WO2020191632A1 - 一种功率控制方法及装置、终端、网络设备 - Google Patents

一种功率控制方法及装置、终端、网络设备 Download PDF

Info

Publication number
WO2020191632A1
WO2020191632A1 PCT/CN2019/079751 CN2019079751W WO2020191632A1 WO 2020191632 A1 WO2020191632 A1 WO 2020191632A1 CN 2019079751 W CN2019079751 W CN 2019079751W WO 2020191632 A1 WO2020191632 A1 WO 2020191632A1
Authority
WO
WIPO (PCT)
Prior art keywords
preamble
terminal
pdcch
information
random access
Prior art date
Application number
PCT/CN2019/079751
Other languages
English (en)
French (fr)
Inventor
王淑坤
石聪
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2019/079751 priority Critical patent/WO2020191632A1/zh
Priority to CN201980065320.6A priority patent/CN112789939B/zh
Publication of WO2020191632A1 publication Critical patent/WO2020191632A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • the embodiments of the present application relate to the field of mobile communication technology, and in particular to a power control method and device, terminal, and network equipment.
  • the terminal In the random access process, the terminal cannot use a large uplink transmission power for the transmission of the preamble at the beginning, in order to avoid uplink interference.
  • the terminal When the terminal retransmits the preamble, the power must be increased to send the preamble.
  • the random access process is initiated in the NR-U cell, whether it is a contention-based random access process or a non-competition-based random access process.
  • Channel preemption is unsuccessful, so there is a possibility that the base station has detected the preamble, but the mgs2 cannot be sent, so the terminal cannot wait for the RAR in the existing random access response (Random Access Response, RAR) receiving window.
  • RAR Random Access Response
  • the terminal does not know whether the RAR reception fails due to unsuccessful channel preemption or the RAR reception fails due to its own low power, so the terminal does not know whether to perform a power increase.
  • the embodiments of the application provide a power control method and device, terminal, and network equipment.
  • the terminal determines the power used to retransmit the preamble based on the first information and the second information;
  • the second information includes at least one of the following: a first physical downlink control channel (PDCCH), the first The first random access response scheduled by the PDCCH;
  • PDCCH physical downlink control channel
  • the first information is used to indicate that the base station successfully seizes a channel, and the first PDCCH is scrambled by a first random access radio network temporary identifier (Random Access-Radio Network Temporary Identifier, RA-RNTI).
  • RA-RNTI Random Access-Radio Network Temporary Identifier
  • the base station After receiving the preamble sent by the terminal, the base station performs channel preemption. If the channel preemption is successful, the base station sends the first information, the first PDCCH, and the first random access response scheduled by the first PDCCH to the terminal;
  • the first information is used to indicate that the base station successfully seizes the channel, and the first PDCCH is scrambled by the first RA-RNTI.
  • the power control unit is configured to determine the power used to retransmit the preamble based on the first information and the second information; the second information includes at least one of the following: the first PDCCH, the first random scheduled by the first PDCCH Access response
  • the first information is used to indicate that the base station successfully seizes the channel, and the first PDCCH is scrambled by the first RA-RNTI.
  • the channel detection unit is used for channel preemption after receiving the preamble sent by the terminal;
  • a sending unit configured to send first information, a first PDCCH, and a first random access response scheduled by the first PDCCH to the terminal if the channel preemption is successful;
  • the first information is used to indicate that the base station successfully seizes the channel, and the first PDCCH is scrambled by the first RA-RNTI.
  • the terminal provided in the embodiment of the present application includes a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the above-mentioned power control method.
  • the network device provided by the embodiment of the present application includes a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the above-mentioned power control method.
  • the chip provided in the embodiment of the present application is used to implement the above-mentioned power control method.
  • the chip includes a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes the above-mentioned power control method.
  • the computer-readable storage medium provided by the embodiments of the present application is used to store a computer program, and the computer program enables a computer to execute the above-mentioned power control method.
  • the computer program product provided by the embodiment of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the above-mentioned power control method.
  • the computer program provided in the embodiment of the present application when it runs on a computer, causes the computer to execute the above-mentioned power control method.
  • the first information indicating that the base station has successfully seized the channel is used to assist the terminal in deciding whether to perform a power ramp to retransmit the preamble.
  • the first information may be a newly defined RNTI scrambled PDCCH or channel preemption
  • the success indicator signal can prevent the base station from retransmitting the preamble by increasing the power even when the base station fails to seize the channel, thereby reducing the uplink interference of the system.
  • FIG. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
  • Figure 2 is a flowchart of a competitive random access process provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a power control method provided by an embodiment of the application.
  • FIG. 4 is a schematic diagram 1 of the structural composition of a power control device provided by an embodiment of the application.
  • FIG. 5 is a second schematic diagram of the structural composition of a power control device provided by an embodiment of the application.
  • FIG. 6 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a chip of an embodiment of the present application.
  • Fig. 8 is a schematic block diagram of a communication system provided by an embodiment of the present application.
  • GSM Global System of Mobile Communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GSM Global System of Mobile Communication
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • the communication system 100 applied in the embodiment of the present application is shown in FIG. 1.
  • the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal 120 (or called a communication terminal or a terminal).
  • the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminals located in the coverage area.
  • the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system (Evolutional Node B, eNB or eNodeB), or the wireless controller in the Cloud Radio Access Network (CRAN), or the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in the future evolution of the Public Land Mobile Network (PLMN), etc.
  • BTS Base Transceiver Station
  • NodeB, NB base station
  • LTE Long Term Evolutional Node B
  • eNB evolved base station
  • CRAN Cloud Radio Access Network
  • the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches
  • the communication system 100 also includes at least one terminal 120 located within the coverage area of the network device 110.
  • the "terminal” used here includes, but is not limited to, connection via wired lines, such as public switched telephone networks (PSTN), digital subscriber lines (Digital Subscriber Line, DSL), digital cables, and direct cable connections; And/or another data connection/network; and/or via a wireless interface, such as for cellular networks, wireless local area networks (WLAN), digital TV networks such as DVB-H networks, satellite networks, AM-FM Broadcast transmitter; and/or another terminal's device configured to receive/send communication signals; and/or Internet of Things (IoT) equipment.
  • a terminal set to communicate through a wireless interface may be referred to as a "wireless communication terminal", a “wireless terminal” or a “mobile terminal”.
  • mobile terminals include, but are not limited to, satellites or cellular phones; Personal Communications System (PCS) terminals that can combine cellular radio phones with data processing, fax, and data communication capabilities; can include radio phones, pagers, Internet/intranet PDA with internet access, web browser, memo pad, calendar, and/or Global Positioning System (GPS) receiver; and conventional laptop and/or palmtop receivers or others including radio phone transceivers Electronic device.
  • PCS Personal Communications System
  • GPS Global Positioning System
  • Terminal can refer to access terminal, user equipment (User Equipment, UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user Device.
  • the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminals in 5G networks, or terminals in the future evolution of PLMN, etc.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • the terminals 120 may perform device-to-device (D2D) communication.
  • D2D device-to-device
  • the 5G system or 5G network may also be referred to as a New Radio (NR) system or NR network.
  • NR New Radio
  • FIG. 1 exemplarily shows one network device and two terminals.
  • the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminals. This embodiment of the present application There is no restriction on this.
  • the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • the devices with communication functions in the network/system in the embodiments of the present application may be referred to as communication devices.
  • the communication device may include a network device 110 and a terminal 120 with communication functions.
  • the network device 110 and the terminal 120 may be the specific devices described above, which will not be repeated here;
  • the device may also include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • NR works in unlicensed frequency bands, including the following work scenarios:
  • Carrier aggregation scenario Primary cell (Primary Cell, PCell) is a licensed spectrum, and secondary cells (SCell) working on unlicensed spectrum are aggregated through carrier aggregation.
  • Primary Cell Primary Cell, PCell
  • SCell secondary cells
  • PCell is an LTE licensed spectrum
  • primary and secondary cell Primary Secondary cell, PScell
  • PScell Primary Secondary cell
  • NR works as an independent cell in an unlicensed spectrum.
  • NR-U's working frequency band is 5GHz unlicensed spectrum and 6GHz unlicensed spectrum; on unlicensed spectrum, NR-U design should ensure that it is compatible with other systems already working on these unlicensed spectrums. Fairness between the two. The principle of fairness is that the impact of NR-U on systems that have been deployed on unlicensed spectrum cannot exceed the impact between these systems.
  • the general energy detection mechanism is the Listen Before Talk (LBT) mechanism.
  • LBT Listen Before Talk
  • the basic principle of this mechanism is that the base station or terminal (transmitting end) needs to listen for a period of time before transmitting data on the unlicensed spectrum. . If the result of the listening indicates that the channel is idle, the transmitting end can transmit data to the receiving end. If the listening result indicates that the channel is in an occupied state, the transmitting end needs to back off for a period of time according to regulations before continuing to listen to the channel, knowing that the channel listening result is in an idle state, before transmitting data to the receiving end.
  • LBT Listen Before Talk
  • the base station For downlink data transmission, the base station needs to perform LBT on the unlicensed frequency band; in LAA, the priority of channel access is determined by the following Table 1:
  • Mp is related to the listening channel time for channel access.
  • CWmin, p and CWmax, p are related to the random listening channel time during channel access. Specifically, when the base station listens to the channel for Td time and is idle, it needs to listen to the channel again N times, each with a duration of 9 us. Where N is a random number from 0 to CWp, and CW min,p ⁇ CW p ⁇ CW max,p .
  • Tmcot p is the longest time for the base station to occupy the channel after it seizes the channel. It is related to the channel priority adopted by the base station. For example, if the priority is 1, the channel will be occupied for 2ms at most after the channel is successfully monitored.
  • the base station needs to transmit data to the UE within the MCOT time. If the base station does not seize the channel, that is, outside the MCOT time, the UE will not receive the scheduling data from the base station to the UE.
  • Random access is an important process for the UE to establish a wireless connection with the network side. Through random access, it can obtain uplink synchronization with the base station and apply for uplink resources.
  • the random access process is divided into competitive random access and non-competitive random access.
  • Figure 2 shows the flow of a competitive random access process. As shown in Figure 2, the competitive random access process includes the following steps:
  • Step 201 The terminal sends msg1 to the base station.
  • the terminal sending msg1 to the base station can be specifically implemented through the following process:
  • the terminal determines the relationship between the synchronization signal block (Synchronization Signal Block, SSB) and the PRACH resource (configured by the higher layer);
  • SSB Synchronization Signal Block
  • the terminal receives a set of SSBs and determines its Reference Signal Received Power (RSRP) value, and selects the appropriate SSB according to the threshold;
  • RSRP Reference Signal Received Power
  • the terminal determines the PRACH resource based on the selected SSB and the corresponding relationship between the SSB and the RACH resource;
  • the terminal selects the preamble group according to the size of msg3, and further selects the preamble;
  • the terminal sets the target received power of the preamble
  • the terminal sends the preamble on the PRACH time-frequency domain resources.
  • Step 202 The terminal receives msg2 sent by the base station.
  • the terminal receiving the msg2 sent by the base station can be specifically implemented through the following process:
  • the terminal determines the random access radio network temporary identifier (RA-RNTI) according to the time-frequency domain resources of the PRACH sent by msg1;
  • RA-RNTI random access radio network temporary identifier
  • the terminal starts the RAR window (ra-Response Window) at the first physical downlink control channel (Physical Downlink Control Channel, PDCCH) after the preamble is sent, and monitors the PDCCH during the operation of the window to receive the corresponding RA -RNTI's RAR;
  • RAR window (ra-Response Window) at the first physical downlink control channel (Physical Downlink Control Channel, PDCCH) after the preamble is sent, and monitors the PDCCH during the operation of the window to receive the corresponding RA -RNTI's RAR;
  • PDCCH Physical Downlink Control Channel
  • the terminal will retransmit msg1;
  • the terminal transmits msg3 according to the RAR's instructions.
  • Step 203 The terminal sends msg3 to the base station.
  • the terminal sending msg3 to the base station can be specifically implemented through the following process:
  • the terminal transmits msg3 based on the uplink scheduling (UL Grant) in RAR;
  • start ra-ContentionResolutionTimer After Msg3 is transmitted, start ra-ContentionResolutionTimer and monitor the PDCCH during the running of the timer; when Msg3 retransmits, restart the timer; until the timer expires or stops, the terminal will always monitor the PDCCH.
  • Step 204 The terminal receives msg4 sent by the base station.
  • the terminal receives the DCI format 1_0 of the Cell-Radio Network Temporary Identifier (C-RNTI) scrambling code and its corresponding PDSCH, random access is complete; if the terminal receives the temporary cell radio network temporary identifier (Temporary Cell-Radio Network Temporary Identifier, TC-RNTI) scrambling DCI format 1_0 and its corresponding PDSCH, and the content is successfully compared, and random access is completed.
  • C-RNTI Cell-Radio Network Temporary Identifier
  • FIG. 3 is a schematic flowchart of a power control method provided by an embodiment of the application. As shown in FIG. 3, the power control method includes the following steps:
  • Step 301 The base station performs channel preemption after receiving the preamble sent by the terminal. If the channel preamble is successful, the base station sends first information, a first PDCCH, and a first random access response scheduled by the first PDCCH to the terminal ; Wherein, the first information is used to indicate that the base station successfully seizes the channel, and the first PDCCH is scrambled by the first RA-RNTI.
  • the technical solutions of the embodiments of the present application can be applied to any type of random access process, such as a competitive random access process (as shown in FIG. 2) or a non-competitive random access process.
  • a competitive random access process as shown in FIG. 2
  • a non-competitive random access process does not need to resolve the random access conflict (the network side is pre-configured with random access resources without conflict). Therefore, the non-competitive random access process
  • the incoming process only includes two steps: msg1 transmission and mgs2 transmission. Among them, msg1 transmission refers to the terminal sending a preamble on the PRACH, and msg2 transmission refers to the base station sending RAR.
  • the base stations mentioned in the embodiments of this application include but are not limited to LTE base stations (eNB) and NR base stations (gNB.)
  • the terminal mentioned in the embodiments of this application may be any device capable of communicating with the network, such as a mobile phone, a notebook, a tablet computer, a vehicle-mounted terminal, and a wearable terminal.
  • the first information is the second PDCCH scrambled by the first RNTI.
  • the first RNTI is different from the first RA-RNTI, and the first RA-RNTI is the RA-RNTI corresponding to the PRACH resource for which the terminal sends the preamble.
  • the first RNTI is a newly defined RNTI, and the RNTI may be unique to the system or configured on the network side.
  • the first information is a channel preemption success indicator signal.
  • the base station fails to seize the channel, the first information will not be sent to the terminal.
  • Step 302 The terminal determines the power used to retransmit the preamble based on the first information and the second information; the second information includes at least one of the following: the first PDCCH, the first random access scheduled by the first PDCCH response.
  • the terminal determines the power used to retransmit the preamble based on the detection results of the first information and the second information, and there may be the following two application scenarios:
  • the first information is the second PDCCH scrambled by the first RNTI
  • the terminal If the terminal detects the second PDCCH but does not detect the first PDCCH, the terminal increases the transmission power of the preamble and then retransmits the preamble;
  • the terminal If the terminal detects the second PDCCH and does not detect the first random access response scheduled by the first PDCCH, the terminal increases the transmit power of the preamble and then retransmits the preamble; so
  • the first random access response refers to the random access response corresponding to the identification of the preamble sent by the terminal, and the first RA-RNTI is the RA corresponding to the physical random access channel PRACH resource through which the terminal sends the preamble. -RNTI;
  • the terminal If the terminal does not detect the second PDCCH, the terminal maintains the transmit power of the preamble unchanged and retransmits the preamble.
  • the terminal selects a PRACH resource and a preamble, and sends the preamble on the PRACH resource; the terminal calculates the RA-RNTI based on the PRACH resource, and starts a time window to wait for RAR.
  • the base station receives the preamble and performs channel preemption. If the channel preemption is successful, the base station sends the X-RNTI (i.e., the first RNTI) scrambled PDCCH (i.e. the second PDCCH) and at the same time transmits the RA-RNTI scrambled PDCCH (i.e. the first PDCCH) ).
  • the base station abandons the transmission of the RAR and discards the RAR.
  • the terminal detects the PDCCH scrambled by X-RNTI and at the same time the PDCCH scrambled by RA-RNTI, and has the following behaviors according to the detection results:
  • Behavior 1 If the X-RNTI scrambled PDCCH is detected, but the RA-RNTI scrambled PDCCH is not detected, the terminal will increase the power and continue to send the preamble; or, if the X-RNTI scrambled PDCCH is detected, it is not detected When the terminal sends the RAR corresponding to the random access preamble ID (Random Access preamble ID, RAPID) corresponding to the preamble, the terminal performs power increase and continues to send the preamble.
  • RAR Random Access preamble ID
  • Behavior 3 If it is detected that the terminal sends the RAR corresponding to the RAPID corresponding to the preamble, the terminal obtains an uplink grant (UL grant) from the RAR, and uses the UL grant to send msg3.
  • UL grant uplink grant
  • the first information is a successful channel preemption indication signal
  • the terminal If the terminal detects the channel preemption success indication signal and does not detect the first PDCCH, the terminal increases the transmit power of the preamble and then retransmits the preamble;
  • the terminal If the terminal detects the channel preemption success indication signal and does not detect the first random access response scheduled by the first PDCCH, the terminal increases the transmission power of the preamble and then retransmits the preamble;
  • the first random access response refers to a random access response corresponding to the identifier of the preamble sent by the terminal, and the first RA-RNTI is the RA-RNTI corresponding to the PRACH resource for which the terminal sends the preamble;
  • the terminal If the terminal does not detect the channel preemption success indicator signal, the terminal maintains the transmission power of the preamble unchanged and retransmits the preamble.
  • any terminal can detect the channel preemption success indication signal.
  • the terminal selects the PRACH resource and the preamble, and sends the preamble on the PRACH resource; the terminal calculates the RA-RNTI based on the PRACH resource, and starts a time window to wait for the RAR.
  • the base station receives the preamble and performs channel preemption. If the channel preamble is successful, the base station sends a channel preamble success indication signal and at the same time sends the RA-RNTI scrambled PDCCH (ie, the first PDCCH).
  • the base station abandons the transmission of the RAR and discards the RAR.
  • the terminal detects the channel preemption success indicator signal, and at the same time detects the PDCCH scrambled by RA-RNTI, and has the following behaviors according to the detection result:
  • Behavior 1 If the terminal detects the channel preemption success indicator signal, but does not detect the PDCCH scrambled by RA-RNTI, the terminal performs power increase and continues to send the preamble; or, if the terminal detects the channel preamble success indicator signal, the terminal is not detected Sending the RAR corresponding to the RAPID corresponding to the preamble, the terminal performs a power increase and continues to send the preamble.
  • Behavior 3 If it is detected that the terminal sends the RAR corresponding to the RAPID corresponding to the preamble, the terminal obtains the UL grant from the RAR, and uses the UL grant to send msg3.
  • FIG. 4 is a schematic diagram 1 of the structural composition of a power control device provided by an embodiment of the application.
  • the power control device is applied to a terminal.
  • the power control device includes the following steps:
  • the power control unit 401 is configured to determine the power used to retransmit the preamble based on the first information and the second information; the second information includes at least one of the following: the first PDCCH, the first scheduled by the first PDCCH Random access response;
  • the first information is used to indicate that the base station successfully seizes the channel, and the first PDCCH is scrambled by the first RA-RNTI.
  • the first information is the second PDCCH scrambled by the first RNTI; the power control unit 401 is configured to:
  • the preamble is retransmitted after the transmission power of the preamble is increased; the first random access The response refers to the random access response corresponding to the identifier of the preamble sent by the terminal, and the first RA-RNTI is the RA-RNTI corresponding to the PRACH resource for which the terminal sends the preamble.
  • the first information is the second PDCCH scrambled by the first RNTI; the power control unit 401 is configured to:
  • the preamble is retransmitted while maintaining the same transmit power of the preamble.
  • the first information is a channel preemption success indication signal; the power control unit 401 is configured to:
  • the preamble is retransmitted after the transmission power of the preamble is increased; or,
  • the preamble is retransmitted after the transmission power of the preamble is increased; the first random access The incoming response refers to the random access response corresponding to the identifier of the preamble sent by the terminal, and the first RA-RNTI is the RA-RNTI corresponding to the PRACH resource for which the terminal sends the preamble.
  • the first information is a channel preemption success indication signal; the power control unit 401 is configured to:
  • the preamble is retransmitted while maintaining the transmission power of the preamble unchanged.
  • Fig. 5 is a schematic diagram 2 of the structural composition of a power control device provided by an embodiment of the application.
  • the power control device is applied to a network device (such as a base station).
  • the power control device includes the following steps:
  • the channel detection unit 501 is configured to perform channel preemption after receiving the preamble sent by the terminal;
  • the sending unit 502 is configured to send first information, a first PDCCH, and a first random access response scheduled by the first PDCCH to the terminal if the channel preemption succeeds;
  • the first information is used to indicate that the base station successfully seizes the channel, and the first PDCCH is scrambled by the first RA-RNTI.
  • the first information is the second PDCCH scrambled by the first RNTI.
  • the first information is a channel preemption success indication signal.
  • FIG. 6 is a schematic structural diagram of a communication device 600 provided by an embodiment of the present application.
  • the communication device can be a terminal or a network device (such as a base station).
  • the communication device 600 shown in FIG. 6 includes a processor 610.
  • the processor 610 can call and run a computer program from a memory to implement the embodiments of the present application. Methods.
  • the communication device 600 may further include a memory 620.
  • the processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
  • the memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
  • the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
  • the transceiver 630 may include a transmitter and a receiver.
  • the transceiver 630 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 600 may specifically be a network device in an embodiment of the present application, and the communication device 600 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not repeated here. .
  • the communication device 600 may specifically be a mobile terminal/terminal according to an embodiment of the application, and the communication device 600 may implement the corresponding procedures implemented by the mobile terminal/terminal in each method of the embodiments of the application. For the sake of brevity, This will not be repeated here.
  • FIG. 7 is a schematic structural diagram of a chip of an embodiment of the present application.
  • the chip 700 shown in FIG. 7 includes a processor 710, and the processor 710 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the chip 700 may further include a memory 720.
  • the processor 710 may call and run a computer program from the memory 720 to implement the method in the embodiment of the present application.
  • the memory 720 may be a separate device independent of the processor 710, or may be integrated in the processor 710.
  • the chip 700 may further include an input interface 730.
  • the processor 710 may control the input interface 730 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
  • the chip 700 may further include an output interface 740.
  • the processor 710 can control the output interface 740 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
  • the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
  • the chip can be applied to the mobile terminal/terminal in the embodiment of the present application, and the chip can implement the corresponding process implemented by the mobile terminal/terminal in each method of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the mobile terminal/terminal in each method of the embodiment of the present application.
  • it will not be omitted here. Repeat.
  • the chip mentioned in the embodiment of the present application may also be referred to as a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip.
  • FIG. 8 is a schematic block diagram of a communication system 900 according to an embodiment of the present application. As shown in FIG. 8, the communication system 900 includes a terminal 910 and a network device 920.
  • the terminal 910 may be used to implement the corresponding functions implemented by the terminal in the foregoing method
  • the network device 920 may be used to implement the corresponding functions implemented by the network device in the foregoing method.
  • details are not described herein again.
  • the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the aforementioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC application specific integrated circuit
  • FPGA ready-made programmable gate array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • ESDRAM enhanced synchronous dynamic random access memory
  • Synchlink DRAM SLDRAM
  • DR RAM Direct Rambus RAM
  • the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
  • the embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer-readable storage medium may be applied to the mobile terminal/terminal in the embodiments of the present application, and the computer program causes the computer to execute the corresponding processes implemented by the mobile terminal/terminal in the various methods of the embodiments of the present application, for It’s concise and will not be repeated here.
  • the embodiments of the present application also provide a computer program product, including computer program instructions.
  • the computer program product may be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program product can be applied to the mobile terminal/terminal in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding procedures implemented by the mobile terminal/terminal in the various methods of the embodiments of the present application, for the sake of brevity , I won’t repeat it here.
  • the embodiment of the present application also provides a computer program.
  • the computer program can be applied to the network device in the embodiment of the present application.
  • the computer program runs on the computer, the computer is caused to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • I won’t repeat it here.
  • the computer program can be applied to the mobile terminal/terminal in the embodiments of the present application.
  • the computer program runs on the computer, the computer can execute the corresponding methods implemented by the mobile terminal/terminal in the various methods of the embodiments of the present application. For the sake of brevity, the process will not be repeated here.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种功率控制方法及装置、终端、网络设备,该方法包括:终端基于第一信息和第二信息,确定重传前导码所采用的功率;所述第二信息包括以下至少之一:第一PDCCH、所述第一PDCCH调度的第一随机接入响应;其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。

Description

一种功率控制方法及装置、终端、网络设备 技术领域
本申请实施例涉及移动通信技术领域,具体涉及一种功率控制方法及装置、终端、网络设备。
背景技术
在随机接入过程中,终端对于前导码(preamble)的发送不能一开始就用很大的上行发射功率,目的是为了避免上行干扰。终端在对preamble重传时,要进行功率攀升来发送preamble。
在新无线非授权(New Radio-Unlicense,NR-U)系统中,在NR-U小区中发起随机接入过程,无论是基于竞争的随机接入过程还是基于非竞争的随机接入过程,由于信道抢占不成功,所以存在基站已经检测到preamble,但是mgs2发送不下来的可能,所以终端在现有的随机接入响应(Random Access Response,RAR)接收窗口内等不到RAR。但是终端并不清楚是由于信道抢占不成功导致的RAR接收失败,还是由于自己功率低导致的RAR接收失败,所以终端不清楚是否要进行功率攀升。
发明内容
本申请实施例提供一种功率控制方法及装置、终端、网络设备。
本申请实施例提供的功率控制方法,包括:
终端基于第一信息和第二信息,确定重传前导码所采用的功率;所述第二信息包括以下至少之一:第一物理下行控制信道(Physical Downlink Control Channel,PDCCH)、所述第一PDCCH调度的第一随机接入响应;
其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一随机接入无线网络临时标识(Random Access-Radio Network Temporary Identifier,RA-RNTI)加扰。
本申请实施例提供的功率控制方法,包括:
基站接收终端发送的前导码后进行信道抢占,如果抢占信道成功,则所述基站向所述终端发送第一信息、第一PDCCH以及所述第一PDCCH调度的第一随机接入响应;
其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
本申请实施例提供的功率控制装置,包括:
功率控制单元,用于基于第一信息和第二信息,确定重传前导码所采用的功率;所述第二信息包括以下至少之一:第一PDCCH、所述第一PDCCH调度的第一随机接入响应;
其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
本申请实施例提供的功率控制装置,包括:
信道检测单元,用于接收终端发送的前导码后进行信道抢占;
发送单元,用于如果抢占信道成功,则向所述终端发送第一信息、第一PDCCH以及所述第一PDCCH调度的第一随机接入响应;
其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
本申请实施例提供的终端,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的功率控制方法。
本申请实施例提供的网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的功率控制方法。
本申请实施例提供的芯片,用于实现上述的功率控制方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的功率控制方法。
本申请实施例提供的计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述的功率控制方法。
本申请实施例提供的计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的功率控制方法。
本申请实施例提供的计算机程序,当其在计算机上运行时,使得计算机执行上述的功率控制方法。
通过上述技术方案,通过指示基站抢占信道成功的第一信息来辅助终端判决是否进行功率攀升来重发前导码,进一步,所述第一信息可以是新定义的RNTI加扰的PDCCH或者是信道抢占成功指示信号,从而可以避免基站抢占信道失败的情况下还依然进行功率攀升来重发前导码,降低了系统的上行干扰。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1是本申请实施例提供的一种通信系统架构的示意性图;
图2是本申请实施例提供的竞争随机接入过程的流程图;
图3为本申请实施例提供的功率控制方法的流程示意图;
图4为本申请实施例提供的功率控制装置的结构组成示意图一;
图5为本申请实施例提供的功率控制装置的结构组成示意图二;
图6是本申请实施例提供的一种通信设备示意性结构图;
图7是本申请实施例的芯片的示意性结构图;
图8是本申请实施例提供的一种通信系统的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global  System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统或5G系统等。
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端进行通信。可选地,该网络设备110可以是GSM系统或CDMA系统中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络设备等。
该通信系统100还包括位于网络设备110覆盖范围内的至少一个终端120。作为在此使用的“终端”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端或者未来演进的PLMN中的终端等。
可选地,终端120之间可以进行终端直连(Device to Device,D2D)通信。
可选地,5G系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。
图1示例性地示出了一个网络设备和两个终端,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端,本申请实施例对此不做限定。
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1 示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端120,网络设备110和终端120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例相关的技术概念进行说明。
NR工作在非授权频段,包括如下几种工作场景:
1)载波聚合场景:主小区(Primary Cell,PCell)为授权频谱,通过载波聚合方式聚合工作在非授权频谱上的辅小区(Secondary Cell,SCell)。
2)双连接工作场景:PCell为LTE授权频谱,主辅小区(Primary Secondary cell,PScell)为NR非授权频谱。
3)独立工作场景:NR作为一个独立小区工作在非授权频谱。
一般来说,NR-U的工作频带(Band)为5GHz非授权频谱和6GHz非授权频谱;在非授权频谱上,NR-U的设计应该保证与其他已经工作在这些非授权频谱上的系统之间的公平性。公平性的原则是,NR-U对于已经部署在非授权频谱上的系统的影响不能超过这些系统之间的影响。
为了保证在非授权频谱上各系统之间的公平性共存,能量检测已经被同意作为一个基本的共存机制。一般的能量检测机制为先听后说(Listen Before Talk,LBT)机制,该机制的基本原理为,基站或者终端(传输端)在非授权频谱上传输数据之前,需要先按照规定侦听一段时间。如果侦听的结果表示该信道为空闲状态,则传输端可以给接收端传输数据。如果侦听的结果表示该信道为占用状态,则传输端需要根据规定回退一段时间再继续侦听信道,知道信道侦听结果为空闲状态,才能向接收端传输数据。
对于下行数据传输,在非授权频段上,基站需要执行LBT;在LAA中,信道接入的优先级由如下表1决定:
Figure PCTCN2019079751-appb-000001
表1
其中,Mp与执行信道接入的侦听信道时间有关系。具体的,基站需要先执行Td时间的信道侦听,其中Td=16us+Mp×9us。
CWmin,p和CWmax,p与信道接入过程中的随机侦听信道时间有关系。具体的,在基站侦听Td时间信道为空闲时,需要再侦听N次信道,每次时长为9us。其中N为一个从0到CWp之间的随机数,而CW min,p≤CW p≤CW max,p
Tmcot,p为基站抢占到信道之后,占用信道的最长时间,它与基站采用的信道优 先级有关系,比如优先级为1,则信道侦听成功之后,最多占用信道2ms。
综上,对于UE侧来讲,基站给UE传输数据需要在MCOT时间之内,如果基站没有抢占到信道,也就是在MCOT时间之外,UE是不会收到基站给UE的调度数据的。
随机接入是UE与网络侧建立无线连接的重要过程,通过随机接入可以与基站之间取得上行同步,申请上行资源。随机接入过程分为竞争随机接入和非竞争随机接入。图2给出了一种竞争随机接入过程的流程,如图2所示,竞争随机接入过程包括以下步骤:
步骤201:终端向基站发送msg1。
这里,终端向基站发送msg1具体可以通过以下过程来实现:
–终端确定同步信号块(Synchronization Signal Block,SSB)与PRACH资源的关系(由高层配置);
–终端接收一组SSB并确定其参考信号接收功率(Reference Signal Received Power,RSRP)值,根据门限选择合适的SSB;
–终端基于选择的SSB和SSB与RACH资源的对应关系确定PRACH资源;
–终端根据msg3的大小选择前导码组(preamble group),进一步选择前导码;
–终端设置前导码的目标接收功率;
–终端在PRACH时频域资源上发送前导码。
步骤202:终端接收基站发送的msg2。
这里,终端接收基站发送的msg2具体可以通过以下过程来实现:
–终端根据发送msg1的PRACH时频域资源确定随机接入无线网络临时标识(Random Access-Radio Network Temporary Identifier,RA-RNTI);
–终端在发送了前导码之后的第一个物理下行控制信道(Physical Downlink Control Channel,PDCCH)时机(occasion)开启RAR窗口(ra-Response Window)并在该窗口运行期间监听PDCCH,以接收对应RA-RNTI的RAR;
–如果在RAR窗口内没有收到RAR,则终端进行msg1的重传;
–如果在RAR窗口内收到RAR,则终端根据RAR的指示进行msg3的传输。
步骤203:终端向基站发送msg3。
这里,终端向基站发送msg3具体可以通过以下过程来实现:
–终端基于RAR中的上行调度(UL Grant)传输msg3;
–当Msg3传输后,启动ra-ContentionResolutionTimer并在定时器运行期间监听PDCCH;当Msg3进行重传时,重启该定时器;在该定时器超时或停止之前,终端会一直监听PDCCH。
步骤204:终端接收基站发送的msg4。
这里,如果终端收到小区无线网络临时标识(Cell-Radio Network Temporary Identifier,C-RNTI)扰码的DCI format 1_0及其对应的PDSCH,随机接入完成;如果终端收到临时小区无线网络临时标识(Temporary Cell-Radio Network Temporary Identifier,TC-RNTI)扰码的DCI format 1_0及其对应的PDSCH,并比对内容成功,随机接入完成。
在NR-U小区中发起随机接入过程,无论是竞争随机接入还是非竞争随机接入,由于信道抢占不成功,所以存在基站已经检测到preamble,但是mgs2发送不下来的可能,所以终端在RAR接收窗口内等不到RAR。但是终端并不清楚是由于信道抢占不成功导致的RAR接收失败,还是由于自己功率低导致的RAR接收失败,为了使终端明确重传前导码所采用的功率,提出了本申请实施例的以下技术方案。
图3为本申请实施例提供的功率控制方法的流程示意图,如图3所示,所述功率控制方法包括以下步骤:
步骤301:基站接收终端发送的前导码后进行信道抢占,如果抢占信道成功,则所述基站向所述终端发送第一信息、第一PDCCH以及所述第一PDCCH调度的第一随机接入响应;其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
本申请实施例的技术方案可以应用于任意类型的随机接入过程,例如竞争随机接入过程(如图2所示)或非竞争随机接入过程。需要说明的是,非竞争随机接入过程相对于竞争随机接入过程而言,由于不需要解决随机接入冲突(网络侧预先配置了没有冲突的随机接入资源),因此,非竞争随机接入过程只包含msg1传输和mgs2传输两个步骤。其中,msg1传输是指终端在PRACH上发送前导码(preamble),msg2传输是指基站发送RAR。
本申请实施例中提到的基站包括但不限于是LTE基站(eNB),NR基站(gNB。)
本申请实施例中提到的终端可以是手机、笔记本、平板电脑、车载终端、可穿戴式终端等任意能够与网络进行通信的设备。
在本申请的一种实施方式中,所述第一信息为第一RNTI加扰的第二PDCCH。需要说明的是,所述第一RNTI与所述第一RA-RNTI不同,所述第一RA-RNTI为所述终端发送前导码的PRACH资源对应的RA-RNTI。所述第一RNTI是新定义的RNTI,该RNTI可以是系统唯一或者网络侧配置。
在本申请的另一种实施方式中,所述第一信息为信道抢占成功指示信号。
需要说明的是,如果基站抢占信道失败,则不会向所述终端发送第一信息。
步骤302:终端基于第一信息和第二信息,确定重传前导码所采用的功率;所述第二信息包括以下至少之一:第一PDCCH、所述第一PDCCH调度的第一随机接入响应。
本申请实施例中,所述终端基于对第一信息和第二信息的检测结果,确定重传前导码所采用的功率,可以有以下两种应用场景:
场景一:所述第一信息为第一RNTI加扰的第二PDCCH
1.1)如果所述终端检测到所述第二PDCCH,未检测到所述第一PDCCH,则所述终端增大前导码的发射功率后对前导码进行重传;
1.2)如果所述终端检测到所述第二PDCCH,未检测到所述第一PDCCH调度的第一随机接入响应,则终端增大前导码的发射功率后对该前导码进行重传;所述第一随机接入响应是指所述终端发送的前导码的标识对应的随机接入响应,所述第一RA-RNTI为所述终端发送前导码的物理随机接入信道PRACH资源对应的RA-RNTI;
1.3)如果所述终端未检测到所述第二PDCCH,则所述终端维持前导码的发射功率不变对前导码进行重传。
举个例子:在基于竞争的随机接入过程中,终端选择PRACH资源和preamble,并在该PRACH资源上发送preamble;终端基于PRACH资源计算RA-RNTI,并启动时间窗口等待RAR。基站接收preamble,进行信道抢占,如果信道抢占成功,则基站发送X-RNTI(即第一RNTI)加扰的PDCCH(即第二PDCCH),同时发送RA-RNTI加扰的PDCCH(即第一PDCCH)。如果信道抢占不成功,则基站放弃该RAR的发送,并丢弃该RAR。终端检测X-RNTI加扰的PDCCH,同时检测RA-RNTI加扰的PDCCH,针对检测结果有如下几种行为:
行为1:如果检测到X-RNTI加扰的PDCCH,没有检测到RA-RNTI加扰的PDCCH,则终端进行功率攀升,继续发送preamble;或者,如果检测到X-RNTI加扰的PDCCH,没有检测到终端发送preamble对应的随机接入前导码标识(Random Access preamble ID,RAPID)对应的RAR,则终端进行功率攀升,继续发送preamble。
行为2:如果没有检测到X-RNTI加扰的PDCCH,则终端继续发送preamble,但不 进行功率攀升。
行为3:如果检测到终端发送preamble对应的RAPID对应的RAR,则终端从RAR中获取上行授权(UL grant),利用该UL grant发送msg3。
场景二:所述第一信息为信道抢占成功指示信号
2.1)如果所述终端检测到所述信道抢占成功指示信号,未检测到所述第一PDCCH,则所述终端增大前导码的发射功率后对前导码进行重传;
2.2)如果所述终端检测到所述信道抢占成功指示信号,未检测所述第一PDCCH调度的第一随机接入响应,则终端增大前导码的发射功率后对该前导码进行重传;所述第一随机接入响应是指所述终端发送的前导码的标识对应的随机接入响应,所述第一RA-RNTI为所述终端发送前导码的PRACH资源对应的RA-RNTI;
2.3)如果所述终端未检测到所述为信道抢占成功指示信号,则所述终端维持前导码的发射功率不变对前导码进行重传。
举个例子:定义一个信号,当基站抢占信道成功就会发送该信号,该信号可以称为信道抢占成功指示信号。任何终端都可以检测到信道抢占成功指示信号。在基于竞争的随机接入过程中,终端选择PRACH资源和preamble,并在该PRACH资源上发送preamble;终端基于PRACH资源计算RA-RNTI,并启动时间窗口等待RAR。基站接收preamble,进行信道抢占,如果信道抢占成功,则基站发送信道抢占成功指示信号,同时发送RA-RNTI加扰的PDCCH(即第一PDCCH)。如果信道抢占不成功,则基站放弃该RAR的发送,并丢弃该RAR。终端检测信道抢占成功指示信号,同时检测RA-RNTI加扰的PDCCH,针对检测结果有如下几种行为:
行为1:如果终端检测到信道抢占成功指示信号,没有检测到RA-RNTI加扰的PDCCH,则终端进行功率攀升,继续发送preamble;或者,如果终端检测到信道抢占成功指示信号,没有检测到终端发送preamble对应的RAPID对应的RAR,则终端进行功率攀升,继续发送preamble。
行为2:如果没有检测到信道抢占成功指示信号,则终端继续发送preamble,但不进行功率攀升。
行为3:如果检测到终端发送preamble对应的RAPID对应的RAR,则终端从RAR中获取UL grant,利用该UL grant发送msg3。
图4为本申请实施例提供的功率控制装置的结构组成示意图一,该功率控制装置应用于终端,如图4所示,所述功率控制装置包括以下步骤:
功率控制单元401,用于基于第一信息和第二信息,确定重传前导码所采用的功率;所述第二信息包括以下至少之一:第一PDCCH、所述第一PDCCH调度的第一随机接入响应;
其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
在一实施方式中,所述第一信息为第一RNTI加扰的第二PDCCH;所述功率控制单元401,用于:
如果检测到所述第二PDCCH,未检测到所述第一PDCCH,则增大前导码的发射功率后对前导码进行重传;或者,
如果检测到所述第二PDCCH,未检测到所述第一PDCCH调度的第一随机接入响应,则增大前导码的发射功率后对该前导码进行重传;所述第一随机接入响应是指所述终端发送的前导码的标识对应的随机接入响应,所述第一RA-RNTI为所述终端发送前导码的PRACH资源对应的RA-RNTI。
在一实施方式中,所述第一信息为第一RNTI加扰的第二PDCCH;所述功率控 制单元401,用于:
如果未检测到所述第二PDCCH,则维持前导码的发射功率不变对前导码进行重传。
在一实施方式中,所述第一信息为信道抢占成功指示信号;所述功率控制单元401,用于:
如果检测到所述信道抢占成功指示信号,未检测到所述第一PDCCH,则增大前导码的发射功率后对前导码进行重传;或者,
如果检测到所述信道抢占成功指示信号,未检测所述第一PDCCH调度的第一随机接入响应,则增大前导码的发射功率后对该前导码进行重传;所述第一随机接入响应是指所述终端发送的前导码的标识对应的随机接入响应,所述第一RA-RNTI为所述终端发送前导码的PRACH资源对应的RA-RNTI。
在一实施方式中,所述第一信息为信道抢占成功指示信号;所述功率控制单元401,用于:
如果未检测到所述为信道抢占成功指示信号,则维持前导码的发射功率不变对前导码进行重传。
本领域技术人员应当理解,本申请实施例的上述功率控制装置的相关描述可以参照本申请实施例的功率控制方法的相关描述进行理解。
图5为本申请实施例提供的功率控制装置的结构组成示意图二,该功率控制装置应用于网络设备(如基站),如图5所示,所述功率控制装置包括以下步骤:
信道检测单元501,用于接收终端发送的前导码后进行信道抢占;
发送单元502,用于如果抢占信道成功,则向所述终端发送第一信息、第一PDCCH以及所述第一PDCCH调度的第一随机接入响应;
其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
在一实施方式中,所述第一信息为第一RNTI加扰的第二PDCCH。
在一实施方式中,所述第一信息为信道抢占成功指示信号。
本领域技术人员应当理解,本申请实施例的上述功率控制装置的相关描述可以参照本申请实施例的功率控制方法的相关描述进行理解。
图6是本申请实施例提供的一种通信设备600示意性结构图。该通信设备可以是终端,也可以是网络设备(如基站),图6所示的通信设备600包括处理器610,处理器610可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图6所示,通信设备600还可以包括存储器620。其中,处理器610可以从存储器620中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器620可以是独立于处理器610的一个单独的器件,也可以集成在处理器610中。
可选地,如图6所示,通信设备600还可以包括收发器630,处理器610可以控制该收发器630与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器630可以包括发射机和接收机。收发器630还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备600具体可为本申请实施例的网络设备,并且该通信设备600可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备600具体可为本申请实施例的移动终端/终端,并且该通信设备 600可以实现本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
图7是本申请实施例的芯片的示意性结构图。图7所示的芯片700包括处理器710,处理器710可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图7所示,芯片700还可以包括存储器720。其中,处理器710可以从存储器720中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器720可以是独立于处理器710的一个单独的器件,也可以集成在处理器710中。
可选地,该芯片700还可以包括输入接口730。其中,处理器710可以控制该输入接口730与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片700还可以包括输出接口740。其中,处理器710可以控制该输出接口740与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的移动终端/终端,并且该芯片可以实现本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
图8是本申请实施例提供的一种通信系统900的示意性框图。如图8所示,该通信系统900包括终端910和网络设备920。
其中,该终端910可以用于实现上述方法中由终端实现的相应的功能,以及该网络设备920可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM, SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单 元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (26)

  1. 一种功率控制方法,所述方法包括:
    终端基于第一信息和第二信息,确定重传前导码所采用的功率;所述第二信息包括以下至少之一:第一物理下行控制信道PDCCH、所述第一PDCCH调度的第一随机接入响应;
    其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
  2. 根据权利要求1所述的方法,其中,所述第一信息为第一RNTI加扰的第二PDCCH;
    所述终端基于第一信息和第二信息,确定重传前导码所采用的功率,包括:
    如果所述终端检测到所述第二PDCCH,未检测到所述第一PDCCH,则所述终端增大前导码的发射功率后对前导码进行重传;或者,
    如果所述终端检测到所述第二PDCCH,未检测到所述第一PDCCH调度的第一随机接入响应,则终端增大前导码的发射功率后对该前导码进行重传;所述第一随机接入响应是指所述终端发送的前导码的标识对应的随机接入响应,所述第一RA-RNTI为所述终端发送前导码的物理随机接入信道PRACH资源对应的RA-RNTI。
  3. 根据权利要求1或2所述的方法,其中,所述第一信息为第一RNTI加扰的第二PDCCH;
    所述终端基于第一信息和第二信息,确定重传前导码所采用的功率,包括:
    如果所述终端未检测到所述第二PDCCH,则所述终端维持前导码的发射功率不变对前导码进行重传。
  4. 根据权利要求1所述的方法,其中,所述第一信息为信道抢占成功指示信号;
    所述终端基于对第一信息和第二信息,确定重传前导码所采用的功率,包括:
    如果所述终端检测到所述信道抢占成功指示信号,未检测到所述第一PDCCH,则所述终端增大前导码的发射功率后对前导码进行重传;或者,
    如果所述终端检测到所述信道抢占成功指示信号,未检测所述第一PDCCH调度的第一随机接入响应,则终端增大前导码的发射功率后对该前导码进行重传;所述第一随机接入响应是指所述终端发送的前导码的标识对应的随机接入响应,所述第一RA-RNTI为所述终端发送前导码的PRACH资源对应的RA-RNTI。
  5. 根据权利要求1或4所述的方法,其中,所述第一信息为信道抢占成功指示信号;
    所述终端基于对第一信息和第二信息,确定重传前导码所采用的功率,包括:
    如果所述终端未检测到所述为信道抢占成功指示信号,则所述终端维持前导码的发射功率不变对前导码进行重传。
  6. 一种功率控制方法,所述方法包括:
    基站接收终端发送的前导码后进行信道抢占,如果抢占信道成功,则所述基站向所述终端发送第一信息、第一PDCCH以及所述第一PDCCH调度的第一随机接入响应;
    其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
  7. 根据权利要求6所述的方法,其中,所述第一信息为第一RNTI加扰的第二PDCCH。
  8. 根据权利要求6所述的方法,其中,所述第一信息为信道抢占成功指示信号。
  9. 一种功率控制装置,所述装置包括:
    功率控制单元,用于基于第一信息和第二信息,确定重传前导码所采用的功率;所述第二信息包括以下至少之一:第一PDCCH、所述第一PDCCH调度的第一随机接入响应;
    其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
  10. 根据权利要求9所述的装置,其中,所述第一信息为第一RNTI加扰的第二PDCCH;所述功率控制单元,用于:
    如果检测到所述第二PDCCH,未检测到所述第一PDCCH,则增大前导码的发射功率后对前导码进行重传;或者,
    如果检测到所述第二PDCCH,未检测到所述第一PDCCH调度的第一随机接入响应,则增大前导码的发射功率后对该前导码进行重传;所述第一随机接入响应是指所述终端发送的前导码的标识对应的随机接入响应,所述第一RA-RNTI为所述终端发送前导码的PRACH资源对应的RA-RNTI。
  11. 根据权利要求9或10所述的装置,其中,所述第一信息为第一RNTI加扰的第二PDCCH;所述功率控制单元,用于:
    如果未检测到所述第二PDCCH,则维持前导码的发射功率不变对前导码进行重传。
  12. 根据权利要求9所述的装置,其中,所述第一信息为信道抢占成功指示信号;所述功率控制单元,用于:
    如果检测到所述信道抢占成功指示信号,未检测到所述第一PDCCH,则增大前导码的发射功率后对前导码进行重传;或者,
    如果检测到所述信道抢占成功指示信号,未检测所述第一PDCCH调度的第一随机接入响应,则增大前导码的发射功率后对该前导码进行重传;所述第一随机接入响应是指所述终端发送的前导码的标识对应的随机接入响应,所述第一RA-RNTI为所述终端发送前导码的PRACH资源对应的RA-RNTI。
  13. 根据权利要求9或12所述的装置,其中,所述第一信息为信道抢占成功指示信号;所述功率控制单元,用于:
    如果未检测到所述为信道抢占成功指示信号,则维持前导码的发射功率不变对前导码进行重传。
  14. 一种功率控制装置,所述装置包括:
    信道检测单元,用于接收终端发送的前导码后进行信道抢占;
    发送单元,用于如果抢占信道成功,则向所述终端发送第一信息、第一PDCCH以及所述第一PDCCH调度的第一随机接入响应;
    其中,所述第一信息用于指示所述基站抢占信道成功,所述第一PDCCH通过第一RA-RNTI加扰。
  15. 根据权利要求14所述的装置,其中,所述第一信息为第一RNTI加扰的第二PDCCH。
  16. 根据权利要求14所述的装置,其中,所述第一信息为信道抢占成功指示信号。
  17. 一种终端,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至5中任一项所述的方法。
  18. 一种网络设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求6至8中任一项所述的方法。
  19. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至5中任一项所述的方法。
  20. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求6至8中任一项所述的方法。
  21. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至5中任一项所述的方法。
  22. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求6至8中任一项所述的方法。
  23. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至5中任一项所述的方法。
  24. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求6至8中任一项所述的方法。
  25. 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至5中任一项所述的方法。
  26. 一种计算机程序,所述计算机程序使得计算机执行如权利要求6至8中任一项所述的方法。
PCT/CN2019/079751 2019-03-26 2019-03-26 一种功率控制方法及装置、终端、网络设备 WO2020191632A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/079751 WO2020191632A1 (zh) 2019-03-26 2019-03-26 一种功率控制方法及装置、终端、网络设备
CN201980065320.6A CN112789939B (zh) 2019-03-26 2019-03-26 一种功率控制方法及装置、终端、网络设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/079751 WO2020191632A1 (zh) 2019-03-26 2019-03-26 一种功率控制方法及装置、终端、网络设备

Publications (1)

Publication Number Publication Date
WO2020191632A1 true WO2020191632A1 (zh) 2020-10-01

Family

ID=72610740

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/079751 WO2020191632A1 (zh) 2019-03-26 2019-03-26 一种功率控制方法及装置、终端、网络设备

Country Status (2)

Country Link
CN (1) CN112789939B (zh)
WO (1) WO2020191632A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117200947A (zh) * 2022-05-27 2023-12-08 华为技术有限公司 一种信息传输方法及通信装置
WO2024044907A1 (en) * 2022-08-29 2024-03-07 Nec Corporation Methods, devices, and computer readable medium for communication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017097582A1 (en) * 2015-12-09 2017-06-15 Nokia Solutions And Networks Oy Random access enhancement for unlicensed access
CN107371273A (zh) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 随机接入方法、装置及用户设备
CN108476532A (zh) * 2016-02-02 2018-08-31 英特尔Ip公司 随机接入过程期间的先听后说(lbt)失败

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106664612B (zh) * 2015-01-31 2019-11-01 华为技术有限公司 一种信号处理方法、用户设备及节点设备
CN106375044A (zh) * 2015-07-23 2017-02-01 中兴通讯股份有限公司 非授权载波的信道状态信息测量反馈方法、基站、终端
CN108702788B (zh) * 2016-05-12 2021-01-12 华为技术有限公司 一种随机接入方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017097582A1 (en) * 2015-12-09 2017-06-15 Nokia Solutions And Networks Oy Random access enhancement for unlicensed access
CN108476532A (zh) * 2016-02-02 2018-08-31 英特尔Ip公司 随机接入过程期间的先听后说(lbt)失败
CN107371273A (zh) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 随机接入方法、装置及用户设备

Also Published As

Publication number Publication date
CN112789939B (zh) 2023-03-14
CN112789939A (zh) 2021-05-11

Similar Documents

Publication Publication Date Title
WO2020186546A1 (zh) 随机接入的方法和设备
WO2019242452A1 (zh) 用于物理随机接入信道传输的信道接入方法、装置和程序
WO2020186466A1 (zh) 无线通信的方法、终端设备和网络设备
WO2020087369A1 (zh) 一种计数方法、终端设备及装置
WO2019237805A1 (zh) 一种随机接入方法及装置、通信设备
WO2020029310A1 (zh) 一种数据传输方法及装置、终端
WO2020024616A1 (zh) 一种随机接入方法及相关设备
WO2020191561A1 (zh) 一种随机接入方法及装置、用户设备、网络设备
WO2020191599A1 (zh) 通信方法、终端设备和网络设备
WO2020191632A1 (zh) 一种功率控制方法及装置、终端、网络设备
WO2020061945A1 (zh) 用于随机接入的方法、网络设备和终端设备
WO2020034203A1 (zh) 传输信号的方法、终端设备和网络设备
WO2020227907A1 (zh) 一种资源确定方法及装置、终端
WO2020215330A1 (zh) 随机接入过程中传输信息的方法、终端设备和网络设备
WO2020206643A1 (zh) 一种随机接入方法、设备及存储介质
WO2020223878A1 (zh) 随机接入的方法、终端设备和网络设备
CN113170514B (zh) 一种随机接入方法及装置、终端、网络设备
WO2021077377A1 (zh) 一种信息指示方法及装置、终端设备、网络设备
WO2020082394A1 (zh) 随机接入的方法、终端设备和网络设备
WO2020191760A1 (zh) 一种信道传输方法、电子设备及存储介质
US11438936B2 (en) Random access method and apparatus, and user equipment and network device
TW202015477A (zh) 通訊方法、終端設備和網路設備
WO2020198988A1 (zh) 一种随机接入方法、电子设备及存储介质
WO2020186468A1 (zh) 随机接入的方法和设备
WO2020206597A1 (zh) 功率分配的方法和终端设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19920713

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19920713

Country of ref document: EP

Kind code of ref document: A1