WO2020186468A1 - Random access method and device - Google Patents
Random access method and device Download PDFInfo
- Publication number
- WO2020186468A1 WO2020186468A1 PCT/CN2019/078788 CN2019078788W WO2020186468A1 WO 2020186468 A1 WO2020186468 A1 WO 2020186468A1 CN 2019078788 W CN2019078788 W CN 2019078788W WO 2020186468 A1 WO2020186468 A1 WO 2020186468A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- pdcch
- rnti
- identifier
- random access
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 211
- 238000001514 detection method Methods 0.000 claims abstract description 26
- 230000008569 process Effects 0.000 claims description 78
- 238000004891 communication Methods 0.000 claims description 72
- 230000015654 memory Effects 0.000 claims description 50
- 238000012545 processing Methods 0.000 claims description 44
- 238000004590 computer program Methods 0.000 claims description 43
- 230000005540 biological transmission Effects 0.000 claims description 25
- 230000004044 response Effects 0.000 claims description 20
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 claims description 12
- 238000010586 diagram Methods 0.000 description 21
- 230000001360 synchronised effect Effects 0.000 description 14
- 230000006870 function Effects 0.000 description 9
- 238000001228 spectrum Methods 0.000 description 5
- 230000001413 cellular effect Effects 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 101100274486 Mus musculus Cited2 gene Proteins 0.000 description 3
- 101150096622 Smr2 gene Proteins 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 101100533725 Mus musculus Smr3a gene Proteins 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 2
- 238000004220 aggregation Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001869 rapid Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
Definitions
- This application relates to the field of communications, in particular to a method and equipment for random access.
- a two-step random access process can be used.
- message 1 (Msg 1) and message 3 (Msg 3) in the four-step random access process can be sent as the first message (Msg A) in the two-step random access process
- message 2 (Msg 2) and message 2 (Msg 4) in the four-step random access process as the second message (Msg B) in the two-step random access process.
- the embodiments of the present application provide a random access method and device, which can resolve contention conflicts in a two-step random access process.
- a random access method includes: a terminal device sends a first message to a network device, the first message includes a random access preamble and an uplink message, and the uplink message includes a first message.
- An identifier the terminal device determines the first target radio network temporary identifier RNTI for blind detection of the first physical downlink control channel PDCCH according to the first identifier; the terminal device blindly detects the first target RNTI according to the first target RNTI Detecting the first PDCCH; the terminal device determines whether to blindly detect the second PDCCH according to the result of blindly detecting the first PDCCH; if the terminal device determines to blindly detect the second PDCCH, the terminal device blindly detects The second PDCCH; the terminal device determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
- a random access method includes: a network device receives a first message sent by a terminal device, where the first message includes a preamble identifier ID for random access and an uplink message, and The uplink message includes a first identifier; the network device decodes the first message; the network device determines a response message to be sent to the terminal device according to the decoding situation of the first message.
- a terminal device which is used to execute the method in the foregoing first aspect or each of its implementation manners.
- the terminal device includes a functional module for executing the method in the foregoing first aspect or each implementation manner thereof.
- a network device configured to execute the method in the second aspect or its implementation manners.
- the network device includes a functional module for executing the method in the foregoing second aspect or each implementation manner thereof.
- a terminal device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned first aspect or each of its implementation modes.
- a network device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned second aspect or each of its implementation modes.
- a chip is provided for implementing any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
- the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes any one of the above-mentioned first aspect to the second aspect or any of the implementations thereof method.
- a computer-readable storage medium for storing a computer program that enables a computer to execute any one of the first aspect to the second aspect or the method in each implementation manner thereof.
- a computer program product including computer program instructions, which cause a computer to execute any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
- a computer program which when running on a computer, causes the computer to execute any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
- the network device can send the first PDCCH and the second PDCCH to the terminal device, and the terminal device can determine whether to blindly detect the second PDCCH according to the result of the blind detection of the first PDCCH. If the device determines to blindly detect the second PDCCH, it can determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH, so that the contention conflict in the two-step random access process can be resolved.
- Fig. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
- Fig. 2 is a schematic flowchart of a four-step random access method according to an embodiment of the present application.
- Fig. 3 is a schematic flowchart of another two-step random access method according to an embodiment of the present application.
- Fig. 4 is a schematic diagram of a MAC PDU including RAR according to an embodiment of the present application.
- Fig. 5 is a schematic block diagram of a BI prefix according to an embodiment of the present application.
- Fig. 6 is a schematic block diagram of a RAPID prefix according to an embodiment of the present application.
- Fig. 7 is a schematic block diagram of a MAC RAR according to an embodiment of the present application.
- Fig. 8 is a schematic flowchart of a four-step random access to a two-step random access according to an embodiment of the present application.
- Fig. 9 is a schematic flowchart of a random access method according to an embodiment of the present application.
- Fig. 10 is a schematic diagram of a random access method according to an embodiment of the present application.
- Fig. 11 is a schematic block diagram of a terminal device according to an embodiment of the present application.
- Fig. 12 is a schematic block diagram of a network device according to an embodiment of the present application.
- Fig. 13 is a schematic block diagram of a communication device according to an embodiment of the present application.
- Fig. 14 is a schematic block diagram of a chip according to an embodiment of the present application.
- Fig. 15 is a schematic block diagram of a communication system according to an embodiment of the present application.
- GSM Global System of Mobile Communication
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- GPRS General Packet Radio Service
- LTE Long Term Evolution
- LTE-A Advanced Long Term Evolution
- New Radio, NR evolution system of NR system
- LTE LTE-based access to unlicensed spectrum
- LTE-U Universal Mobile Telecommunication System
- UMTS Universal Mobile Telecommunication System
- WLAN Wireless Local Area Networks
- WiFi Wireless Fidelity
- D2D Device to Device
- M2M Machine to Machine
- MTC machine type communication
- V2V vehicle to vehicle
- the communication system in the embodiments of the present application can be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, can also be applied to a dual connectivity (DC) scenario, and can also be applied to a standalone (SA) deployment.
- CA Carrier Aggregation
- DC dual connectivity
- SA standalone
- the communication system 100 applied in the embodiment of the present application is shown in FIG. 1.
- the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or called a communication terminal or terminal).
- the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located in the coverage area.
- the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system (Evolutional Node B, eNB or eNodeB), or the wireless controller in the Cloud Radio Access Network (CRAN), or the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in the future evolution of the Public Land Mobile Network (PLMN), etc.
- BTS Base Transceiver Station
- NodeB, NB base station
- LTE Long Term Evolutional Node B
- eNB evolved base station
- CRAN Cloud Radio Access Network
- the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches
- the communication system 100 also includes at least one terminal device 120 located within the coverage area of the network device 110.
- the "terminal equipment” used here includes but is not limited to connection via wired lines, such as via public switched telephone networks (PSTN), digital subscriber lines (Digital Subscriber Line, DSL), digital cables, and direct cable connections ; And/or another data connection/network; and/or via a wireless interface, such as for cellular networks, wireless local area networks (WLAN), digital TV networks such as DVB-H networks, satellite networks, AM- FM broadcast transmitter; and/or another terminal device that is set to receive/send communication signals; and/or Internet of Things (IoT) equipment.
- PSTN public switched telephone networks
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL
- a terminal device set to communicate through a wireless interface may be referred to as a "wireless communication terminal", a “wireless terminal” or a “mobile terminal”.
- mobile terminals include, but are not limited to, satellites or cellular phones; Personal Communications System (PCS) terminals that can combine cellular radio phones with data processing, fax, and data communication capabilities; can include radio phones, pagers, Internet/intranet PDA with internet access, web browser, memo pad, calendar, and/or Global Positioning System (GPS) receiver; and conventional laptop and/or palmtop receivers or others including radio phone transceivers Electronic device.
- PCS Personal Communications System
- GPS Global Positioning System
- Terminal equipment can refer to access terminals, user equipment (UE), user units, user stations, mobile stations, mobile stations, remote stations, remote terminals, mobile equipment, user terminals, terminals, wireless communication equipment, user agents, or User device.
- the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in 5G networks, or terminal devices in the future evolution of PLMN, etc.
- SIP Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- the network device 110 may provide services for a cell, and the terminal device 120 communicates with the network device 110 through transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell.
- the cell may be the network device 110 (for example, a base station)
- the corresponding cell the cell can belong to a macro base station or a base station corresponding to a small cell (Small cell).
- the small cell here can include, for example, a metro cell, a micro cell, and a pico cell. Femto cells, etc. These small cells have the characteristics of small coverage and low transmit power, and are suitable for providing high-rate data transmission services.
- Figure 1 exemplarily shows one network device and two terminal devices.
- the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
- the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- the devices with communication functions in the network/system in the embodiments of the present application may be referred to as communication devices.
- the communication device may include a network device 110 and a terminal device 120 with communication functions, and the network device 110 and the terminal device 120 may be the specific devices described above, which will not be repeated here.
- the communication device may also include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the application.
- the terminal device After the cell search process, the terminal device has achieved downlink synchronization with the cell, so the terminal device can receive downlink data. However, the terminal equipment can only perform uplink transmission if it has achieved uplink synchronization with the cell.
- the terminal equipment can establish a connection with the cell and obtain uplink synchronization through a random access procedure (Random Access Procedure).
- Random Access Procedure Random Access Procedure
- the random access process can usually be triggered by the following events:
- the terminal device can enter the RRC connected state (RRC_CONNECTED) from the radio resource control (Radio Resource Control, RRC) idle state (RRC_IDLE state).
- RRC Radio Resource Control
- the terminal device is in the connected state and needs to establish uplink synchronization with the new cell.
- the uplink is in a "non-synchronised” state (DL or UL data arrival during RRC_CONNECTED when UL synchronisation status is "non-synchronised”).
- the terminal device transitions from the RRC inactive state (Transition from RRC_INACTIVE).
- the terminal device requests other system information (Other System Information, OSI).
- OSI Operating System Information
- the terminal device needs to perform beam failure recovery (Beam failure recovery).
- contention-based random access method as shown in FIG. 2
- non-contention-based random access method as shown in FIG. The following briefly describes the four-step random access process based on contention:
- Step 1 The terminal device sends a random access preamble (Preamble, that is, message1, Msg1) to the network device.
- Preamble that is, message1, Msg1
- the random access preamble may also be referred to as a preamble, a random access preamble sequence, a preamble sequence, and so on.
- the terminal device may select physical random access channel (Physical Random Access Channel, PRACH) resources, and the PRACH resources may include time domain resources, frequency domain resources, and code domain resources.
- PRACH Physical Random Access Channel
- the terminal device can send the selected Preamble on the selected PRACH resource.
- the network device can estimate the transmission delay between it and the terminal device based on the Preamble and use this to calibrate the uplink timing, and can roughly determine the size of the resource required for the terminal device to transmit message 3 (Msg3).
- Msg3 message 3
- Step 2 The network device sends a random access response (Random Access Response, RAR, that is, message2, Msg2) to the terminal device
- RAR Random Access Response
- the terminal device After the terminal device sends the Preamble to the network device, it can open a RAR window, in which RAR window detects the corresponding physical downlink control channel (Physical Downlink) according to the Random Access Radio Network Temporary Identifier (RA-RNTI) Control Channel, PDCCH). If the terminal device detects the PDCCH scrambled by the RA-RNTI, it can obtain the physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) scheduled by the PDCCH. Wherein, the PDSCH includes the RAR corresponding to the Preamble.
- RA-RNTI Random Access Radio Network Temporary Identifier
- the terminal device can consider that this random access procedure has failed. It should be understood that both the terminal equipment and the network equipment need to uniquely determine the value of RA-RNTI, otherwise the terminal equipment cannot decode the RAR.
- the RA-RNTI may calculate the value of the RA-RNTI by using the time-frequency position of the Preamble that is clear to both the transmitting and receiving parties.
- RA-RNTI associated with Preamble can be calculated by formula (1):
- RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id(1)
- s_id is the index of the first Orthogonal Frequency Division Multiplexing (OFDM) symbol of the PRACH resource (0 ⁇ s_id ⁇ 14), and t_id is the index of the first time slot of the PRACH resource in a system frame.
- f_id is the index of the PRACH resource in the frequency domain (0 ⁇ f_id ⁇ 8)
- ul_carrier_id is the uplink carrier used to transmit the Preamble (0 represents the NUL carrier, 1 represents the SUL carrier).
- f_id is fixed to 0.
- the network device since the time-frequency position of the Preamble sent by the terminal device is determined, the network device also obtains the time-frequency position of the Preamble when decoding the Preamble, and can then know the RA-RNTI that needs to be used in the RAR.
- the terminal device successfully receives a RAR (using a certain RA-RNTI to decode), and the random access sequence identifier (Random Access Preamble Identifier, RAPID) in the RAR is the same as the preamble index sent by the terminal device, it can It is considered that the RAR is successfully received, and the terminal device can stop detecting the PDCCH scrambled by the RA-RNTI at this time.
- RAPID Random Access Preamble Identifier
- the RAR can be carried in the Media Access Control (MAC) protocol data unit (Protocol Data Unit, PDU).
- MAC Media Access Control
- PDU Protocol Data Unit
- a MAC PDU may include one or more MAC subPDUs (subPDU) and possibly padding bits, and a MAC subPDU may only have a Backoff Indicator (BI), or There are only random access sequence identifiers (Random Access Preamble Identifier, RAPID), or RAPID and MAC RAR.
- BI Backoff Indicator
- RAPID Random Access Preamble Identifier
- MAC PDU It can be seen from the structure of MAC PDU that if a network device detects random access requests from multiple terminal devices on the same PRACH resource, it can use one MAC PDU to respond to these access requests. Each random access The response to the request (corresponding to a preamble index) corresponds to a RAR. In other words, if multiple terminal devices send Preamble on the same PRACH resource (the same time and frequency position, using the same RA-RNTI), the corresponding RARs are multiplexed in the same MAC PDU.
- all terminal devices that use the same PRACH resource to send the Preamble detect the same RA-RNTI scrambled PDCCH and receive the same MAC PDU, but different RAPIDs correspond to different RARs.
- the MAC PDU can only be scrambled with one RA-RNTI, this also means that the RAR corresponding to the Preamble sent using different PRACH resources (different time and frequency positions) cannot be multiplexed into the same MAC PDU.
- FIG. 5 is a schematic block diagram of a BI subheader in an embodiment of the present application.
- the BI sub-header may include an extension field (E), a type field (T), two reserved fields (R), and a BI value.
- the BI sub-header appears only once and is located at the first head of the MAC header (header). If the terminal device receives a BI subheader, it will save a backoff value, which is equal to the value corresponding to the BI in the header; otherwise, the terminal device can set the Backoff value to 0.
- the value corresponding to BI specifies the time range that the terminal device needs to wait before resending the Preamble. If the terminal device does not receive the RAR within the RAR window, or if none of the received RARs matches the preamble index selected by the terminal device, it can be considered that the RAR reception fails. At this time, the terminal device needs to wait for a period of time before initiating random access.
- the waiting time can be any random value within the waiting time interval specified by the value corresponding to 0 to BI.
- Fig. 6 is a schematic block diagram of a RAPID subheader in an embodiment of the present application.
- the RAPID subheader can include an E, a T, and RAPID values.
- RAPID is the Preamble index received by the network device in response. If the terminal device finds that the value is the same as the index used when it sends the Preamble, it can be considered that the corresponding RAR has been successfully received.
- FIG. 7 is a schematic block diagram of a MAC RAR according to an embodiment of the present application.
- MAC RAR may include: reserved bit R (for example, 1 bit), time alignment command (Timing Advance Command, TAC), uplink grant (UL grant), and temporary cell radio network temporary identification ( Temporary Cell Radio Network Temporary Identifier, TC-RNTI).
- TAC can be used to specify the amount of time adjustment required for the uplink synchronization of the terminal equipment, and can occupy 12 bits.
- UL grant can be used to schedule Msg3 uplink resource indication.
- TC-RNTI can be used to scramble the Msg4 PDCCH (initial access).
- Step 3 The terminal device sends Msg3.
- the terminal device After receiving the RAR message, the terminal device determines whether the RAR is its own RAR message. For example, the terminal device can use the preamble index to check. After determining that it is its own RAR message, it can generate Msg3 in the RRC layer and send it to The network device sends Msg3, which needs to carry the identification information of the terminal device, etc.
- Msg3 is mainly used to notify the network equipment of the random access trigger event.
- the Msg3 sent by the terminal device in step 3 may include different content.
- Msg3 may include the RRC connection request message (RRC Setup Request) generated by the RRC layer.
- RRC Setup Request RRC connection request message
- Msg3 may also carry, for example, the 5G-service temporary mobile subscriber identity (Serving-Temporary Mobile Subscriber Identity, S-TMSI) of the terminal device or a random number.
- S-TMSI Serving-Temporary Mobile Subscriber Identity
- Msg3 may include an RRC connection re-establishment request message (RRC Reestabilshment Request) generated by the RRC layer.
- RRC Reestabilshment Request RRC connection re-establishment request message
- Msg3 may also carry, for example, a Cell Radio Network Temporary Identifier (C-RNTI).
- C-RNTI Cell Radio Network Temporary Identifier
- Msg3 may include an RRC handover confirmation message (RRC Handover Confirm) generated by the RRC layer, which carries the C-RNTI of the terminal device.
- RRC Handover Confirm RRC handover confirmation message
- Msg3 may also carry information such as Buffer Status Report (BSR).
- BSR Buffer Status Report
- Msg3 may at least include the C-RNTI of the terminal device.
- Step 4 The network device sends a contention resolution message (Msg4) to the terminal device.
- Msg4 contention resolution message
- the network device sends Msg4 to the terminal device, and the terminal device correctly receives the Msg4 to complete the contention resolution (Contention Resolution).
- Msg4 may carry the RRC connection establishment message.
- the network device Since the terminal device in step 3 can carry its own unique identifier in Msg3, the network device will carry the unique identifier of the terminal device in Msg4 in the contention resolution mechanism to specify the terminal device that wins the competition. Other terminal devices that did not win in the contention resolution will re-initiate random access.
- the Msg4 can be scheduled with the PDCCH scrambled by the TC-RNTI.
- the resolution of the contention conflict can be through the terminal device receiving the PDSCH of Msg4 to obtain the conflict resolution ID, and by matching the conflict resolution ID with the common control channel (CCCH) service data unit in msg3 , SDU) to determine whether to resolve the conflict.
- CCCH common control channel
- the delay of four-step random access is relatively large, which is not suitable for the low-latency and high-reliability scenarios in 5G.
- a two-step random access process scheme is proposed. As shown in Figure 8, in the two-step random access process, in simple terms, it is equivalent to combining the first and third steps of the four-step random access process into the first step in the two-step random access process. The second and fourth steps of the four-step random access process are combined into the second step of the two-step random access process.
- the two-step random access procedure may include:
- the first step the terminal device sends the first message to the network device.
- the first message may be composed of a preamble and a payload (payload).
- the Preamble is a four-step random access Preamble.
- the preamble is transmitted on the PRACH resource.
- the payload mainly carries information in Msg3 in the four-step random access.
- it may include CCCH SDU, such as corresponding to random access in RRC idle state, and may also include C-RNTI MAC control element (CE), such as mainly corresponding to random access in RRC connected state.
- CE C-RNTI MAC control element
- the payload may be carried on an uplink channel, and the channel may be, for example, a physical uplink shared channel (PUSCH).
- PUSCH physical uplink shared channel
- the first message may carry part or all of the information carried in the Preamble and Msg3 in the four-step random access process.
- Step 2 The network device sends a second message to the terminal device.
- the network device can send the second message to the terminal device.
- the second message may include part or all of the information carried in Msg2 and Msg4 in the four-step random access process.
- the names of the first message and the second message are not limited, that is, they can also be expressed as other names.
- the first message may also be called Msg A, random access request message or new Msg1
- the second message may also be called Msg B or new Msg2.
- FIG. 8 is only a specific implementation of the two-step random access process, and should not limit the protection scope of this application.
- the embodiment of the present application proposes a random access method, which can enable the terminal device to effectively resolve the contention conflict in the two-step random access process.
- FIG. 9 is a schematic flowchart of a random access method 300 according to an embodiment of the present application.
- the method described in FIG. 9 may be executed by a terminal device and a network device.
- the terminal device may be, for example, the terminal device 120 shown in FIG. 1
- the network device may be, for example, the network device 110 shown in FIG.
- the method 300 may include at least part of the following content.
- the terminal device sends a first message to the network device.
- the first message includes a random access preamble (ie, Preamble) and an uplink message, and the uplink message includes a first identifier.
- the network device decodes the first message, and determines the response message to be sent to the terminal device according to the decoding situation of the first message.
- the network device sends a response message to the terminal device.
- the terminal device determines the first target RNTI used for blind detection of the first PDCCH according to the first identifier.
- the terminal device blindly detects the first PDCCH according to the first target RNTI, and determines whether to blindly detect the second PDCCH according to the result of blindly detecting the first PDCCH.
- the terminal device determines to blindly detect the second PDCCH, the terminal device blindly detects the second PDCCH, and determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
- first message in the method 300 may correspond to the first message in FIG. 8.
- the first message including the Preamble and the uplink message can be understood as: between the terminal device sending the Preamble and the uplink message to the network device, there is no other message between the network device and the terminal device, and/or the network device
- the second message may be sent to the terminal device simultaneously for the Preamble and the uplink message.
- the terminal device may first select the resource of the first message, including the PRACH resource and the corresponding PUSCH resource, and then use the selected resource to transmit the first message. Among them, the terminal device can use the PRACH resource to transmit the Preamble and the PUSCH resource to transmit the payload.
- the terminal device can be in a connected state, an inactive state or an idle state.
- the first identifier included in the first message may be different.
- the first identifier can basically be expressed as two types, one is that the payload contains C-RNTI MAC CE, and the other is that the payload does not contain C-RNTI MAC CE, that is, it contains CCCH SDU.
- the terminal device can determine the first identifier carried in the payload according to its current RRC state.
- the first identifier may be but is not limited to the C-RNTI, and the C-RNTI may be included in the C-RNTI MAC CE.
- the first identifier may include, but is not limited to, a random number, 5G-S-TMSI (or a part of 5G-S-TMSI), and identifying RNTI (Identify-RNTI, I- RNTI), Short I-RNTI (Short I-RNTI).
- the number of bits of the random number is fixed, and the I-RNTI can be used to identify the content of the terminal equipment in the RRC inactive state.
- the CCCH SDU may include the identification of the terminal device.
- the SDU may include the RRC message transmitted in the Signaling Radio Bearer (Signaling Radio Bearer, SRB) 0, such as:
- the message in the above content may generally include the first identifier.
- the first identifier may be a random number or a part of 5G-S-TMSI.
- the terminal device sends the first message to the network device, and correspondingly, the network device can receive the first message sent by the terminal device and decode the first message.
- the network device decodes the first message, there can be multiple situations:
- Case 1 The network device successfully decodes one or more Preambles, but fails to decode the Payload in the PUSCH.
- Case 2 The network device successfully decodes one or more Preambles and one or more Payloads.
- Case 3 The network device successfully decoded the payload but failed to decode the preamble. It should be noted that, since the network device needs the Preamble as the uplink timing estimation, the possibility of case 3 is small, and case 3 is not considered in this embodiment of the application.
- the network device can respond to the Preamble, that is, send the RAR in the four-step random access to the terminal device to respond to the Preamble. In this way, for a terminal device with two-step random access, it can fall back to a four-step random access; for a terminal device with four-step random access, it is a normal process. Or it does not respond to the Preamble, that is, the network device may send the second indication information to the terminal device, and the second indication information may be used to instruct the terminal device to retransmit the first message.
- the first message retransmitted by the terminal device may be the same as or different from the first message previously transmitted, and the resource for retransmitting the first message may be the same as or different from the resource previously transmitted for the first message.
- the network device may send third instruction information to the terminal device, and the third instruction information may be used to indicate The terminal device stops blindly checking the first PDCCH, so that the terminal device can retransmit the first message as soon as possible.
- the first PDCCH is used for scheduling RAR.
- the PRACH resources of the terminal device performing the two-step random access and the terminal device performing the four-step random access may be different.
- the network device can distinguish the terminal performing the four-step random access according to the PRACH resource that receives the Preamble Equipment and terminal equipment for two-step random access.
- the PRACH resource may be configured by the network device, or may be preset on the terminal device.
- the network device can distinguish the terminal device corresponding to the identifier in the payload. At this time, the network device may have different response modes according to the first identifier.
- the network device can respond to the payload based on the above association relationship. For example, if the Preamble is successfully decoded but the Payload corresponding to the Preamble is not successfully decoded, the network device may respond to the Preamble or not. If the Preamble is successfully decoded and the Payload corresponding to the Preamble is also successfully decoded, the network device can respond to the Payload. Further, since multiple terminal devices may use the successfully decoded Preamble at the same time, the network device may further respond to the successfully decoded Preamble.
- the network device may send the first PDCCH to the terminal device.
- the terminal device may determine the first target RNTI according to the first identifier, and then blindly detect the first PDCCH according to the first target RNTI.
- the terminal device determines that the first target RNTI may be C-RNTI; if the first identifier is an identifier other than C-RNTI, the terminal device may determine that the first target RNTI may be RA- RNTI.
- the identifiers other than C-RNTI may be random numbers, 5G-S-TMSI, I-RNTI, Short I-RNTI, and so on.
- the RA-RNTI may have a corresponding relationship with the PRACH resource for transmitting the Preamble in the first message, and/or the PUSCH resource for transmitting the payload. That is, the terminal device or the network device may determine the RA-RNTI according to the PRACH resource of the Preamble transmitted in the first message, and/or the PUSCH resource of the payload transmitted.
- RA-RNTI may be calculated from the position of the PRACH time-frequency resource for transmitting the Preamble.
- a possible calculation method is as follows: (2):
- RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id (2)
- s_id is the index of the first OFDM symbol of the PRACH resource for transmitting the Preamble in the first message (0 ⁇ s_id ⁇ 14), and t_id is the first one of the PRACH resource for transmitting the Preamble in the first message in a system frame
- the index of the time slot (0 ⁇ t_id ⁇ 80)
- f_id is the index of the PRACH resource for transmitting the Preamble in the first message in the frequency domain (0 ⁇ f_id ⁇ 8)
- ul_carrier_id is the uplink used to transmit the Preamble in the first message Carrier (0 means NUL carrier, 1 means SUL carrier).
- the terminal device may blindly detect the first PDCCH according to the first target RNTI.
- the blind detection of the first PDCCH by the terminal device may include: after the terminal device sends the first message to the network device, the terminal device starts a first timer or opens a first window, and the first timer or Within the duration of the window, blindly check the first PDCCH.
- the duration of the first timer or the first window may be preset on the terminal device based on a protocol, or may be pre-configured by the network device to the terminal device, for example, it may be configured through RRC signaling.
- the first timer or the first window may be started after the random access preamble is sent, or after the uplink message is sent, which is not specifically limited in the embodiment of the present application.
- the following describes the next behavior of the terminal device from two cases where the first target RNTI is C-RNTI or RA-RNTI.
- Case 1 The first target RNTI is C-RNTI.
- the terminal device can determine whether the contention conflict in the random access process has been resolved according to the result of blindly detecting the first PDCCH.
- the terminal device can determine the contention conflict in the random access process solved. If the terminal device blindly detects the first PDCCH scrambled by the C-RNTI, but the C-RNTI does not match the first identifier in the first message successfully, the terminal device may determine that the contention conflict in the random access process is not resolved.
- the terminal device may determine that the contention conflict in the random access process is not resolved, and the terminal device may resend the first message to the network device.
- Case 2 The first target RNTI is RA-RNTI.
- the terminal device may resend the first message to the network device.
- the terminal device may determine that the first indication information has been successfully decoded, and the terminal device may determine whether to blindly detect the second PDCCH and determine the second target RNTI for blindly detecting the second PDCCH according to the first indication information.
- the information scheduled by the first PDCCH may include the first indication information, or the physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) scheduled by the first PDCCH may include the first indication information.
- the first PDCCH or the second PDCCH may also be an enhanced physical downlink control channel (EPDCCH), a machine type communication physical downlink control channel (Machine Type Communication Physical Downlink Control Channel, MPDCCH) ), Narrowband Physical Downlink Control Channel (NPDCCH), which is not limited in this application.
- EPDCCH enhanced physical downlink control channel
- MPDCCH Machine Type Communication Physical Downlink Control Channel
- NPDCCH Narrowband Physical Downlink Control Channel
- the first indication may be used to instruct the terminal device to blindly detect the second PDCCH.
- the first indication may be used to instruct the terminal device not to blindly detect the second PDCCH.
- the first indication information is one bit.
- the first value can be “0” or "1”
- the second value can also be “0" or "1”.
- the first value is “0”
- the second value is “1”
- the first value is “1”
- the second value is "0”.
- the first indication information can be used to instruct the terminal device to detect the second PDCCH; if there are at least two of the multiple bits The bits are different, and the first indication information may be used to instruct the terminal device not to detect the second PDCCH.
- the 3 bits in the first indication information are used to indicate whether the terminal device detects the second PDCCH, "000" indicates that the terminal device detects the second PDCCH, and "010" indicates that the terminal device does not detect the second PDCCH.
- the first indication information may be used to instruct the terminal device not to detect the second PDCCH.
- the first indication information may indicate whether the terminal device detects the second PDCCH through the first parameter. Exemplarily, if the first indication information includes the first parameter, the terminal device is instructed to detect the second PDCCH; if the first indication information does not include the first parameter, the terminal device is instructed not to detect the second PDCCH.
- the embodiment of the present application does not specifically limit the first parameter, and any parameter that can indicate whether the terminal device detects the second PDCCH is included in the protection scope of the present application.
- the first indication information may be RAR.
- the format of the RAR may be the same as or different from the format of the RAR in FIG. 7, which is not specifically limited in the embodiment of the present application.
- the bit position of the at least one bit may be equal to the bit position of the reserved bit in the four-step random access.
- the number of the at least one bit is one.
- the RAR may use bit “1" to instruct the terminal device to detect the second PDCCH, and use bit "0" to instruct the terminal device not to detect the second PDCCH.
- the first indication information may also be downlink control information (Downlink Control Information, DCI) carried by the first PDCCH, or other information carried by the first PDCCH.
- DCI Downlink Control Information
- the terminal device For the terminal device, if the first indication information is used to instruct the terminal device not to detect the second PDCCH, in one case, the terminal device can fall back to the four-step random access, and the behavior is consistent with the four-step random access, namely: a. Process TAC; b. Process UL grant; c. Set TC-RNTI value; d. If there is no MAC PDU in the Msg3 buffer, the terminal device can generate Msg3MAC PDU; e. The terminal device stops blindly checking the second message window or Timer. After that, the terminal device can send Msg3 to the network device, and the network device sends Msg4 to the terminal device after receiving the Msg3. In another case, the terminal device may retransmit the first message to the network device.
- the terminal device blindly detects the second PDCCH.
- the terminal device may blindly detect the second PDCCH according to the second target RNTI.
- the second target RNTI may be TC-RNTI or C-RNTI.
- the terminal device may set a TC-RNTI or C-RNTI value, and the TC-RNTI or C-RNTI value is used for the terminal device to blindly detect possible second PDCCH scheduling in the second message.
- the terminal device may determine that the random access contention conflict has been resolved.
- the second identifier may be an identifier carried by the second PDCCH or an identifier in the PDSCH scheduled by the second PDCCH.
- the terminal device can determine that the contention conflict of the two-step random access has been resolved.
- the second identifier is the contention conflict resolution ID MAC CE.
- the second PDCCH may be scrambled by the third identifier.
- the third identifier may be a random number, 5G-S-TMSI, I-RNTI, Short I-RNTI, etc.
- the terminal device can match the third identifier with the first identifier. If the matching is successful, the terminal device can determine the two-step random access Incoming competition conflict has been resolved. For example, if the second PDCCH is scrambled by a fixed-size random number, the terminal device can match the fixed-size random number with the first identifier. If the matching is successful, the terminal device can determine the two-step random access The competition conflict has been resolved.
- the first identifier mentioned in the above content matches the second identifier (or third identifier) successfully, which can be understood as: the first identifier and the second identifier (or third identifier) are the same; or, the first identifier and the second identifier ( Or the third identifier) is different but belongs to the same terminal device; or, the first identifier and the second identifier (or third identifier) have a corresponding relationship.
- the terminal device can also process the RAR scheduled by the first PDCCH, such as processing TAC, uplink authorization, and so on.
- FIG. 10 is a diagram of a specific implementation example of an embodiment of the present application.
- an arrow indicates one data transmission, and there are 3 data transmissions in total.
- the first identifier is an identifier other than C-RNTI
- the second target RNTI is TC-RNTI or C-RNTI.
- the terminal device sends the first message to the network device. After that, the terminal device starts the first timer or opens the first window, and blindly detects the second message within the duration of the first timer or the first window. After receiving the first message, the network device sends a second message to the terminal device.
- the second message includes the RAR and Msg B1.
- the network device uses the first PDCCH scrambled by RA-RNTI to schedule the RAR. After successfully decoding the first PDCCH, the terminal device can determine whether to blindly detect the second PDCCH according to the indication of the RAR.
- the terminal device blindly detects the second PDCCH; if the RAR indicates not blind detection of the second PDCCH, the terminal device does not blindly detect the second PDCCH.
- the network equipment uses the second PDCCH scrambled by TC-RNTI or C-RNTI to schedule Msg B1.
- the fourth indication information in the second PDCCH may be used for data transmission.
- the fourth indication information may be used to indicate whether the terminal device uses the parameters in the RAR for data transmission. For example, whether to use the uplink authorization in RAR for data transmission. If the fourth indication information indicates that the parameters in the RAR of the terminal device perform data transmission, the terminal device can use the parameters in the RAR to perform data transmission.
- the fourth indication information may include parameters required by the terminal device for uplink transmission. For example, TAC and so on. In this way, the terminal device does not need to process RAR.
- the network device may send the first PDCCH and the second PDCCH to the terminal device, and the terminal device may determine whether to blindly check the second PDCCH according to the result of blindly checking the first PDCCH. If the terminal device determines to blindly detect the second PDCCH, it can determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH, so that the contention conflict in the two-step random access process can be resolved.
- the size of the sequence number of the foregoing processes does not mean the order of execution.
- the execution order of each process should be determined by its function and internal logic, and should not be implemented in this application.
- the implementation process of the example constitutes any limitation.
- the communication method according to the embodiment of the present application is described in detail above.
- the communication device according to the embodiment of the present application will be described below with reference to FIG. 11 to FIG. 13.
- the technical features described in the method embodiment are applicable to the following device embodiments.
- FIG. 11 shows a schematic block diagram of a terminal device 400 according to an embodiment of the present application.
- the terminal device 400 includes:
- the communication unit 410 is configured to send a first message to a network device, the first message including a preamble for random access and an uplink message, the uplink message including a first identifier.
- the processing unit 420 is configured to determine, according to the first identifier, a first target radio network temporary identifier RNTI used for blind detection of the first physical downlink control channel PDCCH.
- the processing unit 420 is further configured to blindly detect the first PDCCH according to the first target RNTI.
- the processing unit 420 is further configured to determine whether to blindly detect the second PDCCH according to the result of the blind detection of the first PDCCH.
- the processing unit 420 is further configured to, if it is determined to blindly detect the second PDCCH, blindly detect the second PDCCH.
- the processing unit 420 is further configured to determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
- the processing unit 420 is further configured to: after the communication unit 410 sends the first message to the network device, start a first timer or open a first window;
- the processing unit 420 is specifically configured to: blindly detect the first PDCCH according to the first target RNTI within the duration range of the first timer or the first window.
- the first identifier is a cell-radio network temporary identifier C-RNTI
- the first target RNTI is a C-RNTI
- the processing unit 420 is further configured to: determine whether it has been resolved according to the result of the blind check of the first PDCCH Contention conflict during random access.
- the processing unit 420 is specifically configured to: if the processing unit 420 blindly detects the first PDCCH, determine that the contention conflict in the random access process has been resolved; The processing unit 420 does not blindly detect the first PDCCH, and determines that the contention conflict in the random access process is not resolved.
- the first identifier is an identifier other than the C-RNTI
- the first target RNTI is an RA-RNTI
- the RA-RNTI is based on the physical random access channel PRACH resource for transmitting the random access preamble, and/or the physical uplink shared channel PUSCH for transmitting the uplink message The location of the resource is determined.
- the processing unit 420 is specifically configured to: if the processing unit 420 blindly detects the first PDCCH, determine whether to blindly detect the second PDCCH according to the first indication information, and The second target RNTI is determined, where the first PDCCH includes the first indication information, or the PDSCH scheduled by the first PDCCH includes the first indication information.
- the first indication information is used to instruct the terminal device to blindly detect the second PDCCH .
- the first indication information is used to instruct the terminal device not to blindly check the second value. PDCCH.
- the processing unit 420 is specifically configured to: if the first indication information is used to instruct the terminal device 400 to blindly detect the second PDCCH, determine to blindly detect the second PDCCH PDCCH; if the first indication information is used to instruct the terminal device 400 not to blindly detect the second PDCCH, determine not to blindly detect the second PDCCH.
- the first indication information is included in a random access response RAR.
- the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in the four-step random access.
- the communication unit 410 is further configured to: send a message 3 in four-step random access to the network device; Receive the message 4 sent by the network device for the message 3;
- the processing unit 420 is further configured to: according to the message 4, determine whether the contention conflict in the random access process has been resolved.
- the communication unit 410 is further configured to: retransmit the first message to the network device.
- the processing unit 420 is specifically configured to: use the second target RNTI to blindly detect the second PDCCH.
- the processing unit 420 is specifically configured to: if the terminal device 400 blindly detects the second PDCCH, and the first identifier matches the second identifier successfully, then determine that the resolution has been resolved In a contention conflict in a random access process, the second identifier is a conflict resolution identifier carried in the second PDCCH, or the second identifier is a conflict resolution identifier carried in a PDSCH scheduled by the second PDCCH.
- the second target RNTI is a cell-radio network temporary identifier C-RNTI or a temporary cell-radio network temporary identifier TC-RNTI.
- the first identifier includes at least one of the following: a random number, a 5G-S-temporary mobile user identifier TMSI, I-RNTI, and Short I-RNTI.
- the second target RNTI is a cell-radio network temporary identifier C-RNTI or a temporary cell-radio network temporary identifier TC-RNTI.
- the second PDCCH is used to indicate parameters used by the terminal device 400 for data transmission after the terminal device 400 resolves the contention conflict.
- the parameters used by the terminal device 400 for data transmission include parameters in the RAR sent by the network device for the first message.
- terminal device 400 may correspond to the terminal device in the method 300, and can implement the corresponding operations of the terminal device in the method 300. For brevity, details are not described herein again.
- FIG. 12 shows a schematic block diagram of a network device 500 according to an embodiment of the present application. As shown in FIG. 12, the network device 500 includes:
- the communication unit 510 is configured to receive a first message sent by a terminal device, the first message including a random access preamble and an uplink message, the uplink message including a first identifier.
- the processing unit 520 is configured to decode the first message.
- the processing unit 520 is further configured to determine a response message sent to the terminal device according to the decoding situation of the first message.
- the communication unit 510 is further configured to: if the random access preamble is successfully decoded and the first identifier is successfully decoded, send the first target wireless signal to the terminal device.
- the first physical downlink control channel PDCCH scrambled by the network temporary identifier RNTI.
- the first identifier is a cell-radio network temporary identifier C-RNTI
- the first target RNTI is a C-RNTI
- the first identifier is an identifier other than the C-RNTI
- the first target RNTI is an RA-RNTI
- the communication unit 510 is specifically configured to send the first PDCCH and the second PDCCH scrambled by the second target RNTI to the terminal device.
- the first indication information is used to indicate whether the terminal device blindly detects the second PDCCH, wherein the first PDCCH scheduling information includes the first indication information, or The PDSCH scheduled by the first PDCCH includes the first indication information.
- the first indication is used to instruct the terminal device to blindly detect the second PDCCH.
- the first indication information is used to instruct the terminal device not to blindly check the second value. PDCCH.
- the first indication information is a random access response RAR.
- the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in the four-step random access.
- the communication unit 510 is further configured to: receive the fourth PDCCH sent by the terminal device. Step: Message 3 in random access; For the message 3, message 4 is sent to the terminal device.
- the communication unit 510 is further configured to: receive the retransmission of the terminal device The first message.
- the second PDCCH is used to indicate the parameters used by the terminal device for data transmission when the terminal device determines that the contention conflict in the random access process has been resolved.
- the parameters used by the terminal device for data transmission include parameters in the information scheduled by the first PDCCH.
- the second target RNTI is a cell-radio network temporary identifier C-RNTI or a temporary cell-radio network temporary identifier TC-RNTI.
- the RA-RNTI is based on the physical random access channel PRACH resource for receiving the random access preamble, and/or the physical uplink shared channel PUSCH for receiving the uplink message The location of the resource is determined.
- the first identifier includes at least one of the following: a random number, a 5G-S-temporary mobile user identifier TMSI, I-RNTI, and Short I-RNTI.
- the communication unit 510 is further configured to: if the random access preamble is successfully decoded and the first identifier fails to be decoded, send a four-step random access to the terminal device. Incoming message 2; or sending second indication information to the terminal device, where the second indication information is used to instruct the terminal device to retransmit the first message.
- the network device 500 may correspond to the network device in the method 300, and can implement the corresponding operations of the network device in the method 300. For brevity, details are not described herein again.
- FIG. 13 is a schematic structural diagram of a communication device 600 provided by an embodiment of the present application.
- the communication device 600 shown in FIG. 13 includes a processor 610, and the processor 610 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
- the communication device 600 may further include a memory 620.
- the processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
- the memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
- the communication device 600 may further include a transceiver 630, and the processor 6710 may control the transceiver 630 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
- the transceiver 630 may include a transmitter and a receiver.
- the transceiver 630 may further include an antenna, and the number of antennas may be one or more.
- the communication device 600 may specifically be a network device in an embodiment of the present application, and the communication device 600 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not repeated here. .
- the communication device 600 may specifically be a terminal device in an embodiment of this application, and the communication device 600 may implement the corresponding procedures implemented by the terminal device in each method of the embodiment of the application. .
- FIG. 14 is a schematic structural diagram of a chip of an embodiment of the present application.
- the chip 700 shown in FIG. 14 includes a processor 710, and the processor 710 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- the chip 700 may further include a memory 720.
- the processor 710 may call and run a computer program from the memory 720 to implement the method in the embodiment of the present application.
- the memory 720 may be a separate device independent of the processor 710, or may be integrated in the processor 710.
- the chip 700 may further include an input interface 730.
- the processor 710 may control the input interface 730 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
- the chip 700 may further include an output interface 740.
- the processor 710 can control the output interface 740 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
- the chip can be applied to the terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the terminal device in the various methods of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the terminal device in the various methods of the embodiment of the present application.
- the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
- the chip mentioned in the embodiment of the present application may also be referred to as a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip.
- the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
- the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
- the aforementioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
- DSP Digital Signal Processor
- ASIC application specific integrated circuit
- FPGA ready-made programmable gate array
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
- the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
- the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- DRAM synchronous dynamic random access memory
- SDRAM double data rate synchronous dynamic random access memory
- Double Data Rate SDRAM DDR SDRAM
- ESDRAM enhanced synchronous dynamic random access memory
- Synchlink DRAM SLDRAM
- DR RAM Direct Rambus RAM
- the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
- FIG. 15 is a schematic block diagram of a communication system 800 according to an embodiment of the present application. As shown in FIG. 15, the communication system 800 includes a terminal device 810 and a network device 820.
- the terminal device 810 can be used to implement the corresponding function implemented by the terminal device in the above method
- the network device 820 can be used to implement the corresponding function implemented by the network device in the above method. For brevity, it will not be repeated here. .
- the embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
- the computer-readable storage medium can be applied to the terminal device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the embodiments of the present application also provide a computer program product, including computer program instructions.
- the computer program product can be applied to the terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- it is not here. Repeat it again.
- the embodiment of the present application also provides a computer program.
- the computer program can be applied to the terminal device in the embodiment of the present application.
- the computer program runs on the computer, it causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- I won’t repeat it here.
- the computer program can be applied to the network device in the embodiment of the present application.
- the computer program runs on the computer, the computer is caused to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- I won’t repeat it here.
- the disclosed system, device, and method may be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiments of the present application relate to a random access method and device, the method comprising: a terminal device sends a first message to a network device, the first message comprising a random access preamble and an uplink message, and the uplink message comprising a first identifier; on the basis of the first identifier, the terminal device determines a first target radio network temporary identifier RNTI used for blind detection of a first physical downlink control channel PDCCH; on the basis of the first target RNTI, the terminal device blind detects the first PDCCH; on the basis of the result of the blind detection of the first PDCCH, the terminal device determines whether to blind detect a second PDCCH; if the terminal device determines to blind detect the second PDCCH, the terminal device blind detects the second PDCCH; and, on the basis of the result of the blind detection of the second PDCCH, the terminal device determines whether contention conflict in the random access procedure has already been resolved. The random access method and device in the embodiments of the present application can resolve contention conflict in a two-step random access procedure.
Description
本申请涉及通信领域,具体涉及一种随机接入的方法和设备。This application relates to the field of communications, in particular to a method and equipment for random access.
在新无线(New Radio,NR)系统(或称5G系统、5G网络)中可以采用两步随机接入过程的方式。在两步随机接入过程中,可以将四步随机接入过程中的消息1(Msg 1)和消息3(Msg 3)作为两步随机接入过程中的第一消息(Msg A)来发送,并将四步随机接入过程中的消息2(Msg 2)和消息2(Msg 4)作为两步随机接入过程中的第二消息(Msg B)来发送。In the New Radio (NR) system (or 5G system, 5G network), a two-step random access process can be used. In the two-step random access process, message 1 (Msg 1) and message 3 (Msg 3) in the four-step random access process can be sent as the first message (Msg A) in the two-step random access process , And send message 2 (Msg 2) and message 2 (Msg 4) in the four-step random access process as the second message (Msg B) in the two-step random access process.
由于第一消息可以由多个终端设备共享,因此可能出现冲突的问题。因此,如何解决两步随机接入过程中的竞争冲突,是一项亟待解决的问题。Since the first message can be shared by multiple terminal devices, conflicts may arise. Therefore, how to solve the contention conflict in the two-step random access process is an urgent problem to be solved.
发明内容Summary of the invention
本申请实施例提供一种随机接入的方法和设备,可以解决两步随机接入过程中的竞争冲突。The embodiments of the present application provide a random access method and device, which can resolve contention conflicts in a two-step random access process.
第一方面,提供了一种随机接入的方法,所述方法包括:终端设备向网络设备发送第一消息,所述第一消息包括随机接入前导码和上行消息,所述上行消息包含第一标识;所述终端设备根据所述第一标识,确定用于盲检第一物理下行控制信道PDCCH的第一目标无线网络临时标识符RNTI;所述终端设备根据所述第一目标RNTI,盲检所述第一PDCCH;所述终端设备根据盲检所述第一PDCCH的结果,确定是否盲检第二PDCCH;若所述终端设备确定盲检所述第二PDCCH,所述终端设备盲检所述第二PDCCH;所述终端设备根据盲检所述第二PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突。In a first aspect, a random access method is provided. The method includes: a terminal device sends a first message to a network device, the first message includes a random access preamble and an uplink message, and the uplink message includes a first message. An identifier; the terminal device determines the first target radio network temporary identifier RNTI for blind detection of the first physical downlink control channel PDCCH according to the first identifier; the terminal device blindly detects the first target RNTI according to the first target RNTI Detecting the first PDCCH; the terminal device determines whether to blindly detect the second PDCCH according to the result of blindly detecting the first PDCCH; if the terminal device determines to blindly detect the second PDCCH, the terminal device blindly detects The second PDCCH; the terminal device determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
第二方面,提供了一种随机接入的方法,所述方法包括:网络设备接收终端设备发送的第一消息,所述第一消息包括随机接入的前导码标识ID和上行消息,所述上行消息包括第一标识;所述网络设备对所述第一消息进行解码;所述网络设备根据所述第一消息的解码情况,确定向所述终端设备发送的响应消息。In a second aspect, a random access method is provided. The method includes: a network device receives a first message sent by a terminal device, where the first message includes a preamble identifier ID for random access and an uplink message, and The uplink message includes a first identifier; the network device decodes the first message; the network device determines a response message to be sent to the terminal device according to the decoding situation of the first message.
第三方面,提供了一种终端设备,用于执行上述第一方面或其各实现方式中的方法。In a third aspect, a terminal device is provided, which is used to execute the method in the foregoing first aspect or each of its implementation manners.
具体地,该终端设备包括用于执行上述第一方面或其各实现方式中的方法的功能模块。Specifically, the terminal device includes a functional module for executing the method in the foregoing first aspect or each implementation manner thereof.
第四方面,提供了一种网络设备,用于执行上述第二方面或其各实现方式中的方法。In a fourth aspect, a network device is provided, which is configured to execute the method in the second aspect or its implementation manners.
具体地,该网络设备包括用于执行上述第二方面或其各实现方式中的方法的功能模块。Specifically, the network device includes a functional module for executing the method in the foregoing second aspect or each implementation manner thereof.
第五方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第一方面或其各实现方式中的方法。In a fifth aspect, a terminal device is provided, including a processor and a memory. The memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned first aspect or each of its implementation modes.
第六方面,提供了一种网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第二方面或其各实现方式中的方法。In a sixth aspect, a network device is provided, including a processor and a memory. The memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned second aspect or each of its implementation modes.
第七方面,提供了一种芯片,用于实现上述第一方面至第二方面中的任一方面或其各实现方式中的方法。In a seventh aspect, a chip is provided for implementing any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行如上述第一方面至第二方面中的任一方面或其各实现方式中的方法。Specifically, the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes any one of the above-mentioned first aspect to the second aspect or any of the implementations thereof method.
第八方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第一方面至第二方面中的任一方面或其各实现方式中的方法。In an eighth aspect, a computer-readable storage medium is provided for storing a computer program that enables a computer to execute any one of the first aspect to the second aspect or the method in each implementation manner thereof.
第九方面,提供了一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述第一方面至第二方面中的任一方面或其各实现方式中的方法。In a ninth aspect, a computer program product is provided, including computer program instructions, which cause a computer to execute any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
第十方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面至第二方面中的任一方面或其各实现方式中的方法。In a tenth aspect, a computer program is provided, which when running on a computer, causes the computer to execute any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
上述技术方案,在两步随机接入过程中,网络设备可以向终端设备发送第一PDCCH和第二PDCCH,终端设备可以根据盲检第一PDCCH的结果,确定是否盲检第二PDCCH,若终端设备确定盲检第二PDCCH,则可以根据盲检第二PDCCH的结果确定是否已解决随机接入过程中的竞争冲突,从而可以解决两步随机接入过程中的竞争冲突。In the above technical solution, in the two-step random access process, the network device can send the first PDCCH and the second PDCCH to the terminal device, and the terminal device can determine whether to blindly detect the second PDCCH according to the result of the blind detection of the first PDCCH. If the device determines to blindly detect the second PDCCH, it can determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH, so that the contention conflict in the two-step random access process can be resolved.
图1是根据本申请实施例的一种通信系统架构的示意性图。Fig. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
图2是根据本申请实施例的一种四步随机接入方法的示意性流程图。Fig. 2 is a schematic flowchart of a four-step random access method according to an embodiment of the present application.
图3是根据本申请实施例的另一种两步随机接入方法的示意性流程图。Fig. 3 is a schematic flowchart of another two-step random access method according to an embodiment of the present application.
图4是根据本申请实施例的包括RAR的一种MAC PDU的示意性图。Fig. 4 is a schematic diagram of a MAC PDU including RAR according to an embodiment of the present application.
图5是根据本申请实施例的一种BI字头的示意性框图。Fig. 5 is a schematic block diagram of a BI prefix according to an embodiment of the present application.
图6是根据本申请实施例的一种RAPID字头的示意性框图。Fig. 6 is a schematic block diagram of a RAPID prefix according to an embodiment of the present application.
图7是根据本申请实施例的一种MAC RAR的示意性框图。Fig. 7 is a schematic block diagram of a MAC RAR according to an embodiment of the present application.
图8是根据本申请实施例的一种四步随机接入到两步随机接入的示意性流程图。Fig. 8 is a schematic flowchart of a four-step random access to a two-step random access according to an embodiment of the present application.
图9是根据本申请实施例的一种随机接入的方法的示意性流程图。Fig. 9 is a schematic flowchart of a random access method according to an embodiment of the present application.
图10是根据本申请实施例的一种随机接入的方法的示意性图。Fig. 10 is a schematic diagram of a random access method according to an embodiment of the present application.
图11是根据本申请实施例的终端设备的示意性框图。Fig. 11 is a schematic block diagram of a terminal device according to an embodiment of the present application.
图12是根据本申请实施例的网络设备的示意性框图。Fig. 12 is a schematic block diagram of a network device according to an embodiment of the present application.
图13是根据本申请实施例的通信设备的示意性框图。Fig. 13 is a schematic block diagram of a communication device according to an embodiment of the present application.
图14是根据本申请实施例的芯片的示意性框图。Fig. 14 is a schematic block diagram of a chip according to an embodiment of the present application.
图15是根据本申请实施例的通信系统的示意性框图。Fig. 15 is a schematic block diagram of a communication system according to an embodiment of the present application.
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are a part of the embodiments of the present application, not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this application.
本申请实施例可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新无线(New Radio,NR)系统、NR系统的演进系统、免授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、免授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、下一代通信系统或其他通信系统等。The embodiments of this application can be applied to various communication systems, such as: Global System of Mobile Communication (GSM) system, Code Division Multiple Access (CDMA) system, Wideband Code Division Multiple Access (Wideband Code) Division Multiple Access (WCDMA) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, Advanced Long Term Evolution (LTE-A) system, New Wireless (New Radio, NR) system, evolution system of NR system, LTE (LTE-based access to unlicensed spectrum, LTE-U) system on unlicensed spectrum, NR (NR-based access to unlicensed spectrum, on unlicensed spectrum, NR-U) system, Universal Mobile Telecommunication System (UMTS), Wireless Local Area Networks (WLAN), Wireless Fidelity (WiFi), next-generation communication systems or other communication systems, etc.
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),以及车辆间(Vehicle to Vehicle,V2V)通信等,本申请实施例也可以应用于这些通信系统。Generally speaking, traditional communication systems support a limited number of connections and are easy to implement. However, with the development of communication technology, mobile communication systems will not only support traditional communication, but also support, for example, Device to Device (Device to Device, D2D) communication, machine to machine (Machine to Machine, M2M) communication, machine type communication (MTC), and vehicle to vehicle (V2V) communication, etc. The embodiments of this application can also be applied to these communications system.
可选地,本申请实施例中的通信系统可以应用于载波聚合(Carrier Aggregation,CA)场景,也可以应用于双连接(Dual Connectivity,DC)场景,还可以应用于独立(Standalone,SA)布网场景。Optionally, the communication system in the embodiments of the present application can be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, can also be applied to a dual connectivity (DC) scenario, and can also be applied to a standalone (SA) deployment. Network scene.
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端设备120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备进行通信。可选地,该网络设备110可以是GSM系统或CDMA系统中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络设备等。Exemplarily, the communication system 100 applied in the embodiment of the present application is shown in FIG. 1. The communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or called a communication terminal or terminal). The network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located in the coverage area. Optionally, the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system (Evolutional Node B, eNB or eNodeB), or the wireless controller in the Cloud Radio Access Network (CRAN), or the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in the future evolution of the Public Land Mobile Network (PLMN), etc.
该通信系统100还包括位于网络设备110覆盖范围内的至少一个终端设备120。作为在此使用的“终端设备”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端设备的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端设备可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。 终端设备可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端设备或者未来演进的PLMN中的终端设备等。The communication system 100 also includes at least one terminal device 120 located within the coverage area of the network device 110. The "terminal equipment" used here includes but is not limited to connection via wired lines, such as via public switched telephone networks (PSTN), digital subscriber lines (Digital Subscriber Line, DSL), digital cables, and direct cable connections ; And/or another data connection/network; and/or via a wireless interface, such as for cellular networks, wireless local area networks (WLAN), digital TV networks such as DVB-H networks, satellite networks, AM- FM broadcast transmitter; and/or another terminal device that is set to receive/send communication signals; and/or Internet of Things (IoT) equipment. A terminal device set to communicate through a wireless interface may be referred to as a "wireless communication terminal", a "wireless terminal" or a "mobile terminal". Examples of mobile terminals include, but are not limited to, satellites or cellular phones; Personal Communications System (PCS) terminals that can combine cellular radio phones with data processing, fax, and data communication capabilities; can include radio phones, pagers, Internet/intranet PDA with internet access, web browser, memo pad, calendar, and/or Global Positioning System (GPS) receiver; and conventional laptop and/or palmtop receivers or others including radio phone transceivers Electronic device. Terminal equipment can refer to access terminals, user equipment (UE), user units, user stations, mobile stations, mobile stations, remote stations, remote terminals, mobile equipment, user terminals, terminals, wireless communication equipment, user agents, or User device. The access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in 5G networks, or terminal devices in the future evolution of PLMN, etc.
网络设备110可以为小区提供服务,终端设备120通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备110进行通信,该小区可以是网络设备110(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括例如城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。The network device 110 may provide services for a cell, and the terminal device 120 communicates with the network device 110 through transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell. The cell may be the network device 110 (for example, a base station) The corresponding cell, the cell can belong to a macro base station or a base station corresponding to a small cell (Small cell). The small cell here can include, for example, a metro cell, a micro cell, and a pico cell. Femto cells, etc. These small cells have the characteristics of small coverage and low transmit power, and are suitable for providing high-rate data transmission services.
图1示例性地示出了一个网络设备和两个终端设备,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。Figure 1 exemplarily shows one network device and two terminal devices. Optionally, the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。Optionally, the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端设备120,网络设备110和终端设备120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。It should be understood that the devices with communication functions in the network/system in the embodiments of the present application may be referred to as communication devices. Taking the communication system 100 shown in FIG. 1 as an example, the communication device may include a network device 110 and a terminal device 120 with communication functions, and the network device 110 and the terminal device 120 may be the specific devices described above, which will not be repeated here. The communication device may also include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the application.
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the terms "system" and "network" in this article are often used interchangeably in this article. The term "and/or" in this article is only an association relationship describing associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone B these three situations. In addition, the character "/" in this text generally indicates that the associated objects before and after are in an "or" relationship.
在小区搜索过程之后,终端设备已经与小区取得了下行同步,因此终端设备可以接收下行数据。但终端设备只有与小区取得上行同步,才能进行上行传输。终端设备可以通过随机接入过程(Random Access Procedure)与小区建立连接并取得上行同步。为了便于理解本申请实施例的方案,下面将结合图2和图3简单介绍随机接入过程。After the cell search process, the terminal device has achieved downlink synchronization with the cell, so the terminal device can receive downlink data. However, the terminal equipment can only perform uplink transmission if it has achieved uplink synchronization with the cell. The terminal equipment can establish a connection with the cell and obtain uplink synchronization through a random access procedure (Random Access Procedure). In order to facilitate the understanding of the solution of the embodiment of the present application, the random access process will be briefly introduced below in conjunction with FIG. 2 and FIG. 3.
随机接入过程通常可以由以下事件触发:The random access process can usually be triggered by the following events:
(1)初始接入(Initial Access)。(1) Initial Access (Initial Access).
终端设备可以从无线资源控制(Radio Resource Control,RRC)空闲态(RRC_IDLE态)进入RRC连接态(RRC_CONNECTED)。The terminal device can enter the RRC connected state (RRC_CONNECTED) from the radio resource control (Radio Resource Control, RRC) idle state (RRC_IDLE state).
(2)RRC连接重建过程(RRC Connection Re-establishment procedure)。(2) RRC Connection Re-establishment procedure (RRC Connection Re-establishment procedure).
(3)切换(Handover)。(3) Handover.
此时,终端设备处于连接态,需要与新的小区建立上行同步。At this time, the terminal device is in the connected state and needs to establish uplink synchronization with the new cell.
(4)RRC连接态下,下行数据或上行数据到达时,上行处于“不同步”状态(DL or UL data arrival during RRC_CONNECTED when UL synchronisation status is"non-synchronised")。(4) In the RRC connection state, when downlink data or uplink data arrives, the uplink is in a "non-synchronised" state (DL or UL data arrival during RRC_CONNECTED when UL synchronisation status is "non-synchronised").
(5)RRC连接态下,上行数据到达时,没有可用的物理上行控制信道(Physical Uplink Control Channel,PUCCH)资源用于调度请求(Scheduling Request,SR)传输(UL data arrival during RRC_CONNECTED when there are no PUCCH resources for SR available)。(5) In the RRC connected state, when uplink data arrives, there is no available physical uplink control channel (PUCCH) resource for scheduling request (Scheduling Request, SR) transmission (UL data arrival during RRC_CONNECTED when there are no PUCCH resources for SR available).
(6)SR失败(SR failure)。(6) SR failure (SR failure).
(7)RRC在同步配置时的请求(Request by RRC upon synchronous reconfiguration)。(7) RRC request during synchronous configuration (Request by RRC upon synchronous reconfiguration).
(8)终端设备从RRC非激活态过渡(Transition from RRC_INACTIVE)。(8) The terminal device transitions from the RRC inactive state (Transition from RRC_INACTIVE).
(9)在SCell添加时建立时间对齐(To establish time alignment at SCell addition)。(9) Establish time alignment (To establish time alignment at SCell addition) when SCell is added.
(10)终端设备请求其他系统信息(Other System Information,OSI)。(10) The terminal device requests other system information (Other System Information, OSI).
(11)终端设备需要进行波束(Beam)失败的恢复(Beam failure recovery)。(11) The terminal device needs to perform beam failure recovery (Beam failure recovery).
在NR系统中,可以支持两种随机接入方式:如图2所示的基于竞争的随机接入方式和如图3所示的基于非竞争的随机接入方式。下面简单描述基于竞争的四步随机接入过程:In the NR system, two random access methods can be supported: a contention-based random access method as shown in FIG. 2 and a non-contention-based random access method as shown in FIG. The following briefly describes the four-step random access process based on contention:
步骤1,终端设备向网络设备发送随机接入前导码(Preamble,也即message1,Msg1)。Step 1. The terminal device sends a random access preamble (Preamble, that is, message1, Msg1) to the network device.
其中,随机接入前导码也可以称为前导码、随机接入前导码序列、前导码序列等。Among them, the random access preamble may also be referred to as a preamble, a random access preamble sequence, a preamble sequence, and so on.
具体而言,终端设备可以选择物理随机接入信道(Physical Random Access Channel,PRACH)资源,PRACH资源可以包括时域资源、频域资源和码域资源。接下来,终端设备可以在选择的PRACH资源上发送选择的Preamble。网络设备可以根据Preamble估计其与终端设备之间的传输时延并以此 校准上行定时(timing),以及可以大体确定终端设备传输消息3(Msg3)所需要的资源大小。Specifically, the terminal device may select physical random access channel (Physical Random Access Channel, PRACH) resources, and the PRACH resources may include time domain resources, frequency domain resources, and code domain resources. Next, the terminal device can send the selected Preamble on the selected PRACH resource. The network device can estimate the transmission delay between it and the terminal device based on the Preamble and use this to calibrate the uplink timing, and can roughly determine the size of the resource required for the terminal device to transmit message 3 (Msg3).
步骤2,网络设备向终端设备发送随机接入响应(Random Access Response,RAR,也即message2,Msg2)Step 2: The network device sends a random access response (Random Access Response, RAR, that is, message2, Msg2) to the terminal device
终端设备向网络设备发送Preamble后,可以开启一个RAR窗口,在该RAR窗口内根据随机访问无线网络临时标识符(Random Access Radio Network Temporary Identifier,RA-RNTI)检测对应的物理下行控制信道(Physical Downlink Control Channel,PDCCH)。若终端设备检测到RA-RNTI加扰的PDCCH后,可以获得该PDCCH调度的物理下行共享信道(Physical Downlink Shared Channel,PDSCH)。其中,该PDSCH中包括Preamble对应的RAR。After the terminal device sends the Preamble to the network device, it can open a RAR window, in which RAR window detects the corresponding physical downlink control channel (Physical Downlink) according to the Random Access Radio Network Temporary Identifier (RA-RNTI) Control Channel, PDCCH). If the terminal device detects the PDCCH scrambled by the RA-RNTI, it can obtain the physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) scheduled by the PDCCH. Wherein, the PDSCH includes the RAR corresponding to the Preamble.
如果在此RAR窗口内没有接收到网络设备回复的RAR,则终端设备可以认为此次随机接入过程失败。应理解,终端设备和网络设备都需要唯一地确定RA-RNTI的值,否则终端设备就无法解码RAR。If the RAR returned by the network device is not received within this RAR window, the terminal device can consider that this random access procedure has failed. It should be understood that both the terminal equipment and the network equipment need to uniquely determine the value of RA-RNTI, otherwise the terminal equipment cannot decode the RAR.
可选地,本申请实施例中,RA-RNTI可以通过收发双方都明确的Preamble的时频位置来计算RA-RNTI的值。比如,与Preamble相关联的RA-RNTI可以通过公式(1)计算:Optionally, in this embodiment of the present application, the RA-RNTI may calculate the value of the RA-RNTI by using the time-frequency position of the Preamble that is clear to both the transmitting and receiving parties. For example, RA-RNTI associated with Preamble can be calculated by formula (1):
RA-RNTI=1+s_id+14×t_id+14×80×f_id+14×80×8×ul_carrier_id(1)RA-RNTI=1+s_id+14×t_id+14×80×f_id+14×80×8×ul_carrier_id(1)
其中,s_id为PRACH资源的第一个正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)符号的索引(0≤s_id<14),t_id为一个系统帧中PRACH资源的第一个时隙的索引(0≤t_id<80),f_id为频域中PRACH资源的索引(0≤f_id<8),ul_carrier_id为用于传输Preamble的上行载波(0表示NUL载波,1表示SUL载波)。对于FDD而言,每个子帧只有一个PRACH资源,因此,f_id固定为0。Among them, s_id is the index of the first Orthogonal Frequency Division Multiplexing (OFDM) symbol of the PRACH resource (0≤s_id<14), and t_id is the index of the first time slot of the PRACH resource in a system frame. Index (0≤t_id<80), f_id is the index of the PRACH resource in the frequency domain (0≤f_id<8), and ul_carrier_id is the uplink carrier used to transmit the Preamble (0 represents the NUL carrier, 1 represents the SUL carrier). For FDD, there is only one PRACH resource per subframe, so f_id is fixed to 0.
换句话说,由于终端设备发送的Preamble时频位置是确定的,网络设备在解码Preamble时,也获得了该Preamble的时频位置,进而可以知道RAR中需要使用的RA-RNTI。当终端设备成功地接收到一个RAR(使用确定的RA-RNTI来解码),且该RAR中的随机访问序列标识符(Random Access Preamble Identifier,RAPID)与终端设备发送的Preamble index相同时,则可以认为成功接收了RAR,此时终端设备就可以停止检测RA-RNTI加扰的PDCCH了。In other words, since the time-frequency position of the Preamble sent by the terminal device is determined, the network device also obtains the time-frequency position of the Preamble when decoding the Preamble, and can then know the RA-RNTI that needs to be used in the RAR. When the terminal device successfully receives a RAR (using a certain RA-RNTI to decode), and the random access sequence identifier (Random Access Preamble Identifier, RAPID) in the RAR is the same as the preamble index sent by the terminal device, it can It is considered that the RAR is successfully received, and the terminal device can stop detecting the PDCCH scrambled by the RA-RNTI at this time.
RAR可以携带在媒体访问控制(Media Access Control,MAC)协议数据单元(Protocol Data Unit,PDU)内,下面结合图4从包括RAR的MAC PDU构成的角度来介绍RAR携带的信息。The RAR can be carried in the Media Access Control (MAC) protocol data unit (Protocol Data Unit, PDU). The information carried by the RAR will be introduced from the perspective of the configuration of the MAC PDU including the RAR with reference to FIG. 4.
从图4中可以看到,一个MAC PDU可以包括一个或多个MAC子PDU(subPDU)以及可能存在的填充(padding)比特,一个MAC subPDU可以只有)回退指示(Backoff Indicator,BI),或只有随机访问序列标识符(Random Access Preamble Identifier,RAPID),或RAPID和MAC RAR。It can be seen from Figure 4 that a MAC PDU may include one or more MAC subPDUs (subPDU) and possibly padding bits, and a MAC subPDU may only have a Backoff Indicator (BI), or There are only random access sequence identifiers (Random Access Preamble Identifier, RAPID), or RAPID and MAC RAR.
从MAC PDU的结构可以看出,如果网络设备在同一PRACH资源上检测到来自多个终端设备的随机接入请求,则使用一个MAC PDU就可以对这些接入请求进行响应,每个随机接入请求(对应一个Preamble index)的响应对应一个RAR。换句话说,如果多个终端设备在同一PRACH资源(时频位置相同,使用同一RA-RNTI)发送Preamble,则对应的RAR复用在同一MAC PDU中。It can be seen from the structure of MAC PDU that if a network device detects random access requests from multiple terminal devices on the same PRACH resource, it can use one MAC PDU to respond to these access requests. Each random access The response to the request (corresponding to a preamble index) corresponds to a RAR. In other words, if multiple terminal devices send Preamble on the same PRACH resource (the same time and frequency position, using the same RA-RNTI), the corresponding RARs are multiplexed in the same MAC PDU.
即,使用相同PRACH资源发送Preamble(Preamble不一定相同)的所有终端设备都检测相同的RA-RNTI加扰的PDCCH,并接收相同的MAC PDU,但不同RAPID对应不同的RAR。That is, all terminal devices that use the same PRACH resource to send the Preamble (the Preamble is not necessarily the same) detect the same RA-RNTI scrambled PDCCH and receive the same MAC PDU, but different RAPIDs correspond to different RARs.
由于MAC PDU只能使用一个RA-RNTI加扰,这也意味着使用不同PRACH资源(时频位置不同)发送的Preamble对应的RAR不能复用到同一个MAC PDU中。Since the MAC PDU can only be scrambled with one RA-RNTI, this also means that the RAR corresponding to the Preamble sent using different PRACH resources (different time and frequency positions) cannot be multiplexed into the same MAC PDU.
图5是本申请实施例的BI子头的示意性框图。如图5所示,BI子头可以包括一个扩展字段(E)、一个类型字段(T)、两个预留字段(R)以及BI值。FIG. 5 is a schematic block diagram of a BI subheader in an embodiment of the present application. As shown in FIG. 5, the BI sub-header may include an extension field (E), a type field (T), two reserved fields (R), and a BI value.
针对BI子头,该BI子头只出现一次,且位于MAC头(header)的第一个字头处。如果终端设备收到了一个BI子头,则会保存一个回退值,该值等于该字头中的BI对应的值;否则终端设备可以将Backoff值设为0。BI对应的值指定了终端设备重发Preamble前需要等待的时间范围。如果终端设备在RAR窗口内没有接收到RAR,或接收到的RAR中没有一个RAPID与自己选择的preamble index相符合,则可以认为此次RAR接收失败。此时终端设备需要等待一段时间后,再发起随机接入。等待的时间可以为在0至BI对应的值指定的等待时间区间内的任意一个随机值。Regarding the BI sub-header, the BI sub-header appears only once and is located at the first head of the MAC header (header). If the terminal device receives a BI subheader, it will save a backoff value, which is equal to the value corresponding to the BI in the header; otherwise, the terminal device can set the Backoff value to 0. The value corresponding to BI specifies the time range that the terminal device needs to wait before resending the Preamble. If the terminal device does not receive the RAR within the RAR window, or if none of the received RARs matches the preamble index selected by the terminal device, it can be considered that the RAR reception fails. At this time, the terminal device needs to wait for a period of time before initiating random access. The waiting time can be any random value within the waiting time interval specified by the value corresponding to 0 to BI.
图6是本申请实施例的RAPID子头的示意性框图。Fig. 6 is a schematic block diagram of a RAPID subheader in an embodiment of the present application.
如图6所示,RAPID子头可以包括一个E、一个T以及RAPID值。其中,RAPID为网络设备响应接收到的Preamble index。如果终端设备发现该值与自己发送Preamble时使用的索引相同,则可以认为成功接收到对应的RAR。As shown in Figure 6, the RAPID subheader can include an E, a T, and RAPID values. Among them, RAPID is the Preamble index received by the network device in response. If the terminal device finds that the value is the same as the index used when it sends the Preamble, it can be considered that the corresponding RAR has been successfully received.
图7是本申请实施例的MAC RAR的示意性框图。如图7所示,MAC RAR可以包括:预留比特R(例如,1个比特)、时间对齐指令(Timing Advance Command,TAC)、上行授权(UL grant)、以及临时的小区无线网络临时标识(Temporary Cell Radio Network Temporary Identifier,TC-RNTI)。FIG. 7 is a schematic block diagram of a MAC RAR according to an embodiment of the present application. As shown in Figure 7, MAC RAR may include: reserved bit R (for example, 1 bit), time alignment command (Timing Advance Command, TAC), uplink grant (UL grant), and temporary cell radio network temporary identification ( Temporary Cell Radio Network Temporary Identifier, TC-RNTI).
其中,TAC可以用于指定终端设备上行同步所需要的时间调整量,可以占据12比特。UL grant 可以用于调度Msg3的上行资源指示。TC-RNTI可以用于加扰Msg 4的PDCCH(初始接入)。Among them, TAC can be used to specify the amount of time adjustment required for the uplink synchronization of the terminal equipment, and can occupy 12 bits. UL grant can be used to schedule Msg3 uplink resource indication. TC-RNTI can be used to scramble the Msg4 PDCCH (initial access).
步骤3,终端设备发送Msg3。 Step 3. The terminal device sends Msg3.
终端设备在收到RAR消息后,判断该RAR是否为属于自己的RAR消息,例如终端设备可以利用前导码索引进行核对,在确定是属于自己的RAR消息后,可以在RRC层产生Msg3,并向网络设备发送Msg3,其中需要携带终端设备的标识信息等。After receiving the RAR message, the terminal device determines whether the RAR is its own RAR message. For example, the terminal device can use the preamble index to check. After determining that it is its own RAR message, it can generate Msg3 in the RRC layer and send it to The network device sends Msg3, which needs to carry the identification information of the terminal device, etc.
其中,Msg3主要用于通知网络设备该随机接入的触发事件。针对不同的随机接入触发事件,终端设备在步骤3中发送的Msg3可以包括不同的内容。Among them, Msg3 is mainly used to notify the network equipment of the random access trigger event. For different random access trigger events, the Msg3 sent by the terminal device in step 3 may include different content.
例如,对于初始接入的场景,Msg3可以包括RRC层生成的RRC连接请求消息(RRC Setup Request)。此外,Msg3还可以携带例如终端设备的5G-服务临时移动用户标识(Serving-Temporary Mobile Subscriber Identity,S-TMSI)或随机数等。For example, for the initial access scenario, Msg3 may include the RRC connection request message (RRC Setup Request) generated by the RRC layer. In addition, Msg3 may also carry, for example, the 5G-service temporary mobile subscriber identity (Serving-Temporary Mobile Subscriber Identity, S-TMSI) of the terminal device or a random number.
又例如,对于RRC连接重建场景,Msg3可以包括RRC层生成的RRC连接重建请求消息(RRC Reestabilshment Request)。此外,Msg3还可以携带例如小区无线网络临时标识(Cell Radio Network Temporary Identifier,C-RNTI)等。For another example, for an RRC connection re-establishment scenario, Msg3 may include an RRC connection re-establishment request message (RRC Reestabilshment Request) generated by the RRC layer. In addition, Msg3 may also carry, for example, a Cell Radio Network Temporary Identifier (C-RNTI).
又例如,对于切换场景,Msg3可以包括RRC层生成的RRC切换确认消息(RRC Handover Confirm),其携带终端设备的C-RNTI。此外,Msg3还可携带例如缓冲状态报告(Buffer Status Report,BSR)等信息。对于其它触发事件例如上/下行数据到达的场景,Msg3至少可以包括终端设备的C-RNTI。For another example, for a handover scenario, Msg3 may include an RRC handover confirmation message (RRC Handover Confirm) generated by the RRC layer, which carries the C-RNTI of the terminal device. In addition, Msg3 may also carry information such as Buffer Status Report (BSR). For other trigger events such as uplink/downlink data arrival scenarios, Msg3 may at least include the C-RNTI of the terminal device.
步骤4,网络设备向终端设备发送冲突解决消息(contention resolution),即Msg4。 Step 4. The network device sends a contention resolution message (Msg4) to the terminal device.
网络设备向终端设备发送Msg4,终端设备正确接收Msg4完成竞争解决(Contention Resolution)。例如在RRC连接建立过程中,Msg4中可以携带RRC连接建立消息。The network device sends Msg4 to the terminal device, and the terminal device correctly receives the Msg4 to complete the contention resolution (Contention Resolution). For example, during the RRC connection establishment process, Msg4 may carry the RRC connection establishment message.
由于步骤3中的终端设备可以在Msg3中携带自己唯一的标识,从而网络设备在竞争解决机制中,会在Msg4中携带终端设备的唯一标识以指定竞争中胜出的终端设备。而其它没有在竞争解决中胜出的终端设备将重新发起随机接入。Since the terminal device in step 3 can carry its own unique identifier in Msg3, the network device will carry the unique identifier of the terminal device in Msg4 in the contention resolution mechanism to specify the terminal device that wins the competition. Other terminal devices that did not win in the contention resolution will re-initiate random access.
应理解,在本申请实施例中,竞争冲突解决可以有两种方式:It should be understood that, in the embodiment of the present application, there are two ways to resolve the contention conflict:
方式一、如果终端设备在Msg3携带了C-RNTI,则Msg4可以用C-RNTI加扰的PDCCH调度。Manner 1: If the terminal equipment carries the C-RNTI in Msg3, Msg4 can be scheduled with the PDCCH scrambled by the C-RNTI.
方式二、如果终端设备没有在Msg3中携带C-RNTI,比如是初始接入,则Msg4可以用TC-RNTI加扰的PDCCH调度。此时,竞争冲突的解决可以是通过终端设备接收Msg4的PDSCH,获得冲突解决ID,通过匹配该冲突解决ID与msg3中中的公共控制信道(Common control channel,CCCH)服务数据单元(Service Data Unit,SDU)来判断是否解决冲突。Manner 2: If the terminal device does not carry the C-RNTI in the Msg3, such as initial access, the Msg4 can be scheduled with the PDCCH scrambled by the TC-RNTI. At this time, the resolution of the contention conflict can be through the terminal device receiving the PDSCH of Msg4 to obtain the conflict resolution ID, and by matching the conflict resolution ID with the common control channel (CCCH) service data unit in msg3 , SDU) to determine whether to resolve the conflict.
四步随机接入的时延比较大,对于5G中的低时延高可靠场景是不合适的。考虑到低时延高可靠相关业务的特点,提出了两步随机接入过程的方案。如图8所示,在两步随机接入过程中,简单的说,相当于将四步随机接入过程的第一步和第三步合并为两步随机接入过程中的第一步,将四步随机接入过程的第二步和第四步合并为两步随机接入过程中的第二步。The delay of four-step random access is relatively large, which is not suitable for the low-latency and high-reliability scenarios in 5G. Considering the characteristics of low-latency and high-reliability related services, a two-step random access process scheme is proposed. As shown in Figure 8, in the two-step random access process, in simple terms, it is equivalent to combining the first and third steps of the four-step random access process into the first step in the two-step random access process. The second and fourth steps of the four-step random access process are combined into the second step of the two-step random access process.
更具体地,两步随机接入过程可以包括:More specifically, the two-step random access procedure may include:
第一步:终端设备向网络设备发送第一消息。The first step: the terminal device sends the first message to the network device.
其中,第一消息可以由Preamble和有效载荷(payload)组成,Preamble为四步随机接入的Preamble,该Preamble在PRACH资源上传输,Payload主要携带四步随机接入中的Msg3中的信息。例如,可以包含CCCH SDU,比如对应RRC空闲态下的随机接入,也可以包含C-RNTI MAC控制单元(Control Element,CE),比如主要对应RRC连接态下的随机接入。Payload可以承载于上行信道,该信道例如可以为物理上行共享信道(Physical Uplink Shared Channel,PUSCH)。The first message may be composed of a preamble and a payload (payload). The Preamble is a four-step random access Preamble. The preamble is transmitted on the PRACH resource. The payload mainly carries information in Msg3 in the four-step random access. For example, it may include CCCH SDU, such as corresponding to random access in RRC idle state, and may also include C-RNTI MAC control element (CE), such as mainly corresponding to random access in RRC connected state. The payload may be carried on an uplink channel, and the channel may be, for example, a physical uplink shared channel (PUSCH).
应理解,第一消息可以携带四步随机接入过程中的Preamble和Msg3中携带的部分或全部信息。It should be understood that the first message may carry part or all of the information carried in the Preamble and Msg3 in the four-step random access process.
第二步:网络设备向终端设备发送第二消息。Step 2: The network device sends a second message to the terminal device.
若网络设备成功接收到终端设备发送的第一消息,则可以向终端设备发送第二消息。该第二消息中可以包含四步随机接入过程中的Msg2和Msg4中携带的部分或全部信息。第一消息和第二消息的名称并不限定,也就是说,它们也可以表述为其他名称。例如,第一消息也可以称为Msg A、随机接入请求消息或新Msg1,第二消息也可以称为Msg B或新Msg2。If the network device successfully receives the first message sent by the terminal device, it can send the second message to the terminal device. The second message may include part or all of the information carried in Msg2 and Msg4 in the four-step random access process. The names of the first message and the second message are not limited, that is, they can also be expressed as other names. For example, the first message may also be called Msg A, random access request message or new Msg1, and the second message may also be called Msg B or new Msg2.
还应理解,图8仅仅是两步随机接入过程的一种具体实现方式,不应对本申请的保护范围构成限定。It should also be understood that FIG. 8 is only a specific implementation of the two-step random access process, and should not limit the protection scope of this application.
然而,在两步随机接入过程中,由于第一消息可以由多个终端设备共享,因此需要考虑竞争冲突的问题,以及如何解决竞争冲突。为了解决上述问题,本申请实施例提出了一种随机接入的方法,可以使得终端设备有效解决两步随机接入过程中的竞争冲突。However, in the two-step random access process, since the first message can be shared by multiple terminal devices, it is necessary to consider the issue of contention conflict and how to resolve the contention conflict. In order to solve the above problem, the embodiment of the present application proposes a random access method, which can enable the terminal device to effectively resolve the contention conflict in the two-step random access process.
图9是根据本申请实施例的随机接入的方法300的示意性流程图。图9所述的方法可以由终端设 备和网络设备执行,该终端设备例如可以为图1中所示的终端设备120,该网络设备例如可以为图1中所示的网络设备110。如图9所示,该方法300可以包括以下内容中的至少部分内容。FIG. 9 is a schematic flowchart of a random access method 300 according to an embodiment of the present application. The method described in FIG. 9 may be executed by a terminal device and a network device. The terminal device may be, for example, the terminal device 120 shown in FIG. 1, and the network device may be, for example, the network device 110 shown in FIG. As shown in FIG. 9, the method 300 may include at least part of the following content.
在310中,终端设备向网络设备发送第一消息,该第一消息包括随机接入前导码(即Preamble)和上行消息,该上行消息包含第一标识。In 310, the terminal device sends a first message to the network device. The first message includes a random access preamble (ie, Preamble) and an uplink message, and the uplink message includes a first identifier.
在320中,网络设备接收到第一消息后,解码第一消息,并根据第一消息的解码情况,确定向终端设备发送的响应消息。In 320, after receiving the first message, the network device decodes the first message, and determines the response message to be sent to the terminal device according to the decoding situation of the first message.
在330中,网络设备向终端设备发送响应消息。In 330, the network device sends a response message to the terminal device.
在340中,若网络设备发送的响应消息包括第一PDCCH,终端设备根据第一标识,确定盲检第一PDCCH所使用的第一目标RNTI。In 340, if the response message sent by the network device includes the first PDCCH, the terminal device determines the first target RNTI used for blind detection of the first PDCCH according to the first identifier.
在350中,终端设备根据第一目标RNTI,盲检第一PDCCH,并根据盲检第一PDCCH的结果,确定是否盲检第二PDCCH。In 350, the terminal device blindly detects the first PDCCH according to the first target RNTI, and determines whether to blindly detect the second PDCCH according to the result of blindly detecting the first PDCCH.
在360中,若终端设备确定盲检第二PDCCH,终端设备盲检第二PDCCH,并根据盲检第二PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突。In 360, if the terminal device determines to blindly detect the second PDCCH, the terminal device blindly detects the second PDCCH, and determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
应理解,方法300中的第一消息可以对应图8中的第一消息。It should be understood that the first message in the method 300 may correspond to the first message in FIG. 8.
在本申请实施例中,第一消息包括Preamble和上行消息可以理解为:终端设备在向网络设备发送Preamble和上行消息之间,网络设备与终端设备之间没有其他消息,和/或,网络设备可以针对Preamble和上行消息同时向终端设备发送第二消息。In the embodiment of the present application, the first message including the Preamble and the uplink message can be understood as: between the terminal device sending the Preamble and the uplink message to the network device, there is no other message between the network device and the terminal device, and/or the network device The second message may be sent to the terminal device simultaneously for the Preamble and the uplink message.
具体而言,终端设备可以先选择第一消息的资源,包括PRACH资源和对应的PUSCH资源,然后再利用选择的资源传输第一消息。其中,终端设备可以利用PRACH资源传输Preamble,利用PUSCH资源传输payload。Specifically, the terminal device may first select the resource of the first message, including the PRACH resource and the corresponding PUSCH resource, and then use the selected resource to transmit the first message. Among them, the terminal device can use the PRACH resource to transmit the Preamble and the PUSCH resource to transmit the payload.
终端设备可以处于连接态、非激活态或空闲态。当终端设备处于不同的RRC状态时,第一消息包括的第一标识可以是不同的。第一标识基本上可以表示为两类,一类是Payload中包含C-RNTI MAC CE,另一类是Payload中不包含C-RNTI MAC CE,即包含CCCH SDU。The terminal device can be in a connected state, an inactive state or an idle state. When the terminal device is in a different RRC state, the first identifier included in the first message may be different. The first identifier can basically be expressed as two types, one is that the payload contains C-RNTI MAC CE, and the other is that the payload does not contain C-RNTI MAC CE, that is, it contains CCCH SDU.
终端设备可以根据自己当前所处的RRC状态,确定在Payload中携带的第一标识。当终端设备处于连接态时,第一标识可以是但不限于C-RNTI,该C-RNTI可以包含在C-RNTI MAC CE中。或者,当终端设备处于空闲态或非激活态时,第一标识可以包括但不限于随机数、5G-S-TMSI(或5G-S-TMSI的一部分)、识别RNTI(Identify-RNTI,I-RNTI)、短I-RNTI(Short I-RNTI)。其中,随机数的比特数是固定的,I-RNTI可以用于识别处于RRC非激活态的终端设备的内容。此时,CCCH SDU中可以包含终端设备的标识。The terminal device can determine the first identifier carried in the payload according to its current RRC state. When the terminal device is in the connected state, the first identifier may be but is not limited to the C-RNTI, and the C-RNTI may be included in the C-RNTI MAC CE. Alternatively, when the terminal device is in an idle state or in an inactive state, the first identifier may include, but is not limited to, a random number, 5G-S-TMSI (or a part of 5G-S-TMSI), and identifying RNTI (Identify-RNTI, I- RNTI), Short I-RNTI (Short I-RNTI). Among them, the number of bits of the random number is fixed, and the I-RNTI can be used to identify the content of the terminal equipment in the RRC inactive state. At this time, the CCCH SDU may include the identification of the terminal device.
该SDU可以包括在信令无线承载(Signaling Radio Bearer,SRB)0中传输的RRC消息,比如:The SDU may include the RRC message transmitted in the Signaling Radio Bearer (Signaling Radio Bearer, SRB) 0, such as:
上述内容中的消息中一般可能会包括第一标识。比如如果终端设备向网络设备传输RRCSetupRequest,则第一标识可以是一个随机数或者一个5G-S-TMSI的一部分。The message in the above content may generally include the first identifier. For example, if the terminal device transmits an RRCSetupRequest to the network device, the first identifier may be a random number or a part of 5G-S-TMSI.
终端设备向网络设备发送第一消息,相应地,网络设备可以接收终端设备发送的第一消息,并对第一消息进行解码。网络设备对第一消息进行解码,可以有多种情况:The terminal device sends the first message to the network device, and correspondingly, the network device can receive the first message sent by the terminal device and decode the first message. When the network device decodes the first message, there can be multiple situations:
情况1:网络设备成功解码出一个或多个Preamble,但没有解码出PUSCH中的Payload。Case 1: The network device successfully decodes one or more Preambles, but fails to decode the Payload in the PUSCH.
情况2:网络设备成功解码出一个或者多个Preamble以及一个或者多个Payload。Case 2: The network device successfully decodes one or more Preambles and one or more Payloads.
情况3:网络设备成功解码出Payload但是没有解码出Preamble。需要说明的是,由于网络设备需要Preamble来作为上行定时估计,因此出现情况3的可能性较小,本申请实施例不考虑情况3。Case 3: The network device successfully decoded the payload but failed to decode the preamble. It should be noted that, since the network device needs the Preamble as the uplink timing estimation, the possibility of case 3 is small, and case 3 is not considered in this embodiment of the application.
下面详细描述情况1和情况2。Case 1 and Case 2 are described in detail below.
由于多个终端设备可以采用相同的PRACH资源传输Preamble。因此,在情况1中,若网络设备只解码出Preamble,此时网络设备可能不能区分出终端设备。在这种情况下,网络设备可以响应Preamble,即向终端设备发送四步随机接入中的RAR来响应Preamble。这样,对于两步随机接入的终端设备来说,可以回退到四步随机接入;对于四步随机接入的终端设备来说,则是正常的流程。或者不响应Preamble,即网络设备可以向终端设备发送第二指示信息,该第二指示信息可以用于指示终端设备重传第一消息。Because multiple terminal devices can use the same PRACH resource to transmit the Preamble. Therefore, in case 1, if the network device only decodes the preamble, the network device may not be able to distinguish the terminal device at this time. In this case, the network device can respond to the Preamble, that is, send the RAR in the four-step random access to the terminal device to respond to the Preamble. In this way, for a terminal device with two-step random access, it can fall back to a four-step random access; for a terminal device with four-step random access, it is a normal process. Or it does not respond to the Preamble, that is, the network device may send the second indication information to the terminal device, and the second indication information may be used to instruct the terminal device to retransmit the first message.
应理解,终端设备重传的第一消息可以和之前传输的第一消息相同,也可以不同,重传第一消息的资源可以和之前传输第一消息的资源相同,也可以不同。It should be understood that the first message retransmitted by the terminal device may be the same as or different from the first message previously transmitted, and the resource for retransmitting the first message may be the same as or different from the resource previously transmitted for the first message.
进一步地,若网络设备可以区分进行四步随机接入的终端设备和进行两步随机接入的终端设备,则网络设备可以向终端设备发送第三指示信息,该第三指示信息可以用于指示终端设备停止盲检第一 PDCCH,从而终端设备可以尽快地重传第一消息。其中,第一PDCCH用于调度RAR。Further, if the network device can distinguish between a terminal device that performs four-step random access and a terminal device that performs two-step random access, the network device may send third instruction information to the terminal device, and the third instruction information may be used to indicate The terminal device stops blindly checking the first PDCCH, so that the terminal device can retransmit the first message as soon as possible. Among them, the first PDCCH is used for scheduling RAR.
可选地,进行两步随机接入的终端设备和进行四步随机接入的终端设备的PRACH资源可以不同,此时,网络设备可以根据接收Preamble的PRACH资源区分进行四步随机接入的终端设备和进行两步随机接入的终端设备。Optionally, the PRACH resources of the terminal device performing the two-step random access and the terminal device performing the four-step random access may be different. In this case, the network device can distinguish the terminal performing the four-step random access according to the PRACH resource that receives the Preamble Equipment and terminal equipment for two-step random access.
其中,PRACH资源可以是网络设备配置的,或者可以是预设在终端设备上的。Wherein, the PRACH resource may be configured by the network device, or may be preset on the terminal device.
在情况2中,网络设备可以区分出payload中标识对应的终端设备。此时,网络设备根据第一标识,可以有不同的响应方式。In case 2, the network device can distinguish the terminal device corresponding to the identifier in the payload. At this time, the network device may have different response modes according to the first identifier.
可选地,承载Preamble的PRACH资源和承载Payload的PUSCH之间存在一定关联关系,如果网络设备响应Payload时,可以基于上述关联关系响应Payload。例如,若Preamble解码成功,但该Preamble对应的Payload解码没有成功,网络设备可以响应Preamble,也可以不响应Preamble。如果Preamble解码成功,且该Preamble对应的Payload也解码成功,则网络设备可以响应Payload。进一步地,由于多个终端设备可能同时使用了已成功解码的Preamble,因此,所述网络设备还可以进一步可以响应已成功解码的Preamble。Optionally, there is a certain association relationship between the PRACH resource carrying the Preamble and the PUSCH carrying the payload. If the network device responds to the payload, it can respond to the payload based on the above association relationship. For example, if the Preamble is successfully decoded but the Payload corresponding to the Preamble is not successfully decoded, the network device may respond to the Preamble or not. If the Preamble is successfully decoded and the Payload corresponding to the Preamble is also successfully decoded, the network device can respond to the Payload. Further, since multiple terminal devices may use the successfully decoded Preamble at the same time, the network device may further respond to the successfully decoded Preamble.
本申请实施例中,若网络设备响应RAR,则网络设备可以向终端设备发送第一PDCCH。In the embodiment of the present application, if the network device responds to the RAR, the network device may send the first PDCCH to the terminal device.
在一种可能的实施例中,终端设备可以根据第一标识,确定第一目标RNTI,然后根据第一目标RNTI盲检第一PDCCH。In a possible embodiment, the terminal device may determine the first target RNTI according to the first identifier, and then blindly detect the first PDCCH according to the first target RNTI.
若第一标识为C-RNTI,则终端设备确定第一目标RNTI可以为C-RNTI;若第一标识是除C-RNTI以外的其他标识,则终端设备可以确定第一目标RNTI可以为RA-RNTI。示例性地,C-RNTI以外的其他标识可以为随机数、5G-S-TMSI、I-RNTI、Short I-RNTI等。If the first identifier is C-RNTI, the terminal device determines that the first target RNTI may be C-RNTI; if the first identifier is an identifier other than C-RNTI, the terminal device may determine that the first target RNTI may be RA- RNTI. Exemplarily, the identifiers other than C-RNTI may be random numbers, 5G-S-TMSI, I-RNTI, Short I-RNTI, and so on.
可选地,RA-RNTI与传输第一消息中的Preamble的PRACH资源,和/或,传输Payload的PUSCH资源可以具有对应关系。也就是说,终端设备或者网络设备可以根据传输第一消息中的Preamble的PRACH资源,和/或,传输Payload的PUSCH资源确定RA-RNTI。Optionally, the RA-RNTI may have a corresponding relationship with the PRACH resource for transmitting the Preamble in the first message, and/or the PUSCH resource for transmitting the payload. That is, the terminal device or the network device may determine the RA-RNTI according to the PRACH resource of the Preamble transmitted in the first message, and/or the PUSCH resource of the payload transmitted.
示例性地,RA-RNTI与传输第一消息中的Preamble的PRACH资源的对应关系可以为:RA-RNTI可以是由传输Preamble的PRACH时频资源位置计算出来的,一种可能的计算方式如公式(2):Exemplarily, the correspondence between the RA-RNTI and the PRACH resource for transmitting the Preamble in the first message may be: RA-RNTI may be calculated from the position of the PRACH time-frequency resource for transmitting the Preamble. A possible calculation method is as follows: (2):
RA-RNTI=1+s_id+14×t_id+14×80×f_id+14×80×8×ul_carrier_id (2)RA-RNTI=1+s_id+14×t_id+14×80×f_id+14×80×8×ul_carrier_id (2)
其中,s_id为传输第一消息中的Preamble的PRACH资源的第一个OFDM符号的索引(0≤s_id<14),t_id为一个系统帧中传输第一消息中的Preamble的PRACH资源的第一个时隙的索引(0≤t_id<80),f_id为频域中传输第一消息中的Preamble的PRACH资源的索引(0≤f_id<8),ul_carrier_id为用于传输第一消息中的Preamble的上行载波(0表示NUL载波,1表示SUL载波)。Among them, s_id is the index of the first OFDM symbol of the PRACH resource for transmitting the Preamble in the first message (0≤s_id<14), and t_id is the first one of the PRACH resource for transmitting the Preamble in the first message in a system frame The index of the time slot (0≤t_id<80), f_id is the index of the PRACH resource for transmitting the Preamble in the first message in the frequency domain (0≤f_id<8), and ul_carrier_id is the uplink used to transmit the Preamble in the first message Carrier (0 means NUL carrier, 1 means SUL carrier).
在终端设备确定第一目标RNTI后,终端设备可以根据第一目标RNTI,盲检第一PDCCH。After the terminal device determines the first target RNTI, the terminal device may blindly detect the first PDCCH according to the first target RNTI.
在一种实现方式中,终端设备盲检第一PDCCH可以包括:在终端设备向网络设备发送第一消息后,终端设备启动第一定时器或开启第一窗口,在第一定时器或第一窗口的时长范围内,盲检第一PDCCH。In an implementation manner, the blind detection of the first PDCCH by the terminal device may include: after the terminal device sends the first message to the network device, the terminal device starts a first timer or opens a first window, and the first timer or Within the duration of the window, blindly check the first PDCCH.
可选地,第一定时器或第一窗口的时长可以是基于协议预设在终端设备上的,或者,可以是由网络设备预先配置给终端设备的,例如,可以通过RRC信令进行配置。Optionally, the duration of the first timer or the first window may be preset on the terminal device based on a protocol, or may be pre-configured by the network device to the terminal device, for example, it may be configured through RRC signaling.
应理解,第一定时器或第一窗口既可以在随机接入前导码发送完之后启动,也可以在发送完上行消息后启动,本申请实施例对此不作具体限定。It should be understood that the first timer or the first window may be started after the random access preamble is sent, or after the uplink message is sent, which is not specifically limited in the embodiment of the present application.
下面分别从第一目标RNTI为C-RNTI或者RA-RNTI两种情况描述终端设备接下来的行为。The following describes the next behavior of the terminal device from two cases where the first target RNTI is C-RNTI or RA-RNTI.
情况1:第一目标RNTI为C-RNTI。Case 1: The first target RNTI is C-RNTI.
在该情况下,终端设备不盲检第二PDCCH,则终端设备可以根据盲检第一PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突。In this case, if the terminal device does not blindly detect the second PDCCH, the terminal device can determine whether the contention conflict in the random access process has been resolved according to the result of blindly detecting the first PDCCH.
具体而言,若终端设备盲检到C-RNTI加扰的第一PDCCH,且该C-RNTI与第一消息中的第一标识匹配成功,则终端设备可以确定随机接入过程中的竞争冲突已解决。若终端设备盲检到C-RNTI加扰的第一PDCCH,但该C-RNTI与第一消息中的第一标识未匹配成功,则终端设备可以确定随机接入过程中的竞争冲突未解决。Specifically, if the terminal device blindly detects the first PDCCH scrambled by the C-RNTI, and the C-RNTI matches the first identifier in the first message successfully, the terminal device can determine the contention conflict in the random access process solved. If the terminal device blindly detects the first PDCCH scrambled by the C-RNTI, but the C-RNTI does not match the first identifier in the first message successfully, the terminal device may determine that the contention conflict in the random access process is not resolved.
或者,若终端设备未盲检到C-RNTI加扰的第一PDCCH,则终端设备可以确定随机接入过程中的竞争冲突未解决,终端设备可以重新向网络设备发送第一消息。Or, if the terminal device does not blindly detect the first PDCCH scrambled by the C-RNTI, the terminal device may determine that the contention conflict in the random access process is not resolved, and the terminal device may resend the first message to the network device.
情况2:第一目标RNTI为RA-RNTI。Case 2: The first target RNTI is RA-RNTI.
在该情况下,若终端设备未盲检到第一PDCCH,则终端设备可以重新向网络设备发送第一消息。In this case, if the terminal device does not blindly detect the first PDCCH, the terminal device may resend the first message to the network device.
若终端设备盲检到第一PDCCH,且成功解码出第一指示信息,且该第一指示信息中包含一个MAC subPDU,该MAC subPDU的包头中包含的RAPID对应第一消息中的Preamble index,则终端设备可以确定已成功解码第一指示信息,则终端设备可以根据第一指示信息确定是否盲检第二 PDCCH以及确定用于盲检第二PDCCH的第二目标RNTI。其中,第一PDCCH调度的信息可以包括第一指示信息,或者第一PDCCH调度的物理下行共享信道(Physical Downlink Shared Channel,PDSCH)可以包括第一指示信息。If the terminal device blindly detects the first PDCCH and successfully decodes the first indication information, and the first indication information includes a MAC subPDU, the RAPID included in the header of the MAC subPDU corresponds to the Preamble index in the first message, then The terminal device may determine that the first indication information has been successfully decoded, and the terminal device may determine whether to blindly detect the second PDCCH and determine the second target RNTI for blindly detecting the second PDCCH according to the first indication information. The information scheduled by the first PDCCH may include the first indication information, or the physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) scheduled by the first PDCCH may include the first indication information.
在本申请实施例中,第一PDCCH或第二PDCCH也可以是增强的物理下行控制信道(Enhanced Physical Downlink Control Channel,EPDCCH)、机器类通信物理下行控制信道(Machine Type Communication Physical Downlink Control Channel,MPDCCH)、窄带物理下行控制信道(Narrowband Physical Downlink Control Channel,NPDCCH),本申请对此不作限定。In the embodiments of this application, the first PDCCH or the second PDCCH may also be an enhanced physical downlink control channel (EPDCCH), a machine type communication physical downlink control channel (Machine Type Communication Physical Downlink Control Channel, MPDCCH) ), Narrowband Physical Downlink Control Channel (NPDCCH), which is not limited in this application.
作为一种示例,若第一指示信息中的至少一个比特的值为第一值,则第一指示可以用于指示终端设备盲检第二PDCCH。As an example, if the value of at least one bit in the first indication information is the first value, the first indication may be used to instruct the terminal device to blindly detect the second PDCCH.
或者,若第一指示信息中的至少一个比特的值为第二值,则第一指示可以用于指示终端设备不盲检第二PDCCH。Or, if the value of at least one bit in the first indication information is the second value, the first indication may be used to instruct the terminal device not to blindly detect the second PDCCH.
优选地,第一指示信息为一个比特,此时第一值可以为“0”或“1”,第二值也可以为“0”或“1”。当第一值为“0”时,第二值为“1”;当第一值为“1”时,第二值为“0”。Preferably, the first indication information is one bit. In this case, the first value can be "0" or "1", and the second value can also be "0" or "1". When the first value is "0", the second value is "1"; when the first value is "1", the second value is "0".
作为另一种示例,若第一指示信息的比特数为多个,当多个比特位相同时,第一指示信息可以用于指示终端设备检测第二PDCCH;若多个比特位中至少有两个比特位不同,第一指示信息可以用于指示终端设备不检测第二PDCCH。例如,第一指示信息中的3个比特位用于指示终端设备是否检测第二PDCCH,“000”表示终端设备检测第二PDCCH,“010”表示终端设备不检测第二PDCCH。As another example, if the number of bits of the first indication information is multiple, and when the multiple bits are the same, the first indication information can be used to instruct the terminal device to detect the second PDCCH; if there are at least two of the multiple bits The bits are different, and the first indication information may be used to instruct the terminal device not to detect the second PDCCH. For example, the 3 bits in the first indication information are used to indicate whether the terminal device detects the second PDCCH, "000" indicates that the terminal device detects the second PDCCH, and "010" indicates that the terminal device does not detect the second PDCCH.
应理解,本申请实施例中的具体的例子只是为了帮助本领域技术人员更好地理解本发明实施例,而非限制本申请实施例的范围。例如,当多个比特位相同时,第一指示信息可以用于指示终端设备不检测第二PDCCH。It should be understood that the specific examples in the embodiments of the present application are only used to help those skilled in the art to better understand the embodiments of the present invention, rather than limiting the scope of the embodiments of the present application. For example, when multiple bits are the same, the first indication information may be used to instruct the terminal device not to detect the second PDCCH.
作为另一种示例,第一指示信息可以通过第一参数指示终端设备是否检测第二PDCCH。示例性地,若第一指示信息中包括第一参数,则指示终端设备检测第二PDCCH;若第一指示信息中不包括第一参数,则指示终端设备不检测第二PDCCH。As another example, the first indication information may indicate whether the terminal device detects the second PDCCH through the first parameter. Exemplarily, if the first indication information includes the first parameter, the terminal device is instructed to detect the second PDCCH; if the first indication information does not include the first parameter, the terminal device is instructed not to detect the second PDCCH.
需要说明的是,本申请实施例对第一参数不做具体限定,任何可以指示终端设备是否检测第二PDCCH的参数都包含在本申请的保护范围内。It should be noted that the embodiment of the present application does not specifically limit the first parameter, and any parameter that can indicate whether the terminal device detects the second PDCCH is included in the protection scope of the present application.
可选地,第一指示信息可以是RAR。其中,RAR的格式可以与图7中RAR的格式相同,也可以不同,本申请实施例对此不作具体限定。Optionally, the first indication information may be RAR. The format of the RAR may be the same as or different from the format of the RAR in FIG. 7, which is not specifically limited in the embodiment of the present application.
可选地,该至少一个比特的比特位置可以等于四步随机接入中预留比特的比特位置。示例性地,如图7所示,此时,该至少一个比特的数量为1。例如,RAR可以通过比特“1”指示终端设备检测第二PDCCH,通过比特“0”指示终端设备不检测第二PDCCH。Optionally, the bit position of the at least one bit may be equal to the bit position of the reserved bit in the four-step random access. Exemplarily, as shown in FIG. 7, at this time, the number of the at least one bit is one. For example, the RAR may use bit "1" to instruct the terminal device to detect the second PDCCH, and use bit "0" to instruct the terminal device not to detect the second PDCCH.
需要说明的是,本申请实施例对该至少一个比特的名称不作限定。It should be noted that the embodiment of the present application does not limit the name of the at least one bit.
可选地,第一指示信息也可以是第一PDCCH携带的下行控制信息(Downlink Control Information,DCI),或者第一PDCCH携带的其他信息。Optionally, the first indication information may also be downlink control information (Downlink Control Information, DCI) carried by the first PDCCH, or other information carried by the first PDCCH.
对于终端设备来说,若第一指示信息用于指示终端设备不检测第二PDCCH,一种情况下,终端设备可以回退到四步随机接入,行为与四步随机接入一致,即:a、处理TAC;b、处理UL grant;c、设置TC-RNTI值;d、如果Msg3缓存中没有MAC PDU,则终端设备可以生成Msg3MAC PDU;e、终端设备停止盲检第二消息的窗口或定时器。之后,终端设备可以向网络设备发送Msg3,网络设备接收到Msg3后,向终端设备发送Msg4。另一种情况下,终端设备可以向网络设备重传第一消息。For the terminal device, if the first indication information is used to instruct the terminal device not to detect the second PDCCH, in one case, the terminal device can fall back to the four-step random access, and the behavior is consistent with the four-step random access, namely: a. Process TAC; b. Process UL grant; c. Set TC-RNTI value; d. If there is no MAC PDU in the Msg3 buffer, the terminal device can generate Msg3MAC PDU; e. The terminal device stops blindly checking the second message window or Timer. After that, the terminal device can send Msg3 to the network device, and the network device sends Msg4 to the terminal device after receiving the Msg3. In another case, the terminal device may retransmit the first message to the network device.
若第一指示信息用于指示终端设备盲检第二PDCCH,则终端设备盲检第二PDCCH。If the first indication information is used to instruct the terminal device to blindly detect the second PDCCH, the terminal device blindly detects the second PDCCH.
可选地,终端设备可以根据第二目标RNTI盲检第二PDCCH。Optionally, the terminal device may blindly detect the second PDCCH according to the second target RNTI.
在一种实现方式中,第二目标RNTI可以是TC-RNTI或C-RNTI。In an implementation manner, the second target RNTI may be TC-RNTI or C-RNTI.
此时,终端设备可以设置TC-RNTI或C-RNTI值,该TC-RNTI或C-RNTI值用于终端设备盲检第二消息中可能的第二PDCCH调度。At this time, the terminal device may set a TC-RNTI or C-RNTI value, and the TC-RNTI or C-RNTI value is used for the terminal device to blindly detect possible second PDCCH scheduling in the second message.
作为一种示例,若终端设备利用TC-RNTI盲检到第二PDCCH,且第一标识与第二标识匹配成功,则终端设备可以确定随机接入竞争冲突已解决。其中,第二标识可以为第二PDCCH携带的标识,或第二PDCCH调度的PDSCH中的标识。As an example, if the terminal device blindly detects the second PDCCH by using the TC-RNTI, and the first identifier matches the second identifier successfully, the terminal device may determine that the random access contention conflict has been resolved. The second identifier may be an identifier carried by the second PDCCH or an identifier in the PDSCH scheduled by the second PDCCH.
具体而言,若终端设备盲检到TC-RNTI加扰的第一PDCCH,且终端设备成功解码出调度数据中包含的MAC PDU,且该MAC PDU中包含的冲突解决ID MAC CE匹配第一消息中Payload中包含的CCCH SDU,则终端设备可以确定两步随机接入的竞争冲突已解决。其中,第二标识为竞争冲突解决ID MAC CE。Specifically, if the terminal device blindly detects the first PDCCH scrambled by TC-RNTI, and the terminal device successfully decodes the MAC PDU contained in the scheduling data, and the conflict resolution ID contained in the MAC PDU matches the first message If the CCCH and SDU included in the Payload, the terminal device can determine that the contention conflict of the two-step random access has been resolved. Among them, the second identifier is the contention conflict resolution ID MAC CE.
在另一种实现方式中,第二PDCCH可以是通过第三标识加扰的。示例性地,第三标识可以是随机数、5G-S-TMSI、I-RNTI、Short I-RNTI等。In another implementation manner, the second PDCCH may be scrambled by the third identifier. Exemplarily, the third identifier may be a random number, 5G-S-TMSI, I-RNTI, Short I-RNTI, etc.
在该实现方式下,若终端设备盲检到第三标识加扰的第一PDCCH,则终端设备可以将第三标识与第一标识进行匹配,若匹配成功,则终端设备可以确定两步随机接入的竞争冲突已解决。例如,若第二PDCCH通过一个固定大小的随机数进行加扰,则终端设备可以将该固定大小的随机数与第一标识进行匹配,若匹配成功,则终端设备可以确定两步随机接入的竞争冲突已解决。In this implementation mode, if the terminal device blindly detects the first PDCCH scrambled by the third identifier, the terminal device can match the third identifier with the first identifier. If the matching is successful, the terminal device can determine the two-step random access Incoming competition conflict has been resolved. For example, if the second PDCCH is scrambled by a fixed-size random number, the terminal device can match the fixed-size random number with the first identifier. If the matching is successful, the terminal device can determine the two-step random access The competition conflict has been resolved.
上述内容提到的第一标识与第二标识(或第三标识)匹配成功,可以理解为:第一标识与第二标识(或第三标识)相同;或者,第一标识与第二标识(或第三标识)不同,但属于同一个终端设备;或者,第一标识与第二标识(或第三标识)有对应关系。The first identifier mentioned in the above content matches the second identifier (or third identifier) successfully, which can be understood as: the first identifier and the second identifier (or third identifier) are the same; or, the first identifier and the second identifier ( Or the third identifier) is different but belongs to the same terminal device; or, the first identifier and the second identifier (or third identifier) have a corresponding relationship.
进一步地,若终端设备盲检第二PDCCH,则终端设备还可以处理第一PDCCH调度的RAR,如处理TAC、上行授权等。Further, if the terminal device blindly detects the second PDCCH, the terminal device can also process the RAR scheduled by the first PDCCH, such as processing TAC, uplink authorization, and so on.
图10是本申请实施例的一种具体实现示例图。在图10中,一个箭头标识一次数据传输,共有3次数据传输。第一标识为C-RNTI以外的其他标识,第二目标RNTI为TC-RNTI或C-RNTI。FIG. 10 is a diagram of a specific implementation example of an embodiment of the present application. In Figure 10, an arrow indicates one data transmission, and there are 3 data transmissions in total. The first identifier is an identifier other than C-RNTI, and the second target RNTI is TC-RNTI or C-RNTI.
可以看到,终端设备向网络设备发送第一消息,之后,终端设备启动第一定时器或开启第一窗口,在第一定时器或第一窗口的时长范围内盲检第二消息。网络设备接收到第一消息后,向终端设备发送第二消息,第二消息包括RAR和Msg B1,网络设备采用RA-RNTI加扰的第一PDCCH调度RAR。终端设备成功解码第一PDCCH后,可以根据RAR的指示确定是否盲检第二PDCCH。若RAR指示盲检第二PDCCH,则终端设备盲检第二PDCCH;若RAR指示不盲检第二PDCCH,则终端设备不盲检第二PDCCH。其中,网络设备采用TC-RNTI或C-RNTI加扰的第二PDCCH调度Msg B1。It can be seen that the terminal device sends the first message to the network device. After that, the terminal device starts the first timer or opens the first window, and blindly detects the second message within the duration of the first timer or the first window. After receiving the first message, the network device sends a second message to the terminal device. The second message includes the RAR and Msg B1. The network device uses the first PDCCH scrambled by RA-RNTI to schedule the RAR. After successfully decoding the first PDCCH, the terminal device can determine whether to blindly detect the second PDCCH according to the indication of the RAR. If the RAR indicates blind detection of the second PDCCH, the terminal device blindly detects the second PDCCH; if the RAR indicates not blind detection of the second PDCCH, the terminal device does not blindly detect the second PDCCH. Among them, the network equipment uses the second PDCCH scrambled by TC-RNTI or C-RNTI to schedule Msg B1.
在终端设备解决竞争冲突之后,可以利用第二PDCCH中的第四指示信息进行数据传输。After the terminal device resolves the contention conflict, the fourth indication information in the second PDCCH may be used for data transmission.
可选地,第四指示信息可以用于指示终端设备是否采用RAR中的参数进行数据传输。如是否采用RAR中的上行授权进行数据传输。若第四指示信息指示终端设备RAR中的参数进行数据传输,则终端设备可以利用RAR中的参数进行数据传输。Optionally, the fourth indication information may be used to indicate whether the terminal device uses the parameters in the RAR for data transmission. For example, whether to use the uplink authorization in RAR for data transmission. If the fourth indication information indicates that the parameters in the RAR of the terminal device perform data transmission, the terminal device can use the parameters in the RAR to perform data transmission.
可选地,第四指示信息中可以包括终端设备进行上行传输所需要的参数。如,TAC等。如此,终端设备可以不用处理RAR。Optionally, the fourth indication information may include parameters required by the terminal device for uplink transmission. For example, TAC and so on. In this way, the terminal device does not need to process RAR.
应理解,在本申请实施例中,“第一”、“第二”、“第三”和“第四”仅仅为了区分不同的对象,但并不对本申请实施例的范围构成限制。It should be understood that in the embodiments of the present application, "first", "second", "third", and "fourth" are only used to distinguish different objects, but do not limit the scope of the embodiments of the present application.
本申请实施例,在两步随机接入过程中,网络设备可以向终端设备发送第一PDCCH和第二PDCCH,终端设备可以根据盲检第一PDCCH的结果,确定是否盲检第二PDCCH,若终端设备确定盲检第二PDCCH,则可以根据盲检第二PDCCH的结果确定是否已解决随机接入过程中的竞争冲突,从而可以解决两步随机接入过程中的竞争冲突。In the embodiment of this application, in the two-step random access process, the network device may send the first PDCCH and the second PDCCH to the terminal device, and the terminal device may determine whether to blindly check the second PDCCH according to the result of blindly checking the first PDCCH. If the terminal device determines to blindly detect the second PDCCH, it can determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH, so that the contention conflict in the two-step random access process can be resolved.
以上结合附图详细描述了本申请的优选实施方式,但是,本申请并不限于上述实施方式中的具体细节,在本申请的技术构思范围内,可以对本申请的技术方案进行多种简单变型,这些简单变型均属于本申请的保护范围。The preferred embodiments of the present application are described in detail above with reference to the accompanying drawings. However, the present application is not limited to the specific details in the above-mentioned embodiments. Within the scope of the technical concept of the present application, various simple modifications can be made to the technical solutions of the present application. These simple variants all belong to the protection scope of this application.
例如,在上述具体实施方式中所描述的各个具体技术特征,在不矛盾的情况下,可以通过任何合适的方式进行组合,为了避免不必要的重复,本申请对各种可能的组合方式不再另行说明。For example, the specific technical features described in the above specific embodiments can be combined in any suitable manner without contradiction. In order to avoid unnecessary repetition, this application no longer discusses various possible combinations. Explain separately.
又例如,本申请的各种不同的实施方式之间也可以进行任意组合,只要其不违背本申请的思想,其同样应当视为本申请所公开的内容。For another example, various different implementations of this application can also be combined arbitrarily, as long as they do not violate the idea of this application, they should also be regarded as the content disclosed in this application.
应理解,在本申请的各种方法实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that, in the various method embodiments of the present application, the size of the sequence number of the foregoing processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic, and should not be implemented in this application. The implementation process of the example constitutes any limitation.
上文中详细描述了根据本申请实施例的通信方法,下面将结合图11至图13,描述根据本申请实施例的通信装置,方法实施例所描述的技术特征适用于以下装置实施例。The communication method according to the embodiment of the present application is described in detail above. The communication device according to the embodiment of the present application will be described below with reference to FIG. 11 to FIG. 13. The technical features described in the method embodiment are applicable to the following device embodiments.
图11示出了本申请实施例的终端设备400的示意性框图。如图11所示,该终端设备400包括:FIG. 11 shows a schematic block diagram of a terminal device 400 according to an embodiment of the present application. As shown in FIG. 11, the terminal device 400 includes:
通信单元410,用于向网络设备发送第一消息,所述第一消息包括用于随机接入前导码和上行消息,所述上行消息包含第一标识.The communication unit 410 is configured to send a first message to a network device, the first message including a preamble for random access and an uplink message, the uplink message including a first identifier.
处理单元420,用于根据所述第一标识,确定用于盲检第一物理下行控制信道PDCCH的第一目标无线网络临时标识符RNTI。The processing unit 420 is configured to determine, according to the first identifier, a first target radio network temporary identifier RNTI used for blind detection of the first physical downlink control channel PDCCH.
所述处理单元420还用于,根据所述第一目标RNTI,盲检所述第一PDCCH。The processing unit 420 is further configured to blindly detect the first PDCCH according to the first target RNTI.
所述处理单元420还用于,根据盲检所述第一PDCCH的结果,确定是否盲检第二PDCCH。The processing unit 420 is further configured to determine whether to blindly detect the second PDCCH according to the result of the blind detection of the first PDCCH.
所述处理单元420还用于,若确定盲检所述第二PDCCH,盲检所述第二PDCCH。The processing unit 420 is further configured to, if it is determined to blindly detect the second PDCCH, blindly detect the second PDCCH.
所述处理单元420还用于,根据盲检所述第二PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突。The processing unit 420 is further configured to determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
可选地,在本申请实施例中,所述处理单元420还用于:在所述通信单元410向所述网络设备发送第一消息之后,启动第一定时器或开启第一窗口;所述处理单元420具体用于:在所述第一定时器 或所述第一窗口的时长范围内,根据所述第一目标RNTI盲检所述第一PDCCH。Optionally, in the embodiment of the present application, the processing unit 420 is further configured to: after the communication unit 410 sends the first message to the network device, start a first timer or open a first window; The processing unit 420 is specifically configured to: blindly detect the first PDCCH according to the first target RNTI within the duration range of the first timer or the first window.
可选地,在本申请实施例中,所述第一标识为小区-无线网络临时标识符C-RNTI,所述第一目标RNTI为C-RNTI。Optionally, in this embodiment of the present application, the first identifier is a cell-radio network temporary identifier C-RNTI, and the first target RNTI is a C-RNTI.
可选地,在本申请实施例中,若所述终端设备400不盲检所述第二PDCCH,所述处理单元420还用于:根据盲检所述第一PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突。Optionally, in the embodiment of the present application, if the terminal device 400 does not blindly check the second PDCCH, the processing unit 420 is further configured to: determine whether it has been resolved according to the result of the blind check of the first PDCCH Contention conflict during random access.
可选地,在本申请实施例中,所述处理单元420具体用于:若所述处理单元420盲检到所述第一PDCCH,确定已解决随机接入过程中的竞争冲突;若所述处理单元420未盲检到所述第一PDCCH,确定未解决随机接入过程中的竞争冲突。Optionally, in the embodiment of the present application, the processing unit 420 is specifically configured to: if the processing unit 420 blindly detects the first PDCCH, determine that the contention conflict in the random access process has been resolved; The processing unit 420 does not blindly detect the first PDCCH, and determines that the contention conflict in the random access process is not resolved.
可选地,在本申请实施例中,所述第一标识为所述C-RNTI以外的其他标识,所述第一目标RNTI为RA-RNTI。Optionally, in this embodiment of the present application, the first identifier is an identifier other than the C-RNTI, and the first target RNTI is an RA-RNTI.
可选地,在本申请实施例中,所述RA-RNTI是根据传输所述随机接入前导码的物理随机接入信道PRACH资源,和/或,传输所述上行消息的物理上行共享信道PUSCH资源的位置确定的。Optionally, in the embodiment of the present application, the RA-RNTI is based on the physical random access channel PRACH resource for transmitting the random access preamble, and/or the physical uplink shared channel PUSCH for transmitting the uplink message The location of the resource is determined.
可选地,在本申请实施例中,所述处理单元420具体用于:若所述处理单元420盲检到所述第一PDCCH,根据第一指示信息确定是否盲检所述第二PDCCH以及确定所述第二目标RNTI,其中,所述第一PDCCH包括所述第一指示信息,或所述第一PDCCH调度的PDSCH包括所述第一指示信息。Optionally, in the embodiment of the present application, the processing unit 420 is specifically configured to: if the processing unit 420 blindly detects the first PDCCH, determine whether to blindly detect the second PDCCH according to the first indication information, and The second target RNTI is determined, where the first PDCCH includes the first indication information, or the PDSCH scheduled by the first PDCCH includes the first indication information.
可选地,在本申请实施例中,若所述第一指示信息中的至少一个比特的值为第一值,所述第一指示信息用于指示所述终端设备盲检所述第二PDCCH。Optionally, in this embodiment of the application, if the value of at least one bit in the first indication information is a first value, the first indication information is used to instruct the terminal device to blindly detect the second PDCCH .
可选地,在本申请实施例中,若所述第一指示信息中的至少一个比特的值为第二值,所述第一指示信息用于指示所述终端设备不盲检所述第二PDCCH。Optionally, in this embodiment of the present application, if the value of at least one bit in the first indication information is the second value, the first indication information is used to instruct the terminal device not to blindly check the second value. PDCCH.
可选地,在本申请实施例中,所述处理单元420具体用于:若所述第一指示信息用于指示所述终端设备400盲检所述第二PDCCH,确定盲检所述第二PDCCH;若所述第一指示信息用于指示所述终端设备400不盲检所述第二PDCCH,确定不盲检所述第二PDCCH。Optionally, in the embodiment of the present application, the processing unit 420 is specifically configured to: if the first indication information is used to instruct the terminal device 400 to blindly detect the second PDCCH, determine to blindly detect the second PDCCH PDCCH; if the first indication information is used to instruct the terminal device 400 not to blindly detect the second PDCCH, determine not to blindly detect the second PDCCH.
可选地,在本申请实施例中,所述第一指示信息包含在随机接入响应RAR。Optionally, in this embodiment of the present application, the first indication information is included in a random access response RAR.
可选地,在本申请实施例中,所述RAR中的至少一个比特的比特位置等于四步随机接入中预留比特的比特位置。Optionally, in this embodiment of the application, the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in the four-step random access.
可选地,在本申请实施例中,若所述终端设备不盲检所述第二PDCCH,所述通信单元410还用于:向所述网络设备发送四步随机接入中的消息3;接收所述网络设备针对所述消息3发送的消息4;Optionally, in this embodiment of the application, if the terminal device does not blindly detect the second PDCCH, the communication unit 410 is further configured to: send a message 3 in four-step random access to the network device; Receive the message 4 sent by the network device for the message 3;
所述处理单元420还用于:根据所述消息4,确定是否已解决随机接入过程中的竞争冲突。The processing unit 420 is further configured to: according to the message 4, determine whether the contention conflict in the random access process has been resolved.
可选地,在本申请实施例中,若所述终端设备400不盲检所述第二PDCCH,所述通信单元410还用于:向所述网络设备重传所述第一消息。Optionally, in this embodiment of the present application, if the terminal device 400 does not blindly detect the second PDCCH, the communication unit 410 is further configured to: retransmit the first message to the network device.
可选地,在本申请实施例中,若所述终端设备确定盲检所述第二PDCCH,所述处理单元420具体用于:利用第二目标RNTI,盲检所述第二PDCCH。Optionally, in this embodiment of the present application, if the terminal device determines to blindly detect the second PDCCH, the processing unit 420 is specifically configured to: use the second target RNTI to blindly detect the second PDCCH.
可选地,在本申请实施例中,所述处理单元420具体用于:若所述终端设备400盲检到所述第二PDCCH,且第一标识与第二标识匹配成功,则确定已解决随机接入过程中的竞争冲突,其中,所述第二标识为所述第二PDCCH携带的冲突解决标识,或所述第二标识为所述第二PDCCH调度的PDSCH中携带的冲突解决标识。Optionally, in the embodiment of the present application, the processing unit 420 is specifically configured to: if the terminal device 400 blindly detects the second PDCCH, and the first identifier matches the second identifier successfully, then determine that the resolution has been resolved In a contention conflict in a random access process, the second identifier is a conflict resolution identifier carried in the second PDCCH, or the second identifier is a conflict resolution identifier carried in a PDSCH scheduled by the second PDCCH.
可选地,在本申请实施例中,所述第二目标RNTI为小区-无线网络临时标识C-RNTI或临时小区-无线网络临时标识TC-RNTI。Optionally, in this embodiment of the present application, the second target RNTI is a cell-radio network temporary identifier C-RNTI or a temporary cell-radio network temporary identifier TC-RNTI.
可选地,在本申请实施例中,所述第一标识包括以下中的至少一个:随机数、5G-S-临时移动用户标识TMSI、I-RNTI、Short I-RNTI。Optionally, in the embodiment of the present application, the first identifier includes at least one of the following: a random number, a 5G-S-temporary mobile user identifier TMSI, I-RNTI, and Short I-RNTI.
可选地,在本申请实施例中,所述第二目标RNTI为小区-无线网络临时标识C-RNTI或临时小区-无线网络临时标识TC-RNTI。Optionally, in this embodiment of the present application, the second target RNTI is a cell-radio network temporary identifier C-RNTI or a temporary cell-radio network temporary identifier TC-RNTI.
可选地,在本申请实施例中,所述第二PDCCH用于指示在所述终端设备400解决竞争冲突后,所述终端设备400进行数据传输使用的参数。Optionally, in this embodiment of the present application, the second PDCCH is used to indicate parameters used by the terminal device 400 for data transmission after the terminal device 400 resolves the contention conflict.
可选地,在本申请实施例中,所述终端设备400进行数据传输使用的参数包括所述网络设备针对所述第一消息发送的RAR中的参数。Optionally, in this embodiment of the present application, the parameters used by the terminal device 400 for data transmission include parameters in the RAR sent by the network device for the first message.
应理解,该终端设备400可对应于方法300中的终端设备,可以实现该方法300中的终端设备的相应操作,为了简洁,在此不再赘述。It should be understood that the terminal device 400 may correspond to the terminal device in the method 300, and can implement the corresponding operations of the terminal device in the method 300. For brevity, details are not described herein again.
图12示出了本申请实施例的网络设备500的示意性框图。如图12所示,该网络设备500包括:FIG. 12 shows a schematic block diagram of a network device 500 according to an embodiment of the present application. As shown in FIG. 12, the network device 500 includes:
通信单元510,用于接收终端设备发送的第一消息,所述第一消息包括随机接入前导码和上行消息,所述上行消息包括第一标识.The communication unit 510 is configured to receive a first message sent by a terminal device, the first message including a random access preamble and an uplink message, the uplink message including a first identifier.
处理单元520,用于对所述第一消息进行解码。The processing unit 520 is configured to decode the first message.
所述处理单元520还用于,根据所述第一消息的解码情况,确定向所述终端设备发送的响应消息。The processing unit 520 is further configured to determine a response message sent to the terminal device according to the decoding situation of the first message.
可选地,在本申请实施例中,所述通信单元510还用于:若所述随机接入前导码解码成功,且所述第一标识解码成功,向所述终端设备发送第一目标无线网络临时标识符RNTI加扰的第一物理下行控制信道PDCCH。Optionally, in this embodiment of the present application, the communication unit 510 is further configured to: if the random access preamble is successfully decoded and the first identifier is successfully decoded, send the first target wireless signal to the terminal device. The first physical downlink control channel PDCCH scrambled by the network temporary identifier RNTI.
可选地,在本申请实施例中,所述第一标识为小区-无线网络临时标识符C-RNTI,所述第一目标RNTI为C-RNTI。Optionally, in this embodiment of the present application, the first identifier is a cell-radio network temporary identifier C-RNTI, and the first target RNTI is a C-RNTI.
可选地,在本申请实施例中,所述第一标识为所述C-RNTI以外的其他标识,所述第一目标RNTI为RA-RNTI。Optionally, in this embodiment of the present application, the first identifier is an identifier other than the C-RNTI, and the first target RNTI is an RA-RNTI.
可选地,在本申请实施例中,所述通信单元510具体用于:向所述终端设备发送所述第一PDCCH和第二目标RNTI加扰的第二PDCCH。Optionally, in the embodiment of the present application, the communication unit 510 is specifically configured to send the first PDCCH and the second PDCCH scrambled by the second target RNTI to the terminal device.
可选地,在本申请实施例中,第一指示信息用于指示所述终端设备是否盲检所述第二PDCCH,其中,所述第一PDCCH调度的信息包括所述第一指示信息,或所述第一PDCCH调度的PDSCH包括所述第一指示信息。Optionally, in this embodiment of the application, the first indication information is used to indicate whether the terminal device blindly detects the second PDCCH, wherein the first PDCCH scheduling information includes the first indication information, or The PDSCH scheduled by the first PDCCH includes the first indication information.
可选地,在本申请实施例中,若所述第一指示信息中的至少一个比特的值为第一值,所述第一指示用于指示所述终端设备盲检所述第二PDCCH。Optionally, in this embodiment of the present application, if the value of at least one bit in the first indication information is a first value, the first indication is used to instruct the terminal device to blindly detect the second PDCCH.
可选地,在本申请实施例中,若所述第一指示信息中的至少一个比特的值为第二值,所述第一指示信息用于指示所述终端设备不盲检所述第二PDCCH。Optionally, in this embodiment of the present application, if the value of at least one bit in the first indication information is the second value, the first indication information is used to instruct the terminal device not to blindly check the second value. PDCCH.
可选地,在本申请实施例中,所述第一指示信息为随机接入响应RAR。Optionally, in this embodiment of the present application, the first indication information is a random access response RAR.
可选地,在本申请实施例中,所述RAR中的至少一个比特的比特位置等于四步随机接入中预留比特的比特位置。Optionally, in this embodiment of the present application, the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in the four-step random access.
可选地,在本申请实施例中,若所述第一指示信息用于指示所述终端设备不检测所述第二PDCCH,所述通信单元510还用于:接收所述终端设备发送的四步随机接入中的消息3;针对所述消息3,向所述终端设备发送消息4。Optionally, in the embodiment of the present application, if the first indication information is used to instruct the terminal device not to detect the second PDCCH, the communication unit 510 is further configured to: receive the fourth PDCCH sent by the terminal device. Step: Message 3 in random access; For the message 3, message 4 is sent to the terminal device.
可选地,在本申请实施例中,若所述第一指示信息用于指示所述终端设备不检测所述第二PDCCH,所述通信单元510还用于:接收所述终端设备重传的所述第一消息。Optionally, in this embodiment of the present application, if the first indication information is used to instruct the terminal device not to detect the second PDCCH, the communication unit 510 is further configured to: receive the retransmission of the terminal device The first message.
可选地,在本申请实施例中,所述第二PDCCH用于指示在所述终端设备确定已解决随机接入过程中的竞争冲突时,所述终端设备进行数据传输使用的参数。Optionally, in the embodiment of the present application, the second PDCCH is used to indicate the parameters used by the terminal device for data transmission when the terminal device determines that the contention conflict in the random access process has been resolved.
可选地,在本申请实施例中,所述终端设备进行数据传输使用的参数包括所述第一PDCCH调度的信息中的参数。Optionally, in this embodiment of the present application, the parameters used by the terminal device for data transmission include parameters in the information scheduled by the first PDCCH.
可选地,在本申请实施例中,所述第二目标RNTI为小区-无线网络临时标识C-RNTI或临时小区-无线网络临时标识TC-RNTI。Optionally, in this embodiment of the present application, the second target RNTI is a cell-radio network temporary identifier C-RNTI or a temporary cell-radio network temporary identifier TC-RNTI.
可选地,在本申请实施例中,所述RA-RNTI是根据接收所述随机接入前导码的物理随机接入信道PRACH资源,和/或,接收所述上行消息的物理上行共享信道PUSCH资源的位置确定的。Optionally, in this embodiment of the application, the RA-RNTI is based on the physical random access channel PRACH resource for receiving the random access preamble, and/or the physical uplink shared channel PUSCH for receiving the uplink message The location of the resource is determined.
可选地,在本申请实施例中,所述第一标识包括以下中的至少一个:随机数、5G-S-临时移动用户标识TMSI、I-RNTI、Short I-RNTI。Optionally, in the embodiment of the present application, the first identifier includes at least one of the following: a random number, a 5G-S-temporary mobile user identifier TMSI, I-RNTI, and Short I-RNTI.
可选地,在本申请实施例中,所述通信单元510还用于:若所述随机接入前导码解码成功,且所述第一标识解码失败,向所述终端设备发送四步随机接入的消息2;或向所述终端设备发送第二指示信息,所述第二指示信息用于指示所述终端设备重传所述第一消息。Optionally, in the embodiment of the present application, the communication unit 510 is further configured to: if the random access preamble is successfully decoded and the first identifier fails to be decoded, send a four-step random access to the terminal device. Incoming message 2; or sending second indication information to the terminal device, where the second indication information is used to instruct the terminal device to retransmit the first message.
应理解,该网络设备500可对应于方法300中的网络设备,可以实现该方法300中的网络设备的相应操作,为了简洁,在此不再赘述。It should be understood that the network device 500 may correspond to the network device in the method 300, and can implement the corresponding operations of the network device in the method 300. For brevity, details are not described herein again.
图13是本申请实施例提供的一种通信设备600示意性结构图。图13所示的通信设备600包括处理器610,处理器610可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。FIG. 13 is a schematic structural diagram of a communication device 600 provided by an embodiment of the present application. The communication device 600 shown in FIG. 13 includes a processor 610, and the processor 610 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
可选地,如图13所示,通信设备600还可以包括存储器620。其中,处理器610可以从存储器620中调用并运行计算机程序,以实现本申请实施例中的方法。Optionally, as shown in FIG. 13, the communication device 600 may further include a memory 620. The processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
其中,存储器620可以是独立于处理器610的一个单独的器件,也可以集成在处理器610中。The memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
可选地,如图13所示,通信设备600还可以包括收发器630,处理器6710可以控制该收发器630与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。Optionally, as shown in FIG. 13, the communication device 600 may further include a transceiver 630, and the processor 6710 may control the transceiver 630 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
其中,收发器630可以包括发射机和接收机。收发器630还可以进一步包括天线,天线的数量可以为一个或多个。The transceiver 630 may include a transmitter and a receiver. The transceiver 630 may further include an antenna, and the number of antennas may be one or more.
可选地,该通信设备600具体可为本申请实施例的网络设备,并且该通信设备600可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the communication device 600 may specifically be a network device in an embodiment of the present application, and the communication device 600 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not repeated here. .
可选地,该通信设备600具体可为本申请实施例的终端设备,并且该通信设备600可以实现本申 请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the communication device 600 may specifically be a terminal device in an embodiment of this application, and the communication device 600 may implement the corresponding procedures implemented by the terminal device in each method of the embodiment of the application. .
图14是本申请实施例的芯片的示意性结构图。图14所示的芯片700包括处理器710,处理器710可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。FIG. 14 is a schematic structural diagram of a chip of an embodiment of the present application. The chip 700 shown in FIG. 14 includes a processor 710, and the processor 710 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
可选地,如图14所示,芯片700还可以包括存储器720。其中,处理器710可以从存储器720中调用并运行计算机程序,以实现本申请实施例中的方法。Optionally, as shown in FIG. 14, the chip 700 may further include a memory 720. Wherein, the processor 710 may call and run a computer program from the memory 720 to implement the method in the embodiment of the present application.
其中,存储器720可以是独立于处理器710的一个单独的器件,也可以集成在处理器710中。The memory 720 may be a separate device independent of the processor 710, or may be integrated in the processor 710.
可选地,该芯片700还可以包括输入接口730。其中,处理器710可以控制该输入接口730与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。Optionally, the chip 700 may further include an input interface 730. The processor 710 may control the input interface 730 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
可选地,该芯片700还可以包括输出接口740。其中,处理器710可以控制该输出接口740与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。Optionally, the chip 700 may further include an output interface 740. The processor 710 can control the output interface 740 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
可选地,该芯片可应用于本申请实施例中的终端设备,并且该芯片可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the chip can be applied to the terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the terminal device in the various methods of the embodiment of the present application. For brevity, details are not repeated here.
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application. For brevity, details are not described herein again.
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。It should be understood that the chip mentioned in the embodiment of the present application may also be referred to as a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip.
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。It should be understood that the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software. The aforementioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers. The storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. The volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (Synchlink DRAM, SLDRAM) ) And Direct Rambus RAM (DR RAM). It should be noted that the memories of the systems and methods described herein are intended to include, but are not limited to, these and any other suitable types of memories.
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should be understood that the foregoing memory is exemplary but not restrictive. For example, the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
图15是本申请实施例提供的一种通信系统800的示意性框图。如图15所示,该通信系统800包括终端设备810和网络设备820。FIG. 15 is a schematic block diagram of a communication system 800 according to an embodiment of the present application. As shown in FIG. 15, the communication system 800 includes a terminal device 810 and a network device 820.
其中,该终端设备810可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备820可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。Wherein, the terminal device 810 can be used to implement the corresponding function implemented by the terminal device in the above method, and the network device 820 can be used to implement the corresponding function implemented by the network device in the above method. For brevity, it will not be repeated here. .
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。The embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
可选地,该计算机可读存储介质可应用于本申请实施例中的终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer-readable storage medium can be applied to the terminal device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application. For brevity, here No longer.
可选地,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计 算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, here No longer.
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。The embodiments of the present application also provide a computer program product, including computer program instructions.
可选地,该计算机程序产品可应用于本申请实施例中的终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program product can be applied to the terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application. For the sake of brevity, it is not here. Repeat it again.
可选地,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. For the sake of brevity, it is not here. Repeat it again.
本申请实施例还提供了一种计算机程序。The embodiment of the present application also provides a computer program.
可选地,该计算机程序可应用于本申请实施例中的终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program can be applied to the terminal device in the embodiment of the present application. When the computer program runs on the computer, it causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application. For the sake of brevity , I won’t repeat it here.
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program can be applied to the network device in the embodiment of the present application. When the computer program runs on the computer, the computer is caused to execute the corresponding process implemented by the network device in each method of the embodiment of the present application. For the sake of brevity , I won’t repeat it here.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。A person of ordinary skill in the art may be aware that the units and algorithm steps of the examples described in combination with the embodiments disclosed herein can be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and conciseness of description, the specific working process of the above-described system, device, and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed system, device, and method may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, the functional units in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium. Based on this understanding, the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。The above are only specific implementations of this application, but the protection scope of this application is not limited to this. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in this application. Should be covered within the scope of protection of this application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.
Claims (88)
- 一种随机接入的方法,其特征在于,所述方法包括:A random access method, characterized in that the method includes:终端设备向网络设备发送第一消息,所述第一消息包括随机接入前导码和上行消息,所述上行消息包含第一标识;The terminal device sends a first message to the network device, where the first message includes a random access preamble and an uplink message, and the uplink message includes a first identifier;所述终端设备根据所述第一标识,确定用于盲检第一物理下行控制信道PDCCH的第一目标无线网络临时标识符RNTI;The terminal device determines, according to the first identifier, a first target radio network temporary identifier RNTI used for blind detection of the first physical downlink control channel PDCCH;所述终端设备根据所述第一目标RNTI,盲检所述第一PDCCH;The terminal device blindly detects the first PDCCH according to the first target RNTI;所述终端设备根据盲检所述第一PDCCH的结果,确定是否盲检第二PDCCH;The terminal device determines whether to blindly detect the second PDCCH according to the result of blindly detecting the first PDCCH;若所述终端设备确定盲检所述第二PDCCH,所述终端设备盲检所述第二PDCCH;If the terminal device determines to blindly detect the second PDCCH, the terminal device blindly detects the second PDCCH;所述终端设备根据盲检所述第二PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突。The terminal device determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1, wherein the method further comprises:在所述终端设备向所述网络设备发送第一消息之后,所述终端设备启动第一定时器或开启第一窗口;After the terminal device sends the first message to the network device, the terminal device starts a first timer or opens a first window;所述终端设备根据所述第一目标RNTI,盲检所述第一PDCCH,包括:The blind detection of the first PDCCH by the terminal device according to the first target RNTI includes:所述终端设备在所述第一定时器或所述第一窗口的时长范围内,根据所述第一目标RNTI盲检所述第一PDCCH。The terminal device blindly detects the first PDCCH according to the first target RNTI within the duration range of the first timer or the first window.
- 根据权利要求1或2所述的方法,其特征在于,所述第一标识为小区-无线网络临时标识符C-RNTI,所述第一目标RNTI为C-RNTI。The method according to claim 1 or 2, wherein the first identifier is a cell-radio network temporary identifier C-RNTI, and the first target RNTI is a C-RNTI.
- 根据权利要求3所述的方法,其特征在于,若所述终端设备不盲检所述第二PDCCH,所述方法还包括:The method according to claim 3, wherein if the terminal device does not blindly detect the second PDCCH, the method further comprises:所述终端设备根据盲检所述第一PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突。The terminal device determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the first PDCCH.
- 根据权利要求4所述的方法,其特征在于,所述终端设备根据盲检所述第一PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突,包括:The method according to claim 4, wherein the terminal device determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the first PDCCH, comprising:若所述终端设备盲检到所述第一PDCCH,所述终端设备确定已解决随机接入过程中的竞争冲突;If the terminal device blindly detects the first PDCCH, the terminal device determines that the contention conflict in the random access process has been resolved;若所述终端设备未盲检到所述第一PDCCH,所述终端设备确定未解决随机接入过程中的竞争冲突。If the terminal device does not blindly detect the first PDCCH, the terminal device determines that the contention conflict in the random access process is not resolved.
- 根据权利要求1或2所述的方法,其特征在于,所述第一标识为所述C-RNTI以外的其他标识,所述第一目标RNTI为RA-RNTI。The method according to claim 1 or 2, wherein the first identifier is an identifier other than the C-RNTI, and the first target RNTI is an RA-RNTI.
- 根据权利要求6所述的方法,其特征在于,所述RA-RNTI是根据传输所述随机接入前导码的物理随机接入信道PRACH资源,和/或,传输所述上行消息的物理上行共享信道PUSCH资源的位置确定的。The method according to claim 6, wherein the RA-RNTI is based on the physical random access channel PRACH resource for transmitting the random access preamble, and/or the physical uplink sharing for transmitting the uplink message The location of the channel PUSCH resource is determined.
- 根据权利要求6或7所述的方法,其特征在于,所述终端设备根据盲检所述第一PDCCH的结果,确定是否盲检第二PDCCH,包括:The method according to claim 6 or 7, wherein the terminal device determines whether to blindly detect the second PDCCH according to the result of blindly detecting the first PDCCH, comprising:若所述终端设备盲检到所述第一PDCCH,所述终端设备根据第一指示信息确定是否盲检所述第二PDCCH,其中,所述第一PDCCH包括所述第一指示信息,或所述第一PDCCH调度的PDSCH包括所述第一指示信息。If the terminal device blindly detects the first PDCCH, the terminal device determines whether to blindly detect the second PDCCH according to the first indication information, where the first PDCCH includes the first indication information, or The PDSCH scheduled by the first PDCCH includes the first indication information.
- 根据权利要求8所述的方法,其特征在于,若所述第一指示信息中的至少一个比特的值为第一值,所述第一指示信息用于指示所述终端设备盲检所述第二PDCCH。The method according to claim 8, wherein if the value of at least one bit in the first indication information is a first value, the first indication information is used to instruct the terminal device to blindly detect the first value. Two PDCCH.
- 根据权利要求8所述的方法,其特征在于,若所述第一指示信息中的至少一个比特的值为第二值,所述第一指示信息用于指示所述终端设备不盲检所述第二PDCCH。The method according to claim 8, wherein if the value of at least one bit in the first indication information is the second value, the first indication information is used to instruct the terminal device not to blindly check the The second PDCCH.
- 根据权利要求8至10中任一项所述的方法,其特征在于,所述终端设备根据第一指示信息确定是否盲检所述第二PDCCH,包括:The method according to any one of claims 8 to 10, wherein the terminal device determining whether to blindly check the second PDCCH according to the first indication information comprises:若所述第一指示信息用于指示所述终端设备盲检所述第二PDCCH,所述终端设备确定盲检所述第二PDCCH;If the first indication information is used to instruct the terminal device to blindly detect the second PDCCH, the terminal device determines to blindly detect the second PDCCH;若所述第一指示信息用于指示所述终端设备不盲检所述第二PDCCH,所述终端设备确定不盲检所述第二PDCCH。If the first indication information is used to indicate that the terminal device does not blindly detect the second PDCCH, the terminal device determines not to blindly detect the second PDCCH.
- 根据权利要求8至11中任一项所述的方法,其特征在于,所述第一指示信息包含在随机接入响应RAR。The method according to any one of claims 8 to 11, wherein the first indication information is included in a random access response RAR.
- 根据权利要求12所述的方法,其特征在于,所述RAR中的至少一个比特的比特位置等于四步随机接入中预留比特的比特位置。The method according to claim 12, wherein the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in the four-step random access.
- 根据权利要求6至13中任一项所述的方法,其特征在于,若所述终端设备不盲检所述第二 PDCCH,所述方法还包括:The method according to any one of claims 6 to 13, wherein if the terminal device does not blindly detect the second PDCCH, the method further comprises:所述终端设备向所述网络设备发送四步随机接入中的消息3;The terminal device sends a message 3 in four-step random access to the network device;所述终端设备接收所述网络设备针对所述消息3发送的消息4;The terminal device receives the message 4 sent by the network device for the message 3;所述终端设备根据所述消息4,确定是否已解决随机接入过程中的竞争冲突。According to the message 4, the terminal device determines whether the contention conflict in the random access process has been resolved.
- 根据权利要求6至13中任一项所述的方法,其特征在于,若所述终端设备不盲检所述第二PDCCH,所述方法还包括:The method according to any one of claims 6 to 13, wherein if the terminal device does not blindly detect the second PDCCH, the method further comprises:所述终端设备向所述网络设备重传所述第一消息。The terminal device retransmits the first message to the network device.
- 根据权利要求6至13中任一项所述的方法,其特征在于,若所述终端设备确定盲检所述第二PDCCH,所述终端设备盲检所述第二PDCCH,包括:The method according to any one of claims 6 to 13, wherein if the terminal device determines to blindly detect the second PDCCH, the terminal device blindly detects the second PDCCH, comprising:所述终端设备利用第二目标RNTI,盲检所述第二PDCCH。The terminal device uses the second target RNTI to blindly detect the second PDCCH.
- 根据权利要求16所述的方法,其特征在于,所述终端设备根据盲检所述第二PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突,包括:The method according to claim 16, wherein the terminal device determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH, comprising:若所述终端设备盲检到所述第二PDCCH,且第一标识与第二标识匹配成功,则所述终端设备确定已解决随机接入过程中的竞争冲突,其中,所述第二标识为所述第二PDCCH携带的冲突解决标识,或所述第二标识为所述第二PDCCH调度的PDSCH中携带的冲突解决标识。If the terminal device blindly detects the second PDCCH, and the first identifier matches the second identifier successfully, the terminal device determines that the contention conflict in the random access process has been resolved, where the second identifier is The conflict resolution identifier carried by the second PDCCH, or the second identifier is the conflict resolution identifier carried in the PDSCH scheduled by the second PDCCH.
- 根据权利要求16或17所述的方法,其特征在于,所述第二目标RNTI为小区-无线网络临时标识C-RNTI或临时小区-无线网络临时标识TC-RNTI。The method according to claim 16 or 17, wherein the second target RNTI is a cell-radio network temporary identification C-RNTI or a temporary cell-radio network temporary identification TC-RNTI.
- 根据权利要求6至18中任一项所述的方法,其特征在于,所述第一标识包括以下中的至少一个:随机数、5G-服务临时移动用户标识5G-S-TMSI、标识无线网络临时标识I-RNTI、短标识无线网络临时标识Short I-RNTI。The method according to any one of claims 6 to 18, wherein the first identifier includes at least one of the following: a random number, a 5G-serving temporary mobile user identifier 5G-S-TMSI, and a wireless network identifier Temporary identifier I-RNTI, short identifier wireless network temporary identifier Short I-RNTI.
- 根据权利要求1至19中任一项所述的方法,其特征在于,所述第二PDCCH用于指示在所述终端设备解决竞争冲突后,所述终端设备进行数据传输使用的参数。The method according to any one of claims 1 to 19, wherein the second PDCCH is used to indicate a parameter used by the terminal device for data transmission after the terminal device resolves a contention conflict.
- 根据权利要求20所述的方法,其特征在于,所述终端设备进行数据传输使用的参数包括所述网络设备针对所述第一消息发送的RAR中的参数。The method according to claim 20, wherein the parameters used by the terminal device for data transmission include parameters in the RAR sent by the network device for the first message.
- 一种随机接入的方法,其特征在于,所述方法包括:A random access method, characterized in that the method includes:网络设备接收终端设备发送的第一消息,所述第一消息包括随机接入前导码和上行消息,所述上行消息包括第一标识;The network device receives a first message sent by the terminal device, where the first message includes a random access preamble and an uplink message, and the uplink message includes a first identifier;所述网络设备对所述第一消息进行解码;The network device decodes the first message;所述网络设备根据所述第一消息的解码情况,确定向所述终端设备发送的响应消息。The network device determines the response message to be sent to the terminal device according to the decoding situation of the first message.
- 根据权利要求22所述的方法,其特征在于,所述网络设备根据所述第一消息的解码情况,确定向所述终端设备发送的响应消息,包括:The method according to claim 22, wherein the network device determining the response message sent to the terminal device according to the decoding situation of the first message comprises:若所述随机接入前导码解码成功,且所述第一标识解码成功,所述网络设备向所述终端设备发送第一目标无线网络临时标识符RNTI加扰的第一物理下行控制信道PDCCH。If the random access preamble is successfully decoded and the first identifier is successfully decoded, the network device sends the first physical downlink control channel PDCCH scrambled by the first target radio network temporary identifier RNTI to the terminal device.
- 根据权利要求23所述的方法,其特征在于,所述第一标识为小区-无线网络临时标识符C-RNTI,所述第一目标RNTI为C-RNTI。The method according to claim 23, wherein the first identifier is a cell-radio network temporary identifier C-RNTI, and the first target RNTI is a C-RNTI.
- 根据权利要求23所述的方法,其特征在于,所述第一标识为所述C-RNTI以外的其他标识,所述第一目标RNTI为RA-RNTI。The method according to claim 23, wherein the first identifier is an identifier other than the C-RNTI, and the first target RNTI is an RA-RNTI.
- 根据权利要求25所述的方法,其特征在于,所述网络设备向所述终端设备发送第一目标无线网络临时标识符RNTI加扰的第一物理下行控制信道PDCCH,包括:The method according to claim 25, wherein the sending, by the network device to the terminal device, the first physical downlink control channel PDCCH scrambled by the first target radio network temporary identifier RNTI comprises:所述网络设备向所述终端设备发送所述第一PDCCH和第二目标RNTI加扰的第二PDCCH。The network device sends the first PDCCH and the second PDCCH scrambled by the second target RNTI to the terminal device.
- 根据权利要求26所述的方法,其特征在于,第一指示信息用于指示所述终端设备是否盲检所述第二PDCCH,其中,所述第一PDCCH调度的信息包括所述第一指示信息,或所述第一PDCCH调度的PDSCH包括所述第一指示信息。The method according to claim 26, wherein the first indication information is used to indicate whether the terminal device blindly detects the second PDCCH, wherein the first PDCCH scheduling information includes the first indication information Or the PDSCH scheduled by the first PDCCH includes the first indication information.
- 根据权利要求27所述的方法,其特征在于,若所述第一指示信息中的至少一个比特的值为第一值,所述第一指示用于指示所述终端设备盲检所述第二PDCCH。The method according to claim 27, wherein if the value of at least one bit in the first indication information is a first value, the first indication is used to instruct the terminal device to blindly check the second PDCCH.
- 根据权利要求27所述的方法,其特征在于,若所述第一指示信息中的至少一个比特的值为第二值,所述第一指示信息用于指示所述终端设备不盲检所述第二PDCCH。The method according to claim 27, wherein if the value of at least one bit in the first indication information is the second value, the first indication information is used to instruct the terminal device not to blindly check the The second PDCCH.
- 根据权利要求27至29中任一项所述的方法,其特征在于,所述第一指示信息为随机接入响应RAR。The method according to any one of claims 27 to 29, wherein the first indication information is a random access response RAR.
- 根据权利要求30所述的方法,其特征在于,所述RAR中的至少一个比特的比特位置等于四步随机接入中预留比特的比特位置。The method according to claim 30, wherein the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in the four-step random access.
- 根据权利要求27至31中任一项所述的方法,其特征在于,若所述第一指示信息用于指示所 述终端设备不检测所述第二PDCCH,所述方法还包括:The method according to any one of claims 27 to 31, wherein if the first indication information is used to indicate that the terminal device does not detect the second PDCCH, the method further comprises:所述网络设备接收所述终端设备发送的四步随机接入中的消息3;The network device receives the message 3 in the four-step random access sent by the terminal device;所述网络设备针对所述消息3,向所述终端设备发送消息4。For the message 3, the network device sends a message 4 to the terminal device.
- 根据权利要求27至31中任一项所述的方法,其特征在于,若所述第一指示信息用于指示所述终端设备不检测所述第二PDCCH,所述方法还包括:The method according to any one of claims 27 to 31, wherein if the first indication information is used to indicate that the terminal device does not detect the second PDCCH, the method further comprises:所述网络设备接收所述终端设备重传的所述第一消息。The network device receives the first message retransmitted by the terminal device.
- 根据权利要求26至33中任一项所述的方法,其特征在于,所述第二PDCCH用于指示在所述终端设备确定已解决随机接入过程中的竞争冲突时,所述终端设备进行数据传输使用的参数。The method according to any one of claims 26 to 33, wherein the second PDCCH is used to indicate that when the terminal device determines that the contention conflict in the random access process has been resolved, the terminal device performs Parameters used for data transmission.
- 根据权利要求34所述的方法,其特征在于,所述终端设备进行数据传输使用的参数包括所述第一PDCCH调度的信息中的参数。The method according to claim 34, wherein the parameters used by the terminal device for data transmission include parameters in the information scheduled by the first PDCCH.
- 根据权利要求26至35中任一项所述的方法,其特征在于,所述第二目标RNTI为小区-无线网络临时标识C-RNTI或临时小区-无线网络临时标识TC-RNTI。The method according to any one of claims 26 to 35, wherein the second target RNTI is a cell-radio network temporary identification C-RNTI or a temporary cell-radio network temporary identification TC-RNTI.
- 根据权利要求25至36中任一项所述的方法,其特征在于,所述RA-RNTI是根据接收所述随机接入前导码的物理随机接入信道PRACH资源,和/或,接收所述上行消息的物理上行共享信道PUSCH资源的位置确定的。The method according to any one of claims 25 to 36, wherein the RA-RNTI is based on the physical random access channel PRACH resource that receives the random access preamble, and/or receives the The location of the physical uplink shared channel PUSCH resource of the uplink message is determined.
- 根据权利要求25至37中任一项所述的方法,其特征在于,所述第一标识包括以下中的至少一个:随机数、5G-服务临时移动用户标识5G-S-TMSI、标识无线网络临时标识I-RNTI、短标识无线网络临时标识Short I-RNTI。The method according to any one of claims 25 to 37, wherein the first identifier comprises at least one of the following: a random number, a 5G-serving temporary mobile user identifier 5G-S-TMSI, and a wireless network identifier Temporary identifier I-RNTI, short identifier wireless network temporary identifier Short I-RNTI.
- 根据权利要求22所述的方法,其特征在于,所述网络设备根据所述第一消息的解码情况,确定向所述终端设备发送的响应消息,包括:The method according to claim 22, wherein the network device determining the response message sent to the terminal device according to the decoding situation of the first message comprises:若所述随机接入前导码解码成功,且所述第一标识解码失败,所述网络设备向所述终端设备发送四步随机接入的消息2;或If the random access preamble is successfully decoded and the first identifier fails to be decoded, the network device sends a four-step random access message 2 to the terminal device; or所述网络设备向所述终端设备发送第二指示信息,所述第二指示信息用于指示所述终端设备重传所述第一消息。The network device sends second indication information to the terminal device, where the second indication information is used to instruct the terminal device to retransmit the first message.
- 一种终端设备,其特征在于,包括:A terminal device, characterized by comprising:通信单元,用于向网络设备发送第一消息,所述第一消息包括随机接入前导码和上行消息,所述上行消息包含第一标识;A communication unit, configured to send a first message to a network device, where the first message includes a random access preamble and an uplink message, and the uplink message includes a first identifier;处理单元,用于根据所述第一标识,确定用于盲检第一物理下行控制信道PDCCH的第一目标无线网络临时标识符RNTI;A processing unit, configured to determine, according to the first identifier, a first target radio network temporary identifier RNTI used for blind detection of the first physical downlink control channel PDCCH;所述处理单元还用于,根据所述第一目标RNTI,盲检所述第一PDCCH;The processing unit is further configured to blindly detect the first PDCCH according to the first target RNTI;所述处理单元还用于,根据盲检所述第一PDCCH的结果,确定是否盲检第二PDCCH;The processing unit is further configured to determine whether to blindly detect the second PDCCH according to the result of the blind detection of the first PDCCH;所述处理单元还用于,若确定盲检所述第二PDCCH,盲检所述第二PDCCH;The processing unit is further configured to, if it is determined to blindly detect the second PDCCH, blindly detect the second PDCCH;所述处理单元还用于,根据盲检所述第二PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突。The processing unit is further configured to determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
- 根据权利要求40所述的终端设备,其特征在于,所述处理单元还用于:The terminal device according to claim 40, wherein the processing unit is further configured to:在所述通信单元向所述网络设备发送第一消息之后,启动第一定时器或开启第一窗口;After the communication unit sends the first message to the network device, start a first timer or open a first window;所述处理单元具体用于:The processing unit is specifically used for:在所述第一定时器或所述第一窗口的时长范围内,根据所述第一目标RNTI盲检所述第一PDCCH。Blindly detect the first PDCCH according to the first target RNTI within the duration range of the first timer or the first window.
- 根据权利要求40或41所述的终端设备,其特征在于,所述第一标识为小区-无线网络临时标识符C-RNTI,所述第一目标RNTI为C-RNTI。The terminal device according to claim 40 or 41, wherein the first identifier is a cell-radio network temporary identifier C-RNTI, and the first target RNTI is a C-RNTI.
- 根据权利要求42所述的终端设备,其特征在于,若所述终端设备不盲检所述第二PDCCH,所述处理单元还用于:The terminal device according to claim 42, wherein if the terminal device does not blindly detect the second PDCCH, the processing unit is further configured to:根据盲检所述第一PDCCH的结果,确定是否已解决随机接入过程中的竞争冲突。According to the result of blind detection of the first PDCCH, it is determined whether the contention conflict in the random access process has been resolved.
- 根据权利要求43所述的终端设备,其特征在于,所述处理单元具体用于:The terminal device according to claim 43, wherein the processing unit is specifically configured to:若所述处理单元盲检到所述第一PDCCH,确定已解决随机接入过程中的竞争冲突;If the processing unit blindly detects the first PDCCH, determining that the contention conflict in the random access process has been resolved;若所述处理单元未盲检到所述第一PDCCH,确定未解决随机接入过程中的竞争冲突。If the processing unit does not blindly detect the first PDCCH, it is determined that the contention conflict in the random access process is not resolved.
- 根据权利要求40或41所述的终端设备,其特征在于,所述第一标识为所述C-RNTI以外的其他标识,所述第一目标RNTI为RA-RNTI。The terminal device according to claim 40 or 41, wherein the first identifier is an identifier other than the C-RNTI, and the first target RNTI is an RA-RNTI.
- 根据权利要求45所述的终端设备,其特征在于,所述RA-RNTI是根据传输所述随机接入前导码的物理随机接入信道PRACH资源,和/或,传输所述上行消息的物理上行共享信道PUSCH资源的位置确定的。The terminal device according to claim 45, wherein the RA-RNTI is based on a physical random access channel PRACH resource for transmitting the random access preamble, and/or a physical uplink for transmitting the uplink message The location of the shared channel PUSCH resource is determined.
- 根据权利要求45或46所述的终端设备,其特征在于,所述处理单元具体用于:The terminal device according to claim 45 or 46, wherein the processing unit is specifically configured to:若所述处理单元盲检到所述第一PDCCH,根据第一指示信息确定是否盲检所述第二PDCCH以及确定所述第二目标RNTI,其中,所述第一PDCCH包括所述第一指示信息,或所述第一PDCCH调度的PDSCH包括所述第一指示信息。If the processing unit blindly detects the first PDCCH, it determines whether to blindly detect the second PDCCH and determines the second target RNTI according to the first indication information, where the first PDCCH includes the first indication Information, or the PDSCH scheduled by the first PDCCH includes the first indication information.
- 根据权利要求47所述的终端设备,其特征在于,若所述第一指示信息中的至少一个比特的值为第一值,所述第一指示信息用于指示所述终端设备盲检所述第二PDCCH。The terminal device according to claim 47, wherein if the value of at least one bit in the first indication information is a first value, the first indication information is used to instruct the terminal device to blindly check the The second PDCCH.
- 根据权利要求47所述的终端设备,其特征在于,若所述第一指示信息中的至少一个比特的值为第二值,所述第一指示信息用于指示所述终端设备不盲检所述第二PDCCH。The terminal device according to claim 47, wherein if the value of at least one bit in the first indication information is the second value, the first indication information is used to indicate that the terminal device does not blindly detect The second PDCCH.
- 根据权利要求47至49中任一项所述的终端设备,其特征在于,所述处理单元具体用于:The terminal device according to any one of claims 47 to 49, wherein the processing unit is specifically configured to:若所述第一指示信息用于指示所述终端设备盲检所述第二PDCCH,确定盲检所述第二PDCCH;If the first indication information is used to instruct the terminal device to blindly detect the second PDCCH, determine to blindly detect the second PDCCH;若所述第一指示信息用于指示所述终端设备不盲检所述第二PDCCH,确定不盲检所述第二PDCCH。If the first indication information is used to indicate that the terminal device does not blindly detect the second PDCCH, determine not to blindly detect the second PDCCH.
- 根据权利要求47至50中任一项所述的终端设备,其特征在于,所述第一指示信息包含在随机接入响应RAR。The terminal device according to any one of claims 47 to 50, wherein the first indication information is included in a random access response RAR.
- 根据权利要求51所述的终端设备,其特征在于,所述RAR中的至少一个比特的比特位置等于四步随机接入中预留比特的比特位置。The terminal device according to claim 51, wherein the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in the four-step random access.
- 根据权利要求45至52中任一项所述的终端设备,其特征在于,若所述终端设备不盲检所述第二PDCCH,所述通信单元还用于:The terminal device according to any one of claims 45 to 52, wherein if the terminal device does not blindly detect the second PDCCH, the communication unit is further configured to:向所述网络设备发送四步随机接入中的消息3;Sending a message 3 in four-step random access to the network device;接收所述网络设备针对所述消息3发送的消息4;Receive the message 4 sent by the network device for the message 3;所述处理单元还用于:The processing unit is also used for:根据所述消息4,确定是否已解决随机接入过程中的竞争冲突。According to the message 4, it is determined whether the contention conflict in the random access process has been resolved.
- 根据权利要求45至52中任一项所述的终端设备,其特征在于,若所述终端设备不盲检所述第二PDCCH,所述通信单元还用于:The terminal device according to any one of claims 45 to 52, wherein if the terminal device does not blindly detect the second PDCCH, the communication unit is further configured to:向所述网络设备重传所述第一消息。Retransmit the first message to the network device.
- 根据权利要求45至52中任一项所述的终端设备,其特征在于,若所述终端设备确定盲检所述第二PDCCH,所述处理单元具体用于:The terminal device according to any one of claims 45 to 52, wherein if the terminal device determines to blindly detect the second PDCCH, the processing unit is specifically configured to:利用第二目标RNTI,盲检所述第二PDCCH。Using the second target RNTI, blindly check the second PDCCH.
- 根据权利要求55所述的终端设备,其特征在于,所述处理单元具体用于:The terminal device according to claim 55, wherein the processing unit is specifically configured to:若所述终端设备盲检到所述第二PDCCH,且第一标识与第二标识匹配成功,则确定已解决随机接入过程中的竞争冲突,其中,所述第二标识为所述第二PDCCH携带的冲突解决标识,或所述第二标识为所述第二PDCCH调度的PDSCH中携带的冲突解决标识。If the terminal device blindly detects the second PDCCH, and the first identifier matches the second identifier successfully, it is determined that the contention conflict in the random access process has been resolved, where the second identifier is the second The conflict resolution identifier carried by the PDCCH, or the second identifier is the conflict resolution identifier carried in the PDSCH scheduled by the second PDCCH.
- 根据权利要求55或56所述的方法,其特征在于,所述第二目标RNTI为小区-无线网络临时标识C-RNTI或临时小区-无线网络临时标识TC-RNTI。The method according to claim 55 or 56, wherein the second target RNTI is a cell-radio network temporary identification C-RNTI or a temporary cell-radio network temporary identification TC-RNTI.
- 根据权利要求45至57中任一项所述的终端设备,其特征在于,所述第一标识包括以下中的至少一个:随机数、G-服务临时移动用户标识5G-S-TMSI、标识无线网络临时标识I-RNTI、短标识无线网络临时标识Short I-RNTI。The terminal device according to any one of claims 45 to 57, wherein the first identifier includes at least one of the following: a random number, a G-service temporary mobile user identifier 5G-S-TMSI, and a wireless identifier. The network temporary identifier I-RNTI, the short identifier wireless network temporary identifier Short I-RNTI.
- 根据权利要求40至58中任一项所述的终端设备,其特征在于,所述第二PDCCH用于指示在所述终端设备解决竞争冲突后,所述终端设备进行数据传输使用的参数。The terminal device according to any one of claims 40 to 58, wherein the second PDCCH is used to indicate a parameter used by the terminal device for data transmission after the terminal device resolves a contention conflict.
- 根据权利要求59所述的终端设备,其特征在于,所述终端设备进行数据传输使用的参数包括所述网络设备针对所述第一消息发送的RAR中的参数。The terminal device according to claim 59, wherein the parameters used by the terminal device for data transmission include parameters in the RAR sent by the network device for the first message.
- 一种网络设备,其特征在于,包括:A network device, characterized by comprising:通信单元,用于接收终端设备发送的第一消息,所述第一消息包括随机接入前导码和上行消息,所述上行消息包括第一标识;A communication unit, configured to receive a first message sent by a terminal device, where the first message includes a random access preamble and an uplink message, and the uplink message includes a first identifier;处理单元,用于对所述第一消息进行解码;A processing unit, configured to decode the first message;所述处理单元还用于,根据所述第一消息的解码情况,确定向所述终端设备发送的响应消息。The processing unit is further configured to determine a response message to be sent to the terminal device according to the decoding situation of the first message.
- 根据权利要求61所述的网络设备,其特征在于,所述通信单元还用于:The network device according to claim 61, wherein the communication unit is further configured to:若所述随机接入前导码解码成功,且所述第一标识解码成功,向所述终端设备发送第一目标无线网络临时标识符RNTI加扰的第一物理下行控制信道PDCCH。If the random access preamble is successfully decoded and the first identifier is successfully decoded, the first physical downlink control channel PDCCH scrambled by the first target radio network temporary identifier RNTI is sent to the terminal device.
- 根据权利要求62所述的网络设备,其特征在于,所述第一标识为小区-无线网络临时标识符C-RNTI,所述第一目标RNTI为C-RNTI。The network device according to claim 62, wherein the first identifier is a cell-radio network temporary identifier C-RNTI, and the first target RNTI is a C-RNTI.
- 根据权利要求62所述的网络设备,其特征在于,所述第一标识为所述C-RNTI以外的其他 标识,所述第一目标RNTI为RA-RNTI。The network device according to claim 62, wherein the first identifier is an identifier other than the C-RNTI, and the first target RNTI is an RA-RNTI.
- 根据权利要求64所述的网络设备,其特征在于,所述通信单元具体用于:The network device according to claim 64, wherein the communication unit is specifically configured to:向所述终端设备发送所述第一PDCCH和第二目标RNTI加扰的第二PDCCH。Sending the first PDCCH and the second PDCCH scrambled by the second target RNTI to the terminal device.
- 根据权利要求65所述的网络设备,其特征在于,第一指示信息用于指示所述终端设备是否盲检所述第二PDCCH,其中,所述第一PDCCH调度的信息包括所述第一指示信息,或所述第一PDCCH调度的PDSCH包括所述第一指示信息。The network device according to claim 65, wherein the first indication information is used to indicate whether the terminal device blindly detects the second PDCCH, wherein the first PDCCH scheduling information includes the first indication Information, or the PDSCH scheduled by the first PDCCH includes the first indication information.
- 根据权利要求66所述的网络设备,其特征在于,若所述第一指示信息中的至少一个比特的值为第一值,所述第一指示用于指示所述终端设备盲检所述第二PDCCH。The network device according to claim 66, wherein if the value of at least one bit in the first indication information is a first value, the first indication is used to instruct the terminal device to blindly check the first value. Two PDCCH.
- 根据权利要求66所述的网络设备,其特征在于,若所述第一指示信息中的至少一个比特的值为第二值,所述第一指示信息用于指示所述终端设备不盲检所述第二PDCCH。The network device according to claim 66, wherein if the value of at least one bit in the first indication information is the second value, the first indication information is used to indicate that the terminal device does not blindly detect The second PDCCH.
- 根据权利要求66至68中任一项所述的网络设备,其特征在于,所述第一指示信息为随机接入响应RAR。The network device according to any one of claims 66 to 68, wherein the first indication information is a random access response RAR.
- 根据权利要求69所述的网络设备,其特征在于,所述RAR中的至少一个比特的比特位置等于四步随机接入中预留比特的比特位置。The network device according to claim 69, wherein the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in four-step random access.
- 根据权利要求66至70中任一项所述的网络设备,其特征在于,若所述第一指示信息用于指示所述终端设备不检测所述第二PDCCH,所述通信单元还用于:The network device according to any one of claims 66 to 70, wherein if the first indication information is used to indicate that the terminal device does not detect the second PDCCH, the communication unit is further configured to:接收所述终端设备发送的四步随机接入中的消息3;Receiving message 3 in the four-step random access sent by the terminal device;针对所述消息3,向所述终端设备发送消息4。For the message 3, the message 4 is sent to the terminal device.
- 根据权利要求66至70中任一项所述的网络设备,其特征在于,若所述第一指示信息用于指示所述终端设备不检测所述第二PDCCH,所述通信单元还用于:The network device according to any one of claims 66 to 70, wherein if the first indication information is used to indicate that the terminal device does not detect the second PDCCH, the communication unit is further configured to:接收所述终端设备重传的所述第一消息。Receiving the first message retransmitted by the terminal device.
- 根据权利要求65至72中任一项所述的网络设备,其特征在于,所述第二PDCCH用于指示在所述终端设备确定已解决随机接入过程中的竞争冲突时,所述终端设备进行数据传输使用的参数。The network device according to any one of claims 65 to 72, wherein the second PDCCH is used to indicate that when the terminal device determines that the contention conflict in the random access process has been resolved, the terminal device Parameters used for data transmission.
- 根据权利要求73所述的网络设备,其特征在于,所述终端设备进行数据传输使用的参数包括所述第一PDCCH调度的信息中的参数。The network device according to claim 73, wherein the parameters used by the terminal device for data transmission include parameters in the information scheduled by the first PDCCH.
- 根据权利要求65至74中任一项所述的网络设备,其特征在于,所述第二目标RNTI为小区-无线网络临时标识C-RNTI或临时小区-无线网络临时标识TC-RNTI。The network device according to any one of claims 65 to 74, wherein the second target RNTI is a cell-wireless network temporary identity C-RNTI or a temporary cell-wireless network temporary identity TC-RNTI.
- 根据权利要求64至75中任一项所述的网络设备,其特征在于,所述RA-RNTI是根据接收所述随机接入前导码的物理随机接入信道PRACH资源,和/或,接收所述上行消息的物理上行共享信道PUSCH资源的位置确定的。The network device according to any one of claims 64 to 75, wherein the RA-RNTI is based on a physical random access channel PRACH resource receiving the random access preamble, and/or receiving The position of the physical uplink shared channel PUSCH resource of the uplink message is determined.
- 根据权利要求64至76中任一项所述的网络设备,其特征在于,所述第一标识包括以下中的至少一个:随机数、5G-服务临时移动用户标识5G-S-TMSI、标识无线网络临时标识I-RNTI、短标识无线网络临时标识Short I-RNTI。The network device according to any one of claims 64 to 76, wherein the first identifier comprises at least one of the following: a random number, a 5G-serving temporary mobile user identifier 5G-S-TMSI, and a wireless identifier The network temporary identifier I-RNTI, the short identifier wireless network temporary identifier Short I-RNTI.
- 根据权利要求77所述的网络设备,其特征在于,所述通信单元还用于:The network device according to claim 77, wherein the communication unit is further configured to:若所述随机接入前导码解码成功,且所述第一标识解码失败,向所述终端设备发送四步随机接入的消息2;或If the random access preamble is successfully decoded and the first identifier fails to be decoded, send a four-step random access message 2 to the terminal device; or向所述终端设备发送第二指示信息,所述第二指示信息用于指示所述终端设备重传所述第一消息。Sending second indication information to the terminal device, where the second indication information is used to instruct the terminal device to retransmit the first message.
- 一种终端设备,其特征在于,包括:处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至21中任一项所述的方法。A terminal device, characterized by comprising: a processor and a memory, the memory is used to store a computer program, the processor is used to call and run the computer program stored in the memory, and execute as claimed in claims 1 to 21 Any of the methods described.
- 一种网络设备,其特征在于,包括:处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求22至39中任一项所述的方法。A network device, characterized by comprising: a processor and a memory, the memory is used to store a computer program, the processor is used to call and run the computer program stored in the memory, and execute the Any of the methods described.
- 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至21中任一项所述的方法。A chip, characterized by comprising: a processor, configured to call and run a computer program from a memory, so that a device installed with the chip executes the method according to any one of claims 1 to 21.
- 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求22至39中任一项所述的方法。A chip, characterized by comprising: a processor, configured to call and run a computer program from a memory, so that a device installed with the chip executes the method according to any one of claims 22 to 39.
- 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至21中任一项所述的方法。A computer-readable storage medium, characterized in that it is used to store a computer program that enables a computer to execute the method according to any one of claims 1 to 21.
- 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求22至39中任一项所述的方法。A computer-readable storage medium, characterized in that it is used to store a computer program that enables a computer to execute the method according to any one of claims 22 to 39.
- 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至21中任一项所述的方法。A computer program product, characterized by comprising computer program instructions, which cause a computer to execute the method according to any one of claims 1 to 21.
- 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求22至39中任一项所述的方法。A computer program product, characterized by comprising computer program instructions, which cause a computer to execute the method according to any one of claims 22 to 39.
- 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求1至21中任一项所述的方法。A computer program, wherein the computer program causes a computer to execute the method according to any one of claims 1 to 21.
- 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求22至39中任一项所述的方法。A computer program, wherein the computer program causes a computer to execute the method according to any one of claims 22 to 39.
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/078788 WO2020186468A1 (en) | 2019-03-19 | 2019-03-19 | Random access method and device |
CN201980093548.6A CN113519201A (en) | 2019-03-19 | 2019-03-27 | Random access method and equipment |
CN202111184645.1A CN113905453B (en) | 2019-03-19 | 2019-03-27 | Random access method and equipment |
EP19920380.3A EP3930414A4 (en) | 2019-03-19 | 2019-03-27 | Random access method and device |
PCT/CN2019/079939 WO2020186546A1 (en) | 2019-03-19 | 2019-03-27 | Random access method and device |
US17/477,048 US12048021B2 (en) | 2019-03-19 | 2021-09-16 | Random access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/078788 WO2020186468A1 (en) | 2019-03-19 | 2019-03-19 | Random access method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020186468A1 true WO2020186468A1 (en) | 2020-09-24 |
Family
ID=72519568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/078788 WO2020186468A1 (en) | 2019-03-19 | 2019-03-19 | Random access method and device |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2020186468A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101784121A (en) * | 2009-01-20 | 2010-07-21 | 华为技术有限公司 | Random access method, device and system |
US10070400B2 (en) * | 2014-09-24 | 2018-09-04 | Lg Electronics Inc. | Method for transmitting and receiving signal in wireless communication system and apparatus therefor |
CN108633009A (en) * | 2017-03-20 | 2018-10-09 | 华为技术有限公司 | A kind of communication means, terminal and the network equipment |
CN109479306A (en) * | 2016-05-09 | 2019-03-15 | 夏普株式会社 | User equipment, base station and method |
-
2019
- 2019-03-19 WO PCT/CN2019/078788 patent/WO2020186468A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101784121A (en) * | 2009-01-20 | 2010-07-21 | 华为技术有限公司 | Random access method, device and system |
US10070400B2 (en) * | 2014-09-24 | 2018-09-04 | Lg Electronics Inc. | Method for transmitting and receiving signal in wireless communication system and apparatus therefor |
CN109479306A (en) * | 2016-05-09 | 2019-03-15 | 夏普株式会社 | User equipment, base station and method |
CN108633009A (en) * | 2017-03-20 | 2018-10-09 | 华为技术有限公司 | A kind of communication means, terminal and the network equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12048021B2 (en) | Random access method and device | |
WO2020020270A1 (en) | Random access method and communication device | |
CN113490286B (en) | Random access method, terminal equipment and network equipment | |
CN113950161B (en) | Wireless communication method, terminal equipment and network equipment | |
JP7496834B2 (en) | METHOD FOR TWO-STEP RANDOM ACCESS, TERMINAL DEVICE AND NETWORK DEVICE - Patent application | |
CN111972032B (en) | Random access method and equipment | |
WO2020223878A1 (en) | Random access method, terminal device and network device | |
CN113678562B (en) | Communication method, terminal device and network device | |
WO2020215330A1 (en) | Data transmission method in random access process, terminal device, and network device | |
WO2020191561A1 (en) | Random access method and apparatus, user equipment, and network device | |
WO2020024616A1 (en) | Random access method and related device | |
WO2020210963A1 (en) | Message transmission method and device | |
CN113273299B (en) | Method and apparatus for random access | |
CN112789939B (en) | Power control method and device, terminal and network equipment | |
US20230129426A1 (en) | Wireless communication method and terminal device | |
WO2020227907A1 (en) | Resource determination method and apparatus, and terminal | |
WO2020191515A1 (en) | Random access method and apparatus, terminal and network device | |
WO2020206658A1 (en) | Wireless communication method, terminal apparatus, and network apparatus | |
WO2021077377A1 (en) | Information indication method and apparatus, terminal device, and network device | |
WO2020186468A1 (en) | Random access method and device | |
CN112806068B (en) | Resource management method, equipment and storage medium | |
WO2020206597A1 (en) | Power distribution method and terminal device | |
CN114222350B (en) | Random access method and device, user equipment and network equipment | |
WO2020177135A1 (en) | Power control method, random access method apparatuses, and terminal | |
WO2020198988A1 (en) | Random access method, electronic device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19920464 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19920464 Country of ref document: EP Kind code of ref document: A1 |