WO2020168532A1 - Contention resolution in random access procedure - Google Patents
Contention resolution in random access procedure Download PDFInfo
- Publication number
- WO2020168532A1 WO2020168532A1 PCT/CN2019/075807 CN2019075807W WO2020168532A1 WO 2020168532 A1 WO2020168532 A1 WO 2020168532A1 CN 2019075807 W CN2019075807 W CN 2019075807W WO 2020168532 A1 WO2020168532 A1 WO 2020168532A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- random access
- response
- terminal devices
- access response
- terminal device
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 102
- 230000004044 response Effects 0.000 claims abstract description 205
- 230000015654 memory Effects 0.000 claims description 15
- 238000012544 monitoring process Methods 0.000 claims description 8
- 238000012545 processing Methods 0.000 claims description 4
- 230000003247 decreasing effect Effects 0.000 abstract description 2
- 238000013507 mapping Methods 0.000 abstract description 2
- 230000006854 communication Effects 0.000 description 31
- 238000004891 communication Methods 0.000 description 31
- 230000005540 biological transmission Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000000926 separation method Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
- H04W74/0841—Random access procedures, e.g. with 4-step access with collision treatment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
- H04W72/1263—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
Definitions
- Embodiments of the present disclosure generally relate to communication techniques, and more particularly, to methods, devices and computer readable medium for contention resolution in a random access procedure.
- a random access channel (RACH) is shared by terminal devices to request access to networks for call set-up and burst data transmission. Since the RACH is shared, it is possible that two or more terminal devices transmit at the same time and their transmissions collide. This is known as contention. If the terminal device does not get response, it performs the random access request again. Such transmission collisions may incur undesirable failure of random access and unexpected delay in transmission.
- embodiments of the present disclosure relate to a method for contention resolution in a random access procedure and the corresponding communication devices.
- inventions of the disclosure provide a terminal device.
- the terminal device comprises: at least on processor; and a memory coupled to the at least one processor, the memory storing instructions therein, the instructions, when executed by the at least one processor, causing the terminal device to: transmit, at the terminal device, a random access request to a network device.
- the random access request comprising at least one preamble for a random access procedure and identity information of the terminal device.
- the terminal device is also caused to receive, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier.
- the one or more terminal devices transmit preambles for random access procedures to the network device on random access channels.
- the identifier is used for scrambling downlink control channels associated with the terminal devices.
- the terminal device is further caused to in response to determining that the random access response comprising the identity information of the terminal device, determine that the random access procedure of the terminal device is successful.
- inventions of the disclosure provide a network device.
- the network device comprises: at least on processor; and a memory coupled to the at least one processor, the memory storing instructions therein, the instructions, when executed by the at least one processor, causing the network device to: receive, at the network device, random access requests from one or more terminal devices.
- the random access requests comprise at least preambles for random access procedures of the terminal devices and identity information of the terminal devices.
- the preambles are transmitted on random access channels.
- the network device is also caused to transmit a random access response to the terminal devices on a downlink control channel scrambled with an identifier.
- the random access response comprises identity information of at least one of the terminal device to indicate that the random access procedure of the at least one of the one or more terminal device sis successful.
- the identifier is used for scrambling downlink control channels associated with the terminal devices.
- inventions of the present disclosure provide a method.
- the method comprises: transmitting, at a terminal device, a random access request to a network device.
- the random access request comprises at least one preamble for a random access procedure and identity information of the terminal device.
- the method also comprises receiving, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier.
- the random access response comprises identity information of at least one of terminal devices.
- the terminal devices transmit preambles for random access procedures to the network device on random access channels.
- the identifier is used for scrambling downlink control channels associated with the terminal devices.
- the method further comprises in response to determining that the random access response comprising the identity information of the terminal device, determining that the random access procedure of the terminal device is successful.
- embodiments of the present disclosure provide a method.
- the method comprises: receiving, at a network device, random access requests from one or more terminal devices.
- the random access requests comprise at least preambles for random access procedures of the terminal devices and identity information of the terminal devices.
- the preambles are transmitted on random access channels.
- the method further comprises transmitting a random access response to the terminal devices on a downlink control channel scrambled with an identifier.
- the random access response comprises identity information of the at least one of the terminal devices to indicate that the random access procedure of the at least one of the terminal devices is successful.
- the identifier is used for scrambling downlink control channels associated with the terminal devices.
- inventions of the disclosure provide an apparatus.
- the apparatus comprises means for transmitting, at a terminal device, a random access request to a network device.
- the random access request comprises at least one preamble for a random access procedure and identity information of the terminal device.
- the apparatus also comprises means for receiving, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier.
- the random access response comprises identity information of one or more terminal devices.
- the terminal devices transmit preambles for random access procedures to the network device on random access channels.
- the identifier is used for scrambling downlink control channels associated with the terminal devices.
- the apparatus further comprises means for in response to determining that the random access response comprising the identity information of the terminal device, determining that the random access procedure of the terminal device is successful.
- inventions of the disclosure provide an apparatus.
- the apparatus comprises means for receiving, at a network device, random access requests fiom one or more terminal devices.
- the random access requests comprise at least preambles for random access procedures of the terminal devices and identity information of the terminal devices.
- the preambles are transmitted on random access channels.
- the apparatus also comprises means for transmitting a random access response to the one or more terminal devices on a downlink control channel scrambled with an identifier.
- the random access response comprises identity information of the at least one of the terminal devices to indicate that the random access procedure of the at least one of the terminal devices is successful.
- the identifier is used for scrambling downlink control channels associated with the terminal devices.
- embodiments of the disclosure provide a computer readable medium.
- the computer readable medium stores instructions thereon, the instructions, when executed by at least one processing unit of a machine, causing the machine to implement the method according to the third aspect or the fourth aspect.
- Fig. 1 illustrates a schematic diagram of a procedure of a conventional four-step RACH
- Fig. 2 illustrates a schematic diagram of a procedure of a conventional two-step RACH
- Fig. 3 illustrates a schematic diagram of a communication system according to embodiments of the present disclosure
- Fig. 4 illustrates a schematic diagram of interactions among devices according to embodiments of the present disclosure
- Fig. 5 illustrates a flow chart of a method implemented at a communication device according to embodiments of the present disclosure
- Fig. 6 illustrates a flow chart of a method implemented at a communication device according to embodiments of the present disclosure
- Fig. 7 illustrates a schematic diagram of a device according to embodiments of the present disclosure.
- Fig. 8 shows a block diagram of an example computer readable medium in accordance with some embodiments of the present disclosure.
- the term “communication network” refers to a network following any suitable communication standards, such as New Radio (NR) , Long Term Evolution (LTE) , LTE-Advanced (LTE-A) , Wideband Code Division Multiple Access (WCDMA) , High-Speed Packet Access (HSPA) , and so on.
- NR New Radio
- LTE Long Term Evolution
- LTE-A LTE-Advanced
- WCDMA Wideband Code Division Multiple Access
- HSPA High-Speed Packet Access
- the communications between a terminal device and a network device in the communication network may be performed according to any suitable generation communication protocols, including, but not limited to, the first generation (1G) , the second generation (2G) , 2.5G, 2.75G, the third generation (3G) , the fourth generation (4G) , 4.5G, the future fifth generation (5G) communication protocols, and/or any other protocols either currently known or to be developed in the future.
- Embodiments of the present disclosure may be applied in various communication systems. Given the rapid development in communications, there will of course also be future type communication technologies and systems with which the present disclosure may be embodied. It should not be seen as limiting the scope of the present disclosure to only the aforementioned system. For the purpose of illustrations, embodiments of the present disclosure will be described with reference to 5G communication system.
- the term “network device” used herein includes, but not limited to, a base station (BS) , a gateway, a registration management entity, and other suitable device in a communication system.
- base station or “BS” represents a node B (NodeB or NB) , an evolved NodeB (eNodeB or eNB) , a NR NB (also referred to as a gNB) , a Remote Radio Unit (RRU) , a radio header (RH) , a remote radio head (RRH) , a relay, a low power node such as a femto, a pico, and so forth.
- NodeB or NB node B
- eNodeB or eNB evolved NodeB
- NR NB also referred to as a gNB
- RRU Remote Radio Unit
- RH radio header
- RRH remote radio head
- relay a low power node such as a femto, a pico
- terminal device used herein includes, but not limited to, “user equipment (UE) ” and other suitable end device capable of communicating with the network device.
- the “terminal device” may refer to a terminal, a Mobile Terminal (MT) , a Subscriber Station (SS) , a Portable Subscriber Station, a Mobile Station (MS) , or an Access Terminal (AT) .
- MT Mobile Terminal
- SS Subscriber Station
- MS Mobile Station
- AT Access Terminal
- circuitry used herein may refer to one or more or all of the following:
- circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware.
- circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in server, a cellular network device, or other computing or network device.
- a RACH transmission occasion is defined as the time-frequency resource on which a PRACH message 1 is transmitted using the configured PRACH preamble format.
- the user equipment (UE) 110 may transmit 1010 the RACH preamble on a PRACH resource which is mapped to a RA-RNTI and the network device may decode the preamble and obtain the RA-RNTI depending on the PRACH resource where the preamble is received.
- the gNB 120 may transmit 1020 message 2 which may indicate the transmission resource of message 3.
- the gNB 120 may transmit RA response scheduled with PDCCH addressed the RA-RNTI which is calculated from the PRACH resource (for example, time and/or frequency allocation) .
- the UE 110 may decode the RA response and obtain the transmission resource for message3.
- the UE 110 may transmit 1030 a radio resource control (RRC) connection request as message3 scrambled by T-CRNTI obtained from the RA response (message2) .
- RRC radio resource control
- the gNB 120 may response 1040 a contention resolution ID (containing the UL CCCH SDU in msg3) in message4 scrambled by T-CRNTI obtained from the RA response (message2) and T-CRNTI is considered as C-RNTI by the UE upon reception of the message 4.
- two-step RACH has also been proposed, which is shown in Fig. 2.
- the UE 210 transmits 2010 messageA to the gNB 220 and the gNB 220 transmits 2020 messageB to the UE 210.
- two-step RACH combines the transmission of preamble and the message3 payload into messageA, and combines RAR and contention resolution message into messageB.
- the messageA is a signal to detect the UE while the second message is for contention resolution for CBRA with a possible payload.
- the messageA will at least include the equivalent information which is transmitted in message3 for four-step RACH.
- the contention resolution in two-step RACH will be performed by including a UE identifier in the first message (i.e. messageA) which is echoed in the second message (i.e. messageB) .
- Fall-back from two-step RACH to four-step RACH will be supported.
- the fallback after messageA transmission is feasible only if detection of the UE without the decoding of the payload is possible and thus relies on such support at the physical layer.
- the parameters for two-step RACH procedure including resources for messageA will be broadcasted.
- the network can configure different PRACH resources or different preambles for four-step RACH and two-step RACH.
- the RA-RNTI associated with the PRACH in which the Random Access Preamble is transmitted is computed uniquely as:
- RA-RNTI 1 + s_id + 14 ⁇ t_id + 14 ⁇ 80 ⁇ f_id + 14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id (1)
- s_id is the index of the first OFDM symbol of the specified PRACH (0 ⁇ s_id ⁇ 14)
- t_id is the index of the first slot of the specified PRACH in a system frame (0 ⁇ t_id ⁇ 80)
- f_id is the index of the specified PRACH in the frequency domain (0 ⁇ f_id ⁇ 8)
- ul_carrier_id is the UL carrier used for Messagel transmission (0 for NUL carrier, and 1 for SUL carrier) .
- Contention resolution for four-step RACH is addressed to either Temporary C-RNTI or C-RNTI depending on whether the UE already has C-RNTI allocated and included C-RNTI MAC CE in the message3. Both cannot be used for two-step RACH.
- C-RNTI is not applicable to two-step RACH from IDLE mode initial when the UE does not have C-RNTI allocated yet.
- Temporary C-RNTI is allocated in message2 of the four-step RACH hence not applicable to two-step RACH.
- the terminal devices transmit random access requests and the network device transmits one response to the random access requests which comprises the identity information of terminal devices which succeed in the RACH.
- the terminal devices transmit random access requests in random access channels and the network device transmits the response to the random access requests on the downlink control channel addressed to the common identifier.
- CR-RNTI contention resolution radio network temporary identifier
- PRACH physical RACH
- Fig. 3 illustrates a schematic diagram of a communication system 300 in which embodiments of the present disclosure can be implemented.
- the communication system 300 which is a part of a communication network, comprises terminal devices 310-1, 310-2, ..., 310-N (collectively referred to as “terminal device (s) 310” where N is an integer number) .
- the communication system 300 comprises one or more network devices, for example, a network device 320. It should be understood that the communication system 300may also comprise other elements which are omitted for the purpose of clarity. It is to be understood that the numbers of terminal devices and network devices shown in Fig. 3 are given for the purpose of illustration without suggesting any limitations.
- the network device 320 may communicate with the terminal devices 310.
- Communications in the communication system 300 may be implemented according to any proper communication protocol (s) , including, but not limited to, cellular communication protocols of the first generation (1G) , the second generation (2G) , the third generation (3G) , the fourth generation (4G) and the fifth generation (5G) and on the like, wireless local network communication protocols such as Institute for Electrical and Electronics Engineers (IEEE) 802.11 and the like, and/or any other protocols currently known or to be developed in the future.
- s including, but not limited to, cellular communication protocols of the first generation (1G) , the second generation (2G) , the third generation (3G) , the fourth generation (4G) and the fifth generation (5G) and on the like, wireless local network communication protocols such as Institute for Electrical and Electronics Engineers (IEEE) 802.11 and the like, and/or any other protocols currently known or to be developed in the future.
- IEEE Institute for Electrical and Electronics Engineers
- the communication may utilize any proper wireless communication technology, including but not limited to: Code Divided Multiple Address (CDMA) , Frequency Divided Multiple Address (FDMA) , Time Divided Multiple Address (TDMA) , Frequency Divided Duplexer (FDD) , Time Divided Duplexer (TDD) , Multiple-Input Multiple-Output (MIMO) , Orthogonal Frequency Divided Multiple Access (OFDMA) and/or any other technologies currently known or to be developed in the future.
- CDMA Code Divided Multiple Address
- FDMA Frequency Divided Multiple Address
- TDMA Time Divided Multiple Address
- FDD Frequency Divided Duplexer
- TDD Time Divided Duplexer
- MIMO Multiple-Input Multiple-Output
- OFDMA Orthogonal Frequency Divided Multiple Access
- Fig. 4 illustrates a schematic diagram of interactions 400 in accordance with embodiments of the present disclosure.
- the interactions 400 may be implemented at any suitable devices. Only for the purpose of illustrations, the interactions 400 are described to be implemented at the terminal device 310-1 and the network device 320.
- the terminal device 310-1 transmits 405 one or more random access request (also referred to as “message A” ) to the network device 320.
- the random access request comprises a preamble for random access procedure.
- the preamble is transmitted on a random access channel, for example, physical random access channel (PRACH) .
- PRACH physical random access channel
- the terminal device 310-1 may determine the PRACH and preamble based on predetermined configurations.
- the terminal device 310-1 may be configured with information indicating PRACHs and/or preambles used for two-step RACH.
- the random access request comprises identity information of the terminal device 310-1.
- the identity information may be transmitted on a physical uplink shared channel (PUSCH) .
- PUSCH physical uplink shared channel
- the identity information may be a common control channel (CCCH) message which contains UE ID, e.g. RRC Setup Request message for idle mode UE or RRC Resume Request for inactive mode UE.
- CCCH common control channel
- the identity information may be the C-RNTI.
- the request may comprise C-RNTI medium access control (MAC) control element (CE) .
- MAC medium access control
- CE control element
- the random access request may also comprise a buffer report (BSR) and/or power headroom report (PHR) .
- BSR buffer report
- PHR power headroom report
- the random access request may further comprise other proper data depending on the size of the request.
- the network device 320 receives the random access requests from one or more terminal devices 310, for example, the terminal devices 310-1 and/or 310-2.
- the network device 320 determines 410 at least one terminal device (referred to as “the target terminal device” ) from the one or more terminal devices 310.
- the target terminal device is successful in random access procedure.
- the random access requests may be from one terminal device. Alternatively, the random access requests may be from different terminal devices.
- the network device 320 may determine 415 the random access channels on which the random access request are received.
- the preambles may be transmitted on different random access channels. In other embodiments, the preambles may be transmitted on a same random access channel.
- the network device 320 may be configured with information indicating a set of predetermined PRACHs used for two-step RACH. If the PRACHs belong to the set of predetermined PRACHs, the network device 320 may determine that the random access requests are used for two-step RACH.
- the network device 320 may be configured with information indicating a set of predetermined preambles used for two-step RACH. If the preambles belong to the set of predetermined preambles, the network device 320 may determine that the random access requests are used for two-step RACH.
- the network device 320 may generate 420 the random access response (messageB) .
- the random access response comprises the identity information of the target terminal device. If the identity information carried in the random access request is the CCCH UE ID of the target terminal device, the network device 320 generates the random access response indicating the CCCH UE ID.
- the random access response may comprise the CCCH MAC CE as contention resolution.
- the random access response may comprise C-RNTI field to allocate C-RNTI to target the terminal device.
- the network device 320 if the identity information carried in the random access request is the C-RNTI of the target terminal device, the network device 320 generates the random access response indicating the C-RNTI MAC CE in the message if it is not scheduled with PDCCH addressed to C-RNTI.
- the random access response may comprise the C-RNTI MAC CE as contention resolution.
- the random access response maybe scheduled with PDCCH addressed to C-RNTI without indicating the C-RNTI MAC CE in the message.
- the identifier may be common to requests received on different random access channels. Alternatively, the identifier may also be common to all requests received on the random access channels. In an example embodiment, one common specific RNTI, contention resolution RNTI (CR-RNTI) may be configured for transmitting the random access responses, instead of linking the response to the PRACH occasion where the preamble for random access request is sent.
- CR-RNTI contention resolution RNTI
- finer granularity than only one common specific RNTI may be defined for CR-RNTI. In this way, it reduces decoding efforts for the terminal devices which are not responded by the network device 320. For example one RNTI for each subframe/slot within a radio frame.
- the CR-RNTI may be preconfigured to the network device 320 and the terminal devices 310 or fixed in the specification.
- the network device 320 may determine 425 a physical downlink control channel for transmitting the random access response.
- the downlink control channel is scrambled with an identifier.
- the downlink control channel is scrambled with the CR-RNTI. In other embodiments, if the network device 320 knows the C-RNTI of the terminal device 310-1, the downlink control channel is scrambled with the C-RNTI. In this way, the number of RNTIs may be reduced, thus saving RNTI space used for RA procedure.
- the network device 320 transmits 430 the random access response (also referred to as “message B” ) to the terminal device 310-1.
- the terminal device 310-1 may determine the CR-RNTI and receive the random access response on the PDCCH addressed to the CR-RNTI. For example, the terminal device 310-1 may monitor the PDCCH addressed to CR-RNTI during a configured window time (for example, the contention resolution window) .
- the terminal device 310-1 may determine the C-RNTI and receive the random access response on the PDCCH associated with the C-RNTI. For example, the terminal device 310-1 may monitor the PDCCH addressed to C-RNTI during the configured window time.
- he terminal device 310-1 determines 435 whether the random access procedure is successful. For example, if the terminal device 310-1 determines that the random access response comprises the identity information of the terminal device 310-1, the terminal device 310-1 may determine that the random access procedure of the terminal device 310-1 is successful.
- the terminal device 310-1 may determine that this attempt of the random access procedure of the terminal device 310-1 is not successful.
- the terminal device 310-1 may monitor the downlink control channel until the timer for the random access response expires. In some embodiments, the terminal device 310-1 may stop monitoring the random access response before the expire of the timer, if the random access response comprising a further indication indicating there is no further random access response to the random access request.
- the random access response may comprise an indication indicating that a further random access response to the random access request, the terminal device 310-1 may monitor the further random access response within the window.
- the further random response may be for a particular PRACH resource, for example, PRACH occasion, preamble, slot/subframe number. In this way, the terminal device 310-1 does not have to wait and can immediately transmit a further random access request.
- Fig. 5 illustrates a flow chart of a method 500 in accordance with embodiments of the present disclosure.
- the method 500 may be implemented at any suitable devices. Only for the purpose of illustrations, the method 500 is described to be implemented at the terminal device 310-1.
- the terminal device 310-1 transmits the random access request to the network device 320.
- the random access request comprises at least one preamble for random access procedure.
- the preamble may be transmitted on a random access channel, for example, PRACH.
- the terminal device 310-1 may determine the random access channel based on predetermined configurations. For example, the terminal device 310-1 may be configured with information indicating PRACHs used for two-step RACH.
- the random access request comprises identity information of the terminal device 310-1.
- the identity information may be transmitted on a physical uplink shared channel (PUSCH) .
- PUSCH physical uplink shared channel
- the identity information may be a common control channel (CCCH) UE ID.
- the terminal device 310-1 has a cell radio network temporary identifier (C-RNTI) , for example, the terminal device 310-1 may be in a connected mode, the identity information may be the C-RNTI.
- the request may comprise C-RNTI medium access control (MAC) control element (CE) .
- MAC medium access control
- CE control element
- the random access request may also comprise a buffer report (BSR) and/or power headroom report (PHR) .
- BSR buffer report
- PHR power headroom report
- the random access request may further comprise other proper data depending on the size of the request.
- the terminal device 310-1 receives the random access response scheduled by a downlink control channel scrambled with the identifier from the network device 320.
- the random access response comprises the identity information of the at least one of the one or more terminal devices which succeed in the random access procedure.
- the one or more terminal devices transmit preambles to the network device 320.
- the identifier being used for scrambling downlink control channels associated with the one or more terminal devices.
- the terminal device 310-1 may determine the CR-RNTI and receive the random access response on the PDCCH addressed to the CR-RNTI. For example, the terminal device 310-1 may monitor the PDCCH addressed to CR-RNTI during a configured window time (for example, the contention resolution window) . Alternatively, the terminal device 310-1 may determine the C-RNTI and receive the random access response on the PDCCH addressed to the C-RNTI. For example, the terminal device 310-1 may monitor the PDCCH addressed to C-RNTI during the configured window time.
- a configured window time for example, the contention resolution window
- the random access response may indicate the CCCH UE ID.
- the random access response may comprise the CCCH MAC CE as contention resolution.
- the random access response may comprise C-RNTI MAC CE to allocate C-RNTI to target the terminal device.
- the random access response may indicate the C-RNTI.
- the random access response may comprise the C-RNTI MAC CE as contention resolution.
- the terminal device 310-1 determines whether the identity information of the terminal device 310-1 is in the random access response in order to determine random access procedure of the terminal device 310-1 is successful. If the terminal device 310-1 determines that the random access response comprises the identity information of the terminal device 310-1, the terminal device 310-1 may determine, at block 540, that the random access procedure of the terminal device 310-1 is successful.
- the terminal device 310-1 may monitor the downlink control channel until the timer for the random access response expires. In some embodiments, the terminal device 310-1 may stop monitoring the random access response before the expire of the timer, if the random access response comprising a further indication indicating there is no further random access response to the random access request.
- the terminal device 310-1 may determine that the random access procedure of the terminal device 310-1 is not successful.
- an apparatus for performing the method 600 may comprise respective means for performing the corresponding steps in the method 500.
- These means may be implemented in any suitable manners. For example, it can be implemented by circuitry or software modules.
- the apparatus comprises means for transmitting, at a terminal device, a random access request to a network device, the random access request comprising at least one preamble for a random access procedure and identity information of the terminal device; means for receiving, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier, the random access response comprising identity information of at least one of one or more terminal devices, the one or more terminal devices transmitting preambles for random access procedures to the network device on random access channels, the identifier being used for scrambling downlink control channels associated with the one or more terminal devices and means for in response to determining that the random access response comprising the identity information of the terminal device, determining that the random access procedure of the terminal device is successful.
- the identifier is common to a plurality of random access channels in the random access channels.
- the identifier is common to all of the random access channels.
- the mean for receiving the random access response comprises: means for determining the identifier to be a contention resolution radio network temporary identifier (CR-RNTI) ; and means for receiving the random access response on the downlink control channel addressed to the CR-RNTI.
- CR-RNTI contention resolution radio network temporary identifier
- the means for receiving the random access response comprises: means for determining the identifier to be a cell radio network temporary identifier (C-RNTI) ; and means for receiving the random access response on the downlink control channel addressed to the C-RNTI.
- C-RNTI cell radio network temporary identifier
- the means for transmitting the identity information comprises: means for in response to the terminal device being in an idle mode or an inactive mode, transmitting the identity information comprising a common control channel (CCCH) user equipment (UE) ID; or means for in response to the terminal device being in a connected mode, transmitting the identity information comprising a cell radio network temporary identifier (C-RNTI) medium access control (MAC) control element (CE) .
- C-RNTI cell radio network temporary identifier
- CE medium access control element
- the random access request further comprises at least one of: a buffer status report (BSR) , or a power headroom report.
- BSR buffer status report
- the apparatus further comprises at least one of: means for in response to determining that the random access response excluding the identity information of the terminal device, determine that the random access request of the terminal device is failed; and means for in response to the random access response comprising an indication indicating a further random access response to the random access request, monitor the further random access response.
- the random access response comprises at least one of: a CCH MAC CE, or a C-RNTI MAC CE.
- the apparatus further comprises: means for in response to the random access response comprising a further indication indicating there is no further random access response to the random access request, stopping monitoring the downlink control channel before an expire of a time for the random access response.
- the apparatus further comprises: means for monitoring the downlink control channel until an expiration of a time for the random access response.
- Fig. 6 illustrates a flow chart of a method 600 in accordance with embodiments of the present disclosure.
- the method 600 may be implemented at any suitable devices. Only for the purpose of illustrations, the method 600 is described to be implemented at the network device 120.
- the network device 320 receives random access requests from the one or more terminal devices 310-1.
- the random access requests comprise preambles for random access procedure of the one or more terminal devices.
- the preambles may be received on random access channels. In some embodiments, the preambles may be received on different random access channels. In other embodiments, the preambles may be received on the same random access channel.
- the random access request comprises identity information of the terminal devices 310.
- the identity information may be received on a physical uplink shared channel (PUSCH) .
- PUSCH physical uplink shared channel
- the identity information may be a common control channel (CCCH) UE ID.
- the terminal devices 310 have a cell radio network temporary identifier (C-RNTI) , for example, the terminal device 310-1 may be in a connected mode, the identity information may be the C-RNTI.
- the request may comprise C-RNTI medium access control (MAC) control element (CE) .
- MAC medium access control
- CE control element
- the random access request may also comprise a buffer report (BSR) and/or power headroom report (PHR) .
- BSR buffer report
- PHR power headroom report
- the random access request may further comprise other proper data depending on the size of the request.
- the network device 320 may determine the random accesses channels on which the random access request is received. In some embodiments, the network device 320 may be configured with information indicating a set of predetermined random accesses channels used for two-step RACH. If the random accesses channels belong to the set of predetermined random accesses channels, the network device 320 may determine that the random access requests are used for two-step RACH.
- the network device 320 may be configured with information indicating a set of predetermined preambles used for two-step RACH. If the preambles belong to the set of predetermined preambles, the network device 320 may determine that the random access requests are used for two-step RACH.
- the network device 320 may generate the random access response.
- the random access response comprises the identity information of the target terminal device. If the identity information carried in the random access request is the CCCH UE ID of the target terminal device, the network device 320 generates the random access response indicating the CCCH UE ID.
- the random access response may comprise the CCCH MAC CE as contention resolution.
- the random access response may comprise C-RNTI filed to allocate C-RNTI to target the terminal device.
- the network device 320 if the identity information carried in the random access request is the C-RNTI of the target terminal device, the network device 320 generates the random access response indicating the C-RNTI.
- the random access response may comprise the C-RNTI MAC CE as contention resolution if the random access is not scheduled by PDCCH addressed to C-RNTI, but with contention resolution RNTI.
- one common specific RNTI contention resolution RNTI (CR-RNTI) may be configured for transmitting the random access response, instead of linking the response to the PRACH occasion where the preamble for random access request is sent.
- CR-RNTI contention resolution RNTI
- finer granularity than only one common specific RNTI may be defined for CR-RNTI. In this way, it reduces access efforts for the terminal devices which are not responded by the network device 320. For example one RNTI for each subframe/slot within a radio frame.
- the CR-RNTI may be preconfigured to the network device 320 and the terminal devices 310.
- the network device 320 may determine a physical downlink control channel (PDCCH) for transmitting the random access response.
- the PDCCH is addressed to the CR-RNTI.
- the PDCCH is addressed to the C-RNTI. In this way, the number of RNTIs may be reduced, thus saving space.
- the network device 320 transmits the random access response to the terminal device 310-1.
- the random access response is scheduled by the downlink control channel which is scrambled with the identifier.
- the PDCCH may be scrambled with the CR-RNTI.
- the PDCCH may be scrambled with the C-RNTI.
- the identifier is common to a plurality of random access channels in the random access channels. Alternatively, the identifier is common to all of the random access channels.
- an apparatus for performing the method 600 may comprise respective means for performing the corresponding steps in the method 600.
- These means may be implemented in any suitable manners. For example, it can be implemented by circuitry or software modules.
- the apparatus comprises: means for receiving, at a network device, random access requests from one or more terminal devices, the random access requests comprising preambles for random access procedures of the one or more the terminal devices and identity information of the one or more terminal devices, the preambles being transmitted on random access channels; and means for transmitting a random access response to the one or more terminal devices on a downlink control channel scrambled with an identifier, the random access response comprising identity information of the at least one of the one or more terminal devices to indicate that the random access procedure of the at least one of the one or more terminal devices is successful, the identifier being used for scrambling downlink control channels associated with the one or more terminal devices.
- the identity information of the plurality of terminal devices comprises at least one of: common control channel (CCCH) user equipment (UE) IDs of the plurality of terminal devices, or cell radio network temporary identifier (C-RNTI) medium access control (MAC) control elements (CEs) of the one or more of terminal devices.
- CCCH common control channel
- UE user equipment
- C-RNTI cell radio network temporary identifier
- MAC medium access control
- the random access request further comprises at least one of: a buffer status report (BSR) , or power headroom report (PHR) .
- BSR buffer status report
- PHR power headroom report
- the apparatus further comprises: means for determining whether a further random access response is needed; and means for in response to determining that the further random access response is needed, adding into the random access response an indication indicating the further random access response.
- the means for transmitting the random access response comprises: means for determining physical random access channels (PRACHs) on which the preambles are received; means for comparing the PRACHs with a set of predetermined PRACHs; means for in response to the PRACHs belong to the set of predetermined PRACHs, determining the downlink control channel addressed to the identifier; and means for transmitting the random access response on the downlink control channel.
- PRACHs physical random access channels
- the means for transmitting the random access response comprises: means for comparing the preambles with a set of predetermined preambles; means for in response to the preambles belonging to the set of predetermined preambles, determining the downlink control channel addressed to the identifier; and means for transmitting the random access response on the downlink control channel.
- the means for transmitting the random access response comprises: means for in response to the identity information of the at least one of the terminal devices device being a common control channel (CCCH) user equipment (UE) ID, generating the random access response indicating the CCH ID of the at least one of the terminal devices device; or means for in response to the identity information of the at least one of the terminal devices device being a cell radio network temporary identifier (C-RNTI) , generating the random access response indicating the C-RNTI of the at least one of the terminal devices device.
- CCCH common control channel
- UE user equipment
- C-RNTI cell radio network temporary identifier
- Fig. 7 is a simplified block diagram of a device 700 that is suitable for implementing embodiments of the present disclosure.
- the device 700 may be implemented at the network device 320.
- the device 700 may also be implemented at the terminal devices 310.
- the device 700 includes one or more processors 710, one or more memories 720 coupled to the processor (s) 710, one or more transmitters and/or receivers (TX/RX) 740 coupled to the processor 710.
- the processor 710 may be of any type suitable to the local technical network, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples.
- the device 700 may have multiple processors, such as an application specific integrated circuit chip that is slaved in time to a clock which synchronizes the main processor.
- the memory 720 may be of any type suitable to the local technical network and may be implemented using any suitable data storage technology, such as a non-transitory computer readable storage medium, semiconductor based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memory and removable memory, as non-limiting examples.
- the memory 720 stores at least a part of a program 730.
- the device 700 may load the program 730 from the computer readable medium to the RAM for execution.
- the computer readable medium may include any types of tangible non-volatile storage, such as ROM, EPROM, a flash memory, a hard disk, CD, DVD, and the like.
- Fig. 8 shows an example of the computer readable medium 800 in form of CD or DVD.
- the computer readable medium has the program 730 stored thereon.
- the TX/RX 740 is for bidirectional communications.
- the TX/RX 740 has at least one antenna to facilitate communication, though in practice an Access Node mentioned in this application may have several ones.
- the communication interface may represent any interface that is necessary for communication with other network elements.
- the program 730 is assumed to include program instructions that, when executed by the associated processor 710, enable the device 700 to operate in accordance with the embodiments of the present disclosure, as discussed herein with reference to Figs. 5 and 6. That is, embodiments of the present disclosure can be implemented by computer software executable by the processor 710 of the device 700, or by hardware, or by a combination of software and hardware.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Embodiments of the disclosure provide a method, device and computer readable medium for contention resolution in RACH. According to embodiments of the present disclosure, the terminal devices transmit random access requests in random access channels and the network device transmits the response to the random access requests on the downlink control channel addressed to the common identifier. According to embodiments of the present disclosure, there is one to multiple mapping for contention resolution radio network temporary identifier (CR-RNTI) and physical RACH (PRACH). In this way, the number of RNTIs is decreased and the overhead is reduced.
Description
Embodiments of the present disclosure generally relate to communication techniques, and more particularly, to methods, devices and computer readable medium for contention resolution in a random access procedure.
In recent communication networks, a random access channel (RACH) is shared by terminal devices to request access to networks for call set-up and burst data transmission. Since the RACH is shared, it is possible that two or more terminal devices transmit at the same time and their transmissions collide. This is known as contention. If the terminal device does not get response, it performs the random access request again. Such transmission collisions may incur undesirable failure of random access and unexpected delay in transmission.
SUMMARY
Generally, embodiments of the present disclosure relate to a method for contention resolution in a random access procedure and the corresponding communication devices.
In a first aspect, embodiments of the disclosure provide a terminal device. The terminal device comprises: at least on processor; and a memory coupled to the at least one processor, the memory storing instructions therein, the instructions, when executed by the at least one processor, causing the terminal device to: transmit, at the terminal device, a random access request to a network device. The random access request comprising at least one preamble for a random access procedure and identity information of the terminal device. The terminal device is also caused to receive, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier. The one or more terminal devices transmit preambles for random access procedures to the network device on random access channels. The identifier is used for scrambling downlink control channels associated with the terminal devices. The terminal device is further caused to in response to determining that the random access response comprising the identity information of the terminal device, determine that the random access procedure of the terminal device is successful.
In a second aspect, embodiments of the disclosure provide a network device. The network device comprises: at least on processor; and a memory coupled to the at least one processor, the memory storing instructions therein, the instructions, when executed by the at least one processor, causing the network device to: receive, at the network device, random access requests from one or more terminal devices. The random access requests comprise at least preambles for random access procedures of the terminal devices and identity information of the terminal devices. The preambles are transmitted on random access channels. The network device is also caused to transmit a random access response to the terminal devices on a downlink control channel scrambled with an identifier. The random access response comprises identity information of at least one of the terminal device to indicate that the random access procedure of the at least one of the one or more terminal device sis successful. The identifier is used for scrambling downlink control channels associated with the terminal devices.
In a third aspect, embodiments of the present disclosure provide a method. The method comprises: transmitting, at a terminal device, a random access request to a network device. The random access request comprises at least one preamble for a random access procedure and identity information of the terminal device. The method also comprises receiving, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier. The random access response comprises identity information of at least one of terminal devices. The terminal devices transmit preambles for random access procedures to the network device on random access channels. The identifier is used for scrambling downlink control channels associated with the terminal devices. The method further comprises in response to determining that the random access response comprising the identity information of the terminal device, determining that the random access procedure of the terminal device is successful.
In a fourth aspect, embodiments of the present disclosure provide a method. The method comprises: receiving, at a network device, random access requests from one or more terminal devices. The random access requests comprise at least preambles for random access procedures of the terminal devices and identity information of the terminal devices. The preambles are transmitted on random access channels. The method further comprises transmitting a random access response to the terminal devices on a downlink control channel scrambled with an identifier. The random access response comprises identity information of the at least one of the terminal devices to indicate that the random access procedure of the at least one of the terminal devices is successful. The identifier is used for scrambling downlink control channels associated with the terminal devices.
In a fifth aspect, embodiments of the disclosure provide an apparatus. The apparatus comprises means for transmitting, at a terminal device, a random access request to a network device. The random access request comprises at least one preamble for a random access procedure and identity information of the terminal device. The apparatus also comprises means for receiving, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier. The random access response comprises identity information of one or more terminal devices. The terminal devices transmit preambles for random access procedures to the network device on random access channels. The identifier is used for scrambling downlink control channels associated with the terminal devices. The apparatus further comprises means for in response to determining that the random access response comprising the identity information of the terminal device, determining that the random access procedure of the terminal device is successful.
In a sixth aspect, embodiments of the disclosure provide an apparatus. The apparatus comprises means for receiving, at a network device, random access requests fiom one or more terminal devices. The random access requests comprise at least preambles for random access procedures of the terminal devices and identity information of the terminal devices. The preambles are transmitted on random access channels. The apparatus also comprises means for transmitting a random access response to the one or more terminal devices on a downlink control channel scrambled with an identifier. The random access response comprises identity information of the at least one of the terminal devices to indicate that the random access procedure of the at least one of the terminal devices is successful. The identifier is used for scrambling downlink control channels associated with the terminal devices.
In a seventh aspect, embodiments of the disclosure provide a computer readable medium. The computer readable medium stores instructions thereon, the instructions, when executed by at least one processing unit of a machine, causing the machine to implement the method according to the third aspect or the fourth aspect.
Other features and advantages of the embodiments of the present disclosure will also be apparent from the following description of specific embodiments when read in conjunction with the accompanying drawings, which illustrate, by way of example, the principles of embodiments of the disclosure.
Embodiments of the disclosure are presented in the sense of examples and their advantages are explained in greater detail below, with reference to the accompanying drawings, where
Fig. 1 illustrates a schematic diagram of a procedure of a conventional four-step RACH;
Fig. 2 illustrates a schematic diagram of a procedure of a conventional two-step RACH;
Fig. 3 illustrates a schematic diagram of a communication system according to embodiments of the present disclosure;
Fig. 4 illustrates a schematic diagram of interactions among devices according to embodiments of the present disclosure;
Fig. 5 illustrates a flow chart of a method implemented at a communication device according to embodiments of the present disclosure;
Fig. 6 illustrates a flow chart of a method implemented at a communication device according to embodiments of the present disclosure;
Fig. 7 illustrates a schematic diagram of a device according to embodiments of the present disclosure; and
Fig. 8 shows a block diagram of an example computer readable medium in accordance with some embodiments of the present disclosure.
Throughout the figures, same or similar reference numbers indicate same or similar elements.
DETAILED DESCRIPTION OF EMBODIMENTS
The subject matter described herein will now be discussed with reference to several example embodiments. It should be understood these embodiments are discussed only for the purpose of enabling those skilled persons in the art to better understand and thus implement the subject matter described herein, rather than suggesting any limitations on the scope of the subject matter.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a,” “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” “comprising,” “includes” and/or “including, ” when used herein, specify the presence of stated features, integers, steps, operations, elements and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components and/or groups thereof.
It should also be noted that in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two functions or acts shown in succession may in fact be executed concurrently or may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
As used herein, the term “communication network” refers to a network following any suitable communication standards, such as New Radio (NR) , Long Term Evolution (LTE) , LTE-Advanced (LTE-A) , Wideband Code Division Multiple Access (WCDMA) , High-Speed Packet Access (HSPA) , and so on. Furthermore, the communications between a terminal device and a network device in the communication network may be performed according to any suitable generation communication protocols, including, but not limited to, the first generation (1G) , the second generation (2G) , 2.5G, 2.75G, the third generation (3G) , the fourth generation (4G) , 4.5G, the future fifth generation (5G) communication protocols, and/or any other protocols either currently known or to be developed in the future.
Embodiments of the present disclosure may be applied in various communication systems. Given the rapid development in communications, there will of course also be future type communication technologies and systems with which the present disclosure may be embodied. It should not be seen as limiting the scope of the present disclosure to only the aforementioned system. For the purpose of illustrations, embodiments of the present disclosure will be described with reference to 5G communication system.
The term “network device” used herein includes, but not limited to, a base station (BS) , a gateway, a registration management entity, and other suitable device in a communication system. The term “base station” or “BS” represents a node B (NodeB or NB) , an evolved NodeB (eNodeB or eNB) , a NR NB (also referred to as a gNB) , a Remote Radio Unit (RRU) , a radio header (RH) , a remote radio head (RRH) , a relay, a low power node such as a femto, a pico, and so forth.
he term “terminal device” used herein includes, but not limited to, “user equipment (UE) ” and other suitable end device capable of communicating with the network device. By way of example, the “terminal device” may refer to a terminal, a Mobile Terminal (MT) , a Subscriber Station (SS) , a Portable Subscriber Station, a Mobile Station (MS) , or an Access Terminal (AT) .
The term “circuitry” used herein may refer to one or more or all of the following:
(a) hardware-only circuit implementations (such as implementations in only analog and/or digital circuitry) and
(b) combinations of hardware circuits and software, such as (as applicable) :
(i) a combination of analog and/or digital hardware circuit (s) with
software/firmware and
(ii) any portions of hardware processor (s) with software (including digital signal processor (s) ) , software, and memory (ies) that work together to cause an apparatus, such as a mobile phone or server, to perform various functions) and
(c) hardware circuit (s) and or processor (s) , such as a microprocessor (s) or a portion of a microprocessor (s) , that requires software (e.g., firmware) for operation, but the software may not be present when it is not needed for operation. ”
This definition of circuitry applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware. The term circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in server, a cellular network device, or other computing or network device.
As mentioned above, several mechanisms for RACH have been proposed. For example, four-step RACH procedure has been proposed. As shown in Fig. 1, for four-step RACH procedure, a RACH transmission occasion is defined as the time-frequency resource on which a PRACH message 1 is transmitted using the configured PRACH preamble format. The user equipment (UE) 110 may transmit 1010 the RACH preamble on a PRACH resource which is mapped to a RA-RNTI and the network device may decode the preamble and obtain the RA-RNTI depending on the PRACH resource where the preamble is received. The gNB 120 may transmit 1020 message 2 which may indicate the transmission resource of message 3. In particular, the gNB 120 may transmit RA response scheduled with PDCCH addressed the RA-RNTI which is calculated from the PRACH resource (for example, time and/or frequency allocation) . The UE 110 may decode the RA response and obtain the transmission resource for message3. The UE 110 may transmit 1030 a radio resource control (RRC) connection request as message3 scrambled by T-CRNTI obtained from the RA response (message2) . The gNB 120 may response 1040 a contention resolution ID (containing the UL CCCH SDU in msg3) in message4 scrambled by T-CRNTI obtained from the RA response (message2) and T-CRNTI is considered as C-RNTI by the UE upon reception of the message 4.
In recent studies, two-step RACH has also been proposed, which is shown in Fig. 2. The UE 210 transmits 2010 messageA to the gNB 220 and the gNB 220 transmits 2020 messageB to the UE 210. Compared to the traditional four-step RACH with preamble, RAR, message3 and contention resolution message, two-step RACH combines the transmission of preamble and the message3 payload into messageA, and combines RAR and contention resolution message into messageB. For two-step RACH, the messageA is a signal to detect the UE while the second message is for contention resolution for CBRA with a possible payload. The messageA will at least include the equivalent information which is transmitted in message3 for four-step RACH.
As a baseline, all the triggers for four-step RACH are also applicable to two-step RACH; however further analysis is needed on SI request and BFR as well as how timing advance and grants can be obtained for messageA.
The contention resolution in two-step RACH will be performed by including a UE identifier in the first message (i.e. messageA) which is echoed in the second message (i.e. messageB) . Fall-back from two-step RACH to four-step RACH will be supported. The fallback after messageA transmission is feasible only if detection of the UE without the decoding of the payload is possible and thus relies on such support at the physical layer. If two-step RACH is used for initial access, the parameters for two-step RACH procedure including resources for messageA will be broadcasted. The network can configure different PRACH resources or different preambles for four-step RACH and two-step RACH.
For contention resolution and design of RNTI for two-step RACH, studies have been made to reuse what has already been defined for the traditional four-step RACH.
The RA-RNTI associated with the PRACH in which the Random Access Preamble is transmitted, is computed uniquely as:
RA-RNTI= 1 + s_id + 14 × t_id + 14 × 80 × f_id + 14 × 80 × 8 × ul_carrier_id (1)
where s_id is the index of the first OFDM symbol of the specified PRACH (0 ≤ s_id < 14) , t_id is the index of the first slot of the specified PRACH in a system frame (0 ≤ t_id < 80) , f_id is the index of the specified PRACH in the frequency domain (0 ≤ f_id < 8) , and ul_carrier_id is the UL carrier used for Messagel transmission (0 for NUL carrier, and 1 for SUL carrier) . In other words, there is a one-to-one relationship between the RA-RNTI and the PRACH occasion used to transmit the Random Access Preamble.
It has been discussed that the RAR window (currently maximum 10ms) needs to be extended to cope with potential LBT failure, which means the RA-RNTI range will also need to be extended. Similarly, the window for messageB reception will most likely be longer than current RAR window as well. Current RA-RNTI space is already over 19k values, it is undesirable to extend the RA-RNTI further to keep overhead under control.
Contention resolution for four-step RACH is addressed to either Temporary C-RNTI or C-RNTI depending on whether the UE already has C-RNTI allocated and included C-RNTI MAC CE in the message3. Both cannot be used for two-step RACH. C-RNTI is not applicable to two-step RACH from IDLE mode initial when the UE does not have C-RNTI allocated yet. Temporary C-RNTI is allocated in message2 of the four-step RACH hence not applicable to two-step RACH.
According to embodiments of the present disclosure, the terminal devices transmit random access requests and the network device transmits one response to the random access requests which comprises the identity information of terminal devices which succeed in the RACH. According to embodiments of the present disclosure, the terminal devices transmit random access requests in random access channels and the network device transmits the response to the random access requests on the downlink control channel addressed to the common identifier. According to embodiments of the present disclosure, there is one to multiple mapping for contention resolution radio network temporary identifier (CR-RNTI) and physical RACH (PRACH) . In this way, the number of RNTIs is decreased and the overhead is reduced.
Fig. 3 illustrates a schematic diagram of a communication system 300 in which embodiments of the present disclosure can be implemented. The communication system 300, which is a part of a communication network, comprises terminal devices 310-1, 310-2, ..., 310-N (collectively referred to as “terminal device (s) 310” where N is an integer number) . The communication system 300 comprises one or more network devices, for example, a network device 320. It should be understood that the communication system 300may also comprise other elements which are omitted for the purpose of clarity. It is to be understood that the numbers of terminal devices and network devices shown in Fig. 3 are given for the purpose of illustration without suggesting any limitations. The network device 320 may communicate with the terminal devices 310.
Communications in the communication system 300 may be implemented according to any proper communication protocol (s) , including, but not limited to, cellular communication protocols of the first generation (1G) , the second generation (2G) , the third generation (3G) , the fourth generation (4G) and the fifth generation (5G) and on the like, wireless local network communication protocols such as Institute for Electrical and Electronics Engineers (IEEE) 802.11 and the like, and/or any other protocols currently known or to be developed in the future. Moreover, the communication may utilize any proper wireless communication technology, including but not limited to: Code Divided Multiple Address (CDMA) , Frequency Divided Multiple Address (FDMA) , Time Divided Multiple Address (TDMA) , Frequency Divided Duplexer (FDD) , Time Divided Duplexer (TDD) , Multiple-Input Multiple-Output (MIMO) , Orthogonal Frequency Divided Multiple Access (OFDMA) and/or any other technologies currently known or to be developed in the future.
Fig. 4 illustrates a schematic diagram of interactions 400 in accordance with embodiments of the present disclosure. The interactions 400 may be implemented at any suitable devices. Only for the purpose of illustrations, the interactions 400 are described to be implemented at the terminal device 310-1 and the network device 320.
The terminal device 310-1 transmits 405 one or more random access request (also referred to as “message A” ) to the network device 320. The random access request comprises a preamble for random access procedure. The preamble is transmitted on a random access channel, for example, physical random access channel (PRACH) . In some embodiments, the terminal device 310-1 may determine the PRACH and preamble based on predetermined configurations. For example, the terminal device 310-1 may be configured with information indicating PRACHs and/or preambles used for two-step RACH.
In addition, the random access request comprises identity information of the terminal device 310-1. The identity information may be transmitted on a physical uplink shared channel (PUSCH) . In some embodiments, if the terminal device 310-1 is in an idle mode and/or inactive mode, the identity information may be a common control channel (CCCH) message which contains UE ID, e.g. RRC Setup Request message for idle mode UE or RRC Resume Request for inactive mode UE. In other embodiments, if the terminal device 310-1 has a cell radio network temporary identifier (C-RNTI) , for example, the terminal device 310-1 may be in a connected mode, the identity information may be the C-RNTI. The request may comprise C-RNTI medium access control (MAC) control element (CE) .
Alternatively or in addition, the random access request may also comprise a buffer report (BSR) and/or power headroom report (PHR) . The random access request may further comprise other proper data depending on the size of the request.
The network device 320 receives the random access requests from one or more terminal devices 310, for example, the terminal devices 310-1 and/or 310-2. The network device 320 determines 410 at least one terminal device (referred to as “the target terminal device” ) from the one or more terminal devices 310. The target terminal device is successful in random access procedure. The random access requests may be from one terminal device. Alternatively, the random access requests may be from different terminal devices.
In some embodiments, the network device 320 may determine 415 the random access channels on which the random access request are received. In some embodiments, the preambles may be transmitted on different random access channels. In other embodiments, the preambles may be transmitted on a same random access channel.
In some embodiments, the network device 320 may be configured with information indicating a set of predetermined PRACHs used for two-step RACH. If the PRACHs belong to the set of predetermined PRACHs, the network device 320 may determine that the random access requests are used for two-step RACH.
Alternatively or in addition, the network device 320 may be configured with information indicating a set of predetermined preambles used for two-step RACH. If the preambles belong to the set of predetermined preambles, the network device 320 may determine that the random access requests are used for two-step RACH.
The network device 320 may generate 420 the random access response (messageB) . The random access response comprises the identity information of the target terminal device. If the identity information carried in the random access request is the CCCH UE ID of the target terminal device, the network device 320 generates the random access response indicating the CCCH UE ID. For example, the random access response may comprise the CCCH MAC CE as contention resolution. Alternatively or in addition, the random access response may comprise C-RNTI field to allocate C-RNTI to target the terminal device.
In other embodiments, if the identity information carried in the random access request is the C-RNTI of the target terminal device, the network device 320 generates the random access response indicating the C-RNTI MAC CE in the message if it is not scheduled with PDCCH addressed to C-RNTI. For example, the random access response may comprise the C-RNTI MAC CE as contention resolution. Alternatively, the random access response maybe scheduled with PDCCH addressed to C-RNTI without indicating the C-RNTI MAC CE in the message.
The identifier may be common to requests received on different random access channels. Alternatively, the identifier may also be common to all requests received on the random access channels. In an example embodiment, one common specific RNTI, contention resolution RNTI (CR-RNTI) may be configured for transmitting the random access responses, instead of linking the response to the PRACH occasion where the preamble for random access request is sent.
In another embodiment, finer granularity than only one common specific RNTI may be defined for CR-RNTI. In this way, it reduces decoding efforts for the terminal devices which are not responded by the network device 320. For example one RNTI for each subframe/slot within a radio frame. The CR-RNTI may be preconfigured to the network device 320 and the terminal devices 310 or fixed in the specification.
The network device 320 may determine 425 a physical downlink control channel for transmitting the random access response. The downlink control channel is scrambled with an identifier.
In some embodiments, the downlink control channel is scrambled with the CR-RNTI. In other embodiments, if the network device 320 knows the C-RNTI of the terminal device 310-1, the downlink control channel is scrambled with the C-RNTI. In this way, the number of RNTIs may be reduced, thus saving RNTI space used for RA procedure.
The network device 320 transmits 430 the random access response (also referred to as “message B” ) to the terminal device 310-1. In some embodiments, the terminal device 310-1 may determine the CR-RNTI and receive the random access response on the PDCCH addressed to the CR-RNTI. For example, the terminal device 310-1 may monitor the PDCCH addressed to CR-RNTI during a configured window time (for example, the contention resolution window) . Alternatively, the terminal device 310-1 may determine the C-RNTI and receive the random access response on the PDCCH associated with the C-RNTI. For example, the terminal device 310-1 may monitor the PDCCH addressed to C-RNTI during the configured window time.
he terminal device 310-1 determines 435 whether the random access procedure is successful. For example, if the terminal device 310-1 determines that the random access response comprises the identity information of the terminal device 310-1, the terminal device 310-1 may determine that the random access procedure of the terminal device 310-1 is successful.
In some embodiments, if the terminal device 310-1 determines that the random access response does not comprise the identity information of the terminal device 310-1, the terminal device 310-1 may determine that this attempt of the random access procedure of the terminal device 310-1 is not successful.
In this way, a limited number of RNTIs is needed for the random access scheduling instead of tens of thousands of RNTIs. In addition, the overhead of the random access response is reduced.
In some embodiments, the terminal device 310-1 may monitor the downlink control channel until the timer for the random access response expires. In some embodiments, the terminal device 310-1 may stop monitoring the random access response before the expire of the timer, if the random access response comprising a further indication indicating there is no further random access response to the random access request.
In addition, in some embodiments, the random access response may comprise an indication indicating that a further random access response to the random access request, the terminal device 310-1 may monitor the further random access response within the window. The further random response may be for a particular PRACH resource, for example, PRACH occasion, preamble, slot/subframe number. In this way, the terminal device 310-1 does not have to wait and can immediately transmit a further random access request.
Fig. 5 illustrates a flow chart of a method 500 in accordance with embodiments of the present disclosure. The method 500 may be implemented at any suitable devices. Only for the purpose of illustrations, the method 500 is described to be implemented at the terminal device 310-1.
At block 510, the terminal device 310-1 transmits the random access request to the network device 320. The random access request comprises at least one preamble for random access procedure. The preamble may be transmitted on a random access channel, for example, PRACH. In some embodiments, the terminal device 310-1 may determine the random access channel based on predetermined configurations. For example, the terminal device 310-1 may be configured with information indicating PRACHs used for two-step RACH.
In addition, the random access request comprises identity information of the terminal device 310-1. The identity information may be transmitted on a physical uplink shared channel (PUSCH) . In some embodiments, if the terminal device 310-1 is in an idle mode and/or inactive mode, the identity information may be a common control channel (CCCH) UE ID. In other embodiments, if the terminal device 310-1 has a cell radio network temporary identifier (C-RNTI) , for example, the terminal device 310-1 may be in a connected mode, the identity information may be the C-RNTI. The request may comprise C-RNTI medium access control (MAC) control element (CE) .
Alternatively or in addition, the random access request may also comprise a buffer report (BSR) and/or power headroom report (PHR) . The random access request may further comprise other proper data depending on the size of the request.
At block 520, the terminal device 310-1 receives the random access response scheduled by a downlink control channel scrambled with the identifier from the network device 320. The random access response comprises the identity information of the at least one of the one or more terminal devices which succeed in the random access procedure. The one or more terminal devices transmit preambles to the network device 320. The identifier being used for scrambling downlink control channels associated with the one or more terminal devices.
In some embodiments, the terminal device 310-1 may determine the CR-RNTI and receive the random access response on the PDCCH addressed to the CR-RNTI. For example, the terminal device 310-1 may monitor the PDCCH addressed to CR-RNTI during a configured window time (for example, the contention resolution window) . Alternatively, the terminal device 310-1 may determine the C-RNTI and receive the random access response on the PDCCH addressed to the C-RNTI. For example, the terminal device 310-1 may monitor the PDCCH addressed to C-RNTI during the configured window time.
If the identity information carried in the random access request is the CCCH UE ID of the target terminal device, the random access response may indicate the CCCH UE ID. For example, the random access response may comprise the CCCH MAC CE as contention resolution. Alternatively or in addition, the random access response may comprise C-RNTI MAC CE to allocate C-RNTI to target the terminal device.
In other embodiments, if the identity information carried in the random access request is the C-RNTI of the target terminal device, the random access response may indicate the C-RNTI. For example, the random access response may comprise the C-RNTI MAC CE as contention resolution.
At block 530, the terminal device 310-1 determines whether the identity information of the terminal device 310-1 is in the random access response in order to determine random access procedure of the terminal device 310-1 is successful. If the terminal device 310-1 determines that the random access response comprises the identity information of the terminal device 310-1, the terminal device 310-1 may determine, at block 540, that the random access procedure of the terminal device 310-1 is successful.
In some embodiments, the terminal device 310-1 may monitor the downlink control channel until the timer for the random access response expires. In some embodiments, the terminal device 310-1 may stop monitoring the random access response before the expire of the timer, if the random access response comprising a further indication indicating there is no further random access response to the random access request.
In some embodiments, if the terminal device 310-1 determines that the random access response does not comprise the identity information of the terminal device 310-1, the terminal device 310-1 may determine that the random access procedure of the terminal device 310-1 is not successful.
In some embodiments, an apparatus for performing the method 600 (for example, the terminal device 310-1) may comprise respective means for performing the corresponding steps in the method 500. These means may be implemented in any suitable manners. For example, it can be implemented by circuitry or software modules.
In some embodiments, the apparatus comprises means for transmitting, at a terminal device, a random access request to a network device, the random access request comprising at least one preamble for a random access procedure and identity information of the terminal device; means for receiving, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier, the random access response comprising identity information of at least one of one or more terminal devices, the one or more terminal devices transmitting preambles for random access procedures to the network device on random access channels, the identifier being used for scrambling downlink control channels associated with the one or more terminal devices and means for in response to determining that the random access response comprising the identity information of the terminal device, determining that the random access procedure of the terminal device is successful.
In some embodiments, the identifier is common to a plurality of random access channels in the random access channels.
In some embodiments, the identifier is common to all of the random access channels.
In some embodiments, the mean for receiving the random access response comprises: means for determining the identifier to be a contention resolution radio network temporary identifier (CR-RNTI) ; and means for receiving the random access response on the downlink control channel addressed to the CR-RNTI.
In some embodiments, the means for receiving the random access response comprises: means for determining the identifier to be a cell radio network temporary identifier (C-RNTI) ; and means for receiving the random access response on the downlink control channel addressed to the C-RNTI.
In some embodiments, the means for transmitting the identity information comprises: means for in response to the terminal device being in an idle mode or an inactive mode, transmitting the identity information comprising a common control channel (CCCH) user equipment (UE) ID; or means for in response to the terminal device being in a connected mode, transmitting the identity information comprising a cell radio network temporary identifier (C-RNTI) medium access control (MAC) control element (CE) .
In some embodiments, the random access request further comprises at least one of: a buffer status report (BSR) , or a power headroom report.
In some embodiments, the apparatus further comprises at least one of: means for in response to determining that the random access response excluding the identity information of the terminal device, determine that the random access request of the terminal device is failed; and means for in response to the random access response comprising an indication indicating a further random access response to the random access request, monitor the further random access response.
In some embodiments, the random access response comprises at least one of: a CCH MAC CE, or a C-RNTI MAC CE.
In some embodiment, the apparatus further comprises: means for in response to the random access response comprising a further indication indicating there is no further random access response to the random access request, stopping monitoring the downlink control channel before an expire of a time for the random access response.
In some embodiment, the apparatus further comprises: means for monitoring the downlink control channel until an expiration of a time for the random access response.
Fig. 6 illustrates a flow chart of a method 600 in accordance with embodiments of the present disclosure. The method 600 may be implemented at any suitable devices. Only for the purpose of illustrations, the method 600 is described to be implemented at the network device 120.
At block 610, the network device 320 receives random access requests from the one or more terminal devices 310-1. The random access requests comprise preambles for random access procedure of the one or more terminal devices. The preambles may be received on random access channels. In some embodiments, the preambles may be received on different random access channels. In other embodiments, the preambles may be received on the same random access channel.
In addition, the random access request comprises identity information of the terminal devices 310. The identity information may be received on a physical uplink shared channel (PUSCH) . In some embodiments, if the terminal devices are in an idle mode and/or inactive mode, the identity information may be a common control channel (CCCH) UE ID. In other embodiments, if the terminal devices 310 have a cell radio network temporary identifier (C-RNTI) , for example, the terminal device 310-1 may be in a connected mode, the identity information may be the C-RNTI. The request may comprise C-RNTI medium access control (MAC) control element (CE) .
Alternatively or in addition, the random access request may also comprise a buffer report (BSR) and/or power headroom report (PHR) . The random access request may further comprise other proper data depending on the size of the request.
In some embodiments, the network device 320 may determine the random accesses channels on which the random access request is received. In some embodiments, the network device 320 may be configured with information indicating a set of predetermined random accesses channels used for two-step RACH. If the random accesses channels belong to the set of predetermined random accesses channels, the network device 320 may determine that the random access requests are used for two-step RACH.
In some embodiments, the network device 320 may be configured with information indicating a set of predetermined preambles used for two-step RACH. If the preambles belong to the set of predetermined preambles, the network device 320 may determine that the random access requests are used for two-step RACH.
In some embodiments, the network device 320 may generate the random access response. The random access response comprises the identity information of the target terminal device. If the identity information carried in the random access request is the CCCH UE ID of the target terminal device, the network device 320 generates the random access response indicating the CCCH UE ID. For example, the random access response may comprise the CCCH MAC CE as contention resolution. Alternatively or in addition, the random access response may comprise C-RNTI filed to allocate C-RNTI to target the terminal device.
In other embodiments, if the identity information carried in the random access request is the C-RNTI of the target terminal device, the network device 320 generates the random access response indicating the C-RNTI. For example, the random access response may comprise the C-RNTI MAC CE as contention resolution if the random access is not scheduled by PDCCH addressed to C-RNTI, but with contention resolution RNTI.
In an example embodiment, one common specific RNTI, contention resolution RNTI (CR-RNTI) may be configured for transmitting the random access response, instead of linking the response to the PRACH occasion where the preamble for random access request is sent.
In another embodiment, finer granularity than only one common specific RNTI may be defined for CR-RNTI. In this way, it reduces access efforts for the terminal devices which are not responded by the network device 320. For example one RNTI for each subframe/slot within a radio frame. The CR-RNTI may be preconfigured to the network device 320 and the terminal devices 310.
The network device 320 may determine a physical downlink control channel (PDCCH) for transmitting the random access response. In some embodiments, the PDCCH is addressed to the CR-RNTI. In other embodiments, the PDCCH is addressed to the C-RNTI. In this way, the number of RNTIs may be reduced, thus saving space.
At block 620, the network device 320 transmits the random access response to the terminal device 310-1. The random access response is scheduled by the downlink control channel which is scrambled with the identifier. In some embodiments, the PDCCH may be scrambled with the CR-RNTI. Alternatively, the PDCCH may be scrambled with the C-RNTI. In some embodiments, the identifier is common to a plurality of random access channels in the random access channels. Alternatively, the identifier is common to all of the random access channels.
In some embodiments, an apparatus for performing the method 600 (for example, the network device 120) may comprise respective means for performing the corresponding steps in the method 600. These means may be implemented in any suitable manners. For example, it can be implemented by circuitry or software modules.
In some embodiments, the apparatus comprises: means for receiving, at a network device, random access requests from one or more terminal devices, the random access requests comprising preambles for random access procedures of the one or more the terminal devices and identity information of the one or more terminal devices, the preambles being transmitted on random access channels; and means for transmitting a random access response to the one or more terminal devices on a downlink control channel scrambled with an identifier, the random access response comprising identity information of the at least one of the one or more terminal devices to indicate that the random access procedure of the at least one of the one or more terminal devices is successful, the identifier being used for scrambling downlink control channels associated with the one or more terminal devices.
In some embodiments, the identity information of the plurality of terminal devices comprises at least one of: common control channel (CCCH) user equipment (UE) IDs of the plurality of terminal devices, or cell radio network temporary identifier (C-RNTI) medium access control (MAC) control elements (CEs) of the one or more of terminal devices.
In some embodiments, the random access request further comprises at least one of: a buffer status report (BSR) , or power headroom report (PHR) .
In some embodiments, the apparatus further comprises: means for determining whether a further random access response is needed; and means for in response to determining that the further random access response is needed, adding into the random access response an indication indicating the further random access response.
In some embodiments, the means for transmitting the random access response comprises: means for determining physical random access channels (PRACHs) on which the preambles are received; means for comparing the PRACHs with a set of predetermined PRACHs; means for in response to the PRACHs belong to the set of predetermined PRACHs, determining the downlink control channel addressed to the identifier; and means for transmitting the random access response on the downlink control channel.
In some embodiments, the means for transmitting the random access response comprises: means for comparing the preambles with a set of predetermined preambles; means for in response to the preambles belonging to the set of predetermined preambles, determining the downlink control channel addressed to the identifier; and means for transmitting the random access response on the downlink control channel.
In some embodiments, the means for transmitting the random access response comprises: means for in response to the identity information of the at least one of the terminal devices device being a common control channel (CCCH) user equipment (UE) ID, generating the random access response indicating the CCH ID of the at least one of the terminal devices device; or means for in response to the identity information of the at least one of the terminal devices device being a cell radio network temporary identifier (C-RNTI) , generating the random access response indicating the C-RNTI of the at least one of the terminal devices device.
Fig. 7 is a simplified block diagram of a device 700 that is suitable for implementing embodiments of the present disclosure. The device 700 may be implemented at the network device 320. The device 700 may also be implemented at the terminal devices 310. As shown, the device 700 includes one or more processors 710, one or more memories 720 coupled to the processor (s) 710, one or more transmitters and/or receivers (TX/RX) 740 coupled to the processor 710.
The processor 710 may be of any type suitable to the local technical network, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples. The device 700 may have multiple processors, such as an application specific integrated circuit chip that is slaved in time to a clock which synchronizes the main processor.
The memory 720 may be of any type suitable to the local technical network and may be implemented using any suitable data storage technology, such as a non-transitory computer readable storage medium, semiconductor based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memory and removable memory, as non-limiting examples.
The memory 720 stores at least a part of a program 730. The device 700 may load the program 730 from the computer readable medium to the RAM for execution. The computer readable medium may include any types of tangible non-volatile storage, such as ROM, EPROM, a flash memory, a hard disk, CD, DVD, and the like. Fig. 8 shows an example of the computer readable medium 800 in form of CD or DVD. The computer readable medium has the program 730 stored thereon.
The TX/RX 740 is for bidirectional communications. The TX/RX 740 has at least one antenna to facilitate communication, though in practice an Access Node mentioned in this application may have several ones. The communication interface may represent any interface that is necessary for communication with other network elements.
The program 730 is assumed to include program instructions that, when executed by the associated processor 710, enable the device 700 to operate in accordance with the embodiments of the present disclosure, as discussed herein with reference to Figs. 5 and 6. That is, embodiments of the present disclosure can be implemented by computer software executable by the processor 710 of the device 700, or by hardware, or by a combination of software and hardware.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any disclosure or of what may be claimed, but rather as descriptions of features that may be specific to particular embodiments of particular disclosures. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Various modifications, adaptations to the foregoing exemplary embodiments of this disclosure may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings. Any and all modifications will still fall within the scope of the non-limiting and exemplary embodiments of this disclosure. Furthermore, other embodiments of the disclosures set forth herein will come to mind to one skilled in the art to which these embodiments of the disclosure pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings.
Therefore, it is to be understood that the embodiments of the disclosure are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are used herein, they are used in a generic and descriptive sense only and not for purpose of limitation.
Claims (44)
- A terminal device, comprising:at least one processor; anda memory coupled to the at least one processor, the memory storing instructions therein, the instructions, when executed by the at least one processor, causing the terminal device to:transmit, at the terminal device, a random access request to a network device, the random access request comprising at least one preamble for a random access procedure and identity information of the terminal device;receive, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier, the random access response comprising identity information of at least one of one or more terminal devices, the one or more terminal devices transmitting preambles for random access procedures to the network device on random access channels, the identifier being used for scrambling downlink control channels associated with the one or more terminal devices; andin response to determining that the random access response comprising the identity information of the terminal device, determine that the random access procedure of the terminal device is successful.
- The terminal device of claim 1, wherein the identifier is common to a plurality of random access channels in the random access channels.
- The terminal device of claim 2, wherein the identifier is common to all of the random access channels.
- The terminal device of claim 1, wherein the terminal device is further caused to receive the random access response by:determining the identifier to be a contention resolution radio network temporary identifier; andreceiving the random access response on the downlink control channel addressed to the contention resolution radio network temporary identifier.
- The terminal device of claim 1, wherein the terminal device is further caused to receive the random access response by:determining the identifier to be a cell radio network temporary identifier; andreceiving the random access response on the downlink control channel addressed to the cell radio network temporary identifier.
- The terminal device of claim 1, wherein the terminal device is caused to transmit the identity information by:in response to the terminal device being in an idle mode or an inactive mode, transmitting the identity information comprising a common control channel user equipment identity; orin response to the terminal device being in a connected mode, transmitting the identity information comprising a cell radio network temporary identifier medium access control control element.
- The terminal device of claim 1, wherein the random access request further comprises at least one of:a buffer status report, ora power headroom report.
- The terminal device of claim 1, wherein the terminal device is further caused to at least one of:in response to determining that the random access response excluding the identity information of the terminal device, determine that the random access request of the terminal device is failed; andin response to the random access response comprising an indication indicating a further random access response to the random access request, monitor the further random access response.
- The terminal device of claim 1, wherein the terminal device is further caused to:in response to the random access response comprising a further indication indicating there is no further random access response to the random access request, stop monitoring the downlink control channel before an expire of a time for the random access response.
- The terminal device of claim 1, wherein the terminal device is further caused to:monitoring the downlink control channel until an expire of a time for the random access response.
- The terminal device of claim 1, wherein the random access response comprises at least one of:a common control channel medium access control control element, ora cell radio network temporary identifier medium access control control element.
- A network device, comprising:at least one processor; anda memory coupled to the at least one processor, the memory storing instructions therein, the instructions, when executed by the at least one processor, causing the network device to:receive, at the network device, random access requests from one or more terminal devices, the random access requests comprising preambles for random access procedures of the terminal devices and identity information of the of terminal devices, the preambles being transmitted on random access channels; andtransmit a random access response to the terminal devices on a downlink control channel scrambled with an identifier, the random access response comprising identity information of at least one of the terminal devices to indicate that the random access procedure of the at least one of the terminal devices is successful, the identifier being used for scrambling downlink control channels associated with the terminal devices.
- The network device of claim 1, wherein the identifier is common to a plurality of random access channels in the random access channels.
- The network device of claim 13, wherein the identifier is common to all of the random access channels.
- The network device of claim 12, wherein the identity information of the plurality of terminal devices comprises at least one of:common control channel user equipment identities of the terminal devices, orcell radio network temporary identifier medium access control control elements of the terminal devices.
- The network device of claim 12, wherein the random access request further comprises at least one of:a buffer status report, ora power headroom report.
- The network device of claim 12, wherein the network device is further caused to:determine whether a further random access response is needed; andin response to determining that the further random access response is needed, add into the random access response an indication indicating the further random access response.
- The network device of claim 12, wherein the network device is caused to transmit the random access response by:determining physical random access channels on which the preambles are received;comparing the physical random access channels with a set of predetermined physical random access channels;in response to the physical random access channels belong to the set of predetermined physical random access channels, determining the downlink control channel addressed to the identifier; andtransmitting the random access response on the downlink control channel.
- The network device of claim 12, wherein the network device is caused to transmit the random access response by:comparing the preambles with a set of predetermined preambles;in response to the preambles belonging to the set of predetermined preambles, determining the downlink control channel addressed to the identifier; andtransmitting the random access response on the downlink control channel.
- The network device of claim 12, wherein the network device is caused to transmit the random access response by:in response to the identity information of the at least one of the terminal devices being a common control channel user equipment identity, generating the random access response indicating the common control channel identity of the at least one of the terminal devices; orin response to the identity information of the at least one of the terminal devices being a cell radio network temporary identifier, generating the random access response indicating the cell radio network temporary identifier of the at least one of the terminal devices.
- A method, comprising:transmitting, at a terminal device, a random access request to a network device, the random access request comprising at least one preamble for a random access procedure and identity information of the terminal device;receiving, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier, the random access response comprising identity information of one or more terminal devices, the terminal devices transmitting preambles for random access procedures to the network device on random access channels, the identifier being used for scrambling downlink control channels associated with the terminal devices; andin response to determining that the random access response comprising the identity information of the terminal device, determining that the random access procedure of the terminal device is successful.
- The method of claim 21, wherein the identifier is common to a plurality of random access channels in the random access channels.
- The method of claim 22, wherein the identifier is common to all of the random access channels.
- The method of claim 21, wherein receiving the random access response comprises:determining the identifier to be a contention resolution radio network temporary identifier; andreceiving the random access response on the downlink control channel addressed to the contention resolution radio network temporary identifier.
- The method of claim 21, wherein receiving the random access response comprises:determining the identifier to be a cell radio network temporary identifier; andreceiving the random access response on the downlink control channel addressed to the cell radio network temporary identifier.
- The method of claim 21, wherein transmitting the identity information comprises:in response to the terminal device being in an idle mode or an inactive mode, transmitting the identity information comprising a common control channel user equipment identity; orin response to the terminal device being in a connected mode, transmitting the identity information comprising a cell radio network temporary identifier medium access control control element.
- The method of claim 21, wherein the random access request further comprises at least one of:a buffer status report, ora power headroom report.
- The method of claim 21, further comprising at least one of:in response to determining that the random access response excluding the identity information of the terminal device, determine that the random access request of the terminal device is failed; andin response to the random access response comprising an indication indicating a further random access response to the random access request, monitor the further random access response.
- The method of claim 21, further comprising:in response to the random access response comprising a further indication indicating there is no further random access response to the random access request, stop monitoring the downlink control channel before an expire of a time for the random access response.
- The method of claim 21, further comprising:monitoring the downlink control channel until an expire of a time for the random access response.
- The method of claim 21, wherein the random access response comprises at least one of:a common control channel medium access control control element, ora cell radio network temporary identifier medium access control control element.
- A method, comprising:receiving, at a network device, random access requests from one or more terminal devices, the random access requests comprising preambles for random access procedures of the terminal devices and identity information of the terminal devices, the preambles being transmitted on random access channels; andtransmitting a random access response to the terminal devices on a downlink control channel scrambled with an identifier, the random access response comprising identity information of the at least one of the terminal devices to indicate that the random access procedure of the at least one of the terminal devices is successful, the identifier being used for scrambling downlink control channels associated with the terminal devices.
- The method of claim 32, wherein the identifier is common to a plurality of random access channels in the random access channels.
- The method of claim 33, wherein the identifier is common to all of the random access channels.
- The method of claim 32, wherein the identity information of the plurality of terminal devices comprises at least one of:common control channel user equipment identities of the terminal devices, orcell radio network temporary identifier medium access control control elements of the terminal devices.
- The method of claim 32, wherein the random access request further comprises at least one of:a buffer status report, ora power headroom report.
- The method of claim 32, further comprising:determining whether a further random access response is needed; andin response to determining that the further random access response is needed, adding into the random access response an indication indicating the further random access response.
- The method of claim 32, wherein transmitting the random access response comprises:determining physical random access channels on which the preambles are received;comparing the PRACHs with a set of predetermined physical random access channels;in response to the physical random access channels belong to the set of predetermined physical random access channels, determining the downlink control channel addressed to the identifier; andtransmitting the random access response on the downlink control channel.
- The method of claim 32, wherein transmitting the random access response comprises:comparing the preambles with a set of predetermined preambles;in response to the preambles belonging to the set of predetermined preambles, determining the downlink control channel addressed to the identifier; andtransmitting the random access response on the downlink control channel.
- The method of claim 32, wherein transmitting the random access response comprises:in response to the identity information of the at least one of the terminal devices being a common control channel user equipment identities, generating the random access response indicating the common control channel user equipment of the at least one of the terminal devices; orin response to the identity information of the at least one of the terminal devices being a cell radio network temporary identifier, generating the random access response indicating the cell radio network temporary identifier of the at least one of the terminal devices.
- A computer readable medium storing instructions thereon, the instructions, when executed by at least one processing unit of a machine, causing the machine to perform the method according to any one of claims 21-31.
- A computer readable medium storing instructions thereon, the instructions, when executed by at least one processing unit of a machine, causing the machine to perform the method according to any one of claims 32-40.
- An apparatus, comprising:means for transmitting, at a terminal device, a random access request to a network device, the random access request comprising at least a preamble for a random access procedure and identity information of the terminal device;means for receiving, from the network device, a random access response to the random access request scheduled by a downlink control channel scrambled with an identifier, the random access response comprising identity information of one or more terminal devices, the terminal devices transmitting preambles for random access procedures to the network device on random access channels, the identifier being used for scrambling downlink control channels associated with the terminal devices; andmeans for in response to determining that the random access response comprising the identity information of the terminal device, determining that the random access procedure of the terminal device is successful.
- An apparatus, comprising:means for receiving, at a network device, random access requests from one or more terminal devices, the random access requests comprising preambles for random access procedures of the terminal devices and identity information of the terminal devices, the preambles being transmitted on random access channels; andmeans for transmitting a random access response to the one or more terminal devices on a downlink control channel scrambled with an identifier, the random access response comprising identity information of the at least one of the terminal devices to indicate that the random access procedure of the at least one of the terminal devices is successful, the identifier being used for scrambling downlink control channels associated with the terminal devices.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/075807 WO2020168532A1 (en) | 2019-02-22 | 2019-02-22 | Contention resolution in random access procedure |
CN201980091877.7A CN113455089A (en) | 2019-02-22 | 2019-02-22 | Contention resolution in random access procedure |
EP19916442.7A EP3928584A4 (en) | 2019-02-22 | 2019-02-22 | Contention resolution in random access procedure |
US17/431,674 US20220124830A1 (en) | 2019-02-22 | 2019-02-22 | Contention resolution in random access procedure |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/075807 WO2020168532A1 (en) | 2019-02-22 | 2019-02-22 | Contention resolution in random access procedure |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020168532A1 true WO2020168532A1 (en) | 2020-08-27 |
Family
ID=72144852
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/075807 WO2020168532A1 (en) | 2019-02-22 | 2019-02-22 | Contention resolution in random access procedure |
Country Status (4)
Country | Link |
---|---|
US (1) | US20220124830A1 (en) |
EP (1) | EP3928584A4 (en) |
CN (1) | CN113455089A (en) |
WO (1) | WO2020168532A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115379585A (en) * | 2021-05-20 | 2022-11-22 | 上海华为技术有限公司 | Solution method of competition conflict, narrow-band Internet of things equipment and network equipment |
US12022523B2 (en) | 2019-03-28 | 2024-06-25 | Nokia Technologies Oy | Mechanism for first random access mode falling back to second random access mode |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113519201A (en) | 2019-03-19 | 2021-10-19 | Oppo广东移动通信有限公司 | Random access method and equipment |
EP3923668A4 (en) * | 2019-03-19 | 2022-02-23 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Wireless communication method, terminal device, and network device |
US20220183086A1 (en) * | 2019-03-28 | 2022-06-09 | Telefonaktiebolaget Lm Ericsson (Publ) | User Equipment, Radio Network Node and Methods Performed Therein for Handling Communication |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107872899A (en) * | 2016-09-23 | 2018-04-03 | 中兴通讯股份有限公司 | A kind of accidental access method, device and equipment |
CN108632987A (en) * | 2017-03-17 | 2018-10-09 | 华硕电脑股份有限公司 | Method and apparatus in wireless communication applied to the back-off mechanism of random access procedure |
WO2019088670A1 (en) * | 2017-10-30 | 2019-05-09 | Samsung Electronics Co., Ltd. | Method and apparatus for random access design of nr unlicensed |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170114911A (en) * | 2016-04-04 | 2017-10-16 | 삼성전자주식회사 | Method and apparatus for transmitting and receiving feedback in a wireless communication system |
KR20210038627A (en) * | 2018-08-01 | 2021-04-07 | 광동 오포 모바일 텔레커뮤니케이션즈 코포레이션 리미티드 | Random access method, device and computer storage medium |
US11582804B2 (en) * | 2018-11-09 | 2023-02-14 | Qualcomm Incorporated | Rach procedures in new radio-unlicensed (NR-U) |
US20220110165A1 (en) * | 2019-02-01 | 2022-04-07 | Ntt Docomo, Inc. | User equipment and base station apparatus |
WO2020166899A1 (en) * | 2019-02-13 | 2020-08-20 | Samsung Electronics Co., Ltd. | Method and apparatus for handling msga retransmissions during 2 step random access procedures in wireless communication system |
CN111565470B (en) * | 2019-02-13 | 2023-03-28 | 苹果公司 | 2 step random access |
-
2019
- 2019-02-22 EP EP19916442.7A patent/EP3928584A4/en active Pending
- 2019-02-22 US US17/431,674 patent/US20220124830A1/en active Pending
- 2019-02-22 WO PCT/CN2019/075807 patent/WO2020168532A1/en unknown
- 2019-02-22 CN CN201980091877.7A patent/CN113455089A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107872899A (en) * | 2016-09-23 | 2018-04-03 | 中兴通讯股份有限公司 | A kind of accidental access method, device and equipment |
CN108632987A (en) * | 2017-03-17 | 2018-10-09 | 华硕电脑股份有限公司 | Method and apparatus in wireless communication applied to the back-off mechanism of random access procedure |
WO2019088670A1 (en) * | 2017-10-30 | 2019-05-09 | Samsung Electronics Co., Ltd. | Method and apparatus for random access design of nr unlicensed |
Non-Patent Citations (1)
Title |
---|
See also references of EP3928584A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12022523B2 (en) | 2019-03-28 | 2024-06-25 | Nokia Technologies Oy | Mechanism for first random access mode falling back to second random access mode |
CN115379585A (en) * | 2021-05-20 | 2022-11-22 | 上海华为技术有限公司 | Solution method of competition conflict, narrow-band Internet of things equipment and network equipment |
WO2022242375A1 (en) * | 2021-05-20 | 2022-11-24 | 华为技术有限公司 | Contention conflict resolution method, narrow band internet of things device, and network device |
Also Published As
Publication number | Publication date |
---|---|
US20220124830A1 (en) | 2022-04-21 |
EP3928584A4 (en) | 2022-08-24 |
EP3928584A1 (en) | 2021-12-29 |
CN113455089A (en) | 2021-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10149339B2 (en) | Base station, user equipment and methods for random access | |
US11324051B2 (en) | Random access method and apparatus therefor | |
US9642161B2 (en) | Cross-scheduling for random access response | |
WO2020168532A1 (en) | Contention resolution in random access procedure | |
US8223791B2 (en) | Methods and apparatuses for performing random access in a telecommunications systems | |
US20220015155A1 (en) | Methods and devices for transmitting and receiving random access response and communication system | |
US10419185B2 (en) | System and method for listen before talk-based random access with partial subframes | |
WO2020093316A1 (en) | Acknowledgement for downlink early data transmission in paging message | |
US11399396B2 (en) | Random access method and device | |
WO2022067558A1 (en) | Method, device and computer storage medium of communication | |
US12022523B2 (en) | Mechanism for first random access mode falling back to second random access mode | |
CN116074964A (en) | Scheduling request and random access trigger for SDT | |
US20230371066A1 (en) | Radio network node, ue and methods performed therein | |
CN113225833B (en) | Random access in a communication system | |
JP7456551B2 (en) | Signal transmission and reception methods, devices and communication systems | |
US12082262B2 (en) | Mechanism for providing multiple transmission opportunities | |
US10986663B2 (en) | Uplink signal transmission based on timing advance value | |
WO2021087918A1 (en) | Contention resolution in random access procedure | |
WO2020000429A1 (en) | Uplink skipping during random access procedure | |
US20240179657A1 (en) | Acquiring timing advance value | |
WO2024174192A1 (en) | Forwarding control method, information sending method, repeater, and network device | |
WO2021160069A1 (en) | Method and apparatus for random access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19916442 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019916442 Country of ref document: EP Effective date: 20210922 |