或者,一个RO对应的PRACH前导集和相应大小的PUSCH具备预配置关系,或者,一个PRACH和RO的组合对应的PRACH前导集和相应大小的PUSCH具备预配置关系。一个PRACH前导集即为一个preamble分组。
示例性的,在第二随机接入为二步随机接入的情况下,终端设备根据第一上行数据的数据大小,从X个PUSCH中选择出,与该第一上行数据的数据大小相同的PUSCH,然后,从这些PUSCH所对应的PRACH前导集中选择一个PRACH前导集,作为目标PRACH前导集。
示例性的,上述的第二资源中的目标第三资源为:目标PRACH前导集对应的至少一个第三资源。即终端设备在选择出目标PRACH前导集后,便可从该目标PRACH前导集对应的所有第三资源中选择出目标第三资源。
在一种示例中,若终端设备中未配置该配置信息且前一次随机接入(即第一随机接入)为2-step RACH接入,则终端设备对于同一个RACH procedure,重新发起2-step RACH接入(即第二随机接入),此时,选择的PUSCH(即发起MsgA中所含有的PUSCH)的数据大小应当和前一次随接入中的PUSCH(即MsgA中所含有的PUSCH)的数据大小一致。
在另一种示例中,上述X个PUSCH的数据大小相同,即2-step RACH中对应的PUSCH的数据大小预配置成完全一样的。
可选的,在本公开实施例中,在第一随机接入为二步随机接入的情况下,第一上行数据为第一PUSCH,或者,在第一随机接入为四步随机接入情况下,第一上行数据为第一上行授权信息所承载的数据;以及,在第二随机接入为二步随机接入的情况下,第二上行数据为第二PUSCH,或者,在第二随机接入为四步随机接入情况下,第二上行数据为第二上行授权信息所承载的数据。
进一步可选的,在本公开实施例中,在第一随机接入为二步随机接入、且第二随机接入为四步随机接入的情况下,若触发二步随机接入直接回退至四步随机接入,则第一PUSCH的载荷大小与第二上行授权信息所承载的数据大小相同。
场景1:在第一随机接入与第二随机接入均为二步随机接入的情况下,上述的第一上行数据为第一PUSCH,上述第二上行数据为第二PUSCH。
举例说明,针对前一次随机接入和后一次随机接入均是2-step RACH的场景,终端设备在前一次2-step RACH接入失败后,对于同一个RACH procedure重新发起2-step RACH接入,此时,选择的目标资源(即Preamble、RO、Preamble与RO组合中的任一个)对应的Preamble分组(如,A组或B组)应当与前一次2-step RACH接入对应的Preamble分组一样,即两次随机接入对应的PUSCH资源的大小应当一致。
场景2:在第一随机接入为二步随机接入、且第二随机接入为四步随机接入的情况下,上述的第一上行数据为第二PUSCH,上述的第二上行数据为第一上行授权信息所承载的数据。
举例说明,针对前一次随机接入为2-step RACH、后一次的场景随机接入为4-step RACH,网络侧广播配置2-step RACH中preamble/RO和PUSCH资源的关系,广播配置4-step RACH中preamble A/B的分组,终端设备在前一次2-step RACH接入失败后,对于同一个RACH procedure重新发起4-step RACH接入,此时,新选择的目标资源(由于此时的随机接入为4-step RACH,则该目标资源为Preamble)Preamble分组(如,A组或B组)所对应的上行授权数据量grant size大小,和前一次2-step RACH接入发送的MsgA的PUSCH资源的大小应当一致。
场景3:在第一随机接入为四步随机接入、且第二随机接入为二步随机接入的情况下,上述的第一上行数据为第二上行授权信息所承载的数据,上述的第二上行数据为第一PUSCH。
举例说明,针对前一次随机接入为4-step RACH、后一次的场景随机接入为2-step RACH,终端设备在前一次4-step RACH接入失败后,对于同一个RACH procedure重新发起2-step RACH接入,此时,新选择的目标资源(即Preamble、RO、Preamble与RO组合)对应的Preamble分组(如,A组或B组)所对应的上行授权数据量grant size大小(即PUSCH大小),应当和前一次4-step RACH中Preamble分组中含有的上行授权数据量grant size一致。
场景4:场景3的进一步子场景,在第一随机接入为二步随机接入、且第二随机接入为四步随机接入的情况下,若触发二步随机接入直接回退至四步随机接入,则上述的第一PUSCH的载荷大小与第二上行授权信息所承载的数据大小相同。
举例说明,在2-step RACH接入直接回退至4-step RACH接入的场景下,UE发起在2-step RACH接入的MsgB直接fallback到4-step RACH接入的Msg3中继续传输,则网络设备在RAR中携带的UL grant大小,应当与UE发起接入时,使用的资源对应的Preamble分组所对应的PUSCH的payload(载荷)大小相同。
本公开实施例提供的随机接入方法,在第一随机接入失败后,为了避免终端设备重新组包,终端设备在发起第二随机接入时,第二随机接入所使用的第二资源对应的上行数据的数据大小与第一随机接入所使用的第一资源对应的上行数据的数据大小相同,即保持前后两次随机接入所选择的资源对应的上行数据的数据大小,保证第二随机接入成功,提高通信效率以及效能。
图3为实现本公开实施例提供的一种终端设备的可能的结构示意图,如图3所示,该终端设备400包括:执行模块401,其中:
执行模块401,用于在第一随机接入失败后,发起第二随机接入。
其中,第一随机接入的第一上行数据与第二随机接入的第二上行数据的数据大小相同,上述的第一上行数据为第一随机接入所使用的第一资源对应的上行数据,上述的第二上行数据为第二随机接入所使用的第二资源对应的上行数据,上述的第一随机接入包括两步随机接入或四步随机接入,上述的第二随机接入包括两步随机接入或四步随机接入。
可选的,上述的第二资源包括以下至少一项:目标第三资源以及目标随机接入PUSCH;上述的目标第三资源包括以下至少一项:PRACH前导以及RO。
可选的,上述的执行模块401具体用于:根据配置信息以及第一上行数据的数据 大小,选择出目标PRACH前导集;使用第二资源,发起第二随机接入;其中,上述配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之间的对应关系,以及N个第三资源与X个PUSCH之间的对应关系;一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,上述的目标第三资源为:目标PRACH前导集对应的至少一个第三资源,M为大于1的整数,N、X为正整数。
可选的,上述的X个PUSCH的数据大小均相同。
可选的,上述的配置信息为预定义的或网络设备为终端设备配置的。
可选的,在第一随机接入为二步随机接入的情况下,上述的第一上行数据为第一PUSCH,或者,在第一随机接入为四步随机接入情况下,上述的第一上行数据为第一上行授权信息所承载的数据;在第二随机接入为二步随机接入的情况下,上述的第二上行数据为第二PUSCH,或者,在第二随机接入为四步随机接入情况下,上述的第二上行数据为第二上行授权信息所承载的数据。
可选的,在第一随机接入为二步随机接入、且第二随机接入为四步随机接入的情况下,若触发二步随机接入直接回退至四步随机接入,则第一PUSCH的载荷大小与第二上行授权信息所承载的数据大小相同。
可选的,上述的第一随机接入失败包括以下至少一项:第一随机接入未完成,第一随机接入未成功完成以及第一随机接入存在问题。
本公开实施例提供的终端设备,在第一随机接入失败后,为了避免终端设备重新组包,终端设备在发起第二随机接入时,第二随机接入所使用的第二资源对应的上行数据的数据大小与第一随机接入所使用的第一资源对应的上行数据的数据大小相同,即保持前后两次随机接入所选择的资源对应的上行数据的数据大小,保证第二随机接入成功,提高通信效率以及效能。
本公开实施例提供的终端设备能够实现上述方法实施例所示的过程,为避免重复,此处不再赘述。
图4为实现本公开实施例提供的一种网络设备的可能的结构示意图,如图4所示,该网络设备500包括:发送模块501,其中:
发送模块501,用于向终端设备发送配置信息。
其中,上述配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之间的对应关系,以及N个第三资源与X个PUSCH之间的对应关系;一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,M为大于1的整数,N、X为正整数。
可选的,上述X个PUSCH的数据大小均相同。
本公开实施例提供的网络设备,通过向网络设备发送配置信息,以使得终端设备可以根据配置信息以及第一上行数据的数据大小,选择出目标PRACH前导集,并基于该目标PRACH前导集确定出第二资源,以发起第二随机接入,由于第二随机接入所使用的第二资源对应的上行数据的数据大小与第一随机接入所使用的第一资源对应的上行数据的数据大小相同,即保持前后两次随机接入所选择的资源对应的上行数据的数据大小,保证第二随机接入成功,提高通信效率以及效能。
本公开实施例提供的网络设备能够实现上述方法实施例中所示的过程,为避免重复,此处不再赘述。
图5为实现本公开各个实施例的一种终端设备的硬件结构示意图,该终端设备100包括但不限于:射频单元101、网络模块102、音频输出单元103、输入单元104、传感器105、显示单元106、用户输入单元107、接口单元108、存储器109、处理器110、以及电源111等部件。本领域技术人员可以理解,图5中示出的终端设备100的结构并不构成对终端设备的限定,终端设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。在本公开实施例中,终端设备100包括但不限于手机、平板电脑、笔记本电脑、掌上电脑、车载终端设备、可穿戴设备、以及计步器等。
其中,处理器110,用于在第一随机接入失败后,发起第二随机接入。其中,第一随机接入的第一上行数据与第二随机接入的第二上行数据的数据大小相同,上述的第一上行数据为第一随机接入所使用的第一资源对应的上行数据,上述的第二上行数据为第二随机接入所使用的第二资源对应的上行数据,上述的第一随机接入包括两步随机接入或四步随机接入,上述的第二随机接入包括两步随机接入或四步随机接入。
需要说明的是,上述方法实施例涉及的所有相关内容均可以援引到图5中的各功能模块的来实现,此处,不再赘述。
本公开实施例提供的终端设备,在第一随机接入失败后,为了避免终端设备重新组包,终端设备在发起第二随机接入时,第二随机接入所使用的第二资源对应的上行数据的数据大小与第一随机接入所使用的第一资源对应的上行数据的数据大小相同,即保持前后两次随机接入所选择的资源对应的上行数据的数据大小,保证第二随机接入成功,提高通信效率以及效能。
应理解的是,本公开实施例中,射频单元101可用于收发信息或通话过程中,信号的接收和发送,具体的,将来自基站的下行数据接收后,给处理器110处理;另外,将上行的数据发送给基站。通常,射频单元101包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元101还可以通过无线通信系统与网络和其他设备通信。
终端设备100通过网络模块102为用户提供了无线的宽带互联网访问,如帮助用户收发电子邮件、浏览网页和访问流式媒体等。
音频输出单元103可以将射频单元101或网络模块102接收的或者在存储器109中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元103还可以提供与终端设备100执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元103包括扬声器、蜂鸣器以及受话器等。
输入单元104用于接收音频或视频信号。输入单元104可以包括图形处理器(Graphics Processing Unit,GPU)1041和麦克风1042,图形处理器1041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元106上。经图形处理器1041处理后的图像帧可以存储在存储器109(或其它存储介质)中或者经由射频单元101或网络模块102进行发送。麦克风1042可以接收声音,并且能够将这样的声音处理为音频 数据。处理后的音频数据可以在电话通话模式的情况下转换为可经由射频单元101发送到移动通信基站的格式输出。
终端设备100还包括至少一种传感器105,比如光传感器、运动传感器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1061的亮度,接近传感器可在终端设备100移动到耳边时,关闭显示面板1061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别终端设备姿态(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;传感器105还可以包括指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等,在此不再赘述。
显示单元106用于显示由用户输入的信息或提供给用户的信息。显示单元106可包括显示面板1061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1061。
用户输入单元107可用于接收输入的数字或字符信息,以及产生与终端设备100的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元107包括触控面板1071以及其他输入设备1072。触控面板1071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1071上或在触控面板1071附近的操作)。触控面板1071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器110,接收处理器110发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1071。除了触控面板1071,用户输入单元107还可以包括其他输入设备1072。具体地,其他输入设备1072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
进一步的,触控面板1071可覆盖在显示面板1061上,当触控面板1071检测到在其上或附近的触摸操作后,传送给处理器110以确定触摸事件的类型,随后处理器110根据触摸事件的类型在显示面板1061上提供相应的视觉输出。虽然在图5中,触控面板1071与显示面板1061是作为两个独立的部件来实现终端设备100的输入和输出功能,但是在某些实施例中,可以将触控面板1071与显示面板1061集成而实现终端设备100的输入和输出功能,具体此处不做限定。
接口单元108为外部装置与终端设备100连接的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(I/O)端口、视频I/O端口、耳机端口等等。接口单元108可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接收到的输入传输到终端设备100内的一个或多个元件或者可以用于在终端设备100和外部装置之间传输数据。
存储器109可用于存储软件程序以及各种数据。存储器109可主要包括存储程序 区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器109可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
处理器110是终端设备100的控制中心,利用各种接口和线路连接整个终端设备100的各个部分,通过运行或执行存储在存储器109内的软件程序和/或模块,以及调用存储在存储器109内的数据,执行终端设备100的各种功能和处理数据,从而对终端设备100进行整体监控。处理器110可包括一个或多个处理单元;可选的,处理器110可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器110中。
终端设备100还可以包括给各个部件供电的电源111(比如电池),可选的,电源111可以通过电源管理系统与处理器110逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
另外,终端设备100包括一些未示出的功能模块,在此不再赘述。
图6为实现本公开实施例的一种网络设备的硬件结构示意图,该网络设备800包括:处理器801、收发机802、存储器803、用户接口804和总线接口。
其中,收发机802,用于发送模块501,用于向终端设备发送配置信息。
其中,上述配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之间的对应关系,以及N个第三资源与X个PUSCH之间的对应关系;一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,M为大于1的整数,N、X为正整数。
本公开实施例提供的网络设备,通过向网络设备发送配置信息,以使得终端设备可以根据配置信息以及第一上行数据的数据大小,选择出目标PRACH前导集,并基于该目标PRACH前导集确定出第二资源,以发起第二随机接入,由于第二随机接入所使用的第二资源对应的上行数据的数据大小与第一随机接入所使用的第一资源对应的上行数据的数据大小相同,即保持前后两次随机接入所选择的资源对应的上行数据的数据大小,保证第二随机接入成功,提高通信效率以及效能。
本公开实施例中,在图6中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器801代表的一个或多个处理器和存储器803代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机802可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。针对不同的用户设备,用户接口804还可以是能够外接内接需要设备的接口,连接的设备包括但不限于小键盘、显示器、扬声器、麦克风、操纵杆等。处理器801负责管理总线架构和通常的处理,存储器803可以存储处理器801在执行操作时所使用的数据。
另外,网络设备800还包括一些未示出的功能模块,在此不再赘述。
可选的,本公开实施例还提供一种终端设备,包括处理器,存储器,存储在存储器上并可在处理器上运行的计算机程序,该计算机程序被处理器执行时实现上述实施例一中的随机接入方法的过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
可选的,本公开实施例还提供一种网络设备,包括处理器,存储器,存储在存储器上并可在处理器上运行的计算机程序,该计算机程序被处理器执行时实现上述实施例一中的随机接入方法的过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本公开实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述实施例中的随机接入方法的多个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,上述的计算机可读存储介质包括只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本公开多个实施例所述的方法。
上面结合附图对本公开的实施例进行了描述,但是本公开并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本公开的启示下,在不脱离本公开宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本公开的保护之内。

Claims (23)

  1. 一种随机接入方法,应用于终端设备,其中,所述方法包括:
    在第一随机接入失败后,发起第二随机接入;
    其中,所述第一随机接入的第一上行数据与所述第二随机接入的第二上行数据的数据大小相同,所述第一上行数据为所述第一随机接入所使用的第一资源对应的上行数据,所述第二上行数据为所述第二随机接入所使用的第二资源对应的上行数据,所述第一随机接入包括两步随机接入或四步随机接入,所述第二随机接入包括两步随机接入或四步随机接入。
  2. 根据权利要求1所述的方法,其中,所述第二资源包括以下至少一项:目标第三资源以及随机接入上行数据共享信道资源PUSCH;所述目标第三资源包括以下至少一项:物理随机接入信道PRACH前导以及随机接入时机RO。
  3. 根据权利要求2所述的方法,其中,所述发起第二随机接入,包括:
    根据配置信息以及所述第一上行数据的数据大小,选择出目标PRACH前导集;
    使用所述第二资源,发起所述第二随机接入;
    其中,所述配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之间的对应关系,以及所述N个第三资源与X个PUSCH之间的对应关系;
    一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,所述目标第三资源为:所述目标PRACH前导集对应的至少一个第三资源,M为大于1的整数,N、X为正整数。
  4. 根据权利要求3所述的方法,其中,所述X个PUSCH的数据大小均相同。
  5. 根据权利要求3或4所述的方法,其中,所述配置信息为预定义的或网络设备为所述终端设备配置的。
  6. 根据权利要求1所述的方法,其中,
    在所述第一随机接入为二步随机接入的情况下,所述第一上行数据为第一PUSCH,或者,在所述第一随机接入为四步随机接入情况下,所述第一上行数据为第一上行授权信息所承载的数据;
    在所述第二随机接入为二步随机接入的情况下,所述第二上行数据为第二PUSCH,或者,在所述第二随机接入为四步随机接入情况下,所述第二上行数据为第二上行授权信息所承载的数据。
  7. 根据权利要求6所述的方法,其中,在所述第一随机接入为二步随机接入、且所述第二随机接入为四步随机接入的情况下,若触发二步随机接入直接回退至四步随机接入,则所述第一PUSCH的载荷大小与所述第二上行授权信息所承载的数据大小相同。
  8. 根据权利要求1所述的方法,其中,所述第一随机接入失败包括以下至少一项:所述第一随机接入未完成,所述第一随机接入未成功完成以及所述第一随机接入存在问题。
  9. 一种随机接入方法,应用于网络设备,其中,所述方法包括:
    向终端设备发送配置信息;
    其中,所述配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之 间的对应关系,以及所述N个第三资源与X个PUSCH之间的对应关系;一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,M为大于1的整数,N、X为正整数。
  10. 根据权利要求9所述的方法,其中,所述X个PUSCH的数据大小均相同。
  11. 一种终端设备,其中,包括:
    执行模块,用于在第一随机接入失败后,发起第二随机接入;
    其中,第一随机接入的第一上行数据与第二随机接入的第二上行数据的数据大小相同,所述第一上行数据为所述第一随机接入所使用的第一资源对应的上行数据,所述第二上行数据为所述第二随机接入所使用的第二资源对应的上行数据,所述第一随机接入包括两步随机接入或四步随机接入,所述第二随机接入包括两步随机接入或四步随机接入。
  12. 根据权利要求11所述的终端设备,其中,所述第二资源包括以下至少一项:目标第三资源以及随机接入上行数据共享信道资源PUSCH;所述目标第三资源包括以下至少一项:物理随机接入信道PRACH前导以及随机接入时机RO。
  13. 根据权利要求12所述的终端设备,其中,所述执行模块具体用于:
    根据配置信息以及所述第一上行数据的数据大小,选择出目标PRACH前导集;
    使用所述第二资源,发起所述第二随机接入;
    其中,所述配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之间的对应关系,以及所述N个第三资源与X个PUSCH之间的对应关系;
    一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,所述目标第三资源为:所述目标PRACH前导集对应的至少一个第三资源,M为大于1的整数,N、X为正整数。
  14. 根据权利要求13所述的终端设备,其中,所述X个PUSCH的数据大小均相同。
  15. 根据权利要求13或14所述的终端设备,其中,所述配置信息为预定义的或网络设备为所述终端设备配置的。
  16. 根据权利要求11所述的终端设备,其中,
    在所述第一随机接入为二步随机接入的情况下,所述第一上行数据为第一PUSCH,或者,在所述第一随机接入为四步随机接入情况下,所述第一上行数据为第一上行授权信息所承载的数据;
    在所述第二随机接入为二步随机接入的情况下,所述第二上行数据为第二PUSCH,或者,在所述第二随机接入为四步随机接入情况下,所述第二上行数据为第二上行授权信息所承载的数据。
  17. 根据权利要求16所述的终端设备,其中,在所述第一随机接入为二步随机接入、且所述第二随机接入为四步随机接入的情况下,若触发二步随机接入直接回退至四步随机接入,则所述第一PUSCH的载荷大小与所述第二上行授权信息所承载的数据大小相同。
  18. 根据权利要求11所述的终端设备,其中,所述第一随机接入失败包括以下至少一项:所述第一随机接入未完成,所述第一随机接入未成功完成以及所述第一随机 接入存在问题。
  19. 一种网络设备,其中,包括:
    发送模块,用于向终端设备发送配置信息;
    其中,所述配置信息包括以下至少一项:M个PRACH前导集与N个第三资源之间的对应关系,以及所述N个第三资源与X个PUSCH之间的对应关系;一个第三资源包括以下至少一项:PRACH前导和RO,一个PRACH前导集对应至少一个第三资源,一个PUSCH对应至少一个第三资源,M为大于1的整数,N、X为正整数。
  20. 根据权利要求19所述的网络设备,其中,所述X个PUSCH的数据大小均相同。
  21. 一种终端设备,其中,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求1至8中任一项所述的随机接入方法的步骤。
  22. 一种网络设备,其中,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求9或10中任一项所述的随机接入方法的步骤。
  23. 一种计算机可读存储介质,其中,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现如权利要求1至8中任一项、或者、9或10所述的随机接入方法的步骤。
PCT/CN2020/073837 2019-01-30 2020-01-22 随机接入方法及设备 WO2020156451A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2021544395A JP7210755B2 (ja) 2019-01-30 2020-01-22 ランダムアクセス方法及び機器
EP20748986.5A EP3920647A4 (en) 2019-01-30 2020-01-22 RANDOM ACCESS METHOD AND DEVICE
KR1020217026410A KR20210115028A (ko) 2019-01-30 2020-01-22 랜덤 접속 방법 및 장치
US17/385,078 US20210352744A1 (en) 2019-01-30 2021-07-26 Random access method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910094318.3A CN111263464B (zh) 2019-01-30 2019-01-30 随机接入方法、设备及介质
CN201910094318.3 2019-01-30

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/385,078 Continuation US20210352744A1 (en) 2019-01-30 2021-07-26 Random access method and device

Publications (1)

Publication Number Publication Date
WO2020156451A1 true WO2020156451A1 (zh) 2020-08-06

Family

ID=70953811

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/073837 WO2020156451A1 (zh) 2019-01-30 2020-01-22 随机接入方法及设备

Country Status (6)

Country Link
US (1) US20210352744A1 (zh)
EP (1) EP3920647A4 (zh)
JP (1) JP7210755B2 (zh)
KR (1) KR20210115028A (zh)
CN (1) CN111263464B (zh)
WO (1) WO2020156451A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220104276A1 (en) * 2019-02-15 2022-03-31 Lg Electronics Inc. Method for transmitting or receiving physical uplink shared channel for random access in wireless communication system and apparatus therefor

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022052094A1 (zh) * 2020-09-14 2022-03-17 深圳传音控股股份有限公司 数据处理方法、设备及计算机可读储存介质
CN114175820A (zh) * 2021-11-01 2022-03-11 北京小米移动软件有限公司 资源配置、确定方法和装置、通信装置和存储介质

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282899A (zh) * 2017-01-05 2018-07-13 电信科学技术研究院 一种两步竞争随机接入方法和装置

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7074122B2 (ja) * 2016-09-28 2022-05-24 ソニーグループ株式会社 次世代ワイヤレスシステムにおけるランダムアクセス
JP2020065095A (ja) * 2017-02-20 2020-04-23 シャープ株式会社 端末装置、基地局装置、通信方法、および、集積回路
CN110366868B (zh) * 2017-02-28 2022-11-01 Oppo广东移动通信有限公司 随机接入的方法、终端设备、网络设备和计算机可读介质
US10568007B2 (en) * 2017-03-22 2020-02-18 Comcast Cable Communications, Llc Handover random access
US11223985B2 (en) * 2017-05-04 2022-01-11 Beijing Xiaomi Mobile Software Co., Ltd. Beam-based connection failure report
US10660063B2 (en) * 2017-11-16 2020-05-19 Comcast Cable Communications, Llc Beam paging assistance
WO2019096679A1 (en) * 2017-11-16 2019-05-23 Telefonaktiebolaget Lm Ericsson (Publ) Random access procedure
US10772151B2 (en) * 2018-01-05 2020-09-08 Ofinno, Llc Beam management in discontinuous reception
US10784944B2 (en) * 2018-01-09 2020-09-22 Ofinno, Llc Timing advance in beam failure recovery request transmission
US10925095B2 (en) * 2018-01-12 2021-02-16 Innovative Technology Lab Co., Ltd. Apparatus and method for performing random access in wireless communication system
CA3034076A1 (en) * 2018-02-15 2019-08-15 Comcast Cable Communications, Llc Random access using supplementary uplink
JP7271097B2 (ja) * 2018-07-17 2023-05-11 シャープ株式会社 基地局装置、端末装置、および、通信方法
CN110831189B (zh) * 2018-08-11 2022-05-10 华为技术有限公司 链路失败恢复方法及相关设备
US11259331B2 (en) * 2018-09-27 2022-02-22 Ofinno, Llc RACH type switching
CA3066439A1 (en) * 2019-01-03 2020-07-03 Comcast Cable Communications, Llc Access procedures in wireless communications
CN111277382B (zh) * 2019-01-18 2021-10-22 维沃移动通信有限公司 一种随机接入过程的信息传输方法及终端
CN111885737B (zh) * 2019-05-03 2022-12-06 华为技术有限公司 随机接入的方法和装置
KR20220034668A (ko) * 2020-09-11 2022-03-18 아서스테크 컴퓨터 인코포레이션 무선 통신 시스템에서 다중 송수신 포인트에 대한 빔 장애 검출 방법 및 장치

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282899A (zh) * 2017-01-05 2018-07-13 电信科学技术研究院 一种两步竞争随机接入方法和装置

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
LG ELECTRONICS INC.: "2-Step RACH procedure for NR-U", 3GPP TSG-RAN WG2 #103BIS R2-1818098, 16 November 2018 (2018-11-16), XP051481976, DOI: 20200410090435A *
LG ELECTRONICS: "RACH Procedure", 3GPP TSG RAN WG1 MEETING #90BIS R1-1717931, 13 October 2017 (2017-10-13), XP051341115, DOI: 20200410085515Y *
LG ELECTRONICS: "RACH Procedure", 3GPP TSG RAN WG1 MEETING #90BIS R1-1717931, 13 October 2017 (2017-10-13), XP051341115, DOI: 20200410085616X *
NOKIA ET AL.: "Msg3 Handling When Switching from CBRA to CFRA", 3GPP TSG-RAN WG2 MEETING NR ADHOC 1807 R2-1810157, 6 July 2018 (2018-07-06), XP051467368, DOI: 20200410085258Y *
See also references of EP3920647A4
VIVO: "RAN2 impacts of 2-step RACH", 3GPP TSG-RAN WG2 MEETING #104 R2-1818260, 16 November 2018 (2018-11-16), XP051557761, DOI: 20200410084918Y *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220104276A1 (en) * 2019-02-15 2022-03-31 Lg Electronics Inc. Method for transmitting or receiving physical uplink shared channel for random access in wireless communication system and apparatus therefor

Also Published As

Publication number Publication date
KR20210115028A (ko) 2021-09-24
EP3920647A4 (en) 2022-07-13
JP7210755B2 (ja) 2023-01-23
EP3920647A1 (en) 2021-12-08
CN111263464A (zh) 2020-06-09
US20210352744A1 (en) 2021-11-11
JP2022519352A (ja) 2022-03-23
CN111263464B (zh) 2021-12-28

Similar Documents

Publication Publication Date Title
WO2021027821A1 (zh) Sdt处理方法、设备及系统
WO2021008382A1 (zh) 随机接入过程回退方法、设备及系统
WO2020151703A1 (zh) 随机接入方法及装置、通信设备
US20210352744A1 (en) Random access method and device
US11601822B2 (en) Random access method and communications device
US20230300897A1 (en) Random access method, terminal, and network device
WO2019242465A1 (zh) 一种资源请求方法及用户设备
US20210360709A1 (en) Data processing method and user equipment
WO2020156395A1 (zh) 随机接入方法及装置
EP3998831A1 (en) Random access method, configuration method, terminal, and network-side device
US20210204329A1 (en) Random access method and terminal
WO2020164515A1 (zh) 信号传输方法、设备及系统
EP3799344B1 (en) Bwp deactivation timer control method and terminal device
WO2020063230A1 (zh) 一种信号传输方法、用户设备及网络设备
US20220150977A1 (en) Method for selecting random access request resource, terminal, and network device
CN111800831B (zh) 路径变换方法、设备、通信系统及计算机可读存储介质
WO2021088791A1 (zh) 波束失败恢复的确认方法、终端设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20748986

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021544395

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20217026410

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2020748986

Country of ref document: EP

Effective date: 20210830