WO2021062759A1 - 随机接入方法、装置、设备及存储介质 - Google Patents

随机接入方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2021062759A1
WO2021062759A1 PCT/CN2019/109680 CN2019109680W WO2021062759A1 WO 2021062759 A1 WO2021062759 A1 WO 2021062759A1 CN 2019109680 W CN2019109680 W CN 2019109680W WO 2021062759 A1 WO2021062759 A1 WO 2021062759A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
information
terminal device
time
user
Prior art date
Application number
PCT/CN2019/109680
Other languages
English (en)
French (fr)
Inventor
胡星星
曾清海
张宏平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201980100853.3A priority Critical patent/CN114450897A/zh
Priority to PCT/CN2019/109680 priority patent/WO2021062759A1/zh
Publication of WO2021062759A1 publication Critical patent/WO2021062759A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/08Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station

Definitions

  • This application relates to the field of communication technology, and in particular to a random access method, device, device, and storage medium.
  • a dual global subscriber identity module USIM
  • DSSS dual SIM single standby
  • DSDS dual SIM dual standby
  • DSDA dual Card dual active
  • DSSS means that although there are two SIM cards in the terminal device, they can only reside in the communication system to which one SIM card belongs at the same time. At different times, users can choose to reside in the communication system to which different SIM cards belong.
  • DSDS means that the terminal device can reside in the communication system to which two SIM cards belong at the same time, but the communication system to which only one SIM card belongs can be in communication at the same time. For example, when one SIM card is used to surf the Internet, the other SIM card cannot be used to answer calls.
  • DSDA means that the terminal device can not only reside in the communication system to which multiple SIM cards belong at the same time, but also can communicate in the communication system to which multiple SIM cards belong at the same time. For example, when one SIM card is used to surf the Internet, another SIM card can also be used. answer the phone.
  • each SIM card in the terminal device Before the terminal device communicates through the dual SIM card, each SIM card in the terminal device first needs to perform random access first to establish a connection with the network device of the corresponding USIM registered network. Among them, when one SIM card has completed random access, and the other SIM card has not yet performed random access, the interaction between the connected SIM card and the network device of the corresponding registered network will affect the random access of the other SIM card. Access.
  • the embodiments of the present application provide a random access method, device, equipment, and storage medium, which can solve the problem that when a terminal device supports two user identities, random access with one of the user identities has a long delay and a failure probability Higher problems, and then optimize the user experience.
  • a random access method which is applied to a first network device, and the method includes: receiving a first message sent from a terminal device as a first user, and the first message is used to indicate a first The transmission time information of the downlink information, the first downlink information is the information received by the terminal device in the random access process as the second user; according to the first message, the second message is sent to the terminal device. Message, the second message is used to indicate the transmission period of the first downlink information.
  • the first network device may return to the terminal device the transmission period indicating the first downlink information according to the transmission time information indicated by the first message sent by the terminal device.
  • the terminal device can determine the transmission period of the first downlink information according to the second message, and then receive the message sent by the second network device according to the transmission period of the first downlink information. Since the transmission period of the first downlink information is a period specially allocated for the first downlink information, the terminal device will not occupy the transceiver as the first user during random access as the second user. Therefore, it can be ensured that the terminal device receives the information of the second network device in time, thereby shortening the random access delay and improving the success rate of random access.
  • the transmission time information includes one or more of random access response window information, contention resolution duration, non-contention access resource configuration information, radio resource control RRC response waiting duration, and beam recovery duration;
  • the random access response window refers to the time window during which the terminal device waits for the second network device to return a random access response message during the random access process, and the information of the random access response window is the random access response message.
  • the size of the incoming response window, or the information of the random access response window includes the start point and the end point of the random access response window;
  • the contention resolution duration refers to the duration that the terminal device waits for the second network device to return contention resolution information during the random access process
  • the non-competitive access resource configuration information includes random access time domain resources that are allowed to be used when the terminal device performs random access in a non-competitive random access manner as the second user;
  • the RRC response waiting period refers to the period of time that the terminal device waits for the second network device to return an RRC response message
  • the beam recovery duration refers to the duration of random access when the terminal device performs beam recovery as the second user.
  • the implementation process of sending the second message to the terminal device according to the first message may be: determining the uplink time domain resource and the downlink time domain resource used by the terminal device as the first user; Sending the second message to the terminal device according to the transmission time information and at least one of the uplink time domain resource and the downlink time domain resource.
  • the second message is used to indicate a first transmission period and/or a second transmission period
  • the first transmission period is the transmission period of the first downlink information
  • the second transmission period is the transmission period of the first downlink information.
  • the second downlink information refers to information received by the terminal device as the first user.
  • the second message further includes a valid time period of the first transmission period.
  • a random access method applied to a terminal device, the terminal device supports a first user identity and a second user identity, the method includes: determining a time allocation mode, the time allocation mode is used to indicate the first A transmission period of downlink information and/or second downlink information, where the first downlink information is information received by a terminal device in a random access process under the identity of the second user, and the second downlink information is Information received by the terminal device in a random access process as the first user identity; receiving the first downlink information according to the time allocation pattern.
  • the terminal device can determine the time allocation mode. Since the time allocation mode is used to indicate the transmission period of the first downlink information and/or the transmission period of the second downlink information, according to the time allocation mode, The transmission time period during which the terminal device receives the first downlink information sent by the second network device as the second user can be determined. Since the transmission period of the first downlink information is a period specially allocated for the first downlink information, the terminal device will perform random access as the second user according to the time allocation mode, and the terminal device will not be the first user. Occupying the transceiver can ensure that the terminal device receives the information of the second network device in time, thereby shortening the random access delay and improving the success rate of random access.
  • the process of determining the time allocation mode may be: determining the time allocation mode according to a second message from the first network device, where the second message is used to indicate the first transmission period and/or the second transmission period.
  • a transmission period, the first transmission period is a transmission period of the first downlink information, and the second transmission period is a transmission period of the second downlink information.
  • a first message may be sent to the first network device, and the first message is used to indicate the first network device.
  • the transmission time information of the downlink information may be used to indicate the first network device.
  • the terminal device may send the first message to the first network device as the first user.
  • the first network device may return the transmission period indicating the first downlink information to the terminal device according to the transmission time information indicated by the first message.
  • the terminal device can determine the transmission period of the first downlink information according to the second message, and then receive the message sent by the second network device according to the transmission period of the first downlink information. Since the transmission period of the first downlink information is a period specially allocated for the first downlink information, the terminal device will not occupy the transceiver as the first user during random access as the second user. Therefore, it can be ensured that the terminal device receives the information of the second network device in time, thereby shortening the random access delay and improving the success rate of random access.
  • the first message is sent to the first network device again.
  • the second message further includes a valid time period of the first transmission period.
  • the implementation process of determining the time allocation mode may be: determining the time allocation mode according to transmission time information.
  • the terminal device itself may allocate the transmission period of the first downlink information. Since the transmission period of the first downlink information is a period specially allocated for the first downlink information, the terminal device will not occupy the transceiver as the first user during random access as the second user. Therefore, it can be ensured that the terminal device receives the information of the second network device in time, thereby shortening the random access delay and improving the success rate of random access.
  • the terminal device directly determines the time allocation mode according to the transmission time information, and there is no need to send the transmission time information to the network device for allocation, which avoids the inaccuracy of network device allocation and reduces terminal device reporting The process of transmitting time information shortens the random access delay.
  • the transmission time information includes one or more of random access response window information, contention resolution duration, non-contention access resource configuration information, RRC response waiting duration, and beam recovery duration;
  • the random access response window refers to the time window during which the terminal device waits for the second network device to return a random access response message during the random access process, and the information of the random access response window is the random access response message.
  • the size of the incoming response window, or the information of the random access response window includes the start point and the end point of the random access response window;
  • the contention resolution duration refers to the allowable waiting duration for the terminal device to wait for the second network device to return contention resolution information during the random access process
  • the non-competitive access resource configuration information includes random access time domain resources that are allowed to be used when the terminal device performs random access in a non-competitive random access manner as the second user;
  • the RRC response waiting time refers to the allowable waiting time for the terminal device to wait for the second network device to return an RRC response message
  • the beam recovery duration refers to the duration of random access allowed by the terminal device when performing beam recovery as the second user.
  • the method further includes: suspending or stopping the first radio link monitoring in a first time period, where the first time period refers to the transmission of the first downlink information indicated by the time allocation pattern During the period, the first wireless link monitoring is performed by the terminal device as the first user.
  • the terminal device suspends the method of radio link monitoring and the uplink synchronization timing maintenance performed as the first user during the transmission period of the first downlink information. In this way, the terminal device can avoid misjudgment and cause re- Perform RRC reconstruction as the first user to avoid affecting business communication.
  • an information interaction method which is applied to a terminal device, the terminal device supports a first user identity and a second user identity, and the method includes: sending to a first network device as the first user identity First information, the first information is used to instruct the terminal device to suspend or stop signal reception and/or transmission with the identity of the first user, and the first information is carried in the MAC CE or Physical layer PHY signal; pause or stop signal reception and/or transmission as the first user; interact with the second network device as the second user.
  • second information may be sent to the first network device as the first user, and the second information is used to The first network device notifies the signal reception and/or transmission with the identity of the first user to be started.
  • third information may be sent to the second network device as the second user, and the third information is used to indicate Pause or stop signal reception and/or transmission in the identity of the second user; pause or stop signal reception and/or transmission in the identity of the second user, and start signal reception and/or transmission in the identity of the first user And/or send.
  • the terminal device may send the first information to the first network device as the first user, so as to suspend or stop receiving and/or sending of information with the first network device.
  • the terminal device can interact with the second network device as the second user.
  • the terminal device can perform random access as the second user in the next time period. Since the terminal device has suspended or stopped receiving and/or transmitting signals as the first user in the next period of time, the terminal device will not be in the random access process as the second user. Occupy the receiver or transmitter as the first user, so that it can ensure that the terminal device can receive or send messages in time as the second user, shorten the random access delay, and improve the success rate of random access.
  • a MAC CE or PHY signal is used to notify the first network device to suspend interaction with the terminal device, so that the terminal device can perform random access delay in the next time period as the second user. Since the transmission speed of MAC CE and PHY signals is relatively fast, the delay of random access can be shortened. It should also be noted that since the terminal device has notified the first network device that it will suspend or stop sending and receiving information as the first user, the first network device will no longer blindly perform resource scheduling for the terminal device. Avoid waste of resources.
  • a communication device configured to execute the method in the foregoing first aspect or any possible implementation of the first aspect.
  • the communication device may include a communication device for executing the first aspect.
  • the modules of the method in one aspect or any possible implementation of the first aspect include, for example, a receiving module and a sending module.
  • the communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device. In the following, it is taken as an example that the communication device is a network device.
  • the receiving module is configured to receive a first message sent from a terminal device as a first user, where the first message is used to indicate transmission time information of first downlink information, and the first downlink information is the terminal device Information received in the random access process as the second user.
  • the sending module is configured to send a second message to the terminal device according to the first message, where the second message is used to indicate a transmission period of the first downlink information.
  • the transmission time information includes one or more of random access response window information, contention resolution duration, non-contention access resource configuration information, radio resource control RRC response waiting duration, and beam recovery duration;
  • the random access response window refers to the time window during which the terminal device waits for the second network device to return a random access response message during the random access process, and the information of the random access response window is the random access response message.
  • the size of the incoming response window, or the information of the random access response window includes the start point and the end point of the random access response window;
  • the contention resolution duration refers to the duration that the terminal device waits for the second network device to return contention resolution information during the random access process
  • the non-competitive access resource configuration information includes random access time domain resources that are allowed to be used when the terminal device performs random access in a non-competitive random access manner as the second user;
  • the RRC response waiting period refers to the period of time that the terminal device waits for the second network device to return an RRC response message
  • the beam recovery duration refers to the duration of random access when the terminal device performs beam recovery as the second user.
  • the sending module is specifically configured to:
  • the second message is used to indicate a first transmission period and/or a second transmission period
  • the first transmission period is the transmission period of the first downlink information
  • the second transmission period is the transmission period of the first downlink information.
  • the second downlink information refers to information received by the terminal device as the first user.
  • the second message further includes a valid time period of the first transmission period.
  • a communication device configured to execute the foregoing second aspect or the method in any possible implementation manner of the second aspect.
  • the communication device may include
  • the modules of the method in the second aspect or any possible implementation of the second aspect include, for example, a receiving module, a sending module, and a processing module.
  • the communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device. In the following, it is taken as an example that the communication device is a terminal device. Wherein, the terminal device supports a first user identity and a second user identity;
  • the processing module is configured to determine a time allocation mode, the time allocation mode is used to indicate a transmission period of the first downlink information and/or the second downlink information, and the first downlink information is a terminal device using the first downlink information 2.
  • the receiving module is configured to receive the first downlink information according to the time allocation mode.
  • the processing module is specifically configured to: determine the time allocation mode according to a second message from the first network device, where the second message is used to indicate the first transmission period and/or the second transmission period, so The first transmission period is a transmission period of the first downlink information, and the second transmission period is a transmission period of the second downlink information.
  • the sending module is configured to send a first message to the first network device, where the first message is used to indicate transmission time information of the first downlink information.
  • the sending module is also used to:
  • the second message further includes a valid time period of the first transmission period.
  • the processing module is specifically configured to: determine the time allocation mode according to the transmission time information.
  • the transmission time information includes one or more of random access response window information, contention resolution duration, non-contention access resource configuration information, RRC response waiting duration, and beam recovery duration;
  • the random access response window refers to the time window during which the terminal device waits for the second network device to return a random access response message during the random access process, and the information of the random access response window is the random access response message.
  • the size of the incoming response window, or the information of the random access response window includes the start point and the end point of the random access response window;
  • the contention resolution duration refers to the allowable waiting duration for the terminal device to wait for the second network device to return contention resolution information during the random access process
  • the non-competitive access resource configuration information includes random access time domain resources that are allowed to be used when the terminal device performs random access in a non-competitive random access manner as the second user;
  • the RRC response waiting time refers to the allowable waiting time for the terminal device to wait for the second network device to return an RRC response message
  • the beam recovery duration refers to the duration of random access allowed by the terminal device when performing beam recovery as the second user.
  • the processing module is further configured to: suspend or stop the first radio link monitoring in a first time period, where the first time period refers to the first downlink information indicated by the time allocation pattern During the transmission period, the first wireless link monitoring is performed by the terminal device as the first user.
  • a communication device configured to execute the foregoing third aspect or the method in any possible implementation manner of the third aspect.
  • the communication device may include
  • the modules of the method in the third aspect or any possible implementation of the third aspect include, for example, a transceiver module and a processing module.
  • the communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device. In the following, it is taken as an example that the communication device is a terminal device. Wherein, the terminal device supports a first user identity and a second user identity;
  • the transceiver module is configured to send first information to the first network device as the first user, and the first information is used to instruct the terminal device to suspend or stop signal transmission and reception as the first user;
  • the processing module is used to suspend or stop signal reception and/or transmission as the first user
  • the transceiver module is also used to interact with the second network device as the second user.
  • the transceiver module is further configured to: send second information to the first network device as the first user, and the second information is used to notify the first network device that signal reception and/or as the first user has been started. hair.
  • the transceiver module is further configured to: send third information to the second network device as the second user, and the third information is used to instruct to suspend or stop signal receiving and/or sending as the second user; the processing The module is also used to suspend or stop signal reception and/or transmission as the second user, and to start signal reception and/or transmission as the first user.
  • a communication device in a seventh aspect, includes a processor.
  • it may also include a transceiver.
  • the processor and the transceiver are coupled with each other, and are used to implement the foregoing first aspect or the methods described in various possible implementation manners of the first aspect.
  • the communication device may further include a memory.
  • the processor, the memory, and the transceiver are coupled with each other, and are used to implement the foregoing first aspect or the methods described in various possible implementation manners of the first aspect.
  • the communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device. In the following, the communication device is a network device as an example.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver is, for example, a communication interface in the chip, and the communication interface is connected to a radio frequency transceiving component in the communication device to implement information transmission and reception through the radio frequency transceiving component.
  • the transceiver is configured to receive a first message sent from a terminal device as a first user, the first message is used to indicate transmission time information of first downlink information, and the first downlink information is the terminal device Information received as a second user in the random access process; according to the first message, a second message is sent to the terminal device, the second message is used to indicate the transmission period of the first downlink information .
  • the transmission time information includes one or more of random access response window information, contention resolution duration, non-contention access resource configuration information, radio resource control RRC response waiting duration, and beam recovery duration;
  • the random access response window refers to the time window during which the terminal device waits for the second network device to return a random access response message during the random access process, and the information of the random access response window is the random access response message.
  • the size of the incoming response window, or the information of the random access response window includes the start point and the end point of the random access response window;
  • the contention resolution duration refers to the duration that the terminal device waits for the second network device to return contention resolution information during the random access process
  • the non-competitive access resource configuration information includes random access time domain resources that are allowed to be used when the terminal device performs random access in a non-competitive random access manner as the second user;
  • the RRC response waiting period refers to the period of time that the terminal device waits for the second network device to return an RRC response message
  • the beam recovery duration refers to the duration of random access when the terminal device performs beam recovery as the second user.
  • the processor is configured to determine the uplink time domain resources and downlink time domain resources used by the terminal device as the first user; the transceiver is configured to determine the uplink time domain resources and the uplink time domain resources according to the transmission time information and the uplink time domain resources. At least one of the downlink time domain resources sends the second message to the terminal device.
  • the second message is used to indicate a first transmission period and/or a second transmission period
  • the first transmission period is the transmission period of the first downlink information
  • the second transmission period is the transmission period of the first downlink information.
  • the second downlink information refers to information received by the terminal device as the first user.
  • the second message further includes a valid time period of the first transmission period.
  • a communication device in an eighth aspect, includes a processor.
  • it may also include a transceiver.
  • the processor and the transceiver are coupled with each other, and are used to implement the foregoing second aspect or the methods described in various possible implementation manners of the second aspect.
  • the communication device may further include a memory.
  • the processor, the memory, and the transceiver are coupled with each other, and are used to implement the foregoing second aspect or the methods described in various possible implementation manners of the second aspect.
  • the communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device. In the following, the communication device is a terminal device as an example.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver is, for example, a communication interface in the chip, and the communication interface is connected with a radio frequency transceiver component in the communication device to implement information transmission and reception through the radio frequency transceiver component.
  • the processor is configured to determine a time allocation mode, where the time allocation mode is used to indicate a transmission period of the first downlink information and/or the second downlink information, and the first downlink information is a terminal device using the first downlink information 2.
  • the transceiver is configured to receive the first downlink information according to the time allocation pattern.
  • the processor is specifically configured to:
  • the time allocation mode is determined according to a second message from the first network device, the second message is used to indicate a first transmission period and/or a second transmission period, and the first transmission period is the first downlink A transmission period of information, and the second transmission period is a transmission period of the second downlink information.
  • the transceiver is configured to send a first message to the first network device, where the first message is used to indicate transmission time information of the first downlink information.
  • the transceiver is further configured to: after sending the first message, send the first message to the first network device again after a first time interval has elapsed.
  • the second message further includes a valid time period of the first transmission period.
  • the processor is specifically configured to determine the time allocation mode according to transmission time information.
  • the transmission time information includes one or more of random access response window information, contention resolution duration, non-contention access resource configuration information, RRC response waiting duration, and beam recovery duration;
  • the random access response window refers to the time window during which the terminal device waits for the second network device to return a random access response message during the random access process, and the information of the random access response window is the random access response message.
  • the size of the incoming response window, or the information of the random access response window includes the start point and the end point of the random access response window;
  • the contention resolution duration refers to the allowable waiting duration for the terminal device to wait for the second network device to return contention resolution information during the random access process
  • the non-competitive access resource configuration information includes random access time domain resources that are allowed to be used when the terminal device performs random access in a non-competitive random access manner as the second user;
  • the RRC response waiting time refers to the allowable waiting time for the terminal device to wait for the second network device to return an RRC response message
  • the beam recovery duration refers to the duration of random access allowed by the terminal device when performing beam recovery as the second user.
  • the processor is further configured to: suspend or stop monitoring of the first radio link in a first time period, where the first time period refers to the first downlink information indicated by the time allocation pattern During the transmission period, the first wireless link monitoring is performed by the terminal device as the first user.
  • a communication device in a ninth aspect, includes a processor.
  • it may also include a transceiver.
  • the processor and the transceiver are coupled with each other, and are used to implement the methods described in the foregoing third aspect or various possible implementation manners of the third aspect.
  • the communication device may further include a memory.
  • the processor, the memory, and the transceiver are coupled with each other to implement the methods described in the foregoing third aspect or various possible implementation manners of the third aspect.
  • the communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device. In the following, the communication device is a terminal device as an example.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver is, for example, a communication interface in the chip, and the communication interface is connected with a radio frequency transceiver component in the communication device to implement information transmission and reception through the radio frequency transceiver component.
  • a transceiver configured to send first information to the first network device as the first user, and the first information is used to instruct the terminal device to suspend or stop sending and receiving signals as the first user;
  • the processor is used to suspend or stop signal reception and/or transmission as the first user
  • the transceiver is also used to interact with the second network device as the second user.
  • the transceiver is further configured to: send second information to the first network device as the first user, and the second information is used to notify the first network device that signal reception and/or as the first user has been started. hair.
  • the transceiver is further used to: send third information to the second network device as the second user, and the third information is used to instruct to suspend or stop signal receiving and/or sending as the second user; the processing The module is also used to suspend or stop signal reception and/or transmission as the second user, and to start signal reception and/or transmission as the first user.
  • a computer-readable storage medium stores instructions that, when run on a computer, cause the computer to execute the random access described in the first or second aspect above. Access method, or make a computer execute the information interaction method described in the third aspect.
  • a computer program product containing instructions which when run on a computer, causes the computer to execute the random access method described in the first or second aspect, or causes the computer to execute the first The information interaction method described in the three aspects.
  • the terminal device may send the first message to the first network device as the first user.
  • the first network device may return the transmission period indicating the first downlink information to the terminal device according to the transmission time information indicated by the first message.
  • the terminal device can determine the transmission period of the first downlink information according to the second message, and then receive the message sent by the second network device according to the transmission period of the first downlink information. Since the transmission period of the first downlink information is a period specially allocated for the first downlink information, the terminal device will not occupy the transceiver as the first user during random access as the second user. Therefore, it can be ensured that the terminal device receives the information of the second network device in time, thereby shortening the random access delay and improving the success rate of random access.
  • FIG. 1 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 2 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • FIG. 3 is a system architecture diagram involved in the random access method provided by an embodiment of the present application.
  • FIG. 4 is an architecture diagram of a network device provided by an embodiment of the present application.
  • Figure 5 is a flow chart of a random access method provided in related technologies
  • Fig. 6 is a flowchart of a random access method provided by an embodiment of the present application.
  • FIG. 7 is a flowchart of another random access method provided by an embodiment of the present application.
  • FIG. 8 is a flowchart of an information exchange method provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a random access device provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of another random access device provided by an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of an information interaction device provided by an embodiment of the present application.
  • Terminal devices including devices that provide users with voice and/or data connectivity, specifically, include devices that provide users with voice, or include devices that provide users with data connectivity, or include devices that provide users with voice and data connectivity Sexual equipment.
  • it may include a handheld device with a wireless connection function, or a processing device connected to a wireless modem.
  • the terminal device can communicate with the core network via a radio access network (RAN), exchange voice or data with the RAN, or exchange voice and data with the RAN.
  • RAN radio access network
  • the terminal equipment may include user equipment (UE), wireless terminal equipment, mobile terminal equipment, device-to-device communication (device-to-device, D2D) terminal equipment, vehicle to everything (V2X) terminal equipment , Machine-to-machine/machine-type communications (M2M/MTC) terminal equipment, Internet of things (IoT) terminal equipment, subscriber unit, subscriber station (subscriber) station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user Agent (user agent), or user equipment (user device), etc.
  • UE user equipment
  • M2M/MTC Machine-to-machine/machine-type communications
  • IoT Internet of things
  • subscriber unit subscriber station (subscriber) station)
  • mobile station mobile station
  • remote station remote station
  • access point access point
  • AP remote terminal
  • remote terminal remote terminal
  • access terminal access terminal
  • user terminal user terminal
  • user Agent
  • it may include mobile phones (or “cellular” phones), computers with mobile terminal equipment, portable, pocket-sized, hand-held, mobile devices with built-in computers, and so on.
  • PCS personal communication service
  • PCS cordless phones
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistants
  • restricted devices such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities. Examples include barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), laser scanners and other information sensing equipment.
  • RFID radio frequency identification
  • GPS global positioning system
  • laser scanners and other information sensing equipment.
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices or smart wearable devices, etc. It is a general term for using wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes Wait.
  • a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a kind of hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, and need to cooperate with other devices such as smart phones.
  • Use such as all kinds of smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
  • the various terminal devices described above if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be regarded as vehicle-mounted terminal equipment, for example, the vehicle-mounted terminal equipment is also called on-board unit (OBU). ).
  • OBU on-board unit
  • the terminal device may also include a relay. Or it can be understood that everything that can communicate with the base station can be regarded as a terminal device.
  • the device for realizing the function of the terminal device may be a terminal device, or a device capable of supporting the terminal device to realize the function, such as a chip system, and the device may be installed in the terminal device.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the device used to implement the functions of the terminal is a terminal device as an example to describe the technical solutions provided by the embodiments of the present application.
  • Fig. 1 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • the terminal device may include a processor, a communication interface, one or more connection circuit modules, and a memory.
  • the device structure shown in FIG. 1 does not constitute a limitation on the terminal device, and may include more or less components than those shown in the figure, or a combination of some components, or a different component arrangement.
  • the embodiments of the present application There is no restriction on this. The following describes each component of the terminal device in detail with reference to Figure 1:
  • the processor may include circuits for audio/video and logic functions of the terminal device.
  • the processor may include a digital signal processor device, a microprocessor device, an analog-to-digital converter, a digital-to-analog converter, and so on.
  • the control and signal processing functions of the mobile device can be distributed among these devices according to their respective capabilities.
  • the processor may also include an internal voice encoder VC, an internal data modem DM, and so on.
  • the processor may include the function of operating one or more software programs, which may be stored in the memory.
  • the processor and stored software instructions may be configured to cause the terminal device to perform actions.
  • the processor and the stored software instructions may be configured to perform actions performed by the terminal device in the embodiments shown in FIGS. 6-8.
  • the terminal device may also include a user interface, which may include, for example, a headset or speaker, a microphone, an output device (such as a display), an input device, etc., which are operatively coupled to the processor.
  • the processor may include a user interface circuit configured to control at least some functions of one or more elements of the user interface (such as speakers, microphones, displays, etc.).
  • the processor and/or the user interface circuit including the processor may be configured to control one of one or more elements of the user interface through computer program instructions (such as software and/or firmware) stored in a memory accessible by the processor. Or multiple functions.
  • the terminal device may include a battery for supplying power to various circuits related to the mobile device, such as a circuit that provides mechanical vibration as a detectable output.
  • the input device may include a device that allows the device to receive data, such as a keypad, a touch display, a joystick, and/or at least one other input device.
  • the terminal device may also include one or more connection circuit modules for sharing and/or obtaining data.
  • the terminal device may include a short-range radio frequency RF transceiver and/or a detector, so that it can share with and/or obtain data from the electronic device according to the RF technology.
  • the terminal device may include other short-range transceivers, such as, for example, infrared IR transceivers, use transceivers, wireless universal serial bus USB transceivers, and so on.
  • the Bluetooth transceiver can operate according to low-power or ultra-low-power Bluetooth technology. At this point, the terminal device and more specifically the short-range transceiver can send and/or receive data to and/or from electronic devices in the vicinity of the device, such as within 10 meters.
  • the terminal device can send and/or receive data to and/or from electronic devices according to various wireless networking technologies, including: Wi-Fi, Wi-Fi low power consumption, WLAN technology, Such as IEEE 802.11 technology, IEEE 802.15 technology, IEEE 802.16 technology and so on.
  • the terminal device may include a memory that can store information elements related to the mobile user, such as a subscriber identity module SIM. In addition to the SIM, the device may also include other removable and/or fixed memory.
  • the terminal device may include volatile memory and/or non-volatile memory.
  • volatile memory may include random access memory RAM, which includes dynamic RAM and/or static RAM, on-chip and/or off-chip cache memory, and so on.
  • Non-volatile memory may be embedded and/or removable, which may include, for example, read-only memory, flash memory, magnetic storage devices, such as hard disks, floppy disk drives, magnetic tapes, etc., optical disk drives and/or media, Non-volatile random access memory NVRAM and so on.
  • non-volatile memory may include a cache area for temporary storage of data. At least part of the volatile and/or non-volatile memory may be embedded in the processor.
  • the memory can store one or more software programs, instructions, information blocks, data, etc., which can be used by the terminal device to perform the functions of the mobile terminal. For example, the actions of the terminal device in the embodiments shown in FIGS. 6-8 can be executed by the processor calling software programs, instructions, information blocks, data, etc. in the memory.
  • the memory may include an identifier that can uniquely identify a terminal device, such as an International Mobile Equipment Identity (IMEI) code, and may also store an International Mobile Subscriber Identity code (IMSI).
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identity
  • Network equipment including, for example, access network (AN) equipment, such as a base station (e.g., access point), which may refer to equipment that communicates with wireless terminal equipment through one or more cells on the air interface in the access network
  • AN access network
  • a base station e.g., access point
  • V2X vehicle-to-everything
  • the base station can be used to convert the received air frame and IP packet to each other, as a router between the terminal device and the rest of the access network, where the rest of the access network can include the IP network.
  • the RSU can be a fixed infrastructure entity that supports V2X applications, and can exchange messages with other entities that support V2X applications.
  • the network equipment can also coordinate the attribute management of the air interface.
  • the network equipment may include a long term evolution (LTE) system or an evolved base station (NodeB or eNB or e-NodeB, evolutional NodeB) in a long term evolution-advanced (LTE-A) system, Or it can also include the next generation node B (gNB) in the new radio (NR) system (also referred to as the NR system) in the 5th generation (5G) mobile communication technology (the 5th generation, 5G), or it can also Including a centralized unit (CU) and a distributed unit (DU) in a cloud radio access network (cloud radio access network, Cloud RAN) system, which is not limited in the embodiment of the present application.
  • LTE long term evolution
  • NodeB or eNB or e-NodeB, evolutional NodeB evolutional NodeB
  • LTE-A long term evolution-advanced
  • gNB next generation node B
  • NR new radio
  • 5G 5th generation
  • 5G 5th generation
  • CU centralized
  • the network equipment may also include core network equipment.
  • the core network equipment includes, for example, access and mobility management functions (AMF).
  • AMF access and mobility management functions
  • the device used to implement the function of the network device may be a network device, or a device capable of supporting the network device to implement the function, such as a chip system, and the device may be installed in the network device.
  • the device used to implement the functions of the network equipment is a network device as an example to describe the technical solutions provided in the embodiments of the present application.
  • Fig. 2 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the network device may include at least one processor 201, a communication bus 202, a memory 203, and at least one communication interface 204.
  • the device structure shown in FIG. 2 does not constitute a limitation on the network function node, and may include more or less components than shown in the figure, or combine some components, or different component arrangements, the implementation of this application The example does not limit this.
  • the processor 201 is the control center of the network device, and may be a processor or a collective name for multiple processing elements.
  • the processor 201 may be a general-purpose central processing unit (Central Processing Unit, CPU), or an application-specific integrated circuit (ASIC), or one or more integrated circuits used to control the execution of the program of this application. Circuits, for example: one or more microprocessors (digital signal processors, DSP), or one or more field programmable gate arrays (FPGA).
  • the processor 201 can execute various functions of the network function node by running or executing a software program stored in the memory 203 and calling data stored in the memory 203. For example, the actions of the first network device or the second network device in the embodiment shown in FIGS. 6-8 can be executed by calling the data in the memory by the processor of the corresponding network device.
  • the processor 201 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 2.
  • the network function node may include multiple processors, for example, the processor 201 and the processor 205 shown in FIG. 2.
  • processors can be a single-CPU (single-CPU) processor or a multi-core (multi-CPU) processor.
  • the processor here may refer to one or more devices, circuits, and/or processing cores for processing data (for example, computer program instructions).
  • the communication bus 202 may include a path for transferring information between the above-mentioned components.
  • the communication bus 202 may be an industry standard architecture (ISA) bus, a peripheral component (PCI) bus, or an extended industry standard architecture (EISA) bus.
  • ISA industry standard architecture
  • PCI peripheral component
  • EISA extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 2, but it does not mean that there is only one bus or one type of bus.
  • the memory 203 can be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions.
  • the type of dynamic storage device can also be Electrically Erasable Programmable Read-Only Memory (EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM), or other optical disk storage, CD-ROM Storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by Any other medium accessed by the computer, but not limited to this.
  • EEPROM Electrically Erasable Programmable Read-Only Memory
  • CD-ROM Compact Disc Read-Only Memory
  • CD-ROM Storage including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.
  • magnetic disk storage media or other magnetic storage devices
  • the memory 203 may exist independently and is connected to the processor 201 through a communication bus 202.
  • the memory 203 may also be integrated with the processor 201.
  • the memory 203 is used to store a software program for executing the solution provided in the embodiment of the present application, and is controlled by the processor 201 to execute.
  • the communication interface 204 is used to communicate with other devices or communication networks, such as Ethernet, RAN, and wireless local area networks (WLAN).
  • the communication interface 33 may include a receiving unit to realize a receiving function, and a sending unit to realize a sending function.
  • the network device may further include an output device 206 and an input device 207.
  • the output device 206 communicates with the processor 201 and can display information in a variety of ways.
  • the output device 206 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector (projector) Wait.
  • the input device 207 communicates with the processor 201, and can receive user input in a variety of ways.
  • the input device 207 may be a mouse, a keyboard, a touch screen device, a sensor device, or the like.
  • the above-mentioned network function node may be a general network device or a dedicated network device. In a specific implementation, it can be a desktop computer, a portable computer, a network server, and so on.
  • “user identity” (for example, the first user identity or the second user identity, etc.) is a logical concept.
  • “user identity” can correspond to SIM card or subscriber information or virtual SIM card or user identity (such as international mobile subscriber identity (IMSI) or temporary mobile subscriber identity (TMSI), etc.) .
  • IMSI international mobile subscriber identity
  • TMSI temporary mobile subscriber identity
  • different "user identities” logically correspond to different communication entities served by the network side, such as UEs in 4G and 5G systems, such as a terminal device that supports two user identities. In other words, it can be regarded as two communicating entities.
  • the network side will recognize two terminal devices that support different SIM cards or different subscriber information as two different communication entities, and will also support multiple different communication entities.
  • the same terminal device with SIM card or multiple subscriber information is identified as multiple different communication entities, even in reality, the terminal device supporting multiple different SIM cards or multiple subscriber information is just one physical entity.
  • description will be made mainly by taking the "user identity" corresponding to the SIM card as an example.
  • the SIM card can be understood as the key for the terminal device to access the mobile network.
  • the SIM card and its evolution are collectively referred to as the SIM card in the embodiments of the present application.
  • the SIM card can be an identification card for a user of a global system for mobile communications (GSM) digital mobile phone, which is used to store the user's identification code and key, and supports the authentication of the user by the GSM system; and
  • the SIM card may also be a universal subscriber identity module (USIM), which may also be referred to as an upgraded SIM card.
  • GSM global system for mobile communications
  • USB universal subscriber identity module
  • the terminal device is installed with a SIM card, which is considered to be that the terminal device supports one user identity.
  • a terminal device with two SIM cards installed can support two user identities. It can be understood that the SIM card and the user identity are one.
  • This article mainly takes the terminal device supporting two user identities as an example, and the two user identities are called the first user identity and the second user identity respectively.
  • the first user identity can be understood as the user identity that the terminal device has after the SIM card 1 is installed
  • the second user identity can be understood as the user identity that the terminal device has after the SIM card 2 is installed.
  • the terminal device also supports more than two user identities.
  • the terminal device supports three user identities, four user identities, or more.
  • User identity can be registered in more than two networks, and each user identity can be registered in one network.
  • the embodiments of this application will mainly be described based on the terminal device supporting two user identities.
  • the specific implementation can refer to the related description of the terminal device supporting two user identities, and some simple things may be required. However, it is also within the protection scope of the embodiments of this application.
  • the terminal device when the user identity of the terminal device is the first user identity, from the perspective of the network device, the terminal device can be understood as a user (from the perspective of the protocol, it is a terminal device, for example, called the first user );
  • the terminal device when the user identity of the terminal device is the second user identity, from the perspective of the network device, the terminal device can be understood as another user (for example, referred to as the second user).
  • the terminal device can be registered in the first network as the first user and registered in the second network as the second user.
  • the terminal device supports one user identity, which can also be described as the terminal device having one user identity.
  • the terminal device supports two user identities, which can also be described as the terminal device having two user identities.
  • Radio resource control (RRC) state terminal equipment has three RRC states: RRC connected state (connected state), RRC idle state (idle state) and inactive state (inactive state).
  • RRC connected state connected state
  • RRC idle state idle state
  • inactive state inactive state
  • RRC connected state (or, can also be referred to as connected state for short.
  • connected state and “RRC connected state” are the same concept, and the two terms can be interchanged): the terminal device establishes an RRC connection with the network, and it can Perform data transfer.
  • RRC idle state (or, can also be referred to as idle state for short.
  • idle state and “RRC idle state” are the same concept, and the two terms can be interchanged): the terminal device does not establish an RRC connection with the network, and the base station The context of the terminal device is not stored. If the terminal device needs to enter the RRC connected state from the RRC idle state, it needs to initiate an RRC connection establishment process.
  • RRC inactive state (or, can also be referred to as inactive state for short.
  • inactive state “inactive state”, “deactivated state”, “inactive state”, “RRC inactive state” and “RRC deactivated state” , Is the same concept, these terms can be interchanged): the terminal device entered the RRC connection state before, and then the base station released the RRC connection, but the base station saved the context of the terminal device. If the terminal device needs to enter the RRC connected state again from the RRC inactive state, it needs to initiate the RRC connection recovery process (or called the RRC connection reestablishment process). Compared with the RRC establishment process, the RRC recovery process has shorter time delay and lower signaling overhead. However, the base station needs to save the context of the terminal device, which will occupy the storage overhead of the base station.
  • the terminal device can share the transceiver as two users to send and receive information.
  • the terminal device occupies the transceiver as a user to send and receive information, it will no longer be able to send and receive information as another user. That is, through a transceiver, the terminal device can only send and receive information as a user at a time.
  • the embodiment of the present application provides a random access method, which can allocate corresponding time periods for the first user identity and the second user identity, and the terminal device can send and receive information with the corresponding user identity within the corresponding time period. In this way, the delay in sending and receiving information as the second user is reduced, and the success rate of the terminal device accessing the network device as the second user is improved.
  • the terminal device may include two independent transceivers, and the terminal device may use a transceiver corresponding to each user identity to send and receive information with each user identity.
  • the method provided in the embodiment of this application can also be used to assign each user's identity. The corresponding time period. In this way, the terminal device can send and receive information with the corresponding user identity within the time period corresponding to each user's identity, thereby avoiding interference.
  • FIG. 3 is a system architecture diagram involved in a random access method provided by an embodiment of the present application.
  • the system includes a terminal device 301, a first network device 302, and a second network device 303.
  • the terminal device 301 can communicate with the first network device 302 and the second network device 303.
  • the first network device 302 and the second network device 303 may also communicate.
  • the terminal device 301 may be the terminal device that supports two user identities as described in FIG. 1.
  • the two user identities supported by the terminal device 301 are referred to as the first user identity and the second user identity, respectively.
  • the terminal device 301 can interact with the first network device 301 and the second network device 302 through the method introduced in the subsequent embodiments, so as to determine the transmission of uplink and downlink information as each user. Transmission period.
  • the first network device 302 may refer to the network device corresponding to the first user identity in the terminal device 301.
  • the first network device may be a base station serving a communication entity corresponding to the first user identity.
  • the terminal device 301 can perform information interaction with the first network device 302 as the first user.
  • the first network device 302 can implement the scheduling of the terminal device 301 through information interaction with the terminal device 301.
  • the first network device 302 can be implemented by the network device shown in FIG. 2.
  • the second network device 303 may refer to the network device corresponding to the second user identity in the terminal device 301.
  • the second network device may be a base station serving the communication entity corresponding to the second user identity.
  • the terminal device 301 can interact with the second network device 303 as the second user.
  • the second network device 303 can implement scheduling with the terminal device 301 in this way.
  • the first network device 302 can be implemented by the network device shown in FIG. 2.
  • first network device 302 and the second network device 303 may be two network devices in the same network, or two network devices in different networks. Alternatively, the first network device 302 and the second network device 303 may also be the same network device. The embodiment of the application does not limit this.
  • the first network device 302 and the second network device 303 may be 4G or 5G base stations.
  • the first network device 302 and the second network device may be base stations with a separate architecture of a centralized unit (CU) and a distributed unit (DU).
  • Figure 4 shows a schematic structural diagram of a base station with a CU and DU separation architecture. As shown in Figure 4, the base station includes CU401 and DU402.
  • the CU401 includes a control plane (central unit-control plane, CU-CP) 4011 of a centralized unit and a user plane (central unit-user plane CU-UP) 4012 of the centralized unit.
  • CU-CP4011 and CU-UP4012 communicate through the E1 interface.
  • CU-CP4011 is used to implement RRC and control plane packet data convergence protocol (packet data convergence protocol-control, PDCP-C) functions.
  • the CU-UP4012 is used to implement the service data adaptation protocol (SDAP) function and the user plane packet data convergence protocol-user (PDCP-U) function.
  • SDAP service data adaptation protocol
  • PDCP-U user plane packet data convergence protocol-user
  • DU402 can communicate with CU-CP4011 through F1-C interface, and communicate with CU-UP4012 through F1-U interface.
  • the DU402 is used to implement radio link control (RLC), medium access control (medium access control, MAC), and physical layer (physical, PHY) functions.
  • RLC radio link control
  • MAC medium access control
  • PHY physical layer
  • a terminal device Before a terminal device establishes a wireless connection with a network device, it needs to perform a random access process, where the random access process is as follows:
  • Step 1 The terminal device sends a random access preamble to the network device.
  • the terminal device may obtain the available random access resource from the broadcast message of the network device.
  • the random access resource includes a time domain or frequency domain resource for sending random access and a corresponding random access preamble.
  • the terminal device may obtain a random access preamble from the foregoing random access resources, and send the random access preamble to the network device.
  • the terminal device After the terminal device sends the random access preamble, it can receive the random access response sent by the network device within a time window.
  • Step 2 The network device sends a random access response to the terminal device.
  • the network device After receiving the random access preamble of the terminal device, the network device can learn that the terminal device currently wants to access. In this case, the network device can estimate the transmission delay with the terminal device to perform uplink timing calibration, and send a random access response including the calibration information to the terminal device.
  • the purpose of the uplink timing is to enable the uplink information of each terminal device to reach the network device at the same time as possible, so as to avoid interference between the various terminal devices.
  • the terminal device can maintain uplink synchronization with the network device according to the calibration information.
  • the random access response may also include uplink resources that the terminal device subsequently uses to send uplink information.
  • the terminal device can receive the random access response sent by the network device within a time window. If the terminal device receives a random access response within this time window, it can continue to perform random access through subsequent steps. If the random access response is not received within this time window, the terminal device can further determine whether the number of random access preambles sent exceeds the maximum threshold, if not, the terminal device can reselect a random access preamble, Go to step 1. If the number of times that the random access preamble is sent exceeds the maximum threshold, it is determined that this random access procedure has failed.
  • Step 3 The terminal device sends a random access message.
  • the terminal device may send a random access message according to the uplink resource included in the random access response.
  • the random access message may be an RRC connection request (RRC connection request), and the random access message may include an identity identifier of the terminal device, and the identity identifier may be an identifier from the core network for uniquely identifying the terminal device.
  • the random access message may include a random number as the identity of the terminal device.
  • Step 4 Network equipment conducts competition resolution.
  • the network device may perform contention resolution after receiving the random access messages sent by the terminal devices. If the terminal device succeeds in the competition, the network device can send contention resolution information to the terminal device.
  • the contention resolution information includes the bit information included in the random access message previously sent by the terminal device (for example, when the number of bits in the random access message exceeds 48 bits, it includes the first 48 bits in the random access message, otherwise it may include The entire random access message).
  • the terminal device can start a contention resolution timer after sending the random access message. If within the time period defined by the contention resolution timer, the terminal device receives the contention resolution information sent by the network device, then the terminal device can subsequently interact with the network device to complete the establishment of the RRC connection. If the terminal device does not receive the contention resolution information within the time defined by the contention resolution timer, the terminal device will determine that the contention resolution has failed. At this time, the terminal device will further determine whether the number of random access preambles sent has exceeded The maximum threshold. If the maximum threshold is not exceeded, the terminal device can re-select a random access preamble and continue to perform step 1. If the maximum threshold is exceeded, the terminal device determines that this random access process has failed.
  • Fig. 5 is a flowchart of a random access method provided in the related art.
  • the first USIM of the terminal device can register with the first network device in the network of the first USIM Send the first message.
  • the first message includes random access resource information available when the second USIM accesses the second network device in the corresponding registered network.
  • the first network device may send a second message to the first USIM according to the first message.
  • the second message includes the first time unit. In the first time unit, the first network device does not communicate with the first USIM. USIM to interact.
  • the second USIM may send a random access request (such as a random access preamble) to the second network device within the first time unit, and after receiving the random access request, the second network device sends a random access request to the second USIM response.
  • the first USIM may send a third message to the first network device.
  • the third message includes when the second USIM is subsequently used to send a random access message (such as an RRC connection request message) Available resource information.
  • the first network device may send a fourth message to the first USIM according to the third message.
  • the fourth message includes the second time unit. In the second time unit, the first network device does not interact with the first USIM.
  • the second USIM may send a random access message to the second network device in the second time unit. After that, when the second USIM receives the contention resolution information sent by the second network device, the random access is completed.
  • the first network device only allocates the uplink time of the random access process to the two USIMs in the terminal device, but does not allocate the corresponding downlink time to the two USIMs.
  • the second The USIM may not be able to receive the information sent by the second network device in time, which may increase the delay of random access, and may even cause random access to fail.
  • the embodiments of the present application provide a random access method, which can shorten the random access delay and provide a random access success rate.
  • Fig. 6 is a flowchart of a random access method provided by an embodiment of the present application. This method can be applied to the system shown in FIG. 3. As shown in FIG. 6, the method includes the following steps:
  • Step 601 The terminal device sends a first message to the first network device as the first user.
  • the first message is used to indicate the transmission time information of the first downlink information.
  • the first downlink information means that the terminal device is the second user Identity information received during random access.
  • two SIM cards may be installed in the terminal device, and the terminal device sending the first message to the first network device as the first user may mean that the terminal device sends the first message to the first network device through the first SIM card.
  • the first SIM card supports the first user identity.
  • the terminal device has completed random access as the first user, but has not yet completed random access as the second user.
  • the terminal device may currently be in the RRC connected state as the first user, and in any one of the RRC idle state, the RRC inactive state, or the RRC connected state as the second user.
  • the first message may include transmission time information.
  • the transmission time information may include one or more of random access response window information, contention resolution duration, non-contention access resource configuration information, radio resource control RRC response waiting duration, and beam recovery duration.
  • the random access response window refers to the time window during which the terminal device waits for the second network device to return a random access response message during the random access process
  • the information of the random access response window is the size of the random access response window.
  • the information of the random access response window includes the start point and the end point of the random access response window.
  • the terminal device may first send the random access preamble to the second network device as the second user. After sending the random access preamble, the terminal device can wait for the random access response returned by the second network device within a time window, and the random access response will include the terminal device sending to the second network device as the second user The uplink resource and uplink timing of the first uplink information. Wherein, the aforementioned time window for waiting to receive the random access response is the random access response window.
  • the terminal device can re-send the random access preamble to the second network device as the second user. If the terminal device does not receive the random access response sent by the second network device within the random access response window, and the number of times that the terminal device sends the random access preamble to the second network device as the second user has reached the upper threshold, Then the random access performed by the terminal device as the second user will fail.
  • the terminal device can send the random access response window as transmission time information to the first network device, so that the first network device can allocate time according to the random access response window to avoid The terminal device occupies the random access response window as the first user.
  • the contention resolution duration refers to the duration of the terminal device waiting for the second network device to return contention resolution information during the random access process.
  • the terminal device may send the random access to the second network device as the second user.
  • Incoming message (such as RRC connection establishment request message).
  • the random access message includes the user identification of the terminal device or a random number.
  • the second network device will perform contention resolution and send contention resolution information to the terminal device that wins the competition.
  • the terminal device can start timing from the moment when the random access message is sent, and if the contention resolution information is not received after a certain period of time, it is determined that the contention resolution has failed. Subsequently, the terminal device will re-initiate random access as the second user.
  • the period of time for receiving the contention resolution information starting from the moment when the random access message is sent is the contention resolution duration.
  • the non-competitive access resource configuration information includes random access time domain resources that are allowed to be used when the terminal device performs random access in a non-competitive random access manner as the second user.
  • the non-competitive access resource configuration information may include uplink time domain resources that can be used to send the random access preamble when the terminal device performs non-competitive random access as the second user.
  • it can also include other available time domain resources and frequency domain resources in the non-competitive random access process.
  • the RRC response waiting duration refers to the duration of the terminal device waiting for the second network device to return an RRC response message.
  • the terminal device when the terminal device performs random access as the second user, it can send an RRC request such as an RRC establishment request or an RRC activation request to the second network device.
  • the second network device receives the terminal device as the second user.
  • the RRC response message can be fed back to the terminal device.
  • the terminal device can start timing from the moment when the RRC request is sent, and wait for the RRC response message within a predetermined period of time.
  • the predetermined duration is the waiting duration of the RRC response.
  • the transmission time information when the transmission time information includes the RRC response waiting time, the transmission time information may also include an indication information, and the indication information may be used to indicate that the RRC response waiting time is an RRC establishment process It is also the corresponding RRC response waiting time during the RRC activation process. That is, the indication information may be used to indicate the type of the RRC request corresponding to the waiting time for the RRC response.
  • the beam recovery duration refers to the duration of random access when the terminal device performs beam recovery as the second user. Wherein, when the terminal device is in the RRC connected state as the second user, if the current beam fails, the terminal device can switch from the current beam to other beams, that is, perform beam recovery. When the terminal device switches from one beam to another beam with the identity of the second user, the terminal device will perform the random access procedure again with the identity of the second user.
  • the aforementioned beam recovery duration refers to the duration of random access by the terminal device as the second user caused by beam recovery.
  • the transmission time information may include other information in addition to the foregoing items.
  • the transmission time information may also include random access preambles, uplink time domain resources, and frequency domain resources that can be used by the terminal equipment as the second user equipment, or the transmission time information may also include the first network equipment and the second user equipment. The timing deviation of the network equipment and so on.
  • the first message may be an RRC message.
  • the terminal device may frequently perform random access procedures as the second user. For example, the terminal device frequently performs beam recovery as the second user identity, which causes the terminal device to frequently perform random access as the second user identity. Or, the terminal device fails to perform random access as the second user identity, so that the terminal device needs to initiate random access again as the second user identity.
  • the terminal device may send the first message once as the first user and then after the first time interval has elapsed. Send the first message.
  • the terminal device can start a timer from the moment of sending the first message, and do not send the first message within the time defined by the timer.
  • the terminal device can send the first message again.
  • a message wherein, the length of the timer is equal to the first time interval.
  • the value of the first time interval can be set by the terminal device, or it can be notified by the first network device through an RRC message, or it can be notified by the first network device or the second network device through a broadcast message .
  • the embodiment of the application does not limit this.
  • Step 602 The first network device sends a second message to the terminal device according to the first message, where the second message is used to indicate the transmission period of the first downlink information.
  • the first network device may send the second message to the terminal device according to the transmission time information indicated by the first message.
  • the first message is used to indicate the transmission period of the first downlink information.
  • the first network device may determine the uplink time domain resources and downlink time domain resources used by the terminal device as the first user. After that, according to the transmission time information indicated by the first message and at least one of the uplink time domain resource and the downlink time domain resource, a second message is sent to the terminal device.
  • the first network device since the first network device is the network device corresponding to the first user identity in the terminal device, it is possible to schedule the information transmission and reception of the terminal device as the first user identity. Based on this, the first network device can allocate all uplink time domain resources and downlink time domain resources available to the terminal device as the first user.
  • the first network device may allocate the first network device to the terminal device from all available downlink time domain resources.
  • the second downlink information refers to information sent by the first network device that is received by the terminal device as the first user. After determining the transmission period of the second downlink information, the first network device may determine the transmission period of the first downlink information from a period outside the transmission period of the second downlink information according to the transmission time information.
  • the determined duration of the transmission period of the first downlink information is not less than the length of the random response window.
  • the transmission period of the first downlink information is determined according to the contention resolution duration.
  • the transmission period of the first downlink information may include multiple discontinuous periods, and the transmission period of the first downlink information can ensure that the second user identity can correctly receive the contention resolution information, for example, the second user identity can send Within the contention resolution time period after each uplink time, there is a downlink time available for the second user identity.
  • the transmission period of the first downlink information determined according to the transmission time information also includes multiple discontinuous periods, and the transmission period of the first downlink information can guarantee the second user
  • the identity can correctly receive the contention resolution information, for example, there is a downlink time available for the second user identity within the contention resolution time period after each moment when the second user identity can be sent uplink.
  • the transmission period of the first downlink information does not overlap with the period of random access uplink time domain resources included in the non-competitive access resource configuration information.
  • the transmission period of the first downlink information may be adjacent to a period of random access to the uplink time domain resource.
  • the transmission period of the first downlink information is determined according to the RRC response waiting period, where the transmission period of the first downlink information may include multiple discontinuous periods, and Multiple discontinuous periods can ensure that the second user identity can correctly receive the RRC response. For example, within the RRC response waiting time after each time when the second user identity can be sent uplink, there is a downlink time available for the second user identity.
  • the transmission time information includes two or three of the random access response window, the contention resolution time, and the RRC response waiting time
  • the above two or three items of information can be combined, and the first one can be determined with reference to the aforementioned method.
  • the transmission period of the first downlink information includes multiple discontinuous periods, and the relevant constraints of each period can refer to the foregoing introduction.
  • the determined duration of the transmission period of the first downlink information is not less than the beam recovery duration.
  • the first network device may send a second message including the transmission period of the first downlink information to the terminal device.
  • the first network device may send the second message including the transmission period of the first downlink information and the transmission period of the second downlink information to the terminal device.
  • the first network device may also determine the transmission period of the second downlink information from the downlink time domain resources available to the terminal device as the first user based on the transmission time information. After that, the first network device may send the second message including the transmission period of the second downlink information to the terminal device.
  • the time period other than the transmission time period of the second downlink information included in the second message is the transmission time period of the first downlink information indicated by the second message. That is, the second message may indicate the transmission period of the first downlink information in an implicit manner.
  • the first network device may select a period from the uplink time domain resources available to the terminal device as the first user as the transmission period of the second uplink information.
  • the second uplink information refers to information sent by the terminal device to the first network device as the first user.
  • the first network device may determine the transmission period of the second downlink information according to the transmission period of the second uplink information.
  • the first network device may select a period of time as the transmission period of the first downlink information from a period other than the transmission period of the second uplink information and the transmission period of the second downlink information.
  • the first network device may send the second message including the transmission period of the first downlink information to the terminal device.
  • the first network device may send the transmission period including the second uplink information and the second downlink to the terminal device.
  • the second message of the information transmission period is the transmission period of the first downlink information indicated by the second message.
  • the first network device may select a period from the uplink time domain resources available to the terminal device as the first user as the transmission period of the second uplink information, and the terminal device can use A period of time is selected from the downlink time domain resources available for the first user identity as the transmission period of the second downlink information.
  • the first network device may select two time periods from the transmission time period of the second uplink information and the time period other than the transmission time period of the second downlink information as the transmission time period of the first uplink information and the first time period respectively according to the transmission time information.
  • the transmission period of the downlink information wherein, the transmission period of the first uplink information and the transmission period of the first downlink information do not overlap.
  • the first network device may send a second message including the transmission period of the first uplink information and the transmission period of the first downlink information to the terminal device.
  • the CU-CP in the first network device may send the first message to
  • the indicated transmission time information is sent to the DU, and the DU generates a piece of information through the above method.
  • the information includes the transmission period of the first uplink information, the transmission period of the first downlink information, the transmission period of the second uplink information, and the second uplink information. At least one of the transmission time, and send the information to the CU-CP.
  • the CU-CP may include the transmission period included in the information in the second message and send it to the terminal device.
  • the second message may also include the effective time period of the first transmission period.
  • the first transmission period refers to the transmission period of the first downlink information.
  • the effective time period refers to a time period during which the first transmission period is effective. That is, the effective time period can be used to indicate the time period in which the terminal device can use the first transmission period to send and receive information.
  • Step 603 The terminal device determines the time allocation mode according to the second message.
  • the terminal device may obtain the transmission period included in the second message, and determine the time allocation mode according to the transmission period included in the second message.
  • the time allocation mode is used to indicate the transmission period of the first downlink information and the transmission period of the second downlink information.
  • the transmission period of the first downlink information may include multiple discontinuous periods.
  • the transmission period of the second downlink information may also include multiple discontinuous periods.
  • the terminal device may use the uplink time domain resources as the first user and the uplink time domain resources used by the terminal device as the second user.
  • the time domain resource is combined with the transmission period of the first downlink information to determine the transmission period of the second downlink information, the transmission period of the second uplink information, and the transmission period of the first uplink information.
  • the uplink time domain resource used by the terminal device as the first user may be notified by the first network device, and the uplink time domain resource used by the terminal device as the second user may be notified by the second network device.
  • the terminal device may select a period that does not coincide with the transmission period of the first downlink information from the uplink time domain resources used as the second user as the transmission period of the first uplink information. After that, the terminal device may select a period that does not overlap with the transmission period of the first downlink information and the first uplink information from the uplink time domain resources used as the first user as the transmission period of the second uplink information. Finally, the terminal device may determine the transmission period of the second downlink information from other periods other than the transmission period of the first uplink information, the first downlink information, and the second uplink information.
  • the terminal device may select a period that does not coincide with the transmission period of the second downlink information from the uplink time domain resources used as the first user as the first 2. Transmission period of uplink information. After that, the terminal device can determine the transmission period of the first downlink information from the period outside the transmission period of the second uplink information and the second downlink information. Finally, the terminal device can determine the transmission period of the first downlink information from the uplink time domain resource used as the second user. Select a time period that does not overlap with the above three time periods as the transmission time period of the first uplink information.
  • the terminal device may first determine the transmission period of the first uplink information from the uplink time domain resources used as the second user, and finally determine the first uplink information transmission period. The transmission period of the downlink information.
  • the uplink time domain resource used by the terminal device as the first user may be notified by the first network device to the terminal device, and the uplink time domain resource used by the terminal device as the second user may be notified by the second network device.
  • the terminal device may refer to the aforementioned method, and according to the transmission period of the first downlink information and the second downlink information, and the terminal device
  • the uplink time domain resources used by the first user identity and the second user identity determine the transmission period of the first uplink information and the transmission period of the second uplink information.
  • the terminal device may refer to the foregoing second message including the transmission period of the second downlink information to determine the first downlink information And the transmission period of the first uplink information.
  • the terminal device may refer to the foregoing second message including the transmission period of the second downlink information to determine the first downlink information And the transmission period of the first uplink information.
  • the above-mentioned transmission period of the first uplink information and the transmission period of the first downlink information may form a continuous period.
  • the transmission period of the second uplink information and the transmission period of the second downlink information may form a continuous period.
  • the transmission period of the first downlink information may include multiple sub-periods
  • the transmission period of the first uplink information may also include multiple sub-periods
  • Step 604 The terminal device receives the first downlink information according to the time allocation mode.
  • the terminal device can send a message to the second network device as the second user during the transmission period of the first uplink information according to the foregoing time allocation mode, and during the transmission period of the first downlink information, Receive the message fed back by the second network device. Because the transmission period of the first uplink information and the first downlink information does not overlap with the transmission period of the second uplink information and the second downlink information. Therefore, when the terminal device interacts with the second network device for random access according to the transmission period of the first uplink information and the transmission period of the first downlink information in the identity of the second user, the terminal device will suspend the communication with the first user identity. The first network device interacts.
  • the terminal device will not occupy the transceiver as the first user in the process of random access as the second user, thereby ensuring that the terminal device can receive the information of the second network device in time, thereby shortening the random access.
  • the entry delay improves the success rate of random access.
  • the terminal device may also send a notification to the first network device as the first user Message to notify the first network device that the terminal device has completed random access.
  • the first network device may adopt other strategies to re-allocate transmission periods for the first uplink information, the first downlink information, the second uplink information, and the second downlink information.
  • the terminal device when the terminal device is in the RRC connected state as the first user, the terminal device needs to monitor the quality of the downlink signal transmitted as the first user. If the quality of the downlink signal is continuously lower than a certain threshold, the physical layer of the terminal device will report a physical layer out-of-synchronization indication to the RRC layer. When the RRC layer continuously receives a certain number of physical layer out-of-synchronization indications, it will start a timer. If the physical layer detects that the quality of the downlink signal is greater than a certain threshold, the physical layer may report a physical layer synchronization indication to the RRC.
  • the terminal device will determine that the wireless link established as the first user has failed . In this case, the terminal device will re-establish the RRC connection as the first user. The re-establishment of the RRC connection may affect business communication and cause data interruption.
  • the terminal device when the terminal device uses the time allocation mode determined in the embodiment of this application to perform random access as the second user, during the transmission period of the first downlink information, the terminal device will not be able to listen to the first user. The quality of the downlink signal sent by the identity.
  • the RRC layer of the terminal device will start a timer. In the time period defined by the timer, since the terminal device is receiving the first downlink information as the second user, it is difficult to receive a certain number of consecutive physical layer synchronization instructions within the time period defined by the timer. . In this case, the terminal device will eventually determine that the wireless link established as the first user has failed.
  • the terminal device can suspend or stop the radio link monitoring performed as the first user in the first time period, where the first time period refers to the transmission period of the first downlink information.
  • the terminal device may suspend or stop monitoring the quality of the downlink signal as the first user during the transmission period of the first downlink information, or the terminal device may also suspend or stop the timer after the timer is started. Running.
  • the terminal device when the terminal device is in the RRC connected state as the first user, it also needs to maintain an uplink synchronization timer. If the uplink synchronization timer expires, it will cause the terminal device to lose synchronization as the first user. In this way, when the terminal device initiates uplink transmission as the first user subsequently, it needs to initiate the random access process again, which will affect The terminal device performs data communication as the first user.
  • the terminal device When the terminal device uses the time allocation mode determined in this embodiment of the application to perform random access as the second user, during the transmission period when the terminal device transmits information as the second user, it may cause the terminal device to act as the first user.
  • the upside is out of step. Based on this, in the embodiment of the present application, the terminal device can also suspend or stop running the above-mentioned uplink synchronization timer during the transmission period of information transmission as the second user.
  • the above-mentioned method of suspending radio link monitoring and uplink synchronization timing maintenance as the first user during the transmission period of the first downlink information for the terminal device can not only be used in the random access process, but also It can also be used in a scenario where subsequent terminal devices perform time division with the identity of the first user and the identity of the second user, that is, the above method does not depend on the random access method of this application.
  • the terminal device can also use the above method to suspend or stop the second user identity during the period of information transmission performed by the first user.
  • Wireless link monitoring and uplink synchronization timing maintenance by user identity During the period of information transmission performed as the second user, the radio link monitoring and the uplink synchronization timing maintenance performed as the first user are suspended or stopped.
  • the terminal device may send the first message to the first network device as the first user.
  • the first network device may return the transmission period indicating the first downlink information to the terminal device according to the transmission time information indicated by the first message.
  • the terminal device can determine the transmission period of the first downlink information according to the second message, and then receive the message sent by the second network device according to the transmission period of the first downlink information. Since the transmission period of the first downlink information is a period specially allocated for the first downlink information, the terminal device will not occupy the transceiver as the first user during random access as the second user. Therefore, it can be ensured that the terminal device receives the information of the second network device in time, thereby shortening the random access delay and improving the success rate of random access.
  • the terminal device may determine the time allocation mode according to the second message returned by the first network device, and then complete the random access process with the identity of the second user according to the time allocation mode.
  • the terminal device itself may also determine the time allocation mode according to the transmission time information.
  • FIG. 7 shows a flowchart of another random access method provided by an embodiment of the present application. The method can be applied to terminal equipment, and the method can include the following steps:
  • Step 701 Determine a time allocation pattern according to the transmission time information, where the time allocation pattern is used to indicate the transmission period of the first downlink information and/or the second downlink information.
  • the terminal device may determine the time allocation mode according to the transmission time information and at least one of the uplink time domain resources used by the terminal device as the first user and the downlink time domain resources used by the second user.
  • the terminal device may refer to step 602 in the foregoing embodiment to determine according to the transmission time information and at least one of the uplink time domain resources used as the first user and the downlink time domain resources used as the second user The transmission period of the first downlink information, or the transmission period of the second downlink information, or the transmission period of the first uplink information and the first downlink information, or the transmission period of the second uplink information and the second downlink information Transmission period.
  • the terminal device can refer to step 603 in the foregoing embodiment to determine the remaining undetermined time period according to the determined time period.
  • Step 702 Send the time allocation mode to the first network device.
  • the terminal device may send the transmission period of the second uplink information and the second downlink information to the first network device, or may send the transmission period of the first uplink information and the first downlink information to the first network device.
  • the network device alternatively, may send the transmission period of the first downlink information and/or the second downlink information to the first network device.
  • the first network device may perform uplink and downlink scheduling on the terminal device according to the received transmission period.
  • the first network device when the first network device is a base station with a separate CU and DU architecture, the first network device can receive the time allocation pattern sent by the terminal device through the CU-CP, and send the received information to the DU.
  • the DU performs uplink and downlink scheduling on the terminal equipment according to the time allocation mode.
  • the terminal device can set a timer, and start the timer from the moment when the time allocation pattern is sent. Within the time period defined by the device, the terminal device no longer sends the time allocation mode.
  • Step 703 Receive first downlink information according to the time allocation pattern.
  • the terminal device can receive the message fed back by the second network device in the random access process as the second user within the transmission period of the first downlink information indicated by the time allocation pattern.
  • the terminal device may send a message to the second network device as the second user during the transmission period of the first uplink information indicated by the time allocation pattern.
  • the terminal device when the terminal device interacts with the second network device as the second user during the transmission period of the first downlink information and the first uplink information, the terminal device will suspend or stop communicating with the first user as the first user. Interaction of network devices.
  • the terminal device may also send a notification to the first network device as the first user Message to notify the first network device that the terminal device has completed random access.
  • the first network device may adopt other strategies to re-allocate transmission periods for the first uplink information, the first downlink information, the second uplink information, and the second downlink information.
  • the terminal device may also suspend or stop the monitoring of the first radio link as the first user during the transmission period of the first downlink information, and the maintenance of the uplink synchronization timer .
  • the terminal device may also suspend or stop the monitoring of the first radio link as the first user during the transmission period of the first downlink information, and the maintenance of the uplink synchronization timer .
  • the terminal device may determine the time allocation mode according to the transmission time information, and in the first downlink transmission period indicated by the time allocation mode, as the second user, the terminal device can receive the second network device in the random access process. Messages in the feedback. Since the transmission period of the first downlink information is a period specially allocated for the first downlink information, the terminal device will not occupy the transceiver as the first user during random access as the second user. Therefore, it can be ensured that the terminal device receives the information of the second network device in time, thereby shortening the random access delay and improving the success rate of random access.
  • the terminal device directly determines the time allocation mode according to the transmission time information, and there is no need to send the transmission time information to the network device for allocation, which avoids the inaccuracy of network device allocation and reduces terminal device reporting The process of transmitting time information shortens the random access delay.
  • the terminal device when the terminal device interacts with the network device, because the amount of information data in the message to be sent is relatively large, the information is usually carried through the RRC message. However, the transmission of RRC messages in wireless transmission is usually slow, and therefore, this will cause a larger time delay.
  • the network equipment is a base station with a separate CU and DU architecture
  • the CU receives the RRC message sent by the terminal equipment, it also needs to send the RRC message to the DU, and the DU will perform the time allocation. . After that, the DU transmits the allocated time period to the CU, and the CU sends relevant information of these time periods to the terminal device, which will further increase the random access delay of the terminal device.
  • the embodiment of the present application also provides an information exchange method to shorten the time delay of the terminal device in the random access process.
  • Fig. 8 is a flowchart of an information exchange method provided by an embodiment of the present application. This method can be applied to a terminal device. See FIG. 8. The method includes the following steps:
  • Step 801 Send first information to the first network device as the first user, where the first information is used to instruct the terminal device to suspend or stop sending and receiving signals as the first user.
  • the first information is carried in a medium access control layer control element (MAC CE) or a PHY signal, or is included in a MAC CE or PHY signal.
  • MAC CE medium access control layer control element
  • the MAC layer is located between the Radio Link Control (RLC) layer and the PHY layer.
  • RLC Radio Link Control
  • PDU MAC protocol data unit
  • the MAC PDU may include four parts, one MAC header, zero or more MAC service data units (SDU), and zero or more MAC CE or padding signals.
  • the terminal device may define a MAC CE to indicate the meaning of the first information. That is, a specific MAC CE unit is used to instruct to suspend or stop signal transmission and reception as the first user.
  • the embodiment of the present application may also generate a simple indication information, and use the indication information as the information content carried by the MAC CE.
  • the first information is carried by a PHY signal, it may mean that a specific PHY signal is used to characterize the meaning of the first information. That is, a specific PHY signal is used to instruct to suspend or stop transmitting and receiving signals as the first user.
  • the first network device can learn that the terminal device will stop transmitting and receiving signals as the first user based on the first information. At this time, the first network device will also suspend or stop sending information to the terminal device.
  • Step 802 Pause or stop signal reception and/or transmission as the first user.
  • the terminal device may suspend or stop signal reception and/or transmission as the first user. That is, suspend or stop sending and receiving information as the first user, or suspend or stop receiving information as the first user, or suspend or stop sending and receiving information as the first user. Since the terminal device has already sent the first information to the first network device, that is, has notified the first network device that it will stop receiving and/or sending signals next, the first network device can then follow this information Dispatch terminal equipment.
  • Step 803 Interact with the second network device as the second user.
  • the terminal device After suspending or stopping signal reception and/or transmission with the identity of the first user, the terminal device can subsequently receive or transmit data packets with the second network device in the identity of the second user. Wherein, the terminal device can perform random access as the second user in the next time period. Since the terminal device has suspended or stopped receiving and/or transmitting signals as the first user in the next period of time, the terminal device will not be in the random access process as the second user. Occupy the receiver and/or transmitter as the first user, so that it can ensure that the terminal device can receive and/or send messages in time as the second user, shorten the random access delay, and improve the success rate of random access .
  • the MAC CE or PHY signal is used in the embodiment of the application to notify the first network device to suspend the interaction with the terminal device, so that the terminal device can perform random access as the second user in the next time period. Extension. Since the transmission speed of MAC CE and PHY signals is relatively fast, the delay of random access can be shortened.
  • the terminal device may also send the second information as the first user to the first network device, and the second information is used It notifies the first network device that the terminal device has started signal reception and/or transmission as the first user. That is, after the random access is completed, the terminal device can notify the first network device by sending the second information to the first network device, and then can interact with the terminal device.
  • the second information can also be carried in the MAC CE or PHY signal.
  • the first network device may also feed back a confirmation instruction to the terminal device to notify the terminal device that the second information has been received.
  • the confirmation indication can also be carried in the MAC CE or PHY signal.
  • the terminal device may also send to the second network device as the second user
  • the third information is used to instruct to suspend or stop signal receiving and/or sending as the second user; to suspend or stop signal receiving and/or sending as the second user, and start as the first user Signal reception and/or transmission in progress. That is, after the random access is completed, the terminal device may notify the second network device to suspend receiving and/or sending, and resume interaction with the first network device as the first user.
  • the third information can also be carried in the MAC CE or PHY signal.
  • the information interaction method provided above can be used not only in the random access process, but also in other scenarios where the first user identity and the second user identity need to be time-divided after random access.
  • the embodiment of the present application is only described by taking the random access process as an example, and does not constitute a limitation on the application scenario of the embodiment of the present application.
  • the information interaction method provided above can coexist with the method in which the network device uses other methods to allocate time period information to the first user identity and the second user identity.
  • the network device has allocated time period information for the first user identity and the second user identity.
  • the terminal device uses the method of this embodiment for time division allocation, it can suspend the use of the previously allocated time period information.
  • the first network device and the second network device can restore the information transmission mode of the time period information previously allocated by other means, that is, the first network device and the second network device are not needed.
  • the second network device and the terminal device again allocate the time period information through other methods.
  • the terminal device may send the first information to the first network device as the first user, so as to suspend or stop receiving and/or sending information with the first network device.
  • the terminal device can interact with the second network device as the second user.
  • the terminal device can perform random access as the second user in the next time period. Since the terminal device has suspended or stopped receiving and/or transmitting signals as the first user in the next period of time, the terminal device will not be in the random access process as the second user. Occupy the receiver or transmitter as the first user, so that it can ensure that the terminal device can receive or send messages in time as the second user, shorten the random access delay, and improve the success rate of random access.
  • a MAC CE or PHY signal is used to notify the first network device to suspend interaction with the terminal device, so that the terminal device can perform random access delay in the next time period as the second user. Since the transmission speed of MAC CE and PHY signals is relatively fast, the delay of random access can be shortened. It should also be noted that since the terminal device has notified the first network device that it will suspend or stop sending and receiving information as the first user, the first network device will no longer blindly perform resource scheduling for the terminal device. Avoid waste of resources.
  • FIG. 9 is a random access device 900 provided by an embodiment of the present application.
  • the device 900 includes:
  • the receiving module 901 is configured to receive a first message sent from the terminal device as the first user, the first message is used to indicate the transmission time information of the first downlink information, and the first downlink information is the terminal device as the second user. Information received during random access.
  • the sending module 902 is configured to execute step 602 in the foregoing embodiment.
  • the transmission time information includes one or more of random access response window information, contention resolution duration, non-contention access resource configuration information, radio resource control RRC response waiting duration, and beam recovery duration;
  • the random access response window refers to the time window during which the terminal device waits for the second network device to return a random access response message during the random access process, and the information of the random access response window is the size of the random access response window, or, The information of the random access response window includes the start point and the end point of the random access response window;
  • the contention resolution duration refers to the duration of the terminal device waiting for the second network device to return contention resolution information during the random access process
  • the non-competitive access resource configuration information includes random access time domain resources that are allowed to be used when the terminal device performs random access in a non-competitive random access manner as the second user;
  • the RRC response waiting time refers to the time the terminal device waits for the second network device to return an RRC response message
  • the beam recovery duration refers to the duration of random access when the terminal device performs beam recovery as the second user.
  • the sending module 902 is specifically configured to:
  • the second message is used to indicate the first transmission period and/or the second transmission period
  • the first transmission period is the transmission period of the first downlink information
  • the second transmission period is the transmission period of the second downlink information.
  • Downlink information refers to the information received by the terminal device as the first user.
  • the second message further includes the valid time period of the first transmission period.
  • the first network device may return to the terminal device the transmission period indicating the first downlink information according to the transmission time information indicated by the first message sent by the terminal device.
  • the terminal device can determine the transmission period of the first downlink information according to the second message, and then receive the message sent by the second network device according to the transmission period of the first downlink information. Since the transmission period of the first downlink information is a period specially allocated for the first downlink information, the terminal device will not occupy the transceiver as the first user during random access as the second user. Therefore, it can be ensured that the terminal device receives the information of the second network device in time, thereby shortening the random access delay and improving the success rate of random access.
  • FIG. 10 is another random access apparatus 1000 provided by an embodiment of the present application, which is applied to a terminal device.
  • the terminal device supports a first user identity and a second user identity.
  • the apparatus 1000 includes:
  • the processing module 1001 is configured to execute step 603 or step 701 in the foregoing embodiment
  • the receiving module 1002 is configured to execute step 604 or 702 in the foregoing embodiment.
  • processing module 1001 is specifically configured to:
  • the time allocation mode is determined according to a second message from the first network device.
  • the second message is used to indicate the first transmission period and/or the second transmission period.
  • the first transmission period is the transmission period of the first downlink information
  • the second transmission is the transmission time period of the second downlink information.
  • the device 1000 further includes:
  • the sending module is configured to send a first message to the first network device, where the first message is used to indicate transmission time information of the first downlink information.
  • the sending module is also used to:
  • the first message After sending the first message, after the first time interval has elapsed, the first message is sent to the first network device again.
  • the second message further includes the valid time period of the first transmission period.
  • processing module is specifically used for:
  • the transmission time information includes one or more of random access response window information, contention resolution duration, non-contention access resource configuration information, RRC response waiting duration, and beam recovery duration;
  • the random access response window refers to the time window during which the terminal device waits for the second network device to return a random access response message during the random access process, and the information of the random access response window is the size of the random access response window, or, The information of the random access response window includes the start point and the end point of the random access response window;
  • the contention resolution time refers to the allowable waiting time for the terminal device to wait for the second network device to return contention resolution information during the random access process
  • the non-competitive access resource configuration information includes random access time domain resources that are allowed to be used when the terminal device performs random access in a non-competitive random access manner as the second user;
  • the RRC response waiting time refers to the allowable waiting time for the terminal device to wait for the second network device to return an RRC response message
  • the beam recovery duration refers to the duration of random access allowed by the terminal device when performing beam recovery as the second user.
  • the device is also used for:
  • the first time period refers to the transmission period of the first downlink information indicated by the time allocation mode.
  • the first wireless link monitoring is performed by the terminal device with the first user Identity.
  • the terminal device can determine the time allocation mode, and within the first downlink transmission period indicated by the time allocation mode, as the second user, receive the message fed back by the second network device during the random access process . Since the transmission period of the first downlink information is a period specially allocated for the first downlink information, the terminal device will not occupy the transceiver as the first user during random access as the second user. Therefore, it can be ensured that the terminal device receives the information of the second network device in time, thereby shortening the random access delay and improving the success rate of random access.
  • the terminal device directly determines the time allocation mode according to the transmission time information, and there is no need to send the transmission time information to the network device for allocation, which avoids the inaccuracy of network device allocation and reduces terminal device reporting The process of transmitting time information shortens the random access delay.
  • the random access device provided in the above embodiment performs random access
  • only the division of the above functional modules is used as an example for illustration.
  • the above functions can be allocated to different functional modules according to needs.
  • Complete that is, divide the internal structure of the device into different functional modules to complete all or part of the functions described above.
  • the random access device provided in the foregoing embodiment belongs to the same concept as the random access method embodiment, and its specific implementation process is detailed in the method embodiment, and will not be repeated here.
  • FIG. 11 is an information interaction apparatus 1100 provided by an embodiment of the present application.
  • the apparatus can be applied to a terminal device.
  • the terminal device supports a first user identity and a second user identity.
  • the apparatus 1100 includes:
  • the transceiver module 1101 is configured to perform step 801 and step 803 in the foregoing embodiment
  • the processing module 1102 is configured to execute step 802 in the foregoing embodiment.
  • the transceiver module 1101 is further configured to: send second information to the first network device as the first user, and the second information is used to notify the first network device that signal reception and/or signal reception has been initiated as the first user. Or send.
  • the transceiver module 1101 is further configured to: send third information to the second network device as the second user, and the third information is used to instruct to suspend or stop signal reception and/or transmission as the second user; processing module 1102 is also used to suspend or stop signal reception and/or transmission in the identity of the second user, and start signal reception and/or transmission in the identity of the first user.
  • the terminal device may send the first information to the first network device as the first user, so as to suspend or stop receiving and/or sending of information with the first network device.
  • the terminal device can interact with the second network device as the second user.
  • the terminal device can perform random access as the second user in the next time period. Since the terminal device has suspended or stopped receiving and/or transmitting signals as the first user in the next period of time, the terminal device will not be in the random access process as the second user. Occupy the receiver or transmitter as the first user, so that it can ensure that the terminal device can receive or send messages in time as the second user, shorten the random access delay, and improve the success rate of random access.
  • a MAC CE or PHY signal is used to notify the first network device to suspend interaction with the terminal device, so that the terminal device can perform random access delay in the next time period as the second user. Since the transmission speed of MAC CE and PHY signals is relatively fast, the delay of random access can be shortened. It should also be noted that since the terminal device has notified the first network device that it will suspend or stop sending and receiving information as the first user, the first network device will no longer blindly perform resource scheduling for the terminal device. Avoid waste of resources.
  • the information interaction device provided in the foregoing embodiment performs information interaction
  • only the division of the foregoing functional modules is used as an example.
  • the foregoing functions can be allocated by different functional modules as required. That is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
  • the information interaction device provided in the foregoing embodiment and the information interaction method embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment, and will not be repeated here.
  • the methods introduced in the foregoing embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software When implemented by software, it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example: floppy disk, hard disk, tape), optical medium (for example: Digital Versatile Disc (DVD)), or semiconductor medium (for example: Solid State Disk (SSD) )Wait.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种随机接入方法、装置、设备及存储介质,属于通信技术领域。第一网络设备可以根据终端设备发送的第一消息所指示的传输时间信息,向终端设备返回指示第一下行信息的传输时段。这样,终端设备就可以根据该第二消息,确定出第一下行信息的传输时段,进而按照第一下行信息的传输时段来接收第二网络设备发送的消息。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。

Description

随机接入方法、装置、设备及存储介质 技术领域
本申请涉及通信技术领域,特别涉及一种随机接入方法、装置、设备及存储介质。
背景技术
目前,越来越多的终端设备支持安装双全球用户识别卡(universal subscriber identity module,USIM)。以终端设备支持两个SIM卡为例,有多种可能的实现方式,例如双卡单待(dual SIM single standby,DSSS)模式、双卡双待(dual SIM dual standby,DSDS)模式、或双卡双激活(dual SIM dual active,DSDA)模式。
其中,DSSS表示终端设备中虽然有两个SIM卡,但同一时间只能驻留在一个SIM卡所属的通信系统中,在不同时间可以通过用户选择驻留在不同SIM卡所属的通信系统中。DSDS表示终端设备可以同时驻留在两个SIM所属的通信系统中,但同时只能有一个SIM卡所属的通信系统处于通信状态,例如使用一个SIM卡上网时,不能使用另一个SIM接听电话。DSDA表示终端设备不仅可以同时驻留在多SIM卡所属的通信系统中,而且可以同时在多个SIM卡所属的通信系统中进行通信,例如使用一个SIM卡上网时,还可以使用另一个SIM卡接听电话。
在终端设备通过双SIM卡进行通信之前,该终端设备中的每个SIM卡首先需要先进行随机接入,以与相应USIM的注册网络的网络设备建立连接。其中,当一个SIM卡已完成随机接入,而另一个SIM卡还未进行随机接入时,已接入的SIM卡与其对应的注册网络的网络设备的交互将会影响另一个SIM卡的随机接入。
发明内容
本申请实施例提供了一种随机接入方法、装置、设备及存储介质,可以解决终端设备在支持两个用户身份的情况下,以其中一个用户身份进行随机接入时延较长且失败概率较高的问题,进而优化用户体验。
第一方面,提供了一种随机接入方法,应用于第一网络设备,所述方法包括:接收来自终端设备以第一用户身份发送的第一消息,所述第一消息用于指示第一下行信息的传输时间信息,所述第一下行信息为所述终端设备以第二用户身份在随机接入过程中接收的信息;根据所述第一消息,向所述终端设备发送第二消息,所述第二消息用于指示所述第一下行信息的传输时段。
在本申请实施例中,第一网络设备可以根据终端设备发送的第一消息所指示的传输时间信息,向终端设备返回指示第一下行信息的传输时段。这样,终端设备就可以根据该第二消息,确定出第一下行信息的传输时段,进而按照第一下行信息的传输时段来接收第二网络设备发送的消息。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机 接入的成功率。
可选地,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、无线资源控制RRC响应等待时长、波束恢复时长中的一项或多项;
其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的时长;
所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份通过非竞争随机接入的方式进行随机接入时允许使用的随机接入时域资源;
所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的时长;
所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时的随机接入的时长。
可选地,所述根据所述第一消息,向所述终端设备发送第二消息的实现过程可以为:确定所述终端设备以第一用户身份使用的上行时域资源和下行时域资源;根据所述传输时间信息以及所述上行时域资源和所述下行时域资源中的至少一个,向所述终端设备发送所述第二消息。
可选地,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段,所述第二下行信息是指所述终端设备以所述第一用户身份接收的信息。
可选地,所述第二消息还包括所述第一传输时段的有效时间段。
第二方面,提供一种随机接入方法,应用于终端设备,该终端设备支持第一用户身份和第二用户身份,所述方法包括:确定时间分配模式,所述时间分配模式用于指示第一下行信息和/或第二下行信息的传输时段,所述第一下行信息为终端设备以所述第二用户身份在随机接入过程中接收的信息,所述第二下行信息为所述终端设备以所述第一用户身份在随机接入过程中接收的信息;根据所述时间分配模式接收所述第一下行信息。
在本申请实施例中,终端设备可以确定时间分配模式,由于该时间分配模式用于指示第一下行信息的传输时段和/或第二下行信息的传输时段,因此,根据该时间分配模式,可以确定出终端设备以第二用户身份接收第二网络设备发送的第一下行信息的传输时段。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备按照该时间分配模式以第二用户身份进行随机接入,终端设备将不会以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。
可选地,所述确定时间分配模式的实现过程可以为:根据来自第一网络设备的第二消息确定所述时间分配模式,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段。
可选地,所述根据来自第一网络设备的第二消息确定所述时间分配模式之前,还可以向所述第一网络设备发送第一消息,所述第一消息用于指示所述第一下行信息的传输时间信息。
在本申请实施例中,终端设备可以以第一用户身份向第一网络设备发送第一消息。第一网络设备可以根据第一消息所指示的传输时间信息,向终端设备返回指示第一下行信息的传输时段。这样,终端设备就可以根据该第二消息,确定出第一下行信息的传输时段,进而按照第一下行信息的传输时段来接收第二网络设备发送的消息。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。
可选地,在发送所述第一消息后,经过第一时间间隔,向所述第一网络设备再次发送所述第一消息。
通过设置第一时间间隔,可以有效避免某些场景下,终端设备频繁向第一网络设备发送第一消息的情况发生。
可选地,所述第二消息还包括所述第一传输时段的有效时间段。
可选地,所述确定时间分配模式的实现过程可以为:根据传输时间信息确定所述时间分配模式。
也就是说,在本申请实施例中,可以由终端设备自身来分配第一下行信息的传输时段。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。另外,在本申请实施例中,由终端设备直接根据传输时间信息确定时间分配模式,无需将传输时间信息发送至网络设备进行分配,避免了网络设备分配的不准确,并且,减少了终端设备上报传输时间信息的过程,缩短了随机接入时延。
可选地,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、RRC响应等待时长、波束恢复时长中的一项或多项;
其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的允许等待时长;
所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份采用非竞争随机接入的方式进行随机接入时允许采用的随机接入时域资源;
所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的允许等待时长;
所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时允许的随机接入的时长。
可选地,所述方法还包括:暂停或停止在第一时段内的第一无线链路监测,所述第一时段是指由所述时间分配模式指示的所述第一下行信息的传输时段,所述第一无线链路监测是由所述终端设备以第一用户身份进行的。
在本申请实施例中,终端设备在第一下行信息的传输时段内暂停以第一用户身份进行的无线链路监测以及上行同步定时维护的方法,这样,可以避免终端设备误判从而导致重新以第一用户身份进行RRC重建,避免影响业务通信。
第三方面,提供了一种信息交互方法,应用于终端设备,所述终端设备支持第一用户身份和第二用户身份,所述方法包括:以所述第一用户身份向第一网络设备发送第一信息,所述第一信息用于指示所述终端设备暂停或停止以所述第一用户身份进行信号收和/或发,所述第一信息承载于介质访问控制层控制单元MAC CE或物理层PHY信号;暂停或停止以所述第一用户身份进行信号收和/或发;以所述第二用户身份与第二网络设备进行交互。
可选地,在以所述第二用户身份与第二网络设备进行交互之后,还可以以所述第一用户身份向所述第一网络设备发送第二信息,所述第二信息用于向所述第一网络设备通知所述已启动以第一用户身份进行的信号收和/或发。
可选地,在以所述第二用户身份与第二网络设备进行交互之后,还可以以所述第二用户身份向所述第二网络设备发送第三信息,所述第三信息用于指示暂停或停止以所述第二用户身份进行信号收和/或发;暂停或停止以所述第二用户身份进行的信号收和/或发,并启动以所述第一用户身份进行的信号收和/或发。
终端设备可以以第一用户身份向第一网络设备发送第一信息,以暂停或停止与第一网络设备之间的信息接收和/或发送。之后,终端设备即可以以第二用户身份与第二网络设备进行交互。其中,终端设备可以在接下来的时段内以第二用户身份进行随机接入。由于在接下来的时段内,终端设备已经暂停或停止了以第一用户身份进行的信号收和/或发,因此,在以第二用户身份进行的随机接入过程中,终端设备将不会以第一用户身份占用接收机或发射机,这样,可以保证终端设备能够以第二用户身份及时接收或发送消息,缩短了随机接入时延,提高了随机接入的成功率。另外,本申请实施例中采用MAC CE或PHY信号来通知第一网络设备暂停与终端设备的交互,从而使得终端设备可以以第二用户身份在接下来的时段内进行随机接入时延。由于MAC CE和PHY信号的传输速度较快,因此,可以缩短随机接入的时延。还需要说明的是,由于终端设备向第一网络设备通知了将暂停或停止以第一用户身份进行的信息收发,因此,第一网络设备就不会再盲目的针对该终端设备进行资源调度,避免了资源浪费。
第四方面,提供了一种通信装置,所述通信装置用于执行前述第一方面或第一方面的任一可能的实施方式中的方法,具体地,所述通信装置可以包括用于执行第一方面或第一方面的任一可能的实施方式中的方法的模块,例如包括接收模块和发送模块。示例性地,所述通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性地,所述通信设备为网络设备。下面以所述通信装置是网络设备为例。
接收模块,用于接收来自终端设备以第一用户身份发送的第一消息,所述第一消息用于指示第一下行信息的传输时间信息,所述第一下行信息为所述终端设备以第二用户身份在随机接入过程中接收的信息。
发送模块,用于根据所述第一消息,向所述终端设备发送第二消息,所述第二消息用于指示所述第一下行信息的传输时段。
可选地,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、无线资源控制RRC响应等待时长、波束恢复时长中的一项或多项;
其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的时长;
所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份通过非竞争随机接入的方式进行随机接入时允许使用的随机接入时域资源;
所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的时长;
所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时的随机接入的时长。
可选地,所述发送模块具体用于:
确定所述终端设备以第一用户身份使用的上行时域资源和下行时域资源;
根据所述传输时间信息以及所述上行时域资源和所述下行时域资源中的至少一个,向所述终端设备发送所述第二消息。
可选地,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段,所述第二下行信息是指所述终端设备以所述第一用户身份接收的信息。
可选地,所述第二消息还包括所述第一传输时段的有效时间段。
关于第四方面或第四方面的各种可能的实施方式的技术效果,可以参考对于第一方面或第一方面的相应的实施方式的技术效果的介绍。
第五方面,提供了一种通信装置,所述通信装置用于执行前述第二方面或第二方面的任一可能的实施方式中的方法,具体地,所述通信装置可以包括用于执行第二方面或第二方面的任一可能的实施方式中的方法的模块,例如包括接收模块、发送模块和处理模块。示例性地,所述通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性地,所述通信设备为终端设备。下面以所述通信装置是终端设备为例。其中,所述终端设备支持第一用户身份和第二用户身份;
所述处理模块,用于确定时间分配模式,所述时间分配模式用于指示第一下行信息和/或第二下行信息的传输时段,所述第一下行信息为终端设备以所述第二用户身份在随机接入过程中接收的信息,所述第二下行信息为所述终端设备以所述第一用户身份在随机接入过程中接收的信息;
所述接收模块,用于根据所述时间分配模式接收所述第一下行信息。
可选地,所述处理模块具体用于:根据来自第一网络设备的第二消息确定所述时间分配模式,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段。
可选地,所述发送模块,用于向所述第一网络设备发送第一消息,所述第一消息用于指 示所述第一下行信息的传输时间信息。
可选地,所述发送模块还用于:
在发送所述第一消息后,经过第一时间间隔,向所述第一网络设备再次发送所述第一消息。
可选地,所述第二消息还包括所述第一传输时段的有效时间段。
可选地,所述处理模块具体用于:根据传输时间信息确定所述时间分配模式。
可选地,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、RRC响应等待时长、波束恢复时长中的一项或多项;
其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的允许等待时长;
所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份采用非竞争随机接入的方式进行随机接入时允许采用的随机接入时域资源;
所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的允许等待时长;
所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时允许的随机接入的时长。
可选地,所述处理模块还用于:暂停或停止在第一时段内的第一无线链路监测,所述第一时段是指由所述时间分配模式指示的所述第一下行信息的传输时段,所述第一无线链路监测是由所述终端设备以第一用户身份进行的。
关于第五方面或第五方面的各种可能的实施方式的技术效果,可以参考对于第二方面或第二方面的相应的实施方式的技术效果的介绍。
第六方面,提供了一种通信装置,所述通信装置用于执行前述第三方面或第三方面的任一可能的实施方式中的方法,具体地,所述通信装置可以包括用于执行第三方面或第三方面的任一可能的实施方式中的方法的模块,例如包括收发模块和处理模块。示例性地,所述通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性地,所述通信设备为终端设备。下面以所述通信装置是终端设备为例。其中,所述终端设备支持第一用户身份和第二用户身份;
收发模块,用于以第一用户身份向第一网络设备发送第一信息,第一信息用于指示终端设备暂停或停止以第一用户身份进行信号收发;
处理模块,用于暂停或停止以第一用户身份进行信号收和/或发;
所述收发模块,还用于以第二用户身份与第二网络设备进行交互。
可选地,收发模块还用于:以第一用户身份向第一网络设备发送第二信息,第二信息用于向第一网络设备通知已启动以第一用户身份进行的信号收和/或发。
可选地,收发模块还用于:以第二用户身份向第二网络设备发送第三信息,第三信息用于指示暂停或停止以第二用户身份进行信号收和/或发;所述处理模块还用于暂停或停止以第 二用户身份进行的信号收和/或发,并启动以第一用户身份进行的信号收和/或发。
关于第六方面或第六方面的各种可能的实施方式的技术效果,可以参考对于第三方面或第三方面的相应的实施方式的技术效果的介绍。
第七方面,提供一种通信装置。该通信装置包括处理器。可选的,还可以包括收发器。处理器和收发器相互耦合,用于实现上述第一方面或第一方面的各种可能的实施方式所描述的方法。可选的,该通信装置还可以包括存储器。处理器、存储器和收发器相互耦合,用于实现上述第一方面或第一方面的各种可能的实施方式所描述的方法。示例性地,该通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性的,所述通信设备为网络设备。下面以通信装置是网络设备为例。其中,如果通信装置为通信设备,收发器例如通过通信设备中的天线、馈线和编解码器等实现。或者,如果通信装置为设置在通信设备中的芯片,那么收发器例如为芯片中的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。其中,
所述收发器用于接收来自终端设备以第一用户身份发送的第一消息,所述第一消息用于指示第一下行信息的传输时间信息,所述第一下行信息为所述终端设备以第二用户身份在随机接入过程中接收的信息;根据所述第一消息,向所述终端设备发送第二消息,所述第二消息用于指示所述第一下行信息的传输时段。
可选地,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、无线资源控制RRC响应等待时长、波束恢复时长中的一项或多项;
其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的时长;
所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份通过非竞争随机接入的方式进行随机接入时允许使用的随机接入时域资源;
所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的时长;
所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时的随机接入的时长。
可选地,所述处理器用于确定所述终端设备以第一用户身份使用的上行时域资源和下行时域资源;所述收发器用于根据所述传输时间信息以及所述上行时域资源和所述下行时域资源中的至少一个,向所述终端设备发送所述第二消息。
可选地,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段,所述第二下行信息是指所述终端设备以所述第一用户身份接收的信息。
可选地,所述第二消息还包括所述第一传输时段的有效时间段。
关于第七方面或第七方面的各种可能的实施方式的技术效果,可以参考对于第一方面或第一方面的相应的实施方式的技术效果的介绍。
第八方面,提供一种通信装置。该通信装置包括处理器。可选的,还可以包括收发器。处理器和收发器相互耦合,用于实现上述第二方面或第二方面的各种可能的实施方式所描述的方法。可选的,该通信装置还可以包括存储器。处理器、存储器和收发器相互耦合,用于实现上述第二方面或第二方面的各种可能的实施方式所描述的方法。示例性地,该通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性的,所述通信设备为终端设备。下面以通信装置是终端设备为例。其中,如果通信装置为终端设备,收发器例如通过通信设备中的天线、馈线和编解码器等实现。或者,如果通信装置为设置在通信设备中的芯片,那么收发器例如为芯片中的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。其中,
所述处理器,用于确定时间分配模式,所述时间分配模式用于指示第一下行信息和/或第二下行信息的传输时段,所述第一下行信息为终端设备以所述第二用户身份在随机接入过程中接收的信息,所述第二下行信息为所述终端设备以所述第一用户身份在随机接入过程中接收的信息;
所述收发器,用于根据所述时间分配模式接收所述第一下行信息。
可选地,所述处理器具体用于:
根据来自第一网络设备的第二消息确定所述时间分配模式,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段。
可选地,所述收发器,用于向所述第一网络设备发送第一消息,所述第一消息用于指示所述第一下行信息的传输时间信息。
可选地,所述收发器还用于:在发送所述第一消息后,经过第一时间间隔,向所述第一网络设备再次发送所述第一消息。
可选地,所述第二消息还包括所述第一传输时段的有效时间段。
可选地,所述处理器具体用于:根据传输时间信息确定所述时间分配模式。
可选地,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、RRC响应等待时长、波束恢复时长中的一项或多项;
其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的允许等待时长;
所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份采用非竞争随机接入的方式进行随机接入时允许采用的随机接入时域资源;
所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的允许等待时长;
所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时允许的随机接入的时长。
可选地,所述处理器还用于:暂停或停止在第一时段内的第一无线链路监测,所述第一 时段是指由所述时间分配模式指示的所述第一下行信息的传输时段,所述第一无线链路监测是由所述终端设备以第一用户身份进行的。
关于第八方面或第八方面的各种可能的实施方式的技术效果,可以参考对于第二方面或第二方面的相应的实施方式的技术效果的介绍。
第九方面,提供一种通信装置。该通信装置包括处理器。可选的,还可以包括收发器。处理器和收发器相互耦合,用于实现上述第三方面或第三方面的各种可能的实施方式所描述的方法。可选的,该通信装置还可以包括存储器。处理器、存储器和收发器相互耦合,用于实现上述第三方面或第三方面的各种可能的实施方式所描述的方法。示例性地,该通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性的,所述通信设备为终端设备。下面以通信装置是终端设备为例。其中,如果通信装置为终端设备,收发器例如通过通信设备中的天线、馈线和编解码器等实现。或者,如果通信装置为设置在通信设备中的芯片,那么收发器例如为芯片中的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。其中,
收发器,用于以第一用户身份向第一网络设备发送第一信息,第一信息用于指示终端设备暂停或停止以第一用户身份进行信号收发;
处理器,用于暂停或停止以第一用户身份进行信号收和/或发;
所述收发器,还用于以第二用户身份与第二网络设备进行交互。
可选地,收发器还用于:以第一用户身份向第一网络设备发送第二信息,第二信息用于向第一网络设备通知已启动以第一用户身份进行的信号收和/或发。
可选地,收发器还用于:以第二用户身份向第二网络设备发送第三信息,第三信息用于指示暂停或停止以第二用户身份进行信号收和/或发;所述处理模块还用于暂停或停止以第二用户身份进行的信号收和/或发,并启动以第一用户身份进行的信号收和/或发。
关于第九方面或第九方面的各种可能的实施方式的技术效果,可以参考对于第三方面或第三方面的相应的实施方式的技术效果的介绍。
第十方面,提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述第一方面或第二方面所述的随机接入方法,或者,使得计算机执行上述第三方面所述的信息交互方法。
第十一方面,提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面或第二方面所述的随机接入方法,或者,使得计算机执行上述第三方面所述的信息交互方法。
上述第十方面和第十一方面所获得的技术效果与第一方面、第二方面和第三方面中对应的技术手段获得的技术效果近似。在这里不再赘述。
本申请提供的技术方案带来的有益效果至少包括:
在本申请实施例中,终端设备可以以第一用户身份向第一网络设备发送第一消息。第一网络设备可以根据第一消息所指示的传输时间信息,向终端设备返回指示第一下行信息的传输时段。这样,终端设备就可以根据该第二消息,确定出第一下行信息的传输时段,进而按 照第一下行信息的传输时段来接收第二网络设备发送的消息。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。
附图说明
图1是本申请实施例提供的终端设备的结构示意图;
图2是本申请实施例提供的网络设备的结构示意图;
图3是本申请实施例提供的随机接入方法所涉及的系统架构图;
图4是本申请实施例提供的一种网络设备的架构图;
图5是相关技术中提供的一种随机接入方法的流程图;
图6是本申请实施例提供的一种随机接入方法的流程图;
图7是本申请实施例提供的另一种随机接入方法的流程图;
图8是本申请实施例提供的一种信息交互方法的流程图;
图9是本申请实施例提供的一种随机接入装置的结构示意图;
图10是本申请实施例提供的另一种随机接入装置的结构示意图;
图11是本申请实施例提供的一种信息交互装置的结构示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
以下,对本申请实施例中的部分用语进行解释说明,以便于本领域技术人员理解。
1)终端设备,包括向用户提供语音和/或数据连通性的设备,具体的,包括向用户提供语音的设备,或包括向用户提供数据连通性的设备,或包括向用户提供语音和数据连通性的设备。例如可以包括具有无线连接功能的手持式设备、或连接到无线调制解调器的处理设备。该终端设备可以经无线接入网(radio access network,RAN)与核心网进行通信,与RAN交换语音或数据,或与RAN交互语音和数据。该终端设备可以包括用户设备(user equipment,UE)、无线终端设备、移动终端设备、设备到设备通信(device-to-device,D2D)终端设备、车到一切(vehicle to everything,V2X)终端设备、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)终端设备、物联网(internet of things,IoT)终端设备、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、远程站(remote station)、接入点(access point,AP)、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)、或用户装备(user device)等。例如,可以包括移动电话(或称为“蜂窝”电话),具有移动终端设备的计算机,便携式、袖珍式、手持式、计算机内置的移动装置等。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiation protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、等设备。还包括受限设备,例如功耗较低的设备,或存储能力有限的设备,或计算能力有限的设备等。例如包括条码、射频识别(radio frequency identification,RFID)、传感器、全球 定位系统(global positioning system,GPS)、激光扫描器等信息传感设备。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备或智能穿戴式设备等,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能头盔、智能首饰等。
而如上介绍的各种终端设备,如果位于车辆上(例如放置在车辆内或安装在车辆内),都可以认为是车载终端设备,车载终端设备例如也称为车载单元(on-board unit,OBU)。
本申请实施例中,终端设备还可以包括中继(relay)。或者理解为,能够与基站进行数据通信的都可以看作终端设备。
本申请实施例中,用于实现终端设备的功能的装置可以是终端设备,也可以是能够支持终端设备实现该功能的装置,例如芯片系统,该装置可以被安装在终端设备中。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。本申请实施例提供的技术方案中,以用于实现终端的功能的装置是终端设备为例,描述本申请实施例提供的技术方案。
图1是本申请实施例提供的一种终端设备的结构示意图。参见图1,该终端设备可以包括处理器、通信接口、一个或多个连接电路模块和存储器。需要说明的是,图1示出的设备结构并不构成对终端设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,本申请实施例对此不进行限定。下面结合图1对终端设备的各个构成部件进行具体的介绍:
处理器可以包括用于终端设备的音频/视频和逻辑功能的电路。例如,处理器可以包括数字信号处理器设备、微处理器设备、模数转换器、数模转换器等等。可以根据这些设备各自的能力而在这些设备之间分配移动设备的控制和信号处理功能。处理器还可以包括内部语音编码器VC、内部数据调制解调器DM等等。此外,处理器可以包括操作一个或多个软件程序的功能,所述软件程序可以存储在存储器中。通常,处理器和所存储的软件指令可以被配置为使终端设备执行动作。例如,处理器和所存储的软件指令可以被配置为执行图6-8所示的实施例中终端设备所执行的动作。
终端设备还可以包括用户接口,其例如可以包括耳机或扬声器、麦克风、输出装置(例如显示器)、输入装置等等,其可操作地耦合到处理器。在这一点上,处理器可以包括用户接口电路,其被配置为至少控制所述用户接口的一个或多个元件(诸如扬声器、麦克风、显示器等等)的一些功能。处理器和/或包括处理器的用户接口电路可以被配置为通过存储在处理器可访问的存储器中的计算机程序指令(例如软件和/或固件)来控制用户接口的一个或多个元件的一个或多个功能。尽管并未示出,但是终端设备可以包括用于向与移动设备相关的各种电路供电的电池,所述电路例如为提供机械振动来作为可检测输出的电路。输入装置可以包括允许所述装置接收数据的设备,诸如小键盘、触摸显示器、游戏杆和/或至少一个其他输入设备等。
终端设备还可以包括用于共享和/或获得数据的一个或多个连接电路模块。例如,所述终端设备可以包括短距射频RF收发机和/或检测器,从而可以根据RF技术与电子设备共享和/或从电子设备获得数据。所述终端设备可以包括其他短距收发机,诸如例如红外IR收发机、使用收发机、无线通用串行总线USB收发机等等。蓝牙收发机能够根据低功耗或超低功耗蓝牙技术操作。在这一点上,终端设备并且更具体地是短距收发机能够向和/或从在所述装置附近(诸如在10米内)的电子设备发送和/或接收数据。尽管并未示出,所述终端设备能够根据各种无线联网技术来向和/或从电子设备发送和/或接收数据,这些技术包括:Wi-Fi、Wi-Fi低功耗、WLAN技术,诸如IEEE 802.11技术、IEEE 802.15技术、IEEE 802.16技术等等。
终端设备可以包括可存储与移动用户相关的信息元素的存储器,诸如用户身份模块SIM。除了SIM,所述装置还可以包括其他可移除和/或固定存储器。终端设备可以包括易失性存储器和/或非易失性存储器。例如,易失性存储器可以包括随机存取存储器RAM,其包括动态RAM和/或静态RAM、芯片上和/或芯片外高速缓冲存储器等等。非易失性存储器可以是嵌入式的和/或可移除的,其可以包括例如只读存储器、闪存存储器、磁性存储设备,例如硬盘、软盘驱动器、磁带等等、光盘驱动器和/或介质、非易失性随机存取存储器NVRAM等等。类似于易失性存储器,非易失性存储器可以包括用于数据的暂时存储的高速缓冲区域。易失性和/或非易失性存储器的至少一部分可以嵌入到处理器中。存储器可以存储一个或多个软件程序、指令、信息块、数据等等,其可以由所述终端设备用来执行移动终端的功能。例如,图6-8所示的实施例中终端设备的动作即可以通过处理器调用存储器内的软件程序、指令、信息块、数据等来执行。具体的,例如,存储器可以包括能够唯一标识终端设备的标识符,诸如国际移动设备标志IMEI码,还可以存储有国际移动用户标识码IMSI等。
2)网络设备,例如包括接入网(access network,AN)设备,例如基站(例如,接入点),可以是指接入网中在空口通过一个或多个小区与无线终端设备通信的设备,或者例如,一种车到一切(vehicle-to-everything,V2X)技术中的网络设备为路侧单元(road side unit,RSU)。基站可用于将收到的空中帧与IP分组进行相互转换,作为终端设备与接入网的其余部分之间的路由器,其中接入网的其余部分可包括IP网络。RSU可以是支持V2X应用的固定基础设施实体,可以与支持V2X应用的其他实体交换消息。网络设备还可协调对空口的属性管理。例如,网络设备可以包括长期演进(long term evolution,LTE)系统或高级长期演进(long term evolution-advanced,LTE-A)中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),或者也可以包括第五代移动通信技术(the 5th generation,5G)新空口(new radio,NR)系统(也简称为NR系统)中的下一代节点B(next generation node B,gNB)或者也可以包括云接入网(cloud radio access network,Cloud RAN)系统中的集中式单元(centralized unit,CU)和分布式单元(distributed unit,DU),本申请实施例并不限定。
网络设备还可以包括核心网设备,核心网设备例如包括访问和移动管理功能(access and mobility management function,AMF)等。
本申请实施例中,用于实现网络设备的功能的装置可以是网络设备,也可以是能够支持网络设备实现该功能的装置,例如芯片系统,该装置可以被安装在网络设备中。在本申请实施例提供的技术方案中,以用于实现网络设备的功能的装置是网络设备为例,描述本申请实施例提供的技术方案。
图2是本申请实施例提供的一种网络设备的结构示意图。如图2所示,该网络设备可以 包括至少一个处理器201,通信总线202,存储器203以及至少一个通信接口204。需要说明的是,图2示出的设备结构并不构成对网络功能节点的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,本申请实施例对此不进行限定。下面结合图2对网络设备的各个构成部件进行具体的介绍:
处理器201是该网络设备的控制中心,可以是一个处理器,也可以是多个处理元件的统称。例如,处理器201可以是一个通用中央处理器(Central Processing Unit,CPU),或特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路,例如:一个或多个微处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA)。其中,处理器201可以通过运行或执行存储在存储器203内的软件程序,以及调用存储在存储器203内的数据,执行网络功能节点的各种功能。例如,图6-8所示的实施例中第一网络设备或第二网络设备的动作即可以通过相应网络设备的处理器调用存储器内的数据来执行。
在具体实现中,作为一种实施例,处理器201可以包括一个或多个CPU,例如图2中所示的CPU0和CPU1。
在具体实现中,作为一种实施例,网络功能节点可以包括多个处理器,例如图2中所示的处理器201和处理器205。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
通信总线202可包括一通路,在上述组件之间传送信息。该通信总线202可以是工业标准体系结构(industry standard architecture,ISA)总线、外部设备互连(peripheral component,PCI)总线或扩展工业标准体系结构(extended industry standard architecture,EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。为便于表示,图2中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
存储器203可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其它类型的静态存储设备,随机存取存储器(random access memory,RAM))或者可存储信息和指令的其它类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其它光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其它磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其它介质,但不限于此。存储器203可以是独立存在,通过通信总线202与处理器201相连接。存储器203也可以和处理器201集成在一起。其中,所述存储器203用于存储执行本申请实施例提供的方案的软件程序,并由处理器201来控制执行。
通信接口204,用于与其他设备或通信网络通信,如以太网,RAN,无线局域网(wireless local area networks,WLAN)等。通信接口33可以包括接收单元实现接收功能,以及发送单元实现发送功能。
在具体实现中,作为一种实施例,网络设备还可以包括输出设备206和输入设备207。输出设备206和处理器201通信,可以以多种方式来显示信息。例如,输出设备206可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设 备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备207和处理器201通信,可以以多种方式接收用户的输入。例如,输入设备207可以是鼠标、键盘、触摸屏设备或传感设备等。
上述的网络功能节点可以是一个通用网络设备或者是一个专用网络设备。在具体实现中,可以是台式机、便携式电脑、网络服务器等。
3)本申请实施例中,“用户身份”(例如第一用户身份或第二用户身份等)为逻辑概念。例如,“用户身份”可以对应SIM卡或签约用户信息或虚拟SIM卡或用户标识(如国际移动用户标识(international mobile subscriber identity,IMSI)或临时移动用户标识(temporary mobile subscriber identity,TMSI)等)。从网络侧的角度来看,不同的“用户身份”在逻辑上对应网络侧服务的不同通信实体,比如4G和5G系统中的UE,例如一个支持两个用户身份的终端设备,对于网络侧来说,可以看做两个通信实体。再例如,“用户身份”对应SIM卡或签约用户信息时,网络侧会将支持不同SIM卡或不同签约用户信息的两个终端设备识别为两个不同的通信实体,也会将支持多个不同SIM卡或多个签约用户信息的同一终端设备识别为多个不同的通信实体,即使在实际上,支持多个不同SIM卡或多个签约用户信息的终端设备只是一个物理实体。本申请实施例中将主要以“用户身份”对应SIM卡为例进行说明。
示例性地,SIM卡可以理解为终端设备接入移动网络的钥匙,为了便于描述,本申请实施例中将SIM卡以及其演进都统称为SIM卡。例如SIM卡可以是全球移动通信系统(global system for mobile communications,GSM)数字移动电话用户的身份识别卡,用于存储用户的身份识别码和密钥,并支持GSM系统对用户的鉴权;又例如,SIM卡也可以是全球用户识别卡(universal subscriber identity module,USIM),也可以称为升级SIM卡。
在下文中,将终端设备安装一个SIM卡,认为是终端设备支持一个用户身份,例如,安装两个SIM卡的终端设备,就可以支持两个用户身份,可以理解为,SIM卡和用户身份是一一对应的关系。本文主要是以终端设备支持两个用户身份为例,这两个用户身份分别称为第一用户身份和第二用户身份。其中,第一用户身份可以理解为,是终端设备安装了SIM卡1后具有的用户身份,第二用户身份可以理解为,是终端设备安装了SIM卡2后具有的用户身份。而在其它可能的实施例中,如果终端设备安装两个以上的SIM卡,则终端设备也就支持两个以上的用户身份,例如终端设备支持三个用户身份、四个用户身份或更多的用户身份,并可以注册在两个以上的网络中,其中每个用户身份可以注册在一个网络中。本申请实施例将主要基于终端设备支持两个用户身份进行描述,当终端设备支持两个以上的用户身份时,其具体实现可以参照终端设备支持两个用户身份的相关描述,可能需要做一些简单的适配,但是也在本申请实施例的保护范围内。
其中,当终端设备的用户身份为第一用户身份时,从网络设备的角度来看,终端设备可以理解为一个用户(从协议的角度来看,就是一个终端设备,例如,称为第一用户);当终端设备的用户身份为第二用户身份时,从网络设备的角度来看,终端设备可以理解为又一个用户(例如,称为第二用户)。终端设备可以以第一用户身份注册在第一网络,以及以第二用户身份注册在第二网络。本申请实施例中,终端设备支持一个用户身份,也可以描述为,终端设备具有一个用户身份。同理,终端设备支持两个用户身份,也可以描述为,终端设备具有两个用户身份。
4)无线资源控制(radio resource control,RRC)状态,终端设备有3种RRC状态:RRC 连接态(connected态)、RRC空闲态(idle态)和非激活态(inactive态)。
RRC连接态(或,也可以简称为连接态。在本文中,“连接态”和“RRC连接态”,是同一概念,两种称呼可以互换):终端设备与网络建立了RRC连接,可以进行数据传输。
RRC空闲态(或,也可以简称为空闲态。在本文中,“空闲态”和“RRC空闲态”,是同一概念,两种称呼可以互换):终端设备没有与网络建立RRC连接,基站没有存储该终端设备的上下文。如果终端设备需要从RRC空闲态进入RRC连接态,则需要发起RRC连接建立过程。
RRC非激活态(或,也可以简称为非激活态。在本文中,“去活动态”、“去激活态”、“非激活态”、“RRC非激活态”和“RRC去激活态”,是同一概念,这几种称呼可以互换):终端设备之前进入了RRC连接态,然后基站释放了RRC连接,但是基站保存了该终端设备的上下文。如果该终端设备需要从RRC非激活态再次进入RRC连接态,则需要发起RRC连接恢复过程(或者称为RRC连接重建立过程)。RRC恢复过程相对于RRC建立过程来说,时延更短,信令开销更小。但是基站需要保存终端设备的上下文,会占用基站的存储开销。
在对本申请实施例进行详细的说明之前,先对本申请实施例涉及的应用场景予以介绍。
当前,很多终端设备支持两个用户身份。其中,当终端设备中包括有一个收发机时,终端设备可以以两个用户身份共享这个收发机来进行信息的收发。其中,当终端设备以一个用户身份占用收发机进行信息收发时,将无法再以另一个用户身份进行信息收发。也即,通过一个收发机,终端设备每个时刻只能以一个用户身份进行信息的收发。在这种情况下,如果当前终端设备已经以第一用户身份接入网络设备,但是还未以第二用户身份接入网络设备,则在以第二用户身份接入网络设备时,在接入过程中以第二用户身份进行的信息收发将会受到以第一用户身份进行的信息收发的影响,从而有可能导致接入时延较长或者是接入失败。基于此,本申请实施例提供了一种随机接入方法,可以为第一用户身份和第二用户身份分配对应的时段,终端设备可以在对应的时段内,以相应地用户身份进行信息的收发,以此来减少以第二用户身份进行信息收发时的时延,提高终端设备以第二用户身份接入网络设备的成功率。
上述是本申请实施例提供的一种可能的应用场景。可选地,在有些情况下,终端设备中可能包括两个独立的收发机,终端设备可以采用每个用户身份对应的收发机来以每个用户身份进行信息收发。在这种情况下,由于终端设备以两个用户身份分别通过两个收发机同时进行信息收发时,可能会存在信号干扰,因此,也可以通过本申请实施例提供的方法来为各个用户身份分配对应的时段。这样,终端设备可以在各个用户身份对应的时段内,以相应用户身份进行信息收发,从而避免干扰。
图3是本申请实施例提供的一种随机接入方法所涉及的系统架构图。如图3所示,该系统包括终端设备301、第一网络设备302和第二网络设备303。其中,终端设备301可以与第一网络设备302、第二网络设备303进行通信。可选地,在一些可能的情况中,第一网络设备302和第二网络设备303之间也可以进行通信。
在本申请实施例中,终端设备301可以为前述图1介绍的支持两个用户身份的终端设备。在后续实施例中,为了方便描述,将终端设备301支持的两个用户身份分别称为第一用户身 份和第二用户身份。另外,在本申请实施例中,终端设备301可以通过后续实施例中介绍的方法来与第一网络设备301和第二网络设备302进行交互,从而确定出以每个用户身份传输上下行信息的传输时段。
第一网络设备302可以是指终端设备301中第一用户身份所对应的网络设备。其中,该第一网络设备可以为服务该第一用户身份对应的通信实体的基站。终端设备301可以以第一用户身份与第一网络设备302进行信息交互。第一网设备302可以通过与终端设备301的信息交互来实现对终端设备301的调度。其中,该第一网络设备302可以通过图2所示的网络设备来实现。
第二网络设备303可以是指终端设备301中第二用户身份所对应的网络设备。其中,该第二网络设备可以为服务该第二用户身份对应的通信实体的基站。终端设备301可以以第二用户身份与第二网络设备303进行信息交互。第二网络设备303可以以此来实现与终端设备301的调度。其中,该第一网络设备302可以通过图2所示的网络设备来实现。
需要说明的是,第一网络设备302和第二网络设备303可以是同一网络内的两个网络设备,也可以是不同网络内的两个网络设备。或者,第一网络设备302和第二网络设备303也可以是同一个网络设备。本申请实施例对此不作限定。
另外,在本申请实施例中,第一网络设备302和第二网络设备303可以是4G或5G基站。并且,第一网络设备302和第二网络设备可以是集中单元(CU)和分布单元(DU)分离架构的基站。图4示出了一种CU和DU分离架构的基站的结构示意图。如图4所示,该基站中包括CU401和DU402。
其中,CU401包括集中单元的控制面(central unit-control plane,CU-CP)4011和集中单元的用户面(central unit-user planeCU-UP)4012。CU-CP4011和CU-UP4012通过E1接口进行通信。其中,CU-CP4011用于实现RRC、控制面的包数据汇聚协议(packet data convergence protocol-control,PDCP-C)功能。CU-UP4012用于实现服务数据适应协议(service data adaptation protocol,SDAP)功能以及用户面的包数据汇聚协议(packet data convergence protocol-user,PDCP-U)功能。
DU402可以通过F1-C接口与CU-CP4011进行通信,通过F1-U接口与CU-UP4012进行通信。DU402用于实现无线链路控制(radio link control,RLC)、介质访问控制(medium access control,MAC)以及物理层(physical,PHY)功能。
以下对终端设备进行随机接入的过程进行介绍。
终端设备在与网络设备建立无线连接之前,需要先进行随机接入过程,其中,随机接入过程如下:
步骤1:终端设备向网络设备发送随机接入前导。
终端设备可以从网络设备的广播消息中获取可用的随机接入资源,该随机接入资源包括发送随机接入的时域或频域资源以及对应的随机接入前导。在进行随机接入时,终端设备可以从上述随机接入资源中获取一个随机接入前导,并向网络设备发送该随机接入前导。
当终端设备发送随机接入前导之后,可以在一个时间窗口内接收网络设备发送的随机接入响应。
步骤2:网络设备向终端设备发送随机接入响应。
网络设备在接收到终端设备的随机接入前导之后,可以获悉该终端设备当前想要接入。 在这种情况下,该网络设备可以估计与该终端设备之间的传输时延,以进行上行定时校准,并将包括有校准信息的随机接入响应发送至终端设备。其中,上行定时的目的是为了使各个终端设备的上行信息能够尽量同时到达网络设备,从而避免各个终端设备之间的干扰。终端设备可以根据该校准信息和网络设备保持上行同步。除此之外,该随机接入响应还可以包括该终端设备后续用于发送上行信息的上行资源。
终端设备在发送随机接入前导之后,可以在一个时间窗口内接收网络设备发送的随机接入响应。如果终端设备在该时间窗口内接收到随机接入响应,则可以继续通过后续步骤进行随机接入。如果在该时间窗口内未接收到随机接入响应,则终端设备可以进一步的判断发送随机接入前导的次数是否超过了最大阈值,如果没有超过,则终端设备可以重新选择一个随机接入前导,执行步骤1。如果发送随机接入前导的次数超过了最大阈值,则确定本次随机接入过程失败。
步骤3:终端设备发送随机接入消息。
如果终端设备在上述的时间窗口内接收到了随机接入响应,则该终端设备可以根据随机接入响应中包括的上行资源,发送随机接入消息。该随机接入消息可以为RRC连接请求(RRC connection request),该随机接入消息中可以包括终端设备的身份标识,该身份标识可以是来自核心网的用于唯一标识该终端设备的标志。或者,该随机接入消息中可以包括一个随机数作为该终端设备的身份标识。
步骤4:网络设备进行竞争解决。
由于网络设备在同一时刻可能会接收到多个不同的终端设备发送的随机接入消息,因此,网络设备在接收到上述终端设备发送的随机接入消息后,可以进行竞争解决。如果该终端设备竞争成功,则网络设备可以向该终端设备发送竞争解决信息。该竞争解决信息包括该终端设备之前发送的随机接入消息中包括的比特信息(比如当随机接入消息中的比特数目超过48bit时,则包括随机接入消息中的前48比特,否则可以包括整个随机接入消息)。
终端设备可以在发送随机接入消息之后,即启动一个竞争解决定时器。如果在该竞争解决定时器定义的时长内,该终端设备接收到了网络设备发送的竞争解决信息,则后续该终端设备可以与网络设备进行交互,完成RRC连接的建立。如果在该竞争解决定时器定义的时长内,该终端设备未接收到竞争解决信息,则终端设备会判定竞争解决失败,此时,终端设备会进一步的判断发送随机接入前导的次数是否已超过最大阈值,如果未超过最大阈值,则该终端设备可以重新选择一个随机接入前导,继续执行步骤1,如果已超过最大阈值,则该终端设备判定本次随机接入过程失败。
图5是相关技术中提供的一种随机接入方法的流程图。如图5所示,当终端设备中的第一USIM已完成随机接入,第二USIM需要进行随机接入时,终端设备的第一USIM可以向第一USIM的注册网络中的第一网络设备发送第一消息。其中,第一消息包括有第二USIM接入其所对应的注册网络中的第二网络设备时可用的随机接入资源信息。第一网络设备在接收到第一消息之后,可以根据第一消息向第一USIM发送第二消息,第二消息包括第一时间单元,在第一时间单元内,第一网络设备不与第一USIM进行交互。第二USIM可以在第一时间单元内,向第二网络设备发送随机接入请求(比如随机接入前导),第二网络设备在接收到随机接入请求之后,向第二USIM发送随机接入响应。当第二USIM接收到随机接入响应之后,第一USIM可以向第一网络设备发送第三消息,第三消息包括第二USIM接下来用于 发送随机接入消息(比如RRC连接请求消息)时可用的资源信息。第一网络设备可以根据第三消息向第一USIM发送第四消息,第四消息包括第二时间单元,在第二时间单元内,第一网络设备不与第一USIM交互。第二USIM可以在第二时间单元内,向第二网络设备发送随机接入消息。之后,当第二USIM接收到第二网络设备发送的竞争解决信息时,即完成了随机接入。
由此可见,相关技术中,第一网络设备仅仅为终端设备中的两个USIM分配了随机接入过程各自的上行时间,但是,并未为两个USIM分配对应的下行时间,这样,第二USIM有可能无法及时接收到第二网络设备发送的信息,从而导致随机接入时延增加,甚至有可能导致随机接入失败。基于此,本申请实施例提供了一种随机接入方法,可以缩短随机接入时延,提供随机接入成功率。
接下来对本申请实施例提供的随机接入方法进行介绍。
图6是本申请实施例提供的一种随机接入方法的流程图。该方法可以应用于图3所示的系统内,如图6所示,该方法包括以下步骤:
步骤601:终端设备以第一用户身份向第一网络设备发送第一消息,该第一消息用于指示第一下行信息的传输时间信息,第一下行信息是指终端设备以第二用户身份在随机接入过程中接收的信息。
其中,终端设备中可以安装有两个SIM卡,终端设备以第一用户身份向第一网络设备发送第一消息可以是指终端设备通过第一SIM卡向第一网络设备发送第一消息。其中,第一SIM卡支持第一用户身份。另外,在本申请实施例中,终端设备已经以第一用户身份完成随机接入,但还未以第二用户身份完成随机接入。其中,终端设备当前可以以第一用户身份处于RRC连接态,而以第二用户身份处于RRC空闲态、RRC非激活态或者是RRC连接态中的任一种。
需要说明的是,第一消息可以包括传输时间信息。该传输时间信息可以包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、无线资源控制RRC响应等待时长、波束恢复时长中的一项或多项。
其中,随机接入响应窗口是指终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,随机接入响应窗口的信息包括随机接入响应窗口的起始点和结束点。
具体地,如果终端设备要以第二用户身份随机接入第二网络设备,则终端设备可以首先以第二用户身份向第二网络设备发送随机接入前导。在发送随机接入前导之后,终端设备可以在一个时间窗口内等待第二网络设备返回的随机接入响应,该随机接入响应中将会包括终端设备以第二用户身份向第二网络设备发送第一上行信息的上行资源以及上行定时。其中,上述的用于等待接收随机接入响应的这个时间窗口即为随机接入响应窗口。如果终端设备在该随机接入响应窗口内未接收到第二网络设备发送的随机接入响应,并且,终端设备以第二用户身份向第二网络设备发送随机接入前导的次数还未达到上限阈值,则终端设备可以重新以第二用户身份向第二网络设备发送随机接入前导。如果终端设备在该随机接入响应窗口内未接收到第二网络设备发送的随机接入响应,且终端设备以第二用户身份向第二网络设备发送随机接入前导的次数已达到上限阈值,则终端设备以第二用户身份进行的随机接入将会失败。由此可见,如果终端设备以第一用户身份占用了该随机接入响应窗口,则会导致终端设备以第二用户身份进行的随机接入时延增大,甚至会导致接入失败。基于此,在本申请实施 例中,终端设备可以将该随机接入响应窗口作为传输时间信息发送至第一网络设备,以便第一网络设备可以根据该随机接入响应窗口进行时间分配,以避免终端设备以第一用户身份占用该随机接入响应窗口。
竞争解决时长是指终端设备在随机接入过程中等待第二网络设备返回竞争解决信息的时长。
具体地,在终端设备以第二用户身份接入第二网络设备时,终端设备在随机接入响应窗口内接收到随机接入响应之后,可以以第二用户身份向第二网络设备发送随机接入消息(比如RRC连接建立请求消息)。该随机接入消息中包括有终端设备的用户标识或者是一个随机数。第二网络设备在接收到该随机接入消息之后,会进行竞争解决,并对竞争胜出的终端设备发送竞争解决信息。终端设备可以从发送随机接入消息的时刻起开始计时,如果经过一定时长之后,仍未接收到竞争解决信息,则确定竞争解决失败。后续,终端设备将会以第二用户身份重新发起随机接入。其中,从发送随机接入消息的时刻起开始计时的这段用于接收竞争解决信息的时长即为竞争解决时长。
非竞争接入资源配置信息包括终端设备以第二用户身份通过非竞争随机接入的方式进行随机接入时允许使用的随机接入时域资源。示例性地,该非竞争接入资源配置信息可以包括终端设备以第二用户身份进行非竞争随机接入时,可以用于发送随机接入前导的上行时域资源。除此之外,当然也可以包括在非竞争随机接入过程中,其他可用的时域资源和频域资源。
RRC响应等待时长是指终端设备等待第二网络设备返回RRC响应消息的时长。其中,终端设备在以第二用户身份进行随机接入时,可以向第二网络设备发送诸如RRC建立请求或者是RRC激活请求等RRC请求,第二网络设备在接收到终端设备以第二用户身份发送的RRC请求时,可以向终端设备反馈RRC响应消息。终端设备可以从发送RRC请求的时刻起开始计时,在预定时长内等待RRC响应消息。该预定时长即为RRC响应等待时长。可选地,在一种可能的情况中,当传输时间信息包括RRC响应等待时长时,该传输时间信息还可以包括一个指示信息,该指示信息可以用于指示该RRC响应等待时长是RRC建立过程还是RRC激活过程中对应的RRC响应等待时长。也即,该指示信息可以用于指示该RRC响应等待时长对应的RRC请求的类型。
波束恢复时长是指终端设备以第二用户身份在进行波束恢复时的随机接入的时长。其中,当终端设备以第二用户身份处于RRC连接态时,如果当前波束出现故障,则终端设备可以从当前波束切换到其他波束,也即进行波束恢复。当终端设备以第二用户身份从一个波束切换到另一个波束时,终端设备将以第二用户身份重新进行随机接入过程。而上述的波束恢复时长即是指由波束恢复引起的终端设备以第二用户身份进行的随机接入的时长。
可选地,传输时间信息除了可以包括上述几项信息,还可以包括其他信息。例如,该传输时间信息还可以包括终端设备以第二用户设备可使用的随机接入前导、上行时域资源和频域资源等,或者,该传输时间信息还可以包括第一网络设备和第二网络设备的定时偏差等等。
可选地,在本申请实施例中,第一消息可以是RRC消息。
另外,在某些场景下,终端设备可能会以第二用户身份频繁进行随机接入过程。例如,终端设备以第二用户身份频繁进行波束恢复,从而引发终端设备以第二用户身份频繁进行随机接入。或者,终端设备以第二用户身份进行随机接入失败,从而导致终端设备需要以第二用户身份再次发起随机接入。在上述这些场景下,为了避免终端设备频繁的以第一用户身份 发送第一消息给第一网络设备,终端设备可以在以第一用户身份发送一次第一消息之后,经过第一时间间隔之后再发送第一消息。具体地,终端设备可以从发送第一消息的时刻起,启动一个定时器,在该定时器定义的时间内不发送第一消息,当达到该定时器的长度之后,终端设备才可以再次发送第一消息。其中,该定时器的长度等于第一时间间隔。第一时间间隔的取值可以是由终端设备设置的,或者也可以是由第一网络设备通过RRC消息通知的,或者,也可以是由第一网络设备或第二网络设备通过广播消息通知的。本申请实施例对此不作限定。
步骤602:第一网络设备根据第一消息,向终端设备发送第二消息,第二消息用于指示第一下行信息的传输时段。
第一网络设备在接收到终端设备以第一用户身份发送的第一消息之后,可以根据第一消息所指示的传输时间信息,向终端设备发送第二消息。其中,该第一消息用于指示第一下行信息的传输时段。
示例性地,第一网络设备可以确定终端设备以第一用户身份使用的上行时域资源和下行时域资源。之后,根据第一消息所指示的传输时间信息以及上行时域资源和下行时域资源中的至少一个,向终端设备发送第二消息。
其中,由于第一网络设备是终端设备中的第一用户身份对应的网络设备,可以对终端设备以第一用户身份进行的信息收发进行调度。基于此,第一网络设备可以分配终端设备以第一用户身份可用的所有上行时域资源和下行时域资源。
在确定终端设备以第一用户身份可用的上行时域资源和下行时域资源之后,在一种可能的实现方式中,第一网络设备可以从所有可用的下行时域资源中为终端设备分配第二下行信息的传输时段。该第二下行信息是指终端设备以第一用户身份接收的第一网络设备发送的信息。在确定第二下行信息的传输时段之后,第一网络设备可以根据传输时间信息,从第二下行信息的传输时段之外的时段中,确定第一下行信息的传输时段。
具体地,当传输时间信息包括随机响应接入窗口时,确定的第一下行信息的传输时段的时长不小于随机响应窗口的长度。
当传输时间信息包括竞争解决时长时,根据竞争解决时长,确定第一下行信息的传输时段。其中,第一下行信息的传输时段可以包括多个不连续的时段,且其中第一下行信息的传输时段能保证第二用户身份能正确接收到竞争解决信息,比如第二用户身份能发送上行的每个时刻之后的竞争解决时长之内都有第二用户身份可用的下行时间。
当传输时间信息同时包括上述两项信息时,根据传输时间信息确定的第一下行信息的传输时段同样包括多个不连续的时段,且其中第一下行信息的传输时段能保证第二用户身份能正确接收到竞争解决信息,比如第二用户身份能发送上行的每个时刻之后的竞争解决时长之内都有第二用户身份可用的下行时间。
当传输时间信息包括非竞争接入资源配置信息时,第一下行信息的传输时段与非竞争接入资源配置信息包括的随机接入上行时域资源中的时段不重合。并且,该第一下行信息的传输时段可以与随机接入上行时域资源中的一个时间段相邻。
可选地,当传输时间信息包括RRC响应等待时长时,根据RRC响应等待时长确定第一下行信息的传输时段,其中,第一下行信息的传输时段可以包括多个不连续的时段,且多个不连续的时段能保证第二用户身份能正确接收到RRC响应。比如第二用户身份能发送上行的每个时刻之后的RRC响应等待时长之内都有第二用户身份可用的下行时间。
可选地,当传输时间信息同时包括随机接入响应窗口、竞争解决时长、RRC响应等待时长中的两项或者是三项时,可以综合上述两项或三项信息,参考前述方法确定第一下行信息的传输时段。此时,第一下行信息的传输时段包括多个不连续的时段,且其中各个时段的相关约束可以参考前述介绍。
可选地,当传输时间信息包括波束恢复时长时,确定的第一下行信息的传输时段的时长不小于该波束恢复时长。
在确定第一下行信息的传输时段之后,第一网络设备可以向终端设备发送包括该第一下行信息的传输时段的第二消息。或者,第一网络设备可以向终端设备发送包括第一下行信息的传输时段和第二下行信息的传输时段的第二消息。
可选地,在另一种可能的实现方式中,第一网络设备也可以根据传输时间信息,从终端设备以第一用户身份可用的下行时域资源中,确定第二下行信息的传输时段。之后,第一网络设备可以向终端设备发送包括第二下行信息的传输时段的第二消息。在这种情况下,第二消息包括的第二下行信息的传输时段之外的其他时段,即为该第二消息所指示的第一下行信息的传输时段。也即,第二消息可以通过隐式的方式指示第一下行信息的传输时段。
可选地,在另一种可能的实现方式中,第一网络设备可以从终端设备以第一用户身份可用的上行时域资源中选择一个时段作为第二上行信息的传输时段。其中,第二上行信息是指终端设备以第一用户身份向第一网络设备发送的信息。在确定第二上行信息的传输时段之后,第一网络设备可以根据第二上行信息的传输时段,确定第二下行信息的传输时段。之后,第一网络设备可以从第二上行信息的传输时段和第二下行信息的传输时段之外的时段中,选择一个时段作为第一下行信息的传输时段。之后,第一网络设备可以将包括有第一下行信息的传输时段的第二消息发送至终端设备。或者,在该种实现方式中,在确定第二上行信息的传输时段和第二下行信息的传输时段之后,第一网络设备可以向终端设备发送包括有第二上行信息的传输时段和第二下行信息的传输时段的第二消息。这样,第二上行信息的传输时段和第二下行信息的传输时段之外的时段,即为该第二消息所指示的第一下行信息的传输时段。
可选地,在另一种可能的实现方式中,第一网络设备可以从终端设备以第一用户身份可用的上行时域资源中选择一个时段作为第二上行信息的传输时段,从终端设备以第一用户身份可用的下行时域资源中选择一个时段作为第二下行信息的传输时段。之后,第一网络设备可以根据传输时间信息,从第二上行信息的传输时段和第二下行信息的传输时段之外的时段中,选择两个时段分别作为第一上行信息的传输时段和第一下行信息的传输时段。其中,第一上行信息的传输时段和第一下行信息的传输时段不重合。之后,第一网络设备可以将包括第一上行信息的传输时段和第一下行信息的传输时段的第二消息发送至终端设备。
需要说明的是,在本申请实施例中,当第一网络设备为CU和DU分离架构的基站时,第一网络设备中的CU-CP在接收到第一消息之后,可以将第一消息所指示的传输时间信息发送至DU,由DU通过上述方法生成一个信息,该信息包括第一上行信息的传输时段,第一下行信息的传输时段,第二上行信息的传输时段,第二上行信息的传输时间中至少一个,并将该信息发送至CU-CP。CU-CP可以将该信息中包括的传输时段包括在第二消息中发送至终端设备。
可选地,第二消息中还可以包括第一传输时段的有效时间段。其中,第一传输时段是指第一下行信息的传输时段。该有效时间段是指该第一传输时段有效作用的时间段。也即,该 有效时间段可以用于指示该终端设备可以在哪个时间段内使用该第一传输时段来进行信息收发。
步骤603:终端设备根据第二消息确定时间分配模式。
在接收到第一网络设备发送的第二消息之后,终端设备可以获取第二消息中包括的传输时段,并根据第二消息中包括的传输时段,确定时间分配模式。其中,该时间分配模式用于指示第一下行信息的传输时段和为第二下行信息的传输时段。需要说明的是,由前述介绍可知,第一下行信息的传输时段可以包括多个不连续的时段,同理,第二下行信息的传输时段也可以包括多个不连续的时段。
可选地,当第二消息中包括的传输时段为第一下行信息的传输时段时,终端设备可以根据终端设备以第一用户身份使用的上行时域资源以及以第二用户身份使用的上行时域资源,结合第一下行信息的传输时段,确定得到第二下行信息的传输时段、第二上行信息的传输时段和第一上行信息的传输时段。其中,终端设备以第一用户身份使用的上行时域资源可以是第一网络设备通知终端设备的,终端设备以第二用户身份使用的上行时域资源可以是第二网络设备通知终端设备的。
示例性地,终端设备可以从以第二用户身份使用的上行时域资源中,选择与第一下行信息的传输时段不重合的时段作为第一上行信息的传输时段。之后,终端设备可以从以第一用户身份使用的上行时域资源中,选择不与第一下行信息和第一上行信息的传输时段重合的时段,作为第二上行信息的传输时段。最后,终端设备可以从第一上行信息、第一下行信息、第二上行信息的传输时段之外的其他时段中确定第二下行信息的传输时段。
可选地,当第二消息包括第二下行信息的传输时段时,终端设备可以从以第一用户身份使用的上行时域资源中选择不与第二下行信息的传输时段重合的时段,作为第二上行信息的传输时段。之后,终端设备可以从第二上行信息和第二下行信息的传输时段之外的时段中确定第一下行信息的传输时段,最后,终端设备可以从以第二用户身份使用的上行时域资源中选择与上述三个时段均不重合的时段,作为第一上行信息的传输时段。可选地,终端设备在确定第二上行信息和第二下行信息的传输时段,也可以先从以第二用户身份使用的上行时域资源中确定第一上行信息的传输时段,最后确定第一下行信息的传输时段。同样的,终端设备以第一用户身份使用的上行时域资源可以是第一网络设备通知终端设备,终端设备以第二用户身份使用的上行时域资源可以是第二网络设备通知终端设备的。
可选地,当第二消息包括第一下行信息和第二下行信息的传输时段时,终端设备可以参考前述方法,根据第一下行信息和第二下行信息的传输时段,以及终端设备以第一用户身份和第二用户身份使用的上行时域资源,确定第一上行信息的传输时段和第二上行信息的传输时段。
可选地,当第二消息包括第二上行信息和第二下行信息的传输时段时,终端设备可以参考前述的第二消息中包括第二下行信息的传输时段的情况,确定第一下行信息和第一上行信息的传输时段。本申请实施例在此不再赘述。
需要说明的是,上述的第一上行信息的传输时段和第一下行信息的传输时段可以组成一个连续的时段。同理,第二上行信息的传输时段和第二下行信息的传输时段可以组成一个连续的时段。另外,第一下行信息的传输时段可能包括多个子时段,第一上行信息的传输时段可能也包括多个子时段,并且,第一下行信息的多个子时段和第一上行信息的多个子时段交 叉排列。
步骤604:终端设备根据时间分配模式接收第一下行信息。
在确定时间分配模式之后,终端设备可以按照上述时间分配模式,在第一上行信息的传输时段内,以第二用户身份向第二网络设备发送消息,在第一下行信息的传输时段内,接收第二网络设备反馈的消息。由于第一上行信息和第一下行信息的传输时段与第二上行信息和第二下行信息的传输时段不重合。因此,当终端设备以第二用户身份,按照第一上行信息的传输时段和第一下行信息的传输时段与第二网络设备交互进行随机接入时,终端设备将暂停以第一用户身份与第一网络设备进行交互。这样,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。
可选地,在本申请实施例中,当终端设备根据确定的时间分配模式,以第二用户身份完成随机接入过程之后,该终端设备还可以以第一用户身份向第一网络设备发送通知消息,以通知第一网络设备终端设备已经完成随机接入。后续,第一网络设备可以采用其他策略重新为第一上行信息、第一下行信息、第二上行信息和第二下行信息分配传输时段。
可选地,当终端设备以第一用户身份处于RRC连接态时,终端设备需要监听以第一用户身份传输的下行信号的质量。如果下行信号质量持续低于一定阈值,则终端设备的物理层会上报给RRC层一个物理层失步指示。当RRC层连续收到一定数目的物理层失步指示时,则会启动一个定时器。如果物理层检测到下行信号质量大于一定阈值,则物理层可以向RRC上报一个物理层同步指示。如果在该定时器定义的时间内,RRC连续接收到的物理层同步指示大于一定数值,则RRC层会取消这个定时器,否则,终端设备将会判定以第一用户身份建立的无线链路失败。在这种情况下,终端设备将会以第一用户身份重建RRC连接。而重建RRC连接可能会影响业务通信,并且会带来数据的中断。
基于上述介绍可知,当终端设备采用本申请实施例确定的时间分配模式以第二用户身份进行随机接入时,在第一下行信息的传输时段内,终端设备将无法监听到以第一用户身份发送的下行信号的质量。此时,终端设备的RRC层将会启动一个定时器。而在该定时器定义的时长内,由于终端设备正在以第二用户身份接收第一下行信息,因此,很难在该定时器定义的时长内,接收到连续的一定数目的物理层同步指示。在这种情况下,终端设备最终将会判定以第一用户身份建立的无线链路失败。基于此,在本申请实施例中,终端设备可以暂停或停止在第一时段内以第一用户身份进行的无线链路监测,其中,第一时段是指第一下行信息的传输时段。具体地,终端设备可以在第一下行信息的传输时段内暂停或停止以第一用户身份进行下行信号质量的监测,或者,终端设备也可以在上述定时器启动之后,暂停或停止上述定时器的运行。
同理,当终端设备以第一用户身份处于RRC连接态时,还需要维护一个上行同步定时器。如果该上行同步定时器超时,会导致终端设备以第一用户身份的上行失步,这样,后续当终端设备以第一用户身份发起上行传输时,需要再次发起随机接入过程,这将会影响终端设备以第一用户身份进行的数据通信。
当终端设备采用本申请实施例确定的时间分配模式以第二用户身份进行随机接入时,在终端设备以第二用户身份进行信息传输的传输时段内,可能会导致终端设备以第一用户身份的上行失步。基于此,在本申请实施例中,终端设备在以第二用户身份进行信息传输的传输 时段内,同样可以暂停或停止运行上述上行同步定时器。
需要说明的是,上述介绍的终端设备在第一下行信息的传输时段内暂停以第一用户身份进行的无线链路监测以及上行同步定时维护的方法,不仅可以用于随机接入过程中,还可以用于后续终端设备以第一用户身份和第二用户身份进行时分的场景下,也即,上述方法并不依赖于本申请的随机接入方法。在其他场景中,第一用户身份和第二用户身份存在对应的传输时段的情况下,终端设备同样可以采用上述方法在以第一用户身份进行的信息传输的时段内,暂停或停止以第二用户身份进行的无线链路监测以及上行同步定时维护。在以第二用户身份进行的信息传输的时段内,暂停或停止以第一用户身份进行的无线链路监测以及上行同步定时维护。
在本申请实施例中,终端设备可以以第一用户身份向第一网络设备发送第一消息。第一网络设备可以根据第一消息所指示的传输时间信息,向终端设备返回指示第一下行信息的传输时段。这样,终端设备就可以根据该第二消息,确定出第一下行信息的传输时段,进而按照第一下行信息的传输时段来接收第二网络设备发送的消息。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。
在上述实施例中,终端设备可以根据第一网络设备返回的第二消息来确定时间分配模式,进而按照该时间分配模式完成以第二用户身份进行的随机接入过程。在一种可选的实现方式中,也可以由终端设备自身根据传输时间信息确定时间分配模式。参见图7,示出了本申请实施例提供的另一种随机接入方法的流程图。该方法可以应用于终端设备中,该方法可以包括以下步骤:
步骤701:根据传输时间信息确定时间分配模式,该时间分配模式用于指示第一下行信息和/或第二下行信息的传输时段。
其中,传输时间信息的具体介绍可以参考前述实施例中步骤601中关于传输时间信息的详细介绍,本申请实施例在此不再赘述。
另外,终端设备可以根据传输时间信息以及终端设备以第一用户身份使用的上行时域资源和以第二用户身份使用的下行时域资源中的至少一个,来确定时间分配模式。
示例性地,终端设备可以参考前述实施例中的步骤602,根据传输时间信息以及以第一用户身份使用的上行时域资源和以第二用户身份使用的下行时域资源中的至少一个,确定第一下行信息的传输时段,或者,确定第二下行信息的传输时段,或者,确定第一上行信息和第一下行信息的传输时段,或者,确定第二上行信息和第二下行信息的传输时段。
在确定上述时段之后,终端设备可以参考前述实施例中的步骤603,根据已确定出的时段,确定剩余未确定的时段。
步骤702:向第一网络设备发送该时间分配模式。
终端设备在确定时间分配模式之后,可以将第二上行信息和第二下行信息的传输时段发送至第一网络设备,也可以将第一上行信息和第一下行信息的传输时段发送至第一网络设备,或者,可以将第一下行信息和/或第二下行信息的传输时段发送至第一网络设备。第一网络设备可以根据接收到的传输时段来对终端设备进行上下行调度。
需要说明的是,当第一网络设备为CU和DU分离的架构的基站时,第一网络设备可以 通过CU-CP接收终端设备发送的时间分配模式,并将接收到的信息发送至DU,由DU根据该时间分配模式来对终端设备而进行上下行调度。
同样的,为了避免终端设备频繁的以第一用户身份向第一网络设备发送该时间分配模式,终端设备可以设置一个定时器,从发送时间分配模式的时刻起,启动该定时器,在该定时器定义的时长内,该终端设备不再发送时间分配模式。
步骤703:根据该时间分配模式接收第一下行信息。
终端设备可以根据该时间分配模式所指示的第一下行信息的传输时段内,以第二用户身份接收第二网络设备在随机接入过程中反馈的消息。并且,终端设备可以在该时间分配模式所指示的第一上行信息的传输时段内,以第二用户身份向第二网络设备发送消息。其中,当终端设备以第二用户身份,在第一下行信息和第一上行信息的传输时段内与第二网络设备进行交互时,终端设备将会暂停或停止以第一用户身份与第一网络设备的交互。
可选地,在本申请实施例中,当终端设备根据确定的时间分配模式,以第二用户身份完成随机接入过程之后,该终端设备还可以以第一用户身份向第一网络设备发送通知消息,以通知第一网络设备终端设备已经完成随机接入。后续,第一网络设备可以采用其他策略重新为第一上行信息、第一下行信息、第二上行信息和第二下行信息分配传输时段。
可选地,在本申请实施例中,终端设备同样可以在第一下行信息的传输时段内,暂停或停止以第一用户身份进行的第一无线链路监测,以及上行同步定时器的维护。详细实现过程参见前述实施例中的相关介绍,本申请实施例在此不再赘述。
在本申请实施例中,终端设备可以根据传输时间信息确定时间分配模式,并在时间分配模式所指示的第一下行传输时段内,以第二用户身份接收第二网络设备在随机接入过程中反馈的消息。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。另外,在本申请实施例中,由终端设备直接根据传输时间信息确定时间分配模式,无需将传输时间信息发送至网络设备进行分配,避免了网络设备分配的不准确,并且,减少了终端设备上报传输时间信息的过程,缩短了随机接入时延。
需要说明的是,终端设备与网络设备进行交互时,由于需要发送的消息中的信息数据量较大,因此,通常均是通过RRC消息来承载这些信息的。而无线传输中RRC消息的传输通常比较慢,因此,这将导致较大的时延。尤其是当网络设备为CU和DU分离的架构的基站时,在随机接入过程,CU在接收到终端设备发送的RRC消息之后,还需要将该RRC消息发送至DU,由DU来进行时间分配。之后,再由DU把分配的时段传输给CU,CU再将这些时段的相关信息发送至终端设备,这将导致终端设备的随机接入时延进一步增大。基于此,本申请实施例还提供了一种信息交互方法,以缩短终端设备在随机接入过程中的时延。
图8是本申请实施例提供的一种信息交互方法的流程图。该方法可以应用于终端设备,参见图8,该方法包括以下步骤:
步骤801:以第一用户身份向第一网络设备发送第一信息,第一信息用于指示终端设备暂停或停止以第一用户身份进行信号收发。
其中,第一信息承载于介质访问控制层控制单元(medium access control-control element,MAC CE)或PHY信号,或者说包括在MAC CE或PHY信号中。
MAC层位于无线链路控制层(Radio Link Control,RLC)与PHY层之间。在MAC层对数据进行封装时,得到的MAC协议数据单元(Protocol Data Unit,PDU)。MAC PDU可以包括四个部分,一个MAC头、0个或多个MAC服务数据单元(Service Data Unit,SDU),0个或多个MAC CE或填充(padding)信号。在本申请实施例中,终端设备可以定义一个MAC CE来表示第一信息的含义。也即,通过一个特定的MAC CE单元来指示暂停或停止以第一用户身份进行信号收发。或者,本申请实施例也可以生成一个简单的指示信息,将该指示信息作为MAC CE承载的信息内容。
当第一信息承载于PHY信号时,可以是指通过一个特定的PHY信号来表征第一信息的含义。也即,通过一个特定的PHY信号来指示暂停或停止以第一用户身份进行信号收发。
需要说明的是,第一网络设备在接收到第一信息之后,根据该第一信息可以获悉终端设备接下来将停止以第一用户身份进行的信号收发。此时,第一网络设备也将暂停或停止向终端设备的发送信息。
步骤802:暂停或停止以第一用户身份进行信号收和/或发。
在向第一网络设备发送第一信息之后,终端设备可以暂停或停止以第一用户身份进行的信号收和/或发。也即,暂停或停止以第一用户身份进行信息发送,或者,暂停或停止以第一用户身份进行信息接收,或者,暂停或停止以第一用户身份进行信息发送和接收。由于终端设备已经向第一网络设备发送了第一信息,也即,已经向第一网络设备通知了自身接下来将停止信号收和/或发,因此,第一网络设备接下来可以据此信息对终端设备进行调度。
步骤803:以第二用户身份与第二网络设备进行交互。
在暂停或停止以第一用户身份进行信号收和/或发之后,接下来,终端设备即可以以第二用户身份与第二网络设备进行数据包的收或发。其中,终端设备可以在接下来的时段内以第二用户身份进行随机接入。由于在接下来的时段内,终端设备已经暂停或停止了以第一用户身份进行的信号收和/或发,因此,在以第二用户身份进行的随机接入过程中,终端设备将不会以第一用户身份占用接收机和/或发射机,这样,可以保证终端设备能够以第二用户身份及时接收和/或发送消息,缩短了随机接入时延,提高了随机接入的成功率。
需要说明的是,本申请实施例中采用MAC CE或PHY信号来通知第一网络设备暂停与终端设备的交互,从而使得终端设备可以以第二用户身份在接下来的时段内进行随机接入时延。由于MAC CE和PHY信号的传输速度较快,因此,可以缩短随机接入的时延。
可选地,在终端设备以第二用户身份与第二网络设备进行交互,完成随机接入之后,终端设备还可以以第一用户身份向第一网络设备发送第二信息,该第二信息用于向第一网络设备通知终端设备已启动以第一用户身份进行的信号收和/或发。也即,在完成随机接入之后,终端设备可以通过向第一网络设备发送第二信息来通知第一网络设备,接下来可以与终端设备进行交互。其中,该第二信息同样可以承载于MAC CE或PHY信号。
可选地,第一网络设备在接收到第二信息之后,还可以向终端设备反馈一个确认指示,以通知终端设备已接收到该第二信息。其中,该确认指示同样可以承载于MAC CE或PHY信号。
可选地,在一种可能的实现方式中,在终端设备以第二用户身份与第二网络设备进行交互,完成随机接入之后,终端设备还可以以第二用户身份向第二网络设备发送第三信息,第三信息用于指示暂停或停止以第二用户身份进行信号收和/或发;暂停或停止以第二用户身份 进行的信号收和/或发,并启动以第一用户身份进行的信号收和/或发。也即,在随机接入完成之后,终端设备可以通知第二网络设备暂停收和/或发,并恢复以第一用户身份与第一网络设备的交互。其中,第三信息同样可以承载于MAC CE或PHY信号。
需要说明的是,上述提供的信息交互方法不仅可以用于随机接入过程中,还可以用于随机接入之后其他需要对第一用户身份和第二用户身份进行时分的场景中。本申请实施例仅是以随机接入过程为例进行了说明,并不构成对本申请实施例应用场景的限定。
需要说明的是,以上提供的信息交互方法可以和网络设备采用其他方式为第一用户身份和第二用户身份分配时段信息的方法共存。比如在本实施例之前,网络设备已经为第一用户身份和第二用户身份分配了时段信息,当终端设备采用本实施例的方法进行时分分配时,可以暂停使用之前分配的时段信息,当终端设备给第一网络设备或第二网络设备发送一个指示信息之后,第一网络设备和第二网络设备可以恢复到之前通过其他方式分配的时段信息进行信息传输的模式,即无需第一网络设备和第二网络设备和终端设备之间又重新通过其他方式分配一次时段信息。
在本申请实施例中,终端设备可以以第一用户身份向第一网络设备发送第一信息,以暂停或停止与第一网络设备之间的信息接收和/或发送。之后,终端设备即可以以第二用户身份与第二网络设备进行交互。其中,终端设备可以在接下来的时段内以第二用户身份进行随机接入。由于在接下来的时段内,终端设备已经暂停或停止了以第一用户身份进行的信号收和/或发,因此,在以第二用户身份进行的随机接入过程中,终端设备将不会以第一用户身份占用接收机或发射机,这样,可以保证终端设备能够以第二用户身份及时接收或发送消息,缩短了随机接入时延,提高了随机接入的成功率。另外,本申请实施例中采用MAC CE或PHY信号来通知第一网络设备暂停与终端设备的交互,从而使得终端设备可以以第二用户身份在接下来的时段内进行随机接入时延。由于MAC CE和PHY信号的传输速度较快,因此,可以缩短随机接入的时延。还需要说明的是,由于终端设备向第一网络设备通知了将暂停或停止以第一用户身份进行的信息收发,因此,第一网络设备就不会再盲目的针对该终端设备进行资源调度,避免了资源浪费。
图9是本申请实施例提供的一种随机接入装置900,参见图9,该装置900包括:
接收模块901,用于接收来自终端设备以第一用户身份发送的第一消息,第一消息用于指示第一下行信息的传输时间信息,第一下行信息为终端设备以第二用户身份在随机接入过程中接收的信息。
发送模块902,用于执行前述实施例中的步骤602。
可选地,传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、无线资源控制RRC响应等待时长、波束恢复时长中的一项或多项;
其中,随机接入响应窗口是指终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,随机接入响应窗口的信息为随机接入响应窗口的大小,或者,随机接入响应窗口的信息包括随机接入响应窗口的起始点和结束点;
竞争解决时长是指终端设备在随机接入过程中等待第二网络设备返回竞争解决信息的时长;
非竞争接入资源配置信息包括终端设备以第二用户身份通过非竞争随机接入的方式进行 随机接入时允许使用的随机接入时域资源;
RRC响应等待时长是指终端设备等待第二网络设备返回RRC响应消息的时长;
波束恢复时长是指终端设备以第二用户身份在进行波束恢复时的随机接入的时长。
可选地,发送模块902具体用于:
确定终端设备以第一用户身份使用的上行时域资源和下行时域资源;
根据传输时间信息以及上行时域资源和下行时域资源中的至少一个,向终端设备发送第二消息。
可选地,第二消息用于指示第一传输时段和/或第二传输时段,第一传输时段为第一下行信息的传输时段,第二传输时段为第二下行信息的传输时段,第二下行信息是指终端设备以第一用户身份接收的信息。
可选地,第二消息还包括第一传输时段的有效时间段。
在本申请实施例中,第一网络设备可以根据终端设备发送的第一消息所指示的传输时间信息,向终端设备返回指示第一下行信息的传输时段。这样,终端设备就可以根据该第二消息,确定出第一下行信息的传输时段,进而按照第一下行信息的传输时段来接收第二网络设备发送的消息。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。
图10是本申请实施例提供的另一种随机接入装置1000,应用于终端设备,该终端设备支持第一用户身份和第二用户身份,参见图10,该装置1000包括:
处理模块1001,用于执行前述实施例中的步骤603或步骤701;
接收模块1002,用于执行前述实施例中的步骤604或702。
可选地,处理模块1001具体用于:
根据来自第一网络设备的第二消息确定时间分配模式,第二消息用于指示第一传输时段和/或第二传输时段,第一传输时段为第一下行信息的传输时段,第二传输时段为第二下行信息的传输时段。
可选地,该装置1000还包括:
发送模块,用于向第一网络设备发送第一消息,第一消息用于指示第一下行信息的传输时间信息。
可选地,发送模块还用于:
在发送第一消息后,经过第一时间间隔,向第一网络设备再次发送第一消息。
可选地,第二消息还包括第一传输时段的有效时间段。
可选地,处理模块具体用于:
根据传输时间信息确定时间分配模式。
可选地,传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、RRC响应等待时长、波束恢复时长中的一项或多项;
其中,随机接入响应窗口是指终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,随机接入响应窗口的信息为随机接入响应窗口的大小,或者,随机 接入响应窗口的信息包括随机接入响应窗口的起始点和结束点;
竞争解决时长是指终端设备在随机接入过程中等待第二网络设备返回竞争解决信息的允许等待时长;
非竞争接入资源配置信息包括终端设备以第二用户身份采用非竞争随机接入的方式进行随机接入时允许采用的随机接入时域资源;
RRC响应等待时长是指终端设备等待第二网络设备返回RRC响应消息的允许等待时长;
波束恢复时长是指终端设备以第二用户身份在进行波束恢复时允许的随机接入的时长。
可选地,该装置还用于:
暂停或停止在第一时段内的第一无线链路监测,第一时段是指由时间分配模式指示的第一下行信息的传输时段,第一无线链路监测是由终端设备以第一用户身份进行的。
在本申请实施例中,终端设备可以确定时间分配模式,并在时间分配模式所指示的第一下行传输时段内,以第二用户身份接收第二网络设备在随机接入过程中反馈的消息。由于第一下行信息的传输时段是专门为第一下行信息分配的时段,因此,终端设备将不会在以第二用户身份进行随机接入的过程中,以第一用户身份占用收发机,从而可以保证终端设备及时接收到第二网络设备的信息,进而可以缩短随机接入时延,提高随机接入的成功率。另外,在本申请实施例中,由终端设备直接根据传输时间信息确定时间分配模式,无需将传输时间信息发送至网络设备进行分配,避免了网络设备分配的不准确,并且,减少了终端设备上报传输时间信息的过程,缩短了随机接入时延。
需要说明的是:上述实施例提供的随机接入装置在进行随机接入时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的随机接入装置与随机接入方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
图11是本申请实施例提供的一种信息交互装置1100,该装置可以应用于终端设备,该终端设备支持第一用户身份和第二用户身份,参见图11,该装置1100包括:
收发模块1101,用于执行前述实施例中的步骤801和步骤803;
处理模块1102,用于执行前述实施例中的步骤802。
可选地,收发模块1101还用于:以第一用户身份向第一网络设备发送第二信息,第二信息用于向第一网络设备通知已启动以第一用户身份进行的信号收和/或发。
可选地,收发模块1101还用于:以第二用户身份向第二网络设备发送第三信息,第三信息用于指示暂停或停止以第二用户身份进行信号收和/或发;处理模块1102还用于暂停或停止以第二用户身份进行的信号收和/或发,并启动以第一用户身份进行的信号收和/或发。
在本申请实施例中,终端设备可以以第一用户身份向第一网络设备发送第一信息,以暂停或停止与第一网络设备之间的信息接收和/或发送。之后,终端设备即可以以第二用户身份与第二网络设备进行交互。其中,终端设备可以在接下来的时段内以第二用户身份进行随机接入。由于在接下来的时段内,终端设备已经暂停或停止了以第一用户身份进行的信号收和/或发,因此,在以第二用户身份进行的随机接入过程中,终端设备将不会以第一用户身份占用接收机或发射机,这样,可以保证终端设备能够以第二用户身份及时接收或发送消息,缩 短了随机接入时延,提高了随机接入的成功率。另外,本申请实施例中采用MAC CE或PHY信号来通知第一网络设备暂停与终端设备的交互,从而使得终端设备可以以第二用户身份在接下来的时段内进行随机接入时延。由于MAC CE和PHY信号的传输速度较快,因此,可以缩短随机接入的时延。还需要说明的是,由于终端设备向第一网络设备通知了将暂停或停止以第一用户身份进行的信息收发,因此,第一网络设备就不会再盲目的针对该终端设备进行资源调度,避免了资源浪费。
需要说明的是:上述实施例提供的信息交互装置在进行信息交互时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的信息交互装置与信息交互方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
在上述实施例中介绍的方法,可以全部或部分地通过软件、硬件、固件或者其任意结合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如:同轴电缆、光纤、数据用户线(Digital Subscriber Line,DSL))或无线(例如:红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如:软盘、硬盘、磁带)、光介质(例如:数字通用光盘(Digital Versatile Disc,DVD))、或者半导体介质(例如:固态硬盘(Solid State Disk,SSD))等。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述为本申请提供的实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (29)

  1. 一种随机接入方法,其特征在于,应用于第一网络设备,所述方法包括:
    接收来自终端设备以第一用户身份发送的第一消息,所述第一消息用于指示第一下行信息的传输时间信息,所述第一下行信息为所述终端设备以第二用户身份在随机接入过程中接收的信息;
    根据所述第一消息,向所述终端设备发送第二消息,所述第二消息用于指示所述第一下行信息的传输时段。
  2. 根据权利要求1所述的方法,其特征在于,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、无线资源控制RRC响应等待时长、波束恢复时长中的一项或多项;
    其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
    所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的时长;
    所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份通过非竞争随机接入的方式进行随机接入时允许使用的随机接入时域资源;
    所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的时长;
    所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时的随机接入的时长。
  3. 根据权利要求1或2所述的方法,其特征在于,所述根据所述第一消息,向所述终端设备发送第二消息,包括:
    确定所述终端设备以第一用户身份使用的上行时域资源和下行时域资源;
    根据所述传输时间信息以及所述上行时域资源和所述下行时域资源中的至少一个,向所述终端设备发送所述第二消息。
  4. 根据权利要求3所述的方法,其特征在于,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段,所述第二下行信息是指所述终端设备以所述第一用户身份接收的信息。
  5. 根据权利要求4所述的方法,其特征在于,所述第二消息还包括所述第一传输时段的有效时间段。
  6. 一种随机接入方法,其特征在于,应用于终端设备,所述终端设备支持第一用户身份和第二用户身份,所述方法包括:
    确定时间分配模式,所述时间分配模式用于指示第一下行信息和/或第二下行信息的传输时段,所述第一下行信息为终端设备以所述第二用户身份在随机接入过程中接收的信息,所述第二下行信息为所述终端设备以所述第一用户身份在随机接入过程中接收的信息;
    根据所述时间分配模式接收所述第一下行信息。
  7. 根据权利要求6所述的方法,其特征在于,所述确定时间分配模式,包括:
    根据来自第一网络设备的第二消息确定所述时间分配模式,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段。
  8. 根据权利要求7所述的方法,其特征在于,所述根据来自第一网络设备的第二消息确定所述时间分配模式之前,还包括:
    向所述第一网络设备发送第一消息,所述第一消息用于指示所述第一下行信息的传输时间信息。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    在发送所述第一消息后,经过第一时间间隔,向所述第一网络设备再次发送所述第一消息。
  10. 根据权利要求7-9任一所述的方法,其特征在于,所述第二消息还包括所述第一传输时段的有效时间段。
  11. 根据权利要求6所述的方法,其特征在于,所述确定时间分配模式,包括:
    根据传输时间信息确定所述时间分配模式。
  12. 根据权利要求8或11所述的方法,其特征在于,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、RRC响应等待时长、波束恢复时长中的一项或多项;
    其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
    所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的允许等待时长;
    所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份采用非竞争随机接入的方式进行随机接入时允许采用的随机接入时域资源;
    所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的允许等待时长;
    所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时允许的随机接入的时长。
  13. 根据权利要求6-12任一所述的方法,其特征在于,所述方法还包括:
    暂停或停止在第一时段内的第一无线链路监测,所述第一时段是指由所述时间分配模式指示的所述第一下行信息的传输时段,所述第一无线链路监测是由所述终端设备以第一用户身份进行的。
  14. 一种随机接入装置,其特征在于,应用于第一网络设备,所述装置包括:
    接收模块,用于接收来自终端设备以第一用户身份发送的第一消息,所述第一消息用于指示第一下行信息的传输时间信息,所述第一下行信息为所述终端设备以第二用户身份在随机接入过程中接收的信息;
    发送模块,用于根据所述第一消息,向所述终端设备发送第二消息,所述第二消息用于指示所述第一下行信息的传输时段。
  15. 根据权利要求14所述的装置,其特征在于,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、无线资源控制RRC响应等待时长、波束恢复时长中的一项或多项;
    其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
    所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的时长;
    所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份通过非竞争随机接入的方式进行随机接入时允许使用的随机接入时域资源;
    所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的时长;
    所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时的随机接入的时长。
  16. 根据权利要求14或15所述的装置,其特征在于,所述发送模块具体用于:
    确定所述终端设备以第一用户身份使用的上行时域资源和下行时域资源;
    根据所述传输时间信息以及所述上行时域资源和所述下行时域资源中的至少一个,向所述终端设备发送所述第二消息。
  17. 根据权利要求16所述的装置,其特征在于,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段,所述第二下行信息是指所述终端设备以所述第一用户身份接收的信息。
  18. 根据权利要求17所述的装置,其特征在于,所述第二消息还包括所述第一传输时段的有效时间段。
  19. 一种随机接入装置,其特征在于,应用于终端设备,所述终端设备支持第一用户身份和第二用户身份,所述装置包括:
    处理模块,用于确定时间分配模式,所述时间分配模式用于指示第一下行信息和/或第二下行信息的传输时段,所述第一下行信息为终端设备以所述第二用户身份在随机接入过程中接收的信息,所述第二下行信息为所述终端设备以所述第一用户身份在随机接入过程中接收的信息;
    接收模块,用于根据所述时间分配模式接收所述第一下行信息。
  20. 根据权利要求19所述的装置,其特征在于,所述处理模块具体用于:
    根据来自第一网络设备的第二消息确定所述时间分配模式,所述第二消息用于指示第一传输时段和/或第二传输时段,所述第一传输时段为所述第一下行信息的传输时段,所述第二传输时段为所述第二下行信息的传输时段。
  21. 根据权利要求20所述的装置,其特征在于,所述装置还包括:
    发送模块,用于向所述第一网络设备发送第一消息,所述第一消息用于指示所述第一下行信息的传输时间信息。
  22. 根据权利要求21所述的装置,其特征在于,所述发送模块还用于:
    在发送所述第一消息后,经过第一时间间隔,向所述第一网络设备再次发送所述第一消息。
  23. 根据权利要求20-22任一所述的装置,其特征在于,所述第二消息还包括所述第一传输时段的有效时间段。
  24. 根据权利要求19所述的装置,其特征在于,所述处理模块具体用于:
    根据传输时间信息确定所述时间分配模式。
  25. 根据权利要求8或11所述的装置,其特征在于,所述传输时间信息包括随机接入响应窗口的信息、竞争解决时长、非竞争接入资源配置信息、RRC响应等待时长、波束恢复时长中的一项或多项;
    其中,所述随机接入响应窗口是指所述终端设备在随机接入过程中等待第二网络设备返回随机接入响应消息的时间窗口,所述随机接入响应窗口的信息为所述随机接入响应窗口的大小,或者,所述随机接入响应窗口的信息包括所述随机接入响应窗口的起始点和结束点;
    所述竞争解决时长是指所述终端设备在随机接入过程中等待所述第二网络设备返回竞争解决信息的允许等待时长;
    所述非竞争接入资源配置信息包括所述终端设备以所述第二用户身份采用非竞争随机接入的方式进行随机接入时允许采用的随机接入时域资源;
    所述RRC响应等待时长是指所述终端设备等待所述第二网络设备返回RRC响应消息的允许等待时长;
    所述波束恢复时长是指所述终端设备以所述第二用户身份在进行波束恢复时允许的随机接入的时长。
  26. 根据权利要求19-25任一所述的装置,其特征在于,所述装置还用于:
    暂停或停止在第一时段内的第一无线链路监测,所述第一时段是指由所述时间分配模式指示的所述第一下行信息的传输时段,所述第一无线链路监测是由所述终端设备以第一用户身份进行的。
  27. 一种网络设备,其特征在于,所述网络设备包括处理器和通信接口;
    所述处理器用于执行权利要求1-5任一项所述的随机接入方法的程序,所述通信接口用于进行数据收发。
  28. 一种终端设备,其特征在于,所述终端设备支持第一用户身份和第二用户身份,所述终端设备包括处理器和通信接口;
    所述处理器用于执行权利要求6-13任一项所述的随机接入方法的程序,所述通信接口用于进行数据收发。
  29. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当所述指令在计算机上运行时,使得计算机执行权利要求1-5或6-13任一项所述的随机接入方法。
PCT/CN2019/109680 2019-09-30 2019-09-30 随机接入方法、装置、设备及存储介质 WO2021062759A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201980100853.3A CN114450897A (zh) 2019-09-30 2019-09-30 随机接入方法、装置、设备及存储介质
PCT/CN2019/109680 WO2021062759A1 (zh) 2019-09-30 2019-09-30 随机接入方法、装置、设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/109680 WO2021062759A1 (zh) 2019-09-30 2019-09-30 随机接入方法、装置、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2021062759A1 true WO2021062759A1 (zh) 2021-04-08

Family

ID=75336730

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/109680 WO2021062759A1 (zh) 2019-09-30 2019-09-30 随机接入方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN114450897A (zh)
WO (1) WO2021062759A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014201689A1 (zh) * 2013-06-21 2014-12-24 华为技术有限公司 一种通信设备的接入处理的方法、设备和通信系统
CN105636232A (zh) * 2014-11-28 2016-06-01 联芯科技有限公司 一种随机接入过程的处理方法和装置
CN106664130A (zh) * 2014-03-31 2017-05-10 高通股份有限公司 双sim双活动设备中的机会性移动接收分集
CN108810905A (zh) * 2017-05-04 2018-11-13 华为技术有限公司 传输上行信道的方法和装置及传输下行信道的方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014201689A1 (zh) * 2013-06-21 2014-12-24 华为技术有限公司 一种通信设备的接入处理的方法、设备和通信系统
CN106664130A (zh) * 2014-03-31 2017-05-10 高通股份有限公司 双sim双活动设备中的机会性移动接收分集
CN105636232A (zh) * 2014-11-28 2016-06-01 联芯科技有限公司 一种随机接入过程的处理方法和装置
CN108810905A (zh) * 2017-05-04 2018-11-13 华为技术有限公司 传输上行信道的方法和装置及传输下行信道的方法和装置

Also Published As

Publication number Publication date
CN114450897A (zh) 2022-05-06

Similar Documents

Publication Publication Date Title
US12028830B2 (en) Terminal device, wireless communication device, wireless communication method, and computer program
WO2018196520A1 (zh) 一种波束管理方法及终端设备、网络设备
US20230050355A1 (en) Wus for paging for rrc inactive states
WO2022012388A1 (zh) 一种通信方法及设备
WO2021179895A1 (zh) 一种通信方法及装置
CN114788403B (zh) 通信方法、设备及系统
CN113382379A (zh) 无线通信方法和通信装置
US20230319947A1 (en) Data Communication while in RRC Inactive State
US20220287004A1 (en) Communication control method and user equipment
CN117978345A (zh) 无线通信中的灵活下行链路控制信号监测
WO2021197233A1 (zh) 一种通信方法及设备
WO2020181943A1 (zh) 一种请求系统信息的方法及设备
WO2021109039A1 (zh) 一种通信方法、装置及设备
WO2022127777A1 (zh) 一种通信方法及通信装置
WO2021213014A1 (zh) 一种通信方法及装置
WO2022099539A1 (zh) 一种通信方法及装置
WO2022082772A1 (zh) 一种数据传输方法和相关装置
WO2021062759A1 (zh) 随机接入方法、装置、设备及存储介质
WO2021134763A1 (zh) 一种恢复传输的方法、装置及设备
CN115053626A (zh) 具有不可用时间的多sim ue协助信息
WO2024093986A1 (zh) 一种通信方法及装置
WO2024146301A1 (zh) 一种通信方法及装置
WO2024060844A1 (zh) 通信方法及相关装置
CN112770366B (zh) 一种通信方法与通信装置
JP7524992B2 (ja) 端末装置、無線通信装置、無線通信方法及びコンピュータプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19947652

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19947652

Country of ref document: EP

Kind code of ref document: A1