WO2021128016A1 - Procédé, appareil et dispositif de communication - Google Patents

Procédé, appareil et dispositif de communication Download PDF

Info

Publication number
WO2021128016A1
WO2021128016A1 PCT/CN2019/128023 CN2019128023W WO2021128016A1 WO 2021128016 A1 WO2021128016 A1 WO 2021128016A1 CN 2019128023 W CN2019128023 W CN 2019128023W WO 2021128016 A1 WO2021128016 A1 WO 2021128016A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
event
category
information
type
Prior art date
Application number
PCT/CN2019/128023
Other languages
English (en)
Chinese (zh)
Inventor
张向东
娄崇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2019/128023 priority Critical patent/WO2021128016A1/fr
Publication of WO2021128016A1 publication Critical patent/WO2021128016A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • This application relates to the field of mobile communication technology, and in particular to a communication method, device and equipment.
  • the terminal device can achieve uplink synchronization with the network device through a random access (RA) process.
  • the random access process includes a contention-based random access process and a non-contention random access process.
  • the contention-based random access process is completed in four steps, so it is also called the 4-step random access process.
  • the 4-step random access process requires a lot of interaction procedures, and the delay is large, and it cannot be well applied to scenarios with high delay requirements. Therefore, a contention-based 2-step random access procedure is introduced.
  • the 2-step random access process random access can be completed in only two steps. Obviously, because there are relatively few interactive steps, it is possible to reduce the network access delay, which is beneficial to satisfying scenarios with high delay requirements.
  • the 2-step random access procedure can also be used in non-competitive access scenarios, and there is no special restriction here.
  • a criterion that has been defined currently is to select according to the channel quality threshold. For example, if the reference signal receiving power (RSRP) value measured by the terminal device in the downlink is greater than a given threshold, the terminal device can choose a 2-step random access procedure, otherwise the terminal device chooses a 4-step random access procedure.
  • RSRP reference signal receiving power
  • the channel quality of most terminal devices that initiate random access is greater than a given threshold.
  • most terminal devices will choose a 2-step random access process, so that the resources of the 2-step random access process are limited. If the load is heavier, the collision probability will increase, and the random access delay will also increase. However, at the same time, the resource load of the 4-step random access process will be relatively light, but the random access will be completed quickly. It can be seen that simply selecting the type of random access procedure based on the channel quality threshold may have the problem of load imbalance.
  • the embodiments of the present application provide a communication method, device, and equipment, which are used to balance the load of random access resources.
  • a first communication method comprising: determining a first random access type corresponding to a random access procedure triggered by a first type of event, the first type of event being included in the first type Eventually, the first random access type includes 2-step RACH, 4-step RACH, or one or more of 2-step RACH and 4-step RACH, and the first category is one of multiple categories, and Each of the multiple categories includes at least one event; a random access response message in the first random access process is sent, and the random access response message is used to indicate the first random access type.
  • the method may be executed by a first communication device, and the first communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the first communication device is a network device, or a chip set in the network device for realizing the function of the network device, or other component used for realizing the function of the network device.
  • the first communication device is a network device.
  • RACH types can be set for different types of events.
  • the two-step random access process can be corresponded to to reduce Network access delay improves access efficiency.
  • the 4-step random access process which eliminates the need for all events to use the 2-step random access process, and try to meet the low latency of emergency or high-priority events. If required, the load of random access resources can also be balanced.
  • the random access response message is used to indicate the first random access type, including:
  • the random access response message is used to indicate the first category, and the first category corresponds to the first random access type.
  • the correspondence between the category and the random access type is determined in advance, and the network device has notified the terminal device of the correspondence between the category and the random access type in advance.
  • the network device may use the first broadcast message
  • the terminal device is notified of the correspondence between the category and the random access type, or the network device may also notify the terminal device of the correspondence between the category and the random access type through other messages.
  • the second message indicates the first category, and the terminal device can determine that the random access type corresponding to the first category is the first random access type. Therefore, the second message indicates the first category, which is equivalent to indicating the first category.
  • the random access type in other words, is equivalent to indicating that the first category corresponds to the first random access type.
  • the network device is configured in advance, and the type indicated by the network device through the second message, and the corresponding random access type is the first random access type.
  • the second message only needs to indicate the first category, and the terminal device can determine that the first category corresponds to the first random access type.
  • the random access response message is used to indicate the first random access type, including:
  • the random access response message is used to indicate the first random access mode.
  • the correspondence between the category and the random access method is determined in advance, and the network device has notified the terminal device of the correspondence between the category and the random access method in advance.
  • the network device may notify the terminal device of the correspondence between the category and the random access method in advance.
  • the corresponding relationship between the category and the random access mode is notified to the terminal device, or the network device may also notify the terminal device of the corresponding relationship between the category and the random access mode through other messages.
  • the random access method and the random access type also have a corresponding relationship.
  • the corresponding relationship between the random access type and the random access method is determined in advance, and the network equipment has previously combined the random access type with the random access method.
  • the corresponding relationship between the random access methods is notified to the terminal device.
  • the network device can notify the terminal device of the corresponding relationship between the random access type and the random access method through the first broadcast message, or the network device can also use other
  • the message notifies the terminal device of the correspondence between the random access type and the random access mode.
  • the corresponding relationship between the random access type and the random access mode can be determined by the terminal device itself.
  • the terminal device can determine the corresponding relationship between the random access type and the random access mode in advance.
  • the second message may indicate the first category, and the terminal device may determine that the random access mode corresponding to the first category is the first random access mode.
  • the terminal device also knows the correspondence between the random access type and the random access mode, so that it can determine that the first category corresponds to the first random access type. Therefore, the second message indicates the first category, which is equivalent to indicating the first random access type. Or, in this case, the second message may indicate the first random access mode, and the terminal device may determine that the first random access mode corresponds to the first category. The terminal device also knows the correspondence between the random access type and the random access mode, so that it can determine that the first category corresponds to the first random access type. Therefore, the second message indicates the first random access mode, which is equivalent to indicating the first random access type.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • Perform a 4-step random access process switch from a 2-step random access process to a 4-step random access process, switch from a 4-step random access process to a 2-step random access process, perform a 4-step random access process, or perform 2 A kind of random access process.
  • the first random access method is, for example, allowing 2-step RACH, not allowing 2-step RACH, allowing 4-step RACH, not allowing 4-step RACH, switching from 2-step RACH to 4-step RACH, and switching from 4-step RACH.
  • 2-step RACH perform 4-step RACH, perform 2-step RACH, perform 2-step RACH early data transmission (EDT), perform 4-step RACH data early transmission, allow 2-step RACH data early transmission, allow 4 One of the early transmission of RACH data in one step, the early transmission of 2-step RACH data is not allowed, or the early transmission of 4-step RACH data is not allowed.
  • the first random access method can be: allow 2-step RACH, not allow 4-step RACH, switch from 4-step RACH to 2-step RACH, and perform 2-step RACH , One of two-step early RACH data transmission, two-step RACH data early transmission, or four-step RACH data early transmission is not allowed.
  • the first random access type is 4-step RACH
  • the first random access method may be: 2-step RACH is not allowed, 4-step RACH is allowed, switch from 2-step RACH to 4-step RACH, and 4-step RACH is allowed.
  • RACH one of allowing 4-step RACH data early transmission, 4-step RACH data early transmission, or not allowing 2-step RACH data early transmission.
  • the first random access method may be: 2-step RACH is allowed, 2-step RACH is not allowed, 4-step RACH is allowed, and RACH is not allowed.
  • 4-step RACH switch from 2-step RACH to 4-step RACH, switch from 4-step RACH to 2-step RACH, perform 4-step RACH, perform 2-step RACH, perform 2-step RACH early data transmission (EDT), perform One of the 4-step early RACH data transmission, the 2-step early RACH data transmission is allowed, the 4-step RACH data early transmission is allowed, the 2-step RACH data early transmission is not allowed, or the 4-step RACH data early transmission is not allowed.
  • the first category is category 1, category 2, category 3, or category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • This classification is based on the urgency of the event. For example, the urgency of the event included in category 2 is higher than that of the event included in category 3, and the urgency of the event included in category 3 is higher than that of category 4. The urgency of the incident included.
  • this classification method is just an example, and other classification methods are also possible.
  • the method further includes:
  • the network device may send a broadcast message, for example, a first broadcast message, to broadcast the events included in the multiple categories to the terminal device.
  • a broadcast message for example, a first broadcast message
  • the terminal device can know how many categories the event is divided into, and also know the events included in each category.
  • the category to which the event belongs can also be stipulated by agreement. If this is the case, the network device does not need to send the first broadcast message, and both the terminal device and the network device can determine how many categories the event is divided into according to the protocol, and determine the events included in each category.
  • the method further includes:
  • the second random access process is a random access process corresponding to the first random access type, and the second random access process is triggered by the first type of event.
  • the terminal device determines the first random access type corresponding to the first category, if there is a random access process triggered by the first type of event, the terminal device can select the first random access type according to the instructions of the second message.
  • the random access type performs random access.
  • the random access response message is also used to indicate the first information and/or the second information corresponding to the random access process triggered by the first type of event; or,
  • the second broadcast message being used to indicate the first information and/or the second information corresponding to the random access process triggered by the first type of event;
  • the first information is the corresponding power ramp step information for the random access process triggered by the first type of event
  • the second information is the random access triggered by the first type of event.
  • corresponding power ramp step information, or duration information, or power ramp step information can also be set for different categories.
  • duration information can be understood as the backoff duration.
  • the urgency of the events included in category 2 is relatively high.
  • the power ramp step information if the power ramp step information is to be set, the power ramp step can be set to be larger, and the terminal device can climb more power at a time.
  • the duration information if the duration information is to be set, the set duration can be shorter. The terminal device only needs to back off for a short time, or even without back off (the duration indicated by the duration information is 0).
  • the next random access attempt improves the efficiency of the random access process, so that the terminal device can access the network device as soon as possible.
  • the urgency of events included in category 4 is low.
  • the set power ramp step length can be smaller, and the terminal device can climb less power at a time , In order to save the power consumption of the terminal equipment.
  • the duration information is to be set, the duration can be set to be longer, and the terminal device can back off for a longer period of time before making the next random access attempt, which will not affect the requirements of the event, but can also be as long as possible.
  • Other random access procedures give up time and reduce the probability of collision.
  • a second communication method includes: receiving a random access response message in a first random access process from a network device, where the random access response message is used to indicate the first random access type Determining that the random access process triggered by the first type of event corresponds to the first random access type, the first type of event is an event included in the first category, and the first category is one of multiple categories One, each of the plurality of categories includes at least one event.
  • the method may be executed by a second communication device, and the second communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the second communication device is a terminal device, or a chip set in the terminal device for realizing the function of the terminal device, or other component used for realizing the function of the terminal device.
  • the second communication device is a terminal device.
  • the random access response message is used to indicate the first random access type, including:
  • the second message is used to indicate the first category, and the first category corresponds to the first random access type.
  • the random access response message is used to indicate the first random access type, including:
  • the random access response message is used to indicate the first random access mode.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • Perform a 4-step random access process switch from a 2-step random access process to a 4-step random access process, switch from a 4-step random access process to a 2-step random access process, perform a 4-step random access process, or perform 2 A kind of random access process.
  • the multiple categories include one or more of category 1, category 2, category 3, or category 4, and the first category is the category 1, the category 2, The category 3 or the category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • the method further includes:
  • the method further includes:
  • the entry process is triggered by the first type of event.
  • the random access response message is also used to indicate the first information and/or the second information corresponding to the random access process triggered by the first type of event; or,
  • the first information is power ramp step information corresponding to the first random access opportunity for the random access process triggered by the first type of event
  • the second information is the first type of Backoff duration information corresponding to the first random access opportunity in the random access process triggered by the event.
  • a third communication method includes: determining third information corresponding to a random access procedure triggered by a first type of event, where the third information includes the first information and/or the second information,
  • the first type of event is an event included in a first category
  • the first category is one of multiple categories
  • each category of the multiple categories includes at least one event
  • the first information is The power ramp step length information corresponding to the random access process triggered by the first type event
  • the second information is the backoff duration information corresponding to the random access process triggered by the first type event
  • all The multiple categories further include a second category, and the events included in the second category are events of the second category: the power ramp indicated by the power ramp step information corresponding to the random access process triggered by the second event
  • the ramp step length is different from the power ramp step length indicated by the power ramp step length information corresponding to the random access process triggered by the first type event, and/or, the random access process triggered by the second type event
  • the method may be executed by a third communication device, and the third communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the third communication device is a network device, or a chip set in the network device for realizing the function of the network device, or other component used for realizing the function of the network device.
  • the third communication device is a network device.
  • corresponding third information can be set for events of different categories. For example, for events with a higher degree of urgency, if the power ramp step information is to be set, the set power ramp step can be set to be lower. Large, the terminal equipment can climb more power at a time to improve the success rate of random access. For events with a higher degree of urgency, if you want to set the duration information, the duration can be set to be shorter. The terminal device only needs to back off for a short time or even without back off, and then the next random access attempt can be made to improve the random access. The efficiency of the entry process enables terminal equipment to access network equipment as soon as possible.
  • the power ramp step can be set to be smaller, and the terminal device can climb less power at a time to save the power consumption of the terminal device .
  • the duration can be set longer, and the terminal device can back off for a longer period of time before proceeding to the next random access attempt, which will not affect the requirements of the event, but can also be used as much as possible.
  • Other random access procedures give up time and reduce the probability of collision.
  • the notification message is a first broadcast message or a random access response message in the first random access process.
  • the notification message may be a first broadcast message. Through the first broadcast message, the third information corresponding to the first category can be notified to more terminal devices without sending messages to each terminal device in turn, which helps to save signaling overhead.
  • the notification message may also be a random response message, through which the notified terminal device is more targeted.
  • the notification message is the random access response message
  • the random access response message is further used to indicate that the random access process triggered by the first type event corresponds to the first type of event.
  • a random access type, the first random access type includes a 2-step random access process, a 4-step random access process, or one or more of a 2-step random access process and a 4-step random access process .
  • the random access response message is used to indicate that the random access process triggered by the first type event corresponds to the first random access type, including:
  • the random access response message is used to indicate the first random access mode corresponding to the first category.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • Perform a 4-step random access process switch from a 2-step random access process to a 4-step random access process, switch from a 4-step random access process to a 2-step random access process, perform a 4-step random access process, or perform 2 A kind of random access process.
  • the method further includes:
  • the notification message is the first broadcast message, and the first broadcast message is also used to indicate events included in the multiple categories, or to indicate the multiple categories The events included, and the correspondence between the multiple categories and the random access type.
  • the first broadcast message may indicate events included in multiple categories in addition to the third information corresponding to the first category.
  • the terminal device can determine the first broadcast message according to the first broadcast message.
  • the third information corresponding to the category may also determine events included in multiple categories.
  • the first broadcast message indicates the third information corresponding to the first category, It can also indicate events included in multiple categories, and indicate the correspondence between multiple categories and random access types.
  • the terminal device can determine the third information corresponding to the first category according to the first broadcast message, and determine the location of multiple categories. Including events, and determining the correspondence between multiple categories and random access types. In this way, events included in multiple categories can be sent without using other broadcast messages, and signaling overhead can be saved.
  • the correspondence between the category and the random access type may also be indicated not by the first broadcast message, but by other messages, or stipulated by the protocol.
  • the first category is category 1, category 2, category 3, or category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • a fourth communication method includes: receiving a notification message from a network device, where the notification message is used to indicate third information corresponding to a first category; and determining the first category included in the first category
  • the random access process triggered by the event corresponds to the third information
  • the first category is one of a plurality of categories, each category of the plurality of categories includes at least one event, and the first information Power ramp step length information corresponding to the random access process triggered by the first type event
  • the second information is backoff duration information corresponding to the random access process triggered by the first type event
  • the multiple categories further include a second category, and the events included in the second category are events of the second category: the power indicated by the power ramp step information corresponding to the random access process triggered by the second category of events
  • the ramp step length is different from the power ramp step length indicated by the power ramp step length information corresponding to the random access process triggered by the first type event, and/or the power ramp step length triggered by the second type event
  • the method may be executed by a fourth communication device, and the fourth communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the fourth communication device is a terminal device, or a chip set in the terminal device for realizing the function of the terminal device, or other component used for realizing the function of the terminal device.
  • the fourth communication device is a terminal device.
  • the notification message is a first broadcast message or a random access response message in the first random access process.
  • the notification message is the random access response message
  • the random access response message is further used to indicate that the random access process triggered by the first type event corresponds to the first type of event.
  • a random access type, the first random access type includes a 2-step random access process, a 4-step random access process, or one or more of a 2-step random access process and a 4-step random access process .
  • the random access response message is used to indicate that the random access process triggered by the first type event corresponds to the first random access type, including:
  • the random access response message is used to indicate the first random access mode corresponding to the first category.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • Perform a 4-step random access process switch from a 2-step random access process to a 4-step random access process, switch from a 4-step random access process to a 2-step random access process, perform a 4-step random access process, or perform 2 A kind of random access process.
  • the method further includes:
  • the notification message is the first broadcast message, and the first broadcast message is also used to indicate events included in the multiple categories, or to indicate the multiple categories The events included, and the correspondence between the multiple categories and the random access type.
  • the multiple categories include one or more of category 1, category 2, category 3, or category 4, and the first category is the category 1, the category 2, The category 3 or the category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • the method further includes:
  • a fifth communication method includes: adopting a 2-step random access process for random access; after N attempts, determine whether to continue the random access process according to the value of M, where M is all The maximum number of attempts corresponding to the 2-step random access process, and N is a positive integer.
  • the method may be executed by a fifth communication device, and the fifth communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the fifth communication device is a terminal device, or a chip set in the terminal device for realizing the function of the terminal device, or other component used for realizing the function of the terminal device.
  • the fifth communication device is a terminal device.
  • the network device can be configured. If the number of random access attempts by the terminal device is equal to the maximum number of attempts, the random access is still If it fails, the terminal device can fall back to the 4-step RACH for random access, or it can be configured that the terminal device cannot fall back from the 2-step RACH to the 4-step RACH. This enables network devices to be configured in multiple configurations, and there is no contradiction between multiple configurations.
  • determining whether to continue the random access procedure according to the value of M includes:
  • N can be equal to M, which is equivalent to that if the terminal device still fails random access after M random access attempts, then the terminal device can fall back to the 4-step RACH and restart the 4-step RACH. Random access is performed in RACH mode. Or, if the value of M is infinite, then N is less than M. In this case, the terminal device may not need to fall back to the 4-step RACH, but determine that the random access fails. For example, the terminal device can notify the upper layer of the terminal device to determine that the random access fails. In this way, if the value of M is infinite, the terminal device will not always perform random access attempts, but can determine the random access failure in time, so that other processes can be continued to avoid entering an endless loop.
  • the method further includes:
  • the configuration information may be included in high-level signaling, such as RRC signaling or media access control control element (MAC CE), etc., or may also be included in dynamic signaling, such as downlink control information (downlink control information). control information, DCI), etc.
  • the value of M can also be specified by a protocol, or pre-configured in the terminal device, etc. If this is the case, the network device does not need to send configuration information, and the terminal device does not receive configuration information from the network device.
  • a sixth communication method comprising: determining random access information corresponding to a terminal device, the random access information indicating a first parameter, a first random access type, duration information, or power ramp One or more of the information, the first parameter is used to determine the random access type; the random access response message in the first random access process is sent, and the random access response message is used to indicate the random access Access information.
  • the method may be executed by a sixth communication device, and the sixth communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the sixth communication device is a network device, or a chip set in the network device for realizing the function of the network device, or other component used for realizing the function of the network device.
  • the sixth communication device is a network device.
  • the information included in the second message can be used to indicate more content, which enriches the information indicated for the terminal device and improves the utilization rate of the information.
  • the random access information indicating the first random access type includes:
  • the random access information indicates a first random access method, and the first random access method is a 2-step random access process, or, switching from a 2-step random access process to a 4-step random access process, or, Switch from the 4-step random access process to the 2-step random access process.
  • the random access response message includes first information and second information, where:
  • the value of the first information is a first value
  • the value of the second information is a second value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the first information is a third value
  • the value of the second information is a fourth value, which is used to indicate the first random access type corresponding to the terminal device.
  • the second message in the random access process may include a MAC subheader, which may include a 1-bit parameter T1 and a 1-bit parameter T2.
  • the first information may be the parameter T1
  • the second information may be the parameter T2.
  • the access type for example, can indicate switching from 2-step RACH to 4-step RACH.
  • Step RACH switches to 4-step RACH.
  • the random access response message includes a MAC subheader
  • the MAC subheader includes the first information and the second information.
  • the second message in the random access process may include the MAC subheader.
  • the first information and the second information may be included in the MAC subheader.
  • the MAC subheader may include a 1-bit parameter T1 and a 1-bit parameter T2.
  • the first information is the parameter T1
  • the second information is The parameters T2 and so on.
  • the implementation of the first information and the second information is not limited to this.
  • the random access response message includes third information, where:
  • the value of the third information is a fifth value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the third information is a sixth value, which is used to indicate the first random access type corresponding to the terminal device; or,
  • the value of the third information is the seventh value, which is used to indicate whether the terminal device performs backoff after handover; or,
  • the value of the third information is an eighth value, which is used to indicate whether the terminal device performs power ramp after handover.
  • two reserved bits may be included, so one way of implementing the third information is to use these two bits as the third information.
  • the first parameter for example, the first parameter is parameter BI'; or, when the value of these 2 bits is 01, it indicates the first random access type, such as indicating Switch from 2-step RACH to 4-step RACH, or instruct to switch from 4-step RACH to 2-step RACH; or, when the value of these 2 bits is 10, it indicates the duration information and power ramp information, for example, it indicates the random connection during the handover.
  • the random access response message includes a MAC subheader, and the MAC subheader includes the first information.
  • the third information is that these two bits can be used as the third information.
  • the implementation of the third information is not limited to this.
  • a seventh communication method includes: receiving a random access response message in a first random access process from a network device; determining random access information according to the random access response message, and randomly accessing
  • the input information indicates one or more of the first parameter, the first random access type, duration information, or power ramp information, and the first parameter is used to determine the random access type.
  • the method may be executed by a seventh communication device, and the seventh communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the seventh communication device is a terminal device, or a chip set in the terminal device for realizing the function of the terminal device, or other component used for realizing the function of the terminal device.
  • the seventh communication device is a terminal device.
  • the random access information indicating the first random access type includes:
  • the random access information indicates a first random access method, and the first random access method is a 2-step random access process, or, switching from a 2-step random access process to a 4-step random access process, or, Switch from the 4-step random access process to the 2-step random access process.
  • the random access response message includes first information and second information, where:
  • the value of the first information is a first value
  • the value of the second information is a second value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the first information is a third value
  • the value of the second information is a fourth value, which is used to indicate the first random access type corresponding to the terminal device.
  • the second message includes a MAC subheader
  • the MAC subheader includes the first information and the second information
  • the random access response message includes third information, where:
  • the value of the third information is a fifth value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the third information is a sixth value, which is used to indicate the first random access type corresponding to the terminal device; or,
  • the value of the third information is the seventh value, which is used to indicate whether the terminal device performs backoff after handover; or,
  • the value of the third information is an eighth value, which is used to indicate whether the terminal device performs power ramp after handover.
  • the random access response message includes a MAC subheader, and the MAC subheader includes the first information.
  • a communication device is provided, for example, the communication device is the first communication device as described above.
  • the first communication device is configured to execute the method in the foregoing first aspect or any possible implementation manner.
  • the first communication device may include a module for executing the method in the first aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the first communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the first communication device is a network device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver (or transmitter and receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the first communication device is continued to be a network device, and the processing module and the transceiver module are used as examples for the introduction. among them,
  • the processing module is configured to determine a first random access type corresponding to a random access process triggered by a first type of event, where the first type of event is an event included in the first type, and the first random access
  • the input type includes 2-step RACH, 4-step RACH, or one or more of 2-step RACH and 4-step RACH.
  • the first category is one of a plurality of categories, and each category of the plurality of categories Include at least one event;
  • the transceiver module is configured to send a random access response message in a first random access process, where the random access response message is used to indicate the first random access type.
  • the random access response message is used to indicate the first random access type, including:
  • the random access response message is used to indicate the first category, and the first category corresponds to the first random access type.
  • the random access response message is used to indicate the first random access type, including:
  • the random access response message is used to indicate the first random access mode.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • Perform a 4-step random access process switch from a 2-step random access process to a 4-step random access process, switch from a 4-step random access process to a 2-step random access process, perform a 4-step random access process, or perform 2 A kind of random access process.
  • the first category is category 1, category 2, category 3, or category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • the transceiver module is further configured to send a first broadcast message, and the first broadcast message is used to indicate events included in the multiple categories.
  • the transceiver module is further configured to receive a random access request message in a second random access process from a terminal device, and the second random access process is the first random access process.
  • the random access process corresponding to the random access type.
  • the random access response message is also used to indicate the first information and/or the second information corresponding to the random access process triggered by the first type of event; or,
  • the transceiver module is further configured to send a second broadcast message, the second broadcast message being used to indicate the first information and/or the second information corresponding to the random access process triggered by the first type of event;
  • the first information is the corresponding power ramp step information for the random access process triggered by the first type of event
  • the second information is the random access triggered by the first type of event.
  • a communication device is provided, for example, the communication device is the second communication device as described above.
  • the second communication device is used to execute the method in the above-mentioned second aspect or any possible implementation manner.
  • the second communication device may include a module for executing the method in the second aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the second communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device.
  • the second communication device is a terminal device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver (or, transmitter and receiver) is, for example, a communication interface in the chip, and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the second communication device is continued to be a terminal device, and the processing module and the transceiver module are used as examples for the introduction. among them,
  • the transceiver module is configured to receive a random access response message in a first random access process from a network device, where the random access response message is used to indicate a first random access type;
  • the processing module is configured to determine that a random access process triggered by a first type of event corresponds to the first random access type, the first type of event is an event included in a first type, and the first type It is one of a plurality of categories, and each of the plurality of categories includes at least one event.
  • the random access response message is used to indicate the first random access type, including:
  • the second message is used to indicate the first category, and the first category corresponds to the first random access type.
  • the random access response message is used to indicate the first random access type, including:
  • the random access response message is used to indicate the first random access mode.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • Perform a 4-step random access process switch from a 2-step random access process to a 4-step random access process, switch from a 4-step random access process to a 2-step random access process, perform a 4-step random access process, or perform 2 A kind of random access process.
  • the multiple categories include one or more of category 1, category 2, category 3, or category 4, and the first category is the category 1, the category 2, The category 3 or the category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • the transceiver module is further configured to receive a first broadcast message from the network device, where the first broadcast message is used to indicate events included in the multiple categories.
  • the transceiver module is further configured to send a random access request message in a second random access process to the network device, and the second random access process is the first random access process.
  • a random access process corresponding to a random access type, and the second random access process is triggered by the first type of event.
  • the random access response message is also used to indicate the first information and/or the second information corresponding to the random access process triggered by the first type of event; or,
  • the transceiver module is further configured to receive a second broadcast message from the network device, where the second broadcast message is used to indicate the first information and/or corresponding to the random access process triggered by the first type of event Or second information;
  • the first information is power ramp step information corresponding to the first random access opportunity for the random access process triggered by the first type of event
  • the second information is the first type of Backoff duration information corresponding to the first random access opportunity in the random access process triggered by the event.
  • a communication device is provided, for example, the communication device is the third communication device as described above.
  • the third communication device is used to execute the method in the third aspect or any possible implementation manner.
  • the third communication device may include a module for executing the method in the third aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the third communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the third communication device is a network device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the third communication device is a chip set in the communication device
  • the transceiver (or, the transmitter and the receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the third communication device is continued to be a network device, and the processing module and the transceiver module are used as examples for the introduction. among them,
  • the processing module is configured to determine third information corresponding to a random access process triggered by a first type of event, where the third information includes first information and/or second information, and the first type of event is the first Events included in a category, the first category is one of multiple categories, each category in the multiple categories includes at least one event, and the first information is triggered by the first category event
  • the power ramp step length information corresponding to the random access process of the first type of event, the second information is the backoff duration information corresponding to the random access process triggered by the first type of event
  • the multiple types further include a second Category, the events included in the second category are events of the second category: the power ramp step size indicated by the power ramp step size information corresponding to the random access process triggered by the second category event is the same as the first category event
  • the power ramp step size indicated by the power ramp step information corresponding to the random access process triggered by a type of event is different, and/or the power ramp corresponding to the random access process triggered by the second type of event
  • the transceiver module is configured to send a notification message, where the notification message is used to indicate the third information corresponding to the first category.
  • the notification message is a first broadcast message or a random access response message in the first random access process.
  • the notification message is the random access response message
  • the random access response message is further used to indicate that the random access process triggered by the first type event corresponds to the first type of event.
  • a random access type, the first random access type includes a 2-step random access process, a 4-step random access process, or one or more of a 2-step random access process and a 4-step random access process .
  • the random access response message is used to indicate that the random access process triggered by the first type event corresponds to the first random access type, including:
  • the random access response message is used to indicate the first random access mode corresponding to the first category.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • Perform a 4-step random access process switch from a 2-step random access process to a 4-step random access process, switch from a 4-step random access process to a 2-step random access process, perform a 4-step random access process, or perform 2 A kind of random access process.
  • the transceiver module is further configured to send a second broadcast message, and the second broadcast message is used to indicate events included in the multiple categories.
  • the notification message is the first broadcast message, and the first broadcast message is also used to indicate events included in the multiple categories, or to indicate the multiple categories The events included, and the correspondence between the multiple categories and the random access type.
  • the first category is category 1, category 2, category 3, or category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • a communication device is provided, for example, the communication device is the fourth communication device as described above.
  • the fourth communication device is used to execute the method in the foregoing fourth aspect or any possible implementation manner.
  • the fourth communication device may include a module for executing the method in the fourth aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the fourth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device.
  • the fourth communication device is a terminal device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the fourth communication device is a chip set in the communication device
  • the transceiver (or, the transmitter and the receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the fourth communication device is continued to be a terminal device, and the processing module and the transceiver module are used as examples for the introduction. among them,
  • the transceiver module is configured to receive a notification message from a network device, where the notification message is used to indicate third information corresponding to the first category;
  • the processing module is configured to determine that a random access process triggered by a first type event included in the first category corresponds to the third information, the first category is one of multiple categories, and the multiple Each of the three categories includes at least one event, the first information is power ramp step information corresponding to the random access process triggered by the first type of event, and the second information is the first Backoff duration information corresponding to the random access process triggered by a type of event, wherein the multiple categories further include a second category, and the events included in the second category are events of the second type: The power ramp step length indicated by the power ramp step length information corresponding to the triggered random access process, and the power ramp step length information indicated by the power ramp step length information corresponding to the random access process triggered by the first type of event The ramp step length is different, and/or the backoff duration indicated by the power ramp step length information corresponding to the random access process triggered by the second type event is the same as the random access process triggered by the first type event The backoff time indicated by the corresponding power ramp step information is different.
  • the notification message is a first broadcast message or a random access response message in the first random access process.
  • the notification message is the random access response message
  • the random access response message is further used to indicate that the random access process triggered by the first type event corresponds to the first type of event.
  • a random access type, the first random access type includes a 2-step random access process, a 4-step random access process, or one or more of a 2-step random access process and a 4-step random access process .
  • the random access response message is used to indicate that the random access process triggered by the first type event corresponds to the first random access type, including:
  • the random access response message is used to indicate the first random access mode corresponding to the first category.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • Perform a 4-step random access process switch from a 2-step random access process to a 4-step random access process, switch from a 4-step random access process to a 2-step random access process, perform a 4-step random access process, or perform 2 A kind of random access process.
  • the transceiver module is further configured to receive a second broadcast message from the network device, and the second broadcast message is used to indicate events included in the multiple categories.
  • the notification message is the first broadcast message, and the first broadcast message is also used to indicate events included in the multiple categories, or to indicate the multiple categories The events included, and the correspondence between the multiple categories and the random access type.
  • the multiple categories include one or more of category 1, category 2, category 3, or category 4, and the first category is the category 1, the category 2, The category 3 or the category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • the transceiver module is further configured to initiate a second random access process to the network device according to the third information, and the second random access process is controlled by the second random access process.
  • One type of event triggered is further configured to initiate a second random access process to the network device according to the third information, and the second random access process is controlled by the second random access process.
  • a communication device is provided, for example, the communication device is the fifth communication device as described above.
  • the fifth communication device is used to execute the method in the fifth aspect or any possible implementation manner.
  • the fifth communication device may include a module for executing the method in the fifth aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the fifth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device.
  • the fifth communication device is a terminal device.
  • the receiving and sending module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver (or, the transmitter and the receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the fifth communication device is continued to be a terminal device, and the processing module and the transceiving module are used as examples for the introduction. among them,
  • the transceiver module is configured to perform random access using a 2-step random access process
  • the processing module is configured to determine whether to continue the random access process according to the value of M after N attempts, where M is the maximum number of attempts corresponding to the 2-step random access process, and N is a positive integer.
  • the processing module is configured to determine whether to continue the random access process according to the value of M in the following manner:
  • the transceiver module is further configured to receive configuration information from a network device, and the configuration information is used to configure the value of M.
  • a communication device is provided, for example, the communication device is the sixth communication device as described above.
  • the sixth communication device is used to execute the method in the sixth aspect or any possible implementation manner.
  • the sixth communication device may include a module for executing the method in the sixth aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the sixth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device.
  • the sixth communication device is a network device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the sixth communication device is a chip set in a communication device
  • the transceiver (or transmitter and receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the sixth communication device is continued to be a network device, and the processing module and the transceiver module are used as examples for the introduction. among them,
  • the processing module is configured to determine random access information corresponding to the terminal device, where the random access information indicates one or more of a first parameter, a first random access type, duration information, or power ramp information ,
  • the first parameter is used to determine the random access type
  • the transceiver module is configured to send a random access response message in the first random access process, where the random access response message is used to indicate the random access information.
  • the random access information indicating the first random access type includes:
  • the random access information indicates a first random access method, and the first random access method is a 2-step random access process, or, switching from a 2-step random access process to a 4-step random access process, or, Switch from the 4-step random access process to the 2-step random access process.
  • the random access response message includes first information and second information, where:
  • the value of the first information is a first value
  • the value of the second information is a second value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the first information is a third value
  • the value of the second information is a fourth value, which is used to indicate the first random access type corresponding to the terminal device.
  • the random access response message includes a MAC subheader
  • the MAC subheader includes the first information and the second information.
  • the random access response message includes third information, where:
  • the value of the third information is a fifth value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the third information is a sixth value, which is used to indicate the first random access type corresponding to the terminal device; or,
  • the value of the third information is the seventh value, which is used to indicate whether the terminal device performs backoff after handover; or,
  • the value of the third information is an eighth value, which is used to indicate whether the terminal device performs power ramp after handover.
  • the random access response message includes a MAC subheader, and the MAC subheader includes the first information.
  • a communication device is provided, for example, the communication device is the seventh communication device as described above.
  • the seventh communication device is configured to execute the method in the seventh aspect or any possible implementation manner.
  • the seventh communication device may include a module for executing the method in the seventh aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the seventh communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device.
  • the seventh communication device is a terminal device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the seventh communication device is a communication device
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the seventh communication device is a chip set in a communication device
  • the transceiver (or, transmitter and receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the seventh communication device is continued to be a terminal device, and the processing module and the transceiver module are used as examples for the introduction. among them,
  • the transceiver module is configured to receive a random access response message in the first random access process from a network device;
  • the processing module is configured to determine random access information according to the random access response message, where the random access information indicates one of a first parameter, a first random access type, duration information, or power ramp information, or There are multiple types, and the first parameter is used to determine the random access type.
  • the random access information indicating the first random access type includes:
  • the random access information indicates a first random access method, and the first random access method is a 2-step random access process, or, switching from a 2-step random access process to a 4-step random access process, or, Switch from the 4-step random access process to the 2-step random access process.
  • the random access response message includes first information and second information, where:
  • the value of the first information is a first value
  • the value of the second information is a second value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the first information is a third value
  • the value of the second information is a fourth value, which is used to indicate the first random access type corresponding to the terminal device.
  • the second message includes a MAC subheader
  • the MAC subheader includes the first information and the second information
  • the random access response message includes third information, where:
  • the value of the third information is a fifth value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the third information is a sixth value, which is used to indicate the first random access type corresponding to the terminal device; or,
  • the value of the third information is the seventh value, which is used to indicate whether the terminal device performs backoff after handover; or,
  • the value of the third information is an eighth value, which is used to indicate whether the terminal device performs power ramp after handover.
  • the random access response message includes a MAC subheader, and the MAC subheader includes the first information.
  • a communication device is provided.
  • the communication device is, for example, the first communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the first aspect or various possible implementation manners.
  • the first communication device may not include a memory, and the memory may be located outside the first communication device.
  • the first communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the first aspect or various possible implementation manners.
  • the first communication device when the processor executes the computer instructions stored in the memory, the first communication device is caused to execute the method in the foregoing first aspect or any one of the possible implementation manners.
  • the first communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device.
  • the communication interface is realized by a transceiver (or a transmitter and a receiver) in the communication device, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the communication interface is, for example, an input/output interface of the chip, such as input/output pins, etc., and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the second communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the second aspect or various possible implementation manners.
  • the second communication device may not include a memory, and the memory may be located outside the second communication device.
  • the second communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the second aspect or various possible implementation manners.
  • the second communication device when the processor executes the computer instructions stored in the memory, the second communication device is caused to execute the method in the second aspect or any one of the possible implementation manners.
  • the second communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the communication interface is realized by, for example, a transceiver (or transmitter and receiver) in the communication device.
  • the transceiver is realized by an antenna, a feeder, and a receiver in the communication device. Codec and other implementations.
  • the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the third communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the third aspect or various possible implementation manners.
  • the third communication device may not include a memory, and the memory may be located outside the third communication device.
  • the third communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other to implement the methods described in the third aspect or various possible implementation manners.
  • the third communication device when the processor executes the computer instructions stored in the memory, the third communication device is caused to execute the method in the third aspect or any one of the possible implementation manners.
  • the third communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device.
  • the communication interface is realized by a transceiver (or a transmitter and a receiver) in the communication device, for example, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the fourth communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the fourth aspect or various possible implementation manners.
  • the fourth communication device may not include a memory, and the memory may be located outside the fourth communication device.
  • the fourth communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the fourth aspect or various possible implementation manners.
  • the fourth communication device when the processor executes the computer instructions stored in the memory, the fourth communication device is caused to execute the method in the fourth aspect or any one of the possible implementation manners.
  • the fourth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the communication interface is realized by, for example, a transceiver (or a transmitter and a receiver) in the communication device, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the fourth communication device is a chip set in a communication device, the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the fifth communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the fifth aspect or various possible implementation manners.
  • the fifth communication device may not include a memory, and the memory may be located outside the fifth communication device.
  • the fifth communication device may also include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the fifth aspect or various possible implementation manners.
  • the fifth communication device when the processor executes the computer instructions stored in the memory, the fifth communication device is caused to execute the method in the fifth aspect or any one of the possible implementation manners.
  • the fifth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the communication interface is realized by, for example, a transceiver (or a transmitter and a receiver) in the communication device, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the fifth communication device is a chip set in a communication device, the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the sixth communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the sixth aspect or various possible implementation manners.
  • the sixth communication device may not include a memory, and the memory may be located outside the sixth communication device.
  • the sixth communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the sixth aspect or various possible implementation manners.
  • the sixth communication device when the processor executes the computer instructions stored in the memory, the sixth communication device is caused to execute the method in the sixth aspect or any one of the possible implementation manners.
  • the sixth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a network device.
  • the communication interface is realized by a transceiver (or a transmitter and a receiver) in the communication device, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the sixth communication device is a chip set in a communication device, the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided, and the communication device is, for example, the seventh communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the seventh aspect or various possible implementation manners.
  • the seventh communication device may not include a memory, and the memory may be located outside the seventh communication device.
  • the seventh communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the seventh aspect or various possible implementation manners.
  • the seventh communication device is caused to execute the method in the seventh aspect or any one of the possible implementation manners.
  • the seventh communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a terminal device.
  • the communication interface is realized by, for example, a transceiver (or a transmitter and a receiver) in the communication device, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the seventh communication device is a chip set in a communication device, the communication interface is, for example, an input/output interface of the chip, such as input/output pins, etc., and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a first communication system comprising the communication device according to the eighth aspect or the communication device according to the fifteenth aspect, and the communication device according to the ninth aspect or the sixteenth aspect The communication device.
  • a second communication system which includes the communication device according to the tenth aspect or the communication device according to the seventeenth aspect, and the communication device according to the eleventh aspect or the eighteenth aspect.
  • a third communication system includes the communication device according to the twelfth aspect or the communication device according to the nineteenth aspect.
  • a fourth communication system includes the communication device according to the thirteenth aspect or the communication device according to the twentieth aspect, and the communication device according to the fourteenth aspect or the second communication device.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the first aspect or any of the above The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the second aspect or any of the above The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the third aspect or any of the above The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the fourth aspect or any of the above The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the fifth aspect or any one of the foregoing. The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the sixth aspect or any of the above The method described in one possible implementation.
  • a computer-readable storage medium is provided.
  • the computer-readable storage medium is used to store computer instructions.
  • the computer instructions run on a computer, the computer can execute the seventh aspect or any of the above. The method described in one possible implementation.
  • a computer program product containing instructions is provided, the computer program product is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the first aspect or any of the above The method described in one possible implementation.
  • a computer program product containing instructions is provided, the computer program product is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the second aspect or any of the above The method described in one possible implementation.
  • a computer program product containing instructions is provided.
  • the computer program product is used to store computer instructions.
  • the computer instructions run on a computer, the computer executes the third aspect or any of the above. The method described in one possible implementation.
  • a computer program product containing instructions is provided.
  • the computer program product is used to store computer instructions.
  • the computer instructions run on a computer, the computer can execute the fourth aspect or any of the foregoing. The method described in one possible implementation.
  • a computer program product containing instructions is provided, the computer program product is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the fifth aspect or any of the above The method described in one possible implementation.
  • a computer program product containing instructions is provided, the computer program product is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the sixth aspect or any of the above The method described in one possible implementation.
  • a computer program product containing instructions is provided, the computer program product is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the seventh aspect or any of the above The method described in one possible implementation.
  • different random access types can be set for different types of events to reduce network access delay, improve access efficiency, and try to meet the low delay of emergency or high-priority events. If required, the load of random access resources can also be balanced.
  • FIG. 1 is a schematic diagram of an application scenario of an embodiment of the application
  • FIG. 2 is a flowchart of the first communication method provided by an embodiment of this application.
  • FIG. 3 is a flowchart of a second communication method provided by an embodiment of this application.
  • FIG. 4 is a flowchart of a third communication method provided by an embodiment of this application.
  • FIG. 5 is a flowchart of a fourth communication method provided by an embodiment of this application.
  • FIG. 6 is a schematic diagram of the format of the MAC subheader used to indicate the parameter BI in an embodiment of the application;
  • FIG. 7 is a schematic block diagram of a first network device provided by an embodiment of this application.
  • FIG. 8 is a schematic block diagram of a first terminal device provided by an embodiment of this application.
  • FIG. 9 is a schematic block diagram of a second type of network device provided by an embodiment of this application.
  • FIG. 10 is a schematic block diagram of a second type of terminal device provided by an embodiment of this application.
  • FIG. 11 is a schematic block diagram of a third terminal device provided by an embodiment of this application.
  • FIG. 12 is a schematic block diagram of a fourth network device provided by an embodiment of this application.
  • FIG. 13 is a schematic block diagram of a fourth terminal device according to an embodiment of the application.
  • FIG. 14 is a schematic block diagram of a communication device provided by an embodiment of this application.
  • 15 is another schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 16 is still another schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 17 is another schematic block diagram of a communication device provided by an embodiment of this application.
  • Terminal devices including devices that provide users with voice and/or data connectivity, specifically, include devices that provide users with voice, or include devices that provide users with data connectivity, or include devices that provide users with voice and data connectivity Sexual equipment.
  • it may include a handheld device with a wireless connection function, or a processing device connected to a wireless modem.
  • the terminal device can communicate with the core network via a radio access network (RAN), exchange voice or data with the RAN, or exchange voice and data with the RAN.
  • RAN radio access network
  • the terminal equipment may include user equipment (UE), wireless terminal equipment, mobile terminal equipment, device-to-device communication (device-to-device, D2D) terminal equipment, vehicle to everything (V2X) terminal equipment , Machine-to-machine/machine-type communications (machine-to-machine/machine-type communications, M2M/MTC) terminal equipment, Internet of things (IoT) terminal equipment, subscription unit (subscriber unit), subscription station (subscriber) station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user Agent (user agent), or user equipment (user device), etc.
  • UE user equipment
  • wireless terminal equipment mobile terminal equipment
  • mobile terminal equipment device-to-device communication
  • V2X vehicle to everything
  • V2X vehicle to everything
  • Machine-to-machine/machine-type communications machine-to-machine/machine-type communications
  • M2M/MTC Internet of
  • it may include mobile phones (or “cellular” phones), computers with mobile terminal equipment, portable, pocket-sized, hand-held, mobile devices with built-in computers, and so on.
  • PCS personal communication service
  • PCS cordless phones
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistants
  • restricted devices such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities. Examples include barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), laser scanners and other information sensing equipment.
  • RFID radio frequency identification
  • GPS global positioning system
  • laser scanners and other information sensing equipment.
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices or smart wearable devices, etc. It is a general term for using wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes Wait.
  • a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a kind of hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, and need to cooperate with other devices such as smart phones.
  • Use such as all kinds of smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
  • the various terminal devices described above if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be regarded as vehicle-mounted terminal equipment, for example, the vehicle-mounted terminal equipment is also called on-board unit (OBU). ).
  • OBU on-board unit
  • the terminal device may also include a relay. Or it can be understood that everything that can communicate with the base station can be regarded as a terminal device.
  • the device for realizing the function of the terminal device may be a terminal device, or a device capable of supporting the terminal device to realize the function, such as a chip system, and the device may be installed in the terminal device.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the device used to implement the functions of the terminal is a terminal device as an example to describe the technical solutions provided in the embodiments of the present application.
  • Network equipment including, for example, access network (AN) equipment, such as a base station (e.g., access point), which may refer to equipment that communicates with wireless terminal equipment through one or more cells on the air interface in the access network
  • AN access network
  • a base station e.g., access point
  • V2X vehicle-to-everything
  • the base station can be used to convert the received air frame and IP packet to each other, as a router between the terminal device and the rest of the access network, where the rest of the access network can include the IP network.
  • the RSU can be a fixed infrastructure entity that supports V2X applications, and can exchange messages with other entities that support V2X applications.
  • the network equipment can also coordinate the attribute management of the air interface.
  • the network equipment may include the LTE system or the evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in the long term evolution-advanced (LTE-A), or may also include the fifth-generation mobile Communication technology (the 5th generation, 5G) NR system (also referred to as NR system) next generation node B (next generation node B, gNB) or may also include cloud radio access network (cloud radio access network, Cloud RAN) system Centralized unit (CU) and distributed unit (DU) in, the embodiment of the present application is not limited.
  • 5G 5th generation
  • NR system also referred to as NR system
  • next generation node B next generation node B
  • cloud radio access network cloud radio access network
  • Cloud RAN Centralized unit
  • DU distributed unit
  • the network equipment may also include core network equipment.
  • the core network equipment includes, for example, access and mobility management functions (AMF). Since the embodiments of the present application do not involve the core network, unless otherwise specified in the following text, the network devices mentioned all refer to the access network devices.
  • AMF access and mobility management functions
  • the device used to implement the function of the network device may be a network device, or a device capable of supporting the network device to implement the function, such as a chip system, and the device may be installed in the network device.
  • the device used to implement the functions of the network equipment is a network device as an example to describe the technical solutions provided in the embodiments of the present application.
  • first and second uplink information are used to distinguish multiple objects, and are not used to limit the size, content, order, and timing of multiple objects. , Priority or importance, etc.
  • first uplink information and the second uplink information are only for distinguishing different uplink information, but do not indicate the difference in content, transmission order, priority, or importance of the two uplink information.
  • the terminal equipment can realize the uplink synchronization with the network equipment through the random access process.
  • the random access process includes a contention-based random access process and a non-contention random access process.
  • the contention-based random access process is completed in four steps: 1.
  • the terminal device sends a random access request to the network device.
  • the random access request can also be called the first message (Msg1), which contains the random access preamble ( preamble); 2.
  • the network device sends a random access response (RAR) message to the terminal device.
  • the RAR message may also be called the second message (Msg2); 3.
  • the RAR message is scheduled for message transmission, which may also be called the third message (Msg3); 4.
  • the network device sends contention resolution information to the terminal device, and the message that carries the contention resolution information is called the fourth message (Msg4).
  • the RAR message may include a random access preamble identifier (RAP ID), and when the RAP ID matches (or is the same) as the preamble ID selected by the terminal device, the terminal device considers that the RAR message is received successfully. After determining that the RAR is successfully received, the terminal device does not monitor subsequent RARs.
  • RAP ID random access preamble identifier
  • MsgA message A
  • MsgA includes preamble and possible uplink data (similar to Msg1 and Msg3 in the 4-step random access process); 2.
  • the terminal device receives the message B (MsgB) from the network device, or MsgB can also be called the second message (similar to Msg2 and Msg4 in the 4-step random access process) ,
  • MsgB message B
  • MsgB can also be called the second message (similar to Msg2 and Msg4 in the 4-step random access process)
  • C-RNTI cell-radio network temporary identifier
  • a criterion that has been defined currently is to select according to the channel quality threshold. For example, if the RSRP value measured by the terminal device in downlink is greater than a given RSRP threshold, the terminal device can choose a 2-step random access procedure, otherwise the terminal device chooses a 4-step random access procedure.
  • the channel quality of most terminal devices that initiate random access is greater than a given RSRP threshold.
  • most terminal devices will choose a 2-step random access process to make the resources of the 2-step random access process
  • the load on the network is heavier, the collision probability will increase, and the random access delay will also increase.
  • the resource load of the 4-step random access process will be relatively light, but the random access will be completed quickly. It can be seen that simply selecting the type of random access procedure based on the channel quality threshold may have the problem of load imbalance.
  • the network equipment can carry indication information in the RAR message, and the indication information is used to instruct the terminal equipment to fall back to the 4-step random access procedure. Then for the terminal device that receives the RAR message, if the terminal device uses a 2-step random access process, it can fall back to a 4-step random access process. In this way, the load of random access resources can be balanced as much as possible.
  • the RAR message sent by a network device can be received by multiple terminal devices, and the directivity of the indication information is not clear, so all terminal devices that receive the RAR message may fall back to the 4-step random access process. It may cause the resource load of the 4-step random access process to be heavier. It can be seen that this method cannot achieve load balancing well.
  • random access channel (RACH) types can be set for different types of events, for example, for more urgent or higher priority events It can correspond to the 2-step random access process to reduce network access delay and improve access efficiency. For less urgent or low priority events, it can correspond to the 4-step random access process, which eliminates the need for all events to use the 2-step random access process, and try to meet the low latency of emergency or high-priority events. If required, the load of random access resources can also be balanced.
  • RACH random access channel
  • the technical solutions provided by the embodiments of this application can be applied to the 4th generation (4G) mobile communication technology (the 4th generation, 4G) system, such as the LTE system, or can be applied to the 5G system, such as the NR system, or can also be applied to the next generation of mobile communications.
  • the 4th generation, 4G 4th generation
  • the 5G system such as the NR system
  • the technical solution provided in the embodiment of this application can also be applied to a sidelink (SL).
  • SL sidelink
  • one terminal device is reporting to another terminal.
  • the technical solution provided in the embodiment of the present application may also be used.
  • the technical solutions provided by the embodiments of the present application can be applied to device-to-device (D2D) scenarios, can be NR D2D scenarios, LTE D2D scenarios, etc., or can be applied to vehicle-to-everything (vehicle to everything) scenarios.
  • everything (V2X) scenario it can be NR V2X scenario or LTE V2X scenario, etc., for example, it can be applied to the Internet of Vehicles, such as V2X, LTE-V, vehicle-to-vehicle (V2V), etc., or can be used for Intelligent driving, intelligent networked vehicles and other fields.
  • Figure 1 is an application scenario of an embodiment of this application.
  • Figure 1 includes network equipment and terminal equipment. Network equipment and terminal equipment can communicate.
  • Network equipment for example, works in the evolved UMTS terrestrial radio access (E-UTRA) system, or in the NR system, or in the next-generation communication system or other communication systems.
  • E-UTRA evolved UMTS terrestrial radio access
  • the network device in FIG. 1 is, for example, a base station.
  • network devices correspond to different devices in different systems.
  • they can correspond to an eNB
  • 5G system they correspond to an access network device in 5G, such as gNB.
  • the technical solutions provided by the embodiments of the present application can also be applied to future mobile communication systems.
  • the network equipment in FIG. 1 can also correspond to the network equipment in the future mobile communication system.
  • Figure 1 takes the network device as a base station as an example.
  • the network device can also be a device such as an RSU.
  • the terminal device in FIG. 1 uses a mobile phone as an example.
  • the terminal device in the embodiment of the present application is not limited to the mobile phone.
  • the 2-step random access process is also referred to as 2-step RACH or 2-RACH for short
  • the 4-step random access process is also referred to as 4-step RACH or 4-RACH for short.
  • FIG. 2 is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 1 is taken as an example.
  • the method executed by the network device and the terminal device is taken as an example. Because this embodiment is applied to the network architecture shown in FIG. 1 as an example, the network device described below may be the network device in the network architecture shown in FIG. 1, and the terminal device described below may be Figure 1 shows the terminal equipment in the network architecture.
  • the network device sends a first broadcast message, and the terminal device receives the first broadcast message from the network device.
  • the first broadcast message may indicate multiple categories and events respectively included in the multiple categories. Since the network device sends a broadcast message, there may be multiple terminal devices that can receive the first broadcast message.
  • the terminal device in S21 is only any one of the terminal devices that receives the first broadcast message.
  • the broadcast message in the embodiment of the present application is, for example, a system message, or may also be other broadcast messages.
  • events can be divided into different categories, and multiple categories can be divided in total.
  • the events described here that need to be classified are, for example, events that can trigger a random access process.
  • different events have different urgency levels, and have different requirements for network access delays. Therefore, the categories can be divided according to the urgency of the event.
  • the principle is to use the 2-step random access process for the random access process triggered by the more urgent event, for example, divide the more urgent event into one category; or
  • the priority of events is divided into categories, for example, events with a higher priority are divided into one category, and events with a lower priority are divided into another category; or, the categories can also be divided according to the delay requirements of the event, for example, Divide events that require a higher delay into one category; or they can also be classified according to other factors, and there is no restriction on the factors that are classified into categories.
  • the events that can trigger random access can include the following: In the radio resource control (radio resource control, RRC) RRC connection state, the terminal equipment has an uplink data arrival event when there is no resource requested by the uplink scheduling (UL data arrival during RRC_CONNECTED when there are no PUCCH resources for SR available), in the RRC connection state, there is an event of downlink data or uplink data arrival when the terminal device is out of synchronization in the uplink (DL or UL data arrival during RRC_CONNECTED when UL is synchronisation status "non-synchronised"), the event of uplink scheduling request failure (SR failure), the event of the RRC connection re-establishment process (RRC Connection Re-establishment procedure), the event of establishing time alignment for the time advance of the secondary cell (To establish time alignment) for a secondary TAG), beam recovery event (Beam failure recovery), initial random access event in RRC idle state (Initial access from RRC_IDLE), event from RRC inactive state to other states (Transition
  • each of the divided categories may include at least one type of event.
  • a category may include one type of event, two types of events, three types of events, or more types of events.
  • the number of events included in different categories may be the same or different. If a category includes only one type of event, in this case, there may not be a concept of category, but different events are distinguished.
  • the above 10 types of events can be divided into 4 categories, which are category 1, category 2, category 3, and category 4, respectively.
  • Category 1 includes, for example, the event that uplink data arrives when the terminal device does not have the resources requested by the uplink scheduling in the RRC connected state; the event that downlink data or uplink data arrives when the terminal device is out of synchronization in the uplink in the RRC connected state; and uplink;
  • category 1 may include events in which downlink data or uplink data arrives when the terminal device is out of synchronization in the uplink in the RRC connection state, events in which the uplink scheduling request fails, and events in the RRC connection re-establishment process; or category 1 may include beam recovery events ; Or, category 1 can be set to include all events. All events here refer to all events that participate in the category division.
  • category 1 can include this 10 types of events, that is, in the RRC connected state, the terminal device has an event of uplink data arrival when there is no uplink scheduling request resource, and in the RRC connected state, the terminal device has an event of downlink data or uplink data arrival when the uplink is out of synchronization.
  • Category 2 includes, for example, the event that uplink data arrives when the terminal device does not have the resources requested by the uplink scheduling in the RRC connected state; the event that uplink data arrives when the terminal device is out of synchronization in the uplink in the RRC connected state; or, the uplink scheduling One or more of the events in which the request failed.
  • category 2 includes the event that uplink data arrives when the terminal device does not have the resources requested by the uplink scheduling in the RRC connected state; or category 2 includes the event that uplink data arrives when the terminal device in the RRC connected state is out of synchronization in the uplink , And the event that the uplink scheduling request fails; or, Category 2 includes the event that the terminal device in the RRC connected state has uplink data arrival when there is no resource for the uplink scheduling request, and in the RRC connected state, the terminal device has uplink data when the uplink is out of synchronization. Data arrival events, and uplink scheduling request failure events, etc.
  • Category 3 includes, for example: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or, one or more of beam recovery events.
  • category 3 includes events for establishing time alignment for the timing advance of the secondary cell; or category 3 includes events for the RRC connection re-establishment process and events for establishing time alignment for the timing advance of the secondary cell; or category 3 includes RRC The event of the connection re-establishment process, the event of establishing time alignment for the timing advance of the secondary cell, and the beam recovery event, etc.
  • Category 4 includes, for example, one or more of the initial random access event in the RRC idle state, or the event of entering other states from the RRC inactive state.
  • category 4 includes the initial random access event in the RRC idle state; or category 4 includes the event from the RRC inactive state to other states; or category 4 includes the initial random access event in the RRC idle state, and from The event that the RRC inactive state enters other states.
  • the urgency of the event included in category 2 is the highest
  • the urgency of the event included in category 3 is the second
  • the urgency of the event included in category 4 is the lowest.
  • This classification method is just an example, and there are other classification methods.
  • initial random access events for example, including one or two of the initial random access events in the RRC idle state, or the events that enter other states from the RRC inactive state
  • the service type information can be obtained, such as initial Whether the random access event is the initial random access triggered by the ultra-reliable low-latency communications (URLLC) service or the enhanced mobile broadband (eMBB) service
  • URLLC ultra-reliable low-latency communications
  • eMBB enhanced mobile broadband
  • URLLC services are higher in urgency than eMBB services, so the initial random access events triggered by URLLC services can be kept in category 4, and random access events triggered by eMBB services can be classified into category 5; or, you can The initial random access event triggered by the more urgent service is divided into other categories with higher urgency.
  • the initial random access event triggered by the URLLC service can be divided into category 3 or category 2, and the eMBB service can be triggered.
  • the random access events are reserved to category 4.
  • the event can be classified by the network device, and the category to which the event belongs can be unchanged after configuration, or can also be changed.
  • the network device can adjust the classification.
  • the network device may send a broadcast message, for example, a first broadcast message, to broadcast the events included in the multiple categories to the terminal device.
  • the terminal device After receiving the first broadcast message, the terminal device can know how many categories the event is divided into, and also know the events included in each category.
  • the category to which the event belongs can also be stipulated by agreement. If this is the case, the network device does not need to send the first broadcast message, and both the terminal device and the network device can determine how many categories the event is divided into according to the protocol, and determine the events included in each category.
  • S21 is only an optional step, not mandatory.
  • the network device determines the first random access type corresponding to the random access process triggered by the first type of event.
  • the first type of event is an event included in the first category
  • the first category is one of multiple categories obtained by division.
  • a division method can refer to the introduction in S21, and the first category is, for example, one of category 1, category 2, category 3, or category 4.
  • the first random access type includes, for example, 2-step RACH, 4-step RACH, or one or more of 2-step RACH and 4-step RACH.
  • the random access type is 2-step RACH and 4-step RACH, which means that both 2-step RACH and 4-step RACH can be used.
  • the terminal device can use 2-step RACH.
  • RACH, 4-step RACH can also be used.
  • the random access process triggered by the first type of event corresponds to the first random access type, and it can be understood that the first type corresponds to the first random access type.
  • the first category corresponds to the first random access type. Specifically, the first category corresponds to the first random access mode.
  • the network device determining the first random access type corresponding to the first category may be determining the first random access mode corresponding to the first category.
  • the first random access method is, for example, allowing 2-step RACH, not allowing 2-step RACH, allowing 4-step RACH, not allowing 4-step RACH, switching from 2-step RACH to 4-step RACH, and switching from 4-step RACH.
  • 2-step RACH perform 4-step RACH, perform 2-step RACH, perform 2-step RACH early data transmission (EDT), perform 4-step RACH data early transmission, allow 2-step RACH data early transmission, allow 4 One of the early transmission of RACH data in one step, the early transmission of 2-step RACH data is not allowed, or the early transmission of 4-step RACH data is not allowed.
  • the first random access method can be: allow 2-step RACH, not allow 4-step RACH, switch from 4-step RACH to 2-step RACH, and perform 2-step RACH , One of two-step early RACH data transmission, two-step RACH data early transmission, or four-step RACH data early transmission is not allowed.
  • the first random access method may be: 2-step RACH is not allowed, 4-step RACH is allowed, switch from 2-step RACH to 4-step RACH, and 4-step RACH is allowed.
  • RACH one of allowing 4-step RACH data early transmission, 4-step RACH data early transmission, or not allowing 2-step RACH data early transmission.
  • the first random access method may be: 2-step RACH is allowed, 2-step RACH is not allowed, 4-step RACH is allowed, and RACH is not allowed.
  • 4-step RACH switch from 2-step RACH to 4-step RACH, from 4-step RACH to 2-step RACH, perform 4-step RACH, perform 2-step RACH, perform 2-step RACH data early transmission, perform 4-step RACH data early transmission, One of two-step early RACH data transmission is allowed, four-step RACH data early transmission is allowed, two-step RACH data early transmission is not allowed, or four-step RACH data early transmission is not allowed.
  • events can be divided into multiple categories. For example, different types of events correspond to different levels of urgency, or different types of events have different priorities, or different types of events have different requirements for time delay, and so on. Then further, different types of events can be made to correspond to different random access types (or random access methods). For example, events with a higher degree of urgency can correspond to 2-step RACH to reduce network access delay. Improve access efficiency. For less urgent or lower priority events, it can correspond to 4-step RACH, so there is no need to use 2-step RACH for all events. Under the premise of meeting the low latency requirements of emergency or high priority events as much as possible, The load of random access resources can be more balanced.
  • multiple categories are stipulated by the protocol, and the corresponding relationship between the category and the random access type (or random access mode) can also be stipulated by the protocol, or can also be set by the network device. Or, if multiple categories are obtained by dividing the network device, the correspondence between the category and the random access type (or random access mode) can be set by the network device.
  • the terminal device needs to perform random access, and there may be multiple random access opportunities (RACH occasion, RO).
  • the network device determines that the first category corresponds to the first random access type, which may be determining that the first category corresponds to the first random access type in all random access opportunities, or it may also determine that the first category corresponds to the first random access type.
  • the entry opportunity corresponds to the first random access type, and the first random access opportunity is, for example, the next random access opportunity. That is to say, the correspondence between the category determined by the network device and the random access type may be applicable to multiple random access opportunities, or may only be applicable to one random access opportunity.
  • the network equipment can determine the random access type corresponding to the first category at the next random access opportunity according to the load situation of the random access resources at the current random access opportunity, so that the network equipment can real-time based on the random access resource Adjust the type of random access process based on the load situation on the network, so as to achieve load balancing as much as possible. For example, at the first time, the network device determines that the load on the resources of the 2-step RACH is lighter at the first time, or the load on the resources of the 4-step RACH is heavier, then the network equipment can be set at the next random access opportunity ,
  • the random access type corresponding to category 2 is 2-step RACH.
  • the network device determines that the next random access opportunity is that the load on the resources of the 2-step RACH is heavier, or the load on the resources of the 4-step RACH is light, then the network device can be set to the next random access Chances are, the random access type corresponding to category 2 is 4-step RACH.
  • the network device determines that at the second random access opportunity, the load on the resources of the 2-step RACH is lighter, or the load on the resources of the 4-step RACH is heavier, then the network equipment can be set to the second random access opportunity.
  • the next one or more random access opportunities (first random access opportunity) of the access opportunity, the random access type corresponding to category 2 is 2-step RACH.
  • the network device determines that the load on the resources of the 2-step RACH is heavier at the second random access opportunity, or the load on the resources of the 4-step RACH is light, then the network equipment can be set to the second random access opportunity.
  • the next one or more random access opportunities (first random access opportunity) of the access opportunity, the random access type corresponding to category 2 is 4-step RACH.
  • the network device sends the second message in the first random access process, and the terminal device receives the second message in the first random access process from the network device.
  • the second message may indicate the first random access type.
  • the first random access type indicated by the second message may be applicable to multiple random access opportunities, or may also be applicable to the first random access opportunity.
  • the second message in the first random access process refers to that the currently ongoing random access process is, for example, the first random access process, and the network device sends the second message in the first random access process.
  • the second message may be a random access response message in the random access process.
  • the random access response message is MsgB (MsgB may include a successful RAR, for example, sucessRAR , It may also include a failed RAR, such as fallbackRAR, or may also include a successful RAR and a failed RAR), or, if the first random access process is a 4-step RACH, then the random access response message is an RAR message .
  • the network device Since the network device indicates the first random access type through a random access response message instead of a broadcast message (for example, a system message), the first random access type indicated by the network device may correspond to multiple A random access opportunity may also correspond to a random access opportunity, for example, the first random access opportunity. Therefore, it is convenient for the network device to adjust the type of the random access process according to the load condition on the random access resource in real time, so as to achieve load balancing as much as possible.
  • a broadcast message for example, a system message
  • the second message may indicate the first random access type, and the terminal device may determine the first random access type according to the second message.
  • the correspondence between the category and the random access type is determined in advance, and the network device has notified the terminal device of the correspondence between the category and the random access type in advance.
  • the network device may use the first broadcast message
  • the terminal device is notified of the correspondence between the category and the random access type, or the network device may also notify the terminal device of the correspondence between the category and the random access type through other messages.
  • the second message indicates the first random access type, and the terminal device can determine that the first random access type corresponds to the first category according to the correspondence between the category and the random access type. Therefore, if a random access process triggered by a first type of event included in the first type occurs, the terminal device can use the first random access type to perform random access.
  • the second message indicates the first random access type, which may include that the second message indicates the first category, and the first category corresponds to the first random access type
  • the terminal device according to The second message to determine the first random access type may include that the terminal device determines the first category according to the second message.
  • the correspondence between the category and the random access type is determined in advance, and the network device has notified the terminal device of the correspondence between the category and the random access type in advance.
  • the network device may use the first broadcast message The terminal device is notified of the correspondence between the category and the random access type, or the network device may also notify the terminal device of the correspondence between the category and the random access type through other messages.
  • the second message indicates the first category, and the terminal device can determine that the random access type corresponding to the first category is the first random access type. Therefore, the second message indicates the first category, which is equivalent to indicating the first category.
  • the random access type in other words, is equivalent to indicating that the first category corresponds to the first random access type.
  • the network device is configured in advance, and the type indicated by the network device through the second message, and the corresponding random access type is the first random access type. In this case, the second message only needs to indicate the first category, and the terminal device can determine that the first category corresponds to the first random access type.
  • the correspondence between the category and the random access method is determined in advance, and the network device has notified the terminal device of the correspondence between the category and the random access method in advance.
  • the network device may send a first broadcast message
  • the terminal device is notified of the correspondence between the category and the random access mode, or the network device may also notify the terminal device of the correspondence between the category and the random access mode through other messages.
  • the random access method and the random access type also have a corresponding relationship.
  • the corresponding relationship between the random access type and the random access method is determined in advance, and the network equipment has previously combined the random access type with the random access method. The corresponding relationship between the random access methods is notified to the terminal device.
  • the network device can notify the terminal device of the corresponding relationship between the random access type and the random access method through the first broadcast message, or the network device can also use other
  • the message notifies the terminal device of the correspondence between the random access type and the random access mode.
  • the corresponding relationship between the random access type and the random access mode can be determined by the terminal device itself.
  • the terminal device can determine the corresponding relationship between the random access type and the random access mode in advance.
  • the second message may indicate the first category, and the terminal device may determine that the random access mode corresponding to the first category is the first random access mode.
  • the terminal device also knows the correspondence between the random access type and the random access mode, so that it can determine that the first category corresponds to the first random access type.
  • the second message indicates the first category, which is equivalent to indicating the first random access type.
  • the second message may indicate the first random access mode, and the terminal device may determine that the first random access mode corresponds to the first category.
  • the terminal device also knows the correspondence between the random access type and the random access mode, so that it can determine that the first category corresponds to the first random access type. Therefore, the second message indicates the first random access mode, which is equivalent to indicating the first random access type.
  • the network device indicates that the first category corresponds to the first random access type, so for categories other than the first category among the multiple categories, it may be considered that they do not correspond to the first random access type.
  • the first random access type is 2-step RACH
  • for categories other than the first type even if it is determined that 2-step RACH can be performed after the channel quality threshold is judged, 2-step RACH cannot be performed, but only 4-step RACH can be performed. Step RACH.
  • the load on different random access resources can be balanced, so that all terminal devices use 2-step RACH or all 4-step RACH resources for random access.
  • the terminal device may successfully access the network device after one random access attempt, or it may also need to perform multiple random access attempts to successfully access the network device.
  • a random access procedure may include one or more random access attempts.
  • a random access attempt may include a 4-step contention-based RACH process from preamble transmission to Msg4 reception, or a non-contention 2-step RACH process from preamble transmission to RAR message reception, or 2 Step RACH from MsgA to MsgB process.
  • the terminal device can perform power ramping. For example, the terminal device performs the first random access attempt first. If the first random access attempt fails, the terminal device performs the second random access attempt.
  • the power used by the terminal device for the second random access attempt which can be greater than the power used by the terminal device for the first random access attempt, which can increase the success rate of random access.
  • the terminal equipment performs a power ramp, which can include the power of the terminal device to send the preamble, or the power of the terminal device to send uplink data, or the terminal device to send the preamble and uplink data The power of climbing.
  • the terminal device performs a power ramp, which may include a power ramp of the preamble sent by the terminal device.
  • Power climbing involves power climbing step length.
  • the terminal device can perform power climbing according to the power climbing step length.
  • the power ramp step is a
  • the power used by the terminal device for the first random access attempt is, for example, b
  • the power used by the terminal device for the second random access attempt is, for example, b+a. If the access attempt still fails, and the terminal device performs the third random access attempt, the power of the terminal device for the third random access attempt is, for example, b+a+a, and so on.
  • the terminal device may perform the next random access attempt after one random access attempt fails.
  • backoff may be required for a period of time, and then the next random access attempt will be made after this period of time. This period of time may be referred to as the backoff period.
  • the terminal device may determine whether to perform backoff and determine the backoff duration according to the instructions of the network device.
  • corresponding power ramp step information, or duration information, or power ramp step information can also be set for different categories.
  • duration information can be understood as the retreat duration. For example, the urgency of the events included in category 2 is relatively high. For such events, if the power ramp step information is to be set, the power ramp step can be set to be larger, and the terminal device can climb more power at a time. In order to improve the success rate of random access.
  • the set duration can be shorter, and the terminal device only needs to back off for a short time, or even no back off (the duration indicated by the duration information is 0, for example, it is not a category 2 indicates the duration information, it can be considered that category 2 does not need backoff), and then the next random access attempt can be made to improve the efficiency of the random access process, so that the terminal device can access the network device as soon as possible.
  • the urgency of events included in category 4 is low.
  • the set power ramp step length can be smaller, and the terminal device can climb less power at a time , In order to save the power consumption of the terminal equipment.
  • the duration can be set to be longer, and the terminal device can back off for a longer period of time before making the next random access attempt, which will not affect the requirements of the event, but can also be as long as possible.
  • Other random access procedures give up time and reduce the probability of collision.
  • the second message may also indicate the first information, or the second information, or the first information and the random access process triggered by the first type of event. Second information.
  • the second message may indicate the first information, or the second information, or the first information and the second information corresponding to the first category.
  • the second message may correspond to multiple random access opportunities, or may only correspond to the first random access opportunity.
  • the first information indicated by the second message may be the power ramp step information corresponding to the multiple random access opportunities in the random access process triggered by the first type of event
  • the second information indicated by the second message may be the backoff duration information corresponding to multiple random access opportunities in the random access process triggered by the first type of event; or, if the second message corresponds to the first random access opportunity, Then the first information indicated by the second message may be the power ramp step information corresponding to the first random access opportunity in the random access process triggered by the first type of event, and the second information indicated by the second message may be the first Backoff duration information corresponding to the first random access opportunity for the random access process triggered by the similar event.
  • the terminal device can determine the first information corresponding to the first category according to the second message; or, if the second message indicates the second information corresponding to the first category, The terminal device can determine the second information corresponding to the first category according to the second message; or, if the second message indicates the first information and the second information corresponding to the first category, the terminal device can determine the first information according to the second message.
  • the first information is, for example, power ramp step information corresponding to the random access process triggered by the first type of event, or power ramp step information corresponding to the first type.
  • the second information is, for example, the duration information corresponding to the random access process triggered by the first type of event, or the duration information corresponding to the first type.
  • the duration here can be understood as the retreat duration. If the second message indicates the first information, the terminal device can determine the power ramp step information corresponding to the first category according to the second message. If the second message indicates the second information, the terminal device can determine the backoff duration information corresponding to the first category according to the second message.
  • the first information is power ramp step length information
  • the power ramp step length information is, for example, power ramp step length, or may also be a power ramp step length scaling factor. If it is the power ramp step length, it is equivalent to directly specifying the step length for the first category, and the terminal device can perform power ramp according to the power ramp step length. If it is the power ramp step scaling factor, the terminal device can process the original power ramp step of the first type of event according to the power ramp step scaling factor to obtain the new power ramp step corresponding to the first type of event And perform power climbing according to the new power climbing step length. Process the specified power ramp step size according to the power ramp step size scaling factor.
  • one processing method is to multiply the specified power ramp step size by the power ramp step size scaling factor to obtain the new power Climbing step length.
  • the designated power ramp step length is, for example, a common power ramp step length.
  • the so-called public power ramp step length can be understood as if no specific power ramp step length information is configured for a certain type of event, then the public power ramp step length can be used for this event.
  • the second information is duration information
  • the duration information is, for example, duration, or may also be a duration scaling factor.
  • the terminal device can determine the backoff time length according to the time length information. If it is the duration, it is equivalent to directly specifying the duration for the first category, and the terminal device can back off according to the duration. If it is a duration scaling factor, the terminal device can process the specified duration according to the duration scaling factor to obtain a new duration corresponding to the first type of event, and back off according to the new duration.
  • the specified duration is processed according to the duration scaling factor. For example, one processing method is to multiply the original duration and the duration scaling factor to obtain the new duration. Among them, the specified duration, for example, is a common backoff duration.
  • the so-called public back-off duration can be understood as if no specific back-off duration information is configured for a certain type of event, then the event can use the public back-off duration.
  • the public back-off time length may be determined according to a piece of public time length information.
  • the second message may also include a parameter BI (preamble_backoff), which may also be referred to as a backoff parameter.
  • the parameter BI is used for the terminal device to back off.
  • the terminal device can generate a random number between (0, preamble_backoff), and then the terminal device back off for the duration corresponding to the random number before initiating the next random access attempt.
  • the value of preamble_backoff can be set according to the parameter BI.
  • the current parameter BI only instructs the terminal device to back off, and does not indicate other content.
  • the embodiment of the present application provides a solution.
  • the duration information included in the second message may be the parameter BI.
  • the second message includes indication information, and the first random access type is indicated through the indication information.
  • the indication information includes one or more bits, and different contents can be indicated through different values (or different states) of the bits included in the indication information. Take the indication information including 3 bits as an example.
  • the value of these 3 bits is 000, it indicates category 1; if the value of these 3 bits is 001, it indicates category 2; the value of these 3 bits is 010, indicating category 3; the value of these 3 bits is 011, indicating category 4; the value of these 3 bits is 100, indicating the terminal device to switch the random access type, such as the current random access of the terminal device If the type is 2-step RACH, then switch to 4-step RACH, or if the current random access type of the terminal equipment is 4-step RACH, then switch to 2-step RACH.
  • the value of these 3 bits can also be any one of 101 to 111, and these states can be used as reserved (reserved), and can also be used to indicate other access types or different access modes. By indicating different access modes, different access types can be indicated.
  • the first random access type is likely to indicate that the terminal device switches from the current random access type to another random access type.
  • the terminal device may need to fall back from 2-step RACH to 4-step. RACH, or maybe switch from 4-step RACH to 2-step RACH.
  • the terminal device switches the random access type, whether to continue to perform power ramping, or whether to continue to perform backoff, there is currently no conclusion.
  • it can be stipulated that the terminal device switches from the current random access type to another random access type, continues to perform power ramping and/or time backoff, or does not perform power ramping and/or time backoff.
  • more states of the indication information can also be used to indicate.
  • the terminal device when the value of the 3 bits included in the indication information is 101, it instructs the terminal device to continue backoff and/or power ramp after switching the random access type, or instruct the terminal device to switch the random access type. Do not perform backoff and/or power ramp, or instruct the terminal device to continue backoff and/or not perform power ramp after switching the random access type, or instruct the terminal device not to perform backoff and/or power ramp after switching the random access type / Or continue power climbing.
  • the remaining 110-111 states of the indication information can continue to be reserved. Alternatively, different states of the indication information may be used to indicate power ramp-up and/or back-off respectively.
  • the number of bits of the above indication information is only an example, and the corresponding relationship between the value of the bit and the content of the indication is also only an example, and the details are not limited to this.
  • the terminal device determines that the random access process triggered by the first type of event corresponds to the first random access type. In other words, the terminal device determines that the first category corresponds to the first random access type.
  • the terminal device sends the first message in the second random access process to the network device, and the network device receives the first message in the second random access process from the terminal device.
  • the first message in the random access process is, for example, a random access request message, such as a preamble.
  • the second random access process is a random access process corresponding to the first random access type, and the second random access process is triggered by the first type of event.
  • the terminal device determines the first random access type corresponding to the first category, if there is a random access process triggered by the first type of event, the terminal device can select the first random access type according to the instructions of the second message.
  • the random access type performs random access.
  • the second message may correspond to multiple random access opportunities, or may only correspond to the first random access opportunity.
  • the terminal device only needs to perform a random access process in any one of the multiple random access opportunities, and the random access process is triggered by the first type of event, All terminal devices can perform random access according to the instructions of the second message. If the second message corresponds to the first random access opportunity, if the terminal device performs a random access procedure at the first random access opportunity, and the random access event is triggered by the first type of event, the terminal device can Perform random access according to the instructions of the second message, and at other random access opportunities except the first random access opportunity, even if the terminal device is to perform the random access process triggered by the first type of event, the terminal device can Random access is not performed according to the instructions of the second message.
  • the aforementioned second random access procedure may be a random access attempt of the first random access procedure.
  • the terminal device determines according to the second message that the random access process triggered by the first type of event corresponds to the first random access type.
  • the terminal device determines that the first category corresponds to the first random access type, and performs the next or subsequent random access attempts according to the determined random access type.
  • S25 is only an optional step, not mandatory.
  • different random access types can be set for different types of events.
  • the two-step random access process can be corresponded to reduce the network access time. Delay and improve access efficiency.
  • the 4-step random access process which eliminates the need for all events to use the 2-step random access process, and try to meet the low latency of emergency or high-priority events. If required, the load of random access resources can also be balanced.
  • the embodiment of the present application provides a second communication method to improve the efficiency of random access. Please refer to Figure 3, which is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 1 is taken as an example.
  • the method executed by the network device and the terminal device is taken as an example. Because this embodiment is applied to the network architecture shown in FIG. 1 as an example, the network device described below may be the network device in the network architecture shown in FIG. 1, and the terminal device described below may be Figure 1 shows the terminal equipment in the network architecture.
  • the network device sends a second broadcast message, and the terminal device receives the second broadcast message from the network device.
  • the second broadcast message may indicate events included in multiple categories. Since the network device sends a broadcast message, there may be multiple terminal devices that can receive the second broadcast message.
  • the terminal device in S31 is only any one of the terminal devices that receives the second broadcast message.
  • events can be divided into different categories, and multiple categories can be divided in total.
  • the events described here that need to be classified are, for example, events that can trigger a random access process.
  • the event can be classified by the network device, and the category to which the event belongs can be unchanged after configuration, or can also be changed.
  • the network device can adjust the classification.
  • the network device may send a broadcast message, for example, a second broadcast message, to broadcast the events included in the multiple categories to the terminal device.
  • the terminal device After receiving the second broadcast message, the terminal device can know how many categories the event is divided into, and also know the events included in each category.
  • the category to which the event belongs can also be stipulated by agreement. If this is the case, the network device does not need to send the second broadcast message, and both the terminal device and the network device can determine how many categories the event is divided into according to the protocol, and determine the events included in each category.
  • S31 is only an optional step, not mandatory.
  • the network device determines third information corresponding to the random access process triggered by the first type of event.
  • the first type of event is an event included in the first category, and the first category is one of multiple categories obtained by division.
  • the first category is, for example, one of category 1, category 2, category 3, or category 4.
  • the random access process triggered by the first type of event corresponds to the third information, and it can be understood that the first type corresponds to the third information.
  • a terminal device may successfully access the network device after one random access attempt, or it may also need to perform multiple random access attempts to successfully access the network device. Then in different random access attempts in the same random access process, the terminal device can perform power ramping. For example, the terminal device performs the first random access attempt first. If the first random access attempt fails, the terminal device performs the second random access attempt. The power used by the terminal device for the second random access attempt , which can be greater than the power used by the terminal device for the first random access attempt, which can increase the success rate of random access.
  • the terminal equipment performs a power ramp, which can include the power of the terminal device to send the preamble, or the power of the terminal device to send uplink data, or the terminal device to send the preamble and uplink data The power of climbing.
  • a power ramp which may include a power ramp of the preamble sent by the terminal device.
  • Power climbing involves power climbing step length.
  • the terminal device can perform power climbing according to the power climbing step length.
  • the power ramp step is a
  • the power used by the terminal device for the first random access attempt is, for example, b
  • the power used by the terminal device for the second random access attempt is, for example, b+a. If the access attempt still fails, and the terminal device performs the third random access attempt, the power of the terminal device for the third random access attempt is, for example, b+a+a, and so on.
  • the terminal device may perform the next random access attempt after one random access attempt fails.
  • backoff may be required for a period of time, and then the next random access attempt will be made after this period of time. This period of time may be referred to as the backoff period.
  • the terminal device may determine whether to perform backoff and determine the backoff duration according to the instructions of the network device.
  • corresponding power ramp step information, or time length information, or power ramp step information and time length information can be set for different categories (or events included in different categories).
  • the time length determined according to the time length information can be understood as the back-off time length.
  • the multiple categories include a first category and a second category, and events included in the second category may be referred to as events of the second category.
  • the power ramp step size indicated by the power ramp step information corresponding to the random access process triggered by the second type event, and the power ramp step size information corresponding to the random access process triggered by the first type event may be different, in other words, the power ramp step length indicated by the power ramp step length information corresponding to the second category is indicated by the power ramp step length information corresponding to the first category
  • the power climbing step length can be different.
  • the duration determined by the duration information corresponding to the random access process triggered by the second type of event may be different from the duration determined by the duration information corresponding to the random access process triggered by the first type of event.
  • the duration determined by the duration information corresponding to the second category may be different from the duration determined by the duration information corresponding to the first category.
  • the urgency of the second type of events included in the second category is higher than the urgency of the first type of events included in the first category, or the second type of event has a higher delay requirement than the first type of event.
  • the priority of the second type of event is required to be higher than the priority of the first type of event, etc.
  • the power ramp step corresponding to the second category The power ramp step length indicated by the information can be greater than the power ramp step length indicated by the power ramp step length information corresponding to the first category; if both the first category and the second category correspond to time-length information, the second category
  • the duration determined by the corresponding duration information may be less than the duration determined by the duration information corresponding to the first category.
  • the set power ramp step can be larger, and the terminal device can Climb more power to improve the success rate of random access; in addition, for this type of event, if you want to set the duration information, the set duration can be shorter, and the terminal device only needs to back off for a short time, or even without back off ( If the duration indicated by the duration information is 0, or if the duration information is not indicated, backoff is not performed by default), the next random access attempt can be performed to improve the efficiency of the random access process, so that the terminal device can access the network device as soon as possible.
  • the power ramp step can be set to be smaller, and the terminal device can climb less at a time In order to save the power consumption of the terminal equipment; for this type of event, if the duration information is to be set, the duration can be set longer, and the terminal device can back off for a longer period of time before proceeding to the next random access attempt. Influencing the requirements of the event, it is also possible to make time for other random access procedures to reduce the probability of collision.
  • the correspondence between the category and the power ramp step information, or the correspondence between the category and the duration information, or the correspondence between the category and the power ramp information, and the correspondence between the category and the duration information can be configured by network equipment, or can also be stipulated by agreement.
  • the network device may determine the third information corresponding to the random access process triggered by the first type of event, or in other words, the network device may determine the third information corresponding to the first type.
  • the third information may include the first information, or include the second information, or include the first information and the second information.
  • the first information is, for example, power ramp step information corresponding to the random access process triggered by the first type of event, or power ramp step information corresponding to the first type.
  • the second information is, for example, the duration information corresponding to the random access process triggered by the first type of event, or the duration information corresponding to the first type.
  • the duration indicated by the duration information here can be understood as the backoff duration.
  • the second message may correspond to multiple random access opportunities, or may only correspond to the first random access opportunity.
  • the first information indicated by the second message may be the power ramp step information corresponding to the multiple random access opportunities in the random access process triggered by the first type of event
  • the second information indicated by the second message may be the backoff duration information corresponding to multiple random access opportunities in the random access process triggered by the first type of event; or, if the second message corresponds to the first random access opportunity, Then the first information indicated by the second message may be the power ramp step information corresponding to the first random access opportunity in the random access process triggered by the first type of event, and the second information indicated by the second message may be the first Backoff duration information corresponding to the first random access opportunity for the random access process triggered by the similar event.
  • the terminal device needs to perform random access, and there can be multiple random access opportunities.
  • the network device determining the third information corresponding to the first category may be the third information determining that the first category corresponds to all random access opportunities, or it may also be determining that the first category corresponds to the first random access opportunity
  • the first random access opportunity is, for example, the next random access opportunity.
  • the network equipment can determine the third information corresponding to the first category at the next random access opportunity according to the load situation of the random access resources at the next random access opportunity, so that the network equipment can real-time base on the random access resource
  • the third information corresponding to the random access process is adjusted according to the load condition on the network, so as to achieve load balancing as much as possible.
  • the first information may be the power corresponding to multiple random access opportunities in the random access process triggered by the first type of event.
  • the second information may be the backoff duration information corresponding to multiple random access opportunities in the random access process triggered by the first type of event; or, if the network device determines that the first type is in the first random
  • the third information corresponding to the access opportunity the first information may be the power ramp step information corresponding to the first random access opportunity in the random access process triggered by the first type of event, and the second information may be the first type Backoff duration information corresponding to the first random access opportunity in the random access process triggered by the event.
  • the first information is power ramp step length information
  • the power ramp step length information is, for example, the power ramp step length, or may also be a power ramp step length scaling factor. If it is a power climbing step length, it is equivalent to directly specifying the step length for the first category, and power climbing can be performed according to the power climbing step length. If it is the power ramp step scaling factor, the terminal device can process the original power ramp step of the first type of event according to the power ramp step scaling factor to obtain the new power ramp step corresponding to the first type of event And perform power climbing according to the new power climbing step length. Process the specified power ramp step size according to the power ramp step size scaling factor.
  • one processing method is to multiply the specified power ramp step size by the power ramp step size scaling factor to obtain the new power Climbing step length.
  • the designated power ramp step length is, for example, a common power ramp step length.
  • the so-called public power ramp step length can be understood as if no specific power ramp step length information is configured for a certain type of event, then the public power ramp step length can be used for this event.
  • the second information is duration information
  • the duration information is, for example, duration, or may also be a duration scaling factor. If it is the duration, it is equivalent to directly specifying the duration for the first category, and the terminal device can back off according to the duration. If it is a duration scaling factor, the terminal device can process the specified duration according to the duration scaling factor to obtain a new duration corresponding to the first type of event, and back off according to the new duration.
  • the specified duration is processed according to the duration scaling factor. For example, one processing method is to multiply the original duration and the duration scaling factor to obtain the new duration. Among them, the specified duration, for example, is a common backoff duration.
  • the so-called public back-off duration can be understood as if no specific back-off duration information is configured for a certain type of event, then the event can use the public back-off duration.
  • the public back-off time length may be determined according to a piece of public time length information.
  • S31 can occur before S32, or S31 can occur after S32, or S31 and S32 can occur simultaneously.
  • the network device sends a notification message, and the terminal device receives the notification message from the network device.
  • the notification message may indicate the third information corresponding to the first category, and the terminal device can determine the third information corresponding to the first category according to the notification information.
  • the notification message indicates the third information corresponding to the first category.
  • one way is to indicate the correspondence between the first category and the third information.
  • the notification message includes the identifier of the first category (for example, the identity of the first category). Number (ID) or serial number of the first category, etc., and including third information). Then, the terminal device can determine the third information corresponding to the first category according to the notification message.
  • the notification message may also be a broadcast message, such as the first broadcast message.
  • the notification message may also be the second message in the first random access process.
  • the second message in the first random access process refers to that the currently ongoing random access process is, for example, the first random access process, and the network device sends the second message in the first random access process.
  • the second message in the first random access process may be a random access response message in the first random access process. If the first random access process is a 2-step RACH, the random access response message is, for example, MsgB, Or, the first random access process is a 4-step RACH, and the random access response message is, for example, a RAR message.
  • different categories can correspond to their respective random access types.
  • different categories can also correspond to their respective random access types.
  • the notification message is the second message in the first random access process
  • the second message may also indicate that the random access process triggered by the first type of event corresponds to the first random access process.
  • Access type the terminal device can determine according to the second message that the random access process triggered by the first type of event corresponds to the first random access type.
  • the first random access type includes one or more of 2-step RACH, 4-step RACH, or 2-step RACH and 4-step RACH.
  • the random access process triggered by the first type of event corresponds to the first random access type, and it can be understood that the first type corresponds to the first random access type.
  • the first category corresponds to the first random access type.
  • the first category corresponds to the first random access mode.
  • the network device determining the first random access type corresponding to the first category may be determining the first random access mode corresponding to the first category.
  • content such as random access type and random access mode, reference may be made to the related introduction of S22 in the embodiment shown in FIG. 2.
  • the second message may also include a parameter BI (preamble_backoff), which may also be referred to as a backoff parameter.
  • the parameter BI is used for the terminal device to back off.
  • the terminal device can generate a random number between (0, preamble_backoff), and then the terminal device back off for the duration corresponding to the random number before initiating the next random access attempt.
  • the value of preamble_backoff can be set according to the parameter BI.
  • the current parameter BI only instructs the terminal device to back off, and does not indicate other content.
  • the embodiment of the present application provides a solution.
  • the second message includes indication information, and the first random access type is indicated through the indication information.
  • the indication information includes one or more bits, and different contents can be indicated through different values (or different states) of the bits included in the indication information. Take the indication information including 3 bits as an example.
  • the value of these 3 bits is 000, it indicates category 1; if the value of these 3 bits is 001, it indicates category 2; the value of these 3 bits is 010, indicating category 3; the value of these 3 bits is 011, indicating category 4; the value of these 3 bits is 100, indicating the terminal device to switch the random access type, such as the current random access of the terminal device If the type is 2-step RACH, then switch to 4-step RACH, or if the current random access type of the terminal equipment is 4-step RACH, then switch to 2-step RACH.
  • the value of these 3 bits can also be any one of 101 to 111, and these states can be used as reservations, and can also be used to indicate other access types or different access modes. By indicating different access modes, different access types can be indicated.
  • the first random access type is likely to indicate that the terminal device switches from the current random access type to another random access type.
  • the terminal device may need to fall back from 2-step RACH to 4-step. RACH, or maybe switch from 4-step RACH to 2-step RACH.
  • the terminal device switches the random access type, whether to continue to perform power ramping, or whether to continue to perform backoff, there is currently no conclusion.
  • it can be stipulated that the terminal device switches from the current random access type to another random access type, continues to perform power ramping and/or time backoff, or does not perform power ramping and/or time backoff.
  • more states of the indication information can also be used to indicate.
  • the terminal device when the value of the 3 bits included in the indication information is 101, it instructs the terminal device to continue backoff and/or power ramp after switching the random access type, or instruct the terminal device to switch the random access type Do not perform backoff and/or power ramp, or instruct the terminal device to continue backoff and/or not perform power ramp after switching the random access type, or instruct the terminal device not to perform backoff and/or power ramp after switching the random access type / Or continue power climbing.
  • the remaining 110-111 states of the indication information can continue to be reserved. Alternatively, different states of the indication information may be used to indicate power ramp-up and/or back-off respectively.
  • the number of bits of the above indication information is only an example, and the corresponding relationship between the value of the bit and the content of the indication is also only an example, and the details are not limited to this.
  • the notification message is the first broadcast message
  • the first broadcast message and the second broadcast message can be the same message. If this is the case, then it can be considered that S31 occurs after S32, and S31 and S32 can be the same step .
  • the first broadcast message and the second broadcast message are the same message, in addition to indicating the third information corresponding to the first category, the first broadcast message can also indicate events included in multiple categories. The message may determine the third information corresponding to the first category, and may also determine the events included in multiple categories.
  • the first broadcast message indicates the third information corresponding to the first category, It can also indicate events included in multiple categories, and indicate the correspondence between multiple categories and random access types.
  • the terminal device can determine the third information corresponding to the first category according to the first broadcast message, and determine the location of multiple categories. Including events, and determining the correspondence between multiple categories and random access types.
  • the correspondence between the category and the random access type may also be indicated not by the first broadcast message, but by other messages, or stipulated by the protocol.
  • the terminal device initiates a second random access procedure to the network device according to the third information, and the network device receives the second random access procedure from the terminal device.
  • the second random access procedure is triggered by the first type of event. That is, after the terminal device determines the third information corresponding to the first category, if there is a random access process triggered by the first type of event, the terminal device can initiate random access according to the third information. For example, if the third information includes the first information, the terminal device can perform power ramp according to the power ramp step information indicated by the first information during the second random access process, or if the third information includes the second information, the terminal Before performing the second random access procedure, the device may back off according to the duration information indicated by the second information.
  • the third information may correspond to multiple random access opportunities, or may only correspond to the first random access opportunity. If the third information corresponds to multiple random access opportunities, the terminal device only needs to perform a random access process in any one of the multiple random access opportunities, and the random access process is triggered by the first type of event, All terminal devices can perform random access according to the third information.
  • the terminal device can Random access is performed according to the third information, and for random access opportunities other than the first random access opportunity, even if the terminal device is to perform the random access process triggered by the first type of event, the terminal device may not follow The third information is randomly accessed.
  • the terminal device may perform the second random access process according to the first random access type.
  • the aforementioned second random access procedure may be a random access attempt of the first random access procedure.
  • the terminal device determines according to the second message that the random access process triggered by the first type of event corresponds to the first random access type.
  • the terminal device determines that the first category corresponds to the first random access type, and performs the next or subsequent random access attempts according to the determined random access type.
  • S35 is only an optional step, not mandatory.
  • corresponding third information can be set for events of different categories. For example, for events with a higher degree of urgency, if the power ramp step information is to be set, the set power ramp step can be set to be lower. Large, the terminal equipment can climb more power at a time to improve the success rate of random access. For events with a higher degree of urgency, if you want to set the duration information, the duration can be set to be shorter. The terminal device only needs to back off for a short time or even without back off, and then the next random access attempt can be made to improve the random access. The efficiency of the entry process enables terminal equipment to access network equipment as soon as possible.
  • the power ramp step can be set to be smaller, and the terminal device can climb less power at a time to save the power consumption of the terminal device .
  • the duration can be set longer, and the terminal device can back off for a longer period of time before proceeding to the next random access attempt, which will not affect the requirements of the event, but can also be used as much as possible.
  • Other random access procedures give up time and reduce the probability of collision.
  • different types of random access can be set for different types of events.
  • a two-step random access process can be used to reduce network access time. Delay and improve access efficiency.
  • it can correspond to the 4-step random access process, which eliminates the need for all events to use the 2-step random access process, and try to meet the low latency of emergency or high-priority events. If required, the load of random access resources can also be balanced.
  • the network device can configure the maximum number of attempts for the 2-step RACH.
  • the number of random access attempts needs to be less than or equal to the maximum number of attempts. If the number of random access attempts made by the terminal device is equal to the maximum number of attempts, but the random access still fails, the terminal device can fall back to the 4-step RACH for random access.
  • the network equipment can configure the terminal equipment not to fall back from the 2-step RACH to the 4-step RACH. This is a contradiction, which may cause execution disorder in the terminal equipment.
  • the embodiment of the present application provides a third communication method to solve this contradiction. Please refer to Figure 4, which is a flowchart of this method.
  • the method executed by the network device and the terminal device is taken as an example. Because this embodiment is applied to the network architecture shown in FIG. 1 as an example, the network device described below may be the network device in the network architecture shown in FIG. 1, and the terminal device described below may be Figure 1 shows the terminal equipment in the network architecture.
  • the network device sends configuration information to the terminal device, and the terminal device receives the configuration information from the network device.
  • the configuration information can configure the value of M, and the terminal device can determine the value of M according to the configuration information.
  • M is the maximum number of attempts corresponding to the 2-step RACH. That is, when the terminal device performs a random access procedure, it tries at most M times.
  • the value of M configured by the network device may be infinite or non-infinite.
  • the configuration information may be included in high-level signaling, such as RRC signaling or media access control control element (MAC CE), etc., or may also be included in dynamic signaling, such as downlink control information (downlink control information). control information, DCI), etc.
  • high-level signaling such as RRC signaling or media access control control element (MAC CE), etc.
  • MAC CE media access control control element
  • dynamic signaling such as downlink control information (downlink control information). control information, DCI), etc.
  • the value of M can also be specified by a protocol, or pre-configured in the terminal device, etc. If this is the case, the network device does not need to send configuration information, and the terminal device does not receive configuration information from the network device. Therefore S41 is an optional step.
  • the terminal equipment uses the 2-step RACH for random access, and the network equipment receives the 2-step RACH random access from the terminal equipment.
  • the terminal device determines whether to continue the random access process according to the value of M.
  • N is a positive integer.
  • the terminal device can determine whether to continue the random access process according to the value of M.
  • N can be equal to M, which is equivalent to that if the terminal device still fails random access after M random access attempts, then the terminal device can fall back to the 4-step RACH and restart the 4-step RACH. Random access is performed in RACH mode.
  • N is less than M.
  • N can be determined autonomously by the terminal device, and can also be sent to the terminal device by the network device. If the value of M is infinite, the terminal device does not need to fall back to the 4-step RACH, but determines that the random access fails. For example, the terminal device may notify the upper layer of the terminal device, for example, indicate a random access problem to the upper layer, and determine that the random access fails.
  • the upper layer of the terminal device may be the upper layer of the internal protocol layer of the terminal device. For example, from the perspective of the communication protocol, the RRC layer is the upper layer of the MAC layer.
  • the network device can be configured. If the number of random access attempts by the terminal device is equal to the maximum number of attempts, the random access is still If it fails, the terminal device can fall back to the 4-step RACH for random access, or it can be configured that the terminal device cannot fall back from the 2-step RACH to the 4-step RACH. This enables network devices to be configured in multiple configurations, and there is no contradiction between multiple configurations.
  • the MAC subheader corresponds to SuccessRAR MAC subPDU.
  • the MAC subheader does not include the parameter T2, which means that the terminal device will fallback to the 4-step RACH during this random access process, such as the MAC subheader Corresponds to FallbackRAR MAC subPDU.
  • the MAC subheader does not include the parameter T2, which is equivalent to not using the parameter T2.
  • the embodiment of the present application provides a fourth communication method. Please refer to Figure 5, which is a flowchart of this method. In the following introduction process, the application of this method to the network architecture shown in FIG. 1 is taken as an example.
  • the method executed by the network device and the terminal device is taken as an example. Because this embodiment is applied to the network architecture shown in FIG. 1 as an example, the network device described below may be the network device in the network architecture shown in FIG. 1, and the terminal device described below may be Figure 1 shows the terminal equipment in the network architecture.
  • the network device determines random access information corresponding to the terminal device.
  • the random access information may indicate one or more of the first parameter corresponding to the terminal device, the first random access type corresponding to the terminal device, the duration information corresponding to the terminal device, or the power ramp information corresponding to the terminal device.
  • the random access information may indicate the first parameter and the first random access type; or, the random access information may indicate the first parameter, the first random access type and duration information; or, the random access information
  • the first parameter, the first random access type, and power ramp information may be indicated; or, the random access information may indicate the first random access type; or, the random access information may indicate the first parameter; or, the The random access information may indicate the first parameter, the first random access type, duration information, power ramp information, and so on.
  • the duration information may include, for example, duration, or may include back-off information or no back-off information.
  • the duration here can be understood as the retreat duration.
  • the duration information may include a duration scaling factor.
  • the power ramp information may include the power ramp step size, or may include information about performing power ramp or not performing power ramp. Alternatively, the power ramp information may include a power ramp scaling factor.
  • the first parameter may be used to determine the random access type, or in other words, the terminal device may determine the random access type according to the first parameter.
  • the first parameter is, for example, the parameter BI'. Because the current terminal equipment selects the random access type according to the channel quality threshold. For example, if the RSRP value measured by the terminal equipment is greater than the given RSRP threshold, the terminal equipment can choose a 2-step random access process, otherwise the terminal equipment chooses 4 steps Random access process. Considering that this approach may bring about the problem of unbalanced load, the parameter BI’ can be introduced.
  • the function of the parameter BI' is that the terminal device can randomly generate a random number rand 2 between (0, 1), and stipulate that if rand 2 is less than the value of the parameter BI', the terminal device selects 2-step RACH, otherwise the terminal The device selects 4-step RACH. Of course, the reverse is also possible. If rand 2 is less than the value of the parameter BI', the terminal device selects the 4-step RACH, otherwise the terminal device selects the 2-step RACH.
  • the parameter BI may be indicated by the second message, so that the content indicated by the second message is richer.
  • the first random access type may include, for example, 2-step RACH or 4-step RACH.
  • the random access information indicates the first random access type, for example, it may indicate the first random access mode.
  • the first random access method may include 2-step RACH, handover (or fallback) from 2-step RACH to 4-step RACH, or handover from 4-step RACH to 2-step RACH.
  • the corresponding first random access mode can be 2-step RACH, or switch from 4-step RACH to 2-step RACH; or, the first random access type is 4-step RACH, the corresponding first random access mode can be switched from 2-step RACH to 4-step RACH.
  • the network device sends the second message in the first random access process, and the terminal device receives the second message in the first random access process from the network device.
  • the second message may indicate the random access information.
  • the second message in the first random access process may be a random access response message in the first random access process.
  • the random access response message is, for example, MsgB, Or, the first random access process is a 4-step RACH, and the random access response message is, for example, a RAR message.
  • the second message may indicate the random access information through the first information and the second information included in the second message, or in other words, may indicate the random access information through the first message.
  • the value of the information and the value of the second information indicate random access information.
  • the first information and the second information may indicate the first parameter; or, when the value of the first information is the first parameter Three values, when the value of the second information is the fourth value, the first information and the second information may indicate the first random access type.
  • the second message may include a MAC subheader, and the MAC subheader may include the parameter T1 and the parameter T2.
  • the first information may be the parameter T1
  • the second information may be the parameter T2.
  • the access type for example, can indicate switching from 2-step RACH to 4-step RACH.
  • Step RACH switches to 4-step RACH.
  • the terminal device will perform the first random access type when performing the next random access procedure or the next random access attempt.
  • the first random access type is switching from a 2-step RACH to a 4-step RACH, and when the terminal device performs the next random access process, it will perform random access according to the 4-step RACH.
  • the terminal device may determine the random access type according to the first parameter. For example, the terminal device can randomly generate a random number rand 2 between (0, 1). If rand 2 is less than the value of the parameter BI' indicated by the first information and the second information, the terminal device selects 2-step RACH, otherwise The terminal equipment selects 4-step RACH. Of course, the reverse is also possible. If rand 2 is less than the value of the parameter BI' indicated by the first information and the second information, the terminal device selects the 4-step RACH, otherwise the terminal device selects the 2-step RACH.
  • the network device instructs the terminal device to switch the random access type through the second message (for example, switching from 2-step RACH to 4-step RACH), for example, the first information and second information included in the second message are used to indicate random access information
  • the network device may instruct the terminal device to switch the random access type through the first information and the second information (for example, switch from 2-step RACH to 4-step RACH).
  • the terminal equipment After the random access type is switched, the terminal equipment Whether to continue to perform backoff, or whether to continue to perform power ramp.
  • the terminal device switches the random access type (for example, from 2-step RACH to 4-step RACH), no backoff and/or power ramp are no longer performed, or no backoff and/or are no longer performed Continue to perform power ramp, or continue to perform backoff and/or no longer perform power ramp, or continue to perform backoff and/or continue to perform power ramp.
  • the regulation can be pre-configured in the terminal device, or can also be stipulated through a protocol. Or it may not be specified in advance, but determined by the network device and notified to the terminal device.
  • the network device may send notification information to the terminal device, and the notification information may indicate that if the terminal device switches the random access type (for example, switches from 2-step RACH to 4-step RACH), then backoff and/or no longer will be executed Power ramp, or no longer execute backoff and/or continue to perform power ramp, or continue to execute backoff and/or no longer perform power ramp, or continue to execute backoff and/or continue to perform power ramp.
  • the terminal device can clarify the operation mode after switching the random access type.
  • the notification information may be included in the second message, or the network device may also send the notification information to the terminal device through other messages.
  • the second message may indicate the random access information through the third information included in the second message, or in other words, may be obtained through the third information. Value to indicate random access information.
  • the first parameter when the value of the third information is the fifth value, the first parameter may be indicated; or, when the value of the third information is the sixth value, the first random access type may be indicated; or, when the third information is When the value of the information is the seventh value, the duration information can be indicated, for example, instructing the terminal device to continue or not perform backoff after switching the random access type; or, when the value of the third information is the eighth value, you can Indicate power ramp information, for example, instruct the terminal device to continue to perform power ramp or not to perform power ramp after switching the random access type.
  • the second message includes the MAC subheader, and the format of the MAC subheader can refer to FIG. 6.
  • the MAC subheader may be the MAC subheader including the first information and the second information as described above, or may also be another MAC subheader included in the second message.
  • E indicates whether the MAC sub-protocol data unit (subPDU) of the MAC subheader is the last MAC subPDU, or whether it contains more fields in the MAC header; T indicates that the MAC subheader contains
  • the random access preamble ID (random access preamble ID) is also a backoff indicator, R represents a reserved bit, BI represents a parameter BI (backoff indicator), and a small box above represents a bit.
  • the MAC subheader includes two bits of reserved bits, so one implementation of the third information is that these two bits can be used as the third information.
  • the first parameter for example, the first parameter is parameter BI'; or, when the value of these 2 bits is 01, it indicates the first random access type, such as indicating Switch from 2-step RACH to 4-step RACH, or instruct to switch from 4-step RACH to 2-step RACH; or, when the value of these 2 bits is 10, it indicates the duration information and power ramp information, for example, it indicates the random connection during the handover.
  • the second message indicates the random access information through the third information included in the second message
  • the terminal device switches the random access type (for example, switches from 2-step RACH to 4-step RACH)
  • the regulation can be pre-configured in the terminal device, or can also be stipulated through a protocol. If specified, the second message only needs to indicate the first parameter and/or the first random access type through the third information, and does not need to indicate the duration information and the power ramp information.
  • the second message may indicate the random access information through the indication information included in the second message, or in other words, may indicate the random access information through the value of the indication information. Indicates random access information.
  • the indication information included in the second message may indicate the second random access type.
  • the indication information indicating the second random access type and the content of the second random access type reference may be made to the related introduction of the embodiment shown in FIG. 2, where the second random access type described here may be equivalent to The first random access type in the embodiment shown in FIG. 2.
  • the indication information includes one or more bits, and different contents can be indicated through different values (or different states) of the bits included in the indication information. Take the indication information including 3 bits as an example.
  • the value of these 3 bits is 000, it indicates category 1; if the value of these 3 bits is 001, it indicates category 2; the value of these 3 bits is 010, indicating category 3; the value of these 3 bits is 011, indicating category 4; the value of these 3 bits is 100, indicating the first random access type, in other words, instructing the terminal device to switch random access Access type, for example, if the current random access type of the terminal device is 2-step RACH, then switch to 4-step RACH, or if the current random access type of the terminal device is 4-step RACH, then switch to 2-step RACH.
  • the value of these 3 bits can also be any one of 101 to 111, and these states can be reserved. For content of category 1, category 2, category 3, category 4, etc., reference may be made to the related introduction of the embodiment shown in FIG. 2.
  • the first random access type is likely to indicate that the terminal device switches from the current random access type to another random access type.
  • the terminal device may need to fall back from 2-step RACH to 4-step. RACH, or maybe switch from 4-step RACH to 2-step RACH. Then, after the terminal device switches the random access type, whether to continue to perform power ramping, or whether to continue to perform backoff, there is currently no conclusion. Then you can also use the indication information to indicate more states.
  • the terminal device when the value of the 3 bits included in the indication information is 101, it instructs the terminal device to continue backoff and/or power ramp after switching the random access type, or instruct the terminal device to switch the random access type Do not perform backoff and/or power ramp, or instruct the terminal device to continue backoff and/or not perform power ramp after switching the random access type, or instruct the terminal device not to perform backoff and/or power ramp after switching the random access type / Or continue power climbing.
  • the remaining 110-111 states of the indication information can continue to be reserved. Alternatively, different states of the indication information may be used to indicate power ramp-up, back-off, etc., respectively.
  • the number of bits of the above indication information is only an example, and the corresponding relationship between the value of the bit and the content of the indication is also only an example, and the details are not limited to this.
  • the terminal device determines the random access information according to the second message in the first random access process.
  • the random access information determined by the terminal device is consistent with the random access information indicated by the second message, and will not be repeated.
  • the terminal device initiates a second random access procedure to the network device according to the random access information, and the network device receives the second random access procedure from the terminal device.
  • the second random access process may be another random access process after the first random access process.
  • the terminal device may initiate the second random access procedure according to the indication of the random access information. For example, if the random access information indicates that the terminal device switches from a 2-step RACH to a 4-step RACH, the terminal device can participate in the 4-step RACH when initiating the second random access procedure; for another example, the random access information indicates that the terminal device is switching randomly. If the backoff is continued after the access type, the terminal device can backoff before initiating the second random access process; for another example, if the random access information indicates that the terminal device does not perform power ramping after switching the random access type, the terminal The device does not perform power ramp during the second random access process, and so on.
  • the terminal device initiates another random access attempt of the first random access procedure to the network device according to the random access information.
  • the network device receives another random access attempt of the first random access procedure from the terminal device.
  • the information included in the second message can be used to indicate more content, which enriches the information indicated for the terminal device and improves the utilization rate of the information.
  • FIG. 7 is a schematic block diagram of a communication device 700 according to an embodiment of the application.
  • the communication apparatus 700 is a network device 700, for example.
  • the network device 700 includes a processing module 710 and a transceiver module 720.
  • the network device 700 may be a network device, or may be a chip applied in the network device or other combination devices, components, etc. having the functions of the network device described above.
  • the transceiver module 720 may be a transceiver
  • the transceiver may include an antenna and a radio frequency circuit, etc.
  • the processing module 710 may be a processor
  • the processor may include one or more central processing units (central processing units). unit, CPU).
  • the transceiver module 720 may be a radio frequency unit, and the processing module 710 may be a processor, such as a baseband processor.
  • the transceiver module 720 may be an input/output interface of a chip (such as a baseband chip), and the processing module 710 may be a processor of the chip system, and may include one or more central processing units.
  • the processing module 710 in the embodiment of the present application may be implemented by a processor or a processor-related circuit component, and the transceiver module 720 may be implemented by a transceiver or a transceiver-related circuit component.
  • the processing module 710 may be used to perform all operations other than the transceiving operation performed by the network device in the embodiment shown in FIG. 2, such as S22, and/or other processes used to support the technology described herein.
  • the transceiver module 720 may be used to perform all the receiving operations performed by the network device in the embodiment shown in FIG. 2, such as S21, S23, and S25, and/or other processes used to support the technology described herein.
  • the transceiver module 720 may be a functional module that can perform both sending and receiving operations.
  • the transceiver module 720 may be used to perform all the sending operations performed by the network device in the embodiment shown in FIG. 2 And receiving operations, for example, when performing a sending operation, the transceiver module 720 can be considered as a sending module, and when performing a receiving operation, the transceiver module 720 can be considered as a receiving module; alternatively, the transceiver module 720 can also be two functional modules, The transceiver module 720 can be regarded as a collective term for these two functional modules.
  • the two functional modules are respectively a sending module and a receiving module.
  • the sending module is used to complete the sending operation.
  • the sending module can be used to perform the embodiment shown in FIG. 2
  • the receiving module is used to complete the receiving operation.
  • the receiving module may be used to perform all the receiving operations performed by the network device in the embodiment shown in FIG. 2.
  • the processing module 710 is configured to determine a first random access type corresponding to a random access process triggered by a first type of event, where the first type of event is an event included in the first type, and the first random
  • the access type includes 2-step RACH, 4-step RACH, or one or more of 2-step RACH and 4-step RACH.
  • the first category is one of multiple categories, and each of the multiple categories The category includes at least one event;
  • the transceiver module 720 is configured to send a random access response message in the first random access process, where the random access response message is used to indicate the first random access type.
  • the random access response message is used to indicate the first random access type, including:
  • the random access response message is used to indicate the first category, and the first category corresponds to the first random access type.
  • the random access response message is used to indicate the first random access type, including:
  • the random access response message is used to indicate the first random access mode.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • 4-step random access process switch from 2-step random access process to 4-step random access process, switch from 4-step random access process to 2-step random access process, perform 4-step random access process, or perform 2-step random access process A type of random access process.
  • the first category is category 1, category 2, category 3, or category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • the transceiver module 720 is further configured to send a first broadcast message, where the first broadcast message is used to indicate events included in the multiple categories.
  • the transceiver module 720 is further configured to receive a random access request message in a second random access process from a terminal device, and the second random access process is the first random access process.
  • the random access process corresponding to the access type.
  • the random access response message is also used to indicate the first information and/or the second information corresponding to the random access process triggered by the first type of event; or,
  • the transceiver module 720 is further configured to send a second broadcast message, where the second broadcast message is used to indicate the first information and/or the second information corresponding to the random access process triggered by the first type of event;
  • the first information is the corresponding power ramp step information for the random access process triggered by the first type of event
  • the second information is the random access triggered by the first type of event.
  • FIG. 8 is a schematic block diagram of a communication device 800 provided by an embodiment of the application.
  • the communication device 800 is a terminal device 800, for example.
  • the terminal device 800 includes a processing module 810 and a transceiver module 820.
  • the terminal device 800 may be a terminal device, or may be a chip applied to the terminal device or other combination devices, components, etc. having the above-mentioned terminal device functions.
  • the transceiver module 820 may be a transceiver
  • the transceiver may include an antenna and a radio frequency circuit, etc.
  • the processing module 810 may be a processor, such as a baseband processor.
  • the baseband processor may include one or more CPU.
  • the transceiver module 820 may be a radio frequency unit, and the processing module 810 may be a processor, such as a baseband processor.
  • the transceiver module 820 may be an input/output interface of a chip (such as a baseband chip), and the processing module 810 may be a processor of the chip system, and may include one or more central processing units.
  • the processing module 810 in the embodiment of the present application may be implemented by a processor or a processor-related circuit component, and the transceiver module 820 may be implemented by a transceiver or a transceiver-related circuit component.
  • the processing module 810 may be used to perform all operations other than the transceiving operation performed by the terminal device in the embodiment shown in FIG. 2, such as S24, and/or other processes used to support the technology described herein.
  • the transceiver module 820 may be used to perform all the receiving operations performed by the terminal device in the embodiment shown in FIG. 2, such as S21, S23, and S25, and/or other processes used to support the technology described herein.
  • the transceiver module 820 may be one functional module, or may include two functional modules, etc., please refer to the introduction of the implementation form of the transceiver module 720.
  • the transceiver module 820 is configured to receive a random access response message in the first random access process from the network device, where the random access response message is used to indicate the first random access type;
  • the processing module 810 is configured to determine that a random access process triggered by a first type of event corresponds to the first random access type, the first type of event is an event included in a first type, and the first type is One of a plurality of categories, each of the plurality of categories includes at least one event.
  • the random access response message is used to indicate the first random access type, including:
  • the second message is used to indicate the first category, and the first category corresponds to the first random access type.
  • the random access response message is used to indicate the first random access type, including:
  • the random access response message is used to indicate the first random access mode.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • 4-step random access process switch from 2-step random access process to 4-step random access process, switch from 4-step random access process to 2-step random access process, perform 4-step random access process, or perform 2-step random access process A type of random access process.
  • the multiple categories include one or more of category 1, category 2, category 3, or category 4, and the first category is the category 1, the category 2, the The category 3 or the category 4; where,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • the transceiver module 820 is further configured to receive a first broadcast message from the network device, where the first broadcast message is used to indicate events included in the multiple categories.
  • the transceiver module 820 is further configured to send a random access request message in a second random access process to the network device, where the second random access process is the first random access process.
  • the random access process corresponding to the access type, and the second random access process is triggered by the first type of event.
  • the random access response message is also used to indicate the first information and/or the second information corresponding to the random access process triggered by the first type of event; or,
  • the transceiver module 820 is further configured to receive a second broadcast message from the network device, where the second broadcast message is used to indicate the first information and/or corresponding to the random access process triggered by the first type of event Second information
  • the first information is power ramp step information corresponding to the first random access opportunity for the random access process triggered by the first type of event
  • the second information is the first type of Backoff duration information corresponding to the first random access opportunity in the random access process triggered by the event.
  • FIG. 9 is a schematic block diagram of a communication device 900 according to an embodiment of the application.
  • the communication device 900 is a network device 900, for example.
  • the network device 900 includes a processing module 910 and a transceiver module 920.
  • the network device 900 may be a network device, or may be a chip applied in the network device or other combination devices or components having the functions of the above-mentioned network device.
  • a component or a chip system with the above-mentioned network device functions refer to the introduction to the network device 700.
  • the processing module 910 may be used to perform all operations other than the transceiving operation performed by the network device in the embodiment shown in FIG. 3, such as S32, and/or other processes used to support the technology described herein.
  • the transceiver module 920 may be used to perform all the receiving operations performed by the network device in the embodiment shown in FIG. 3, such as S31, S33, and S35, and/or other processes used to support the technology described herein.
  • the transceiver module 920 may be one functional module, or may include two functional modules, etc., please refer to the introduction of the implementation form of the transceiver module 720.
  • the processing module 910 is configured to determine third information corresponding to a random access process triggered by a first type of event, where the third information includes first information and/or second information, and the first type of event is An event included in a first category, the first category is one of a plurality of categories, each category in the plurality of categories includes at least one event, and the first information is an event of the first category Power ramp step information corresponding to the triggered random access process, the second information is backoff time information corresponding to the random access process triggered by the first type of event, wherein the multiple categories further include the first type of event Two categories, the events included in the second category are events of the second category: the power ramp step size indicated by the power ramp step size information corresponding to the random access process triggered by the second category event is the same as the The power ramp step size indicated by the power ramp step information corresponding to the random access process triggered by the first type of event is different, and/or the power ramp corresponding to the random access process triggered by the second type of event The backoff time indicated by the third
  • the transceiver module 920 is configured to send a notification message, where the notification message is used to indicate the third information corresponding to the first category.
  • the notification message is a first broadcast message or a random access response message in the first random access process.
  • the notification message is the random access response message
  • the random access response message is also used to indicate that the random access process triggered by the first type event corresponds to the first Random access type
  • the first random access type includes a 2-step random access process, a 4-step random access process, or one or more of a 2-step random access process and a 4-step random access process.
  • the random access response message is used to indicate that the random access process triggered by the first type event corresponds to the first random access type, including:
  • the random access response message is used to indicate the first random access mode corresponding to the first category.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • 4-step random access process switch from 2-step random access process to 4-step random access process, switch from 4-step random access process to 2-step random access process, perform 4-step random access process, or perform 2-step random access process A type of random access process.
  • the transceiver module 920 is further configured to send a second broadcast message, where the second broadcast message is used to indicate events included in the multiple categories.
  • the notification message is the first broadcast message, and the first broadcast message is also used to indicate events included in the multiple categories, or to indicate the events included in the multiple categories.
  • the first category is category 1, category 2, category 3, or category 4; wherein,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • FIG. 10 is a schematic block diagram of a communication device 1000 according to an embodiment of the application.
  • the communication apparatus 1000 is, for example, a terminal device 1000.
  • the terminal device 1000 includes a processing module 1010 and a transceiver module 1020.
  • the terminal device 1000 may be a network device, or may be a chip applied in a terminal device or other combination devices, components, etc. having the above-mentioned terminal device functions.
  • a component or a chip system with the above-mentioned terminal device functions refer to the introduction to the terminal device 800.
  • the processing module 1010 may be used to perform all operations other than the transceiving operation performed by the terminal device in the embodiment shown in FIG. 3, such as S34, and/or other processes used to support the technology described herein.
  • the transceiver module 1020 may be used to perform all the receiving operations performed by the terminal device in the embodiment shown in FIG. 3, such as S31, S33, and S35, and/or other processes used to support the technology described herein.
  • the transceiver module 1020 may be one functional module, or may include two functional modules, etc., please refer to the introduction of the implementation form of the transceiver module 720.
  • the transceiver module 1020 is configured to receive a notification message from a network device, where the notification message is used to indicate third information corresponding to the first category;
  • the processing module 1010 is configured to determine that a random access process triggered by a first type event included in the first category corresponds to the third information, the first category is one of multiple categories, and the multiple Each category in the categories includes at least one event, the first information is power ramp step information corresponding to the random access process triggered by the first event, and the second information is the first Backoff duration information corresponding to the random access process triggered by the type of event, wherein the multiple types further include a second type, and the events included in the second type are events of the second type: triggered by the second type of events
  • the power ramp step size indicated by the power ramp step size information corresponding to the random access process, and the power ramp step size indicated by the power ramp step size information corresponding to the random access process triggered by the first type of event The step size is different, and/or the backoff time indicated by the power ramp step length information corresponding to the random access process triggered by the second type event corresponds to the random access process triggered by the first type event
  • the notification message is a first broadcast message or a random access response message in the first random access process.
  • the notification message is the random access response message
  • the random access response message is also used to indicate that the random access process triggered by the first type event corresponds to the first Random access type
  • the first random access type includes a 2-step random access process, a 4-step random access process, or one or more of a 2-step random access process and a 4-step random access process.
  • the random access response message is used to indicate that the random access process triggered by the first type event corresponds to the first random access type, including:
  • the random access response message is used to indicate the first random access mode corresponding to the first category.
  • the first random access method is that the 2-step random access process is allowed, the 2-step random access process is not allowed, the 4-step random access process is allowed, and the random access process is not allowed.
  • 4-step random access process switch from 2-step random access process to 4-step random access process, switch from 4-step random access process to 2-step random access process, perform 4-step random access process, or perform 2-step random access process A type of random access process.
  • the transceiver module 1020 is further configured to receive a second broadcast message from the network device, where the second broadcast message is used to indicate events included in the multiple categories.
  • the notification message is the first broadcast message, and the first broadcast message is also used to indicate events included in the multiple categories, or to indicate the events included in the multiple categories.
  • the multiple categories include one or more of category 1, category 2, category 3, or category 4, and the first category is the category 1, the category 2, the The category 3 or the category 4; where,
  • the category 1 includes: in the RRC connected state, the terminal device has the event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the event of the uplink data arrival of the terminal device when the uplink is out of synchronization; uplink The event of scheduling request failure; the event of the RRC connection re-establishment process; the event of establishing time alignment for the timing advance of the secondary cell; the beam recovery event; the initial random access event in the RRC idle state; or entering other states from the RRC inactive state One or more of the events;
  • the category 2 includes: in the RRC connected state, the terminal device has an event of uplink data arrival when there is no resource requested by the uplink scheduling; in the RRC connected state, the terminal device has an event of uplink data arrival when the uplink is out of synchronization; or One or more of the events in which the uplink scheduling request failed;
  • the category 3 includes: events of the RRC connection re-establishment process; events of establishing time alignment for the timing advance of the secondary cell; or one or more of beam recovery events;
  • the category 4 includes: an initial random access event in the RRC idle state; or one or more of events from the RRC inactive state to other states.
  • the transceiver module 1020 is further configured to initiate a second random access procedure to the network device according to the third information, and the second random access procedure is controlled by the first type Event triggered.
  • FIG. 11 is a schematic block diagram of a communication device 1100 according to an embodiment of the application.
  • the communication apparatus 1100 is a terminal device 1100, for example.
  • the terminal device 1100 includes a processing module 1110 and a transceiver module 1120.
  • the terminal device 1100 may be a network device, or may be a chip applied in a terminal device, or other combination devices, components, etc. having the above-mentioned terminal device functions.
  • the transceiver module 1120 and the processing module 1110 when the terminal device 1100 is a terminal device a component or a chip system with the above terminal device functions, refer to the introduction to the network device 800.
  • the processing module 1110 may be used to perform all operations other than the transceiving operation performed by the terminal device in the embodiment shown in FIG. 4, such as S43, and/or other processes used to support the technology described herein.
  • the transceiver module 1120 may be used to perform all the receiving operations performed by the terminal device in the embodiment shown in FIG. 4, such as S41 and S42, and/or other processes used to support the technology described herein.
  • the transceiver module 1120 may be one functional module, or may include two functional modules, etc., please refer to the introduction of the implementation form of the transceiver module 720.
  • the transceiver module 1120 is used for random access using a 2-step random access process
  • the processing module 1110 is configured to determine whether to continue the random access process according to the value of M after N attempts, where M is the maximum number of attempts corresponding to the 2-step random access process, and N is a positive integer.
  • determining whether to continue the random access process according to the value of M includes:
  • the transceiver module 1120 is further configured to receive configuration information from a network device, where the configuration information is used to configure the value of M.
  • FIG. 12 is a schematic block diagram of a communication device 1200 according to an embodiment of the application.
  • the communication device 1200 is, for example, a network device 1200.
  • the network device 1200 includes a processing module 1210 and a transceiver module 1220.
  • the network device 1200 may be a network device, or may be a chip applied in the network device or other combination devices or components having the functions of the above-mentioned network device.
  • a component or a chip system with the above-mentioned network device functions refer to the introduction to the network device 700.
  • the processing module 1210 may be used to perform all operations other than the transceiving operation performed by the network device in the embodiment shown in FIG. 5, such as S51, and/or other processes used to support the technology described herein.
  • the transceiver module 1220 may be used to perform all the receiving operations performed by the network device in the embodiment shown in FIG. 5, such as S52 and S54, and/or other processes used to support the technology described herein.
  • the transceiver module 1220 may be one functional module, or may include two functional modules, etc., please refer to the introduction of the implementation form of the transceiver module 720.
  • the processing module 1210 is configured to determine random access information corresponding to the terminal device, where the random access information indicates one or more of the first parameter, the first random access type, duration information, or power ramp information Type, the first parameter is used to determine the random access type;
  • the transceiver module 1220 is configured to send a random access response message in the first random access process, where the random access response message is used to indicate the random access information.
  • the random access information indicating the first random access type includes:
  • the random access information indicates a first random access method, and the first random access method is a 2-step random access process, or, switching from a 2-step random access process to a 4-step random access process, or, Switch from the 4-step random access process to the 2-step random access process.
  • the random access response message includes first information and second information, where:
  • the value of the first information is a first value
  • the value of the second information is a second value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the first information is a third value
  • the value of the second information is a fourth value, which is used to indicate the first random access type corresponding to the terminal device.
  • the random access response message includes a MAC subheader
  • the MAC subheader includes the first information and the second information.
  • the random access response message includes third information, where:
  • the value of the third information is a fifth value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the third information is a sixth value, which is used to indicate the first random access type corresponding to the terminal device; or,
  • the value of the third information is the seventh value, which is used to indicate whether the terminal device performs backoff after handover; or,
  • the value of the third information is an eighth value, which is used to indicate whether the terminal device performs power ramp after handover.
  • the random access response message includes a MAC subheader, and the MAC subheader includes the first information.
  • FIG. 13 is a schematic block diagram of a communication device 1300 according to an embodiment of the application.
  • the communication apparatus 1300 is a terminal device 1300, for example.
  • the terminal device 1300 includes a processing module 1310 and a transceiver module 1320.
  • the terminal device 1300 may be a network device, or may be a chip applied in a terminal device, or other combination devices, components, etc. having the above-mentioned terminal device functions.
  • the transceiver module 1320 and the processing module 1310 when the terminal device 1300 is a terminal device, a component or a chip system with the above terminal device functions, refer to the introduction to the network device 800.
  • the processing module 1310 may be used to perform all operations other than the transceiving operation performed by the terminal device in the embodiment shown in FIG. 5, such as S53, and/or other processes used to support the technology described herein.
  • the transceiver module 1320 may be used to perform all the receiving operations performed by the terminal device in the embodiment shown in FIG. 5, such as S52 and S54, and/or other processes used to support the technology described herein.
  • the transceiver module 1320 may be one functional module, or may include two functional modules, etc., please refer to the introduction of the implementation form of the transceiver module 720.
  • the transceiver module 1320 is configured to receive a random access response message in the first random access process from the network device;
  • the processing module 1310 is configured to determine random access information according to the random access response message, where the random access information indicates one or more of a first parameter, a first random access type, duration information, or power ramp information
  • the first parameter is used to determine the random access type.
  • the random access information indicating the first random access type includes:
  • the random access information indicates a first random access method, and the first random access method is a 2-step random access process, or, switching from a 2-step random access process to a 4-step random access process, or, Switch from the 4-step random access process to the 2-step random access process.
  • the random access response message includes first information and second information, where:
  • the value of the first information is a first value
  • the value of the second information is a second value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the first information is a third value
  • the value of the second information is a fourth value, which is used to indicate the first random access type corresponding to the terminal device.
  • the second message includes a MAC subheader
  • the MAC subheader includes the first information and the second information
  • the random access response message includes third information, where:
  • the value of the third information is a fifth value, which is used to indicate the first parameter corresponding to the terminal device; or,
  • the value of the third information is a sixth value, which is used to indicate the first random access type corresponding to the terminal device; or,
  • the value of the third information is the seventh value, which is used to indicate whether the terminal device performs backoff after handover; or,
  • the value of the third information is an eighth value, which is used to indicate whether the terminal device performs power ramp after handover.
  • the random access response message includes a MAC subheader, and the MAC subheader includes the first information.
  • the embodiment of the present application also provides a communication device, and the communication device may be a terminal device or a circuit.
  • the communication device can be used to perform the actions performed by the terminal device in the foregoing method embodiments.
  • FIG. 14 shows a simplified schematic diagram of the structure of the terminal device. It is easy to understand and easy to illustrate.
  • the terminal device uses a mobile phone as an example.
  • the terminal equipment includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, and to control the terminal device, execute the software program, and process the data of the software program.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of baseband signals and radio frequency signals and the processing of radio frequency signals.
  • the antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of terminal devices may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 14 only one memory and processor are shown in FIG. 14. In an actual terminal device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or storage device.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
  • the antenna and radio frequency circuit with transceiving functions can be regarded as the transceiving unit of the terminal device (the transceiving unit can be a functional unit that can realize the sending and receiving functions; or the transceiving unit can also be It includes two functional units, namely a receiving unit capable of realizing the receiving function and a transmitting unit capable of realizing the transmitting function), and the processor with the processing function is regarded as the processing unit of the terminal device.
  • the terminal device includes a transceiving unit 1410 and a processing unit 1420.
  • the transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on.
  • the processing unit may also be called a processor, a processing board, a processing module, a processing device, and so on.
  • the device for implementing the receiving function in the transceiving unit 1410 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiving unit 1410 as the sending unit, that is, the transceiving unit 1410 includes a receiving unit and a sending unit.
  • the transceiver unit may sometimes be referred to as a transceiver, a transceiver, or a transceiver circuit.
  • the receiving unit may sometimes be called a receiver, a receiver, or a receiving circuit.
  • the transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
  • transceiving unit 1410 is used to perform sending and receiving operations on the terminal device side in the foregoing method embodiment
  • processing unit 1420 is used to perform other operations on the terminal device in the foregoing method embodiment except for the transceiving operation.
  • the processing unit 1420 may be used to perform all operations performed by the terminal device in the embodiment shown in FIG. 2 except for the transceiving operations, such as S24, and/or to support the operations described herein. Other processes of the described technology.
  • the transceiving unit 1410 may be used to perform all the receiving operations performed by the terminal device in the embodiment shown in FIG. 2, such as S21, S23, and S25, and/or other processes used to support the technology described herein.
  • the processing unit 1420 may be used to perform all operations performed by the terminal device in the embodiment shown in FIG. 3 except for the transceiving operations, such as S34, and/or to support the text. Other processes of the described technique.
  • the transceiver unit 1410 may be used to perform all the receiving operations performed by the terminal device in the embodiment shown in FIG. 3, such as S31, S33, and S35, and/or other processes used to support the technology described herein.
  • the processing unit 1420 may be used to perform all operations performed by the terminal device in the embodiment shown in FIG. 4 except for the transceiving operations, such as S43, and/or to support the text. Other processes of the described technique.
  • the transceiver unit 1410 may be used to perform all the receiving operations performed by the terminal device in the embodiment shown in FIG. 4, such as S41 and S42, and/or other processes used to support the technology described herein.
  • the processing unit 1420 may be used to perform all operations performed by the terminal device in the embodiment shown in FIG. 5 except for the receiving and sending operations, such as S53, and/or to support the text. Other processes of the described technique.
  • the transceiver unit 1410 may be used to perform all the receiving operations performed by the terminal device in the embodiment shown in FIG. 5, such as S52 and S54, and/or other processes used to support the technology described herein.
  • the device may include a transceiver unit and a processing unit.
  • the transceiving unit may be an input/output circuit and/or a communication interface;
  • the processing unit is an integrated processor or microprocessor or integrated circuit.
  • the device shown in FIG. 15 can be referred to.
  • the device can perform functions similar to the processing module 810 in FIG. 8.
  • the device can perform functions similar to the processing module 1010 in FIG. 10.
  • the device can perform functions similar to the processing module 1110 in FIG. 11.
  • the device can perform functions similar to the processing module 1310 in FIG. 13.
  • the device includes a processor 1510, a data sending processor 1520, and a data receiving processor 1530.
  • the processing module 810 in the foregoing embodiment may be the processor 1510 in FIG. 15 and complete corresponding functions;
  • the transceiving module 820 in the foregoing embodiment may be the sending data processor 1520 in FIG.
  • the processing module 1010 in the foregoing embodiment may be the processor 1510 in FIG. 15 and complete corresponding functions; the transceiving module 1020 in the foregoing embodiment may be the sending data processor 1520 in FIG. 15, and/or Receive data processor 1530 and complete corresponding functions.
  • the processing module 1110 in the foregoing embodiment may be the processor 1510 in FIG. 15 and complete corresponding functions; the transceiver module 1120 in the foregoing embodiment may be the sending data processor 1520 in FIG. 15, and/or Receive data processor 1530 and complete corresponding functions.
  • the processing module 1310 in the foregoing embodiment may be the processor 1510 in FIG.
  • the transceiver module 1320 in the foregoing embodiment may be the sending data processor 1520 in FIG. 15, and/or Receive data processor 1530 and complete corresponding functions.
  • the channel encoder and the channel decoder are shown in FIG. 15, it can be understood that these modules do not constitute a restrictive description of this embodiment, and are only illustrative.
  • the processing device 1600 includes modules such as a modulation subsystem, a central processing subsystem, and a peripheral subsystem.
  • the communication device in this embodiment can be used as the modulation subsystem therein.
  • the modulation subsystem may include a processor 1603 and an interface 1604.
  • the processor 1603 completes the function of the aforementioned processing module 810
  • the interface 1604 completes the function of the aforementioned transceiver module 820.
  • the processor 1603 completes the function of the aforementioned processing module 1010
  • the interface 1604 completes the function of the aforementioned transceiver module 1020.
  • the processor 1603 completes the function of the aforementioned processing module 1110, and the interface 1604 completes the function of the aforementioned transceiver module 1120.
  • the processor 1603 completes the function of the aforementioned processing module 1310, and the interface 1604 completes the function of the aforementioned transceiver module 1320.
  • the modulation subsystem includes a memory 1606, a processor 1603, and a program stored in the memory 1606 and running on the processor. When the processor 1603 executes the program, the terminal device side in the above method embodiment is implemented. Methods. It should be noted that the memory 1606 can be non-volatile or volatile, and its location can be located inside the modulation subsystem or in the processing device 1600, as long as the memory 1606 can be connected to the The processor 1603 is fine.
  • the device 1700 includes one or more radio frequency units, such as a remote radio unit (RRU) 1710 and one or more baseband units (BBU) (also referred to as a digital unit, digital unit, DU) 1720 .
  • RRU 1710 may be referred to as a transceiver module, and the transceiver module may include a sending module and a receiving module, or the transceiver module may be a module capable of implementing sending and receiving functions.
  • the transceiver module may correspond to the transceiver module 720 in FIG. 7, or may correspond to the transceiver module 920 in FIG.
  • the transceiver module may also be called a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 1711 and a radio frequency unit 1712.
  • the RRU 1710 part is mainly used for sending and receiving of radio frequency signals and conversion of radio frequency signals and baseband signals, for example, for sending instruction information to terminal equipment.
  • the 1710 part of the BBU is mainly used to perform baseband processing, control the base station, and so on.
  • the RRU 1710 and the BBU 1720 may be physically set together, or may be physically separated, that is, a distributed base station.
  • the BBU 1720 is the control center of the base station, and may also be called a processing module. It may correspond to the processing module 710 in FIG. 7, or may correspond to the processing module 910 in FIG. 9, or may be the same as the processing module 1210 in FIG. Correspondingly, it is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, spread spectrum and so on.
  • the BBU processing module
  • the BBU may be used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment, for example, to generate the foregoing indication information.
  • the BBU 1720 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network with a single access standard (such as an LTE network), or support different access standards. Wireless access network (such as LTE network, 5G network or other networks).
  • the BBU 1720 also includes a memory 1721 and a processor 1722.
  • the memory 1721 is used to store necessary instructions and data.
  • the processor 1722 is used to control the base station to perform necessary actions, for example, to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
  • the memory 1721 and the processor 1722 may serve one or more boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • the embodiment of the present application provides a first communication system.
  • the first communication system may include the terminal device involved in the embodiment shown in FIG. 2 and the network device involved in the embodiment shown in FIG. 2.
  • the terminal device is, for example, the terminal device 800 in FIG. 8.
  • the network device is, for example, the network device 700 in FIG. 7.
  • the embodiment of the present application provides a second communication system.
  • the first communication system may include the terminal device involved in the embodiment shown in FIG. 3 and the network device involved in the embodiment shown in FIG. 3.
  • the terminal device is, for example, the terminal device 1000 in FIG. 10.
  • the network device is, for example, the network device 900 in FIG. 9.
  • the embodiment of the present application provides a third communication system.
  • the third communication system may include the terminal device involved in the embodiment shown in FIG. 4 described above.
  • the terminal device is, for example, the terminal device 1100 in FIG. 11.
  • the embodiment of the present application provides a fourth communication system.
  • the fourth communication system may include the terminal device involved in the embodiment shown in FIG. 5 and the network device involved in the embodiment shown in FIG. 5.
  • the terminal device is, for example, the terminal device 1300 in FIG. 13.
  • the network device is, for example, the network device 1200 in FIG. 12.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 2 provided by the foregoing method embodiment.
  • the process related to the network device in the embodiment is not limited to a computer-readable storage medium.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 2 provided by the foregoing method embodiment.
  • the process related to the terminal device in the embodiment is not limited to a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 2 provided by the foregoing method embodiment. The process related to the terminal device in the embodiment.
  • An embodiment of the present application also provides a computer-readable storage medium that stores a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement the method shown in FIG. 3 provided by the foregoing method embodiment. The process related to the network device in the embodiment.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 3 provided by the foregoing method embodiment.
  • the process related to the terminal device in the embodiment is not limited to a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 3 provided by the foregoing method embodiment. The process related to the terminal device in the embodiment.
  • the embodiments of the present application also provide a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 4 provided by the foregoing method embodiment.
  • the process related to the terminal device in the embodiment is not limited to a computer-readable storage medium.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 5 provided by the foregoing method embodiment.
  • the process related to the network device in the embodiment is not limited to a computer-readable storage medium.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 5 provided by the foregoing method embodiment.
  • the process related to the terminal device in the embodiment is not limited to a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 5 provided by the foregoing method embodiment. The process related to the terminal device in the embodiment.
  • the embodiments of the present application also provide a computer program product, which is used to store a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 2 provided by the above method embodiment. Processes related to network equipment.
  • the embodiments of the present application also provide a computer program product, which is used to store a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 2 provided by the above method embodiment. Processes related to terminal equipment.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 3 provided by the above method embodiment Processes related to network equipment.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 3 provided by the above method embodiment Processes related to terminal equipment.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 4 provided by the above method embodiment Processes related to terminal equipment.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 5 provided by the above method embodiment Processes related to network equipment.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 5 provided by the above method embodiment Processes related to terminal equipment.
  • processors mentioned in the embodiments of this application may be a CPU, or other general-purpose processors, digital signal processors (digital signal processors, DSP), application specific integrated circuits (ASICs), ready-made Field programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory mentioned in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component
  • the memory storage module
  • the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not correspond to the embodiments of the present application.
  • the implementation process constitutes any limitation.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned computer-readable storage medium may be any available medium that can be accessed by a computer.
  • computer-readable media can include random access memory (RAM), read-only memory (ROM), and electrically erasable programmable read-only memory (electrically erasable programmable read-only memory).
  • RAM random access memory
  • ROM read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • CD-ROM compact disc read-only memory
  • USB flash disk universal serial bus flash disk
  • mobile hard disk or other optical disk storage
  • disk storage A medium or other magnetic storage device, or any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande concerne un procédé, un appareil et un dispositif de communication. Le procédé consiste : à déterminer un premier type d'accès aléatoire correspondant à un processus d'accès aléatoire déclenché par un premier type d'événement, le premier type d'événement consistant dans les événements compris dans une première catégorie, et le premier type d'accès aléatoire comprenant la RACH à 2 étapes, la RACH à 4 étapes, ou un ou plusieurs types parmi la RACH à 2 étapes et la RACH à 4 étapes ; à envoyer un message de réponse d'accès aléatoire dans un premier processus d'accès aléatoire, le message de réponse d'accès aléatoire étant utilisé pour indiquer le premier type d'accès aléatoire. Des modes de réalisation de la présente invention peuvent régler différents types d'accès aléatoire pour différentes catégories d'événements de manière à réduire le retard d'accès au réseau, à augmenter l'efficacité d'accès et à rendre la charge de ressources d'accès aléatoire plus équilibrée sur la base de la satisfaction de l'exigence de faible latence pour des urgences ou des événements à haute priorité, autant que possible.
PCT/CN2019/128023 2019-12-24 2019-12-24 Procédé, appareil et dispositif de communication WO2021128016A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/128023 WO2021128016A1 (fr) 2019-12-24 2019-12-24 Procédé, appareil et dispositif de communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/128023 WO2021128016A1 (fr) 2019-12-24 2019-12-24 Procédé, appareil et dispositif de communication

Publications (1)

Publication Number Publication Date
WO2021128016A1 true WO2021128016A1 (fr) 2021-07-01

Family

ID=76575708

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/128023 WO2021128016A1 (fr) 2019-12-24 2019-12-24 Procédé, appareil et dispositif de communication

Country Status (1)

Country Link
WO (1) WO2021128016A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015129985A1 (fr) * 2014-02-28 2015-09-03 엘지전자(주) Procédé et appareil pour l'émission de données de liaison montante de faible latence dans un système de communication sans fil
CN109565880A (zh) * 2018-10-31 2019-04-02 北京小米移动软件有限公司 传输随机接入指示信息的方法及装置
CN109863814A (zh) * 2016-10-19 2019-06-07 高通股份有限公司 增强型随机接入信道(rach)规程
CN110169189A (zh) * 2017-01-13 2019-08-23 摩托罗拉移动有限责任公司 在载波频率中执行基于竞争的随机接入的方法和装置
CN110312312A (zh) * 2019-03-29 2019-10-08 北京展讯高科通信技术有限公司 上行传输资源获取方法、数据传输方法、电子设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015129985A1 (fr) * 2014-02-28 2015-09-03 엘지전자(주) Procédé et appareil pour l'émission de données de liaison montante de faible latence dans un système de communication sans fil
CN109863814A (zh) * 2016-10-19 2019-06-07 高通股份有限公司 增强型随机接入信道(rach)规程
CN110169189A (zh) * 2017-01-13 2019-08-23 摩托罗拉移动有限责任公司 在载波频率中执行基于竞争的随机接入的方法和装置
CN109565880A (zh) * 2018-10-31 2019-04-02 北京小米移动软件有限公司 传输随机接入指示信息的方法及装置
CN110312312A (zh) * 2019-03-29 2019-10-08 北京展讯高科通信技术有限公司 上行传输资源获取方法、数据传输方法、电子设备

Similar Documents

Publication Publication Date Title
WO2021259129A1 (fr) Procédé de communication et dispositif de communication
CN109196908B (zh) 调度方法、基站和存储介质
US10375737B2 (en) Method and apparatus for sending and receiving information on a wireless network
CN113382379B (zh) 无线通信方法和通信装置
WO2021175185A1 (fr) Procédé et appareil de communication
WO2021179895A1 (fr) Procédé et appareil de communication
WO2021057564A1 (fr) Procédé et appareil de transmission de priorité d'informations d'état de canal, procédé et appareil de détermination de priorité d'informations d'état de canal, support d'informations, et équipement utilisateur
JP2022506884A (ja) サイドリンクデータ伝送方法及び端末機器
US20220159696A1 (en) Wireless communication method, terminal device, and network device
WO2021128224A1 (fr) Procédé, dispositif et système de communication
US11889347B2 (en) Apparatus and method for uplink data report and control channel synchronization in wireless communication system
JP7239718B2 (ja) リソース管理の方法及び装置
WO2021204016A1 (fr) Procédé de communication et appareil de communication
CN115175143A (zh) 一种通信方法及装置
US20240098764A1 (en) Resource selection in side link (sl) communications
US20220159685A1 (en) Data transmission method and apparatus
WO2021128016A1 (fr) Procédé, appareil et dispositif de communication
CN113473590B (zh) 一种通信方法及装置
WO2022077286A1 (fr) Station de base, équipement d'utilisateur et procédé de transmission de petites données sur la base d'un accès aléatoire
WO2018141202A1 (fr) Procédé et dispositif de traitement de communications
WO2022237597A1 (fr) Procédé de communication et appareil de communication
WO2023169362A1 (fr) Procédé de radiomessagerie et appareil associé
WO2023124823A1 (fr) Procédé et appareil de communication
US20240056926A1 (en) Communication method and apparatus for obtaining load information
US20220225433A1 (en) Wireless communication method, terminal device, and network device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19957552

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19957552

Country of ref document: EP

Kind code of ref document: A1