WO2020249007A1 - Procédé de rapport d'informations exécuté par un équipement utilisateur et équipement utilisateur - Google Patents
Procédé de rapport d'informations exécuté par un équipement utilisateur et équipement utilisateur Download PDFInfo
- Publication number
- WO2020249007A1 WO2020249007A1 PCT/CN2020/095363 CN2020095363W WO2020249007A1 WO 2020249007 A1 WO2020249007 A1 WO 2020249007A1 CN 2020095363 W CN2020095363 W CN 2020095363W WO 2020249007 A1 WO2020249007 A1 WO 2020249007A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- random access
- information
- access process
- rach
- report
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 479
- 230000008569 process Effects 0.000 claims abstract description 387
- 230000008859 change Effects 0.000 claims description 112
- 230000005540 biological transmission Effects 0.000 claims description 23
- 230000015654 memory Effects 0.000 claims description 13
- 230000004044 response Effects 0.000 claims description 10
- 230000002708 enhancing effect Effects 0.000 abstract 1
- 238000011084 recovery Methods 0.000 description 23
- 238000005457 optimization Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000005259 measurement Methods 0.000 description 3
- 101150014328 RAN2 gene Proteins 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 101150069124 RAN1 gene Proteins 0.000 description 1
- 101100355633 Salmo salar ran gene Proteins 0.000 description 1
- 238000004378 air conditioning Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
Definitions
- the present disclosure relates to the field of wireless communication technology, and more specifically, the present disclosure relates to an information report method executed by a user equipment and a user equipment.
- network optimization can achieve the purpose of optimizing network performance.
- data collection and data analysis are performed on existing deployed and operating networks to find out the reasons that affect network quality, and network performance is improved by modifying configured network parameters, adjusting network structure, and deployed equipment.
- SON Self-configuration and Self-Optimization Network
- the network side can configure the UE to perform measurement for SON.
- the SON function includes many aspects, such as the Automatic Neighbour Relation Function (ANR), which is used to reduce the burden of neighbor management on the operator, and the Mobile Load Balancing function (MLB, Mobility Load), which is used to balance the responsibility of different cells. Balancing), Mobility Robustness Optimization (MRO) for users to optimize mobile performance, random access channel optimization for optimizing random access channel parameters, and radio link failure report for optimizing coverage and MRO Function etc.
- ANR Automatic Neighbour Relation Function
- MLB Mobile Load Balancing function
- MRO Mobility Robustness Optimization
- NR New Radio
- LTE Long Term Evolution
- the present disclosure aims to realize the random access channel performance in the SON function in the NR network and the coverage optimization problem caused by the random access problem, and further solve the problem of how to more accurately feed back the random access process information to the network side .
- the purpose of the present invention is to propose a solution to the random access channel performance in the SON function in the NR network and the coverage optimization problem caused by the random access problem. More specifically, the present disclosure proposes a solution to the problem of how to more accurately feed back random access process information to the network side.
- an information reporting method executed by user equipment is proposed, which is a random access channel RACH information reporting method containing two-step random access process information.
- the two-step random access process is based on contention
- the four-step random access process of the NAS implements an enhanced random access process.
- the method includes the following steps: When the user equipment UE sends to the base station the RACH report included in the RACH report, the connection establishment failure CEF report, or the radio link failure RLF report When sending information, the UE sets the content of the RACH information according to the following: the first information is set to indicate whether the corresponding random access process is a two-step random access process or a four-step random access process.
- an information reporting method executed by user equipment is proposed, which is a random access channel RACH information reporting method containing two-step random access process information.
- the two-step random access process is based on contention
- the four-step random access process of the NAS implements an enhanced random access process.
- the method includes the following steps: When the user equipment UE sends to the base station the RACH report included in the RACH report, the connection establishment failure CEF report, or the radio link failure RLF report Information, the UE sets the content of the RACH information according to the following: the second information is set to indicate whether the first random access type is changed during the corresponding random access process, where the random access type is Two-step random access or four-step random access.
- an information reporting method executed by user equipment is proposed, which is a random access channel RACH information reporting method containing two-step random access process information.
- the two-step random access process is based on contention
- the four-step random access process of the NAS implements an enhanced random access process.
- the method includes the following steps: When the user equipment UE sends to the base station the RACH report included in the RACH report, the connection establishment failure CEF report, or the radio link failure RLF report Information, the UE sets the content of the RACH information according to the following: the third information is set to indicate the reason or trigger condition of the random access type change that occurs in the corresponding random access process, wherein the random access The type is two-step random access or four-step random access.
- the third information is set to indicate that the reason for the random access type change is because Received a random access response indicating the UE to change or fall back to four-step random access; the reason for indicating the change of the random access type is that the number of attempts or transmissions of the two-step random access process reaches the configured maximum The number of times; or it is used to indicate that the reason for the change of the random access type is that the number of attempts or transmissions of the four-step random access process reaches the configured maximum number of times.
- the UE in addition to the first, second, and third information, also includes one or more of the following information in the RACH information: Information about the number of random access preambles sent by the media access control layer in the random access process; information used to indicate that contention is detected for at least one random access preamble sent during the corresponding random access process; Information indicating whether the carrier used in the random access process is a normal uplink carrier or a supplementary uplink carrier.
- an information reporting method performed by user equipment is proposed, which is a random access channel RACH information reporting method containing two-step random access process information.
- the two-step random access process is based on contention
- the four-step random access process of the NAS implements an enhanced random access process.
- the method includes the following steps: When the user equipment UE sends to the base station the RACH report included in the RACH report, the connection establishment failure CEF report, or the radio link failure RLF report In the case of information, the two-step random access process information and the four-step random access process information are distinguished by parameter settings.
- the RACH information includes one or more of the following information: used to indicate the corresponding two-step random access Information about the number of random access preambles sent by the media access control layer during the process; information used to indicate that contention is detected for at least one random access preamble sent in the corresponding two-step random access process; used to indicate The carrier used in the two-step random access process is the normal uplink carrier or supplementary uplink carrier information.
- the RACH information includes one or more of the following information: used to indicate the corresponding Information about the number of random access preambles sent by the media access control layer during the four-step random access process; used to indicate that contention is detected for at least one random access preamble sent in the corresponding four-step random access process Information; information used to indicate whether the carrier used in the four-step random access process is a normal uplink carrier or a supplementary uplink carrier.
- the two-step random access procedure includes: the UE sends a message A to the base station; and the UE receives a message B from the base station, and the message A includes random access.
- the message B includes a random access response or contention resolution identifier.
- the corresponding random access process is the random access process that has been successfully completed recently
- the RACH information is the information contained in the CEF report or the RLF report
- the corresponding random access process is the failed random access process.
- a user equipment including: a processor; and a memory on which instructions are stored.
- the instructions When the instructions are run by the processor, the user equipment executes the The information reporting method described in the article.
- the base station can obtain more accurate RACH information, thereby more accurately adjust the RACH parameters based on the accurate information in the RACH information report, and improve RACH performance And coverage performance.
- Fig. 1 is a diagram showing a contention-based random access procedure.
- Fig. 2 is a diagram showing a random access procedure based on non-contention.
- Figure 3 is a schematic diagram of the enhanced two-step random access process in R16.
- Figure 4 is a diagram showing a four-step random access RAR content and its corresponding medium access control layer subheader in the NR system.
- (a) is the MAC subheader corresponding to the MAC RAR containing the random access preamble identifier;
- (b) is the MAC subheader corresponding to the MAC RAR containing the fallback parameters;
- (c) is the MAC RAR content.
- Figure 5 is a diagram showing the four-step random access RAR content and its corresponding medium access control layer subheader in the LTE system.
- (a) is the MAC subheader corresponding to the MAC RAR containing the random access preamble identifier;
- (b) is the MAC subheader corresponding to the MAC RAR containing the fallback parameters;
- (c) is the MAC RAR content.
- FIG. 6 is a diagram showing an information report method executed by a user equipment according to Embodiment 1 of the present disclosure.
- FIG. 7 is a diagram showing an information report method executed by a user equipment according to Embodiment 2 of the present disclosure.
- Fig. 8 is a diagram showing an information report method executed by a user equipment according to Embodiment 3 of the present disclosure.
- FIG. 9 is a diagram showing an information report method executed by a user equipment according to Embodiment 4 of the present disclosure.
- FIG. 10 is a brief structural block diagram of the user equipment UE involved in the present disclosure.
- the base station in this disclosure can be any type of base station, including Node B, enhanced base station eNB, 5G communication system base station gNB, or micro base station, pico base station, macro base station, home base station, etc.; the cell can also be any of the above
- the cell under the type of base station, the cell can also be a beam, a transmission point (TRP), and a base station can also be a central unit (gNB-Central Unit, gNB-CU) or a distributed unit (gNB- Distributed Unit, gNB-DU).
- gNB-Central Unit gNB-CU
- gNB- Distributed Unit gNB- Distributed Unit
- LTE system is also used to refer to 5G and subsequent LTE systems (such as eLTE systems, or LTE systems that can be connected to the 5G core network) ), and LTE can be replaced with Evolved Universal Terrestrial Radio Access (E-UTRA) or E-UTRAN.
- E-UTRA Evolved Universal Terrestrial Radio Access
- Different embodiments can also work together.
- the RRC reconfiguration message in the present disclosure is equivalent to the RRC connection reconfiguration message; similarly, the response message RRC reconfiguration complete message is equivalent to the RRC connection reconfiguration complete message.
- the handover command is equivalent to the RRC message containing the handover command, and refers to the RRC message or the configuration in the RRC message that triggers the UE to perform the handover.
- Switch configuration refers to all or part of the configuration in the switch command. Cancel, release, delete, empty and clear can be replaced. Execution, use and application can be replaced. Configuration and reconfiguration can be replaced. Monitoring (monitor) and detection (detect) can be replaced. Conditional switching commands and conditional switching configurations can be replaced.
- Physical random access channel resource Physical Random Access Channel (PRACH) resource.
- the base station broadcasts the physical random access channel parameter configuration list on each carrier through system information (see the NPRACH-ParametersList-NB information element in the 3GPP protocol specification 36.331).
- the physical random access channel resource PRACH resource can refer to Physical frequency resources and/or time domain resources and/or code domain resources (such as preamble) for random access.
- Random Access Channel Random Access Channel, RACH.
- RACH can refer to either the transport channel RACH or the physical random access channel PRACH.
- RACH parameter/configuration refers to the wireless configuration that implements the random access function, including PRACH related configuration, such as the maximum number of preamble transmissions, power boost parameters, random access response receiving window size, MAC contention resolution timer configuration, PRACH time-frequency resource configuration , Message 1 (i.e.
- preamble subcarrier interval used to indicate the number of synchronization channel blocks (Synchronization Signal Block, SSB) corresponding to each RACH occasion (RACH occasion, RO) and the contention-based random preamble corresponding to each SSB
- SSB Synchronization Signal Block
- RACH occasion RO
- contention-based random preamble corresponding to each SSB
- the configuration of the number of preambles (configured by the ssb-perRACH-OccasionAndCB-PreamblesPerSSB information element), etc.
- the base station will issue a UEinformationRequest message to the UE, which contains a RACH report request indication (rach-reportreq information element) for requesting the UE to report the RACH report of the random access process.
- the UE After receiving the UEinformationRequest message containing the indication, the UE includes the RACH report in the UEinformationReponse message and reports it to the base station.
- the base station takes the RACH report reported by a UE as a sample. Based on enough samples, the base station can analyze whether the current RACH performance meets the demand, and adjust the RACH parameters according to the demand to improve the RACH performance.
- the base station sends a UEinformationRequest message to the UE, which contains a connection establishment failure report request indication (connEstFailReportReq information element) for requesting the UE to report the saved connection establishment failure information.
- the UE After receiving the UEinformationRequest message containing the indication, the UE includes the connection establishment failure report (connEstFailReport information element, referred to as the CEF report in this disclosure) in the UEinformationReponse message and reports it to the base station.
- the base station sends a UEinformationRequest message to the UE, which contains a radio link failure report request indication (rlf-ReportReq information element), which is used to request the UE to report the saved radio link failure (Radio Link Failure, RLF) report information.
- RLF Radio Link Failure
- both the RACH report and the CEF report contain two pieces of information about the random access process, one is the number of preamblesent for random access, which is used to indicate the number of preambles sent during the random access process.
- the number of times corresponds to the PREAMBLE_TRANSMISSION_COUNTER count value of the Medium Access Control (MAC, Medium Access Control) layer; the other is a contention detection indication (contentiondetected), which is used to indicate whether contention is detected for at least one random access preamble sent.
- MAC Medium Access Control
- contention detection indication contentiondetected
- the RACH parameters that can be adjusted by the base station may include RACH resource configuration, random access preamble division (such as division into dedicated preamble, group A and group B preamble grouping), RACH backoff (backoff) parameters, RACH transmission power control parameters, and so on.
- RACH resource configuration random access preamble division (such as division into dedicated preamble, group A and group B preamble grouping)
- RACH backoff (backoff) parameters RACH transmission power control parameters, and so on.
- the random access process information included in the CEF report and RLF report is also called RACH failure information, but unless otherwise specified, the random access process information included in the RACH report, CEF report, and RLF report can be used.
- RACH information Collectively referred to as RACH information.
- the CEF report can refer to the RRC connection establishment failure report, the RRC connection recovery failure report, and the RRC connection reestablishment failure report; that is to say, the CEF report in this disclosure can be applied to the failure of the RRC connection establishment process, the RRC Information when the connection recovery process fails or the RRC connection re-establishment process fails.
- the RACH information also contains SSB related information or channel state information reference signal (Channel State Information Reference Signal, CSI-RS) related information.
- the SSB/CSI-RS association information includes the SSB/CSI-RS index value and/or the number of random access preamble transmissions corresponding to each attempted SSB/CSI-RS, and the number of random access preambles used to indicate the random access associated Whether the uplink carrier is a normal uplink carrier (UL) or a supplementary uplink carrier (supplementary UpLink, SUL).
- CBRA contention-based random access
- CFRA contention-based random access
- the CBRA process is shown in Figure 1. It is divided into four steps: the first step is for the UE to send message 1 (i.e. random access preamble) to the base station; the second step: the UE receives the message 2 (i.e. random access preamble) from the base station.
- Random Access Response Random Access Response (RAR) message 2 can include time advance commands, backoff parameters, random access preamble identifiers, uplink grant UL grants, temporary cell radio network temporary identifiers (Temporary Cell-Radio Network Temporary Identifier, TC- RNTI), etc.;
- Step 3 The UE sends message 3 (uplink transmission scheduled by the uplink grant in message 2).
- Message 3 is generally used to send the UE ID to the base station for radio resource control (Radio Resource Control).
- RRC Radio Resource Control
- Step 4 UE receives message 4 from the base station (that is, the contention resolution message, which may include RRC message).
- the PRACH resource used in CBRA is shared by many UEs.
- the CFRA process is shown in Figure 2. It is divided into two steps: the first step is for the UE to send message 1 (i.e. random access preamble) to the base station; the second step: the UE receives the message 2 (i.e. random access preamble) from the base station. Access Response Random Access Response (RAR). After successfully receiving Message 2 associated with Message 1, the UE considers that the CFRA process is successfully completed.
- message 1 i.e. random access preamble
- RAR Access Response Random Access Response
- the uplink transmission scheduled by using the uplink grant uplink grant in the RAR can also be referred to as message 3.
- the base station In CFRA, the base station generally allocates dedicated PRACH resources such as preamble (referred to as step 0 in Figure 2) for the UE in advance, so there is no competition.
- a random access procedure is either CBRA or CFRA.
- CBRA random access resources and CFRA random access resources In NR, due to the existence of beams, it is possible to use both CBRA random access resources and CFRA random access resources during a random access process. That is to say, the retransmission of the random access preamble may change the random access resources used.
- UEs that are allocated CFRA resources select before sending msg1 During random access to resources, if the received power value of the reference signal measured by the SSB or CSI-RS corresponding to the allocated CFRA resource is less than a configured threshold, the UE will abandon the configured CFRA and choose the CBRA resource Select a random access resource corresponding to SSB or CSI-RS with better signal quality to send msg1.
- the one-step random access process is mainly based on the four-step random access process of CBRA for enhancement or improvement.
- the general mechanism of the two-step random access process is: First step: UE sends message A to the base station.
- Message A contains two parts of random access preamble and physical uplink shared channel (Physical Uplink Shared Channel, PUSCH) transmission, which actually corresponds to message 1 and message 3 of the traditional four-step random access process; the second step: UE receives from the base station The message B.
- Message B can implement the traditional four-step random access process message 2 (that is, it can include time advance commands, backoff parameters, random access preamble identifiers, uplink grant UL grants, and temporary cell radio network temporary identifiers (Temporary Cell-Radio Network Temporary Identifier, TC-RNTI), etc.) and/or message 4 (contention resolution identification and/or RRC message).
- TC-RNTI Temporary Cell-Radio Network Temporary Identifier
- the conclusion reached at the RAN1#96b meeting is that the PRACH resources used by two-step random access and four-step random access are independently configured.
- One conclusion of the RAN2#106 meeting was to support the fallback (or change to) the traditional four-step random access process from the two-step random access process.
- One of the two-step random access to four-step random access scenarios is that after the UE sends a message A for two-step random access, the received message B is an instruction to fall back to four-step random access.
- RAR the RAR indicating the fallback to the four-step random access may be the RAR of the traditional message 2, as shown in FIG. 4 and FIG. 5, or it may be a fallback RAR newly defined for the two-step random access.
- Another possible scenario of two-step random access to four-step random access is that the UE can switch to the four-step random access process and try the random access process again when it has tried multiple two-step random access procedures but failed.
- the base station cannot distinguish whether the RACH information is for the RACH parameters of the two-step random access process or the RACH parameters for the four-step random access process, because the base station cannot verify the received For more precise analysis of the sample, it is impossible to determine which RACH parameter (the random access configuration parameter corresponding to two-step random access or the random access configuration parameter corresponding to four-step random access) should be adjusted and how to adjust , Which makes the optimization of RACH parameters inaccurate or even wrong.
- the RACH parameters of the two-step random access process are configured separately from the RACH parameters of the traditional four-step random access process, in this configuration, the base station needs to separately determine the RACH performance and usage of the two-step random access process.
- the aforementioned two-step random access process can be converted or fall back to a four-step random access process, that is, a random access process may include both RACH resources using the two-step random access process
- the stage also includes the stage of using the RACH resources of the four-step random access process, and the RACH information report in the existing system cannot support this more refined RACH information, so that the base station cannot know the RACH information based on the received RACH information sample. Whether the sample is suitable for RACH performance optimization of two-step random access resources or four-step random resources, which may lead to inaccurate optimization of RACH performance and coverage performance.
- the RACH information report in the existing system cannot achieve more refined RACH information.
- the base station can obtain more accurate RACH information, so as to perform RACH more accurately based on the accurate information in the RACH information report. Parameter adjustment to improve RACH performance and coverage performance.
- the traditional random access process includes the random access process defined in NR or LTE Release 15 and previous versions.
- the traditional random access procedure refers to a traditional four-step random access procedure, namely CBRA; optionally, the traditional random access procedure refers to a traditional non-contention-based random access procedure, namely CFRA.
- the two-step random access process refers to the two-step random access process that is enhanced for the traditional random access process (CBRA or CFRA) in R16 and subsequent versions, and adopts the method of sending a random access preamble and a message A for uplink transmission PUSCH.
- the two-step random access process refers to a two-step random access process that enhances the traditional CBRA four-step random access process and adopts a method of sending a random access preamble and a message A for uplink transmission PUSCH.
- This embodiment provides a method for reporting RACH information including two-step random access process information.
- the UE when the user equipment UE sends the RACH information contained in the RACH report/CEF report/RLF report to the base station, the UE sets the content of the RACH information according to the following:
- the first information is set to indicate whether the corresponding random access process is a two-step random access process or a four-step random access process. Or described as being used to indicate whether the corresponding random access process is a two-step random access process or whether it is a four-step random access process.
- the corresponding random access process refers to the random access process that has been successfully completed recently;
- the RACH information is included in the CEF report or RLF report, the The corresponding random access process refers to the random access process that has failed, preferably, the random access process that has failed recently.
- the value of the corresponding field of the first information is "TURE” or "1”, indicating that the corresponding random access process is a two-step random access process.
- the value of the corresponding field of the first information is "FALSE” or "0”, which indicates that the corresponding random access process is a traditional four-step random access process.
- the domain corresponding to the first information is an enumerated type. That is, if its value is set to "2-step RACH", it means that the corresponding random access process is a two-step random access process; or its value is set to "4-step RACH", it means that the corresponding random access process is traditional Four-step random access process.
- the UE considers that the corresponding random access process is a four-step random access process. That is to say, the UE includes the first information only when the random access process is a two-step random access process.
- the two-step random access process can also be described as using PRACH resources or RACH configuration configured by two-step random access; the four-step random access process can also be described as using four-step random access.
- the configured PRACH resource or RACH configuration (for example, it is included in the RACH-configcommon or RACH-configDedicated information element in the NR system. When used for random access for beam failure recovery, it can be included in the rach- in the beam failure recovery configuration.
- the configBFR or candidateBeamRSList information element is included in the PRACH-config or RACH-configCommon or RACH-configDedicated information element in the LTE system).
- the base station can use the first information to receive the RACH information for the two-step random access process or the four-step random access process, so that the type of the random access process can be distinguished more accurately RACH parameter adjustment and network performance optimization.
- This embodiment provides another RACH information reporting method including two-step random access process information.
- the UE when the UE sends the RACH information contained in the RACH report/CEF report/RLF report to the base station, the UE sets the content of the RACH information according to the following:
- the second information is set to indicate whether the first random access type is changed during the corresponding random access process.
- the random access type refers to two-step random access or traditional random access.
- the first random access type change refers to a fallback/change from a two-step random access process to a traditional random access process.
- the first random access type change may also refer to a fallback/change from a traditional random access process to a two-step random access process.
- the second information may be referred to as a fallback instruction or a first random access type change instruction, which is only for convenience of description, and is not a limitation.
- the corresponding random access process refers to the random access process that has been successfully completed recently; when the RACH information is included in the CEF report or RLF report, the The corresponding random access process refers to the random access process that has failed, preferably, the random access process that has failed recently.
- the value of the corresponding field of the second information is "TURE” or "1”, which indicates that the corresponding random access process has undergone the first random access type change/backoff.
- the value of the corresponding field of the second information is "FALSE” or "0”, which means that the corresponding random access process has not undergone the first random access type change/backoff.
- the domain corresponding to the second information is an enumerated type. That is, if the value is set to "fallback” or “RACH type change” or “fallbackto4step", it means that the corresponding random access process has undergone the first random access type change/fallback.
- the second information may also indicate the direction of the random access process type change.
- the second information is also used to indicate that the type of the random access process changes from two-step random access/back-off to four-step random access, for example, the value can be set to "2stepto4step” at this time.
- the second information can also be used to indicate that the type of the random access process is changed from four-step random access to two-step random access, for example, its value can be set to "4stepto2step".
- the UE considers that the corresponding random access process has not undergone the first random access type change/backoff. That is to say, the UE includes the second information only when the first random access type change/backoff occurs in the random access process.
- the change in the first random access type may also be described as a change in the type of random access resource used.
- the random access process type changed from two-step random access to traditional random access can also be described as the use of PRACH resources or RACH configuration configured by two-step random access; change/fallback to traditional random access
- the configured PRACH resource or RACH configuration (such as included in the RACH-configcommon or RACH-configDedicated information element in the NR system, when used for random access for beam failure recovery, can be included in the rach of the beam failure recovery configuration -The configBFR or candidateBeamRSList information element is included in the PRACH-config or RACH-configCommon or RACH-configDedicated information element in the LTE system).
- This embodiment provides another RACH information reporting method including two-step random access process information.
- the UE when the UE sends the RACH information contained in the RACH report/CEF report/RLF report to the base station, the UE sets the content of the RACH information according to the following:
- the third information is set to indicate the reason or trigger condition/situation of the random access type change that occurs during the corresponding random access process.
- the random access type refers to two-step random access or traditional random access.
- the random access type change refers to a fallback/change from a two-step random access process to a traditional random access process.
- the random access type change may also refer to a fallback/change from a traditional random access process to a two-step random access process.
- the third information may be set to indicate that the reason for the change of the random access type is because it is received to indicate that the UE changes/fallback to traditional random access.
- RAR can also be described as the random access type change/fallback indicated by the network).
- the RAR can also be a traditional RAR (that is, the RAR used in the traditional random access process), or it can be an RAR defined specifically for indicating change/fallback to traditional random access.
- the third information may also be set to indicate that the reason for the random access type change is that the number of attempts/transmissions of the two-step random access process reaches the configured maximum number of times.
- the maximum number of times is used to determine the change of the random access type, that is, when the number of attempts of the two-step random access process (the number of times that the two-step random access resource is used to send the preamble) reaches or exceeds the configured maximum number of times, the UE
- the change/rollback is to use the traditional random access process (the corresponding random access resource is used to send the preamble).
- the third information may also be set to indicate that the reason for the change of the random access type is that the number of attempts/transmissions of the traditional random access process reaches the configured maximum number of times.
- the maximum number of times is used to determine the change of the random access type, that is, when the number of attempts of the traditional random access process (the number of times the preamble is sent using traditional random access resources) reaches or exceeds the configured maximum number of times, the UE changes/
- the fallback is to use a two-step random access process (the corresponding random access resource is used to send the preamble).
- the corresponding random access process refers to the random access process that has been successfully completed recently; when the RACH information is included in the CEF report or RLF report, the The corresponding random access process refers to the random access process that has failed, preferably, the random access process that has failed recently.
- the UE considers that no random access type change/back-off has occurred in the corresponding random access process. That is to say, the UE includes the third information only when the random access type is changed/backed off in the random access process.
- the third information can be used to implement the function of the second information in Embodiment 2.
- the random access type change can also be described as a change in the type of random access resource used.
- the random access process type changed from two-step random access to traditional random access can also be described as the use of PRACH resources or RACH configuration configured by two-step random access; change/fallback to traditional random access
- the configured PRACH resource or RACH configuration (such as included in the RACH-configcommon or RACH-configDedicated information element in the NR system, when used for random access for beam failure recovery, can be included in the rach of the beam failure recovery configuration -The configBFR or candidateBeamRSList information element is included in the PRACH-config or RACH-configCommon or RACH-configDedicated information element in the LTE system).
- the UE in addition to the first, second, and third information, also includes one or more of the aforementioned RACH information in the present disclosure in the RACH information, such as:
- the number of random access preambles sent by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time also includes the SSB index value corresponding to the sent random access preamble Or CSI-RS index value.
- the RACH information may include multiple SSB indexes or CSI-RS indexes and the corresponding random access preamble transmission times.
- the contention detected information may also distinguish SSB or CSI-RS, that is, the RACH information includes one or more SSB index values and the corresponding contention detected information (contentionDetected).
- the UE includes the above-mentioned RACH information in the UEinformationresponse message.
- the UE reports the above RACH information after receiving the RACH information request from the base station.
- the RACH information request received by the UE such as the rach-ReportReq information element or the rlf-ReportReq information element or the connEstFailReportReq information element
- the UE reports the content of the RACH information to the base station according to the above settings.
- the RACH information request indication used by the base station to request the UE to report is included in the UE information request message.
- the present disclosure does not limit the name of the radio resource control (Radio Resource Control, RRC) message including the above request or report.
- RRC Radio Resource Control
- This embodiment provides yet another RACH information reporting method including two-step random access process information.
- the two-step random access process information and the traditional random access process information are distinguished by parameter settings. That is, the RACH information in the report is divided into two sets, one set is RACH information used in a two-step random access process, and the other set is RACH information used in a traditional random access process.
- the RACH information includes one or more of the following information:
- the number of random access preambles sent by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time also includes the SSB index value corresponding to the sent random access preamble Or CSI-RS index value.
- the RACH information may include multiple SSB indexes or CSI-RS indexes and the corresponding random access preamble transmission times.
- the contention detected information may also distinguish SSB or CSI-RS, that is, the RACH information includes one or more SSB index values and the corresponding contention detected information (contentionDetected).
- the above-mentioned RACH information parameters in this embodiment distinguish two-step random access and traditional random access.
- the RACH information in the report is in the following format:
- -Parameter 1 Information used to indicate the number of random access preambles sent by the MAC layer in the corresponding two-step random access process (which can be expressed as numberOfPreamblesSent) and its associated SSB or CSI index value.
- the SSB or CSI index value is only applied in the NR system.
- the RACH information may include multiple parameters 1 corresponding to multiple SSB indexes or CSI-RS index values.
- -Parameter 2 Information used to indicate that contention resolution is unsuccessful for at least one random access preamble sent during the corresponding two-step random access process.
- the RACH information contains one or more SSB index values and corresponding parameters 2 of contention detected information (contentionDetected).
- the SSB or CSI index value is only applied in the NR system.
- -Parameter 3 Information used to indicate whether the carrier used in the two-step random access procedure is UL or SUL.
- -Parameter 4 Information used to indicate the number of random access preambles sent by the MAC layer in the corresponding traditional random access process (which can be expressed as numberOfPreamblesSent) and its associated SSB or CSI index value.
- the SSB or CSI index value is only applied in the NR system.
- the RACH information may include multiple parameters 4 corresponding to multiple SSB indexes or CSI-RS index values.
- -Parameter 5 Information used to indicate that competition is detected for at least one random access preamble sent in the corresponding traditional random access process or described as contention resolution unsuccessful.
- the RACH information contains one or more SSB index values and corresponding parameters 5 of contention detected information (contentionDetected).
- the SSB or CSI index value is only applied in the NR system.
- -Parameter 6 Information used to indicate whether the carrier used in the traditional random access procedure is UL or SUL.
- the random access process performed by the UE is a two-step random access process (that is, only the random access resources of the two-step random access process and the configured random access process are used, the random access process is not in the random access process. If the random access type change/fallback occurs during the process, the RACH information reported by the UE only needs to include the above-mentioned parameters for the two-step random access process, that is, only parameters 1, 2, and 3 are included.
- the UE When the random access process performed by the UE is a traditional random access process (that is, the random access process that only uses the random access resources of the traditional random access process and the configuration is completed, the random access type does not occur in the random access process Change/rollback), the UE only needs to include the above-mentioned parameters for the traditional random access process in the reported RACH information, that is, only include parameters 4, 5, and 6. Although the content of the parameters contained in the RACH information for the two-step random access and the traditional random access is the same, the different parameters/code points are adopted so that the base station can distinguish all the information when receiving the RACH information. Whether the RACH information is for two-step random access or traditional random access.
- the RACH information reported by the UE includes the above-mentioned parameters for the two-step random access process and the above-mentioned parameters for the traditional random access process. Parameters, including parameters 1, 2, 3, 4, 5, 6.
- the corresponding random access process refers to the random access process that has been successfully completed recently; when the RACH information is included in the CEF report or RLF report, the The corresponding random access process refers to the random access process that has failed, preferably, the random access process that has failed recently.
- the random access type change can also be described as a change in the type of random access resource used.
- the random access process type changed from two-step random access to traditional random access can also be described as the use of PRACH resources or RACH configuration configured by two-step random access; change/fallback to traditional random access
- the configured PRACH resource or RACH configuration (such as included in the RACH-configcommon or RACH-configDedicated information element in the NR system, when used for random access for beam failure recovery, can be included in the rach of the beam failure recovery configuration -The configBFR or candidateBeamRSList information element is included in the PRACH-config or RACH-configCommon or RACH-configDedicated information element in the LTE system).
- This embodiment provides a method for enabling the RACH information report including the two-step random access process information.
- the UE only includes the RACH information in the RACH information when the two-step random access process is enabled or the random access resource corresponding to the two-step random access process or other random access configuration is configured in its serving cell Contains RACH information related to the two-step random access process of any one or more of the foregoing embodiments 1 to 4.
- the two-step random access process is enabled or the random access resources or parameters corresponding to the two-step random access process can be enabled or configured through system information, or through dedicated RRC messages (such as RRC connection Reconfiguration messages, RRC connection release messages, etc.) are enabled or configured.
- the UE only includes the RACH information of any one or more of Embodiments 1 to 4 in the RACH information when the two-step random access process RACH information reporting is enabled in its serving cell.
- RACH information related to the random access procedure That is to say, the UE receives the RRC message from the base station that contains the enable indication of the RACH information reporting of the two-step random access process. Any one or more functions of the RACH information related to the two-step random access process.
- the RRC message may be system information or a dedicated RRC message (such as an RRC connection reconfiguration message, an RRC connection release message, etc.).
- the following is a description of the base station side corresponding to the above-mentioned UE side embodiment.
- This embodiment provides a method for reporting RACH information including two-step random access process information.
- the base station receives the RACH information contained in the RACH report/CEF report/RLF report sent by the UE, and the content of the RACH information includes:
- the first information is used to indicate whether the corresponding random access process is a two-step random access process or a traditional random access process. Or described as being used to indicate whether the corresponding random access process is a two-step random access process or whether it is a traditional random access process.
- the corresponding random access process refers to the random access process that has been successfully completed recently;
- the RACH information is included in the CEF report or RLF report, the The corresponding random access process refers to the random access process that has failed, preferably, the random access process that has failed recently.
- the value of the corresponding field of the first information is "TURE” or "1”, indicating that the corresponding random access process is a two-step random access process.
- the value of the corresponding field of the first information is "FALSE” or "0", which indicates that the corresponding random access process is a traditional random access process.
- the domain corresponding to the first information is an enumerated type. That is, if its value is set to "2-step RACH", it means that the corresponding random access process is a two-step random access process; or its value is set to "4-step RACH", it means that the corresponding random access process is traditional Four-step random access process.
- the base station considers that the corresponding random access process is a traditional random access process. That is to say, the base station only receives the first information when the random access process is a two-step random access process.
- the two-step random access procedure can also be described as using PRACH resources or RACH configuration configured by two-step random access; the traditional random access procedure can also be described as using traditional random access configuration PRACH resource or RACH configuration (such as included in the RACH-configcommon or RACH-configDedicated information element in the NR system, when used for random access for beam failure recovery, it can be included in the rach-configBFR or in the beam failure recovery configuration
- the candidateBeamRSList information element is included in the PRACH-config or RACH-configCommon or RACH-configDedicated information element in the LTE system).
- the RACH information also includes the aforementioned RACH information of the present disclosure, such as:
- the number of random access preambles sent by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time also includes the SSB index value corresponding to the sent random access preamble Or CSI-RS index value.
- the RACH information may include multiple SSB indexes or CSI-RS indexes and the number of times of sending the corresponding random access preamble.
- the contention detected information may also distinguish SSB or CSI-RS, that is, the RACH information includes one or more SSB index values and the corresponding contention detected information (contentionDetected).
- the base station receives the above-mentioned RACH information in a UEinformationresponse message.
- the base station before the above-mentioned base station receives the RACH information reported by the UE, it further includes the base station sending a RACH information request to the UE.
- a RACH information request (such as the rach-ReportReq information element or the rlf-ReportReq information element or the connEstFailReportReq information element) sent by the base station is set to "ture"
- the base station receives the content of the RACH information containing the above information.
- the RACH information request indication used by the base station to request the UE to report is included in the UE information request message.
- the present disclosure does not limit the name of the radio resource control (Radio Resource Control, RRC) message including the above request or report.
- RRC Radio Resource Control
- the base station can use the first information to receive the RACH information whether it is for the two-step random access process or the traditional random access process, so that the type of random access process can be distinguished more accurately.
- RACH parameter adjustment and network performance optimization are examples of RACH parameters adjustment and network performance optimization.
- This embodiment provides another RACH information reporting method including two-step random access process information.
- the base station receives the RACH information contained in the RACH report/CEF report/RLF report sent by the UE, and the content of the RACH information includes:
- the second information is used to indicate whether the random access type is changed during the corresponding random access process.
- the random access type refers to two-step random access or traditional random access.
- the random access type change refers to a fallback/change from a two-step random access process to a traditional random access process.
- the random access type change may also refer to a fallback/change from a traditional random access process to a two-step random access process.
- the second information may be referred to as a fallback instruction or a random access type change instruction, which is only for convenience of description and is not a limitation.
- the corresponding random access process refers to the random access process that has been successfully completed recently; when the RACH information is included in the CEF report or RLF report, the The corresponding random access process refers to the random access process that has failed, preferably, the random access process that has failed recently.
- the value of the corresponding field of the second information is "TURE” or "1”, which indicates that the random access type change/backoff has occurred in the corresponding random access process.
- the value of the corresponding field of the second information is "FALSE” or "0”, which indicates that no random access type change/back-off has occurred in the corresponding random access process.
- the domain corresponding to the second information is an enumerated type. That is, if the value is set to "fallback” or “RACH type change” or “fallbackto4step", it indicates that the random access type change/fallback has occurred in the corresponding random access process.
- the second information may also indicate the direction of the random access process type change.
- the second information is also used to indicate that the type of the random access process is changed from two-step random access/back-off to four-step random access, for example, its value is "2stepto4step” at this time.
- the second information can also be used to indicate that the type of random access process is changed from four-step random access to two-step random access, for example, the value is "4stepto2step".
- the base station considers that no random access type change/back-off has occurred in the corresponding random access process. That is to say, the base station only receives the RACH information including the second information when the random access type is changed/backed off in the random access process.
- the random access type change can also be described as a change in the type of random access resource used.
- the random access process type changed from two-step random access to traditional random access can also be described as the use of PRACH resources or RACH configuration configured by two-step random access; change/fallback to traditional random access
- the configured PRACH resource or RACH configuration (such as included in the RACH-configcommon or RACH-configDedicated information element in the NR system, when used for random access for beam failure recovery, can be included in the rach of the beam failure recovery configuration -The configBFR or candidateBeamRSList information element is included in the PRACH-config or RACH-configCommon or RACH-configDedicated information element in the LTE system).
- the base station receives the above-mentioned RACH information in a UEinformationresponse message.
- the base station before the above-mentioned base station receives the RACH information reported by the UE, it further includes the base station sending a RACH information request to the UE.
- the base station For example, if the RACH information request sent by the base station (such as the rach-ReportReq information element or the rlf-ReportReq information element or the connEstFailReportReq information element) is set to "ture", the base station receives the content of the RACH information containing the above information.
- the RACH information request indication used by the base station to request the UE to report is included in the UE information request message.
- This embodiment provides another RACH information reporting method including two-step random access process information.
- the base station receives the RACH information contained in the RACH report/CEF report/RLF report sent by the UE, and the content of the RACH information includes:
- the third information is used to indicate the reason or trigger condition/situation of the random access type change occurring in the corresponding random access process.
- the random access type refers to two-step random access or traditional random access.
- the random access type change refers to a fallback/change from a two-step random access process to a traditional random access process.
- the random access type change may also refer to a fallback/change from a traditional random access process to a two-step random access process.
- the third information is used to indicate that the reason for the random access type change is because the RAR used to instruct the UE to change/fall back to traditional random access is received (It can also be described as the random access type change/fallback indicated by the network).
- the RAR can also be a traditional RAR (that is, the RAR used in the traditional random access process), or it can be an RAR defined specifically for indicating change/fallback to traditional random access.
- the third information may also be used to indicate that the reason for the random access type change is that the number of attempts/transmissions of the two-step random access process reaches the configured maximum number of times.
- the maximum number of times is used to determine the change of the random access type, that is, when the number of attempts of the two-step random access process (the number of times that the two-step random access resource is used to send the preamble) reaches or exceeds the configured maximum number of times, the UE
- the change/rollback is to use the traditional random access process (the corresponding random access resource is used to send the preamble).
- the third information may also be used to indicate that the reason for the change of the random access type is that the number of attempts/transmissions of the traditional random access process reaches the configured maximum number of times.
- the maximum number of times is used to determine the change of the random access type, that is, when the number of attempts of the traditional random access process (the number of times the preamble is sent using traditional random access resources) reaches or exceeds the configured maximum number of times, the UE changes/
- the fallback is to use a two-step random access process (the corresponding random access resource is used to send the preamble).
- the corresponding random access process refers to the random access process that has been successfully completed recently; when the RACH information is included in the CEF report or RLF report, the The corresponding random access process refers to the random access process that has failed, preferably, the random access process that has failed recently.
- the base station considers that the random access type change/backoff has not occurred in the corresponding random access process. That is to say, the base station receives the RACH information including the third information only when the random access type change/backoff occurs in the random access process.
- the third information can also implement the function of the second information in Embodiment 7.
- the random access type change can also be described as a change in the type of random access resource used.
- the random access process type changed from two-step random access to traditional random access can also be described as the use of PRACH resources or RACH configuration configured by two-step random access; change/fallback to traditional random access
- the configured PRACH resource or RACH configuration (such as included in the RACH-configcommon or RACH-configDedicated information element in the NR system, when used for random access for beam failure recovery, can be included in the rach-
- the configBFR or candidateBeamRSList information element is included in the PRACH-config or RACH-configCommon or RACH-configDedicated information element in the LTE system).
- the base station receives the above-mentioned RACH information in a UEinformationresponse message.
- the base station before the above-mentioned base station receives the RACH information reported by the UE, it further includes the base station sending a RACH information request to the UE.
- a RACH information request (such as the rach-ReportReq information element or the rlf-ReportReq information element or the connEstFailReportReq information element) sent by the base station is set to "ture"
- the base station receives the content of the RACH information containing the above information.
- the RACH information request indication used by the base station to request the UE to report is included in the UE information request message.
- This embodiment provides yet another RACH information reporting method including two-step random access process information.
- the base station receives the RACH information contained in the RACH report/CEF report/RLF report sent by the UE.
- the two-step random access process information and the traditional random access process information in the content of the RACH information are distinguished parameter reception. That is, the RACH information in the report is divided into two sets, one set is RACH information used in a two-step random access process, and the other set is RACH information used in a traditional random access process.
- the RACH information includes one or more of the following information:
- the number of random access preambles sent by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time also includes the SSB index value corresponding to the sent random access preamble Or CSI-RS index value.
- the RACH information may include multiple SSB indexes or CSI-RS indexes and the corresponding random access preamble transmission times.
- the contention detected information may also distinguish SSB or CSI-RS, that is, the RACH information includes one or more SSB index values and the corresponding contention detected information (contentionDetected).
- the above-mentioned RACH information parameters in this embodiment distinguish two-step random access and traditional random access.
- the RACH information in the report is in the following format:
- -Parameter 1 Information used to indicate the number of random access preambles sent by the MAC layer in the corresponding two-step random access process (which can be expressed as numberOfPreamblesSent) and its associated SSB or CSI index value.
- the SSB or CSI index value is only applied in the NR system.
- the RACH information may include multiple parameters 1 corresponding to multiple SSB indexes or CSI-RS index values.
- -Parameter 2 Information used to indicate that contention resolution is unsuccessful for at least one random access preamble sent during the corresponding two-step random access process.
- the RACH information contains one or more SSB index values and corresponding parameters 2 of contention detected information (contentionDetected).
- the SSB or CSI index value is only applied in the NR system.
- -Parameter 3 Information used to indicate whether the carrier used in the two-step random access procedure is UL or SUL.
- -Parameter 4 Information used to indicate the number of random access preambles sent by the MAC layer in the corresponding traditional random access process (which can be expressed as numberOfPreamblesSent) and its associated SSB or CSI index value.
- the SSB or CSI index value is only applied in the NR system.
- the RACH information may include multiple parameters 4 corresponding to multiple SSB indexes or CSI-RS index values.
- -Parameter 5 Information used to indicate that competition is detected for at least one random access preamble sent in the corresponding traditional random access process or described as contention resolution unsuccessful.
- the RACH information contains one or more SSB index values and corresponding parameters 5 of contention detected information (contentionDetected).
- the SSB or CSI index value is only applied in the NR system.
- -Parameter 6 Information used to indicate whether the carrier used in the traditional random access procedure is UL or SUL.
- the random access process performed by the UE is a two-step random access process (that is, only the random access resources of the two-step random access process and the configured random access process are used, the random access process is not in the random access process. Random access type change/fallback occurs during the process), the RACH information reported by the UE received by the base station includes the above-mentioned parameters for the two-step random access process, that is, only parameters 1, 2, and 3 are included.
- the RACH information reported by the UE received by the base station includes the above-mentioned parameters for the traditional random access process, that is, only parameters 4, 5, and 6 are included.
- the content of the parameters contained in the RACH information for the two-step random access and the traditional random access is the same, the different parameters/code points are adopted so that the base station can distinguish all the information when receiving the RACH information. Whether the RACH information is for two-step random access or traditional random access.
- the RACH information reported by the UE received by the base station includes both the above-mentioned parameters for the two-step random access process and the traditional random access process.
- the above parameters of the process include parameters 1, 2, 3, 4, 5, and 6.
- the MAC layer needs to maintain two parameters: PREAMBLE_TRANSMISSION_COUNTER_2STEP and PREAMBLE_TRANSMISSION_COUNTER_4STEP.
- Parameter 1 corresponds to PREAMBLE_TRANSMISSION_COUNTER_2STEP of the MAC layer
- parameter 4 corresponds to PREAMBLE_TRANSMISSION_COUNTER_4STEP of the MAC layer.
- PREAMBLE_TRANSMISSION_COUNTER_2STEP is used to indicate the number of times that a two-step random access resource is used to send message A in a random access process
- PREAMBLE_TRANSMISSION_COUNTER_4STEP is used to indicate the number of times that a traditional random access resource is used to send message 1 in a random access process.
- PREAMBLE_TRANSMISSION_COUNTER does not reach or is not greater than the configured maximum threshold preambleTransMax
- the MAC layer will increase PREAMBLE_TRANSMISSION_COUNTER_2STEP by 1 each time message A is sent, and every time message 1 (that is, the preamble not included in message A) is sent, Add 1 to PREAMBLE_TRANSMISSION_COUNTER_4STEP; the MAC layer resets these two parameters to zero during the initialization phase or at the end of a random access process.
- the names of these two parameters are only for the convenience of presentation and are not restrictive.
- the corresponding random access procedure refers to the random access procedure that has been successfully completed recently; when the RACH information is contained in the CEF report or RLF report.
- the corresponding random access process refers to the random access process that failed, preferably, it refers to the random access process that failed recently.
- the random access type change can also be described as a change in the type of random access resource used.
- the random access process type changed from two-step random access to traditional random access can also be described as the use of PRACH resources or RACH configuration configured by two-step random access; change/fallback to traditional random access
- the configured PRACH resource or RACH configuration (such as included in the RACH-configcommon or RACH-configDedicated information element in the NR system, when used for random access for beam failure recovery, can be included in the rach of the beam failure recovery configuration -The configBFR or candidateBeamRSList information element is included in the PRACH-config or RACH-configCommon or RACH-configDedicated information element in the LTE system).
- the base station receives the above-mentioned RACH information in a UEinformationresponse message.
- the base station before the above-mentioned base station receives the RACH information reported by the UE, it further includes the base station sending a RACH information request to the UE.
- a RACH information request (such as the rach-ReportReq information element or the rlf-ReportReq information element or the connEstFailReportReq information element) sent by the base station is set to "ture"
- the base station receives the content of the RACH information containing the above information.
- the RACH information request indication used by the base station to request the UE to report is included in the UE information request message.
- This embodiment provides a random access information reporting method for changing the random access type between contention-based random access and non-competition-based random access during random access.
- the UE When the UE sends the RACH information contained in the RACH report/CEF report/RLF report to the base station, the UE sets the content of the RACH information according to the following:
- the fourth information is set to indicate whether the second random access type is changed during the corresponding random access process.
- the random access type in this embodiment refers to CBRA or CFRA.
- the second random access type change refers to a change from CFRA to CBRA.
- the second random access type change may also refer to a change from CBRA to CFRA.
- the fourth information may be referred to as the second random access type change indication, which is only for convenience of description and is not a limitation.
- the corresponding random access process refers to the random access process that has been successfully completed recently; when the RACH information is included in the CEF report or RLF report, the The corresponding random access process refers to the random access process that has failed, preferably, the random access process that has failed recently.
- the value of the corresponding field of the fourth information is "TURE” or "1”, which indicates that the corresponding random access process has undergone a second random access type change/backoff.
- the value of the corresponding field of the fourth information is "FALSE” or "0”, which indicates that the corresponding random access process has not undergone the second random access type change/backoff.
- the corresponding field of the fourth information is an enumerated type. That is, if the value is set to "RACH type change/switch", it means that the corresponding random access process has undergone a second random access type change/backoff.
- the UE considers that the corresponding random access process has not changed the second random access type. That is to say, the UE only includes the fourth information when the second random access type is changed in the random access process.
- the occurrence of the second random access type change can also be described as a change in the type of random access resource used.
- the change of the random access process type from CFRA to CBRA can also be described as the use of PRACH resources configured by CFRA or RACH configuration (such as included in the RACH-configDedicated information element in the NR system, which is used for beam failure recovery For random access, it can be included in the rach-configBFR or candidateBeamRSList information element in the beam failure recovery configuration. In the LTE system, it is included in the RACH-configDedicated information element). Change to the PRACH resource or RACH configuration configured by CBRA (Such as included in the RACH-configcommon information element).
- the UE includes the above-mentioned RACH information in the UEinformationresponse message.
- the UE reports the above RACH information after receiving the RACH information request from the base station.
- the RACH information request received by the UE such as the rach-ReportReq information element or the rlf-ReportReq information element or the connEstFailReportReq information element
- the UE reports the content of the RACH information to the base station according to the above settings.
- the RACH information request indication used by the base station to request the UE to report is included in the UE information request message.
- the UE sends the RACH information contained in the RACH report/CEF report/RLF report to the base station.
- the CBRA random access information and the CFRA random access information are received by distinguishing parameters. That is, the RACH information in the report is divided into two sets, one set is RACH information used for CBRA random access, and the other set is RACH information used for CFRA random access.
- the RACH information includes one or more of the following information:
- the number of random access preambles sent by the MAC layer is for a specific SSB or a specific CSI-RS, and at this time also includes the SSB index value corresponding to the sent random access preamble Or CSI-RS index value.
- the RACH information may include multiple SSB indexes or CSI-RS indexes and the corresponding random access preamble transmission times.
- the contention detected information may also distinguish SSB or CSI-RS, that is, the RACH information includes one or more SSB index values and the corresponding contention detected information (contentionDetected).
- the above-mentioned RACH information parameters in this embodiment distinguish between CBRA random access and CFRA random access.
- the RACH information in the report is in the following format:
- -Parameter 1 Information used to indicate the number of random access preambles sent by the MAC layer in the corresponding CBRA (can be expressed as numberOfPreamblesSent) and its associated SSB or CSI index value.
- the SSB or CSI index value is only applied in the NR system.
- the RACH information may include multiple parameters 1 corresponding to multiple SSB indexes or CSI-RS index values.
- -Parameter 2 Information used to indicate that contention resolution (contention resolution) is unsuccessful in the corresponding CBRA for at least one random access preamble sent.
- the RACH information contains one or more SSB index values and corresponding parameters 2 of contention detected information (contentionDetected).
- the SSB or CSI index value is only applied in the NR system.
- -Parameter 3 Information used to indicate whether the carrier used by the CBRA is UL or SUL.
- -Parameter 4 Information used to indicate the number of random access preambles sent by the MAC layer in the corresponding CFRA (which can be expressed as numberOfPreamblesSent) and its associated SSB or CSI index value.
- the SSB or CSI index value is only applied in the NR system.
- the RACH information may include multiple parameters 4 corresponding to multiple SSB indexes or CSI-RS index values.
- -Parameter 5 Information used to indicate whether the carrier used by the CFRA is UL or SUL.
- the UE when the random access process performed by the UE is a random access process that only uses the random access resources of CBRA and the configuration is completed, and the random access type does not change during the random access process, the UE will report to the base station
- the reported RACH information only includes the above-mentioned parameters for CBRA, that is, only parameters 1, 2, and 3.
- the random access process performed by the UE is a random access process that only uses the random access resources of CFRA and the configuration is completed, and the random access type does not change during the random access process
- the UE reports to the base station in the RACH information Only the above parameters for CFRA are included, that is, only parameters 4 and 5 are included.
- the RACH information reported by the UE to the base station includes both the above-mentioned parameters for CBRA and the above-mentioned parameters for CFRA, that is, parameters 1, 2, and 3. , 4, 5.
- the MAC layer needs to maintain two parameters: PREAMBLE_TRANSMISSION_COUNTER_CBRA and PREAMBLE_TRANSMISSION_COUNTER_CFRA.
- Parameter 1 corresponds to PREAMBLE_TRANSMISSION_COUNTER_CBRA of the MAC layer
- parameter 4 corresponds to PREAMBLE_TRANSMISSION_COUNTER_CFRA of the MAC layer.
- PREAMBLE_TRANSMISSION_COUNTER_CBRA is used to indicate the number of times that CBRA random access resources are used to send Message 1 in a random access process
- PREAMBLE_TRANSMISSION_COUNTER_CFRA is used to indicate the number of times that CFRA random access resources are used to send Message 1 in a random access process.
- PREAMBLE_TRANSMISSION_COUNTER has not reached or is not greater than the configured maximum threshold preambleTransMax, the MAC layer will increase PREAMBLE_TRANSMISSION_COUNTER_CBRA by 1 each time a message 1 is sent using CBRA resources, and increase PREAMBLE_TRANSMISSION_COUNTER_CFRA by 1 each time a message 1 is sent using CFRA resources; The MAC layer resets these two parameters to zero at the initialization stage or at the end of a random access process. In addition, the names of these two parameters are only for the convenience of presentation and are not restrictive.
- the corresponding random access procedure refers to the random access procedure that has been successfully completed recently; when the RACH information is contained in the CEF report or RLF report.
- the corresponding random access process refers to the random access process that failed, preferably, it refers to the random access process that failed recently.
- the random access type change can also be described as a change in the type of random access resource used.
- the change of the random access process type from CFRA to CBRA can also be described as the use of PRACH resources configured by CFRA or RACH configuration (such as included in the RACH-configDedicated information element in the NR system, which is used for beam failure recovery For random access, it can be included in the rach-configBFR or candidateBeamRSList information element in the beam failure recovery configuration. In the LTE system, it is included in the RACH-configDedicated information element). Change to the PRACH resource or RACH configuration configured by CBRA (Such as included in the RACH-configcommon information element).
- the base station receives the above-mentioned RACH information in a UEinformationresponse message.
- the UE before the foregoing UE reports the RACH information to the base station, it further includes that the UE receives a RACH information request from the base station.
- a RACH information request such as the rach-ReportReq information element or the rlf-ReportReq information element or the connEstFailReportReq information element
- the UE sends the content of the RACH information containing the above information to the base station.
- the RACH information request indication used to request the UE to report is included in the UE information request message.
- FIG. 10 is a brief structural block diagram of the user equipment UE involved in the present disclosure.
- the user equipment UE1000 includes a processor 1001 and a memory 1002.
- the processor 1001 may include, for example, a microprocessor, a microcontroller, an embedded processor, and the like.
- the memory 1002 may include, for example, volatile memory (such as random access memory RAM), hard disk drive (HDD), non-volatile memory (such as flash memory), or other memories.
- the memory 1002 stores program instructions. When the instruction is executed by the processor 1001, it can execute the above-mentioned method executed by the user equipment described in detail in this disclosure.
- the program running on the device may be a program that causes the computer to implement the functions of the embodiments of the present disclosure by controlling a central processing unit (CPU).
- the program or the information processed by the program can be temporarily stored in volatile memory (such as random access memory RAM), hard disk drive (HDD), non-volatile memory (such as flash memory), or other memory systems.
- the program for realizing the functions of the various embodiments of the present disclosure can be recorded on a computer-readable recording medium.
- Corresponding functions can be realized by causing the computer system to read the programs recorded on the recording medium and execute these programs.
- the so-called "computer system” herein may be a computer system embedded in the device, and may include an operating system or hardware (such as peripheral devices).
- the "computer-readable recording medium” may be a semiconductor recording medium, an optical recording medium, a magnetic recording medium, a recording medium storing a program dynamically for a short time, or any other recording medium readable by a computer.
- circuits for example, single-chip or multi-chip integrated circuits.
- Circuits designed to perform the functions described in this specification can include general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA), or other programmable logic devices, discrete Gate or transistor logic, discrete hardware components, or any combination of the above devices.
- the general-purpose processor may be a microprocessor, or any existing processor, controller, microcontroller, or state machine.
- the above-mentioned circuit can be a digital circuit or an analog circuit. In the case of new integrated circuit technologies that replace existing integrated circuits due to advances in semiconductor technology, one or more embodiments of the present disclosure may also be implemented using these new integrated circuit technologies.
- present disclosure is not limited to the above-mentioned embodiments. Although various examples of the embodiment have been described, the present disclosure is not limited thereto.
- Fixed or non-mobile electronic equipment installed indoors or outdoors can be used as terminal equipment or communication equipment, such as AV equipment, kitchen equipment, cleaning equipment, air conditioning, office equipment, vending machines, and other household appliances.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention concerne un procédé de rapport d'informations exécuté par un équipement utilisateur (UE) et un équipement utilisateur correspondant. Le procédé de rapport d'informations exécuté par un équipement utilisateur est un procédé de rapport d'informations de canal d'accès aléatoire (RACH) comprenant des informations de processus d'accès aléatoire en deux étapes et un processus d'accès aléatoire en deux étapes est un procédé d'accès aléatoire obtenu par l'amélioration d'un processus d'accès aléatoire en quatre étapes basé sur une contention. Le procédé comprend les étapes suivantes : lorsque l'UE envoie à une station de base des informations RACH comprises dans un rapport RACH, un rapport de défaillance d'établissement de connexion (CEF) ou un rapport de défaillance de liaison radio (RLF), l'UE configure le contenu des informations RACH selon l'opération suivante : configuration de premières informations, utilisées pour indiquer si un processus d'accès aléatoire correspondant est un processus d'accès aléatoire en deux étapes ou un procédé d'accès aléatoire en quatre étapes.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910514717.0 | 2019-06-13 | ||
CN201910514717.0A CN112087765B (zh) | 2019-06-13 | 2019-06-13 | 由用户设备执行的信息报告方法及用户设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020249007A1 true WO2020249007A1 (fr) | 2020-12-17 |
Family
ID=73733845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/095363 WO2020249007A1 (fr) | 2019-06-13 | 2020-06-10 | Procédé de rapport d'informations exécuté par un équipement utilisateur et équipement utilisateur |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112087765B (fr) |
WO (1) | WO2020249007A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023098811A1 (fr) * | 2021-12-03 | 2023-06-08 | 夏普株式会社 | Procédé de rapport d'échec d'établissement de connexion, et équipement utilisateur |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115150878A (zh) * | 2021-03-30 | 2022-10-04 | 夏普株式会社 | 随机接入信息上报方法和用户设备 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018064367A1 (fr) * | 2016-09-28 | 2018-04-05 | Idac Holdings, Inc. | Accès aléatoire dans des systèmes sans fil de prochaine génération |
WO2018204863A1 (fr) * | 2017-05-04 | 2018-11-08 | Ofinno Technologies, Llc | Configuration de mesure basée sur des faisceaux |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101841889B (zh) * | 2009-03-19 | 2014-11-05 | 中兴通讯股份有限公司 | 随机接入信息的获取方法及用户设备 |
EP3277047B1 (fr) * | 2016-07-28 | 2021-02-24 | ASUSTek Computer Inc. | Procédé et appareil permettant d'améliorer la procédure d'accès aléatoire dans un système de communication sans fil |
CN108271275B (zh) * | 2017-01-04 | 2021-02-05 | 电信科学技术研究院 | 一种竞争随机接入的方法和装置 |
-
2019
- 2019-06-13 CN CN201910514717.0A patent/CN112087765B/zh active Active
-
2020
- 2020-06-10 WO PCT/CN2020/095363 patent/WO2020249007A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018064367A1 (fr) * | 2016-09-28 | 2018-04-05 | Idac Holdings, Inc. | Accès aléatoire dans des systèmes sans fil de prochaine génération |
WO2018204863A1 (fr) * | 2017-05-04 | 2018-11-08 | Ofinno Technologies, Llc | Configuration de mesure basée sur des faisceaux |
Non-Patent Citations (1)
Title |
---|
ZTE CORPORATION ET AL.: "3GPP R2-1903549: Consideration on 2-step RACH procedure", 3GPP TSG-WG2 MEETING #105-BIS, 28 March 2019 (2019-03-28), XP051692814 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023098811A1 (fr) * | 2021-12-03 | 2023-06-08 | 夏普株式会社 | Procédé de rapport d'échec d'établissement de connexion, et équipement utilisateur |
Also Published As
Publication number | Publication date |
---|---|
CN112087765A (zh) | 2020-12-15 |
CN112087765B (zh) | 2024-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3817443B1 (fr) | Procédé exécuté par un équipement d'utilisateur, et équipement d'utilisateur | |
US20210400567A1 (en) | Preconfiguring dedicated resource information in idle mode | |
US20180184369A1 (en) | Communication system | |
WO2020052550A1 (fr) | Procédé de rapport d'informations, procédé d'acquisition d'informations, terminal et dispositif de réseau | |
WO2019137472A1 (fr) | Procédé et appareil de reprise après défaillance de faisceau | |
JP2021511710A (ja) | ビーム障害回復のためのコンテンションベースランダムアクセス | |
US20230105175A1 (en) | Methods for managing parallel measurement gap patterns for radio resource management and positioning measurements | |
WO2021129567A1 (fr) | Procédé de rapport d'accès aléatoire exécuté par un équipement utilisateur, et équipement utilisateur | |
KR102487406B1 (ko) | 무선 통신 시스템에서 기지국을 변경하는 방법 및 장치 | |
US11405952B2 (en) | User equipment and base station for improved prioritized random access | |
EP4216597A1 (fr) | Procédé de rapport de défaillance de liaison radio et équipement utilisateur | |
WO2020249007A1 (fr) | Procédé de rapport d'informations exécuté par un équipement utilisateur et équipement utilisateur | |
WO2015119568A1 (fr) | Procédés et dispositifs de décalage d'un préambule d'accès aléatoire | |
WO2022206668A1 (fr) | Procédé de rapport d'informations d'accès aléatoire et équipement utilisateur | |
US20220053573A1 (en) | Method and apparatus for ue information transmission for network optimization | |
WO2024027704A1 (fr) | Procédé de rapport d'informations de transfert intercellulaire, et équipement utilisateur | |
WO2023125649A1 (fr) | Procédé de rapport d'échec d'établissement de connexion et équipement utilisateur | |
WO2022194041A1 (fr) | Procédé de rapport d'accès aléatoire et équipement utilisateur | |
WO2022022444A1 (fr) | Procédé exécuté par un équipement utilisateur et équipement utilisateur | |
WO2021129568A1 (fr) | Procédé de rapport d'accès aléatoire exécuté par un équipement utilisateur et équipement utilisateur | |
WO2024114732A1 (fr) | Procédé de rapport d'accès aléatoire et équipement utilisateur | |
WO2020074636A1 (fr) | Auto-optimisation de sélection de faisceau | |
WO2023246765A1 (fr) | Procédé mis en œuvre par un équipement utilisateur, et équipement utilisateur | |
US20240276258A1 (en) | Failure reporting in small data transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20823176 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20823176 Country of ref document: EP Kind code of ref document: A1 |