WO2020186468A1 - Procédé et dispositif d'accès aléatoire - Google Patents
Procédé et dispositif d'accès aléatoire Download PDFInfo
- Publication number
- WO2020186468A1 WO2020186468A1 PCT/CN2019/078788 CN2019078788W WO2020186468A1 WO 2020186468 A1 WO2020186468 A1 WO 2020186468A1 CN 2019078788 W CN2019078788 W CN 2019078788W WO 2020186468 A1 WO2020186468 A1 WO 2020186468A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- pdcch
- rnti
- identifier
- random access
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 211
- 238000001514 detection method Methods 0.000 claims abstract description 26
- 230000008569 process Effects 0.000 claims description 78
- 238000004891 communication Methods 0.000 claims description 72
- 230000015654 memory Effects 0.000 claims description 50
- 238000012545 processing Methods 0.000 claims description 44
- 238000004590 computer program Methods 0.000 claims description 43
- 230000005540 biological transmission Effects 0.000 claims description 25
- 230000004044 response Effects 0.000 claims description 20
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 claims description 12
- 238000010586 diagram Methods 0.000 description 21
- 230000001360 synchronised effect Effects 0.000 description 14
- 230000006870 function Effects 0.000 description 9
- 238000001228 spectrum Methods 0.000 description 5
- 230000001413 cellular effect Effects 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 101100274486 Mus musculus Cited2 gene Proteins 0.000 description 3
- 101150096622 Smr2 gene Proteins 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 101100533725 Mus musculus Smr3a gene Proteins 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 2
- 238000004220 aggregation Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001869 rapid Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
Definitions
- This application relates to the field of communications, in particular to a method and equipment for random access.
- a two-step random access process can be used.
- message 1 (Msg 1) and message 3 (Msg 3) in the four-step random access process can be sent as the first message (Msg A) in the two-step random access process
- message 2 (Msg 2) and message 2 (Msg 4) in the four-step random access process as the second message (Msg B) in the two-step random access process.
- the embodiments of the present application provide a random access method and device, which can resolve contention conflicts in a two-step random access process.
- a random access method includes: a terminal device sends a first message to a network device, the first message includes a random access preamble and an uplink message, and the uplink message includes a first message.
- An identifier the terminal device determines the first target radio network temporary identifier RNTI for blind detection of the first physical downlink control channel PDCCH according to the first identifier; the terminal device blindly detects the first target RNTI according to the first target RNTI Detecting the first PDCCH; the terminal device determines whether to blindly detect the second PDCCH according to the result of blindly detecting the first PDCCH; if the terminal device determines to blindly detect the second PDCCH, the terminal device blindly detects The second PDCCH; the terminal device determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
- a random access method includes: a network device receives a first message sent by a terminal device, where the first message includes a preamble identifier ID for random access and an uplink message, and The uplink message includes a first identifier; the network device decodes the first message; the network device determines a response message to be sent to the terminal device according to the decoding situation of the first message.
- a terminal device which is used to execute the method in the foregoing first aspect or each of its implementation manners.
- the terminal device includes a functional module for executing the method in the foregoing first aspect or each implementation manner thereof.
- a network device configured to execute the method in the second aspect or its implementation manners.
- the network device includes a functional module for executing the method in the foregoing second aspect or each implementation manner thereof.
- a terminal device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned first aspect or each of its implementation modes.
- a network device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned second aspect or each of its implementation modes.
- a chip is provided for implementing any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
- the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes any one of the above-mentioned first aspect to the second aspect or any of the implementations thereof method.
- a computer-readable storage medium for storing a computer program that enables a computer to execute any one of the first aspect to the second aspect or the method in each implementation manner thereof.
- a computer program product including computer program instructions, which cause a computer to execute any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
- a computer program which when running on a computer, causes the computer to execute any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
- the network device can send the first PDCCH and the second PDCCH to the terminal device, and the terminal device can determine whether to blindly detect the second PDCCH according to the result of the blind detection of the first PDCCH. If the device determines to blindly detect the second PDCCH, it can determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH, so that the contention conflict in the two-step random access process can be resolved.
- Fig. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
- Fig. 2 is a schematic flowchart of a four-step random access method according to an embodiment of the present application.
- Fig. 3 is a schematic flowchart of another two-step random access method according to an embodiment of the present application.
- Fig. 4 is a schematic diagram of a MAC PDU including RAR according to an embodiment of the present application.
- Fig. 5 is a schematic block diagram of a BI prefix according to an embodiment of the present application.
- Fig. 6 is a schematic block diagram of a RAPID prefix according to an embodiment of the present application.
- Fig. 7 is a schematic block diagram of a MAC RAR according to an embodiment of the present application.
- Fig. 8 is a schematic flowchart of a four-step random access to a two-step random access according to an embodiment of the present application.
- Fig. 9 is a schematic flowchart of a random access method according to an embodiment of the present application.
- Fig. 10 is a schematic diagram of a random access method according to an embodiment of the present application.
- Fig. 11 is a schematic block diagram of a terminal device according to an embodiment of the present application.
- Fig. 12 is a schematic block diagram of a network device according to an embodiment of the present application.
- Fig. 13 is a schematic block diagram of a communication device according to an embodiment of the present application.
- Fig. 14 is a schematic block diagram of a chip according to an embodiment of the present application.
- Fig. 15 is a schematic block diagram of a communication system according to an embodiment of the present application.
- GSM Global System of Mobile Communication
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- GPRS General Packet Radio Service
- LTE Long Term Evolution
- LTE-A Advanced Long Term Evolution
- New Radio, NR evolution system of NR system
- LTE LTE-based access to unlicensed spectrum
- LTE-U Universal Mobile Telecommunication System
- UMTS Universal Mobile Telecommunication System
- WLAN Wireless Local Area Networks
- WiFi Wireless Fidelity
- D2D Device to Device
- M2M Machine to Machine
- MTC machine type communication
- V2V vehicle to vehicle
- the communication system in the embodiments of the present application can be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, can also be applied to a dual connectivity (DC) scenario, and can also be applied to a standalone (SA) deployment.
- CA Carrier Aggregation
- DC dual connectivity
- SA standalone
- the communication system 100 applied in the embodiment of the present application is shown in FIG. 1.
- the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or called a communication terminal or terminal).
- the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located in the coverage area.
- the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system (Evolutional Node B, eNB or eNodeB), or the wireless controller in the Cloud Radio Access Network (CRAN), or the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in the future evolution of the Public Land Mobile Network (PLMN), etc.
- BTS Base Transceiver Station
- NodeB, NB base station
- LTE Long Term Evolutional Node B
- eNB evolved base station
- CRAN Cloud Radio Access Network
- the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches
- the communication system 100 also includes at least one terminal device 120 located within the coverage area of the network device 110.
- the "terminal equipment” used here includes but is not limited to connection via wired lines, such as via public switched telephone networks (PSTN), digital subscriber lines (Digital Subscriber Line, DSL), digital cables, and direct cable connections ; And/or another data connection/network; and/or via a wireless interface, such as for cellular networks, wireless local area networks (WLAN), digital TV networks such as DVB-H networks, satellite networks, AM- FM broadcast transmitter; and/or another terminal device that is set to receive/send communication signals; and/or Internet of Things (IoT) equipment.
- PSTN public switched telephone networks
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL
- a terminal device set to communicate through a wireless interface may be referred to as a "wireless communication terminal", a “wireless terminal” or a “mobile terminal”.
- mobile terminals include, but are not limited to, satellites or cellular phones; Personal Communications System (PCS) terminals that can combine cellular radio phones with data processing, fax, and data communication capabilities; can include radio phones, pagers, Internet/intranet PDA with internet access, web browser, memo pad, calendar, and/or Global Positioning System (GPS) receiver; and conventional laptop and/or palmtop receivers or others including radio phone transceivers Electronic device.
- PCS Personal Communications System
- GPS Global Positioning System
- Terminal equipment can refer to access terminals, user equipment (UE), user units, user stations, mobile stations, mobile stations, remote stations, remote terminals, mobile equipment, user terminals, terminals, wireless communication equipment, user agents, or User device.
- the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in 5G networks, or terminal devices in the future evolution of PLMN, etc.
- SIP Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- the network device 110 may provide services for a cell, and the terminal device 120 communicates with the network device 110 through transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell.
- the cell may be the network device 110 (for example, a base station)
- the corresponding cell the cell can belong to a macro base station or a base station corresponding to a small cell (Small cell).
- the small cell here can include, for example, a metro cell, a micro cell, and a pico cell. Femto cells, etc. These small cells have the characteristics of small coverage and low transmit power, and are suitable for providing high-rate data transmission services.
- Figure 1 exemplarily shows one network device and two terminal devices.
- the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
- the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- the devices with communication functions in the network/system in the embodiments of the present application may be referred to as communication devices.
- the communication device may include a network device 110 and a terminal device 120 with communication functions, and the network device 110 and the terminal device 120 may be the specific devices described above, which will not be repeated here.
- the communication device may also include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the application.
- the terminal device After the cell search process, the terminal device has achieved downlink synchronization with the cell, so the terminal device can receive downlink data. However, the terminal equipment can only perform uplink transmission if it has achieved uplink synchronization with the cell.
- the terminal equipment can establish a connection with the cell and obtain uplink synchronization through a random access procedure (Random Access Procedure).
- Random Access Procedure Random Access Procedure
- the random access process can usually be triggered by the following events:
- the terminal device can enter the RRC connected state (RRC_CONNECTED) from the radio resource control (Radio Resource Control, RRC) idle state (RRC_IDLE state).
- RRC Radio Resource Control
- the terminal device is in the connected state and needs to establish uplink synchronization with the new cell.
- the uplink is in a "non-synchronised” state (DL or UL data arrival during RRC_CONNECTED when UL synchronisation status is "non-synchronised”).
- the terminal device transitions from the RRC inactive state (Transition from RRC_INACTIVE).
- the terminal device requests other system information (Other System Information, OSI).
- OSI Operating System Information
- the terminal device needs to perform beam failure recovery (Beam failure recovery).
- contention-based random access method as shown in FIG. 2
- non-contention-based random access method as shown in FIG. The following briefly describes the four-step random access process based on contention:
- Step 1 The terminal device sends a random access preamble (Preamble, that is, message1, Msg1) to the network device.
- Preamble that is, message1, Msg1
- the random access preamble may also be referred to as a preamble, a random access preamble sequence, a preamble sequence, and so on.
- the terminal device may select physical random access channel (Physical Random Access Channel, PRACH) resources, and the PRACH resources may include time domain resources, frequency domain resources, and code domain resources.
- PRACH Physical Random Access Channel
- the terminal device can send the selected Preamble on the selected PRACH resource.
- the network device can estimate the transmission delay between it and the terminal device based on the Preamble and use this to calibrate the uplink timing, and can roughly determine the size of the resource required for the terminal device to transmit message 3 (Msg3).
- Msg3 message 3
- Step 2 The network device sends a random access response (Random Access Response, RAR, that is, message2, Msg2) to the terminal device
- RAR Random Access Response
- the terminal device After the terminal device sends the Preamble to the network device, it can open a RAR window, in which RAR window detects the corresponding physical downlink control channel (Physical Downlink) according to the Random Access Radio Network Temporary Identifier (RA-RNTI) Control Channel, PDCCH). If the terminal device detects the PDCCH scrambled by the RA-RNTI, it can obtain the physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) scheduled by the PDCCH. Wherein, the PDSCH includes the RAR corresponding to the Preamble.
- RA-RNTI Random Access Radio Network Temporary Identifier
- the terminal device can consider that this random access procedure has failed. It should be understood that both the terminal equipment and the network equipment need to uniquely determine the value of RA-RNTI, otherwise the terminal equipment cannot decode the RAR.
- the RA-RNTI may calculate the value of the RA-RNTI by using the time-frequency position of the Preamble that is clear to both the transmitting and receiving parties.
- RA-RNTI associated with Preamble can be calculated by formula (1):
- RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id(1)
- s_id is the index of the first Orthogonal Frequency Division Multiplexing (OFDM) symbol of the PRACH resource (0 ⁇ s_id ⁇ 14), and t_id is the index of the first time slot of the PRACH resource in a system frame.
- f_id is the index of the PRACH resource in the frequency domain (0 ⁇ f_id ⁇ 8)
- ul_carrier_id is the uplink carrier used to transmit the Preamble (0 represents the NUL carrier, 1 represents the SUL carrier).
- f_id is fixed to 0.
- the network device since the time-frequency position of the Preamble sent by the terminal device is determined, the network device also obtains the time-frequency position of the Preamble when decoding the Preamble, and can then know the RA-RNTI that needs to be used in the RAR.
- the terminal device successfully receives a RAR (using a certain RA-RNTI to decode), and the random access sequence identifier (Random Access Preamble Identifier, RAPID) in the RAR is the same as the preamble index sent by the terminal device, it can It is considered that the RAR is successfully received, and the terminal device can stop detecting the PDCCH scrambled by the RA-RNTI at this time.
- RAPID Random Access Preamble Identifier
- the RAR can be carried in the Media Access Control (MAC) protocol data unit (Protocol Data Unit, PDU).
- MAC Media Access Control
- PDU Protocol Data Unit
- a MAC PDU may include one or more MAC subPDUs (subPDU) and possibly padding bits, and a MAC subPDU may only have a Backoff Indicator (BI), or There are only random access sequence identifiers (Random Access Preamble Identifier, RAPID), or RAPID and MAC RAR.
- BI Backoff Indicator
- RAPID Random Access Preamble Identifier
- MAC PDU It can be seen from the structure of MAC PDU that if a network device detects random access requests from multiple terminal devices on the same PRACH resource, it can use one MAC PDU to respond to these access requests. Each random access The response to the request (corresponding to a preamble index) corresponds to a RAR. In other words, if multiple terminal devices send Preamble on the same PRACH resource (the same time and frequency position, using the same RA-RNTI), the corresponding RARs are multiplexed in the same MAC PDU.
- all terminal devices that use the same PRACH resource to send the Preamble detect the same RA-RNTI scrambled PDCCH and receive the same MAC PDU, but different RAPIDs correspond to different RARs.
- the MAC PDU can only be scrambled with one RA-RNTI, this also means that the RAR corresponding to the Preamble sent using different PRACH resources (different time and frequency positions) cannot be multiplexed into the same MAC PDU.
- FIG. 5 is a schematic block diagram of a BI subheader in an embodiment of the present application.
- the BI sub-header may include an extension field (E), a type field (T), two reserved fields (R), and a BI value.
- the BI sub-header appears only once and is located at the first head of the MAC header (header). If the terminal device receives a BI subheader, it will save a backoff value, which is equal to the value corresponding to the BI in the header; otherwise, the terminal device can set the Backoff value to 0.
- the value corresponding to BI specifies the time range that the terminal device needs to wait before resending the Preamble. If the terminal device does not receive the RAR within the RAR window, or if none of the received RARs matches the preamble index selected by the terminal device, it can be considered that the RAR reception fails. At this time, the terminal device needs to wait for a period of time before initiating random access.
- the waiting time can be any random value within the waiting time interval specified by the value corresponding to 0 to BI.
- Fig. 6 is a schematic block diagram of a RAPID subheader in an embodiment of the present application.
- the RAPID subheader can include an E, a T, and RAPID values.
- RAPID is the Preamble index received by the network device in response. If the terminal device finds that the value is the same as the index used when it sends the Preamble, it can be considered that the corresponding RAR has been successfully received.
- FIG. 7 is a schematic block diagram of a MAC RAR according to an embodiment of the present application.
- MAC RAR may include: reserved bit R (for example, 1 bit), time alignment command (Timing Advance Command, TAC), uplink grant (UL grant), and temporary cell radio network temporary identification ( Temporary Cell Radio Network Temporary Identifier, TC-RNTI).
- TAC can be used to specify the amount of time adjustment required for the uplink synchronization of the terminal equipment, and can occupy 12 bits.
- UL grant can be used to schedule Msg3 uplink resource indication.
- TC-RNTI can be used to scramble the Msg4 PDCCH (initial access).
- Step 3 The terminal device sends Msg3.
- the terminal device After receiving the RAR message, the terminal device determines whether the RAR is its own RAR message. For example, the terminal device can use the preamble index to check. After determining that it is its own RAR message, it can generate Msg3 in the RRC layer and send it to The network device sends Msg3, which needs to carry the identification information of the terminal device, etc.
- Msg3 is mainly used to notify the network equipment of the random access trigger event.
- the Msg3 sent by the terminal device in step 3 may include different content.
- Msg3 may include the RRC connection request message (RRC Setup Request) generated by the RRC layer.
- RRC Setup Request RRC connection request message
- Msg3 may also carry, for example, the 5G-service temporary mobile subscriber identity (Serving-Temporary Mobile Subscriber Identity, S-TMSI) of the terminal device or a random number.
- S-TMSI Serving-Temporary Mobile Subscriber Identity
- Msg3 may include an RRC connection re-establishment request message (RRC Reestabilshment Request) generated by the RRC layer.
- RRC Reestabilshment Request RRC connection re-establishment request message
- Msg3 may also carry, for example, a Cell Radio Network Temporary Identifier (C-RNTI).
- C-RNTI Cell Radio Network Temporary Identifier
- Msg3 may include an RRC handover confirmation message (RRC Handover Confirm) generated by the RRC layer, which carries the C-RNTI of the terminal device.
- RRC Handover Confirm RRC handover confirmation message
- Msg3 may also carry information such as Buffer Status Report (BSR).
- BSR Buffer Status Report
- Msg3 may at least include the C-RNTI of the terminal device.
- Step 4 The network device sends a contention resolution message (Msg4) to the terminal device.
- Msg4 contention resolution message
- the network device sends Msg4 to the terminal device, and the terminal device correctly receives the Msg4 to complete the contention resolution (Contention Resolution).
- Msg4 may carry the RRC connection establishment message.
- the network device Since the terminal device in step 3 can carry its own unique identifier in Msg3, the network device will carry the unique identifier of the terminal device in Msg4 in the contention resolution mechanism to specify the terminal device that wins the competition. Other terminal devices that did not win in the contention resolution will re-initiate random access.
- the Msg4 can be scheduled with the PDCCH scrambled by the TC-RNTI.
- the resolution of the contention conflict can be through the terminal device receiving the PDSCH of Msg4 to obtain the conflict resolution ID, and by matching the conflict resolution ID with the common control channel (CCCH) service data unit in msg3 , SDU) to determine whether to resolve the conflict.
- CCCH common control channel
- the delay of four-step random access is relatively large, which is not suitable for the low-latency and high-reliability scenarios in 5G.
- a two-step random access process scheme is proposed. As shown in Figure 8, in the two-step random access process, in simple terms, it is equivalent to combining the first and third steps of the four-step random access process into the first step in the two-step random access process. The second and fourth steps of the four-step random access process are combined into the second step of the two-step random access process.
- the two-step random access procedure may include:
- the first step the terminal device sends the first message to the network device.
- the first message may be composed of a preamble and a payload (payload).
- the Preamble is a four-step random access Preamble.
- the preamble is transmitted on the PRACH resource.
- the payload mainly carries information in Msg3 in the four-step random access.
- it may include CCCH SDU, such as corresponding to random access in RRC idle state, and may also include C-RNTI MAC control element (CE), such as mainly corresponding to random access in RRC connected state.
- CE C-RNTI MAC control element
- the payload may be carried on an uplink channel, and the channel may be, for example, a physical uplink shared channel (PUSCH).
- PUSCH physical uplink shared channel
- the first message may carry part or all of the information carried in the Preamble and Msg3 in the four-step random access process.
- Step 2 The network device sends a second message to the terminal device.
- the network device can send the second message to the terminal device.
- the second message may include part or all of the information carried in Msg2 and Msg4 in the four-step random access process.
- the names of the first message and the second message are not limited, that is, they can also be expressed as other names.
- the first message may also be called Msg A, random access request message or new Msg1
- the second message may also be called Msg B or new Msg2.
- FIG. 8 is only a specific implementation of the two-step random access process, and should not limit the protection scope of this application.
- the embodiment of the present application proposes a random access method, which can enable the terminal device to effectively resolve the contention conflict in the two-step random access process.
- FIG. 9 is a schematic flowchart of a random access method 300 according to an embodiment of the present application.
- the method described in FIG. 9 may be executed by a terminal device and a network device.
- the terminal device may be, for example, the terminal device 120 shown in FIG. 1
- the network device may be, for example, the network device 110 shown in FIG.
- the method 300 may include at least part of the following content.
- the terminal device sends a first message to the network device.
- the first message includes a random access preamble (ie, Preamble) and an uplink message, and the uplink message includes a first identifier.
- the network device decodes the first message, and determines the response message to be sent to the terminal device according to the decoding situation of the first message.
- the network device sends a response message to the terminal device.
- the terminal device determines the first target RNTI used for blind detection of the first PDCCH according to the first identifier.
- the terminal device blindly detects the first PDCCH according to the first target RNTI, and determines whether to blindly detect the second PDCCH according to the result of blindly detecting the first PDCCH.
- the terminal device determines to blindly detect the second PDCCH, the terminal device blindly detects the second PDCCH, and determines whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
- first message in the method 300 may correspond to the first message in FIG. 8.
- the first message including the Preamble and the uplink message can be understood as: between the terminal device sending the Preamble and the uplink message to the network device, there is no other message between the network device and the terminal device, and/or the network device
- the second message may be sent to the terminal device simultaneously for the Preamble and the uplink message.
- the terminal device may first select the resource of the first message, including the PRACH resource and the corresponding PUSCH resource, and then use the selected resource to transmit the first message. Among them, the terminal device can use the PRACH resource to transmit the Preamble and the PUSCH resource to transmit the payload.
- the terminal device can be in a connected state, an inactive state or an idle state.
- the first identifier included in the first message may be different.
- the first identifier can basically be expressed as two types, one is that the payload contains C-RNTI MAC CE, and the other is that the payload does not contain C-RNTI MAC CE, that is, it contains CCCH SDU.
- the terminal device can determine the first identifier carried in the payload according to its current RRC state.
- the first identifier may be but is not limited to the C-RNTI, and the C-RNTI may be included in the C-RNTI MAC CE.
- the first identifier may include, but is not limited to, a random number, 5G-S-TMSI (or a part of 5G-S-TMSI), and identifying RNTI (Identify-RNTI, I- RNTI), Short I-RNTI (Short I-RNTI).
- the number of bits of the random number is fixed, and the I-RNTI can be used to identify the content of the terminal equipment in the RRC inactive state.
- the CCCH SDU may include the identification of the terminal device.
- the SDU may include the RRC message transmitted in the Signaling Radio Bearer (Signaling Radio Bearer, SRB) 0, such as:
- the message in the above content may generally include the first identifier.
- the first identifier may be a random number or a part of 5G-S-TMSI.
- the terminal device sends the first message to the network device, and correspondingly, the network device can receive the first message sent by the terminal device and decode the first message.
- the network device decodes the first message, there can be multiple situations:
- Case 1 The network device successfully decodes one or more Preambles, but fails to decode the Payload in the PUSCH.
- Case 2 The network device successfully decodes one or more Preambles and one or more Payloads.
- Case 3 The network device successfully decoded the payload but failed to decode the preamble. It should be noted that, since the network device needs the Preamble as the uplink timing estimation, the possibility of case 3 is small, and case 3 is not considered in this embodiment of the application.
- the network device can respond to the Preamble, that is, send the RAR in the four-step random access to the terminal device to respond to the Preamble. In this way, for a terminal device with two-step random access, it can fall back to a four-step random access; for a terminal device with four-step random access, it is a normal process. Or it does not respond to the Preamble, that is, the network device may send the second indication information to the terminal device, and the second indication information may be used to instruct the terminal device to retransmit the first message.
- the first message retransmitted by the terminal device may be the same as or different from the first message previously transmitted, and the resource for retransmitting the first message may be the same as or different from the resource previously transmitted for the first message.
- the network device may send third instruction information to the terminal device, and the third instruction information may be used to indicate The terminal device stops blindly checking the first PDCCH, so that the terminal device can retransmit the first message as soon as possible.
- the first PDCCH is used for scheduling RAR.
- the PRACH resources of the terminal device performing the two-step random access and the terminal device performing the four-step random access may be different.
- the network device can distinguish the terminal performing the four-step random access according to the PRACH resource that receives the Preamble Equipment and terminal equipment for two-step random access.
- the PRACH resource may be configured by the network device, or may be preset on the terminal device.
- the network device can distinguish the terminal device corresponding to the identifier in the payload. At this time, the network device may have different response modes according to the first identifier.
- the network device can respond to the payload based on the above association relationship. For example, if the Preamble is successfully decoded but the Payload corresponding to the Preamble is not successfully decoded, the network device may respond to the Preamble or not. If the Preamble is successfully decoded and the Payload corresponding to the Preamble is also successfully decoded, the network device can respond to the Payload. Further, since multiple terminal devices may use the successfully decoded Preamble at the same time, the network device may further respond to the successfully decoded Preamble.
- the network device may send the first PDCCH to the terminal device.
- the terminal device may determine the first target RNTI according to the first identifier, and then blindly detect the first PDCCH according to the first target RNTI.
- the terminal device determines that the first target RNTI may be C-RNTI; if the first identifier is an identifier other than C-RNTI, the terminal device may determine that the first target RNTI may be RA- RNTI.
- the identifiers other than C-RNTI may be random numbers, 5G-S-TMSI, I-RNTI, Short I-RNTI, and so on.
- the RA-RNTI may have a corresponding relationship with the PRACH resource for transmitting the Preamble in the first message, and/or the PUSCH resource for transmitting the payload. That is, the terminal device or the network device may determine the RA-RNTI according to the PRACH resource of the Preamble transmitted in the first message, and/or the PUSCH resource of the payload transmitted.
- RA-RNTI may be calculated from the position of the PRACH time-frequency resource for transmitting the Preamble.
- a possible calculation method is as follows: (2):
- RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id (2)
- s_id is the index of the first OFDM symbol of the PRACH resource for transmitting the Preamble in the first message (0 ⁇ s_id ⁇ 14), and t_id is the first one of the PRACH resource for transmitting the Preamble in the first message in a system frame
- the index of the time slot (0 ⁇ t_id ⁇ 80)
- f_id is the index of the PRACH resource for transmitting the Preamble in the first message in the frequency domain (0 ⁇ f_id ⁇ 8)
- ul_carrier_id is the uplink used to transmit the Preamble in the first message Carrier (0 means NUL carrier, 1 means SUL carrier).
- the terminal device may blindly detect the first PDCCH according to the first target RNTI.
- the blind detection of the first PDCCH by the terminal device may include: after the terminal device sends the first message to the network device, the terminal device starts a first timer or opens a first window, and the first timer or Within the duration of the window, blindly check the first PDCCH.
- the duration of the first timer or the first window may be preset on the terminal device based on a protocol, or may be pre-configured by the network device to the terminal device, for example, it may be configured through RRC signaling.
- the first timer or the first window may be started after the random access preamble is sent, or after the uplink message is sent, which is not specifically limited in the embodiment of the present application.
- the following describes the next behavior of the terminal device from two cases where the first target RNTI is C-RNTI or RA-RNTI.
- Case 1 The first target RNTI is C-RNTI.
- the terminal device can determine whether the contention conflict in the random access process has been resolved according to the result of blindly detecting the first PDCCH.
- the terminal device can determine the contention conflict in the random access process solved. If the terminal device blindly detects the first PDCCH scrambled by the C-RNTI, but the C-RNTI does not match the first identifier in the first message successfully, the terminal device may determine that the contention conflict in the random access process is not resolved.
- the terminal device may determine that the contention conflict in the random access process is not resolved, and the terminal device may resend the first message to the network device.
- Case 2 The first target RNTI is RA-RNTI.
- the terminal device may resend the first message to the network device.
- the terminal device may determine that the first indication information has been successfully decoded, and the terminal device may determine whether to blindly detect the second PDCCH and determine the second target RNTI for blindly detecting the second PDCCH according to the first indication information.
- the information scheduled by the first PDCCH may include the first indication information, or the physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) scheduled by the first PDCCH may include the first indication information.
- the first PDCCH or the second PDCCH may also be an enhanced physical downlink control channel (EPDCCH), a machine type communication physical downlink control channel (Machine Type Communication Physical Downlink Control Channel, MPDCCH) ), Narrowband Physical Downlink Control Channel (NPDCCH), which is not limited in this application.
- EPDCCH enhanced physical downlink control channel
- MPDCCH Machine Type Communication Physical Downlink Control Channel
- NPDCCH Narrowband Physical Downlink Control Channel
- the first indication may be used to instruct the terminal device to blindly detect the second PDCCH.
- the first indication may be used to instruct the terminal device not to blindly detect the second PDCCH.
- the first indication information is one bit.
- the first value can be “0” or "1”
- the second value can also be “0" or "1”.
- the first value is “0”
- the second value is “1”
- the first value is “1”
- the second value is "0”.
- the first indication information can be used to instruct the terminal device to detect the second PDCCH; if there are at least two of the multiple bits The bits are different, and the first indication information may be used to instruct the terminal device not to detect the second PDCCH.
- the 3 bits in the first indication information are used to indicate whether the terminal device detects the second PDCCH, "000" indicates that the terminal device detects the second PDCCH, and "010" indicates that the terminal device does not detect the second PDCCH.
- the first indication information may be used to instruct the terminal device not to detect the second PDCCH.
- the first indication information may indicate whether the terminal device detects the second PDCCH through the first parameter. Exemplarily, if the first indication information includes the first parameter, the terminal device is instructed to detect the second PDCCH; if the first indication information does not include the first parameter, the terminal device is instructed not to detect the second PDCCH.
- the embodiment of the present application does not specifically limit the first parameter, and any parameter that can indicate whether the terminal device detects the second PDCCH is included in the protection scope of the present application.
- the first indication information may be RAR.
- the format of the RAR may be the same as or different from the format of the RAR in FIG. 7, which is not specifically limited in the embodiment of the present application.
- the bit position of the at least one bit may be equal to the bit position of the reserved bit in the four-step random access.
- the number of the at least one bit is one.
- the RAR may use bit “1" to instruct the terminal device to detect the second PDCCH, and use bit "0" to instruct the terminal device not to detect the second PDCCH.
- the first indication information may also be downlink control information (Downlink Control Information, DCI) carried by the first PDCCH, or other information carried by the first PDCCH.
- DCI Downlink Control Information
- the terminal device For the terminal device, if the first indication information is used to instruct the terminal device not to detect the second PDCCH, in one case, the terminal device can fall back to the four-step random access, and the behavior is consistent with the four-step random access, namely: a. Process TAC; b. Process UL grant; c. Set TC-RNTI value; d. If there is no MAC PDU in the Msg3 buffer, the terminal device can generate Msg3MAC PDU; e. The terminal device stops blindly checking the second message window or Timer. After that, the terminal device can send Msg3 to the network device, and the network device sends Msg4 to the terminal device after receiving the Msg3. In another case, the terminal device may retransmit the first message to the network device.
- the terminal device blindly detects the second PDCCH.
- the terminal device may blindly detect the second PDCCH according to the second target RNTI.
- the second target RNTI may be TC-RNTI or C-RNTI.
- the terminal device may set a TC-RNTI or C-RNTI value, and the TC-RNTI or C-RNTI value is used for the terminal device to blindly detect possible second PDCCH scheduling in the second message.
- the terminal device may determine that the random access contention conflict has been resolved.
- the second identifier may be an identifier carried by the second PDCCH or an identifier in the PDSCH scheduled by the second PDCCH.
- the terminal device can determine that the contention conflict of the two-step random access has been resolved.
- the second identifier is the contention conflict resolution ID MAC CE.
- the second PDCCH may be scrambled by the third identifier.
- the third identifier may be a random number, 5G-S-TMSI, I-RNTI, Short I-RNTI, etc.
- the terminal device can match the third identifier with the first identifier. If the matching is successful, the terminal device can determine the two-step random access Incoming competition conflict has been resolved. For example, if the second PDCCH is scrambled by a fixed-size random number, the terminal device can match the fixed-size random number with the first identifier. If the matching is successful, the terminal device can determine the two-step random access The competition conflict has been resolved.
- the first identifier mentioned in the above content matches the second identifier (or third identifier) successfully, which can be understood as: the first identifier and the second identifier (or third identifier) are the same; or, the first identifier and the second identifier ( Or the third identifier) is different but belongs to the same terminal device; or, the first identifier and the second identifier (or third identifier) have a corresponding relationship.
- the terminal device can also process the RAR scheduled by the first PDCCH, such as processing TAC, uplink authorization, and so on.
- FIG. 10 is a diagram of a specific implementation example of an embodiment of the present application.
- an arrow indicates one data transmission, and there are 3 data transmissions in total.
- the first identifier is an identifier other than C-RNTI
- the second target RNTI is TC-RNTI or C-RNTI.
- the terminal device sends the first message to the network device. After that, the terminal device starts the first timer or opens the first window, and blindly detects the second message within the duration of the first timer or the first window. After receiving the first message, the network device sends a second message to the terminal device.
- the second message includes the RAR and Msg B1.
- the network device uses the first PDCCH scrambled by RA-RNTI to schedule the RAR. After successfully decoding the first PDCCH, the terminal device can determine whether to blindly detect the second PDCCH according to the indication of the RAR.
- the terminal device blindly detects the second PDCCH; if the RAR indicates not blind detection of the second PDCCH, the terminal device does not blindly detect the second PDCCH.
- the network equipment uses the second PDCCH scrambled by TC-RNTI or C-RNTI to schedule Msg B1.
- the fourth indication information in the second PDCCH may be used for data transmission.
- the fourth indication information may be used to indicate whether the terminal device uses the parameters in the RAR for data transmission. For example, whether to use the uplink authorization in RAR for data transmission. If the fourth indication information indicates that the parameters in the RAR of the terminal device perform data transmission, the terminal device can use the parameters in the RAR to perform data transmission.
- the fourth indication information may include parameters required by the terminal device for uplink transmission. For example, TAC and so on. In this way, the terminal device does not need to process RAR.
- the network device may send the first PDCCH and the second PDCCH to the terminal device, and the terminal device may determine whether to blindly check the second PDCCH according to the result of blindly checking the first PDCCH. If the terminal device determines to blindly detect the second PDCCH, it can determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH, so that the contention conflict in the two-step random access process can be resolved.
- the size of the sequence number of the foregoing processes does not mean the order of execution.
- the execution order of each process should be determined by its function and internal logic, and should not be implemented in this application.
- the implementation process of the example constitutes any limitation.
- the communication method according to the embodiment of the present application is described in detail above.
- the communication device according to the embodiment of the present application will be described below with reference to FIG. 11 to FIG. 13.
- the technical features described in the method embodiment are applicable to the following device embodiments.
- FIG. 11 shows a schematic block diagram of a terminal device 400 according to an embodiment of the present application.
- the terminal device 400 includes:
- the communication unit 410 is configured to send a first message to a network device, the first message including a preamble for random access and an uplink message, the uplink message including a first identifier.
- the processing unit 420 is configured to determine, according to the first identifier, a first target radio network temporary identifier RNTI used for blind detection of the first physical downlink control channel PDCCH.
- the processing unit 420 is further configured to blindly detect the first PDCCH according to the first target RNTI.
- the processing unit 420 is further configured to determine whether to blindly detect the second PDCCH according to the result of the blind detection of the first PDCCH.
- the processing unit 420 is further configured to, if it is determined to blindly detect the second PDCCH, blindly detect the second PDCCH.
- the processing unit 420 is further configured to determine whether the contention conflict in the random access process has been resolved according to the result of the blind detection of the second PDCCH.
- the processing unit 420 is further configured to: after the communication unit 410 sends the first message to the network device, start a first timer or open a first window;
- the processing unit 420 is specifically configured to: blindly detect the first PDCCH according to the first target RNTI within the duration range of the first timer or the first window.
- the first identifier is a cell-radio network temporary identifier C-RNTI
- the first target RNTI is a C-RNTI
- the processing unit 420 is further configured to: determine whether it has been resolved according to the result of the blind check of the first PDCCH Contention conflict during random access.
- the processing unit 420 is specifically configured to: if the processing unit 420 blindly detects the first PDCCH, determine that the contention conflict in the random access process has been resolved; The processing unit 420 does not blindly detect the first PDCCH, and determines that the contention conflict in the random access process is not resolved.
- the first identifier is an identifier other than the C-RNTI
- the first target RNTI is an RA-RNTI
- the RA-RNTI is based on the physical random access channel PRACH resource for transmitting the random access preamble, and/or the physical uplink shared channel PUSCH for transmitting the uplink message The location of the resource is determined.
- the processing unit 420 is specifically configured to: if the processing unit 420 blindly detects the first PDCCH, determine whether to blindly detect the second PDCCH according to the first indication information, and The second target RNTI is determined, where the first PDCCH includes the first indication information, or the PDSCH scheduled by the first PDCCH includes the first indication information.
- the first indication information is used to instruct the terminal device to blindly detect the second PDCCH .
- the first indication information is used to instruct the terminal device not to blindly check the second value. PDCCH.
- the processing unit 420 is specifically configured to: if the first indication information is used to instruct the terminal device 400 to blindly detect the second PDCCH, determine to blindly detect the second PDCCH PDCCH; if the first indication information is used to instruct the terminal device 400 not to blindly detect the second PDCCH, determine not to blindly detect the second PDCCH.
- the first indication information is included in a random access response RAR.
- the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in the four-step random access.
- the communication unit 410 is further configured to: send a message 3 in four-step random access to the network device; Receive the message 4 sent by the network device for the message 3;
- the processing unit 420 is further configured to: according to the message 4, determine whether the contention conflict in the random access process has been resolved.
- the communication unit 410 is further configured to: retransmit the first message to the network device.
- the processing unit 420 is specifically configured to: use the second target RNTI to blindly detect the second PDCCH.
- the processing unit 420 is specifically configured to: if the terminal device 400 blindly detects the second PDCCH, and the first identifier matches the second identifier successfully, then determine that the resolution has been resolved In a contention conflict in a random access process, the second identifier is a conflict resolution identifier carried in the second PDCCH, or the second identifier is a conflict resolution identifier carried in a PDSCH scheduled by the second PDCCH.
- the second target RNTI is a cell-radio network temporary identifier C-RNTI or a temporary cell-radio network temporary identifier TC-RNTI.
- the first identifier includes at least one of the following: a random number, a 5G-S-temporary mobile user identifier TMSI, I-RNTI, and Short I-RNTI.
- the second target RNTI is a cell-radio network temporary identifier C-RNTI or a temporary cell-radio network temporary identifier TC-RNTI.
- the second PDCCH is used to indicate parameters used by the terminal device 400 for data transmission after the terminal device 400 resolves the contention conflict.
- the parameters used by the terminal device 400 for data transmission include parameters in the RAR sent by the network device for the first message.
- terminal device 400 may correspond to the terminal device in the method 300, and can implement the corresponding operations of the terminal device in the method 300. For brevity, details are not described herein again.
- FIG. 12 shows a schematic block diagram of a network device 500 according to an embodiment of the present application. As shown in FIG. 12, the network device 500 includes:
- the communication unit 510 is configured to receive a first message sent by a terminal device, the first message including a random access preamble and an uplink message, the uplink message including a first identifier.
- the processing unit 520 is configured to decode the first message.
- the processing unit 520 is further configured to determine a response message sent to the terminal device according to the decoding situation of the first message.
- the communication unit 510 is further configured to: if the random access preamble is successfully decoded and the first identifier is successfully decoded, send the first target wireless signal to the terminal device.
- the first physical downlink control channel PDCCH scrambled by the network temporary identifier RNTI.
- the first identifier is a cell-radio network temporary identifier C-RNTI
- the first target RNTI is a C-RNTI
- the first identifier is an identifier other than the C-RNTI
- the first target RNTI is an RA-RNTI
- the communication unit 510 is specifically configured to send the first PDCCH and the second PDCCH scrambled by the second target RNTI to the terminal device.
- the first indication information is used to indicate whether the terminal device blindly detects the second PDCCH, wherein the first PDCCH scheduling information includes the first indication information, or The PDSCH scheduled by the first PDCCH includes the first indication information.
- the first indication is used to instruct the terminal device to blindly detect the second PDCCH.
- the first indication information is used to instruct the terminal device not to blindly check the second value. PDCCH.
- the first indication information is a random access response RAR.
- the bit position of at least one bit in the RAR is equal to the bit position of a reserved bit in the four-step random access.
- the communication unit 510 is further configured to: receive the fourth PDCCH sent by the terminal device. Step: Message 3 in random access; For the message 3, message 4 is sent to the terminal device.
- the communication unit 510 is further configured to: receive the retransmission of the terminal device The first message.
- the second PDCCH is used to indicate the parameters used by the terminal device for data transmission when the terminal device determines that the contention conflict in the random access process has been resolved.
- the parameters used by the terminal device for data transmission include parameters in the information scheduled by the first PDCCH.
- the second target RNTI is a cell-radio network temporary identifier C-RNTI or a temporary cell-radio network temporary identifier TC-RNTI.
- the RA-RNTI is based on the physical random access channel PRACH resource for receiving the random access preamble, and/or the physical uplink shared channel PUSCH for receiving the uplink message The location of the resource is determined.
- the first identifier includes at least one of the following: a random number, a 5G-S-temporary mobile user identifier TMSI, I-RNTI, and Short I-RNTI.
- the communication unit 510 is further configured to: if the random access preamble is successfully decoded and the first identifier fails to be decoded, send a four-step random access to the terminal device. Incoming message 2; or sending second indication information to the terminal device, where the second indication information is used to instruct the terminal device to retransmit the first message.
- the network device 500 may correspond to the network device in the method 300, and can implement the corresponding operations of the network device in the method 300. For brevity, details are not described herein again.
- FIG. 13 is a schematic structural diagram of a communication device 600 provided by an embodiment of the present application.
- the communication device 600 shown in FIG. 13 includes a processor 610, and the processor 610 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
- the communication device 600 may further include a memory 620.
- the processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
- the memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
- the communication device 600 may further include a transceiver 630, and the processor 6710 may control the transceiver 630 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
- the transceiver 630 may include a transmitter and a receiver.
- the transceiver 630 may further include an antenna, and the number of antennas may be one or more.
- the communication device 600 may specifically be a network device in an embodiment of the present application, and the communication device 600 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not repeated here. .
- the communication device 600 may specifically be a terminal device in an embodiment of this application, and the communication device 600 may implement the corresponding procedures implemented by the terminal device in each method of the embodiment of the application. .
- FIG. 14 is a schematic structural diagram of a chip of an embodiment of the present application.
- the chip 700 shown in FIG. 14 includes a processor 710, and the processor 710 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- the chip 700 may further include a memory 720.
- the processor 710 may call and run a computer program from the memory 720 to implement the method in the embodiment of the present application.
- the memory 720 may be a separate device independent of the processor 710, or may be integrated in the processor 710.
- the chip 700 may further include an input interface 730.
- the processor 710 may control the input interface 730 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
- the chip 700 may further include an output interface 740.
- the processor 710 can control the output interface 740 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
- the chip can be applied to the terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the terminal device in the various methods of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the terminal device in the various methods of the embodiment of the present application.
- the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
- the chip mentioned in the embodiment of the present application may also be referred to as a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip.
- the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
- the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
- the aforementioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
- DSP Digital Signal Processor
- ASIC application specific integrated circuit
- FPGA ready-made programmable gate array
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
- the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
- the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- DRAM synchronous dynamic random access memory
- SDRAM double data rate synchronous dynamic random access memory
- Double Data Rate SDRAM DDR SDRAM
- ESDRAM enhanced synchronous dynamic random access memory
- Synchlink DRAM SLDRAM
- DR RAM Direct Rambus RAM
- the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
- FIG. 15 is a schematic block diagram of a communication system 800 according to an embodiment of the present application. As shown in FIG. 15, the communication system 800 includes a terminal device 810 and a network device 820.
- the terminal device 810 can be used to implement the corresponding function implemented by the terminal device in the above method
- the network device 820 can be used to implement the corresponding function implemented by the network device in the above method. For brevity, it will not be repeated here. .
- the embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
- the computer-readable storage medium can be applied to the terminal device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the embodiments of the present application also provide a computer program product, including computer program instructions.
- the computer program product can be applied to the terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- it is not here. Repeat it again.
- the embodiment of the present application also provides a computer program.
- the computer program can be applied to the terminal device in the embodiment of the present application.
- the computer program runs on the computer, it causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- I won’t repeat it here.
- the computer program can be applied to the network device in the embodiment of the present application.
- the computer program runs on the computer, the computer is caused to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- I won’t repeat it here.
- the disclosed system, device, and method may be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Les modes de réalisation de la présente invention concernent un procédé et un dispositif d'accès aléatoire, le procédé comprenant les étapes suivantes : un dispositif de terminal envoie un premier message à un dispositif de réseau, le premier message comprenant un préambule d'accès aléatoire et un message de liaison montante, et le message de liaison montante comprenant un premier identifiant ; sur la base du premier identifiant, le dispositif de de terminal détermine un premier identifiant temporaire de réseau radio RNTI cible utilisé pour la détection à l'aveugle d'un premier canal physique de contrôle de liaison descendante PDCCH ; sur la base du premier RNTI cible, le dispositif de terminal détecte à l'aveugle le premier PDCCH ; sur la base du résultat de la détection à l'aveugle du premier PDCCH, le dispositif de terminal détermine s'il faut ou non détecter à l'aveugle un second PDCCH ; si le dispositif de terminal détermine qu'il faut détecter à l'aveugle le second PDCCH, le dispositif de terminal détecte à l'aveugle le second PDCCH ; et, sur la base du résultat de la détection à l'aveugle du second PDCCH, le dispositif de terminal détermine si un conflit de collision dans la procédure d'accès aléatoire a déjà été résolu. Le procédé et le dispositif d'accès aléatoire dans les modes de réalisation de la présente invention peuvent résoudre un conflit de collision dans une procédure d'accès aléatoire en deux étapes.
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/078788 WO2020186468A1 (fr) | 2019-03-19 | 2019-03-19 | Procédé et dispositif d'accès aléatoire |
CN201980093548.6A CN113519201A (zh) | 2019-03-19 | 2019-03-27 | 随机接入的方法和设备 |
CN202111184645.1A CN113905453B (zh) | 2019-03-19 | 2019-03-27 | 随机接入的方法和设备 |
EP19920380.3A EP3930414A4 (fr) | 2019-03-19 | 2019-03-27 | Procédé et dispositif d'accès aléatoire |
PCT/CN2019/079939 WO2020186546A1 (fr) | 2019-03-19 | 2019-03-27 | Procédé et dispositif d'accès aléatoire |
US17/477,048 US12048021B2 (en) | 2019-03-19 | 2021-09-16 | Random access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/078788 WO2020186468A1 (fr) | 2019-03-19 | 2019-03-19 | Procédé et dispositif d'accès aléatoire |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020186468A1 true WO2020186468A1 (fr) | 2020-09-24 |
Family
ID=72519568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/078788 WO2020186468A1 (fr) | 2019-03-19 | 2019-03-19 | Procédé et dispositif d'accès aléatoire |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2020186468A1 (fr) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101784121A (zh) * | 2009-01-20 | 2010-07-21 | 华为技术有限公司 | 一种随机接入的方法、装置和系统 |
US10070400B2 (en) * | 2014-09-24 | 2018-09-04 | Lg Electronics Inc. | Method for transmitting and receiving signal in wireless communication system and apparatus therefor |
CN108633009A (zh) * | 2017-03-20 | 2018-10-09 | 华为技术有限公司 | 一种通信方法、终端及网络设备 |
CN109479306A (zh) * | 2016-05-09 | 2019-03-15 | 夏普株式会社 | 用户设备、基站和方法 |
-
2019
- 2019-03-19 WO PCT/CN2019/078788 patent/WO2020186468A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101784121A (zh) * | 2009-01-20 | 2010-07-21 | 华为技术有限公司 | 一种随机接入的方法、装置和系统 |
US10070400B2 (en) * | 2014-09-24 | 2018-09-04 | Lg Electronics Inc. | Method for transmitting and receiving signal in wireless communication system and apparatus therefor |
CN109479306A (zh) * | 2016-05-09 | 2019-03-15 | 夏普株式会社 | 用户设备、基站和方法 |
CN108633009A (zh) * | 2017-03-20 | 2018-10-09 | 华为技术有限公司 | 一种通信方法、终端及网络设备 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12048021B2 (en) | Random access method and device | |
WO2020020270A1 (fr) | Procédé d'accès aléatoire, et dispositif de communication | |
CN113490286B (zh) | 随机接入的方法、终端设备和网络设备 | |
CN113950161B (zh) | 无线通信的方法、终端设备和网络设备 | |
JP7496834B2 (ja) | 2ステップのランダムアクセスのための方法、端末デバイス及びネットワークデバイス | |
CN111972032B (zh) | 随机接入的方法和设备 | |
WO2020223878A1 (fr) | Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau | |
CN113678562B (zh) | 通信方法、终端设备和网络设备 | |
WO2020215330A1 (fr) | Procédé de transmission de données dans un processus d'accès aléatoire, dispositif terminal, et dispositif de réseau | |
WO2020191561A1 (fr) | Procédé et appareil d'accès aléatoire, équipement utilisateur, et dispositif de réseau | |
WO2020024616A1 (fr) | Procédé d'accès aléatoire et dispositif associé | |
WO2020210963A1 (fr) | Procédé et dispositif de transmission de message | |
CN113273299B (zh) | 用于随机接入的方法及设备 | |
CN112789939B (zh) | 一种功率控制方法及装置、终端、网络设备 | |
US20230129426A1 (en) | Wireless communication method and terminal device | |
WO2020227907A1 (fr) | Procédé et appareil de détermination de ressource et terminal | |
WO2020191515A1 (fr) | Procédé et appareil d'accès aléatoire, terminal et dispositif de réseau | |
WO2020206658A1 (fr) | Procédé de communication sans fil, équipement terminal et dispositif réseau | |
WO2021077377A1 (fr) | Procédé et appareil d'indication d'informations, dispositif terminal et dispositif réseau | |
WO2020186468A1 (fr) | Procédé et dispositif d'accès aléatoire | |
CN112806068B (zh) | 一种资源管理方法、设备及存储介质 | |
WO2020206597A1 (fr) | Procédé de distribution de puissance et dispositif terminal | |
CN114222350B (zh) | 一种随机接入方法及装置、用户设备、网络设备 | |
WO2020177135A1 (fr) | Procédé de commande de puissance, procédé d'accès aléatoire, appareils, et terminal | |
WO2020198988A1 (fr) | Procédé d'accès aléatoire, dispositif électronique et support d'informations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19920464 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19920464 Country of ref document: EP Kind code of ref document: A1 |