WO2021062688A1 - 一种随机接入方法及装置 - Google Patents
一种随机接入方法及装置 Download PDFInfo
- Publication number
- WO2021062688A1 WO2021062688A1 PCT/CN2019/109574 CN2019109574W WO2021062688A1 WO 2021062688 A1 WO2021062688 A1 WO 2021062688A1 CN 2019109574 W CN2019109574 W CN 2019109574W WO 2021062688 A1 WO2021062688 A1 WO 2021062688A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- random access
- terminal device
- access parameter
- type
- network device
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 362
- 230000008569 process Effects 0.000 claims abstract description 214
- 230000015654 memory Effects 0.000 claims description 18
- 238000011084 recovery Methods 0.000 claims description 8
- 230000000977 initiatory effect Effects 0.000 abstract description 4
- 238000012545 processing Methods 0.000 description 73
- 238000004891 communication Methods 0.000 description 62
- 230000006870 function Effects 0.000 description 37
- 238000013461 design Methods 0.000 description 36
- 230000011664 signaling Effects 0.000 description 34
- 238000010586 diagram Methods 0.000 description 33
- 230000005540 biological transmission Effects 0.000 description 23
- 230000001960 triggered effect Effects 0.000 description 21
- 238000012913 prioritisation Methods 0.000 description 12
- 101100533725 Mus musculus Smr3a gene Proteins 0.000 description 10
- 230000004044 response Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 230000006399 behavior Effects 0.000 description 5
- 235000019800 disodium phosphate Nutrition 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 101100274486 Mus musculus Cited2 gene Proteins 0.000 description 3
- 101150096622 Smr2 gene Proteins 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 108700026140 MAC combination Proteins 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000009194 climbing Effects 0.000 description 1
- 239000013256 coordination polymer Substances 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
Definitions
- This application relates to the field of wireless communication technology, and in particular to a random access method and device.
- the terminal device needs to obtain uplink synchronization with the network device through a random access process to facilitate subsequent communication. Since the application scenarios of the fifth generation (5G) communication system are diversified, and different application scenarios have different requirements for random access, therefore, the priority of random access will be differentiated in the 5G communication system and have different priorities. Provide different random access services.
- 5G fifth generation
- the random access process is divided into high and low priority by the event that triggers the random access process.
- the random access process triggered by the handover event or the beam failure recovery event is specified as high.
- the priority random access process defines the random access process triggered by other events as a low priority random access process.
- the network device can configure the random access parameters used by the random access process triggered by the handover event for the terminal device.
- the 5G communication system also introduces multimedia priority services (MPS) terminal equipment and mission critical services (MCS) terminal equipment. Since MPS and MCS are relatively urgent services, in order to ensure such services
- the network equipment can configure the random access parameters used by the MPS terminal equipment and MCS terminal equipment to initiate the random access process.
- the purpose of the embodiments of the present application is to provide a random access method and device, which are used to solve the problem that the terminal equipment is not clear about the random access parameters used to initiate the random access process.
- the embodiments of the present application provide a random access method, which may be applied to a terminal device, or may also be applied to a chip inside the terminal device.
- the terminal device can receive first information and second information, where the first information is used to indicate the first random access parameter configured for the first type of terminal device, and the second information is used to indicate the first event The configured second random access parameter; when the terminal device is the first type of terminal device and the event that triggers the random access process is the first event, the terminal device can determine the target random access parameter and use the target random access parameter to initiate Random access process; where the target random access parameter is the first random access parameter or the second random access parameter.
- the terminal equipment determines the target random access parameters, so that by regulating the behavior of the terminal equipment, the random access parameters used by the terminal equipment to initiate the random access process are clarified, and the terminal equipment is prevented from selecting random access parameters.
- the behavior is unclear.
- the method further includes: the terminal device receives indication information, the indication information is used to indicate the target random access parameter, and the terminal device can determine the target random access parameter according to the indication information.
- the network side indicates the target random access parameters, which clarifies the random access parameters used by the terminal device to initiate the random access process.
- the network side indication method can make the target random access The choice of parameters is more flexible.
- the second random access parameter is the same as the first random access parameter.
- the target random access parameter is the first random access parameter, and the random access success rate corresponding to the first random access parameter is greater than the random access success rate corresponding to the second random access parameter; or , The target random access parameter is the second random access parameter, and the random access success rate corresponding to the first random access parameter is less than the random access success rate corresponding to the second random access parameter; or, the target random access parameter is The first random access parameter or the second random access parameter, the random access success rate corresponding to the first random access parameter is equal to the random access success rate corresponding to the second random access parameter.
- the terminal device can determine the target random access parameter according to the random success rate corresponding to the random access parameter, thereby clarifying the random access parameter used by the terminal device to initiate the random access process, and can effectively improve the random access success rate .
- determining the target random access parameter includes: when the terminal device is a terminal device of the first type and the event that triggers the random access process is the first event, the target random access parameter is the second random access parameter. Into the parameters.
- the method further includes: the terminal device sends type information to the network device or the core network device, and the type information is used to indicate the type of the terminal device.
- the type information is sent through the terminal device, so that the network device can obtain the type of the terminal device.
- the embodiments of the present application provide a random access method, which may be applied to a terminal device, or may also be applied to a chip inside the terminal device.
- the terminal device determines whether the second random access parameter corresponding to the first event is configured; when the second random access parameter is configured, the terminal device The device uses the second random access parameter to initiate the random access process; or, when the second random access parameter is not configured, the terminal device determines whether the first random access parameter corresponding to the first type of terminal device is configured, when When the first random access parameter is configured, the first random access parameter is used to initiate the random access process; or, when the second random access parameter corresponding to the first event is not configured and the first type of terminal device is not configured When corresponding to the first random access parameter, the terminal device uses the third random access parameter to initiate a random access process. In this way, the procedure for the terminal device to select the random access parameters used to initiate the random access process is clarified.
- the embodiments of the present application provide a random access method, which can be applied to a second network device, or can also be applied to a chip inside the second network device.
- the second network device sends second information to the terminal device, the second information is used to indicate the second random access parameter configured for the first event; the second network device obtains the type of the terminal device, and when the terminal device’s
- the type is the first type
- the instruction information is sent to the terminal device, and the instruction information is used to indicate the target random access parameter; where the target random access parameter is the first random access parameter or the second random access parameter, and the first random access parameter is the first random access parameter.
- the access parameter is configured by the first network device for the first type of terminal device.
- the network device can obtain the type of the terminal device, and when the terminal device is a terminal device of the first type, send indication information to the terminal device to instruct the terminal device to initiate the target used by the random access process triggered by the first event
- the random access parameter solves the problem that the terminal device does not know which random access parameter to use to initiate the random access process.
- the network device indicates the target random access parameter to the terminal device, so that the target random access parameter can be flexibly selected by the network device, and the implementation is more convenient.
- acquiring the type of the terminal device by the second network device includes: the second network device acquires the type of the terminal device from the terminal device; or, the second network device acquires the type of the terminal device from the core network device; or , The second network device obtains the type of the terminal device from the first network device.
- the embodiments of the present application provide a random access method, which can be applied to a network device, or can also be applied to a chip inside the network device.
- the second network device obtains the type of the terminal device; the second network device configures random access parameters for the terminal device according to the type of the terminal device.
- network equipment can configure random access parameters according to the type of terminal equipment, which can effectively avoid configuring multiple random access parameters for MPS terminal equipment or MCS terminal equipment, causing the terminal equipment to be unclear about which type of random access to use. Parameter to initiate the random access process.
- the second network device configures random access parameters for the terminal device according to the type of the terminal device, including: when the type of the terminal device is the first type, the second network device sends the third network device to the terminal device. Information, the third information is used to indicate random access parameters configured for the first type of terminal device.
- the network device can configure random access parameters for the first type of terminal device, instead of configuring additional random access parameters for the first event, thereby avoiding the terminal device's unclear usage The question of which random access parameter is used to initiate the random access process.
- the third information includes random access parameters, or the third information includes an index of random access parameters. In this way, when the third information includes the index of the random access parameter, resource overhead can be effectively saved.
- the second network device configures random access parameters for the terminal device according to the type of the terminal device, including: when the type of the terminal device is the first type, the second network device sends the second network device to the terminal device.
- Information the second information is used to indicate the random access parameter corresponding to the first event; wherein, the random access parameter corresponding to the first event is the same as the first random access parameter, and the first random access parameter is that the first network device is The first type of terminal equipment configuration.
- acquiring the type of the terminal device by the second network device includes: the second network device acquires the type of the terminal device from the terminal device; or, the second network device acquires the type of the terminal device from the core network device; or , The second network device obtains the type of the terminal device from the first network device.
- the embodiments of the present application provide a random access method, which may be applied to a terminal device, or may also be applied to a chip inside the terminal device.
- the terminal device sends type information to the first network device or the core network device, and the type information is used to indicate the type of the terminal device; and the terminal device obtains the second network device to configure random access parameters for the terminal device.
- the type information is sent by the terminal device, so that the network device can obtain the type of the terminal device, which is convenient for the network device to configure random access parameters for the terminal device according to the type of the terminal device.
- the terminal device acquiring the second network device to configure random access parameters for the terminal device includes: when the type of the terminal device is the first type, the terminal device receives the third information from the second network device, and The third information is used to indicate the random access parameters configured for the first type of terminal device.
- the third information includes random access parameters, or the third information includes an index of random access parameters.
- the terminal device acquiring the second network device to configure random access parameters for the terminal device includes: when the type of the terminal device is the first type, the terminal device receives the second information from the second network device, The second information is used to indicate the random access parameter corresponding to the first event;
- the random access parameter corresponding to the first event is the same as the first random access parameter, and the first random access parameter is configured by the first network device for the first type of terminal device.
- the first event is a beam failure recovery event or a handover event.
- the first type of terminal device includes a multimedia priority service MPS terminal device or a mission-critical service MCS terminal device.
- an embodiment of the present application provides a device, which includes units or means for executing each step included in any of the designs of the first aspect, the second aspect, or the fifth aspect.
- an embodiment of the present application provides a device that includes units or means for executing each step included in any of the designs of the third aspect or the fourth aspect.
- an embodiment of the present application provides a device including at least one processor and a memory, and the at least one processor is configured to execute the method provided in any one of the designs of the first aspect, the second aspect, or the fifth aspect.
- an embodiment of the present application provides an apparatus including at least one processor and a memory, and the at least one processor is configured to execute the method provided in any one of the designs of the third aspect or the fourth aspect.
- an embodiment of the present application provides a device including at least one processor and an interface circuit, and the at least one processor is configured to execute the method provided in any one of the designs of the first aspect, the second aspect, or the fifth aspect.
- an embodiment of the present application provides a device, including at least one processor and an interface circuit, and the at least one processor is configured to execute the method provided in any one of the designs of the third aspect or the fourth aspect.
- an embodiment of the present application provides a program, when the program is executed by a processor, it is used to execute the method provided in any one of the designs of the first aspect to the fifth aspect above.
- the embodiments of the present application provide a program product, such as a computer-readable storage medium.
- the computer reads and executes the program product, the computer executes any of the designs of the first aspect to the fifth aspect. Method provided in.
- the above device may be a chip, and the processor may be realized by hardware or software.
- the processor may be a logic circuit, an integrated circuit, etc.; when realized by software, the processor may be It is a general-purpose processor, realized by reading the software code stored in the memory, the memory can be integrated in the processor, can be located outside the processor, and exist independently.
- processors There are one or more processors and one or more memories.
- the memory can be integrated with the processor, or the memory and the processor can be provided separately.
- the memory and the processor may be integrated on the same chip, or may be separately arranged on different chips.
- the embodiment of the present application does not limit the type of the memory and the way of setting the memory and the processor.
- FIG. 1 is a schematic diagram of a network architecture to which an embodiment of this application is applicable;
- FIG. 2 is a schematic diagram of another network architecture to which the embodiments of this application are applicable;
- FIG. 3 is a schematic diagram of another network architecture to which the embodiments of this application are applicable.
- Figure 4 is a schematic diagram of a random access process provided by an embodiment of this application.
- FIG. 5a is an example diagram of the field ra-prioritizationForAccessIdentity provided by an embodiment of the application.
- Figure 5b is a schematic diagram of how a terminal device initiates a random access process triggered by a BFR event
- Figure 5c is a schematic diagram of how a terminal device initiates a random access process triggered by a handover event
- FIG. 6 is a schematic flow diagram corresponding to the random access method provided in Embodiment 1 of this application.
- FIG. 7a is a schematic diagram of a process of determining target random access parameters based on preset rules according to an embodiment of the application
- FIG. 7b is a schematic diagram of a process for determining target random access parameters based on preset rules according to an embodiment of the application
- FIG. 8 is a schematic diagram of a process corresponding to the random access method provided in the second embodiment of the application.
- FIG. 9 is a schematic flowchart corresponding to the random access method provided in Embodiment 3 of this application.
- FIG. 10 is a schematic diagram of a flow corresponding to the random access method provided in the fourth embodiment of the application.
- FIG. 11 is a possible exemplary block diagram of a device involved in an embodiment of this application.
- FIG. 12 is a schematic structural diagram of a terminal device provided by an embodiment of this application.
- FIG. 13 is a schematic structural diagram of a network device provided by an embodiment of this application.
- Terminal device It can be a wireless terminal device that can receive network device scheduling and instruction information.
- a wireless terminal device can be a device that provides voice and/or data connectivity to users, or a handheld device with wireless connection function, or Other processing equipment connected to the wireless modem.
- a terminal device can communicate with one or more core networks or the Internet via a radio access network (e.g., radio access network, RAN).
- the terminal device can be a mobile terminal device, such as a mobile phone (or called a "cellular" phone, mobile phone). (mobile phone)), computers and data cards, for example, may be portable, pocket-sized, handheld, built-in computer or vehicle-mounted mobile devices, which exchange language and/or data with the wireless access network.
- Wireless terminal equipment can also be called system, subscriber unit, subscriber station, mobile station, mobile station (MS), remote station (remote station), access point ( access point (AP), remote terminal equipment (remote terminal), access terminal equipment (access terminal), user terminal equipment (user terminal), user agent (user agent), subscriber station (SS), user terminal equipment (customer premises equipment, CPE), terminal (terminal), user equipment (user equipment, UE), mobile terminal (mobile terminal, MT), etc.
- the terminal device may also be a wearable device and a next-generation communication system, for example, a terminal device in a 5G communication system or a terminal device in a public land mobile network (PLMN) that will evolve in the future.
- PLMN public land mobile network
- the network equipment may be a radio access network (RAN) node (or device) that connects terminal equipment to the wireless network, and may also be called a base station.
- RAN equipment are: new generation Node B (gNodeB), transmission reception point (TRP), evolved Node B (evolved Node B, eNB), wireless network in 5G communication system Controller (radio network controller, RNC), node B (Node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB), Or home Node B, HNB, baseband unit (BBU), or wireless fidelity (Wi-Fi) access point (AP), etc.
- gNodeB new generation Node B
- TRP transmission reception point
- eNB evolved Node B
- eNB evolved Node B
- RNC radio network controller
- Node B Node B
- BSC base station controller
- BTS base transce
- the network device may include a centralized unit (CU) node, or a distributed unit (DU) node, or a RAN device including a CU node and a DU node.
- the network device may be another device that provides wireless communication functions for the terminal device.
- the embodiment of the present application does not limit the specific technology and specific device form adopted by the network device.
- a device that provides a wireless communication function for a terminal device is referred to as a network device.
- ordinal numbers such as "first" and "second” mentioned in the embodiments of this application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects. degree.
- the first information and the second information are only for distinguishing different information, but do not indicate the difference in priority or importance of the two types of information.
- FIG. 1 is a schematic diagram of a network architecture to which an embodiment of this application is applicable.
- the terminal device 130 can access a wireless network to obtain services from an external network (such as the Internet) through the wireless network, or communicate with other devices through the wireless network, for example, it can communicate with other terminal devices.
- the wireless network includes a radio access network (RAN) device 110 and a core network (core network, CN) device 120.
- the RAN device 110 is used to connect the terminal device 130 to the wireless network
- the CN device 120 is used to Manage terminal equipment and provide a gateway for communication with the external network.
- the number of devices in the communication system shown in FIG. 1 is only for illustration, and the embodiment of the present application is not limited to this. In actual applications, the communication system may also include more terminal devices 130 and more RAN devices. 110, it may also include other devices.
- the CN may include multiple CN devices 120.
- the CN device 120 may be an access and mobility management function (AMF) entity, session management A function (session management function, SMF) entity or a user plane function (UPF) entity, etc.
- AMF access and mobility management function
- SMF session management function
- UPF user plane function
- the CN device 120 may be a mobility management entity (mobility management entity). entity, MME) and serving gateway (serving gateway, S-GW), etc.
- MME mobility management entity
- serving gateway serving gateway
- FIG. 2 is a schematic diagram of another network architecture to which the embodiments of this application are applicable.
- the network architecture includes CN equipment, RAN equipment and terminal equipment.
- the RAN equipment includes a baseband device and a radio frequency device.
- the baseband device can be implemented by one node or by multiple nodes.
- the radio frequency device can be implemented remotely from the baseband device, or integrated in the baseband device, or partially pulled.
- the remote part is integrated in the baseband device.
- the RAN equipment (eNB) includes a baseband device and a radio frequency device, where the radio frequency device can be arranged remotely relative to the baseband device, such as a remote radio unit (RRU) arranged remotely relative to the BBU .
- RRU remote radio unit
- the control plane protocol layer structure can include the radio resource control (radio resource control, RRC) layer and the packet data convergence protocol (packet data convergence protocol, PDCP) layer.
- RRC radio resource control
- PDCP packet data convergence protocol
- RLC Radio link control
- MAC media access control
- user plane protocol layer structure can include PDCP layer, RLC layer, MAC layer
- SDAP service data adaptation protocol
- the RAN equipment can be implemented by one node to implement the functions of the RRC, PDCP, RLC, and MAC protocol layers, or multiple nodes can implement the functions of these protocol layers.
- RAN equipment may include CUs and DUs, and multiple DUs may be centrally controlled by one CU.
- CU and DU can be divided according to the protocol layer of the wireless network. For example, the functions of the PDCP layer and the above protocol layers are set in the CU, and the protocol layers below the PDCP, such as the RLC layer and MAC layer, are set in the DU.
- This type of protocol layer division is just an example, it can also be divided in other protocol layers, for example, in the RLC layer, the functions of the RLC layer and above protocol layers are set in the CU, and the functions of the protocol layers below the RLC layer are set in the DU; Or, in a certain protocol layer, for example, part of the functions of the RLC layer and the functions of the protocol layer above the RLC layer are set in the CU, and the remaining functions of the RLC layer and the functions of the protocol layer below the RLC layer are set in the DU. In addition, it can also be divided in other ways, for example, by time delay. The functions that need to meet the delay requirement for processing time are set in the DU, and the functions that do not need to meet the delay requirement are set in the CU.
- the radio frequency device can be remote, not placed in the DU, can also be integrated in the DU, or part of the remote part is integrated in the DU, and there is no restriction here.
- FIG. 3 is a schematic diagram of another network architecture to which the embodiments of this application are applicable.
- the control plane (CP) and the user plane (UP) of the CU can also be separated and implemented by dividing them into different entities, namely the control plane (CP) CU entity (That is, the CU-CP entity) and the user plane (UP) CU entity (that is, the CU-UP entity).
- CP control plane
- UP user plane
- the signaling generated by the CU can be sent to the terminal device through the DU, or the signaling generated by the terminal device can be sent to the CU through the DU.
- the DU may directly pass the protocol layer encapsulation without analyzing the signaling and transparently transmit it to the terminal device or the CU. If the following embodiments involve the transmission of such signaling between the DU and the terminal device, at this time, the sending or receiving of the signaling by the DU includes this scenario.
- the RRC or PDCP layer signaling will eventually be processed as PHY layer signaling and sent to the terminal device, or converted from the received PHY layer signaling.
- the RRC or PDCP layer signaling can also be considered to be sent by the DU, or sent by the DU and radio frequency loading.
- the network architecture shown in Fig. 1, Fig. 2 or Fig. 3 can be applied to various radio access technology (RAT) communication systems, such as LTE communication system or 5G (or called The new radio (NR) communication system may also be a transitional system between an LTE communication system and a 5G communication system.
- the transitional system may also be referred to as a 4.5G communication system, and of course it may also be a future communication system.
- RAT radio access technology
- the network architecture and business scenarios described in the embodiments of this application are intended to more clearly illustrate the technical solutions of the embodiments of this application, and do not constitute a limitation on the technical solutions provided in the embodiments of this application. Those of ordinary skill in the art will know that with communication With the evolution of the network architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are equally applicable to similar technical problems.
- the devices in the following embodiments of the present application may be located in terminal equipment or network equipment according to their realized functions.
- the network device may be a CU node, or a DU node, or a RAN device including a CU node and a DU node.
- the terminal device can establish uplink synchronization with the network device through a random access process, and obtain a unique terminal identifier, such as a cell radio network temporary identifier (cell radio network). temporary identifier, C-RNTI), and the terminal device can perform uplink transmission with the network device.
- a unique terminal identifier such as a cell radio network temporary identifier (cell radio network). temporary identifier, C-RNTI
- the random access process refers to the process from the terminal device sending a random access signal to try to access the network to the process before the basic signaling connection is established with the network device.
- the random access signal can be used to initiate a random access process.
- the random access signal can be a random access preamble.
- the random access signal may also be a demodulation reference signal (DMRS).
- DMRS demodulation reference signal
- the terminal device can exchange information with the network device through the random access process to achieve uplink time synchronization with the communication system.
- it can also perform resource request or data transmission through the random access process.
- the random access process may also be referred to as random access or random access channel process or random access mode, which is not distinguished in this application, and may be used instead in the following description.
- the random access process can be triggered by the following scenarios: (1) The initial access of the terminal device is controlled by the radio resource (radio resource control, RRC) idle (RRC_IDLE) state to RRC connected (RRC_CONNECTED) state to establish a wireless connection; (2) RRC connection re-establishment procedure; (3) handover; (4) ) In the RRC_CONNECTED state, when the downlink data arrives (the acknowledgment (ACK)/non-acknowledgement (NACK) is required at this time), the uplink is in the "unsynchronized” state; (5) In the RRC_CONNECTED state, the uplink data arrives (for example, a measurement report needs to be reported) Or sending user data), the uplink is in an "out of synchronization" state or there is no available physical uplink control channel (PUCCH) resource for scheduling request (SR) transmission (the terminal that allows uplink synchronization at
- the random access process can also be triggered by the following scenarios: (1) The uplink (UL) data arrives in the inactive (Inactive) state, and the uplink is in the "unsynchronized” state at this time; (2) ) When the downlink (DL) data arrives in the Inactive state, the uplink is in the "out of synchronization” state; (3) Requesting On-demand system information (system information, SI) (In the 5G communication system, system messages are divided into two types : Minimum SI and On-demand SI, where minimum SI is required by all terminal devices, while On-demand SI can be requested according to the needs of the terminal device itself; (4) beam failure recovery (BFR) .
- SI On-demand system information
- the random access process is divided into a high priority random access process and a low priority random access process according to the event that triggers the random access process.
- the random access process triggered by the handover or beam failure recovery event It is defined as a high-priority random access process
- the random access process triggered by other events is defined as a low-priority random access process.
- the network device can configure two special parameters for the high-priority random access process, which are the power used in the high-priority random access process.
- the climbing step length powerRampingStepHighPriority
- the backoff factor scalingFactorBI
- the power ramping mechanism refers to: when the random access preamble fails to be sent, the transmission power is continuously increased to increase the probability of retransmitting the preamble successfully.
- the power ramp formula is as follows:
- preambleReceivedTargetPower is the preamble target received power
- DELTA_PREAMBLE is the power deviation based on the preamble format, which can be a pre-configured value
- PREAMBLE_POWER_RAMPING_COUNTER is the power ramp counter
- PREAMBLE_POWER_RAMPING_STEP is the preamble power ramp step length.
- the second transmission will be performed with the power of X+PREAMBLE_POWER_RAMPING_STEP; if the second time If the random access preamble fails to be sent even after the power ramps up, the power of X+PREAMBLE_POWER_RAMPING_STEP+PREAMBLE_POWER_RAMPING_STEP is used to increase, and so on, until the maximum number of transmissions is reached or the maximum transmission power limit of the terminal device is reached.
- the value of PREAMBLE_POWER_RAMPING_STEP is powerRampingStepHighPriority; for the low-priority random access process, the value of PREAMBLE_POWER_RAMPING_STEP is the power ramping step (powerRampingStep).
- scalingFactorBI is mainly used in the backoff mechanism.
- the backoff mechanism refers to that after the current amble transmission fails, in order to increase the probability of random access success, the terminal device can randomly select a value between 0 and the backoff indicator (BI), and then the terminal The device initiates the random access process again after delaying the time corresponding to the corresponding value, thereby increasing the probability of random access success.
- the terminal device can directly use the BI value carried in the RAR message by the network device; for a high-priority random access process, if necessary
- the terminal device can multiply the BI value by the scalingFactorBI, that is, when the terminal device executes the backoff mechanism, it randomly selects a value in the range of 0 ⁇ BI*scalingFactorBI, and then initiates the random access process again after a corresponding value time delay.
- the following describes how the network device configures the above two parameters.
- the high-priority random access process includes the random access process triggered by the BFR event and the random access process triggered by the handover event. That is to say, the network equipment can configure the above two parameters for the BFR event or the handover event. .
- the network device can send BFR configuration information to the terminal device.
- the BFR configuration information includes the powerRampingStepHighPriority and scalingFactorBI configured by the network device for the BFR event; accordingly, after the terminal device receives the BFR configuration information, if it is determined that BFR has occurred Event, you can use the parameters configured by the network device for the BFR to initiate the random access process.
- the target network device can send a switching command to the terminal device through the source network device.
- the switching command includes the powerRampingStepHighPriority and scalingFactorBI configured by the target network device for the switching event; accordingly, after the terminal device receives the switching command,
- the random access procedure can be initiated using the parameters configured by the target network device for the handover event.
- the random access process is divided into a high priority random access process and a low priority random access process.
- the random access process can be divided into a contention-based random access process and a non-contention-based random access process.
- the terminal device can select the preamble; when the event that triggers the random access process is the aforementioned events other than handover and beam failure recovery, the random access based on contention can be used process.
- the network device can allocate the preamble to the terminal device; when the event that triggers the random access process is the handover and beam failure recovery events described above, the non-competition-based random access process can be used .
- Fig. 4 is a schematic diagram of a random access process provided by an embodiment of the application. As shown in FIG. 4, the random access procedure provided by the embodiment of the present application includes the following steps.
- Step 400 The network device sends random access configuration information to the terminal device, and the terminal device can receive random access configuration information from the network device, where the random access configuration information is used to configure random access parameters.
- This step may be used to perform preparatory work before the random access process, and is not a step included in the random access process.
- the random access parameters may include one or more of the following: physical random access channel (PRACH) resource set used to transmit the random access preamble; random access preamble (preamble) Set; the maximum number of transmissions of the random access preamble; the initial transmit power of the random access preamble; the size of the random access response window; the hybrid automatic repeat request (HARQ) maximum retransmission of the third message Number of times; the duration of the competition resolution timer.
- PRACH physical random access channel
- preamble random access preamble
- HARQ hybrid automatic repeat request
- the random access parameter may also include the power ramp step length.
- the PRACH resource set may include time-frequency resources that can be used by the terminal device to send the preamble, which may be indicated by the field rach-ConfigGeneric.
- the maximum number of transmissions of the random access preamble can be indicated by the field totalNumberOfRA-Preambles.
- the initial transmit power of the random access preamble can be indicated by the field reambleInitialReceivedTargetpower.
- the size of the random access response window is used to indicate the number of subframes included in the random access response window, which can be indicated by the field ra-ResponsewindowSize.
- the random access response window starts from the subframe in which the terminal device sends the preamble (if preamble If multiple subframes are spanned in the time domain, the third subframe after the last subframe is used for calculation, and it continues for ra-ResponseWindowSize subframes.
- the maximum number of HARQ retransmissions of the third message can be indicated by the field maxHARQ-Msg3.
- the duration of the contention resolution timer can be indicated by the field mac-ContentionResolutionTimer.
- the random access configuration information sent by the network device is configured with the RACH resource set, but the maximum number of transmissions of the random access preamble is not configured (for example, the random access configuration information includes the field rach-ConfigGeneric, but does not include the field totalNumberOfRA-Preambles)
- the value of the maximum transmission times of the random access preamble can be the default value.
- the random access parameter may also include other content related to the random access process, such as time indication information.
- the time indication information is introduced below.
- the terminal device when the terminal device sends Msg1 for the first time, it does not need to wait, but can send it directly; when it fails to send Msg1 for the first time and needs to be retransmitted, the terminal device can send it according to the network device's status.
- the BI indicated in Msg2 determines the back-off time, and after waiting for the corresponding back-off time, Msg1 is resent.
- the 5G communication system supports a large number of terminal devices in the future, it is possible that a large number of terminal devices need to initiate a random access process at the same time. When a large number of terminal devices send Msg1 at the same time, it will cause access congestion and affect access performance.
- time indication information can be introduced into the random access parameters, and the time indication information is used to determine the time to wait before sending Msg1 for the first time. That is to say, when the terminal device sends Msg1 for the first time, it can determine the back-off time according to the time indication information, and initiate Msg1 after waiting for the back-off time; when it fails to send Msg1 for the first time and needs to be retransmitted, the terminal device can The backoff time is determined according to the BI indicated by the network device in Msg2. In this way, since the terminal device can back off according to the determined backoff time when Msg1 occurs for the first time, it can effectively avoid access congestion caused by a large number of terminal devices sending Msg1 at the same time and improve access performance.
- the above-mentioned time indication information may also be referred to as BI (in order to distinguish it from the BI in Msg2, it may be expressed as BI').
- the terminal device determines the back-off time according to BI', which may mean that the terminal device randomly selects a value between 0 and BI' as the back-off time.
- the time indication information may be sent by the network device through a broadcast message or through dedicated RRC signaling (such as an RRC reconfiguration message or a handover command).
- Step 401 The terminal device sends a preamble to the network device, and the network device receives the preamble from the terminal device, where the preamble is also called the first message or message 1 (MSG1) in the random access process.
- MSG1 first message or message 1
- the preamble sent by the terminal device to the network device in step 401 may be a preamble selected by the terminal device from the preamble set for random access obtained in step 400.
- Step 402 After detecting the preamble sent by the terminal device, the network device sends a random access response (RAR) message to the terminal device, and the terminal device receives the RAR message from the network device, where the RAR message is also called This is the second message or message 2 (MSG2) in the random access process.
- Message 2 may include one or more of the following information: the identification or index of the detected preamble, uplink time synchronization information, the uplink resources allocated for terminal equipment to send message 3 and the BI, of course, message 2 may also include other information.
- the identifier of the preamble is, for example, a random access preamble identifier (RAPID).
- RAPID random access preamble identifier
- the network device may send a backoff instruction to it.
- the backoff instruction may be used to indicate a time value, and the time value is used to determine the backoff time range.
- the terminal The device can select a back-off time within the back-off time range, and can use the random access resource configured for it in step 400 by the network device again after the selected back-off time ends. It should be noted that if the network device does not receive the preamble sent by the terminal device, the message 2 sent by the network device does not include the identifier of the preamble corresponding to the terminal device.
- Step 403 The terminal device sends uplink data to the network device according to message 2, and the network device receives the uplink data from the terminal device.
- the uplink data is also referred to as the third message or message 3 (MSG3) in the random access process, and the message 3 may include identifiers of different scene information, for example, the identifier of the terminal device (such as UE-ID).
- the identifier of the terminal device such as UE-ID
- the corresponding scenario information is identified as a cell radio network temporary identifier (C-RNTI).
- the message 2 can carry uplink resources and a time advanced (TA) command (command). In this way, after receiving the message 2, the terminal device uses the TA value indicated by the TA command in the uplink indicated by the message 2 Send message 3 on the resource.
- TA time advanced
- Step 404 When the network device detects the message 3, it sends a contention resolution message to the terminal device, and the terminal device receives the contention resolution message from the network device, where the contention resolution message is also called the fourth message or message 4 (MSG4) .
- the message 4 may include part of the content of the message 3 or the physical downlink control channel (PDCCH) containing the C-RNTI, that is, the message 4 includes the C-RNTI carried by the PDCCH.
- PDCH physical downlink control channel
- message 4 can carry the identification of the terminal device; if the network device does not receive the uplink data sent by the terminal device, the message 4 sent by the network device does not include the identification of the terminal device
- the terminal device receives the message 4, it can determine whether the terminal device is successfully connected to the network device according to whether the identity of the terminal device carried in the message 4 matches its own identity, and if the two match, it is determined that the terminal device is successfully connected to the network Device, if the two do not match, it is determined that the terminal device has failed to access.
- the random access parameters may include powerRampingStepHighPriority and scalingFactorBI in addition to the parameters described above.
- the terminal equipment may support some more urgent services, such as MPS or MCS, because the above is based on the event that triggers the random access process to divide the priority of the random access process, and does not consider the triggering of the random access process.
- the urgency of the business Therefore, in order to ensure the normal execution of the more urgent services, you can also consider the priority of the random access process based on the business urgency that triggers the random access process. For example, the priority of the random access process will be triggered by the more urgent business.
- the random access process is also defined as a high-priority random access process.
- a terminal device that supports MPS may be referred to as an MPS terminal device, and a terminal device that supports MCS may be referred to as an MCS terminal device.
- the random access process initiated by the MPS terminal device or the MCS terminal device can be understood as a high-priority random access process.
- the random access process initiated by the MPS terminal device (or MCS terminal device) and the random access process triggered by the handover event (or BFR event) may have the same priority or different priorities.
- Access Identity may be information embedded in a subscriber identification module (SIM) card of a terminal device, and the network device does not know this information, that is, the network device does not know the type of the terminal device.
- SIM subscriber identification module
- the network equipment can be MPS terminal equipment or MCS terminal through a broadcast message
- the device is configured with random access parameters. For example, a new field ra-Prioritization is added to the broadcast message, and two parameters powerRampingStepHighPriority and scalingFactorBI are configured in the field ra-Prioritization.
- the broadcast message may also include a field ra-prioritizationFor AccessIdentity, this field includes 7 bits, and the value of each bit is used to indicate whether the terminal device of the type corresponding to the bit uses the parameters in ra-prioritization, such as When the value of a bit is 1, it means that the type of terminal device corresponding to the bit uses the parameter in ra-prioritization. When the value of a bit is 0, it means that the type of terminal device corresponding to the bit is not used. Parameters in ra-prioritization.
- the broadcast message may also include random access parameters configured for the low-priority random access process, such as powerRampingStep.
- the broadcast message includes a field ra-Prioritization.
- the random access parameters included in the ra-Prioritization can be used to initiate the random access process;
- the random access parameters included in the ra-Prioritization can also be used to initiate a random access process. That is, the network equipment uniformly configures the random access parameters for the MPS terminal equipment and the MCS terminal equipment. In this case, the random access parameters configured for the MPS terminal equipment and the MCS terminal equipment are the same.
- the network device can also configure random access parameters for the MPS terminal device and the MCS terminal device respectively.
- the random access parameters configured for the MPS terminal device and the MCS terminal device may be different, so Improve configuration flexibility. For example, add two new fields ra-Prioritization in the broadcast message, namely ra-Prioritization-1 and ra-Prioritization-2.
- ra-Prioritization-1 configure the powerRampingStepHighPriority and scalingFactorBI parameters for the MPS terminal device.
- -Prioritization-2 configures two parameters powerRampingStepHighPriority and scalingFactorBI for MCS terminal equipment.
- the random access parameters included in the ra-Prioritization-1 can be used to initiate a random access process; when the terminal device is an MCS terminal device, the ra-Prioritization-2 can be used.
- the included random access parameters initiate the random access procedure.
- the network device can configure random access parameters for the MPS terminal device (or MCS terminal device) by sending a broadcast message.
- the network device since the network device does not know the type of the terminal device, the network device may also configure random access parameters for the BFR event or handover event of the MPS terminal device (or MCS terminal device) in the manner described above, thereby causing the When a BFR event or a handover event occurs, the MPS terminal device (or MCS terminal device) does not know which random access parameter is used to initiate the random access process.
- the network device sends a broadcast message.
- the broadcast message includes random access parameters configured for MPS terminal devices or MCS terminal devices (called random access parameters 1, such as: powerRampingStepHighPriority1 and scalingFactorBI1), further, the broadcast message may also include random access parameters (such as powerRampingStep) for initiating a low priority random access procedure.
- the network device may also send BFR configuration information to the terminal device through unicast.
- the BFR configuration information includes the random access parameters configured for the BFR event (called random access).
- Parameter 2 such as powerRampingStepHighPriority2 and scalingFactorBI2).
- step 4 the terminal device will not know which random access parameter of random access parameter 1 and random access parameter 2 is used to initiate the random access process triggered by the BFR event.
- the source network device sends a broadcast message, and the broadcast message includes random access parameters configured for MPS terminal devices or MCS terminal devices (called random access parameters 1, For example, it includes two parameters: powerRampingStepHighPriority1 and scalingFactorBI1). Further, the broadcast message may also include random access parameters for initiating a low-priority random access process.
- the source network device sends a handover request to the target network device.
- step 4 the target network device receives the handover request, but because it does not know the type of the terminal device, it is processed according to the terminal device normally handed over, that is, the random access parameter (called random access parameter 3) is configured for the handover event, such as Including powerRampingStep HighPriority3 and scalingFactorBI3), and sent to the terminal device through the source network device.
- the terminal device will not know which random access parameter of random access parameter 1 and random access parameter 3 is used to initiate the random access process triggered by the handover event.
- the embodiments of the present application provide a random access method and device, which are used to solve the problem that the terminal equipment is not clear about the random access parameters used to initiate the random access process.
- the random access method provided in the embodiment of the present application may include three possible schemes, which are referred to as scheme one, scheme two, and scheme three for ease of description.
- scheme 1 the network equipment does not know the type of the terminal equipment, and the terminal equipment determines the target random access parameter from the first random access parameter and the second random access parameter, and uses the target random access parameter to initiate random access Process; In this way, the terminal equipment determines the target random access parameters, so that by regulating the behavior of the terminal equipment, the random access parameters used by the terminal equipment to initiate the random access process are clarified, and the terminal equipment is prevented from selecting the random access parameters The behavior is unclear.
- the network device can obtain the type of the terminal device, and when it is determined that the terminal device is an MPS terminal device or an MCS terminal device, it can send indication information to the terminal device to indicate the target random access parameters. Accordingly, the terminal device After receiving the instruction information, the target random access parameter can be used to initiate the random access process; in this way, on the one hand, the network device indicates the target random access parameter, which clarifies the random access used by the terminal device to initiate the random access process Parameters, on the other hand, adopting the manner indicated by network equipment can make the selection of target random access parameters more flexible.
- the network device can obtain the type of the terminal device, and configure random access parameters for the terminal device according to the type of the terminal device; accordingly, the terminal device can use the random access parameters configured by the network device to initiate the random access process ;
- network equipment can configure random access parameters according to the type of terminal equipment, which can effectively avoid configuring multiple random access parameters for MPS terminal equipment or MCS terminal equipment, causing the terminal equipment to be unclear about which type of random access to use Parameter to initiate the random access process.
- Fig. 6 is a schematic diagram of the process corresponding to the random access method provided in the first embodiment of this application, as shown in Fig. 6, including:
- Step 601 The first network device sends first information to the terminal device.
- the first information is used to indicate the first random access parameter configured for the first type of terminal device.
- the first random access parameter can be understood as the first type of terminal device. Corresponding random access parameters.
- the terminal device of the first type may be an MPS terminal device or an MCS terminal device.
- the first type of terminal device is an MPS terminal device as an example for description.
- the first type of terminal device is an MCS terminal device, refer to the implementation.
- the terminal device receives the first information and obtains the first random access parameter.
- the first random access parameter may include a first power ramp-up step size and/or a first backoff factor; where the first power ramp-up step size may be powerRampingStepHighPriority, and the first backoff factor may be scalingFactorBI.
- the first network device sends a broadcast message, and the broadcast message includes first information.
- the first information may include the field ra-Prioritization described in the preceding paragraph (or the ra-Prioritization field described in the preceding example). -1) and the field ra-prioritizationForAccessIdentity.
- the broadcast message may also include a third random access parameter configured for the low-priority random access process, the third random access parameter may include a third power ramp step size, and the third power ramp step size may be Is powerRampingStep.
- Step 603 The second network device sends second information to the terminal device.
- the second information is used to indicate the second random access parameter configured for the first event.
- the second random access parameter can be understood as the random access corresponding to the first event. Into the parameters.
- the configuration of random access parameters for the first event involved in the embodiments of the present application can be understood as the network device configuring the terminal device with random access parameters corresponding to the first event.
- step 604 the terminal device receives the second information and obtains the second random access parameter.
- the second random access parameter may include a second power ramp-up step size and/or a second backoff factor, where the second power ramp-up step size may be powerRampingStepHighPriority, and the second backoff factor may be scalingFactorBI.
- the second random access parameter may be different from the first random access parameter.
- the first random access parameter may include the first power ramp step size and the first backoff factor
- the second random access parameter may Including the second power ramp step size and the second backoff factor as an example
- the second random access parameter may be different from the first random access parameter, and may include: the powerRampingStepHighPriority included in the first random access parameter is different from the second random access parameter.
- the powerRampingStepHighPriority included in the random access parameter, and/or the scalingFactorBI included in the first random access parameter is different from the scalingFactorBI included in the second random access parameter.
- the first backoff factor may be a predetermined value or the first backoff factor It can be configured separately through other methods, and the details are not limited.
- the first power ramp step length may be a predetermined value, or the first power ramp step The length is configured separately through other methods, and the specifics are not limited.
- the second random access parameter is similar.
- the parameters included in the first random access parameter and the second random access parameter may be the same, for example, the first random access parameter includes the first power ramp step size, and the second random access parameter includes the second power
- the first random access parameter includes a first backoff factor
- the second random access parameter includes a second backoff factor
- the first random access parameter includes a first power ramp step and The first backoff factor and the second random access parameter include the second power ramp step size and the second backoff factor.
- the following describes the implementation manner of the second network device sending the second information to the terminal device.
- the second network device and the first network device may be the same network device; or, the second network device and the first network device may also be different network devices, for example, the second network device is in a handover scenario
- the first network device is the source network device in the handover scenario.
- the first event may refer to an event in which the triggered random access parameter is a high-priority random access process, such as a BFR event or a handover event.
- the second network device and the first network device are the same network device, and the first event is a BFR event.
- the second network device may send the second information to the terminal device in various ways.
- the second network device may send the high-level signaling to the terminal device, and the high-level signaling includes the second information.
- high-level signaling may refer to signaling sent by a high-level protocol layer, and the high-level protocol layer is at least one protocol layer above the physical layer.
- the high-level protocol layer may include at least one of the following protocol layers: MAC layer, RLC layer, PDCP layer, RRC layer, and non-access stratum (NAS).
- the RRC layer signaling may be an RRC reconfiguration message or a broadcast message.
- the RRC reconfiguration message may be an RRCConnectionReconfiguration message or an RRCReconfiguration message, which is not specifically limited.
- the second network device is the target network device
- the first network device is the source network device
- the first event is a handover event.
- the second network device can send the second information to the terminal device in various ways.
- the second network device sends a switching command to the terminal device through the first network device, and the switching command includes the second information.
- the handover command may be RRC signaling.
- step 601 can be performed before step 603, or step 601 can be performed simultaneously with step 603, or, step 601 can also be performed after step 603, which is not specifically limited.
- Step 605 When the terminal device is a terminal device of the first type and the event that triggers the random access process is the first event, determine the target random access parameter.
- Step 606 The terminal device uses the target random access parameter to initiate a random access process.
- the terminal device can obtain its own access identifier, and if the access identifier is 1, it can be determined as the first type of terminal device.
- the terminal device is the first type of terminal device, the following describes two ways to determine the target random access parameter, which are implementation manner 1 and implementation manner 2, respectively.
- the terminal device may determine the target random access parameter based on a preset rule.
- the preset rule may be that if the event triggering the random access process is the first event, the target random access parameter is the random access corresponding to the first event Parameter (ie, the second random access parameter). It should be noted that when the terminal device is a terminal device of the first type, the target random access parameter can be determined based on preset rules; when the terminal device is not a terminal device of the first type, it can be determined to initiate random access according to the existing method. Random access parameters that need to be used in the entry process.
- the process of determining target random access parameters based on preset rules can be seen in FIG. 7a, and includes:
- Step 1 The event that triggers the random access process is the first event.
- Step 2 Determine whether the second random access parameter corresponding to the first event is configured, if yes, execute step 3, if not, execute step 4.
- Step 3 When the second random access parameter corresponding to the first event is configured, the second random access parameter is used to initiate a random access process.
- Step 4 When the second random access parameter corresponding to the first event has not been configured, determine whether the first random access parameter corresponding to the first type of terminal device is configured, if yes, proceed to step 5, if not, then Go to step 6.
- Step 5 When the first random access parameter corresponding to the first type of terminal device is configured, the first random access parameter is used to initiate a random access process.
- Step 6 When the second random access parameter corresponding to the first event is not configured and the first random access parameter corresponding to the first type terminal device is not configured, the third random access parameter is used to initiate a random access process.
- the process of determining target random access parameters based on preset rules can be seen in FIG. 7b, and includes:
- Step 1 The random access process is triggered.
- Step 2 Determine whether the first random access parameter corresponding to the first type of terminal device is configured, if yes, execute step 3, if not, execute step 9.
- Step 3 Determine whether the event triggering the random access process is a BFR event or a handover event. If it is a BFR event, go to step 4, if it is a handover event, go to step 6, and if it is neither a BFR event nor a handover event, then go to step 8.
- Step 4 Determine whether the random access parameter corresponding to the BFR event (referred to as the second random access parameter a) is configured, if yes, execute step 5, if not, execute step 8.
- Step 5 Use the second random access parameter a to initiate a random access process.
- Step 6 Determine whether the random access parameter corresponding to the handover event (referred to as the second random access parameter b) is configured, if yes, execute step 7; if not, execute step 8.
- Step 7 using the second random access parameter b to initiate a random access process.
- Step 8 Use the first random access parameter to initiate a random access process.
- Step 9 Determine whether the event triggering the random access process is a BFR event or a handover event. If it is a BFR event, perform step 10; if it is a handover event, perform step 12; if it is neither a BFR event nor a handover event, perform step 14.
- Step 10 Determine whether the second random access parameter a corresponding to the BFR event is configured, if yes, execute step 11, if not, execute step 14.
- Step 11 Use the second random access parameter a corresponding to the BFR event to initiate a random access process.
- Step 12 Determine whether the second random access parameter b corresponding to the handover event is configured, if yes, execute step 13, and if not, execute step 14.
- Step 13 using the second random access parameter b corresponding to the handover event to initiate a random access process.
- Step 14 Use the third random access parameter to initiate a random access process.
- the terminal device can determine the random access parameter with a high random access success rate as the target random access parameter based on the random access success rate corresponding to the random access parameter (in other words, it will be more conducive to the success of random access.
- the random access parameter is determined as the target random access parameter).
- the random access success rate can also be replaced with a random access level or other similar concepts, which is not specifically limited.
- the terminal device determines that the random access success rate corresponding to the first random access parameter is greater than the random access success rate corresponding to the second random access parameter, it can determine that the target random access parameter is the first random access parameter; If the terminal device determines that the random access success rate corresponding to the first random access parameter is less than the random access success rate corresponding to the second random access parameter, it can determine that the target random access parameter is the second random access parameter; If it is determined that the random access success rate corresponding to the first random access parameter is equal to the random access success rate corresponding to the second random access parameter, it can be determined that the target random access parameter is the first random access parameter or the second random access parameter.
- the target random access parameter is the first random access parameter or the second random access parameter.
- the random access success rate corresponding to the first random access parameter can be the function calculation result of powerRampingStepHighPriority and scalingFactorBI, namely F (powerRampingStepHighPriority, scalingFactorBI).
- the random access success rate corresponding to the first random access parameter can be equal to powerRampingStepHighPriority*a–scalingFactorBI*b, where a and b are preset weight values, and the preset weight values can be predefined by the protocol or can be Network equipment is configured for terminal equipment.
- the terminal device is a terminal device of the first type and the event that triggers the random access process is the second event (the second event can be understood as an event other than the first event)
- the first random access parameter can be used to initiate a random access procedure.
- the terminal device is not the first type of terminal device, when the event triggering the random access process is the first event, the second random access parameter can be used to initiate the random access process; when the event triggering the random access process is the second event In the event of an event, the third random access parameter can be used to initiate a random access procedure.
- the first random access parameter may include the first power ramp step size and The first backoff factor and the second random access parameter may include the second power ramp step size and the second backoff factor
- the third random access parameter may include the third power ramp step size.
- the first random access parameter (or the second random access parameter or the third random access parameter) may also include other possible parameters.
- the first random access parameter (or the second random access parameter) Parameter or third random access parameter) other possible parameters that may also be included are called the first parameter, and the first parameter includes one or more of the following: PRACH resource set used to transmit the random access preamble; random access Preamble set; the maximum number of transmissions of the random access preamble; the initial transmission power of the random access preamble; the size of the random access response window; the maximum number of HARQ retransmissions of the third message; the duration of the contention resolution timer.
- PRACH resource set used to transmit the random access preamble
- random access Preamble set the maximum number of transmissions of the random access preamble
- the initial transmission power of the random access preamble the size of the random access response window
- the maximum number of HARQ retransmissions of the third message the duration of the contention resolution timer.
- the first parameter included in the first random access parameter, the second random access parameter, and the third random access parameter may be uniformly configured by the network device (in this case, the first random access parameter, the second random access parameter
- the first parameter included in the third random access parameter may be the same), or it may be configured separately by the network equipment (in this case, the first random access parameter, the second random access parameter, and the third random access parameter
- the first parameter included in the access parameter may be different), which is not specifically limited.
- the terminal device when the terminal device receives a variety of random access parameters from the network side, it can determine the target random access based on preset rules or the random access success rate corresponding to the random access parameters. Enter the parameters, thereby clarifying the random access parameters used by the terminal equipment to initiate the random access process.
- the network device does not need to know the type of the terminal device, and can configure random access parameters for the terminal device in the existing way, that is to say, the solution changes the behavior of the network device slightly. Has strong applicability.
- Fig. 8 is a schematic diagram of a process corresponding to the random access method provided in the second embodiment of the application, as shown in Fig. 8, including:
- Step 801 The first network device sends first information to the terminal device, where the first information is used to indicate the first random access parameter configured for the first type of terminal device.
- the first type terminal device may include an MPS terminal device or an MCS terminal device.
- the terminal device receives the first information and obtains the first random access parameter.
- Step 803 The second network device sends second information to the terminal device, where the second information is used to indicate the second random access parameter configured for the first event.
- step 804 the terminal device receives the second information and obtains the second random access parameter.
- step 801 to step 804 can refer to step 601 to step 604, which will not be repeated here.
- Step 805 The second network device obtains the type of the terminal device, and when the type of the terminal device is the first type (or the terminal device is the first type of terminal device), it sends indication information to the terminal device.
- the indication information is used to indicate that the target is random. Access parameters.
- the second network device may obtain type information, and the type information is used to indicate the type of the terminal device.
- the type information can indicate the type of the terminal device in many ways.
- the terminal device is a terminal device of the first type.
- the type information may include 1 bit. If the value of this bit is 1, it means that the terminal device is the first type of terminal device. If the value of this bit is 0, it means that the terminal device is not the first type. Type of terminal equipment.
- the type information may include 2 bits, and the value of 1 bit is used to indicate whether the terminal device is MPS terminal device (for example, if the value is 1, it means that the terminal device is an MPS terminal device, if the value is 0, it means that the terminal device is not an MPS terminal device), and the other bit is used to indicate whether the terminal device is an MCS terminal device ( For example, if the value is 1, it means that the terminal device is an MCS terminal device, and if the value is 0, it means that the terminal device is not an MCS terminal device).
- the type information may include 2 bits, and the value of the 2 bits is used to jointly indicate the type of the terminal device. For example, 00 indicates that the terminal device is an MPS terminal device, 01 indicates that the terminal device is an MCS terminal device, and 10 indicates that the terminal device is a terminal device. Not MPS terminal equipment or MCS terminal equipment, 11 is reserved for future use.
- the second network device and the first network device may be the same network device (case 1); or, the second network device and the first network device may also be different network devices, for example, the second network device is the target in the handover scenario
- the network device, the first network device is the source network device in the handover scenario (case 2).
- the following describes the implementation manners for the second network device to obtain the type information of the terminal device respectively for these two situations.
- the second network device can obtain the type information of the terminal device in the manner described in Example 1 or Example 2 below.
- Example 1 The terminal device can send type information to the second network device, and the type information includes the access identifier of the terminal device. This method can be understood as the terminal device actively reporting the type information; for another example, the second network device can send the terminal device Sending the type inquiry message, the terminal device sends the type information to the second network device after receiving the type inquiry message. This way can be understood as the terminal device passively reporting the type information.
- Example 2 The terminal device can send type information to the core network device, and the core network device sends the type information to the second network device.
- the indication information and the second information may be sent through the same piece of signaling, for example, the second network device sends the second information and the indication information through the same high-layer signaling.
- the indication information and the second information may also be sent through different signaling.
- the second network device may send the second information through high-level signaling 1, and through high-level signaling 2, semi-static signaling or dynamic signaling. Send instructions.
- semi-static signaling can be understood as signaling sent through the MAC layer, such as medium access control control element (MAC CE). Since MAC CE has its corresponding HARQ feedback information, the reliability is high. Thus, it can be ensured that the terminal device receives the instruction information.
- Dynamic signaling can be understood as information sent through the PDCCH, such as downlink control information (DCI). Since the DCI is directly sent through physical layer information, the terminal device has a short delay in receiving the indication information.
- high-level signaling 1 and high-level signaling 2 can be understood as RRC signaling (or RRC messages).
- the second network device can send the second information through the RRC message, or can send the indication information through the RRC message.
- RRC messages may be used to indicate.
- the second network device can obtain the type information of the terminal device in the manner described in Example 3 below.
- Example 3 The second network device can obtain the type information of the terminal device from the first network device.
- the first network device sends a handover request to the second network device, and the handover request includes the type information; where the first network device can be
- the type information of the terminal device is obtained by the method described in the above example 1 and example 2.
- the indication information and the second information may be sent through the same piece of signaling, for example, the second network device sends the second information and the indication information through a handover command.
- the indication information is used to indicate the target random access parameter. It can be understood that the indication information is used to indicate that if the event triggering the random access process is the first event, the target random access parameter is used to initiate the random access process.
- the indexes of the first random access parameter and the second random access parameter may be predefined, for example, the index of the first random access parameter is 00, and the index of the second random access parameter is 01, thereby indicating the information It may include the index of the target random access parameter.
- the indication information may include 1 bit. If the value of this bit is 0, it means that if the event triggering the random access process is the first event, the second random access parameter corresponding to the first event is used. Initiate a random access process; if the value of this bit is 1, it means that if the event that triggers the random access process is the first event, the first random access parameter configured for the first type of terminal device is used to initiate the random access process .
- Step 806 The terminal device receives the indication information, and when the event that triggers the random access process is the first event, it uses the target random access parameters to initiate the random access process.
- the network device can obtain the type of the terminal device, and when the terminal device is a terminal device of the first type, send indication information to the terminal device to instruct the terminal device to initiate the target used by the random access process triggered by the first event
- the random access parameter solves the problem that the terminal device does not know which random access parameter to use to initiate the random access process.
- the network device indicates the target random access parameter to the terminal device, so that the target random access parameter can be flexibly selected by the network device, and the implementation is more convenient.
- the main difference between the second embodiment and the first embodiment is that: in the second embodiment, the network device can obtain the type of the terminal device and indicate the target random access parameters of the terminal device; while in the first embodiment, the network device does not know the terminal device The terminal equipment determines the target random access parameters. In addition to this difference, the two can be cross-referenced.
- Fig. 9 is a schematic diagram of a process corresponding to the random access method provided in the third embodiment of the application, as shown in Fig. 9, including:
- Step 901 The first network device sends first information to the terminal device, where the first information is used to indicate the first random access parameter configured for the terminal device of the first type.
- the first type terminal device may include an MPS terminal device or an MCS terminal device.
- the terminal device receives the first information and obtains the first random access parameter.
- Step 903 The second network device obtains the type of the terminal device.
- Step 904 When the type of the terminal device is the first type, the second network device sends second information to the terminal device.
- the second information is used to indicate the second random access parameter configured for the first event, and the second random access The parameters are the same as the first random access parameters.
- the second network device may acquire the first random access parameter before sending the second information to the terminal device. If the second network device and the first network device are the same network device, the second network device can directly obtain the first random access parameter from itself; if the second network device and the first network device are different network devices, such as the second network device The network device is the target network device, and the first network device is the source network device, the second network device can obtain the first random access parameter from the first network device, for example, the first network device sends a handover request to the second network device, and the handover The request includes the first random access parameter.
- the second network device may configure the second random access parameter that is the same as the first random access parameter, or directly use the first random access parameter as the second random access parameter.
- the second information may include the second random access parameter or the index of the second random access parameter.
- Step 905 The terminal device receives the second information, and obtains the second random access parameter.
- Step 906 When the event triggering the random access process is the first event, the terminal device uses the first random access parameter or the second random access parameter to initiate the random access process.
- the terminal device may randomly choose to use the first random access parameter or the second random access parameter to initiate a random access process.
- the network device can obtain the type of the terminal device, and configure the same first random access parameter and second random access parameter for the terminal device, thereby solving the problem that the terminal device does not know which random access parameter is used to initiate random access.
- the problem of the entry process can obtain the type of the terminal device, and configure the same first random access parameter and second random access parameter for the terminal device, thereby solving the problem that the terminal device does not know which random access parameter is used to initiate random access. The problem of the entry process.
- the second network device sends second information to the terminal device, and the second information may indicate The second random access parameter configured for the first event is the same as the first random access parameter, or the terminal device is instructed to use the first random access parameter to initiate the random access process triggered by the first event; in this case, the second The information may no longer include the second random access parameter or the index of the second random access parameter.
- the second information may include one bit of information.
- the terminal device may receive the second information, and when the event that triggers the random access process is the first event, the terminal device uses the first random access parameter to initiate the random access process.
- the difference between this alternative solution and the solution described above is that the content included in the second information is different. Since in this alternative solution, the second information may no longer include the second random access parameter or the index of the second random access parameter, the resource overhead can be effectively reduced; in addition, the second network device may also no longer need to obtain the first random access parameter. Access parameters, which can save transmission resources.
- the main difference between the third embodiment and the first embodiment is that: in the third embodiment, the network device can configure the second random access parameter to be the same as the first random access parameter according to the type of the terminal device, thereby avoiding the terminal The device does not know which random access parameter is used to initiate the random access process; in the first embodiment, the second random access parameter and the first random access parameter may be different, and the terminal device needs to use the method in the first embodiment to Determine the target random access parameters. In addition to this difference, the two can be cross-referenced.
- Fig. 10 is a schematic diagram of the process corresponding to the random access method provided in the fourth embodiment of the application, as shown in Fig. 10, including:
- Step 1001 The network device obtains the type of the terminal device.
- Step 1002 When the type of the terminal device is the first type, the network device sends third information to the terminal device, where the third information is used to indicate the first random access parameter configured for the terminal device of the first type.
- the network device may send the third information in a unicast manner, for example, the network device sends the third information to the terminal device through high-level signaling.
- the network device since the network device can obtain the type of the terminal device, the second random access parameter corresponding to the first event may no longer be configured for the terminal device of the first type.
- the third information may include the first random access parameter, or the third information may include the index of the first random access parameter.
- the third information may include the index of the first random access parameter.
- random access parameters can be defined in advance, such as the random access parameter with index 00, the random access parameter with index 01, the random access parameter with index 10, and the random access parameter with index 11 as shown in Table 1. Random access parameters.
- Table 1 Examples of indexes of random access parameters
- the index included in the third information is 00, it indicates that the first random access parameter is a random access parameter with an index of 00. In this way, the index is used to indicate the first random access parameter, which can effectively reduce resource overhead.
- the first random access parameters include powerRampingStepHighPriority and scalingFactorBI.
- the first random access parameters may also include one or more of the following: PRACH resource set used to transmit the random access preamble; Random access preamble set; the maximum number of random access preamble transmissions; the initial transmission power of the random access preamble; the size of the random access response window; the maximum number of HARQ retransmissions of the third message; the contention resolution timer duration.
- PRACH resource set used to transmit the random access preamble
- Random access preamble set the maximum number of random access preamble transmissions
- the initial transmission power of the random access preamble the size of the random access response window
- the maximum number of HARQ retransmissions of the third message the contention resolution timer duration.
- the specifics are not limited.
- Step 1003 The terminal device receives the third information, and obtains the first random access parameter.
- Step 1004 When the event triggering the random access process is the first event, the terminal device uses the first random access parameter to initiate the random access process.
- the terminal device may be pre-configured to directly use the first random access parameter to initiate the random access procedure when the event that triggers the random access procedure is the first event; or, the terminal device may also The preset rule described in the first solution can be adopted, and then the first random access parameter is used to initiate the random access process.
- the foregoing network device may be a network device that is providing a service for a terminal device, or may also be a target network device in a handover scenario.
- the third information can be sent to the terminal device through the source network device.
- the first random access parameter can be configured for the first type terminal device, instead of configuring the first event corresponding to the terminal device. This solves the problem that the terminal device does not know which random access parameter to use to initiate the random access process, and effectively saves transmission resources.
- the differences between the different embodiments are mainly described.
- the differences between the different embodiments include: in the first embodiment, the terminal device determines the method used to initiate the random access process In the second embodiment, the network device instructs the terminal device to initiate the random access parameter used in the random access process. In the third embodiment, the network device configures the terminal device with the same first random access parameter.
- the network device configures the first random access parameter for the terminal device, and no longer configures the second random access parameter.
- embodiments 1 to 4 can be referred to each other.
- the implementation of obtaining the type of terminal device involved in the third and fourth embodiments can refer to the second embodiment.
- the network device or the terminal device may include a corresponding hardware structure and/or software module for performing each function.
- the embodiments of the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
- the embodiment of the present application may divide the terminal device and the network device into functional units according to the foregoing method examples.
- each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- FIG. 11 shows a possible exemplary block diagram of a device involved in an embodiment of the present application.
- the apparatus 1100 may include: a processing unit 1102 and a communication unit 1103.
- the processing unit 1102 is used to control and manage the actions of the device 1100.
- the communication unit 1103 is used to support communication between the apparatus 1100 and other devices.
- the communication unit 1103 is also called a transceiving unit, and may include a receiving unit and/or a sending unit, which are used to perform receiving and sending operations, respectively.
- the device 1100 may further include a storage unit 1101 for storing program codes and/or data of the device 1100.
- the apparatus 1100 may be the terminal device in any of the foregoing embodiments, or may also be a chip provided in the terminal device.
- the processing unit 1102 may support the apparatus 1100 to perform the actions of the terminal device in the foregoing method examples.
- the processing unit 1102 mainly executes the internal actions of the terminal device in the method example, and the communication unit 1103 may support communication between the apparatus 1100 and the network device.
- the processing unit 1102 can be used to execute step 605 in FIG. 6, as well as step 1, step 2, step 4 in FIG. 7a, and step 1, step 2, step 3, step 4, step 6, and step 6 in FIG. 7b. Step 9, Step 10, Step 12.
- the communication unit 1103 can be used to perform step 602, step 604, and step 606 in FIG.
- Step 6 as well as step 3, step 5, or step 6 in FIG. 7a, and step 5, step 7, step 8, and step 11 in FIG. 7b.
- Step 13 or Step 14, and Step 802, Step 804, Step 806 in FIG. 8 Step 902, Step 905, Step 906 in FIG. 9, and Step 1003 and Step 1004 in FIG.
- the communication unit 1103 is configured to: receive first information, where the first information is used to indicate the first random access parameter configured for the first type of terminal device; and, receive the second information, the second The information is used to indicate the second random access parameter configured for the first event; the processing unit 1102 is used to: when the terminal device is the first type of terminal device and the event triggering the random access process is the first event, determine the target random access
- the communication unit 1103 is further configured to: use the target random access parameter to initiate a random access process; where the target random access parameter is the first random access parameter or the second random access parameter.
- the communication unit 1103 is further configured to: receive indication information, where the indication information is used to indicate target random access parameters.
- the second random access parameter is the same as the first random access parameter.
- the target random access parameter is the first random access parameter, and the random access success rate corresponding to the first random access parameter is greater than the random access success rate corresponding to the second random access parameter; or , The target random access parameter is the second random access parameter, and the random access success rate corresponding to the first random access parameter is less than the random access success rate corresponding to the second random access parameter; or, the target random access parameter is The first random access parameter or the second random access parameter, the random access success rate corresponding to the first random access parameter is equal to the random access success rate corresponding to the second random access parameter.
- the communication unit 1103 is further configured to send type information to the network device or the core network device, and the type information is used to indicate the type of the terminal device.
- the processing unit 1102 is configured to: when the event triggering random access is the first event, determine whether the second random access parameter corresponding to the first event is configured; when the second random access parameter is configured When accessing the parameters, the communication unit 1103 uses the second random access parameters to initiate the random access process; or, when the second random access parameters are not configured, it is determined whether the first type terminal device corresponding to the first type is configured. Random access parameters, when the first random access parameters are configured, the communication unit 1103 uses the first random access parameters to initiate a random access process; or, when the second random access corresponding to the first event is not configured When the parameter is not configured with the first random access parameter corresponding to the first type of terminal device, the communication unit 1103 uses the third random access parameter to initiate a random access process.
- the communication unit 1103 is further configured to: send type information to the first network device or the core network device, the type information is used to indicate the type of the terminal device; and the terminal device obtains that the second network device is the terminal device configuration Random access parameters.
- the communication unit 1103 is further configured to: when the type of the terminal device is the first type, receive third information from the second network device, and the third information is used to indicate the configuration of the terminal device of the first type. Random access parameters.
- the third information includes random access parameters, or the third information includes an index of random access parameters.
- the communication unit 1103 is further configured to: when the type of the terminal device is the first type, receive second information from the second network device, and the second information is used to indicate the random access corresponding to the first event. Parameters; where the random access parameter corresponding to the first event is the same as the first random access parameter, and the first random access parameter is configured by the first network device for the first type of terminal device.
- the apparatus 1100 may also be a network device (such as a second network device) in any of the foregoing embodiments, or may also be a chip set in the second network device.
- the processing unit 1102 may support the apparatus 1100 to perform the actions of the second network device in the foregoing method examples.
- the processing unit 1102 mainly executes the internal actions of the second network device in the method example, and the communication unit 1103 may support communication between the apparatus 1100 and the terminal device.
- the communication unit 1103 may be used to execute step 602 in FIG. 6, steps 803 and 805 in FIG. 8, steps 903 and 904 in FIG. 9, and steps 1001 and 1002 in FIG. 10.
- the communication unit 1103 is configured to: send second information to the terminal device, the second information being used to indicate the second random access parameter configured for the first event; and to obtain the type of the terminal device, when When the type of the terminal equipment is the first type, sending indication information to the terminal equipment, where the indication information is used to indicate the target random access parameter; where the target random access parameter is the first random access parameter or the second random access parameter,
- the first random access parameter is configured by the first network device for the first type of terminal device.
- the communication unit 1103 is specifically configured to: obtain the type of the terminal device from the terminal device; or, obtain the type of the terminal device from the core network device; or, obtain the type of the terminal device from the first network device.
- the communication unit 1103 is used to obtain the type of the terminal device; the processing unit 1102 is used to configure random access parameters for the terminal device according to the type of the terminal device.
- the communication unit 1103 is further configured to: when the type of the terminal device is the first type, send third information to the terminal device, and the third information is used to indicate the random access configured for the first type terminal device. Into the parameters.
- the third information includes random access parameters, or the third information includes an index of random access parameters.
- the communication unit 1103 is further configured to: when the type of the terminal device is the first type, send second information to the terminal device, where the second information is used to indicate the random access parameter corresponding to the first event; Wherein, the random access parameter corresponding to the first event is the same as the first random access parameter, and the first random access parameter is configured by the first network device for the first type of terminal device.
- the communication unit 1103 is further configured to: obtain the type of the terminal device from the terminal device; or, obtain the type of the terminal device from the core network device; or, obtain the type of the terminal device from the first network device.
- each unit in the device can be a separate processing element, or it can be integrated in a certain chip of the device for implementation.
- it can also be stored in the memory in the form of a program, which is called and executed by a certain processing element of the device.
- all or part of these units can be integrated together or implemented independently.
- the processing element described here can also become a processor, which can be an integrated circuit with signal processing capabilities.
- each step of the above method or each of the above units may be implemented by an integrated logic circuit of hardware in a processor element or implemented in a form of being called by software through a processing element.
- the unit in any of the above devices may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (ASICs), or, one or Multiple microprocessors (digital singnal processors, DSPs), or, one or more field programmable gate arrays (Field Programmable Gate Arrays, FPGAs), or a combination of at least two of these integrated circuits.
- ASICs application specific integrated circuits
- DSPs digital singnal processors
- FPGAs Field Programmable Gate Arrays
- the unit in the device can be implemented in the form of a processing element scheduler
- the processing element can be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call programs.
- CPU central processing unit
- these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
- the above receiving unit is an interface circuit of the device for receiving signals from other devices.
- the receiving unit is an interface circuit used by the chip to receive signals from other chips or devices.
- the above unit for sending is an interface circuit of the device for sending signals to other devices.
- the sending unit is an interface circuit used by the chip to send signals to other chips or devices.
- FIG. 12 is a schematic structural diagram of a terminal device according to an embodiment of the application. It may be the terminal device in the above embodiment, and is used to implement the operation of the terminal device in the above embodiment.
- the terminal device includes: an antenna 1210, a radio frequency part 1220, and a signal processing part 1230.
- the antenna 1210 is connected to the radio frequency part 1220.
- the radio frequency part 1220 receives the information sent by the network device through the antenna 1210, and sends the information sent by the network device to the signal processing part 1230 for processing.
- the signal processing part 1230 processes the information of the terminal equipment and sends it to the radio frequency part 1220
- the radio frequency part 1220 processes the information of the terminal equipment and sends it to the network equipment via the antenna 1210.
- the signal processing part 1230 may include a modem subsystem, which is used to process the various communication protocol layers of the data; it may also include a central processing subsystem, which is used to process the terminal device operating system and application layer; in addition, it may also Including other subsystems, such as multimedia subsystems, peripheral subsystems, etc., where the multimedia subsystem is used to control the terminal device camera, screen display, etc., and the peripheral subsystem is used to realize the connection with other devices.
- the modem subsystem can be a separate chip.
- the above apparatus for terminal equipment may be located in the modem subsystem.
- the modem subsystem may include one or more processing elements 1231, for example, including a main control CPU and other integrated circuits.
- the modem subsystem may also include a storage element 1232 and an interface circuit 1233.
- the storage element 1232 is used to store data and programs, but the program used to execute the method executed by the terminal device in the above method may not be stored in the storage element 1232, but is stored in a memory outside the modem subsystem, When in use, the modem subsystem is loaded and used.
- the interface circuit 1233 is used to communicate with other subsystems.
- the above apparatus for terminal equipment may be located in a modem subsystem, which may be implemented by a chip.
- the chip includes at least one processing element and an interface circuit, wherein the processing element is used to perform any of the above terminal equipment executions.
- the interface circuit is used to communicate with other devices.
- the unit for the terminal device to implement each step in the above method can be implemented in the form of a processing element scheduler.
- the device for the terminal device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the terminal device in the above method embodiment.
- the storage element may be a storage element whose processing element is on the same chip, that is, an on-chip storage element.
- the program used to execute the method executed by the terminal device in the above method may be a storage element on a different chip from the processing element, that is, an off-chip storage element.
- the processing element calls or loads a program from the off-chip storage element on the on-chip storage element to call and execute the method executed by the terminal device in the above method embodiment.
- the unit of the terminal device that implements each step in the above method may be configured as one or more processing elements, and these processing elements are arranged on the modem subsystem, where the processing elements may be integrated circuits, For example: one or more ASICs, or, one or more DSPs, or, one or more FPGAs, or a combination of these types of integrated circuits. These integrated circuits can be integrated together to form a chip.
- the units of the terminal device that implement each step in the above method can be integrated together and implemented in the form of a system-on-a-chip (SOC), and the SOC chip is used to implement the above method.
- SOC system-on-a-chip
- the chip can integrate at least one processing element and a storage element, and the processing element can call the stored program of the storage element to implement the method executed by the above terminal device; or, the chip can integrate at least one integrated circuit to implement the above terminal The method executed by the device; or, it can be combined with the above implementations.
- the functions of some units are implemented in the form of calling programs by processing elements, and the functions of some units are implemented in the form of integrated circuits.
- the above apparatus for terminal equipment may include at least one processing element and an interface circuit, wherein at least one processing element is used to execute any of the methods performed by the terminal equipment provided in the above method embodiments.
- the processing element can execute part or all of the steps executed by the terminal device in the first way: calling the program stored in the storage element; or in the second way: combining instructions through the integrated logic circuit of the hardware in the processor element Part or all of the steps executed by the terminal device are executed in a manner; of course, part or all of the steps executed by the terminal device may also be executed in combination with the first manner and the second manner.
- the processing element here is the same as the above description, and it may be a general-purpose processor, such as a CPU, or one or more integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
- a general-purpose processor such as a CPU
- integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
- the storage element can be a memory or a collective term for multiple storage elements.
- FIG. 13 is a schematic structural diagram of a network device provided by an embodiment of this application. It is used to implement the operation of the network device (such as the second network device) in the above embodiment.
- the network equipment includes: an antenna 1301, a radio frequency device 1302, and a baseband device 1303.
- the antenna 1301 is connected to the radio frequency device 1302.
- the radio frequency device 1302 receives the information sent by the terminal device through the antenna 1301, and sends the information sent by the terminal device to the baseband device 1303 for processing.
- the baseband device 1303 processes the information of the terminal device and sends it to the radio frequency device 1302, and the radio frequency device 1302 processes the information of the terminal device and sends it to the terminal device via the antenna 1301.
- the baseband device 1303 may include one or more processing elements 13031, for example, a main control CPU and other integrated circuits.
- the baseband device 1303 may also include a storage element 13032 and an interface 13033.
- the storage element 13032 is used to store programs and data; the interface 13033 is used to exchange information with the radio frequency device 1302.
- the interface is, for example, a common public radio interface. , CPRI).
- the above apparatus for network equipment may be located in the baseband apparatus 1303.
- the above apparatus for network equipment may be a chip on the baseband apparatus 1303.
- the chip includes at least one processing element and an interface circuit, wherein the processing element is used to execute the above network. For each step of any method executed by the device, the interface circuit is used to communicate with other devices.
- the unit for the network device to implement each step in the above method can be implemented in the form of a processing element scheduler.
- the device for the network device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the network device in the above method embodiment.
- the storage element may be a storage element with the processing element on the same chip, that is, an on-chip storage element, or a storage element on a different chip from the processing element, that is, an off-chip storage element.
- the unit of the network device that implements each step in the above method may be configured as one or more processing elements, and these processing elements are arranged on the baseband device.
- the processing elements here may be integrated circuits, such as one Or multiple ASICs, or, one or more DSPs, or, one or more FPGAs, or a combination of these types of integrated circuits. These integrated circuits can be integrated together to form a chip.
- the units for the network equipment to implement each step in the above method can be integrated together and implemented in the form of a system-on-a-chip (SOC).
- the baseband device includes the SOC chip for implementing the above method.
- At least one processing element and storage element can be integrated in the chip, and the processing element can call the stored program of the storage element to implement the method executed by the above network device; or, at least one integrated circuit can be integrated in the chip to implement the above network The method executed by the device; or, it can be combined with the above implementations.
- the functions of some units are implemented in the form of calling programs by processing elements, and the functions of some units are implemented in the form of integrated circuits.
- the above apparatus for a network device may include at least one processing element and an interface circuit, wherein at least one processing element is used to execute any method performed by the network device provided in the above method embodiments.
- the processing element can execute part or all of the steps executed by the network device in the first way: calling the program stored in the storage element; or in the second way: combining instructions through the integrated logic circuit of the hardware in the processor element Part or all of the steps performed by the network device are executed in the method; of course, part or all of the steps executed by the network device above can also be executed in combination with the first method and the second method.
- the processing element here is the same as the above description, and it may be a general-purpose processor, such as a CPU, or one or more integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
- a general-purpose processor such as a CPU
- integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
- the storage element can be a memory or a collective term for multiple storage elements.
- this application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
- the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
- These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
- the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
一种随机接入方法及装置,其中方法包括:终端设备接收第一信息和第二信息,其中,第一信息用于指示为第一类型终端设备配置的第一随机接入参数,第二信息用于指示为第一事件配置的第二随机接入参数;当终端设备为第一类型终端设备且触发随机接入过程的事件为第一事件时,终端设备可以确定目标随机接入参数,并使用目标随机接入参数发起随机接入过程;其中,目标随机接入参数为第一随机接入参数或第二随机接入参数。采用上述方法,由终端设备来确定目标随机接入参数,从而通过对终端设备的行为进行规范,明确了终端设备发起随机接入过程所使用的随机接入参数,避免终端设备选择随机接入参数的行为不清楚的问题。
Description
本申请涉及无线通信技术领域,特别涉及一种随机接入方法及装置。
在无线通信系统中,终端设备需要和网络设备通过随机接入过程取得上行同步,以便后续进行通信。由于第五代(the fifth generation,5G)通信系统的应用场景呈现多样化,不同应用场景对随机接入的需求不同,因此,5G通信系统中将区分随机接入的优先级,并为不同优先级提供不同的随机接入服务。
具体来说,5G通信系统中通过触发随机接入过程的事件将随机接入过程划分高、低两类优先级,其中,将切换事件或者波束失败恢复事件而触发的随机接入过程规定为高优先级随机接入过程,将其它事件触发的随机接入过程规定为低优先级随机接入过程。以切换事件为例,网络设备可以为终端设备配置发起切换事件触发的随机接入过程所使用的随机接入参数。
5G通信系统中还引入了多媒体优先级业务(multimedia priority services,MPS)终端设备、关键任务业务(mission critical services,MCS)终端设备,由于MPS、MCS均为比较紧急的业务,为保证该类业务的时延等要求,网络设备可以为MPS终端设备和MCS终端设备配置其发起随机接入过程所使用的随机接入参数。
然而,当MPS终端设备或MCS终端设备发起切换事件或波束失败恢复触发的随机接入过程时,使用何种随机接入参数,仍需进一步的研究。
发明内容
本申请实施方式的目的在于提供一种随机接入方法及装置,用于解决终端设备不清楚发起随机接入过程所使用的随机接入参数的问题。
第一方面,本申请实施例提供一种随机接入方法,该方法可以应用于终端设备,或者也可以应用于终端设备内部的芯片。在该方法中,终端设备可以接收第一信息和第二信息,其中,第一信息用于指示为第一类型终端设备配置的第一随机接入参数,第二信息用于指示为第一事件配置的第二随机接入参数;当终端设备为第一类型终端设备且触发随机接入过程的事件为第一事件时,终端设备可以确定目标随机接入参数,并使用目标随机接入参数发起随机接入过程;其中,目标随机接入参数为第一随机接入参数或第二随机接入参数。
采用上述方法,由终端设备来确定目标随机接入参数,从而通过对终端设备的行为进行规范,明确了终端设备发起随机接入过程所使用的随机接入参数,避免终端设备选择随机接入参数的行为不清楚的问题。
在一种可能的设计中,该方法还包括:终端设备接收指示信息,指示信息用于指示目标随机接入参数,进而终端设备可以根据指示信息确定目标随机接入参数。
如此,一方面,由网络侧来指示目标随机接入参数,明确了终端设备发起随机接入过程所使用的随机接入参数,另一方面,采用网络侧指示的方式,可以使得目标随机接入参数的选择更加灵活。
在一种可能的设计中,第二随机接入参数和第一随机接入参数相同。
如此,由于第一随机接入参数和第二随机接入参数相同,从而避免了终端设备不清楚发起随机接入过程所使用的随机接入参数的问题。
在一种可能的设计中,目标随机接入参数为第一随机接入参数,第一随机接入参数对应的随机接入成功率大于第二随机接入参数对应的随机接入成功率;或者,目标随机接入参数为第二随机接入参数,第一随机接入参数对应的随机接入成功率小于第二随机接入参数对应的随机接入成功率;或者,目标随机接入参数为第一随机接入参数或第二随机接入参数,第一随机接入参数对应的随机接入成功率等于第二随机接入参数对应的随机接入成功率。
如此,终端设备可以根据随机接入参数对应的随机成功率来确定目标随机接入参数,从而明确了终端设备发起随机接入过程所使用的随机接入参数,且能够有效提高随机接入成功率。
在一种可能的设计中,确定目标随机接入参数,包括:当终端设备为第一类型终端设备且触发随机接入过程的事件为第一事件时,目标随机接入参数为第二随机接入参数。
在一种可能的设计中,该方法还包括:终端设备向网络设备或核心网络设备发送类型信息,类型信息用于指示终端设备的类型。
如此,通过终端设备发送类型信息,使得网络设备可以获取终端设备的类型。
第二方面,本申请实施例提供一种随机接入方法,该方法可以应用于终端设备,或者也可以应用于终端设备内部的芯片。在该方法中,当触发随机接入的事件为第一事件时,终端设备确定是否被配置了第一事件对应的第二随机接入参数;当被配置了第二随机接入参数时,终端设备使用第二随机接入参数发起随机接入过程;或者,当未被配置第二随机接入参数时,终端设备确定是否被配置了第一类型终端设备对应的第一随机接入参数,当被配置了第一随机接入参数时,使用第一随机接入参数发起随机接入过程;或者,当未被配置第一事件对应的第二随机接入参数且未被配置第一类型终端设备对应的第一随机接入参数时,终端设备使用第三随机接入参数发起随机接入过程。如此,明确了终端设备选择发起随机接入过程使用的随机接入参数的流程。
第三方面,本申请实施例提供一种随机接入方法,该方法可以应用于第二网络设备,或者也可以应用于第二网络设备内部的芯片。在该方法中,第二网络设备向终端设备发送第二信息,第二信息用于指示为第一事件配置的第二随机接入参数;第二网络设备获取终端设备的类型,当终端设备的类型为第一类型时,向终端设备发送指示信息,指示信息用于指示目标随机接入参数;其中,目标随机接入参数为第一随机接入参数或第二随机接入参数,第一随机接入参数为第一网络设备为第一类型终端设备配置的。
采用上述方法,网络设备可以获取终端设备的类型,并在终端设备为第一类型终端设备时,向终端设备发送指示信息,指示终端设备发起由第一事件触发的随机接入过程所使用的目标随机接入参数,从而解决了终端设备不知采用哪种随机接入参数发起随机接入过程的问题。在该方案中,由网络设备向终端设备指示目标随机接入参数,从而使得目标随机接入参数可以由网络设备灵活选择,且实现较为方便。
在一种可能的设计中,第二网络设备获取终端设备的类型,包括:第二网络设备从终端设备获取终端设备的类型;或者,第二网络设备从核心网设备获取终端设备的类型;或者,第二网络设备从第一网络设备获取终端设备的类型。
第四方面,本申请实施例提供一种随机接入方法,该方法可以应用于网络设备,或者也可以应用于网络设备内部的芯片。在该方法中,第二网络设备获取终端设备的类型;第二网络设备根据终端设备的类型,为终端设备配置随机接入参数。
如此,网络设备可以根据终端设备的类型来配置随机接入参数,从而能够有效避免为MPS终端设备或MCS终端设备配置多种随机接入参数,而导致终端设备不清楚采用哪一种随机接入参数来发起随机接入过程的问题。
在一种可能的设计中,第二网络设备根据终端设备的类型,为终端设备配置随机接入参数,包括:当终端设备的类型为第一类型时,第二网络设备向终端设备发送第三信息,第三信息用于指示为第一类型终端设备配置的随机接入参数。
如此,当终端设备的类型为第一类型时,网络设备可以为第一类型终端设备配置随机接入参数,而不再为第一事件额外配置随机接入参数,从而避免了终端设备不清楚采用哪一种随机接入参数来发起随机接入过程的问题。
在一种可能的设计中,第三信息包括随机接入参数,或者,第三信息包括随机接入参数的索引。如此,当第三信息包括随机接入参数的索引时,能够有效节省资源开销。
在一种可能的设计中,第二网络设备根据终端设备的类型,为终端设备配置随机接入参数,包括:当终端设备的类型为第一类型时,第二网络设备向终端设备发送第二信息,第二信息用于指示第一事件对应的随机接入参数;其中,第一事件对应的随机接入参数和第一随机接入参数相同,第一随机接入参数为第一网络设备为第一类型终端设备配置的。
在一种可能的设计中,第二网络设备获取终端设备的类型,包括:第二网络设备从终端设备获取终端设备的类型;或者,第二网络设备从核心网设备获取终端设备的类型;或者,第二网络设备从第一网络设备获取终端设备的类型。
第五方面,本申请实施例提供一种随机接入方法,该方法可以应用于终端设备,或者也可以应用于终端设备内部的芯片。在该方法中,终端设备向第一网络设备或核心网设备发送类型信息,类型信息用于指示终端设备的类型;以及,终端设备获取第二网络设备为终端设备配置随机接入参数。
如此,通过终端设备发送类型信息,使得网络设备可以获取终端设备的类型,便于网络设备根据终端设备的类型为终端设备配置随机接入参数。
在一种可能的设计中,终端设备获取第二网络设备为终端设备配置随机接入参数,包括:当终端设备的类型为第一类型时,终端设备从第二网络设备接收第三信息,第三信息用于指示为第一类型终端设备配置的随机接入参数。
在一种可能的设计中,第三信息包括随机接入参数,或者,第三信息包括随机接入参数的索引。
在一种可能的设计中,终端设备获取第二网络设备为终端设备配置随机接入参数,包括:当终端设备的类型为第一类型时,终端设备从第二网络设备接收第二信息,第二信息用于指示第一事件对应的随机接入参数;
其中,第一事件对应的随机接入参数和第一随机接入参数相同,第一随机接入参数为第一网络设备为第一类型终端设备配置的。
针对上述第一方面至第五方面,在一种可能的设计中,第一事件为波束失败恢复事件或切换事件。在又一种可能的设计中,第一类型终端设备包括多媒体优先级业务MPS终端设备或关键任务业务MCS终端设备。
第六方面,本申请实施例提供一种装置,包括用于执行以上第一方面或第二方面或第五方面的任一种设计中所包括的各个步骤的单元或手段(means)。
第七方面,本申请实施例提供一种装置,包括用于执行以上第三方面或第四方面的任一种设计中所包括的各个步骤的单元或手段。
第八方面,本申请实施例提供一种装置,包括至少一个处理器和存储器,至少一个处理器用于执行以上第一方面或第二方面或第五方面的任一种设计中提供的方法。
第九方面,本申请实施例提供一种装置,包括至少一个处理器和存储器,至少一个处理器用于执行以上第三方面或第四方面的任一种设计中提供的方法。
第十方面,本申请实施例提供一种装置,包括至少一个处理器和接口电路,至少一个处理器用于执行以上第一方面或第二方面或第五方面的任一种设计中提供的方法。
第十一方面,本申请实施例提供一种装置,包括至少一个处理器和接口电路,至少一个处理器用于执行以上第三方面或第四方面的任一种设计中提供的方法。
第十二方面,本申请实施例提供一种程序,该程序在被处理器执行时用于执行以上第一方面至第五方面的任一种设计中提供的方法。
第十三方面,本申请实施例提供一种程序产品,例如计算机可读存储介质,当计算机读取并执行所述程序产品时,使得计算机执行上述第一方面至第五方面的任一种设计中提供的方法。
以上装置可以是一个芯片,处理器可以通过硬件来实现也可以通过软件来实现,当通过硬件实现时,该处理器可以是逻辑电路、集成电路等;当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,该存储器可以集成在处理器中,可以位于该处理器之外,独立存在。
以上处理器为一个或多个,存储器为一个或多个。
存储器可以与处理器集成在一起,或者存储器与处理器分离设置。在具体实现过程中,存储器可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请实施例对存储器的类型以及存储器与处理器的设置方式不做限定。
图1为本申请实施例适用的一种网络架构示意图;
图2为本申请实施例适用的又一种网络架构示意图;
图3为本申请实施例适用的又一种网络架构示意图;
图4为本申请实施例提供的随机接入过程示意图;
图5a为本申请实施例提供的字段ra-prioritizationForAccessIdentity的示例图;
图5b为终端设备如何发起BFR事件触发的随机接入过程示意图;
图5c为终端设备如何发起切换事件触发的随机接入过程示意图;
图6为本申请实施例一提供的随机接入方法所对应的流程示意图;
图7a为本申请实施例提供的一种基于预设规则确定目标随机接入参数的过程示意图;
图7b为本申请实施例提供的一种基于预设规则确定目标随机接入参数的过程示意图;
图8为本申请实施例二提供的随机接入方法所对应的流程示意图;
图9为本申请实施例三提供的随机接入方法所对应的流程示意图;
图10为本申请实施例四提供的随机接入方法所对应的流程示意图;
图11为本申请实施例中所涉及的装置的可能的示例性框图;
图12为本申请实施例提供的一种终端设备的结构示意图;
图13为本申请实施例提供的一种网络设备的结构示意图。
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。
首先,对本申请实施例中的部分用语进行解释说明,以便于本领域技术人员理解。
(1)终端设备:可以是能够接收网络设备调度和指示信息的无线终端设备,无线终端设备可以是指向用户提供语音和/或数据连通性的设备,或具有无线连接功能的手持式设备、或连接到无线调制解调器的其他处理设备。终端设备可以经无线接入网(如,radio access network,RAN)与一个或多个核心网或者互联网进行通信,终端设备可以是移动终端设备,如移动电话(或称为“蜂窝”电话,手机(mobile phone))、计算机和数据卡,例如,可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语言和/或数据。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、平板电脑(Pad)、带无线收发功能的电脑等设备。无线终端设备也可以称为系统、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile station,MS)、远程站(remote station)、接入点(access point,AP)、远程终端设备(remote terminal)、接入终端设备(access terminal)、用户终端设备(user terminal)、用户代理(user agent)、用户站(subscriber station,SS)、用户端设备(customer premises equipment,CPE)、终端(terminal)、用户设备(user equipment,UE)、移动终端(mobile terminal,MT)等。终端设备也可以是可穿戴设备以及下一代通信系统,例如,5G通信系统中的终端设备或者未来演进的公共陆地移动网络(public land mobile network,PLMN)中的终端设备等。
(2)网络设备:是无线网络中的设备,例如网络设备可以为将终端设备接入到无线网络的无线接入网(radio access network,RAN)节点(或设备),又可以称为基站。目前,一些RAN设备的举例为:5G通信系统中的新一代基站(generation Node B,gNodeB)、传输接收点(transmission reception point,TRP)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU),或无线保真(wireless fidelity,Wi-Fi)接入点(access point,AP)等。另外,在一种网络结构中,网络设备可以包括集中单元(centralized unit,CU)节点、或分布单元(distributed unit,DU)节点、或包括CU节点和DU节点的RAN设备。此外,在其它可能的情况下,网络设备可以是其它为终端设备提供无线通信功能的装置。本申请的实施例对网络设备所采用的具体技术和具体设备形态不做限定。为方便描述,本申请实施例中,为终端设备提供无线通信功能的装置称为网络设备。
(3)本申请实施例中的术语“系统”和“网络”可被互换使用。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可 以存在三种关系,例如,A和/或B,可以表示:单独存在A、同时存在A和B、单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如“A,B和C中的至少一个”包括A,B,C,AB,AC,BC或ABC。
以及,除非有特别说明,本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度。例如,第一信息和第二信息,只是为了区分不同的信息,而并不是表示这两种信息的优先级或者重要程度等的不同。
下面结合说明书附图对本申请的技术方案作进一步地详细描述。
图1为本申请实施例适用的一种网络架构示意图。如图1所示,终端设备130可接入到无线网络,以通过无线网络获取外网(例如因特网)的服务,或者通过无线网络与其它设备通信,如可以与其它终端设备通信。该无线网络包括无线接入网(radio access network,RAN)设备110和核心网(core network,CN)设备120,其中RAN设备110用于将终端设备130接入到无线网络,CN设备120用于对终端设备进行管理并提供与外网通信的网关。应理解,图1所示的通信系统中各个设备的数量仅作为示意,本申请实施例并不限于此,实际应用中在通信系统中还可以包括更多的终端设备130、更多的RAN设备110,还可以包括其它设备。
CN中可以包括多个CN设备120,当图1所示的网络架构适用于5G通信系统时,CN设备120可以为接入和移动性管理功能(access and mobility management function,AMF)实体、会话管理功能(session management function,SMF)实体或用户面功能(user plane function,UPF)实体等,当图1所示的网络架构适用于LTE通信系统时,CN设备120可以为移动性管理实体(mobility management entity,MME)和服务网关(serving gateway,S-GW)等。
图2为本申请实施例适用的又一种网络架构示意图。如图2所示,该网络架构包括CN设备、RAN设备和终端设备。其中,RAN设备包括基带装置和射频装置,其中基带装置可以由一个节点实现,也可以由多个节点实现,射频装置可以从基带装置拉远独立实现,也可以集成在基带装置中,或者部分拉远部分集成在基带装置中。例如,在LTE通信系统中,RAN设备(eNB)包括基带装置和射频装置,其中射频装置可以相对于基带装置拉远布置,例如射频拉远单元(remote radio unit,RRU)相对于BBU拉远布置。
RAN设备和终端设备之间的通信遵循一定的协议层结构,例如控制面协议层结构可以包括无线资源控制(radio resource control,RRC)层、分组数据汇聚层协议(packet data convergence protocol,PDCP)层、无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理层等协议层的功能;用户面协议层结构可以包括PDCP层、RLC层、MAC层和物理层等协议层的功能;在一种可能的实现中,PDCP层之上还可以包括业务数据适配(service data adaptation protocol,SDAP)层。
RAN设备可以由一个节点实现RRC、PDCP、RLC和MAC等协议层的功能,或者可以由多个节点实现这些协议层的功能。例如,在一种演进结构中,RAN设备可以包括CU)和DU,多个DU可以由一个CU集中控制。如图2所示,CU和DU可以根据无线网络的 协议层划分,例如PDCP层及以上协议层的功能设置在CU,PDCP以下的协议层,例如RLC层和MAC层等的功能设置在DU。
这种协议层的划分仅仅是一种举例,还可以在其它协议层划分,例如在RLC层划分,将RLC层及以上协议层的功能设置在CU,RLC层以下协议层的功能设置在DU;或者,在某个协议层中划分,例如将RLC层的部分功能和RLC层以上的协议层的功能设置在CU,将RLC层的剩余功能和RLC层以下的协议层的功能设置在DU。此外,也可以按其它方式划分,例如按时延划分,将处理时间需要满足时延要求的功能设置在DU,不需要满足该时延要求的功能设置在CU。
此外,射频装置可以拉远,不放在DU中,也可以集成在DU中,或者部分拉远部分集成在DU中,在此不作任何限制。
图3为本申请实施例适用的又一种网络架构示意图。相对于图2所示的网络架构,图3中还可以将CU的控制面(CP)和用户面(UP)分离,分成不同实体来实现,分别为控制面(control plane,CP)CU实体(即CU-CP实体)和用户面(user plane,UP)CU实体(即CU-UP实体)。
在以上网络架构中,CU产生的信令可以通过DU发送给终端设备,或者终端设备产生的信令可以通过DU发送给CU。DU可以不对该信令进行解析而直接通过协议层封装而透传给终端设备或CU。以下实施例中如果涉及这种信令在DU和终端设备之间的传输,此时,DU对信令的发送或接收包括这种场景。例如,RRC或PDCP层的信令最终会处理为PHY层的信令发送给终端设备,或者,由接收到的PHY层的信令转变而来。在这种架构下,该RRC或PDCP层的信令,即也可以认为是由DU发送的,或者,由DU和射频装载发送的。
上述图1、图2或图3所示意的网络架构可以适用于各种无线接入技术(radio access technology,RAT)的通信系统中,例如可以是LTE通信系统,也可以是5G(或者称为新无线(new radio,NR))通信系统,也可以是LTE通信系统与5G通信系统之间的过渡系统,该过渡系统也可以称为4.5G通信系统,当然也可以是未来的通信系统。本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着通信网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请以下实施例中的装置,根据其实现的功能,可以位于终端设备或网络设备。当采用以上CU-DU的结构时,网络设备可以为CU节点、或DU节点、或包括CU节点和DU节点的RAN设备。
在图1、图2或图3所示意的网络架构中,终端设备通过随机接入过程可建立与网络设备的上行同步,并获得唯一的终端标识符,比如小区无线网络临时标识(cell radio network temporary identifier,C-RNTI),进而终端设备可与网络设备进行上行传输。
下面对本申请实施例所涉及的随机接入过程的相关技术特征进行解释说明。
一、随机接入过程的触发
随机接入过程是指从终端设备发送随机接入信号开始尝试接入网络,到与网络设备建立起基本的信令连接之前的过程。随机接入信号可用于发起随机接入过程,例如随机接入 信号可以为随机接入前导码(random access preamble)。可选的,随机接入信号还可以为解调参考信号(demodulation reference signal,DMRS)。终端设备可通过随机接入过程与网络设备进行信息交互,实现与通信系统的上行时间同步,可选的,还可以通过随机接入过程进行资源请求或数据传输。本申请实施例中,随机接入过程也可以称为随机接入或随机接入信道过程或随机接入方式,本申请对此不做区分,下文描述中可替代使用。
示例性地,触发随机接入过程的事件(或场景)可以有多种,比如,LTE通信系统中,可以由以下场景触发随机接入过程:(1)终端设备初始接入,由无线资源控制(radio resource control,RRC)空闲(RRC_IDLE)态到RRC连接(RRC_CONNECTED)态时建立无线连接;(2)RRC连接重建过程(RRC connection re-establishment procedure);(3)切换(handover);(4)RRC_CONNECTED态下,下行数据到达(此时需要回复确认(ACK)/非确认(NACK))时,上行处于“不同步”状态;(5)RRC_CONNECTED态下,上行数据到达(比如需要上报测量报告或发送用户数据)时,上行处于“不同步”状态或没有可用的物理上行控制信道(physical uplink control channel,PUCCH)资源用于调度请求(scheduling request,SR)传输(此时允许上行同步的终端设备使用随机接入信道(random access channel,RACH)来替代SR)。又比如,5G通信系统中,还可以由以下场景触发随机接入过程:(1)非激活(Inactive)状态下上行(uplink,UL)数据到达,此时上行处于“不同步”状态;(2)Inactive状态下下行(downlink,DL)数据到达,此时上行处于“不同步”状态;(3)请求On-demand系统消息(system information,SI)(5G通信系统中将系统消息划分成两类:minimum SI和On-demand SI,其中minimum SI是所有终端设备都需要接受的,而On-demand SI可根据终端设备自身的需要进行请求);(4)波束失败恢复(beam failure recovery,BFR)。
二、高优先级和低优先级随机接入过程
5G通信系统中根据触发随机接入过程的事件将随机接入过程划分为高优先级随机接入过程和低优先级随机接入过程,其中,将切换或者波束失败恢复事件触发的随机接入过程规定为高优先级随机接入过程,将其它事件触发的随机接入过程规定为低优先级随机接入过程。
高优先级随机接入过程和低优先级随机接入过程的一个区别在于:网络设备可以为高优先级随机接入过程配置两个特殊的参数,分别为高优先级随机接入过程使用的功率爬坡步长(powerRampingStepHighPriority)和用于区分随机接入过程的退避因子(scalingFactorBI)。下面分别对这两个参数进行说明。
(1)powerRampingStepHighPriority
powerRampingStepHighPriority主要用在功率爬坡机制中,功率爬坡机制是指:当随机接入前导码发送失败后,通过不断抬升发送功率来提高重发前导码成功的概率。示例性地,功率爬坡公式如下:
preambleReceivedTargetPower+DELTA_PREAMBLE+(PREAMBLE_POWER_RAMPING_COUNTER–1)×PREAMBLE_POWER_RAMPING_STEP
其中,preambleReceivedTargetPower为前导码目标接收功率,DELTA_PREAMBLE为基于前导码格式的功率偏差,可以为预先配置的数值;PREAMBLE_POWER_RAMPING_COUNTER为功率爬坡计数器,PREAMBLE_POWER_RAMPING_STEP为前导码功率爬坡步长。
举个例子,如果第一次功率爬坡的功率是X,当第一次功率爬坡后随机接入前导码发送失败,则以X+PREAMBLE_POWER_RAMPING_STEP的功率来进行第二次发送;如果第二次功率爬坡后随机接入前导码仍发送失败,则以X+PREAMBLE_POWER_RAMPING_STEP+PREAMBLE_POWER_RAMPING_STEP的功率进行提升,以此类推,直到达到最大发送次数或者达到终端设备的最大发送功率限制。
对于高优先随机接入过程来说,PREAMBLE_POWER_RAMPING_STEP的取值为powerRampingStepHighPriority;对于低优先级随机接入过程来说,PREAMBLE_POWER_RAMPING_STEP的取值为功率爬坡步长(powerRampingStep)。
(2)scalingFactorBI
scalingFactorBI主要用在退避机制中,退避机制是指当前导码发送失败后,为了提升随机接入成功概率,终端设备可以在0和退避指示(backoff indicator,BI)之间随机选择一个数值,然后终端设备在延迟相应数值对应的时间后再次发起随机接入过程,从而提升随机接入成功概率。示例性地,对于低优先级随机接入过程来说,如果需要进行退避,则终端设备可以直接使用网络设备在RAR消息中携带的BI值;对于高优先级随机接入过程来说,如果需要进行退避,则终端设备可以将BI值乘以scalingFactorBI,即终端设备在执行退避机制时,在0~BI*scalingFactorBI范围内随机选择一个数值,然后在延迟相应数值时间后再次发起随机接入过程。
下面对网络设备配置上述两个参数的实现方式进行描述。
根据前文的描述可知,高优先级随机接入过程包括BFR事件触发的随机接入过程和切换事件触发的随机接入过程,也就是说,网络设备可以为BFR事件或切换事件配置上述两个参数。比如,针对于BFR事件,网络设备可以向终端设备发送BFR配置信息,BFR配置信息中包括网络设备为BFR事件配置的powerRampingStepHighPriority和scalingFactorBI;相应地,终端设备接收到BFR配置信息后,若确定发生BFR事件,则可以使用网络设备为BFR配置的参数发起随机接入过程。又比如,针对于切换事件,目标网络设备可以通过源网络设备向终端设备发送切换命令,切换命令中包括目标网络设备为切换事件配置的powerRampingStepHighPriority和scalingFactorBI;相应地,终端设备接收到切换命令后,可以使用目标网络设备为切换事件配置的参数发起随机接入过程。
三、随机接入过程包括的步骤
上述是以触发随机接入过程的事件,将随机接入过程划分为高优先级随机接入过程和低优先级随机接入过程。示例性地,根据终端设备发送的前导码是否是由终端设备自身选择,可以将随机接入过程划分为基于竞争的随机接入过程和基于非竞争的随机接入过程。其中,基于竞争的随机接入过程,可以由终端设备选择前导码;当触发随机接入过程的事件为前面介绍的除切换以及波束失败恢复外的其他事件时,可以采用基于竞争的随机接入过程。基于非竞争的随机接入过程,可以由网络设备为终端设备分配前导码;当触发随机接入过程的事件为前面介绍的切换以及波束失败恢复事件时,可以采用基于非竞争的随机接入过程。
下面以基于竞争的随机接入过程为例,结合图4描述随机接入过程所包括的一些步骤。图4为本申请实施例提供的一种随机接入过程示意图。如图4所示,本申请实施例提供的随机接入过程包括如下步骤。
步骤400:网络设备向终端设备发送随机接入配置信息,则终端设备可接收来自网络设备的随机接入配置信息,所述随机接入配置信息用于配置随机接入参数。该步骤可以为用于执行随机接入过程之前的准备工作,不属于随机接入过程包括的步骤。
示例性地,随机接入参数可以包括以下一项或多项:用于传输随机接入前导码的物理随机接入信道(physical random access channel,PRACH)资源集;随机接入前导码(preamble)集合;随机接入前导码的最大传输次数;随机接入前导码的初始发射功率;随机接入响应窗的大小;第3消息的混合自动重传请求(hybrid automatic repeat request,HARQ)最大重传次数;竞争决议定时器的时长。进一步地,随机接入参数还可以包括功率爬坡步长。
其中,PRACH资源集可以包括终端设备发送前导码可使用的时频资源,可以通过字段rach-ConfigGeneric来指示。随机接入前导码的最大传输次数可以通过字段totalNumberOfRA-Preambles来指示。随机接入前导码的初始发射功率可以通过字段reambleInitialReceivedTargetpower来指示。随机接入响应窗的大小用于指示随机接入响应窗所包括的子帧个数,可以通过字段ra-ResponsewindowSize来指示,随机接入响应窗起始于终端设备发送preamble的子帧(如果preamble在时域上跨多个子帧,则以最后一个子帧计算)之后的第3个子帧,并持续ra-ResponseWindowSize个子帧。第3消息的HARQ最大重传次数可以通过字段maxHARQ-Msg3来指示。竞争决议定时器的时长可以通过字段mac-ContentionResolutionTimer来指示。
需要说明的是:(1)上述所描述的“PRACH资源集、preamble集合、随机接入前导码的最大传输次数、随机接入前导码的初始发射功率、随机接入响应窗的大小、第3消息的HARQ最大重传次数、竞争决议定时器的时长”中的每一项可以预先设置对应的默认值。比如,网络设备发送的随机接入配置信息配置了RACH资源集,而未配置随机接入前导码的最大传输次数(比如随机接入配置信息包括字段rach-ConfigGeneric,而不包括字段totalNumberOfRA-Preambles)时,随机接入前导码的最大传输次数的取值可以为默认值。
(2)上述是对随机接入参数包括的内容进行示例性描述,在其它可能的实施例中,随机接入参数还可能包括其它与随机接入过程相关的内容,比如时间指示信息。
下面对时间指示信息进行介绍。
现有的随机接入过程,终端设备在第一次发送Msg1时,不需要进行等待,而是可以直接发送;当第一次发送Msg1失败而需要进行重发时,终端设备可以根据网络设备在Msg2中所指示的BI来确定退避时间,进而在等待相应的退避时间后,重新发送Msg1。然而,由于5G通信系统未来支持海量的终端设备,有可能同时有大量终端设备需要发起随机接入过程,当大量终端设备在同一时刻发送Msg1会造成接入拥塞,影响接入性能。为解决这一问题,本申请实施例考虑可以在随机接入参数中引入时间指示信息,时间指示信息用于确定在初次发送Msg1之前需要等待的时间。也就是说,终端设备在第一次发送Msg1时,可以根据时间指示信息来确定退避时间,并在等待退避时间后发起Msg1;当第一次发送Msg1失败而需要进行重发时,终端设备可以根据网络设备在Msg2中所指示的BI来确定退避时间。采用该方式,由于终端设备在第一次发生Msg1可以根据确定出的退避时间进行退避,从而能够有效避免大量终端设备在同一时刻发送Msg1造成接入拥塞,提高接入性能。
示例性地,上述时间指示信息也可以称为BI(为便于与Msg2中的BI进行区分,可以表示为BI’)。终端设备根据BI’确定退避时间,可以是指,终端设备在0和BI’之间随机 选择一个数值作为退避时间。在一个示例中,时间指示信息可以由网络设备通过广播消息来发送或者通过专用RRC信令(比如RRC重配置消息或切换命令)来发送。
步骤401:终端设备向网络设备发送preamble,则网络设备从终端设备接收preamble,其中,该preamble又被称为随机接入过程中的第1消息或消息1(MSG1)。
其中,步骤401中终端设备向网络设备发送的preamble可以为终端设备从步骤400中获取到的用于随机接入的preamble集合中选择的一个preamble。
步骤402:网络设备在检测到终端设备发送的preamble后,向终端设备发送随机接入响应(random access response,RAR)消息,则终端设备从网络设备接收RAR消息,其中,该RAR消息又被称为随机接入过程中的第2消息或消息2(MSG2)。消息2中可包括如下信息中的一种或多种:检测到的preamble的标识或索引、上行时间同步信息、为终端设备发送消息3分配的上行资源和BI,当然消息2中还可以包括其它信息。preamble的标识例如为随机接入前导标识(random access preamble identifier,RAPID)。对于随机接入失败的终端设备,网络设备可向其发送退避指示,所述退避指示可以用于指示时间值,所述时间值用于确定退避时间范围,当该随机接入过程失败时,终端设备可在该退避时间范围内选择退避时间,并在选择的退避时间结束之后才可以再次使用网络设备在步骤400中为其配置的随机接入资源。需要说明的是,若网络设备未接收到终端设备发送的preamble,则网络设备发送的消息2中不包括与该终端设备对应的preamble的标识。
步骤403:终端设备根据消息2向网络设备发送上行数据,则网络设备从终端设备接收该上行数据。其中,该上行数据又被称为随机接入过程中的第3消息或消息3(MSG3),消息3可以包括不同的场景信息的标识,例如,终端设备的标识(如UE-ID)。例如,针对终端设备进行无线资源控制(radio resource control,RRC)连接重建的场景,对应的场景信息的标识为小区无线网络临时标识(cell radio network temporary identifier,C-RNTI)。示例性地,消息2中可以携带上行资源和时间提前(time advanced,TA)命令(command),如此,终端设备接收到消息2之后,使用该TA command所指示的TA值在消息2指示的上行资源上发送消息3。
步骤404:网络设备在检测到消息3时,向终端设备发送竞争解决消息,则终端设备从网络设备接收竞争解决消息,其中,该竞争解决消息又被称为第4消息或消息4(MSG4)。消息4可以包括消息3的部分内容或包含C-RNTI的物理下行控制信道(physical downlink control channel,PDCCH),即消息4包括PDCCH承载的C-RNTI。例如若网络设备接收到终端设备发送的上行数据,消息4可以携带终端设备的标识;若网络设备未接收到终端设备发送的上行数据,则网络设备发送的消息4中不包括该终端设备的标识;终端设备在接收到该消息4时,可根据消息4携带的终端设备的标识与自身的标识是否相符来确定是否成功接入网络设备,其中,若两者相符则确定终端设备成功接入网络设备,若两者不相符则确定终端设备接入失败。
需要说明的是,上述所描述的为基于竞争的随机接入过程(或者低优先级随机接入过程)的实现过程,高优先级随机接入过程的实现可以参照处理,其差别在于,对于高优先级随机接入过程来说,随机接入参数除包括上述所描述的参数外,还可以包括powerRampingStepHighPriority和scalingFactorBI。
四、MPS终端设备和MCS终端设备
5G通信系统中,终端设备可能支持一些比较紧急的业务,比如MPS或MCS,由 于上述是基于触发随机接入过程的事件来划分随机接入过程的优先级,而未考虑触发随机接入过程的业务的紧急程度,因此,为保证比较紧急的业务的正常执行,还可以考虑基于触发随机接入过程的业务紧急程度来区分随机接入过程的优先级,比如,将比较紧急的业务所触发的随机接入过程也规定为高优先级随机接入过程。本申请实施例中,支持MPS的终端设备可以称为MPS终端设备,支持MCS的终端设备可以称为MCS终端设备。MPS终端设备或MCS终端设备所发起的随机接入过程均可以理解为高优先级随机接入过程。其中,MPS终端设备(或MCS终端设备)所发起的随机接入过程和切换事件(或BFR事件)触发的随机接入过程可以是相同优先级,或者也可以是不同优先级。
示例性地,可以通过终端设备的接入标识(Access Identity)来识别终端设备的类型,Access Identity=0表示终端设备没有配置任何参数;Access Identity=1表示终端设备为MPS终端设备;Access Identity=2表示终端设备为MCS终端设备;Access Identity=3~10是预留给未来使用;Access Identity=11表示终端设备是对应接入等级(Access Class)11的终端设备,以此类推。需要说明的是,Access Identity可以为内嵌在终端设备的用户识别模块(subscriber identification module,SIM)卡中的信息,网络设备不知晓该信息,即网络设备不知晓终端设备的类型。
由于网络设备不知晓终端设备的类型,即不知晓哪些终端设备为MPS终端设备或MCS终端设备,因此,在一种可能的实现方式中,网络设备可以通过广播消息来为MPS终端设备或MCS终端设备配置随机接入参数。比如,在广播消息中新增一个字段ra-Prioritization,在字段ra-Prioritization中配置powerRampingStepHighPriority和scalingFactorBI两个参数。广播消息中还可以包括一个字段ra-prioritizationFor AccessIdentity,此字段包括7个比特(bit),每个比特的取值用于指示该比特对应的类型的终端设备是否使用ra-prioritization中的参数,比如当某一比特的取值为1时,表示该比特对应的类型的终端设备使用ra-prioritization中的参数,当某一比特的取值为0时,表示该比特对应的类型的终端设备不使用ra-prioritization中的参数。示例性地,第1个比特对应的类型为Access Identity=1,第2个比特对应的类型为Access Identity=2,第3个比特对应的类型为Access Identity=11,第4个比特对应的类型为Access Identity=12,第5个比特对应的类型为Access Identity=13,第6个比特对应的类型为Access Identity=14,第7个比特对应的类型为Access Identity=15。如图5a所示,为字段ra-prioritizationForAccessIdentity的一种示例图,由于图5a中第1个比特和第2个比特的取值为1,因此,终端设备接收到该广播消息后,若确定自身的Access Identity=1或2,则可以使用ra-prioritization中的参数发起随机接入过程。
示例性地,广播消息中还可以包括为低优先级随机接入过程配置的随机接入参数,比如powerRampingStep。
需要说明的是,上述示例中,广播消息中包括一个字段ra-Prioritization,当终端设备为MPS终端设备时,可以使用该ra-Prioritization所包括的随机接入参数发起随机接入过程;当终端设备为MCS终端设备时,也可以使用该ra-Prioritization所包括的随机接入参数发起随机接入过程。也就是说,网络设备统一为MPS终端设备和MCS终端设备配置随机接入参数,此种情形下,为MPS终端设备和MCS终端设备配置的随机接入参数相同。
在其它可能的示例中,网络设备也可以分别为MPS终端设备和MCS终端设备配置随机接入参数,此种情形下,为MPS终端设备和MCS终端设备配置的随机接入参数可以不相同,从而提高配置的灵活性。比如,在广播消息中新增两个字段ra-Prioritization,分别为ra-Prioritization-1和ra-Prioritization-2,在ra-Prioritization-1中为MPS终端设备配置powerRampingStepHighPriority和scalingFactorBI两个参数,在ra-Prioritization-2中为MCS终端设备配置powerRampingStepHighPriority和scalingFactorBI两个参数。进而,当终端设备为MPS终端设备时,可以使用该ra-Prioritization-1所包括的随机接入参数发起随机接入过程;当终端设备为MCS终端设备时,可以使用该ra-Prioritization-2所包括的随机接入参数发起随机接入过程。
根据上述对相关技术特征的介绍可知,网络设备可以通过发送广播消息的方式为MPS终端设备(或MCS终端设备)配置随机接入参数。此外,由于网络设备不知晓终端设备的类型,因此,网络设备还可能通过上文中所描述的方式为MPS终端设备(或MCS终端设备)的BFR事件或切换事件配置随机接入参数,从而导致当发生BFR事件或切换事件时,MPS终端设备(或MCS终端设备)不知采用哪一种随机接入的参数来发起随机接入过程。
举个例子,如图5b所示,在步骤1中,网络设备发送广播消息,广播消息中包括为MPS终端设备或MCS终端设备配置的随机接入参数(称为随机接入参数1,比如包括powerRampingStepHigh Priority1和scalingFactorBI1两个参数),进一步地,广播消息中还可以包括用于发起低优先级随机接入过程的随机接入参数(比如powerRampingStep)。在步骤2中,终端设备接收到广播消息后,根据Access Identity(比如Access Identity=1)确定需要使用为MPS终端设备配置的随机接入参数。在步骤3中,网络设备由于不知道终端设备的类型,还可能通过单播的方式向终端设备发送BFR配置信息,BFR配置信息中包括为BFR事件配置的随机接入参数(称为随机接入参数2,比如包括powerRampingStepHighPriority2和scalingFactorBI2)。在步骤4中,终端设备将不清楚采用随机接入参数1和随机接入参数2中的哪一种随机接入参数来发起由BFR事件触发的随机接入过程。
再举个例子,如图5c所示,在步骤1中,源网络设备发送广播消息,广播消息中包括为MPS终端设备或MCS终端设备配置的随机接入参数(称为随机接入参数1,比如包括powerRampingStepHigh Priority1和scalingFactorBI1两个参数),进一步地,广播消息中还可以包括用于发起低优先级随机接入过程的随机接入参数。在步骤2中,终端设备接收到广播消息后,根据Access Identity(比如Access Identity=1)确定需要使用为MPS终端设备配置的随机接入参数。在步骤3中,源网络设备向目标网络设备发送切换请求。在步骤4中,目标网络设备接收切换请求,但由于不知道终端设备的类型,因此按照正常切换的终端设备进行处理,即为切换事件配置随机接入参数(称为随机接入参数3,比如包括powerRampingStep HighPriority3和scalingFactorBI3),并通过源网络设备发送给终端设备。在步骤5中,终端设备将不清楚采用随机接入参数1和随机接入参数3中的哪一种随机接入参数来发起由切换事件触发的随机接入过程。
基于此,本申请实施例提供一种随机接入方法及装置,用于解决终端设备不清楚 发起随机接入过程所使用的随机接入参数的问题。
示例性地,本申请实施例提供的随机接入方法可以包括三种可能的方案,为便于描述,称为方案一、方案二和方案三。在方案一中,网络设备不知晓终端设备的类型,由终端设备从第一随机接入参数和第二随机接入参数中确定目标随机接入参数,并使用目标随机接入参数发起随机接入过程;如此,由终端设备来确定目标随机接入参数,从而通过对终端设备的行为进行规范,明确了终端设备发起随机接入过程所使用的随机接入参数,避免终端设备选择随机接入参数的行为不清楚的问题。在方案二中,网络设备可以获取终端设备的类型,进而当确定终端设备为MPS终端设备或MCS终端设备时,可以向终端设备发送指示信息,来指示目标随机接入参数,相应地,终端设备接收到指示信息后,可以使用目标随机接入参数发起随机接入过程;如此,一方面,由网络设备来指示目标随机接入参数,明确了终端设备发起随机接入过程所使用的随机接入参数,另一方面,采用网络设备指示的方式,可以使得目标随机接入参数的选择更加灵活。在方案三中,网络设备可以获取终端设备的类型,并根据终端设备的类型,为终端设备配置随机接入参数;相应地,终端设备可以使用网络设备配置的随机接入参数发起随机接入过程;如此,网络设备可以根据终端设备的类型来配置随机接入参数,从而能够有效避免为MPS终端设备或MCS终端设备配置多种随机接入参数而导致终端设备不清楚采用哪一种随机接入参数来发起随机接入过程的问题。
实施例一
在实施例一中,将基于上述方案一描述随机接入方法的一种可能的实现。
图6为本申请实施例一提供的随机接入方法所对应的流程示意图,如图6所示,包括:
步骤601,第一网络设备向终端设备发送第一信息,第一信息用于指示为第一类型终端设备配置的第一随机接入参数,第一随机接入参数可以理解为第一类型终端设备对应的随机接入参数。
示例性地,第一类型终端设备可以为MPS终端设备或MCS终端设备。下文中主要以第一类型终端设备为MPS终端设备为例进行描述,当第一类型终端设备为MCS终端设备时可以参照实施。
相应地,在步骤602中,终端设备接收第一信息,并获取第一随机接入参数。
其中,第一随机接入参数可以包括第一功率爬坡步长和/或第一退避因子;其中,第一功率爬坡步长可以为powerRampingStepHighPriority,第一退避因子可以为scalingFactorBI。第一网络设备向终端设备发送第一信息的实现方式可以有多种。在一种可能的实现方式,第一网络设备发送广播消息,广播消息中包括第一信息,比如第一信息可以包括前文中所描述的字段ra-Prioritization(或者前文示例中所描述的ra-Prioritization-1)和字段ra-prioritizationForAccessIdentity。进一步地,广播消息中还可以包括为低优先级随机接入过程配置的第三随机接入参数,第三随机接入参数可以包括第三功率爬坡步长,第三功率爬坡步长可以为powerRampingStep。
步骤603,第二网络设备向终端设备发送第二信息,第二信息用于指示为第一事件配置的第二随机接入参数,第二随机接入参数可以理解为第一事件对应的随机接入参数。
本申请实施例中所涉及的为第一事件配置随机接入参数,可以理解为网络设备为终端设备配置第一事件对应的随机接入参数。
相应地,在步骤604中,终端设备接收第二信息,并获取第二随机接入参数。
示例性地,第二随机接入参数可以包括第二功率爬坡步长和/或第二退避因子,其中,第二功率爬坡步长可以为powerRampingStepHighPriority,第二退避因子可以为scalingFactorBI。在该方案中,第二随机接入参数可以不同于第一随机接入参数,以第一随机接入参数可以包括第一功率爬坡步长和第一退避因子,第二随机接入参数可以包括第二功率爬坡步长和第二退避因子为例,第二随机接入参数可以不同于第一随机接入参数,可以包括:第一随机接入参数中所包括的powerRampingStepHighPriority不同于第二随机接入参数中所包括的powerRampingStepHighPriority,和/或,第一随机接入参数中所包括的scalingFactorBI不同于第二随机接入参数中所包括的scalingFactorBI。
需要说明的是:(1)当上述第一随机接入参数包括第一功率爬坡步长,而不包括第一退避因子时,第一退避因子可以为预先约定的值,或者第一退避因子通过其它方式单独配置,具体不做限定。类似地,当上述第一随机接入参数包括第一退避因子,而不包括第一功率爬坡步长时,第一功率爬坡步长可以为预先约定的值,或者第一功率爬坡步长通过其它方式单独配置,具体不做限定。第二随机接入参数也是类似。(2)第一随机接入参数和第二随机接入参数所包括的参数可以相同,比如,第一随机接入参数包括第一功率爬坡步长,第二随机接入参数包括第二功率爬坡步长;又比如,第一随机接入参数包括第一退避因子,第二随机接入参数包括第二退避因子;又比如,第一随机接入参数包括第一功率爬坡步长和第一退避因子,第二随机接入参数包括第二功率爬坡步长和第二退避因子。
下面对第二网络设备向终端设备发送第二信息的实现方式进行介绍。
本申请实施例中,第二网络设备和第一网络设备可以为同一网络设备;或者,第二网络设备和第一网络设备也可以为不同的网络设备,比如,第二网络设备为切换场景中的目标网络设备,第一网络设备为切换场景中的源网络设备。第一事件可以是指触发的随机接入参数为高优先级随机接入过程的事件,比如BFR事件或切换事件。
在一个示例中,第二网络设备和第一网络设备为同一网络设备,且第一事件为BFR事件。此种情形下,第二网络设备向终端设备发送第二信息的实现方式可以有多种,比如,第二网络设备可以向终端设备发送高层信令,高层信令中包括第二信息。其中,高层信令可以是指高层协议层发出的信令,高层协议层为物理层以上的至少一个协议层。其中,高层协议层可以包括以下协议层中的至少一个:MAC层、RLC层、PDCP层、RRC层和非接入层(non access stratum,NAS)。
当第二网络设备通过RRC层信令向终端设备发送第二信息时,RRC层信令可以为RRC重配置消息或者广播消息。其中,RRC重配置消息可以为RRCConnectionReconfiguration消息,或者RRCReconfiguration消息,具体不做限定。
在又一个示例中,第二网络设备为目标网络设备,第一网络设备为源网络设备,且第一事件为切换事件。此种情形下,第二网络设备向终端设备发送第二信息的实现方式可以有多种,比如,第二网络设备通过第一网络设备向终端设备发送切换命令,切换命令中包括第二信息。示例性地,切换命令可以为RRC信令。
需要说明的是,步骤601可以在步骤603之前执行,或者步骤601也可以和步骤603同时执行,又或者,步骤601也可以在步骤603之后执行,具体不做限定。
步骤605,当终端设备为第一类型终端设备且触发随机接入过程的事件为第一事件时,确定目标随机接入参数。
步骤606,终端设备使用目标随机接入参数发起随机接入过程。
示例性地,终端设备可以获取自身的接入标识,若接入标识为1,则可以确定为第一类型终端设备。当终端设备为第一类型终端设备时,下面描述两种确定目标随机接入参数的方式,分别为实现方式1和实现方式2。
实现方式1
终端设备可以基于预设规则来确定目标随机接入参数,比如,预设规则可以为若触发随机接入过程的事件为第一事件,则目标随机接入参数为第一事件对应的随机接入参数(即第二随机接入参数)。需要说明的是,当终端设备为第一类型终端设备时,可以基于预设规则来确定目标随机接入参数;当终端设备不是第一类型终端设备时,可以按照现有方式来确定发起随机接入过程需要使用的随机接入参数。
在该实现方式的一个示例中,基于预设规则确定目标随机接入参数的过程可以参见图7a所示,包括:
步骤1,触发随机接入过程的事件为第一事件。
步骤2,判断是否被配置了第一事件对应的第二随机接入参数,若是,则执行步骤3,若否,则执行步骤4。
步骤3,当被配置了第一事件对应的第二随机接入参数时,使用第二随机接入参数发起随机接入过程。
步骤4,当未被配置第一事件对应的第二随机接入参数时,确定是否被配置了第一类型终端设备对应的第一随机接入参数,若是,则执行步骤5,若否,则执行步骤6。
步骤5,当被配置了第一类型终端设备对应的第一随机接入参数时,使用第一随机接入参数发起随机接入过程。
步骤6,当未被配置第一事件对应的第二随机接入参数且未被配置第一类型终端设备对应的第一随机接入参数时,使用第三随机接入参数发起随机接入过程。
在该实现方式的又一个示例中,基于预设规则确定目标随机接入参数的过程可以参见图7b所示,包括:
步骤1,随机接入过程被触发。
步骤2,判断是否被配置了第一类型终端设备对应的第一随机接入参数,若是,则执行步骤3,若否,则执行步骤9。
步骤3,确定触发随机接入过程的事件是否为BFR事件或切换事件,若是BFR事件,则执行步骤4,若是切换事件,则执行步骤6,若既不是BFR事件也不是切换事件,则执行步骤8。
步骤4,确定是否被配置了BFR事件对应的随机接入参数(称为第二随机接入参数a),若是,则执行步骤5,若否,则执行步骤8。
步骤5,使用第二随机接入参数a发起随机接入过程。
步骤6,确定是否被配置了切换事件对应的随机接入参数(称为第二随机接入参数b),若是,则执行步骤7,若否,则执行步骤8。
步骤7,使用为第二随机接入参数b发起随机接入过程。
步骤8,使用第一随机接入参数发起随机接入过程。
步骤9,确定触发随机接入过程的事件是否为BFR事件或切换事件,若是BFR事件,则执行步骤10,若是切换事件,则执行步骤12,若既不是BFR事件也不是切换事件,则 执行步骤14。
步骤10,确定是否被配置了BFR事件对应的第二随机接入参数a,若是,则执行步骤11,若否,则执行步骤14。
步骤11,使用BFR事件对应的第二随机接入参数a发起随机接入过程。
步骤12,确定是否被配置了切换事件对应的第二随机接入参数b,若是,则执行步骤13,若否,则执行步骤14。
步骤13,使用切换事件对应的第二随机接入参数b发起随机接入过程。
步骤14,使用第三随机接入参数发起随机接入过程。
实现方式2
终端设备可以基于随机接入参数对应的随机接入成功率,将对应的随机接入成功率高的随机接入参数确定为目标随机接入参数(或者说,将更有利于随机接入成功的随机接入参数确定为目标随机接入参数)。其中,随机接入成功率也可以替换为随机接入等级或者其它类似概念,具体不做限定。比如,终端设备若确定第一随机接入参数对应的随机接入成功率大于第二随机接入参数对应的随机接入成功率,则可以确定目标随机接入参数为第一随机接入参数;终端设备若确定第一随机接入参数对应的随机接入成功率小于第二随机接入参数对应的随机接入成功率,则可以确定目标随机接入参数为第二随机接入参数;终端设备若确定第一随机接入参数对应的随机接入成功率等于第二随机接入参数对应的随机接入成功率,则可以确定目标随机接入参数为第一随机接入参数或第二随机接入参数。其中,powerRampingStepHighPriority越大,则对应的随机接入成功率越高;scalingFactorBI越小,则对应的随机接入成功率越高。
示例性地,以第一随机接入参数为例,确定第一随机接入参数对应的随机接入成功率的方式可以有多种,在一个示例中,第一随机接入参数对应的随机接入成功率可以为powerRampingStepHighPriority和scalingFactorBI的函数运算结果,即F(powerRampingStepHighPriority,scalingFactorBI)。比如,第一随机接入参数对应的随机接入成功率可以等于powerRampingStepHighPriority*a–scalingFactorBI*b,其中,a、b为预设权重值,预设权重值可以是协议预定义的,也可以是网络设备为终端设备配置的。
需要说明的是:(1)在上述步骤605中,若终端设备为第一类型终端设备且触发随机接入过程的事件为第二事件(第二事件可以理解为第一事件以外的其它事件)时,可以使用第一随机接入参数发起随机接入过程。若终端设备不是第一类型终端设备,则当触发随机接入过程的事件为第一事件时,可以使用第二随机接入参数发起随机接入过程;当触发随机接入过程的事件为第二事件时,可以使用第三随机接入参数发起随机接入过程。
(2)上文中侧重描述了第一随机接入参数、第二随机接入参数和第三随机接入参数的不同之处,比如第一随机接入参数可以包括第一功率爬坡步长和第一退避因子,第二随机接入参数可以包括第二功率爬坡步长和第二退避因子,第三随机接入参数可以包括第三功率爬坡步长。此外,第一随机接入参数(或第二随机接入参数或第三随机接入参数)还可以包括其它可能的参数,为便于描述,将第一随机接入参数(或第二随机接入参数或第三随机接入参数)还可以包括的其它可能的参数称为第一参数,第一参数包括以下一项或多项:用于传输随机接入前导码的PRACH资源集;随机接入前导码集合;随机接入前导码的最大传输次数;随机接入前导码的初始发射功率;随机接入响应窗的大小;第3消息的HARQ最大重传次数;竞争决议定时器的时长。可以参见前文中的描述,此处不再赘述。 第一随机接入参数、第二随机接入参数和第三随机接入参数所包括的第一参数可以是由网络设备统一配置的(此时第一随机接入参数、第二随机接入参数和第三随机接入参数所包括的第一参数可以是相同的),或者,也可以是由网络设备分别配置的(此时第一随机接入参数、第二随机接入参数和第三随机接入参数所包括的第一参数可以不同),具体不做限定。
采用上述方法,针对于第一类型终端设备,当终端设备从网络侧接收到多种随机接入参数时,可以基于预设规则或者随机接入参数对应的随机接入成功率来确定目标随机接入参数,从而明确了终端设备发起随机接入过程所使用的随机接入参数。此外,在该方案中,网络设备可以无需知晓终端设备的类型,并可以按照目前已有的方式来为终端设备配置随机接入参数,也就是说,该方案对网络设备的行为改动较小,具有较强的适用性。
实施例二
在实施例二中,将基于上述方案二描述随机接入方法的一种可能的实现。
图8为本申请实施例二提供的随机接入方法所对应的流程示意图,如图8所示,包括:
步骤801,第一网络设备向终端设备发送第一信息,第一信息用于指示为第一类型终端设备配置的第一随机接入参数。示例性地,第一类型终端设备可以包括MPS终端设备或MCS终端设备。
相应地,在步骤802中,终端设备接收第一信息,并获取第一随机接入参数。
步骤803,第二网络设备向终端设备发送第二信息,第二信息用于指示为第一事件配置的第二随机接入参数。
相应地,在步骤804中,终端设备接收第二信息,并获取第二随机接入参数。
示例性地,步骤801至步骤804可以参照步骤601至步骤604,此处不再赘述。
步骤805,第二网络设备获取终端设备的类型,当终端设备的类型为第一类型(或者说终端设备为第一类型终端设备)时,向终端设备发送指示信息,指示信息用于指示目标随机接入参数。
本申请实施例中,第二网络设备可以获取类型信息,类型信息用于指示终端设备的类型。其中,类型信息指示终端设备的类型的方式可以有多种,在一个示例中,类型信息用于指示终端设备的Access Identity,根据前文的介绍可知,Access Identity共有16种取值,因此,类型信息可以包括4个比特,当4个比特的取值为0000时,表示Access Identity=0,当4个比特的取值为0001时,表示Access Identity=1,当4个比特的取值为0010时,表示Access Identity=2,以此类推。如此,第二网络设备可以根据类型信息所指示的Access Identity确定终端设备的类型,比如,若Access Identity=1,则可以确定终端设备为第一类型终端设备。在又一个示例中,类型信息可以包括1个比特,若该比特的取值为1,则说明终端设备为第一类型终端设备,若该比特的取值为0,则说明终端设备不是第一类型终端设备。在又一个示例中,考虑到本申请实施例中的终端设备可能为MPS终端设备或MCS终端设备,因此,类型信息可以包括2个比特,其中1个比特的取值用于指示终端设备是否为MPS终端设备(比如若取值为1,则说明终端设备为MPS终端设备,若取值为0,则说明终端设备不是MPS终端设备),另一个比特用于指示终端设备是否为MCS终端设备(比如若取值为1,则说明终端设备为MCS终端设备,若取值为0,则说明终端设备不是MCS终端设备)。或者,类型信息可以包括2个比特,并通过2个比特的取值来联合指 示终端设备的类型,比如00表示终端设备为MPS终端设备,01表示终端设备为MCS终端设备,10表示终端设备既不是MPS终端设备也不是MCS终端设备,11预留给未来使用。
第二网络设备和第一网络设备可以为同一网络设备(情形1);或者,第二网络设备和第一网络设备也可以为不同的网络设备,比如,第二网络设备为切换场景中的目标网络设备,第一网络设备为切换场景中的源网络设备(情形2)。下面分别针对这两种情形,描述第二网络设备获取终端设备的类型信息的实现方式。
在情形1中,第二网络设备可以通过如下示例1或示例2中所描述的方式获取终端设备的类型信息。示例1,终端设备可以向第二网络设备发送类型信息,类型信息中包括终端设备的接入标识,此种方式可以理解为终端设备主动上报类型信息;又比如,第二网络设备可以向终端设备发送类型询问消息,终端设备接收到类型询问消息后,向第二网络设备发送类型信息,此种方式可以理解为终端设备被动上报类型信息。示例2,终端设备可以向核心网设备发送类型信息,进而核心网设备将类型信息发送给第二网络设备。
进一步地,在该情形中,指示信息和第二信息可以通过同一条信令来发送,比如,第二网络设备通过同一条高层信令来发送第二信息和指示信息。或者,指示信息和第二信息也可以通过不同信令来发送,比如,第二网络设备可以通过高层信令1来发送第二信息,通过高层信令2、半静态信令或动态信令来发送指示信息。其中,半静态信令可以理解为通过MAC层发送的信令,比如媒体接入控制控制元素(medium access control control element,MAC CE),由于MAC CE有其对应的HARQ反馈信息可靠性较高,从而能够确保终端设备接收到指示信息。动态信令可以理解为通过PDCCH发送的信息,比如下行控制信息(downlink control information,DCI),由于DCI直接通过物理层信息发送,从而使得终端设备接收指示信息的时延较短。其中,高层信令1和高层信令2可以理解为是RRC信令(或者说RRC消息),比如第二网络设备可以RRC消息来发送第二信息,或者可以通过RRC消息来发送指示信息,当第二网络设备通过不同高层信令来发送第二信息和指示信息时,可采用不同的RRC消息来指示。
在情形2中,第二网络设备可以通过如下示例3中所描述的方式获取终端设备的类型信息。示例3,第二网络设备可以从第一网络设备获取终端设备的类型信息,比如,第一网络设备向第二网络设备发送切换请求,切换请求中包括类型信息;其中,第一网络设备可以是通过上述示例1和示例2中所描述的方式来获取终端设备的类型信息。
进一步地,在该情形中,指示信息和第二信息可以通过同一条信令来发送,比如,第二网络设备通过切换命令来发送第二信息和指示信息。
示例性地,指示信息用于指示目标随机接入参数,可以理解为,指示信息用于指示若触发随机接入过程的事件为第一事件,则使用目标随机接入参数发起随机接入过程。在一个示例中,可以预先定义第一随机接入参数和第二随机接入参数的索引,比如第一随机接入参数的索引为00,第二随机接入参数的索引为01,进而指示信息可以包括目标随机接入参数的索引,比如若指示信息中包括的索引为01,则说明指示信息所指示的目标随机接入参数为第二随机接入参数,即若触发随机接入过程的事件为第一事件,则使用第二随机接入参数发起随机接入过程。在又一个示例中,指示信息可以包括1个比特,若该比特的取值为0,表示若触发随机接入过程的事件为第一事件,则采用第一事件对应的第二随机接入参数发起随机接入过程;若该比特的取值为1,表示若触发随机接入过程的事件为第 一事件,则采用为第一类型终端设备配置的第一随机接入参数发起随机接入过程。
步骤806,终端设备接收指示信息,当触发随机接入过程的事件为第一事件时,使用目标随机接入参数发起随机接入过程。
采用上述方法,网络设备可以获取终端设备的类型,并在终端设备为第一类型终端设备时,向终端设备发送指示信息,指示终端设备发起由第一事件触发的随机接入过程所使用的目标随机接入参数,从而解决了终端设备不知采用哪种随机接入参数发起随机接入过程的问题。在该方案中,由网络设备向终端设备指示目标随机接入参数,从而使得目标随机接入参数可以由网络设备灵活选择,且实现较为方便。
实施例二与实施例一的主要差异之处在于:实施例二中,网络设备可以获取终端设备的类型,并指示终端设备目标随机接入参数;而实施例一中,网络设备不知晓终端设备的类型,进而由终端设备来确定目标随机接入参数。除此差异之外的其它内容,二者可以相互参照。
实施例三
在实施例三中,将基于上述方案三描述随机接入方法的一种可能的实现。
图9为本申请实施例三提供的随机接入方法所对应的流程示意图,如图9所示,包括:
步骤901,第一网络设备向终端设备发送第一信息,第一信息用于指示为第一类型终端设备配置的第一随机接入参数。示例性地,第一类型终端设备可以包括MPS终端设备或MCS终端设备。
相应地,在步骤902中,终端设备接收第一信息,并获取第一随机接入参数。
步骤903,第二网络设备获取终端设备的类型。
步骤904,当终端设备的类型为第一类型时,第二网络设备向终端设备发送第二信息,第二信息用于指示为第一事件配置的第二随机接入参数,第二随机接入参数和第一随机接入参数相同。
在一个示例中,当终端设备的类型为第一类型时,第二网络设备向终端设备发送第二信息之前,可以获取第一随机接入参数。若第二网络设备和第一网络设备为同一网络设备,则第二网络设备可以直接从自身获取第一随机接入参数;若第二网络设备和第一网络设备为不同网络设备,比如第二网络设备为目标网络设备,第一网络设备为源网络设备,则第二网络设备可以从第一网络设备获取第一随机接入参数,比如第一网络设备向第二网络设备发送切换请求,切换请求中包括第一随机接入参数。第二网络设备获取到第一随机接入参数后,可以配置与第一随机接入参数相同的第二随机接入参数,或者,直接将第一随机接入参数作为第二随机接入参数。此种情形下,第二信息可以包括第二随机接入参数或者第二随机接入参数的索引。
步骤905,终端设备接收第二信息,并获取第二随机接入参数。
步骤906,当触发随机接入过程的事件为第一事件时,终端设备使用第一随机接入参数或第二随机接入参数发起随机接入过程。此处,由于第一随机接入参数和第二随机接入参数相同,终端设备可以随机选择使用第一随机接入参数或第二随机接入参数发起随机接入过程。
采用上述方法,网络设备可以获取终端设备的类型,并为终端设备配置相同的第一随机接入参数和第二随机接入参数,从而解决了终端设备不知采用哪种随机接入参数发起随 机接入过程的问题。
需要说明的是,针对于上述步骤904至步骤906,一种可能的替换方案为,当终端设备的类型为第一类型时,第二网络设备向终端设备发送第二信息,第二信息可以指示为第一事件配置的第二随机接入参数和第一随机接入参数相同,或者指示终端设备使用第一随机接入参数发起第一事件触发的随机接入过程;此种情形下,第二信息可以不再包括第二随机接入参数或第二随机接入参数的索引,比如第二信息可以包括一个比特的信息。相应地,终端设备可以接收第二信息,当触发随机接入过程的事件为第一事件时,终端设备使用第一随机接入参数发起随机接入过程。该替换方案与上述所描述的方案的差异之处在于:第二信息所包括的内容不同。由于该替换方案中,第二信息可以不再包括第二随机接入参数或第二随机接入参数的索引,从而能够有效降低资源开销;此外,第二网络设备也可以无需再获取第一随机接入参数,从而能够节省传输资源。
实施例三与实施例一的主要差异之处在于:实施例三中,网络设备根据终端设备的类型,可以将第二随机接入参数配置成和第一随机接入参数相同,从而避免了终端设备不清楚采用使用哪种随机接入参数发起随机接入过程;实施例一中,第二随机接入参数和第一随机接入参数可以不同,进而终端设备需要采用实施例一中的方式来确定目标随机接入参数。除此差异之外的其它内容,二者可以相互参照。
实施例四
在实施例四中,将基于上述方案三描述随机接入方法的又一种可能的实现。
图10为本申请实施例四提供的随机接入方法所对应的流程示意图,如图10所示,包括:
步骤1001,网络设备获取终端设备的类型。
步骤1002,当终端设备的类型为第一类型时,网络设备向终端设备发送第三信息,第三信息用于指示为第一类型终端设备配置的第一随机接入参数。
在一种可能的实现方式中,网络设备可以通过单播的方式来发送第三信息,比如,网络设备通过高层信令向终端设备发送第三信息。在该方案中,由于网络设备可以获取终端设备的类型,因此可以不再为第一类型终端设备配置第一事件对应的第二随机接入参数。
其中,第三信息可以包括第一随机接入参数,或者,第三信息可以包括第一随机接入参数的索引。比如,可以预先定义多种随机接入参数,如表1中所示意的索引为00的随机接入参数、索引为01的随机接入参数、索引为10的随机接入参数和索引为11的随机接入参数。
表1:随机接入参数的索引示例
若第三信息所包括的索引为00,则说明第一随机接入参数为索引为00的随机接入参数。采用这种方式,通过索引来指示第一随机接入参数,能够有效降低资源开销。
需要说明的是,上述是以第一随机接入参数包括powerRampingStepHighPriority和scalingFactorBI为例,第一随机接入参数还可以包括以下一项或多项:用于传输随机接入前导码的PRACH资源集;随机接入前导码集合;随机接入前导码的最大传输次数;随机接入前导码的初始发射功率;随机接入响应窗的大小;第3消息的HARQ最大重传次数;竞争决议定时器的时长。具体不做限定。
步骤1003,终端设备接收第三信息,并获取第一随机接入参数。
步骤1004,当触发随机接入过程的事件为第一事件时,终端设备使用第一随机接入参数发起随机接入过程。
示例性地,在该方案中,终端设备可以被预先配置为:当触发随机接入过程的事件为第一事件时,直接使用第一随机接入参数发起随机接入过程;或者,终端设备也可以采用上述方案一中所描述的预设规则,进而使用第一随机接入参数发起随机接入过程。
示例性地,上述网络设备可以为正在为终端设备提供服务的网络设备,或者也可以为切换场景中的目标网络设备。当网络设备为目标网络设备时,可以通过源网络设备向终端设备发送第三信息。
采用上述方法,网络设备获取终端设备的类型后,若终端设备的类型为第一类型,则可以为第一类型终端设备配置第一随机接入参数,而不再为终端设备配置第一事件对应的第二随机接入参数,从而解决了终端设备不知采用哪种随机接入参数发起随机接入过程的问题,且有效节省了传输资源。
针对于上述实施例一至实施例四,需要说明的是:(1)上述图6、图8、图9和图10中的步骤编号仅为执行流程的一种示例,并不构成对步骤执行的先后顺序的限制,本申请实施例中相互之间没有时序依赖关系的步骤之间没有严格的执行顺序。(2)上述实施例一至实施例四中,侧重描述了不同实施例之间的差异,比如不同实施例之间的差异包括:实施例一中是由终端设备来确定发起随机接入过程所使用的随机接入参数,实施例二中是由网络设备向终端设备指示发起随机接入过程所使用的随机接入参数,实施例三中是由网络设备为终端设备配置相同的第一随机接入参数和第二随机接入参数,实施例四中是由网络设备为终端设备配置第一随机接入参数,而不再配置第二随机接入参数。除上述差异之外的其它内容,实施例一至实施例四可以相互参照,比如实施例三和实施例四中所涉及的获取终端设备的类型的实现可以参照实施例二。
上述主要从网络设备和终端设备之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,为了实现上述功能,网络设备或终端设备可以包括执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请的实施例能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对终端设备和网络设备进行功能单元的划分,例 如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
在采用集成的单元的情况下,图11示出了本申请实施例中所涉及的装置的可能的示例性框图。如图11所示,装置1100可以包括:处理单元1102和通信单元1103。处理单元1102用于对装置1100的动作进行控制管理。通信单元1103用于支持装置1100与其他设备的通信。可选地,通信单元1103也称为收发单元,可以包括接收单元和/或发送单元,分别用于执行接收和发送操作。装置1100还可以包括存储单元1101,用于存储装置1100的程序代码和/或数据。
该装置1100可以为上述任一实施例中的终端设备、或者还可以为设置在终端设备中的芯片。处理单元1102可以支持装置1100执行上文中各方法示例中终端设备的动作。或者,处理单元1102主要执行方法示例中的终端设备的内部动作,通信单元1103可以支持装置1100与网络设备之间的通信。例如,处理单元1102可以用于执行图6中的步骤605,以及图7a中的步骤1、步骤2、步骤4,以及图7b中的步骤1、步骤2、步骤3、步骤4、步骤6、步骤9、步骤10、步骤12。通信单元1103可以用于执行图6中的步骤602、步骤604、步骤606,以及图7a中的步骤3、步骤5或步骤6,以及图7b中的步骤5、步骤7、步骤8、步骤11、步骤13或步骤14,以及图8中的步骤802、步骤804、步骤806,以及图9中的步骤902、步骤905、步骤906,以及图10中的步骤1003、步骤1004。
具体地,在一个实施例中,通信单元1103用于:接收第一信息,第一信息用于指示为第一类型终端设备配置的第一随机接入参数;以及,接收第二信息,第二信息用于指示为第一事件配置的第二随机接入参数;处理单元1102用于:当终端设备为第一类型终端设备且触发随机接入过程的事件为第一事件时,确定目标随机接入参数;通信单元1103还用于:使用目标随机接入参数发起随机接入过程;其中,目标随机接入参数为第一随机接入参数或第二随机接入参数。
在一种可能的设计中,通信单元1103还用于:接收指示信息,指示信息用于指示目标随机接入参数。
在一种可能的设计中,第二随机接入参数和第一随机接入参数相同。
在一种可能的设计中,目标随机接入参数为第一随机接入参数,第一随机接入参数对应的随机接入成功率大于第二随机接入参数对应的随机接入成功率;或者,目标随机接入参数为第二随机接入参数,第一随机接入参数对应的随机接入成功率小于第二随机接入参数对应的随机接入成功率;或者,目标随机接入参数为第一随机接入参数或第二随机接入参数,第一随机接入参数对应的随机接入成功率等于第二随机接入参数对应的随机接入成功率。
在一种可能的设计中,通信单元1103还用于:向网络设备或核心网络设备发送类型信息,类型信息用于指示终端设备的类型。
在又一个实施例中,处理单元1102用于:当触发随机接入的事件为第一事件时,确定是否被配置了第一事件对应的第二随机接入参数;当被配置了第二随机接入参数时,通过通信单元1103使用第二随机接入参数发起随机接入过程;或者,当未被配置第二随机接入参数时,确定是否被配置了第一类型终端设备对应的第一随机接入参数,当被配置了第一随机接入参数时,通过通信单元1103使用第一随机接入参数发起随机接入过程;或者,当未被配置第一事件对应的第二随机接入参数且未被配置第一类型终端设备对应的第一随 机接入参数时,通过通信单元1103使用第三随机接入参数发起随机接入过程。
在又一个实施例中,通信单元1103还用于:向第一网络设备或核心网设备发送类型信息,类型信息用于指示终端设备的类型;以及,终端设备获取第二网络设备为终端设备配置随机接入参数。
在一种可能的设计中,通信单元1103还用于:当终端设备的类型为第一类型时,从第二网络设备接收第三信息,第三信息用于指示为第一类型终端设备配置的随机接入参数。
在一种可能的设计中,第三信息包括随机接入参数,或者,第三信息包括随机接入参数的索引。
在一种可能的设计中,通信单元1103还用于:当终端设备的类型为第一类型时,从第二网络设备接收第二信息,第二信息用于指示第一事件对应的随机接入参数;其中,第一事件对应的随机接入参数和第一随机接入参数相同,第一随机接入参数为第一网络设备为第一类型终端设备配置的。
该装置1100还可以为上述任一实施例中的网络设备(比如第二网络设备)、或者还可以为设置在第二网络设备中的芯片。处理单元1102可以支持装置1100执行上文中各方法示例中第二网络设备的动作。或者,处理单元1102主要执行方法示例中的第二网络设备的内部动作,通信单元1103可以支持装置1100与终端设备之间的通信。例如,通信单元1103可以用于执行图6中的步骤602,以及图8中的步骤803、步骤805,以及图9中的步骤903、步骤904,以及图10中的步骤1001、步骤1002。
具体地,在一个实施例中,通信单元1103用于:向终端设备发送第二信息,第二信息用于指示为第一事件配置的第二随机接入参数;以及获取终端设备的类型,当终端设备的类型为第一类型时,向终端设备发送指示信息,指示信息用于指示目标随机接入参数;其中,目标随机接入参数为第一随机接入参数或第二随机接入参数,第一随机接入参数为第一网络设备为第一类型终端设备配置的。
在一种可能的设计中,通信单元1103具体用于:从终端设备获取终端设备的类型;或者,从核心网设备获取终端设备的类型;或者,从第一网络设备获取终端设备的类型。
在又一个实施例中,通信单元1103用于:获取终端设备的类型;处理单元1102用于:根据终端设备的类型,为终端设备配置随机接入参数。
在一种可能的设计中,通信单元1103还用于:当终端设备的类型为第一类型时,向终端设备发送第三信息,第三信息用于指示为第一类型终端设备配置的随机接入参数。
在一种可能的设计中,第三信息包括随机接入参数,或者,第三信息包括随机接入参数的索引。
在一种可能的设计中,通信单元1103还用于:当终端设备的类型为第一类型时,向终端设备发送第二信息,第二信息用于指示第一事件对应的随机接入参数;其中,第一事件对应的随机接入参数和第一随机接入参数相同,第一随机接入参数为第一网络设备为第一类型终端设备配置的。
在一种可能的设计中,通信单元1103还用于:从终端设备获取终端设备的类型;或者,从核心网设备获取终端设备的类型;或者,从第一网络设备获取终端设备的类型。
应理解以上装置中单元的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且装置中的单元可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分单元以软件通过处理元 件调用的形式实现,部分单元以硬件的形式实现。例如,各个单元可以为单独设立的处理元件,也可以集成在装置的某一个芯片中实现,此外,也可以以程序的形式存储于存储器中,由装置的某一个处理元件调用并执行该单元的功能。此外这些单元全部或部分可以集成在一起,也可以独立实现。这里所述的处理元件又可以成为处理器,可以是一种具有信号的处理能力的集成电路。在实现过程中,上述方法的各步骤或以上各个单元可以通过处理器元件中的硬件的集成逻辑电路实现或者以软件通过处理元件调用的形式实现。
在一个例子中,以上任一装置中的单元可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个特定集成电路(Application Specific Integrated Circuit,ASIC),或,一个或多个微处理器(digital singnal processor,DSP),或,一个或者多个现场可编程门阵列(Field Programmable Gate Array,FPGA),或这些集成电路形式中至少两种的组合。再如,当装置中的单元可以通过处理元件调度程序的形式实现时,该处理元件可以是通用处理器,例如中央处理器(Central Processing Unit,CPU)或其它可以调用程序的处理器。再如,这些单元可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现。
以上用于接收的单元是一种该装置的接口电路,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,该接收单元是该芯片用于从其它芯片或装置接收信号的接口电路。以上用于发送的单元是一种该装置的接口电路,用于向其它装置发送信号。例如,当该装置以芯片的方式实现时,该发送单元是该芯片用于向其它芯片或装置发送信号的接口电路。
请参考图12,其为本申请实施例提供的一种终端设备的结构示意图。其可以为以上实施例中的终端设备,用于实现以上实施例中终端设备的操作。如图12所示,该终端设备包括:天线1210、射频部分1220、信号处理部分1230。天线1210与射频部分1220连接。在下行方向上,射频部分1220通过天线1210接收网络设备发送的信息,将网络设备发送的信息发送给信号处理部分1230进行处理。在上行方向上,信号处理部分1230对终端设备的信息进行处理,并发送给射频部分1220,射频部分1220对终端设备的信息进行处理后经过天线1210发送给网络设备。
信号处理部分1230可以包括调制解调子系统,用于实现对数据各通信协议层的处理;还可以包括中央处理子系统,用于实现对终端设备操作系统以及应用层的处理;此外,还可以包括其它子系统,例如多媒体子系统,周边子系统等,其中多媒体子系统用于实现对终端设备相机,屏幕显示等的控制,周边子系统用于实现与其它设备的连接。调制解调子系统可以为单独设置的芯片。可选的,以上用于终端设备的装置可以位于该调制解调子系统。
调制解调子系统可以包括一个或多个处理元件1231,例如,包括一个主控CPU和其它集成电路。此外,该调制解调子系统还可以包括存储元件1232和接口电路1233。存储元件1232用于存储数据和程序,但用于执行以上方法中终端设备所执行的方法的程序可能不存储于该存储元件1232中,而是存储于调制解调子系统之外的存储器中,使用时调制解调子系统加载使用。接口电路1233用于与其它子系统通信。以上用于终端设备的装置可以位于调制解调子系统,该调制解调子系统可以通过芯片实现,该芯片包括至少一个处理元件和接口电路,其中处理元件用于执行以上终端设备执行的任一种方法的各个步骤,接口电路用于与其它装置通信。在一种实现中,终端设备实现以上方法中各个步骤的单元 可以通过处理元件调度程序的形式实现,例如用于终端设备的装置包括处理元件和存储元件,处理元件调用存储元件存储的程序,以执行以上方法实施例中终端设备执行的方法。存储元件可以为处理元件处于同一芯片上的存储元件,即片内存储元件。
在另一种实现中,用于执行以上方法中终端设备所执行的方法的程序可以在与处理元件处于不同芯片上的存储元件,即片外存储元件。此时,处理元件从片外存储元件调用或加载程序于片内存储元件上,以调用并执行以上方法实施例中终端设备执行的方法。
在又一种实现中,终端设备实现以上方法中各个步骤的单元可以是被配置成一个或多个处理元件,这些处理元件设置于调制解调子系统上,这里的处理元件可以为集成电路,例如:一个或多个ASIC,或,一个或多个DSP,或,一个或者多个FPGA,或者这些类集成电路的组合。这些集成电路可以集成在一起,构成芯片。
终端设备实现以上方法中各个步骤的单元可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现,该SOC芯片,用于实现以上方法。该芯片内可以集成至少一个处理元件和存储元件,由处理元件调用存储元件的存储的程序的形式实现以上终端设备执行的方法;或者,该芯片内可以集成至少一个集成电路,用于实现以上终端设备执行的方法;或者,可以结合以上实现方式,部分单元的功能通过处理元件调用程序的形式实现,部分单元的功能通过集成电路的形式实现。
可见,以上用于终端设备的装置可以包括至少一个处理元件和接口电路,其中至少一个处理元件用于执行以上方法实施例所提供的任一种终端设备执行的方法。处理元件可以以第一种方式:即调用存储元件存储的程序的方式执行终端设备执行的部分或全部步骤;也可以以第二种方式:即通过处理器元件中的硬件的集成逻辑电路结合指令的方式执行终端设备执行的部分或全部步骤;当然,也可以结合第一种方式和第二种方式执行终端设备执行的部分或全部步骤。
这里的处理元件同以上描述,可以是通用处理器,例如CPU,还可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个ASIC,或,一个或多个微处理器DSP,或,一个或者多个FPGA等,或这些集成电路形式中至少两种的组合。
存储元件可以是一个存储器,也可以是多个存储元件的统称。
请参考图13,其为本申请实施例提供的一种网络设备的结构示意图。用于实现以上实施例中网络设备(比如第二网络设备)的操作。如图13所示,该网络设备包括:天线1301、射频装置1302、基带装置1303。天线1301与射频装置1302连接。在上行方向上,射频装置1302通过天线1301接收终端设备发送的信息,将终端设备发送的信息发送给基带装置1303进行处理。在下行方向上,基带装置1303对终端设备的信息进行处理,并发送给射频装置1302,射频装置1302对终端设备的信息进行处理后经过天线1301发送给终端设备。
基带装置1303可以包括一个或多个处理元件13031,例如,包括一个主控CPU和其它集成电路。此外,该基带装置1303还可以包括存储元件13032和接口13033,存储元件13032用于存储程序和数据;接口13033用于与射频装置1302交互信息,该接口例如为通用公共无线接口(common public radio interface,CPRI)。以上用于网络设备的装置可以位于基带装置1303,例如,以上用于网络设备的装置可以为基带装置1303上的芯片,该芯片包括至少一个处理元件和接口电路,其中处理元件用于执行以上网络设备执行的任一种 方法的各个步骤,接口电路用于与其它装置通信。在一种实现中,网络设备实现以上方法中各个步骤的单元可以通过处理元件调度程序的形式实现,例如用于网络设备的装置包括处理元件和存储元件,处理元件调用存储元件存储的程序,以执行以上方法实施例中网络设备执行的方法。存储元件可以为处理元件处于同一芯片上的存储元件,即片内存储元件,也可以为与处理元件处于不同芯片上的存储元件,即片外存储元件。
在另一种实现中,网络设备实现以上方法中各个步骤的单元可以是被配置成一个或多个处理元件,这些处理元件设置于基带装置上,这里的处理元件可以为集成电路,例如:一个或多个ASIC,或,一个或多个DSP,或,一个或者多个FPGA,或者这些类集成电路的组合。这些集成电路可以集成在一起,构成芯片。
网络设备实现以上方法中各个步骤的单元可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现,例如,基带装置包括该SOC芯片,用于实现以上方法。该芯片内可以集成至少一个处理元件和存储元件,由处理元件调用存储元件的存储的程序的形式实现以上网络设备执行的方法;或者,该芯片内可以集成至少一个集成电路,用于实现以上网络设备执行的方法;或者,可以结合以上实现方式,部分单元的功能通过处理元件调用程序的形式实现,部分单元的功能通过集成电路的形式实现。
可见,以上用于网络设备的装置可以包括至少一个处理元件和接口电路,其中至少一个处理元件用于执行以上方法实施例所提供的任一种网络设备执行的方法。处理元件可以以第一种方式:即调用存储元件存储的程序的方式执行网络设备执行的部分或全部步骤;也可以以第二种方式:即通过处理器元件中的硬件的集成逻辑电路结合指令的方式执行网络设备执行的部分或全部步骤;当然,也可以结合第一种方式和第二种方式执行以上网络设备执行的部分或全部步骤。
这里的处理元件同以上描述,可以是通用处理器,例如CPU,还可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个ASIC,或,一个或多个微处理器DSP,或,一个或者多个FPGA等,或这些集成电路形式中至少两种的组合。
存储元件可以是一个存储器,也可以是多个存储元件的统称。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个 方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。
Claims (28)
- 一种随机接入方法,其特征在于,所述方法包括:终端设备接收第一信息,所述第一信息用于指示为第一类型终端设备配置的第一随机接入参数;所述终端设备接收第二信息,所述第二信息用于指示为第一事件配置的第二随机接入参数;当所述终端设备为所述第一类型终端设备且触发随机接入过程的事件为所述第一事件时,确定目标随机接入参数;所述终端设备使用所述目标随机接入参数发起所述随机接入过程;其中,所述目标随机接入参数为所述第一随机接入参数或所述第二随机接入参数。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:所述终端设备接收指示信息,所述指示信息用于指示所述目标随机接入参数。
- 根据权利要求1所述的方法,其特征在于,所述第二随机接入参数和所述第一随机接入参数相同。
- 根据权利要求1所述的方法,其特征在于:所述目标随机接入参数为所述第一随机接入参数,所述第一随机接入参数对应的随机接入成功率大于所述第二随机接入参数对应的随机接入成功率;或者,所述目标随机接入参数为所述第二随机接入参数,所述第一随机接入参数对应的随机接入成功率小于所述第二随机接入参数对应的随机接入成功率;或者,所述目标随机接入参数为所述第一随机接入参数或第二随机接入参数,所述第一随机接入参数对应的随机接入成功率等于所述第二随机接入参数对应的随机接入成功率。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:所述终端设备向网络设备或核心网络设备发送类型信息,所述类型信息用于指示所述终端设备的类型。
- 一种随机接入方法,其特征在于,所述方法包括:当触发随机接入的事件为第一事件时,终端设备确定是否被配置了所述第一事件对应的第二随机接入参数;当被配置了所述第二随机接入参数时,终端设备使用所述第二随机接入参数发起随机接入过程;或者,当未被配置所述第二随机接入参数时,终端设备确定是否被配置了第一类型终端设备对应的第一随机接入参数,当被配置了所述第一随机接入参数时,使用所述第一随机接入参数发起随机接入过程;或者,当未被配置所述第一事件对应的所述第二随机接入参数且未被配置所述第一类型终端设备对应的所述第一随机接入参数时,终端设备使用第三随机接入参数发起随机接入过程。
- 根据权利要求1至6中任一项所述的方法,其特征在于:所述第一事件为波束失败恢复事件或切换事件。
- 根据权利要求1至7中任一项所述的方法,其特征在于:所述第一类型终端设备包括多媒体优先级业务MPS终端设备或关键任务业务MCS终 端设备。
- 一种随机接入方法,其特征在于,所述方法包括:第二网络设备向终端设备发送第二信息,所述第二信息用于指示为第一事件配置的第二随机接入参数;所述第二网络设备获取所述终端设备的类型,当所述终端设备的类型为第一类型时,向所述终端设备发送指示信息,所述指示信息用于指示目标随机接入参数;其中,所述目标随机接入参数为第一随机接入参数或所述第二随机接入参数,所述第一随机接入参数为第一网络设备为第一类型终端设备配置的。
- 根据权利要求9所述的方法,其特征在于,所述第二网络设备获取所述终端设备的类型,包括:所述第二网络设备从所述终端设备获取所述终端设备的类型;或者,所述第二网络设备从所述核心网设备获取所述终端设备的类型;或者,所述第二网络设备从所述第一网络设备获取所述终端设备的类型。
- 一种随机接入方法,其特征在于,所述方法包括:第二网络设备获取终端设备的类型;所述第二网络设备根据所述终端设备的类型,为所述终端设备配置随机接入参数。
- 根据权利要求11所述的方法,其特征在于,所述第二网络设备根据所述终端设备的类型,为所述终端设备配置随机接入参数,包括:当所述终端设备的类型为第一类型时,所述第二网络设备向所述终端设备发送第三信息,所述第三信息用于指示为第一类型终端设备配置的随机接入参数。
- 根据权利要求12所述的方法,其特征在于,所述第三信息包括所述随机接入参数,或者,所述第三信息包括所述随机接入参数的索引。
- 根据权利要求11所述的方法,其特征在于,所述第二网络设备根据所述终端设备的类型,为所述终端设备配置随机接入参数,包括:当所述终端设备的类型为第一类型时,所述第二网络设备向所述终端设备发送第二信息,所述第二信息用于指示第一事件对应的随机接入参数;其中,所述第一事件对应的随机接入参数和第一随机接入参数相同,所述第一随机接入参数为第一网络设备为所述第一类型终端设备配置的。
- 根据权利要求11至14中任一项所述的方法,其特征在于,所述第二网络设备获取所述终端设备的类型,包括:所述第二网络设备从所述终端设备获取所述终端设备的类型;或者,所述第二网络设备从所述核心网设备获取所述终端设备的类型;或者,所述第二网络设备从第一网络设备获取所述终端设备的类型。
- 一种随机接入方法,其特征在于,所述方法包括:终端设备向第一网络设备或核心网设备发送类型信息,所述类型信息用于指示所述终端设备的类型;所述终端设备获取第二网络设备为所述终端设备配置随机接入参数。
- 根据权利要求16所述的方法,其特征在于,所述终端设备获取第二网络设备为所述终端设备配置随机接入参数,包括:当所述终端设备的类型为第一类型时,所述终端设备从第二网络设备接收第三信息, 所述第三信息用于指示为第一类型终端设备配置的随机接入参数。
- 根据权利要求17所述的方法,其特征在于,所述第三信息包括所述随机接入参数,或者,所述第三信息包括所述随机接入参数的索引。
- 根据权利要求16所述的方法,其特征在于,所述终端设备获取第二网络设备为所述终端设备配置随机接入参数,包括:当所述终端设备的类型为第一类型时,所述终端设备从第二网络设备接收第二信息,所述第二信息用于指示第一事件对应的随机接入参数;其中,所述第一事件对应的随机接入参数和第一随机接入参数相同,所述第一随机接入参数为第一网络设备为所述第一类型终端设备配置的。
- 一种装置,其特征在于,包括用于执行如权利要求1至8中任一项所述的方法的各步骤或者如权利要求16至19中任一项所述的方法的各步骤的单元。
- 一种装置,其特征在于,包括用于执行如权利要求9至15中任一项所述的方法的各步骤的单元。
- 一种装置,其特征在于,包括至少一个处理器和接口电路,其中,所述至少一个处理器用于通过所述接口电路与其它装置通信,并执行如权利要求1至8中任一项所述的方法或者如权利要求16至19中任一项所述的方法。
- 一种装置,其特征在于,包括至少一个处理器和接口电路,其中,所述至少一个处理器用于通过所述接口电路与其它装置通信,并执行如权利要求9至15中任一项所述的方法。
- 一种装置,其特征在于,包括处理器,用于调用存储器中存储的程序,以执行如权利要求1至8中任一项所述的方法或者如权利要求16至19中任一项所述的方法。
- 一种装置,其特征在于,包括处理器,用于调用存储器中存储的程序,以执行如权利要求9至15中任一项所述的方法。
- 一种终端设备,其特征在于,包括如权利要求20或权利要求22或权利要求24所述的装置。
- 一种网络设备,其特征在于,包括如权利要求21或权利要求23或权利要求25所述的装置。
- 一种计算机可读存储介质,其特征在于,包括程序,当所述程序被处理器运行时,如权利要求1至19中任一项所述的方法被执行。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/109574 WO2021062688A1 (zh) | 2019-09-30 | 2019-09-30 | 一种随机接入方法及装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/109574 WO2021062688A1 (zh) | 2019-09-30 | 2019-09-30 | 一种随机接入方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021062688A1 true WO2021062688A1 (zh) | 2021-04-08 |
Family
ID=75337642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/109574 WO2021062688A1 (zh) | 2019-09-30 | 2019-09-30 | 一种随机接入方法及装置 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2021062688A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023077917A1 (zh) * | 2021-11-05 | 2023-05-11 | 华为技术有限公司 | 一种通信方法和设备 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018232381A1 (en) * | 2017-06-16 | 2018-12-20 | Qualcomm Incorporated | Differentiated random access in new radio |
-
2019
- 2019-09-30 WO PCT/CN2019/109574 patent/WO2021062688A1/zh active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018232381A1 (en) * | 2017-06-16 | 2018-12-20 | Qualcomm Incorporated | Differentiated random access in new radio |
Non-Patent Citations (3)
Title |
---|
CATT: "RACH priority configuration", 3GPP DRAFT; R2-1804480 RACH PRIORITY CONFIGURATION - FINAL, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Sanya, China;, 14 April 2018 (2018-04-14), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051428215 * |
ERICSSON (RAPPORTEUR): "E-mail discussion 101bis#71 – Prioritized RACH", 3GPP DRAFT; R2-1808178 - REPORT OF E-MAIL DISCUSSION 101BIS-71 - PRIORITIZED RACH, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Busan, Republic of Korea; 20180521 - 20180525, 20 May 2018 (2018-05-20), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051444477 * |
VIVO: "Prioritized RA parameters for 2-step RACH", 3GPP DRAFT; R2-1905657 PRIORITIZED RA PARAMETERS FOR 2-STEP RACH, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Reno, USA; 20190513 - 20190517, 13 May 2019 (2019-05-13), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051729160 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023077917A1 (zh) * | 2021-11-05 | 2023-05-11 | 华为技术有限公司 | 一种通信方法和设备 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230354454A1 (en) | Re-Establishment of Component Carriers in a Wireless Communication System | |
CN110945957B (zh) | 执行随机接入过程的方法和装置 | |
WO2018171759A1 (zh) | 一种信息传输方法和装置 | |
JP7551899B2 (ja) | 周波数領域リソース決定方法、デバイス、及び記憶媒体 | |
US9439209B2 (en) | Selection between random access and dedicated scheduling request resources | |
US20210136683A1 (en) | Control information utilization method and apparatus of terminal in mobile communication system | |
EP3703455B1 (en) | Methods, terminal device and system for data transmission | |
TWI688302B (zh) | 重新導向通訊裝置的裝置及方法 | |
CN114391235B (zh) | 执行用于非优先的上行链路授权的混合自动重复请求进程的方法及相关设备 | |
WO2021087929A1 (zh) | 一种随机接入的方法和装置 | |
CN113647182B (zh) | 无线通信的方法和设备 | |
WO2020206643A1 (zh) | 一种随机接入方法、设备及存储介质 | |
WO2021056702A1 (zh) | 上行信号的发送和接收方法以及装置 | |
TWI511597B (zh) | 防止隨機存取回應碰撞的方法 | |
WO2021142589A1 (zh) | 一种通信方法及装置 | |
WO2021018472A1 (en) | User equipment involved in performing a random access procedure | |
WO2021077343A1 (zh) | 无线通信方法和终端设备 | |
WO2021203956A1 (zh) | 一种通信方法及装置 | |
WO2020164527A1 (zh) | 一种随机接入方法和装置 | |
WO2024148662A1 (zh) | 无线通信的方法及装置 | |
WO2021062688A1 (zh) | 一种随机接入方法及装置 | |
WO2020061961A1 (zh) | 测量信道质量的方法和装置 | |
WO2020062820A1 (zh) | 信号传输方法及通信装置 | |
CN109600860B (zh) | 随机接入方法、装置、设备、存储介质和程序产品 | |
TWI786536B (zh) | 通訊系統之隨機接取技術 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19947930 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19947930 Country of ref document: EP Kind code of ref document: A1 |