WO2021072706A1 - Procédé et appareil de communication - Google Patents

Procédé et appareil de communication Download PDF

Info

Publication number
WO2021072706A1
WO2021072706A1 PCT/CN2019/111720 CN2019111720W WO2021072706A1 WO 2021072706 A1 WO2021072706 A1 WO 2021072706A1 CN 2019111720 W CN2019111720 W CN 2019111720W WO 2021072706 A1 WO2021072706 A1 WO 2021072706A1
Authority
WO
WIPO (PCT)
Prior art keywords
network device
random access
detection result
access preamble
terminal
Prior art date
Application number
PCT/CN2019/111720
Other languages
English (en)
Chinese (zh)
Inventor
陈绍元
吴艺群
王磊
王超
陈雁
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201980096974.5A priority Critical patent/CN113892301B/zh
Priority to PCT/CN2019/111720 priority patent/WO2021072706A1/fr
Publication of WO2021072706A1 publication Critical patent/WO2021072706A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • This application relates to the field of communication, and in particular to a communication method and device.
  • the terminal device When the terminal device initiates a random access request, the terminal device sends a random access preamble to the serving base station.
  • the serving base station identifies the terminal device by analyzing the random access preamble, and sends a random access response to the terminal device, so as to allocate physical resources to the terminal device and provide network services.
  • the terminal device may need to send the random access preamble to the serving base station multiple times (such as 8 times), and the transmission power usually increases with the number of transmissions to improve the success rate of random access, but it also leads to The random access process takes a long time and consumes high power.
  • the serving base station can only identify one of the terminal devices, and the efficiency of random access is low.
  • the embodiments of the present application provide a communication method and device, which can improve the success rate and reliability of random access.
  • a communication method includes: a first network device obtains a first detection result, and based on the first detection result, sends a first random access response to the first terminal.
  • the first detection result is the detection result of the first random access preamble of the first terminal in the second network device.
  • the first network device can send the first random access to the first terminal according to the detection result of the first random access preamble of the first terminal in the second network device, that is, the first detection result. response.
  • the network device can accept the random access request initiated by the terminal according to the detection result of the random access preamble of the terminal by the adjacent network device of the network device, and send a random access response to the terminal, which can solve the problem
  • the detection result of the random access preamble of each terminal device by the network device is relatively close, which may cause the network device to be unable to distinguish between the multiple terminal devices initiated at the same time Random access requests, which in turn lead to the problem of failure of some or all of the random access requests, can improve the success rate and reliability of random access.
  • the first detection result may include: the first correlation value of the first random access preamble of the first terminal detected by the second network device.
  • the first network device determines that the first correlation value is greater than or equal to the correlation value threshold, the first network device accepts the random access request initiated by the first terminal and sends the first random access response to the first terminal.
  • the second network device may be an adjacent network device of the first network device.
  • the configuration information of the first random access preamble may be sent by the first network device to the second network device in advance, so that the second network device assists in detecting the first random access preamble of the first terminal. Therefore, in a possible design method, the communication method described in the first aspect may further include: the first network device sends first indication information to the second network device; wherein the first indication information is used to indicate one or more One first candidate random access preamble and its time-frequency resource configuration, one or more first candidate random access preambles include the first random access preamble.
  • the neighboring network device that is closer to the first network device may be selected to assist in detecting the first random access preamble. That is, optionally, the distance between the second network device and the first network device may be less than or equal to the distance threshold. For example, when there is a wireless connection between network devices, a wireless signal strength threshold, and/or a wireless signal quality threshold, etc. may also be used instead of the distance threshold.
  • the neighboring network device may determine by itself whether the distance between it and the first network device is less than or equal to the distance threshold, and determine whether to assist in detecting the first random access preamble according to the determination result. It is easy to understand that at this time, the neighboring network device can learn the location information of the first network device. Therefore, optionally, the communication method described in the first aspect may further include: the first network device sends the first location information of the first network device to the second network device. The first location information is used by the second network device to determine that the distance between the first network device and the second network device is less than or equal to the distance threshold.
  • the first network device may also determine which neighboring network devices assist in detecting the first random access preamble. At this time, the first network device needs to know the location information of its neighboring network devices. Therefore, optionally, the communication method described in the first aspect may further include: the first network device receives second location information of the second network device; wherein the second location information is used by the first network device to determine the first network device The distance from the second network device is less than or equal to the distance threshold. That is, the first network device may designate some neighboring network devices to assist in detecting the first random access preamble, so as to reduce the amount of invalid detection result data that needs to be transmitted, thereby saving transmission resource overhead between network devices.
  • the communication method described in the first aspect may further include: the first network device sends a first request to the second network device; wherein the first request is used to request the first detection result. It should be understood that for neighboring network devices that have not received the first request, they may not participate in assisting in detecting the first random access preamble, so as to save processing resources and transmission resources.
  • the random access preamble of the same terminal can be jointly detected based on the detection results of at least two network devices, so as to further improve the accuracy of detecting the random access preamble and the success rate and efficiency of random access requests, and can reduce The number of times the terminal device sends the random access preamble, which reduces the power consumption of the terminal device. Therefore, in a possible design method, the communication method described in the first aspect may further include: the first network device detects the first random access preamble, and obtains the second detection result.
  • the foregoing first network device sending the first random access response to the first terminal based on the first detection result may include: the first network device sending the first random access response to the first terminal based on the first detection result and the second detection result. Into the response.
  • the first detection result may include: the first correlation value of the first random access preamble of the first terminal detected by the second network device
  • the second detection result may include: the first random access preamble detected by the first network device.
  • the second correlation value of the first random access preamble of the terminal if the first network device determines that the weighted sum of the first correlation value and the second correlation value is greater than or equal to the correlation value threshold, the first network device accepts the random access request initiated by the first terminal and sends it to the first terminal The first random access response.
  • the communication method described in the first aspect can also be used to identify random access requests initiated by multiple terminal devices at the same time and using the same random access preamble, and to send random access responses to multiple terminal devices to Further improve the efficiency and reliability of random access. Therefore, in a possible design method, the communication method described in the first aspect may further include: the first network device obtains a third detection result; wherein the third detection result is the second random access preamble of the second terminal The detection result of the second network device. The first network device sends a second random access response to the second terminal based on the third detection result.
  • the third detection result may include: the third correlation value of the second random access preamble of the second terminal detected by the second network device.
  • the first network device determines that the third correlation value is greater than or equal to the correlation value threshold, the first network device accepts the random access request initiated by the second terminal and sends a second random access response to the second terminal.
  • the first network device may also adopt a joint detection method to determine whether to accept the random access request of the second terminal. Therefore, in another possible design method, the communication method described in the first aspect may further include: the first network device detects the second random access preamble of the second terminal to obtain a fourth detection result; The detection result is the detection result of the second random access preamble of the second terminal in the first network device. The first network device sends a second random access response to the second terminal based on the third detection result and the fourth detection result.
  • the fourth detection result may include: the fourth correlation value of the second random access preamble of the second terminal detected by the first network device.
  • the first network device determines that the weighted sum of the third correlation value and the fourth correlation value is greater than or equal to the correlation value threshold, the first network device accepts the random access request initiated by the second terminal and sends it to the second terminal Second random access response.
  • the weighting factor can be determined according to actual needs. For example, the value of the weighting factor may be negatively correlated with the value of the distance between the network device and the second terminal corresponding to any of the foregoing correlation values.
  • the foregoing first to fourth detection results may also be used to identify the first terminal and the second terminal that use the same random access preamble at the same time. Specifically, if the distance between the first terminal and the second terminal and the first network device is relatively close, the second correlation value is relatively close to the fourth correlation value. In this case, the first to fourth correlation values can be distinguished from the first to fourth correlation values.
  • the terminal and the second terminal Specifically, the following way one or way two can be used to identify the first terminal and the second terminal:
  • the first network device may determine that the first terminal and the second terminal are different terminals.
  • the first network device may It is determined that the first terminal and the second terminal are different terminals.
  • the first detection result may also include: the first transmission delay for the first random access preamble of the first terminal to reach the second network device
  • the second detection result may also include: the first random access of the first terminal
  • the third detection result may further include: the third transmission delay for the second random access preamble of the second terminal to reach the second network device
  • the fourth detection result may also include : The fourth transmission delay for the second random access preamble of the second terminal to reach the first network device.
  • the second correlation value is relatively close to the fourth correlation value.
  • the first to fourth transmission delays can be distinguished from each other.
  • a terminal and a second terminal to further improve the accuracy of identifying different terminals. Specifically, the following way three or way four can be used to identify the first terminal and the second terminal:
  • the first network device may determine that the first terminal and the second terminal are different terminals.
  • Manner 4 If the time deviation between the weighted sum of the first transmission delay and the second transmission delay and the weighted sum of the third transmission delay and the fourth transmission delay is greater than or equal to the timing deviation threshold, the first network The device may determine that the first terminal and the second terminal are different terminals.
  • first to fourth correlation values and the foregoing first to fourth transmission delays can also be combined to identify the first terminal and the second terminal, so as to further improve the accuracy of identifying different terminals.
  • manner 5 or manner 6 may be used to identify the first terminal and the second terminal:
  • the first network device can determine that the first terminal and the second terminal are different terminals.
  • the first network device can determine the first terminal and the second The terminals are different terminals.
  • the configuration information of the second random access preamble of the second terminal may also be sent by the first network device to the second network device in advance, so that The second network device assists in detecting the second random access preamble of the second terminal, so that the second network device can detect the candidate random access preambles configured by the first network device in a targeted manner, and does not need to check all the random access preambles specified in the protocol. Performing detection can reduce the number of candidate random access preambles that need to be detected, thereby improving detection efficiency.
  • the communication method described in the first aspect may further include: the first network device sends second indication information to the second network device; wherein the second indication information is used to indicate one or more Two second candidate random access preambles and their time-frequency resource configuration, one or more second candidate random access preambles include second random access preambles.
  • the first random access preamble and the second random access preamble may be the same random access preamble, and the first random access preamble and the second random access preamble may occupy the same physical resources. That is to say, even if different terminals use the same random access preamble to initiate random access requests at the same time, each of the different terminals can be identified, which can improve the efficiency of terminal identification, thereby improving the efficiency and reliability of random access .
  • a communication method includes: a second network device detects a first random access preamble from a first terminal, and obtains a first detection result of the first random access preamble.
  • the second network device sends third indication information to the first network device, where the third indication information is used to indicate the first detection result.
  • the first detection result may include: the first correlation value of the first random access preamble of the first terminal detected by the second network device.
  • the configuration information of the first random access preamble may be sent by the first network device to the second network device in advance, so that the second network device assists in detecting the first random access preamble of the first terminal. Therefore, in a possible design method, the communication method described in the second aspect may further include: the second network device receives the first indication information from the first network device; wherein the first indication information is used to indicate one or A plurality of first candidate random access preambles and their time-frequency resource configuration, and the one or more first candidate random access preambles include the first random access preamble.
  • the neighboring network device that is closer to the first network device may be selected to assist in detecting the first random access preamble. That is, the distance between the second network device and the first network device is less than or equal to the distance threshold.
  • the neighboring network device may determine by itself whether the distance between it and the first network device is less than or equal to the distance threshold, and determine whether to assist in detecting the first random access preamble according to the determination result. It is easy to understand that at this time, the neighboring network device needs to know the location information of the first network device. Therefore, optionally, the communication method described in the second aspect may further include: the second network device receives first location information of the first network device; wherein the first location information is used to determine whether the second network device is connected to the first network device. The distance between the devices is less than or equal to the distance threshold.
  • the first network device may also determine in advance which neighboring network devices can assist in detecting the first random access preamble. At this time, the first network device needs to know the location information of its neighboring network devices. Therefore, optionally, the communication method described in the second aspect may further include: the second network device sends the second location information of the second network device to the first network device.
  • the communication method of the second aspect may further include: the second network device receives a first request from the first network device; wherein, the first request is used to request the second network device to send the first network device to the first network device. Send the first test result.
  • the communication method described in the second aspect may also be used to identify random access requests initiated by multiple terminal devices, and send random access responses to multiple terminal devices, so as to further improve the efficiency of random access. Therefore, in a possible design method, the communication method described in the second aspect may further include: the second network device detects the second random access preamble from the second terminal, and obtains the third part of the second random access preamble. Test results. The second network device sends fourth indication information to the first network device, where the fourth indication information is used to indicate the third detection result.
  • the third detection result may include: the third correlation value of the second random access preamble of the second terminal detected by the second network device.
  • the first network device determines that the third correlation value is greater than or equal to the correlation value threshold, the first network device accepts the random access request initiated by the second terminal and sends a second random access response to the second terminal.
  • the configuration information of the second random access preamble of the second terminal may also be sent by the first network device to the second network device in advance, so that The second network device assists in detecting the second random access preamble of the second terminal. Therefore, in a possible design method, the communication method described in the second aspect may further include: the second network device receives second indication information from the first network device; wherein the second indication information is used to indicate one or A plurality of second candidate random access preambles and their time-frequency resource configuration, one or more second candidate random access preambles include a second random access preamble.
  • the first random access preamble and the second random access preamble may be the same random access preamble, and the first random access preamble and the second random access preamble may occupy the same physical resources.
  • a communication method includes: obtaining a fifth detection result, a sixth detection result, and a seventh detection result of a third random access preamble, and obtaining the location of the third terminal according to the fifth detection result, the sixth detection result, and the seventh detection result .
  • the third random access preamble is the random access preamble from the third terminal
  • the fifth detection result, the sixth detection result, and the seventh detection result are respectively: the detection result of the third random access preamble on a different network device .
  • the communication method described in the third aspect can obtain the position of the third terminal according to at least three detection results of the third random access preamble of the third terminal by different network equipment, that is, the terminal positioning can be completed in the random access phase , Instead of forcing the terminal to jump from the idle state to the connected state, or from the inactive state to the active state to complete the positioning operation, the signaling overhead and positioning processing delay in the positioning process can be reduced, thereby improving the positioning efficiency. Reduce terminal power consumption.
  • different network devices may include a third network device, a fourth network device, and a fifth network device.
  • the execution subject of the communication method described in the third aspect may be any one of the third network device, the fourth network device, and the fifth network device, or may be any network device other than the third network device, the fourth network device, and the third network device.
  • Another network device other than the fifth network device is not limited in this embodiment of the present application. Described below separately.
  • the execution subject of the communication method described in the third aspect is: another network device other than the third network device, the fourth network device, and the fifth network device.
  • obtaining the fifth detection result, the sixth detection result, and the seventh detection result of the third random access preamble may include: receiving fifth indication information from the third network device, where the fifth indication information is used to indicate the first Five detection results; among them, the fifth detection result is: the detection result of the third random access preamble on the third network device.
  • the sixth indication information is received from the fourth network device, where the sixth indication information is used to indicate the sixth detection result; where the sixth detection result is: the detection result of the third random access preamble in the fourth network device.
  • the communication method of the third aspect may further include: sending eighth indication information to the third network device, the fourth network device, and the fifth network device; where the eighth indication information is used to indicate one or more The third candidate random access preamble and its time-frequency resource configuration, one or more third candidate random access preambles include the third random access preamble, so that the third network device, the fourth network device, and the fifth network device can be targeted Assisting in detecting the third random access preamble of the third terminal, instead of all random access preambles specified in the blind detection protocol, can reduce the number of random access preambles that need to be detected, thereby improving detection efficiency and positioning efficiency.
  • the third network device, the fourth network device, and the fifth network device may actively feed back the fifth detection result, the sixth detection result, and the seventh detection result to the execution subject of the communication method described in the third aspect, or After receiving the assistance test request, the fifth test result, the sixth test result, and the seventh test result are fed back. Therefore, further, the communication method of the third aspect may further include: sending a second request to the third network device, the fourth network device, and the fifth network device; wherein the second request is used to request the third random access Leading detection result.
  • the execution subject of the communication method described in the third aspect may be any one of the third network device, the fourth network device, and the fifth network device, such as the third network device.
  • obtaining the fifth detection result, the sixth detection result, and the seventh detection result of the third random access preamble may include: the third network device detects the third random access preamble and obtains the fifth detection result; third The network device receives the sixth indication information from the fourth network device, where the sixth indication information is used to indicate the sixth detection result; where the sixth detection result is: the detection result of the third random access preamble in the fourth network device; Third, the network device receives the seventh indication information from the fifth network device, where the seventh indication information is used to indicate the seventh detection result; where the seventh detection result is: the detection result of the third random access preamble at the fifth network device.
  • the communication method of the third aspect may further include: acquiring third location information of the third network device, fourth location information of the fourth network device, and fifth location information of the fifth network device.
  • third network device, fourth network device, and fifth network device may be part of adjacent network devices of the network device that the terminal is trying to access, such as between the network device that the terminal is trying to access
  • Adjacent network devices whose distance is less than or equal to the distance threshold does not require all adjacent network devices to participate in detection, which can reduce the number of adjacent network devices assisting in detection and the detection workload, thereby improving detection efficiency and positioning efficiency.
  • the execution subject of the communication method described in the third aspect may be the serving base station or a neighboring base station of the serving base station, which is not limited in the embodiment of the present application.
  • a communication device in a fourth aspect, includes: a processing module and a transceiver module. Among them, the processing module is used to obtain the first detection result. The processing module is further configured to control the transceiver module to send the first random access response to the first terminal based on the first detection result. The first detection result is the detection result of the first random access preamble of the first terminal in the second network device.
  • the first detection result may include: the first correlation value of the first random access preamble of the first terminal detected by the second network device.
  • the processing module is further configured to accept the random access request initiated by the first terminal if the first correlation value is greater than or equal to the correlation value threshold, and control the transceiver module to send the first random access response to the first terminal.
  • the configuration information of the first random access preamble may be sent to the second network device in advance by the transceiver module, so that the second network device assists in detecting the first random access preamble of the first terminal. Therefore, in a possible design, the transceiver module is also used to send first indication information to the second network device; where the first indication information is used to indicate one or more first candidate random access preambles and their timing. Frequency resource configuration, the one or more first candidate random access preambles include the first random access preamble.
  • the neighboring network equipment that is close to the communication device described in the fourth aspect may be selected to assist in detecting the first random access preamble. That is, the distance between the second network device and the communication device in the fourth aspect is less than or equal to the distance threshold.
  • the neighboring network equipment may determine by itself whether the distance between it and the communication device described in the fourth aspect is less than or equal to the distance threshold, and determine whether to assist in detecting the first random access preamble according to the determination result. It is easy to understand that at this time, the neighboring network equipment needs to know the location information of the communication device described in the fourth aspect. Therefore, optionally, the transceiver module is further configured to send the first location information of the communication device described in the fourth aspect to the second network device. The first location information is used by the second network device to determine that the distance between the communication device described in the fourth aspect and the second network device is less than or equal to a distance threshold.
  • the communication device described in the fourth aspect may also determine which neighboring network equipment is needed to assist in detecting the first random access preamble. At this time, the communication device described in the fourth aspect needs to know the location of its neighboring network equipment. information. Therefore, optionally, the transceiver module is further configured to receive second location information of the second network device; wherein the second location information is used for the communication device described in the fourth aspect to determine the distance between it and the second network device Less than or equal to the distance threshold.
  • the communication device described in the fourth aspect can actively request its neighboring network equipment to assist in detecting the first random access preamble. Therefore, optionally, the transceiver module is also used to send a first request to the second network device; wherein the first request is used to request the first detection result.
  • the random access preamble of the same terminal can be jointly detected based on the detection results of at least two network devices, so as to further improve the accuracy of detecting the random access preamble and the success rate and efficiency of random access requests, and can reduce The number of times the terminal device sends the random access preamble, which reduces the power consumption of the terminal device. Therefore, in a possible design, the processing module is also used to control the transceiver module to detect the first random access preamble and obtain the second detection result. The processing module is further configured to control the transceiver module to send the first random access response to the first terminal based on the first detection result and the second detection result.
  • the first detection result may include: the first correlation value of the first random access preamble of the first terminal detected by the second network device
  • the second detection result may include: the communication device detection of the fourth aspect The second correlation value of the first random access preamble of the first terminal.
  • the processing module is further configured to accept the random access request initiated by the first terminal if the weighted sum of the first correlation value and the second correlation value is greater than or equal to the correlation value threshold, and control the transceiver module to send to the first terminal The first random access response.
  • the communication device described in the fourth aspect may also be used to identify random access requests initiated by multiple terminal devices, and send random access responses to multiple terminal devices, so as to further improve the efficiency of random access. Therefore, in a possible design, the processing module is also used to obtain the third detection result; where the third detection result is the detection result of the second random access preamble of the second terminal on the second network device. The processing module is further configured to control the transceiver module to send a second random access response to the second terminal based on the third detection result.
  • the third detection result may include: the third correlation value of the second random access preamble of the second terminal detected by the second network device.
  • the processing module is further configured to accept the random access request initiated by the second terminal if the third correlation value is greater than or equal to the correlation value threshold, and control the transceiver module to send the second random access response to the second terminal.
  • the communication device described in the fourth aspect may also adopt a joint detection method to determine whether to accept the random access request of the second terminal. Therefore, in another possible design, the processing module is also used to control the transceiver module to detect the second random access preamble of the second terminal to obtain the fourth detection result; wherein, the fourth detection result is the second terminal's first detection result. 2. The detection result of the communication device described in the fourth aspect of the random access preamble. The processing module is further configured to control the transceiver module to send a second random access response to the second terminal based on the third detection result and the fourth detection result.
  • the fourth detection result may include: the fourth correlation value of the second random access preamble of the second terminal detected by the communication device of the fourth aspect.
  • the processing module is further configured to accept the random access request initiated by the second terminal if the weighted sum of the third correlation value and the fourth correlation value is greater than or equal to the correlation value threshold, and control the transceiver module to send to the second terminal Second random access response.
  • the foregoing first to fourth detection results may also be used to identify the first terminal and the second terminal. Specifically, if the distance between the first terminal and the second terminal and the first network device is relatively close, the second correlation value is relatively close to the fourth correlation value. In this case, the first to fourth correlation values can be distinguished from the first to fourth correlation values.
  • the terminal and the second terminal Specifically, the following way one or way two can be used to identify the first terminal and the second terminal:
  • the processing module is further configured to determine that the first terminal and the second terminal are different terminals if the correlation value deviation between the first correlation value and the third correlation value is greater than or equal to the correlation value deviation threshold.
  • the processing module is also used to provide that if the weighted sum of the first correlation value and the second correlation value, the correlation value deviation from the weighted sum of the third correlation value and the fourth correlation value is greater than or equal to the correlation value deviation threshold, Then it can be determined that the first terminal and the second terminal are different terminals.
  • the first detection result may also include: the first transmission delay for the first random access preamble of the first terminal to reach the second network device
  • the second detection result may also include: the first random access of the first terminal
  • the third detection result may further include: the third transmission delay for the second random access preamble of the second terminal to reach the second network device
  • the fourth detection The result may also include: the fourth transmission delay for the second random access preamble of the second terminal to reach the communication device described in the fourth aspect.
  • the second correlation value is relatively close to the fourth correlation value.
  • the time delay distinguishes the first terminal and the second terminal. Specifically, the following way three or way four can be used to identify the first terminal and the second terminal:
  • the processing module is further configured to determine that the first terminal and the second terminal are different terminals if the time deviation between the first transmission delay and the third transmission delay is greater than or equal to the timing deviation threshold.
  • the processing module is also used to provide if the weighted sum of the first transmission delay and the second transmission delay, the time deviation from the weighted sum of the third transmission delay and the fourth transmission delay is greater than or equal to the timing deviation Threshold, it can be determined that the first terminal and the second terminal are different terminals.
  • first to fourth correlation values and the foregoing first to fourth transmission delays may also be combined to identify the first terminal and the second terminal.
  • manner 5 or manner 6 may be used to identify the first terminal and the second terminal:
  • the processing module is further used to provide if the correlation value deviation between the first correlation value and the third correlation value is greater than or equal to the correlation value deviation threshold, and the time deviation between the first transmission delay and the third transmission delay If it is greater than or equal to the timing deviation threshold, it can be determined that the first terminal and the second terminal are different terminals.
  • the processing module is also used to provide that if the weighted sum of the first correlation value and the second correlation value, the correlation value deviation between the weighted sum of the third correlation value and the fourth correlation value is greater than or equal to the correlation value deviation threshold, And the time deviation between the weighted sum of the first transmission delay and the second transmission delay and the weighted sum of the third transmission delay and the fourth transmission delay is greater than or equal to the timing deviation threshold, it can be determined that the first terminal and the The second terminal is a different terminal.
  • the configuration information of the second random access preamble of the second terminal may also be sent by the first network device to the second network device in advance, so that The second network device assists in detecting the second random access preamble of the second terminal. Therefore, in a possible design, the transceiver module is also used to send second indication information to the second network device; where the second indication information is used to indicate one or more second candidate random access preambles and their timing. Frequency resource configuration, one or more second candidate random access preambles include a second random access preamble.
  • the first random access preamble and the second random access preamble may be the same random access preamble, and the first random access preamble and the second random access preamble may occupy the same physical resources.
  • the communication device of the fourth aspect may further include a storage module that stores programs or instructions.
  • the processing module executes the program or instruction
  • the communication device described in the fourth aspect can execute the function of the first network device described in any implementation manner of the first aspect.
  • the communication device described in the fourth aspect may be the first network device described in the first aspect to the second aspect, such as a serving base station, or a chip or chip system set in the first network device. This application does not limit this.
  • a communication device in a fifth aspect, includes: a processing module and a transceiver module.
  • the processing module is configured to detect the first random access preamble from the first terminal, and obtain the first detection result of the first random access preamble.
  • the transceiver module is configured to send third indication information to the first network device, and the third indication information is used to indicate the first detection result.
  • the first detection result may include: the first correlation value of the first random access preamble of the first terminal detected by the communication device of the fifth aspect.
  • the configuration information of the first random access preamble may be sent by the first network device to the communication device according to the fifth aspect in advance, so that the communication device according to the fifth aspect assists in detecting the first terminal's The first random access preamble. Therefore, in a possible design, the transceiver module is also used to receive the first indication information from the first network device; where the first indication information is used to indicate one or more first candidate random access preambles and their In the time-frequency resource configuration, the one or more first candidate random access preambles include the first random access preamble.
  • the neighboring network device that is closer to the first network device may be selected to assist in detecting the first random access preamble. That is to say, the distance between the communication device in the fifth aspect and the first network device is less than or equal to the distance threshold.
  • the neighboring network device may determine by itself whether the distance between it and the first network device is less than or equal to the distance threshold, and determine whether to assist in detecting the first random access preamble according to the determination result. It is easy to understand that at this time, the neighboring network device needs to know the location information of the first network device. Therefore, optionally, the transceiver module is further configured to receive first location information of the first network device; wherein the first location information is used to determine that the distance between the communication device of the fifth aspect and the first network device is less than Or equal to the distance threshold.
  • the first network device may also determine in advance which neighboring network devices are needed to assist in detecting the first random access preamble, and at this time, the first network device needs to know the location information of its neighboring network devices. Therefore, optionally, the transceiver module is further configured to send the second location information of the communication device described in the fifth aspect to the first network device.
  • the transceiver module is further configured to receive a first request from the first network device; wherein the first request is used to request the communication device of the fifth aspect to send the first detection result to the first network device.
  • the communication device described in the fifth aspect may also be used to identify random access requests initiated by multiple terminal devices, and send random access responses to multiple terminal devices, so as to further improve the efficiency of random access. Therefore, in a possible design, the processing module is also used to control the transceiver module to detect the second random access preamble from the second terminal, and obtain the third detection result of the second random access preamble. The transceiver module is further configured to send fourth indication information to the first network device, where the fourth indication information is used to indicate the third detection result.
  • the third detection result may include: the third correlation value of the second random access preamble of the second terminal detected by the communication device of the fifth aspect.
  • the configuration information of the second random access preamble of the second terminal may also be sent in advance by the first network device to the fifth aspect.
  • a communication device so that the communication device of the fifth aspect assists in detecting the second random access preamble of the second terminal. Therefore, in a possible design, the transceiver module is also used to receive second indication information from the first network device; where the second indication information is used to indicate one or more second candidate random access preambles and their In the time-frequency resource configuration, the one or more second candidate random access preambles include the second random access preamble.
  • the first random access preamble and the second random access preamble may be the same random access preamble, and the first random access preamble and the second random access preamble may occupy the same physical resources.
  • the communication device of the fifth aspect may further include a storage module that stores programs or instructions. When the processing module executes the program or instruction, the communication device described in the fifth aspect can execute the function of the second network device described in any one of the implementation modes in the second aspect.
  • the communication device described in the fifth aspect may be the second network device described in the first aspect to the second aspect, such as a neighboring base station of a serving base station, or a chip set in the second network device. Or chip system, this application does not limit this.
  • a communication device in a sixth aspect, includes: a processing module and a transceiver module.
  • the processing module is used to obtain the fifth detection result, the sixth detection result, and the seventh detection result of the third random access preamble.
  • the processing module is further configured to obtain the location of the third terminal according to the fifth detection result, the sixth detection result, and the seventh detection result.
  • the third random access preamble is the random access preamble from the third terminal
  • the fifth detection result, the sixth detection result, and the seventh detection result are respectively: the detection result of the third random access preamble on a different network device .
  • the transceiver module is configured to receive detection results from different network devices, such as neighboring network devices of the communication device, and/or, under the control of the processing module, receive the third random access preamble from the third terminal.
  • different network devices may include a third network device, a fourth network device, and a fifth network device.
  • the communication device may be any one of the third network device, the fourth network device, and the fifth network device, or it may be another network device in addition to the third network device, the fourth network device, and the fifth network device.
  • a network device which is not limited in the embodiment of this application. Described below separately.
  • the communication device may be: another network device other than the third network device, the fourth network device, and the fifth network device.
  • the transceiver module is further configured to receive fifth indication information from the third network device, where the fifth indication information is used to indicate the fifth detection result; wherein, the fifth detection result is: the third random access preamble is in the third The test result of the network device.
  • the transceiver module is further configured to receive sixth indication information from the fourth network device, where the sixth indication information is used to indicate the sixth detection result; where the sixth detection result is: the third random access preamble is in the fourth network device Test results.
  • the transceiver module is further configured to receive seventh indication information from the fifth network device, where the seventh indication information is used to indicate the seventh detection result; wherein, the seventh detection result is: the third random access preamble is in the fifth network device Test results.
  • the transceiver module is further configured to send eighth indication information to the third network device, the fourth network device, and the fifth network device; where the eighth indication information is used to indicate one or more third candidate random access
  • the preamble and its time-frequency resource configuration, one or more third candidate random access preambles include the third random access preamble, so that the third network device, the fourth network device, and the fifth network device can assist in detecting the third terminal of the third terminal. Random access preamble.
  • the third network device, the fourth network device, and the fifth network device can actively feed back the fifth detection result, the sixth detection result, and the seventh detection result to the communication device, or they can feed back the second detection result after receiving the assisted detection request.
  • the communication device may also be any one of the third network device, the fourth network device, and the fifth network device, such as the third network device.
  • the transceiver module is also used to detect the third random access preamble and obtain the fifth detection result.
  • the transceiver module is further configured to receive sixth indication information from the fourth network device, where the sixth indication information is used to indicate the sixth detection result; where the sixth detection result is: the third random access preamble is in the fourth network device Test results.
  • the transceiver module is further configured to receive seventh indication information from the fifth network device, where the seventh indication information is used to indicate the seventh detection result; wherein, the seventh detection result is: the third random access preamble is in the fifth network device Test results.
  • the processing module is further configured to obtain third location information of the third network device, fourth location information of the fourth network device, and fifth location information of the fifth network device.
  • the communication device of the sixth aspect may further include a storage module, and the storage module stores a program or instruction.
  • the processing module executes the program or instruction
  • the communication device described in the third aspect can execute the function of the network device described in any implementation manner of the third aspect.
  • the communication device described in the sixth aspect may be a network device, such as a base station, or a chip or a chip system set in the network device, which is not limited in this application.
  • a communication device configured to execute the communication method described in any one of the possible implementation manners of the first aspect to the third aspect.
  • the communication device described in the seventh aspect may further include a processing module and a transceiver module.
  • the processing module is configured to execute the processing function of any network device described in any one of the implementation manners of the first aspect to the third aspect.
  • the transceiver module is configured to perform the transceiver function of any network device described in any one of the implementation manners of the first aspect to the third aspect.
  • the communication device of the seventh aspect may further include a storage module, and the storage module stores a program or an instruction.
  • the processing module executes the program or instruction
  • the communication device described in the seventh aspect can execute the communication method described in any one of the implementation manners of the first aspect to the third aspect.
  • the communication device described in the seventh aspect may be a network device, such as a base station, or a chip or a chip system set in the network device, which is not limited in this application.
  • a communication device in an eighth aspect, includes: a processor coupled with a memory, the memory is used to store a computer program; the processor is used to execute the computer program stored in the memory, so that the communication device executes any one of the first aspect to the third aspect One possible implementation of the communication method described.
  • the communication device described in the eighth aspect may further include a transceiver.
  • the transceiver can be a transceiver circuit or an input/output interface.
  • the transceiver can be used for the communication device to communicate with other communication devices.
  • the communication device described in the eighth aspect may be a terminal device and/or a network device, or a chip or a chip system provided in the terminal device and/or the network device.
  • a chip system in a ninth aspect, includes a processor and an input/output port.
  • the processor is used to implement the processing functions involved in the first to third aspects, and the input/output port is used to implement The transceiver functions involved in the first to third aspects.
  • the chip system further includes a memory, and the memory is used to store program instructions and data for realizing the functions involved in any one of the first aspect to the third aspect.
  • the chip system can be composed of chips, or include chips and other discrete devices.
  • a communication system in a tenth aspect, includes one or more terminal devices and multiple network devices.
  • a computer-readable storage medium including: computer instructions are stored in the computer-readable storage medium; when the computer instructions are executed on a computer, the computer is caused to execute the first to third aspects. Any one of the possible implementations of the communication method.
  • a computer program product containing instructions including a computer program or instruction, when the computer program or instruction runs on a computer, the computer can execute any one of the first to third aspects.
  • FIG. 1 is a schematic diagram 1 of the architecture of a communication system provided by an embodiment of this application;
  • FIG. 2 is a second schematic diagram of the architecture of the communication system provided by an embodiment of this application.
  • FIG. 3 is a first structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 4 is a first schematic flowchart of a communication method provided by an embodiment of this application.
  • FIG. 5 is a second schematic flowchart of a communication method provided by an embodiment of this application.
  • FIG. 6 is a third schematic flowchart of a communication method provided by an embodiment of this application.
  • FIG. 7 is a fourth flowchart of a communication method provided by an embodiment of this application.
  • FIG. 8 is a fifth schematic flowchart of a communication method provided by an embodiment of this application.
  • FIG. 9 is a sixth flowchart of a communication method provided by an embodiment of this application.
  • FIG. 10 is a second structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a network device provided by an embodiment of this application.
  • FIG. 12 is a third structural diagram of a communication device provided by an embodiment of this application.
  • the technical solutions of the embodiments of the present application can be applied to various communication systems, such as the 4th generation (4G) mobile communication system, such as the long term evolution (LTE) system, and the worldwide interoperability for microwave access.
  • 4G 4th generation
  • LTE long term evolution
  • Microwave access (WiMAX) communication systems 5th generation mobile communication systems
  • 5G fifth generation mobile communication systems
  • NR new radio
  • 6G sixth generation mobile communications System and so on.
  • the subscript sometimes as W 1 may form a clerical error at non-target as W1, while not emphasize the difference, to express their meaning is the same.
  • FIG. 1 and FIG. 2 are taken as an example to describe in detail the communication system applicable to the embodiments of the present application.
  • FIG. 1 is a schematic structural diagram of a communication system 1 to which the communication method provided in an embodiment of the application is applicable.
  • the communication system includes at least two network devices, such as a first network device and a second network device, and at least one terminal device, such as a first terminal and a second terminal.
  • the first network device is configured to obtain a first detection result, and based on the first detection result, send a first random access response to the first terminal.
  • the first detection result is the detection result of the first random access preamble of the first terminal in the second network device.
  • the second network device is configured to detect the first random access preamble from the first terminal, and obtain the first detection result of the first random access preamble.
  • the second network device is further configured to send third indication information to the first network device, where the third indication information is used to indicate the first detection result.
  • the first terminal is configured to send a first random access preamble to the first network device and receive a first random access response from the first network device.
  • FIG. 2 is a schematic diagram of the architecture of the second communication system to which the communication method provided in the embodiment of the application is applicable.
  • the communication system includes at least three network devices, such as a third network device, a fourth network device, and a fifth network device, and at least one terminal device, such as a third terminal.
  • any one of the at least three network devices is used to perform the following communication method to obtain the location of the third terminal: obtain the fifth detection result, the sixth detection result, and the seventh detection result of the third random access preamble , And obtain the location of the third terminal according to the fifth detection result, the sixth detection result, and the seventh detection result.
  • the third random access preamble is the random access preamble from the third terminal
  • the fifth detection result, the sixth detection result, and the seventh detection result are respectively: the detection result of the third random access preamble on a different network device .
  • the different network devices may be any three network devices among the above-mentioned at least three network devices, such as the third network device, the fourth network device, and the fifth network device.
  • the execution subject of the communication method for acquiring the location of the third terminal may be a network device accessed by the third terminal, such as a serving base station, or a neighboring network device of the network device accessed by the third terminal.
  • a neighboring base station of the serving base station which is not specifically limited in the embodiment of the present application.
  • the above-mentioned network device is a device that is located on the network side of the above-mentioned communication system and has a wireless transceiving function, or a chip or chip system that can be installed in the device.
  • the network equipment includes but is not limited to: access points (APs) in wireless fidelity (WiFi) systems, such as home gateways, routers, servers, switches, bridges, etc., evolved node B (evolved) Node B, eNB), radio network controller (RNC), node B (Node B, NB), base station controller (BSC), base transceiver station (BTS), home Base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (BBU), wireless relay node, wireless backhaul node, transmission point (transmission and reception point, TRP or transmission point, TP) It can also be 5G, such as the gNB in the new radio (NR) system, or the transmission point (TRP or TP), one or a group
  • the above-mentioned terminal equipment is a terminal that is connected to the above-mentioned communication system and has a wireless transceiver function, or a chip or chip system that can be installed in the terminal.
  • the terminal device may also be called a user device, an access terminal, a user unit, a user station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, a user agent, or a user device.
  • the terminal device in the embodiment of the present application may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (VR) terminal device, and an augmented reality (AR) terminal Equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, transportation safety ( Wireless terminals in transportation safety, wireless terminals in smart cities, wireless terminals in smart homes, vehicle-mounted terminals, RSUs with terminal functions, etc.
  • the terminal device of the present application may also be a vehicle-mounted module, vehicle-mounted module, vehicle-mounted component, vehicle-mounted chip, or vehicle-mounted unit built into a vehicle as one or more components or units. The vehicle passes through the built-in vehicle-mounted module, vehicle-mounted module, The on-board component, on-board chip, or on-board unit can implement the communication method provided in this application.
  • the communication method provided by the embodiments of the present application can be used between any two nodes shown in FIG. 1, such as between terminal devices, between network devices, and between terminal devices and network devices.
  • For communication between terminal devices if there is a network device, it is a scenario with network coverage; if there is no network device, it is a scenario without network coverage.
  • communication between terminal devices can be performed using resources configured by the network device, and in a scenario without network coverage, communication between terminal devices can be performed using pre-configured resources.
  • FIGS. 1 and 2 are only simplified schematic diagrams for ease of understanding and examples.
  • the communication system shown in FIGS. 1 and 2 may also include other network devices, and/or other terminal devices, which are not shown in FIGS. 1 and 2. Draw it out.
  • FIG. 3 is a schematic structural diagram of a communication device 300 that can be used to implement the communication method provided by an embodiment of the present application.
  • the communication device 300 may be a network device, or a chip applied to the network device or other components with network device functions.
  • the communication device 300 may include a processor 301 and a transceiver 303. Wherein, the processor 301 is coupled with the transceiver 303, for example, can be connected through a communication bus.
  • the communication device 300 may further include a memory 302.
  • the memory 302 may be integrated with the processor 301, such as the internal cache of the processor 301, or it may be an external memory independent of the processor 301 and coupled with the processor 301, such as connected to the processor 301 through a communication bus. External cache.
  • the processor 301 is the control center of the communication device 300, and may be a processor or a collective name for multiple processing elements.
  • the processor 301 is one or more central processing units (CPU), or may be an application specific integrated circuit (ASIC), or may be configured to implement one or more of the embodiments of the present application.
  • An integrated circuit for example: one or more microprocessors (digital signal processors, DSP), or one or more field programmable gate arrays (FPGA).
  • the processor 301 can execute various functions of the communication device 300 by running or executing a software program stored in the memory 302 and calling data stored in the memory 302.
  • the processor 301 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 3.
  • the communication device 300 may also include multiple processors, such as the processor 301 and the processor 304 shown in FIG. 3. Each of these processors can be a single-core processor (single-CPU) or a multi-core processor (multi-CPU).
  • the processor here may refer to one or more communication devices, circuits, and/or processing cores for processing data (for example, computer program instructions).
  • the memory 302 can be a read-only memory (ROM) or other types of static storage communication devices that can store static information and instructions, a random access memory (RAM), or other types that can store information and instructions.
  • the type of dynamic storage communication equipment can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disk storage, Optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, Blu-ray disc, etc.), magnetic disk storage media or other magnetic storage communication devices, or can be used to carry or store desired program codes in the form of instructions or data structures and Any other medium that can be accessed by the computer, but not limited to this.
  • EEPROM electrically erasable programmable read-only memory
  • CD-ROM compact disc read-only memory
  • Optical disc storage including compact disc, laser disc, optical disc, digital versatile disc, Blu-ray disc, etc.
  • magnetic disk storage media or other magnetic storage communication devices or can be used to carry or store desired program codes in the
  • the memory 302 is used to store a software program for executing the solution of the application, and the processor 301 controls the execution.
  • the processor 301 controls the execution.
  • the transceiver 303 is used for communication with other communication devices.
  • the communication apparatus 300 is a terminal device, and the transceiver 303 may be used to communicate with a network device or to communicate with another terminal device.
  • the communication device 300 is a network device, and the transceiver 303 may be used to communicate with a terminal device or to communicate with another network device.
  • the transceiver 303 may include a receiver and a transmitter (not separately shown in FIG. 3). Among them, the receiver is used to realize the receiving function, and the transmitter is used to realize the sending function.
  • the transceiver 303 may be integrated with the processor 301, or may exist independently, and is coupled with the processor 301 through the input/output port (not shown in FIG. 3) of the communication device 300, which is not specifically limited in the embodiment of the present application. .
  • the structure of the communication device 300 shown in FIG. 3 does not constitute a limitation on the communication device.
  • the actual communication device may include more or less components than those shown in the figure, or combine certain components, or Different component arrangements.
  • the execution subject of the communication method shown in any one of FIG. 4 to FIG. 9 may be a network device, or may be a device, module, subsystem, or device set in the network device.
  • Other components such as chips, processors, processing circuits, etc.
  • the embodiments of this application will collectively refer to network devices that can perform any of the communication methods provided in the embodiments of this application, or devices, modules, subsystems, or other components provided in the network devices, as network devices.
  • FIG. 4 is a first schematic flowchart of a communication method provided by an embodiment of this application. This communication method can be applied to the communication between network devices, between terminal devices, and between network devices and terminal devices as shown in FIG. 1.
  • the communication method includes the following steps:
  • S401 The first terminal sends a first random access preamble.
  • the first terminal may select one from one or more first candidate random access preambles configured by the first network device and send it out.
  • the first terminal may select one of the first candidate random access preambles as the first random access preamble according to the configuration information of one or more first candidate random access preambles, such as a sequence number.
  • the one or more first candidate random access preambles may be random access preambles in the random access preamble set configured by the first network device, and the configuration information of the first random access preamble may be the configuration of the random access preamble set. Part of the message.
  • the configuration information of the random access preamble set may also include: uplink physical resources for sending any candidate random access preamble.
  • the uplink physical resources may include time domain resources and/or frequency domain resources.
  • the configuration information of the foregoing random access preamble set may be broadcast by the first network device to all terminal devices in the coverage area of the first network device.
  • the configuration information of the random access preamble set may also be sent by the first network device to the second network device, so that the second network device assists in detecting the first random access preamble of the first terminal, that is, execute The following S402-S404. Therefore, in a possible design method, the communication method shown in FIG. 4 may further include: the first network device sends first indication information to the second network device; wherein the first indication information is used to indicate one or more The first candidate random access preamble and its time-frequency resource configuration, and the one or more first candidate random access preambles include the first random access preamble.
  • the first network device may send a random access preamble set to some or all of the adjacent network devices of the first network device through a wired or wireless interface between its neighboring network devices, such as an X2 interface or an Xn interface Configuration information.
  • the configuration information of the random access preamble set configured by the first network device may also be uniformly sent by the core network device to the first network device and the second network device, such as sending the first network device to the second network device.
  • the configuration information of the random access preamble set configured by the device, and the configuration information of the random access preamble set configured by the second network device is sent to the first network device.
  • the embodiment of the present application does not limit the specific implementation manner in which the second network device obtains the configuration information of the random access preamble set of the first network device.
  • the second network device detects the first random access preamble from the first terminal, and obtains a first detection result of the first random access preamble.
  • the first detection result is the detection result of the first random access preamble of the first terminal in the second network device.
  • the first detection result may include: the first correlation value and/or the first transmission delay of the first random access preamble of the first terminal detected by the second network device.
  • the first correlation value is: the local sequence generated by the second network device according to the sequence number of one or more first candidate random access preambles, and the received radio signal from the first terminal that carries the first random access preamble The maximum value of the cumulative sum of correlation operations.
  • the first transmission delay is: the wireless signal from the first terminal and carrying the first random access preamble reaches the transmission delay of the second network device.
  • the transmission delay may be the difference between the arrival time of the wireless signal to the second network device and the transmission time of the wireless signal.
  • the transmission time may be determined by the transmission time stamp carried by the wireless signal.
  • the transmission time of the radio signal carrying any candidate random access preamble may also be known based on the uplink physical resources of any candidate random access preamble, such as time domain resources.
  • the neighboring network device that is closer to the first network device may be selected to assist in detecting the first random access preamble. That is, the distance between the second network device and the first network device is less than or equal to the distance threshold.
  • the distance threshold can be comprehensively determined in combination with the wireless channel model and the propagation mode of the radio wave, and the distance threshold can be the distance value between the first network device and its neighboring network devices, or the signal strength and/or corresponding to the distance value.
  • signal quality such as a reference signal receiving power (RSRP) threshold, and/or a reference signal receiving quality (RSRQ) threshold, etc.
  • RSRP reference signal receiving power
  • RSRQ reference signal receiving quality
  • the neighboring network device can determine by itself whether the distance between it and the first network device is less than or equal to the distance threshold, and determine whether to assist in detecting the first random access preamble according to the determination result. It is easy to understand that at this time, the neighboring network device needs to know the location information of the first network device. Therefore, optionally, the communication method shown in FIG. 4 may further include: the first network device sends the first location information of the first network device to the second network device. The first location information is used by the second network device to determine that the distance between the first network device and the second network device is less than or equal to the distance threshold.
  • the first network device may also determine which neighboring network devices are needed to assist in detecting the first random access preamble. At this time, the first network device needs to know the location information of its neighboring network devices. Therefore, optionally, the communication method shown in FIG. 4 may further include: the first network device receives second location information of the second network device; wherein the second location information is used by the first network device to determine whether the first network device is connected to the The distance between the second network devices is less than or equal to the distance threshold.
  • the above two methods of determining that the distance between the first network device and the second network device is less than or equal to the distance threshold can also be used in combination, which is not limited in the embodiment of the present application.
  • the first network device may actively request its neighboring network devices to assist in detecting the first random access preamble. Therefore, optionally, the communication method shown in FIG. 4 may further include: the first network device sends a first request to the second network device; wherein the first request is used to request the first detection result.
  • the first request may be an explicit indication
  • the first request may be an implicit indication.
  • the foregoing display indication may be sent to the second network device along with the configuration information of the candidate random access preamble set configured by the first network device, or may be sent to the second network device separately.
  • the above implicit indication can be implemented in the following manner: as long as the second network device receives the configuration information of the candidate random access preamble set configured by the first network device, the second network device assists the first network device to detect the first network device by default. Randomly access the preamble, and feed back the first detection result of the first random access preamble to the first network device.
  • S403 The second network device sends third indication information to the first network device.
  • the third indication information is used to indicate the first detection result.
  • the third indication information may be the first detection result itself, or may be other information used to obtain the first detection result.
  • the second network device may also send all or part of the correlation values of the first candidate random access preamble to the first network device, and the first network device selects the maximum value among the correlation values as the first correlation value.
  • the second network device may also only send the foregoing arrival time and sending time to the first network device, and the first network device calculates the first transmission delay.
  • the second network device may also only send the aforementioned arrival time to the first network device, and the first network device receives and obtains the transmission time carried in the wireless signal carrying the first random access preamble, and based on the arrival time and the transmission time Calculate the first transmission delay.
  • the first network device may obtain the first detection result according to the third indication information.
  • the third indication information For the specific implementation, refer to S403, which will not be repeated here.
  • the first network device sends a first random access response to the first terminal based on the first detection result.
  • the first network device sending the first random access response to the first terminal based on the first detection result may include:
  • the first network device determines that the first correlation value is greater than or equal to the correlation value threshold, the first network device accepts the random access request initiated by the first terminal, and sends the first random access response to the first terminal.
  • the relevant value threshold can be determined according to actual requirements, such as determining a specific value according to simulation results.
  • the first random access response may include configuration information such as a network temporary identifier, a timing advance, and uplink physical resources allocated to the first terminal.
  • the first network device can send the first random access response to the first terminal according to the detection result of the first random access preamble of the first terminal in the second network device, that is, the first detection result .
  • the network device can accept the random access request initiated by the terminal according to the detection result of the random access preamble of the terminal by the adjacent network device of the network device, and send a random access response to the terminal, which can solve the problem
  • the detection result of the random access preamble of each terminal device by the network device is relatively close, which may cause the network device to be unable to distinguish the random access preambles initiated by the multiple terminal devices. Access requests, which in turn lead to the problem of partial or all random access requests fail, can improve the success rate and reliability of random access.
  • the detection results of the first random access preamble from the same terminal by at least two network devices may be combined to determine whether to accept the random access request of the terminal device, that is, through joint detection, the detection of random access is further improved.
  • the accuracy of the preamble and the success rate and efficiency of random access requests can reduce the number of times that the terminal device sends the random access preamble and reduce the power consumption of the terminal device.
  • FIG. 5 is a second schematic diagram of the flow of the communication method provided by an embodiment of the application. As shown in FIG. 5, the communication method shown in FIG. 4 may further include the following steps:
  • the first network device detects the first random access preamble, and obtains a second detection result.
  • the second detection result may include: the second correlation value of the first random access preamble of the first terminal detected by the first network device, and/or the second transmission delay.
  • the second correlation value and the second transmission delay may refer to the first correlation value and the first transmission delay in S402, which will not be repeated here.
  • S501 can be executed before S402, can also be executed after S402, and S501 and S402 can also be executed simultaneously. That is, the embodiment of the present application does not specifically limit the execution order of S501 and S402.
  • the first network device sends the first random access response to the first terminal based on the first detection result, which may be specifically implemented as follows:
  • the first network device sends a first random access response to the first terminal based on the first detection result and the second detection result.
  • the first network device determines that the weighted sum of the first correlation value and the second correlation value is greater than or equal to the correlation value threshold, the first network device accepts the random access request initiated by the first terminal and sends it to the first terminal The first random access response.
  • the first terminal may be caused the correlation value of the first random access preamble from the first terminal detected by the second network device, that is, the first correlation value, and the correlation value of the first random access preamble from the first terminal detected by the first network device.
  • the value, that is, the second correlation value is less than the correlation value threshold.
  • the weighted sum of the first correlation value and the second correlation value may be greater than or equal to the correlation value threshold.
  • the weighted sum of the first correlation value and the second correlation value can be used to determine whether to accept the random access request of the first terminal, which can improve the accuracy of detecting the first random access preamble and the random access request. Success rate and efficiency, and achieve the purpose of reducing terminal power consumption.
  • the weighting coefficient can be determined based on factors such as the distance between the first network device and its neighboring network devices, signal strength, signal quality, etc., such as the negative correlation between the weighting coefficient and the distance, the positive correlation of the weighting coefficient signal strength, and the signal quality, etc.
  • the embodiment does not specifically limit the method for determining the weighting coefficient.
  • two or more may also be used.
  • three network devices perform joint detection on the detection result of the first random access preamble of the first terminal.
  • the number of network devices involved in the joint detection is not specifically limited.
  • the communication method shown in FIG. 4 or FIG. 5 can also be used to identify random access requests initiated simultaneously by multiple terminal devices using the same random access preamble, and to send random access responses to multiple terminal devices to Further improve the efficiency of random access.
  • the term “simultaneously” can be understood as at the same time, or within the same period of time, or within the same period.
  • FIG. 6 is a third schematic flowchart of a communication method provided by an embodiment of this application. With reference to FIG. 4 or FIG. 5, taking FIG. 4 as an example, as shown in FIG. 6, the communication method may further include the following steps:
  • S601 The second terminal sends a second random access preamble.
  • the configuration information of the second random access preamble of the second terminal can also be sent by the first network device to the second terminal in a broadcast manner, and passed The wired or wireless interface between the first network device and the second network device is sent to the second network device, so that the second network device assists in detecting the second random access preamble of the second terminal. Therefore, in a possible design method, the communication method shown in FIG. 6 may further include: the first network device sends second indication information to the second network device; wherein the second indication information is used to indicate one or more The second candidate random access preamble, and uplink physical resources that carry each second candidate random access preamble, such as uplink time-frequency resources.
  • the one or more second candidate random access preambles include a second random access preamble.
  • the second indication information and the first indication information may also be the same indication information, and one or more second candidate random access preambles and one or more first candidate random access preambles may also be the same group Candidate random access preamble.
  • the first random access preamble and the second random access preamble may be selected by the first terminal and the second terminal from the same set of candidate random access preambles, that is, the random access preamble set configured by the first network device Random access preamble.
  • the first random access preamble and the second random access preamble may be the same random access preamble, and the first random access preamble and the second random access preamble may occupy the same physical resources.
  • S601 may be executed before S401 or after S401, and S601 and S401 may also be executed at the same time. That is, the embodiment of the present application does not specifically limit the execution order of S601 and S401.
  • the second network device detects a second random access preamble from the second terminal, and obtains a third detection result of the second random access preamble.
  • the third detection result is the detection result of the second random access preamble of the second terminal in the second network device.
  • the third detection result may include: the second correlation value and/or the second transmission delay of the second random access preamble of the second terminal detected by the second network device.
  • the second correlation value and the second transmission delay reference may be made to the first correlation value and the first transmission delay in S402 respectively, which will not be repeated here.
  • the first network device may actively request its neighboring network devices to assist in detecting the second random access preamble. Therefore, optionally, the communication method shown in FIG. 6 may further include: the first network device sends a second request to the second network device; wherein the second request is used to request the second detection result.
  • the second request please refer to the first request in S402 respectively, which will not be repeated here.
  • the second request and the first request may also be the same request, and the same request is used to request the second network device to assist in detecting the first random access preamble of the first terminal and the second random access preamble of the second terminal. Access preamble.
  • S602 may be executed before S402, or may be executed after S402, and S602 and S402 may also be executed at the same time. That is, the embodiment of the present application does not specifically limit the execution order of S602 and S402.
  • S603 The second network device sends fourth indication information to the first network device.
  • the fourth indication information is used to indicate the third detection result.
  • S603 can be executed before S403 or after S403, and S603 and S403 can also be executed at the same time. That is, the embodiment of the present application does not specifically limit the execution order of S603 and S403.
  • the first network device obtains a third detection result.
  • the first network device may obtain the second detection result according to the fourth indication information.
  • the first network device may obtain the second detection result according to the fourth indication information.
  • the first network device may obtain the first detection result according to the third indication information, which will not be repeated here.
  • S604 can be executed before S404 or after S404, and S604 and S404 can also be executed at the same time. That is, the embodiment of the present application does not specifically limit the execution order of S604 and S404.
  • the first network device sends a second random access response to the second terminal based on the third detection result.
  • the first network device sending the second random access response to the second terminal based on the third detection result may include:
  • the first network device determines that the third correlation value is greater than or equal to the correlation value threshold, the first network device accepts the random access request initiated by the second terminal and sends a second random access response to the second terminal.
  • the first network device accepts the random access request initiated by the first terminal, and sends the first random access request to the first terminal. The access response will not be repeated here.
  • the joint detection method shown in FIG. 5 can also be used to identify the first terminal and the second terminal, so as to increase the success rate of identifying different terminals, thereby increasing the random access rate. Success rate and efficiency. Therefore, the communication method shown in FIG. 6 may further include: the first network device detects the second random access preamble, and obtains a fourth detection result.
  • the fourth detection result is the second random access preamble of the second terminal, and the detection result on the first network device may include the fourth correlation value and/or the fourth transmission delay.
  • the fourth correlation value and/or the fourth transmission delay can refer to the second correlation value and the second transmission delay in S501, which will not be repeated here.
  • the first network device sends the second random access response to the second terminal based on the third detection result, which may be specifically implemented as follows: the first network device sends the second random access response to the second terminal based on the third detection result and the fourth detection result.
  • the two terminals send a second random access response.
  • the first network device determines that the weighted sum of the third correlation value and the fourth correlation value is greater than or equal to the correlation value threshold, the first network device accepts the random access request initiated by the second terminal and sends it to the second terminal Second random access response.
  • the second random access response and the first random access response may be included in the same random access response message, or may be included in different random access response messages, which is not discussed in this embodiment of the application. limited.
  • the first terminal and the second terminal can be identified by the first correlation value and the third correlation value, that is, by One to identify different terminals:
  • the first network device may determine that the first terminal and the second terminal are different terminals.
  • the first to fourth correlation values can be passed through
  • the correlation value identifies the first terminal and the second terminal, that is, different terminals are identified through the following method two:
  • the first network device may It is determined that the first terminal and the second terminal are different terminals.
  • the first network device may determine that the first terminal and the second terminal are different terminals.
  • Manner 4 If the time deviation between the weighted sum of the first transmission delay and the second transmission delay and the weighted sum of the third transmission delay and the fourth transmission delay is greater than or equal to the timing deviation threshold, the first network The device may determine that the first terminal and the second terminal are different terminals.
  • the first network device can determine that the first terminal and the second terminal are different terminals.
  • the first network device can determine the first terminal and the second The terminals are different terminals.
  • the relative value of the random access preamble of the same terminal detected by the second network device, or the random access of the same terminal detected by the first network device and the second network device needs to be greater than or equal to the correlation value threshold in order to identify different terminals under the premise of effectively avoiding the adverse effects of noise and interference, reduce the probability of false alarms, and improve the reliability of identifying different terminals.
  • S605 can be executed before S405 or after S405, and S605 and S405 can also be executed simultaneously. That is, the embodiment of the present application does not specifically limit the execution sequence of S605 and S405.
  • FIG. 7 is a fourth flowchart of a communication method provided by an embodiment of this application. This communication method can be applied to the communication between network devices and between network devices and terminal devices as shown in FIG. 2. As shown in Figure 7, the communication method includes the following steps:
  • the third random access preamble is the random access preamble from the third terminal
  • the fifth detection result, the sixth detection result and the seventh detection result are respectively: the detection results of the third random access preamble on different network devices .
  • different network devices may include a third network device, a fourth network device, and a fifth network device.
  • the fifth detection result, the sixth detection result, and the seventh detection result may also include that the third random access preamble is in the third network device, the fourth network device, and the third network device, respectively. 5.
  • the transmission delays detected by the network equipment please refer to the first to fourth transmission delays for details, which will not be repeated here.
  • S702 Acquire the location of the third terminal according to the fifth detection result, the sixth detection result, and the seventh detection result.
  • the communication method shown in FIG. 7 may further include: acquiring third location information of the third network device, fourth location information of the fourth network device, and fifth location information of the fifth network device.
  • the circumferential positioning method and the hyperbolic positioning method reference may be made to existing implementation manners, and details are not described in the embodiment of the present application.
  • the execution subject of the communication method shown in FIG. 7 can be any one of the third network device, the fourth network device, and the fifth network device, or it can be other than the third network device and the fourth network device.
  • the device and another network device other than the fifth network device are not limited in this embodiment of the present application. Examples are given below.
  • the execution subject of the communication method shown in FIG. 7 may be: another network device other than the third network device, the fourth network device, and the fifth network device, such as the sixth network device .
  • the following takes the sixth network device as the execution body of the communication method shown in FIG. 7 and the sixth network device as the serving base station as an example for specific description.
  • FIG. 8 is a fifth schematic flowchart of a communication method provided by an embodiment of this application.
  • the third terminal after performing S801, the third terminal sends the third random access preamble, in S701, the fifth detection result, the sixth detection result, and the seventh detection result of the third random access preamble are obtained, which can be specific Including the following S802-S804:
  • the third network device, the fourth network device, and the fifth network device detect the third random access preamble from the third terminal, and obtain the fifth detection result, the sixth detection result, and the seventh detection result of the third random access preamble, respectively. Test results.
  • different network devices detect the third random access preamble from the third terminal and obtain the execution sequence of the detection result, that is, the execution sequence of the three S802s in FIG. 8 is not specifically limited. .
  • the third network device sends fifth instruction information to the sixth network device, the fourth network device sends sixth instruction information to the sixth network device, and the fifth network device sends seventh instruction information to the sixth network device.
  • the sixth network device receives the fifth instruction information from the third network device, receives the sixth instruction information from the fourth network device, and receives the seventh instruction information from the fifth network device.
  • the fifth indication information is used to indicate the fifth detection result, and the fifth detection result is: the detection result of the third random access preamble on the fourth network device.
  • the sixth indication information is used to indicate the sixth detection result, and the sixth detection result is: the detection result of the third random access preamble on the fifth network device.
  • the seventh indication information is used to indicate the seventh detection result, and the seventh detection result is: the detection result of the third random access preamble in the sixth network device.
  • the sixth network device obtains the fifth detection result, the sixth detection result, and the seventh detection result according to the fifth indication information, the sixth indication information, and the seventh indication information, respectively.
  • the configuration information of the third random access preamble such as the sequence number
  • the network device and the fifth network device assist in detecting the third random access preamble of the third terminal. Therefore, optionally, the communication method shown in FIG.
  • the eighth network device may further include: the sixth network device sends eighth instruction information to the third network device, the fourth network device, and the fifth network device; where the eighth instruction information is used for Indicate one or more third candidate random access preambles and their time-frequency resource configuration, one or more third candidate random access preambles include the third random access preamble, so that the third network device, the fourth network device and the second 5.
  • the network device assists in detecting the third random access preamble of the third terminal.
  • the eighth indication information reference may be made to the above-mentioned first indication information and second indication information, which will not be repeated here.
  • the third network device, the fourth network device, and the fifth network device can actively feed back the fifth detection result, the sixth detection result, and the seventh detection result to the sixth network device, or they can receive the assisted detection request.
  • the fifth test result, the sixth test result, and the seventh test result are fed back. Therefore, optionally, the communication method shown in FIG. 8 may further include:
  • the sixth network device sends the second request to the third network device, the fourth network device, and the fifth network device.
  • the third network device, the fourth network device, and the fifth network device receive the second request from the sixth network device.
  • the second request is used to request the detection result of the third random access preamble. For the specific implementation of the second request, you can refer to the above-mentioned first request, which will not be repeated here.
  • the execution sequence of the detection result of the third random access preamble from the third terminal by the network device corresponding to the instruction information is obtained according to the instruction information from different network devices, as shown in FIG. 8
  • the execution sequence of obtaining the fifth detection result according to the fifth indication information, obtaining the sixth detection result according to the sixth indication information, and obtaining the seventh detection result according to the seventh indication information in S804 is not specifically limited.
  • the detection result corresponding to each instruction information may be sequentially acquired according to the time sequence in which the sixth network device receives each instruction information.
  • the detection results corresponding to each indication information may be sequentially obtained according to a preset sequence.
  • the foregoing S702 can be executed, and the location of the third terminal can be acquired according to the fifth detection result, the sixth detection result, and the seventh detection result.
  • the execution subject of the communication method shown in FIG. 7 may be any one of the third network device, the fourth network device, and the fifth network device, such as the third network device.
  • the following takes the third network device as the execution subject of the communication method shown in FIG. 7 and the third network device as the serving base station as an example for specific description.
  • FIG. 9 is a sixth flowchart of a communication method provided by an embodiment of this application.
  • the third terminal after performing S901, the third terminal sends the third random access preamble, and correspondingly, the above S701 obtains the fifth detection result, the sixth detection result, and the seventh detection result of the third random access preamble.
  • steps S902-S904 Specifically includes the following steps S902-S904:
  • the third network device, the fourth network device, and the fifth network device detect the third random access preamble from the third terminal, and obtain the fifth detection result, the sixth detection result, and the seventh detection result of the third random access preamble, respectively. Test results.
  • different network devices detect the third random access preamble from the third terminal and obtain the execution sequence of the detection result respectively, that is, the execution sequence of the three S902 in FIG. 9 is not specifically limited. .
  • the fourth network device sends sixth instruction information to the third network device, and the fifth network device sends seventh instruction information to the third network device.
  • the third network device receives the sixth instruction information from the fourth network device, and receives the seventh instruction information from the fifth network device.
  • the sixth indication information is used to indicate the sixth detection result, and the sixth detection result is: the detection result of the third random access preamble on the fifth network device.
  • the seventh indication information is used to indicate the seventh detection result, and the seventh detection result is: the detection result of the third random access preamble in the sixth network device.
  • the execution sequence of the fourth network device and the fifth network device sending the detection results of the third random access preamble from the third terminal to the third network device respectively that is, in FIG. 9
  • the execution sequence of the two S903s is not specifically limited.
  • the third network device obtains the sixth detection result and the seventh detection result according to the sixth indication information and the seventh indication information, respectively.
  • the communication method shown in FIG. 9 may further include: the third network device sends eighth indication information to the fourth network device and the fifth network device; where the eighth indication information is used to indicate one or more third network devices.
  • One or more third candidate random access preambles include third random access preambles, so that the fourth network device and the fifth network device can assist in detecting the third random access of the third terminal. Access preamble.
  • the fourth network device and the fifth network device can actively feed back the fifth detection result, the sixth detection result, and the seventh detection result to the third network device, or they can feed back the sixth detection result after receiving the assisted detection request And the seventh test result. Therefore, further, the communication method shown in FIG. 9 may further include: the third network device sends a third request to the fourth network device and the fifth network device; wherein the third request is used to request the third random access preamble Test results.
  • the execution sequence of the detection result of the third random access preamble from the third terminal by the network device corresponding to the instruction information is obtained according to the instruction information from different network devices, as shown in FIG. 9
  • the execution sequence of obtaining the sixth detection result according to the sixth indication information and obtaining the seventh detection result according to the seventh indication information in S904 is not specifically limited.
  • the detection results corresponding to each indication information may be sequentially obtained.
  • the detection results corresponding to each indication information may be sequentially obtained according to a preset sequence.
  • the above S702 can be executed, and the position of the third terminal can be obtained according to the fifth detection result, the sixth detection result, and the seventh detection result.
  • the execution subject of the communication method shown in any one of FIGS. 7-9 may be the serving base station, or may be a neighboring base station of the serving base station, which is not limited in the embodiment of the present application.
  • the communication method shown in any one of FIGS. 7-9 can obtain the position of the third terminal according to at least three detection results of the third random access preamble of the third terminal by different network devices, that is, in the random access phase
  • the terminal positioning operation can be completed without forcing the terminal device to jump from the idle state or inactive state to the connected state to complete the positioning operation, which can reduce signaling overhead and positioning delay, improve positioning efficiency, and reduce terminal power consumption .
  • the embodiments of the present application also provide corresponding communication devices, including corresponding modules for executing the foregoing method embodiments.
  • the module can be software, hardware, or a combination of software and hardware.
  • Figure 10 shows a schematic diagram of the structure of a communication device.
  • the communication device may be a network device, or a chip, a chip system, or a processor that supports the network device to implement the foregoing method.
  • the communication device can be used to implement the method described in the foregoing method embodiment, and for details, please refer to the description in the foregoing method embodiment.
  • the communication device 1000 may include one or more processors 1001, and the processor 1001 may also be referred to as a processing unit, which may implement certain control functions.
  • the processor 1001 may be a general-purpose processor or a special-purpose processor. For example, it can be a baseband processor or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data
  • the central processor can be used to control communication devices (such as base stations, baseband chips, terminals, terminal chips, DU or CU, etc.), execute software programs, and process The data of the software program.
  • the processor 1001 may also store instructions and/or data 1003, and the instructions and/or data 1003 may be executed by the processor, so that the communication device 1000 executes the method described in the foregoing method embodiments. Methods.
  • the processor 1001 may include a transceiver unit for implementing receiving and sending functions.
  • the transceiver unit may be a transceiver circuit, or an interface, or an interface circuit.
  • the transceiver circuits, interfaces, or interface circuits used to implement the receiving and transmitting functions can be separated or integrated.
  • the foregoing transceiver circuit, interface, or interface circuit may be used for code/data reading and writing, or the foregoing transceiver circuit, interface, or interface circuit may be used for signal transmission or transmission.
  • the communication device 1000 may include a circuit, and the circuit may implement the sending or receiving or communication functions in the foregoing method embodiments.
  • the communication device 1000 may include one or more memories 1002, on which instructions 1004 may be stored, and the instructions may be executed on the processor, so that the communication device 1000 executes the methods described in the foregoing method embodiments. method.
  • data may also be stored in the memory.
  • instructions and/or data may also be stored in the processor.
  • the processor and the memory can be provided separately or integrated together.
  • the first, second, and eighth indication information described in the foregoing method embodiment, and/or the first to sixth detection results may be stored in a memory or in a processor.
  • the communication device 1000 may further include a transceiver 1005 and/or an antenna 1006.
  • the processor 1001 may be referred to as a processing unit, and controls the communication device 1000.
  • the transceiver 1005 may be called a transceiver unit, a transceiver, a transceiver circuit, a transceiver device or a transceiver module, etc., for implementing the transceiver function.
  • the communication device 1000 in the embodiment of the present application may be used to execute the method shown in any one of FIG. 4 to FIG. 9 in the embodiment of the present application, and may also be used to execute the two or more above-mentioned figures.
  • the methods described in the method are combined with each other.
  • the processor and transceiver described in this application can be implemented in integrated circuit (IC), analog IC, radio frequency integrated circuit RFIC, mixed signal IC, application specific integrated circuit (ASIC), printed circuit board ( printed circuit board, PCB), electronic equipment, etc.
  • the processor and transceiver can also be manufactured using various IC process technologies, such as complementary metal oxide semiconductor (CMOS), nMetal-oxide-semiconductor (NMOS), and P-type Metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS nMetal-oxide-semiconductor
  • PMOS bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • the communication device 1000 described in the above embodiment may be a network device, but the scope of the communication device 1000 described in this application is not limited to this, and the structure of the communication device 1000 may not be limited by FIG. 10.
  • the communication apparatus 1000 may be a stand-alone device or may be part of a larger device.
  • the communication device 1000 may be:
  • the IC collection may also include storage components for storing data and/or instructions;
  • ASIC such as a modem
  • FIG. 11 is a schematic structural diagram of a network device provided by an embodiment of the present application, for example, it may be a schematic structural diagram of a base station. As shown in FIG. 11, the base station can be applied to the system shown in FIG. 1 to perform the function of any network device in the foregoing method embodiment.
  • the base station 1100 may include one or more radio frequency units, such as a remote radio unit (RRU) 1101 and one or more baseband units (BBU) 1102.
  • RRU 1101 may be called a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 1103 and a radio frequency unit 1104.
  • the RRU 1101 part is mainly used for receiving and sending of radio frequency signals and conversion of radio frequency signals and baseband signals, for example, for sending the signaling messages described in the foregoing embodiments to terminal equipment or other network equipment.
  • the 1102 part of the BBU is mainly used for baseband processing, control of the base station, and so on.
  • the RRU 1101 and the BBU 1102 may be physically set together, or may be physically separated, that is, a distributed base station.
  • the BBU 1102 is the control center of the base station, and may also be called a processing unit, which is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, and spreading.
  • the BBU (processing unit) 1102 may be used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
  • the BBU 1102 may be composed of one or more single boards, and multiple single boards may jointly support a wireless access network (such as an LTE network) of a single access standard, or can support different access standards. Wireless access network (such as LTE network, 5G network or other networks).
  • the BBU 1102 further includes a memory 1105 and a processor 1106, and the memory 1105 is used to store necessary instructions and data.
  • the memory 1002 stores at least one of the first to seventh detection results in the foregoing embodiment, and so on.
  • the processor 1106 is used to control the base station to perform necessary actions, for example, to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
  • the memory 1105 and the processor 1106 may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • the communication device may be a network device, a component of a network device (for example, an integrated circuit, a chip, etc.), and may also be another communication module for implementing the method in the method embodiment of the present application.
  • the communication device 1200 may include: a processing module 1201 (or referred to as a processing unit).
  • the communication device 1200 may further include a transceiving module 1202 (or referred to as a transceiving unit) and a storage module 1203 (or referred to as a storage unit).
  • one or more modules as shown in Figure 12 may be implemented by one or more processors, or by one or more processors and memories; or by one or more processors It may be implemented with a transceiver; or implemented by one or more processors, memories, and transceivers, which is not limited in the embodiment of the present application.
  • the processor, memory, and transceiver can be set separately or integrated together.
  • the communication device 1200 has the function of implementing the network equipment described in the embodiments of the present application.
  • the communication device 1200 includes the modules or units or means corresponding to the steps involved in the network equipment described in the embodiments of the present application.
  • the above-mentioned functions or units or means can be realized by software, or by hardware, or by hardware executing corresponding software, or by a combination of software and hardware.
  • each module in the communication device 1200 may be used to execute the method shown in any one of FIG. 4 to FIG. 9 in the embodiment of the present application, or may be used to execute the method described in the above two or more figures. Methods of combining with each other.
  • the communication device 1200 may include: a processing module 1201 and a transceiver module 1202.
  • the communication apparatus 1200 may be used to perform the function of the first network device in the communication method shown in any one of FIG. 4 to FIG. 6.
  • the processing module 1201 is used to obtain the first detection result.
  • the first detection result is the detection result of the first random access preamble of the first terminal in the second network device.
  • the processing module 1201 is further configured to control the transceiver module 1202 to send a first random access response to the first terminal based on the first detection result.
  • the first detection result may include: the first correlation value of the first random access preamble of the first terminal detected by the second network device.
  • the processing module 1201 is further configured to accept the random access request initiated by the first terminal if the first correlation value is greater than or equal to the correlation value threshold, and control the transceiver module 1202 to send the first random access response to the first terminal .
  • the configuration information of the first random access preamble such as the serial number
  • the transceiver module 1202 is also used to send first indication information to the second network device; where the first indication information is used to indicate one or more first candidate random access preambles and their In the time-frequency resource configuration, the one or more first candidate random access preambles include the first random access preamble.
  • the neighboring network equipment close to the communication device 1200 may be selected to assist in detecting the first random access preamble. That is, the distance between the second network device and the communication device 1200 is less than or equal to the distance threshold.
  • the neighboring network device may determine by itself whether the distance between it and the communication device 1200 is less than or equal to the distance threshold, and determine whether to assist in detecting the first random access preamble according to the determination result. It is easy to understand that the neighboring network equipment needs to know the location information of the communication device 1200 at this time. Therefore, optionally, the transceiver module 1202 is also used to send the first location information of the communication device 1200 to the second network device. The first location information is used by the second network device to determine that the distance between the communication apparatus 1200 and the second network device is less than or equal to the distance threshold.
  • the communication apparatus 1200 may also determine which neighboring network devices are needed to assist in detecting the first random access preamble. At this time, the communication apparatus 1200 needs to know the location information of its neighboring network devices. Therefore, optionally, the transceiver module 1202 is also used to receive second location information of the second network device; wherein the second location information is used by the communication device 1200 to determine that the distance between it and the second network device is less than or equal to the distance Threshold.
  • the communication apparatus 1200 can actively request its neighboring network devices to assist in detecting the first random access preamble. Therefore, optionally, the transceiver module 1202 is also used to send a first request to the second network device; wherein the first request is used to request the first detection result.
  • the random access preamble of the same terminal can be jointly detected based on the detection results of at least two network devices, so as to further improve the accuracy of detecting the random access preamble and the success rate and efficiency of random access requests, and can reduce The number of times the terminal device sends the random access preamble, which reduces the power consumption of the terminal device. Therefore, in a possible design, the processing module 1201 is also used to control the transceiver module 1202 to detect the first random access preamble and obtain the second detection result. Correspondingly, the processing module 1201 is further configured to control the transceiver module 1202 to send the first random access response to the first terminal based on the first detection result and the second detection result.
  • the first detection result may include: the first correlation value of the first random access preamble of the first terminal detected by the second network device
  • the second detection result may include: the first terminal detected by the communication device 1200 The second correlation value of the first random access preamble.
  • the processing module 1201 is further configured to accept the random access request initiated by the first terminal if the weighted sum of the first correlation value and the second correlation value is greater than or equal to the correlation value threshold, and control the transceiver module 1202 to send a request to the first terminal. The terminal sends the first random access response.
  • the communication apparatus 1200 may also be used to identify random access requests initiated by multiple terminal devices, and send random access responses to the multiple terminal devices, so as to further improve the efficiency of random access. Therefore, in a possible design, the processing module 1201 is also used to obtain the third detection result; where the third detection result is the detection result of the second random access preamble of the second terminal in the second network device. The processing module 1201 is further configured to control the transceiver module 1202 to send a second random access response to the second terminal based on the third detection result.
  • the third detection result may include: the third correlation value of the second random access preamble of the second terminal detected by the second network device.
  • the processing module 1201 is further configured to accept the random access request initiated by the second terminal if the third correlation value is greater than or equal to the correlation value threshold, and control the transceiver module 1202 to send the second random access response to the second terminal .
  • the communication device 1200 may also adopt a joint detection method to determine whether to accept the random access request of the second terminal. Therefore, in another possible design, the processing module 1201 is also used to control the transceiver module 1202 to detect the second random access preamble of the second terminal to obtain the fourth detection result; wherein, the fourth detection result is the second terminal The detection result of the second random access preamble in the communication device 1200. Correspondingly, the processing module 1201 is further configured to control the transceiver module 1202 to send the second random access response to the second terminal based on the third detection result and the fourth detection result.
  • the fourth detection result may include: the fourth correlation value of the second random access preamble of the second terminal detected by the communication device 1200.
  • the processing module 1201 is further configured to accept the random access request initiated by the second terminal if the weighted sum of the third correlation value and the fourth correlation value is greater than or equal to the correlation value threshold, and control the transceiver module 1202 to send the second terminal to the second terminal. The terminal sends a second random access response.
  • the foregoing first to fourth detection results may also be used to identify the first terminal and the second terminal. Specifically, if the distance between the first terminal and the second terminal and the first network device is relatively close, the second correlation value is relatively close to the fourth correlation value. In this case, the first to fourth correlation values can be distinguished from the first to fourth correlation values.
  • the terminal and the second terminal Specifically, the following way one or way two can be used to identify the first terminal and the second terminal:
  • the processing module 1201 is further configured to determine that the first terminal and the second terminal are different terminals if the correlation value deviation between the first correlation value and the third correlation value is greater than or equal to the correlation value deviation threshold.
  • the processing module 1201 is further configured to provide if the weighted sum of the first correlation value and the second correlation value, the correlation value deviation from the weighted sum of the third correlation value and the fourth correlation value is greater than or equal to the correlation value deviation threshold , It can be determined that the first terminal and the second terminal are different terminals.
  • the first detection result may also include: the first transmission delay for the first random access preamble of the first terminal to reach the second network device
  • the second detection result may also include: the first random access of the first terminal
  • the third detection result may further include: the third transmission delay for the second random access preamble of the second terminal to reach the second network device
  • the fourth detection result may further include: The fourth transmission delay for the second random access preamble of the second terminal to reach the communication device 1200.
  • the second correlation value is relatively close to the fourth correlation value.
  • the first to fourth transmission delays can be distinguished from the first terminal.
  • the terminal and the second terminal Specifically, the following way three or way four can be used to identify the first terminal and the second terminal:
  • the processing module 1201 is further configured to determine that the first terminal and the second terminal are different terminals if the time deviation between the first transmission delay and the third transmission delay is greater than or equal to the timing deviation threshold.
  • the processing module 1201 is further configured to provide that the time deviation between the weighted sum of the first transmission delay and the second transmission delay and the weighted sum of the third transmission delay and the fourth transmission delay is greater than or equal to the timing By the deviation threshold, it can be determined that the first terminal and the second terminal are different terminals.
  • first to fourth correlation values and the foregoing first to fourth transmission delays may also be combined to identify the first terminal and the second terminal.
  • manner 5 or manner 6 may be used to identify the first terminal and the second terminal:
  • the processing module 1201 is further configured to provide if the correlation value deviation between the first correlation value and the third correlation value is greater than or equal to the correlation value deviation threshold, and the time between the first transmission delay and the third transmission delay If the deviation is greater than or equal to the timing deviation threshold, it can be determined that the first terminal and the second terminal are different terminals.
  • the processing module 1201 is further configured to provide if the weighted sum of the first correlation value and the second correlation value, the correlation value deviation from the weighted sum of the third correlation value and the fourth correlation value is greater than or equal to the correlation value deviation threshold , And the time deviation between the weighted sum of the first transmission delay and the second transmission delay and the weighted sum of the third transmission delay and the fourth transmission delay is greater than or equal to the timing deviation threshold, the first terminal can be determined And the second terminal are different terminals.
  • the configuration information of the second random access preamble of the second terminal may also be sent by the first network device to the second network device in advance, so that The second network device assists in detecting the second random access preamble of the second terminal. Therefore, in a possible design, the transceiver module 1202 is also used to send second indication information to the second network device; where the second indication information is used to indicate one or more second candidate random access preambles and their In the time-frequency resource configuration, the one or more second candidate random access preambles include the second random access preamble.
  • the first random access preamble and the second random access preamble may be the same random access preamble, and the first random access preamble and the second random access preamble may occupy the same physical resources.
  • the communication device 1200 may also be used to perform the function of the second network device in the communication method shown in any one of FIG. 4 to FIG. 6.
  • the processing module 1201 is configured to detect the first random access preamble from the first terminal, and obtain the first detection result of the first random access preamble.
  • the transceiver module 1202 is configured to send third indication information to the first network device, and the third indication information is used to indicate the first detection result.
  • the first detection result may include: the first correlation value of the first random access preamble of the first terminal detected by the communication device 1200.
  • the above-mentioned configuration information of the first random access preamble such as a sequence number, may be sent by the first network device to the communication apparatus 1200 in advance, so that the communication apparatus 1200 assists in detecting the first random access preamble of the first terminal. Therefore, in a possible design, the transceiver module 1202 is also used to receive first indication information from the first network device; where the first indication information is used to indicate one or more first candidate random access preambles and In the time-frequency resource configuration, the one or more first candidate random access preambles include the first random access preamble.
  • the neighboring network device that is closer to the first network device may be selected to assist in detecting the first random access preamble. That is, the distance between the communication apparatus 1200 and the first network device is less than or equal to the distance threshold.
  • the neighboring network device may determine by itself whether the distance between it and the first network device is less than or equal to the distance threshold, and determine whether to assist in detecting the first random access preamble according to the determination result. It is easy to understand that at this time, the neighboring network device needs to know the location information of the first network device. Therefore, optionally, the transceiver module 1202 is further configured to receive first location information of the first network device; wherein, the first location information is used to determine that the distance between the communication device 1200 and the first network device is less than or equal to a distance threshold .
  • the first network device may also determine in advance which neighboring network devices are needed to assist in detecting the first random access preamble, and at this time, the first network device needs to know the location information of its neighboring network devices. Therefore, optionally, the transceiver module 1202 is also used to send the second location information of the communication device 1200 to the first network device.
  • the transceiver module 1202 is further configured to receive a first request from the first network device; wherein, the first request is used to request the communication apparatus 1200 to send the first detection result to the first network device.
  • the first network device may also be used to identify random access requests initiated by multiple terminal devices, and send random access responses to the multiple terminal devices, so as to further improve the efficiency of random access. Therefore, in a possible design, the processing module 1201 is further configured to control the transceiver module 1202 to detect the second random access preamble from the second terminal, and obtain the third detection result of the second random access preamble. The transceiver module 1202 is further configured to send fourth indication information to the first network device, and the fourth indication information is used to indicate the third detection result.
  • the third detection result may include: the third correlation value of the second random access preamble of the second terminal detected by the communication device 1200.
  • the configuration information of the second random access preamble of the second terminal may also be sent by the first network device to the communication device 1200 in advance for communication.
  • the apparatus 1200 assists in detecting the second random access preamble of the second terminal. Therefore, in a possible design, the transceiver module 1202 is also used to receive second indication information from the first network device; where the second indication information is used to indicate one or more second candidate random access preambles and In the time-frequency resource configuration, the one or more second candidate random access preambles include the second random access preamble.
  • the first random access preamble and the second random access preamble may be the same random access preamble, and the first random access preamble and the second random access preamble may occupy the same physical resources.
  • the communication device 1200 can also be used to execute the network device as the execution subject of the communication method in any one of the communication methods shown in FIG. 7-9, as shown in Figure 8 in the sixth The function of the network device or the third network device in FIG. 9.
  • the processing module 1201 is configured to obtain the fifth detection result, the sixth detection result, and the seventh detection result of the third random access preamble.
  • the processing module 1201 is further configured to obtain the location of the third terminal according to the fifth detection result, the sixth detection result, and the seventh detection result.
  • the third random access preamble is the random access preamble from the third terminal
  • the fifth detection result, the sixth detection result, and the seventh detection result are respectively: the detection result of the third random access preamble on a different network device .
  • the transceiver module 1202 is configured to receive detection results from different network devices, such as neighboring network devices of the communication device 1200, and/or, under the control of the processing module 1201, receive a third random access preamble from a third terminal .
  • different network devices may include a third network device, a fourth network device, and a fifth network device.
  • the communication device 1200 may be any one of the third network equipment, the fourth network equipment, and the fifth network equipment, or may be other than the third network equipment, the fourth network equipment, and the fifth network equipment.
  • Another network device is not limited in this embodiment of the application. Described below separately.
  • the communication device 1200 may be another network device other than the third network device, the fourth network device, and the fifth network device.
  • the transceiver module 1202 is further configured to receive fifth indication information from the third network device, where the fifth indication information is used to indicate the fifth detection result; wherein, the fifth detection result is: the third random access preamble is in the first 3. Test results of network equipment.
  • the transceiver module 1202 is further configured to receive sixth indication information from the fourth network device, where the sixth indication information is used to indicate the sixth detection result; where the sixth detection result is: the third random access preamble is in the fourth network device The test results.
  • the transceiver module 1202 is further configured to receive seventh indication information from the fifth network device, where the seventh indication information is used to indicate the seventh detection result; where the seventh detection result is: the third random access preamble is in the fifth network device The test results.
  • the transceiver module 1202 is further configured to send eighth indication information to the third network device, the fourth network device, and the fifth network device; where the eighth indication information is used to indicate one or more third candidate random accesses.
  • the eighth indication information is used to indicate one or more third candidate random accesses.
  • Incoming preamble and its time-frequency resource configuration, one or more third candidate random access preambles include the third random access preamble, so that the third network device, the fourth network device, and the fifth network device can assist in detecting the third terminal's Three random access preamble.
  • the third network device, the fourth network device, and the fifth network device can actively feed back the fifth detection result, the sixth detection result, and the seventh detection result to the communication device 1200, or they can feed back after receiving the assistance detection request The fifth test result, the sixth test result, and the seventh test result. Therefore, further, the transceiver module 1202 is further configured to send a second request to the third network device, the fourth network device, and the fifth network device; wherein, the second request is used to request the detection result of the third random access preamble.
  • the communication device 1200 may also be any one of the third network device, the fourth network device, and the fifth network device, such as the third network device.
  • the transceiver module 1202 is also used to detect the third random access preamble and obtain the fifth detection result.
  • the transceiver module 1202 is further configured to receive sixth indication information from the fourth network device, where the sixth indication information is used to indicate the sixth detection result; where the sixth detection result is: the third random access preamble is in the fourth network device The test results.
  • the transceiver module 1202 is further configured to receive seventh indication information from the fifth network device, where the seventh indication information is used to indicate the seventh detection result; where the seventh detection result is: the third random access preamble is in the fifth network device The test results.
  • the processing module 1201 is further configured to obtain third location information of the third network device, fourth location information of the fourth network device, and fifth location information of the fifth network device.
  • the storage module 1203 stores programs or instructions.
  • the processing module 1201 executes the program or instruction
  • the communication device 1200 can execute the communication method shown in any one of FIG. 4 to FIG. 9.
  • the communication device 1200 may be a network device, such as a base station, or a chip or a chip system provided in the network device, which is not limited in this application.
  • any communication device given in the embodiments of the present application can also implement these features or functions correspondingly, which will not be repeated here.
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a field programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • the processing unit used to execute these technologies at a communication device can be implemented in one or more general-purpose processors, DSPs, digital signal processing devices, ASICs, Programmable logic device, FPGA, or other programmable logic device, discrete gate or transistor logic, discrete hardware component, or any combination of the foregoing.
  • the general-purpose processor may be a microprocessor.
  • the general-purpose processor may also be any traditional processor, controller, microcontroller, or state machine.
  • the processor can also be implemented by a combination of computing devices, such as a digital signal processor and a microprocessor, multiple microprocessors, one or more microprocessors combined with a digital signal processor core, or any other similar configuration. achieve.
  • the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM
  • the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the function of any of the foregoing method embodiments is realized.
  • This application also provides a computer program product, which, when executed by a computer, realizes the functions of any of the foregoing method embodiments.
  • the computer may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk, SSD)) etc.
  • system and “network” in this article are often used interchangeably in this article.
  • the term “and/or” in this article is only an association relationship describing the associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone In the three cases of B, A can be singular or plural, and B can be singular or plural.
  • the character “/” generally indicates that the associated objects before and after are in an "or” relationship.
  • At least one of! or "at least one of" as used herein means all or any combination of the listed items, for example, "at least one of A, B and C", It can mean: A alone exists, B alone exists, C exists alone, A and B exist at the same time, B and C exist at the same time, and there are six cases of A, B and C at the same time, where A can be singular or plural, and B can be Singular or plural, C can be singular or plural.
  • B corresponding to A means that B is associated with A, and B can be determined according to A.
  • determining B based on A does not mean that B is determined only based on A, and B can also be determined based on A and/or other information.
  • the corresponding relationships shown in the tables in this application can be configured or pre-defined.
  • the value of the information in each table is only an example, and can be configured to other values, which is not limited in this application.
  • the corresponding relationship shown in some rows may not be configured.
  • appropriate deformation adjustments can be made based on the above table, such as splitting, merging, and so on.
  • the names of the parameters shown in the titles in the above tables may also adopt other names that can be understood by the communication device, and the values or expressions of the parameters may also be other values or expressions that can be understood by the communication device.
  • other data structures can also be used, such as arrays, queues, containers, stacks, linear tables, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables, or hash tables. Wait.
  • the pre-definition in this application can be understood as definition, pre-definition, storage, pre-storage, pre-negotiation, pre-configuration, curing, or pre-fired.
  • the systems, devices, and methods described in this application can also be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et un appareil de communication qui peuvent améliorer le taux de réussite et la fiabilité d'un accès aléatoire, réduire la consommation d'énergie d'un terminal et s'appliquer à des systèmes 4G et des systèmes 5G. Le procédé comprend un premier dispositif réseau, tel qu'une station de base de desserte, capable d'obtenir un premier résultat de détection d'un premier préambule d'accès aléatoire à partir d'un premier terminal dans un dispositif réseau voisin, tel qu'un second dispositif réseau, du premier dispositif réseau, de déterminer, d'après le premier résultat de détection, s'il faut accepter une demande d'accès aléatoire initiée par le premier terminal, et le cas échéant, d'envoyer une première réponse d'accès aléatoire au premier terminal.
PCT/CN2019/111720 2019-10-17 2019-10-17 Procédé et appareil de communication WO2021072706A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201980096974.5A CN113892301B (zh) 2019-10-17 2019-10-17 通信方法及装置
PCT/CN2019/111720 WO2021072706A1 (fr) 2019-10-17 2019-10-17 Procédé et appareil de communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/111720 WO2021072706A1 (fr) 2019-10-17 2019-10-17 Procédé et appareil de communication

Publications (1)

Publication Number Publication Date
WO2021072706A1 true WO2021072706A1 (fr) 2021-04-22

Family

ID=75537647

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/111720 WO2021072706A1 (fr) 2019-10-17 2019-10-17 Procédé et appareil de communication

Country Status (2)

Country Link
CN (1) CN113892301B (fr)
WO (1) WO2021072706A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101883423A (zh) * 2009-05-07 2010-11-10 大唐移动通信设备有限公司 一种确定终端的位置信息的方法、系统和装置
US9370025B1 (en) * 2014-06-11 2016-06-14 Sprint Spectrum L.P. Contention free preamble reuse based on latency metrics
CN105765882A (zh) * 2013-11-12 2016-07-13 Lg电子株式会社 获得上行链路同步并且配置上行链路连接的方法
CN108112090A (zh) * 2012-11-02 2018-06-01 华为技术有限公司 确定信道损耗的方法、基站和用户设备
CN108464052A (zh) * 2015-11-18 2018-08-28 IPCom两合公司 单频网络随机接入

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101883423A (zh) * 2009-05-07 2010-11-10 大唐移动通信设备有限公司 一种确定终端的位置信息的方法、系统和装置
CN108112090A (zh) * 2012-11-02 2018-06-01 华为技术有限公司 确定信道损耗的方法、基站和用户设备
CN105765882A (zh) * 2013-11-12 2016-07-13 Lg电子株式会社 获得上行链路同步并且配置上行链路连接的方法
US9370025B1 (en) * 2014-06-11 2016-06-14 Sprint Spectrum L.P. Contention free preamble reuse based on latency metrics
CN108464052A (zh) * 2015-11-18 2018-08-28 IPCom两合公司 单频网络随机接入

Also Published As

Publication number Publication date
CN113892301A (zh) 2022-01-04
CN113892301B (zh) 2024-06-04

Similar Documents

Publication Publication Date Title
WO2020015610A1 (fr) Procédé, appareil et dispositif de positionnement
EP3709531A1 (fr) Procédé de conditionnement de faisceau et dispositif associé
US11638226B2 (en) Method and device for processing synchronization signal block information and communication device
CN105474719A (zh) 用于发送或接收协助数据的设备和方法
WO2021000680A1 (fr) Procédé de transmission de coopération et appareil de communication
TWI696366B (zh) 傳輸控制通道的方法、網路設備和終端設備
WO2021208856A1 (fr) Procédé de réception de signal de référence de positionnement et équipement utilisateur
US20230037478A1 (en) Positioning signal processing method and apparatus
WO2020078318A1 (fr) Procédé et appareil de communication
KR20160068844A (ko) D2d 발견 신호의 송신 방법과 송신 장치
WO2023206178A1 (fr) Procédés de coexistence de communication de liaison latérale selon de multiples technologies d'accès radioélectrique, et dispositifs associés
WO2022007623A1 (fr) Procédé et appareil pour accéder à une cellule
WO2022077387A1 (fr) Procédé de communication et appareil de communication
WO2022061940A1 (fr) Procédé de transmission de données de modèle et appareil de communication
WO2022117087A1 (fr) Procédé et dispositif de positionnement sur liaison latérale (sl), et terminal
US20240129089A1 (en) Positioning method and apparatus, and related device
US20210204312A1 (en) Downlink control information transmission method and apparatus
WO2021159421A1 (fr) Procédé et appareil de positionnement
US20230180192A1 (en) Communication method and apparatus, and readable storage medium
WO2017080489A1 (fr) Procédé et dispositif de traitement de message de découverte
WO2021072706A1 (fr) Procédé et appareil de communication
WO2019006882A1 (fr) Procédé, appareil et système d'apprentissage de faisceau de transmission
WO2020010985A1 (fr) Procédé de couverture de terminaux, dispositif de communication et support de stockage lisible par ordinateur
WO2022206688A1 (fr) Procédé et appareil de positionnement
WO2023124753A1 (fr) Procédé et appareil d'attribution de ressources pour communication d2d, et support et produit de programme

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19949488

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19949488

Country of ref document: EP

Kind code of ref document: A1