WO2020221327A1 - 一种随机接入方法及其装置 - Google Patents

一种随机接入方法及其装置 Download PDF

Info

Publication number
WO2020221327A1
WO2020221327A1 PCT/CN2020/087924 CN2020087924W WO2020221327A1 WO 2020221327 A1 WO2020221327 A1 WO 2020221327A1 CN 2020087924 W CN2020087924 W CN 2020087924W WO 2020221327 A1 WO2020221327 A1 WO 2020221327A1
Authority
WO
WIPO (PCT)
Prior art keywords
scrambling code
terminal device
preset
pdcch
scrambling
Prior art date
Application number
PCT/CN2020/087924
Other languages
English (en)
French (fr)
Other versions
WO2020221327A8 (zh
Inventor
行双双
吴艺群
徐修强
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020221327A1 publication Critical patent/WO2020221327A1/zh
Publication of WO2020221327A8 publication Critical patent/WO2020221327A8/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0048Allocation of pilot signals, i.e. of signals known to the receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/121Wireless traffic scheduling for groups of terminals or users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1263Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
    • H04W72/1268Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • This application relates to the field of communication technology, and in particular to a random access method and device.
  • the random access process refers to the process from the user sending the random access preamble (Preamble), starting to try to access the network, and before establishing a basic signaling connection with the network.
  • Preamble random access preamble
  • competition random access Incoming competition random access Incoming
  • non-competitive random access there are three radio resource control (Radio Resource Control, RRC) states supported by the terminal equipment: RRC idle state, RRC inactive state and RRC connected state.
  • RRC Radio Resource Control
  • the terminal device sends Msg1, Msg1 to the network device through the Physical Random Access Channel (PRACH) Including the preamble; after receiving the preamble, the network device generates a random access response (Random Access Response, RAR) for the preamble and sends the RAR (ie Msg2), where the RAR is carried on the first physical downlink shared channel (Physical Downlink shared channel, PDSCH), the first PDSCH is scheduled by the first physical downlink control channel (Physical Downlink Control Channel, PDCCH), the RAR carries the Temporary Cell Radio Network Temporary Identifier (TC-RNTI), and the first PDCCH uses random Random Access Radio Network Temporary Identifier (RA-RNTI) is scrambled; after the terminal device sends the Preamble, if it listens to the first PDCCH scrambled by RA-RNTI,
  • RAR Random Access Response
  • the response to the PUSCH is carried on the second PDSCH.
  • the second PDSCH is scheduled by the second PDCCH.
  • the second PDCCH is scrambled with TC-RNTI.
  • the response may include the contention resolution identity (CRID) of the terminal, and the terminal device can determine whether the contention access is successful according to the CRID; after the terminal device sends the PUSCH, if it monitors the second PDCCH scrambled with TC-RNTI, then The second PDSCH is received according to the monitored second PDCCH, and the second PDSCH is demodulated, thereby obtaining the CRID carried on the second PDSCH, and determining whether the contention access is successful according to the CRID.
  • CRID contention resolution identity
  • the terminal device cannot obtain the TC-RNTI configured by the network device for it.
  • the terminal device can send Preamble and PUSCH at the same time.
  • the network device can generate a response to the Preamble (RAR) and a response to the PUSCH, and combine the RAR and the PUSCH The response of is carried on the PDSCH and sent, and the PDCCH used to schedule the PDSCH is sent, where the PDCCH can be scrambled using TC-RNTI.
  • the embodiments of the present application provide a random access method and device, which are beneficial for terminal equipment to successfully obtain the PDSCH scheduled by the PDCCH.
  • an embodiment of the present application provides a random access method, the method includes: a terminal device sends a random access message to a network device, the random access message includes a random access preamble and a physical uplink shared channel PUSCH; the terminal The device monitors the first physical downlink control channel PDCCH according to the scrambling code in the preset scrambling code set.
  • the first PDCCH is used to schedule the first physical downlink shared channel PDSCH carrying the first response message for the PUSCH; the terminal device monitors the first physical downlink shared channel PDSCH according to the monitored The first PDCCH receives the first PDSCH.
  • the preset scrambling code set may be agreed in advance by the network device and the terminal device. If the network device generates the first response information for the PUSCH, it is used to schedule the first PDSCH carrying the first response message
  • the first PDCCH is scrambled by using the scrambling code in the preset scrambling code set, and the terminal device monitors the first PDCCH according to the scrambling code in the preset scrambling code set, so that the terminal device can successfully monitor the first PDCCH sent by the network device Therefore, it is beneficial for the terminal device to successfully obtain the first PDSCH scheduled by the first PDCCH.
  • the PUSCH may carry the identification of the terminal device.
  • the terminal device monitors the first PDCCH according to the scrambling code in the preset scrambling code set.
  • the specific implementation manner may be: the terminal device according to the random access preamble, the terminal device The first scrambling code is obtained from at least one of the identification of the device and the time-frequency resources used to send the PUSCH and the preset operation relationship, and the first PDCCH is monitored according to the first scrambling code, where the preset operation relationship is such that the first The scrambling code is located in a preset scrambling code set.
  • the terminal device can obtain a unique and determined first scrambling code according to at least one of the random access preamble, the identification of the terminal device, and the PUSCH time-frequency resource and the preset operation relationship. Since the scrambling codes in the preset scrambling code set are tried one by one to determine whether the first PDCCH scrambled with the scrambling codes in the preset scrambling code set is monitored, this technical solution can effectively improve terminal equipment monitoring The efficiency of the first PDCCH is thus beneficial to improve the efficiency of random access.
  • the terminal device specifically obtains the first scrambling code according to the identifier of the terminal device, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the preset operation relationship may be:
  • X is the first scrambling code
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set.
  • the preset operation relationship may be:
  • index is the index of the scrambling code in the preset scrambling code set
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x index is the scrambling code with index index
  • ⁇ x 0 is a scrambling code with index
  • x N-1 is a scrambling code with index N-1
  • X is a first scrambling code.
  • the terminal device specifically obtains the first scrambling code according to the random access preamble, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the preset operation relationship may be:
  • Preamble index is the index of the random access preamble
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set.
  • the preset operation relationship may be:
  • index is the index of the scrambling code in the preset scrambling code set
  • N is the number of scrambling codes in the preset scrambling code set
  • X is the first scrambling code
  • x index is the scrambling code with index index
  • ⁇ x 0 ,..., x N-1 ⁇ are a preset scrambling code set
  • x 0 is a scrambling code with index
  • x N-1 is a scrambling code with index N-1.
  • the terminal device obtains the first value according to the location information of the time-frequency resource used to send the PUSCH, and according to the first value, the number of scrambling codes in the preset scrambling code set, and the preset The first scrambling code is obtained by the operation relationship of
  • the calculation relationship for the terminal device to obtain the first value according to the location information of the PUSCH time-frequency resource is as follows:
  • PO value is the first value
  • s_id represents the first OFDM symbol of the time domain resource of the PUSCH
  • t_id represents the index of the first time slot of the time domain resource of the PUSCH in the system frame
  • f_id represents all The frequency domain resource index of the PUSCH in the frequency domain
  • ul_carrier_id represents the uplink carrier for transmitting the PUSCH in the random access message in the random access process
  • a can be the number of OFDM symbols contained in a time slot
  • b can be a system frame
  • the number of time slots included, c may be the maximum number of frequency domain resources that can be allocated to the PUSCH (or random access channel).
  • the terminal device obtains the first scrambling code according to the first value, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship, and the scrambling codes in the preset scrambling code set are continuous
  • the preset scrambling code set is ⁇ x min ,..., x max ⁇
  • the preset operation relationship can be:
  • X is the first scrambling code
  • PO value is the first value
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set.
  • the preset operation when the scrambling codes in the preset scrambling code set are non-continuous scrambling codes, and the preset scrambling code set is ⁇ x 0 ,..., x N-1 ⁇ , the preset operation
  • the relationship can be:
  • index is the index of the scrambling code in the preset scrambling code set
  • PO value is the first value
  • N is the number of scrambling codes in the preset scrambling code set
  • X is the first scrambling code
  • x index is the index The scrambling code of index, ⁇ x 0 ,..., x N-1 ⁇ is the preset scrambling code set
  • x 0 is the scrambling code with index
  • x N-1 is the scrambling code with index N-1.
  • the method may further include: the terminal device determines the random access wireless network temporary identifier RA-RNTI corresponding to the time-frequency resource used to send the random access preamble; if the RA-RNTI and the first interference The code is the same, the terminal device adjusts the first scrambling code according to the preset offset value to obtain the adjusted first scrambling code; the specific implementation manner of the terminal device monitoring the first PDCCH according to the first scrambling code can be: terminal device use The adjusted first scrambling code monitors the first PDCCH.
  • the terminal device when the RA-RNTI and the first scrambling code are the same, the terminal device adjusts the first scrambling code by using a preset offset value, and uses the adjusted first scrambling code to monitor the first PDCCH. Prevent network equipment from using the first scrambling code to scramble the first PDCCH (the first PDCCH is used to schedule the first PDSCH, and the first PDSCH is used to carry the response message for the PUSCH), and the RA-RNTI is used to schedule the bearer When scrambling the PDCCH of the PDSCH of the response message of the Preamble, the terminal device cannot distinguish whether the received response information is the response message for the PUSCH (ie, the first response message) or the response message for the Preamble according to the scrambling sequence.
  • the first response message may carry the temporary cell radio network temporary identifier TC-RNTI
  • the method may further include: the terminal device sets the TC-RNTI as the cell radio network temporary identifier C-RNTI.
  • the first response message may carry the cell radio network temporary identification C-RNTI.
  • the method may further include: if the terminal device monitors the second PDCCH scrambled with RA-RNTI, the second PDCCH is used to schedule a second response message carrying the second response message for the random access preamble.
  • PDSCH the second response message carries uplink scheduling information
  • the terminal device uses the second scrambling code to monitor the third PDCCH
  • the third PDCCH is used to schedule the third PDSCH
  • the third PDSCH is used to carry A response message for the uplink transmission scheduled by the uplink scheduling information
  • the terminal device uses the first scrambling code to monitor the third PDCCH.
  • the embodiments of the present application provide another random access method.
  • the method includes: a network device receives a random access message, the random access message includes a random access preamble and a physical uplink shared channel PUSCH; if the decoding is successful PUSCH, the network device generates the first response message for the PUSCH; the network device sends the first PDCCH used to schedule the first PDSCH, where the first PDCCH is scrambled using the scrambling code in the preset scrambling code set, and the first PDSCH is used It carries the first response message for PUSCH.
  • the preset scrambling code set may be pre-appointed by the network device and the terminal device.
  • the terminal device will monitor the first PDCCH sent by the network device according to the scrambling code in the preset scrambling code set, and the network device will send and use
  • the first PDCCH scrambled by the scrambling code in the preset scrambling code set enables the terminal device to successfully monitor the first PDCCH sent by the network device, thereby facilitating the terminal device to successfully obtain the first PDSCH scheduled by the first PDCCH.
  • the PUSCH may carry the identification of the terminal device
  • the method may further include: the network device according to at least one of the random access preamble, the identification of the terminal device, and the time-frequency resource of the PUSCH and preset
  • the first scrambling code is obtained by the operation relationship, and the first PDCCH is scrambled according to the first scrambling code, where the preset operation relationship can make the first scrambling code be in the preset scrambling code set.
  • the network device can obtain a unique and determined first scrambling code according to at least one of the random access preamble, the identification of the terminal device, and the PUSCH time-frequency resource and the preset operation relationship.
  • a scrambling code is used to scramble the first PDCCH. If the terminal device uses the same scrambling code calculated in the same way and uses the scrambling code to monitor the first PDCCH sent by the network device, the first PDCCH sent by the network device can be effectively increased. The probability that a PDCCH is successfully detected by the terminal device.
  • the network device obtains the first scrambling code according to the identifier of the terminal device, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the preset operation relationship may be:
  • X is the first scrambling code
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set.
  • the preset operation relationship may be:
  • index is the index of the scrambling code in the preset scrambling code set
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x index is the scrambling code with index index
  • ⁇ x 0 is a scrambling code with index
  • x N-1 is a scrambling code with index N-1
  • X is a first scrambling code.
  • the network device obtains the first scrambling code according to the random access preamble, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the preset operation relationship may be:
  • Preamble index is the random access preamble index
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set.
  • the preset operation relationship may be:
  • index is the index of the scrambling code in the preset scrambling code set
  • N is the number of scrambling codes in the preset scrambling code set
  • X is the first scrambling code
  • x index is the scrambling code with index index
  • ⁇ x 0 ,..., x N-1 ⁇ are a preset scrambling code set
  • x 0 is a scrambling code with index
  • x N-1 is a scrambling code with index N-1.
  • the network device obtains the first value according to the location information of the time-frequency resource of the PUSCH, and obtains the first value according to the first value, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • One scrambling code One scrambling code.
  • the calculation relationship for the network device to obtain the first value according to the location information of the PUSCH time-frequency resource is as follows:
  • PO value is the first value
  • s_id represents the first OFDM symbol of the time domain resource of the PUSCH
  • t_id represents the index of the first time slot of the time domain resource of the PUSCH in the system frame
  • f_id represents all The frequency domain resource index of the PUSCH in the frequency domain
  • ul_carrier_id represents the uplink carrier for transmitting the PUSCH in the random access message in the random access process
  • a can be the number of OFDM symbols contained in a time slot
  • b can be a system frame
  • the number of time slots included, c may be the maximum number of frequency domain resources that can be allocated to the PUSCH (or random access channel).
  • the network device obtains the first scrambling code according to the first value, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship, and the scrambling codes in the preset scrambling code set are continuous
  • the preset scrambling code set is ⁇ x min ,..., x max ⁇
  • the preset operation relationship can be:
  • X is the first scrambling code
  • PO value is the first value
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set.
  • the preset operation when the scrambling codes in the preset scrambling code set are non-continuous scrambling codes, and the preset scrambling code set is ⁇ x 0 ,..., x N-1 ⁇ , the preset operation
  • the relationship can be:
  • index is the index of the scrambling code in the preset scrambling code set
  • PO value is the first value
  • N is the number of scrambling codes in the preset scrambling code set
  • X is the first scrambling code
  • x index is the index The scrambling code of index, ⁇ x 0 ,..., x N-1 ⁇ is the preset scrambling code set
  • x 0 is the scrambling code with index
  • x N-1 is the scrambling code with index N-1.
  • the network device determines the random access wireless network temporary identifier RA-RNTI corresponding to the time-frequency resource used to send the random access preamble; if the RA-RNTI and the first scrambling code are the same, the network device determines The preset offset value adjusts the first scrambling code to obtain the adjusted first scrambling code; the specific implementation manner for the network device to scramble the first PDCCH according to the first scrambling code may be: the network device according to the adjusted The first scrambling code scrambles the first PDCCH.
  • the network device adjusts the first scrambling code through a preset offset value, and adds to the first PDCCH according to the adjusted first scrambling code. Scrambling, so that the terminal device can distinguish according to the scrambling code sequence that the first PDSCH scheduled with the first PDCCH scrambled by the adjusted first scrambling code carries the first response message for the PUSCH, and the PDCCH scheduling with RA-RNTI scrambling is used
  • the PDSCH bears the response message for Preamble.
  • the first response message may carry the temporary cell radio network temporary identifier TC-RNTI
  • the method may further include: the network device sets the TC-RNTI as the cell radio network temporary identifier C-RNTI corresponding to the terminal device.
  • the first response message may carry the cell radio network temporary identification C-RNTI.
  • the method may further include: if the random access preamble is successfully detected, the network device generates a second response message for the random access preamble, and sends a second response message for scheduling the second response message.
  • the second PDCCH of the second PDSCH the second PDCCH is scrambled with RA-RNTI, and the second response message carries uplink scheduling information; if the second response message carries the second scrambling code, the network device sends the third PDCCH for scheduling the third PDSCH ,
  • the third PDCCH is scrambled with the second scrambling code, and the third PDSCH is used to carry the response message for the uplink transmission scheduled by the uplink scheduling information; and/or, if the second response message does not carry any scrambling code, the network device sends To schedule the third PDCCH of the third PDSCH, the third PDCCH is scrambled using the first scrambling code.
  • an embodiment of the present application provides a communication device, which has the function of implementing the random access method described in the first aspect.
  • the function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • an embodiment of the present application provides another communication device, which has the function of implementing the random access method described in the second aspect.
  • the function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • an embodiment of the present application provides a computer-readable storage medium for storing computer program instructions used by the communication device described in the third aspect, which includes instructions for executing the program involved in the first aspect.
  • an embodiment of the present application provides a computer-readable storage medium for storing computer program instructions used by the communication device according to the fourth aspect, which includes the program for executing the program involved in the second aspect.
  • an embodiment of the present application provides a terminal device.
  • the terminal device includes a memory and a processor.
  • the memory stores program instructions, and the processor calls the program instructions stored in the memory to enable the terminal device to implement the method described in the first aspect. The random access method described.
  • an embodiment of the present application provides a network device, the network device includes a memory and a processor, the memory stores program instructions, and the processor calls the program instructions stored in the memory to make the network device implement the network device described in the second aspect. The random access method described.
  • embodiments of the present application provide a computer program product, which includes a program, which when executed by a communication device, causes the communication device to implement the method described in the first aspect.
  • an embodiment of the present application provides a computer program product, which includes a program, and when the program is executed by a communication device, the communication device realizes the method described in the second aspect.
  • Figure 1a is a schematic flow chart of a four-step random access disclosed in an embodiment of the present application.
  • Fig. 1b is a schematic diagram of a two-step random access process disclosed in an embodiment of the present application.
  • FIG. 1c is a schematic diagram of the architecture of a communication system disclosed in an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a random access method disclosed in an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of another random access method disclosed in an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of another random access method disclosed in an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another random access method disclosed in an embodiment of the present application.
  • Fig. 6 is a schematic structural diagram of a communication device disclosed in an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a terminal device disclosed in an embodiment of the present application.
  • Fig. 8 is a schematic structural diagram of another communication device disclosed in an embodiment of the present application.
  • Fig. 9 is a schematic structural diagram of a network device disclosed in an embodiment of the present application.
  • Scrambling is a processing method of digital signals. It uses scrambling code to XOR with the original signal to obtain a new signal. Usually the role of uplink physical channel scrambling is to distinguish different terminal devices, and downlink scrambling can distinguish between cells and channels. Among them, the scrambling code can be used to scramble and descramble the original signal.
  • the scrambling code may scramble the downlink control information (DCI), or may also be referred to as scrambling the PDCCH.
  • the scrambling of the DCI specifically refers to scrambling the cyclic redundancy check (cyclic redundancy check, CRC) field of the DCI.
  • the terminal device descrambling the received DCI specifically refers to that the terminal device descrambles the CRC field of the DCI with a corresponding type of scrambling code to determine the format or type of the DCI.
  • the scrambling code may include, but is not limited to: cell radio network temporary identifier (C-RNTI), temporary cell radio network temporary identifier (TC-RNTI), and random access wireless network temporary identifier (TC-RNTI). Identification (random access radio network temporary identifier, RA-RNTI).
  • C-RNTI cell radio network temporary identifier
  • TC-RNTI temporary cell radio network temporary identifier
  • TC-RNTI random access wireless network temporary identifier
  • Identification random access radio network temporary identifier, RA-RNTI
  • the terminal device If the terminal device is in the radio resource control connected (RRC-connected) state, it indicates that the terminal device has been assigned to the C-RNTI, and the terminal device needs to carry the C-RNTI when initiating a random access request to the network device. If the terminal device is in the RRC idle state or the RRC inactive state, it means that the terminal device has not been allocated to the C-RNTI. If the terminal device requests an RRC connection, the network device may allocate a temporary C-RNTI to the terminal device in the subsequent response message (such as Msg2 in the four-step random access process), which is recorded as TC-RNTI, and the terminal device confirms that the contention is resolved After success, TC-RNTI can be converted to C-RNTI.
  • RRC-connected radio resource control connected
  • the network device can allocate a TC-RNTI to the terminal device in the response message (such as Msg2 in the four-step random access process), which is used in the subsequent data transmission process (such as the four-step random access process).
  • Msg3 and Msg4 carry the TC-RNTI to identify the terminal device. After the terminal equipment has successfully accessed randomly, TC-RNTI can be converted into C-RNTI.
  • the generation of the RA-RNTI is related to the time-frequency resources used by the terminal equipment to send the preamble. For example, when terminal device A and terminal device B use the same random access channel time-frequency resource to initiate random access, the corresponding RA-RNTI is the same. Take the four-step random access process as an example.
  • the network device detects the random access time-frequency resource that sends the preamble, it can calculate the RA-RNTI.
  • the network device processes the PDCCH based on a DCI format and uses it in the process.
  • RA-RNTI scrambles DCI.
  • the network device sends response information for the preamble to the terminal device.
  • the terminal device knows the time-frequency resource information of the preamble, so it can also calculate the RA-RNTI, and the terminal device can detect whether there is a corresponding RA on the received PDCCH -RNTI; if yes, it means that the random access request is responded by the network device, and the terminal device continues to demodulate the PDSCH indicated by the DCI carried by the PDCCH. If the demodulated preamble is the same as the preamble sent by the terminal device, then the terminal The device can initiate subsequent processes, such as conflict contention resolution processes.
  • RA-RNTI 1+s_id+14*t_id+14*80*f_id+14*80*8*ul_carrier_id, where s_id represents the random access used
  • the first orthogonal frequency division multiplexing (OFDM) symbol of the channel time domain resource (the protocol specifies that a slot contains 14 OFDM symbols), t_id represents the first time domain resource of the random access channel Timeslots are indexed in the system frame (the protocol specifies that the maximum subcarrier interval of the system frame is 120KHz, that is, the system frame contains 80 timeslots); f_id represents the frequency domain index of the frequency domain resource of the random access channel ( The protocol stipulates that the maximum number of frequency domain resources allocated to the random access channel is 8); ul_carrier_id represents the uplink carrier that transmits random access messages during the random access process, where the value of ul_carrier_id can be 0 or 1, 0 means Normal uplink
  • OFDM orthogonal frequency division multiplexing
  • the physical channel is used by the physical layer for the transmission of specific signals.
  • the physical channels include: (a) physical layer downlink shared channel (PDSCH), used to carry downlink service data, etc.; (b) physical layer downlink control channel (physical downlink control channel, PDCCH), used to carry downlink Scheduling information, such as channel allocation and downlink control information (DCI), that is, DCI is carried by PDCCH; (c) Physical uplink shared channel (PUSCH), used to carry uplink control information and/or Service data; (d) Physical uplink control channel (PUCCH), used to carry uplink control information, such as Acknowledgement (ACK)/Negative Acknowledgement (NACK), etc.
  • PDSCH physical layer downlink shared channel
  • PDCCH physical downlink control channel
  • PUSCH Physical uplink shared channel
  • PUSCH Physical uplink control information and/or Service data
  • PUCCH Physical uplink control channel
  • PUCCH Physical uplink control channel
  • Physical layer random access channel Physical random access channel, PRACH
  • the terminal device sends the preamble during random access, and the network device receives the preamble through PRACH to determine the identity of the access terminal device.
  • Preamble namely random access preamble.
  • the network device used to identify the identity of the terminal device during random access, or used to distinguish the device that initiates random access by the network device can also be used for other purposes, which is not limited in this embodiment of the application.
  • LTE Long Term Evolution
  • Rel-15 NR New Radio
  • each cell has 64 preambles.
  • the terminal device may carry the preamble when sending the random access request to the network device.
  • the network device sends the response information to the terminal device, in order to reduce the size of the response information, it may send the index of the preamble.
  • the preamble is used as an example for description.
  • FIG. 1c is a schematic structural diagram of a communication system disclosed in an embodiment of the present application.
  • the communication system includes: a base station 101 and a terminal device 102.
  • a terminal device such as the terminal device 102 shown in FIG. 1c
  • a network device such as the base station 101 shown in FIG. 1c
  • the terminal device is usually required to initiate a random request to the network device. Access process.
  • the terminal device may initiate a random access procedure in the following scenarios.
  • Scenario 1 The initial radio resource control (RRC) connection of the terminal device is established.
  • RRC radio resource control
  • Scenario 2 The RRC connection of the terminal device is reestablished.
  • the terminal device initiates a random access procedure.
  • Scenario 3 When a terminal device performs a cell handover, the terminal device will initiate a random access procedure in the new cell.
  • Scenario 4 Downlink data arrives and the terminal device is in the connected state, the network device has downlink data that needs to be transmitted to the terminal device, and the terminal device is found to be in an uplink asynchronous state, the network device will trigger the terminal device to initiate a random access process.
  • Scenario 5 The uplink data arrives and the terminal device is in the connected state.
  • the terminal device has uplink data that needs to be transmitted to the network device. It is found that the terminal device is in an unsynchronized uplink state or there is no available uplink resource for uplink data transmission.
  • the terminal device initiates a random Access process.
  • the terminal device may initiate random access, but may also initiate random access in other scenarios, which is not limited in this embodiment of the application.
  • the base station 101 can allocate time-frequency resources to the terminal device 102, and each time-frequency resource unit in the time-frequency resources that can be allocated by the base station 101 can only be allocated to one terminal device, resulting in the terminal device 102 and other terminal devices (Not shown in the figure) Need to compete for time-frequency resources.
  • the terminal device 102 may send a random access message to the base station 101 to initiate a random access procedure to the base station 101, and the random access message may include Preamble and PUSCH.
  • the Preamble can be used to inform the base station 101 that the terminal device 102 needs to establish a connection with it or to obtain uplink synchronization, or for other purposes; the PUSCH can carry information used for contention resolution, for example, the identification of the terminal device.
  • the preamble can be sent through the physical random access channel PRACH, and the uplink data can be sent through the physical uplink shared channel PUSCH.
  • the PUSCH or uplink data mentioned in the embodiments of this application refer to the uplink data carried on the PUSCH
  • the Preamble or PRACH mentioned in the embodiments of this application refer to the data carried on the PRACH. Preamble.
  • the base station 101 After receiving the PUSCH, the base station 101 can demodulate and decode the received PUSCH. If the base station 101 successfully demodulates the received PUSCH, it can generate a response message for the PUSCH and carry the response message in the PDCCH scheduling The PDSCH is sent.
  • the base station 101 may pre-appoint a scrambling code set with the terminal device 102, and the base station 101 may scramble the PDCCH used for scheduling PDSCH according to the scrambling code in the scrambling code set.
  • the terminal device 102 can use the scrambling code in the scrambling code set to monitor the PDCCH.
  • the terminal device 102 may demodulate the PDSCH scheduled by the PDCCH, and then obtain the response message carried on the PDSCH.
  • the terminal device may also determine whether the random access is successful according to the response message.
  • terminal equipment is an entity on the user side for receiving or transmitting signals.
  • the terminal equipment may be User Equipment (UE), remote terminal, mobile terminal, wireless communication equipment, user equipment, etc.
  • the user equipment can be a mobile phone, a desktop computer, a notebook computer or a wearable device, etc.
  • the base station in Figure 1c only receives the random access message sent by one terminal device for example only, and does not constitute a limitation to the embodiment of this application. In other feasible implementation manners, the base station may also receive other Random access message sent by terminal equipment.
  • FIG. 2 is a schematic flowchart of a random access method provided by an embodiment of the present application. The method may include but is not limited to the following steps:
  • Step S201 The terminal device sends a random access message to the network device, where the random access message includes Preamble and PUSCH.
  • a terminal device when it needs to establish a connection with a network device or obtain uplink synchronization, it can send a random access message to the network device.
  • the random access message can be used for competitive access, and the random access message can include Preamble and PUSCH.
  • the network device pre-configures the time-frequency resource for sending the random access message for the terminal device, including the PRACH time-frequency resource used to send the Preamble in the random access message and the time-frequency resource used to send the random access message.
  • PUSCH time-frequency resources in the message.
  • the terminal device can send the Preamble in the random access message to the network device through the PRACH time-frequency resource pre-configured by the network device, and send the random access message to the network device through the PUSCH time-frequency resource pre-configured by the network device.
  • Uplink data (PUSCH) PUSCH
  • Step S202 If the network device decodes the PUSCH successfully, generate a first response message for the PUSCH.
  • the network device can manage (configure) time-frequency resources used to send random access messages, and the time-frequency resources that the network device can manage may include PRACH time-frequency resources and PUSCH time-frequency resources.
  • the network device may broadcast system information to notify each terminal device of which time-frequency resources are allowed to transmit PRACH.
  • the network device may also broadcast system information to notify each terminal device on which time-frequency resources are allowed to transmit the PUSCH. For example, when a network device is used to manage the time-frequency resources used by terminal device 1 and terminal device 2, the network device can notify terminal device 1 of its configured time-frequency resource 1 for PUSCH transmission, and notify terminal device 2 of it. Configure the time-frequency resource 2 for PUSCH transmission.
  • the time-frequency resource 1 and the time-frequency resource 2 may be the same or different.
  • the network device after the network device notifies each terminal device on which time-frequency resources the PRACH and PUSCH can be transmitted, it can receive the PRACH (Preamble) and PUSCH (preamble) of the random access message on the configured PRACH time-frequency resource and PUSCH time-frequency resource, respectively. Upstream data).
  • the terminal device can send the Preamble on the PRACH time-frequency resource, and the network device can receive the Preamble on the PRACH time-frequency resource.
  • the terminal device can send uplink data on the PUSCH time-frequency resource, and the network device can receive the uplink data on the PUSCH time-frequency resource.
  • the network device If the network device successfully detects the preamble and decodes the received PUSCH successfully, the network device generates a first response message for the PUSCH, carries the first response message on the first PDSCH, and then sends the first PDSCH to the terminal equipment.
  • the first PDSCH may also carry response information for the Preamble.
  • the first PDSCH may not carry response information for the Preamble, and the response information for the Preamble may be carried in another PDSCH.
  • the network device can generate a second response message to the Preamble and carry the second response message on the second PDSCH, and then The second PDSCH is sent to the terminal device.
  • the second response message may refer to a random access response (RAR) in the four-step random access process, or, in addition to the information in the RAR, the second response message may also include other information.
  • the RAR may include one or more of a preamble index, a timing advance command (Timing Advance command, TA command), uplink scheduling information (Uplink grant, UL grant), and a temporary cell radio network temporary identification TC-RNTI.
  • the preamble index is the index of the preamble in the random access message
  • the TA command is used by the terminal device to determine the time size of the timing advance
  • the UL grant can be used to configure a part of the time-frequency resource for the terminal device to use, and the terminal device can use this part of the time.
  • the frequency resource sends uplink data to the network device.
  • the network device may be an entity used to transmit or receive signals.
  • the network device may be an access network device (such as a base station in FIG. 1c).
  • Step S203 The network device sends a first PDCCH for scheduling a first PDSCH, and the first PDSCH is used to carry a first response message.
  • the first PDCCH is scrambled by using a scrambling code in a preset scrambling code set.
  • the specific implementation manner of the network device using the scrambling code in the preset scrambling code set to scramble the first PDCCH may be: the network device randomly selects a scrambling code pair from the preset scrambling code set The first PDCCH is scrambled.
  • the network device selects a largest (or smallest) scrambling code from a preset scrambling code set according to the numerical value of the scrambling code to perform a scrambling index on the first PDCCH.
  • Step S204 The terminal device monitors the first PDCCH according to the scrambling code in the preset scrambling code set.
  • the terminal device after the terminal device sends the random access message to the network device, it can monitor the first PDCCH according to the scrambling code in the preset scrambling code set, so that when the first PDCCH is monitored, the terminal device can monitor the first PDCCH according to the monitored first PDCCH. Receive the first PDSCH from the network device.
  • the scrambling codes in the preset scrambling code set may be continuous scrambling codes or non-continuous scrambling codes.
  • the preset scrambling code set can be consecutive values in the range of values of the Radio Network Temporary Identifier (RNTI) sequence.
  • RNTI Radio Network Temporary Identifier
  • the range and length of the value are not limited, and the starting and ending positions are not limited.
  • the value range of the RNTI sequence is from 0001 to FFEF
  • the value range of the preset scrambling code set can be any continuous value from 0001 to FFEF.
  • the value range of the preset scrambling code set can be It is FF00-FFEF or 0001-FEFF.
  • the preset scrambling code set may be a non-contiguous value set in the value range of the RNTI sequence, and the length of the value set is not limited.
  • the start position and end position are not limited.
  • the preset scrambling code set can be one or more values from 0001 to FFEF.
  • the preset scrambling code set can be ⁇ 0001, 0003, 0005 ⁇ , ⁇ 0001, 000F ⁇ or ⁇ 0001, 00EF, 0EEF, F000 ⁇ , etc.
  • the first PDCCH carries downlink control information (DCI), and the DCI may indicate the time-frequency resource used to transmit the first PDSCH.
  • DCI downlink control information
  • the terminal device can only use scrambling code 1 to correctly descramble the first PDCCH.
  • the preset scrambling code set can be a scrambling code set agreed upon in advance by the terminal device and the network device. Any scrambling code in the preset scrambling code set can be used to scramble the first PDCCH.
  • the terminal device detects The first PDCCH scrambled by any scrambling code in the preset scrambling code set indicates that the monitored data transmitted on the time-frequency resource indicated by the DCI carried on the first PDCCH includes the data transmitted on the PUSCH in the random access message.
  • the first response message is transmitted on the time-frequency resource indicated by the DCI.
  • the terminal device can demodulate the first PDSCH indicated by the DCI.
  • the network device can notify all terminal devices of the preset scrambling code set by broadcasting system information.
  • the specific implementation manner of the terminal device monitoring the first PDCCH according to the scrambling code in the preset scrambling code set may be: the terminal device tries to detect the DCI format 1_0, and the CRC of the DCI uses the preset scrambling code set
  • the scrambling code (such as TC-RNTI) is used for scrambling, and the DCI is used to schedule a PDSCH (such as the first PDSCH).
  • the PDSCH carries (or carries) a CRID.
  • the terminal device selects a scrambling code from the preset scrambling code set to try whether the first PDSCH can be descrambled correctly; if the first PDSCH cannot be descrambled correctly, try another scrambling code in the preset scrambling code set. Whether the code can be descrambled correctly, until a scrambling code is found in the preset scrambling code set to correctly descramble the first PDCCH, or until it is determined that all the scrambling codes in the preset scrambling code set cannot be correctly descrambled. Up to one PDCCH. If all the scrambling codes in the preset scrambling code set cannot descramble the first PDCCH correctly, it means that the data carried on the first PDSCH scheduled by the first PDCCH is not data sent to the terminal device.
  • the terminal device since the terminal device monitors the first PDCCH according to the scrambling code in the preset scrambling code set, it needs to try one or more scrambling codes before it is possible to monitor the first PDCCH, which will cause the terminal to monitor the first PDCCH.
  • the efficiency of the device to monitor the first PDCCH is low, which leads to a long random access process and low random access efficiency.
  • the number of scrambling codes included in the preset scrambling code set can be reduced to improve the efficiency of the terminal device to monitor the first PDCCH.
  • the scrambling code in the preset scrambling code set may be TC-RNTI or RA-RNTI. It should be noted that the embodiment of the application does not limit the name of the scrambling code in the preset scrambling code set, as long as the scrambling code is used as the scrambling sequence of the DCI carried on the PDCCH sent by the network device to the terminal device (or DCI's CRC scrambling sequence), and DCI is used to schedule the transmission of PDSCH, and PDSCH is used to carry the response message sent to the terminal device for the random access message. When the response message carries at least the CRID, it is implemented in this application The scrambling code in the preset scrambling code set in the example.
  • Step S205 The terminal device receives the first PDSCH from the network device according to the monitored first PDCCH.
  • the terminal device monitors the first PDCCH scrambled with the scrambling code in the preset scrambling code set, it indicates that the network device has responded to the random access message sent by the terminal device, and the terminal device can listen to The first PDCCH of receives the first PDSCH from the network device, demodulates the first PDSCH, and then obtains the first response message carried on the first PDSCH.
  • the terminal device monitors the first PDCCH scrambled with the scrambling code in the preset scrambling code set, it indicates that the network device has responded to the random access message sent by the terminal device, and the terminal device can listen to The first PDCCH of receives the first PDSCH from the network device, demodulates the first PDSCH, and then obtains the first response message carried on the first PDSCH.
  • step S204 may occur before step S202, which is not limited in this application.
  • the first response message may include contention resolution information (Contention Resolution Message, CRM), and the terminal device can determine whether the contention access is successful according to the contention resolution information.
  • the CRM may include CRID
  • the specific implementation manner for the terminal device to determine whether the contention access is successful according to the CRM may be: obtain the CRID in the CRM, if the CRID and the terminal device are in the uplink carried in the PUSCH in the random access message
  • the data in the Common Control Channel Service Data Unit Uplink Common Control Channel Service Data Unit, UL CCCH SDU
  • the data is the identification of the terminal device
  • the PUSCH carries the identification of the terminal device, and the CRID may be obtained according to the identification of the terminal device. Specifically, if the total number of bits of the CRID is the same as the total number of bits of the identification of the terminal device, then the CRID is the same as the identification of the terminal device; if the total number of bits of the CRID is different from the total number of bits of the identification of the terminal device, for example, CRID
  • the total number of bits in is s1 bits, the total number of bits in the identification of the terminal device is s2 bits, and s2>s1, then CRID is the first s1 bit of the identification of the terminal device. For example, if the total number of bits of the CRID is specified in the protocol as 48 bits, and if the length of the terminal device identifier is greater than 48 bits, then the CRID is the first 48 bits of the terminal device identifier.
  • the terminal equipment can determine that the contention access is successful; if the total number of bits of the CRID is the same as that of the terminal.
  • the total number of bits of the device identification is different, and the total number of bits of the CRID is s1 bits, and the total number of bits of the identification of the terminal device is s2 bits, then the CRID and the identification of the terminal device carried in the PUSCH of the terminal device in the random access message Whether it matches or not refers to whether the first s1 bit of the terminal device identification carried in the PUSCH in the
  • the first response message carries the temporary cell radio network temporary identifier TC-RNTI.
  • the TC-RNTI can be set as the cell radio network temporary identifier (Cell Radio Network Temporary Identifier). , C-RNTI).
  • C-RNTI can be used to establish a connection between a terminal device and a network device before the connection is released. If the terminal device initiates a random access request again and the network device sends contention resolution information to the terminal device, the network device can use the C- The RNTI scrambles the PDCCH scheduling the PDSCH carrying the contention resolution information. Similarly, the terminal equipment can also only use the C-RNTI to monitor the PDCCH.
  • the network device needs to select a scrambling code from the preset scrambling code set to scramble it every time before sending the PDCCH. Similarly, it can also prevent the terminal device from being in the preset scrambling code set Select a scrambling code for descrambling operation.
  • the first response message carries the cell radio network temporary identification C-RNTI, and after the terminal device determines that the competitive access is successful, the terminal device may save the C-RNTI.
  • the terminal device may also determine whether the RNTI carried in the first response message is a C-RNTI or a TC-RNTI. According to the determined result, corresponding processing is performed, for example, see the description of the foregoing embodiment.
  • the TC-RNTI (or C-RNTI) carried in the first response message may be the same as the scrambling code for scrambling the first PDCCH, or may be different from the scrambling code for scrambling the first PDCCH.
  • the TC-RNTI (or C-RNTI) carried in the first response message may be located in the preset scrambling code set, and may not be located in the preset scrambling code set, which is not limited in the embodiment of the present application.
  • the first response message may include a contention resolution identifier, or the first response message may include a contention resolution identifier and the first information.
  • the first information may include at least one of the following: resource information of the feedback confirmation message, timing advance command, uplink data transmission authorization, preamble carried in the random access message sent by the terminal device, and cell radio network temporary identification C-RNTI Or one of the temporary cell radio network temporary identifier TC-RNTI, RRC reconfiguration (RRC reconfiguration) information, RRC connection reestablishment (RRC reestablishment) information, and RRC resume (RRC resume) information.
  • the first information may also include other RRC information, and examples are not given here. Among them, the C-RNT or TC-RNTI is used to allocate to the terminal device for subsequent uplink and downlink data transmission as a dynamic identifier of the terminal device.
  • the network device can use the scrambling code in the preset scrambling code set to scramble the first PDCCH.
  • the terminal device can try each scrambling code in the scrambling code set one by one until it detects the first PDCCH scrambled with the scrambling code in the scrambling code set, and can receive the first PDCCH from the network device according to the monitored first PDCCH.
  • One PDSCH Therefore, by implementing the embodiments of the present application, it is beneficial for the terminal device to successfully obtain the first PDSCH scheduled by the first PDCCH.
  • Figure 3 is a schematic flow diagram of another random access method provided by an embodiment of the present application. The method describes in detail how to use the Preamble, terminal device identifiers, and PUSCH time-frequency resources based on at least one of the Suppose the first scrambling code is obtained by assuming the operation relationship, the method may include but not limited to the following steps:
  • Step S301 The terminal device sends a random access message to the network device.
  • the random access message includes the Preamble and the PUSCH, and the PUSCH carries the identity of the terminal device.
  • Step S302 If the network device successfully decodes the PUSCH, generate a first response message for the PUSCH.
  • the PUSCH may carry the identification of the terminal device, or the UL CCCH SDU, or the UL CCCH SDU, and the UL CCCH SDU may carry the identification of the terminal device.
  • Step S303 The terminal device obtains a first scrambling code according to at least one of the Preamble, the identifier of the terminal device, and the time-frequency resource of the PUSCH and the preset operation relationship, where the first PDCCH is used for scheduling and carrying the first response to the PUSCH For the first PDSCH of the message, the preset operation relationship makes the first scrambling code located in the preset scrambling code set.
  • the terminal device After the terminal device sends the random access message to the network device, it needs to monitor the first PDCCH according to the scrambling code in the preset scrambling code set to receive the first PDSCH from the network device according to the monitored first PDCCH.
  • the specific implementation manner for the terminal device to monitor the first PDCCH according to the scrambling code in the preset scrambling code set may be: the terminal device according to the Preamble, the identifier of the terminal device, and the time-frequency resource of the PUSCH (PUSCH occasion, The first scrambling code is obtained from at least one of PO) and the preset operation relationship, and the first PDCCH is monitored according to the first scrambling code.
  • the time-frequency resource of the PUSCH is the time-frequency resource determined by the terminal device for sending the PUSCH in the random access message.
  • the terminal device may specifically obtain the first scrambling code according to the identification of the terminal device, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship; or, the terminal device may specifically obtain the first scrambling code according to the Preamble , The number of scrambling codes in the preset scrambling code set and the preset calculation relationship obtain the first scrambling code; or, the terminal device can obtain the first value according to the location information of the PO, and according to the first value, the preset The number of scrambling codes in the scrambling code set and the preset operation relationship obtain the first scrambling code.
  • the scrambling codes in the aforementioned preset scrambling code set may be continuous scrambling codes or non-continuous scrambling codes.
  • the scrambling codes in the preset scrambling code set are continuous scrambling codes, and the preset scrambling code set is ⁇ x min ,..., x max ⁇ , the preset operation relationship can be:
  • X is the first scrambling code
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the number of scrambling codes in the preset scrambling code set
  • mod() means modulo operation.
  • the preset operation relationship (1) since the number N of scrambling codes in the preset scrambling code set is used as the divisor, the result of mod(UE_ID, N) can be made less than N, and then the preset scrambling code is added
  • the minimum value x min in the set can make the obtained first scrambling code (that is, X) located in the preset scrambling code set.
  • N x max -x min +1.
  • the preset operation when the scrambling codes in the preset scrambling code set are non-continuous scrambling codes, and the preset scrambling code set is ⁇ x 0 ,..., x N-1 ⁇ , the preset operation
  • the relationship can be:
  • index is the index of the scrambling code in the preset scrambling code set
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x index is The scrambling code with index index, ⁇ x 0 ,..., x N-1 ⁇ is the preset scrambling code set
  • x 0 is the scrambling code with index
  • x N-1 is the scrambling code with index N-1
  • X is the first scrambling code.
  • the first scrambling code (that is, X) obtained according to the operation relationship (2) is located in The preset scrambling code set.
  • the terminal device when the terminal device obtains the first scrambling code according to the Preamble, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship, and the scrambling codes in the preset scrambling code set are continuous Scrambling code.
  • the preset scrambling code set is ⁇ x min ,..., x max ⁇
  • the preset operation relationship can be:
  • X is the first scrambling code
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set
  • the Preamble index is The index of the preamble in the random access message in step S301. It can be known from the preset operation relationship (3) that the result of mod (Preamble index, N) is less than N, so the first scrambling code (ie X) obtained according to the operation relationship (3) is located in the preset scrambling code set.
  • the preset operation when the scrambling codes in the preset scrambling code set are non-continuous scrambling codes, and the preset scrambling code set is ⁇ x 0 ,..., x N-1 ⁇ , the preset operation
  • the relationship can be:
  • index is the index of the scrambling code in the preset scrambling code set
  • Preamble index is the index of the Preamble in the random access message in step S301
  • N is the preset scrambling code set
  • x index is the scrambling code with index index
  • ⁇ x 0 ,..., x N-1 ⁇ is the preset scrambling code set
  • x 0 is the scrambling code with index
  • x N-1 is the index Is the N-1 scrambling code
  • X is the first scrambling code.
  • the result of mod (Preamble index, N) (ie the index of the first scrambling code) is less than N, so the first scrambling code (ie X) obtained according to the operation relationship (4) is located
  • the preset scrambling code set is not limited to the preset operation relationship (4).
  • the terminal device may obtain the first value according to the location information of the PO, and obtain the first scrambling code according to the first value, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the location information of the PO may include, but is not limited to: the first orthogonal frequency division multiplexing (OFDM) for transmitting the time domain resources of the PUSCH in the random access message during the random access process.
  • OFDM orthogonal frequency division multiplexing
  • the terminal equipment obtains the first numerical value according to the position information of the PO as follows:
  • PO value is the first value
  • f_id represents the index
  • the definition of ul_carrier_id can be referred to the description of the foregoing (the method of calculating RA-RNTI), which will not be repeated here.
  • a can be the number of OFDM symbols included in a time slot
  • b can be the number of time slots included in a system frame
  • c can be the maximum number of frequency domain resources that can be allocated to the PUSCH (or random access channel).
  • the values of a, b, and c in the calculation relationship (5) may change with the granularity of the PUSCH configured by the network device for the terminal device.
  • the terminal device can obtain the first scrambling code according to the first value, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the scrambling code in the preset scrambling code set is When the code is a continuous scrambling code, and the preset scrambling code set is ⁇ x min ,..., x max ⁇ , the preset operation relationship can be:
  • X is the first scrambling code
  • PO value is the first value
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the number of scrambling codes in the preset scrambling code set. Minimum scrambling code. It can be known from the preset operation relationship (6) that the result of mod(PO value , N) is less than N, so the first scrambling code (ie X) obtained according to the operation relationship (6) is located in the preset scrambling code set.
  • the preset operation when the scrambling codes in the preset scrambling code set are non-continuous scrambling codes, and the preset scrambling code set is ⁇ x 0 ,..., x N-1 ⁇ , the preset operation
  • the relationship can be:
  • index is the index of the scrambling code in the preset scrambling code set
  • PO value is the first value
  • N is the number of scrambling codes in the preset scrambling code set
  • x index is The scrambling code with index index, ⁇ x 0 ,..., x N-1 ⁇ is the preset scrambling code set
  • x 0 is the scrambling code with index
  • x N-1 is the scrambling code with index N-1
  • X is the first scrambling code.
  • the result of mod (the first value, N) (ie the index of the first scrambling code) is less than N, so the first scrambling code (ie X) obtained according to the operational relationship (7) is located in the preset Scrambling code set.
  • the first response message may carry a TC-RNTI, and after obtaining the first response message, the terminal device may set the TC-RNTI to C-RNT. In an implementation manner, the first response message may carry a C-RNTI, and the terminal device may save the C-RNTI after obtaining the first response message.
  • the TC-RNTI (or C-RNTI) carried in the first response message may be the same as the scrambling code used to scramble the first PDCCH, or may be different from the scrambling code used to scramble the first PDCCH.
  • the TC-RNTI (or C-RNTI) carried in a response message may be located in the preset scrambling code set, and may not be located in the preset scrambling code set.
  • the network device and the terminal device 1 and the terminal device 2 agree to obtain the first scrambling code according to the Preamble, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship, since the terminal device 1 and the terminal device 2 send The Preamble for the same network device may be the same, and the set of scrambling codes pre-appointed by the network device and terminal device 1 and terminal device 2 may also be the same, so the first scrambling code calculated by terminal device 1 and terminal device 2 may be the same.
  • the network device will use the same first scrambling code to scramble the first PDCCH sent to the terminal device 1 and the terminal device 2, and the terminal device 1 and the terminal device 2 will simultaneously perform the first PDSCH indicated by the first PDCCH. Decoding. According to the contention resolution ID in the first response information carried in the first PDSCH, it is confirmed whether the first PDSCH is its own. There may be two situations for the first PDSCH:
  • the first PDSCH is a unicast data that only contains the response information of the terminal device 1, and the response information contains at least the contention resolution ID.
  • terminal device 2 After terminal device 2 demodulates the first PDSCH, it is found that the contention resolution ID does not match the data in the UL CCCH SDU transmitted by terminal device 2 (or the identification of terminal device 2), and terminal device 2 discards the first PDSCH. In an embodiment, the terminal device 2 can re-initiate random access.
  • the network device sends the PDSCH carrying response information containing the contention resolution ID to the terminal device 2, it continues to use the first scrambling code to scramble the PDCCH scheduling the PDSCH , The terminal device 2 uses the first scrambling code to monitor the PDCCH.
  • terminal device 1 After terminal device 1 demodulates the first PDSCH, it finds that the contention resolution ID matches the data in the ULCCCH SDU (or the identity of terminal device 1) transmitted by terminal device 1, and terminal device 1 confirms that the contention resolution is successful, and the first The TC-RNTI carried in a PDSCH is set as C-RNTI.
  • the terminal device 1 receives the contention resolution information sent by the network device in the subsequent newly initiated random access process, it can use the C-RNTI to monitor the PDCCH to avoid collisions with the terminal device 2 when monitoring the PDCCH. It should be noted that, at this time, the TC-RNTI carried in the first PDSCH is different from the first scrambling code.
  • the first PDSCH is a multicast data that contains the response information of terminal device 1 and the response information of terminal device 2. Both the response information of terminal device 1 and the response information of terminal device 2 contain at least the contention resolution ID
  • terminal device 2 After terminal device 2 demodulates the first PDSCH, it finds that one of the contention resolution IDs matches the data in the ULCCCH SDU (or the identification of terminal device 2) transmitted by terminal device 2, and terminal device 2 confirms that the contention resolution is successful. Device 2 saves the TC-RNTI carried in the data part where the contention resolution ID is located, and sets it as C-RNTI. When the terminal device 2 receives the contention resolution information sent by the network device in the subsequent newly initiated random access process, it can use the C-RNTI to monitor the PDCCH. Avoid collision with terminal device 1 when monitoring PDCCH
  • terminal device 1 After terminal device 1 demodulates the first PDSCH, it finds that one of the contention resolution IDs matches the data in the ULCCCH SDU (or the identification of terminal device 1) transmitted by terminal device 1, and terminal device 1 confirms that the contention resolution is successful. Device 1 will save the TC-RNTI carried in the data part where the contention resolution ID is located, and set it as C-RNTI. When the terminal device 1 receives the contention resolution information sent by the network device in the subsequent newly initiated random access process, it can use the C-RNTI to monitor the PDCCH. Avoid collisions with the terminal device 2 when monitoring the PDCCH. It should be noted that the TC-RNTI carried in the data part of the contention resolution ID in the response information of the terminal device 1 is different from the TC-RNTI carried in the data part of the contention resolution ID in the response information of the terminal device 2.
  • step S303 only states that the terminal device obtains the first scrambling code according to any one of the Preamble, the identifier of the terminal device, and the time-frequency resource of the PUSCH and the preset operation relationship.
  • the terminal device can also obtain the first scrambling code according to a preset operation relationship among multiple types of Preamble, the identifier of the terminal device and the PUSCH time-frequency resource.
  • the terminal device Since the terminal device does not know which scrambling code in the preset scrambling code set is used by the network device to scramble the first PDCCH, the terminal device needs to scramble the first PDCCH in the preset scrambling code set
  • the scrambling code is tried one by one (ie blind detection) to determine whether the first PDCCH scrambled with the scrambling code in the preset scrambling code set is monitored, that is, the terminal device may need to try multiple times to determine the first PDCCH PDCCH is scrambled with which scrambling code in the preset scrambling code set.
  • blind detection method used in the embodiment shown in FIG. 2
  • the 3 obtain the first scrambling code in the same manner, and both are based on the Preamble, the identification of the terminal device and the PUSCH timing. At least one of the frequency resources and the preset operation relationship obtain the unique first scrambling code, that is, the first scrambling code calculated by the terminal device and the first scrambling code calculated by the network device are the same, so that Effectively improve the efficiency of the terminal equipment to monitor the first PDCCH, thereby helping to improve the efficiency of random access.
  • Step S304 The terminal device monitors the first PDCCH according to the first scrambling code.
  • the terminal device may use the first scrambling code to monitor the first PDCCH.
  • Step S305 The network device obtains the first scrambling code according to at least one of the Preamble, the identifier of the terminal device, and the time-frequency resource of the PUSCH and the preset operation relationship.
  • step S305 For the execution process of step S305, refer to the specific description of step S303, which is not repeated here.
  • the specific method can be based on the identification of the terminal device and the scrambling code in the preset scrambling code set.
  • the number and the preset operation relationship (1) obtain the first scrambling code; according to the Preamble, the number of scrambling codes in the preset scrambling code set and the preset operation relationship (3) (Or the preset operation relationship (4)) Obtain the first scrambling code; according to the PUSCH time-frequency resource, the number of scrambling codes in the preset scrambling code set, the operation relationship (5) and the preset operation relationship (6) (Or the preset operation relationship (7)) obtain the first scrambling code; randomly determine the first scrambling code in the preset scrambling code set. Therefore, the terminal device and the network device need to agree to determine the first scrambling code in the same way in order to improve the efficiency of random access.
  • the network device can notify the terminal device by broadcasting system information, which method the network device will use to obtain the first scrambling code. After the terminal device receives the broadcast system information, it can use the same method as that used by the network device. Way to get the first scrambling code.
  • the network device and the terminal device may also adopt other methods (such as protocol agreement) besides broadcasting system information to stipulate which method is used to determine the first scrambling code, which is not limited in the embodiment of the present application.
  • Step S306 The network device scrambles the first PDCCH according to the first scrambling code.
  • the network device may scramble the first PDCCH according to the first scrambling code, that is, scramble the CRC of the DCI carried on the first PDCCH according to the first scrambling code.
  • Step S307 The network device sends the first PDCCH for scheduling the first PDSCH.
  • Step S308 The terminal device receives the first PDSCH from the network device according to the monitored first PDCCH.
  • step S307 to step S308 please refer to the specific description of step S204 to step S205 in FIG. 2 respectively, which will not be repeated here. At least some of the above steps can be in no order. For example, steps S303 and S304 can occur before step S302, which is not limited in this application.
  • both the terminal device and the network device can obtain the first scrambling code according to at least one of the Preamble, the identifier of the terminal device, and the PUSCH time-frequency resource and the preset operation relationship, that is, when When the terminal device and the network device obtain the first scrambling code in the same way, the first scrambling code calculated by the terminal device and the first scrambling code calculated by the network device are the same, which can effectively improve the terminal device’s ability to monitor the first PDCCH. Efficiency, which helps to improve the efficiency of random access.
  • FIG. 4 is a schematic flowchart of another random access method provided by an embodiment of the present application.
  • the method elaborates the RA-RNTI and the first scrambling code corresponding to the time-frequency resource used to transmit the preamble.
  • the method may include but is not limited to the following steps:
  • Step S401 The terminal device sends a random access message to the network device.
  • the random access message includes the Preamble and the PUSCH, and the PUSCH carries the identity of the terminal device.
  • Step S402 If the network device decodes the PUSCH successfully, generate a first response message for the PUSCH.
  • Step S403 The terminal device obtains the first scrambling code according to at least one of the random access preamble, the identifier of the terminal device, and the PUSCH time-frequency resource and the preset operation relationship, where the first PDCCH is used for scheduling and carrying the PUSCH For the first PDSCH of the first response message, the preset operation relationship enables the first scrambling code to be located in the preset scrambling code set.
  • step S401 to step S403 please refer to the specific description of step S301 to step S303 in FIG. 3 respectively, which will not be repeated here.
  • Step S404 The terminal device determines the RA-RNTI corresponding to the time-frequency resource used to send the Preamble.
  • the random access message sent by the terminal device to the network device may include Preamble and PUSCH. If the network device successfully detects the Preamble and successfully decodes the PUSCH, it may generate a first response message for the PUSCH. If the network device successfully detects the Preamble but fails to decode the PUSCH, it can generate a second response message for the Preamble.
  • the terminal device When the terminal device receives the first response message, it indicates that the network device has successfully detected the Preamble and successfully decoded the PUSCH. At this time, the terminal device needs to obtain the CRID carried by the PUSCH, and determine whether the CRID matches the identification of the terminal device, and then determine the terminal Whether the device competition access is successful.
  • the terminal device receives the second response message, it indicates that the network device has only successfully detected the Preamble but failed to demodulate the PUSCH. At this time, the terminal device needs to retransmit the Preamble and PUSCH (or only retransmit the PUSCH) to the network device. The network device detects and decodes the received retransmission information.
  • the network device sends a third response message containing at least the CRID to the terminal.
  • the terminal device receives the third response message and passes the third response
  • the message confirms that the CRID matches the identification of the terminal device it indicates that the network device successfully detects the PUSCH and the terminal device successfully competes for access.
  • the terminal device can send a confirmation message to the network device, which is used to notify the network device terminal The device has successfully received the third response message. It can be seen that the terminal device needs to perform different operations after receiving different response messages.
  • the terminal device needs to distinguish whether the response message is a response message for Preamble (ie, the second response message) or a response message for PUSCH (ie, the first response message), so that the terminal device can respond according to the response message.
  • the type of message performs the correct operation.
  • the network device can scramble the second PDCCH for scheduling the second PDSCH through RA-RNTI, and the second PDSCH is used to carry the second response message for the Preamble; and the network device can use the first scrambler
  • the code scrambles the first PDCCH that schedules the first PDSCH, and the first PDSCH is used to carry the first response message for the PUSCH. Therefore, if the terminal equipment monitors the second PDCCH scrambled with RA-RNTI, the terminal equipment can determine that the response message carried on the PDSCH scheduled by the second PDCCH is the second response message for the Preamble. Similarly, if the terminal equipment If the first DCCH scrambled with the first scrambling code is monitored, the terminal device can determine that the response message carried on the first PDSCH scheduled by the first PDCCH is the first response message for the PUSCH.
  • the network device and the terminal device can use the same method to calculate the same RA-RNTI.
  • the specific implementation manner for calculating the RA-RNTI can be: determining the time-frequency resource used to send the preamble corresponds to RA-RNTI.
  • the terminal device (or network device) may determine the RA-RNTI according to the location information of the time-frequency resource used to send the Preamble, and the time-frequency resource used to send the Preamble is called a random access opportunity (PRACH Occasion, RO).
  • Step S405 If the RA-RNTI and the first scrambling code are the same, the terminal device adjusts the first scrambling code according to the preset offset value to obtain the adjusted first scrambling code.
  • the terminal device cannot distinguish between the second response message only for the Preamble and the first response message for the PUSCH.
  • the RA-RNTI and/or the first scrambling code need to be adjusted so that the adjusted RA-RNTI is different from the first scrambling code.
  • the RA-RNTI can be kept unchanged, and the first scrambling code can be adjusted.
  • the first scrambling code may be adjusted according to the preset offset value to obtain the adjusted first scrambling code.
  • the terminal device adjusts the first scrambling code according to a preset offset value, and there are three specific implementation manners for obtaining the adjusted first scrambling code:
  • the first way use the sum (or difference) of the first scrambling code and the preset offset value as the adjusted first scrambling code.
  • the adjusted first scrambling code can be determined quickly, but in this way, the adjusted first scrambling code may not be in the preset scrambling code set. If the network equipment and terminal equipment agree to use The blind detection method determines the first scrambling code, then the terminal device may not be able to monitor the PDCCH scrambled with the adjusted first scrambling code.
  • the adjusted first scrambling code is located in a preset scrambling code set. In this manner, it is possible to prevent the terminal device from being unable to monitor the PDCCH scrambled with the adjusted first scrambling code.
  • the terminal device can calculate the preset offset value and the dividend in the remainder function (ie mod function) in the operation relationship (1) Perform addition operation (or subtraction operation), and use the obtained value as the new dividend in the remainder function in the operation relationship (1), thereby obtaining the new operation relationship (1′), and then the operation relationship (1′)
  • the result is the adjusted first scrambling code.
  • the operation relationship (1′) can be:
  • X' is the adjusted first scrambling code
  • is the preset offset value.
  • the definitions of UE_ID, N and x min are the same as those in the operation relationship (1). I won't go into details here. It can be seen from the operational relationship (1') that the result of mod(UE_ID+ ⁇ , N) is less than N, so the adjusted first scrambling code (ie X') obtained according to the operational relationship (1') is located in the preset scrambling code In the collection.
  • the first scrambling code is obtained by using other operation relations besides operation relation (1), then you can refer to the method of obtaining operation relation (1′) to obtain other new operation relations, and pass other new operation relations.
  • the adjusted first scrambling code is calculated by calculating the operation relationship of, which will not be repeated in the embodiment of the present application.
  • the terminal device can compare the preset offset value and the sum (or difference between) the first scrambling code obtained according to the calculation relationship (1) ) Is used as the new dividend in the remainder function in the operation relationship (1) to obtain a new operation relationship (1"), and then the result of the operation relationship (1") is used as the adjusted first scrambling code.
  • the operation relationship (1′′) can be:
  • X" is the adjusted first scrambling code
  • X is the first scrambling code obtained according to the operation relationship (1)
  • is the preset offset value
  • the definitions of N and x mim It is the same as the definition in the operation relation (1), and will not be repeated here. It can be seen from the operation relationship (1′′) that the result of mod(X+ ⁇ , N) is less than N, so the adjusted first scrambling code (ie X′′) obtained according to the operation relationship (1′′) is located in the preset scrambling code In the collection.
  • first scrambling code is obtained by using other operational relations except for operational relation (1), then you can refer to the method of obtaining operational relation (1′′) to obtain other new operational relations and pass other new operational relations.
  • the adjusted first scrambling code is calculated by calculating the operation relationship of, which will not be repeated in the embodiment of the present application.
  • Step S406 The terminal device uses the adjusted first scrambling code to monitor the first PDCCH.
  • the terminal device may use the adjusted first scrambling code to monitor the first PDCCH.
  • Step S407 The network device obtains the first scrambling code according to at least one of the Preamble, the identifier of the terminal device, and the time-frequency resource of the PUSCH and the preset operation relationship.
  • step S407 refers to the specific description of step S305 in FIG. 3, which will not be repeated here.
  • Step S408 The network device determines the RA-RNTI corresponding to the time-frequency resource used to send the Preamble.
  • Step S409 If the RA-RNTI is the same as the first scrambling code, the network device adjusts the first scrambling code according to the preset offset value to obtain the adjusted first scrambling code.
  • the manner in which the network device determines the RA-RNTI corresponding to the time-frequency resource used to transmit the Preamble is the same as the manner in which the terminal device determines the RA-RNTI corresponding to the time-frequency resource used to transmit the Preamble, and the network device determines The preset offset value adjusts the first scrambling code to obtain the adjusted first scrambling code and the terminal device adjusts the first scrambling code according to the preset offset value to obtain the adjusted first scrambling code The same way.
  • steps S408 to S409 please refer to the specific description of steps S404 to S405 respectively, which will not be repeated here.
  • the network device can notify the terminal device by broadcasting system information, which method the network device will use to adjust the first scrambling code. After receiving the broadcast system information, the terminal device can use the same method as that used by the network device. Way to adjust the first scrambling code.
  • the network device and the terminal device may also adopt other methods (such as protocol agreement) besides broadcasting system information to agree on which method to use to adjust the first scrambling code, which is not limited in this embodiment of the application.
  • Step S410 The network device scrambles the first PDCCH according to the adjusted first scrambling code.
  • the network device After the network device obtains the adjusted first scrambling code, it can scramble the first PDCCH according to the adjusted first scrambling code, that is, according to the adjusted first scrambling code, the DCI carried on the first PDCCH is CRC scrambles.
  • Step S411 The network device sends the first PDCCH for scheduling the first PDSCH.
  • Step S412 The terminal device receives the first PDSCH from the network device according to the monitored first PDCCH.
  • step S411 to step S412 please refer to the specific description of step S307 to step S308 in FIG. 3 respectively, which will not be repeated here.
  • the first scrambling code is adjusted by the preset offset value, so that the network device uses the adjusted first scrambling code to perform the first PDCCH For scrambling, the terminal device uses the adjusted first scrambling code to monitor the first PDCCH.
  • the terminal device cannot distinguish whether the received response information is for the PUSCH response message or for the Preamble according to the scrambling sequence. The status of the response message.
  • Figure 5 is a schematic flow diagram of another random access method provided by an embodiment of the present application. This method briefly describes that when the network device successfully detects the Preamble but fails to decode the PUSCH, it is based on the second response message Whether to carry a scrambling code, how does the terminal device determine which scrambling code to use to monitor the PDCCH, the method may include but is not limited to the following steps:
  • Step S501 The terminal device sends a random access message to the network device.
  • the random access message includes the Preamble and the PUSCH, and the PUSCH carries the identity of the terminal device.
  • step S501 can be referred to the specific description of step S201 in FIG. 2 respectively, which is not repeated here.
  • Step S502 If the network device successfully detects the Preamble and the PUSCH decoding fails, it generates a second response message for the Preamble, the second response message carries index uplink scheduling information.
  • the network device can generate a second response message for the Preamble.
  • the second response message can carry the preamble index, TAcommand, uplink scheduling information (UL grant) and At least one type of data in TC-RNTI.
  • the uplink scheduling information is used to configure a part of time-frequency resources for use by the terminal device, and the terminal device can use this part of the time-frequency resource to retransmit the PUSCH, or retransmit the Preamble and PUSCH.
  • Step S503 The terminal device monitors the second PDCCH according to the RA-RNTI, and the second PDCCH is used to schedule the second PDSCH carrying the second response message only for the Preamble.
  • the network device after the terminal device sends the random access message, by monitoring the second PDCCH, it can be confirmed whether the network device successfully detects the Preamble in the random access message and whether it decodes the PUSCH correctly.
  • the network device if the network device successfully detects the Preamble but fails to decode the PUSCH, the network device can generate a second response message for the Preamble, and use RA-RNTI to schedule the first response message carrying the second response message. 2.
  • the second PDCCH of the PDSCH is scrambled; if the network device successfully detects the Preamble and successfully decodes the PUSCH, the network device can generate a first response message for the PUSCH code, and use the first scrambling code to carry the first The first PDCCH of the first PDSCH of the response message is scrambled. Therefore, after the terminal device sends the random access message, it can monitor the second PDCCH according to the RA-RNTI and monitor the first PDCCH according to the first scrambling code to confirm whether the network device successfully detects the Preamble and PUSCH in the random access message.
  • Step S504 The network device sends a second PDCCH for scheduling a second PDSCH, and the second PDCCH is scrambled by using RA-RNTI.
  • the network device can use RA-RNTI to scramble the second PDCCH used to schedule the second PDSCH, and send the scrambled second PDCCH, where RA-RNTI is used for the second PDCCH.
  • the specific implementation of scrambling for the second PDCCH is: using RA-RNTI to scramble the CRC of the DCI carried on the second PDCCH.
  • the second PDSCH is used to carry a second response message, and the second response message carries uplink scheduling information.
  • Step S505 If the terminal equipment monitors the second PDCCH scrambled using RA-RNTI, it performs uplink transmission according to the uplink scheduling information carried by the second PDSCH.
  • the terminal device monitors the second PDCCH scrambled using RA-RNTI, it can receive the second PDSCH from the network device according to the monitored second PDCCH, and demodulate the second PDSCH to obtain the second PDSCH The second response message carried.
  • the second response message may be used to notify the terminal device of which data to retransmit.
  • the terminal device may be notified to retransmit the Preamble and PUSCH, or the terminal device may be notified to retransmit the PUSCH.
  • the second response message carries uplink scheduling information. After the terminal device determines the data that needs to be retransmitted according to the second response information, it can perform uplink transmission through the time-frequency resource indicated by the uplink scheduling information. Transmission may include retransmission of PUSCH to the network device, or uplink transmission may include retransmission of PUSCH and Preamble to the network device.
  • Step S506 The network device detects the uplink transmission on the time-frequency resource indicated by the uplink scheduling information.
  • the network device after the network device sends the second PDCCH, it can detect the uplink transmission on the time-frequency resource indicated by the uplink scheduling information.
  • the uplink transmission can include the terminal device retransmitting the PUSCH to the network device, or the uplink transmission can include the terminal device to the network device. Retransmit PUSCH and Preamble.
  • Step S507 If the network device successfully detects the uplink transmission, it generates a response message for the uplink transmission.
  • the network device successfully detects the uplink transmission on the time-frequency resource indicated by the uplink scheduling information, it generates a response message for the uplink transmission.
  • the content included in the response message for uplink transmission and the content included in the first response message may be the same or different.
  • the response message for the uplink transmission may include a response message generated when the PUSCH in the uplink transmission is successfully decoded, or may be included in the successful detection of the Preamble in the uplink transmission and the PUSCH The response message generated if the decoding fails.
  • Step S508 If the second response message carries the second scrambling code, the terminal device uses the second scrambling code to monitor the third PDCCH, the third PDCCH is used to schedule the third PDSCH, and the third PDSCH is used to carry the uplink scheduled for uplink scheduling information The transmitted response message; if the second response message does not carry any scrambling code, the terminal device uses the third scrambling code to monitor the third PDCCH.
  • the second response message may or may not carry any scrambling code.
  • the second response message carries the second scrambling code, it means that the network device will use the second scrambling code to scramble the third PDCCH to be transmitted next, where the third PDCCH is used to schedule the third PDSCH, and the third PDSCH is used to It carries the response message for the uplink transmission scheduled by the uplink scheduling information.
  • the terminal device also needs to use the second scrambling code to monitor the third PDCCH.
  • the network device will use the third scrambling code to scramble the third PDCCH for the next transmission, where the third scrambling code can be the first scrambling code or the first scrambling code.
  • the third scrambling code can be the first scrambling code or the first scrambling code.
  • Four scrambling codes For the calculation method of the first scrambling code, refer to the description of the embodiments in FIG. 2 to FIG. 4, which is not repeated here.
  • the calculation method of the fourth scrambling code is: obtaining the second value according to the position information of the time-frequency resource indicated by the uplink scheduling information, and obtaining the second value according to the second value, the number of scrambling codes in the preset scrambling code set, and the preset calculation relationship The fourth scrambling code.
  • the calculation method of the first scrambling code may be: obtaining the first value according to the position information of the PUSCH time-frequency resource in the random access message, and according to the first value, the number of scrambling codes in the preset scrambling code set and the preset
  • the first scrambling code is obtained by the operation relationship of. It can be seen that the first scrambling code can be calculated according to the position information of the time-frequency resource of the PUSCH, and the fourth scrambling code can be calculated according to the position information of the time-frequency resource indicated by the uplink scheduling information. It should be noted that the first scrambling code and the fourth scrambling code may be the same or different, which is not limited in the embodiment of the present application.
  • the terminal device will use a different scrambling code to monitor the third PDCCH. Specifically, if the second response message carries the second scrambling code, the carried second scrambling code will be used to monitor the third PDCCH. Three PDCCHs; if the second response message does not carry any scrambling code, the first scrambling code is used to monitor the third PDCCH (at this time, the third PDCCH is the same as the first PDCCH in the embodiments of FIGS. 2 to 4); if the second The response message does not carry any scrambling code, and the fourth scrambling code can also be used to monitor the third PDCCH.
  • Step S509 If the second response message carries the second scrambling code, the network device sends the third PDCCH for scheduling the third PDSCH, the third PDCCH is scrambled with the second scrambling code, and the third PDSCH is used to carry the information for uplink scheduling.
  • the third scrambling code can be the first scrambling code or the fourth scrambling code.
  • the manner in which the network device calculates the fourth scrambling code is the same as the manner in which the terminal device calculates the fourth scrambling code. For the execution process, refer to the specific description in step S508, which will not be repeated here.
  • Step S510 The terminal device receives the third PDSCH from the network device according to the monitored third PDCCH.
  • the response message for the uplink transmission may include a third response message for the PUSCH.
  • the third PDCCH monitored by the terminal device is equivalent to the first PDSCH in the embodiments of FIGS. 2 to 4
  • the third PDSCH is equivalent to the first PDCCH in the embodiments of FIGS. 2 to 4.
  • the third PDSCH may carry the fifth scrambling code.
  • the terminal device may store the fifth scrambling code and set the fifth scrambling code to C- RNTI.
  • the fifth scrambling code may be a scrambling code in a preset scrambling code set, or may be an RNTI sequence in the RNTI sequence value range, which is not limited in the embodiment of the present application.
  • the terminal device may store RNTI1 and set RNTI1 as C-RNTI, If the third PDSCH carries RNTI2, after obtaining the RNTI2 carried on the third PDSCH, the terminal device can store RNTI2 and set RNTI2 as C-RNTI. In one implementation, if the second PDSCH and the third PDSCH do not carry any RNTI, the terminal device can store the scrambling code (such as RNTI3) used to scramble the third PDCCH, and set the scrambling code to C-RNTI.
  • the scrambling code such as RNTI3
  • the priority of the scrambling code carried by the third PDSCH (such as RNTI2)> the priority of the scrambling code carried by the second PDSCH (such as RNTI1)> the priority of the scrambling code (such as RNTI3) used to scramble the third PDCCH level.
  • the terminal device After the terminal device sends a random access message to the network device, if the network device successfully detects the Preamble but fails to decode the PUSCH, if the second response message sent by the network device to the terminal device carries the first response message If the second scrambling code is used, the terminal device can use the second scrambling code to monitor the third PDSCH. If the second response message does not carry any scrambling code, the terminal device can use the first scrambling code or the fourth scrambling code to monitor the third PDSCH. It is beneficial for the terminal device to obtain the third PDSCH according to the third PDCCH, where the third PDSCH is used to carry the response message for the uplink transmission scheduled by the uplink scheduling information.
  • FIG. 6 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the communication device 60 is used to perform the steps performed by the terminal device in the method embodiments corresponding to FIGS. 2 to 5, and the communication device 60 may include:
  • the sending module 601 is configured to send a random access message to a network device, where the random access message includes a random access preamble and a physical uplink shared channel PUSCH;
  • the monitoring module 602 is configured to monitor the first physical downlink control channel PDCCH according to the scrambling code in the preset scrambling code set, and the first PDCCH is used to schedule the first physical downlink shared channel PDSCH carrying the first response message for the PUSCH;
  • the receiving module 603 is configured to receive the first PDSCH from the network device according to the monitored first PDCCH.
  • the PUSCH may carry the identification of the terminal device; the monitoring module 602 may be specifically configured to be used according to at least one of the random access preamble, the identification of the terminal device, and the time-frequency resource of the PUSCH and preset
  • the first scrambling code is obtained by the operation relationship, and the first PDCCH is monitored according to the first scrambling code, wherein the preset operation relationship makes the first scrambling code located in the preset scrambling code set.
  • the monitoring module 602 may be specifically configured to obtain the first scrambling code according to the identification of the terminal device, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the preset operation relationship may be:
  • X is the first scrambling code
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set
  • mod() is taken Modular operation.
  • the preset operation relationship is:
  • index is the index of the scrambling code in the preset scrambling code set
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x index is the scrambling code with index index
  • ⁇ x 0 is a scrambling code with index
  • x N-1 is a scrambling code with index N-1
  • X is a first scrambling code.
  • the monitoring module 602 may be specifically configured to obtain the first value according to the position information of the time-frequency resource of the PUSCH; and according to the first value, the number of scrambling codes in the preset scrambling code set, and the preset calculation Relation to get the first scrambling code.
  • the communication device 60 may further include a determining module 604 and an adjusting module 605; the determining module 604 may be used to determine the RA-RNTI corresponding to the time-frequency resource used to send the random access preamble; the adjusting module 605 can be used to adjust the first scrambling code according to the preset offset value if the RA-RNTI and the first scrambling code are the same; the monitoring module 602 is used to monitor according to the first scrambling code When the first PDCCH is used, it can be specifically used to monitor the first PDCCH using the adjusted first scrambling code.
  • the first response message may carry TC-RNTI; the communication device 60 may further include a setting module 606, and the setting module 606 may be used to set the TC-RNTI to C-RNTI.
  • the first response message may carry C-RNTI.
  • the monitoring module 602 may also be used to if the second PDCCH scrambled with RA-RNTI is monitored, the second PDCCH is used to schedule the second PDSCH carrying the second response message for the random access preamble ,
  • the second response message carries uplink scheduling information;
  • the monitoring module 602 can also be used to if the second response message carries the second scrambling code, use the second scrambling code to monitor the third PDCCH, the third PDCCH is used to schedule the third PDSCH, and the third The PDSCH is used to carry a response message for the uplink transmission scheduled by the uplink scheduling information; and/or, if the second response message does not carry any scrambling code, the first scrambling code is used to monitor the third PDCCH.
  • FIG. 7 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • the terminal device 70 may include a transceiver 701, a processor 702, and a memory 703.
  • the transceiver 701, the processor 702, and the memory 703 may pass through One or more communication buses are connected to each other, and can also be connected in other ways.
  • the related functions implemented by the sending module 601, the monitoring module 602, the receiving module 603, the determining module 604, the adjusting module 605, and the setting module 606 shown in FIG. 6 can be implemented by the same processor 702, or by multiple different The processor 702 is implemented.
  • the transceiver 701 may be used to send data and/or signaling, and receive data and/or signaling.
  • the transceiver 701 may be used to send a random access message to a network device, and may also be used to receive the first PDSCH from the network device.
  • the processor 702 is configured to perform corresponding functions of the terminal device in the methods described in FIGS. 2 to 5.
  • the processor 702 may include one or more processors.
  • the processor 702 may be one or more central processing units (CPUs), network processors (network processors, NPs), hardware chips, or any of them. combination.
  • the processor 702 is a CPU, the CPU may be a single-core CPU or a multi-core CPU.
  • the memory 703 is used to store program codes and the like.
  • the memory 703 may include a volatile memory (volatile memory), such as a random access memory (random access memory, RAM); the memory 703 may also include a non-volatile memory (non-volatile memory), such as a read-only memory (read-only memory).
  • volatile memory volatile memory
  • non-volatile memory non-volatile memory
  • read-only memory read-only memory
  • ROM read-only memory
  • flash memory flash memory
  • HDD hard disk drive
  • SSD solid-state drive
  • memory 703 may also include a combination of the foregoing types of memories.
  • the processor 702 may call the program code stored in the memory 703 to perform the following operations:
  • the random access message includes the random access preamble and the physical uplink shared channel PUSCH;
  • the first PDCCH is used to schedule the first physical downlink shared channel PDSCH carrying the first response message for the PUSCH;
  • the PUSCH may carry the identification of the terminal device; when the processor 702 monitors the first PDCCH according to the scrambling code in the preset scrambling code set, the following operations may be specifically performed: according to the random access preamble, The first scrambling code is obtained by at least one of the identification of the terminal device and the PUSCH time-frequency resource and the preset operation relationship, and the first PDCCH is monitored according to the first scrambling code, wherein the preset operation relationship is such that the first scrambling code Located in the preset scrambling code set.
  • the processor 702 may specifically perform the following operations: obtain the first scrambling code according to the identification of the terminal device, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the preset operation relationship may be:
  • X is the first scrambling code
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set.
  • the preset operation relationship is:
  • index is the index of the scrambling code in the preset scrambling code set
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x index is the scrambling code with index index
  • ⁇ x 0 is a scrambling code with index
  • x N-1 is a scrambling code with index N-1
  • X is a first scrambling code.
  • the processor 702 may specifically perform the following operations: obtain the first value according to the location information of the PUSCH time-frequency resource; and according to the first value, the number of scrambling codes in the preset scrambling code set and the preset The first scrambling code is obtained by the operation relationship of.
  • the processor 702 may also perform the following operations: determine the RA-RNTI corresponding to the time-frequency resource used to send the random access preamble; if the RA-RNTI and the first scrambling code are the same, according to the preset The offset value of is adjusted to the first scrambling code to obtain the adjusted first scrambling code; when monitoring the first PDCCH according to the first scrambling code, it can be specifically used to monitor the first PDCCH using the adjusted first scrambling code.
  • the first response message may carry TC-RNTI; the processor 702 may also perform the following operations: set the TC-RNTI to the C-RNTI.
  • the first response message may carry C-RNTI.
  • the processor 702 may also perform the following operations: if the second PDCCH scrambled with RA-RNTI is monitored, the second PDCCH is used to schedule the first response message carrying the second response message for the random access preamble. Second PDSCH, the second response message carries uplink scheduling information; if the second response message carries the second scrambling code, use the second scrambling code to monitor the third PDCCH, the third PDCCH is used to schedule the third PDSCH, and the third PDSCH is used to carry The response message of the uplink transmission scheduled by the uplink scheduling information; and/or, if the second response message does not carry any scrambling code, the first scrambling code is used to monitor the third PDCCH.
  • the processor 702 may also perform operations corresponding to the terminal device in the embodiments shown in FIG. 2 to FIG. 5. For details, please refer to the description in the method embodiment, which will not be repeated here.
  • FIG. 8 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the communication device 80 is used to execute the steps performed by the network device in the method embodiment corresponding to FIGS. 2 to 5, and the communication device 80 may include:
  • the receiving module 801 is configured to receive a random access message, where the random access message includes a random access preamble and a physical uplink shared channel PUSCH;
  • the generating module 802 is configured to generate a first response message for the PUSCH if the PUSCH is successfully decoded;
  • the sending module 803 is configured to send the first physical downlink control channel PDCCH for scheduling the first physical downlink shared channel PDSCH, where the first PDCCH is scrambled by using a scrambling code in a preset scrambling code set, and the first PDSCH is used for Carry the first response message for PUSCH.
  • the PUSCH may carry the identification of the terminal device; the communication device 80 may also include: a processing module 804 and a scrambling module 805; the processing module 804 may be used to perform random access preamble, terminal device identification and At least one of the PUSCH time-frequency resources and a preset operation relationship obtain the first scrambling code, where the preset operation relationship makes the first scrambling code located in the preset scrambling code set; the scrambling module 805 can be used for The first PDCCH is scrambled according to the first scrambling code.
  • the processing module 804 may be specifically configured to obtain the first scrambling code according to the identification of the terminal device, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the preset operation relationship may be:
  • X is the first scrambling code
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set.
  • the preset operation relationship may be:
  • index is the index of the scrambling code in the preset scrambling code set
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x index is the scrambling code with index index
  • ⁇ x 0 is a scrambling code with index
  • x N-1 is a scrambling code with index N-1
  • X is a first scrambling code.
  • the processing module 804 may be specifically configured to obtain the first value according to the position information of the time-frequency resource of the PUSCH, and according to the first value, the number of scrambling codes in the preset scrambling code set, and the preset calculation Relation to get the first scrambling code
  • the communication device 80 may further include a determining module 806 and an adjusting module 807; the determining module 806 may be used to determine the RA-RNTI corresponding to the time-frequency resource used to send the random access preamble; the adjusting module 807 can be used to adjust the first scrambling code according to the preset offset value if the RA-RNTI and the first scrambling code are the same; the scrambling module 805 can be specifically used to adjust the first scrambling code according to the adjusted Scramble the first PDCCH with the first scrambling code.
  • the first response message may carry TC-RNTI; the communication device 80 may further include a setting module 808, and the setting module 808 may be used to set the TC-RNTI to C-RNTI.
  • the first response message may carry C-RNTI.
  • the generating module 802 can also be used to generate a second response message for the random access preamble if the random access preamble is successfully detected; the sending module 803 can also be used to send the second response message for the scheduling bearer
  • the second PDCCH of the second PDSCH of the second response message the second PDCCH is scrambled by RA-RNTI, and the second response message carries uplink scheduling information; the sending module 803 can also be used to send if the second response message carries the second scrambling code
  • FIG. 8 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the network device 90 may include a transceiver 901, a processor 902, and a memory 903.
  • the transceiver 901, the processor 902, and the memory 903 may One or more communication buses are connected to each other, and can also be connected in other ways.
  • the relevant functions implemented by the receiving module 801, the generating module 802, the sending module 803, the processing module 804, the scrambling module 805, the determining module 806, the adjusting module 807, and the setting module 808 shown in FIG. 8 can be implemented by the same processor 902 Implementation can also be implemented by multiple different processors 902.
  • the transceiver 901 may be used to send data and/or signaling, and receive data and/or signaling.
  • the transceiver 901 may be used to transmit the first PDCCH used to schedule the first PDSCH, and may also be used to receive random access messages.
  • the processor 902 is configured to perform corresponding functions of the network device in the methods described in FIGS. 2 to 5.
  • the processor 902 may include one or more processors.
  • the processor 902 may be one or more central processing units (CPUs), network processors (network processors, NPs), hardware chips, or any of them. combination.
  • the processor 902 is a CPU
  • the CPU may be a single-core CPU or a multi-core CPU.
  • the memory 903 is used to store program codes and the like.
  • the memory 903 may include a volatile memory (volatile memory), such as a random access memory (random access memory, RAM); the memory 903 may also include a non-volatile memory (non-volatile memory), such as a read-only memory (read-only memory). Only memory (ROM), flash memory (flash memory), hard disk drive (HDD) or solid-state drive (SSD); the memory 903 may also include a combination of the foregoing types of memories.
  • volatile memory volatile memory
  • RAM random access memory
  • non-volatile memory such as a read-only memory (read-only memory).
  • SSD solid-state drive
  • the processor 902 may call the program code stored in the memory 903 to perform the following operations:
  • Receive random access messages which include random access preambles and physical uplink shared channel PUSCH;
  • the PUSCH may carry the identification of the terminal device; the processor 902 may also perform the following operations: according to at least one of the random access preamble, the identification of the terminal device, and the PUSCH time-frequency resource and preset
  • the first scrambling code is obtained according to the operation relationship of, and the first PDCCH is scrambled according to the first scrambling code, wherein the preset operation relationship is such that the first scrambling code is located in the preset scrambling code set.
  • the processor 902 may specifically perform the following operations: obtain the first scrambling code according to the identification of the terminal device, the number of scrambling codes in the preset scrambling code set, and the preset operation relationship.
  • the preset operation relationship may be:
  • X is the first scrambling code
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x min is the smallest scrambling code in the preset scrambling code set.
  • the preset operation relationship may be:
  • index is the index of the scrambling code in the preset scrambling code set
  • UE_ID is the identification of the terminal device
  • N is the number of scrambling codes in the preset scrambling code set
  • x index is the scrambling code with index index
  • ⁇ x 0 is a scrambling code with index
  • x N-1 is a scrambling code with index N-1
  • X is a first scrambling code.
  • the processor 902 may specifically perform the following operations: obtain the first value according to the position information of the PUSCH time-frequency resource, and according to the first value, the number of scrambling codes in the preset scrambling code set and the preset The first scrambling code is obtained by the operation relationship of.
  • the processor 902 may also perform the following operations: determine the RA-RNTI corresponding to the time-frequency resource used to send the random access preamble; if the RA-RNTI and the first scrambling code are the same, according to the preset Adjust the first scrambling code to obtain the adjusted first scrambling code; when the processor 902 scrambles the first PDCCH according to the first scrambling code, the following operations may be specifically performed: according to the adjusted first scrambling code A scrambling code scrambles the first PDCCH.
  • the first response message may carry TC-RNTI; the processor 902 may also perform the following operations: set TC-RNTI to C-RNTI.
  • the first response message may carry C-RNT.
  • the processor 902 may also perform the following operations: if the random access preamble is successfully detected, generate a second response message for the random access preamble; send a second response message for scheduling the second response message; The second PDCCH of the second PDSCH, the second PDCCH is scrambled with RA-RNTI, and the second response message carries uplink scheduling information; if the second response message carries the second scrambling code, the third PDCCH used to schedule the third PDSCH is sent.
  • Three PDCCHs are scrambled using the second scrambling code, and the third PDSCH is used to carry a response message for uplink transmission scheduled by uplink scheduling information; and/or, if the second response message does not carry any scrambling code, it is sent for scheduling
  • the third PDCCH of the third PDSCH, and the third PDCCH is scrambled using the first scrambling code.
  • processor 902 may also perform operations corresponding to the network device in the embodiments shown in FIG. 2 to FIG. 5. For details, please refer to the description in the method embodiment, which will not be repeated here.
  • the embodiment of the present application also provides a computer-readable storage medium, which can be used to store computer software instructions used by the communication device in the embodiment shown in FIG. 6, which includes a program for executing the terminal device in the above-mentioned embodiment.
  • the embodiment of the present application also provides a computer-readable storage medium, which can be used to store computer software instructions used by the communication device in the embodiment shown in FIG. 8, which includes a program for executing the program designed for the network device in the above embodiment.
  • the aforementioned computer-readable storage medium includes, but is not limited to, flash memory, hard disk, and solid state hard disk.
  • the embodiments of the present application also provide a computer program product.
  • the computer product When the computer product is run by a computing device, it can execute the method designed for the terminal device in the above-mentioned embodiments of FIG. 2 to FIG. 5.
  • the embodiments of the present application also provide a computer program product.
  • the computer product When the computer product is run by a computing device, it can execute the method designed for the network device in the above-mentioned embodiments of FIG. 2 to FIG. 5.
  • An embodiment of the present application also provides a chip, including a processor and a memory, the memory includes a processor and a memory, the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory.
  • the computer program is used to implement the method in the above method embodiment.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted through the computer-readable storage medium.
  • the computer instructions can be sent from one website site, computer, server, or data center to another website site via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) , Computer, server or data center for transmission.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例公开了一种随机接入方法和实现该方法的装置。该方法包括:终端设备向网络设备发送随机接入消息,随机接入消息包括随机接入前导码和物理上行共享信道PUSCH;终端设备根据预设的扰码集合中的扰码监听第一物理下行控制信道PDCCH,第一PDCCH用于调度携带针对PUSCH的第一响应消息的第一物理下行共享信道PDSCH;终端设备根据监听到的第一PDCCH接收第一PDSCH。通过实施本申请实施例,有利于终端设备成功获得PDCCH调度的PDSCH。

Description

一种随机接入方法及其装置
本申请要求于2019年5月1日提交中国专利局、申请号为201910370990.0、申请名称为“一种随机接入方法及其装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种随机接入方法及其装置。
背景技术
随机接入过程是指从用户发送随机接入前导码(Preamble),开始尝试接入网络到与网络间建立起基本的信令连接之前的过程,随机接入过程有两种类型:竞争随机接入和非竞争随机接入。在竞争随机接入过程中,终端设备所支持的无线资源控制(Radio Resource Control,RRC)状态有三种:RRC空闲态、RRC非活跃态和RRC连接态。
当终端设备处于RRC空闲态或者RRC非活跃态时,四步随机接入的过程如图1a所示:终端设备通过物理随机接入信道(Physical Random Access Channel,PRACH)向网络设备发送Msg1,Msg1包括Preamble;网络设备接收到Preamble之后,生成针对Preamble的随机接入响应(Random Access Response,RAR)并发送RAR(即Msg2),其中,RAR承载于第一物理下行共享信道(Physical Downlink shared channel,PDSCH),第一PDSCH由第一物理下行控制信道(Physical Downlink Control Channel,PDCCH)调度,RAR中携带临时小区无线网络临时标识(Temporary Cell Radio Network Temporary Identifier,TC-RNTI),第一PDCCH用随机接入无线网络临时标识(Random Access Radio Network Temporary Identifier,RA-RNTI)加扰;终端设备发送Preamble之后,如果监听到由RA-RNTI加扰的第一PDCCH,则根据监听到的第一PDCCH接收第一PDSCH,并对第一PDSCH进行解调,从而得到承载于第一PDSCH上的RAR,然后向网络设备发送Msg3,Msg3承载于物理上行共享信道(Physical uplink shared channel,PUSCH);网络设备接收到终端设备发送的PUSCH之后,生成针对PUSCH的响应(即Msg4),针对PUSCH的响应承载于第二PDSCH,第二PDSCH由第二PDCCH调度,第二PDCCH用TC-RNTI加扰,针对PUSCH的响应可以包括终端竞争解决标识(Contention Resolution Identity,CRID),终端设备根据该CRID可以确定竞争接入是否成功;终端设备在发送PUSCH之后,如果监听到用TC-RNTI加扰的第二PDCCH,则根据监听到的第二PDCCH接收第二PDSCH,并对第二PDSCH进行解调,从而得到承载于第二PDSCH上的CRID,并根据CRID确定竞争接入是否成功。
但是,在某些场景(如两步随机接入过程或者其他场景下)下终端设备无法获取网络设备为其配置的TC-RNTI,以图1b所示的两步随机接入的流程示意图为例,在两步随机接入过程中,终端设备可以同时发送Preamble和PUSCH,网络设备在接收到Preamble和PUSCH之后,可以生成针对Preamble的响应(RAR)和针对PUSCH的响应,并将RAR和针对PUSCH的响应承载于PDSCH之上发送,并且发送用于调度PDSCH的PDCCH,其中,PDCCH可以使用TC-RNTI加扰。
由图1b可知,当终端设备处于RRC空闲态或者RRC非活跃态时,由于终端设备无法 提前获得网络设备为其配置的TC-RNTI,也就无法监听到用TC-RNTI加扰的PDCCH,导致终端设备无法获得PDCCH调度的PDSCH。
发明内容
本申请实施例提供了一种随机接入方法及其装置,有利于终端设备成功获得PDCCH调度的PDSCH。
第一方面,本申请实施例提供了一种随机接入方法,该方法包括:终端设备向网络设备发送随机接入消息,随机接入消息包括随机接入前导码和物理上行共享信道PUSCH;终端设备根据预设的扰码集合中的扰码监听第一物理下行控制信道PDCCH,第一PDCCH用于调度携带针对PUSCH的第一响应消息的第一物理下行共享信道PDSCH;终端设备根据监听到的第一PDCCH接收第一PDSCH。
在该技术方案中,预设的扰码集合可以是网络设备与终端设备预先约定的,若网络设备生成了针对PUSCH的第一响应信息,那么用于调度承载有第一响应消息的第一PDSCH的第一PDCCH采用预设的扰码集合中的扰码加扰,终端设备根据预设的扰码集合中的扰码监听第一PDCCH,使得终端设备可以成功监听到网络设备发送的第一PDCCH,从而有利于终端设备成功获得第一PDCCH调度的第一PDSCH。
在一种实现方式中,PUSCH可以承载有终端设备的标识,终端设备根据预设的扰码集合中的扰码监听第一PDCCH的具体实施方式可以为:终端设备根据随机接入前导码、终端设备的标识和用于发送PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,并根据第一扰码监听第一PDCCH,其中,预设的运算关系使得第一扰码位于预设的扰码集合中。
在该技术方案中,终端设备根据随机接入前导码、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系可以得到一个唯一且确定的第一扰码,相较于对预设的扰码集合中的扰码进行逐个尝试才能确定是否监听到用预设的扰码集合中的扰码加扰的第一PDCCH的方式,采用本技术方案可以有效提高终端设备监听第一PDCCH的效率,从而有利于提高随机接入效率。
在一种实现方式中,终端设备具体地根据终端设备的标识、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,当预设的扰码集合中的扰码为连续的扰码时,预设的运算关系可以为:
X=mod(UE_ID,N)+x min
其中,X为第一扰码,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码时,预设的运算关系可以为:
index=mod(UE_ID,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集 合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码,X为第一扰码。
在一种实现方式中,终端设备具体地根据随机接入前导码、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,当预设的扰码集合中的扰码为连续的扰码时,预设的运算关系可以为:
X=mod(Preamble index,N)+x min
其中,X为第一扰码,Preamble index为随机接入前导码的索引,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码时,预设的运算关系可以为:
index=mod(Preamble index,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,N为预设的扰码集合中扰码的数量,X为第一扰码,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码。
在一种实现方式中,终端设备具体地根据用于发送所述PUSCH的时频资源的位置信息得到第一数值,并根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,终端设备根据PUSCH的时频资源的位置信息得到第一数值的运算关系如下:
PO value=1+s_id+a*t_id+a*b*f_id+a*b*c*ul_carrier_id
其中,PO value为第一数值,s_id表示所述PUSCH的时域资源的第一个OFDM符号,t_id表示所述PUSCH的时域资源的第一个时隙在系统帧中的索引;f_id表示所述PUSCH的频域资源在频域的索引;ul_carrier_id表示随机接入过程中传输随机接入消息中所述PUSCH的上行载波,a可以为一个时隙包含的OFDM符号的数量,b可以为系统帧包含的时隙数量,c可以是为可分配给PUSCH(或随机接入信道)的最大频域资源数量。
在一种实现方式中,终端设备根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码,且预设的扰码集合中的扰码为连续的扰码,预设的扰码集合为{x min,…,x max}时,预设的运算关系可以为:
X=mod(PO value,N)+x min
其中,X为第一扰码,PO value为第一数值,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码,且预设的扰码集合为{x 0,…,x N-1}时,预设的运算关系可以为:
index=mod(PO value,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,PO value为第一数值,N为预设的扰码集合中扰码的数量,X为第一扰码,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码。
在一种实现方式中,该方法还可以包括:终端设备确定用于发送随机接入前导码的时 频资源所对应的随机接入无线网络临时标识RA-RNTI;如果RA-RNTI和第一扰码相同,终端设备根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码;终端设备根据第一扰码监听第一PDCCH的具体实施方式可以为:终端设备使用调整后的第一扰码监听第一PDCCH。
在该技术方案中,当RA-RNTI和第一扰码相同时,终端设备通过预设的偏移值对第一扰码进行调整,并使用调整后的第一扰码监听第一PDCCH,可以避免网络设备采用第一扰码对第一PDCCH(第一PDCCH用于调度第一PDSCH,第一PDSCH用于承载针对PUSCH的响应消息)进行加扰,并根据RA-RNTI对用于调度承载有针对Preamble的响应消息的PDSCH的PDCCH进行加扰时,导致终端设备无法根据加扰序列区分接收到的响应信息是针对PUSCH的响应消息(即第一响应消息)还是针对Preamble的响应消息的情况。
在一种实现方式中,第一响应消息可以携带临时小区无线网络临时标识TC-RNTI,该方法还可以包括:终端设备将TC-RNTI设置为小区无线网络临时标识C-RNTI。
在一种实现方式中,第一响应消息可以携带小区无线网络临时标识C-RNTI。
在一种实现方式中,该方法还可以包括:如果终端设备监听到使用RA-RNTI加扰的第二PDCCH,第二PDCCH用于调度承载针对随机接入前导码的第二响应消息的第二PDSCH,第二响应消息携带上行调度信息;如果第二响应消息携带第二扰码,终端设备采用第二扰码监听第三PDCCH,第三PDCCH用于调度第三PDSCH,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息;和/或,如果第二响应消息未携带任何扰码,终端设备采用第一扰码监听第三PDCCH。
第二方面,本申请实施例提供了另一种随机接入方法,该方法包括:网络设备接收随机接入消息,随机接入消息包括随机接入前导码和物理上行共享信道PUSCH;如果成功解码PUSCH,网络设备生成针对PUSCH的第一响应消息;网络设备发送用于调度第一PDSCH的第一PDCCH,其中,第一PDCCH使用预设的扰码集合中的扰码加扰,第一PDSCH用于承载针对PUSCH的第一响应消息。
在该技术方案中,预设的扰码集合可以是网络设备与终端设备预先约定的,终端设备会根据预设的扰码集合中的扰码监听网络设备发送的第一PDCCH,网络设备发送使用预设的扰码集合中的扰码加扰的第一PDCCH,使得终端设备可以成功监听到网络设备发送的第一PDCCH,从而有利于终端设备成功获得第一PDCCH调度的第一PDSCH。
在一种实现方式中,PUSCH可以承载有终端设备的标识,该方法还可以包括:网络设备根据随机接入前导码、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,并根据第一扰码对第一PDCCH进行加扰,其中,预设的运算关系可以使得第一扰码位于预设的扰码集合中。
在该技术方案中,网络设备根据随机接入前导码、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系可以得到一个唯一且确定的第一扰码,该第一扰码用于对第一PDCCH进行加扰,若终端设备采用相同方式计算得到的一个相同的扰码,并采用该扰码监听网络设备发送的第一PDCCH,可以有效提高网络设备发送的第一PDCCH被终端设备成功检测到的概率。
在一种实现方式中,网络设备具体地根据终端设备的标识、预设的扰码集合中扰码的 数量和预设的运算关系得到第一扰码。
在一种实现方式中,当预设的扰码集合中的扰码为连续的扰码时,预设的运算关系可以为:
X=mod(UE_ID,N)+x min
其中,X为第一扰码,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码时,预设的运算关系可以为:
index=mod(UE_ID,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码,X为第一扰码。
在一种实现方式中,网络设备具体地根据随机接入前导码、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,当预设的扰码集合中的扰码为连续的扰码时,预设的运算关系可以为:
X=mod(Preamble index,N)+x min
其中,X为第一扰码,Preamble index为随机接入前导码索引,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码时,预设的运算关系可以为:
index=mod(Preamble index,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,N为预设的扰码集合中扰码的数量,X为第一扰码,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码。
在一种实现方式中,网络设备具体地根据PUSCH的时频资源的位置信息得到第一数值,并根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,网络设备根据所述PUSCH的时频资源的位置信息得到第一数值的运算关系如下:
PO value=1+s_id+a*t_id+a*b*f_id+a*b*c*ul_carrier_id
其中,PO value为第一数值,s_id表示所述PUSCH的时域资源的第一个OFDM符号,t_id表示所述PUSCH的时域资源的第一个时隙在系统帧中的索引;f_id表示所述PUSCH的频域资源在频域的索引;ul_carrier_id表示随机接入过程中传输随机接入消息中所述PUSCH的上行载波,a可以为一个时隙包含的OFDM符号的数量,b可以为系统帧包含的时隙数量,c可以是为可分配给PUSCH(或随机接入信道)的最大频域资源数量。
在一种实现方式中,网络设备根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码,且预设的扰码集合中的扰码为连续的扰码,预设的扰码集合为{x min,…,x max}时,预设的运算关系可以为:
X=mod(PO value,N)+x min
其中,X为第一扰码,PO value为第一数值,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码,且预设的扰码集合为{x 0,…,x N-1}时,预设的运算关系可以为:
index=mod(PO value,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,PO value为第一数值,N为预设的扰码集合中扰码的数量,X为第一扰码,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码。
在一种实现方式中,网络设备确定用于发送随机接入前导码的时频资源所对应的随机接入无线网络临时标识RA-RNTI;如果RA-RNTI和第一扰码相同,网络设备根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码;网络设备根据第一扰码对第一PDCCH进行加扰的具体实施方式可以为:网络设备根据调整后的第一扰码对第一PDCCH进行加扰。
在该技术方案中,当RA-RNTI和第一扰码相同时,网络设备通过预设的偏移值对第一扰码进行调整,并根据调整后的第一扰码对第一PDCCH进行加扰,使得终端设备可以根据扰码序列区分采用调整后的第一扰码加扰的第一PDCCH调度的第一PDSCH承载的是针对PUSCH的第一响应消息,采用RA-RNTI加扰的PDCCH调度的PDSCH承载的是针对Preamble的响应消息。
在一种实现方式中,第一响应消息可以携带临时小区无线网络临时标识TC-RNTI,该方法还可以包括:网络设备将TC-RNTI设置为终端设备对应的小区无线网络临时标识C-RNTI。
在一种实现方式中,第一响应消息可以携带小区无线网络临时标识C-RNTI。
在一种实现方式中,该方法还可以包括:如果成功检测到随机接入前导码,网络设备生成针对随机接入前导码的第二响应消息,并发送用于调度承载第二响应消息的第二PDSCH的第二PDCCH,第二PDCCH使用RA-RNTI加扰,第二响应消息携带上行调度信息;如果第二响应消息携带第二扰码,网络设备发送用于调度第三PDSCH的第三PDCCH,第三PDCCH使用第二扰码加扰,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息;和/或,如果第二响应消息未携带任何扰码,网络设备发送用于调度第三PDSCH的第三PDCCH,第三PDCCH使用第一扰码加扰。
第三方面,本申请实施例提供了一种通信装置,该装置具有实现第一方面所述的随机接入方法的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
第四方面,本申请实施例提供了另一种通信装置,该装置具有实现第二方面所述的随机接入方法的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
第五方面,本申请实施例提供一种计算机可读存储介质,用于储存为第三方面所述的通信装置所用的计算机程序指令,其包含用于执行上述第一方面所涉及的程序。
第六方面,本申请实施例提供一种计算机可读存储介质,用于储存为第四方面所述的通信装置所用的计算机程序指令,其包含用于执行上述第二方面所涉及的程序。
第七方面,本申请实施例提供一种终端设备,该终端设备包括存储器和处理器,存储器中存储有程序指令,处理器调用存储器中存储的程序指令以使得所述终端设备实现第一方面所述的随机接入方法。
第八方面,本申请实施例提供一种网络设备,该网络设备包括存储器和处理器,存储器中存储有程序指令,处理器调用存储器中存储的程序指令以使得所述网络设备实现第二方面所述的随机接入方法。
第九方面,本申请实施例提供一种计算机程序产品,该程序产品包括程序,所述程序被通信装置执行时,使得所述通信装置实现上述第一方面所述的方法。
第十方面,本申请实施例提供一种计算机程序产品,该程序产品包括程序,所述程序被通信装置执行时,使得所述通信装置实现上述第二方面所述的方法。
附图说明
图1a是本申请实施例公开的一种四步随机接入的流程示意图;
图1b是本申请实施例公开的一种两步随机接入的流程示意图;
图1c是本申请实施例公开的一种通信系统的架构示意图;
图2是本申请实施例公开的一种随机接入方法的流程示意图;
图3是本申请实施例公开的另一种随机接入方法的流程示意图;
图4是本申请实施例公开的又一种随机接入方法的结构示意图;
图5是本申请实施例公开的又一种随机接入方法的流程示意图;
图6是本申请实施例公开的一种通信装置的结构示意图;
图7是本申请实施例公开的一种终端设备的结构示意图;
图8是本申请实施例公开的另一种通信装置的结构示意图;
图9是本申请实施例公开的一种网络设备的结构示意图。
具体实施方式
为了便于理解,介绍本申请涉及的基本概念。
一、加扰
加扰,是数字信号的加工处理方法,用扰码与原始信号异或运算,从而得到新的信号。通常上行链路物理信道加扰的作用是区分不同的终端设备,下行链路加扰可以区分小区和信道。其中,扰码可用于对原始信号加扰和解扰。例如,扰码可以对下行控制信息(downlink control information,DCI)加扰,或者也可称为对PDCCH加扰。对DCI加扰具体是指对DCI的循环冗余校验(cyclic redundancy check,CRC)字段进行加扰。相应地,终端设备对接收到的DCI进行解扰,具体是指终端设备对DCI的CRC字段使用相应类型的扰码进行解扰,以确定DCI的格式或者类型等。
扰码可以包括但不限于:小区无线网络临时标识(cell radio network temporary identifier,C-RNTI)、临时小区无线网络临时标识(temporary cell radio network temporary identifier, TC-RNTI)和随机接入无线网络临时标识(random accessradio network temporary identifier,RA-RNTI)。
二、C-RNTI
若终端设备处于无线资源控制连接(radio resource control connected,RRC-connected)态,说明终端设备已经被分配到了C-RNTI,终端设备向网络设备发起随机接入请求时需要携带该C-RNTI。若终端设备处于RRC空闲(RRC idle)态或者RRC非活跃(RRC inactive)态,说明终端设备还未被分配到C-RNTI。若终端设备请求RRC连接,网络设备在后续的响应信息(例如四步随机接入流程的Msg2)里可能会给终端设备分配一个临时C-RNTI,记为TC-RNTI,待终端设备确认竞争解决成功后,可以将TC-RNTI转为C-RNTI。
三、TC-RNTI
在竞争解决模式下,网络设备在响应消息(例如四步随机接入流程的Msg2)中可以给终端设备分配一个TC-RNTI,用于在后续的数据传输过程(例如四步随机接入流程的Msg3和Msg4)中携带该TC-RNTI以标识该终端设备。当终端设备随机接入成功后,TC-RNTI可转化为C-RNTI。
四、RA-RNTI
在随机接入流程中,RA-RNTI的生成与终端设备发送前导码所用的时频资源相关。例如,当终端设备A和终端设备B使用同一个随机接入信道时频资源发起随机接入时,对应的RA-RNTI是相同的。以四步随机接入流程为例,当网络设备检测到发送前导码的随机接入时频资源后,可计算出RA-RNTI,网络设备在PDCCH上基于一种DCI格式处理,处理过程中使用RA-RNTI对DCI进行加扰。网络设备向终端设备发送针对前导码的响应信息,终端设备知道自己发送前导码的时频资源信息,因此也可以计算出RA-RNTI,终端设备可检测接收到的PDCCH上是否有自己对应的RA-RNTI;若有,则说明随机接入请求被网络设备响应,终端设备继续解调PDCCH承载的DCI所指示的PDSCH,如果解调得到的前导码与终端设备自己发送的前导码相同,那么终端设备可以启动后续流程,如冲突竞争解决流程。示例性地,计算RA-RNTI的一种方式可为RA-RNTI=1+s_id+14*t_id+14*80*f_id+14*80*8*ul_carrier_id,其中,s_id表示所使用的随机接入信道时域资源的第一个正交频分复用(orthogonal frequency division multiplexing,OFDM)符号(协议中规定一个时隙包含14个OFDM符号),t_id表示该随机接入信道时域资源的第一个时隙在系统帧中索引(协议中规定系统帧的最大子载波间隔为120KHz,即系统帧中包含80个时隙);f_id表示该随机接入信道的频域资源在频域的索引(协议中规定给随机接入信道分配的频域资源个数最大为8);ul_carrier_id表示随机接入过程中传输随机接入消息的上行载波,其中,ul_carrier_id的取值可以为0或1,0表示正常上行链路(normal uplink,NUL),1表示补充上行链路(supplementary uplink,SUL)。
五、物理信道
物理信道由物理层用于具体信号的传输。物理信道包括:(a)物理层下行共享信道(physical downlink shared channel,PDSCH),用于承载下行业务数据等;(b)物理层下行控制信道(physical downlink control channel,PDCCH),用于承载下行调度信息,如信道分配和下行控制信息(downlink control information,DCI),即DCI由PDCCH承载;(c) 物理层上行共享信道(physical uplink shared channel,PUSCH),用于承载上行控制信息和/或业务数据;(d)物理层上行控制信道(physical uplink control channel,PUCCH),用于承载上行控制信息,如确认应答(Acknowledgement,ACK)/否定应答(Negative Acknowledgement,NACK)等。(e)物理层随机接入信道(physical random access channel,PRACH),用于终端设备发起与网络设备的通信。终端设备随机接入时发送前导码,网络设备通过PRACH接收前导码,确定接入终端设备的身份。
六、前导码
前导码(Preamble),即随机接入前导。在一实施例中,用于随机接入时网络设备识别终端设备的身份,或者用于网络设备区分发起随机接入的设备,也可以用作其它用途,本申请实施例中不做限定。在长期演进(Long Term Evolution,LTE)和Rel-15 NR(New Radio)通信系统中,每个小区有64个前导码。可选地,终端设备向网络设备发送随机接入请求时可以携带前导码,网络设备向终端设备发送响应信息时,为了减少响应信息的大小,可以发送前导码的索引。如下实施例中为了方便说明,均以前导码为例进行说明。
为了更好的理解本申请实施例公开的一种随机接入方法,下面首先对本申请实施例适用的通信系统进行描述。
请参见图1c,图1c是本申请实施例公开的一种通信系统的架构示意图。如图1c所示,该通信系统包括:基站101和终端设备102。
基于上述通信系统架构,当终端设备(如图1c所示的终端设备102)为了与网络设备(如图1c所示的基站101)建立连接或者取得上行同步,通常需要终端设备向网络设备发起随机接入流程。终端设备在如下几种场景下可能会发起随机接入流程。
场景1:终端设备初始无线资源控制(radio resource control,RRC)连接建立,当终端设备从空闲态转到连接态时,终端设备会发起随机接入流程。
场景2:终端设备RRC连接重建,当终端设备与网络设备之间的无线连接失败后,终端设备需要重新建立RRC连接时,终端设备会发起随机接入流程。
场景3:当终端设备进行小区切换时,终端设备会在新小区发起随机接入流程。
场景4:下行数据到达、且终端设备处于连接态,网络设备有下行数据需要传输给终端设备,发现终端设备处于上行不同步状态,网络设备将触发终端设备发起随机接入流程。
场景5:上行数据到达、且终端设备处于连接态,终端设备有上行数据需要传输给网络设备,发现终端设备处于上行不同步状态或者无可用的上行资源用于上行数据的传输,终端设备发起随机接入流程。
可以理解的是,终端设备除在了上述场景下会发起随机接入,还可能在其它场景下发起随机接入,本申请实施例不限定。
图1c中,基站101可为终端设备102分配时频资源,可供基站101分配的时频资源中每个时频资源单元只能分配给一个终端设备使用,从而造成终端设备102和其他终端设备(图未示)需要对时频资源进行竞争。
当处于上述5种场景中的任意一种场景下,终端设备102可以向基站101发送随机接入消息,以向基站101发起随机接入流程,该随机接入消息可以包括Preamble和PUSCH。在一种实施例中,Preamble可用于告知基站101终端设备102需要与其建立连接或者用于 取得上行同步,或者用于其它用途;PUSCH可携带用于竞争解决的信息,例如,终端设备的标识。需要说明的是,Preamble可以通过物理随机接入信道PRACH发送,上行数据可以通过物理上行共享信道PUSCH发送。还需要说明的是,本申请实施例中提及的PUSCH或者上行数据都指的是承载于PUSCH上的上行数据,本申请实施例中提及的Preamble或者PRACH都指的是承载于PRACH上的Preamble。
基站101,接收到PUSCH后,可以对接收到的PUSCH进行解调和译码,如果基站101成功解调该接收到的PUSCH,可以生成针对该PUSCH的响应消息,并将响应消息承载于PDCCH调度的PDSCH发送。
为了确保终端设备102获得响应消息,基站101可以与终端设备102预先约定一个扰码集合,基站101可以根据该扰码集合中的扰码对用于调度PDSCH的PDCCH进行加扰。相应的,终端设备102向基站101发送随机接入消息之后,终端设备102可以采用该扰码集合中的扰码监听PDCCH,当终端设备102用于监听PDCCH的扰码与监听到的PDCCH所用的扰码相同时,终端设备102可以对PDCCH所调度的PDSCH进行解调,进而获取PDSCH上承载的响应消息。可选地,终端设备还可以根据响应消息,确定随机接入是否成功。
其中,终端设备是用户侧的一种用于接收或发射信号的实体,具体的,终端设备可以是用户设备(User Equipment,UE)、远程终端、移动终端、无线通信设备、用户装置等,其中,用户设备可以是手机、台式电脑、笔记本电脑或可穿戴设备等。
需要说明的是,图1c中基站仅接收到一个终端设备发送的随机接入消息仅用于举例,并不构成对本申请实施例的限定,在其他可行的实现方式中,基站还可以接收到其他终端设备发送的随机接入消息。
可以理解的是,本申请实施例描述的通信系统是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
下面结合附图对本申请所提供的随机接入方法及其装置进行详细地介绍。
请参见图2,图2是本申请实施例提供的一种随机接入方法的流程示意图,该方法可以包括但不限于如下步骤:
步骤S201:终端设备向网络设备发送随机接入消息,随机接入消息包括Preamble和PUSCH。
具体的,例如,当终端设备需要与网络设备建立连接或者取得上行同步时,可以通过向网络设备发送随机接入消息,该随机接入消息可以用于竞争接入,该随机接入消息可以包括Preamble和PUSCH。在一种实现方式中,网络设备预先为终端设备配置用于发送随机接入消息的时频资源,包括用于发送随机接入消息中的Preamble的PRACH时频资源和用于发送该随机接入消息中的PUSCH时频资源。终端设备可以通过网络设备预先为其配置的PRACH时频资源向网络设备发送随机接入消息中的Preamble,并通过网络设备为其预先配置的PUSCH时频资源向网络设备发送该随机接入消息中的上行数据(PUSCH)。
步骤S202:如果网络设备对PUSCH译码成功,生成针对PUSCH的第一响应消息。
在本申请实施例中,网络设备可以管理(配置)用于发送随机接入消息的时频资源,网络设备可以管理的时频资源可以包括PRACH时频资源和PUSCH时频资源。在一种实现方式中,网络设备可以通过广播系统信息来通知各个终端设备,允许在哪些时频资源上传输PRACH。在一种实现方式中,网络设备还可以通过广播系统信息来通知各个终端设备,允许在哪些时频资源上传输PUSCH。例如,当网络设备用于管理终端设备1和终端设备2使用的时频资源时,网络设备可以通知终端设备1为其配置的用于传输PUSCH的时频资源1,并通知终端设备2为其配置用于传输PUSCH的时频资源2上。其中,时频资源1和时频资源2可以相同,也可以不同。
具体的,网络设备通知各个终端设备可以在哪些时频资源上传输PRACH和PUSCH之后,可以在配置的PRACH时频资源和PUSCH时频资源上分别接收随机接入消息的PRACH(Preamble)和PUSCH(上行数据)。对于PRACH时频资源,终端设备可以在该PRACH时频资源上发送Preamble,网络设备可以在该PRACH时频资源上接收Preamble。同理,对于PUSCH时频资源,终端设备可以在该PUSCH时频资源上发送上行数据,网络设备可以在该PUSCH时频资源上接收上行数据。
如果网络设备成功检测到preamble并且对接收到的PUSCH译码成功,网络设备生成针对PUSCH的第一响应消息,并将第一响应消息承载于第一PDSCH之上,然后将第一PDSCH发送给终端设备。在一种实现方式中,所述第一PDSCH还可以携带针对Preamble的响应信息。在另一种实现方式中,所述第一PDSCH可以不携带针对Preamble的响应信息,该针对Preamble的响应信息而是携带在另外一个PDSCH中。
在一种实现方式中,如果网络设备只成功检测到Preamble,而对PUSCH译码失败,网络设备可以生成针对Preamble的第二响应消息,并将第二响应消息承载于第二PDSCH之上,然后将第二PDSCH发送给终端设备。
在一种实现方式中,第二响应消息可以指四步随机接入过程中的随机接入响应(random access response,RAR),或者,第二响应信息除了包括RAR中的信息以外,还可以包括其他信息。其中,该RAR可以包括preamble索引,定时提前命令(Timing Advance command,TA command),上行调度信息(Uplink grant,UL grant)和临时小区无线网络临时标识TC-RNTI中的一种或多种。其中,preamble索引是随机接入消息中的preamble的索引;TA command用于终端设备确定定时提前的时间大小;UL grant可以用于配置一部分时频资源供终端设备使用,终端设备可以利用这部分时频资源向网络设备发送上行数据。
其中,网络设备可以是用于发射或接收信号的实体,例如,网络设备可以是接入网设备(如图1c中的基站)。
步骤S203:网络设备发送用于调度第一PDSCH的第一PDCCH,第一PDSCH用于承载第一响应消息。
其中,第一PDCCH使用预设的扰码集合中的扰码加扰。在一种实现方式中,网络设备使用预设的扰码集合中的扰码对第一PDCCH进行加扰的具体实施方式可以为:网络设备在预设的扰码集合中随机选择一个扰码对第一PDCCH进行加扰。或者,网络设备根据扰码的数值大小在预设的扰码集合中选择一个最大(或者最小)的扰码对第一PDCCH进行加扰索引。
步骤S204:终端设备根据预设的扰码集合中的扰码监听第一PDCCH。
具体的,终端设备向网络设备发送随机接入消息之后,可以根据预设的扰码集合中的扰码监听第一PDCCH,以便在监听到第一PDCCH的情况下,根据监听到的第一PDCCH接收来自网络设备的第一PDSCH。
在一种实现方式中,预设的扰码集合中的扰码可以是连续的扰码,也可以是非连续的扰码。当预设的扰码集合中的扰码为连续的扰码时,预设的扰码集合可以是无线网络临时标识(Radio Network Temporary Identifier,RNTI)序列取值范围中连续的取值,该连续取值的范围和长度不限定,起始位置和终止位置不限定。例如,若RNTI序列取值范围为0001~FFEF时,预设的扰码集合的取值范围可以为0001~FFEF中的任意一段连续取值,例如,预设的扰码集合的取值范围可以为FF00-FFEF或者0001-FEFF。当预设的扰码集合中的扰码为非连续的扰码时,预设的扰码集合可以是RNTI序列取值范围中非连续的取值集合,该取值集合的长度不限定,起始位置和终止位置不限定。例如,若RNTI序列取值范围为0001~FFEF时,预设的扰码集合可以为0001~FFEF中的一个或多个取值,例如,预设的扰码集合可以为{0001,0003,0005}、{0001,000F}或{0001,00EF,0EEF,F000}等。
在一种实现方式中,第一PDCCH承载下行控制信息(downlink control information,DCI),DCI可以指示用于传输第一PDSCH的时频资源。若网络设备采用预设的扰码集合中的扰码1对第一PDCCH进行加扰,那么终端设备只有采用扰码1才能正确解扰第一PDCCH。预设的扰码集合可以是终端设备和网络设备预先约定的一个扰码集合,预设的扰码集合中的任意一个扰码均可以用于对第一PDCCH进行加扰,若终端设备检测到了使用预设的扰码集合中的任意一个扰码加扰的第一PDCCH,则表明监测到的第一PDCCH上承载的DCI所指示的时频资源上传输的数据包括针对随机接入消息中PUSCH的响应信息(应用于本申请实施例中,DCI指示的时频资源上传输的是第一响应消息),此时,终端设备可以对DCI指示的第一PDSCH进行解调。在一种实现方式中,网络设备可以通过广播系统信息将预设的扰码集合告知所有终端设备。
在一种实现方式中,终端设备根据预设的扰码集合中的扰码监听第一PDCCH的具体实施方式可以为:终端设备尝试检测DCI格式1_0,该DCI的CRC用预设的扰码集合中的扰码(如TC-RNTI)加扰,该DCI用于调度一个PDSCH(如第一PDSCH)。在一实施例中,该PDSCH携带有(或承载有)CRID。也就是说,终端设备在预设的扰码集合中选择一个扰码进行尝试是否可以正确解扰第一PDSCH;若不能正确解扰第一PDSCH,再尝试预设的扰码集合中的其他扰码是否能正确解扰,直至在预设的扰码集合中找到一个扰码可以正确解扰第一PDCCH为止,或者,直至确定预设的扰码集合中的所有扰码都不能正确解扰第一PDCCH为止。若预设的扰码集合中的所有扰码都不能正确解扰第一PDCCH,表示第一PDCCH调度的第一PDSCH上承载的数据并非发送给该终端设备的数据。
在一种实现方式中,由于终端设备根据预设的扰码集合中的扰码监听第一PDCCH的过程中,需要尝试一个或多个扰码才有可能监听到第一PDCCH,因此会使得终端设备监听第一PDCCH的效率较低,从而导致随机接入的过程太长,随机接入效率低。针对该问题,可以通过减少预设的扰码集合包括的扰码数量,以提高终端设备监听第一PDCCH的效率。
在一种实现方式中,预设的扰码集合中的扰码可以是TC-RNTI或者RA-RNTI。需要 说明的是,本申请实施例对预设的扰码集合中的扰码的名称不做限定,只要该扰码是作为网络设备向终端设备发送的PDCCH上承载的DCI的加扰序列(或者DCI的CRC的加扰序列),并且DCI用于调度PDSCH的发送,PDSCH用于承载发送给终端设备的针对随机接入消息的响应消息,该响应消息中至少携带CRID时,均为本申请实施例中预设的扰码集合中的扰码。
步骤S205:终端设备根据监听到的第一PDCCH接收来自网络设备的第一PDSCH。
具体的,若终端设备监听到了使用预设的扰码集合中的扰码加扰的第一PDCCH,则表明网络设备对终端设备发送的随机接入消息做出了响应,终端设备可以根据监听到的第一PDCCH接收来自网络设备的第一PDSCH,并对第一PDSCH进行解调,进而获取第一PDSCH上承载的第一响应消息。需要说明的是,上述步骤中至少有部分步骤之间是可以没有先后顺序的,例如,步骤S204可以先于步骤S202发生,本申请不做限定。
在一种实现方式中,第一响应消息可以包括竞争解决信息(Contention Resolution Message,CRM),终端设备根据竞争解决信息,可以确定竞争接入是否成功。在一种实现方式中,CRM可以包括CRID,终端设备根据CRM确定竞争接入是否成功的具体实施方式可以为:获取CRM中的CRID,若CRID与终端设备在随机接入消息中PUSCH携带的上行公共控制信道服务数据单元(Uplink Common Control Channel Service Data Unit,UL CCCH SDU)中的数据(该数据为终端设备的标识)匹配时,则确定终端设备竞争接入成功;若CRID与终端设备在随机接入消息中携带的UL CCCH SDU中的数据不匹配,则确定终端设备竞争接入失败。
在一种实现方式中,PUSCH承载有终端设备的标识,CRID可以是根据终端设备的标识得到的。具体的,若CRID的总比特数与终端设备的标识的总比特数相同,那么,CRID与终端设备的标识相同;若CRID的总比特数与终端设备的标识的总比特数不同,例如,CRID的总比特数为s1比特,终端设备的标识的总比特数为s2比特,且s2>s1,那么,CRID为终端设备的标识的第一个s1比特。例如,若协议中规定CRID的总比特数为48比特,如果终端设备的标识的长度大于48比特,那么CRID就是终端设备的标识的第一个48比特。
在一种实现方式中,若CRID的总比特数与终端设备的标识的总比特数相同,那么,CRID与终端设备在随机接入消息中PUSCH携带的终端设备的标识是否匹配是指:CRID与随机接入消息中PUSCH携带的终端设备的标识是否相同(若CRID与随机接入消息中PUSCH携带的终端设备的标识相同,终端设备可以确定竞争接入成功);若CRID的总比特数与终端设备的标识的总比特数不同,且CRID的总比特数为s1比特,终端设备的标识的总比特数为s2比特,那么,CRID与终端设备在随机接入消息中PUSCH携带的终端设备的标识是否匹配是指:终端设备在随机接入消息中PUSCH携带的终端设备的标识的第一个s1比特是否与CRID相同。
在一种实现方式中,第一响应消息携带临时小区无线网络临时标识TC-RNTI,终端设备确定竞争接入成功之后,可以将该TC-RNTI设置为小区无线网络临时标识(Cell Radio Network Temporary Identifier,C-RNTI)。C-RNTI可以用于终端设备和网络设备之间建立连接之后,在连接释放之前,如果终端设备再次发起随机接入请求,网络设备向终端设备 发送竞争解决信息时,网络设备可以用该C-RNTI对调度承载竞争解决信息的PDSCH的PDCCH进行加扰,同理,终端设备也可以仅使用C-RNTI来监听PDCCH。通过这种方式,可以避免网络设备每次发送PDCCH前,都需要在预设的扰码集合中选择一个扰码对其进行加扰,同理,也可以避免终端设备在预设的扰码集合中选择一个扰码进行解扰的操作。
在一种实现方式中,第一响应消息携带小区无线网络临时标识C-RNTI,终端设备确定竞争接入成功之后,终端设备可以保存该C-RNTI。
在一种实现方式中,终端设备还可以确定第一响应消息中携带的RNTI是C-RNTI还是TC-RNTI。根据确定的结果,执行相应的处理,例如,参见前文实施例的描述。
在一种实现方式中,第一响应消息携带的TC-RNTI(或者C-RNTI)可以与对第一PDCCH加扰的扰码相同,也可以与对第一PDCCH加扰的扰码不同。第一响应消息携带的TC-RNTI(或者C-RNTI)可以位于预设的扰码集合内,可以不位于预设的扰码集合内,本申请实施例对此不作限定。
在一种实现方式中,第一响应消息可以包括竞争解决标识,或者第一响应消息可以包括竞争解决标识和第一信息。第一信息可以包括如下内容中的至少一种:反馈确认消息的资源信息、定时提前命令、上行数据传输授权、终端设备发送的随机接入消息携带的前导码、小区无线网络临时标识C-RNTI或者临时小区无线网络临时标识TC-RNTI中的一个、RRC重配置(RRC reconfiguration)信息、RRC连接重建立(RRC reestablishment)信息、RRC恢复(RRC resume)信息。第一信息还可以包括其他RRC信息,此处不再一一举例。其中,C-RNT或者TC-RNTI用于分配给终端设备用于后续上下行数据传输过程中,作为终端设备的动态标识。
可见,网络设备通过与终端设备约定一个扰码集合(即预设的扰码集合),使得网络设备可以采用预设的扰码集合中的扰码对第一PDCCH进行加扰,同理,使得终端设备可以对扰码集合中的每个扰码进行逐个尝试,直至监听到用扰码集合中的扰码加扰的第一PDCCH时,可以根据监听到的第一PDCCH接收来自网络设备的第一PDSCH。因此,通过实施本申请实施例,有利于终端设备成功获得第一PDCCH调度的第一PDSCH。
可以理解的是,前文所述的预设的扰码集合也可以是网络设备确定,并告知给终端设备。参见图3,图3是本申请实施例提供的另一种随机接入方法的流程示意图,该方法详细描述了如何根据Preamble、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,该方法可以包括但不限于如下步骤:
步骤S301:终端设备向网络设备发送随机接入消息,随机接入消息包括Preamble和PUSCH,该PUSCH承载有终端设备的标识。
步骤S302:如果网络设备对PUSCH译码成功,生成针对PUSCH的第一响应消息。
需要说明的是,步骤S301~步骤S302的执行过程可分别参见图2中步骤S201~步骤S202的具体描述,在此不赘述。在一种实现方式中,PUSCH可以承载有终端设备的标识,或者UL CCCH SDU,或者承载有UL CCCH SDU,且该UL CCCH SDU中携带终端设备的标识。
步骤S303:终端设备根据Preamble、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,其中,第一PDCCH用于调度携带针对PUSCH的第一响应消息的第一PDSCH,预设的运算关系使得第一扰码位于预设的扰码集合中。
具体的,终端设备向网络设备发送随机接入消息之后,需要根据预设的扰码集合中的扰码监听第一PDCCH,以根据监听到的第一PDCCH接收来自网络设备的第一PDSCH。在本申请实施例中,终端设备根据预设的扰码集合中的扰码监听第一PDCCH的具体实施方式可以为:终端设备根据Preamble、终端设备的标识和PUSCH的时频资源(PUSCH occasion,PO)中的至少一种和预设的运算关系得到第一扰码,并根据第一扰码监听第一PDCCH。PUSCH的时频资源是终端设备确定的用于发送随机接入消息中PUSCH的时频资源。
在一种实现方式中,终端设备具体地可以根据终端设备的标识、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码;或者,终端设备具体地可以根据Preamble、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码;或者,终端设备具体地可以根据PO的位置信息得到第一数值,并根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,前述预设的扰码集合中的扰码可以是连续的扰码,也可以是非连续的扰码。当预设的扰码集合中的扰码为连续的扰码,且预设的扰码集合为{x min,…,x max}时,预设的运算关系可以为:
X=mod(UE_ID,N)+x min  (1)
在预设的运算关系(1)中,X为第一扰码,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码,mod()表示取模运算。通过预设的运算关系(1)可知,由于将预设的扰码集合中扰码的数量N作为除数,可以使得mod(UE_ID,N)的结果小于N,然后再加上预设的扰码集合中的最小值x min,可以使得获得的第一扰码(即X)位于预设的扰码集合中。其中,N=x max-x min+1。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码,且预设的扰码集合为{x 0,…,x N-1}时,预设的运算关系可以为:
index=mod(UE_ID,N)和X=x index∈{x 0,…,x N-1}  (2)
在预设的运算关系(2)中,index为预设的扰码集合中的扰码的索引,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码,X为第一扰码。通过预设的运算关系(2)可知,由于mod(UE_ID,N)的结果(即第一扰码的索引)小于N,所以根据运算关系(2)获得的第一扰码(即X)位于预设的扰码集合中。
在一种实现方式中,当终端设备根据Preamble、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码,且预设的扰码集合中的扰码为连续的扰码,预设的扰码集合为{x min,…,x max}时,预设的运算关系可以为:
X=mod(Preamble index,N)+x min  (3)
在预设的运算关系(3)中,X为第一扰码,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码,Preamble index为步骤S301中随机接入消息中preamble的索引。通过预设的运算关系(3)可知,mod(Preamble index,N)的结果小于N,所以根据运算关系(3)获得的第一扰码(即X)位于预设的扰码集合中。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码,且预设的扰码集合 为{x 0,…,x N-1}时,预设的运算关系可以为:
index=mod(Preamble index,N)和X=x index∈{x 0,…,x N-1}  (4)
在预设的运算关系(4)中,index为预设的扰码集合中的扰码的索引,Preamble index为步骤S301中随机接入消息中Preamble的索引,N为预设的扰码集合中扰码的数量,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码,X为第一扰码。通过预设的运算关系(4)可知,mod(Preamble index,N)的结果(即第一扰码的索引)小于N,所以根据运算关系(4)获得的第一扰码(即X)位于预设的扰码集合中。
在一种实现方式中,终端设备可以根据PO的位置信息得到第一数值,并根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。在一种实现方式中,PO的位置信息可以包括但不限于:随机接入过程中传输随机接入消息中PUSCH的时域资源的第一个正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)符号,所述PUSCH的时域资源的第一个时隙在系统帧中的索引,所述PUSCH的频域资源在频域的索引和随机接入过程中传输随机接入消息中所述PUSCH的上行载波,终端设备根据PO的位置信息得到第一数值的运算关系如下:
PO value=1+s_id+a*t_id+a*b*f_id+a*b*c*ul_carrier_id   (5)
在运算关系(5)中,PO value为第一数值,s_id、t_id索引、f_id表示索引以及ul_carrier_id的定义可参见前文(计算RA-RNTI的方式)的描述,在此不赘述。a可以为一个时隙包含的OFDM符号的数量,b可以为系统帧包含的时隙数量,c可以是为可分配给PUSCH(或随机接入信道)的最大频域资源数量。运算关系(5)中的a、b和c的取值可以随着网络设备给终端设备配置的PUSCH的粒度发生变化。例如,当协议规定一个时隙包含14个OFDM符号时,a=14;当协议规定系统帧的最大子载波间隔为120KHz时,即1ms时间包含80个时隙,b=80;当协议规定可分配给PUSCH(或随机接入信道)的频域资源个数最大为8时,c=8。需要说明的是,上述a、b和c的取值仅用于举例,并不构成对本申请实施例的限定。
具体的,终端设备得到第一数值之后,可以根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码,当预设的扰码集合中的扰码为连续的扰码,且预设的扰码集合为{x min,…,x max}时,预设的运算关系可以为:
X=mod(PO value,N)+x min  (6)
在预设的运算关系(6)中,X为第一扰码,PO value为第一数值,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。通过预设的运算关系(6)可知,mod(PO value,N)的结果小于N,所以根据运算关系(6)获得的第一扰码(即X)位于预设的扰码集合中。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码,且预设的扰码集合为{x 0,…,x N-1}时,预设的运算关系可以为:
index=mod(PO value,N)和X=x index∈{x 0,…,x N-1}  (7)
在预设的运算关系(7)中,index为预设的扰码集合中的扰码的索引,PO value为第一数值,N为预设的扰码集合中扰码的数量,x index是索引为index的扰码,{x 0,…,x N-1}为 预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码,X为第一扰码。通过运算关系(7)可知,mod(第一数值,N)的结果(即第一扰码的索引)小于N,所以根据运算关系(7)获得的第一扰码(即X)位于预设的扰码集合中。
在一种实现方式中,第一响应消息可以携带一个TC-RNTI,终端设备获取第一响应消息后,可以将该TC-RNTI设置为C-RNT。在一种实现方式中,第一响应消息可以携带一个C-RNTI,终端设备获取第一响应消息后,可以保存该C-RNTI。在一种实现方式中,第一响应消息携带的TC-RNTI(或者C-RNTI)可以与对第一PDCCH加扰的扰码相同,也可以与对第一PDCCH加扰的扰码不同,第一响应消息携带的TC-RNTI(或者C-RNTI)可以位于预设的扰码集合内,可以不位于预设的扰码集合内。
例如,当网络设备和终端设备1、终端设备2约定根据Preamble、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码时,由于终端设备1和终端设备2发送给同一网络设备的Preamble可能相同,并且网络设备与终端设备1和终端设备2预先约定的扰码集合也可以相同,所以可能会导致终端设备1和终端设备2计算出的第一扰码相同,相应的,网络设备会采用相同的第一扰码对发送给终端设备1和终端设备2的第一PDCCH进行加扰,终端设备1和终端设备2会同时对第一PDCCH所指示的第一PDSCH进行译码。根据第一PDSCH中所携带的第一响应信息中的竞争解决ID确认该第一PDSCH是否是自己的。第一PDSCH可能有两种情况:
1.第一PDSCH是一个单播数据,只包含终端设备1的响应信息,该响应信息中至少包含竞争解决ID。
a.终端设备2对第一PDSCH解调后,发现竞争解决ID与终端设备2所传输的UL CCCH SDU中的数据(或终端设备2的标识)不匹配,终端设备2丢弃该第一PDSCH。在一实施例中,终端设备2可以重新发起随机接入,当网络设备向终端设备2发送承载包含竞争解决ID的响应信息的PDSCH时,继续采用第一扰码对调度该PDSCH的PDCCH加扰,终端设备2采用第一扰码监听PDCCH.
b.终端设备1对第一PDSCH解调后,发现竞争解决ID与终端设备1所传输的ULCCCH SDU(或终端设备1的标识)中的数据匹配,终端设备1确认竞争解决成功,并将第一PDSCH中所携带的TC-RNTI设为C-RNTI。终端设备1在后续新发起的随机接入过程中接收网络设备发送的竞争解决信息时,可以使用该C-RNTI监听PDCCH,以避免与终端设备2在监听PDCCH时发生碰撞。需要说明的是,此时,第一PDSCH中所携带的TC-RNTI与第一扰码不同。
2.第一PDSCH是一个组播数据,包含终端设备1的响应信息和终端设备2的响应信息,终端设备1的响应信息和终端设备2的响应信息中都至少包含竞争解决ID
a.终端设备2对第一PDSCH解调后,发现其中一个竞争解决ID与终端设备2所传输的ULCCCH SDU(或终端设备2的标识)中的数据匹配,终端设备2确认竞争解决成功,终端设备2保存该竞争解决ID所在的数据部分所携带的TC-RNTI,并将其设为C-RNTI。终端设备2在后续新发起的随机接入 过程中接收网络设备发送的竞争解决信息时,可以使用该C-RNTI监听PDCCH。避免与终端设备1在监听PDCCH时发生碰撞
b.终端设备1对第一PDSCH解调后,发现其中一个竞争解决ID与终端设备1所传输的ULCCCH SDU(或终端设备1的标识)中的数据匹配,终端设备1确认竞争解决成功,终端设备1将保存该竞争解决ID所在的数据部分所携带的TC-RNTI,并将其设为C-RNTI。终端设备1在后续新发起的随机接入过程中接收网络设备发送的竞争解决信息时,可以使用该C-RNTI监听PDCCH。避免与终端设备2在监听PDCCH时发生碰撞。需要说明的是,终端设备1的响应信息中的竞争解决ID所在的数据部分所携带的TC-RNTI与终端设备2的响应信息中的竞争解决ID所在的数据部分所携带的TC-RNTI不同。
需要说明的是,步骤S303中仅阐述了终端设备根据Preamble、终端设备的标识和PUSCH的时频资源中的任意一种和预设的运算关系得到第一扰码,在其他可行的实现方式中,终端设备还可以根据Preamble、终端设备的标识和PUSCH的时频资源中的多种和预设的运算关系得到第一扰码。
参见图2所示实施例:由于终端设备不知道网络设备是采用预设的扰码集合中的哪个扰码对第一PDCCH进行加扰的,因此,终端设备需要对预设的扰码集合中的扰码进行逐个尝试(即盲检),才能确定是否监听到用预设的扰码集合中的扰码加扰的第一PDCCH,也就是说,终端设备可能需要尝试多次才能确定第一PDCCH是用预设的扰码集合中的哪个扰码加扰的。相较于图2所述实施例所采用的盲检方式,图3所述实施例中终端设备和网络设备获取第一扰码的方式相同,均为根据Preamble、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到唯一的第一扰码,也就是说,终端设备计算出的第一扰码和网络设备计算出的第一扰码是相同的,这样可以有效提高终端设备监听第一PDCCH的效率,从而有利于提高随机接入效率。
步骤S304:终端设备根据第一扰码监听第一PDCCH。
具体的,终端设备确定第一扰码之后,可以采用第一扰码监听第一PDCCH。
步骤S305:网络设备根据Preamble、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码。
需要说明的是,网络设备根据Preamble、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码的方式与终端设备获取第一扰码的方式相同,步骤S305的执行过程可参见步骤S303的具体描述,在此不赘述。
还需要说明的是,通过图2所示实施例和步骤S303可知,获取第一扰码的方式有多种,例如,具体的可以根据终端设备的标识、预设的扰码集合中扰码的数量和预设的运算关系(1)(或预设的运算关系(2))得到第一扰码;根据Preamble、预设的扰码集合中扰码的数量和预设的运算关系(3)(或预设的运算关系(4))得到第一扰码;根据PUSCH的时频资源、预设的扰码集合中扰码的数量、运算关系(5)和预设的运算关系(6)(或预设的运算关系(7))得到第一扰码;在预设的扰码集合中随机确定第一扰码。因此,终端设备和网络设备需要约定采用相同的方式确定第一扰码,才能有利于提高随机接入效率。 在一种实现方式中,网络设备可以通过广播系统信息来通知终端设备,网络设备将采用哪种方式获取第一扰码,终端设备接收到广播系统信息之后,可以采用与网络设备所采用的相同方式来获取第一扰码。在其他可行的实现方式中,网络设备和终端设备还可以采用除了广播系统信息以外的其他方式(比如协议约定)约定采用哪种方式确定第一扰码,本申请实施例对此不作限定。
步骤S306:网络设备根据第一扰码对第一PDCCH进行加扰。
具体的,网络设备获得第一扰码之后,可以根据第一扰码对第一PDCCH进行加扰,即根据第一扰码对第一PDCCH上承载的DCI的CRC进行加扰。
步骤S307:网络设备发送用于调度第一PDSCH的第一PDCCH。
步骤S308:终端设备根据监听到的第一PDCCH接收来自网络设备的第一PDSCH。
需要说明的是,步骤S307~步骤S308的执行过程可分别参见图2中步骤S204~步骤S205的具体描述,在此不赘述。上述步骤中至少有部分步骤之间是可以没有先后顺序的,例如,步骤S303和S304可以先于步骤S302发生的,本申请不做限定。
通过实施本申请实施例中,终端设备和网络设备均可以根据Preamble、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,也就是说,当终端设备和网络设备采用相同的方式获取第一扰码时,终端设备计算出的第一扰码和网络设备计算出的第一扰码是相同的,这样可以有效提高终端设备监听第一PDCCH的效率,从而有利于提高随机接入效率。
请参见图4,图4是本申请实施例提供的又一种随机接入方法的流程示意图,该方法详细阐述了当用于发送Preamble的时频资源所对应的RA-RNTI与第一扰码相同时,如何对第一扰码进行调整,以使得调整后的第一扰码与RA-RNTI不同,该方法可以包括但不限于如下步骤:
步骤S401:终端设备向网络设备发送随机接入消息,随机接入消息包括Preamble和PUSCH,该PUSCH承载有终端设备的标识。
步骤S402:如果网络设备对PUSCH译码成功,生成针对PUSCH的第一响应消息。
步骤S403:终端设备根据随机接入前导码、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,其中,第一PDCCH用于调度携带针对PUSCH的第一响应消息的第一PDSCH,预设的运算关系使得第一扰码位于预设的扰码集合中。
需要说明的是,步骤S401~步骤S403的执行过程可分别参见图3中步骤S301~步骤S303的具体描述,在此不赘述。
步骤S404:终端设备确定用于发送Preamble的时频资源所对应的RA-RNTI。
在本申请实施例中,终端设备向网络设备发送的随机接入消息可以包括Preamble和PUSCH,如果网络设备成功检测到Preamble且PUSCH译码成功,可以生成针对PUSCH的第一响应消息。如果网络设备成功检测到Preamble但PUSCH译码失败,可以生成针对Preamble的第二响应消息。
当终端设备接收到第一响应消息时,表明网络设备成功检测到Preamble且对PUSCH解码成功,此时,终端设备需要获取PUSCH承载的CRID,并确定CRID与终端设备的标 识是否匹配,进而确定终端设备竞争接入是否成功。当终端设备接收到第二响应消息时,表明网络设备仅成功检测到Preamble,而对PUSCH解调失败,此时,终端设备需要向网络设备重发Preamble和PUSCH(或者仅重发PUSCH)。网络设备对收到的重传信息进行检测和译码,如果PUSCH译码成功,网络设备向终端发送至少包含CRID的第三响应消息,当终端设备接收到第三响应消息,并且通过第三响应消息确定CRID与终端设备的标识匹配时,表明网络设备成功检测到PUSCH,并且终端设备竞争接入成功,此时,终端设备可以向网络设备发送一条确认消息,该确认消息用于通知网络设备终端设备已成功接收到第三响应消息。可见,终端设备在接收到不同的响应消息后,需要执行的操作不同。
上述可知,终端设备在接收到响应消息后,需要区分该响应消息是针对Preamble的响应消息(即第二响应消息)还是针对PUSCH的响应消息(即第一响应消息),以使终端设备根据响应消息的类型执行正确的操作。
在一种实现方式中,网络设备可以通过RA-RNTI对调度第二PDSCH的第二PDCCH进行加扰,第二PDSCH用于承载针对Preamble的第二响应消息;并且,网络设备可以通过第一扰码对调度第一PDSCH的第一PDCCH进行加扰,第一PDSCH用于承载针对PUSCH的第一响应消息。因此,如果终端设备监听到使用RA-RNTI加扰的第二PDCCH,那么终端设备可以确定该第二PDCCH调度的PDSCH上承载的响应消息为针对Preamble的第二响应消息,同理,如果终端设备监听到使用第一扰码加扰的第一DCCH,那么终端设备可以确定该第一PDCCH调度的第一PDSCH上承载的响应消息为针对PUSCH的第一响应消息。
在一种实现方式中,网络设备和终端设备可以采用相同的方式计算得到相同的RA-RNTI,具体的,计算RA-RNTI的具体实施方式可以为:确定用于发送Preamble的时频资源所对应的RA-RNTI。具体的,终端设备(或者网络设备)可以根据用于发送Preamble的时频资源的位置信息确定RA-RNTI,用于发送Preamble的时频资源称为一个随机接入机会(PRACH Occasion,RO)。
步骤S405:如果该RA-RNTI和第一扰码相同,终端设备根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码。
具体的,如果RA-RNTI和第一扰码相同,那么会导致终端设备无法区分只针对Preamble的第二响应消息和针对PUSCH的第一响应消息。为了解决该问题,需要调整RA-RNTI和/或第一扰码,以使得调整后的RA-RNTI和第一扰码不同。在一种实现方式中,可以保持RA-RNTI不变,并对第一扰码进行调整。具体的,可以根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码。在一种实现方式中,终端设备根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码的具体实施方式可以有以下三种:
第一种方式:将第一扰码与预设的偏移值之和(或者之差)作为调整后的第一扰码。通过这种方式,可以很快确定调整后的第一扰码,但是采用这种方式,可能会导致调整后的第一扰码不在预设的扰码集合内,若网络设备和终端设备约定采用盲检的方式确定第一扰码,那么可能会导致终端设备无法监听到用调整后的第一扰码加扰的PDCCH。
在一种实现方式中,调整后的第一扰码位于预设的扰码集合内,通过这种方式,可以避免终端设备无法监听到用调整后的第一扰码加扰的PDCCH的情况。
第二种方式:若第一扰码是采用运算关系(1)得到的,那么终端设备可以对预设的偏移值和运算关系(1)中的取余函数(即mod函数)中的被除数进行加法运算(或减法运算),并将得到的值作为运算关系(1)中的取余函数中的新被除数,从而得到新的运算关系(1′),然后将运算关系(1′)的结果作为调整后的第一扰码。
例如,若用于计算第一扰码的运算关系为运算关系(1)(即X=mod(UE_ID,N)+x min)时,运算关系(1′)可以为:
X′=mod(UE_ID+δ,N)+x min  (1′)
在运算关系(1′)中,X′为调整后的第一扰码,δ为预设的偏移值,UE_ID、N和x min的定义与在运算关系(1)中的定义相同,在此不赘述。通过运算关系(1′)可知,mod(UE_ID+δ,N)的结果小于N,所以根据运算关系(1′)得到的调整后的第一扰码(即X′)位于预设的扰码集合中。在一种实现方式中,预设的偏移值δ可以为除了数值A以外的任意值,其中,数值A为预设的扰码集合中扰码的数量(即N)的整数倍,即A=mN,其中,m为正整数。因为若δ=mN,将导致根据运算关系(1′)得到的调整后的第一扰码(X′)与根据运算关系(1)得到的调整前的第一扰码(X)相同,这样不能实现调整第一扰码的目的。
需要说明的是,若第一扰码是采用除了运算关系(1)以外的其他运算关系得到的,那么可以参考获得运算关系(1′)的方法,获取其他新的运算关系,并通过其他新的运算关系计算得到调整后的第一扰码,本申请实施例在此不赘述。
第三种方式:若第一扰码是采用运算关系(1)得到的,那么终端设备可以将预设的偏移值和根据运算关系(1)得到的第一扰码之和(或之差)作为运算关系(1)中的取余函数中的新被除数,从而得到新的运算关系(1″),然后将运算关系(1″)的结果作为调整后的第一扰码。
例如,若用于计算第一扰码的运算关系为运算关系(1)(即X=mod(UE_ID,N)+x min)时,运算关系(1″)可以为:
X″=mod(X+δ,N)+x min  (1″)
在运算关系(1″)中,X″为调整后的第一扰码,X为根据运算关系(1)得到的第一扰码,δ为预设的偏移值,N和x mim的定义与在运算关系(1)中的定义相同,在此不赘述。通过运算关系(1″)可知,mod(X+δ,N)的结果小于N,所以根据运算关系(1″)得到的调整后的第一扰码(即X″)位于预设的扰码集合中。
需要说明的是,若第一扰码是采用除了运算关系(1)以外的其他运算关系得到的,那么可以参考获得运算关系(1″)的方法,获取其他新的运算关系,并通过其他新的运算关系计算得到调整后的第一扰码,本申请实施例在此不赘述。
步骤S406:终端设备使用调整后的第一扰码监听第一PDCCH。
具体的,终端设备得到调整后的第一扰码之后,可以采用调整后的第一扰码监听第一PDCCH。
步骤S407:网络设备根据Preamble、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码。
需要说明的是,步骤S407的执行过程可参见图3中步骤S305的具体描述,在此不赘 述。
步骤S408:网络设备确定用于发送Preamble的时频资源所对应的RA-RNTI。
步骤S409:如果该RA-RNTI和第一扰码相同,网络设备根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码。
需要说明的是,网络设备确定用于发送Preamble的时频资源所对应的RA-RNTI的方式与终端设备确定用于发送Preamble的时频资源所对应的RA-RNTI的方式相同,并且网络设备根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码的方式与终端设备根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码的方式相同。步骤S408~S409的执行过程可分别参见步骤S404~S405的具体描述,在此不赘述。
还需要说明的是,当RA-RNTI和第一扰码相同时,由于根据预设的偏移值对第一扰码进行调整的方式有多种,因此,终端设备和网络设备需要约定采用相同的方式对第一扰码进行调整,才能使得终端设备得到的调整后的第一扰码和网络设备得到的调整后的第一扰码相同。在一种实现方式中,网络设备可以通过广播系统信息来通知终端设备,网络设备将采用哪种方式调整第一扰码,终端设备接收到广播系统信息之后,可以采用与网络设备所采用的相同方式来调整第一扰码。在其他可行的实现方式中,网络设备和终端设备还可以采用除了广播系统信息以外的其他方式(比如协议约定)约定采用哪种方式调整第一扰码,本申请实施例对此不作限定。
步骤S410:网络设备根据调整后的第一扰码对第一PDCCH进行加扰。
具体的,网络设备获得调整后的第一扰码之后,可以根据调整后的第一扰码对第一PDCCH进行加扰,即根据调整后的第一扰码对第一PDCCH上承载的DCI的CRC进行加扰。
步骤S411:网络设备发送用于调度第一PDSCH的第一PDCCH。
步骤S412:终端设备根据监听到的第一PDCCH接收来自网络设备的第一PDSCH。
需要说明的是,步骤S411~步骤S412的执行过程可分别参见图3中步骤S307~步骤S308的具体描述,在此不赘述。
通过实施本申请实施例,当RA-RNTI和第一扰码相同时,通过预设的偏移值对第一扰码进行调整,使得网络设备采用调整后的第一扰码对第一PDCCH进行加扰,终端设备使用调整后的第一扰码监听第一PDCCH。使用该方法,可以避免网络设备采用第一扰码对第一PDCCH(第一PDCCH用于调度第一PDSCH,第一PDSCH用于承载针对PUSCH的响应消息)进行加扰,并采用与第一扰码相同的RA-RNTI对用于调度承载有针对Preamble的响应消息的PDSCH的PDCCH进行加扰时,导致终端设备无法根据加扰序列区分接收到的响应信息是针对PUSCH的响应消息还是针对Preamble的响应消息的情况。
请参见图5,图5是本申请实施例提供的又一种随机接入方法的流程示意图,该方法简要描述了网络设备成功检测到Preamble,但对PUSCH译码失败时,根据第二响应信息是否携带扰码,终端设备如何确定采用哪个扰码来监听PDCCH,该方法可以包括但不限于如下步骤:
步骤S501:终端设备向网络设备发送随机接入消息,随机接入消息包括Preamble和 PUSCH,该PUSCH承载有终端设备的标识。
需要说明的是,步骤S501的执行过程可分别参见图2中步骤S201的具体描述,在此不赘述。
步骤S502:网络设备如果成功检测到Preamble,且PUSCH译码失败时,生成针对Preamble的第二响应消息,第二响应消息携带索引上行调度信息。
具体的,网络设备如果成功检测到Preamble,而对PUSCH译码失败,那么网络设备可以生成针对Preamble的第二响应消息,第二响应消息可以携带preamble索引,TAcommand,上行调度信息(UL grant)和TC-RNTI中的至少一种数据。其中,上行调度信息用于配置一部分时频资源供终端设备使用,终端设备可以利用这部分时频资源重传PUSCH,或者重传Preamble和PUSCH。
步骤S503:终端设备根据RA-RNTI监听第二PDCCH,第二PDCCH用于调度承载只针对Preamble的第二响应消息的第二PDSCH。
具体的,终端设备发送随机接入消息之后,通过监听第二PDCCH可以确认网络设备是否成功检测到随机接入消息中的Preamble和是否对PUSCH正确译码。在本申请实施例中,若网络设备成功检测到Preamble,而对PUSCH译码失败,则网络设备可以生成针对Preamble的第二响应消息,并采用RA-RNTI对调度承载有第二响应消息的第二PDSCH的第二PDCCH进行加扰;若网络设备成功检测到Preamble且对PUSCH译码成功,则网络设备可以生成针对PUSCH码的第一响应消息,并采用第一扰码对调度承载有第一响应消息的第一PDSCH的第一PDCCH进行加扰。因此,终端设备发送随机接入消息之后,可以根据RA-RNTI监听第二PDCCH,并根据第一扰码监听第一PDCCH,以确认网络设备是否成功检测到随机接入消息中的Preamble和PUSCH。
步骤S504:网络设备发送用于调度第二PDSCH的第二PDCCH,第二PDCCH使用RA-RNTI加扰。
具体的,网络设备生成第二响应消息之后,可以使用RA-RNTI对用于调度第二PDSCH的第二PDCCH进行加扰,并发送加扰后的第二PDCCH,其中,使用RA-RNTI对第二PDCCH进行加扰的具体实施方式为:使用RA-RNTI对第二PDCCH上承载的DCI的CRC进行加扰。第二PDSCH用于承载第二响应消息,第二响应消息携带上行调度信息。
步骤S505:终端设备如果监听到使用RA-RNTI加扰的第二PDCCH,根据第二PDSCH承载的上行调度信息进行上行传输。
具体的,终端设备如果监听到使用RA-RNTI加扰的第二PDCCH,可以根据监听到的第二PDCCH接收来自网络设备的第二PDSCH,并对第二PDSCH进行解调,以获取第二PDSCH承载的第二响应消息。
在一种实现方式中,第二响应消息可以用于通知终端设备重传哪些数据,例如,可以通知终端设备重传Preamble和PUSCH,或者通知终端设备重传PUSCH。在本申请实施例中,第二响应消息携带有上行调度信息,当终端设备根据第二响应信息确定需要重传的数据之后,可以通过上行调度信息指示的时频资源进行上行传输,其中,上行传输可以包括向网络设备重传PUSCH,或者,上行传输可以包括向网络设备重传PUSCH和Preamble。
步骤S506:网络设备在上行调度信息指示的时频资源上检测上行传输。
具体的,网络设备发送第二PDCCH之后,可以在上行调度信息指示的时频资源上检测上行传输,上行传输可以包括终端设备向网络设备重传PUSCH,或者,上行传输可以包括终端设备向网络设备重传PUSCH和Preamble。
步骤S507:网络设备如果成功检测到上行传输,生成针对上行传输的响应消息。
具体的,网络设备如果在上行调度信息指示的时频资源上成功检测到上行传输,则生成针对上行传输的响应消息。针对上行传输的响应消息包括的内容与第一响应信息包括的内容可以相同,也可能不同。当上行传输包括PUSCH和Preamble时,针对上行传输的响应消息可以包括在对上行传输中的PUSCH解码成功的情况下生成的响应消息,或者,可以包括在对上行传输中的Preamble检测成功并对PUSCH解码失败的情况下生成的响应消息。
步骤S508:如果第二响应消息携带第二扰码,终端设备采用第二扰码监听第三PDCCH,第三PDCCH用于调度第三PDSCH,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息;如果第二响应消息未携带任何扰码,终端设备采用第三扰码监听第三PDCCH。
在一种实现方式中,第二响应消息可以携带第二扰码,也可以不携带任何扰码。当第二响应消息携带第二扰码时,表示网络设备会采用第二扰码对下一次传输的第三PDCCH进行加扰,其中,第三PDCCH用于调度第三PDSCH,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息。相应的,若第二响应消息携带第二扰码,则终端设备也需要采用第二扰码监听第三PDCCH。
当第二响应消息未携带任何扰码时,表示网络设备会采用第三扰码对下一次传输的第三PDCCH进行加扰,其中,第三扰码可以是第一扰码,也可以是第四扰码。第一扰码的计算方法可以参见图2-图4实施例的描述,在此不赘述。第四扰码的计算方式为:根据上行调度信息指示的时频资源的位置信息得到第二数值,并根据第二数值、预设的扰码集合中扰码的数量和预设的运算关系得到第四扰码。第一扰码的计算方式可以为:根据随机接入消息中的PUSCH的时频资源的位置信息得到第一数值,并根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。可见,根据PUSCH的时频资源的位置信息可以计算得到第一扰码,而根据上行调度信息指示的时频资源的位置信息可以计算得到第四扰码。需要说明的是,第一扰码和第四扰码可以相同也可以不同,本申请实施例对此不作限定。
换言之,根据第二响应消息是否携带扰码,终端设备会采用不同的扰码监听第三PDCCH,具体的,若第二响应消息携带了第二扰码,则采用携带的第二扰码监听第三PDCCH;若第二响应消息未携带任何扰码,则采用第一扰码监听第三PDCCH(此时,第三PDCCH与图2~图4实施例中的第一PDCCH相同);若第二响应消息未携带任何扰码,还可以采用第四扰码监听第三PDCCH。
步骤S509:如果第二响应消息携带第二扰码,网络设备发送用于调度第三PDSCH的第三PDCCH,第三PDCCH使用第二扰码加扰,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息;如果第二响应消息未携带任何扰码,网络设备发送用于调度第三PDSCH的第三PDCCH,第三PDCCH使用第三扰码加扰。
其中,第三扰码可以是第一扰码,也可以是第四扰码。网络设备计算第四扰码的方式与终端设备计算第四扰码的方式相同,其执行过程可以参见步骤S508中的具体描述,在此不赘述。
步骤S510:终端设备根据监听到的第三PDCCH接收来自网络设备的第三PDSCH。
在一种实现方式中,当上行传输至少包括PUSCH,且网络设备对上行传输中PUSCH译码成功时,针对上行传输的响应消息可以包括针对PUSCH的第三响应消息。此时,终端设备监听到的第三PDCCH相当于图2~图4实施例中的第一PDSCH,第三PDSCH相当于图2~图4实施例中的第一PDCCH。
在一种实现方式中,第三PDSCH可以承载有第五扰码,终端设备获取第三PDSCH并且正确解调第三PDSCH之后,可以存储第五扰码,并将第五扰码设置为C-RNTI。其中,第五扰码可以为预设的扰码集中的扰码,也可以为RNTI序列取值范围中的一个RNTI序列,本申请实施例对此不作限定。在一种实现方式中,若第二PDSCH承载有RNTI1(即第二响应消息携带RNTI1),终端设备在获得第二PDSCH上承载的RNTI1之后,可以存储RNTI1,并将RNTI1设置为C-RNTI,若第三PDSCH承载有RNTI2,那么终端设备在获得第三PDSCH上承载的RNTI2之后,可以存储RNTI2,并将RNTI2设置为C-RNTI。在一种实现方式中,若第二PDSCH和第三PDSCH均未承载任何RNTI,那么终端设备可以存储对第三PDCCH进行加扰所采用的扰码(如RNTI3),并将该扰码设置为C-RNTI。换言之,第三PDSCH承载的扰码(如RNTI2)的优先级>第二PDSCH承载的扰码(如RNTI1)的优先级>对第三PDCCH进行加扰所采用的扰码(如RNTI3)的优先级。
通过实施本发明实施例,终端设备向网络设备发送随机接入消息之后,若网络设备成功检测到Preamble,但对PUSCH译码失败时,若网络设备发送给终端设备的第二响应消息携带有第二扰码,则终端设备可以采用第二扰码监听第三PDSCH,若第二响应消息未携带任何扰码,则终端设备可以采用第一扰码或者第四扰码监听第三PDSCH,这样有利于终端设备根据第三PDCCH获取第三PDSCH,其中,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息。
上述详细阐述了本申请实施例的方法,下面提供了本申请实施例的装置。
请参见图6,图6是本申请实施例提供的一种通信装置的结构示意图,通信装置60用于执行图2-图5对应的方法实施例中终端设备所执行的步骤,通信装置60可以包括:
发送模块601,用于向网络设备发送随机接入消息,随机接入消息包括随机接入前导码和物理上行共享信道PUSCH;
监听模块602,用于根据预设的扰码集合中的扰码监听第一物理下行控制信道PDCCH,第一PDCCH用于调度携带针对PUSCH的第一响应消息的第一物理下行共享信道PDSCH;
接收模块603,用于根据监听到的第一PDCCH接收来自网络设备的第一PDSCH。
在一种实现方式中,PUSCH可以承载有终端设备的标识;监听模块602,具体可以用于根据随机接入前导码、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,并根据第一扰码监听第一PDCCH,其中,预设的运算关系使得第一扰码位于预设的扰码集合中。
在一种实现方式中,监听模块602具体可以用于根据终端设备的标识、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,当预设的扰码集合中的扰码为连续的扰码时,预设的运算关系可以为:
X=mod(UE_ID,N)+x min
其中,X为第一扰码,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码,mod()为取模运算。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码时,预设的运算关系为:
index=mod(UE_ID,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码,X为第一扰码。
在一种实现方式中,监听模块602具体可以用于根据PUSCH的时频资源的位置信息得到第一数值;并根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,该通信装置60还可以包括确定模块604和调整模块605;确定模块604可以用于确定用于发送随机接入前导码的时频资源所对应的RA-RNTI;调整模块605可以用于如果RA-RNTI和第一扰码相同,根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码;监听模块602用于根据第一扰码监听第一PDCCH时,具体可以用于使用调整后的第一扰码监听第一PDCCH。
在一种实现方式中,第一响应消息可以携带TC-RNTI;通信装置60还可以包括设置模块606,设置模块606可以用于将TC-RNTI设置为C-RNTI。
在一种实现方式中,第一响应消息可以携带C-RNTI。
在一种实现方式中,监听模块602还可以用于如果监听到使用RA-RNTI加扰的第二PDCCH,第二PDCCH用于调度承载针对随机接入前导码的第二响应消息的第二PDSCH,第二响应消息携带上行调度信息;监听模块602还可以用于如果第二响应消息携带第二扰码,采用第二扰码监听第三PDCCH,第三PDCCH用于调度第三PDSCH,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息;和/或,如果第二响应消息未携带任何扰码,采用第一扰码监听第三PDCCH。
需要说明的是,图6对应的实施例中未提及的内容以及各个模块执行步骤的具体实现方式可参见图2-图5所示实施例以及前述内容,这里不再赘述。
在一种实现方式中,图6中的各个模块所实现的相关功能可以结合处理器与收发器来实现。参见图7,图7是本申请实施例提供的一种终端设备的结构示意图,该终端设备70可以包括收发器701、处理器702和存储器703,收发器701、处理器702和存储器703可以通过一条或多条通信总线相互连接,也可以通过其它方式相连接。图6所示的发送模块601、监听模块602、接收模块603、确定模块604、调整模块605和设置模块606所实现的相关功能可以通过同一个处理器702来实现,也可以通过多个不同的处理器702来实现。
收发器701可以用于发送数据和/或信令,以及接收数据和/或信令。应用在本申请实施例中,收发器701可以用于向网络设备发送随机接入消息,还可以用于接收来自网络设备的第一PDSCH。
处理器702被配置为执行图2-图5所述方法中终端设备相应的功能。该处理器702可以包括一个或多个处理器,例如该处理器702可以是一个或多个中央处理器(central processing unit,CPU),网络处理器(network processor,NP),硬件芯片或者其任意组合。在处理器702是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
存储器703用于存储程序代码等。存储器703可以包括易失性存储器(volatile memory),例如随机存取存储器(random access memory,RAM);存储器703也可以包括非易失性存储器(non-volatile memory),例如只读存储器(read-only memory,ROM),快闪存储器(flash memory),硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD);存储器703还可以包括上述种类的存储器的组合。
处理器702可以调用存储器703中存储的程序代码以执行以下操作:
向网络设备发送随机接入消息,随机接入消息包括随机接入前导码和物理上行共享信道PUSCH;
根据预设的扰码集合中的扰码监听第一物理下行控制信道PDCCH,第一PDCCH用于调度携带针对PUSCH的第一响应消息的第一物理下行共享信道PDSCH;
根据监听到的第一PDCCH接收来自网络设备的第一PDSCH。
在一种实现方式中,PUSCH可以承载有终端设备的标识;处理器702执行根据预设的扰码集合中的扰码监听第一PDCCH时,具体可以执行以下操作:根据随机接入前导码、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,并根据第一扰码监听第一PDCCH,其中,预设的运算关系使得第一扰码位于预设的扰码集合中。
在一种实现方式中,处理器702具体可以执行以下操作:根据终端设备的标识、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,当预设的扰码集合中的扰码为连续的扰码时,预设的运算关系可以为:
X=mod(UE_ID,N)+x min
其中,X为第一扰码,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码时,预设的运算关系为:
index=mod(UE_ID,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码,X为第一扰码。
在一种实现方式中,处理器702具体可以执行以下操作:根据PUSCH的时频资源的位置信息得到第一数值;并根据第一数值、预设的扰码集合中扰码的数量和预设的运算关 系得到第一扰码。
在一种实现方式中,处理器702还可以执行以下操作:确定用于发送随机接入前导码的时频资源所对应的RA-RNTI;如果RA-RNTI和第一扰码相同,根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码;根据第一扰码监听第一PDCCH时,具体可以用于使用调整后的第一扰码监听第一PDCCH。
在一种实现方式中,第一响应消息可以携带TC-RNTI;处理器702还可以执行以下操作:将TC-RNTI设置为C-RNTI。
在一种实现方式中,第一响应消息可以携带C-RNTI。
在一种实现方式中,处理器702还可以执行以下操作:如果监听到使用RA-RNTI加扰的第二PDCCH,第二PDCCH用于调度承载针对随机接入前导码的第二响应消息的第二PDSCH,第二响应消息携带上行调度信息;如果第二响应消息携带第二扰码,采用第二扰码监听第三PDCCH,第三PDCCH用于调度第三PDSCH,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息;和/或,如果第二响应消息未携带任何扰码,采用第一扰码监听第三PDCCH。
进一步地,处理器702还可以执行图2-图5所示实施例中终端设备对应的操作,具体可参见方法实施例中的描述,在此不再赘述。
请参见图8,图8是本申请实施例提供的一种通信装置的结构示意图,通信装置80用于执行图2-图5对应的方法实施例中网络设备所执行的步骤,通信装置80可以包括:
接收模块801,用于接收随机接入消息,随机接入消息包括随机接入前导码和物理上行共享信道PUSCH;
生成模块802,用于如果成功解码PUSCH,生成针对PUSCH的第一响应消息;
发送模块803,用于发送用于调度第一物理下行共享信道PDSCH的第一物理下行控制信道PDCCH,其中,第一PDCCH使用预设的扰码集合中的扰码加扰,第一PDSCH用于承载针对PUSCH的第一响应消息。
在一种实现方式中,PUSCH可以承载有终端设备的标识;通信装置80还可以包括:处理模块804和加扰模块805;处理模块804可以用于根据随机接入前导码、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,其中,预设的运算关系使得第一扰码位于预设的扰码集合中;加扰模块805可以用于根据第一扰码对第一PDCCH进行加扰。
在一种实现方式中,处理模块804具体可以用于根据终端设备的标识、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,当预设的扰码集合中的扰码为连续的扰码时,预设的运算关系可以为:
X=mod(UE_ID,N)+x min
其中,X为第一扰码,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码时,预设的运算关系 可以为:
index=mod(UE_ID,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码,X为第一扰码。
在一种实现方式中,处理模块804具体可以用于根据PUSCH的时频资源的位置信息得到第一数值,并根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,该通信装置80还可以包括确定模块806和调整模块807;确定模块806可以用于确定用于发送随机接入前导码的时频资源所对应的RA-RNTI;调整模块807可以用于如果RA-RNTI和第一扰码相同,根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码;加扰模块805具体可以用于根据调整后的第一扰码对第一PDCCH进行加扰。
在一种实现方式中,第一响应消息可以携带TC-RNTI;通信装置80还可以包括设置模块808,设置模块808可以用于将TC-RNTI设置为C-RNTI。
在一种实现方式中,第一响应消息可以携带C-RNTI。
在一种实现方式中,生成模块802还可以用于如果成功检测到随机接入前导码,生成针对随机接入前导码的第二响应消息;发送模块803还可以用于发送用于调度承载第二响应消息的第二PDSCH的第二PDCCH,第二PDCCH使用RA-RNTI加扰,第二响应消息携带上行调度信息;发送模块803还可以用于如果第二响应消息携带第二扰码,发送用于调度第三PDSCH的第三PDCCH,第三PDCCH使用所述第二扰码加扰,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息;和/或,发送模块803还可以用于如果第二响应消息未携带任何扰码,发送用于调度第三PDSCH的第三PDCCH,第三PDCCH使用第一扰码加扰。
需要说明的是,图8对应的实施例中未提及的内容以及各个模块执行步骤的具体实现方式可参见图2-图5所示实施例以及前述内容,这里不再赘述。
在一种实现方式中,图8中的各个模块所实现的相关功能可以结合处理器与收发器来实现。参见图9,图9是本申请实施例提供的一种网络设备的结构示意图,该网络设备90可以包括收发器901、处理器902和存储器903,收发器901、处理器902和存储器903可以通过一条或多条通信总线相互连接,也可以通过其它方式相连接。图8所示的接收模块801、生成模块802、发送模块803、处理模块804、加扰模块805、确定模块806、调整模块807和设置模块808所实现的相关功能可以通过同一个处理器902来实现,也可以通过多个不同的处理器902来实现。
收发器901可以用于发送数据和/或信令,以及接收数据和/或信令。应用在本申请实施例中,收发器901可以用于发送用于调度第一PDSCH的第一PDCCH,还可以用于接收随机接入消息。
处理器902被配置为执行图2-图5所述方法中网络设备相应的功能。该处理器902可以包括一个或多个处理器,例如该处理器902可以是一个或多个中央处理器(central  processing unit,CPU),网络处理器(network processor,NP),硬件芯片或者其任意组合。在处理器902是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
存储器903用于存储程序代码等。存储器903可以包括易失性存储器(volatile memory),例如随机存取存储器(random access memory,RAM);存储器903也可以包括非易失性存储器(non-volatile memory),例如只读存储器(read-only memory,ROM),快闪存储器(flash memory),硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD);存储器903还可以包括上述种类的存储器的组合。
处理器902可以调用存储器903中存储的程序代码以执行以下操作:
接收随机接入消息,随机接入消息包括随机接入前导码和物理上行共享信道PUSCH;
如果成功解码PUSCH,生成针对PUSCH的第一响应消息;
发送用于调度第一物理下行共享信道PDSCH的第一物理下行控制信道PDCCH,其中,第一PDCCH使用预设的扰码集合中的扰码加扰,第一PDSCH用于承载针对PUSCH的第一响应消息。
在一种实现方式中,PUSCH可以承载有终端设备的标识;处理器902还可以执行以下操作:根据随机接入前导码、终端设备的标识和PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,并根据第一扰码对第一PDCCH进行加扰,其中,预设的运算关系使得第一扰码位于预设的扰码集合中。
在一种实现方式中,处理器902具体可以执行以下操作:根据终端设备的标识、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,当预设的扰码集合中的扰码为连续的扰码时,预设的运算关系可以为:
X=mod(UE_ID,N)+x min
其中,X为第一扰码,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x min为预设的扰码集合中的最小扰码。
在一种实现方式中,当预设的扰码集合中的扰码为非连续的扰码时,预设的运算关系可以为:
index=mod(UE_ID,N)和X=x index∈{x 0,…,x N-1}
其中,index为预设的扰码集合中的扰码的索引,UE_ID为终端设备的标识,N为预设的扰码集合中扰码的数量,x index是索引为index的扰码,{x 0,…,x N-1}为预设的扰码集合,x 0是索引为0的扰码,x N-1是索引为N-1的扰码,X为第一扰码。
在一种实现方式中,处理器902具体可以执行以下操作:根据PUSCH的时频资源的位置信息得到第一数值,并根据第一数值、预设的扰码集合中扰码的数量和预设的运算关系得到第一扰码。
在一种实现方式中,处理器902还可以执行以下操作:确定用于发送随机接入前导码的时频资源所对应的RA-RNTI;如果RA-RNTI和第一扰码相同,根据预设的偏移值对第一扰码进行调整,得到调整后的第一扰码;处理器902执行根据第一扰码对第一PDCCH进行加扰时,具体可以执行以下操作:根据调整后的第一扰码对第一PDCCH进行加扰。
在一种实现方式中,第一响应消息可以携带TC-RNTI;处理器902还可以执行以下操 作:将TC-RNTI设置为C-RNTI。
在一种实现方式中,第一响应消息可以携带C-RNT。
在一种实现方式中,处理器902还可以执行以下操作:如果成功检测到随机接入前导码,生成针对随机接入前导码的第二响应消息;发送用于调度承载第二响应消息的第二PDSCH的第二PDCCH,第二PDCCH使用RA-RNTI加扰,第二响应消息携带上行调度信息;如果第二响应消息携带第二扰码,发送用于调度第三PDSCH的第三PDCCH,第三PDCCH使用所述第二扰码加扰,第三PDSCH用于承载针对上行调度信息所调度的上行传输的响应消息;和/或,如果第二响应消息未携带任何扰码,发送用于调度第三PDSCH的第三PDCCH,第三PDCCH使用第一扰码加扰。
进一步地,处理器902还可以执行图2-图5所示实施例中网络设备对应的操作,具体可参见方法实施例中的描述,在此不再赘述。
本申请实施例还提供一种计算机可读存储介质,可以用于存储图6所示实施例中通信装置所用的计算机软件指令,其包含用于执行上述实施例中为终端设备所设计的程序。
本申请实施例还提供一种计算机可读存储介质,可以用于存储图8所示实施例中通信装置所用的计算机软件指令,其包含用于执行上述实施例中为网络设备所设计的程序。
上述计算机可读存储介质包括但不限于快闪存储器、硬盘、固态硬盘。
本申请实施例还提供一种计算机程序产品,该计算机产品被计算设备运行时,可以执行上述图2-图5实施例中为终端设备所设计的方法。
本申请实施例还提供一种计算机程序产品,该计算机产品被计算设备运行时,可以执行上述图2-图5实施例中为网络设备所设计的方法。
在本申请实施例中还提供一种芯片,包括处理器和存储器,该存储器用包括处理器和存储器,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,该计算机程序用于实现上述方法实施例中的方法。
本领域普通技术人员可以意识到,结合本申请中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或 多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (21)

  1. 一种随机接入方法,其特征在于,所述方法包括:
    终端设备向网络设备发送随机接入消息,所述随机接入消息包括随机接入前导码和物理上行共享信道PUSCH;
    所述终端设备根据预设的扰码集合中的扰码监听第一物理下行控制信道PDCCH,所述第一PDCCH用于调度携带针对所述PUSCH的第一响应消息的第一物理下行共享信道PDSCH;
    所述终端设备根据监听到的所述第一PDCCH接收来自所述网络设备的所述第一PDSCH。
  2. 根据权利要求1所述的方法,其特征在于,所述PUSCH承载有所述终端设备的标识;所述终端设备根据预设的扰码集合中的扰码监听第一PDCCH,包括:
    所述终端设备根据所述随机接入前导码、所述终端设备的标识和用于发送所述PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,其中,所述预设的运算关系使得所述第一扰码位于所述预设的扰码集合中;
    所述终端设备根据所述第一扰码监听所述第一PDCCH。
  3. 根据权利要求2所述的方法,其特征在于,所述终端设备具体地根据所述终端设备的标识、所述预设的扰码集合中扰码的数量和所述预设的运算关系得到所述第一扰码。
  4. 根据权利要求3所述的方法,其特征在于,当所述预设的扰码集合中的扰码为连续的扰码时,所述预设的运算关系为:
    X=mod(UE_ID,N)+x min
    其中,所述X为所述第一扰码,所述UE_ID为所述终端设备的标识,所述N为所述预设的扰码集合中扰码的数量,所述x min为所述预设的扰码集合中的最小扰码。
  5. 根据权利要求3所述的方法,其特征在于,当所述预设的扰码集合中的扰码为非连续的扰码时,所述预设的运算关系为:
    index=mod(UE_ID,N)和X=x index∈{x 0,…,x N-1}
    其中,所述index为所述预设的扰码集合中的扰码的索引,所述UE_ID为所述终端设备的标识,所述N为所述预设的扰码集合中扰码的数量,所述x index是索引为index的扰码,所述{x 0,…,x N-1}为所述预设的扰码集合,所述x 0是索引为0的扰码,所述x N-1是索引为N-1的扰码,所述X为所述第一扰码。
  6. 根据权利要求2所述的方法,其特征在于,所述终端设备具体地根据用于发送所述PUSCH的时频资源的位置信息得到第一数值;
    所述终端设备根据所述第一数值、所述预设的扰码集合中扰码的数量和所述预设的运算关系得到所述第一扰码。
  7. 根据权利要求2至6任一项所述的方法,其特征在于,所述方法还包括:
    所述终端设备确定用于发送所述随机接入前导码的时频资源所对应的随机接入无线网络临时标识RA-RNTI;
    如果所述RA-RNTI和所述第一扰码相同,所述终端设备根据预设的偏移值对所述第一 扰码进行调整,得到调整后的第一扰码;
    所述终端设备根据所述第一扰码监听所述第一PDCCH包括:所述终端设备使用所述调整后的第一扰码监听所述第一PDCCH。
  8. 根据权利要求1至7任一项所述的方法,其特征在于,所述第一响应消息携带临时小区无线网络临时标识TC-RNTI;
    所述方法还包括:所述终端设备将所述TC-RNTI设置为小区无线网络临时标识C-RNTI。
  9. 根据权利要求1至7任一项所述的方法,其特征在于,所述第一响应消息携带小区无线网络临时标识C-RNTI。
  10. 根据权利要求2至9任一项所述的方法,其特征在于,所述方法还包括:
    如果所述终端设备监听到使用RA-RNTI加扰的第二PDCCH,所述第二PDCCH用于调度承载针对所述随机接入前导码的第二响应消息的第二PDSCH,所述第二响应消息携带上行调度信息;
    如果所述第二响应消息携带第二扰码,所述终端设备采用所述第二扰码监听第三PDCCH,所述第三PDCCH用于调度第三PDSCH,所述第三PDSCH用于承载针对所述上行调度信息所调度的上行传输的响应消息;和/或
    如果所述第二响应消息未携带任何扰码,所述终端设备采用所述第一扰码监听所述第三PDCCH。
  11. 一种通信装置,其特征在于,所述装置包括:
    发送模块,用于向网络设备发送随机接入消息,所述随机接入消息包括随机接入前导码和物理上行共享信道PUSCH;
    监听模块,用于根据预设的扰码集合中的扰码监听第一物理下行控制信道PDCCH,所述第一PDCCH用于调度携带针对所述PUSCH的第一响应消息的第一物理下行共享信道PDSCH;
    接收模块,用于根据监听到的所述第一PDCCH接收来自所述网络设备的所述第一PDSCH。
  12. 根据权利要求11所述的装置,其特征在于,所述PUSCH承载有终端设备的标识;
    所述监听模块,具体用于根据所述随机接入前导码、所述终端设备的标识和用于发送所述PUSCH的时频资源中的至少一种和预设的运算关系得到第一扰码,并根据所述第一扰码监听所述第一PDCCH,其中,所述预设的运算关系使得所述第一扰码位于所述预设的扰码集合中。
  13. 根据权利要求12所述的装置,其特征在于,所述监听模块具体用于根据所述终端设备的标识、所述预设的扰码集合中扰码的数量和所述预设的运算关系得到所述第一扰码。
  14. 根据权利要求13所述的装置,其特征在于,当所述预设的扰码集合中的扰码为连续的扰码时,所述预设的运算关系为:
    X=mod(UE_ID,N)+x min
    其中,所述X为所述第一扰码,所述UE_ID为所述终端设备的标识,所述N为所述预设的扰码集合中扰码的数量,所述x min为所述预设的扰码集合中的最小扰码。
  15. 根据权利要求13所述的装置,其特征在于,当所述预设的扰码集合中的扰码为非 连续的扰码时,所述预设的运算关系为:
    index=mod(UE_ID,N)和X=x index∈{x 0,…,x N-1}
    其中,所述index为所述预设的扰码集合中的扰码的索引,所述UE_ID为所述终端设备的标识,所述N为所述预设的扰码集合中扰码的数量,所述x index是索引为index的扰码,所述{x 0,…,x N-1}为所述预设的扰码集合,所述x 0是索引为0的扰码,所述x N-1是索引为N-1的扰码,所述X为所述第一扰码。
  16. 根据权利要求12所述的装置,其特征在于,所述监听模块具体用于根据用于发送所述PUSCH的时频资源的位置信息得到第一数值;并根据所述第一数值、所述预设的扰码集合中扰码的数量和所述预设的运算关系得到所述第一扰码。
  17. 根据权利要求12至16任一项所述的装置,其特征在于,所述装置还包括确定模块和调整模块;
    所述确定模块,用于确定用于发送所述随机接入前导码的时频资源所对应的随机接入无线网络临时标识RA-RNTI;
    所述调整模块,用于如果所述RA-RNTI和所述第一扰码相同,根据预设的偏移值对所述第一扰码进行调整,得到调整后的第一扰码;
    所述监听模块用于根据所述第一扰码监听所述第一PDCCH时,具体用于:使用所述调整后的第一扰码监听所述第一PDCCH。
  18. 根据权利要求11至17任一项所述的装置,其特征在于,所述第一响应消息携带临时小区无线网络临时标识TC-RNTI;
    所述装置还包括设置模块,所述设置模块用于将所述TC-RNTI设置为小区无线网络临时标识C-RNTI。
  19. 根据权利要求11至17任一项所述的装置,其特征在于,所述第一响应消息携带小区无线网络临时标识C-RNTI。
  20. 根据权利要求12至19任一项所述的装置,其特征在于,
    所述监听模块,还用于如果监听到使用RA-RNTI加扰的第二PDCCH,所述第二PDCCH用于调度承载针对所述随机接入前导码的第二响应消息的第二PDSCH,所述第二响应消息携带上行调度信息;
    所述监听模块,还用于如果所述第二响应消息携带第二扰码,采用所述第二扰码监听第三PDCCH,所述第三PDCCH用于调度第三PDSCH,所述第三PDSCH用于承载针对所述上行调度信息所调度的上行传输的响应消息;和/或,如果所述第二响应消息未携带任何扰码,采用所述第一扰码监听所述第三PDCCH。
  21. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被通信装置执行时使所述通信装置执行如权利要求1~10任一项所述的方法。
PCT/CN2020/087924 2019-05-01 2020-04-29 一种随机接入方法及其装置 WO2020221327A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910370990.0A CN111885739B (zh) 2019-05-01 2019-05-01 一种随机接入方法及其装置
CN201910370990.0 2019-05-01

Publications (2)

Publication Number Publication Date
WO2020221327A1 true WO2020221327A1 (zh) 2020-11-05
WO2020221327A8 WO2020221327A8 (zh) 2021-09-23

Family

ID=73028599

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/087924 WO2020221327A1 (zh) 2019-05-01 2020-04-29 一种随机接入方法及其装置

Country Status (2)

Country Link
CN (1) CN111885739B (zh)
WO (1) WO2020221327A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220322416A1 (en) * 2019-03-22 2022-10-06 Samsung Electronics Co., Ltd. Adjusting parameters of a transmission in response to interference

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114980369A (zh) * 2021-02-26 2022-08-30 上海推络通信科技合伙企业(有限合伙) 一种被用于无线通信的通信节点中的方法和装置
CN115884424A (zh) * 2021-08-24 2023-03-31 大唐移动通信设备有限公司 随机接入方法、网络侧设备、终端、装置及存储介质
CN114269026B (zh) * 2022-03-01 2022-05-10 成都爱瑞无线科技有限公司 随机接入信号处理方法、随机接入方法、装置及存储介质
WO2023206383A1 (zh) * 2022-04-29 2023-11-02 Oppo广东移动通信有限公司 随机接入方法、装置、设备、存储介质以及程序产品
WO2024092390A1 (zh) * 2022-10-31 2024-05-10 华为技术有限公司 一种通信方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140050188A1 (en) * 2011-04-25 2014-02-20 Pantech Co., Ltd Method and device for controlling the transception of multiple pieces of control information in a wireless communication system
US20140133430A1 (en) * 2011-06-28 2014-05-15 Lg Electronics Inc. Method and apparatus for transmitting/receiving uplink signal, and method and apparatus for transmitting/receiving downlink signal
CN107439047A (zh) * 2015-04-06 2017-12-05 Lg电子株式会社 在无线通信系统中基于共享资源发送和接收信号的方法及其设备
WO2018135631A1 (ja) * 2017-01-20 2018-07-26 シャープ株式会社 端末装置、基地局装置、通信方法、および、集積回路
CN109429308A (zh) * 2017-07-03 2019-03-05 中国移动通信有限公司研究院 一种连接管理方法、终端设备、网络设备及存储介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300331B (zh) * 2011-08-19 2013-11-27 电信科学技术研究院 数据传输方法和设备
CN109392180B (zh) * 2017-08-11 2021-06-29 中国移动通信有限公司研究院 一种随机接入方法、网络侧设备和移动通信终端
WO2020191679A1 (zh) * 2019-03-27 2020-10-01 Oppo广东移动通信有限公司 随机接入方法、终端设备和网络设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140050188A1 (en) * 2011-04-25 2014-02-20 Pantech Co., Ltd Method and device for controlling the transception of multiple pieces of control information in a wireless communication system
US20140133430A1 (en) * 2011-06-28 2014-05-15 Lg Electronics Inc. Method and apparatus for transmitting/receiving uplink signal, and method and apparatus for transmitting/receiving downlink signal
CN107439047A (zh) * 2015-04-06 2017-12-05 Lg电子株式会社 在无线通信系统中基于共享资源发送和接收信号的方法及其设备
WO2018135631A1 (ja) * 2017-01-20 2018-07-26 シャープ株式会社 端末装置、基地局装置、通信方法、および、集積回路
CN109429308A (zh) * 2017-07-03 2019-03-05 中国移动通信有限公司研究院 一种连接管理方法、终端设备、网络设备及存储介质

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
VIVO: "Discussion on Channel Structure for 2-Step RACH", 3GPP TSG RAN WG1 #96 BIS R1-1904059, 12 April 2019 (2019-04-12), XP051691264 *
ZTE ET AL.: "On 2-Step RACH Procedures", 3GPP TSG RAN WG1 MEETING #96BIS R1-1903879, 12 April 2019 (2019-04-12), XP051691124 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220322416A1 (en) * 2019-03-22 2022-10-06 Samsung Electronics Co., Ltd. Adjusting parameters of a transmission in response to interference

Also Published As

Publication number Publication date
CN111885739A (zh) 2020-11-03
CN111885739B (zh) 2022-09-23
WO2020221327A8 (zh) 2021-09-23

Similar Documents

Publication Publication Date Title
WO2020221327A1 (zh) 一种随机接入方法及其装置
US11818080B2 (en) Random access with bandwidth part switch
EP3791671B1 (en) Method and wireless communication system for handling timer operation
US10448430B2 (en) Group based random access method device and system
US9854604B2 (en) Controlling random access failure on a secondary cell
US11452139B2 (en) Random access procedure for latency reduction
JP6526207B2 (ja) 上りリンク信号を送信する方法及び使用者器機、並びに上りリンク信号を受信する方法及び基地局
WO2019120260A1 (zh) 通信方法和装置
EP3541133A1 (en) Uplink information processing method and device
CN111867130B (zh) 一种随机接入方法、装置及存储介质
CN108668374B (zh) 一种调度请求的传输方法及装置
US20130250888A1 (en) Radio communication terminal, radio communication base station and communication methods thereof, program for carrying out the communication method and medium for storing the program
JP2020136762A (ja) 基地局装置、端末装置、通信方法、および、集積回路
CN115997466A (zh) 用于小数据传输的方法和装置
KR20230039651A (ko) 무선 통신에서 소형 데이터 송신을 위한 랜덤 액세스 절차를 위한 방법 및 장치
US20220377766A1 (en) Configured ul with repetition
WO2019062582A1 (zh) 一种信息获取方法及终端
WO2017166023A1 (zh) 一种随机接入的方法及装置
CN113439467B (zh) 在终端和无线网络节点之间的通信
RU2788520C1 (ru) Терминал и способ передачи
WO2023160677A1 (zh) 一种通信方法及其装置
WO2021065692A1 (en) User equipments, base stations and methods for cancellation of uplink signal(s)
CN113875311B (zh) 基于非竞争的两步随机接入方法、装置、终端及存储介质
WO2022027527A1 (zh) 信号的发送和接收方法、装置和通信系统
EP4035477A1 (en) User equipments, base stations and methods for a priority of uplink transmission(s)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20798097

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20798097

Country of ref document: EP

Kind code of ref document: A1