WO2020216341A1 - 随机接入方法和通信装置 - Google Patents

随机接入方法和通信装置 Download PDF

Info

Publication number
WO2020216341A1
WO2020216341A1 PCT/CN2020/086783 CN2020086783W WO2020216341A1 WO 2020216341 A1 WO2020216341 A1 WO 2020216341A1 CN 2020086783 W CN2020086783 W CN 2020086783W WO 2020216341 A1 WO2020216341 A1 WO 2020216341A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
access preamble
threshold
data
reference signal
Prior art date
Application number
PCT/CN2020/086783
Other languages
English (en)
French (fr)
Inventor
徐小英
黄曲芳
酉春华
郭英昊
赵力
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20794379.6A priority Critical patent/EP3952570A4/en
Priority to CA3137983A priority patent/CA3137983A1/en
Priority to EP23178242.6A priority patent/EP4274321A3/en
Publication of WO2020216341A1 publication Critical patent/WO2020216341A1/zh
Priority to US17/510,065 priority patent/US20220046727A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
    • H04W52/242TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account path loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/30TPC using constraints in the total amount of available transmission power
    • H04W52/36TPC using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
    • H04W52/367Power values between minimum and maximum limits, e.g. dynamic range
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0866Non-scheduled access, e.g. ALOHA using a dedicated channel for access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/38TPC being performed in particular situations
    • H04W52/50TPC being performed in particular situations at the moment of starting communication in a multiple access environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal

Definitions

  • This application relates to the field of communication, and more specifically, to a method and communication device for random access.
  • terminal equipment obtains uplink synchronization with network equipment through a random access process.
  • random access types include four-step random access and two-step random access.
  • the network equipment can simultaneously configure random access channel (RACH) resources for four-step random access and RACH resources for two-step random access.
  • RACH random access channel
  • the present application provides a random access method and a communication device, which can make the terminal device clarify what type of random access is performed.
  • a random access method including: determining a random access preamble; and using the random access preamble for random access.
  • the random access preamble is at least one determined from at least one two-step random access preamble, or, the random access preamble is from at least one two-step random access preamble and at least one four-step random access preamble.
  • One of the preambles determined by random access is determined by random access.
  • the at least one two-step random access preamble is a random access preamble configured by the network device for two-step random access.
  • the at least one four-step random access preamble is a random access preamble configured by the network device for four-step random access.
  • the terminal device when the network equipment is configured with a random access preamble for four-step random access and a random access preamble for two-step random access, the terminal device can choose to use two Two-step random access preamble for two-step random access, or the terminal device can randomly select a random access preamble from the configured two-step random access preamble and four-step random access preamble, and perform the corresponding type Random access.
  • the random access is used for initial data transmission, or for data retransmission.
  • the random access preamble is used for random access; or, in the case of data retransmission, the random access preamble is used for random access.
  • the method may further include: in the case that the random access fails, performing Two-step random access.
  • the access delay can be reduced by adopting the two-step random access.
  • the method may further include: in the case that the random access fails, performing Two-step random access or four-step random access.
  • the terminal device can flexibly select the random access type.
  • the method may further include: receiving instruction information sent by the network device, and the instruction information is used to instruct the terminal device to perform Two-step random access, or the indication information is used to instruct the terminal device to perform four-step random access; according to the indication information, random access is performed.
  • the terminal device can determine the type of random access according to the instructions of the network device.
  • the random access preamble is a two-step random access preamble, and the at least one two-step random access preamble corresponds to at least one first data volume threshold,
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble, and each first data volume threshold corresponds to a second signal strength threshold.
  • the determination of the random access preamble includes:
  • the reference signal is a synchronization signal block (synchronization signal block, SSB) or a channel state information reference signal (channel state information reference signal resource, CSI-RS);
  • the preamble is randomly accessed from the two steps corresponding to the target reference signal
  • the random access preamble is determined in the code
  • the first data volume threshold corresponding to the random access preamble is the first data volume threshold corresponding to the target second signal strength threshold.
  • the target second signal strength threshold is the second signal strength threshold corresponding to the first data amount threshold corresponding to the data amount to be transmitted.
  • the random access preamble supports the amount of data to be transmitted.
  • a target reference signal can be selected according to the prior art, and then determined according to the relationship between the amount of data to be transmitted and the first data amount threshold, and the relationship between the RSRP corresponding to the target reference signal and the second signal strength threshold Random access preamble.
  • the target reference signal may not be selected, and the random access preamble corresponding to the reference signal whose RSRP is greater than the target second signal strength threshold in the at least one reference signal may be directly determined.
  • Access the preamble For example, the random access preamble that supports the amount of data to be transmitted can be directly selected from the random access preamble corresponding to the reference signal whose RSRP is greater than the target second signal strength threshold as the random access preamble. Since the random access preamble corresponding to some reference signals may not include the two-step random access preamble, compared with the aforementioned scheme of selecting the target reference signal first and then determining the random access preamble, this scheme can improve the selection of two random access preambles. The probability of random access to the preamble.
  • the random access preamble has a corresponding relationship with the physical uplink share channel (PUSCH) resource.
  • PUSCH resource corresponds to the size of the largest transmitted data block, that is, the maximum transport block size (TBS). ).
  • TBS transport block size
  • the random access preamble corresponds to the TBS, and its meaning is that when the amount of data to be sent is less than (or, less than or equal to) the TBS, the random access preamble corresponding to the TBS can be used. Therefore, the amount of data supported by a random access preamble refers to the TBS corresponding to the PUSCH resource corresponding to the random access preamble.
  • the random access preamble is a two-step random access preamble, and the at least one two-step random access preamble corresponds to at least one first data volume threshold,
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble, and each first data volume threshold corresponds to a PL1, and PL1 is the first path loss threshold .
  • the determination of the random access preamble includes:
  • the network device If there is a reference signal with a corresponding reference signal received power RSRP greater than the first signal strength threshold in at least one reference signal configured by the network device, select a target reference signal from the reference signals greater than the first signal strength threshold, and the reference signal is Synchronization signal block SSB or channel state information reference signal CSI-RS;
  • the amount of data to be transmitted is less than or equal to one of the at least one first data amount threshold, and the path loss corresponding to the target reference signal is less than the target PL1, randomly access the preamble from the two-step corresponding to the target reference signal Determine the random access preamble.
  • the target PL is the second signal strength threshold corresponding to the first data volume threshold corresponding to the data volume to be transmitted, or the first data volume threshold corresponding to the random access preamble is the target second signal The first data volume threshold corresponding to the intensity threshold; or, the random access preamble supports the data volume to be transmitted.
  • PL1 PCMAX-TP- ⁇ 1
  • PL1 is the first path loss threshold
  • PCMAX is the maximum transmit power of the terminal device in the cell performing random access
  • TP is the target received power of the two-step random access preamble
  • ⁇ 1 is the standby The power deviation between the transmitted data and the two-step random access preamble
  • the target PL1 is the PL1 corresponding to the first data volume threshold corresponding to the data volume to be transmitted.
  • a target reference signal can be selected according to the prior art, and then the random access preamble can be determined according to the relationship between the data volume to be transmitted and the first data volume threshold, and the path loss corresponding to the target reference signal and PL1. code.
  • the target reference signal may not be selected, and the random access preamble can be determined directly according to the random access preamble corresponding to the reference signal whose path loss is less than the target PL1 in the at least one reference signal. code.
  • the random access preamble that supports the amount of data to be transmitted can be directly selected from the random access preamble corresponding to the reference signal whose path loss is less than the target PL1 as the random access preamble. Since the random access preamble corresponding to some reference signals may not include the two-step random access preamble, based on this scheme, the probability of selecting the two-step random access preamble can be improved.
  • the random access preamble is a two-step random access preamble.
  • the determination of the random access preamble includes:
  • the reference signal is a synchronization signal block SSB or a channel state information reference signal CSI-RS;
  • the target reference signal corresponds to the Determine the random access preamble from the random access preamble in the first group of random access preambles; or,
  • the random access preambles in the second set of random access preambles corresponding to the target reference signal The random access preamble is determined in the access preamble, and the maximum transmission data volume supported by the second group of random access preamble is the second data volume threshold; or,
  • the random access corresponding to the target reference signal belongs to the second group of random access preambles Determine the random access preamble in the preamble;
  • PL2 PCMAX-TP- ⁇ 1- ⁇ 2
  • PL2 is the second path loss threshold
  • PCMAX is the maximum transmit power of the terminal device in the cell performing random access
  • TP is the preamble of the random access preamble for two-step random access Target received power
  • ⁇ 1 is the power deviation between the data to be sent and the two-step random access preamble
  • ⁇ 2 is the power deviation between the first group of random access preambles and the second group of random access preambles.
  • a random access preamble can be selected from the first group of random access preambles for random access, or a random access preamble can be selected from the second group of random access preambles for random access.
  • the first group of random access preambles and the second group of random access preambles are two-step random access preambles.
  • the at least one random access preamble includes a first group of random access preambles and a second group of random access preambles.
  • the random access preamble is a two-step random access preamble.
  • the determination of the random access preamble includes:
  • the reference signal is a synchronization signal block SSB or a channel state information reference signal CSI-RS;
  • the target The random access preamble is determined from the random access preambles in the first group of random access preambles corresponding to the reference signal, and the maximum amount of transmitted data supported by the second group of random access preambles is the second data Amount threshold; or,
  • the random access preambles in the second set of random access preambles corresponding to the target reference signal is determined in the access preamble; or,
  • the random access preamble corresponding to the target reference signal belongs to the second group of random access preambles To determine the random access preamble.
  • a random access preamble can be selected from the first group of random access preambles for random access, or a random access preamble can be selected from the second group of random access preambles for random access.
  • the random access preamble is a two-step random access preamble; and the determined random access preamble includes:
  • the random access preamble is determined from random access preambles in the second group of random access preambles corresponding to the target reference signal.
  • the random access preamble is a two-step random access preamble, and the at least one two-step random access preamble corresponds to at least one first data volume threshold,
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble, and each first data volume threshold corresponds to a second signal strength threshold.
  • the determination of the random access preamble includes:
  • the at least one reference signal configured by the network device includes a reference signal with a corresponding reference signal received power RSRP greater than the target second signal strength threshold , Select a target reference signal from the reference signals whose RSRP is greater than the second signal strength threshold, the reference signal is the synchronization signal block SSB or the channel state information reference signal CSI-RS, and the target second signal strength is the to-be-transmitted A second signal strength threshold corresponding to the first data amount threshold corresponding to the data amount of
  • the random access preamble is determined from the two-step random access preamble corresponding to the target reference signal.
  • the target second signal strength threshold is the second signal strength threshold corresponding to the first data amount threshold corresponding to the amount of data to be transmitted, or in other words, the first data amount threshold corresponding to the random access preamble is the The first data volume threshold corresponding to the target second signal strength threshold; or, the random access preamble supports the data volume to be transmitted.
  • the random access preamble can be determined according to the relationship between the amount of data to be transmitted and the first data amount threshold, and the relationship between the RSRP corresponding to the target reference signal and the second signal strength threshold.
  • this scheme is simpler to implement.
  • the random access preamble is a two-step random access preamble, and the at least one two-step random access preamble corresponds to at least one first data volume threshold,
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble, and each first data volume threshold corresponds to a second signal strength threshold;
  • Determining the random access preamble includes: if the amount of data to be transmitted is less than or equal to one of the at least one first data amount threshold, and at least one reference signal configured by the network device has a corresponding reference signal received power RSRP greater than
  • the reference signal of the target second signal strength threshold is selected from the random access preambles respectively corresponding to the reference signals greater than the second signal strength threshold, and the reference signal is the synchronization signal block SSB or channel state information
  • the target second signal strength is the second signal strength threshold corresponding to the first data amount threshold
  • the target second signal strength threshold is the second signal strength threshold corresponding to the first data volume threshold corresponding to the data volume to be transmitted, or in other words, the first data volume threshold corresponding to the random access preamble is the target first data volume threshold. 2.
  • the first data volume threshold corresponding to the signal strength threshold; or, the random access preamble supports the data volume to be transmitted.
  • the random access preamble corresponding to some reference signals may not include the two-step random access preamble, compared with the aforementioned scheme of selecting the target reference signal first and then determining the random access preamble, this scheme can improve the selection of two random access preambles. The probability of random access to the preamble.
  • the using the random access preamble to perform random access includes: determining the next available transmission opportunity from the transmission time corresponding to the target reference signal, and The sending opportunity is used to send the random access preamble; the random access preamble is used at the available sending opportunity to perform the random access.
  • a random access method includes: generating configuration information; sending the configuration information to a terminal device, the configuration information including at least one first data volume threshold and at least one second signal strength threshold, the At least one first data volume threshold corresponds to at least one two-step random access preamble, and the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble
  • Each first data volume threshold corresponds to a second signal strength threshold
  • the configuration information is used by the terminal device to determine a random access preamble for random access.
  • a communication device including a processing unit and a transceiver unit.
  • the processing unit and the transceiver unit may be used to execute the first aspect and the corresponding steps of the method in any one of the possible implementation manners of the first aspect.
  • a communication device including a processor.
  • the processor is coupled with the memory and can be used to execute instructions in the memory to implement the foregoing first aspect and the method in any one of the possible implementation manners of the first aspect.
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, and the processor is coupled with the communication interface.
  • the communication device is a terminal device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the communication device is a chip configured in a terminal device.
  • the communication interface may be an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • a communication device including a processing unit and a transceiver unit.
  • the processing unit and the transceiving unit may be used to execute the second aspect and corresponding steps in the method in any one of the possible implementation manners of the second aspect.
  • a communication device including a processor.
  • the processor is coupled with the memory and can be used to execute instructions in the memory to implement the foregoing second aspect and the method in any one of the possible implementation manners of the second aspect.
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, and the processor is coupled with the communication interface.
  • the communication device is a network device.
  • the communication interface may be a transceiver or an input/output interface.
  • the communication device is a chip configured in a network device.
  • the communication interface may be an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • a processor including: an input circuit, an output circuit, and a processing circuit.
  • the processing circuit is configured to receive signals through the input circuit and transmit signals through the output circuit, so that the processor executes the method in any one of the first aspect to the second aspect and any one of the first aspect to the second aspect.
  • the foregoing processor may be a chip
  • the input circuit may be an input pin
  • the output circuit may be an output pin
  • the processing circuit may be a transistor, a gate circuit, a flip-flop, and various logic circuits.
  • the input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver
  • the signal output by the output circuit may be, for example, but not limited to, output to and transmitted by the transmitter
  • the circuit can be the same circuit, which is used as an input circuit and an output circuit at different times.
  • the embodiments of the present application do not limit the specific implementation manners of the processor and various circuits.
  • a processing device including a processor and a memory.
  • the processor is used to read instructions stored in the memory, receive signals through a receiver, and transmit signals through a transmitter to execute any one of the first aspect to the second aspect and any one of the first aspect to the second aspect.
  • processors there are one or more processors and one or more memories.
  • the memory may be integrated with the processor, or the memory and the processor may be provided separately.
  • the memory can be a non-transitory (non-transitory) memory, such as a read only memory (ROM), which can be integrated with the processor on the same chip, or can be set in different On the chip, the embodiment of the present application does not limit the type of memory and the setting mode of the memory and the processor.
  • ROM read only memory
  • sending measurement configuration information may be a process of outputting measurement configuration information from the processor
  • receiving information may be a process of receiving information by the processor.
  • the processed output data may be output to the transmitter, and the input data received by the processor may come from the receiver.
  • the transmitter and receiver can be collectively referred to as a transceiver.
  • the processing device in the above eighth aspect may be a chip, and the processor may be implemented by hardware or software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, etc.; when implemented by software
  • the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory.
  • the memory may be integrated in the processor, may be located outside the processor, and exist independently.
  • a computer program product includes: a computer program (also called code, or instruction), which when the computer program is run, causes the computer to execute the first to second aspects above And the method in any one of the possible implementation manners of the first aspect to the second aspect.
  • a computer program also called code, or instruction
  • a computer-readable medium stores a computer program (also called code, or instruction) when it runs on a computer, so that the computer executes the first to second aspects above.
  • a computer program also called code, or instruction
  • a communication system including the aforementioned network equipment and terminal equipment.
  • Figure 1 is a schematic diagram of a communication system applicable to the present application
  • Figure 2 is a schematic diagram of a four-step random access type random access process
  • Figure 3 is a schematic diagram of a two-step random access type random access process
  • Fig. 4 is a schematic flowchart of the random access method provided by the present application.
  • Fig. 5 is a schematic structural diagram of a communication device provided by the present application.
  • FIG. 6 is a schematic structural diagram of a terminal device provided by this application.
  • Fig. 7 is a schematic structural diagram of a network device provided by this application.
  • the technical solutions of the embodiments of the present application can be applied to various communication systems, such as: LTE time division duplex (TDD), universal mobile telecommunication system (UMTS), and worldwide interconnected microwave access (worldwide interoperability) for microwave access, WiMAX) communication system, the future 5th generation (5G) system or new radio (NR), etc.
  • TDD time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX worldwide interconnected microwave access
  • WiMAX worldwide interconnected microwave access
  • 5G future 5th generation
  • NR new radio
  • the terminal equipment in the embodiments of this application may refer to user equipment, access terminals, user units, user stations, mobile stations, mobile stations, remote stations, remote terminals, mobile equipment, user terminals, terminals, wireless communication equipment, user agents, or User device.
  • the terminal device can also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), with wireless communication Functional handheld devices, computing devices, or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in the future 5G network or future evolution of the public land mobile network (PLMN) Terminal equipment, etc., this embodiment of the present application does not limit this.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • the network device in the embodiment of the present application may be any device with a wireless transceiver function.
  • This equipment includes but is not limited to: baseband unit (BBU), access point (AP) in wireless fidelity (WIFI) system, wireless relay node, wireless backhaul node, transmission point (transmission point, TP) or transmission and reception point (transmission and reception point, TRP), etc.
  • BBU baseband unit
  • AP access point
  • WIFI wireless fidelity
  • WIFI wireless fidelity
  • WIFI wireless fidelity
  • TP wireless backhaul node
  • transmission point transmission point
  • TP transmission and reception point
  • TRP transmission and reception point
  • the gNB may include a centralized unit (CU) and DU.
  • the gNB may also include an active antenna unit (AAU).
  • CU implements part of the functions of gNB
  • DU implements part of the functions of gNB.
  • the CU is responsible for processing non-real-time protocols and services, and implements radio resource control (radio resource control, RRC), packet data convergence protocol (packet data convergence protocol, PDCP) layer functions.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • the DU is responsible for processing physical layer protocols and real-time services, and realizes the functions of the radio link control (RLC) layer, media access control (MAC) layer, and physical (PHY) layer.
  • RLC radio link control
  • MAC media access control
  • PHY physical
  • the network device may be a device that includes one or more of a CU node, a DU node, and an AAU node.
  • the CU can be divided into network equipment in an access network (radio access network, RAN), or the CU can be divided into network equipment in a core network (core network, CN), which is not limited in this application.
  • FIG. 1 is an architecture diagram of a communication system applicable to an embodiment of the present application.
  • the wireless communication system may include at least one network device 101, and the network device 101 communicates with one or more terminal devices (for example, the terminal device 102 and the terminal device 103 shown in FIG. 1).
  • the network device When a network device sends a signal, the network device is the transmitter and the terminal device is the receiver. Conversely, when a terminal device sends a signal, the terminal device is the transmitter and the network device is the receiver.
  • the terminal device After the terminal device selects a suitable cell and completes camping, it can perform random access.
  • FIG 2 is a schematic diagram of a four-step random access type random access process.
  • the terminal device sends a message 1 (message 1, abbreviated as msg 1) to the network device, and the message 1 is also a random access preamble.
  • the network device After detecting the random access preamble, the network device returns a response message, that is, message 2 (message 2), to the terminal device.
  • message 2 contains the uplink resources allocated by the network equipment to the terminal equipment.
  • the terminal device sends the message 3 on the uplink resource indicated by the message 2. If the network device can correctly decode message 3 (message 3), it returns message 4 (message 4) to the terminal device, and message 4 is used to notify the terminal device that the competition succeeded. After the above 4 steps, the random access procedure is successful.
  • MTC machine type communication
  • NB-IoT narrowband internet of things
  • FIG 3 is a schematic diagram of a two-step random access type random access process.
  • the terminal equipment simultaneously carries the random access preamble and data (that is, preamble+data) in the message A.
  • the data part is usually a radio resource control (radio resource control, RRC) message.
  • RRC radio resource control
  • the network device successfully decodes message A and returns message B to the terminal device.
  • Message B includes both the response to the random access preamble and the response to the data.
  • the response to the random access preamble is also a random access response (RAR).
  • RAR random access response
  • the response to data is usually an RRC message.
  • the two responses can be sent at the same time or one after the other.
  • the terminal device can decode the two parts of the response independently. After receiving the message B, the terminal device learns that the random access is successful. If there is a conflict between the terminal devices, the network device may not be able to successfully decode the data in the message A, and the network device does not send the message B to the terminal device at this time. After sending the message A, the terminal device waits for a time window. If the message B is not received, it is considered that the random access has failed.
  • the terminal device sends the message A at the sending occasion configured for the two-step random access, that is, it includes the random access preamble and data. If the network device can only successfully decode the random access preamble, but cannot successfully decode the data, the network device only replies to the terminal device with RAR, and does not reply to the data. After receiving the RAR, the terminal device falls back to the four-step random access process, that is, the terminal device resends message 1 or message 3. This process is called two-step random access fallback to four-step random access.
  • the network equipment can configure the random access preamble for four-step random access and the random access preamble for two-step random access at the same time.
  • the terminal device cannot determine what type of Random access.
  • this application provides a random access method, aiming at the terminal device to determine what type of random access is performed.
  • the terminal device can choose to use two Two-step random access preamble for two-step random access, or the terminal device can randomly select a random access preamble from the configured two-step random access preamble and four-step random access preamble, and perform the corresponding type Random access.
  • the random access method provided in this application will be described in detail with reference to FIG. 4.
  • the execution subject is a terminal device or a network device as an example.
  • operations performed by the terminal device may also be performed by a chip configured in the terminal device
  • operations performed by a network device may also be performed by a chip configured in the network device.
  • FIG. 4 is a schematic flowchart of a random access method 400 provided in this application.
  • the method 400 mainly includes S410 to S420. The steps are described below.
  • S410 The terminal device determines a random access preamble.
  • S420 The terminal device uses the determined random access preamble to perform random access.
  • the random access preamble determined by the terminal device is recorded as: the target random access preamble.
  • the target random access preamble is at least one determined from the two-step random access preamble configured by the network device.
  • the target random access preamble is one determined from the two-step random access preamble configured by the network device and the four-step random access preamble configured by the network device, that is, the target random access preamble is two One of one-step random access preamble and four-step random access preamble.
  • the number of two-step random access preambles configured by the network device is at least one, and the number of four-step random access preambles configured by the network device is at least one.
  • the two-step random access preamble is used for two-step random access
  • the four-step random access preamble is used for four-step random access.
  • the terminal device performs a two-step random access. If the target random access preamble determined by the terminal device is a four-step random access preamble, the terminal device performs a four-step random access.
  • the terminal device when the network equipment is configured with a random access preamble for four-step random access and a random access preamble for two-step random access, the terminal device can choose to use two Two-step random access preamble for two-step random access, or the terminal device can randomly select a random access preamble from the configured two-step random access preamble and four-step random access preamble, and perform the corresponding type Random access.
  • the method may further include:
  • S402 The network device generates configuration information
  • S404 The network device sends configuration information to the terminal device.
  • the terminal device receives the configuration information sent by the network device.
  • the network device may configure a reference signal set through the configuration information or other configuration information, and the reference signal set may include an SSB set and a CSI-RS set.
  • the network device can configure the RACH resource corresponding to each SSB in the SSB set and the RACH resource corresponding to each CSI-RS in the CSI-RS set through the configuration information.
  • the network device can configure the RACH resources corresponding to any two SSBs or CSI-RSs to be the same or different.
  • the network device can configure the random access code corresponding to any SSB to be different or the same.
  • the RACH resources corresponding to each SSB may include two-step RACH resources and four-step RACH resources.
  • the RACH resources corresponding to some SSBs may include two-step RACH resources, and the RACH resources corresponding to other SSBs may include four-step RACH resources.
  • the two-step RACH resource includes two-step random access preamble and two-step random access transmission timing, and the two-step random access transmission timing is used to send the two-step random access preamble.
  • the four-step RACH resource includes the four-step random access preamble and the four-step random access transmission timing, and the four-step random access transmission timing is used to send the four-step random access preamble.
  • the transmission timing includes at least one of time domain resources and frequency domain resources.
  • the transmission timing of two-step random access and the transmission timing of four-step random access can be shared, that is, the configured transmission timing of two-step random access and the transmission timing of four-step random access are the same, but this application There is no restriction on this.
  • the transmission timing of the two-step random access is not explicitly configured, but the two-step random access preamble is configured, the transmission timing of the two-step random access and the configured four-step random access are considered The timing of sending is the same.
  • the two-step random access preamble has no explicit indication, it is considered that the two-step random access preamble is the same as the four-step random access preamble. For example, if the two-step random access preamble is not explicitly configured, but the transmission timing of the two-step random access is configured, it is considered that the two-step random access preamble is the same as the configured four-step random access preamble.
  • the transmission timing of the two-step random access and the transmission timing of the four-step random access configured by the network device may be different or the same.
  • the configurable two-step random access preamble and the four-step random access preamble are different.
  • this application does not exclude the situation that the transmission timing of the two-step random access and the four-step random access configured by the network device are the same, and the two-step random access preamble is the same as the four-step random access preamble.
  • this article only uses the corresponding transmission timing and random access preamble for each SSB as an example. In fact, some SSBs may not have the corresponding transmission timing, so there is no corresponding random access. Preamble.
  • Each SSB corresponds to at least one transmission timing, and the transmission timings corresponding to any two SSBs are the same, or the transmission timings corresponding to any two SSBs are different. It should be understood that the different transmission timings corresponding to any two SSBs means that there is no intersection between the transmission timings corresponding to any two SSBs. The following similar expressions also have similar meanings, and will not be described below. In the case where the sending timings corresponding to any two SSBs are different, the number of sending timings corresponding to any two SSBs may be equal or different. Each SSB corresponds to at least one two-step random access preamble and at least one four-step random access preamble.
  • the at least one two-step random access preamble is different from the at least one four-step random access preamble. There is no intersection between a two-step random access preamble and the at least one four-step random access preamble.
  • the number of two-step random access preambles and the number of four-step random access preambles corresponding to one SSB can be equal or different.
  • the two-step random access preamble corresponding to any two SSBs can be the same or different.
  • the number of two-step random access preambles corresponding to any two SSBs can be equal or unequal.
  • the four-step random access preamble corresponding to any two SSBs can be the same or different.
  • the number of four-step random access preambles corresponding to any two SSBs can be equal or different.
  • the two-step random access preamble and the four-step random access preamble corresponding to one SSB can share the transmission timing corresponding to the SSB.
  • the SSB set includes 4 SSBs as an example.
  • Table 1 shows that different SSBs correspond to different transmission occasions, different two-step random access preambles, and different four-step random access preambles.
  • Table 2 shows a situation where different SSBs correspond to different transmission occasions, the same two-step random access preamble and the same four-step random access preamble. It should be understood that different SSBs can also correspond to the same two-step random access preamble and correspond to different four-step random access preambles. Alternatively, different SSBs may correspond to different two-step random access preambles and correspond to the same four-step random access preamble.
  • Table 3 shows that different SSBs correspond to the same transmission timing, different two-step random access preambles, and different four-step random access preambles.
  • Table 4 shows that different SSBs correspond to the same transmission timing, the same two-step random access preamble, and the same four-step random access preamble.
  • Each SSB corresponds to at least one random access preamble.
  • the at least one random access preamble can be used for two-step random access or four-step random access, that is, at least one random access preamble corresponding to one SSB
  • the code is shared by two-step random access and four-step random access.
  • the random access preambles corresponding to any two SSBs may be the same or different. In different situations, the number of random access preambles corresponding to any two SSBs may be the same or different.
  • Each SSB corresponds to at least one sending opportunity for two-step random access and at least one sending opportunity for four-step random access.
  • the transmission timing of the at least one two-step random access and the transmission timing of the at least one four-step random access are different.
  • the number of transmission opportunities for two-step random access and four-step random access corresponding to one SSB can be equal or different.
  • the sending timing of the two-step random access corresponding to any two SSBs may be the same or different.
  • the number of transmission opportunities for two-step random access corresponding to any two SSBs can be equal or unequal.
  • the sending timing of the four-step random access corresponding to any two SSBs may be the same or different.
  • the number of four-step random access transmission opportunities corresponding to any two SSBs can be equal or unequal.
  • the transmission timing of the two-step random access and the transmission timing of the four-step random access corresponding to one SSB can share the random access preamble corresponding to the SSB.
  • Table 5 shows a situation where the transmission timing of two-step random access and the transmission timing of four-step random access correspond to the same random access preamble.
  • Table 6 shows another case where the transmission timing of the two-step random access and the transmission timing of the four-step random access correspond to the same random access preamble.
  • Table 7 shows the situation where the transmission timing of two-step random access and the transmission timing of four-step random access correspond to different random access preambles.
  • the random access preamble corresponding to a part of the SSB in the SSB set is a two-step random access preamble, and the random access preamble corresponding to the other part of the SSB is a four-step random access preamble.
  • the number of SSBs corresponding to the two-step random access preamble and the number of SSBs corresponding to the four-step random access preamble may be equal or different.
  • each SSB corresponds to at least one transmission occasion, and the transmission occasions corresponding to any two SSBs are the same.
  • the random access preambles corresponding to different SSBs are different.
  • the number of random access preambles corresponding to any two SSBs can be equal or unequal.
  • Table 8 shows that different SSBs correspond to the same transmission timing and different random access preambles.
  • each SSB corresponds to at least one transmission opportunity, and the transmission opportunities corresponding to any two SSBs are different, and the number of transmission opportunities corresponding to any two SSBs may be equal or different.
  • the random access preambles corresponding to different SSBs are different. The number of random access preambles corresponding to any two SSBs can be equal or unequal.
  • Table 9 shows a situation where different SSBs correspond to different transmission occasions and different random access preambles.
  • each SSB corresponds to at least one transmission opportunity, and the transmission opportunities corresponding to any two SSBs are different, and the number of transmission opportunities corresponding to any two SSBs may be equal or different.
  • the random access preambles corresponding to different SSBs are the same, that is, the same random access preamble has different functions when corresponding to different SSBs.
  • Table 10 shows a situation where different SSBs correspond to different transmission timings and the same random access preamble.
  • each SSB corresponds to at least one transmission opportunity, and any two SSBs corresponding to the two-step random access preamble have the same two-step random access preamble and correspond to the two-step random access preamble.
  • Any two SSBs of the incoming preamble correspond to different sending timings.
  • the number of sending occasions corresponding to any two SSBs corresponding to the two-step random access preamble can be equal or different.
  • the two-step random access preamble is different from the four-step random access preamble.
  • the correspondence between the four-step random access preamble, the transmission timing and the SSB is not limited.
  • the four-step random access preamble corresponding to any two SSBs corresponding to the four-step random access preamble is the same, and the sending timings corresponding to any two SSBs corresponding to the four-step random access preamble are different.
  • the number of sending opportunities corresponding to any two SSBs corresponding to the four-step random access preamble may be equal or different.
  • the two-step RACH resource configuration mode can be interchanged with the four-step RACH resource configuration mode.
  • Table 11 shows that SSBs corresponding to the same type of random access preamble correspond to different transmission occasions and the same random access preamble.
  • each SSB corresponds to at least one transmission opportunity
  • any two SSBs corresponding to the two-step random access preamble correspond to the same transmission time, and correspond to any of the two-step random access preamble.
  • the random access preambles corresponding to the two SSBs are different.
  • the number of random access preambles corresponding to any two SSBs corresponding to the two-step random access preamble can be equal or different.
  • the transmission timing of the two-step random access is different from the transmission timing of the four-step random access.
  • the correspondence between the four-step random access preamble, the transmission timing and the SSB is not limited.
  • the sending timing of the four-step random access corresponding to any two SSBs corresponding to the four-step random access preamble is the same, and any two SSBs corresponding to the four-step random access random access preamble correspond to The random access preamble is different.
  • the number of random access preambles corresponding to any two SSBs corresponding to the four-step random access preamble may be equal or different.
  • Table 12 shows a situation where SSBs corresponding to the same type of random access preamble correspond to different random access preambles and the same transmission timing.
  • the random access preamble corresponding to each SSB includes a two-step random access preamble and a four-step random access preamble.
  • each SSB only corresponds to one of the two-step random access preamble and the four-step random access preamble.
  • the target random access preamble determined in S210 is selected from the two-step random access preamble configured by the network device.
  • the terminal device determines the target random access preamble from the two-step random access preamble configured by the network device.
  • the two-step random access preamble configured by the network device corresponds to at least one first data volume threshold, and each first data volume threshold corresponds to a second signal strength threshold.
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble.
  • the terminal device determines the random access preamble, including:
  • the target random access preamble is determined from the two-step random access preamble corresponding to the target reference signal.
  • the target second signal strength threshold is the second signal strength threshold corresponding to the first data amount threshold corresponding to the amount of data to be transmitted.
  • the target random access preamble supports the amount of data to be transmitted. Further, the first data volume threshold corresponding to the target random access preamble is the first data volume threshold corresponding to the target second signal strength threshold.
  • the RSRP corresponding to the reference signal refers to the RSRP obtained by measuring the reference signal.
  • the two-step random access preamble configured by the network device corresponds to at least one first data volume threshold.
  • a first data volume threshold corresponds to a set of two-step random access preambles
  • any two first data volume thresholds correspond to The two groups of two-step random access preambles are different.
  • the maximum amount of data sent by the two-step random access preamble in a group of two-step random access preamble is the first data corresponding to the group of two-step random access preamble.
  • the amount threshold is the first data corresponding to the group of two-step random access preamble.
  • the random access preamble corresponds to the TBS, and its meaning is that when the amount of data to be sent is less than (or, less than or equal to) the TBS, the random access preamble corresponding to the TBS can be used. Therefore, the amount of data supported by a random access preamble refers to the TBS corresponding to the PUSCH resource corresponding to the random access preamble.
  • At least one reference signal is an SSB set or a CSI-RS set configured by a network device.
  • the first data volume threshold corresponding to the SSB set and the first data volume threshold corresponding to the CSI-RS set may be configured by the network device through the configuration information.
  • the first data volume threshold corresponding to the SSB set and the first data volume threshold corresponding to the CSI-RS set may be based on the modulation and coding strategy (modulation and coding scheme, MCS) of the PUSCH resource configured by the network device through the configuration information. )
  • MCS modulation and coding scheme
  • the size of the PUSCH frequency domain resource are resources for sending data to be transmitted.
  • the second signal strength threshold corresponding to the SSB set and the second signal strength threshold corresponding to the CSI-RS set may be configured by the network device through the configuration information, but this application does not limit this.
  • the second signal strength threshold corresponding to the SSB set and the second signal strength threshold corresponding to the CSI-RS set may be equal or different.
  • the first signal strength threshold corresponding to the SSB set and the first signal strength threshold corresponding to the CSI-RS set may be equal or different.
  • the first signal strength threshold is less than the second signal strength threshold.
  • the first signal strength threshold may be a condition for selecting a four-step RACH random access preamble in the prior art or a condition for selecting an SSB in the prior art. For details, refer to the prior art. It should be understood that the description of any concept, word, or term here is also applicable to any of the following methods. Therefore, when describing other methods of determining the target random access preamble, the same concept, word, or Terminology for description.
  • PUSCH resources can be configured by PUSCH resource configuration information.
  • PUSCH resource configuration information can include PUSCH time domain and frequency domain resources, demodulation reference signal (DMRS), the number of repeated transmissions, MCS, PUSCH initial transmission power, PUSCH target reception power, and increase in PUSCH transmission power At least one of the step size and the relative power deviation of the random access preamble (ie, ⁇ 1 in the following).
  • the initial PUSCH transmission power may be the transmission power of the PUSCH when the message A is initially transmitted.
  • the PUSCH target received power is the received power of the PUSCH expected by the network device, and the terminal device determines the PUSCH transmit power of the message A according to this value and path loss.
  • the step size of the increase of PUSCH transmission power refers to the step size of the increase of the power of the terminal device when the message A is retransmitted.
  • the relative power deviation of the random access preamble is the difference ( ⁇ 1) between the transmission power of the PUSCH part of the message A and the transmission power of the random access preamble of the message A (ie, TP hereinafter).
  • the transmission power of the PUSCH part of message A is determined according to this deviation and the transmission power of the random access preamble part of message A.
  • the transmission power of the random access preamble part of message A is determined according to the path loss and the target reception power of the random access preamble part of message A configured by the network device.
  • the first signal strength threshold corresponding to the SSB set is denoted as: the first SSB-RSRP threshold; the first signal strength threshold corresponding to the CSI-RS set is denoted as: the first CSI-RS-RSRP Threshold; the second signal strength threshold corresponding to the SSB set is recorded as: the second SSB-RSRP threshold; the second signal strength threshold corresponding to the CSI-RS set is recorded as: the second CSI-RS-RSRP threshold.
  • the second signal strength threshold may be a condition for selecting a two-step RACH random access preamble or a condition for selecting an SSB in this application.
  • the number of the first data amount threshold is 1 and 2 respectively to describe the method A.
  • the number of the first data amount threshold is 1.
  • the first data amount threshold configured when the number of the first data amount threshold is 1 is denoted as: TBS#1 in the following.
  • the terminal device may first determine whether there is an SSB whose corresponding RSRP is greater than the first SSB-RSRP threshold in the configured SSB set, and if it exists, it may randomly select one from the SSB whose corresponding RSRP is greater than the first SSB-RSRP threshold SSB, use the selected SSB as the target SSB.
  • the terminal device determines whether the amount of data to be transmitted is less than or equal to TBS#1. If the amount of data to be transmitted is greater than TBS#1, it means that two-step random access cannot be performed. If the amount of data to be transmitted is less than or equal to TBS#1, the terminal device determines whether the RSRP of the target SSB is greater than the second SSB-RSRP threshold. If the RSRP of the target SSB is greater than the second SSB-RSRP threshold, it is determined whether the random access preamble corresponding to the target SSB includes a two-step random access preamble that meets the conditions.
  • the two-step random access preamble corresponding to the target SSB can be In the random access preamble, at least one random access preamble among the two-step random access preamble that meets the condition is determined as the target random access preamble.
  • the two-step random access preamble that meets the conditions refers to a two-step random access preamble that supports the amount of data to be transmitted, or the corresponding first data amount threshold is the target second signal
  • the first data volume threshold corresponding to the data volume to be transmitted is TBS#1
  • the target second signal strength threshold is the second SSB-RSRP threshold, which meets the conditions
  • the two-step random access preamble is the two-step random access preamble whose maximum supported data volume is TBS#1.
  • a two-step random access preamble supports the amount of data to be transmitted can be understood as the first data amount threshold corresponding to the two-step random access preamble is greater than or equal to the amount of data to be transmitted.
  • TBS#1 and TBS#2 the two first data volume thresholds when the number of the first data volume threshold is 2 are respectively denoted as: TBS#1 and TBS#2. Among them, TBS#1 ⁇ TBS#2. TBS#1 corresponds to the second SSB-RSRP threshold #1, and TBS#2 corresponds to the second SSB-RSRP threshold #2.
  • the terminal device can first determine whether there is an SSB with a corresponding RSRP greater than the first SSB-RSRP threshold in the configured SSB set, and if it exists, it can use the corresponding RSRP
  • One SSB is randomly selected among the SSBs greater than the first SSB-RSRP threshold, and the selected SSB is used as the target SSB.
  • the terminal device determines whether the amount of data to be transmitted is less than or equal to TBS#1, or whether it is less than or equal to TBS#2.
  • TBS#2 If the amount of data to be transmitted is greater than TBS#2, it means that two-step random access cannot be performed.
  • the terminal device determines whether the RSRP of the target SSB is greater than the second SSB-RSRP threshold #1. If the RSRP of the target SSB is greater than the second SSB-RSRP threshold #1, it is determined whether the random access preamble corresponding to the target SSB includes a two-step random access preamble that meets the conditions. If it is included, the target SSB corresponding to the At least one random access preamble satisfying the condition in the two-step random access preamble is determined as the target random access preamble.
  • the target random The access preamble can be a random access preamble in preamble group #1, or a random access preamble in preamble group #2.
  • the target random access preamble is a random access preamble selected from preamble group #1.
  • the terminal device determines whether the RSRP of the target SSB is greater than the second SSB-RSRP threshold #2. If the RSRP of the target SSB is greater than the second SSB-RSRP threshold #2, it is judged whether the random access preamble corresponding to the target SSB includes a two-step random access preamble that satisfies the conditions. If included, the target SSB corresponding to the In the two-step random access preamble, at least one random access preamble that satisfies the condition is determined as the target random access preamble.
  • the target random access preamble can only be the random access preamble in the preamble group #2.
  • the number of the first data volume threshold is a value greater than or equal to 2, it is assumed that the at least one first data volume threshold is in descending order, TBS#1, TBS#2, TBS#3,... ... and the second signal strength thresholds corresponding to the at least one first data volume threshold in sequence are the second SSB-RSRP threshold #1, the second SSB-RSRP threshold #2, the second SSB-RSRP threshold #3, ...
  • the second signal strength threshold corresponding to any first data amount threshold TBS#i is the second SSB-RSRP threshold #i, then, if the amount of data to be transmitted is less than or equal to TBS#1, the amount of data to be transmitted corresponds to The first data volume threshold is TBS#1, and the target second signal strength threshold is the second SSB-RSRP threshold #1. If the amount of data to be transmitted is greater than TBS#i and less than or equal to TBS#(i+1), the first data amount threshold corresponding to the amount of data to be transmitted is TBS#(i+1), the target second signal strength threshold Is the second SSB-RSRP threshold #(i+1).
  • the number of the first data volume threshold is 2
  • the first data volume threshold corresponding to the data volume to be transmitted is TBS#1
  • the target second signal strength threshold It is the second SSB-RSRP threshold #1.
  • the amount of data to be transmitted is greater than TBS#1 and less than or equal to TBS#2
  • the first data amount threshold corresponding to the amount of data to be transmitted is TBS#2
  • the target second signal strength threshold is the second SSB-RSRP threshold# 2.
  • the reference signal is an SSB as an example for description.
  • the reference signal is a CSI-RS
  • the target random access preamble can be determined in a similar manner, which is not repeated here.
  • the two-step random access preamble configured by the network device corresponds to at least one first data volume threshold, and each first data volume threshold corresponds to a second signal strength threshold.
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble.
  • the terminal device determines the random access preamble, including:
  • the corresponding RSRP is greater than A target reference signal is selected from the reference signals of the second signal strength threshold; the target random access preamble is determined from the two-step random access preamble corresponding to the target reference signal.
  • the definition of the target second signal strength threshold can refer to Method A.
  • the target random access preamble supports the amount of data to be transmitted.
  • the first data volume threshold corresponding to the target random access preamble is the first data volume threshold corresponding to the target second signal strength threshold.
  • the number of the first data amount threshold is 1 and 2 respectively, and the method B is described.
  • the number of the first data amount threshold is 1.
  • the terminal device may first determine whether the amount of data to be transmitted is less than or equal to TBS#1. If the amount of data to be transmitted is less than or equal to TBS#1, the terminal device determines whether there is an SSB with a corresponding RSRP greater than the second SSB-RSRP threshold in the SSB set. If there is, it can be determined from the corresponding RSRP greater than the second SSB-RSRP threshold Randomly select one SSB as the target SSB among the SSBs. Then, the terminal device determines whether the random access preamble corresponding to the target SSB includes the two-step random access preamble that meets the conditions. If it does, it can select the two-step random access preamble corresponding to the target SSB that meets the conditions. At least one random access preamble is determined as the target random access preamble.
  • the terminal device may first determine whether the amount of data to be transmitted is less than or equal to TBS#1, or whether it is less than or equal to TBS#2. If the amount of data to be transmitted is less than or equal to TBS#1, the terminal device determines whether there is an SSB with a corresponding RSRP greater than the second SSB-RSRP threshold #1 in the SSB set. If it exists, it can be determined from the corresponding RSRP greater than the second SSB. -RSRP threshold #1 SSB is randomly selected as the target SSB. Then, the terminal device determines whether the random access preamble corresponding to the target SSB includes the two-step random access preamble that meets the conditions.
  • the terminal device determines whether there is an SSB with a corresponding RSRP greater than the second SSB-RSRP threshold #2 in the SSB set, and if it exists, it can One SSB is randomly selected as the target SSB from the SSBs whose corresponding RSRP is greater than the second SSB-RSRP threshold #2.
  • the terminal device determines whether the random access preamble corresponding to the target SSB includes the two-step random access preamble that meets the conditions. If it does, it can select the two-step random access preamble corresponding to the target SSB that meets the conditions. At least one random access preamble is determined as the target random access preamble.
  • method B can directly select the target SSB from the SSB greater than the second SSB-RSRP threshold, while method A needs to first select the target from the SSB greater than the first SSB-RSRP threshold SSB. Compared with method A, method B is more efficient.
  • the target random access preamble can be determined. If there is a target SSB, and if the correspondence between the reference signal and the RACH resource is correspondence three, the target random access preamble may not be determined.
  • the correspondence between the reference signal and the RACH resource is shown in Table 8, and the selected target SSB is the SSB with ID 2. Since the SSB with ID 2 only corresponds to the four-step random access preamble, the target cannot be determined Random access preamble, in other words, there is no target random access preamble.
  • the two-step random access preamble configured by the network device corresponds to at least one first data volume threshold, and each first data volume threshold corresponds to a second signal strength threshold.
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble.
  • the terminal device determines the random access preamble, including:
  • the first signal strength threshold reference signal has a corresponding RSRP greater than the target second signal strength threshold.
  • the target reference signal is determined from the reference signal whose RSRP is greater than the target second signal strength threshold, and the target reference signal is At least one two-step random access preamble that meets the condition is determined as the target random access preamble.
  • the target reference signal may be a reference signal whose corresponding RSRP is greater than the target second signal strength threshold and the corresponding random access preamble includes a two-step random access preamble that meets the condition.
  • the definition of the target second signal strength threshold can refer to Method A.
  • the number of the first data amount threshold is 1 and 2 respectively, and the method C is described.
  • the number of the first data amount threshold is 1.
  • the terminal device may first determine whether the configured SSB set includes the first set, and whether the amount of data to be transmitted is less than or equal to TBS#1, and the RSRP of any SSB in the first set is greater than the SSB with the first SSB-RSRP threshold .
  • the terminal device determines whether there is an SSB with a corresponding RSRP greater than the second SSB-RSRP threshold in the first set, and if so, then Then determine whether the random access preambles corresponding to the SSBs whose corresponding RSRP is greater than the second SSB-RSRP threshold include a two-step random access preamble that meets the conditions.
  • a corresponding random access preamble can be randomly selected
  • the preamble includes the SSB of the two-step random access preamble that meets the conditions as the target SSB, and at least one random access preamble that meets the conditions among the two-step random access preambles corresponding to the target SSB is determined as the target random access preamble code.
  • the terminal device may first determine whether the configured SSB set includes the first set, and if it does, then determine whether the amount of data to be transmitted is less than or equal to TBS#1, or whether it is less than or equal to TBS#2.
  • the terminal device determines whether the corresponding RSRP in the SSB set is greater than the first SSB-RSRP threshold #1 in the SSB, whether there is a corresponding RSRP greater than the second SSB-RSRP threshold #1 If the SSB exists, then determine whether the random access preambles corresponding to the SSBs whose corresponding RSRP is greater than the second SSB-RSRP threshold #1 include a two-step random access preamble that meets the conditions.
  • the terminal device determines whether the corresponding RSRP in the SSB set is greater than the first SSB-RSRP threshold #2, whether there is a corresponding RSRP greater than If the SSB of the second SSB-RSRP threshold #2 exists, then it is determined whether the random access preambles corresponding to the SSBs whose corresponding RSRP is greater than the second SSB-RSRP threshold #2 include a two-step random access that meets the conditions.
  • the two-step random access preamble configured by the network device corresponds to at least one first data volume threshold, and each first data volume threshold corresponds to a second signal strength threshold.
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble.
  • the terminal device determines the random access preamble, including:
  • the target reference signal is determined from the reference signal of the target second signal strength threshold, and at least one two-step random access preamble meeting the condition in the target reference signal is determined as the target random access preamble.
  • the target reference signal may be a reference signal whose corresponding RSRP is greater than the target second signal strength threshold and the corresponding random access preamble includes a two-step random access preamble that meets the condition.
  • the definition of the target second signal strength threshold can refer to Method A.
  • the number of the first data amount threshold is 1 and 2 respectively, and the method D is described.
  • the number of the first data amount threshold is 1.
  • the terminal device may first determine whether the amount of data to be transmitted is less than or equal to TBS#1. If the amount of data to be transmitted is less than or equal to TBS#1, the terminal device determines whether there are SSBs whose corresponding RSRP is greater than the second SSB-RSRP threshold in the SSB set, and if so, then determines that these corresponding RSRPs are greater than the second SSB-RSRP Whether the random access preamble corresponding to the threshold SSB includes a two-step random access preamble, if it is included, a corresponding random access preamble can be randomly selected including the SSB of the two-step random access preamble that meets the conditions As the target SSB, at least one random access preamble that satisfies the condition among the two-step random access preambles corresponding to the target SSB is determined as the target random access preamble. .
  • the terminal device may first determine whether the amount of data to be transmitted is less than or equal to TBS#1, or whether it is less than or equal to TBS#2. If the amount of data to be transmitted is less than or equal to TBS#1, the terminal device determines whether there are SSBs in the SSB set whose corresponding RSRP is greater than the second SSB-RSRP threshold #1.
  • a corresponding random access preamble can be randomly selected to include two that meet the conditions
  • the SSB of the random access preamble is used as the target SSB, and at least one random access preamble that meets the condition among the two random access preambles corresponding to the target SSB is determined as the target random access preamble.
  • the terminal device determines whether there is an SSB with a corresponding RSRP greater than the second SSB-RSRP threshold #2 in the SSB set, and if it exists, continue Determine whether the random access preambles corresponding to the SSBs whose corresponding RSRP is greater than the second SSB-RSRP threshold #2 include a two-step random access preamble that satisfies the conditions. If included, a corresponding random access preamble can be randomly selected.
  • the incoming preamble includes the SSB of the two-step random access preamble that meets the conditions as the target SSB, and at least one random access preamble that meets the conditions in the two-step random access preamble corresponding to the target SSB is determined as the target random access Preamble.
  • method D can directly determine the SSB in the SSB set that is greater than the second SSB-RSRP threshold, while method C needs to first determine all SSBs that are greater than the first SSB-RSRP threshold from the SSB set. , And then determine the SSB greater than the second SSB-RSRP threshold from all SSBs greater than the first SSB-RSRP threshold.
  • method D is more efficient.
  • the SSB including the two-step random access preamble may be able to Determine the target random access preamble.
  • the two-step random access preamble configured by the network device corresponds to at least one first data volume threshold, and each first data volume threshold corresponds to a PL1, and PL1 is the first path loss threshold.
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble.
  • the terminal device determines the random access preamble, including:
  • the target random access preamble is determined from the two-step random access preamble corresponding to the target reference signal.
  • the target random access preamble supports the amount of data to be transmitted.
  • the first data volume threshold corresponding to the target random access preamble is the first data volume threshold corresponding to the target second signal strength threshold.
  • PL1 PCMAX-TP- ⁇ 1
  • PL1 is the first path loss threshold
  • PCMAX is the maximum transmit power of the cell where the terminal device performs random access
  • TP is the target received power of the two-step random access preamble
  • ⁇ 1 is the power deviation between the data to be sent and the two-step random access preamble.
  • PCMAX, TP, and ⁇ 1 may be configured through the configuration information, or may be a protocol agreement, but this application does not limit this.
  • the target PL1 is the PL1 corresponding to the first data volume threshold corresponding to the data volume to be transmitted.
  • the path loss may be the difference between the RSRP of the reference signal sent by the network device and the RSRP measured by the terminal device.
  • the RSRP that the network device sends the reference signal may be configured by the network device to the terminal device.
  • the network device can directly configure PL1, or PL1 can be specified by the agreement.
  • the number of the first data amount threshold is 1 and 2 respectively to illustrate the method E.
  • the number of the first data amount threshold is 1.
  • the terminal device may first determine whether there is an SSB whose corresponding RSRP is greater than the first SSB-RSRP threshold in the configured SSB set, and if it exists, it may randomly select one from the SSB whose corresponding RSRP is greater than the first SSB-RSRP threshold SSB, use the selected SSB as the target SSB.
  • the terminal device determines whether the amount of data to be transmitted is less than or equal to TBS#1. If the amount of data to be transmitted is greater than TBS#1, it means that two-step random access cannot be performed. If the amount of data to be transmitted is less than or equal to TBS#1, the terminal device determines whether the path loss corresponding to the target SSB is less than the target PL1. If the path loss corresponding to the target SSB is less than the target PL1, it is determined whether the random access preamble corresponding to the target SSB includes a two-step random access preamble that meets the conditions. If it is included, the two-step random access corresponding to the target SSB can be At least one random access preamble that meets the condition among the incoming preambles is determined as the target random access preamble.
  • the two-step random access preamble that meets the conditions refers to a two-step random access preamble that supports the amount of data to be transmitted, or the corresponding first data amount threshold is corresponding to the target PL1
  • the two-step random access preamble of the first data volume threshold refers to a two-step random access preamble that supports the amount of data to be transmitted, or the corresponding first data amount threshold is corresponding to the target PL1
  • the two-step random access preamble of the first data volume threshold refers to a two-step random access preamble that supports the amount of data to be transmitted, or the corresponding first data amount threshold is corresponding to the target PL1
  • the two-step random access preamble of the first data volume threshold refers to a two-step random access preamble that supports the amount of data to be transmitted, or the corresponding first data amount threshold is corresponding to the target PL1
  • the first data volume threshold corresponding to the data volume to be transmitted is TBS#1
  • the target PL1 is the only one PL1
  • the code is a two-step random access preamble with the maximum supported data volume of TBS#1.
  • PL1 corresponding to TBS#1 is denoted as: PL1#1 in the following
  • PL1 corresponding to TBS#2 is denoted as: PL1#2.
  • the terminal device may first determine whether there is an SSB whose corresponding RSRP is greater than the first SSB-RSRP threshold in the configured SSB set, and if it exists, it may randomly select one from the SSB whose corresponding RSRP is greater than the first SSB-RSRP threshold SSB, use the selected SSB as the target SSB.
  • the terminal device determines whether the amount of data to be transmitted is less than or equal to TBS#1, or whether it is less than or equal to TBS#2.
  • TBS#2 If the amount of data to be transmitted is greater than TBS#2, it means that two-step random access cannot be performed.
  • the terminal device determines whether the path loss corresponding to the target SSB is less than PL1#1. If the path loss corresponding to the target SSB is less than PL1#1, it is determined whether the random access preamble corresponding to the target SSB includes a two-step random access preamble that meets the conditions. If it is included, the two-step random access preamble corresponding to the target SSB can be selected. At least one random access preamble that meets the condition among the access preambles is determined as the target random access preamble.
  • the terminal device determines whether the path loss corresponding to the target SSB is less than PL1#2. If the path loss corresponding to the target SSB is less than PL1#2, it is determined whether the random access preamble corresponding to the target SSB includes the two-step random access preamble that meets the conditions. If included, the two-step random access preamble corresponding to the target SSB can be selected. At least one random access preamble that meets the condition among the access preambles is determined as the target random access preamble.
  • the number of the first data volume threshold is a value greater than or equal to 2, it is assumed that the at least one first data volume threshold is in descending order, TBS#1, TBS#2, TBS#3,... ..., and the PL1 corresponding to the at least one first data volume threshold in turn is PL1#1, PL1#2, PL1#3, ..., and the PL1 corresponding to any first data volume threshold TBS#i is PL1#i, Then, if the amount of data to be transmitted is greater than 0 and less than or equal to TBS#1, the first data amount threshold corresponding to the amount of data to be transmitted is TBS#1, and the target PL1 is PL1#1.
  • the first data amount threshold corresponding to the amount of data to be transmitted is TBS#(i+1), and the target PL1 is PL1#( i+1).
  • the number of the first data volume threshold is 2, if the data volume to be transmitted is less than TBS#1, the first data volume threshold corresponding to the data volume to be transmitted is TBS#1, and the target PL1 is PL1#1 . If the amount of data to be transmitted is greater than TBS#1 and less than or equal to TBS#2, the first data amount threshold corresponding to the amount of data to be transmitted is TBS#2, and the target PL1 is PL1#2.
  • the two-step random access preamble configured by the network device corresponds to at least one first data volume threshold, and each first data volume threshold corresponds to a PL1, and PL1 is the first path loss threshold.
  • the first data volume threshold corresponding to a two-step random access preamble is the maximum transmission data volume supported by the two-step random access preamble.
  • the terminal device determines the random access preamble, including:
  • the RSRP of at least one reference signal is greater than the first signal strength threshold, and if the amount of data to be transmitted is less than or equal to one of the at least one first data amount threshold, and if the corresponding RSRP is greater than the first signal strength threshold
  • At least one two-step random access preamble is determined as the target random access preamble.
  • the target reference signal may be a reference signal in which the corresponding RSRP is greater than the first signal strength threshold and the corresponding path loss is less than the target PL1.
  • the corresponding random access preamble includes a two-step random access preamble that meets the conditions. Among them, refer to Method E for the definition of target PL1.
  • mode F is similar to mode C, and will not be repeated here.
  • the terminal determines the random access preamble, including:
  • At least one reference signal has a reference signal whose RSRP is greater than the first signal strength threshold, select a target reference signal from the reference signals whose RSRP is greater than the first signal strength threshold, and determine whether the first set of random access is configured.
  • the first set of random access preambles is configured, and the amount of data to be transmitted is greater than the second data amount threshold, and the path loss corresponding to the target reference signal is less than PL2, then the one from the target reference signal belongs to the first set of random The random access preamble in the access preamble determines the target random access preamble; or
  • the random access preambles in the second group of random access preambles corresponding to the target reference signal Determine the target random access preamble in the middle;
  • the path loss corresponding to the target reference signal is greater than or equal to PL2
  • the amount of transmitted data supported by the first group of random access preambles is greater than the second data amount threshold, and the maximum amount of transmitted data supported by the second group of random access preambles is the second data amount threshold.
  • the first group of random access preambles and the second group of random access preambles are two-step random access preambles.
  • PL2 PCMAX-TP- ⁇ 1- ⁇ 2
  • PL2 is the second path loss threshold
  • PCMAX is the maximum transmit power of the terminal device in the cell performing random access
  • TP is the preamble of the random access preamble for two-step random access Target received power
  • ⁇ 1 is the power deviation between the data to be sent and the two-step random access preamble
  • ⁇ 2 is the power deviation between the first group of random access preambles and the second group of random access preambles.
  • the first group of random access preambles, the second group of random access preambles, PCMAX, TP, ⁇ 1, and ⁇ 2 can be configured through the configuration information, but this application does not limit this.
  • the first group of random access preambles and the second group of random access preambles are two-step random access preambles.
  • At least one reference signal is an SSB set or a CSI-RS set configured by a network device.
  • the second data volume threshold corresponding to the SSB set and the second data volume threshold corresponding to the CSI-RS set may be configured by the network device through the configuration information.
  • the second data volume threshold corresponding to the SSB set and the second data volume threshold corresponding to the CSI-RS set may be determined by the size of the MCS of the PUSCH resource and the PUSCH frequency domain resource configured by the network device through the configuration information.
  • the terminal device determines whether the first group of random access preambles is configured. If the first group of random access preambles is configured and the conditions (a) and (b) are established, the target random access preamble is determined from the random access preambles corresponding to the target reference signal and belonging to the first group of random access preambles. Enter the preamble.
  • the target random access preamble is determined from the random access preambles belonging to the second group of random access preambles corresponding to the target reference signal.
  • the terminal determines the random access preamble, including:
  • condition (c) If there is a reference signal whose RSRP is greater than the first signal strength threshold in at least one reference signal, determine whether the first group of random access preamble is configured; if the first group of random access preamble is configured, and condition (c) If and (d) are established, the target random access preamble is determined from the random access preambles belonging to the first group of random access preambles corresponding to the target reference signal. If any one of the conditions (c) and (d) is not established, the target random access preamble is determined from the random access preambles belonging to the second group of random access preambles corresponding to the target reference signal.
  • condition (c) the amount of data to be transmitted is greater than the second data amount threshold; condition (d) corresponding to reference signals with RSRP greater than the first signal strength threshold, there is a reference signal with a corresponding path loss less than PL2.
  • the terminal determines the random access preamble, including:
  • At least one reference signal has a reference signal whose RSRP is greater than the first signal strength threshold, select a target reference signal from the reference signals whose RSRP is greater than the first signal strength threshold, and determine whether the first set of random access is configured.
  • the random access corresponding to the target reference signal belongs to the first group. Enter the random access preamble of the preamble to determine the target random access preamble;
  • the amount of data to be transmitted is less than or equal to the second data volume threshold, from the random access preambles belonging to the second group of random access preambles corresponding to the target reference signal Determine the target random access preamble; or,
  • the target random access is determined from the random access preambles corresponding to the second group of random access preambles corresponding to the target reference signal Preamble.
  • the terminal device determines that the first group of random access preambles is not configured, the random access preamble that belongs to the second group of random access preambles corresponding to the target reference signal determines the target random access preamble. Enter the preamble.
  • the terminal device if the random access preamble corresponding to the target reference signal does not include a two-step random access preamble, or does not include a two-step random access preamble that meets the conditions, the terminal device
  • the target random access preamble can be determined from the four-step random access preamble configured by the network device.
  • the terminal device may determine the four-step random access preamble that supports the amount of data to be transmitted in the random access preamble corresponding to the target reference signal as the target random access preamble.
  • the method of selecting the four-step random access preamble can also refer to the existing method, such as based on the measured path loss and the amount of data to be sent, and based on the amount of data triggered by the CCCH.
  • the above describes how to determine the target random access preamble when the target random access preamble is a two-step random access preamble.
  • the target random access preamble is a four-step random access preamble
  • the manner of determining the target random access preamble can be referred to the prior art, which will not be repeated in this article.
  • the terminal device may determine that a two-step random access is required for random access.
  • the terminal device can determine that it needs to use two-step random access for random access based on one or a combination of the following factors:
  • Load information for two-step random access and four-step random access For example, if the load of two-step random access is low, it is determined that two-step random access is required for random access;
  • the reason for the uplink initiated by the terminal device For example, if the uplink priority is high, it is determined that two-step random access is required. For example, for emergency calls, it is determined that two-step random access is required
  • Quality service information of uplink service For example, for inactive terminal devices, for uplink services with high quality service levels, it is determined that two-step random access is required.
  • the terminal device may determine the random access type after determining the target SSB according to some of the foregoing methods. For example, if the target SSB includes a two-step random access preamble and a four-step random access preamble at the same time, the terminal device can determine to use two steps according to one or more of (1) to (3) listed above. One-step random access or four-step random access.
  • the terminal device performing random access using the target random access preamble includes:
  • the terminal device determines the next available transmission timing from the transmission timing corresponding to the target reference signal; and uses the random access preamble to perform random access at the available transmission timing.
  • a target reference signal can be determined through some of the methods for determining the random access preamble described in the foregoing.
  • the target reference signal corresponds to at least one sending opportunity (or called available sending opportunity).
  • the terminal device can select the next sending opportunity, that is, the closest sending opportunity in time to the current one, and send the selected target random access at this sending opportunity. Enter the preamble and the data to be transmitted, and perform two-step random access.
  • the method 400 can be used for initial data transmission.
  • the random access performed in S420 is used for initial data transmission. It should be understood that the random access performed in S420 may be two-step random access or four-step random access.
  • the method may further include: performing a two-step random access in a case where the random access fails.
  • the terminal device performs two-step random access again.
  • the terminal device can use the method of determining the target random access preamble to select the random access preamble again to perform random access.
  • the terminal device can directly use the target random access preamble used in the initial transmission, or the random access preamble group where the target random access preamble is located (for example, the first group of random access preambles or the second group of random access preambles). Random access preamble), or any one of the two-step random access preambles that meet the conditions included in the target SSB, to perform random access.
  • the two-step random access is performed again. Access.
  • the method may further include: in the case that the random access fails, performing four-step random access or falling back to four-step random access.
  • the terminal device can first determine the random access preamble used for the four-step random access.
  • the terminal device can adopt the method of selecting random access preamble during initial transmission of message 3 or PUSCH initial transmission in the prior art to determine the random access preamble used for four-step random access, or the existing In the technology, the random access preamble is selected when the message 3 or PUSCH is retransmitted, and the random access preamble used for the four-step random access is determined.
  • the random access preamble is selected when the message 3 or PUSCH is retransmitted, and the random access preamble used for the four-step random access is determined.
  • the terminal device can also directly use the target random access preamble used in the initial transmission, or where the target random access preamble used in the initial transmission is located Random access is performed by any random access preamble in the random access preamble group (such as group A or group B in the prior art).
  • the network device may instruct the terminal device to fall back to the four-step random access to send the random access preamble. Or, when the terminal device does not receive a response message from the network device or falls back to four-step random access according to the load of the network device, the terminal device sends the random access preamble. For example, the network device sends load status information of two-step or four-step random access, and if the load of two-step random access is high, it will automatically fall back to four-step random access. Conversely, if the load of the four-step random access is high, it will automatically fall back to the two-step random access.
  • the reason for the random access failure may be one or a combination of the following:
  • the terminal device did not receive message B or message 2;
  • the data part After the network device indicates the retransmission resources of the data part, the data part is still not sent successfully after N retransmissions;
  • the response message received by the terminal device contains the preamble ID sent by the terminal device and the uplink authorization allocated for this preamble ID, that is, does not contain the contention resolution information corresponding to the preamble;
  • the terminal device When the terminal device receives the response message, it contains the Preamble ID sent by the terminal device and contains contention resolution information, but the terminal device fails to successfully resolve the contention;
  • the preamble and PUSCH are carried during the retransmission, and the transmission is still not successful after the retransmission.
  • the method 400 can be used for data retransmission.
  • the random access performed in S420 is used for data retransmission.
  • the method may further include: performing a two-step random access when the four-step random access fails.
  • the terminal device again chooses to perform the two-step random access.
  • the method may further include: the terminal device receives the instruction information sent by the network device, and performs random access according to the instruction information. That is, in the case of random access failure, the terminal device performs random access again according to the instruction information sent by the network device.
  • the network device may send instruction information to the terminal device.
  • the instruction information may instruct the terminal device to perform two-step random access, or instruct the terminal device to perform four-step random access. Access.
  • the terminal device receives the instruction information sent by the network device, if the instruction information instructs the terminal device to perform two-step random access, the terminal device performs two-step random access; if the instruction information instructs the terminal device to perform four-step random access, Then the terminal device performs four-step random access.
  • the network device needs to indicate the random access failure and then perform random access again. Random access type.
  • Fig. 5 is a schematic block diagram of a communication device provided by an embodiment of the present application.
  • the communication device 500 may include a processing unit 510 and a transceiving unit 520.
  • the communication device 500 may correspond to the terminal device in the above method embodiment, for example, it may be a terminal device or a chip configured in the terminal device.
  • the processing unit may be a processor
  • the transceiver unit may be a transceiver.
  • the communication device may further include a storage unit, and the storage unit may be a memory. The storage unit is used to store instructions, and the processing unit executes the instructions stored in the storage unit, so that the communication device executes the foregoing method.
  • the processing unit may be a processor, and the transceiver unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit to enable the communication
  • the device executes the operations performed by the terminal device in the foregoing method 400
  • the storage unit may be a storage unit (for example, a register, a cache, etc.) in the chip, or a storage unit ( For example, read-only memory, random access memory, etc.).
  • the communication device 500 may correspond to the terminal device in the method according to the embodiment of the present application, and the communication device 500 may include a unit for executing the method executed by the terminal device in the method in FIG. 4.
  • each unit in the communication device and other operations and/or functions described above are intended to implement the corresponding process of the method in FIG. 4.
  • the processing unit 510 may be used to perform S410 in the method shown in FIG. 4
  • the transceiving unit 520 may be used to perform 420 and S404 in the method shown in FIG.
  • the communication device 500 may correspond to the network device in the above method embodiment, for example, it may be a network device or a chip configured in the network device.
  • the processing unit may be a processor
  • the transceiver unit may be a transceiver.
  • the communication device may further include a storage unit, and the storage unit may be a memory. The storage unit is used to store instructions, and the processing unit executes the instructions stored in the storage unit, so that the communication device executes the foregoing method.
  • the processing unit may be a processor, and the transceiver unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit to enable the The communication device executes the operations performed by the network device in the foregoing method 400.
  • the storage unit may be a storage unit (for example, a register, a cache, etc.) in the chip, or a storage unit located outside the chip in the communication device. (For example, read only memory, random access memory, etc.).
  • the communication device 500 may correspond to the network device in the method according to the embodiment of the present application, and the communication device 500 may include a unit for executing the method performed by the network device in FIG. 4.
  • each unit in the communication device 500 and other operations and/or functions described above are intended to implement the corresponding process of the method 400 in FIG. 4.
  • the processing unit 510 may be used to perform S402 in the method shown in FIG. 4
  • the transceiver unit 420 may be used to perform S420 and S420 in the method shown in FIG. S404.
  • the network equipment in each of the above device embodiments corresponds to the network equipment or terminal equipment in the terminal equipment and method embodiments, and the corresponding modules or units execute the corresponding steps, for example, the transceiver unit (transceiver) method executes the method. And/or the steps of receiving, other steps except sending and receiving may be executed by the processing unit (processor).
  • the transceiving unit may include a transmitting unit and/or a receiving unit, the transceiver may include a transmitter and/or a receiver, which respectively implement the transceiving function; the processor may be one or more.
  • the above-mentioned terminal device or network device may be a chip, and the processing unit may be realized by hardware or software.
  • the processing unit may be a logic circuit, integrated circuit, etc.; when realized by software,
  • the processing unit may be a general-purpose processor, which is implemented by reading software codes stored in a storage unit.
  • the storage unit may be integrated in the processor, or may be located outside the processor and exist independently.
  • FIG. 6 is a schematic structural diagram of a terminal device 10 provided by this application. For ease of description, FIG. 6 only shows the main components of the terminal device. As shown in FIG. 6, the terminal device 10 includes a processor, a memory, a control circuit, an antenna, and an input and output device.
  • the processor is mainly used to process communication protocols and communication data, control the entire terminal device, execute software programs, and process data of the software programs, for example, to support the terminal device to perform the actions described in the above method embodiments.
  • the memory is mainly used to store software programs and data.
  • the control circuit is mainly used for the conversion of baseband signals and radio frequency signals and the processing of radio frequency signals.
  • the control circuit and the antenna together can also be called a transceiver, which is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, and keyboards, are mainly used to receive data input by users and output data to users.
  • the processor can read the software program in the storage unit, interpret and execute the instructions of the software program, and process the data of the software program.
  • the processor performs baseband processing on the data to be sent and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and then sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 6 only shows a memory and a processor. In actual terminal devices, there may be multiple processors and memories.
  • the memory may also be referred to as a storage medium or a storage device, etc., which is not limited in the embodiment of the present application.
  • the processor may include a baseband processor and a central processing unit.
  • the baseband processor is mainly used to process communication protocols and communication data.
  • the central processing unit is mainly used to control the entire terminal device and execute Software program, processing the data of the software program.
  • the processor in FIG. 6 integrates the functions of the baseband processor and the central processing unit.
  • the baseband processor and the central processing unit may also be independent processors and are interconnected by technologies such as buses.
  • the terminal device may include multiple baseband processors to adapt to different network standards, the terminal device may include multiple central processors to enhance its processing capabilities, and various components of the terminal device may be connected through various buses.
  • the baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
  • the central processing unit can also be expressed as a central processing circuit or a central processing chip.
  • the function of processing the communication protocol and communication data can be built in the processor, or can be stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
  • the antenna and control circuit with the transceiver function may be regarded as the transceiver unit 101 of the terminal device 10, and the processor with the processing function may be regarded as the processing unit 102 of the terminal device 10.
  • the terminal device 10 includes a transceiver unit 101 and a processing unit 102.
  • the transceiver unit may also be called a transceiver, transceiver, transceiver, and so on.
  • the device for implementing the receiving function in the transceiver unit 101 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver unit 101 as the sending unit, that is, the transceiver unit 101 includes a receiving unit and a sending unit.
  • the receiving unit may also be called a receiver, a receiver, a receiving circuit, etc.
  • the sending unit may be called a transmitter, a transmitter, or a transmitting circuit, etc.
  • the terminal device shown in FIG. 6 can perform various actions performed by the terminal device in the foregoing method. Here, in order to avoid redundant description, detailed descriptions thereof are omitted.
  • the network device may be a base station, for example. As shown in Fig. 7, the base station can be applied to the communication system shown in Fig. 1 to perform the functions of the network device in the above method embodiment.
  • the base station 20 may include one or more radio frequency units, such as a remote radio unit (RRU) 201 and one or more baseband units (BBU) (also known as digital units (DU)) ) 202.
  • RRU 201 may be called a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 2011 and a radio frequency unit 2012.
  • the RRU 201 part is mainly used for receiving and sending of radio frequency signals and conversion of radio frequency signals and baseband signals, for example, for transmitting the BFR configuration of the foregoing method embodiment.
  • the BBU 202 part is mainly used for baseband processing, control of the base station, and so on.
  • the RRU 201 and the BBU 202 may be physically set together, or may be physically separated, that is, a distributed base station.
  • the BBU 202 is the control center of the base station, and may also be called a processing unit, which is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, and spreading.
  • the BBU (processing unit) 202 may be used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
  • the BBU 202 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network (such as an LTE network) with a single access indication, or may respectively support different access standards Wireless access network (such as LTE network, 5G network or other network).
  • the BBU 202 further includes a memory 2021 and a processor 2022, and the memory 2021 is used to store necessary instructions and data.
  • the processor 2022 is used to control the base station to perform necessary actions, for example, used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
  • the memory 2021 and the processor 2022 may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • the network equipment is not limited to the above forms, and may also be in other forms: for example: including BBU and adaptive radio unit (ARU), or BBU and active antenna unit (AAU); or Customer premises equipment (CPE) may also be in other forms, which is not limited by this application.
  • ARU adaptive radio unit
  • AAU BBU and active antenna unit
  • CPE Customer premises equipment
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the aforementioned processor may be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a field programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • Programming logic devices discrete gates or transistor logic devices, discrete hardware components.
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • processor in this embodiment of the application may be a central processing unit (central processing unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), and application-specific integrated circuits. (application specific integrated circuit, ASIC), ready-made programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • CPU central processing unit
  • DSP digital signal processors
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • programmable logic devices discrete gates or transistor logic devices, discrete hardware components, etc.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically erasable programmable only Read memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • Access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory Take memory (synchlink DRAM, SLDRAM) and direct memory bus random access memory (direct rambus RAM, DR RAM).
  • the present application also provides a computer program product, the computer program product includes: computer program code, when the computer program code runs on a computer, the computer executes the above method The method executed by the terminal device or network device.
  • the present application also provides a computer-readable medium storing program code, which when the program code runs on a computer, causes the computer to execute the method described in the above-mentioned method embodiments.
  • the method executed by the terminal device or network device.
  • the present application also provides a system, which includes the aforementioned one or more terminal devices and one or more network devices.
  • the foregoing embodiments can be implemented in whole or in part by software, hardware, firmware or any other combination.
  • the above-mentioned embodiments may be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center that includes one or more sets of available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a digital versatile disc (DVD)), or a semiconductor medium.
  • the semiconductor medium may be a solid state drive.
  • the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, rather than corresponding to the embodiments of the present application.
  • the implementation process constitutes any limitation.
  • At least one of or “at least one of” or “at least one of” herein means all or any combination of the listed items, for example, "A, At least one of B and C" can mean: A alone, B alone, C alone, A and B, B and C, and A, B and C.
  • B corresponding to A means that B is associated with A, and B can be determined according to A.
  • determining B according to A does not mean that B is determined only according to A, and B can also be determined according to A and/or other information.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种随机接入方法和通信装置,能够使终端设备明确进行何种类型的随机接入。该方法包括:从至少一个两步随机接入前导码中确定至少一个随机接入前导码,或者,从至少一个两步随机接入前导码和至少一个四步随机接入前导码中确定一种随机接入前导码;使用所确定出的随机接入前导码进行随机接入。

Description

随机接入方法和通信装置
本申请要求于2019年04月26日提交中国专利局、申请号为201910346571.3、申请名“随机接入方法和通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,并且更具体地,涉及一种随机接入的方法和通信装置。
背景技术
在无线通信技术中,终端设备通过随机接入过程获得和网络设备的上行同步。目前,随机接入类型包括四步随机接入和两步随机接入。网络设备可以同时配置用于四步随机接入的随机接入信道(random access channel,RACH)资源和用于两步随机接入的RACH资源。此在场景下,终端设备无法确定需要进行何种类型的随机接入。
发明内容
本申请提供了一种随机接入方法和通信装置,能够使终端设备明确进行何种类型的随机接入。
第一方面,提供了一种随机接入方法,包括:确定随机接入前导码;使用该随机接入前导码进行随机接入。
其中,该随机接入前导码为从至少一个两步随机接入前导码中所确定出的至少一个,或者,该随机接入前导码为从至少一个两步随机接入前导码和至少一个四步随机接入前导码中所确定出的一种。该至少一个两步随机接入前导码为网络设备配置的用于两步随机接入的随机接入前导码。该至少一个四步随机接入前导码为网络设备配置的用于四步随机接入的随机接入前导码。
根据本申请提供的方法,在网络设备同时配置了用于四步随机接入的随机接入前导码和用于两步随机接入的随机接入前导码的场景下,终端设备可以选择使用两步随机接入前导码进行两步随机接入,或者,终端设备可以从配置的两步随机接入前导码和四步随机接入前导码中随机选取一种随机接入前导码,进行相应类型的随机接入。
可选地,该随机接入用于数据初传,或者,用于数据重传。
换句话说,在数据初传的情况下,使用该随机接入前导码进行随机接入;或者,在数据重传的情况下,使用该随机接入前导码进行随机接入。
结合第一方面,在第一方面的某些实现方式中,在所述随机接入为用于数据初传的情况下,该方法还可以包括:在所述随机接入失败的情况下,进行两步随机接入。
由于两步随机接入相对于四步随机接入所需时间较短,因此通过采用两步随机接入能够减小接入时延。
结合第一方面,在第一方面的某些实现方式中,在所述随机接入为用于数据重传的情况下,该方法还可以包括:在所述随机接入失败的情况下,进行两步随机接入或者四步随机接入。
基于该方案,在用于数据重传的随机接入失败的情况下,终端设备可以灵活选择随机接入类型。
结合第一方面,在第一方面的某些实现方式中,在所述随机接入失败的情况下,该方法还可以包括:接收网络设备发送的指示信息,该指示信息用于指示终端设备进行两步随机接入,或者,该指示信息用于指示终端设备进行四步随机接入;根据该指示信息,进行随机接入。
基于该方案,终端设备可以根据网络设备的指示,确定随机接入的类型。
结合第一方面,在第一方面的某些实现方式中,该随机接入前导码为两步随机接入前导码,该至少一个两步随机接入前导码对应至少一个第一数据量阈值,一个两步随机接入前导码所对应的第一数据量阈值为该两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个第二信号强度阈值。以及,该确定随机接入前导码,包括:
如果网络设备配置的至少一个参考信号中存在对应的参考信号接收功率(reference signal receiving power,RSRP)大于第一信号强度阈值的参考信号,从大于该第一信号强度阈值的参考信号中选择一个目标参考信号,该参考信号为同步信号块(synchronization signal block,SSB)或者信道状态信息参考信号(channel state information reference signal resource,CSI-RS);
如果待传输的数据量小于或者等于该至少一个第一数据量阈值中的其中一个,并且该目标参考信号的RSRP大于目标第二信号强度阈值,从该目标参考信号对应的两步随机接入前导码中确定该随机接入前导码,该随机接入前导码对应的第一数据量阈值为该目标第二信号强度阈值所对应的第一数据量阈值。其中,该目标第二信号强度阈值为该待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值。或者,该随机接入前导码支持待传输的数据量。
基于该方案,可以根据现有技术先选择一个目标参考信号,然后再根据待传输的数据量与第一数据量阈值的关系,以及目标参考信号对应的RSRP与第二信号强度阈值的关系,确定随机接入前导码。
作为该方案的一个替代方案,也可以不选择出目标参考信号,而直接根据该至少一个参考信号中对应的RSRP大于目标第二信号强度阈值的参考信号所对应的随机接入前导码,确定随机接入前导码。比如,可以直接从对应的RSRP大于目标第二信号强度阈值的参考信号所对应的随机接入前导码中选择支持待传输的数据量的随机接入前导码作为该随机接入前导码。由于某些参考信号对应的随机接入前导码可能不包括两步随机接入前导码,因此相对于前述先选择目标参考信号,再确定随机接入前导码的方案,该方案能够提高选择出两步随机接入前导码的概率。
应理解,随机接入前导码与物理上行共享信道(physical uplink share channel,PUSCH)资源有对应关系,一个PUSCH资源对应一个最大传输的数据块的大小,即最大传输块大小(transport block size,TBS)。可以认为,随机接入前导码与TBS对应,并且其含义是,当待发送的数据量小于(或,小于或等于)TBS时,可以使用该TBS对应的随机接入前 导码。所以一个随机接入前导码支持的数据量,是指该随机接入前导码对应的PUSCH资源对应的TBS。
结合第一方面,在第一方面的某些实现方式中,该随机接入前导码为两步随机接入前导码,该至少一个两步随机接入前导码对应至少一个第一数据量阈值,一个两步随机接入前导码所对应的第一数据量阈值为该两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个PL1,PL1为第一路损阈值。以及,该确定随机接入前导码,包括:
如果网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于第一信号强度阈值的参考信号,从大于该第一信号强度阈值的参考信号中选择一个目标参考信号,该参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS;
如果待传输的数据量小于或者等于该至少一个第一数据量阈值中的其中一个,并且该目标参考信号对应的路损小于目标PL1,从该目标参考信号对应的两步随机接入前导码中确定该随机接入前导码。
其中,该目标PL为该待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值,或者称,该随机接入前导码对应的第一数据量阈值为该目标第二信号强度阈值所对应的第一数据量阈值;或者,该随机接入前导码支持待传输的数据量。PL1=PCMAX-TP-Δ1,PL1为第一路损阈值,PCMAX为终端设备在执行随机接入的小区的最大发射功率,TP为两步随机接入前导码的目标接收功率,Δ1为该待发送数据与两步随机接入前导码的功率偏差,该目标PL1为该待传输的数据量对应的第一数据量阈值所对应的PL1。
基于该方案,可以根据现有技术先选择一个目标参考信号,然后再根据待传输的数据量与第一数据量阈值的关系,以及目标参考信号对应的路损与PL1关系,确定随机接入前导码。
作为该方案的一个替代方案,也可以不选择出目标参考信号,而直接根据该至少一个参考信号中对应的路损小于目标PL1的参考信号所对应的随机接入前导码,确定随机接入前导码。比如,可以直接从对应的路损小于目标PL1的参考信号所对应的随机接入前导码中选择支持待传输的数据量的随机接入前导码作为该随机接入前导码。由于某些参考信号对应的随机接入前导码可能不包括两步随机接入前导码,因此基于该方案,能够提高选择出两步随机接入前导码的概率。
结合第一方面,在第一方面的某些实现方式中,该随机接入前导码为两步随机接入前导码。以及,该确定随机接入前导码,包括:
如果网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于第一信号强度阈值的参考信号,从对应的RSRP大于该第一信号强度阈值的参考信号中选择一个目标参考信号,该参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS;
确定是否配置了第一组随机接入前导码,该第一组随机接入前导码支持的发送数据量大于第二数据量阈值;
若配置了该第一组随机接入前导码,并且,待传输的数据量大于该第二数据量阈值,以及,该目标参考信号对应的路损小于PL2,从该目标参考信号对应的属于该第一组随机接入前导码中的随机接入前导码中确定该随机接入前导码;或,
若配置了该第一组随机接入前导码,并且,该待传输的数据量小于或者等于该第二数 据量阈值,从该目标参考信号对应的属于第二组随机接入前导码中的随机接入前导码中确定该随机接入前导码,该第二组随机接入前导码支持的最大发送数据量为该第二数据量阈值;或,
若配置了该第一组随机接入前导码,并且,该目标参考信号对应的路损大于或者等于PL2,从该目标参考信号对应的属于该第二组随机接入前导码中的随机接入前导码中确定该随机接入前导码;
其中,PL2=PCMAX-TP-Δ1-Δ2,PL2为第二路损阈值,PCMAX为终端设备在执行随机接入的小区的最大发射功率,TP为两步随机接入的随机接入前导码的目标接收功率,Δ1为该待发送数据与两步随机接入前导码的功率偏差,Δ2为该第一组随机接入前导码与第二组随机接入前导码的功率偏差。
基于该方案,可以从第一组随机接入前导码中选择出随机接入前导码进行随机接入,或者,可以从第二组随机接入前导码中选择出随机接入前导码进行随机接入。
应理解,第一组随机接入前导码和第二组随机接入前导码为两步随机接入前导码。所述至少一个随机接入前导码包括第一组随机接入前导码和第二组随机接入前导码。
结合第一方面,在第一方面的某些实现方式中,该随机接入前导码为两步随机接入前导码。以及,该确定随机接入前导码,包括:
如果网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于第一信号强度阈值的参考信号,从对应的RSRP大于该第一信号强度阈值的参考信号中选择一个目标参考信号,该参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS;
确定是否配置了第一组随机接入前导码,该第一组随机接入前导码支持的发送数据量大于第二数据量阈值;
若配置了该第一组随机接入前导码,并且,待传输的数据量大于该第二数据量阈值,以及该待传输的数据通过公共控制信道(common control channel,CCCH)承载,从该目标参考信号对应的属于该第一组随机接入前导码中的随机接入前导码中确定该随机接入前导码,该第二组随机接入前导码支持的最大发送数据量为该第二数据量阈值;或,
若配置了该第一组随机接入前导码,并且,该待传输的数据量小于或者等于该第二数据量阈值,从该目标参考信号对应的属于第二组随机接入前导码中的随机接入前导码中确定该随机接入前导码;或,
若配置了该第一组随机接入前导码,并且,该待传输的数据不通过该CCCH承载,从该目标参考信号对应的属于该第二组随机接入前导码中的随机接入前导码中确定该随机接入前导码。
基于该方案,可以从第一组随机接入前导码中选择出随机接入前导码进行随机接入,或者,可以从第二组随机接入前导码中选择出随机接入前导码进行随机接入。
结合第一方面,在第一方面的某些实现方式中,该随机接入前导码为两步随机接入前导码;以及,该确定随机接入前导码,包括:
若没有配置该第一组随机接入前导码,从该目标参考信号对应的属于该第二组随机接入前导码中的随机接入前导码中确定该随机接入前导码。
结合第一方面,在第一方面的某些实现方式中,该随机接入前导码为两步随机接入前导码,该至少一个两步随机接入前导码对应至少一个第一数据量阈值,一个两步随机接入 前导码所对应的第一数据量阈值为该两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个第二信号强度阈值。以及,该确定随机接入前导码,包括:
如果待传输的数据量小于或者等于该至少一个第一数据量阈值中的其中一个,并且网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于目标第二信号强度阈值的参考信号,从对应的RSRP大于该第二信号强度阈值的参考信号中选择一个目标参考信号,该参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS,该目标第二信号强度为该待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值;
从该目标参考信号对应的两步随机接入前导码中确定该随机接入前导码。
其中,该目标第二信号强度阈值为该待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值,或者说,该随机接入前导码对应的第一数据量阈值为该目标第二信号强度阈值所对应的第一数据量阈值;或者,该随机接入前导码支持待传输的数据量。
基于该方案,可以根据待传输的数据量与第一数据量阈值的关系,以及目标参考信号对应的RSRP与第二信号强度阈值的关系,确定随机接入前导码。相比于先根据第一信号强度阈值选择一个参考信号,再判断该参考信号与第二信号强度阈值的关系选择随机接入前导码的方案,该方案实现起来较简单。
结合第一方面,在第一方面的某些实现方式中,该随机接入前导码为两步随机接入前导码,该至少一个两步随机接入前导码对应至少一个第一数据量阈值,一个两步随机接入前导码所对应的第一数据量阈值为该两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个第二信号强度阈值;以及,该确定随机接入前导码,包括:如果待传输的数据量小于或者等于该至少一个第一数据量阈值中的其中一个,并且网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于目标第二信号强度阈值的参考信号,从大于该第二信号强度阈值的参考信号分别对应的随机接入前导码中选择该随机接入前导码,该参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS,该目标第二信号强度为该待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值。该目标第二信号强度阈值为该待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值,或者说,该随机接入前导码对应的第一数据量阈值为该目标第二信号强度阈值所对应的第一数据量阈值;或者,该随机接入前导码支持待传输的数据量。
由于某些参考信号对应的随机接入前导码可能不包括两步随机接入前导码,因此相对于前述先选择目标参考信号,再确定随机接入前导码的方案,该方案能够提高选择出两步随机接入前导码的概率。
结合第一方面,在第一方面的某些实现方式中,所述使用该随机接入前导码进行随机接入,包括:从该目标参考信号对应的发送时机中确定下一个可用发送时机,该发送时机用于发送该随机接入前导码;在该可用发送时机上使用该随机接入前导码进行该随机接入。
第二方面,提供了一种随机接入方法,该方法包括:生成配置信息;向终端设备发送该配置信息,该配置信息包括至少一个第一数据量阈值以及至少一个第二信号强度阈值,该至少一个第一数据量阈值与至少一个两步随机接入前导码对应,一个两步随机接入前导码所对应的第一数据量阈值为该两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个第二信号强度阈值,该配置信息用于终端设备确定随机接入前导码以进 行随机接入。
第三方面,提供了一种通信装置,包括处理单元和收发单元。处理单元和收发单元可以用于执行第一方面以及第一方面中任一种可能实现方式中的方法的相应步骤。
第四方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第一方面以及第一方面中任一种可能实现方式中的方法。可选地,该通信装置还包括存储器。可选地,该通信装置还包括通信接口,处理器与通信接口耦合。
在一种实现方式中,该通信装置为终端设备。当该通信装置为终端设备时,该通信接口可以是收发器,或,输入/输出接口。
在另一种实现方式中,该通信装置为配置于终端设备中的芯片。当该通信装置为配置于终端设备中的芯片时,该通信接口可以是输入/输出接口。
可选地,该收发器可以为收发电路。可选地,该输入/输出接口可以为输入/输出电路。
第五方面,提供了一种通信装置,包括处理单元和收发单元。处理单元和收发单元可以用于执行第二方面以及第二方面中任一种可能实现方式中的方法中的相应步骤。
第六方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第二方面以及第二方面中任一种可能实现方式中的方法。可选地,该通信装置还包括存储器。可选地,该通信装置还包括通信接口,处理器与通信接口耦合。
在一种实现方式中,该通信装置为网络设备。当该通信装置为网络设备时,该通信接口可以是收发器,或,输入/输出接口。
在另一种实现方式中,该通信装置为配置于网络设备中的芯片。当该通信装置为配置于网络设备中的芯片时,该通信接口可以是输入/输出接口。
可选地,该收发器可以为收发电路。可选地,该输入/输出接口可以为输入/输出电路。
第七方面,提供了一种处理器,包括:输入电路、输出电路和处理电路。该处理电路用于通过该输入电路接收信号,并通过该输出电路发射信号,使得该处理器执行第一方面至第二方面以及第一方面至第二方面任一种可能实现方式中的方法。
在具体实现过程中,上述处理器可以为芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。输入电路所接收的输入的信号可以是由例如但不限于接收器接收并输入的,输出电路所输出的信号可以是例如但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请实施例对处理器及各种电路的具体实现方式不做限定。
第八方面,提供了一种处理装置,包括处理器和存储器。该处理器用于读取存储器中存储的指令,并可通过接收器接收信号,通过发射器发射信号,以执行第一方面至第二方面以及第一方面至第二方面任一种可能实现方式中的方法。
可选地,该处理器为一个或多个,该存储器为一个或多个。
可选地,该存储器可以与该处理器集成在一起,或者该存储器与处理器分离设置。
在具体实现过程中,存储器可以为非瞬时性(non-transitory)存储器,例如只读存储器(read only memory,ROM),其可以与处理器集成在同一块芯片上,也可以分别设置 在不同的芯片上,本申请实施例对存储器的类型以及存储器与处理器的设置方式不做限定。
应理解,相关的数据交互过程例如发送测量配置信息可以为从处理器输出测量配置信息的过程,接收信息可以为处理器接收信息的过程。具体地,处理输出的数据可以输出给发射器,处理器接收的输入数据可以来自接收器。其中,发射器和接收器可以统称为收发器。
上述第八方面中的处理装置可以是一个芯片,该处理器可以通过硬件来实现也可以通过软件来实现,当通过硬件实现时,该处理器可以是逻辑电路、集成电路等;当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,该存储器可以集成在处理器中,可以位于该处理器之外,独立存在。
第九方面,提供了一种计算机程序产品,该计算机程序产品包括:计算机程序(也可以称为代码,或指令),当该计算机程序被运行时,使得计算机执行上述第一方面至第二方面以及第一方面至第二方面中任一种可能实现方式中的方法。
第十方面,提供了一种计算机可读介质,该计算机可读介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得计算机执行上述第一方面至第二方面以及第一方面至第二方面中任一种可能实现方式中的方法。
第十一方面,提供了一种通信系统,包括前述的网络设备和终端设备。
附图说明
图1是适用于本申请的一个通信系统的示意图;
图2是四步随机接入类型的随机接入过程的示意图;
图3是两步随机接入类型的随机接入过程的示意图;
图4是本申请提供的随机接入方法的示意性流程图;
图5本申请提供的一种通信装置的示意性结构示意图;
图6是本申请提供的一种终端设备的结构示意图;
图7是本申请提供的一种网络设备的结构示意图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、未来的第五代(5th generation,5G)系统或新无线(new radio,NR)等。
本申请实施例中的终端设备可以指用户设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用 陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。
本申请实施例中的网络设备可以是任意一种具有无线收发功能的设备。该设备包括但不限于:基带单元(baseband unit,BBU),无线保真(wireless fidelity,WIFI)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission point,TP)或者发送接收点(transmission and reception point,TRP)等,还可以为第五代(the fifth generation,5G)系统,例如,新空口(new radio,NR)中的gNB或传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络节点,例如基带单元(BBU)或分布式单元(distributed unit,DU)等。
在一些部署中,gNB可以包括集中式单元(centralized unit,CU)和DU。gNB还可以包括有源天线单元(active antenna unit,AAU)。CU实现gNB的部分功能,DU实现gNB的部分功能。比如,CU负责处理非实时协议和服务,实现无线资源控制(radio resource control,RRC),分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能。DU负责处理物理层协议和实时服务,实现无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理(physical,PHY)层的功能。AAU实现部分物理层处理功能、射频处理及有源天线的相关功能。由于RRC层的信息最终会变成PHY层的信息,或者,由PHY层的信息转变而来,因而,在这种架构下,高层信令,如RRC层信令,也可以认为是由DU发送的,或者,由DU+AAU发送的。可以理解的是,网络设备可以为包括CU节点、DU节点、AAU节点中一项或多项的设备。此外,可以将CU划分为接入网(radio access network,RAN)中的网络设备,也可以将CU划分为核心网(core network,CN)中的网络设备,本申请对此不做限定。
参见图1,图1是适用于本申请实施例的通信系统的架构图。如图1所示,该无线通信系统中可以包括至少一个网络设备101,网络设备101和一个或多个终端设备(例如图1中所示的终端设备102和终端设备103)进行通信。当网络设备发送信号时,网络设备为发射端,终端设备为接收端。反之,当终端设备发送信号时,终端设备为发射端,网络设备为接收端。
为了便于理解本申请的技术方案,首先对本申请涉及的相关技术作简单介绍。
终端设备选择合适的小区完成驻留之后,就可以进行随机接入。
参见图2,图2为四步随机接入类型的随机接入过程的示意图。如图2所示,终端设备向网络设备发送消息1(message 1,简记作msg 1),消息1也即随机接入前导码(preamble)。网络设备检测到随机接入前导码之后,向终端设备返回响应消息,也即消息2(message 2)。消息2中包含网络设备为终端设备分配的上行资源。终端设备接收到消息2之后,在消息2指示的上行资源上发送消息3。如果网络设备能够正确解码消息3(message 3),则向终端设备返回消息4(message 4),消息4用于通知终端设备竞争成功。经过上述4个步骤,随机接入流程成功。
随着机器类型通信(machine type communication,MTC)、窄带物联网(narrow band internet of things,NB-IoT)等新型无线终端类型的引入,终端设备的数量呈指数上升。如果所有的终端设备都采用四步随机接入类型进行随机接入,会导致网络设备的负荷过重。另外,四步随机接入的时延也比较长。
为了解决这些问题,两步随机接入类型被引入。
参见图3,图3为两步随机接入类型的随机接入过程的示意图。在两步随机接入过程中,终端设备在消息A中同时携带随机接入前导码和数据(也即,preamble+data)。数据部分通常是无线资源控制(radio resource control,RRC)消息。如果终端设备之间没有冲突,网络设备成功解码消息A后向终端设备返回消息B。消息B中同时包括针对随机接入前导码的响应和针对数据的响应。其中,针对随机接入前导码的响应也即随机接入响应(random access response,RAR)。针对数据的响应通常是RRC消息。这两部响应可以同时发送,也可以先后发送。终端设备对这两部分响应可以是独立解码的。终端设备收到消息B后获知随机接入成功。如果终端设备之间有冲突,网络设备可能无法成功解出消息A中的数据,此时网络设备不向终端设备发送消息B。终端设备在发出消息A之后,等待一个时间窗,如果没有接收到消息B,认为随机接入失败。
在一些情况下,终端设备在配置给两步随机接入的发送时机(occasion)上发送消息A,即包括随机接入前导码和数据。如果网络设备只能成功解码随机接入前导码,而不能成功解码数据,则网络设备只向终端设备回复RAR,而不回复针对数据的响应。终端设备收到RAR之后,回退到四步随机接入过程,即终端设备重新发送消息1或者消息3。这个过程称之为两步随机接入回退到四步随机接入。
目前,网络设备可以同时配置用于四步随机接入的随机接入前导码和用于两步随机接入的随机接入前导码,此在场景下,终端设备无法确定需要进行何种类型的随机接入。
为此,本申请提供一种随机接入方法,旨在终端设备明确进行何种类型的随机接入。根据本申请提供的方法,在网络设备同时配置了用于四步随机接入的随机接入前导码和用于两步随机接入的随机接入前导码的场景下,终端设备可以选择使用两步随机接入前导码进行两步随机接入,或者,终端设备可以从配置的两步随机接入前导码和四步随机接入前导码中随机选取一个随机接入前导码,进行相应类型的随机接入。
以下,结合图4,对本申请提供的随机接入方法进行详细说明。需要说明的是,本文在描述本申请提供的方法时,以执行主体为终端设备或者网络设备为例进行说明。实际上,由终端设备执行的操作还可以由配置在终端设备中的芯片执行,由网络设备执行的操作还可以由配置在网络设备中的芯片执行。
图4是本申请提供的随机接入方法400的示意性流程图。该方法400主要包括S410至S420。以下对步骤进行说明。
S410,终端设备确定随机接入前导码。
S420,终端设备使用所确定出来的该随机接入前导码,进行随机接入。
以下,为了区分,将终端设备所确定出来的随机接入前导码记作:目标随机接入前导码。
其中,目标随机接入前导码为从网络设备配置的两步随机接入前导码中所确定出的至少一个。或者,目标随机接入前导码为从网络设备配置的两步随机接入前导码和网络设备配置的四步随机接入前导码中所确定出的一种,即目标随机接入前导码为两步随机接入前导码和四步随机接入前导码中的一种。网络设备配置的两步随机接入前导码的数量为至少一个,网络设备配置的四步随机接入前导码的数量为至少一个。两步随机接入前导码用于两步随机接入,四步随机接入前导码用于四步随机接入。
若终端设备所确定出来的目标随机接入前导码为两步随机接入前导码,则终端设备进行两步随机接入。若终端设备所确定出来的目标随机接入前导码为四步随机接入前导码,则终端设备进行四步随机接入。
根据本申请提供的方法,在网络设备同时配置了用于四步随机接入的随机接入前导码和用于两步随机接入的随机接入前导码的场景下,终端设备可以选择使用两步随机接入前导码进行两步随机接入,或者,终端设备可以从配置的两步随机接入前导码和四步随机接入前导码中随机选取一种随机接入前导码,进行相应类型的随机接入。
可选地,在S410之前,该方法还可以包括:
S402,网络设备生成配置信息;
S404,网络设备向终端设备发送配置信息。相应地,终端设备接收网络设备发送的配置信息。
具体来讲,网络设备可以通过该配置信息或者其他的配置信息,配置参考信号集合,该参考信号集合可以包括SSB集合和CSI-RS集合。网络设备可以通过该配置信息配置SSB集合中每个SSB对应的RACH资源,以及CSI-RS集合中每个CSI-RS对应的RACH资源。一般地,网络设备可将任意两个SSB或CSI-RS对应的RACH资源配置为相同的,也可以配置为不同的。网络设备可将任意SSB对应的随机接入码配置为不同的,也可以配置为相同的。
此外,每个SSB对应的RACH资源可以包括两步RACH资源和四步RACH资源。或者,一些SSB对应的RACH资源可以包括两步RACH资源,另一些SSB对应的RACH资源可以包括四步RACH资源。两步RACH资源包括两步随机接入前导码和两步随机接入的发送时机,两步随机接入的发送时机用于发送两步随机接入前导码。四步RACH资源包括四步随机接入前导码和四步随机接入的发送时机,四步随机接入的发送时机用于发送四步随机接入前导码。发送时机包括时域资源和频域资源中的至少一个。
可选地,两步随机接入的发送时机和四步随机接入的发送时机可以共享,即,配置的两步随机接入的发送时机和四步随机接入的发送时机相同,但本申请对此不作限定。在一种实现方式中,若两步随机接入的发送时机没有显式配置,但配置了两步随机接入前导码,则认为两步随机接入的发送时机和配置的四步随机接入的发送时机相同。
在另一种实现方式中,若两步随机接入前导码没有显式指示,则认为两步随机接入前导码和四步随机接入前导码相同。例如,若两步随机接入前导码没有显式配置,但配置了两步随机接入的发送时机,则认为两步随机接入前导码和配置的四步随机接入前导码相同。
一般来说,网络设备配置的两步随机接入的发送时机和四步随机接入的发送时机可以不同,也可以相同。在相同的时候,网络设备可配置的两步随机接入前导码和四步随机接入前导码不同。但本申请并不排除网络设备配置的两步随机接入的发送时机和四步随机接入的发送时机相同,以及两步随机接入前导码和四步随机接入前导码相同的情况。
需要说明的是,本文中仅以每个SSB都有对应的发送时机和随机接入前导码为例进行说明,实际上,某些SSB可能没有对应的发送时机,因此也没有对应的随机接入前导码。
以下,以SSB为例,对参考信号与RACH资源的可能的对应关系进行举例说明。
对应关系一
每个SSB对应至少一个发送时机,任意两个SSB对应的发送时机相同,或者,任意两个SSB对应的发送时机不同。应理解,任意两个SSB对应的发送时机不同表示任意两个SSB对应的发送时机之间没有交集,下述类似的表述也表示类似的含义,下文中将不再说明。在任意两个SSB对应的发送时机不同的情况下,任意两个SSB对应的发送时机的数量可以相等,也可以不等。每个SSB对应至少一个两步随机接入前导码和至少一个四步随机接入前导码,该至少一个两步随机接入前导码和该至少一个四步随机接入前导码不同,即该至少一个两步随机接入前导码和该至少一个四步随机接入前导码之间没有交集。一个SSB对应的两步随机接入前导码的数量和四步随机接入前导码的数量可以相等,也可以不等。任意两个SSB对应的两步随机接入前导码可以相同,也可以不同。任意两个SSB对应的两步随机接入前导码的数量可以相等,也可以不等。任意两个SSB对应的四步随机接入前导码可以相同,也可以不同。任意两个SSB对应的四步随机接入前导码的数量可以相等,也可以不等。一个SSB对应的两步随机接入前导码和四步随机接入前导码可以共享该SSB对应的发送时机。
下文中均以该SSB集合共包括4个SSB为例进行说明。
示例性的,参见表1,表1示出了不同SSB对应不同发送时机、不同两步随机接入前导码和不同四步随机接入前导码的情况。
表1
Figure PCTCN2020086783-appb-000001
示例性的,参见表2,表2示出了不同SSB对应不同发送时机、相同两步随机接入前导码和相同四步随机接入前导码的情况。应理解,不同SSB也可以对应相同的两步随机接入前导码,并且对应不同的四步随机接入前导码。或者,不同SSB可以对应不同的两步随机接入前导码,并且对应相同的四步随机接入前导码。
表2
Figure PCTCN2020086783-appb-000002
Figure PCTCN2020086783-appb-000003
示例性的,参见表3,表3示出了不同SSB对应相同发送时机、不同两步随机接入前导码和不同四步随机接入前导码的情况。
表3
Figure PCTCN2020086783-appb-000004
示例性的,参见表4,表4示出了不同SSB对应相同发送时机、相同两步随机接入前导码和相同四步随机接入前导码的情况。
表4
Figure PCTCN2020086783-appb-000005
对应关系二
每个SSB对应至少一个随机接入前导码,该至少一个随机接入前导码可以用于两步随机接入也可以用于四步随机接入,即与一个SSB对应的至少一个随机接入前导码由两 步随机接入和四步随机接入共享。任意两个SSB对应的随机接入前导码可以相同也可以不同,在不同的情况下,任意两个SSB对应的随机接入前导码的数量可以相同,也可以不同。
每个SSB对应至少一个两步随机接入的发送时机和至少一个四步随机接入的发送时机。该至少一个两步随机接入的发送时机和该至少一个四步随机接入的发送时机不同。一个SSB对应的两步随机接入的发送时机和四步随机接入的发送时机的数量可以相等,也可以不等。任意两个SSB对应的两步随机接入的发送时机可以相同,也可以不同。任意两个SSB对应的两步随机接入的发送时机的数量可以相等,也可以不等。任意两个SSB对应的四步随机接入的发送时机可以相同,也可以不同。任意两个SSB对应的四步随机接入的发送时机的数量可以相等,也可以不等。一个SSB对应的两步随机接入的发送时机和四步随机接入的发送时机可以共享该SSB对应的随机接入前导码。
示例性的,参见表5,表5示出了两步随机接入的发送时机和四步随机接入的发送时机对应相同随机接入前导码的情况。
表5
Figure PCTCN2020086783-appb-000006
示例性的,参见表6,表6示出了两步随机接入的发送时机和四步随机接入的发送时机对应相同随机接入前导码的另一情况。
表6
Figure PCTCN2020086783-appb-000007
示例性的,参见表7,表7示出了两步随机接入的发送时机和四步随机接入的发送时机对应不同随机接入前导码的情况。
表7
Figure PCTCN2020086783-appb-000008
对应关系三
该SSB集合中一部分SSB对应的随机接入前导码为两步随机接入前导码,另一部分SSB对应的随机接入前导码为四步随机接入前导码。对应两步随机接入前导码的SSB的数量和对应四步随机接入前导码的SSB的数量可以相等,也可以不等。
在对应关系三下,可选地,每个SSB对应至少一个发送时机,且任意两个SSB对应的发送时机相同。并且,不同SSB对应的随机接入前导码不同。任意两个SSB对应的随机接入前导码的数量可以相等,也可以不等。
示例性的,参见表8,表8示出了不同SSB对应相同发送时机和不同随机接入前导码的情况。
表8
Figure PCTCN2020086783-appb-000009
Figure PCTCN2020086783-appb-000010
在对应关系三下,可选地,每个SSB对应至少一个发送时机,且任意两个SSB对应的发送时机不同,任意两个SSB对应的发送时机的数量可以相等,也可以不等。并且,不同SSB对应的随机接入前导码不同。任意两个SSB对应的随机接入前导码的数量可以相等,也可以不等。
示例性的,参见表9,表9示出了不同SSB对应不同发送时机和不同随机接入前导码的情况。
表9
Figure PCTCN2020086783-appb-000011
在对应关系三下,可选地,每个SSB对应至少一个发送时机,且任意两个SSB对应的发送时机不同,任意两个SSB对应的发送时机的数量可以相等,也可以不等。并且,不同SSB对应的随机接入前导码相同,也就是说,同一随机接入前导码在对应不同SSB时,作用也不同。
示例性的,参见表10,表10示出了不同SSB对应不同发送时机和相同随机接入前导码的情况。
表10
Figure PCTCN2020086783-appb-000012
Figure PCTCN2020086783-appb-000013
在对应关系三下,可选地,每个SSB对应至少一个发送时机,对应两步随机接入前导码的任意两个SSB所对应的两步随机接入前导码相同,且对应两步随机接入前导码的任意两个SSB对应的发送时机不同。对应两步随机接入前导码的任意两个SSB对应的发送时机的数量可以相等,也可以不等。两步随机接入前导码和四步随机接入前导码不同。
进一步地,对于四步随机接入前导码与发送时机以及SSB的对应关系不作限定。
示例性的,对应四步随机接入前导码的任意两个SSB所对应的四步随机接入前导码相同,且对应四步随机接入前导码的任意两个SSB对应的发送时机不同。对应四步随机接入前导码的任意两个SSB对应的发送时机的数量可以相等,也可以不等。
应理解,两步RACH资源的配置方式可以和四步RACH资源的配置方式互换。
示例性的,参见表11,表11示出了对应同一类型的随机接入前导码的SSB对应不同发送时机和相同随机接入前导码的情况。
表11
Figure PCTCN2020086783-appb-000014
在对应关系三下,可选地,每个SSB对应至少一个发送时机,对应两步随机接入前导码的任意两个SSB所对应的发送时机相同,且对应两步随机接入前导码的任意两个SSB对应的随机接入前导码不同。对应两步随机接入前导码的任意两个SSB对应的随机接入 前导码的数量可以相等,也可以不等。两步随机接入的发送时机和四步随机接入的发送时机不同。
进一步地,对于四步随机接入前导码与发送时机以及SSB的对应关系不作限定。
示例性的,对应四步随机接入前导码的任意两个SSB所对应的四步随机接入的发送时机相同,且对应四步随机接入的随机接入前导码的任意两个SSB对应的随机接入前导码不同。对应四步随机接入前导码的任意两个SSB对应的随机接入前导码的数量可以相等,也可以不等。
示例性的,参见表12,表12示出了对应同一类型的随机接入前导码的SSB对应不同随机接入前导码和相同发送时机的情况。
表12
SSB ID 发送时机ID 两步随机接入前导码ID
1 0~7 0~3
2 0~7 4~7
SSB ID 发送时机ID 四步随机接入前导码ID
3 16~23 8~11
4 16~23 12~14
应理解,表1至表12仅是示例性说明,并不对应本申请构成任何限定。
可以看出,对于在对应关系一和对应关系二,每个SSB对应的随机接入前导码中都包括两步随机接入前导码和四步随机接入前导码。对于对应关系三,每个SSB仅对应两步随机接入前导码和四步随机接入前导码中的一种。
本申请中,一种情况下,S210所确定出的目标随机接入前导码为从网络设备配置的两步随机接入前导码中选择出来的。以下,将结合上文中所描述的RACH资源与参考信号的对应关系,对终端设备如何从网络设备配置的两步随机接入前导码中确定目标随机接入前导码进行说明。
方式A
网络设备配置的两步随机接入前导码对应至少一个第一数据量阈值,每个第一数据量阈值对应一个第二信号强度阈值。一个两步随机接入前导码所对应的第一数据量阈值为该两步随机接入前导码支持的最大发送数据量。
以及,终端设备确定随机接入前导码,包括:
如果至少一个参考信号中存在对应的RSRP大于第一信号强度阈值的参考信号,从大 于第一信号强度阈值的参考信号中选择一个目标参考信号;如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,并且目标参考信号的RSRP大于目标第二信号强度阈值,从目标参考信号对应的两步随机接入前导码中确定目标随机接入前导码。其中,目标第二信号强度阈值为待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值。
本申请中,目标随机接入前导码支持所述待传输的数据量。进一步地,目标随机接入前导码对应的第一数据量阈值为目标第二信号强度阈值所对应的第一数据量阈值。
应理解,参考信号对应的RSRP是指对该参考信号进行测量得到的RSRP。
网络设备配置的两步随机接入前导码对应至少一个第一数据量阈值可以理解为,一个第一数据量阈值对应一组两步随机接入前导码,任意两个第一数据量阈值对应的两组两步随机接入前导码不同,一组两步随机接入前导码中的两步随机接入前导码支持的最大发送数据量为该组两步随机接入前导码对应的第一数据量阈值。
应理解,随机接入前导码与PUSCH资源有对应关系,一个PUSCH资源对应一个最大传输的数据块的大小,即最大TBS。可以认为,随机接入前导码与TBS对应,并且其含义是,当待发送的数据量小于(或,小于或等于)TBS时,可以使用该TBS对应的随机接入前导码。所以一个随机接入前导码支持的数据量,是指该随机接入前导码对应的PUSCH资源对应的TBS。
本申请中,至少一个参考信号为网络设备配置的SSB集合或者CSI-RS集合。与SSB集合对应的第一数据量阈值以及与CSI-RS集合对应的第一数据量阈值,可以由网络设备通过所述配置信息配置。或者,与SSB集合对应的第一数据量阈值以及与CSI-RS集合对应的第一数据量阈值可以根据网络设备通过所述配置信息配置的PUSCH资源的调制与编码策略(modulation and coding scheme,MCS)和PUSCH频域资源的大小确定。应理解,PUSCH资源为用于发送待传输的数据的资源。与SSB集合对应的第二信号强度阈值和与CSI-RS集合对应的第二信号强度阈值,可以由网络设备通过所述配置信息配置,但本申请对此不作限定。与SSB集合对应的第二信号强度阈值和与CSI-RS集合对应的第二信号强度阈值可以相等,也可以不等。类似地,与SSB集合对应的第一信号强度阈值和与CSI-RS集合对应的第一信号强度阈值可以相等,也可以不等。第一信号强度阈值小于第二信号强度阈值。第一信号强度阈值可以是现有技术中选择四步RACH随机接入前导的条件或现有技术中选择SSB的条件,具体可以参见现有技术。应理解,这里对任一概念或词语或术语所作的说明也适用于下述任一方式,因此在下文中描述其他确定目标随机接入前导码的方式时,将不再对相同的概念或词语或术语进行说明。
在本申请中,可以由PUSCH资源配置信息配置PUSCH资源。PUSCH资源配置信息可以包含PUSCH的时域和频域资源、解调参考信号(demodulation reference signal,DMRS),可以重复发送的次数、MCS、PUSCH初始发送功率、PUSCH目标接收功率、PUSCH发送功率的攀升步长、相对随机接入前导的功率偏差(即,下文中的Δ1)中的至少一个。其中,PUSCH初始发送功率可以是消息A初传时的PUSCH的发送功率。PUSCH目标接收功率是网络设备期望的PUSCH的接收功率,终端设备根据这个值和路损等确定消息A的PUSCH的发送功率。PUSCH发送功率的攀升步长是指终端设备在消息A重传时的攀升功率的步长,比如在消息A发送后没有收到网络设备的响应时进行重传时进行 PUSCH部分的功率攀升的步长。相对随机接入前导的功率偏差是消息A的PUSCH部分的发送功率和消息A的随机接入前导码的发送功率(即,下文中的TP)的差值(Δ1)。可选的,在消息A初传时,消息A的PUSCH部分的发送功率根据这个偏差和消息A的随机接入前导部分的发送功率等确定。消息A的随机接入前导部分的发送功率是根据路损和网络设备配置的消息A的随机接入前导部分的目标接收功率确定的。为便于理解,下文中将与SSB集合对应的第一信号强度阈值记作:第一SSB-RSRP门限;将与CSI-RS集合对应的第一信号强度阈值记作:第一CSI-RS-RSRP门限;将与SSB集合对应的第二信号强度阈值记作:第二SSB-RSRP门限;将与CSI-RS集合对应的第二信号强度阈值记作:第二CSI-RS-RSRP门限。可以理解,第二信号强度阈值可以是本申请中选择两步RACH随机接入前导的条件或选择SSB的条件。
下面分别以第一数据量阈值的数量为1和2为例,对方式A进行说明。
(1)第一数据量阈值的数量为1。
为便于理解,下文中将第一数据量阈值的数量为1时配置的第一数据量阈值,记作:TBS#1。具体地,终端设备可以首先判断配置的SSB集合中是否存在对应的RSRP大于第一SSB-RSRP门限的SSB,如果存在,则可以从对应的RSRP大于第一SSB-RSRP门限的SSB中随机选择一个SSB,将选择的SSB作为目标SSB。
然后,终端设备再判断待传输的数据量是否小于或者等于TBS#1。如果待传输的数据量大于TBS#1,则表示不能进行两步随机接入。如果待传输的数据量小于或者等于TBS#1,则终端设备判断目标SSB的RSRP是否大于第二SSB-RSRP门限。如果目标SSB的RSRP大于第二SSB-RSRP门限,则判断目标SSB对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以将目标SSB对应的两步随机接入前导码中满足条件的两步随机接入前导码中至少一个随机接入前导码确定为目标随机接入前导码。
在方式A至方式D中,满足条件的两步随机接入前导码是指,支持待传输的数据量的两步随机接入前导码,或者,对应的第一数据量阈值为目标第二信号强度阈值所对应的第一数据量阈值的两步随机接入前导码。
应理解,第一数据量阈值的数量为1时,所述待传输的数据量对应的第一数据量阈值为TBS#1,目标第二信号强度阈值为第二SSB-RSRP门限,满足条件的两步随机接入前导码为,支持的最大发送数据量为TBS#1的两步随机接入前导码。
还应理解,一个两步随机接入前导码支持待传输的数据量可以理解为,该两步随机接入前导码对应的第一数据量阈值大于或者等于待传输的数据量。
(2)第一数据量阈值的数量为2
为便于理解,下文中将第一数据量阈值的数量为2时的两个第一数据量阈值分别记作:TBS#1和TBS#2。其中,TBS#1<TBS#2。TBS#1与第二SSB-RSRP门限#1对应,TBS#2与第二SSB-RSRP门限#2对应。
具体地,与第一数据量阈值的数量为1时类似,终端设备可以首先判断配置的SSB集合中是否存在对应的RSRP大于第一SSB-RSRP门限的SSB,如果存在,则可以从对应的RSRP大于第一SSB-RSRP门限的SSB中随机选择一个SSB,将选择的SSB作为目标SSB。
然后,终端设备再判断待传输的数据量是否小于或者等于TBS#1,或者,是否小于或 者等于TBS#2。
如果待传输的数据量大于TBS#2,则表示不能进行两步随机接入。
如果待传输的数据量小于或者等于TBS#1,则终端设备判断目标SSB的RSRP是否大于第二SSB-RSRP门限#1。如果目标SSB的RSRP大于第二SSB-RSRP门限#1,则判断目标SSB对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。举例来说,假设TBS#1对应的一组两步随机接入前导码为前导码组#1,TBS#2对应的一组两步随机接入前导码为前导码组#2,那么目标随机接入前导码可以是前导码组#1中的随机接入前导码,也可以是前导码组#2中的随机接入前导码。优选的是,目标随机接入前导码从前导码组#1中选择的随机接入前导码。
或者,如果待传输的数据量小于或者等于TBS#2,且大于TBS#1,则终端设备判断目标SSB的RSRP是否大于第二SSB-RSRP门限#2。如果目标SSB的RSRP大于第二SSB-RSRP门限#2,则判断目标SSB对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以将目标SSB对应的两步随机接入前导码中支持满足条件的至少一个随机接入前导码确定为目标随机接入前导码。在这里,目标随机接入前导码只能是前导码组#2中的随机接入前导码。
应理解,若第一数据量阈值的数量为大于或者等于2的数值,假设该至少一个第一数据量阈值按照从小到大的顺序,依次为TBS#1,TBS#2,TBS#3,……,且与该至少一个第一数据量阈值依次对应的第二信号强度阈值为第二SSB-RSRP门限#1,第二SSB-RSRP门限#2,第二SSB-RSRP门限#3,……,任一第一数据量阈值TBS#i对应的第二信号强度阈值为第二SSB-RSRP门限#i,那么,如果待传输的数据量小于或者等于TBS#1,则传输的数据量对应的第一数据量阈值为TBS#1,目标第二信号强度阈值为第二SSB-RSRP门限#1。如果待传输的数据量大于TBS#i且小于或者等于TBS#(i+1),则待传输的数据量对应的第一数据量阈值为TBS#(i+1),目标第二信号强度阈值为第二SSB-RSRP门限#(i+1)。举例来说,第一数据量阈值的数量为2时,如果待传输的数据量小于TBS#1,则待传输的数据量对应的第一数据量阈值为TBS#1,目标第二信号强度阈值为第二SSB-RSRP门限#1。如果待传输的数据量大于TBS#1且小于或者等于TBS#2,则待传输的数据量对应的第一数据量阈值为TBS#2,目标第二信号强度阈值为第二SSB-RSRP门限#2。
应理解,本文中仅以参考信号为SSB为例进行说明,参考信号为CSI-RS时,可以采用类似的方式确定目标随机接入前导码,这里不再赘述。
方式B
网络设备配置的两步随机接入前导码对应至少一个第一数据量阈值,每个第一数据量阈值对应一个第二信号强度阈值。一个两步随机接入前导码所对应的第一数据量阈值为该两步随机接入前导码支持的最大发送数据量。
以及,终端设备确定随机接入前导码,包括:
如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,并且如果至少一个参考信号中存在对应的RSRP大于目标第二信号强度阈值的参考信号,从对应的RSRP大于第二信号强度阈值的参考信号中选择一个目标参考信号;从目标参考信号对应的两步随机接入前导码中确定目标随机接入前导码。其中,目标第二信号强度阈值的 定义可以参考方式A。
可选地,目标随机接入前导码支持所述待传输的数据量。进一步地,目标随机接入前导码对应的第一数据量阈值为目标第二信号强度阈值所对应的第一数据量阈值。
这里也分别以第一数据量阈值的数量为1和2为例,对方式B进行说明。
(1)第一数据量阈值的数量为1。
具体地,终端设备可以首先判断待传输的数据量是否小于或者等于TBS#1。如果待传输的数据量小于或者等于TBS#1,则终端设备判断SSB集合是否存在对应的RSRP大于第二SSB-RSRP门限的SSB,如果存在,则可以从对应的RSRP大于第二SSB-RSRP门限的SSB中随机选择一个SSB作为目标SSB。接着,终端设备再判断目标SSB对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。
(2)第一数据量阈值的数量为2
具体地,终端设备可以首先判断待传输的数据量是否小于或者等于TBS#1,或者,是否小于或者等于TBS#2。如果待传输的数据量小于或者等于TBS#1,则终端设备判断SSB集合中是否存在对应的RSRP大于第二SSB-RSRP门限#1的SSB,如果存在,则可以从对应的RSRP大于第二SSB-RSRP门限#1的SSB中随机选择一个SSB作为目标SSB。接着,终端设备再判断目标SSB对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。或者,如果待传输的数据量小于或者等于TBS#2,且大于TBS#1,则终端设备判断SSB集合中是否存在对应的RSRP大于第二SSB-RSRP门限#2的SSB,如果存在,则可以从对应的RSRP大于第二SSB-RSRP门限#2的SSB中随机选择一个SSB作为目标SSB。接着,终端设备再判断目标SSB对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。方式B与方式A的不同之处在于,方式B可以直接从大于第二SSB-RSRP门限的SSB中选择出目标SSB,而方式A需要首先从大于第一SSB-RSRP门限的SSB中选择出目标SSB。相比于方式A,方式B的效率较高。
对于方式A和方式B,根据前文所描述的参考信号与RACH资源的对应关系可知,如果存在目标SSB,并且如果参考信号与RACH资源的对应关系为对应关系一或对应关系二,就很有可能能确定出目标随机接入前导码。如果存在目标SSB,并且如果参考信号与RACH资源的对应关系为对应关系三,则可能不能确定出目标随机接入前导码。比如,参考信号与RACH资源的对应关系如表8所示,并且选择出的目标SSB为ID为2的SSB,由于ID为2的SSB只对应四步随机接入前导码,因此不能确定出目标随机接入前导码,或者说,不存在目标随机接入前导码。
方式C
网络设备配置的两步随机接入前导码对应至少一个第一数据量阈值,每个第一数据量阈值对应一个第二信号强度阈值。一个两步随机接入前导码所对应的第一数据量阈值为所述两步随机接入前导码支持的最大发送数据量。
以及,终端设备确定随机接入前导码,包括:
如果至少一个参考信号中存在对应的RSRP大于第一信号强度阈值的参考信号,并且如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,以及如果对应的RSRP大于第一信号强度阈值的参考信号中存在对应的RSRP大于目标第二信号强度阈值的参考信号,从对应的RSRP大于目标第二信号强度阈值的参考信号中确定目标参考信号,并将目标参考信号中满足条件的至少一个两步随机接入前导码确定为目标随机接入前导码。其中,目标参考信号可以是对应的RSRP大于目标第二信号强度阈值的参考信号中对应的随机接入前导码包括满足条件的两步随机接入前导码的参考信号。其中,目标第二信号强度阈值的定义可以参考方式A。
这里也分别以第一数据量阈值的数量为1和2为例,对方式C进行说明。
(1)第一数据量阈值的数量为1。
具体地,终端设备可以首先判断配置的SSB集合是否包括第一集合,以及待传输的数据量是否小于或者等于TBS#1,第一集合中任一SSB的RSRP大于第一SSB-RSRP门限的SSB。以及如果SSB集合中存在第一集合,且待传输的数据量小于或者等于TBS#1,则终端设备判断第一集合中是否存在对应的RSRP大于第二SSB-RSRP门限的SSB,如果存在,再接着判断这些对应的RSRP大于第二SSB-RSRP门限的SSB分别对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以随机选择一个对应的随机接入前导码包括满足条件的两步随机接入前导码的SSB作为目标SSB,并将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。
(2)第一数据量阈值的数量为2
具体地,终端设备可以首先判断配置的SSB集合是否包括第一集合,如果包括,则判断待传输的数据量是否小于或者等于TBS#1,或者,是否小于或者等于TBS#2。
如果待传输的数据量小于或者等于TBS#1,则终端设备判断SSB集合中对应的RSRP大于第一SSB-RSRP门限#1的SSB中,是否存在对应的RSRP大于第二SSB-RSRP门限#1的SSB,如果存在,再接着判断这些对应的RSRP大于第二SSB-RSRP门限#1的SSB分别对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以随机选择一个对应的随机接入前导码包括满足条件的两步随机接入前导码的SSB作为目标SSB,并将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。
或者,如果待传输的数据量小于或者等于TBS#2,且大于TBS#1,则终端设备判断SSB集合中对应的RSRP大于第一SSB-RSRP门限#2的SSB中,是否存在对应的RSRP大于第二SSB-RSRP门限#2的SSB,如果存在,再接着判断这些对应的RSRP大于第二SSB-RSRP门限#2的SSB分别对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以随机选择一个对应的随机接入前导码包括满足条件的两步随机接入前导码的SSB作为目标SSB,并将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。
方式D
网络设备配置的两步随机接入前导码对应至少一个第一数据量阈值,每个第一数据量 阈值对应一个第二信号强度阈值。一个两步随机接入前导码所对应的第一数据量阈值为该两步随机接入前导码支持的最大发送数据量。
以及,终端设备确定随机接入前导码,包括:
如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,以及如果至少一个参考信号中存在对应的RSRP大于目标第二信号强度阈值的参考信号,从对应的RSRP大于目标第二信号强度阈值的参考信号中确定目标参考信号,并将目标参考信号中满足条件的至少一个两步随机接入前导码确定为目标随机接入前导码。其中,目标参考信号可以是对应的RSRP大于目标第二信号强度阈值的参考信号中对应的随机接入前导码包括满足条件的两步随机接入前导码的参考信号。其中,目标第二信号强度阈值的定义可以参考方式A。
这里也分别以第一数据量阈值的数量为1和2为例,对方式D进行说明。
(1)第一数据量阈值的数量为1。
具体地,终端设备可以首先判断待传输的数据量是否小于或者等于TBS#1。如果待传输的数据量小于或者等于TBS#1,则终端设备判断SSB集合是否存在对应的RSRP大于第二SSB-RSRP门限的SSB,如果存在,再接着判断这些对应的RSRP大于第二SSB-RSRP门限的SSB分别对应的随机接入前导码中是否包括两步随机接入前导码,如果包括,则可以随机选择一个对应的随机接入前导码包括满足条件的两步随机接入前导码的SSB作为目标SSB,并将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。。
(2)第一数据量阈值的数量为2
具体地,终端设备可以首先判断待传输的数据量是否小于或者等于TBS#1,或者,是否小于或者等于TBS#2。如果待传输的数据量小于或者等于TBS#1,则终端设备判断SSB集合中是否存在对应的RSRP大于第二SSB-RSRP门限#1的SSB,如果存在,再接着判断这些对应的RSRP大于第二SSB-RSRP门限#1的SSB分别对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以随机选择一个对应的随机接入前导码包括满足条件的两步随机接入前导码的SSB作为目标SSB,并将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。或者,如果待传输的数据量小于或者等于TBS#2,且大于TBS#1,则终端设备判断SSB集合中是否存在对应的RSRP大于第二SSB-RSRP门限#2的SSB,如果存在,再接着判断这些对应的RSRP大于第二SSB-RSRP门限#2的SSB分别对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以随机选择一个对应的随机接入前导码包括满足条件的两步随机接入前导码的SSB作为目标SSB,并将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。
方式D与方式C的不同之处在于,方式D可以直接判断SSB集合中大于第二SSB-RSRP门限的SSB,而方式C需要首先从SSB集合中确定出所有大于第一SSB-RSRP门限的SSB,再从所有大于第一SSB-RSRP门限的SSB中确定出大于第二SSB-RSRP门限的SSB。相比于方式C,方式D的效率较高。
对于方式C和方式D,根据前文所描述的参考信号与RACH资源的对应关系可知,如果参考信号与RACH资源的对应关系为对应关系一或对应关系二,如果存在大于第二 SSB-RSRP门限的SSB,就可能能确定出目标随机接入前导码。如果参考信号与RACH资源的对应关系为对应关系三,并且如果大于第二SSB-RSRP门限的SSB中存在至少一个对应的随机接入前导码包括两步随机接入前导码的SSB,就可能能确定出目标随机接入前导码。
方式E
网络设备配置的两步随机接入前导码对应至少一个第一数据量阈值,每个第一数据量阈值对应一个PL1,PL1为第一路损阈值。一个两步随机接入前导码所对应的第一数据量阈值为所述两步随机接入前导码支持的最大发送数据量。
以及,终端设备确定随机接入前导码,包括:
如果至少一个参考信号的RSRP大于第一信号强度阈值,从大于第一信号强度阈值的参考信号中选择一个目标参考信号;如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,并且目标参考信号对应的路损小于目标PL1,从目标参考信号对应的两步随机接入前导码中确定目标随机接入前导码。可选地,目标随机接入前导码支持所述待传输的数据量。进一步地,目标随机接入前导码对应的第一数据量阈值为目标第二信号强度阈值所对应的第一数据量阈值。
本申请中,PL1=PCMAX-TP-Δ1,PL1为第一路损阈值,PCMAX为终端设备在执行随机接入的小区的最大发射功率,TP为两步随机接入前导码的目标接收功率,Δ1为所述待发送数据与两步随机接入前导码的功率偏差。PCMAX、TP和Δ1中的一个或多个可以通过所述配置信息配置,也可以是协议约定,但本申请对此不作限定。目标PL1为待传输的数据量对应的第一数据量阈值所对应的PL1。
举例来说,路损可以是网络设备发送参考信号的RSRP和终端设备测量的RSRP的差值。其中,网络设备发送参考信号的RSRP可是网络设备配置给终端设备的。或者,网络设备可直接配置PL1,或者由协议规定PL1。
下面分别以第一数据量阈值的数量为1和2为例,对方式E进行说明。
(1)第一数据量阈值的数量为1。
具体地,终端设备可以首先判断配置的SSB集合中是否存在对应的RSRP大于第一SSB-RSRP门限的SSB,如果存在,则可以从对应的RSRP大于第一SSB-RSRP门限的SSB中随机选择一个SSB,将选择的SSB作为目标SSB。
然后,终端设备再判断待传输的数据量是否小于或者等于TBS#1。如果待传输的数据量大于TBS#1,则表示不能进行两步随机接入。如果待传输的数据量小于或者等于TBS#1,则终端设备判断目标SSB对应的路损是否小于目标PL1。如果目标SSB对应的路损小于目标PL1,则判断目标SSB对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。
在方式E和方式F中,满足条件的两步随机接入前导码是指,支持待传输的数据量的两步随机接入前导码,或者,对应的第一数据量阈值为目标PL1所对应的第一数据量阈值的两步随机接入前导码。
应理解,第一数据量阈值的数量为1时,所述待传输的数据量对应的第一数据量阈值为TBS#1,目标PL1为唯一的一个PL1,满足条件的两步随机接入前导码为,支持的最大 发送数据量为TBS#1的两步随机接入前导码。
(2)第一数据量阈值的数量为2
为便于理解,下文中将TBS#1对应的PL1记作:PL1#1,将TBS#2对应的PL1记作:PL1#2。
具体地,终端设备可以首先判断配置的SSB集合中是否存在对应的RSRP大于第一SSB-RSRP门限的SSB,如果存在,则可以从对应的RSRP大于第一SSB-RSRP门限的SSB中随机选择一个SSB,将选择的SSB作为目标SSB。
然后,终端设备再判断待传输的数据量是否小于或者等于TBS#1,或者,是否小于或者等于TBS#2。
如果待传输的数据量大于TBS#2,则表示不能进行两步随机接入。
如果待传输的数据量小于或者等于TBS#1,则终端设备判断目标SSB对应的路损是否小于PL1#1。如果目标SSB对应的路损小于PL1#1,则判断目标SSB对应的随机接入前导码中是否包括满足条件的两步随机接入前导码,如果包括,则可以将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。
或者,如果待传输的数据量小于或者等于TBS#2,且大于TBS#1,则终端设备判断目标SSB对应的路损是否小于PL1#2。如果目标SSB对应的路损小于PL1#2,则判断目标SSB对应的随机接入前导码中是否满足条件的包括两步随机接入前导码,如果包括,则可以将目标SSB对应的两步随机接入前导码中满足条件的至少一个随机接入前导码确定为目标随机接入前导码。
应理解,若第一数据量阈值的数量为大于或者等于2的数值,假设该至少一个第一数据量阈值按照从小到大的顺序,依次为TBS#1,TBS#2,TBS#3,……,且与该至少一个第一数据量阈值依次对应的PL1为PL1#1,PL1#2,PL1#3,……,任一第一数据量阈值TBS#i对应的PL1为PL1#i,那么,如果待传输的数据量大于0且小于或者等于TBS#1,则待传输的数据量对应的第一数据量阈值为TBS#1,目标PL1为PL1#1。如果待传输的数据量大于TBS#i且小于或者等于TBS#(i+1),则待传输的数据量对应的第一数据量阈值为TBS#(i+1),目标PL1为PL1#(i+1)。举例来说,第一数据量阈值的数量为2时,如果待传输的数据量小于TBS#1,则待传输的数据量对应的第一数据量阈值为TBS#1,目标PL1为PL1#1。如果待传输的数据量大于TBS#1且小于或者等于TBS#2,则待传输的数据量对应的第一数据量阈值为TBS#2,目标PL1为PL1#2。
方式F
网络设备配置的两步随机接入前导码对应至少一个第一数据量阈值,每个第一数据量阈值对应一个PL1,PL1为第一路损阈值。一个两步随机接入前导码所对应的第一数据量阈值为该两步随机接入前导码支持的最大发送数据量。
以及,终端设备确定随机接入前导码,包括:
如果至少一个参考信号的RSRP大于第一信号强度阈值,并且如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,以及如果对应的RSRP大于第一信号强度阈值的参考信号中存在对应的路损小于目标PL1的参考信号,从对应的RSRP大于第一信号强度阈值且对应的路损小于目标PL1的参考信号中确定目标参考信号,并将目 标参考信号中满足条件的至少一个两步随机接入前导码确定为目标随机接入前导码。其中,目标参考信号可以是对应的RSRP大于第一信号强度阈值且对应的路损小于目标PL1的参考信号中对应的随机接入前导码包括满足条件的两步随机接入前导码的参考信号。其中,目标PL1的定义参见方式E。
可以理解,方式F与方式C类似,这里不再赘述。
方式G
终端确定随机接入前导码,包括:
如果至少一个参考信号中存在对应的RSRP大于第一信号强度阈值的参考信号,从对应的RSRP大于第一信号强度阈值的参考信号中选择一个目标参考信号,并确定是否配置了第一组随机接入前导码;
若配置了第一组随机接入前导码,并且,待传输的数据量大于第二数据量阈值,以及,目标参考信号对应的路损小于PL2,则从目标参考信号对应的属于第一组随机接入前导码中的随机接入前导码中确定目标随机接入前导码;或
若配置了第一组随机接入前导码,并且,待传输的数据量小于或者等于第二数据量阈值,从目标参考信号对应的属于第二组随机接入前导码中的随机接入前导码中中确定目标随机接入前导码;或
若配置了第一组随机接入前导码,并且,目标参考信号对应的路损大于或者等于PL2,从目标参考信号对应的属于第二组随机接入前导码中的随机接入前导码中确定目标随机接入前导码。
其中,第一组随机接入前导码支持的发送数据量大于第二数据量阈值,第二组随机接入前导码支持的最大发送数据量为第二数据量阈值。第一组随机接入前导码和第二组随机接入前导码为两步随机接入前导码。其中,PL2=PCMAX-TP-Δ1-Δ2,PL2为第二路损阈值,PCMAX为终端设备在执行随机接入的小区的最大发射功率,TP为两步随机接入的随机接入前导码的目标接收功率,Δ1为所述待发送数据与两步随机接入前导码的功率偏差,Δ2为所述第一组随机接入前导码与第二组随机接入前导码的功率偏差。第一组随机接入前导码、第二组随机接入前导码、PCMAX、TP、Δ1和Δ2可以通过所述配置信息配置,但本申请对此不作限定。第一组随机接入前导码和第二组随机接入前导码为两步随机接入前导码。
本申请中,至少一个参考信号为网络设备配置的SSB集合或者CSI-RS集合。与SSB集合对应的第二数据量阈值以及与CSI-RS集合对应的第二数据量阈值,可以由网络设备通过所述配置信息配置。或者,与SSB集合对应的第二数据量阈值以及与CSI-RS集合对应的第二数据量阈值可以通过网络设备通过所述配置信息配置的PUSCH资源的MCS和PUSCH频域资源的大小确定。应理解,这里对任一概念或词语或术语所作的说明也适用于下述任一方式,因此在下文中描述其他确定目标随机接入前导码的方式时,将不再对相同的概念或词语或术语进行说明。
以SSB为例来讲,简而言之,如果网络设备配置的SSB集合中存在对应的RSRP大于第一信号强度阈值的SSB,则可以从对应的RSRP大于第一信号强度阈值的SSB中随机选择一个SSB作为目标SSB。接着,终端设备判断是否配置了第一组随机接入前导码。如果配置了第一组随机接入前导码,并且条件(a)和(b)成立,则从目标参考信号对应 的属于第一组随机接入前导码的随机接入前导码中确定目标随机接入前导码。如果条件(a)和(b)中的任意一项不成立,则从目标参考信号对应的属于第二组随机接入前导码的随机接入前导码中确定目标随机接入前导码。其中,条件(a):待传输的数据量大于第二数据量阈值;条件(b)目标参考信号对应的路损小于PL2。
方式H
终端确定随机接入前导码,包括:
如果至少一个参考信号中存在对应的RSRP大于第一信号强度阈值的参考信号,确定是否配置了第一组随机接入前导码;若配置了第一组随机接入前导码,并且条件(c)和(d)成立,则从目标参考信号对应的属于第一组随机接入前导码的随机接入前导码中确定目标随机接入前导码。如果条件(c)和(d)中的任意一项不成立,则从目标参考信号对应的属于第二组随机接入前导码的随机接入前导码中确定目标随机接入前导码。其中,条件(c):待传输的数据量大于第二数据量阈值;条件(d)对应的RSRP大于第一信号强度阈值的参考信号中存在对应的路损小于PL2的参考信号。
方式I
终端确定随机接入前导码,包括:
如果至少一个参考信号中存在对应的RSRP大于第一信号强度阈值的参考信号,从对应的RSRP大于第一信号强度阈值的参考信号中选择一个目标参考信号,并确定是否配置了第一组随机接入前导码;
若配置了第一组随机接入前导码,并且,待传输的数据量大于第二数据量阈值,以及待传输的数据通过公共控制信道CCCH承载,从目标参考信号对应的属于第一组随机接入前导码的随机接入前导码中确定目标随机接入前导码;
若配置了第一组随机接入前导码,并且,待传输的数据量小于或者等于第二数据量阈值,从目标参考信号对应的属于第二组随机接入前导码的随机接入前导码中确定目标随机接入前导码;或者,
若配置了第一组随机接入前导码,并且,待传输的数据不通过CCCH承载,从目标参考信号对应的属于第二组随机接入前导码的随机接入前导码中确定目标随机接入前导码。
在方式H和I中,进一步地,若终端设备确定没有配置第一组随机接入前导码,从目标参考信号对应的属于第二组随机接入前导码的随机接入前导码确定目标随机接入前导码。
可选地,作为本申请一个实施例,若目标参考信号对应的随机接入前导码中不包括两步随机接入前导码,或者不包括满足条件的两步随机接入前导码,则终端设备可以从网络设备配置的四步随机接入前导码中确定目标随机接入前导码。例如,终端设备可以将目标参考信号对应的随机接入前导码中支持待传输的数据量的四步随机接入前导码确定为目标随机接入前导码。再如,选择四步随机接入前导的方式也可以参考现有的方式,比如基于测量的路损和待发送数据量、基于由CCCH触发的数据量来选。
上文中描述了目标随机接入前导码是两步随机接入前导码时,如何确定目标随机接入前导码的方式。目标随机接入前导码是四步随机接入前导码时,确定目标随机接入前导码的方式可以参见现有技术,本文中不再赘述。
可选地,在终端设备确定目标随机接入前导码之前,终端设备可以确定需要采用两步 随机接入进行随机接入。
比如,终端设备可以根据以下因素之一或组合确定需要采用两步随机接入进行随机接入:
(1)两步随机接入和四步随机接入的负载信息。例如,两步随机接入的负载低,则确定需要采用两步随机接入进行随机接入;
(2)终端设备发起的上行的原因。例如,上行优先级高,则确定需要采用两步随机接入。例如,紧急呼叫,则确定需要采用两步随机接入
(3)上行业务的质量服务信息。例如,对于非激活(inactive)终端设备,对于质量服务等级高的上行业务,确定需要采用两步随机接入。
可选地,作为本申请一个实施例,终端设备可以根据上述一些方式确定目标SSB之后,再确定随机接入类型。比如,若目标SSB中同时包括两步随机接入前导码和四步随机接入前导码,终端设备可以根据上述所列出的(1)至(3)中之一或多个来确定采用两步随机接入还是四步随机接入。
可选地,作为本申请一个实施例,终端设备进行使用目标随机接入前导码进行随机接入,包括:
终端设备从所述目标参考信号对应的发送时机中确定下一个可用发送时机;在该可用发送时机上使用所述随机接入前导码进行随机接入。
通过前文中所描述的一些确定随机接入前导码的方式,可以确定一个目标参考信号。该目标参考信号对应至少一个发送时机(或称可用发送时机),终端设备可以选择下一个发送时机,即在时间上距离当前最近的一个发送时机,在该发送时机上发送所选择的目标随机接入前导码和待传输数据,进行两步随机接入。
以下,对方法400可能的应用场景进行说明。
在一种实现方式中,方法400可以用于数据初传。也就是说,S420中所进行的随机接入用于数据初传。应理解,S420所进行的随机接入可以是两步随机接入也可以是四步随机接入。
可选地,在方法400用于数据初传的场景下,该方法还可以包括:在该随机接入失败的情况下,进行两步随机接入。
也就是说,在用于数据初传的随机接入失败的情况下,终端设备再次进行两步随机接入。
当终端设备再次进行两步随机接入时,终端设备可以使用上述确定目标随机接入前导码的方式再次选择随机接入前导码,以进行随机接入。或者,终端设备可以直接使用初传时所使用的目标随机接入前导码,或者目标随机接入前导码所在的随机接入前导码组(例如,第一组随机接入前导码或者第二组随机接入前导码)、或者目标SSB中所包括的满足条件的两步随机接入前导码中的任一随机接入前导码,进行随机接入。
可选地,在方法400用于数据初传的场景下,如果该随机接入失败,并且终端设备没有接收到网络设备指示的回退四步随机接入的RACH资源,则再次进行两步随机接入。
可选地,在方法400用于数据初传的场景下,该方法还可以包括:在该随机接入失败的情况下,进行四步随机接入或者回退到四步随机接入。
在进行四步随机接入或者回退到四步随机接入时,终端设备可以首先确定用于四步随 机接入的随机接入前导码。
可选地,终端设备可以采用现有技术中消息3初传或PUSCH初传时选择随机接入前导码的方式,确定用于四步随机接入的随机接入前导码,也可以采用现有技术中消息3或PUSCH重传时选择随机接入前导码的方式,确定用于四步随机接入的随机接入前导码,具体可以参见现有技术,这里不再赘述。
可选地,在初传为四步随机接入的场景下,终端设备也可以直接使用初传时所使用的目标随机接入前导码,或者初传时所使用的目标随机接入前导码所在的随机接入前导码组(如现有技术中的组A或组B)中的任一随机接入前导码,进行随机接入。
本申请中,网络设备可以指示终端设备回退到四步随机接入进行随机接入前导码的发送。或者,终端设备在没有收到网络设备的响应消息时或根据网络设备的负载回退到四步随机接入进行随机接入前导码的发送。例如,网络设备发送两步或四步随机接入的负载状态信息,若两步随机接入的负载高,则自行回退到四步随机接入。反之,若四步随机接入的负载高,则自行回退到两步随机接入。
本申请中,可选地,随机接入失败的原因可能是下述中的一种或多种的组合:
终端设备没有接收到消息B或者消息2;
在网络设备指示数据部分的重传资源后,数据部分在N次重传后仍没有发送成功;
在网络设备指示回退到四步随机接入的消息3发送后,消息3在N次重传后仍没有发送成功;
在网络设备指示回退到四步随机接入后,消息A的数据部分在N次重传后仍没有发送成功;
终端设备接收到的响应消息包含有终端设备发送的Preamble ID和针对这个preamble ID分配的上行授权,即没有包含这个preamble对应的竞争解决信息;
终端设备接收到响应消息时,包含有终端设备所发送的Preamble ID且包含竞争解决信息,但是终端设备没有成功通过竞争解决;。
在网络设备指示重传消息A的情况,重传时携带preamble和PUSCH,重传后仍没有发送成功。
在另一种实现方式中,方法400可以用于数据重传。也就是说,S420中所进行的随机接入用于数据重传。
进一步地,在方法400用于数据重传的场景下,该方法还可以包括:在四步随机接入失败的情况下,进行两步随机接入。
也就是说,在用于数据初传的四步随机接入失败的情况下,终端设备再次选择进行两步随机接入。
在又一种实现方式中,在S420中所进行的随机接入失败的情况下,该方法还可以包括:终端设备接收网络设备发送的指示信息,并且根据该指示信息,进行随机接入。即,在随机接入失败的情况下,终端设备根据网络设备发送的指示信息,再次进行随机接入。
具体地,在S420中所进行的随机接入失败的情况下,网络设备可以向终端设备发送指示信息,该指示信息可以指示终端设备进行两步随机接入,也可以指示终端设备进行四步随机接入。终端设备接收到网络设备发送的指示信息后,若该指示信息指示终端设备进行两步随机接入,则终端设备进行两步随机接入,若该指示信息指示终端设备进行四步随 机接入,则终端设备进行四步随机接入。
相比于上述两种由终端设备自己决定随机接入失败后再次进行随机接入的随机接入类型的方式,在该实现方式中,需要网络设备指示随机接入失败后再次进行随机接入的随机接入类型。
上文中描述了本申请提供的方法,下面对本申请提供的装置进行说明。
图5是本申请实施例提供的通信装置的示意性框图。如图5所示,该通信装置500可以包括处理单元510和收发单元520。
在一种可能的设计中,该通信装置500可对应于上文方法实施例中的终端设备,例如,可以为终端设备,或者配置于终端设备中的芯片。当该通信装置是终端设备时,该处理单元可以是处理器,收发单元可以是收发器。该通信装置还可以包括存储单元,该存储单元可以是存储器。该存储单元用于存储指令,该处理单元执行该存储单元所存储的指令,以使该通信装置执行上述方法。当该通信装置是终端设备内的芯片时,该处理单元可以是处理器,收发单元可以是输入/输出接口、管脚或电路等;该处理单元执行存储单元所存储的指令,以使该通信装置执行上述方法400中由终端设备所执行的操作,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该通信装置内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
在一种实现方式中,该通信装置500可对应于根据本申请实施例的方法中的终端设备,该通信装置500可以包括用于执行图4中的方法中的终端设备执行的方法的单元。并且,该通信装置中的各单元和上述其他操作和/或功能为了实现图4中的方法的相应流程。具体地,处理单元510可用于执行图4所示的方法中的S410,收发单元520可用于执行图4所示的方法中的420和S404。
在另一种可能的设计中,该通信装置500可对应于上文方法实施例中的网络设备,例如,可以为网络设备,或者配置于网络设备中的芯片。当该通信装置是网络设备时,该处理单元可以是处理器,收发单元可以是收发器。该通信装置还可以包括存储单元,该存储单元可以是存储器。该存储单元用于存储指令,该处理单元执行该存储单元所存储的指令,以使该通信装置执行上述方法。当该通信装置是网络设备内的芯片时,该处理单元可以是处理器,该收发单元可以是输入/输出接口、管脚或电路等;该处理单元执行存储单元所存储的指令,以使该通信装置执行上述方法400中由网络设备所执行的操作,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该通信装置内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
在一种实现方式中,该通信装置500可对应于根据本申请实施例的方法中的网络设备,该通信装置500可以包括用于执行图4中的网络设备执行的方法的单元。并且,该通信装置500中的各单元和上述其他操作和/或功能为了实现图4中的方法400的相应流程。具体地,当该通信装置500用于执行图4中的方法400时,处理单元510可用于执行图4所示的方法中的S402,收发单元420可用于执行图4中的方法中的S420和S404。
上述各个装置实施例中网络设备与终端设备和方法实施例中的网络设备或终端设备完全对应,由相应的模块或单元执行相应的步骤,例如收发单元(收发器)方法执行方法实施例中发送和/或接收的步骤,除发送接收外的其它步骤可以由处理单元(处理器)执行。具体单元的功能可以参考相应的方法实施例。收发单元可以包括发送单元和/或接收 单元,收发器可以包括发射器和/或接收器,分别实现收发功能;处理器可以为一个或多个。
应理解,上述各个单元的划分仅仅是功能上的划分,实际实现时可能会有其它的划分方法。
上述终端设备或者网络设备可以是一个芯片,处理单元可以通过硬件来实现也可以通过软件来实现,当通过硬件实现时,该处理单元可以是逻辑电路、集成电路等;当通过软件来实现时,该处理单元可以是一个通用处理器,通过读取存储单元中存储的软件代码来实现,该存储单元可以集成在处理器中,也可以位于所述处理器之外,独立存在。
图6为本申请提供的一种终端设备10的结构示意图。为了便于说明,图6仅示出了终端设备的主要部件。如图6所示,终端设备10包括处理器、存储器、控制电路、天线以及输入输出装置。
处理器主要用于对通信协议以及通信数据进行处理,以及对整个终端设备进行控制,执行软件程序,处理软件程序的数据,例如用于支持终端设备执行上述方法实施例中所描述的动作。存储器主要用于存储软件程序和数据。控制电路主要用于基带信号与射频信号的转换以及对射频信号的处理。控制电路和天线一起也可以叫做收发器,主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。
当终端设备开机后,处理器可以读取存储单元中的软件程序,解释并执行软件程序的指令,处理软件程序的数据。当需要通过无线发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。
本领域技术人员可以理解,为了便于说明,图6仅示出了一个存储器和处理器。在实际的终端设备中,可以存在多个处理器和存储器。存储器也可以称为存储介质或者存储设备等,本申请实施例对此不做限制。
作为一种可选的实现方式,处理器可以包括基带处理器和中央处理器,基带处理器主要用于对通信协议以及通信数据进行处理,中央处理器主要用于对整个终端设备进行控制,执行软件程序,处理软件程序的数据。图6中的处理器集成了基带处理器和中央处理器的功能,本领域技术人员可以理解,基带处理器和中央处理器也可以是各自独立的处理器,通过总线等技术互联。本领域技术人员可以理解,终端设备可以包括多个基带处理器以适应不同的网络制式,终端设备可以包括多个中央处理器以增强其处理能力,终端设备的各个部件可以通过各种总线连接。所述基带处理器也可以表述为基带处理电路或者基带处理芯片。所述中央处理器也可以表述为中央处理电路或者中央处理芯片。对通信协议以及通信数据进行处理的功能可以内置在处理器中,也可以以软件程序的形式存储在存储单元中,由处理器执行软件程序以实现基带处理功能。
示例性的,在本申请实施例中,可以将具有收发功能的天线和控制电路视为终端设备10的收发单元101,将具有处理功能的处理器视为终端设备10的处理单元102。如图6所示,终端设备10包括收发单元101和处理单元102。收发单元也可以称为收发器、收 发机、收发装置等。可选的,可以将收发单元101中用于实现接收功能的器件视为接收单元,将收发单元101中用于实现发送功能的器件视为发送单元,即收发单元101包括接收单元和发送单元。示例性的,接收单元也可以称为接收机、接收器、接收电路等,发送单元可以称为发射机、发射器或者发射电路等。
图6所示的终端设备可以执行上述方法中终端设备所执行的各动作,这里,为了避免赘述,省略其详细说明。
27是本申请提供的一种网络设备的结构示意图,该网络设备例如可以为基站。如图7所示,该基站可应用于如图1所示的通信系统中,执行上述方法实施例中网络设备的功能。基站20可包括一个或多个射频单元,如远端射频单元(remote radio unit,RRU)201和一个或多个基带单元(baseband unit,BBU)(也可称为数字单元(digital unit,DU))202。所述RRU 201可以称为收发单元、收发机、收发电路、或者收发器等等,其可以包括至少一个天线2011和射频单元2012。所述RRU 201部分主要用于射频信号的收发以及射频信号与基带信号的转换,例如用于发送上述方法实施例BFR配置。所述BBU 202部分主要用于进行基带处理,对基站进行控制等。所述RRU 201与BBU 202可以是物理上设置在一起,也可以物理上分离设置的,即分布式基站。
所述BBU 202为基站的控制中心,也可以称为处理单元,主要用于完成基带处理功能,如信道编码,复用,调制,扩频等等。例如所述BBU(处理单元)202可以用于控制基站执行上述方法实施例中关于网络设备的操作流程。
在一个实施例中,所述BBU 202可以由一个或多个单板构成,多个单板可以共同支持单一接入指示的无线接入网(如LTE网络),也可以分别支持不同接入制式的无线接入网(如LTE网,5G网或其它网)。所述BBU 202还包括存储器2021和处理器2022,所述存储器2021用于存储必要的指令和数据。所述处理器2022用于控制基站进行必要的动作,例如用于控制基站执行上述方法实施例中关于网络设备的操作流程。所述存储器2021和处理器2022可以服务于一个或多个单板。也就是说,可以每个单板上单独设置存储器和处理器。也可以是多个单板共用相同的存储器和处理器。此外每个单板上还可以设置有必要的电路。
另外,网络设备不限于上述形态,也可以是其它形态:例如:包括BBU和自适应无线单元(adaptive radio unit,ARU),或BBU和有源天线单元(active antenna unit,AAU);也可以为客户终端设备(customer premises equipment,CPE),还可以为其它形态,本申请不限定。
应注意,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其它可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请各实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪 存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
应理解,本申请实施例中的处理器可以为中央处理单元(central processing unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。
还应理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的随机存取存储器(random access memory,RAM)可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行上述方法实施例中由终端设备或者网络设备所执行的方法。
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行上述方法实施例中由终端设备或者网络设备所执行的方法。
根据本申请实施例提供的方法,本申请还提供一种系统,其包括前述的一个或多个终端设备以及一个或多个网络设备。
上述实施例,可以全部或部分地通过软件、硬件、固件或其他任意组合来实现。当使用软件实现时,上述实施例可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载或执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以为通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集合的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,数字通用光盘(digital versatile disc,DVD))、或者半导体 介质。半导体介质可以是固态硬盘。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
还应理解,在本申请中,“当…时”、“若”以及“如果”均指在某种客观情况下终端设备或者网络设备会做出相应的处理,并非是限定时间,且也不要求终端设备或网络设备实现时一定要有判断的动作,也不意味着存在其它限定。
本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。
本文中术语“……中的至少一个”或“……中的至少一种”或“……中的至少一项”,表示所列出的各项的全部或任意组合,例如,“A、B和C中的至少一种”,可以表示:单独存在A,单独存在B,单独存在C,同时存在A和B,同时存在B和C,同时存在A、B和C这六种情况。
应理解,在本申请各实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而 前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准

Claims (21)

  1. 一种随机接入方法,其特征在于,包括:
    确定随机接入前导码,所述随机接入前导码为从至少一个两步随机接入前导码中所确定出的至少一个,或者,所述随机接入前导码为从至少一个两步随机接入前导码和至少一个四步随机接入前导码中所确定出的一种;
    使用所述随机接入前导码进行随机接入。
  2. 如权利要求1所述的方法,其特征在于,在所述随机接入为用于数据初传的情况下,所述方法还包括:
    在所述随机接入失败的情况下,进行两步随机接入。
  3. 如权利要求1所述的方法,其特征在于,在所述随机接入为用于数据重传的情况下,所述方法还包括:
    在所述随机接入失败的情况下,进行两步随机接入或者四步随机接入。
  4. 如权利要求1所述的方法,其特征在于,在所述随机接入失败的情况下,所述方法还包括:
    接收网络设备发送的指示信息,所述指示信息用于指示终端设备进行两步随机接入,或者,所述指示信息用于指示终端设备进行四步随机接入;
    根据所述指示信息,进行随机接入。
  5. 如权利要求1至4中任一项所述的方法,其特征在于,所述随机接入前导码为两步随机接入前导码,所述至少一个两步随机接入前导码对应至少一个第一数据量阈值,一个两步随机接入前导码所对应的第一数据量阈值为所述两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个第二信号强度阈值;
    以及,所述确定随机接入前导码,包括:
    如果网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于第一信号强度阈值的参考信号,从大于所述第一信号强度阈值的参考信号中选择一个目标参考信号,所述参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS;
    如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,并且所述目标参考信号的RSRP大于目标第二信号强度阈值,从所述目标参考信号对应的两步随机接入前导码中确定所述随机接入前导码,所述随机接入前导码对应的第一数据量阈值为所述目标第二信号强度阈值所对应的第一数据量阈值,其中,所述目标第二信号强度阈值为所述待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值。
  6. 如权利要求1至4中任一项所述的方法,其特征在于,所述随机接入前导码为两步随机接入前导码,所述至少一个两步随机接入前导码对应至少一个第一数据量阈值,一个两步随机接入前导码所对应的第一数据量阈值为所述两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个PL1,PL1为第一路损阈值;
    以及,所述确定随机接入前导码,包括:
    如果网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于第一信号强度阈值的参考信号,从大于所述第一信号强度阈值的参考信号中选择一个目标参 考信号,所述参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS;
    如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,并且所述目标参考信号对应的路损小于目标PL1,从所述目标参考信号对应的两步随机接入前导码中确定所述随机接入前导码,所述随机接入前导码对应的第一数据量阈值为所述目标第二信号强度阈值所对应的第一数据量阈值,
    其中,PL1=PCMAX-TP-Δ1,PL1为第一路损阈值,PCMAX为终端设备在执行随机接入的小区的最大发射功率,TP为两步随机接入前导码的目标接收功率,Δ1为所述待发送数据与两步随机接入前导码的功率偏差,所述目标PL1为所述待传输的数据量对应的第一数据量阈值所对应的PL1。
  7. 如权利要求1至4中任一项所述的方法,其特征在于,所述随机接入前导码为两步随机接入前导码;
    以及,所述确定随机接入前导码,包括:
    如果网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于第一信号强度阈值的参考信号,从对应的RSRP大于所述第一信号强度阈值的参考信号中选择一个目标参考信号,所述参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS;
    确定是否配置了第一组随机接入前导码,所述第一组随机接入前导码支持的发送数据量大于第二数据量阈值;
    若配置了所述第一组随机接入前导码,并且,待传输的数据量大于所述第二数据量阈值,以及,所述目标参考信号对应的路损小于PL2,从所述目标参考信号对应的属于所述第一组随机接入前导码中的随机接入前导码中确定所述随机接入前导码;或,
    若配置了所述第一组随机接入前导码,并且,所述待传输的数据量小于或者等于所述第二数据量阈值,从所述目标参考信号对应的属于第二组随机接入前导码中的随机接入前导码中确定所述随机接入前导码,所述第二组随机接入前导码支持的最大发送数据量为所述第二数据量阈值;或,
    若配置了所述第一组随机接入前导码,并且,所述目标参考信号对应的路损大于或者等于PL2,从所述目标参考信号对应的属于所述第二组随机接入前导码中的随机接入前导码中确定所述随机接入前导码;
    其中,PL2=PCMAX-TP-Δ1-Δ2,PL2为第二路损阈值,PCMAX为终端设备在执行随机接入的小区的最大发射功率,TP为两步随机接入的随机接入前导码的目标接收功率,Δ1为所述待发送数据与两步随机接入前导码的功率偏差,Δ2为所述第一组随机接入前导码与第二组随机接入前导码的功率偏差。
  8. 如权利要求1至4中任一项所述的方法,其特征在于,所述随机接入前导码为两步随机接入前导码;
    以及,所述确定随机接入前导码,包括:
    如果网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于第一信号强度阈值的参考信号,从对应的RSRP大于所述第一信号强度阈值的参考信号中选择一个目标参考信号,所述参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS;
    确定是否配置了第一组随机接入前导码,所述第一组随机接入前导码支持的发送数据量大于第二数据量阈值;
    若配置了所述第一组随机接入前导码,并且,待传输的数据量大于所述第二数据量阈值,以及所述待传输的数据通过公共控制信道CCCH承载,从所述目标参考信号对应的属于所述第一组随机接入前导码中的随机接入前导码中确定所述随机接入前导码,所述第二组随机接入前导码支持的最大发送数据量为所述第二数据量阈值;或,
    若配置了所述第一组随机接入前导码,并且,所述待传输的数据量小于或者等于所述第二数据量阈值,从所述目标参考信号对应的属于第二组随机接入前导码中的随机接入前导码中确定所述随机接入前导码;或,
    若配置了所述第一组随机接入前导码,并且,所述待传输的数据不通过所述CCCH承载,从所述目标参考信号对应的属于所述第二组随机接入前导码中的随机接入前导码中确定所述随机接入前导码。
  9. 如权利要求7或8所述的方法,其特征在于,所述随机接入前导码为两步随机接入前导码;
    以及,所述确定随机接入前导码,包括:
    若没有配置所述第一组随机接入前导码,从所述目标参考信号对应的属于所述第二组随机接入前导码中的随机接入前导码中确定所述随机接入前导码。
  10. 如权利要求1至4中任一项所述的方法,其特征在于,所述随机接入前导码为两步随机接入前导码,所述至少一个两步随机接入前导码对应至少一个第一数据量阈值,一个两步随机接入前导码所对应的第一数据量阈值为所述两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个第二信号强度阈值;
    以及,所述确定随机接入前导码,包括:
    如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,并且网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于目标第二信号强度阈值的参考信号,从对应的RSRP大于所述第二信号强度阈值的参考信号中选择一个目标参考信号,所述参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS,所述目标第二信号强度为所述待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值;
    从所述目标参考信号对应的两步随机接入前导码中确定所述随机接入前导码,所述随机接入前导码对应的第一数据量阈值为所述目标第二信号强度阈值所对应的第一数据量阈值。
  11. 如权利要求1至4中任一项所述的方法,其特征在于,所述随机接入前导码为两步随机接入前导码,所述至少一个两步随机接入前导码对应至少一个第一数据量阈值,一个两步随机接入前导码所对应的第一数据量阈值为所述两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个第二信号强度阈值;
    以及,所述确定随机接入前导码,包括:
    如果待传输的数据量小于或者等于所述至少一个第一数据量阈值中的其中一个,并且网络设备配置的至少一个参考信号中存在对应的参考信号接收功率RSRP大于目标第二信号强度阈值的参考信号,从大于所述第二信号强度阈值的参考信号分别对应的随机接入前 导码中选择所述随机接入前导码,所述参考信号为同步信号块SSB或者信道状态信息参考信号CSI-RS,所述目标第二信号强度为所述待传输的数据量对应的第一数据量阈值所对应的第二信号强度阈值,所述随机接入前导码对应的第一数据量阈值为所述目标第二信号强度阈值所对应的第一数据量阈值。
  12. 如权利要求5、6或10中任一项所述的方法,其特征在于,所述使用所述随机接入前导码进行随机接入,包括:
    从所述目标参考信号对应的发送时机中确定下一个可用发送时机,所述发送时机用于发送所述随机接入前导码;
    在所述可用发送时机上使用所述随机接入前导码进行所述随机接入。
  13. 如权利要求1所述的方法,其特征在于,所述随机接入前导码为所述至少一个两步随机接入前导码中的一个,所述至少一个两步随机接入前导码对应至少一组随机接入前导码;
    其中,所述使用所述随机接入前导码进行随机接入,包括:
    使用所述随机接入前导码进行两步随机接入;
    以及,所述方法还包括:
    在所述两步随机接入失败的情况下,使用所述两步随机接入前导码所在的一组或多组随机接入前导码中的任一随机接入前导码,进行四步随机接入。
  14. 一种随机接入方法,其特征在于,包括:
    生成配置信息;
    向终端设备发送所述配置信息,所述配置信息包括至少一个第一数据量阈值以及至少一个第二信号强度阈值,所述至少一个第一数据量阈值与至少一个两步随机接入前导码对应,一个两步随机接入前导码所对应的第一数据量阈值为所述两步随机接入前导码支持的最大发送数据量,每个第一数据量阈值对应一个第二信号强度阈值,所述配置信息用于所述终端设备确定随机接入前导码以进行随机接入。
  15. 一种通信装置,其特征在于,所述装置用于执行如权利要求1至13中任一项所述的方法。
  16. 一种通信装置,其特征在于,所述装置用于执行如权利要求14所述的方法。
  17. 一种通信装置,其特征在于,包括:处理器,所述处理器与存储器耦合,所述存储器用于存储程序或指令,当所述程序或指令被所述处理器执行时,使得所述装置执行如权利要求1至13中任一项所述的方法。
  18. 一种通信装置,其特征在于,包括:处理器,所述处理器与存储器耦合,所述存储器用于存储程序或指令,当所述程序或指令被所述处理器执行时,使得所述装置执行如权利要求14所述的方法。
  19. 一种存储介质,其上存储有计算机程序或指令,其特征在于,所述计算机程序或指令被执行时使得计算机执行如权利要求1至13中任一项所述的方法。
  20. 一种存储介质,其上存储有计算机程序或指令,其特征在于,所述计算机程序或指令被执行时使得计算机执行如权利要求14所述的方法。
  21. 一种通信系统,其特征在于,包括:如权利要求17所述的装置,和/或,如权利要求18中所述的装置。
PCT/CN2020/086783 2019-04-26 2020-04-24 随机接入方法和通信装置 WO2020216341A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP20794379.6A EP3952570A4 (en) 2019-04-26 2020-04-24 DIRECT ACCESS METHOD AND COMMUNICATION DEVICE
CA3137983A CA3137983A1 (en) 2019-04-26 2020-04-24 Random access method and communications apparatus
EP23178242.6A EP4274321A3 (en) 2019-04-26 2020-04-24 Random access method and communication apparatus
US17/510,065 US20220046727A1 (en) 2019-04-26 2021-10-25 Random access method and communications apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910346571.3A CN111867123B (zh) 2019-04-26 2019-04-26 随机接入方法和通信装置
CN201910346571.3 2019-04-26

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/510,065 Continuation US20220046727A1 (en) 2019-04-26 2021-10-25 Random access method and communications apparatus

Publications (1)

Publication Number Publication Date
WO2020216341A1 true WO2020216341A1 (zh) 2020-10-29

Family

ID=72940749

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/086783 WO2020216341A1 (zh) 2019-04-26 2020-04-24 随机接入方法和通信装置

Country Status (5)

Country Link
US (1) US20220046727A1 (zh)
EP (2) EP3952570A4 (zh)
CN (2) CN116017751A (zh)
CA (1) CA3137983A1 (zh)
WO (1) WO2020216341A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022146211A1 (en) * 2020-12-30 2022-07-07 Telefonaktiebolaget Lm Ericsson (Publ) Random access for wireless communication network
WO2023010461A1 (zh) * 2021-08-05 2023-02-09 Oppo广东移动通信有限公司 随机接入条件的上报方法、终端设备及网络设备

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113891486B (zh) * 2020-07-02 2024-05-14 上海朗帛通信技术有限公司 一种被用于无线通信的通信节点中的方法和装置
CN114615709A (zh) * 2020-12-09 2022-06-10 中兴通讯股份有限公司 随机接入信道的配置方法、装置、电子设备和存储介质
CN115119327A (zh) * 2021-03-19 2022-09-27 大唐移动通信设备有限公司 信息传输方法、装置及存储介质
WO2023004756A1 (zh) * 2021-07-30 2023-02-02 Oppo广东移动通信有限公司 随机接入方法、装置、设备及存储介质
CN116471702A (zh) * 2022-01-11 2023-07-21 维沃移动通信有限公司 信息传输方法、装置、终端及网络侧设备

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018064367A1 (en) * 2016-09-28 2018-04-05 Idac Holdings, Inc. Random access in next generation wireless systems

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282895B (zh) * 2017-01-06 2019-12-20 电信科学技术研究院 一种随机接入方法及终端
CN113348720A (zh) * 2019-02-01 2021-09-03 株式会社Ntt都科摩 用户装置以及基站装置
MX2021009630A (es) * 2019-02-13 2021-09-08 Ntt Docomo Inc Equipo de usuario.
US10893544B2 (en) * 2019-02-14 2021-01-12 Nokia Technologies Oy Beam refinement in two-step random access channel (RACH) procedure
US20230232444A1 (en) * 2020-06-03 2023-07-20 Beijing Xiaomi Mobile Software Co., Ltd. Method and apparatus for determining random access configuration, communication device, and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018064367A1 (en) * 2016-09-28 2018-04-05 Idac Holdings, Inc. Random access in next generation wireless systems

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE , SANECHIPS: "On 2-Step RACH Procedures", 3GPP DRAFT; R1-1903879, 12 April 2019 (2019-04-12), Xi’an, China, pages 1 - 10, XP051691124 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022146211A1 (en) * 2020-12-30 2022-07-07 Telefonaktiebolaget Lm Ericsson (Publ) Random access for wireless communication network
WO2023010461A1 (zh) * 2021-08-05 2023-02-09 Oppo广东移动通信有限公司 随机接入条件的上报方法、终端设备及网络设备

Also Published As

Publication number Publication date
CN111867123B (zh) 2022-12-06
EP3952570A1 (en) 2022-02-09
EP4274321A2 (en) 2023-11-08
EP4274321A3 (en) 2024-01-03
CN116017751A (zh) 2023-04-25
EP3952570A4 (en) 2022-06-08
US20220046727A1 (en) 2022-02-10
CA3137983A1 (en) 2020-10-29
CN111867123A (zh) 2020-10-30

Similar Documents

Publication Publication Date Title
WO2020216341A1 (zh) 随机接入方法和通信装置
US11129217B2 (en) Data sending method and apparatus, and base station
WO2021000680A1 (zh) 一种协作传输方法及通信装置
WO2020042123A1 (zh) 发送上行信号的方法和设备
WO2020168577A1 (zh) 传输上行反馈信息的方法、终端设备和网络设备
WO2020211096A1 (zh) 无线通信方法、终端设备和网络设备
WO2020248259A1 (zh) 随机接入方法、终端设备和网络设备
WO2020029199A1 (zh) 传输信息的方法、终端设备和网络设备
US11432370B2 (en) D2D communication method and terminal device
WO2020056696A1 (zh) 一种资源分配方法及装置、终端
JP2022516899A (ja) 無線通信方法及び装置
WO2021062764A1 (zh) 终端的定时提前量ta处理的方法和装置
WO2020037626A1 (zh) 一种反馈信息传输方法及装置、通信设备
WO2022078321A1 (zh) 上行信息发送方法及相关产品
US20240098766A1 (en) Data sending method, data receiving method, resource indication method, apparatus, and system
WO2020034203A1 (zh) 传输信号的方法、终端设备和网络设备
WO2021212372A1 (zh) 资源分配方法和终端
US20230262751A1 (en) Communication method and apparatus
US20220150001A1 (en) Method for transmitting feedback information, and terminal device
US20210258961A1 (en) Data transmission method and device
WO2020156394A1 (zh) 一种反馈方法及装置
WO2021226850A1 (zh) Harq-ack码本的反馈方法、终端设备和网络设备
WO2021147214A1 (zh) 通信方法和通信装置
WO2020199213A1 (zh) 一种信号传输方法及装置、网络设备
WO2020029287A1 (zh) 反馈信息的方法、终端、芯片和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20794379

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3137983

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020794379

Country of ref document: EP

Effective date: 20211103