WO2020191771A1 - Method and apparatus for performing enhanced random access procedure - Google Patents

Method and apparatus for performing enhanced random access procedure Download PDF

Info

Publication number
WO2020191771A1
WO2020191771A1 PCT/CN2019/080251 CN2019080251W WO2020191771A1 WO 2020191771 A1 WO2020191771 A1 WO 2020191771A1 CN 2019080251 W CN2019080251 W CN 2019080251W WO 2020191771 A1 WO2020191771 A1 WO 2020191771A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
information
wireless communication
time
random access
Prior art date
Application number
PCT/CN2019/080251
Other languages
French (fr)
Inventor
Li Zhang
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Priority to CA3131598A priority Critical patent/CA3131598A1/en
Priority to CN201980094973.7A priority patent/CN113647184B/en
Priority to PCT/CN2019/080251 priority patent/WO2020191771A1/en
Priority to EP19920772.1A priority patent/EP3949634A4/en
Priority to KR1020217034583A priority patent/KR20210141695A/en
Publication of WO2020191771A1 publication Critical patent/WO2020191771A1/en
Priority to US17/487,687 priority patent/US20220132586A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal

Definitions

  • This disclosure relates generally to wireless communications and, more particularly, to a method and apparatus for performing enhanced random access procedure.
  • eMBB enhanced mobile broadband
  • mMTC massive Machine-Type Communication
  • URLLC Ultra Reliability Low Latency Communication
  • wireless communication systems should meet a variety of requirements, such as throughput, latency, data rate, capacity, reliability, link density, cost, energy consumption, complexity, and coverage.
  • exemplary embodiments disclosed herein are directed to solving the issues related to one or more problems presented in the prior art, as well as providing additional features that will become readily apparent by reference to the following detailed description when taken in conjunction with the accompany drawings.
  • exemplary systems, methods, and computer program products are disclosed herein. It is understood, however, that these embodiments are presented by way of example and not limitation, and it will be apparent to those of ordinary skill in the art who read the present disclosure that various modifications to the disclosed embodiments can be made while remaining within the scope of the invention.
  • RACH random access
  • a listen-before-talk (LBT) process is required, in which a CCA (clear channel assessment) is performed.
  • the CCA determines the availability of a channel by detecting a presence of any existing signal on the channel. If signals are detected and the channel is occupied, a next LBT process can be performed after a time period until a non-occupied channel is detected, followed by a data transmission.
  • Such a LBT process is performed during each step of a RACH procedure when accessing an unlicensed spectrum, resulting in increased latency and disadvantageously affecting the system performance.
  • a method performed by a wireless communication node includes: transmitting first information to a wireless communication device; receiving a first message from the wireless communication device; and transmitting a second message to the wireless communication device, wherein the first information comprises information of a plurality of time windows for the wireless communication device to receive the second message.
  • a method performed by a wireless communication device includes: receiving first information from a wireless communication node; transmitting a first message to the wireless communication node; and receiving a second message from the wireless communication node, wherein the first information comprises information of a plurality of time windows for receiving the second message.
  • a method performed by a wireless communication node includes: transmitting first information to a wireless communication device; receiving a first message from the wireless communication device; and transmitting a second message to the wireless communication device, wherein the first information comprises a size of a time window for the wireless communication device to receive the second message, wherein the second message is scrambled by a Random Access-Radio Network Temporary Identifier (RA-RNTI) , wherein the RA-RNTI is determined according to frequency-domain information of resources for receiving the first message, and wherein the second message comprises one of the following: time-domain information of the resources for receiving the first message and a Start Frame Number (SFN) for receiving the first message.
  • RA-RNTI Random Access-Radio Network Temporary Identifier
  • a method performed by a wireless communication device includes: receiving first information from a wireless communication node; transmitting a first message to the wireless communication node; and receiving a second message from the wireless communication node, wherein the first information comprises a size of a time window for receiving the second message, wherein the second message is scrambled by a Random Access-Radio Network Temporary Identifier (RA-RNTI) , wherein the RA-RNTI is determined according to frequency-domain information of resources for transmitting the first message, and wherein the second message comprises one of the following: time-domain information of the resources for transmitting the first message and a Start Frame Number (SFN) for transmitting the first message.
  • RA-RNTI Random Access-Radio Network Temporary Identifier
  • a computing device comprising at least one processor and a memory coupled to the processor, the at least one processor configured to carry out the method.
  • a non-transitory computer-readable medium having stored thereon computer-executable instructions for carrying out the method.
  • FIG. 1A illustrates an exemplary wireless communication network illustrating achievable modulation as a function of distance from a BS, in accordance with some embodiments of the present disclosure.
  • FIG. 1B illustrates a block diagram of an exemplary wireless communication system for a slot structure information indication, in accordance with some embodiments of the present disclosure.
  • FIG. 2 illustrates a method of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • RACH Random Access
  • FIG. 3 illustrates a method of performing a 4-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • RACH contention-based Random Access
  • FIG. 4 illustrates an exemplary format of a Media Access Control (MAC) Random Access Response (RAR) , in accordance with some embodiments of the present disclosure.
  • MAC Media Access Control
  • RAR Random Access Response
  • FIG. 5 illustrates a method of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • RACH Random Access
  • FIG. 6 illustrates a method of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • RACH Random Access
  • FIG. 7 illustrates a method of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • RACH Random Access
  • FIG. 8 illustrates an exemplary format of a Media Access Control (MAC) Control Element (CE) subheader, in accordance with some embodiments of the present disclosure.
  • MAC Media Access Control
  • CE Control Element
  • FIG. 9 illustrates a method for a discontinuous reception mode (DRX) process, in accordance with some embodiments of the present disclosure.
  • FIG. 10A illustrates an exemplary format of a Media Access Control (MAC) Control Element (CE) subheader, in accordance with some embodiments of the present disclosure.
  • MAC Media Access Control
  • CE Control Element
  • FIG. 10B illustrates a table of Language Code Identifier (LCID) values in a Media Access Control (MAC) Control Element (CE) subheader, in accordance with some embodiments of the present disclosure.
  • LCID Language Code Identifier
  • FIG. 1A illustrates an exemplary wireless communication network 100, in accordance with some embodiments of the present disclosure.
  • a network side communication node or a base station can be a node B, an E-utran Node B (also known as Evolved Node B, eNodeB or eNB) , a pico station, a femto station, or the like.
  • a terminal side node or a user equipment can be a long range communication system like a mobile phone, a smart phone, a personal digital assistant (PDA) , tablet, laptop computer, or a short range communication system such as, for example a wearable device, a vehicle with a vehicular communication system and the like.
  • PDA personal digital assistant
  • a network and a terminal side communication node are represented by a BS 102 and a UE 104, respectively, which are generally referred to as “communication nodes” hereinafter in all the embodiments in this disclosure.
  • Such communication nodes may be capable of wireless and/or wired communications, in accordance with some embodiments of the invention. It is noted that all the embodiments are merely preferred examples, and are not intended to limit the present disclosure. Accordingly, it is understood that the system may include any desired combination of UE’s and BSs, while remaining within the scope of the present disclosure.
  • the wireless communication network 100 includes a BS 102 and a UE 104a, and a UE 104b (collectively referred to as UE’s 104 herein) .
  • the BS 102 and the UE’s 104 are contained within a geographic boundary of cell 101.
  • a wireless transmission from a transmitting antenna of the UE 104 to a receiving antenna of the BS 102 is known as an uplink transmission, and a wireless transmission from a transmitting antenna of the BS 102 to a receiving antenna of the UE 104 is known as a downlink transmission.
  • the coverage of uplink communication 105b is larger than that of the uplink communication 105a, as indicated by dotted circles 112 and 110, respectively.
  • the BS 102 is located at the intercept region of the coverage areas 110 and 112 in order for the BS 102 to perform uplink communication with the UE 104a and UE 104b in the cell 101.
  • the direct communication channels 105/103 between the UE’s 104 and the BS 102 can be through interfaces such as an Uu interface, which is also known as UMTS (Universal Mobile Telecommunication System (UMTS) air interface.
  • the direct communication channels (sidelink transmission) 106 between the UE’s can be through a PC5 interface, which is introduced to address high moving speed and high density applications such as Vehicle-to-Vehicle (V2V) communications.
  • the BS 102 is connected to a core network (CN) 108 through an external interface 107, e.g., an Iu interface.
  • CN core network
  • the UE’s 104a and 104b obtains its synchronization timing from the BS 102, which obtains its own synchronization timing from the core network 108 through an internet time service, such as a public time NTP (Network Time Protocol) server or a RNC (Radio Frequency Simulation System Network Controller) server. This is known as network-based synchronization.
  • the BS 102 can also obtain synchronization timing from a Global Navigation Satellite System (GNSS) (not shown) through a satellite signal 106, especially for a large BS in a large cell which has a direct line of sight to the sky, which is known as satellite-based synchronization.
  • GNSS Global Navigation Satellite System
  • Figure 1B illustrates a block diagram of an exemplary wireless communication system 150, in accordance with some embodiments of the present disclosure.
  • the system 150 may include components and elements configured to support known or conventional operating features that need not be described in detail herein.
  • system 150 can be used to transmit and receive data symbols in a wireless communication environment such as the wireless communication network 100 of Figure 1A, as described above.
  • the System 150 generally includes a BS 102 and two UEs 104a and 104b, collectively referred to as UE 104 below for ease of discussion.
  • the BS 102 includes a BS transceiver module 152, a BS antenna array 154, a BS memory module 156, a BS processor module 158, and a Network interface 160, each module being coupled and interconnected with one another as necessary via a data communication bus 180.
  • the UE 104 includes a UE transceiver module 162, a UE antenna 164, a UE memory module 166, a UE processor module 168, and an input/output (I/O) interface 169, each module being coupled and interconnected with one another as necessary via a date communication bus 190.
  • the BS 102 communicates with the UE 104 via a communication channel 192, which can be any wireless channel or other medium known in the art suitable for transmission of data as described herein.
  • system 150 may further include any number of blocks, modules, circuits, etc. other than those shown in Figure 1B.
  • Those skilled in the art will understand that the various illustrative blocks, modules, circuits, and processing logic described in connection with the embodiments disclosed herein may be implemented in hardware, computer-readable software, firmware, or any practical combination thereof. To clearly illustrate this interchangeability and compatibility of hardware, firmware, and software, various illustrative components, blocks, modules, circuits, and steps are described generally in terms of their functionality. Whether such functionality is implemented as hardware, firmware, or software depends upon the particular application and design constraints imposed on the overall system. Those familiar with the concepts described herein may implement such functionality in a suitable manner for each particular application, but such implementation decisions should not be interpreted as limiting the scope of the present invention.
  • a wireless transmission from a transmitting antenna of the UE 104 to a receiving antenna of the BS 102 is known as an uplink transmission
  • a wireless transmission from a transmitting antenna of the BS 102 to a receiving antenna of the UE 104 is known as a downlink transmission.
  • a UE transceiver 162 may be referred to herein as an "uplink" transceiver 162 that includes a RF transmitter and receiver circuitry that are each coupled to the UE antenna 164.
  • a duplex switch (not shown) may alternatively couple the uplink transmitter or receiver to the uplink antenna in time duplex fashion.
  • the BS transceiver 152 may be referred to herein as a "downlink" transceiver 152 that includes RF transmitter and receiver circuitry that are each coupled to the antenna array 154.
  • a downlink duplex switch may alternatively couple the downlink transmitter or receiver to the downlink antenna array 154 in time duplex fashion.
  • the operations of the two transceivers 152 and 162 are coordinated in time such that the uplink receiver is coupled to the uplink UE antenna 164 for reception of transmissions over the wireless communication channel 192 at the same time that the downlink transmitter is coupled to the downlink antenna array 154.
  • there is close synchronization timing with only a minimal guard time between changes in duplex direction.
  • the UE transceiver 162 communicates through the UE antenna 164 with the BS 102 via the wireless communication channel 192 or with other UEs via the wireless communication channel 193.
  • the wireless communication channel 193 can be any wireless channel or other medium known in the art suitable for sidelink transmission of data as described herein.
  • the UE transceiver 162 and the BS transceiver 152 are configured to communicate via the wireless data communication channel 192, and cooperate with a suitably configured RF antenna arrangement 154/164 that can support a particular wireless communication protocol and modulation scheme.
  • the BS transceiver 152 is configured to transmit the physical downlink control channel (PDCCH) and configured slot structure related information (SFI) entry set to the UE transceiver 162.
  • the UE transceiver 162 is configured to receive PDCCH containing at least one SFI field from the BS transceiver 152.
  • the UE transceiver 162 and the BS transceiver 152 are configured to support industry standards such as the Long Term Evolution (LTE) and emerging 5G standards, and the like. It is understood, however, that the invention is not necessarily limited in application to a particular standard and associated protocols. Rather, the UE transceiver 162 and the BS transceiver 152 may be configured to support alternate, or additional, wireless data communication protocols, including future standards or variations thereof.
  • LTE Long Term Evolution
  • 5G 5G
  • the BS processor modules 158 and UE processor modules 168 are implemented, or realized, with a general purpose processor, a content addressable memory, a digital signal processor, an application specific integrated circuit, a field programmable gate array, any suitable programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof, designed to perform the functions described herein.
  • a processor may be realized as a microprocessor, a controller, a microcontroller, a state machine, or the like.
  • a processor may also be implemented as a combination of computing devices, e.g., a combination of a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other such configuration.
  • the UE processor module 168 detects the PHR triggering message on the UE transceiver module 162, the UE processor module 168 is further configured to determine at least one second SFI entry set based on at least one predefined algorithm and the received at least one first SFI entry set configured by the BS 102, wherein the at least one predefined algorithm is selected based on other parameters calculated or messages received.
  • the UE processor module 168 is further configured to generate the at least one second SFI entry set and monitor the PDCCH received on the UE transceiver module 162 to further receive the at least one SFI field.
  • SFI entry set means SFI table or SFI entries.
  • the steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in firmware, in a software module executed by processor modules 158 and 168, respectively, or in any practical combination thereof.
  • the memory modules 156 and 166 may be realized as RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
  • the memory modules 156 and 166 may be coupled to the processor modules 158 and 168, respectively, such that the processors modules 158 and 168 can read information from, and write information to, memory modules 156 and 166, respectively.
  • the memory modules 156 and 166 may also be integrated into their respective processor modules 158 and 168.
  • the memory modules 156 and 166 may each include a cache memory for storing temporary variables or other intermediate information during execution of instructions to be executed by processor modules 158 and 168, respectively.
  • Memory modules 156 and 166 may also each include non-volatile memory for storing instructions to be executed by the processor modules 158 and 168, respectively.
  • the network interface 160 generally represents the hardware, software, firmware, processing logic, and/or other components of the base station 102 that enable bi-directional communication between BS transceiver 152 and other network components and communication nodes configured to communication with the BS 102.
  • network interface 160 may be configured to support internet or WiMAX traffic.
  • network interface 160 provides an 802.3 Ethernet interface such that BS transceiver 152 can communicate with a conventional Ethernet based computer network.
  • the network interface 160 may include a physical interface for connection to the computer network (e.g., Mobile Switching Center (MSC) ) .
  • MSC Mobile Switching Center
  • the terms “configured for” or “configured to” as used herein with respect to a specified operation or function refers to a device, component, circuit, structure, machine, signal, etc. that is physically constructed, programmed, formatted and/or arranged to perform the specified operation or function.
  • the network interface 160 could allow the BS 102 to communicate with other BSs or core network over a wired or wireless connection.
  • the BS 102 repeatedly broadcasts system information associated with the BS 102 to one or more UEs (e.g., 104) so as to allow the UE 104 to access the network within the cell 101 where the BS 102 is located, and in general, to operate properly within the cell 101.
  • Plural information such as, for example, downlink and uplink cell bandwidths, downlink and uplink configuration, configuration for random access, etc., can be included in the system information, which will be discussed in further detail below.
  • the BS 102 broadcasts a first signal carrying some major system information, for example, configuration of the cell 101 through a PBCH (Physical Broadcast Channel) .
  • PBCH Physical Broadcast Channel
  • first broadcast signal For purposes of clarity of illustration, such a broadcasted first signal is herein referred to as “first broadcast signal. ” It is noted that the BS 102 may subsequently broadcast one or more signals carrying some other system information through respective channels (e.g., a Physical Downlink Shared Channel (PDSCH) ) , which are herein referred to as “second broadcast signal, ” “third broadcast signal, ” and so on.
  • PDSCH Physical Downlink Shared Channel
  • the major system information carried by the first broadcast signal may be transmitted by the BS 102 in a symbol format via the communication channel 192.
  • an original form of the major system information may be presented as one or more sequences of digital bits and the one or more sequences of digital bits may be processed through plural steps (e.g., coding, scrambling, modulation, mapping steps, etc. ) , all of which can be processed by the BS processor module 158, to become the first broadcast signal.
  • the UE processor module 168 may perform plural steps (de-mapping, demodulation, decoding steps, etc. ) to estimate the major system information such as, for example, bit locations, bit numbers, etc., of the bits of the major system information.
  • the UE processor module 168 is also coupled to the I/O interface 169, which provides the UE 104 with the ability to connect to other devices such as computers.
  • the I/O interface 169 is the communication path between these accessories and the UE processor module 168.
  • the UE 104 can operate in a hybrid communication network in which the UE communicates with the BS 102, and with other UEs, e.g., between 104a and 104b. As described in further detail below, the UE 104 supports sidelink communications with other UE’s as well as downlink/uplink communications between the BS 102 and the UE 104. As discussed above, sidelink communication allows the UEs 104a and 104b to establish a direct communication link with each other, or with other UEs from different cells, without requiring the BS 102 to relay data between UE’s.
  • Figure 2 illustrates a method 200 of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • the wireless communication system comprises a BS 102 and a UE 104. It is understood that additional operations may be provided before, during, and after the method 200 of Figure 2, and that some other operations may be omitted or only briefly described herein. It should be noted Figure 2 is an example for illustration and discussion purposes.
  • the method 200 starts with operation 212 in which the UE 104 receives first information from the BS 102 according to some embodiments.
  • the first information comprises information of a plurality of time windows including at least one of the following: a number of a plurality of time windows and a size of each of the plurality of time windows.
  • the first information is transmitted in system information or a Radio Resource Control (RRC) message.
  • RRC Radio Resource Control
  • each of the plurality of time windows is configured for receiving a RA response by the UE 104 from the BS 102.
  • the plurality of time windows comprises at least one of the following: at least one ra-ResponseWindow and at least one time offset.
  • the information of the plurality of time windows can be received by the UE 104 from the BS 102 through an RRC message.
  • the first information further comprises at least one Search Space (SS) and at least one Control Resource Set (CORESET) .
  • the at least one SS and the at least one CORESET provides information of resources in the time and frequency domain for receiving Downlink Control Information (DCI) on a Physical Downlink Control Channel (PDCCH) in a RA response by the UE 104 from the BS 102.
  • DCI Downlink Control Information
  • PDCCH Physical Downlink Control Channel
  • RACH configurations e.g., random access preamble format, transmission timing, and PRACH index, are also configured to the UE 104 through the system information or the RRC message.
  • the first information further comprises a correlation between each of the plurality of time windows and at least one of the following: the at least one CORESET and the at least one SS.
  • each of the plurality of time windows can be distinguished by at least one of the following: a corresponding Control Resource Set (CORESET) and a corresponding Search Space (SS) .
  • CORESET Control Resource Set
  • SS Search Space
  • 2 time windows can be configured can be configured to the UE 104 via system information or a RRC message.
  • the 2 time windows comprises a first time window and a second time window.
  • the first time window is a first ra-ResponseWindow and the second time window is one of the following: a second ra-ResponseWindow and a time offset.
  • the first time window is determined by a first CORESET and by a first SS; and the second time window is determined by a second CORESET and a second SS.
  • the first CORESET and the second CORESET each comprises information of resources on the frequency domain for receiving the DCI on the PDCCH.
  • the first SS and the second SS each comprises information of resource on the time domain for receiving the DCI on the PDCCH.
  • the first CORESET is the same as the second CORESET, i.e., same resource in the frequency domain for receiving the DCI on the PDCCH.
  • the first CORESET is different from the second CORESET.
  • the first SS is the same as the second SS. In some other embodiments, the first SS is different from the second SS.
  • the method 200 continues with operation 214 in which the UE 104 transmits a random access preamble and scheduled transmission to the BS 102 according to some embodiments.
  • the UE 104 Before transmitting the random access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion.
  • the LBT process comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., the uplink carrier is available and unoccupied) .
  • the UE 104 then starts first transmissions of random access preambles to the BS 102 on the PRACH occasion.
  • the UE 104 starts a first time window (i.e., ra-ResponseWindow) at the start (i.e., t0) of a first PDCCH occasion.
  • a first time window i.e., ra-ResponseWindow
  • the size of the time window in the time domain is preconfigured by the system and transmitted to the UE 104 in the system information.
  • the method 200 continues with operation 216 in which the BS 102 transmits a random access (RA) response and contention resolution to the UE 104, according to some embodiments.
  • the RA response comprises a MAC Random Access Response (RAR) .
  • RAR MAC Random Access Response
  • the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH.
  • the UE 104 monitor the PDCCH on resources defined by the first SS and the first CORESET, which corresponds to the first time window.
  • the UE 104 when the MAC RAR is not received before the end of the first time window (i.e., the first ra-ResponseWindow) , and when the second time window is a second ra-ResponseWindow, the UE 104 starts a second ra-ResponseWindow at time t1.
  • the time t1 is the end of the first PDCCH occasion and at the start of a second PDCCH occasion.
  • the second time window is not initiated.
  • the MAC RAR is not received before the end of the first time window (i.e., the first ra-ResponseWindow) at t1, and when the second time window is a time offset, the UE 104 continues with the monitoring of the first PDCCH within the time offset.
  • each of the plurality of time windows can be distinguished by a window indication in the RA response received by the UE 104 from the BS 102.
  • the window indication to indicate a time window is transmitted in one of the following: the DCI on the PDCCH and the MAC RAR on the PDSCH.
  • 2 time windows can be configured to the UE 104 via system information or a RRC message.
  • the 2 time windows comprise a first time window and a second time window.
  • the first time window is a first ra-ResponseWindow and the second time window is one of the following: a second ra-ResponseWindow and a time offset.
  • the MAC RAR comprises a window indication (WI) field with at least one bit for window indication. For example, a value of 0 of the WI field indicates the first time window is used; and a value of 1 of the WI field indicates the second time window is used.
  • WI window indication
  • the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow)
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message
  • the WI field has a value of 0, the RAR message is successfully received by the UE 104.
  • the UE 104 when the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the second ra-ResponseWindow) , when the RA response message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 1, the RAR message from the BS 102 is successfully received by the UE 104.
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 1, the reception of the RAR message by the UE 104 is failed.
  • the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the second ra-ResponseWindow)
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message
  • the WI field has a value of 0
  • the MAC RAR comprises a window indication (WI) field with at least one bit for window and time offset indication. For example, a value of 0 of the WI field indicates the first time window is used; and a value of 1 of the WI field indicates the second time window is used.
  • WI window indication
  • the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow)
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message
  • the WI field has a value of 0, the RAR message is successfully received by the UE 104.
  • the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the time offset)
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message
  • the WI field has a value of 1
  • the RAR message from the BS 102 is successfully received by the UE 104.
  • the UE 104 when the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 1, the reception of the RAR message by the UE 104 is failed.
  • the first time window i.e., the first ra-ResponseWindow
  • the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the time offset) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 0, the reception of the RAR message from the BS 102 by the UE 104 is failed.
  • the second time window i.e., the time offset
  • each of the plurality of time windows can be indicated by a Start Frame number (SFN) of a RACH occasion for transmitting the random access preamble in the first message.
  • the SFN of a RACH occasion is determined by the BS 102 according to the SFN of receiving the random access preamble.
  • the SFN can be transmitted in one of the following: a MAC RAR and a DCI.
  • 10 bits in a MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble. 3 lower bits of the 10 bits can be used for indicating the SFN.
  • a radio frame in the MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble.
  • the radio frame is the SFN mod N, wherein N is an integer.
  • the UE 104 compares the SFN in the MAC RAR or the DCI with the SFN used for transmitting the random access preamble so as to differentiate different time windows. If the SFN in the MAC RAR or the DCI received by the UE 104 from the BS 102 in a first time window matches the SFN for transmitting the random access preamble by the UE 104, the random access response is received successfully by the UE 104. If the SFN in the MAC RAR or the DCI received by the UE 104 from the BS 102 in a first time window does not match the SFN for transmitting the random access preamble by the UE 104, the random access response is failed.
  • Figure 3 illustrates a method 300 of performing a 4-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • the wireless communication system comprises a BS 102 and a UE 104. It is understood that additional operations may be provided before, during, and after the method 300 of Figure 3, and that some other operations may be omitted or only briefly described herein. It should be noted Figure 3 is an example for illustration and discussion purposes.
  • the method 300 starts with operation 302 in which the UE 104 receives first information from the BS 102 according to some embodiments.
  • the first information comprises information of a plurality of time windows including at least one of the following: a number of a plurality of time windows and a size of each of the plurality of time windows.
  • the first information is transmitted in system information or a RRC message.
  • each of the plurality of time windows is configured for receiving a RA response by the UE 104 from the BS 102.
  • the plurality of time windows comprises at least one of the following: at least one ra-ResponseWindow and at least one time offset.
  • the information of the plurality of time windows can be received by the UE 104 from the BS 102 through an RRC message.
  • the first information comprises at least one Search Space (SS) and at least one Control Resource Set (CORESET) .
  • the at least one SS and the at least one CORESET provides information of resources in the time and frequency domain for receiving Downlink Control Information (DCI) on a Physical Downlink Control Channel (PDCCH) in a RA response by the UE 104 from the BS 102.
  • DCI Downlink Control Information
  • PDCCH Physical Downlink Control Channel
  • RACH configurations e.g., random access preamble format, transmission timing, and PRACH configuration index, are also configured to the UE 104 through the system information or the RRC message.
  • the first information further comprises a correlation between each of the plurality of time windows and at least one of the following: the at least one CORESET and the at least one SS.
  • each of the plurality of time windows can be distinguished by at least one of the following: a corresponding Control Resource Set (CORESET) and a corresponding Search Space (SS) .
  • CORESET Control Resource Set
  • SS Search Space
  • 2 time windows can be configured to the UE 104 via system information or a RRC message.
  • the 2 time windows comprise a first time window and a second time window.
  • the first time window is a first ra-ResponseWindow and the second time window is one of the following: a second ra-ResponseWindow and a time offset.
  • the first time window is determined by a first CORESET and by a first SS; and the second time window is determined by a second CORESET and a second SS.
  • the first CORESET and the second CORESET each comprises information of resources on the frequency domain for receiving the DCI on the PDCCH.
  • the first SS and the second SS each comprises information of resource on the time domain for receiving the DCI on the PDCCH.
  • the first CORESET is the same as the second CORESET, i.e., same resource in the frequency domain for receiving the DCI on the PDCCH.
  • the first CORESET is different from the second CORESET.
  • the first SS is the same as the second SS. In some other embodiments, the first SS is different from the second SS.
  • the method 300 continues with operation 304 in which the UE 104 transmits a random access preamble to the BS 102 according to some embodiments.
  • the UE 104 Before transmitting the random access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion.
  • the LBT process comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., the uplink carrier is available and unoccupied) .
  • the UE 104 then starts first transmissions of random access preambles to the BS 102 on the PRACH occasion.
  • the UE 104 starts a first time window (i.e., ra-ResponseWindow) at the start (i.e., t0) of a first PDCCH occasion.
  • a first time window i.e., ra-ResponseWindow
  • the size of the time window in the time domain is preconfigured by the system and transmitted to the UE 104 in the system information.
  • the method 300 continues with operation 306 in which the BS 102 transmits a random access (RA) response to the UE 104, according to some embodiments.
  • the RA response comprises a MAC Random Access Response (RAR) , which are generated according to the random access preamble received from the UE 104.
  • RAR MAC Random Access Response
  • the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH.
  • the UE 104 monitor the PDCCH on resources defined by the first SS and the first CORESET, which corresponds to the first time window.
  • the UE 104 when the MAC RAR is not received before the end of the first time window (i.e., the first ra-ResponseWindow) , and when the second time window is a second ra-ResponseWindow, the UE 104 starts a second ra-ResponseWindow at time t1.
  • the time t1 is the end of the first PDCCH occasion and at the start of a second PDCCH occasion.
  • the second time window is not initiated.
  • the MAC RAR is not received before the end of the first time window (i.e., the first ra-ResponseWindow) at t1, and when the second time window is a time offset, the UE 104 continues with the monitoring of the first PDCCH within the time offset.
  • each of the plurality of time windows can be distinguished by a window indication in the RA response received by the UE 104 from the BS 102.
  • the window indication to indicate a time window is transmitted in one of the following: the DCI on the PDCCH and the MAC RAR on the PDSCH.
  • 2 time windows can be configured to the UE 104 via system information or a RRC message.
  • the 2 time windows comprise a first time window and a second time window.
  • the first time window is a first ra-ResponseWindow and the second time window is one of the following: a second ra-ResponseWindow and a time offset.
  • the MAC RAR comprises a window indication (WI) field with at least one bit for window indication.
  • WI window indication
  • An example of a MAC RAR format is discussed below in Figure 4.
  • a value of 0 of the WI field indicates the first time window is used; and a value of 1 of the WI field indicates the second time window is used.
  • the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow)
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message
  • the WI field has a value of 0, the RAR message is successfully received by the UE 104.
  • the UE 104 when the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the second ra-ResponseWindow) , when the RA response message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 1, the RAR message from the BS 102 is successfully received by the UE 104.
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 1, the reception of the RAR message by the UE 104 is failed.
  • the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the second ra-ResponseWindow)
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message
  • the WI field has a value of 0
  • the MAC RAR comprises a window indication (WI) field with at least one bit for window and time offset indication. For example, a value of 0 of the WI field indicates the first time window is used; and a value of 1 of the WI field indicates the second time window is used.
  • WI window indication
  • the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow)
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message
  • the WI field has a value of 0, the RAR message is successfully received by the UE 104.
  • the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the time offset)
  • the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message
  • the WI field has a value of 1
  • the RAR message from the BS 102 is successfully received by the UE 104.
  • the UE 104 when the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 1, the reception of the RAR message by the UE 104 is failed.
  • the first time window i.e., the first ra-ResponseWindow
  • the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the time offset) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 0, the reception of the RAR message from the BS 102 by the UE 104 is failed.
  • the second time window i.e., the time offset
  • each of the plurality of time windows can be indicated by a Start Frame number (SFN) of a RACH occasion for transmitting the random access preamble in the first message.
  • the SFN of a RACH occasion is determined by the BS 102 according to the SFN of receiving the random access preamble.
  • the SFN can be transmitted in one of the following: a MAC RAR and a DCI.
  • 10 bits in a MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble. 3 lower bits of the 10 bits can be used for indicating the SFN.
  • a radio frame in the MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble.
  • the radio frame is the SFN mod N, wherein N is an integer.
  • the UE 104 compares the SFN in the MAC RAR or the DCI with the SFN used for transmitting the random access preamble so as to differentiate different time windows. If the SFN in the MAC RAR or the DCI received by the UE 104 from the BS 102 in a first time window matches the SFN for transmitting the random access preamble by the UE 104, the random access response is received successfully by the UE 104. If the SFN in the MAC RAR or the DCI received by the UE 104 from the BS 102 in a first time window does not match the SFN for transmitting the random access preamble by the UE 104, the random access response is failed.
  • FIG. 4 illustrates an exemplary format of a MAC RAR 400, in accordance with some embodiments of the present disclosure.
  • the MAC RAR 400 is transmitted on a PDSCH and comprises a window indication field 410 occupying first 1 bit 402 of a first Oct 404-1 (Oct 1) .
  • the MAC RAR 400 further comprises a first Timing Advance Command field 412 occupying last 7 bits 402 of the first Oct (Oct 1) , a second Timing Advance Command field 412 occupying first 5 bits 402 of a second Oct 404-2 (Oct 2) , a first UL Grant field 414 occupying last 3 bits 402 of the second Oct 404-2 (Oct 2) , a second UL Grant field 414 occupying 8 bits 402 of a third Oct 404-3 (Oct 3) , a third UL Grant field 414 occupying 8 bits 402 of a fourth Oct 404-4 (Oct 4) , and a fourth UL Grant field 414 occupying 8 bits 402 of a fifth Oct 404-5 (Oct 5) .
  • a first Timing Advance Command field 412 occupying last 7 bits 402 of the first Oct (Oct 1)
  • a second Timing Advance Command field 412 occupying first 5 bits 402 of a second Oct 404-2
  • the MAC RAR 400 further comprises a first temporary C-RNTI field 416 occupying 8 bits 402 of a sixth Oct 404-6 (Oct 6) and a second temporary C-RNTI field 416 occupying 8 bits 402 of a seventh Oct 404-7 (Oct 7) .
  • Figure 4 is an exemplary format of the MAC RAR 400 and is not intended to be limiting. Any MAC RAR with a WI field can be used and is within the scope of this invention.
  • the method 300 continues with operation 308 in which a scheduled transmission is received by the BS 102 from the UE 104 according to some embodiments.
  • the scheduled transmission is received by the BS 102 on the PUSCH.
  • the scheduled transmission is received on resources in the time and frequency domain indicated by the MAC RAR received by the UE 104 from the BS 102.
  • the method 300 continues with operation 310 in which a contention-resolution message is generated and transmitted by the BS 102 to the UE 104 according to some embodiments.
  • the contention resolution message comprises random access connection setup from the BS 102.
  • the BS 102 perform a LBT process to determine the availability of the downlink carriers before transmitting the contention resolution message.
  • Figure 5 illustrates a method 500 of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • the wireless communication system comprises a BS 102 and a UE 104.
  • additional operations may be provided before, during, and after the method 500 of Figure 5, and that some other operations may be omitted or only briefly described herein.
  • Figure 5 is an example for illustration and the 2-step contention-based RACH process of Figure 5 is used for discussion purposes. It should be noted that the method 500 can be also used in a 4-step contention-based RACH process.
  • the method 500 starts with operation 502 in which the UE 104 receives first information from the BS 102 according to some embodiments.
  • the first information comprises information of a time windows.
  • the first information is transmitted in system information or a Radio Resource Control (RRC) message.
  • the time windows is configured for receiving a RA response by the UE 104 from the BS 102.
  • a size of the time window (e.g., 20 millisecond) is configured by the BS 102 in the first information.
  • the method 500 continues with operation 504 in which the UE 104 transmits a random access preamble and scheduled transmission to the BS 102 according to some embodiments.
  • the UE 104 Before transmitting the random access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion.
  • the LBT process comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., a channel is available and unoccupied) .
  • the UE 104 then starts first transmissions of random access preambles to the BS 102 on the PRACH occasion.
  • the UE 104 starts the time window 202 (i.e., ra-ResponseWindow) at the start (i.e., t0) 204 of a first PDCCH occasion.
  • the method 500 continues with operation 506 in which the BS 102 generates and transmits a random access (RA) response and contention resolution to the UE 104, according to some embodiments.
  • the BS 102 further calculates RA-RNTI (Random Access-Radio Network Temporary Identifier) values according to information of the resources on which the random access preambles are transmitted on the frequency domain.
  • RA-RNTI Random Access-Radio Network Temporary Identifier
  • the RA-RNTI value can be is a function of at least one of the following: an index of the first frequency of the PRACH occasion in a system frame and a UL carrier used for the random access preamble.
  • the RA response comprises a MAC Random Access Response (RAR) .
  • RAR MAC Random Access Response
  • the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH.
  • the MAC RAR or the DCI is scrambled by the RA-RNTI determined by the BS 102 according to the information of the resources on which the random access preamble is transmitted on the frequency domain.
  • information of the resources on which the random access preamble is transmitted on the time domain is included in one of the following: the MAC RAR and the DCI.
  • the UE 104 further calculates RA-RNTI value according to the frequency-domain information of the resource on which the random access preamble is transmitted.
  • the UE 104 descrambles the MAC RAR or the DCI using the calculated RA-RNTI. If the scrambled MAC RAR can be descrambled by the UE 104 according to the calculated RA-RNTI, the frequency-domain information of the resources used by the BS 102 for determining the RA-RNTI matches the frequency-domain information of the resources used by the UE 104 for determining the RA-RNTI.
  • the time-domain information of the resources can be determined and further compared with the time-domain information of the resources on which the random access preamble is transmitted by the UE 104.
  • the time-domain information of resources on which the random access preamble is transmitted by the UE 104 matches the time-domain information of resource in the MAC-RAR, the random access response is successfully received by the UE.
  • the time-domain information of resources on which the random access preamble is transmitted by the UE 104 does not match the time-domain information of resources in the MAC-RAR or the RA-RNTI scrambled MAC RAR or DCI is not received within the time window 202, the random access response is failed.
  • Figure 6 illustrates a method 600 of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • the wireless communication system comprises a BS 102 and a UE 104.
  • additional operations may be provided before, during, and after the method 600 of Figure 6, and that some other operations may be omitted or only briefly described herein.
  • Figure 6 is an example for illustration and the 2-step contention-based RACH process of Figure 6 is used for discussion purposes.
  • the method 500 can be also used in a 4-step contention-based RACH process.
  • the method 600 starts with operation 602 in which the UE 104 receives first information from the BS 102 according to some embodiments.
  • the first information comprises information of a time windows.
  • the first information is transmitted in system information or a Radio Resource Control (RRC) message.
  • RRC Radio Resource Control
  • the time windows is configured for receiving a RA response by the UE 104 from the BS 102.
  • a size of the time window (e.g., 20 millisecond) is configured by the BS 102.
  • the method 600 starts with operation 604 in which the UE 104 transmits a random access preamble and scheduled transmission to the BS 102 according to some embodiments.
  • the UE 104 Before transmitting the random access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion.
  • the LBT process comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., a channel is available and unoccupied) .
  • the UE 104 then starts first transmissions of random access preambles to the BS 102 on the PRACH occasion.
  • the UE 104 starts the time window 202 (i.e., ra-ResponseWindow) at the start (i.e., t0) 204 of a first PDCCH occasion.
  • the method 600 continues with operation 606 in which the BS 102 generates and transmits a random access (RA) response and contention resolution to the UE 104, according to some embodiments.
  • the BS 102 further calculates RA-RNTI (Random Access-Radio Network Temporary Identifier) values according to information of the resources on which the random access preambles are transmitted.
  • RA-RNTI Random Access-Radio Network Temporary Identifier
  • the RA-RNTI value can be is determined using the equation below,
  • RA-RNTI 1 + s_id + 14 ⁇ t_id + 14 ⁇ 80 ⁇ f_id + 14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id,
  • s_id is the index of the first OFDM symbol of the PRACH occasion (0 ⁇ s_id ⁇ 14) ;
  • t_id is the index of the first slot of the PRACH occasion in a system frame (0 ⁇ t_id ⁇ 80) ;
  • f_id is the index of the first frequency of the PRACH occasion in the frequency domain (0 ⁇ f_id ⁇ 8) ;
  • ul_carrier_id is the UL carrier used for the random access preamble (i.e., 0 for NUL carrier and 1 for SUL carrier) .
  • f_id and ul_carrier_id each carries information of resources on the frequency domain on which the random access preamble is transmitted; and s_id and t_id each carriers information of resources on the time domain on which the random access preamble is transmitted.
  • the RA response comprises a MAC Random Access Response (RAR) .
  • RAR MAC Random Access Response
  • the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH.
  • the MAC RAR or the DCI is scrambled by the RA-RNTI determined by the BS 102.
  • the SFN of a RACH occasion is determined by the BS 102 according to the SFN of receiving the random access preamble.
  • the SFN can be transmitted in one of the following: a MAC RAR and a DCI.
  • 10 bits in a MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble. 3 lower bits of the 10 bits can be used for indicating the SFN.
  • a radio frame in the MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble.
  • the radio frame is the SFN mod N, wherein N is an integer.
  • the UE 104 further calculates RA-RNTI value according to the frequency-domain information of the resource on which the random access preamble is transmitted.
  • the UE 104 descrambles the MAC RAR or the DCI using the calculated RA-RNTI.
  • the SFN can be determined and further compared with the SFN used for transmitting the random access preamble.
  • the value e.g., the lower bit of the SFN or the SFN mod N
  • the DCI received by the UE 104 from the BS 102 in the time window matches the SFN for transmitting the random access preamble by the UE 104, the random access response is received successfully by the UE 104.
  • the random access response is failed.
  • Figure 7 illustrates a method 700 of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
  • the wireless communication system comprises a UE 104 and a BS 102. It is understood that additional operations may be provided before, during, and after the method 700 of Figure 7, and that some other operations may be omitted or only briefly described herein.
  • Figure 7 is an example for illustration and the 2-step contention-based RACH process of Figure 7 is used for discussion purposes. It should be noted that the method 700 can be also used in a 4-step contention-based RACH process.
  • the method 700 starts with operation 702 in which the first UE 104-1 and the second UE 104-2 each transmits a random access preamble and scheduled transmission to the BS 102 according to some embodiments.
  • the UE 104 Before transmitting the random access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion.
  • the LBT process comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., the uplink carrier is available and unoccupied) .
  • the first message further comprises a MAC CE, wherein the MAC CE is configured to carry at least one of the following: information of the secondary primary cell (e.g., PCI) , the information of the serving cell (e.g., ServCellIndex) , and the information of the UE 104 (e.g., MAC-I) , which are discussed in detail below in Figure 8.
  • information of the secondary primary cell e.g., PCI
  • the information of the serving cell e.g., ServCellIndex
  • the information of the UE 104 e.g., MAC-I
  • the first message further comprises at least one Media Access Control (MAC) Control Element (CE) for at least one of the following: a Cell-Radio Network Temporary Identifier (C-RNTI) MAC CE and a Buffer Status Report (BSR) .
  • MAC Media Access Control
  • CE Cell-Radio Network Temporary Identifier
  • BSR Buffer Status Report
  • the first UE 104-1 and the second UE 104-2 can be differentiated according to the first MAC CE, and at least one of the following MAC CE: the C-RNTI MAC CE and the BSR MAC CE.
  • the method 700 continues with operation 704 in which the BS 102 generates and transmits a random access (RA) response and contention resolution to the UE 104, according to some embodiments.
  • the RA response comprises the DCI and a MAC Random Access Response (RAR) .
  • the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH.
  • the random access response and contention resolution further comprises information determined according to the random access preamble received from the UE 104.
  • the random access response comprises a MAC RAR subheader and a MAC RAR, wherein the MAC RAR comprises timing advance command, UL grant, and temporary C-RNTI; and the contention resolution comprises at least one of the following: ID MAC CE and a RRC setup message.
  • Figure 8A illustrates an exemplary format of a MAC CE subheader 800, in accordance with some embodiments of the present disclosure.
  • the MAC CE subheader 800 is transmitted on a PDSCH and comprises 8 bits 402.
  • two reserved fields 802 occupying first 2 bits 402 and a Language Code Identifier (LCID) field 804 occupying last 6 bits.
  • LCID Language Code Identifier
  • Figure 8A is an exemplary format of the MAC CE subheader and is not intended to be limiting. Any MAC CE subheader with a field for indicating PCI can be used and is within the scope of this invention.
  • Figure 8B illustrates a table 810 of LCID values in a MAC CE subheader, in accordance with some embodiments of the present disclosure.
  • the table 810 comprises 2 columns, i.e., a first column 812 showing a plurality of indices and a second column 814 comprising a plurality of corresponding LCID values.
  • the LCID field in the MAC CE subheader occupies 6 bits and 64 indices.
  • an index value of 0 indicates a Common Control Channel (CCCH) occupying 64 bits; an index value of 1-32 identifies an logical channel; an index of 33-50 is reserved; a value of 51 is for indicating a PCI; an index value of 52 indicates a CCCH occupying 48 bits; an index value of 53 indicates a recommended bit rate query; an index value of 54 indicates multiple entry Power Headroom Report (PHR) (4 octets) ; an index value of 55 indicates configured grate confirmation; an index value of 56 indicates multiple entry PHR (1 octet) ; and an index value of 57 indicates a single entry PHR; an index value of 58 indicates C-RNTI; an index value of 59 indicates short truncated BSR; an index value of 60 indicates long truncated BSR; an index value of 61 indicates short BSR; an index value of 62 indicates long BSR; and an index value of 63 indicates Padding.
  • CCCH Common Control Channel
  • an index value of 1-32
  • Figure 8C illustrates an exemplary format of a MAC CE 820, in accordance with some embodiments of the present disclosure.
  • the MAC CE 820 is transmitted on a PDSCH and comprises 2 octets 404.
  • 6 reserved fields 822 occupying first 6 bits 402 in a first octet 404-1
  • a physical cell ID 824 occupies last 2 bits 402 of the first octet 404-1 and 8 bits 402 of a second octet 404-2.
  • the physical cell ID field 824 occupying at least 10 bits is configured to carry the PCI of a UE 104.
  • the PCI and the C-RNTI are used to differentiate different UE 104.
  • Figure 8A is an exemplary format of the MAC CE and is not intended to be limiting. Any MAC CE with a field for indicating the PCI can be used and is within the scope of this invention.
  • Figure 8D illustrates an exemplary format of a MAC CE 830, in accordance with some embodiments of the present disclosure.
  • the MAC CE 830 is transmitted on a PDSCH and comprises 1 octet 404.
  • 3 reserved fields 832 occupying first 3 bits 402
  • a serving Cell index (ServCellIndex) field 834 occupies last 6 bits 402.
  • the ServCellIndex field 834 occupying 6 bits is configured to carry serving cell information of a UE 104.
  • the serving cell information and the C-RNTI are used to differentiate different UE 104.
  • Figure 8D is an exemplary format of the MAC CE and is not intended to be limiting. Any MAC CE with a field for indicating the serving cell information can be used and is within the scope of this invention.
  • Figure 8E illustrates an exemplary format of a MAC CE 840, in accordance with some embodiments of the present disclosure.
  • the MAC CE 840 is transmitted on a PDSCH and comprises 2 octets 404.
  • a MAC-I field 842 occupies 16 bits 402 of the 2 octets.
  • the MAC-I field 842 is configured to carry information of a UE 104.
  • the information of the UE 104in the MAC-I field 842 is used to differentiate different UE 104.
  • Figure 8e is an exemplary format of the MAC CE and is not intended to be limiting. Any MAC CE with a field for indicating the information of the UE 104 can be used and is within the scope of this invention.
  • Figure 9 illustrates a method 900 for a discontinuous reception mode (DRX) process, in accordance with some embodiments of the present disclosure.
  • the wireless communication system comprises a UE 104 and a BS 102.
  • the UE 104 is in a DRX mode, in which the UE 104 only performs a Physical Downlink Control Channel (PDCCH) blind detection during an active time and turns off monitoring PDCCH during a non-active time.
  • the active time and non-active time appear alternatively and periodically.
  • the UE 104 enters a following non-active time. It is understood that additional operations may be provided before, during, and after the method 900 of Figure 9, and that some other operations may be omitted or only briefly described herein. It should be noted Figure 9 is an example for illustration and discussion purposes.
  • the method 900 starts with operation 902 in which at least one DRX parameter is configured to the UE 104 from the BS 102 according to some embodiments.
  • the at least one DRX parameter comprises a period of a DRX process, a DRX inactive timer, an active time and a non-active time.
  • the at least one DRX parameter is configured by the BS 102 to the UE 104 through a RRC reconfiguration process.
  • the method 900 continues with operation 904 in which the UE 104 starts the DRX process according to some embodiments.
  • the UE 104 determines to enter an active time according to the at least one DRX parameter and service scheduling situation of the BS 102.
  • a first active timer indicated in the DRX parameter is started at time t0 204-1 when the UE 104 starts the DRX process and the first active timer has a window size 202-1 which terminates at time t1 204-2.
  • the method 900 continues with operation 906, in which a first message is received by the UE 104 from the BS 102 according to some embodiments.
  • the first message is a media access control message, e.g., MAC PDU, in a format of a data-indication MAC control element (CE) .
  • the first message is received at time t2 204-3 before the termination of the first active timer.
  • the first message is transmitted on a PDSCH.
  • the data-indication MAC CE is for an indication of pending data for transmission from the BS 102 to the UE 104 so as to start a second active timer before an expiration of the first active timer.
  • the data-indication MAC CE is identified in the MAC PDU subheader with LCID, which is discussed in Figure 10 below.
  • the second active timer has a window size 202-2, wherein the window size of the second active timer can be one of the following: the DRX inactive timer configured in the at least one DRX parameter and a second active timer configured by the BS 102.
  • the UE 104 after receiving the first message, the UE 104 remains active for receiving the pending data from the BS 102 according to some embodiments.
  • the UE 104 when the UE 104 receives the data-indication MAC CE in the first message, the UE 104 further performs one of the following: restarting the DRX inactive timer and starting a new timer, so as to continue with the PDCCH blind detection.
  • Figure 10A illustrates an exemplary format of a MAC CE subheader 1000, in accordance with some embodiments of the present disclosure.
  • the MAC CE subheader 1000 is transmitted on a PDSCH and comprises 8 bits 402.
  • two reserved fields 1002 occupying first 2 bits 402 and a LCID field 1004 occupying last 6 bits.
  • Figure 10A is an exemplary format of the MAC CE subheader and is not intended to be limiting. Any MAC CE subheader with a field for indicating PCI can be used and is within the scope of this invention.
  • Figure 10B illustrates a table 1010 of Language Code Identifier (LCID) values in a MAC CE subheader, in accordance with some embodiments of the present disclosure.
  • the table 1010 comprises 2 columns, i.e., a first column 1012 showing a plurality of indices and a second column 1014 comprising a plurality of corresponding LCID values.
  • the LCID field in the MAC CE subheader occupies 6 bits and 64 indices.
  • an index value of 0 indicates a CCCH occupying 64 bits; an index value of 1-32 identifies an logical channel; an index of 33-45 is reserved; an index value of 46 is for data indication command; an index value of 47 indicates recommended bit rate; an index value of 48 indicates semi-persistent zero power channel state information- reference signal (SP ZP CSI-RS) Resource Set Activation/Deactivation; an index value of 49 indicates PUCCH spatial relation Activation/Deactivation; a value of 50 indicates semi-persistent sounding reference signal (SP SRS) Activation/Deactivation; a value of 51 indicates SP CSI reporting on PUCCH Activation/Deactivation; an index value of 52 indicates a Transmission Configuration Indication (TCI) State Indication for UE-specific PDCCH; an index value of 53 indicates TCI states Activation/Deactivation for UE-specific PDSCH; an index value of 54 indicates Aperiodic CSI Trigger State Subselection; an index value of 55 indicates SP
  • TCI
  • any reference to an element herein using a designation such as “first, “ “second, “ and so forth does not generally limit the quantity or order of those elements. Rather, these designations can be used herein as a convenient means of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements can be employed, or that the first element must precede the second element in some manner.
  • any of the some illustrative logical blocks, modules, processors, means, circuits, methods and functions described in connection with the aspects disclosed herein can be implemented by electronic hardware (e.g., a digital implementation, an analog implementation, or a combination of the two, which can be designed using source coding or some other technique) , various forms of program or design code incorporating instructions (which can be referred to herein, for convenience, as "software” or a "software module) , or combinations of both.
  • software or a “software module”
  • IC integrated circuit
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the logical blocks, modules, and circuits can further include antennas and/or transceivers to communicate with various components within the network or within the device.
  • a general purpose processor can be a microprocessor, but in the alternative, the processor can be any conventional processor, controller, or state machine.
  • a processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other suitable configuration to perform the functions described herein.
  • Computer-readable media includes both computer storage media and communication media including any medium that can be enabled to transfer a computer program or code from one place to another.
  • a storage media can be any available media that can be accessed by a computer.
  • such computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • module refers to software, firmware, hardware, and any combination of these elements for performing the associated functions described herein. Additionally, for purpose of discussion, the various modules are described as discrete modules; however, as would be apparent to one of ordinary skill in the art, two or more modules may be combined to form a single module that performs the associated functions according embodiments of the invention.
  • memory or other storage may be employed in embodiments of the invention.
  • memory or other storage may be employed in embodiments of the invention.
  • any suitable distribution of functionality between different functional units, processing logic elements or domains may be used without detracting from the invention.
  • functionality illustrated to be performed by separate processing logic elements, or controllers may be performed by the same processing logic element, or controller.
  • references to specific functional units are only references to a suitable means for providing the described functionality, rather than indicative of a strict logical or physical structure or organization.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method and apparatus for performing an enhanced random access (RACH) procedure is disclosed. In one embodiment, a method performed by a wireless communication node, includes: transmitting first information to a wireless communication device; receiving a first message from the wireless communication device; and transmitting a second message to the wireless communication device, wherein the first information comprises information of a plurality of time windows for the wireless communication device to receive the second message.

Description

METHOD AND APPARATUS FOR PERFORMING ENHANCED RANDOM ACCESS PROCEDURE TECHNICAL FIELD
This disclosure relates generally to wireless communications and, more particularly, to a method and apparatus for performing enhanced random access procedure.
BACKGROUND
Over the past few decades, mobile communications have evolved from voice services to high-speed broadband data services. With further development of new types of services and applications, e.g., enhanced mobile broadband (eMBB) , massive Machine-Type Communication (mMTC) , Ultra Reliability Low Latency Communication (URLLC) , etc., the demands for high-performance data transmission on mobile networks will continue to increase exponentially. Based on specific requirements in these emerging services, wireless communication systems should meet a variety of requirements, such as throughput, latency, data rate, capacity, reliability, link density, cost, energy consumption, complexity, and coverage.
SUMMARY OF THE INVENTION
The exemplary embodiments disclosed herein are directed to solving the issues related to one or more problems presented in the prior art, as well as providing additional features that will become readily apparent by reference to the following detailed description when taken in conjunction with the accompany drawings. In accordance with some embodiments, exemplary systems, methods, and computer program products are disclosed herein. It is understood, however, that these embodiments are presented by way of example and not limitation, and it will be apparent to those of ordinary skill in the art who read the present disclosure that various  modifications to the disclosed embodiments can be made while remaining within the scope of the invention.
Traditional methods which rely on random access of user terminals and scheduled data transmissions between a base station and a user terminal fail to provide satisfactory performance for the aforementioned services due to limited equipment capacity, high latency, and high signaling overhead. In order to meet these demands in 5G/NR (New Radio) communications, a grant-free data transmission method based on competition is being considered. A random access (RACH) procedure is important during initial access from RRC (radio resource control) idle, when performing a RRC connection establishment procedure, for downlink or uplink data transmission when a wireless communication device is not synchronized, and during handover when uplink synchronization is need in a target cell, etc.
To access an unlicensed spectrum during a RACH procedure, a listen-before-talk (LBT) process is required, in which a CCA (clear channel assessment) is performed. The CCA determines the availability of a channel by detecting a presence of any existing signal on the channel. If signals are detected and the channel is occupied, a next LBT process can be performed after a time period until a non-occupied channel is detected, followed by a data transmission. Such a LBT process is performed during each step of a RACH procedure when accessing an unlicensed spectrum, resulting in increased latency and disadvantageously affecting the system performance. Further, when a random access preamble is transmitted and a ra-ResponseWindow is started, if a random access response (RAR) is not received before the expiration of the ra-ResponseWindow, the RAR is failed. Thus, there exists a need to develop a new method to reduce latency in a RACH procedure when accessing an unlicensed spectrum.
In one embodiment, a method performed by a wireless communication node, includes: transmitting first information to a wireless communication device; receiving a first message from the wireless communication device; and transmitting a second message to the wireless communication device, wherein the first information comprises information of a plurality of time windows for the wireless communication device to receive the second message.
In another embodiment, a method performed by a wireless communication device, includes: receiving first information from a wireless communication node; transmitting a first message to the wireless communication node; and receiving a second message from the wireless communication node, wherein the first information comprises information of a plurality of time windows for receiving the second message.
Yet, in another embodiment, a method performed by a wireless communication node, includes: transmitting first information to a wireless communication device; receiving a first message from the wireless communication device; and transmitting a second message to the wireless communication device, wherein the first information comprises a size of a time window for the wireless communication device to receive the second message, wherein the second message is scrambled by a Random Access-Radio Network Temporary Identifier (RA-RNTI) , wherein the RA-RNTI is determined according to frequency-domain information of resources for receiving the first message, and wherein the second message comprises one of the following: time-domain information of the resources for receiving the first message and a Start Frame Number (SFN) for receiving the first message.
Yet, in another embodiment, a method performed by a wireless communication device, includes: receiving first information from a wireless communication node; transmitting a first message to the wireless communication node; and receiving a second message from the wireless  communication node, wherein the first information comprises a size of a time window for receiving the second message, wherein the second message is scrambled by a Random Access-Radio Network Temporary Identifier (RA-RNTI) , wherein the RA-RNTI is determined according to frequency-domain information of resources for transmitting the first message, and wherein the second message comprises one of the following: time-domain information of the resources for transmitting the first message and a Start Frame Number (SFN) for transmitting the first message.
Yet in another embodiment, a computing device comprising at least one processor and a memory coupled to the processor, the at least one processor configured to carry out the method.
Yet, in another embodiment, a non-transitory computer-readable medium having stored thereon computer-executable instructions for carrying out the method.
BRIEF DESCRIPTION OF THE DRAWINGS
Aspects of the present disclosure are best understood from the following detailed description when read with the accompanying figures. It is noted that various features are not necessarily drawn to scale. In fact, the dimensions and geometries of the various features may be arbitrarily increased or reduced for clarity of discussion.
FIG. 1A illustrates an exemplary wireless communication network illustrating achievable modulation as a function of distance from a BS, in accordance with some embodiments of the present disclosure.
FIG. 1B illustrates a block diagram of an exemplary wireless communication system for a slot structure information indication, in accordance with some embodiments of the present disclosure.
FIG. 2 illustrates a method of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
FIG. 3 illustrates a method of performing a 4-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
FIG. 4 illustrates an exemplary format of a Media Access Control (MAC) Random Access Response (RAR) , in accordance with some embodiments of the present disclosure.
FIG. 5 illustrates a method of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
FIG. 6 illustrates a method of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
FIG. 7 illustrates a method of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure.
FIG. 8 illustrates an exemplary format of a Media Access Control (MAC) Control Element (CE) subheader, in accordance with some embodiments of the present disclosure.
FIG. 9 illustrates a method for a discontinuous reception mode (DRX) process, in accordance with some embodiments of the present disclosure.
FIG. 10A illustrates an exemplary format of a Media Access Control (MAC) Control Element (CE) subheader, in accordance with some embodiments of the present disclosure.
FIG. 10B illustrates a table of Language Code Identifier (LCID) values in a Media Access Control (MAC) Control Element (CE) subheader, in accordance with some embodiments of the present disclosure.
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS
Various exemplary embodiments of the invention are described below with reference to the accompanying figures to enable a person of ordinary skill in the art to make and use the invention. As would be apparent to those of ordinary skill in the art, after reading the present disclosure, various changes or modifications to the examples described herein can be made without departing from the scope of the invention. Thus, the present invention is not limited to the exemplary embodiments and applications described or illustrated herein. Additionally, the specific order or hierarchy of steps in the methods disclosed herein are merely exemplary approaches. Based upon design preferences, the specific order or hierarchy of steps of the disclosed methods or processes can be re-arranged while remaining within the scope of the present invention. Thus, those of ordinary skill in the art will understand that the methods and techniques disclosed herein present various steps or acts in a sample order, and the invention is not limited to the specific order or hierarchy presented unless expressly stated otherwise.
Embodiments of the present invention are described in detail with reference to the accompanying drawings. The same or similar components may be designated by the same or similar reference numerals although they are illustrated in different drawings. Detailed descriptions of constructions or processes well-known in the art may be omitted to avoid obscuring the subject matter of the present invention. Further, the terms are defined in  consideration of their functionality in embodiment of the present invention, and may vary according to the intention of a user or an operator, usage, etc. Therefore, the definition should be made on the basis of the overall content of the present specification.
Figure 1A illustrates an exemplary wireless communication network 100, in accordance with some embodiments of the present disclosure. In a wireless communication system, a network side communication node or a base station (BS) can be a node B, an E-utran Node B (also known as Evolved Node B, eNodeB or eNB) , a pico station, a femto station, or the like. A terminal side node or a user equipment (UE) can be a long range communication system like a mobile phone, a smart phone, a personal digital assistant (PDA) , tablet, laptop computer, or a short range communication system such as, for example a wearable device, a vehicle with a vehicular communication system and the like. A network and a terminal side communication node are represented by a BS 102 and a UE 104, respectively, which are generally referred to as “communication nodes” hereinafter in all the embodiments in this disclosure. Such communication nodes may be capable of wireless and/or wired communications, in accordance with some embodiments of the invention. It is noted that all the embodiments are merely preferred examples, and are not intended to limit the present disclosure. Accordingly, it is understood that the system may include any desired combination of UE’s and BSs, while remaining within the scope of the present disclosure.
Referring to Figure 1A, the wireless communication network 100 includes a BS 102 and a UE 104a, and a UE 104b (collectively referred to as UE’s 104 herein) . The BS 102 and the UE’s 104 are contained within a geographic boundary of cell 101. A wireless transmission from a transmitting antenna of the UE 104 to a receiving antenna of the BS 102 is known as an uplink transmission, and a wireless transmission from a transmitting antenna of the BS 102 to a  receiving antenna of the UE 104 is known as a downlink transmission. Although only 2 UE’s 104 are shown in Figure 1A, it should be noted that any number of UE’s 104 can be included in the cell 101 and are within the scope of this invention. In some embodiments, the coverage of uplink communication 105b is larger than that of the uplink communication 105a, as indicated by  dotted circles  112 and 110, respectively. The BS 102 is located at the intercept region of the  coverage areas  110 and 112 in order for the BS 102 to perform uplink communication with the UE 104a and UE 104b in the cell 101.
The direct communication channels 105/103 between the UE’s 104 and the BS 102 can be through interfaces such as an Uu interface, which is also known as UMTS (Universal Mobile Telecommunication System (UMTS) air interface. The direct communication channels (sidelink transmission) 106 between the UE’s can be through a PC5 interface, which is introduced to address high moving speed and high density applications such as Vehicle-to-Vehicle (V2V) communications. The BS 102 is connected to a core network (CN) 108 through an external interface 107, e.g., an Iu interface.
The UE’s 104a and 104b obtains its synchronization timing from the BS 102, which obtains its own synchronization timing from the core network 108 through an internet time service, such as a public time NTP (Network Time Protocol) server or a RNC (Radio Frequency Simulation System Network Controller) server. This is known as network-based synchronization. Alternatively, the BS 102 can also obtain synchronization timing from a Global Navigation Satellite System (GNSS) (not shown) through a satellite signal 106, especially for a large BS in a large cell which has a direct line of sight to the sky, which is known as satellite-based synchronization.
Figure 1B illustrates a block diagram of an exemplary wireless communication system 150, in accordance with some embodiments of the present disclosure. The system 150 may include components and elements configured to support known or conventional operating features that need not be described in detail herein. In one exemplary embodiment, system 150 can be used to transmit and receive data symbols in a wireless communication environment such as the wireless communication network 100 of Figure 1A, as described above.
System 150 generally includes a BS 102 and two UEs 104a and 104b, collectively referred to as UE 104 below for ease of discussion. The BS 102 includes a BS transceiver module 152, a BS antenna array 154, a BS memory module 156, a BS processor module 158, and a Network interface 160, each module being coupled and interconnected with one another as necessary via a data communication bus 180. The UE 104 includes a UE transceiver module 162, a UE antenna 164, a UE memory module 166, a UE processor module 168, and an input/output (I/O) interface 169, each module being coupled and interconnected with one another as necessary via a date communication bus 190. The BS 102 communicates with the UE 104 via a communication channel 192, which can be any wireless channel or other medium known in the art suitable for transmission of data as described herein.
As would be understood by persons of ordinary skill in the art, system 150 may further include any number of blocks, modules, circuits, etc. other than those shown in Figure 1B. Those skilled in the art will understand that the various illustrative blocks, modules, circuits, and processing logic described in connection with the embodiments disclosed herein may be implemented in hardware, computer-readable software, firmware, or any practical combination thereof. To clearly illustrate this interchangeability and compatibility of hardware, firmware, and software, various illustrative components, blocks, modules, circuits, and steps are described  generally in terms of their functionality. Whether such functionality is implemented as hardware, firmware, or software depends upon the particular application and design constraints imposed on the overall system. Those familiar with the concepts described herein may implement such functionality in a suitable manner for each particular application, but such implementation decisions should not be interpreted as limiting the scope of the present invention.
A wireless transmission from a transmitting antenna of the UE 104 to a receiving antenna of the BS 102 is known as an uplink transmission, and a wireless transmission from a transmitting antenna of the BS 102 to a receiving antenna of the UE 104 is known as a downlink transmission. In accordance with some embodiments, a UE transceiver 162 may be referred to herein as an "uplink" transceiver 162 that includes a RF transmitter and receiver circuitry that are each coupled to the UE antenna 164. A duplex switch (not shown) may alternatively couple the uplink transmitter or receiver to the uplink antenna in time duplex fashion. Similarly, in accordance with some embodiments, the BS transceiver 152 may be referred to herein as a "downlink" transceiver 152 that includes RF transmitter and receiver circuitry that are each coupled to the antenna array 154. A downlink duplex switch may alternatively couple the downlink transmitter or receiver to the downlink antenna array 154 in time duplex fashion. The operations of the two  transceivers  152 and 162 are coordinated in time such that the uplink receiver is coupled to the uplink UE antenna 164 for reception of transmissions over the wireless communication channel 192 at the same time that the downlink transmitter is coupled to the downlink antenna array 154. Preferably, there is close synchronization timing with only a minimal guard time between changes in duplex direction. The UE transceiver 162 communicates through the UE antenna 164 with the BS 102 via the wireless communication channel 192 or with other UEs via the wireless communication channel 193. The wireless  communication channel 193 can be any wireless channel or other medium known in the art suitable for sidelink transmission of data as described herein.
The UE transceiver 162 and the BS transceiver 152 are configured to communicate via the wireless data communication channel 192, and cooperate with a suitably configured RF antenna arrangement 154/164 that can support a particular wireless communication protocol and modulation scheme. In some embodiments, the BS transceiver 152 is configured to transmit the physical downlink control channel (PDCCH) and configured slot structure related information (SFI) entry set to the UE transceiver 162. In some embodiments, the UE transceiver 162 is configured to receive PDCCH containing at least one SFI field from the BS transceiver 152. In some exemplary embodiments, the UE transceiver 162 and the BS transceiver 152 are configured to support industry standards such as the Long Term Evolution (LTE) and emerging 5G standards, and the like. It is understood, however, that the invention is not necessarily limited in application to a particular standard and associated protocols. Rather, the UE transceiver 162 and the BS transceiver 152 may be configured to support alternate, or additional, wireless data communication protocols, including future standards or variations thereof.
The BS processor modules 158 and UE processor modules 168 are implemented, or realized, with a general purpose processor, a content addressable memory, a digital signal processor, an application specific integrated circuit, a field programmable gate array, any suitable programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof, designed to perform the functions described herein. In this manner, a processor may be realized as a microprocessor, a controller, a microcontroller, a state machine, or the like. A processor may also be implemented as a combination of computing devices, e.g., a combination of a digital signal processor and a microprocessor, a plurality of  microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other such configuration.
Then the UE processor module 168 detects the PHR triggering message on the UE transceiver module 162, the UE processor module 168 is further configured to determine at least one second SFI entry set based on at least one predefined algorithm and the received at least one first SFI entry set configured by the BS 102, wherein the at least one predefined algorithm is selected based on other parameters calculated or messages received. The UE processor module 168 is further configured to generate the at least one second SFI entry set and monitor the PDCCH received on the UE transceiver module 162 to further receive the at least one SFI field. As used herein, “SFI entry set” means SFI table or SFI entries.
Furthermore, the steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in firmware, in a software module executed by  processor modules  158 and 168, respectively, or in any practical combination thereof. The  memory modules  156 and 166 may be realized as RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. In this regard, the  memory modules  156 and 166 may be coupled to the  processor modules  158 and 168, respectively, such that the  processors modules  158 and 168 can read information from, and write information to,  memory modules  156 and 166, respectively. The  memory modules  156 and 166 may also be integrated into their  respective processor modules  158 and 168. In some embodiments, the  memory modules  156 and 166 may each include a cache memory for storing temporary variables or other intermediate information during execution of instructions to be executed by  processor modules  158 and 168, respectively.  Memory modules  156 and 166 may  also each include non-volatile memory for storing instructions to be executed by the  processor modules  158 and 168, respectively.
The network interface 160 generally represents the hardware, software, firmware, processing logic, and/or other components of the base station 102 that enable bi-directional communication between BS transceiver 152 and other network components and communication nodes configured to communication with the BS 102. For example, network interface 160 may be configured to support internet or WiMAX traffic. In a typical deployment, without limitation, network interface 160 provides an 802.3 Ethernet interface such that BS transceiver 152 can communicate with a conventional Ethernet based computer network. In this manner, the network interface 160 may include a physical interface for connection to the computer network (e.g., Mobile Switching Center (MSC) ) . The terms “configured for” or “configured to” as used herein with respect to a specified operation or function refers to a device, component, circuit, structure, machine, signal, etc. that is physically constructed, programmed, formatted and/or arranged to perform the specified operation or function. The network interface 160 could allow the BS 102 to communicate with other BSs or core network over a wired or wireless connection.
Referring again to Figure 1A, as mentioned above, the BS 102 repeatedly broadcasts system information associated with the BS 102 to one or more UEs (e.g., 104) so as to allow the UE 104 to access the network within the cell 101 where the BS 102 is located, and in general, to operate properly within the cell 101. Plural information such as, for example, downlink and uplink cell bandwidths, downlink and uplink configuration, configuration for random access, etc., can be included in the system information, which will be discussed in further detail below. Typically, the BS 102 broadcasts a first signal carrying some major system information, for example, configuration of the cell 101 through a PBCH (Physical Broadcast Channel) . For  purposes of clarity of illustration, such a broadcasted first signal is herein referred to as “first broadcast signal. ” It is noted that the BS 102 may subsequently broadcast one or more signals carrying some other system information through respective channels (e.g., a Physical Downlink Shared Channel (PDSCH) ) , which are herein referred to as “second broadcast signal, ” “third broadcast signal, ” and so on.
Referring again to Figure 1B, in some embodiments, the major system information carried by the first broadcast signal may be transmitted by the BS 102 in a symbol format via the communication channel 192. In accordance with some embodiments, an original form of the major system information may be presented as one or more sequences of digital bits and the one or more sequences of digital bits may be processed through plural steps (e.g., coding, scrambling, modulation, mapping steps, etc. ) , all of which can be processed by the BS processor module 158, to become the first broadcast signal. Similarly, when the UE 104 receives the first broadcast signal (in the symbol format) using the UE transceiver 162, in accordance with some embodiments, the UE processor module 168 may perform plural steps (de-mapping, demodulation, decoding steps, etc. ) to estimate the major system information such as, for example, bit locations, bit numbers, etc., of the bits of the major system information. The UE processor module 168 is also coupled to the I/O interface 169, which provides the UE 104 with the ability to connect to other devices such as computers. The I/O interface 169 is the communication path between these accessories and the UE processor module 168.
In some embodiments, the UE 104 can operate in a hybrid communication network in which the UE communicates with the BS 102, and with other UEs, e.g., between 104a and 104b. As described in further detail below, the UE 104 supports sidelink communications with other UE’s as well as downlink/uplink communications between the BS 102 and the UE 104. As  discussed above, sidelink communication allows the UEs 104a and 104b to establish a direct communication link with each other, or with other UEs from different cells, without requiring the BS 102 to relay data between UE’s.
Figure 2 illustrates a method 200 of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure. In the illustrated embodiment, the wireless communication system comprises a BS 102 and a UE 104. It is understood that additional operations may be provided before, during, and after the method 200 of Figure 2, and that some other operations may be omitted or only briefly described herein. It should be noted Figure 2 is an example for illustration and discussion purposes.
The method 200 starts with operation 212 in which the UE 104 receives first information from the BS 102 according to some embodiments. In some embodiments, the first information comprises information of a plurality of time windows including at least one of the following: a number of a plurality of time windows and a size of each of the plurality of time windows. In some embodiments, the first information is transmitted in system information or a Radio Resource Control (RRC) message. In some embodiments, each of the plurality of time windows is configured for receiving a RA response by the UE 104 from the BS 102. In some embodiments, the plurality of time windows comprises at least one of the following: at least one ra-ResponseWindow and at least one time offset. In some embodiments, the information of the plurality of time windows can be received by the UE 104 from the BS 102 through an RRC message. In some embodiments, the first information further comprises at least one Search Space (SS) and at least one Control Resource Set (CORESET) . In some embodiments, the at least one SS and the at least one CORESET provides information of resources in the time and  frequency domain for receiving Downlink Control Information (DCI) on a Physical Downlink Control Channel (PDCCH) in a RA response by the UE 104 from the BS 102. In some embodiments, RACH configurations, e.g., random access preamble format, transmission timing, and PRACH index, are also configured to the UE 104 through the system information or the RRC message.
In some embodiments, the first information further comprises a correlation between each of the plurality of time windows and at least one of the following: the at least one CORESET and the at least one SS. In some embodiments, each of the plurality of time windows can be distinguished by at least one of the following: a corresponding Control Resource Set (CORESET) and a corresponding Search Space (SS) . For example, 2 time windows can be configured can be configured to the UE 104 via system information or a RRC message. The 2 time windows comprises a first time window and a second time window. The first time window is a first ra-ResponseWindow and the second time window is one of the following: a second ra-ResponseWindow and a time offset. In some embodiments, the first time window is determined by a first CORESET and by a first SS; and the second time window is determined by a second CORESET and a second SS. In some embodiments, the first CORESET and the second CORESET each comprises information of resources on the frequency domain for receiving the DCI on the PDCCH. In some embodiments, the first SS and the second SS each comprises information of resource on the time domain for receiving the DCI on the PDCCH. In some embodiments, the first CORESET is the same as the second CORESET, i.e., same resource in the frequency domain for receiving the DCI on the PDCCH. In some other embodiments, the first CORESET is different from the second CORESET. In some embodiments, the first SS is  the same as the second SS. In some other embodiments, the first SS is different from the second SS.
The method 200 continues with operation 214 in which the UE 104 transmits a random access preamble and scheduled transmission to the BS 102 according to some embodiments. Before transmitting the random access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion. In some embodiments, the LBT process comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., the uplink carrier is available and unoccupied) . The UE 104 then starts first transmissions of random access preambles to the BS 102 on the PRACH occasion. The UE 104 starts a first time window (i.e., ra-ResponseWindow) at the start (i.e., t0) of a first PDCCH occasion. In some embodiments, the size of the time window in the time domain is preconfigured by the system and transmitted to the UE 104 in the system information.
The method 200 continues with operation 216 in which the BS 102 transmits a random access (RA) response and contention resolution to the UE 104, according to some embodiments. In some embodiments, the RA response comprises a MAC Random Access Response (RAR) . In some embodiments, the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH. Continue with the example above, the UE 104 monitor the PDCCH on resources defined by the first SS and the first CORESET, which corresponds to the first time window.
In some embodiments, when the MAC RAR is not received before the end of the first time window (i.e., the first ra-ResponseWindow) , and when the second time window is a second ra-ResponseWindow, the UE 104 starts a second ra-ResponseWindow at time t1. In some  embodiments, the time t1 is the end of the first PDCCH occasion and at the start of a second PDCCH occasion. In some other embodiments, when the MAC RAR is received before the end of the first time window (i.e., the first ra-ResponseWindow) , the second time window is not initiated.
In some other embodiments, the MAC RAR is not received before the end of the first time window (i.e., the first ra-ResponseWindow) at t1, and when the second time window is a time offset, the UE 104 continues with the monitoring of the first PDCCH within the time offset.
In some embodiments, each of the plurality of time windows can be distinguished by a window indication in the RA response received by the UE 104 from the BS 102. In some embodiments, the window indication to indicate a time window is transmitted in one of the following: the DCI on the PDCCH and the MAC RAR on the PDSCH. For example, 2 time windows can be configured to the UE 104 via system information or a RRC message. The 2 time windows comprise a first time window and a second time window. The first time window is a first ra-ResponseWindow and the second time window is one of the following: a second ra-ResponseWindow and a time offset.
In some embodiments, the MAC RAR comprises a window indication (WI) field with at least one bit for window indication. For example, a value of 0 of the WI field indicates the first time window is used; and a value of 1 of the WI field indicates the second time window is used. For example, when the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 0, the RAR message is successfully received by the UE 104. Similarly, when the UE 104 receives the RAR message from the BS 102 within the second time  window (i.e., the second ra-ResponseWindow) , when the RA response message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 1, the RAR message from the BS 102 is successfully received by the UE 104. For another example, when the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 1, the reception of the RAR message by the UE 104 is failed. Similarly, when the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the second ra-ResponseWindow) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 0, the reception of the RAR message from the BS 102 by the UE 104 is failed.
In some other embodiments, the MAC RAR comprises a window indication (WI) field with at least one bit for window and time offset indication. For example, a value of 0 of the WI field indicates the first time window is used; and a value of 1 of the WI field indicates the second time window is used. For example, when the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 0, the RAR message is successfully received by the UE 104. Similarly, when the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the time offset) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 1, the RAR message from the BS 102 is successfully received by the UE 104. For another example, when the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow) , when the RAR message comprises a  preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 1, the reception of the RAR message by the UE 104 is failed. Similarly, when the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the time offset) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 0, the reception of the RAR message from the BS 102 by the UE 104 is failed.
In some embodiments, each of the plurality of time windows can be indicated by a Start Frame number (SFN) of a RACH occasion for transmitting the random access preamble in the first message. In some embodiments, the SFN of a RACH occasion is determined by the BS 102 according to the SFN of receiving the random access preamble. In some embodiments, the SFN can be transmitted in one of the following: a MAC RAR and a DCI. For example, 10 bits in a MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble. 3 lower bits of the 10 bits can be used for indicating the SFN. For another example, a radio frame in the MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble. The radio frame is the SFN mod N, wherein N is an integer.
When the UE 104 receives the MACR RAR or the DCI, the UE 104 compares the SFN in the MAC RAR or the DCI with the SFN used for transmitting the random access preamble so as to differentiate different time windows. If the SFN in the MAC RAR or the DCI received by the UE 104 from the BS 102 in a first time window matches the SFN for transmitting the random access preamble by the UE 104, the random access response is received successfully by the UE 104. If the SFN in the MAC RAR or the DCI received by the UE 104 from the BS 102 in a first time window does not match the SFN for transmitting the random access preamble by the UE 104, the random access response is failed.
Figure 3 illustrates a method 300 of performing a 4-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure. In the illustrated embodiment, the wireless communication system comprises a BS 102 and a UE 104. It is understood that additional operations may be provided before, during, and after the method 300 of Figure 3, and that some other operations may be omitted or only briefly described herein. It should be noted Figure 3 is an example for illustration and discussion purposes.
The method 300 starts with operation 302 in which the UE 104 receives first information from the BS 102 according to some embodiments. In some embodiments, the first information comprises information of a plurality of time windows including at least one of the following: a number of a plurality of time windows and a size of each of the plurality of time windows. In some embodiments, the first information is transmitted in system information or a RRC message. In some embodiments, each of the plurality of time windows is configured for receiving a RA response by the UE 104 from the BS 102. In some embodiments, the plurality of time windows comprises at least one of the following: at least one ra-ResponseWindow and at least one time offset. In some embodiments, the information of the plurality of time windows can be received by the UE 104 from the BS 102 through an RRC message. In some embodiments, the first information comprises at least one Search Space (SS) and at least one Control Resource Set (CORESET) . In some embodiments, the at least one SS and the at least one CORESET provides information of resources in the time and frequency domain for receiving Downlink Control Information (DCI) on a Physical Downlink Control Channel (PDCCH) in a RA response by the UE 104 from the BS 102. In some embodiments, RACH configurations, e.g., random access preamble format, transmission timing, and PRACH  configuration index, are also configured to the UE 104 through the system information or the RRC message.
In some embodiments, the first information further comprises a correlation between each of the plurality of time windows and at least one of the following: the at least one CORESET and the at least one SS. In some embodiments, each of the plurality of time windows can be distinguished by at least one of the following: a corresponding Control Resource Set (CORESET) and a corresponding Search Space (SS) . For example, 2 time windows can be configured to the UE 104 via system information or a RRC message. The 2 time windows comprise a first time window and a second time window. The first time window is a first ra-ResponseWindow and the second time window is one of the following: a second ra-ResponseWindow and a time offset. In some embodiments, the first time window is determined by a first CORESET and by a first SS; and the second time window is determined by a second CORESET and a second SS. In some embodiments, the first CORESET and the second CORESET each comprises information of resources on the frequency domain for receiving the DCI on the PDCCH. In some embodiments, the first SS and the second SS each comprises information of resource on the time domain for receiving the DCI on the PDCCH. In some embodiments, the first CORESET is the same as the second CORESET, i.e., same resource in the frequency domain for receiving the DCI on the PDCCH. In some other embodiments, the first CORESET is different from the second CORESET. In some embodiments, the first SS is the same as the second SS. In some other embodiments, the first SS is different from the second SS.
The method 300 continues with operation 304 in which the UE 104 transmits a random access preamble to the BS 102 according to some embodiments. Before transmitting the random  access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion. In some embodiments, the LBT process comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., the uplink carrier is available and unoccupied) . The UE 104 then starts first transmissions of random access preambles to the BS 102 on the PRACH occasion. The UE 104 starts a first time window (i.e., ra-ResponseWindow) at the start (i.e., t0) of a first PDCCH occasion. In some embodiments, the size of the time window in the time domain is preconfigured by the system and transmitted to the UE 104 in the system information.
The method 300 continues with operation 306 in which the BS 102 transmits a random access (RA) response to the UE 104, according to some embodiments. In some embodiments, the RA response comprises a MAC Random Access Response (RAR) , which are generated according to the random access preamble received from the UE 104. In some embodiments, the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH. Continue with the example above, the UE 104 monitor the PDCCH on resources defined by the first SS and the first CORESET, which corresponds to the first time window.
In some embodiments, when the MAC RAR is not received before the end of the first time window (i.e., the first ra-ResponseWindow) , and when the second time window is a second ra-ResponseWindow, the UE 104 starts a second ra-ResponseWindow at time t1. In some embodiments, the time t1 is the end of the first PDCCH occasion and at the start of a second PDCCH occasion. In some other embodiments, when the MAC RAR is received before the end  of the first time window (i.e., the first ra-ResponseWindow) , the second time window is not initiated.
In some other embodiments, the MAC RAR is not received before the end of the first time window (i.e., the first ra-ResponseWindow) at t1, and when the second time window is a time offset, the UE 104 continues with the monitoring of the first PDCCH within the time offset.
In some embodiments, each of the plurality of time windows can be distinguished by a window indication in the RA response received by the UE 104 from the BS 102. In some embodiments, the window indication to indicate a time window is transmitted in one of the following: the DCI on the PDCCH and the MAC RAR on the PDSCH. For example, 2 time windows can be configured to the UE 104 via system information or a RRC message. The 2 time windows comprise a first time window and a second time window. The first time window is a first ra-ResponseWindow and the second time window is one of the following: a second ra-ResponseWindow and a time offset.
In some embodiments, the MAC RAR comprises a window indication (WI) field with at least one bit for window indication. An example of a MAC RAR format is discussed below in Figure 4. For example, a value of 0 of the WI field indicates the first time window is used; and a value of 1 of the WI field indicates the second time window is used. For example, when the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 0, the RAR message is successfully received by the UE 104. Similarly, when the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the second ra-ResponseWindow) , when the RA response message comprises a preamble matches the preamble  transmitted in the Random Access Preamble Message, and when the WI field has a value of 1, the RAR message from the BS 102 is successfully received by the UE 104. For another example, when the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 1, the reception of the RAR message by the UE 104 is failed. Similarly, when the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the second ra-ResponseWindow) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 0, the reception of the RAR message from the BS 102 by the UE 104 is failed.
In some other embodiments, the MAC RAR comprises a window indication (WI) field with at least one bit for window and time offset indication. For example, a value of 0 of the WI field indicates the first time window is used; and a value of 1 of the WI field indicates the second time window is used. For example, when the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when the WI field has a value of 0, the RAR message is successfully received by the UE 104. Similarly, when the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the time offset) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 1, the RAR message from the BS 102 is successfully received by the UE 104. For another example, when the UE 104 receives the RAR message from the BS 102 within the first time window (i.e., the first ra-ResponseWindow) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access preamble message, and when  the WI field has a value of 1, the reception of the RAR message by the UE 104 is failed. Similarly, when the UE 104 receives the RAR message from the BS 102 within the second time window (i.e., the time offset) , when the RAR message comprises a preamble matches the preamble transmitted in the Random Access Preamble Message, and when the WI field has a value of 0, the reception of the RAR message from the BS 102 by the UE 104 is failed.
In some embodiments, each of the plurality of time windows can be indicated by a Start Frame number (SFN) of a RACH occasion for transmitting the random access preamble in the first message. In some embodiments, the SFN of a RACH occasion is determined by the BS 102 according to the SFN of receiving the random access preamble. In some embodiments, the SFN can be transmitted in one of the following: a MAC RAR and a DCI. For example, 10 bits in a MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble. 3 lower bits of the 10 bits can be used for indicating the SFN. For another example, a radio frame in the MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble. The radio frame is the SFN mod N, wherein N is an integer.
When the UE 104 receives the MACR RAR or the DCI, the UE 104 compares the SFN in the MAC RAR or the DCI with the SFN used for transmitting the random access preamble so as to differentiate different time windows. If the SFN in the MAC RAR or the DCI received by the UE 104 from the BS 102 in a first time window matches the SFN for transmitting the random access preamble by the UE 104, the random access response is received successfully by the UE 104. If the SFN in the MAC RAR or the DCI received by the UE 104 from the BS 102 in a first time window does not match the SFN for transmitting the random access preamble by the UE 104, the random access response is failed.
Figure 4 illustrates an exemplary format of a MAC RAR 400, in accordance with some embodiments of the present disclosure. In the illustrated embodiment, the MAC RAR 400 is transmitted on a PDSCH and comprises a window indication field 410 occupying first 1 bit 402 of a first Oct 404-1 (Oct 1) . In the illustrated embodiment, the MAC RAR 400 further comprises a first Timing Advance Command field 412 occupying last 7 bits 402 of the first Oct (Oct 1) , a second Timing Advance Command field 412 occupying first 5 bits 402 of a second Oct 404-2 (Oct 2) , a first UL Grant field 414 occupying last 3 bits 402 of the second Oct 404-2 (Oct 2) , a second UL Grant field 414 occupying 8 bits 402 of a third Oct 404-3 (Oct 3) , a third UL Grant field 414 occupying 8 bits 402 of a fourth Oct 404-4 (Oct 4) , and a fourth UL Grant field 414 occupying 8 bits 402 of a fifth Oct 404-5 (Oct 5) . In the illustrated embodiment, the MAC RAR 400 further comprises a first temporary C-RNTI field 416 occupying 8 bits 402 of a sixth Oct 404-6 (Oct 6) and a second temporary C-RNTI field 416 occupying 8 bits 402 of a seventh Oct 404-7 (Oct 7) . It should be noted that Figure 4 is an exemplary format of the MAC RAR 400 and is not intended to be limiting. Any MAC RAR with a WI field can be used and is within the scope of this invention.
The method 300 continues with operation 308 in which a scheduled transmission is received by the BS 102 from the UE 104 according to some embodiments. In some embodiments, the scheduled transmission is received by the BS 102 on the PUSCH. In some embodiments, the scheduled transmission is received on resources in the time and frequency domain indicated by the MAC RAR received by the UE 104 from the BS 102.
The method 300 continues with operation 310 in which a contention-resolution message is generated and transmitted by the BS 102 to the UE 104 according to some embodiments. In some embodiments, the contention resolution message comprises random  access connection setup from the BS 102. In some embodiments, the BS 102 perform a LBT process to determine the availability of the downlink carriers before transmitting the contention resolution message.
Figure 5 illustrates a method 500 of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure. In the illustrated embodiment, the wireless communication system comprises a BS 102 and a UE 104. It is understood that additional operations may be provided before, during, and after the method 500 of Figure 5, and that some other operations may be omitted or only briefly described herein. It should be noted Figure 5 is an example for illustration and the 2-step contention-based RACH process of Figure 5 is used for discussion purposes. It should be noted that the method 500 can be also used in a 4-step contention-based RACH process.
The method 500 starts with operation 502 in which the UE 104 receives first information from the BS 102 according to some embodiments. In some embodiments, the first information comprises information of a time windows. In some embodiments, the first information is transmitted in system information or a Radio Resource Control (RRC) message. In some embodiments, the time windows is configured for receiving a RA response by the UE 104 from the BS 102. In some embodiments, a size of the time window (e.g., 20 millisecond) is configured by the BS 102 in the first information.
The method 500 continues with operation 504 in which the UE 104 transmits a random access preamble and scheduled transmission to the BS 102 according to some embodiments. Before transmitting the random access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion. In some embodiments, the LBT process  comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., a channel is available and unoccupied) . The UE 104 then starts first transmissions of random access preambles to the BS 102 on the PRACH occasion. The UE 104 starts the time window 202 (i.e., ra-ResponseWindow) at the start (i.e., t0) 204 of a first PDCCH occasion.
The method 500 continues with operation 506 in which the BS 102 generates and transmits a random access (RA) response and contention resolution to the UE 104, according to some embodiments. The BS 102 further calculates RA-RNTI (Random Access-Radio Network Temporary Identifier) values according to information of the resources on which the random access preambles are transmitted on the frequency domain. In some embodiments, the RA-RNTI value can be is a function of at least one of the following: an index of the first frequency of the PRACH occasion in a system frame and a UL carrier used for the random access preamble.
In some embodiments, the RA response comprises a MAC Random Access Response (RAR) . In some embodiments, the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH. In some embodiments, before transmitting, the MAC RAR or the DCI is scrambled by the RA-RNTI determined by the BS 102 according to the information of the resources on which the random access preamble is transmitted on the frequency domain. In some embodiments, information of the resources on which the random access preamble is transmitted on the time domain is included in one of the following: the MAC RAR and the DCI.
In some embodiments, the UE 104 further calculates RA-RNTI value according to the frequency-domain information of the resource on which the random access preamble is  transmitted. When the RA-RNTI scrambled MAC RAR or DCI is received by the UE 104 from the BS 102 within the time window 202, the UE 104 descrambles the MAC RAR or the DCI using the calculated RA-RNTI. If the scrambled MAC RAR can be descrambled by the UE 104 according to the calculated RA-RNTI, the frequency-domain information of the resources used by the BS 102 for determining the RA-RNTI matches the frequency-domain information of the resources used by the UE 104 for determining the RA-RNTI. When the MAC-RAR is successfully descrambled, the time-domain information of the resources can be determined and further compared with the time-domain information of the resources on which the random access preamble is transmitted by the UE 104. When the time-domain information of resources on which the random access preamble is transmitted by the UE 104 matches the time-domain information of resource in the MAC-RAR, the random access response is successfully received by the UE. When the time-domain information of resources on which the random access preamble is transmitted by the UE 104 does not match the time-domain information of resources in the MAC-RAR or the RA-RNTI scrambled MAC RAR or DCI is not received within the time window 202, the random access response is failed.
Figure 6 illustrates a method 600 of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure. In the illustrated embodiment, the wireless communication system comprises a BS 102 and a UE 104. It is understood that additional operations may be provided before, during, and after the method 600 of Figure 6, and that some other operations may be omitted or only briefly described herein. It should be noted Figure 6 is an example for illustration and the 2-step contention-based RACH process of Figure 6 is used for discussion  purposes. It should be noted that the method 500 can be also used in a 4-step contention-based RACH process.
The method 600 starts with operation 602 in which the UE 104 receives first information from the BS 102 according to some embodiments. In some embodiments, the first information comprises information of a time windows. In some embodiments, the first information is transmitted in system information or a Radio Resource Control (RRC) message. In some embodiments, the time windows is configured for receiving a RA response by the UE 104 from the BS 102. In some embodiments, a size of the time window (e.g., 20 millisecond) is configured by the BS 102.
The method 600 starts with operation 604 in which the UE 104 transmits a random access preamble and scheduled transmission to the BS 102 according to some embodiments. Before transmitting the random access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion. In some embodiments, the LBT process comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., a channel is available and unoccupied) . The UE 104 then starts first transmissions of random access preambles to the BS 102 on the PRACH occasion. The UE 104 starts the time window 202 (i.e., ra-ResponseWindow) at the start (i.e., t0) 204 of a first PDCCH occasion.
The method 600 continues with operation 606 in which the BS 102 generates and transmits a random access (RA) response and contention resolution to the UE 104, according to some embodiments. The BS 102 further calculates RA-RNTI (Random Access-Radio Network  Temporary Identifier) values according to information of the resources on which the random access preambles are transmitted. In some embodiments, the RA-RNTI value can be is determined using the equation below,
RA-RNTI = 1 + s_id + 14×t_id + 14×80×f_id + 14×80×8×ul_carrier_id,
wherein s_id is the index of the first OFDM symbol of the PRACH occasion (0 ≤ s_id <14) ; t_id is the index of the first slot of the PRACH occasion in a system frame (0 ≤ t_id < 80) ; f_id is the index of the first frequency of the PRACH occasion in the frequency domain (0 ≤ f_id < 8) ; and ul_carrier_id is the UL carrier used for the random access preamble (i.e., 0 for NUL carrier and 1 for SUL carrier) . In some embodiments, f_id and ul_carrier_id each carries information of resources on the frequency domain on which the random access preamble is transmitted; and s_id and t_id each carriers information of resources on the time domain on which the random access preamble is transmitted.
In some embodiments, the RA response comprises a MAC Random Access Response (RAR) . In some embodiments, the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH. In some embodiments, before transmitting, the MAC RAR or the DCI is scrambled by the RA-RNTI determined by the BS 102.
In some embodiments, the SFN of a RACH occasion is determined by the BS 102 according to the SFN of receiving the random access preamble. In some embodiments, the SFN can be transmitted in one of the following: a MAC RAR and a DCI. For example, 10 bits in a MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble. 3 lower bits of the 10 bits can be used for indicating the SFN. For another example, a radio frame in the MAC RAR or DCI can be used for representing the SFN for transmitting the radio access preamble. The radio frame is the SFN mod N, wherein N is an integer.
In some embodiments, the UE 104 further calculates RA-RNTI value according to the frequency-domain information of the resource on which the random access preamble is transmitted. When the RA-RNTI scrambled MAC RAR or DCI is received by the UE 104 from the BS 102 within the time window 202, the UE 104 descrambles the MAC RAR or the DCI using the calculated RA-RNTI.
When the MAC-RAR is successfully descrambled, the SFN can be determined and further compared with the SFN used for transmitting the random access preamble. When the value (e.g., the lower bit of the SFN or the SFN mod N) in the MAC RAR or the DCI received by the UE 104 from the BS 102 in the time window matches the SFN for transmitting the random access preamble by the UE 104, the random access response is received successfully by the UE 104. When the value (e.g., the lower bit of the SFN or the SFN mod N) in the MAC RAR or the DCI received by the UE 104 from the BS 102 in the time window does not match the SFN for transmitting the random access preamble by the UE 104 or the scrambled MAC RAR or DCI is not received by the UE 104 from the BS 102 within the time window, the random access response is failed.
Figure 7 illustrates a method 700 of performing a 2-step contention-based Random Access (RACH) procedure in a wireless communication system, according to some embodiments of the present disclosure. In the illustrated embodiment, the wireless communication system comprises a UE 104 and a BS 102. It is understood that additional operations may be provided before, during, and after the method 700 of Figure 7, and that some other operations may be omitted or only briefly described herein. It should be noted Figure 7 is an example for illustration and the 2-step contention-based RACH process of Figure 7 is used for discussion  purposes. It should be noted that the method 700 can be also used in a 4-step contention-based RACH process.
The method 700 starts with operation 702 in which the first UE 104-1 and the second UE 104-2 each transmits a random access preamble and scheduled transmission to the BS 102 according to some embodiments. Before transmitting the random access preamble to the BS 102, the UE 104 performs a LBT process on the selected at least one PRACH occasion. In some embodiments, the LBT process comprises sensing interference and bursty arrivals of packets through its transmitters to determine interference level and traffic loads on the uplink carrier. If the LBT process fails, the UE 104 restarts the LBT process at the following PRACH occasion on the corresponding uplink carrier until the LBT process passes (i.e., the uplink carrier is available and unoccupied) . The first UE 104-1 and the second UE 104-2 then starts first transmissions of random access preambles to the BS 102 on the PRACH occasion. In some embodiments, the first message further comprises a MAC CE, wherein the MAC CE is configured to carry at least one of the following: information of the secondary primary cell (e.g., PCI) , the information of the serving cell (e.g., ServCellIndex) , and the information of the UE 104 (e.g., MAC-I) , which are discussed in detail below in Figure 8. In some embodiments, the first message further comprises at least one Media Access Control (MAC) Control Element (CE) for at least one of the following: a Cell-Radio Network Temporary Identifier (C-RNTI) MAC CE and a Buffer Status Report (BSR) . In some embodiments, the first UE 104-1 and the second UE 104-2 can be differentiated according to the first MAC CE, and at least one of the following MAC CE: the C-RNTI MAC CE and the BSR MAC CE.
The method 700 continues with operation 704 in which the BS 102 generates and transmits a random access (RA) response and contention resolution to the UE 104, according to  some embodiments. In some embodiments, the RA response comprises the DCI and a MAC Random Access Response (RAR) . In some embodiments, the DCI is transmitted on the PDCCH and the MAC RAR is transmitted on the PDSCH. In some embodiments, the random access response and contention resolution further comprises information determined according to the random access preamble received from the UE 104. For example, during an initial access, the random access response comprises a MAC RAR subheader and a MAC RAR, wherein the MAC RAR comprises timing advance command, UL grant, and temporary C-RNTI; and the contention resolution comprises at least one of the following: ID MAC CE and a RRC setup message.
Figure 8A illustrates an exemplary format of a MAC CE subheader 800, in accordance with some embodiments of the present disclosure. In the illustrated embodiment, the MAC CE subheader 800 is transmitted on a PDSCH and comprises 8 bits 402. In the illustrated embodiment, two reserved fields 802 occupying first 2 bits 402 and a Language Code Identifier (LCID) field 804 occupying last 6 bits. It should be noted that Figure 8A is an exemplary format of the MAC CE subheader and is not intended to be limiting. Any MAC CE subheader with a field for indicating PCI can be used and is within the scope of this invention.
Figure 8B illustrates a table 810 of LCID values in a MAC CE subheader, in accordance with some embodiments of the present disclosure. In the illustrated embodiment, the table 810 comprises 2 columns, i.e., a first column 812 showing a plurality of indices and a second column 814 comprising a plurality of corresponding LCID values. In the illustrated embodiment, the LCID field in the MAC CE subheader occupies 6 bits and 64 indices. In the illustrated embodiment, an index value of 0 indicates a Common Control Channel (CCCH) occupying 64 bits; an index value of 1-32 identifies an logical channel; an index of 33-50 is reserved; a value of 51 is for indicating a PCI; an index value of 52 indicates a CCCH  occupying 48 bits; an index value of 53 indicates a recommended bit rate query; an index value of 54 indicates multiple entry Power Headroom Report (PHR) (4 octets) ; an index value of 55 indicates configured grate confirmation; an index value of 56 indicates multiple entry PHR (1 octet) ; and an index value of 57 indicates a single entry PHR; an index value of 58 indicates C-RNTI; an index value of 59 indicates short truncated BSR; an index value of 60 indicates long truncated BSR; an index value of 61 indicates short BSR; an index value of 62 indicates long BSR; and an index value of 63 indicates Padding.
Figure 8C illustrates an exemplary format of a MAC CE 820, in accordance with some embodiments of the present disclosure. In the illustrated embodiment, the MAC CE 820 is transmitted on a PDSCH and comprises 2 octets 404. In the illustrated embodiments, 6 reserved fields 822 occupying first 6 bits 402 in a first octet 404-1, a physical cell ID 824 occupies last 2 bits 402 of the first octet 404-1 and 8 bits 402 of a second octet 404-2. In some embodiments, the physical cell ID field 824 occupying at least 10 bits is configured to carry the PCI of a UE 104. In some embodiments, the PCI and the C-RNTI are used to differentiate different UE 104. It should be noted that Figure 8A is an exemplary format of the MAC CE and is not intended to be limiting. Any MAC CE with a field for indicating the PCI can be used and is within the scope of this invention.
Figure 8D illustrates an exemplary format of a MAC CE 830, in accordance with some embodiments of the present disclosure. In the illustrated embodiment, the MAC CE 830 is transmitted on a PDSCH and comprises 1 octet 404. In the illustrated embodiments, 3 reserved fields 832 occupying first 3 bits 402, and a serving Cell index (ServCellIndex) field 834 occupies last 6 bits 402. In some embodiments, the ServCellIndex field 834 occupying 6 bits is configured to carry serving cell information of a UE 104. In some embodiments, the serving cell  information and the C-RNTI are used to differentiate different UE 104. It should be noted that Figure 8D is an exemplary format of the MAC CE and is not intended to be limiting. Any MAC CE with a field for indicating the serving cell information can be used and is within the scope of this invention.
Figure 8E illustrates an exemplary format of a MAC CE 840, in accordance with some embodiments of the present disclosure. In the illustrated embodiment, the MAC CE 840 is transmitted on a PDSCH and comprises 2 octets 404. In the illustrated embodiments, a MAC-I field 842 occupies 16 bits 402 of the 2 octets. In some embodiments, the MAC-I field 842 is configured to carry information of a UE 104. In some embodiments, the information of the UE 104in the MAC-I field 842 is used to differentiate different UE 104. It should be noted that Figure 8e is an exemplary format of the MAC CE and is not intended to be limiting. Any MAC CE with a field for indicating the information of the UE 104 can be used and is within the scope of this invention.
Figure 9 illustrates a method 900 for a discontinuous reception mode (DRX) process, in accordance with some embodiments of the present disclosure. In the illustrated embodiment, the wireless communication system comprises a UE 104 and a BS 102. In the illustrated embodiment, the UE 104 is in a DRX mode, in which the UE 104 only performs a Physical Downlink Control Channel (PDCCH) blind detection during an active time and turns off monitoring PDCCH during a non-active time. In some embodiments, the active time and non-active time appear alternatively and periodically. When no service is detected during an active time and when the active time window ends, the UE 104 enters a following non-active time. It is understood that additional operations may be provided before, during, and after the method 900  of Figure 9, and that some other operations may be omitted or only briefly described herein. It should be noted Figure 9 is an example for illustration and discussion purposes.
The method 900 starts with operation 902 in which at least one DRX parameter is configured to the UE 104 from the BS 102 according to some embodiments. In some embodiments, the at least one DRX parameter comprises a period of a DRX process, a DRX inactive timer, an active time and a non-active time. In some embodiments, the at least one DRX parameter is configured by the BS 102 to the UE 104 through a RRC reconfiguration process.
The method 900 continues with operation 904 in which the UE 104 starts the DRX process according to some embodiments. In some embodiments, the UE 104 determines to enter an active time according to the at least one DRX parameter and service scheduling situation of the BS 102. In some embodiments, a first active timer indicated in the DRX parameter is started at time t0 204-1 when the UE 104 starts the DRX process and the first active timer has a window size 202-1 which terminates at time t1 204-2.
The method 900 continues with operation 906, in which a first message is received by the UE 104 from the BS 102 according to some embodiments. In some embodiments, the first message is a media access control message, e.g., MAC PDU, in a format of a data-indication MAC control element (CE) . In some embodiments, the first message is received at time t2 204-3 before the termination of the first active timer. In some embodiments, the first message is transmitted on a PDSCH. In some embodiments, the data-indication MAC CE is for an indication of pending data for transmission from the BS 102 to the UE 104 so as to start a second active timer before an expiration of the first active timer. In some embodiments, the data-indication MAC CE is identified in the MAC PDU subheader with LCID, which is discussed in Figure 10 below. In some embodiments, the second active timer has a window size 202-2,  wherein the window size of the second active timer can be one of the following: the DRX inactive timer configured in the at least one DRX parameter and a second active timer configured by the BS 102. In some embodiments, after receiving the first message, the UE 104 remains active for receiving the pending data from the BS 102 according to some embodiments. In some embodiments, when the UE 104 receives the data-indication MAC CE in the first message, the UE 104 further performs one of the following: restarting the DRX inactive timer and starting a new timer, so as to continue with the PDCCH blind detection.
Figure 10A illustrates an exemplary format of a MAC CE subheader 1000, in accordance with some embodiments of the present disclosure. In the illustrated embodiment, the MAC CE subheader 1000 is transmitted on a PDSCH and comprises 8 bits 402. In the illustrated embodiment, two reserved fields 1002 occupying first 2 bits 402 and a LCID field 1004 occupying last 6 bits. It should be noted that Figure 10A is an exemplary format of the MAC CE subheader and is not intended to be limiting. Any MAC CE subheader with a field for indicating PCI can be used and is within the scope of this invention.
Figure 10B illustrates a table 1010 of Language Code Identifier (LCID) values in a MAC CE subheader, in accordance with some embodiments of the present disclosure. In the illustrated embodiment, the table 1010 comprises 2 columns, i.e., a first column 1012 showing a plurality of indices and a second column 1014 comprising a plurality of corresponding LCID values. In the illustrated embodiment, the LCID field in the MAC CE subheader occupies 6 bits and 64 indices. In the illustrated embodiment, an index value of 0 indicates a CCCH occupying 64 bits; an index value of 1-32 identifies an logical channel; an index of 33-45 is reserved; an index value of 46 is for data indication command; an index value of 47 indicates recommended bit rate; an index value of 48 indicates semi-persistent zero power channel state information- reference signal (SP ZP CSI-RS) Resource Set Activation/Deactivation; an index value of 49 indicates PUCCH spatial relation Activation/Deactivation; a value of 50 indicates semi-persistent sounding reference signal (SP SRS) Activation/Deactivation; a value of 51 indicates SP CSI reporting on PUCCH Activation/Deactivation; an index value of 52 indicates a Transmission Configuration Indication (TCI) State Indication for UE-specific PDCCH; an index value of 53 indicates TCI states Activation/Deactivation for UE-specific PDSCH; an index value of 54 indicates Aperiodic CSI Trigger State Subselection; an index value of 55 indicates SP CSI-RS/semi-persistent channel state information interference measurement (CSI-IM) Resource Set Activation/Deactivation; an index value of 56 indicates Duplication Activation/Deactivation; an index value of 57 SCell Activation/Deactivation (Four Octets) ; an index value of 58 indicates SCell Activation/Deactivation (One Octet) ; an index value of 59 indicates Long DRX Command; an index value of 60 indicates DRX command; an index value of 61 indicates Timing Advance Command; an index value of 62 indicates UE Contention Resolution Identity; and an index value of 63 indicates Padding.
While various embodiments of the invention have been described above, it should be understood that they have been presented by way of example only, and not by way of limitation. Likewise, the various diagrams may depict an example architectural or configuration, which are provided to enable persons of ordinary skill in the art to understand exemplary features and functions of the invention. Such persons would understand, however, that the invention is not restricted to the illustrated example architectures or configurations, but can be implemented using a variety of alternative architectures and configurations. Additionally, as would be understood by persons of ordinary skill in the art, one or more features of one embodiment can be combined with one or more features of another embodiment described herein. Thus, the  breadth and scope of the present disclosure should not be limited by any of the above-described exemplary embodiments.
It is also understood that any reference to an element herein using a designation such as "first, " "second, " and so forth does not generally limit the quantity or order of those elements. Rather, these designations can be used herein as a convenient means of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements can be employed, or that the first element must precede the second element in some manner.
Additionally, a person having ordinary skill in the art would understand that information and signals can be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits and symbols, for example, which may be referenced in the above description can be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
A person of ordinary skill in the art would further appreciate that any of the some illustrative logical blocks, modules, processors, means, circuits, methods and functions described in connection with the aspects disclosed herein can be implemented by electronic hardware (e.g., a digital implementation, an analog implementation, or a combination of the two, which can be designed using source coding or some other technique) , various forms of program or design code incorporating instructions (which can be referred to herein, for convenience, as "software" or a "software module) , or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is  implemented as hardware, firmware or software, or a combination of these technique, depends upon the particular application and design constraints imposed on the overall system. Skilled artisans can implement the described functionality in various ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
Furthermore, a person of ordinary skill in the art would understand that various illustrative logical blocks, modules, devices, components and circuits described herein can be implemented within or performed by an integrated circuit (IC) that can include a general purpose processor, a digital signal processor (DSP) , an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) or other programmable logic device, or any combination thereof. The logical blocks, modules, and circuits can further include antennas and/or transceivers to communicate with various components within the network or within the device. A general purpose processor can be a microprocessor, but in the alternative, the processor can be any conventional processor, controller, or state machine. A processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other suitable configuration to perform the functions described herein.
If implemented in software, the functions can be stored as one or more instructions or code on a computer-readable medium. Thus, the steps of a method or algorithm disclosed herein can be implemented as software stored on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that can be enabled to transfer a computer program or code from one place to another. A storage media can be any available media that can be accessed by a computer. By way of example, and  not limitation, such computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer.
In this document, the term "module" as used herein, refers to software, firmware, hardware, and any combination of these elements for performing the associated functions described herein. Additionally, for purpose of discussion, the various modules are described as discrete modules; however, as would be apparent to one of ordinary skill in the art, two or more modules may be combined to form a single module that performs the associated functions according embodiments of the invention.
Additionally, memory or other storage, as well as communication components, may be employed in embodiments of the invention. It will be appreciated that, for clarity purposes, the above description has described embodiments of the invention with reference to different functional units and processors. However, it will be apparent that any suitable distribution of functionality between different functional units, processing logic elements or domains may be used without detracting from the invention. For example, functionality illustrated to be performed by separate processing logic elements, or controllers, may be performed by the same processing logic element, or controller. Hence, references to specific functional units are only references to a suitable means for providing the described functionality, rather than indicative of a strict logical or physical structure or organization.
Various modifications to the implementations described in this disclosure will be readily apparent to those skilled in the art, and the general principles defined herein can be applied to other implementations without departing from the scope of this disclosure. Thus, the  disclosure is not intended to be limited to the implementations shown herein, but is to be accorded the widest scope consistent with the novel features and principles disclosed herein, as recited in the claims below.

Claims (24)

  1. A method performed by a wireless communication node, comprising:
    transmitting first information to a wireless communication device;
    receiving a first message from the wireless communication device; and
    transmitting a second message to the wireless communication device,
    wherein the first information comprises information of a plurality of time windows for the wireless communication device to receive the second message.
  2. The method of claim 1, wherein each of the plurality of time windows comprises one of the following: a time window and a time offset.
  3. The method of claim 1, wherein the first information further comprises at least one search space (SS) and at least one Control Resource Set (CORESET) so as to provide information of resources for the wireless communication node to transmit Downlink Control Information (DCI) in the second message.
  4. The method of claim 3, wherein the first information further comprises a correlation between each of the plurality of time windows and at least one of the following: the at least one SS and the at least one CORESET so as to distinguish each of the plurality of time windows.
  5. The method of claim 1, wherein the second message comprises a window indication, wherein the window indication is configured to indicate one of the plurality of time windows.
  6. The method of claim 5, wherein the window indication is a window-indication field in one of the following: a Media Access Control (MAC) Random Access Response and Downlink Control Information (DCI) in the second message.
  7. The method of claim 1, wherein the second message comprises a System Frame Number (SFN) for receiving the first message from the wireless communication device.
  8. The method of claim 7, wherein the SFN is used to indicate one of the plurality of time windows.
  9. A method performed by a wireless communication device, comprising:
    receiving first information from a wireless communication node;
    transmitting a first message to the wireless communication node; and
    receiving a second message from the wireless communication node,
    wherein the first information comprises information of a plurality of time windows for receiving the second message.
  10. The method of claim 9, wherein each of the plurality of time windows comprises one of the following: a time window and a time offset.
  11. the method of claim 9, wherein the first information further comprises at least one search space (SS) and at least one Control Resource Set (CORESET) so as to provide information of resources for receiving Downlink Control Information (DCI) in the second message.
  12. The method of claim 11, wherein the first information further comprises a correlation between each of the plurality of time windows and at least one of the following: the at least one SS and the at least one CORESET so as to distinguish each of the plurality of time windows.
  13. The method of claim 9, wherein the second message comprises a window indication, wherein the window indication is configured to indicate one of the plurality of time windows.
  14. The method of claim 13, wherein the window indication is a window-indication field in one of the following: a Media Access Control (MAC) Random Access Response (RAR) and Downlink Control Information (DCI) in the second message.
  15. The method of claim 9, wherein the second message comprises a System Frame Number (SFN) for transmitting the first message to the wireless communication node.
  16. The method of claim 15, wherein the SFN is used to indicate one of the plurality of time windows.
  17. A method performed by a wireless communication node, comprising:
    transmitting first information to a wireless communication device;
    receiving a first message from the wireless communication device; and
    transmitting a second message to the wireless communication device,
    wherein the first information comprises a size of a time window for the wireless communication device to receive the second message, wherein the second message is scrambled by a Random Access-Radio Network Temporary Identifier (RA-RNTI) , wherein the RA-RNTI is determined according to frequency-domain information of resources for receiving the first message, and wherein the second message comprises one of the following: time-domain information of the resources for receiving the first message and a System Frame Number (SFN) for receiving the first message.
  18. The method of claim 17, wherein the first information is transmitted in one of the following: system information and a Radio Resource Control (RRC) message.
  19. The method of claim 17, wherein the RA-RNTI is further determined by the time-domain information of the resources for receiving the first message.
  20. A method performed by a wireless communication device, comprising:
    receiving first information from a wireless communication node;
    transmitting a first message to the wireless communication node; and
    receiving a second message from the wireless communication node,
    wherein the first information comprises a size of a time window for receiving the second message, wherein the second message is scrambled by a Random Access-Radio Network Temporary Identifier (RA-RNTI) , wherein the RA-RNTI is determined according to frequency-domain information of resources for transmitting the first message, and wherein the second message comprises one of the following: time-domain information of the resources for  transmitting the first message and a System Frame Number (SFN) for transmitting the first message.
  21. The method of claim 20, wherein the first information is received in one of the following: system information and a Radio Resource Control (RRC) message.
  22. The method of claim 20, wherein the RA-RNTI is further determined by the time-domain information of the resources for transmitting the first message.
  23. A computing device comprising at least one processor and a memory coupled to the processor, the at least one processor configured to carry out the method of any one claims 1 through 22.
  24. A non-transitory computer-readable medium having stored thereon computer-executable instructions for carrying out the method of any one claims 1 through 22.
PCT/CN2019/080251 2019-03-28 2019-03-28 Method and apparatus for performing enhanced random access procedure WO2020191771A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
CA3131598A CA3131598A1 (en) 2019-03-28 2019-03-28 Method and apparatus for performing enhanced random access procedure
CN201980094973.7A CN113647184B (en) 2019-03-28 2019-03-28 Method, apparatus, and medium for performing enhanced random access procedure
PCT/CN2019/080251 WO2020191771A1 (en) 2019-03-28 2019-03-28 Method and apparatus for performing enhanced random access procedure
EP19920772.1A EP3949634A4 (en) 2019-03-28 2019-03-28 Method and apparatus for performing enhanced random access procedure
KR1020217034583A KR20210141695A (en) 2019-03-28 2019-03-28 Method and apparatus for performing an enhanced random access procedure
US17/487,687 US20220132586A1 (en) 2019-03-28 2021-09-28 Method and apparatus for performing enhanced random access procedure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/080251 WO2020191771A1 (en) 2019-03-28 2019-03-28 Method and apparatus for performing enhanced random access procedure

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/487,687 Continuation US20220132586A1 (en) 2019-03-28 2021-09-28 Method and apparatus for performing enhanced random access procedure

Publications (1)

Publication Number Publication Date
WO2020191771A1 true WO2020191771A1 (en) 2020-10-01

Family

ID=72611281

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/080251 WO2020191771A1 (en) 2019-03-28 2019-03-28 Method and apparatus for performing enhanced random access procedure

Country Status (6)

Country Link
US (1) US20220132586A1 (en)
EP (1) EP3949634A4 (en)
KR (1) KR20210141695A (en)
CN (1) CN113647184B (en)
CA (1) CA3131598A1 (en)
WO (1) WO2020191771A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11785648B2 (en) * 2019-08-09 2023-10-10 Intel Corporation RAR window enhancement during random access procedure for new radio (NR)-unlicensed spectrum

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018031799A1 (en) * 2016-08-10 2018-02-15 Idac Holdings, Inc. Connectivity supervision and recovery
US20180270698A1 (en) * 2017-03-16 2018-09-20 Ofinno Technologies, Llc Truncated Buffer Status Reporting

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8570977B2 (en) * 2008-03-24 2013-10-29 Qualcomm Incorporated Method and apparatus for handover in a wireless communication system
KR20120123997A (en) * 2011-05-02 2012-11-12 주식회사 팬택 Apparatus And Method For Random Access
WO2015013073A1 (en) * 2013-07-22 2015-01-29 Zte Wistron Telecom Ab Method and apparatus for sub-windowed random access response search window for contention free and low complexity extension of the rar search time in hetnets with any backhaul
CN110603888B (en) * 2017-05-12 2024-04-23 瑞典爱立信有限公司 Radio network node, wireless device and method for performing random access in a wireless communication network
WO2018226026A1 (en) * 2017-06-07 2018-12-13 Samsung Electronics Co., Ltd. System and method of identifying random access response
CN109041228B (en) * 2017-06-12 2021-03-12 维沃移动通信有限公司 Information transmission method, base station, mobile terminal, and computer-readable storage medium
CN112399607B (en) * 2017-06-14 2024-03-29 维沃移动通信有限公司 System information transmission method, terminal and network equipment
CN109152002A (en) * 2017-06-15 2019-01-04 中兴通讯股份有限公司 Method and device, storage medium and the processor of information transmission
US10785739B2 (en) * 2017-08-10 2020-09-22 Ofinno, Llc Beam indication in RACH
CN109618410B (en) * 2017-08-10 2020-03-20 华为技术有限公司 Communication method and apparatus
EP3720231A4 (en) * 2017-11-28 2021-09-08 NTT DoCoMo, Inc. User device
WO2019235897A1 (en) * 2018-06-06 2019-12-12 Samsung Electronics Co., Ltd. Method and system for handling random access response in wireless communication system
WO2020032733A1 (en) * 2018-08-09 2020-02-13 엘지전자 주식회사 Method for transmitting/receiving control information in wireless communication system, and apparatus therefor
US11653387B2 (en) * 2018-09-28 2023-05-16 Samsung Electronics Co., Ltd. Random access method and apparatus in wireless communication system
US11272532B2 (en) * 2018-11-01 2022-03-08 Comcast Cable Communications, Llc Random access response reception
CN113767701A (en) * 2018-12-21 2021-12-07 瑞典爱立信有限公司 Random access in a wireless communication system
JP7460642B2 (en) * 2019-02-01 2024-04-02 ノキア テクノロジーズ オサケユイチア Control mechanism for random access procedures
US11109420B2 (en) * 2019-02-08 2021-08-31 Qualcomm Incorporated Random access channel (RACH) response (RAR) reception in an unlicensed radio frequency (RF) spectrum band
EP3759993A4 (en) * 2019-02-14 2021-11-17 Nokia Technologies Oy Receiving random access response with extended response window
US20220141877A1 (en) * 2019-02-15 2022-05-05 Lg Electronics Inc. Method by which terminal performs random access procedure in wireless communication system, and device therefor
CN113647193B (en) * 2019-02-15 2023-12-15 Lg 电子株式会社 Method for terminal to perform random access channel procedure in wireless communication system and apparatus therefor

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018031799A1 (en) * 2016-08-10 2018-02-15 Idac Holdings, Inc. Connectivity supervision and recovery
US20180270698A1 (en) * 2017-03-16 2018-09-20 Ofinno Technologies, Llc Truncated Buffer Status Reporting

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
LG ELECTRONICS INC.: "RAR window extention for multi-beam operation", 3GPP TSG-RAN WG2 NR AH R2-1800567, 26 January 2018 (2018-01-26), pages 1 - 2, XP051386228, DOI: 20191216102336X *
LG ELECTRONICS INC.: "RAR window extention for multi-beam operation", 3GPP TSG-RAN WG2 NR AH R2-1800567, 26 January 2018 (2018-01-26), pages 1 - 2, XP051386228, DOI: 20191216102341X *
MEDIATEC INC.: "Remaining details on RACH procedure", 3GPP TSG RAN WG1 MEETING 91 R1-1719569, 1 December 2017 (2017-12-01), pages 2 - 8, XP051369383, DOI: 20191216102535Y *
See also references of EP3949634A4 *
ZTE: "Considerations on channel access procedure for NR-U", 3GPP TSG RAN WG2 NR #103 MEETING R2-1811281, 24 August 2018 (2018-08-24), XP051520945, DOI: 20191216102712Y *

Also Published As

Publication number Publication date
US20220132586A1 (en) 2022-04-28
EP3949634A4 (en) 2022-10-12
CN113647184A (en) 2021-11-12
CN113647184B (en) 2022-11-15
KR20210141695A (en) 2021-11-23
CA3131598A1 (en) 2020-10-01
EP3949634A1 (en) 2022-02-09

Similar Documents

Publication Publication Date Title
US11596001B2 (en) Method and apparatus for performing multiple RACH procedures
US11399329B2 (en) Uplink carrier configuration and selection with supplementary uplink
US11540323B2 (en) 2-step random access
US20220182877A1 (en) Methods and apparatus for reducing overhead in a random access procedure
TW202014038A (en) Method for determining listen before talk and channel access priority class and user equipments thereof
US20220061105A1 (en) Random access method and device
US20220330328A1 (en) Random access method, device, and medium
CN110958712A (en) Signal transmitting/receiving method, user equipment and network equipment
WO2021109388A1 (en) Systems and methods for reporting random access information in wireless communication networks
KR20230030650A (en) Method and apparatus for transmitting and receiving uplink signals
US20220132586A1 (en) Method and apparatus for performing enhanced random access procedure
US20210168739A1 (en) Method and apparatus for data transmission on common resources
CN112839378A (en) Data transmission method and device
WO2023133890A1 (en) Methods and apparatuses for prach repetition
WO2023019542A1 (en) Systems and methods for initial access
CN117014953A (en) Information transmission method and communication device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19920772

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3131598

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20217034583

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2019920772

Country of ref document: EP

Effective date: 20211028