WO2020221279A1 - 随机接入方法和装置 - Google Patents

随机接入方法和装置 Download PDF

Info

Publication number
WO2020221279A1
WO2020221279A1 PCT/CN2020/087698 CN2020087698W WO2020221279A1 WO 2020221279 A1 WO2020221279 A1 WO 2020221279A1 CN 2020087698 W CN2020087698 W CN 2020087698W WO 2020221279 A1 WO2020221279 A1 WO 2020221279A1
Authority
WO
WIPO (PCT)
Prior art keywords
response
random access
window
monitored
terminal device
Prior art date
Application number
PCT/CN2020/087698
Other languages
English (en)
French (fr)
Inventor
赵力
徐小英
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to KR1020217038735A priority Critical patent/KR20220004135A/ko
Priority to EP20799509.3A priority patent/EP3955685A4/en
Publication of WO2020221279A1 publication Critical patent/WO2020221279A1/zh
Priority to US17/515,045 priority patent/US20220053558A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • H04W74/0858Random access procedures, e.g. with 4-step access with collision treatment collision detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • H04W74/085Random access procedures, e.g. with 4-step access with collision treatment collision avoidance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0866Non-scheduled access, e.g. ALOHA using a dedicated channel for access

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a random access method and device.
  • the terminal device can achieve uplink synchronization with the network device through a random access (RA) process.
  • the random access process includes a contention-based random access process and a non-contention random access process.
  • the contention-based random access process is completed in four steps: The first step is to send a random access request from the terminal device to the network device.
  • the random access request can also be called message 1 (Msg1), which contains the random access preamble. (preamble);
  • the second step is for the network device to send a random access response (RAR) message to the terminal device.
  • RAR random access response
  • This RAR message can also be called message 2 (Msg2); the third step is for the terminal device to receive the RAR Then, on the resources allocated by the network device, use the timing advance indicated by the network device to send a message to the network device.
  • This message can also be called message 3 (Msg3); the fourth step is for the network device to send contention resolution information to the terminal device , The message carrying this information is called message 4 (Msg4).
  • the RAR message may include a random access preamble identifier (RAP ID), and if the RAP ID matches (or is the same) as the preamble ID selected by the terminal device, it is considered that the RAR message is received successfully.
  • RAP ID random access preamble identifier
  • the competition-based 4-step random access process requires more interaction procedures, and the delay is large, and it cannot be well applied to scenarios with high delay requirements. Therefore, a contention-based 2-step random access procedure is introduced.
  • the terminal device does not know how to operate when weighing the delay and the power consumption of the terminal device.
  • the embodiments of the present application provide a random access method and device, so that the terminal device can select a suitable random access type when weighing the delay and power consumption.
  • a random access method is provided.
  • the method provided in the first aspect may be executed by a terminal device, or may be executed by a chip configured in the terminal device, which is not limited in this application.
  • the method includes: sending a random access signal and first information for contention resolution to a network device; monitoring a first response and a second response, where the first response is a response to the random access signal and includes uplink Authorization, the second response is the response of the first information used for contention resolution.
  • the first response is monitored and the second response is monitored before the time domain position of the uplink authorization, it is determined that the random access is successful; or, when the first response is monitored, the uplink authorization is used to send the second response for contention resolution
  • the second response or the third response is monitored, it is determined that the random access is successful, where the third response is a response to the second information for contention resolution.
  • the terminal device monitors the first response and the second response in the first listening window and the second listening window, respectively, so that the terminal device performs a 4-step random access process while performing a 2-step random access process.
  • the access process when any type of random access is successful, it is determined that the terminal device is successfully accessed randomly, thereby reducing the time delay of the terminal device in the random access process.
  • monitoring the first response and the second response includes, in response to sending the transmission of the random access signal, activating or restarting the first monitoring window.
  • the first response is monitored in the listening window; in response to the transmission of the first information for contention resolution, the second listening window is activated or restarted, and the second response is monitored in the second listening window.
  • first monitoring window and the second monitoring window can be started or restarted at the same time, or can be started or restarted at different times, which is not limited in this application.
  • the second listening window is stopped.
  • the third monitoring window in response to the transmission of the second information for contention resolution, is activated or restarted, and the third response is monitored in the third monitoring window .
  • the terminal device when the terminal device first listens to the second response in the second listening window, it means that the 2-step random access is successful, and the terminal device stops the second listening window and the third listening window, and terminates the 2-step random access.
  • Access and 4-step random access or when the terminal device first monitors the third response in the third listening window, it means that the 4-step random access is successful, and the terminal device stops the second listening window and the third listening window.
  • the parallel implementation of the 2-step random access process and the 4-step random access process can reduce the time delay of the random access of the terminal equipment.
  • the second listening window when the third listening window is running, the second listening window times out, stop listening for the second response, and continue listening for the third response;
  • the third response is monitored in the window, it is determined that the random access is successful; or, when the third response is not monitored in the third monitoring window, the random access is re-initiated.
  • the terminal device can re-initiate random access by either 2-step random access or 4-step random access, which is not limited in this application.
  • the third listening window when the third listening window is running, the second listening window times out, the third listening window is stopped, and random access is re-initiated.
  • the terminal device after the terminal device determines that the 2-step random access fails, the terminal device directly terminates the 2-step and 4-step random access procedures and re-initiates random access without continuing the 4-step random access process, thereby reducing the terminal The power consumption of the device.
  • the third listening window when the second listening window is running, the third listening window times out, stop listening to the third response, and continue to monitor the second response; and when the second listening window is running When the second response is monitored in the window, it is determined that the random access is successful; or, when the second response is not monitored in the second monitoring window, the random access is reinitiated.
  • the first listening window when the second listening window is running, the first listening window times out, continue to monitor the second response, and when the second listening window is monitored When responding, it is determined that the random access is successful; or, when the second response is not monitored in the second monitoring window, the random access is re-initiated.
  • the uplink authorization when the first listening window is running and the second listening window times out, continue to monitor the first response, and when the first response is monitored, the uplink authorization is used Send the second information for contention resolution, and when the third response is monitored, it is determined that the random access is successful; or, when the third response is not monitored, the random access is reinitiated.
  • the first listening window in response to the transmission of the random access signal and/or the transmission of the first information for contention resolution, the first listening window is activated or restarted, The first response and the second response are monitored in the first listening window.
  • the terminal device simultaneously monitors the first response and the second response in a listening window, where the first listening window can reuse the listening window in the prior art, for example, the RAR window; it can also be through a network device
  • the new monitoring window is reconfigured to the terminal device, which is not limited in this application.
  • the first listening window is stopped.
  • the second listening window in response to the transmission of the second information for contention resolution, is activated or restarted, and the third response is monitored in the second listening window .
  • the first listening window when the second listening window is running, the first listening window times out, stopping listening for the second response, and continuing to monitor the third response; and when the second listening window is running When the third response is monitored in the window, it is determined that the random access is successful; or, when the third response is not monitored in the second monitoring window, the random access is re-initiated.
  • the second listening window when the second listening window is running, the first listening window times out, the second listening window is stopped, and random access is re-initiated.
  • the second listening window when the first listening window is running, the second listening window times out, stop listening to the third response, and continue to monitor the second response; and when the first listening window is running When the second response is monitored in the window, it is determined that the random access is successful; or, when the second response is not monitored in the first monitoring window, the random access is reinitiated.
  • this application provides a random access device, including a method for executing the first aspect or any possible implementation of the first aspect.
  • the present application provides a random access device, including at least one processor and an interface circuit, and the at least one processor is configured to execute the first aspect or the method in any possible implementation manner of the first aspect.
  • the present application provides a random access device, including at least one processor, configured to connect with a memory to call a program in the memory to execute the method provided in the above first aspect.
  • the memory can be located inside the device or outside the device.
  • the processor includes one or more.
  • the present application provides a terminal device that includes the device provided in the second aspect above, or the terminal device includes the device provided in the third aspect above, or the terminal device includes the device provided in the fourth aspect above Device.
  • the present application provides a computer-readable storage medium.
  • the computer-readable storage medium stores computer instructions.
  • the computer instructions run on the computer, the computer executes the first aspect or any possible implementation of the first aspect. The method in the way.
  • the present application provides a chip including a processor.
  • the processor is used to read and execute a computer program stored in the memory to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • the chip further includes a memory, and the memory and the processor are connected to the memory through a circuit or wire, and the memory is used to store a computer program.
  • the chip further includes a communication interface.
  • the present application also provides a computer program product.
  • the computer program product includes computer program code.
  • the computer program code runs on a computer, the computer executes the first aspect and any one of the possibilities thereof. The method in the implementation mode.
  • the terminal device performs a 2-step random access process and a 4-step random access process in parallel, so that the terminal device can select an appropriate random access type when weighing time delay and power consumption.
  • FIG. 1 is an architecture diagram of a communication system to which an embodiment of this application is applicable;
  • FIG. 2 is an architecture diagram of another communication system to which the embodiments of this application are applicable;
  • FIG. 3 is an architecture diagram of another communication system to which the embodiments of this application are applicable.
  • Figure 4 is a message interaction diagram of an existing contention-based 4-step random access process
  • Figure 5 is a message interaction diagram of the existing contention-based 2-step random access procedure
  • FIG. 6 is a schematic flowchart of a random access method provided by an embodiment of the application.
  • FIG. 7 is a schematic structural diagram of a device provided by an embodiment of the application.
  • FIG. 8 is a schematic structural diagram of a terminal device provided by an embodiment of the application.
  • the communication system may include a terminal device 100 and a network device 200.
  • the embodiment of the present application does not limit the number of terminal devices 100 and network devices 200.
  • the terminal device 100 located within the coverage area of the network device 200 may communicate with the network device 200 in a wireless manner.
  • the network device 200 serves as the sender, it can send downlink information to the terminal device 100.
  • the terminal device 100 as a receiver can receive the downlink information sent by the network device 200.
  • the terminal device 100 acts as a sender, it can send uplink information to the network device 200.
  • the network device 200 can receive the uplink information sent by the terminal device 100.
  • the terminal device 100 may be a fixed location, or it may be movable.
  • the communication system may also include other devices.
  • the communication system may also include core network equipment (not shown in FIG. 1).
  • the network device 200 may be connected to the core network device in a wireless or wired manner.
  • the core network device and the network device 200 can be separate and different physical devices, or the functions of the core network device and the network device 200 can be integrated on the same physical device, or the core network device can be integrated on the same physical device Part of the function and part of the function of the network device 200.
  • the communication system may also include a wireless relay device or a wireless backhaul device (not shown in FIG. 1).
  • the network equipment 200 is a device for transmitting and receiving signals on the network side, for example, a radio access network (RAN) node that connects terminal equipment to the wireless network.
  • RAN nodes are: new radio access technology (NR) (or 5G) systems in the new generation of base stations (generation Node B, gNB), transmission reception point (transmission reception point, TRP) , Evolved Node B (evolved Node B, eNB), radio network controller (RNC), Node B (Node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (BBU), relay station, or wireless fidelity (Wifi) access point (access point, AP) etc.
  • NR new radio access technology
  • gNB new radio access technology
  • TRP transmission reception point
  • RNC radio network controller
  • Node B Node B
  • a network device may include a centralized unit (CU) node, or a distributed unit (DU) node, or a RAN device including a CU node and a DU node.
  • the wireless coverage area of the network device 200 may include one or more cells.
  • the terminal device 100 within the coverage of the cell communicates with the network device 200 through the transmission resource (for example, frequency domain resource, spectrum resource, or time-frequency resource) of the cell.
  • the cell may be a macro cell or a small cell (small cell).
  • the small cell may include: a metro cell, a micro cell, a pico cell, or a femto cell, etc.
  • the embodiment of the present application does not limit the specific technology and specific device form adopted by the network device 200.
  • the terminal device 100 also known as user equipment (UE), mobile station (MS), or mobile terminal (MT), is a device that provides users with voice/data connectivity , For example, handheld devices with wireless connectivity, or in-vehicle devices.
  • terminal devices are: mobile phones (mobile phones), tablet computers, notebook computers, palmtop computers, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, augmented Augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving (self-driving), wireless terminals in remote medical surgery, and smart grid (smart grid)
  • the network architecture includes core network (CN) equipment and RAN equipment.
  • the RAN equipment includes a baseband device and a radio frequency device.
  • the baseband device can be implemented by one node or by multiple nodes.
  • the radio frequency device can be implemented separately from the baseband device, or integrated into the baseband device, or partially remote Integrated in the baseband device.
  • the RAN equipment (eNB) includes a baseband device and a radio frequency device.
  • the radio frequency device can be arranged remotely from the baseband device, such as a remote radio unit (radio unit).
  • RRU is arranged farther away from the BBU.
  • the control plane protocol layer structure may include the radio resource control (RRC) layer, the packet data convergence protocol (PDCP) layer, the radio link control (RLC) layer, and the media interface. Access control (media access control, MAC) layer and physical layer and other protocol layer functions.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • RLC radio link control
  • MAC media access control
  • the user plane protocol layer structure can include the functions of the PDCP layer, the RLC layer, the MAC layer, and the physical layer; in one implementation, the PDCP layer can also include a service data adaptation protocol (SDAP) layer .
  • SDAP service data adaptation protocol
  • the functions of these protocol layers can be implemented by one node, or can be implemented by multiple nodes; for example, in an evolution structure, the RAN device can include CUs and DUs, and multiple DUs can be centrally controlled by one CU. As shown in Figure 2, CU and DU can be divided according to the protocol layers of the wireless network. For example, the functions of the PDCP layer and above protocol layers are set in the CU, and the protocol layers below the PDCP, such as the RLC layer and MAC layer, are set in the DU.
  • This type of protocol layer division is just an example, it can also be divided in other protocol layers, for example, in the RLC layer, the functions of the RLC layer and above protocol layers are set in the CU, and the functions of the protocol layers below the RLC layer are set in the DU; Or, in a certain protocol layer, for example, part of the functions of the RLC layer and the functions of the protocol layer above the RLC layer are set in the CU, and the remaining functions of the RLC layer and the functions of the protocol layer below the RLC layer are set in the DU. In addition, it can also be divided in other ways, for example, by time delay, and functions that need to meet the delay requirement for processing time are set in the DU, and functions that do not need to meet the delay requirement are set in the CU.
  • the radio frequency device can be remote, not placed in the DU, can also be integrated in the DU, or part of the remote part is integrated in the DU, and there is no restriction here.
  • control plane (CP) and the user plane (UP) of the CU can also be separated and divided into different entities for implementation. They are the control plane CU entity (CU-CP entity). ) And the user plane CU entity (CU-UP entity).
  • the signaling generated by the CU can be sent to the terminal device through the DU, or the signaling generated by the terminal device can be sent to the CU through the DU.
  • the DU can directly pass the protocol layer encapsulation without analyzing the signaling and transparently transmit it to the terminal device or CU. If the following embodiments involve the transmission of such signaling between the DU and the terminal device, at this time, the sending or receiving of the signaling by the DU includes this scenario.
  • the RRC or PDCP layer signaling will eventually be processed as the PHY layer signaling and sent to the terminal device, or converted from the received PHY layer signaling.
  • the RRC or PDCP layer signaling can also be considered to be sent by the DU, or sent by the DU and radio frequency.
  • the CU is divided into network equipment on the RAN side.
  • the CU can also be divided into network equipment on the CN side, which is not limited here.
  • the network device in each embodiment of the present application may be a CU node, or a DU node, or a RAN device including a CU node and a DU node.
  • the terminal equipment can realize the uplink synchronization with the network equipment through the random access process.
  • FIG. 4 is a message interaction diagram of an existing contention-based random access process. As shown in Figure 4, this process mainly includes 4 steps, so it can be called a 4-step random access process.
  • the terminal device sends a random access request to the network device.
  • the random access request may also be referred to as message 1 (Msg1), which includes a random access preamble.
  • the network device receives the preamble, knows that a terminal device requests access, and then executes the following step S402.
  • the network device sends a random access response (RAR) message to the terminal device.
  • RAR random access response
  • the RAR message may also be referred to as message 2 (Msg2).
  • the RAR may include the following contents: 1) RAPID.
  • RAPID is the preamble identifier (preamble identifier) obtained by the network device when detecting the preamble, which may also be referred to as the preamble index.
  • Timing advance command (timing advance command, TA command).
  • the TA command is used to specify the amount of time adjustment (also called timing advance) required for the terminal device to perform uplink synchronization.
  • UL grant Uplink grant information
  • UL grant is used to specify the uplink resources allocated by the network device to the terminal device to send Msg3 (message 3).
  • TC-RNTI Temporary cell radio network temporary identity
  • the terminal device calculates the random access radio network temporary identifier (RA-RNTI) by sending the time-frequency resource of the preamble, and monitors the RA-RNTI scrambled physical downlink control within the RAR time window Channel (physical downlink control channel, PDCCH) to receive the RAR corresponding to the RA-RNTI.
  • RA-RNTI random access radio network temporary identifier
  • PDCCH physical downlink control channel
  • the terminal device uses the timing advance indicated by the network device to send Msg3 (message 3) to the network device on the uplink resources allocated by the network device according to the RAR.
  • Msg3 contains the identification of the terminal device.
  • the identification of the terminal device will be used for contention resolution in S404.
  • the identification of the terminal device may be related to the state of the terminal device in the communication system.
  • the identification of the terminal device may be a cell radio network temporary identifier (C-RNTI).
  • C-RNTI cell radio network temporary identifier
  • the identifier of the terminal device may be the terminal device identifier from the core network.
  • the terminal device identifier from the core network may be a system architecture evolution temporary mobile station identifier (S-TMSI) or a random number.
  • S-TMSI system architecture evolution temporary mobile station identifier
  • the network device sends Msg4 (message 4) to the terminal device.
  • Msg4 may include contention resolution information to indicate successful contention resolution.
  • the contention resolution information may be a UE contention resolution identity MAC control element (contention resolution identity MAC CE), that is, part of the content of Msg3 or the entire content of Msg3, and the contention resolution information may also be a cell radio network temporary identification (cell radio network).
  • C-RNTI Temporary identifier, C-RNTI
  • the terminal device waits to receive Msg4 within the contention resolution timer. If the contention resolution timer expires and the terminal device has not received the contention resolution information, it returns to S401 to perform a 4-step random access based on contention again.
  • FIG. 5 is a message interaction diagram of a 2-step random access process provided by an embodiment of the application.
  • the random access procedure may include:
  • S501 The terminal device sends a request message to the network device.
  • the network device receives the request message sent by the terminal device.
  • the request message may include a random access signal and information for contention resolution.
  • the random access signal is used to request random access.
  • the network device can detect the random access signal and learn that a terminal device requests random access.
  • the implementation of random access signals may be different.
  • the random access signal may be a preamble (Preamble), a demodulation reference signal (DMRS) or other detection signals for random access.
  • Preamble a preamble
  • DMRS demodulation reference signal
  • the embodiment of the present application does not limit the implementation manner, length, name, etc. of the random access signal.
  • the information used for contention resolution is sent by the terminal equipment to the network equipment for contention resolution.
  • the information used for contention resolution may include the identification of the terminal device.
  • the identification of the terminal device may be related to the state of the terminal device in the communication system. For example, when the terminal device is in the RRC connected state (RRC_CONNECTED state), the identifier of the terminal device may be a cell radio network temporary identifier (C-RNTI). When the terminal device is in a non-RRC connection state, the identifier of the terminal device may be the terminal device identifier from the core network.
  • the terminal device identifier from the core network may be a system architecture evolution temporary mobile station identifier (S-TMSI) or a random number.
  • S-TMSI system architecture evolution temporary mobile station identifier
  • the network device sends a response message to the request message to the terminal device.
  • the terminal device receives the response message to the request message sent by the network device.
  • the response message includes contention resolution information and a payload (Payload), and the payload in the response message may include part or all of the content in the RAR in the 4-step random access process based on contention.
  • the payload in the response message may include one or any combination of the following information: UL grant, TA command, TC-RNTI. It may also include newly defined content, such as downlink assignment (DL assignment), and this application does not limit the specific content of the load in the response message.
  • the contention resolution information in the response message is obtained by the terminal device based on the information used for contention resolution, which is part or all of the content of the contention resolution information, or is the PDCCH scrambled by the C-RNTI of the terminal device or is explicitly carried C-RNTI in the response message.
  • Msg4 is implemented through the PDCCH scrambled by the C-RNTI.
  • the terminal device can send its C-RNTI to the network device through C_RNTI MAC CE.
  • the terminal device monitors the PDCCH scrambled by the C-RNTI, and the terminal device considers that the random access is successful.
  • the terminal device has already obtained the C-RNTI.
  • the C-RNTI may be sent to the network device as information for contention resolution.
  • the network equipment can explicitly carry the C-RNTI as contention resolution information in the response message.
  • the two-step random access process has fewer interaction processes than the four-step random access process, which can greatly reduce the delay of random access, thereby meeting new application scenarios with high delay requirements. .
  • unlicensed spectrum cell short delay service, small data packet service, etc.
  • the terminal equipment does not know how to randomly access the 4-step process. Choose between the entry process and the 2-step random access process.
  • the embodiments of the present application provide a random access method. While the terminal device is performing the 2-step random access process, if it listens to the response message of the random access signal, the terminal device will fall back to 4-step random access. During the access process, continue with the 2-step random access process. That is, the 2-step random access process and the 4-step random access process are performed at the same time. When any one of the random access is successful, the terminal device determines that the random access is successful this time, thereby greatly reducing the delay of random access.
  • FIG. 6 shows a schematic flowchart of a random access method 600 provided by an embodiment of the present application.
  • the method 600 includes steps S601 to S603, which are described in detail below.
  • the terminal device sends a random access signal and the first information for contention resolution to the network device.
  • the random access signal is used to request random access
  • the first information for contention resolution is sent by the terminal device to the network device for contention resolution.
  • the embodiment of the present application does not limit the manner in which the terminal device sends the random access signal and the first information for contention resolution to the network device.
  • the terminal device monitors the first response and the second response.
  • the network device After the network device receives the random access signal sent by the terminal device and the first information for contention resolution, the network device sends a first response to the random access signal and a second response to the first contention resolution information , The terminal device monitors the first response and the second response.
  • the first response may be an existing RAR message (random access response), or other newly defined response messages, and the name of the first response is not limited in this application.
  • the first response includes part or all of the content in the RAR in the contention-based 4-step random access process, including one or more of uplink grant information (UL grant), timing advance command (TA command), and TC-RNTI.
  • UL grant uplink grant information
  • TA command timing advance command
  • TC-RNTI TC-RNTI
  • the second response is obtained by the terminal device according to the first information used for contention resolution, for example, part or all of the content of the first information used for contention resolution, or the PDCCH scrambled by the C-RNTI or explicitly carried in the first content 2.
  • C-RNTI in response.
  • the terminal device has obtained the C-RNTI.
  • the C-RNTI may be sent to the network device as information for contention resolution.
  • the network device may explicitly carry the C-RNTI as contention resolution information in the second response.
  • S603 The terminal device determines whether the random access is successful.
  • the terminal device When the terminal device monitors the first response and monitors the second response before the uplink authorized time domain position, the terminal device determines that the random access is successful. Or, when the terminal device monitors the first response, it uses the uplink authorization to send the second information for contention resolution, and when it monitors the second response or the third response, the terminal device determines that the random access is successful, where: The third response is a response to the second information used for contention resolution.
  • the second information used for contention resolution may be Message 3 in a contention-based 4-step random access process. Specifically, refer to the description of S403, which is not repeated here for brevity.
  • the third response may be message 4 in a contention-based 4-step random access process, and may include contention resolution information to indicate that the contention resolution is successful.
  • the contention resolution information can be the UE contention resolution identity MAC control element (Contention Resolution Identity MAC CE), that is, part of the content of message 3 or the entire content of message 3, and the contention resolution information can also be PDCCH scrambled by C-RNTI .
  • the success of contention resolution is also called success of random access, that is, when the terminal device determines that the contention resolution is successful according to the monitoring of the first response, the second response, and the third response, it can also be considered that the random access is successful.
  • the monitoring conditions of the first response, the second response, and the third response determine that the contention resolution fails, it can also be considered that the random access fails.
  • the embodiments of the present application are collectively referred to as random access success or random access failure.
  • the network device may send configuration information of two listening windows to the terminal device, defining the first listening window and the second listening window, where the first listening window is used to monitor the first response , The second listening window is used to monitor the second response.
  • the first monitoring window may be a RAR window in the prior art, or may be a monitoring window reconfigured by a network device for monitoring the first response.
  • the first monitoring window and the second monitoring window are The specific name of is not limited in any way.
  • the listening window can also be called a timer.
  • the first monitoring window and the second monitoring window can be started or restarted at the same time, or can be started or restarted at different times.
  • the first listening window is started or restarted after the terminal device sends the random access signal.
  • the first listening window is started or restarted on the first PDCCH resource (for example, PDCCH occasion) after the random access signal transmission ends. Window, or start or restart the first listening window after a certain time offset after the transmission of the random access signal ends, where the time offset can be predefined or configured on the network device side .
  • the second listening window is started or restarted after the terminal device finishes sending or retransmitting the physical layer uplink shared channel (PUSCH), for example, the first symbol (such as symbol) after the PUSCH transmission or retransmission ends.
  • PUSCH physical layer uplink shared channel
  • the first listening window and the second listening window are simultaneously started or restarted after the terminal device finishes sending or retransmitting the PUSCH, for example, on the first symbol (for example, symbol) after the PUSCH transmission or retransmission ends, and at the same time Start or restart the first listening window and the second listening window, or start or restart the first listening window and the second listening window at the same time after a certain time offset after the end of PUSCH transmission or retransmission, where the time The offset can be pre-defined or configured on the network device side.
  • the first listening window and the second listening window are simultaneously started or restarted, for example, on the first PDCCH resource (for example, PDCCH occasion) after the transmission of the random access signal ends, and at the same time Start or restart the first listening window and the second listening window, or start or restart the first listening window and the second listening window at the same time after a certain time offset has passed after the transmission of the random access signal ends, where the time The offset can be pre-defined or configured on the network device side.
  • the terminal device If the terminal device first monitors the second response and determines that the random access is successful, the terminal device stops the first listening window and the second listening window, and the terminal device determines that this random access is successful.
  • stopping the first monitoring window means stopping monitoring the first response
  • stopping the second monitoring window means stopping monitoring the second response
  • stopping the monitoring window in this application means stopping monitoring the corresponding response. For the sake of brevity, it will not be described in detail below.
  • the terminal device listens to the first response first, the terminal device stops the first listening window, but does not stop the second listening window, and continues to monitor the second response while returning to the 4-step random access process, that is, the terminal device is doing 2.
  • 4-step random access is performed in parallel.
  • the terminal device stops the 2-step random access process and the 4-step random access process, and determines that the random access is successful. , Thereby reducing the delay of random access.
  • Random access fallback refers to a fallback from a contention-based 2-step random access process to a contention-based 4-step random access process.
  • the network equipment may send the first random access signal to the terminal equipment.
  • the first response includes uplink grant information, timing advance command and TC-RNTI.
  • the terminal device may execute S403 to S404 in Figure 4 according to the received first response to perform random access fallback.
  • the terminal device first listens to the first response, and listens to the second response before the time domain position of the uplink authorization included in the first response and determines that the random access is successful, the terminal device stops the first response. Second, the monitoring window confirms that this random access is successful.
  • the terminal device first listens to the first response, and the second listening window times out before the time domain position of the uplink authorization included in the first response, the terminal device stops listening to the second response and continues In the 4-step random access process, S403 ⁇ S404 in Figure 4 are executed. If the terminal device determines that the 4-step random access process is successful, the terminal device terminates the 4-step random access process; if the terminal device determines that the 4-step random access process fails, the terminal device re-initiates 2-step random access or 4-step random access Into. Or when the second listening window times out, the terminal device directly stops the first listening window and re-initiates 2-step random access or 4-step random access.
  • the terminal device monitors the second response after the time domain position of the uplink authorization included in the first response.
  • the terminal device since the terminal device has already sent message 3 on the uplink authorization, and the third listening window is activated or restarted, Then the terminal device monitors the second response in the second listening window while listening to the third response in the third listening window, where the third response may be contention resolution information in the 4-step random access process, that is, message 4.
  • the second information used for contention resolution may be message 3 in the 4-step random access process. If the terminal device first listens to the second response and determines that the random access is successful, indicating that the 2-step random access process is successful, the terminal device stops the second and third listening windows, and terminates the 4-step random access process. The device determines that this random access is successful.
  • the terminal device if the terminal device first listens to the third response message, indicating that the 4-step random access process is successful, the terminal device stops the second listening window and the third listening window, and terminates the 2-step random access process, and the terminal device determines This random access was successful.
  • the terminal device uses RA-RNTI to decode and successfully receives the RAR, and the RAPID value in the RAR is the same as the index value used when the terminal device sends the preamble, it is considered The RAR is successfully received, that is, the terminal device has successfully monitored the first response; when the terminal device detects that the second response to the first contention resolution information includes the contention resolution identification of the terminal device or the second response is sent by the terminal device
  • the PDCCH scrambled by the C-RNTI or the second response explicitly carries the C-RNTI of the terminal device, then the terminal device has successfully monitored the second response;
  • the third response can be the contention resolution information in the 4-step random access (message 4)
  • the terminal device detects that the third response to the second contention resolution information includes the contention resolution identification of the terminal device or the third response is the PDCCH scrambled by the C-RNTI of the terminal device, the terminal device The third response was successfully monitored.
  • the third monitoring window may be a contention resolution timer in the prior art, or may be a new timer reconfigured by the network device, which is not limited in this embodiment of the application.
  • the terminal device stops monitoring the second response and continues to monitor the third response in the third monitoring window. If the terminal device monitors the third response in the third listening window, the terminal device stops the third listening window and determines that this random access is successful.
  • the terminal device can initiate 2-step random access or 4-step random access.
  • the terminal device when the second listening window times out, the terminal device directly stops the third listening window and re-initiates random access.
  • the terminal device can initiate 2-step random access or 4-step random access. Random access.
  • the terminal device stops listening for the third response and continues to monitor the second response in the second listening window. If the terminal device monitors the second response in the second listening window, the terminal device stops the second listening window and determines that this random access is successful.
  • the terminal device can initiate 2-step random access or 4-step random access.
  • the terminal device when the third listening window times out, the terminal device directly stops the second listening window and re-initiates random access.
  • the terminal device can initiate 2-step random access or 4-step random access. Access.
  • the terminal device in order to reduce the delay of random access of the terminal device when the terminal device performs random access, after receiving the first response, the terminal device continues to monitor the second response while falling back to 4-step random access.
  • the access process enables the terminal equipment to perform the 4-step random access process while performing the 2-step random access process.
  • the terminal equipment determines that the random access is successful this time, which greatly reduces The delay of random access of terminal equipment is reduced.
  • the terminal device when the terminal device first listens to the first response, the terminal device directly stops the first listening window and the second listening window, and directly falls back from the 2-step random access process to the 4-step random access process .
  • the terminal device executes S403 to S404 in Figure 4, simplify the processing process of the terminal device, thereby reducing the power consumption of the terminal device.
  • the terminal device stops the first listening window and continues to monitor the second response in the second listening window.
  • the terminal device stops the second listening window and ends the 2-step random access process, and the terminal device determines that this random access is successful.
  • the terminal device When the terminal device does not monitor the second response when the second listening window expires, the terminal device ends the 2-step random access process and judges whether the terminal device can fall back to the 4-step random access process at this time, and if it can return Back to the 4-step random access process, that is, the current time has not reached the time domain position of the uplink authorization included in the first response, then the terminal device will fall back from the 2-step random access process to the 4-step random access process, and continue with 4
  • the following steps of the random access process are performed, S403 ⁇ S404 in Figure 4 are executed; if the current time exceeds the time domain position of the uplink authorization included in the first response, the terminal device cannot fall back to 4 from the 2-step random access process.
  • Step random access process the terminal device re-initiates random access, where the terminal device can initiate 2-step random access or 4-step random access. Since the terminal device first performs the 2-step random access process during random access, when the 2-step random access process fails, it directly falls back to the 4-step random access process or re-initiates random access, which simplifies the terminal equipment processing Process, thereby reducing the power consumption of the terminal device.
  • the terminal device continues to monitor the second response until the terminal device monitors the second response during the operation period of the second listening window and determines the random connection. If the entry is successful, the terminal device stops the second listening window, and the terminal device determines that this random access is successful; or the terminal device does not monitor the second response when the second listening window times out, the terminal device determines that this random access failed , Re-initiate 2-step random access or 4-step random access; or when the first monitoring window expires, the terminal device stops the second monitoring window and re-initiates 2-step random access or 4-step random access.
  • the terminal device continues to monitor the first response, and when the terminal device monitors the first response during the operation period of the first listening window, the terminal device continues In the 4-step random access process, S403 ⁇ S404 in Figure 4 are executed.
  • the terminal device determines that the 4-step random access is successful, the terminal device terminates the 4-step random access process; if the terminal device determines that the 4-step random access fails, the terminal device re-initiates 2-step random access or 4-step random access; Or the terminal device does not monitor the first response when the first listening window expires, the terminal device determines that the random access fails this time, and re-initiates 2-step random access or 4-step random access; or the second listening window exceeds From time to time, the terminal device directly stops the first listening window and re-initiates 2-step random access or 4-step random access.
  • the terminal device determines that this random access fails and re-initiates the 2-step random access Or 4-step random access.
  • the terminal device can monitor the first response and the second response in a listening window, that is, the network device sends the configuration information of a listening window to the terminal device, and the listening window is used to monitor both the first response and the second response. Used to monitor the second response.
  • the monitoring window can be a monitoring window or timer that reuses existing technologies, such as RAR monitoring window (RAR window), contention resolution timer (contention resolution timer), or a redefined network device for monitoring
  • RAR window RAR monitoring window
  • contention resolution timer contention resolution timer
  • the specific name of the monitoring window is not limited in the embodiment of this application.
  • the embodiment of the present application takes the first monitoring window as an example.
  • first monitoring window and the second monitoring window appearing below in the embodiment of the present application are not the same as the first monitoring window and the second monitoring window in the foregoing embodiment.
  • the terminal device starts or restarts the first listening window after sending or retransmitting the PUSCH, for example, starting or restarting the first listening window on the first symbol (such as symbol) after the PUSCH transmission or retransmission is completed, or
  • the first listening window is started or restarted after a certain time offset after the PUSCH transmission or retransmission ends, where the time offset may be predefined or configured on the network device side.
  • start or restart the first listening window after sending the random access signal for example, start or restart the first listening window on the first PDCCH resource (for example, PDCCH occasion) after the random access signal transmission ends, Or the first listening window is started or restarted after a certain time offset after the transmission of the random access signal ends, where the time offset may be predefined or configured on the network device side.
  • the time offset may be predefined or configured on the network device side.
  • the terminal device monitors the second response in the first listening window and determines that the random access is successful, the terminal device stops the first listening window, and the terminal device determines that this random access is successful.
  • the terminal device since the terminal device simultaneously monitors the first response and the second response in the first listening window, when the terminal device stops the first listening window, it stops listening to the first response and the second response. For brevity, the following will not A detailed description.
  • the terminal device If the terminal device first listens to the first response in the first listening window, the terminal device stops listening to the first response, but does not stop the first listening window, the terminal device continues to monitor the second response while falling back to 4-step random access
  • the entry process that is, the terminal device performs 4-step random access in parallel while doing 2-step random access.
  • the terminal device stops the 2-step random access process and the 4-step random access process, and determines that the random access is successful. , Thereby reducing the delay of random access.
  • the terminal device when the terminal device first monitors the first response in the first listening window, and monitors the second response before the time domain position of the uplink authorization included in the first response and determines that the random access is successful, the terminal device stops The first monitoring window determines that this random access is successful.
  • the terminal device if the terminal device monitors the first response, and the first listening window times out before the time domain position of the uplink authorization included in the first response, the terminal device stops listening to the second response, and continues 4 In the random access process, S403 ⁇ S404 in Figure 4 are executed. If the terminal device determines that the 4-step random access is successful, the 4-step random access process is terminated; if the terminal device determines that the 4-step random access fails, the terminal device re-initiates 2-step random access or 4-step random access. Or when the first listening window times out, the terminal device re-initiates 2-step random access or 4-step random access.
  • the terminal device monitors the second response after the time domain position of the uplink authorization included in the first response, because at this time the terminal device has already sent message 3 on the uplink authorization and started or restarted the second listening window, then The terminal device monitors the second response in the first listening window while listening to the third response in the second listening window, where the third response may be contention resolution information in the 4-step random access process, that is, message 4.
  • the second information used for contention resolution may be message 3 in the 4-step random access process. If the terminal device first listens to the second response and determines that the random access is successful, indicating that the 2-step random access process is successful, the terminal device stops the first listening window and the second listening window, and terminates the 4-step random access process. The device determines that this random access is successful.
  • the terminal device if the terminal device first listens to the third response message, indicating that the 4-step random access process is successful, the terminal device stops the first listening window and the second listening window, and terminates the 2-step random access process, and the terminal device determines This random access was successful.
  • the terminal device stops listening for the second response and continues to monitor the third response in the second listening window. If the terminal device monitors the third response in the second listening window, the terminal device stops the second listening window and determines that this random access is successful.
  • the terminal device can initiate 2-step random access or 4-step random access.
  • the terminal device when the first listening window times out, the terminal device directly stops the second listening window and re-initiates random access.
  • the terminal device can initiate 2-step random access or 4-step random access. Random access.
  • the terminal device stops monitoring the third response and continues to monitor the second response in the first monitoring window. If the terminal device monitors the second response in the first listening window, the terminal device stops the first listening window and determines that this random access is successful.
  • the terminal device can initiate 2-step random access or 4-step random access.
  • the terminal device when the second listening window times out, the terminal device directly stops the first listening window and re-initiates random access.
  • the terminal device can initiate 2-step random access or 4-step random access. Access.
  • the terminal device in order to reduce the delay of random access of the terminal device when the terminal device performs random access, after receiving the first response, the terminal device continues to monitor the second response while falling back to 4-step random access.
  • the access process enables the terminal equipment to perform the 4-step random access process while performing the 2-step random access process.
  • the terminal equipment determines that the random access is successful this time, which greatly reduces The delay of random access of terminal equipment is reduced.
  • the terminal device when the terminal device first listens to the first response in the first listening window, the terminal device directly stops the first listening window, and directly falls back from the 2-step random access process to the 4-step random access The process continues with the follow-up process of 4-step random access, and executes S403 to S404 in FIG. 4, which simplifies the processing process of the terminal device, thereby reducing the power consumption of the terminal device.
  • the terminal device stops listening to the first response, and continues to monitor the second response in the first listening window.
  • the terminal device stops the first listening window and ends the 2-step random access process, and the terminal device determines that this random access is successful.
  • the terminal device When the terminal device does not monitor the second response when the first listening window times out, the terminal device ends the 2-step random access process and determines whether the terminal device can fall back to the 4-step random access process at this time, and if it can return Back to the 4-step random access process, that is, the current time has not reached the time domain position of the uplink authorization included in the first response, then the terminal device will fall back from the 2-step random access process to the 4-step random access process, and continue with 4
  • the following steps of the random access process are performed, S403 ⁇ S404 in Figure 4 are executed; if the current time exceeds the time domain position of the uplink authorization included in the first response, the terminal device cannot fall back to 4 from the 2-step random access process.
  • Step random access process the terminal device re-initiates random access, where the terminal device can initiate 2-step random access or 4-step random access. Since the terminal device first performs the 2-step random access process during random access, when the 2-step random access process fails, it directly falls back to the 4-step random access process or re-initiates random access, which simplifies the terminal equipment processing Process, thereby reducing the power consumption of the terminal device.
  • the terminal device determines that this random access fails and re-initiates 2-step random access or 4-step random access. Access.
  • the communication device includes a hardware structure and/or software module corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
  • the embodiment of the present application also provides a device for implementing any of the above methods.
  • a device is provided that includes units (or means) for implementing each step performed by the terminal device in any of the above methods.
  • another device is also provided, including a unit (or means) for implementing each step performed by the network device in any of the above methods.
  • FIG. 7 is a schematic structural diagram of a device provided by an embodiment of the application. It should be understood that the apparatus 700 shown in FIG. 7 is only an example, and the apparatus 700 in the embodiment of the present application may also include other modules or units, or include units with similar functions to the units in FIG. 7, or not necessarily include those shown in FIG. 7. In all units. As shown in FIG. 7, the apparatus 700 includes a sending unit 701 and a processing unit 702.
  • the apparatus 700 may be a terminal device.
  • the sending unit 701 is configured to send a random access signal and the first information used for contention resolution to a network device;
  • the processing unit 702 is configured to monitor a first response and a second response, where the first response is a response to a random access signal and includes an uplink authorization, and the second response is a response to the first information used for contention resolution;
  • the uplink authorization is used to send the second information for contention resolution, and when the second response or the third response is monitored, it is determined that the random access is successful, where the third response is the second Response to information used for contention resolution.
  • the terminal device after the terminal device sends the random access signal and the first information for contention resolution to the network device, it monitors the first response corresponding to the random access signal and the first response corresponding to the first contention resolution information.
  • the second response is to determine whether the random access is successful according to the monitoring situation of the first response, the second response and the third response.
  • the 2-step random access process and the 4-step random access process are performed in parallel, thereby reducing the time delay of the random access of the terminal equipment.
  • the processing unit 702 is specifically configured to start or restart the first listening window in response to the transmission of the random access signal, and monitor the first response in the first listening window;
  • the second monitoring window is activated or restarted, and the second response is monitored in the second monitoring window.
  • processing unit 702 is further specifically configured to stop the second listening window when determining that the random access is successful.
  • the terminal device monitors the second response in the second listening window and determines that the random access is successful, the terminal device stops the second listening window, and the terminal device determines that the random access is successful.
  • processing unit 702 is further configured to start or restart the third monitoring window in response to the transmission of the second information for contention resolution, and monitor the third response in the third monitoring window.
  • processing unit 702 is further configured to stop the second listening window and the third listening window when the second response is monitored in the second listening window; or,
  • the terminal device when the terminal device detects the second response and determines that the 2-step random access is successful, the terminal device stops the second listening window and the third listening window, and terminates the 4-step random access process to determine this random access
  • the connection is successful.
  • the terminal device stops the second monitoring window and the third monitoring window, and terminates the 2-step random access process to determine that this random access is successful.
  • the terminal device performs a 2-step random access process and a 4-step random access process in parallel. When any one of the random access is successful, it is determined that the random access is successful this time, which greatly reduces the random access delay.
  • processing unit 702 is further configured to: during the operation of the third listening window, the second listening window times out, stop listening to the second response, and continue to monitor the third response; and
  • the random access may be 2-step random access or 4-step random access, which is not limited in the embodiment of the present application.
  • the processing unit 702 is further configured to, when the second listening window times out during the operation of the third listening window, stop the third listening window, and re-initiate random access, where the random access may be a 2-step random access. Access or 4-step random access.
  • the 2-step random access process fails, the terminal device directly terminates the 2-step random access process and the 4-step random access process, and directly initiates random access again, thereby reducing the power consumption of the terminal device.
  • processing unit 702 is further configured to stop monitoring the third response when the third monitoring window times out while the second monitoring window is running, and continue to monitor the second response;
  • random access When the second response is not monitored in the second monitoring window, random access is reinitiated.
  • the random access may be 2-step random access or 4-step random access.
  • the terminal equipment performs a 2-step random access process and a 4-step random access process in parallel.
  • the 4-step random access process fails, it continues with the 2-step random access process.
  • the 2-step random access process succeeds, it determines this time The random access is successful; when the 2-step random access process fails, it is determined that the random access has failed this time, and the terminal device directly initiates the random access again. Since the terminal device performs the 2-step random access process and the 4-step random access process in parallel during random access, when any random access process is successful, it can be determined that the random access process is successful, thereby reducing The delay of the random access process of the terminal equipment is reduced.
  • processing unit 702 is further configured to continue to monitor the second response when the first listening window times out while the second listening window is running, and
  • random access When the second response is not monitored in the second monitoring window, random access is reinitiated.
  • the random access may be 2-step random access or 4-step random access.
  • processing unit 702 is further configured to continue to monitor the first response when the second listening window times out during the operation of the first listening window, and when the first response is monitored, use the uplink authorization to send the second Information used for competition resolution, and
  • random access is re-initiated, where the random access may be 2-step random access or 4-step random access.
  • the terminal device can monitor the first response and the second response in a listening window.
  • the processing unit 702 is further configured to respond to the transmission of the random access signal and/or the transmission of the first contention resolution information, start or restart the first listening window, within the first listening window Listen for the first response and the second response.
  • the processing unit 702 is further configured to stop the first listening window when determining that the random access is successful.
  • the terminal device monitors the second response in the first listening window and determines that the random access is successful
  • the terminal device stops the first listening window and determines that the random access is successful this time.
  • the processing unit 702 is further configured to start or restart a second listening window in response to the transmission of the second information for contention resolution, and monitor the third response in the second listening window.
  • processing unit 702 is further configured to stop the first listening window and the second listening window when the second response is monitored in the first listening window; or,
  • processing unit 702 is further configured to stop monitoring the second response when the second monitoring window is running and the first monitoring window times out, and continue to monitor the third response;
  • the processing unit 702 is further configured to stop the second listening window when the first listening window times out while the second listening window is running, and re-initiate random access.
  • processing unit 702 is further configured to stop monitoring the third response when the second monitoring window times out while the first monitoring window is running, and continue to monitor the second response;
  • each unit in the device can be implemented in the form of software called by processing elements; they can also be implemented in the form of hardware; part of the units can be implemented in the form of software called by the processing elements, and some of the units can be implemented in the form of hardware.
  • each unit can be a separately established processing element, or it can be integrated in a certain chip of the device for implementation.
  • it can also be stored in the memory in the form of a program, which is called and executed by a certain processing element of the device.
  • all or part of these units can be integrated together or implemented independently.
  • the processing element described here can also become a processor, which can be an integrated circuit with signal processing capabilities.
  • each step of the above method or each of the above units may be implemented by an integrated logic circuit of hardware in a processor element or implemented in a form of being called by software through a processing element.
  • the unit in any of the above devices may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (ASIC), or, one or Multiple microprocessors (digital singnal processors, DSP), or, one or more field programmable gate arrays (FPGA), or a combination of at least two of these integrated circuits.
  • ASIC application specific integrated circuits
  • DSP digital singnal processors
  • FPGA field programmable gate arrays
  • the unit in the device can be implemented in the form of a processing element scheduler
  • the processing element can be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call programs.
  • CPU central processing unit
  • these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • the above receiving unit is an interface circuit of the device for receiving signals from other devices.
  • the receiving unit is an interface circuit used by the chip to receive signals from other chips or devices.
  • the above unit for sending is an interface circuit of the device for sending signals to other devices.
  • the sending unit is an interface circuit used by the chip to send signals to other chips or devices.
  • FIG. 8 shows a schematic structural diagram of a terminal device provided by an embodiment of the present application, which may be the terminal device in the above embodiment, and is used to implement the operation of the terminal device in the above embodiment.
  • the terminal device includes: an antenna 1110, a radio frequency part 1120, and a signal processing part 1130.
  • the antenna 1110 is connected to the radio frequency part 1120.
  • the radio frequency part 1120 receives the information sent by the network device through the antenna 1110, and sends the information sent by the network device to the signal processing part 1130 for processing.
  • the signal processing part 1130 processes the information of the terminal equipment and sends it to the radio frequency part 1120.
  • the radio frequency part 1120 processes the information of the terminal equipment and sends it to the network equipment via the antenna 1110.
  • the signal processing part 1130 may include a modem subsystem, which is used to process data at various communication protocol layers; it may also include a central processing subsystem, which is used to process terminal equipment operating systems and application layers; in addition, it may also Including other subsystems, such as multimedia subsystems, peripheral subsystems, etc., where the multimedia subsystem is used to control the terminal device camera, screen display, etc., and the peripheral subsystem is used to realize the connection with other devices.
  • the modem subsystem can be a separate chip.
  • the above apparatus for terminal equipment may be located in the modem subsystem.
  • the modem subsystem may include one or more processing elements 1131, for example, including a main control CPU and other integrated circuits.
  • the modem subsystem may also include a storage element 1132 and an interface circuit 1133.
  • the storage element 1132 is used to store data and programs, but the program used to execute the method executed by the terminal device in the above method may not be stored in the storage element 1132, but stored in a memory outside the modem subsystem, When in use, the modem subsystem is loaded and used.
  • the interface circuit 1133 is used to communicate with other subsystems.
  • the above apparatus for terminal equipment may be located in a modem subsystem, which may be implemented by a chip.
  • the chip includes at least one processing element and an interface circuit, wherein the processing element is used to perform any of the above terminal equipment executions.
  • the interface circuit is used to communicate with other devices.
  • the unit for the terminal device to implement each step in the above method can be implemented in the form of a processing element scheduler.
  • the device for the terminal device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the terminal device in the above method embodiment.
  • the storage element may be a storage element whose processing element is on the same chip, that is, an on-chip storage element.
  • the program for executing the method executed by the terminal device in the above method may be a storage element on a different chip from the processing element, that is, an off-chip storage element.
  • the processing element calls or loads a program from the off-chip storage element on the on-chip storage element to call and execute the method executed by the terminal device in the above method embodiment.
  • the unit of the terminal device that implements each step in the above method may be configured as one or more processing elements, and these processing elements are arranged on the modem subsystem, where the processing elements may be integrated circuits, For example: one or more ASICs, or, one or more DSPs, or, one or more FPGAs, or a combination of these types of integrated circuits. These integrated circuits can be integrated together to form a chip.
  • the units of the terminal device that implement the steps in the above methods can be integrated together and implemented in the form of SOC, and the SOC chip is used to implement the above methods.
  • the chip can integrate at least one processing element and a storage element, and the processing element can call the stored program of the storage element to implement the method executed by the above terminal device; or, the chip can integrate at least one integrated circuit to implement the above terminal The method executed by the device; or, it can be combined with the above implementations.
  • the functions of some units are implemented in the form of calling programs by processing elements, and the functions of some units are implemented in the form of integrated circuits.
  • the above apparatus for terminal equipment may include at least one processing element and an interface circuit, wherein at least one processing element is used to execute any of the methods performed by the terminal equipment provided in the above method embodiments.
  • the processing element can execute part or all of the steps executed by the terminal device in the first way: calling the program stored in the storage element; or in the second way: combining instructions through the integrated logic circuit of the hardware in the processor element Part or all of the steps performed by the terminal device are executed in a manner; of course, part or all of the steps executed by the terminal device can also be executed in combination with the first manner and the second manner.
  • the processing element here is the same as the above description, and may be a general-purpose processor, such as a CPU, or one or more integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • a general-purpose processor such as a CPU
  • integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • the storage element can be a memory or a collective term for multiple storage elements.
  • the embodiment of the present application also provides a communication system, which includes the aforementioned terminal device and network device.
  • This application provides a computer-readable storage medium.
  • the computer-readable storage medium stores computer instructions. When the computer instructions are executed on the computer, the computer executes the corresponding operations and/or processes performed by the terminal device in each method embodiment. .
  • This application also provides a computer program product containing instructions.
  • the computer program product runs on a computer, the computer can execute each step performed by the terminal device in the method shown in FIG. 6.
  • the application also provides a chip including a processor.
  • the processor is used to read and run the computer program stored in the memory to execute the corresponding operation and/or process executed by the terminal device in the random access method provided in this application.
  • the chip further includes a memory, the memory and the processor are connected to the memory through a circuit or a wire, and the processor is used to read and execute the computer program in the memory.
  • the chip further includes a communication interface, and the processor is connected to the communication interface.
  • the communication interface is used to receive data and/or information that needs to be processed, and the processor obtains the data and/or information from the communication interface, and processes the data and/or information.
  • the communication interface can be an input and output interface.
  • the processor may be a central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more of them used to control the technology of the application Integrated circuits for program execution, etc.
  • the processor may be a digital signal processor device, a microprocessor device, an analog-to-digital converter, a digital-to-analog converter, etc.
  • the processor can distribute control and signal processing functions of terminal devices or network devices among these devices according to their respective functions.
  • the processor may have a function of operating one or more software programs, and the software programs may be stored in the memory.
  • the functions of the processor can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the memory can be read-only memory (ROM), other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
  • Dynamic storage devices can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM), or other optical disk storage, optical disc storage ( Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can Any other medium accessed by the computer, etc.
  • EEPROM electrically erasable programmable read-only memory
  • CD-ROM compact disc read-only memory
  • optical disc storage Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.
  • magnetic disk storage media or other magnetic storage devices or can be used to carry or store desired program codes in the form of instructions or data structures and can Any other medium
  • the memory and the memory involved in the foregoing embodiments may be physically independent units, or the memory may also be integrated with the processor.
  • uplink and downlink appearing in this application are used to describe the direction of data/information transmission in a specific scenario.
  • the "uplink” direction generally refers to the direction or distribution of data/information from the terminal to the network side.
  • the “downlink” direction generally refers to the direction in which data/information is transmitted from the network side to the terminal, or the direction from the centralized unit to the distributed unit.
  • uplink and downlink “It is only used to describe the direction of data/information transmission.
  • the specific start and end equipment of the data/information transmission is not limited.
  • the architecture of the CU and DU in the embodiment of the application is not limited to 5G NR gNB, and can also be applied to the scenario where the LTE base station is divided into CU and DU; the CU can also be further divided into two parts, CP and UP.
  • the protocol layer does not include an SDAP layer.
  • At least one refers to one or more
  • multiple refers to two or more.
  • And/or describes the association relationship of the associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean that A exists alone, A and B exist at the same time, and B exists alone. Among them, A and B can be singular or plural.
  • the character “/” generally indicates that the associated objects are in an “or” relationship.
  • “The following at least one item” and similar expressions refer to any combination of these items, including any combination of single items or plural items.
  • At least one of a, b, and c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, and c can be single or multiple.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative, for example, the division of units is only a logical function division, and there may be other division methods in actual implementation.
  • multiple units or components can be combined or integrated into another system, or some features can be omitted or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may not be physically separated, and the components displayed as units may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the technical solution of the present application.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种随机接入方法和装置。该方法包括:向网络设备发送随机接入信号和第一用于竞争解决的信息;监听第一响应和第二响应,其中,第一响应为随机接入信号的响应且包括上行授权,第二响应为第一用于竞争解决的信息的响应;当监听到第一响应,且在上行授权的时域位置之前监听到第二响应时,确定随机接入成功;或者,当监听到第一响应,采用上行授权发送第二用于竞争解决的信息,且在监听到第二响应或第三响应时,确定随机接入成功,其中第三响应为第二用于竞争解决的信息的响应。本申请提供的技术方案能够使得终端设备在权衡时延和终端设备功耗时,选择合适的随机接入类型。

Description

随机接入方法和装置
本申请要求于2019年04月30日提交中国专利局、申请号为201910360371.3、申请名称为“随机接入方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信技术领域,尤其涉及一种随机接入方法和装置。
背景技术
终端设备通过随机接入(random access,RA)过程可以实现与网络设备的上行同步。随机接入过程包括基于竞争的随机接入过程和非竞争的随机接入过程。目前,基于竞争的随机接入过程分四步完成:第一步是终端设备向网络设备发送随机接入请求,该随机接入请求也可称为消息1(Msg1),其中包含随机接入前导(preamble);第二步为网络设备向终端设备发送随机接入响应(random access response,RAR)消息,该RAR消息也可称为消息2(Msg2);第三步为终端设备在接收到RAR后,在网络设备分配的资源上,使用网络设备指示的定时提前量,向网络设备发送消息,该消息也可称为消息3(Msg3);第四步为网络设备向终端设备发送竞争解决信息,承载该信息的消息称为消息4(Msg4)。RAR消息中可以包括随机接入前导标识(random access preamble identifier,RAP ID),且该RAP ID与终端设备选择的preamble ID相匹配(或相同),则认为RAR消息接收成功。
基于竞争的4步随机接入过程需要较多的交互流程,时延较大,不能很好的应用于对时延要求较高的场景。因此,引入了基于竞争的2步随机接入过程。
但由于目前有些终端设备既支持2步随机接入过程,又支持4步随机接入过程,使得终端设备在权衡时延和终端设备功耗时,不知如何操作。
发明内容
有鉴于此,本申请实施例提供了一种随机接入方法和装置,以期终端设备在权衡时延和功耗时,选择合适的随机接入类型。
第一方面,提供了一种随机接入方法,第一方面提供的方法可以由终端设备执行,也可以由配置于终端设备中的芯片执行,本申请对此不作限定。
具体地,该方法包括:向网络设备发送随机接入信号和第一用于竞争解决的信息;监听第一响应和第二响应,其中,该第一响应为随机接入信号的响应且包括上行授权,第二响应为第一用于竞争解决的信息的响应。当监听到所述第一响应,且在上行授权的时域位置之前监听到第二响应时,确定随机接入成功;或者,当监听到第一响应,采用上行授权发送第二用于竞争解决的信息,且在监听到第二响应或第三响应时,确定随机接入成功, 其中第三响应为第二用于竞争解决的信息的响应。
本申请实施例的随机接入方法,终端设备在第一监听窗和第二监听窗内分别监听第一响应和第二响应,使得终端设备在进行2步随机接入过程的同时进行4步随机接入过程,当其中任意类型的随机接入成功,则确定终端设备随机接入成功,从而减小了终端设备在随机接入过程中的时延。
结合第一方面,在第一方面的某些可能的实现方式中,监听第一响应和第二响应包括,响应于发送随机接入信号的传输,启动或重新启动第一监听窗,在第一监听窗内监听第一响应;响应于第一用于竞争解决的信息的传输,启动或重新启动第二监听窗,在第二监听窗内监听第二响应。
应说明,第一监听窗和第二监听窗可以在同一时刻启动或重新启动,也可以在不同时刻启动或重新启动,本申请对此不作限定。
结合第一方面,在第一方面的某些可能的实现方式中,确定随机接入成功时,停止第二监听窗。
结合第一方面,在第一方面的某些可能的实现方式中,响应于第二用于竞争解决的信息的传输,启动或重新启动第三监听窗,在第三监听窗内监听第三响应。
结合第一方面,在第一方面的某些可能的实现方式中,当在第二监听窗内监听到第二响应时,停止第二监听窗和第三监听窗;或者,当在第三监听窗内监听到第三响应时,停止第二监听窗和第三监听窗。
本申请技术方案中,当终端设备先在第二监听窗内监听到第二响应时,则表示2步随机接入成功,则终端设备停止第二监听窗和第三监听窗,终止2步随机接入和4步随机接入;或者当终端设备先在第三监听窗内监听到第三响应,则表示4步随机接入成功,则终端设备停止第二监听窗和第三监听窗。这种2步随机接入过程和4步随机接入过程并行进行的方式,可以减小终端设备随机接入的时延。
结合第一方面,在第一方面的某些可能的实现方式中,当第三监听窗运行期间,第二监听窗超时,停止监听第二响应,继续监听第三响应;且当在第三监听窗内监听到第三响应时,确定随机接入成功;或,当在第三监听窗内未监听到第三响应时,重新发起随机接入。
应说明,终端设备在确定随机接入失败后,终端设备重新发起随机接入可以是2步随机接入也可以是4步随机接入,本申请对此不作限定。
结合第一方面,在第一方面的某些可能的实现方式中,当第三监听窗运行期间,第二监听窗超时,停止第三监听窗,重新发起随机接入。
上述技术方案中,终端设备确定2步随机接入失败后,终端设备直接终止2步和4步随机接入过程,重新发起随机接入,而不用继续进行4步随机接入过程,从而降低终端设备的功耗。
结合第一方面,在第一方面的某些可能的实现方式中,当第二监听窗运行期间,第三监听窗超时,停止监听第三响应,继续监听第二响应;且当在第二监听窗内监听到第二响应时,确定随机接入成功;或,当在第二监听窗内未监听到第二响应时,重新发起随机接入。
结合第一方面,在第一方面的某些可能的实现方式中,当第二监听窗运行期间,第一 监听窗超时,继续监听第二响应,且当在第二监听窗内监听到第二响应时,确定随机接入成功;或,当在第二监听窗内未监听到第二响应时,重新发起随机接入。
结合第一方面,在第一方面的某些可能的实现方式中,当第一监听窗运行期间,第二监听窗超时,继续监听第一响应,且在监听到第一响应时,采用上行授权发送第二用于竞争解决的信息,且在监听到第三响应时,确定随机接入成功;或者,未监听到第三响应时,重新发起随机接入。
结合第一方面,在第一方面的某些可能的实现方式中,响应于随机接入信号的传输和/或第一用于竞争解决的信息的传输,启动或重新启动第一监听窗,在第一监听窗内监听第一响应和第二响应。
上述技术方案中,终端设备在一个监听窗内同时监听第一响应和第二响应,其中,该第一监听窗可以复用现有技术中的监听窗,例如,RAR window;也可以通过网络设备向终端设备重新配置新的监听窗口,本申请对此不作限定。
结合第一方面,在第一方面的某些可能的实现方式中,确定随机接入成功时,停止第一监听窗。
结合第一方面,在第一方面的某些可能的实现方式中,响应于第二用于竞争解决的信息的传输,启动或重新启动第二监听窗,在第二监听窗内监听第三响应。
结合第一方面,在第一方面的某些可能的实现方式中,当在第一监听窗内监听到第二响应时,停止第一监听窗和第二监听窗;或者,
当在第二监听窗内监听到第三响应时,停止第一监听窗和第二监听窗。
结合第一方面,在第一方面的某些可能的实现方式中,当第二监听窗运行期间,第一监听窗超时,停止监听第二响应,继续监听第三响应;且当在第二监听窗内监听到第三响应时,确定随机接入成功;或,当在第二监听窗内未监听到第三响应时,重新发起随机接入。
结合第一方面,在第一方面的某些可能的实现方式中,当第二监听窗运行期间,第一监听窗超时,停止第二监听窗,重新发起随机接入。
结合第一方面,在第一方面的某些可能的实现方式中,当第一监听窗运行期间,第二监听窗超时,停止监听第三响应,继续监听第二响应;且当在第一监听窗内监听到第二响应时,确定随机接入成功;或,当在第一监听窗内未监听到第二响应时,重新发起随机接入。
第二方面,本申请提供一种随机接入装置,包括用于执行第一方面或第一方面的任意可能的实现方式中的方法。
第三方面,本申请提供一种随机接入装置,包括至少一个处理器和接口电路,所述至少一个处理器用于执行第一方面或第一方面的任意可能的实现方式中的方法。
第四方面,本申请提供一种随机接入装置,包括至少一个处理器,用于与存储器连接,以调用存储器中的程序执行以上第一方面提供的方法。该存储器可以位于该装置之内,也可以位于该装置之外。且该处理器包括一个或者多个。
第五方面,本申请提供一种终端设备,该终端设备包括上述第二方面提供的装置,或者,该终端设备包括上述第三方面提供的装置,或者,该终端设备包括上述第四方面提供的装置。
第六方面,本申请提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机指令,当计算机指令在计算机上运行时,使得计算机执行第一方面或第一方面的任意可能的实现方式中的方法。
第七方面,本申请提供一种芯片,包括处理器。处理器用于读取并执行存储器中存储的计算机程序,以执行第一方面或第一方面任意可能的实现方式中的方法。
可选地,所述芯片还包括存储器,存储器与处理器通过电路或电线与存储器连接,存储器用于存储计算机程序。
进一步可选地,所述芯片还包括通信接口。
第八方面,本申请还提供一种计算机程序产品,所述计算机程序产品包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行上述第一方面及其任意一种可能的实现方式中的方法。
本申请的技术方案,终端设备通过并行进行2步随机接入过程和4步随机接入过程,使得终端设备在权衡时延和功耗时可以选择合适的随机接入类型。
附图说明
图1为本申请实施例适用的一种通信系统的架构图;
图2为本申请实施例适用的另一种通信系统的架构图;
图3为本申请实施例适用的又一种通信系统的架构图;
图4为现有的基于竞争的4步随机接入过程的消息交互图;
图5为现有的基于竞争的2步随机接入过程的消息交互图;
图6为本申请实施例提供的随机接入方法的示意性流程图;
图7为本申请实施例提供的装置的结构示意图;
图8为本申请实施例提供的终端设备的结构示意图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
请参考图1,其为本申请实施例提供的一种通信系统的架构图。如图1所示,通信系统可以包括终端设备100和网络设备200。本申请实施例对于终端设备100和网络设备200的数量不做限定。位于网络设备200覆盖范围内的终端设备100,可以通过无线的方式与网络设备200通信。具体的,当网络设备200作为发送者时,可以向终端设备100发送下行信息。相应的,终端设备100作为接收者,可以接收网络设备200发送的下行信息。当终端设备100作为发送者时,可以向网络设备200发送上行信息。相应的,网络设备200作为接收者,可以接收终端设备100发送的上行信息。终端设备100可以是固定位置的,也可以是可移动的。
可选的,通信系统还可以包括其它设备。例如,通信系统还可以包括核心网设备(图1未示出)。网络设备200可以通过无线或有线的方式与核心网设备连接。核心网设备与网络设备200可以是独立的不同的物理设备,也可以将核心网设备的功能与网络设备200的功能集成在同一个物理设备上,还可以是一个物理设备上集成了核心网设备的部分功能和网络设备200的部分功能。又例如,通信系统还可以包括无线中继设备或无线回传设备 (图1未示出)。
网络设备200,是网络侧中一种用于发射和接收信号的装置,例如将终端设备接入到无线网络的无线接入网(radio access network,RAN)节点。目前,一些RAN节点的举例为:新无线接入技术(new radio access technology,NR)(或5G)系统中的新一代基站(generation Node B,gNB)、传输接收点(transmission reception point,TRP)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU),中继站,或无线保真(wireless fidelity,Wifi)接入点(access point,AP)等。在一种网络结构中,网络设备可以包括集中单元(centralized unit,CU)节点、或分布单元(distributed unit,DU)节点、或包括CU节点和DU节点的RAN设备。网络设备200的无线覆盖区域可以包括一个或多个小区。小区覆盖范围内的终端设备100通过该小区的传输资源(例如,频域资源,频谱资源,或时频资源)与网络设备200进行通信。该小区可以是宏小区,也可以是小小区(small cell)。可选的,小小区可以包括:城市小区(metro cell)、微小区(micro cell)、微微小区(pico cell)、或毫微微小区(femto cell)等。本申请实施例对于网络设备200所采用的具体技术和具体设备形态不做限定。
终端设备100,又称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、或移动终端(mobile terminal,MT)等,是一种向用户提供语音/数据连通性的设备,例如,具有无线连接功能的手持式设备、或车载设备等。目前,一些终端设备的举例为:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备、虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、或智慧家庭(smart home)中的无线终端等。
请参考图2,其为本申请实施例提供的另一种网络架构的示意图。如图2所示,该网络架构包括核心网(CN)设备和RAN设备。其中RAN设备包括基带装置和射频装置,其中基带装置可以由一个节点实现,也可以由多个节点实现,射频装置可以从基带装置拉远独立实现,也可以集成基带装置中,或者部分拉远部分集成在基带装置中。例如,在长期演进(Long Term Evolution,LTE)通信系统中,RAN设备(eNB)包括基带装置和射频装置,其中射频装置可以相对于基带装置拉远布置,例如射频拉远单元(remote radio unit,RRU)相对于BBU拉远布置。
RAN设备和终端设备之间的通信遵循一定的协议层结构。例如控制面协议层结构可以包括无线资源控制(radio resource control,RRC)层、分组数据汇聚层协议(packet data convergence protocol,PDCP)层、无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理层等协议层的功能。用户面协议层结构可以包括PDCP层、RLC层、MAC层和物理层等协议层的功能;在一种实现中,PDCP层之上还可以包括业务数据适配(service data adaptation protocol,SDAP)层。
这些协议层的功能可以由一个节点实现,或者可以由多个节点实现;例如,在一种演 进结构中,RAN设备可以包括CU和DU,多个DU可以由一个CU集中控制。如图2所示,CU和DU可以根据无线网络的协议层划分,例如PDCP层及以上协议层的功能设置在CU,PDCP以下的协议层,例如RLC层和MAC层等的功能设置在DU。
这种协议层的划分仅仅是一种举例,还可以在其它协议层划分,例如在RLC层划分,将RLC层及以上协议层的功能设置在CU,RLC层以下协议层的功能设置在DU;或者,在某个协议层中划分,例如将RLC层的部分功能和RLC层以上的协议层的功能设置在CU,将RLC层的剩余功能和RLC层以下的协议层的功能设置在DU。此外,也可以按其它方式划分,例如按时延划分,将处理时间需要满足时延要求的功能设置在DU,不需要满足该时延要求的功能设置在CU。
此外,射频装置可以拉远,不放在DU中,也可以集成在DU中,或者部分拉远部分集成在DU中,在此不作任何限制。
请继续参考图3,相对于图2所示的架构,还可以将CU的控制面(CP)和用户面(UP)分离,分成不同实体来实现,分别为控制面CU实体(CU-CP实体)和用户面CU实体(CU-UP实体)。
在以上网络架构中,CU产生的信令可以通过DU发送给终端设备,或者终端设备产生的信令可以通过DU发送给CU。DU可以不对该信令进行解析而直接通过协议层封装而透传给终端设备或CU。以下实施例中如果涉及这种信令在DU和终端设备之间的传输,此时,DU对信令的发送或接收包括这种场景。例如,RRC或PDCP层的信令最终会处理为PHY层的信令发送给终端设备,或者,由接收到的PHY层的信令转变而来。在这种架构下,该RRC或PDCP层的信令,即也可以认为是由DU发送的,或者,由DU和射频发送的。
在以上实施例中CU划分为RAN侧的网络设备,此外,也可以将CU划分为CN侧的网络设备,在此不做限制。
当采用以上CU-DU的结构时,本申请各实施例中的网络设备,可以为CU节点、或DU节点、或包括CU节点和DU节点的RAN设备。
终端设备通过随机接入过程可以实现与网络设备的上行同步。请参考图4,其为一种现有的基于竞争的随机接入过程的消息交互图。如图4所示,该过程主要包括4个步骤,故可以称为4步随机接入过程。
S401、终端设备向网络设备发送随机接入请求,该随机接入请求也可称为消息1(Msg1),其中包含随机接入前导(preamble)。
相应的,网络设备接收该preamble,获知有终端设备请求接入,进而执行以下步骤S402。
S402、网络设备向终端设备发送随机接入响应(random access response,RAR)消息,该RAR消息也可称为消息2(Msg2)。
RAR可以包括如下内容:1)RAPID,RAPID为网络设备在检测preamble时得到的preamble identifier(前导码标识),又可以称为前导码索引。2)定时提前命令(timing advance command,TA command),TA命令用于指定终端设备进行上行同步所需要的时间调整量(也称为定时提前量)。3)上行授权信息(UL grant),UL grant用于指定网络设备分配给终端设备发送Msg3(消息3)的上行资源。4)临时小区无线网络临时标识(temporary  cell radio network temporary identity,TC-RNTI),用于终端设备和网络设备之间后续的数据传输。
相应的,终端设备通过发送preamble的时频资源计算出随机接入无线网络临时标识(random access radio network temporary identifier,RA-RNTI),并在RAR时间窗口内监听RA-RNTI加扰的物理下行控制信道(physical downlink control channel,PDCCH),以接收对应所述RA-RNTI的RAR。当终端设备使用所述RA-RNTI解码并成功地接收到一个RAR,且该RAR中的RAPID值与终端设备发送preamble时使用的索引值相同时,则认为RAR接收成功。终端设备开始处理该RAR里面包含的TA command,UL grant以及TC-RNTI。如果终端设备在RAR时间窗口内没有接收到针对所述Preamble的RAR,则认为RAR接收失败。后续,返回S401重新进行基于竞争的4步随机接入。
S403、终端设备根据RAR,在网络设备分配的上行资源上,使用网络设备指示的定时提前量向网络设备发送Msg3(消息3)。
具体的,终端设备发送Msg3后,启动或重新启动竞争解决定时器。其中,Msg3中包含终端设备的标识。终端设备的标识将用于S404中的竞争解决。终端设备的标识可以与终端设备在通信系统中的状态相关。例如,终端设备处于RRC连接(RRC_CONNECTED)态时,终端设备的标识可以是小区无线网络临时标识(cell radio network temporary identifier,C-RNTI)。终端设备处于非RRC连接态时,终端设备的标识可以为来自核心网的终端设备标识。可选地,来自核心网的终端设备标识可以为系统架构演进临时移动台标识符(system architecture evolution temporary mobile station identifier,S-TMSI)或一个随机数。
S404、网络设备向终端设备发送Msg4(消息4)。
Msg4可以包括竞争解决信息,以指示竞争解决成功。可选的,竞争解决信息可以为UE竞争解决标识MAC控制单元(contention resolution identity MAC CE),即Msg3的部分内容或者Msg3的全部内容,竞争解决信息也可以为小区无线网络临时标识(cell radio network temporary identifier,C-RNTI)加扰的PDCCH,即终端设备检测到C-RNTI加扰的PDCCH,则认为竞争解决。相应的,终端设备在竞争解决定时器内等待接收Msg4。如果竞争解决定时器超时,终端设备尚未接收到竞争解决信息,则返回S401重新进行基于竞争的4步随机接入。
以上基于竞争的4步随机接入过程应用于对时延要求较高的场景时,由于交互的流程较多,时延较大,存在难以满足时延要求的问题。因此,引入了2步随机接入过程。请参考图5,其为本申请实施例提供的一种2步随机接入过程的消息交互图。如图5所示,该随机接入过程,可以包括:
S501、终端设备向网络设备发送请求消息。
相应的,网络设备接收终端设备发送的请求消息。
其中,请求消息可以包括随机接入信号和用于竞争解决的信息。
其中,随机接入信号用于请求随机接入。网络设备可以检测出随机接入信号,并获知有终端设备请求随机接入。
在不同的通信系统或不同的应用场景中,随机接入信号的实现方式可以不同。例如,在NR系统中,随机接入信号可以为前导码(Preamble)、解调参考信号(demodulation  reference signal,DMRS)或者其他的用于随机接入的检测信号。本申请实施例对于随机接入信号的实现方式以及长度、名称等不做限定。
其中,用于竞争解决的信息是终端设备向网络设备发送的,用于竞争解决。
可选的,用于竞争解决的信息可以包括终端设备的标识。终端设备的标识可以与终端设备在通信系统中的状态相关。例如,终端设备处于RRC连接态(RRC_CONNECTED态)时,终端设备的标识可以是小区无线网络临时标识(cell radio network temporary identifier,C-RNTI)。终端设备处于非RRC连接态时,终端设备的标识可以为来自核心网的终端设备标识。可选的,来自核心网的终端设备标识可以为系统架构演进临时移动台标识符(system architecture evolution temporary mobile station identifier,S-TMSI)或一个随机数。
S502、网络设备向终端设备发送对于请求消息的响应消息。
相应的,终端设备接收网络设备发送的对于请求消息的响应消息。
其中,响应消息包含了竞争解决信息和一个负载(Payload),响应消息中的负载可以包括基于竞争的4步随机接入过程中的RAR中的部分内容或者全部内容。例如,可以包括以下信息的中的之一或其任意组合:UL grant、TA命令、TC-RNTI。也可以包括新定义的内容,例如下行分配(DL assignment),本申请对响应消息中的负载的具体内容不作限定。响应消息中的竞争解决信息是终端设备根据用于竞争解决的信息得到的,是用于竞争解决的信息的部分或全部内容,或者为终端设备的C-RNTI加扰的PDCCH或者为显式携带在响应消息中的C-RNTI。
例如,参照图4中S404,在基于竞争的4步随机接入过程中,对于RRC_CONNECTED态的终端设备,Msg4是通过C-RNTI加扰的PDCCH实现的。在S403中,终端设备可以通过C_RNTI MAC CE将自己的C-RNTI发送给网络设备,在S404中,终端设备监听到C-RNTI加扰的PDCCH,则终端设备认为随机接入成功。在基于竞争的2步随机接入过程中,对于RRC_CONNECTED态的终端设备,终端设备已经获得C-RNTI。在S501中,终端设备向网络设备发送的消息中,可以将C-RNTI作为用于竞争解决的信息发送给网络设备。相应的,网络设备可以将C-RNTI作为竞争解决信息显式地携带在响应消息中。
由上可以看出,2步随机接入过程流程相较于4步随机接入过程交互流程较少,可以大大减小随机接入的时延,从而满足时延要求较高的新的应用场景。例如,非授权频谱小区、短时延业务、小数据包业务等。
但由于现有的一些终端设备既可以支持4步随机接入过程,又可以支持2步随机接入过程,当考虑时延和功耗两方面问题时,终端设备不知道如何在4步随机接入过程和2步随机接入过程之间抉择。有鉴于此,本申请实施例提供一种随机接入方法,终端设备在进行2步随机接入过程的同时,若监听到随机接入信号的响应消息,则终端设备边回退到4步随机接入过程,边继续进行2步随机接入过程。即2步随机接入过程和4步随机接入过程同时进行,当其中任意一个随机接入成功,则终端设备确定此次随机接入成功,从而大大减小了随机接入的时延。
图6示出了本申请一个实施例提供的随机接入方法600的示意性流程图。该方法600包括步骤S601至S603,下面详细介绍这些步骤。
S601、发送随机接入信号和第一用于竞争解决的信息。
终端设备向网络设备发送随机接入信号和第一用于竞争解决的信息。其中,该随机接入信号用于请求随机接入,该第一用于竞争解决的信息是终端设备向网络设备发送的,用于竞争解决的。具体地,可以参考S501的描述,此处为了简洁不再赘述。
本申请实施例对终端设备向网络设备发送随机接入信号和第一用于竞争解决的信息的方式不作限定。
S602、终端设备监听第一响应和第二响应。
网络设备接收到终端设备发送的随机接入信号和第一用于竞争解决的信息后,网络设备发送对于该随机接入信号的第一响应和对于第一用于竞争解决的信息的第二响应,终端设备监听该第一响应和第二响应。
其中,第一响应可以是现有的RAR消息(随机接入响应),或者其它新定义的响应消息,本申请对第一响应的名称不作限定。第一响应包括基于竞争的4步随机接入过程中的RAR中的部分或全部内容,包括上行授权信息(UL grant)、定时提前命令(TA命令)、TC-RNTI中的一个或多个。
第二响应是终端设备根据第一用于竞争解决的信息得到的,例如是第一用于竞争解决的信息的部分或全部内容,或者为C-RNTI加扰的PDCCH或者为显式携带在第二响应中的C-RNTI。
例如,参照图6中S602,对于RRC_CONNECTED态的终端设备,终端设备已经获得C-RNTI。在S601中,终端设备向网络设备发送的消息中,可以将C-RNTI作为用于竞争解决的信息发送给网络设备。相应的,网络设备可以将C-RNTI作为竞争解决信息显式地携带在第二响应中。
S603、终端设备确定随机接入是否成功。
当终端设备监听到第一响应时,且在上行授权的时域位置之前监听到该第二响应时,则该终端设备确定随机接入成功。或者,当终端设备监听到该第一响应,采用上行授权发送第二用于竞争解决的信息,且在监听到该第二响应或第三响应时,该终端设备确定随机接入成功,其中,该第三响应为第二用于竞争解决的信息的响应。
在一些可能的实施方式中,该第二用于竞争解决的信息可以是基于竞争的4步随机接入过程中的消息3。具体地,可以参考S403的描述,此处为了简洁不再赘述。
在一些可能的实施方式中,该第三响应可以是基于竞争的4步随机接入过程中的消息4,可以包括竞争解决信息,以指示竞争解决成功。可选地,竞争解决信息可以为UE竞争解决标识MAC控制单元(Contention Resolution Identity MAC CE),即消息3的部分内容或者消息3的全部内容,竞争解决信息也可以为C-RNTI加扰的PDCCH。
应说明,竞争解决成功也称为随机接入成功,即终端设备根据第一响应、第二响应以及第三响应的监听情况确定竞争解决成功时,也可认为随机接入成功,当终端设备根据第一响应、第二响应和第三响应的监听情况确定竞争解决失败时,也可认为随机接入失败。本申请实施例为了便于描述,统一称为随机接入成功或随机接入失败。
为了监听第一响应和第二响应,网络设备可以向终端设备发送两个监听窗的配置信息,定义第一监听窗和第二监听窗,其中,该第一监听窗用于监听该第一响应,该第二监听窗用于监听第二响应。
其中,该第一监听窗可以为现有技术中的RAR window,也可以为网络设备重新配置 的用于监听第一响应的监听窗,本申请实施例对该第一监听窗和第二监听窗的具体名称不作任何限定。此外,监听窗也可以称为定时器。
另外,第一监听窗和第二监听窗可以在同一时刻启动或者重新启动,也可以在不同时刻启动或重新启动。例如,第一监听窗在终端设备发送完随机接入信号后启动或重新启动,例如在随机接入信号传输结束后的第一个PDCCH资源(例如PDCCH occasion)上,启动或重新启动第一监听窗,或者在随机接入信号传输结束后经过某个时间偏移量后启动或重新启动该第一监听窗,其中,该时间偏移量可以是预定义的,也可以是网络设备侧配置的。第二监听窗在终端设备发送完或者重传完物理层上行共享信道(physical uplink shared channel,PUSCH)后启动或重新启动,例如在PUSCH传输或者重传结束后的第一个符号(例如symbol)上,启动或者重新启动第二监听窗,或者在PUSCH传输或者重传结束后经过某个时间偏移量后启动或重新启动该第二监听窗,其中,该时间偏移量可以是预定义的,也可以是网络设备侧配置的。或者,该第一监听窗和第二监听窗在终端设备发送完或者重传完PUSCH后同时启动或重新启动,例如在PUSCH传输或者重传结束后的第一个符号(例如symbol)上,同时启动或者重新启动第一监听窗和第二监听窗,或者在PUSCH传输或者重传结束后经过某个时间偏移量后同时启动或重新启动第一监听窗和第二监听窗,其中,该时间偏移量可以是预定义的,也可以是网络设备侧配置的。或者,在终端设备发送完随机接入信号后同时启动或重新启动第一监听窗和第二监听窗,例如在随机接入信号传输结束后的第一个PDCCH资源(例如PDCCH occasion)上,同时启动或重新启动第一监听窗和第二监听窗,或者在随机接入信号传输结束后经过某个时间偏移量后同时启动或重新启动第一监听窗和第二监听窗,其中,该时间偏移量可以是预定义的,也可以是网络设备侧配置的。
应理解,上述第一监听窗和第二监听窗的启动或重新启动方式仅仅是为了示例,本申请实施例对此并不作任何限定。
若终端设备先监听到了第二响应并确定随机接入成功,则终端设备停止该第一监听窗和第二监听窗,终端设备确定此次随机接入成功。
应理解,停止第一监听窗,即表示停止监听第一响应,停止第二监听窗,表示停止监听第二响应。
应说明,本申请中停止监听窗,即表示停止监听相应的响应,为了简洁,下文不再详细描述。
若终端设备先监听到了第一响应,则终端设备停止第一监听窗,但不停止第二监听窗,继续监听第二响应的同时回退到4步随机接入过程,即终端设备在做2步随机接入的同时并行进行4步随机接入。当2步随机接入过程和4步随机接入过程中任意一种确定随机接入成功,则终端设备停止2步随机接入过程和4步随机接入过程,并确定此次随机接入成功,从而减小随机接入的时延。
随机接入回退,是指从基于竞争的2步随机接入过程回退到基于竞争的4步随机接入过程。
具体的,如果网络设备控制终端设备从基于竞争的2步随机接入过程回退到基于竞争的4步随机接入过程,此时,网络设备可以向终端设备发送对于该随机接入信号的第一响应。可选地,所述第一响应包括上行授权信息、定时提前命令和TC-RNTI。后续,终端设 备可以根据接收到的第一响应,执行图4中的S403~S404,进行随机接入回退。
在一些可能的实现方式中,终端设备先监听到了第一响应,并且在该第一响应中包括的上行授权的时域位置之前监听到了第二响应并确定随机接入成功,则终端设备停止第二监听窗,确定此次随机接入成功。
在一些可能的实现方式中,终端设备先监听到了第一响应,并且在该第一响应中包括的上行授权的时域位置之前第二监听窗超时,则终端设备停止监听该第二响应,继续4步随机接入过程,执行图4中的S403~S404。若终端设备确定4步随机接入过程成功,则终端设备终止4步随机接入过程;若终端设备确定4步随机接入过程失败,则终端设备重新发起2步随机接入或4步随机接入。或者在第二监听窗超时时,终端设备直接停止第一监听窗并重新发起2步随机接入或4步随机接入。
或者,终端设备在第一响应中包括的上行授权的时域位置之后监听到了第二响应,此时由于终端设备已经在上行授权上发送了消息3,并且启动或重新启动了第三监听窗,则终端设备在第二监听窗内监听第二响应的同时在第三监听窗内监听第三响应,其中,该第三响应可以为4步随机接入过程中的竞争解决信息,即消息4,该第二用于竞争解决的信息可以为4步随机接入过程中的消息3。如果终端设备先监听到了第二响应并确定随机接入成功,表明2步随机接入过程成功,则终端设备停止该第二监听窗和第三监听窗,并终止4步随机接入过程,终端设备确定此次随机接入成功。
同样的,如果终端设备先监听到第三响应消息,表明4步随机接入过程成功,则终端设备停止该第二监听窗和第三监听窗,并终止2步随机接入过程,终端设备确定此次随机接入成功。
可选地,以第一响应为RAR消息为例,当终端设备使用RA-RNTI解码并成功接收到RAR,且该RAR中的RAPID值与终端设备发送preamble时使用的索引值相同时,则认为RAR接收成功,即终端设备成功监听到了第一响应;当终端设备检测到对于第一用于竞争解决的信息的第二响应中包括终端设备的竞争解决标识或者该第二响应是通过终端设备的C-RNTI加扰的PDCCH或者该第二响应显式携带了终端设备的C-RNTI,则终端设备成功监听到了第二响应;第三响应可以为4步随机接入中的竞争解决信息(消息4),当终端设备检测到对于第二用于竞争解决的信息的第三响应中包括终端设备的竞争解决标识或者该第三响应是通过终端设备的C-RNTI加扰的PDCCH,则终端设备成功监听到了第三响应。
应说明,该第三监听窗可以为现有技术中的竞争解决定时器,也可以为网络设备重新配置的新的定时器,本申请实施例对此并不作限定。
当第三监听窗在运行时,第二监听窗超时,则终端设备停止监听该第二响应,继续在第三监听窗内监听第三响应。若终端设备在第三监听窗内监听到该第三响应,则终端设备停止该第三监听窗,确定此次随机接入成功。
或者,该终端设备在第三监听窗超时时仍未监听到该第三响应,则表明2步随机接入过程和4步随机接入过程均失败,则终端设备重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。
在一些可能的实现方式中,当第二监听窗超时时,终端设备直接停止第三监听窗,并重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。
另外,当第二监听窗在运行时,第三监听窗超时,则终端设备停止监听该第三响应, 继续在第二监听窗内监听第二响应。若终端设备在第二监听窗内监听到该第二响应,则终端设备停止第二监听窗,确定此次随机接入成功。
或者,该终端设备在第二监听窗超时时仍未监听到该第二响应,则表明2步随机接入过程和4步随机接入过程均失败,则终端设备重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。
在一些可能的实现方式中,当第三监听窗超时时,终端设备直接停止第二监听窗并重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。
上述技术方案中,终端设备在进行随机接入时,为了减小终端设备随机接入的时延,终端设备在接收到第一响应后,继续监听第二响应的同时边回退到4步随机接入过程,使得终端设备在进行2步随机接入过程的同时进行4步随机接入过程,当其中任意一种随机接入过程成功,则终端设备确定此次随机接入成功,从而大大减小了终端设备的随机接入的时延。
在一些可能的实现方式中,当终端设备先监听到第一响应时,终端设备直接停止第一监听窗和第二监听窗,由2步随机接入过程直接回退到4步随机接入过程,继续4步随机接入的后续过程,执行图4中的S403~S404,简化了终端设备的处理进程,从而降低了终端设备的功耗。
或者,终端设备监听到了第一响应,则终端设备停止第一监听窗,并继续在第二监听窗监听第二响应。当终端设备在第二监听窗运行期间监听到了第二响应并确定随机接入成功,则终端设备停止第二监听窗,结束2步随机接入过程,终端设备确定此次随机接入成功。当终端设备在第二监听窗超时时仍未监听到第二响应,则终端设备结束2步随机接入过程,并判断此时终端设备是否可以回退到4步随机接入过程,如果可以回退到4步随机接入过程,即当前时刻还未到第一响应中包括的上行授权的时域位置,则终端设备由2步随机接入过程回退到4步随机接入过程,继续4步随机接入过程的后续步骤,执行图4中的S403~S404;如果当前时刻超过第一响应中包括的上行授权的时域位置,则终端设备不能由2步随机接入过程回退到4步随机接入过程,则终端设备重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。由于终端设备在随机接入时先进行2步随机接入过程,当2步随机接入过程失败时,直接回退到4步随机接入过程或者重新发起随机接入,简化了终端设备的处理进程,从而降低了终端设备的功耗。
可选地,当第一监听窗超时时,第二监听窗还在运行,则终端设备继续监听第二响应,直至终端设备在第二监听窗的运行期间内监听到第二响应且确定随机接入成功,则终端设备停止第二监听窗,终端设备确定此次随机接入成功;或者终端设备在第二监听窗超时时仍未监听到第二响应,则终端设备确定此次随机接入失败,重新发起2步随机接入或4步随机接入;或者在第一监听窗超时时,终端设备停止第二监听窗并重新发起2步随机接入或4步随机接入。
或者,当第二监听窗超时时,第一监听窗还在运行,则终端设备继续监听第一响应,当终端设备在第一监听窗的运行期间内监听到第一响应,则该终端设备继续4步随机接入过程,执行图4中的S403~S404。若终端设备确定4步随机接入成功,则终端设备终止4步随机接入过程;若终端设备确定4步随机接入失败,则终端设备重新发起2步随机接入或4步随机接入;或者终端设备在第一监听窗超时时仍未监听到第一响应,则终端设备确定此次 随机接入失败,重新发起2步随机接入或4步随机接入;或者在第二监听窗超时时,终端设备直接停止第一监听窗并重新发起2步随机接入或4步随机接入。
另外,当第一监听窗和第二监听窗超时时,终端设备既没有监听到第一响应又未监听到第二响应,则终端设备确定此次随机接入失败并重新发起2步随机接入或4步随机接入。
在一些可能的实现方式中,终端设备可以在一个监听窗内监听第一响应和第二响应,即网络设备向终端设备发送一个监听窗的配置信息,该监听窗既用于监听第一响应又用于监听第二响应。
其中,该监听窗可以是复用现有技术中监听窗或定时器,例如RAR监听窗(RAR window)、竞争解决定时器(contention resolution timer),也可以是网络设备重新定义的用于监听第一响应和第二响应的监听窗,本申请实施例对该监听窗的具体名称不作任何限定。为了便于描述,本申请实施例以第一监听窗为例。
还应说明,本申请实施例中第一监听窗以及下文出现的第二监听窗与上述实施例中第一监听窗和第二监听窗并不是指同一个。
终端设备在发送完或者重传完PUSCH后启动或重新启动第一监听窗,例如在PUSCH传输或者重传结束后的第一个符号(例如symbol)上,启动或者重新启动第一监听窗,或者在PUSCH传输或者重传结束后经过某个时间偏移量后启动或重新启动第一监听窗,其中,该时间偏移量可以是预定义的,也可以是网络设备侧配置的。或者在发送完随机接入信号后启动或重新启动该第一监听窗,例如在随机接入信号传输结束后的第一个PDCCH资源(例如PDCCH occasion)上,启动或重新启动第一监听窗,或者在随机接入信号传输结束后经过某个时间偏移量后启动或重新启动该第一监听窗,其中,该时间偏移量可以是预定义的,也可以是网络设备侧配置的。本申请实施例对此并不作限定。
若终端设备监在该第一监听窗内监听到了第二响应并确定随机接入成功,则终端设备停止该第一监听窗,终端设备确定此次随机接入成功。
应理解,由于终端设备在第一监听窗内同时监听第一响应和第二响应,则当终端设备停止第一监听窗时,即停止监听第一响应和第二响应,为了简洁,下文不再详细描述。
若终端设备在第一监听窗内先监听到了第一响应,则终端设备停止监听第一响应,但是不停止第一监听窗,终端设备继续监听第二响应的同时边回退到4步随机接入过程,即终端设备在做2步随机接入的同时并行进行4步随机接入。当2步随机接入过程和4步随机接入过程中任意一种确定随机接入成功,则终端设备停止2步随机接入过程和4步随机接入过程,并确定此次随机接入成功,从而减小随机接入的时延。
例如,当终端设备先在第一监听窗口内监听到第一响应,并且在该第一响应中包括的上行授权的时域位置之前监听到了第二响应并确定随机接入成功,则终端设备停止该第一监听窗,确定此次随机接入成功。
在一些可能的实现方式中,终端设备监听到了第一响应,并且在该第一响应中包括的上行授权的时域位置之前第一监听窗超时,则终端设备停止监听该第二响应,继续4步随机接入过程,执行图4中的S403~S404。若终端设备确定4步随机接入成功,则终止4步随机接入过程;若终端设备确定4步随机接入失败,则终端设备重新发起2步随机接入或4步随机接入。或者在第一监听窗超时时,终端设备重新发起2步随机接入或4步随机接入。
或者,终端设备在第一响应中包括的上行授权的时域位置之后监听到了第二响应,由 于此时终端设备已经在上行授权上发送了消息3并且启动或重新启动了第二监听窗,则终端设备在该第一监听窗内监听第二响应的同时在第二监听窗内监听第三响应,其中,该第三响应可以为4步随机接入过程中的竞争解决信息,即消息4,该第二用于竞争解决的信息可以为4步随机接入过程中的消息3。如果终端设备先监听到了第二响应并确定随机接入成功,表明2步随机接入过程成功,则终端设备停止该第一监听窗和第二监听窗,并终止4步随机接入过程,终端设备确定此次随机接入成功。
同样的,如果终端设备先监听到第三响应消息,表明4步随机接入过程成功,则终端设备停止该第一监听窗和第二监听窗,并终止2步随机接入过程,终端设备确定此次随机接入成功。
当第二监听窗在运行时,第一监听窗超时,则终端设备停止监听该第二响应,继续在第二监听窗内监听第三响应。若终端设备在第二监听窗内监听到该第三响应,则终端设备停止该第二监听窗,确定此次随机接入成功。
或者,该终端设备在第二监听窗超时时仍未监听到该第三响应,则表明2步随机接入过程和4步随机接入过程均失败,则终端设备重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。
在一些可能的实现方式中,当第一监听窗超时时,终端设备直接停止第二监听窗,并重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。
另外,当第一监听窗在运行时,第二监听窗超时,则终端设备停止监听该第三响应,继续在第一监听窗内监听第二响应。若终端设备在第一监听窗内监听到该第二响应,则终端设备停止第一监听窗,确定此次随机接入成功。
或者,该终端设备在第一监听窗超时时仍未监听到该第二响应,则表明2步随机接入过程和4步随机接入过程均失败,则终端设备重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。
在一些可能的实现方式中,当第二监听窗超时时,终端设备直接停止第一监听窗并重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。
上述技术方案中,终端设备在进行随机接入时,为了减小终端设备随机接入的时延,终端设备在接收到第一响应后,继续监听第二响应的同时边回退到4步随机接入过程,使得终端设备在进行2步随机接入过程的同时进行4步随机接入过程,当其中任意一种随机接入过程成功,则终端设备确定此次随机接入成功,从而大大减小了终端设备的随机接入的时延。
在一些可能的实现方式中,当终端设备先在第一监听窗内监听到第一响应,则终端设备直接停止第一监听窗,由2步随机接入过程直接回退到4步随机接入过程,继续4步随机接入的后续过程,执行图4中的S403~S404,简化了终端设备的处理过程,从而降低了终端设备的功耗。
或者,终端设备在第一监听窗内监听到了第一响应,则终端设备停止监听第一响应,并继续在第一监听窗监听第二响应。当终端设备在第一监听窗运行期间监听到了第二响应并确定随机接入成功,则终端设备停止第一监听窗,结束2步随机接入过程,终端设备确定此次随机接入成功。当终端设备在第一监听窗超时时仍未监听到第二响应,则终端设备结束2步随机接入过程,并判断此时终端设备是否可以回退到4步随机接入过程,如果可以 回退到4步随机接入过程,即当前时刻还未到第一响应中包括的上行授权的时域位置,则终端设备由2步随机接入过程回退到4步随机接入过程,继续4步随机接入过程的后续步骤,执行图4中的S403~S404;如果当前时刻超过第一响应中包括的上行授权的时域位置,则终端设备不能由2步随机接入过程回退到4步随机接入过程,则终端设备重新发起随机接入,其中,该终端设备可以发起2步随机接入,也可以发起4步随机接入。由于终端设备在随机接入时先进行2步随机接入过程,当2步随机接入过程失败时,直接回退到4步随机接入过程或者重新发起随机接入,简化了终端设备的处理进程,从而降低了终端设备的功耗。
可选地,如果第一监听窗超时时,终端设备没有监听到第一响应也未监听到第二响应,则终端设备确定此次随机接入失败并重新发起2步随机接入或4步随机接入。
应理解,上述只是为了帮助本领域技术人员更好地理解本申请实施例,而非要限制本申请实施例的范围。本领域技术人员根据所给出的上述示例,显然可以进行各种等价的修改或变化。或者上述任意两种或者任意多种实施例的组合。这样的修改、变化或者组合后的方案也落入本申请实施例的范围内。
还应理解,上文对本申请实施例的描述着重于强调各个实施例之间的不同之处,未提到的相同或相似之处可以互相参考,为了简洁,这里不再赘述。
还应理解,上述过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
还应理解,在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。
上文详细介绍了本申请提供的随机接入方法示例。可以理解的是,通信装置为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例还提供用于实现以上任一种方法的装置。例如,提供一种装置,包括用以实现以上任一种方法中终端设备所执行的各个步骤的单元(或手段)。再如,还提供另一种装置,包括用以实现以上任一种方法中网络设备所执行的各个步骤的单元(或手段)。
图7为本申请实施例提供的一种装置的结构示意图。应理解,图7示出的装置700仅是示例,本申请实施例的装置700还可以包括其他模块或单元,或者包括与图7中的各个单元的功能相似的单元,或者并非要包括图7中所有单元。如图7所示,装置700包括发送单元701、处理单元702。
在一些可能的实现方式中,该装置700可以是终端设备。
发送单元701,用于向网络设备发送随机接入信号和第一用于竞争解决的信息;
处理单元702,用于监听第一响应和第二响应,其中,第一响应为随机接入信号的响应且包括上行授权,第二响应为第一用于竞争解决的信息的响应;
当监听到该第一响应,且在上行授权的时域位置之前监听到该第二响应时,确定随机 接入成功;或者,
当监听到该第一响应,采用该上行授权发送第二用于竞争解决的信息,且在监听到该第二响应或第三响应时,确定随机接入成功,其中该第三响应为第二用于竞争解决的信息的响应。
本申请实施例中,终端设备向网络设备发送随机接入信号和第一用于竞争解决的信息后,通过监听随机接入信号相应的第一响应和第一用于竞争解决的信息相应的第二响应,根据第一响应、第二响应以及第三响应的监听情况确定随机接入是否成功。在确定随机接入是否成功时,2步随机接入过程和4步随机接入过程并行进行,从而减小了终端设备随机接入的时延。
可选地,处理单元702具体用于响应于发送随机接入信号的传输,启动或重新启动第一监听窗,在第一监听窗内监听第一响应;
响应于第一用于竞争解决的信息的传输,启动或重新启动第二监听窗,在第二监听窗内监听第二响应。
可选地,处理单元702还具体用于确定随机接入成功时,停止第二监听窗。
例如,终端设备在第二监听窗内监听到第二响应并确定随机接入成功,则终端设备停止该第二监听窗,终端设备确定随机接入成功。
可选地,处理单元702还用于响应于第二用于竞争解决的信息的传输,启动或重新启动第三监听窗,在第三监听窗内监听第三响应。
可选地,处理单元702还用于当在该第二监听窗内监听到该第二响应时,停止该第二监听窗和该第三监听窗;或者,
当在该第三监听窗内监听到该第三响应时,停止该第二监听窗和该第三监听窗。
上述技术方案中,终端设备在监听到第二响应时,确定2步随机接入成功,则终端设备停止第二监听窗和第三监听窗,并终止4步随机接入过程,确定此次随机接入成功。或者在先监听到第三响应时,确定4步随机接入成功,则终端设备停止第二监听窗和第三监听窗,并终止2步随机接入过程,确定此次随机接入成功。终端设备并行进行2步随机接入过程和4步随机接入过程,当其中任意一个随机接入成功时,则确定此次随机接入成功,大大减小了随机接入时延。
可选地,处理单元702还用于在第三监听窗运行期间,该第二监听窗超时,停止监听该第二响应,继续监听该第三响应;且
当在该第三监听窗内监听到该第三响应时,确定随机接入成功;或,
当在该第三监听窗内未监听到该第三响应时,重新发起随机接入。
其中,该随机接入可以为2步随机接入或4步随机接入,本申请实施例对此并不作限定。
可选地,处理单元702还用于当该第三监听窗运行期间,该第二监听窗超时,停止该第三监听窗,重新发起随机接入,其中,该随机接入可以为2步随机接入或4步随机接入。终端设备在2步随机接入过程失败时,直接终止2步随机接入过程和4步随机接入过程,直接重新发起随机接入,从而降低终端设备的功耗。
可选地,处理单元702还用于当第二监听窗运行期间,该第三监听窗超时,停止监听该第三响应,继续监听该第二响应;且
当在该第二监听窗内监听到该第二响应时,确定随机接入成功;或,
当在该第二监听窗内未监听到该第二响应时,重新发起随机接入。其中,该随机接入可以为2步随机接入或4步随机接入。
终端设备并行进行2步随机接入过程和4步随机接入过程,当4步随机接入过程失败时,继续进行2步随机接入过程,当2步随机接入过程成功时,确定此次随机接入成功;当2步随机接入过程失败时,则确定此次随机接入失败,终端设备直接重新发起随机接入。由于终端设备在进行随机接入时并行进行2步随机接入过程和4步随机接入过程,当任意一种随机接入过程成功时,即可确定此次随机接入过程成功,从而减小了终端设备的随机接入过程的时延。
可选地,处理单元702还用于当第二监听窗运行期间,该第一监听窗超时,继续监听第二响应,且
当在该第二监听窗内监听到该第二响应时,确定随机接入成功;或,
当在该第二监听窗内未监听到该第二响应时,重新发起随机接入。其中,该随机接入可以为2步随机接入或4步随机接入。
可选地,处理单元702还用于当该第一监听窗运行期间,该第二监听窗超时,继续监听该第一响应,且在监听到该第一响应时,采用该上行授权发送第二用于竞争解决的信息,且
在监听到该第三响应时,确定随机接入成功;或者,
未监听到该第三响应时,重新发起随机接入,其中,该随机接入可以为2步随机接入或者4步随机接入。
在一些可能的实现方式中,终端设备可以在一个监听窗内监听第一响应和第二响应。
可选地,处理单元702还用于响应于该随机接入信号的传输和/或该第一用于竞争解决的信息的传输,启动或重新启动第一监听窗,在该第一监听窗内监听第一响应和第二响应。
可选地,处理单元702还用于确定随机接入成功时,停止该第一监听窗。
例如,终端设备在第一监听窗内监听到第二响应并确定随机接入成功时,则终端设备停止该第一监听窗,确定此次随机接入成功。
可选地,处理单元702还用于响应于该第二用于竞争解决的信息的传输,启动或重新启动第二监听窗,在该第二监听窗内监听第三响应。
可选地,处理单元702还用于当在该第一监听窗内监听到第二响应时,停止该第一监听窗和第二监听窗;或者,
当在第二监听窗内监听到第三响应时,停止该第一监听窗和该第二监听窗。
可选地,处理单元702还用于当第二监听窗运行期间,该第一监听窗超时,停止监听该第二响应,继续监听该第三响应;且
当在该第二监听窗内监听到该第三响应时,确定随机接入成功;或,
当在该第二监听窗内未监听到该第三响应时,重新发起随机接入。
可选地,处理单元702还用于当该第二监听窗运行期间,该第一监听窗超时,停止该第二监听窗,重新发起随机接入。
可选地,处理单元702还用于当该第一监听窗运行期间,该第二监听窗超时,停止监 听该第三响应,继续监听该第二响应;且
当在该第一监听窗内监听到该第二响应时,确定随机接入成功;或,
当在该第一监听窗内未监听到该第二响应时,重新发起随机接入。
应理解以上装置中单元的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且装置中的单元可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分单元以软件通过处理元件调用的形式实现,部分单元以硬件的形式实现。例如,各个单元可以为单独设立的处理元件,也可以集成在装置的某一个芯片中实现,此外,也可以以程序的形式存储于存储器中,由装置的某一个处理元件调用并执行该单元的功能。此外这些单元全部或部分可以集成在一起,也可以独立实现。这里所述的处理元件又可以成为处理器,可以是一种具有信号的处理能力的集成电路。在实现过程中,上述方法的各步骤或以上各个单元可以通过处理器元件中的硬件的集成逻辑电路实现或者以软件通过处理元件调用的形式实现。
在一个例子中,以上任一装置中的单元可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个特定集成电路(application specific integrated circuit,ASIC),或,一个或多个微处理器(digital singnal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA),或这些集成电路形式中至少两种的组合。再如,当装置中的单元可以通过处理元件调度程序的形式实现时,该处理元件可以是通用处理器,例如中央处理器(central processing unit,CPU)或其它可以调用程序的处理器。再如,这些单元可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现。
以上用于接收的单元是一种该装置的接口电路,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,该接收单元是该芯片用于从其它芯片或装置接收信号的接口电路。以上用于发送的单元是一种该装置的接口电路,用于向其它装置发送信号。例如,当该装置以芯片的方式实现时,该发送单元是该芯片用于向其它芯片或装置发送信号的接口电路。
图8示出了本申请实施例提供的终端设备的结构示意图,其可以为以上实施例中的终端设备,用于实现以上实施例中终端设备的操作。如图8所示,该终端设备包括:天线1110、射频部分1120、信号处理部分1130。天线1110与射频部分1120连接。在下行方向上,射频部分1120通过天线1110接收网络设备发送的信息,将网络设备发送的信息发送给信号处理部分1130进行处理。在上行方向上,信号处理部分1130对终端设备的信息进行处理,并发送给射频部分1120,射频部分1120对终端设备的信息进行处理后经过天线1110发送给网络设备。
信号处理部分1130可以包括调制解调子系统,用于实现对数据各通信协议层的处理;还可以包括中央处理子系统,用于实现对终端设备操作系统以及应用层的处理;此外,还可以包括其它子系统,例如多媒体子系统,周边子系统等,其中多媒体子系统用于实现对终端设备相机,屏幕显示等的控制,周边子系统用于实现与其它设备的连接。调制解调子系统可以为单独设置的芯片。可选的,以上用于终端设备的装置可以位于该调制解调子系统。
调制解调子系统可以包括一个或多个处理元件1131,例如,包括一个主控CPU和其它集成电路。此外,该调制解调子系统还可以包括存储元件1132和接口电路1133。存储 元件1132用于存储数据和程序,但用于执行以上方法中终端设备所执行的方法的程序可能不存储于该存储元件1132中,而是存储于调制解调子系统之外的存储器中,使用时调制解调子系统加载使用。接口电路1133用于与其它子系统通信。以上用于终端设备的装置可以位于调制解调子系统,该调制解调子系统可以通过芯片实现,该芯片包括至少一个处理元件和接口电路,其中处理元件用于执行以上终端设备执行的任一种方法的各个步骤,接口电路用于与其它装置通信。在一种实现中,终端设备实现以上方法中各个步骤的单元可以通过处理元件调度程序的形式实现,例如用于终端设备的装置包括处理元件和存储元件,处理元件调用存储元件存储的程序,以执行以上方法实施例中终端设备执行的方法。存储元件可以为处理元件处于同一芯片上的存储元件,即片内存储元件。
在另一种实现中,用于执行以上方法中终端设备所执行的方法的程序可以在与处理元件处于不同芯片上的存储元件,即片外存储元件。此时,处理元件从片外存储元件调用或加载程序于片内存储元件上,以调用并执行以上方法实施例中终端设备执行的方法。
在又一种实现中,终端设备实现以上方法中各个步骤的单元可以是被配置成一个或多个处理元件,这些处理元件设置于调制解调子系统上,这里的处理元件可以为集成电路,例如:一个或多个ASIC,或,一个或多个DSP,或,一个或者多个FPGA,或者这些类集成电路的组合。这些集成电路可以集成在一起,构成芯片。
终端设备实现以上方法中各个步骤的单元可以集成在一起,以SOC的形式实现,该SOC芯片,用于实现以上方法。该芯片内可以集成至少一个处理元件和存储元件,由处理元件调用存储元件的存储的程序的形式实现以上终端设备执行的方法;或者,该芯片内可以集成至少一个集成电路,用于实现以上终端设备执行的方法;或者,可以结合以上实现方式,部分单元的功能通过处理元件调用程序的形式实现,部分单元的功能通过集成电路的形式实现。
可见,以上用于终端设备的装置可以包括至少一个处理元件和接口电路,其中至少一个处理元件用于执行以上方法实施例所提供的任一种终端设备执行的方法。处理元件可以以第一种方式:即调用存储元件存储的程序的方式执行终端设备执行的部分或全部步骤;也可以以第二种方式:即通过处理器元件中的硬件的集成逻辑电路结合指令的方式执行终端设备执行的部分或全部步骤;当然,也可以结合第一种方式和第二种方式执行终端设备执行的部分或全部步骤。
这里的处理元件同以上描述,可以是通用处理器,例如CPU,还可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个ASIC,或,一个或多个微处理器DSP,或,一个或者多个FPGA等,或这些集成电路形式中至少两种的组合。
存储元件可以是一个存储器,也可以是多个存储元件的统称。
本申请实施例还提供了一种通信系统,其包括前述的终端设备和网络设备。
本申请提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机指令,当计算机指令在计算机上运行时,使得计算机执行各方法实施例中由终端设备执行的相应操作和/或流程。
本申请还提供了一种包含指令的计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行如图6所示的方法中终端设备执行的各个步骤。
本申请还提供了一种芯片,包括处理器。该处理器用于读取并运行存储器中存储的计 算机程序,以执行本申请提供的随机接入方法中由终端设备执行的相应操作和/或流程。可选地,该芯片还包括存储器,该存储器与该处理器通过电路或电线与存储器连接,处理器用于读取并执行该存储器中的计算机程序。进一步可选地,该芯片还包括通信接口,处理器与该通信接口连接。通信接口用于接收需要处理的数据和/或信息,处理器从该通信接口获取该数据和/或信息,并对该数据和/或信息进行处理。该通信接口可以是输入输出接口。
以上各实施例中,处理器可以为中央处理器(central processing unit,CPU)、微处理器、特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请技术方案程序执行的集成电路等。例如,处理器可以是数字信号处理器设备、微处理器设备、模数转换器、数模转换器等。处理器可以根据这些设备各自的功能而在这些设备之间分配终端设备或网络设备的控制和信号处理的功能。此外,处理器可以具有操作一个或多个软件程序的功能,软件程序可以存储在存储器中。处理器的所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
存储器可以是只读存储器(read-only memory,ROM)、可存储静态信息和指令的其它类型的静态存储设备、随机存取存储器(random access memory,RAM)或可存储信息和指令的其它类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其它磁存储设备,或者还可以是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其它介质等。
可选的,上述实施例中涉及的存储器与存储器可以是物理上相互独立的单元,或者,存储器也可以和处理器集成在一起。
本申请中出现的术语“上行”和“下行”,用于在特定场景描述数据/信息传输的方向,比如,“上行”方向一般是指数据/信息从终端向网络侧传输的方向,或者分布式单元向集中式单元传输的方向,“下行”方向一般是指数据/信息从网络侧向终端传输的方向,或者集中式单元向分布式单元传输的方向,可以理解,“上行”和“下行”仅用于描述数据/信息的传输方向,该数据/信息传输的具体起止的设备都不作限定。
在本申请中可能出现的对各种消息/信息/设备/网元/系统/装置/动作/操作/流程/概念等各类客体进行了赋名,可以理解的是,这些具体的名称并不构成对相关客体的限定,所赋名称可随着场景,语境或者使用习惯等因素而变更,对本申请中技术术语的技术含义的理解,应主要从其在技术方案中所体现/执行的功能和技术效果来确定。
本申请实施例中CU和DU的架构不限于5G NR gNB,还可以应用在LTE基站划分为CU和DU的场景;CU还可以进一步划分为CP和UP两部分。可选的,当为LTE基站时,所述协议层不包含SDAP层。
本申请实施例中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示单独存在A、同时存在A和B、单独存在B的情况。其中A,B可以是单数或者复数。 字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项”及其类似表达,是指的这些项中的任意组合,包括单项或复数项的任意组合。例如,a,b和c中的至少一项可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
本领域普通技术人员可以意识到,本文中公开的实施例中描述的各单元及算法步骤,能够以电子硬件、计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元也可以不是物理上分开的,作为单元显示的部件也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本申请技术方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。本申请的保护范围应以所述权利要求的保护范围为准。

Claims (33)

  1. 一种随机接入方法,其特征在于,包括:
    向网络设备发送随机接入信号和第一用于竞争解决的信息,其中所述随机接入信号用于请求随机接入;
    在监听窗内监听第一响应和第二响应,其中,所述第一响应为所述随机接入信号的响应,所述第二响应为所述第一用于竞争解决的信息的响应,其中所述监听窗既用于监听第一响应又用于监听第二响应;
    确定所述随机接入是否成功。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在发送或者重传物理上行共享信道PUSCH后启动或重新启动所述监听窗。
  3. 根据权利要求2所述的方法,其特征在于,在发送或者重传PUSCH后启动或重新启动所述监听窗,包括:
    在所述PUSCH传输或者重传后的第一个符号上,启动或者重新启动所述监听窗。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述方法还包括:
    从所述网络设备接收所述监听窗的配置信息。
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:
    当在所述监听窗内监听到所述第二响应并确定竞争解决成功时,停止所述监听窗。
  6. 根据权利要求1至5中任一项所述的方法,其特征在于,所述方法还包括:
    当在所述监听窗内监听到所述第一响应,停止所述监听窗,且由两步随机接入过程回退到四步随机接入过程。
  7. 根据权利要求6所述的方法,其特征在于,所述第一响应包括上行授权信息和定时提前命令,所述上行授权信息用于指示所述网络设备分配的上行资源,所述定时提前命令用于指示的定时提前量,以及
    所述由两步随机接入过程回退到四步随机接入过程,包括:
    根据所述第一响应,在所述上行授权信息指示的上行资源上,使用所述定时提前命令指示的定时提前量向网络设备发送所述四步随机接入过程中的消息3;
    从所述网络设备接收所述四步随机接入过程中的消息4,
    其中所述随机接入信号为所述四步随机接入过程中的消息1,所述第一响应为所述四步随机接入过程中的消息2。
  8. 根据权利要求1至7中任一项所述的方法,其特征在于,所述确定所述随机接入是否成功,包括:
    当所述监听窗超时且没有监听到所述第一响应和所述第二响应,确定所述随机接入失败。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    重新发起两步或四步随机接入过程。
  10. 根据权利要求1至7中任一项所述的方法,其特征在于,所述确定所述随机接入是否成功,包括:
    当所述监听窗内监听到指示竞争解决成功的信息时,确定随机接入成功,其中所述指示竞争解决成功的信息携带于所述第二响应;或,所述指示竞争解决成功的信息携带于第三响应中,其中,所述第一响应包括上行授权,所述上行授权用于发送第二用于竞争解决的信息,且所述第三响应为所述第二用于竞争解决的信息的响应。
  11. 根据权利要求1至7中任一项所述的方法,其特征在于,所述确定所述随机接入是否成功,包括:
    当所述监听窗内监听到小区无线网络临时标识C-RNTI加扰的物理下行控制信道PDCCH,确定随机接入成功。
  12. 根据权利要求1至11中任一项所述的方法,其特征在于,所述第一响应包括以下信息中的一个或多个:
    前导码标识RAPID,定时提前命令,上行授权信息,和临时小区无线网络临时标识TC-RNTI;
    所述第二响应包括:
    所述第一用于竞争解决的信息的部分或全部内容,或者C-RNTI加扰的PDCCH,或C-RNTI。
  13. 一种随机接入方法,其特征在于,包括:
    向网络设备发送随机接入信号和第一用于竞争解决的信息;
    监听第一响应和第二响应,其中,所述第一响应为所述随机接入信号的响应且包括上行授权,所述第二响应为所述第一用于竞争解决的信息的响应;
    当监听到所述第一响应,且在所述上行授权的时域位置之前监听到所述第二响应时,确定随机接入成功;或者,
    当监听到所述第一响应,采用所述上行授权发送第二用于竞争解决的信息,且在监听到所述第二响应或第三响应时,确定随机接入成功,其中所述第三响应为所述第二用于竞争解决的信息的响应。
  14. 根据权利要求13所述的方法,其特征在于,所述监听第一响应和第二响应,包括:
    响应于发送所述随机接入信号的传输,启动或重新启动第一监听窗,在所述第一监听窗内监听所述第一响应;
    响应于所述第一用于竞争解决的信息的传输,启动或重新启动第二监听窗,在所述第二监听窗内监听所述第二响应。
  15. 根据权利要求14所述的方法,其特征在于,所述方法还包括:
    确定随机接入成功时,停止所述第二监听窗。
  16. 根据权利要求14或15所述的方法,其特征在于,所述方法还包括:
    响应于所述第二用于竞争解决的信息的传输,启动或重新启动第三监听窗,在所述第三监听窗内监听所述第三响应。
  17. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    当在所述第二监听窗内监听到所述第二响应时,停止所述第二监听窗和所述第三监听窗;或者,
    当在所述第三监听窗内监听到所述第三响应时,停止所述第二监听窗和所述第三监听 窗。
  18. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    当所述第三监听窗运行期间,所述第二监听窗超时,停止监听所述第二响应,继续监听所述第三响应;且
    当在所述第三监听窗内监听到所述第三响应时,确定随机接入成功;或,
    当在所述第三监听窗内未监听到所述第三响应时,重新发起随机接入。
  19. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    当所述第三监听窗运行期间,所述第二监听窗超时,停止所述第三监听窗,重新发起随机接入。
  20. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    当所述第二监听窗运行期间,所述第三监听窗超时,停止监听所述第三响应,继续监听所述第二响应;且
    当在所述第二监听窗内监听到所述第二响应时,确定随机接入成功;或,
    当在所述第二监听窗内未监听到所述第二响应时,重新发起随机接入。
  21. 根据权利要求14至20中任一项所述的方法,其特征在于,所述方法还包括:
    当所述第二监听窗运行期间,所述第一监听窗超时,继续监听所述第二响应,且
    当在所述第二监听窗内监听到所述第二响应时,确定随机接入成功;或,
    当在所述第二监听窗内未监听到所述第二响应时,重新发起随机接入。
  22. 根据权利要求14至20中任一项所述的方法,其特征在于,所述方法还包括:
    当所述第一监听窗运行期间,所述第二监听窗超时,继续监听所述第一响应,且在监听到所述第一响应时,采用所述上行授权发送所述第二用于竞争解决的信息,且
    在监听到所述第三响应时,确定随机接入成功;或者,
    未监听到所述第三响应时,重新发起随机接入。
  23. 根据权利要求13所述的方法,其特征在于,所述方法还包括:
    响应于所述随机接入信号的传输和/或所述第一用于竞争解决的信息的传输,启动或重新启动第一监听窗,在所述第一监听窗内监听所述第一响应和/或所述第二响应。
  24. 根据权利要求23所述的方法,其特征在于,所述方法还包括:
    确定随机接入成功时,停止所述第一监听窗。
  25. 根据权利要求23或24所述的方法,其特征在于,所述方法还包括:
    响应于所述第二用于竞争解决的信息的传输,启动或重新启动第二监听窗,在所述第二监听窗内监听所述第三响应。
  26. 根据权利要求25所述的方法,其特征在于,所述方法还包括:
    当在所述第一监听窗内监听到所述第二响应时,停止所述第一监听窗和所述第二监听窗;或者,
    当在所述第二监听窗内监听到所述第三响应时,停止所述第一监听窗和所述第二监听窗。
  27. 根据权利要求25所述的方法,其特征在于,所述方法还包括:
    当所述第二监听窗运行期间,所述第一监听窗超时,停止监听所述第二响应,继续监听所述第三响应;且
    当在所述第二监听窗内监听到所述第三响应时,确定随机接入成功;或,
    当在所述第二监听窗内未监听到所述第三响应时,重新发起随机接入。
  28. 根据权利要求25所述的方法,其特征在于,所述方法还包括:
    当所述第二监听窗运行期间,所述第一监听窗超时,停止所述第二监听窗,重新发起随机接入。
  29. 根据权利要求25所述的方法,其特征在于,所述方法还包括:
    当所述第一监听窗运行期间,所述第二监听窗超时,停止监听所述第三响应,继续监听所述第二响应;且
    当在所述第一监听窗内监听到所述第二响应时,确定随机接入成功;或,
    当在所述第一监听窗内未监听到所述第二响应时,重新发起随机接入。
  30. 一种装置,其特征在于,包括:用于执行如权利要求1至29中任一项所述的随机接入方法的各步骤的单元。
  31. 一种装置,其特征在于,包括:处理器和接口电路,所述处理器用于通过所述接口电路与其它装置通信,并执行如权利要求1至29中任一项所述的随机接入方法。
  32. 一种装置,其特征在于,包括处理器,用于调用存储器中存储的程序,以执行如权利要求1至29中任一项所述的随机接入方法。
  33. 一种存储介质,其特征在于,存储有计算机执行指令,当所述计算机执行指令被处理器运行时,如权利要求1至29中任一项所述的随机接入方法被执行。
PCT/CN2020/087698 2019-04-30 2020-04-29 随机接入方法和装置 WO2020221279A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
KR1020217038735A KR20220004135A (ko) 2019-04-30 2020-04-29 랜덤 액세스 방법 및 장치
EP20799509.3A EP3955685A4 (en) 2019-04-30 2020-04-29 DIRECT ACCESS METHOD AND APPARATUS
US17/515,045 US20220053558A1 (en) 2019-04-30 2021-10-29 Random access method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910360371.3A CN111867126A (zh) 2019-04-30 2019-04-30 随机接入方法和装置
CN201910360371.3 2019-04-30

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/515,045 Continuation US20220053558A1 (en) 2019-04-30 2021-10-29 Random access method and apparatus

Publications (1)

Publication Number Publication Date
WO2020221279A1 true WO2020221279A1 (zh) 2020-11-05

Family

ID=72965637

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/087698 WO2020221279A1 (zh) 2019-04-30 2020-04-29 随机接入方法和装置

Country Status (5)

Country Link
US (1) US20220053558A1 (zh)
EP (1) EP3955685A4 (zh)
KR (1) KR20220004135A (zh)
CN (2) CN111867126A (zh)
WO (1) WO2020221279A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220183080A1 (en) * 2019-05-02 2022-06-09 Telefonaktiebolaget Lm Ericsson (Publ) Wireless device, network node, and methods performed thereby, for handling a random access procedure

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018127549A1 (en) * 2017-01-06 2018-07-12 Sony Corporation Wireless telecommunications apparatuses and methods
CN108282901A (zh) * 2017-01-06 2018-07-13 电信科学技术研究院 一种随机接入响应方法和装置
WO2018157298A1 (zh) * 2017-02-28 2018-09-07 广东欧珀移动通信有限公司 随机接入的方法、终端设备和网络设备

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101946424B (zh) * 2008-02-25 2013-08-28 Lg电子株式会社 在无线通信系统中执行随机接入流程的方法
JP5962772B2 (ja) * 2012-01-25 2016-08-03 富士通株式会社 無線通信システムにおける伝送方法
CN117042198A (zh) * 2016-10-07 2023-11-10 三星电子株式会社 用于基于增强竞争的随机接入程序的方法和装置
CN108282899B (zh) * 2017-01-05 2020-03-06 电信科学技术研究院 一种两步竞争随机接入方法和装置
US11057935B2 (en) * 2017-03-22 2021-07-06 Comcast Cable Communications, Llc Random access process in new radio
US11064537B2 (en) * 2019-02-01 2021-07-13 Qualcomm Incorporated Random access procedure fallback
US20220132580A1 (en) * 2019-02-14 2022-04-28 Ntt Docomo, Inc. User equipment and control method
WO2020177069A1 (en) * 2019-03-05 2020-09-10 Qualcomm Incorporated Identification of user equipment in a random access procedure
CN113574958B (zh) * 2019-03-29 2024-03-26 富士通株式会社 随机接入响应的接收方法、装置和通信系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018127549A1 (en) * 2017-01-06 2018-07-12 Sony Corporation Wireless telecommunications apparatuses and methods
CN108282901A (zh) * 2017-01-06 2018-07-13 电信科学技术研究院 一种随机接入响应方法和装置
WO2018157298A1 (zh) * 2017-02-28 2018-09-07 广东欧珀移动通信有限公司 随机接入的方法、终端设备和网络设备

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
NOKIA ET AL.: "2-step RACH Procedure Feature lead summary- Update 3", 3GPP TSG RAN WG1 #96BIS R1-1905874, 12 April 2019 (2019-04-12), XP051707918 *
NTT DOCOMO, INC.: "Discussion on Procedure for Two-step RACH", 3GPP TSG RAN WG1 #96BIS R1-1904945, 12 April 2019 (2019-04-12), XP051691880 *
See also references of EP3955685A4

Also Published As

Publication number Publication date
CN118158831A (zh) 2024-06-07
CN111867126A (zh) 2020-10-30
KR20220004135A (ko) 2022-01-11
EP3955685A4 (en) 2022-06-01
EP3955685A1 (en) 2022-02-16
US20220053558A1 (en) 2022-02-17

Similar Documents

Publication Publication Date Title
JP7170730B2 (ja) ビーム失敗回復方法、装置およびデバイス
WO2019242604A1 (zh) 随机接入方法、终端设备及网络侧设备
US11997720B2 (en) Radio terminal, radio access network node, and method therefor
WO2020062164A1 (zh) 网络接入方法、装置及存储介质
TW201507424A (zh) 雙連結中分配無線網路暫時識別的方法
WO2020147130A1 (zh) 随机接入方法、装置及存储介质
CN109314912B (zh) 网络接入方法、装置及存储介质
CN111083798B (zh) 一种基于竞争的随机接入方法和装置
WO2022152003A1 (zh) 非激活态下数据传输方法及装置
US10462827B2 (en) Random access method and apparatus
WO2020221279A1 (zh) 随机接入方法和装置
WO2020164527A1 (zh) 一种随机接入方法和装置
US20230077110A1 (en) Communication Method, Apparatus, and System
JP2023543071A (ja) 端末装置、ネットワーク装置及び通信の方法
US20220264520A1 (en) Communication method and apparatus
CN116210328A (zh) 非活动时的用户装备直接传输
WO2018227510A1 (zh) 接入控制方法及相关产品
WO2022000509A1 (zh) 无线通信方法、终端设备和网络设备
CN113906816B (zh) 通信方法及装置
RU2791244C1 (ru) Способ и устройство произвольного доступа
WO2020192441A1 (zh) 随机接入方法和装置
CN111757537A (zh) 随机接入方法和装置
WO2023169580A1 (zh) 数据传输方法及装置、存储介质、终端设备、网络设备
WO2023004619A1 (zh) 信息传输方法、设备及存储介质
WO2020192482A1 (zh) 随机接入方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20799509

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020799509

Country of ref document: EP

Effective date: 20211110

ENP Entry into the national phase

Ref document number: 20217038735

Country of ref document: KR

Kind code of ref document: A