WO2021207908A1 - 一种随机接入方法及终端设备 - Google Patents

一种随机接入方法及终端设备 Download PDF

Info

Publication number
WO2021207908A1
WO2021207908A1 PCT/CN2020/084596 CN2020084596W WO2021207908A1 WO 2021207908 A1 WO2021207908 A1 WO 2021207908A1 CN 2020084596 W CN2020084596 W CN 2020084596W WO 2021207908 A1 WO2021207908 A1 WO 2021207908A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
network slicing
terminal device
service
network
Prior art date
Application number
PCT/CN2020/084596
Other languages
English (en)
French (fr)
Inventor
屈凯旸
黄曲芳
罗海燕
肖潇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN202080099807.9A priority Critical patent/CN115428483A/zh
Priority to PCT/CN2020/084596 priority patent/WO2021207908A1/zh
Priority to EP20931596.9A priority patent/EP4124078A4/en
Publication of WO2021207908A1 publication Critical patent/WO2021207908A1/zh
Priority to US17/965,577 priority patent/US20230049532A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • This application relates to the field of communication technology, and in particular to a random access method and terminal equipment.
  • Network function virtualization NFV
  • Network slicing is an end-to-end virtual network formed by logically defining and dividing the network based on a general physical infrastructure. Among them, each virtual network has different functional characteristics, so as to dynamically meet a variety of needs and business models.
  • a terminal device when a terminal device initiates a network slicing service, it usually selects the type of random access based on the signal strength of the reference signal sent by the measuring cell. In this way, when multiple terminal devices have measured equivalent signal strengths, the multiple terminal devices will select a random access type to initiate random access at the same time. It is easy to affect the terminal device’s performance due to insufficient random access resources. Normal access causes some network slicing services with high timeliness requirements to be affected.
  • the embodiments of this application provide a random access method and terminal equipment, which determine the corresponding random access type according to the network slicing service to be initiated, so that different types of network slicing services can be randomly accessed through different random access types.
  • Network slicing services that require high immediacy can be accessed first with random access types with less interactive signaling; for network slicing services that require less timeliness, random access with less interactive signaling is used.
  • Type for random access leaving limited 2-step random access time-frequency resources to other terminal devices that require fast access, thereby improving network experience.
  • the first aspect of the embodiments of the present application provides a random access method, which includes: when a terminal device wants to initiate a first network slicing service, the terminal device determines a first random access time-frequency resource corresponding to the first network slicing service, where , The first random access time-frequency resource corresponding to the first network slicing service may be predefined; then, the terminal device determines the random access type corresponding to the first network slicing service, that is, the terminal device may be based on the first network slicing
  • the type of service determines which random access type is used to initiate random access for the network slicing service; the terminal device initiates random access based on the first random access time-frequency resource and the random access type corresponding to the first network slicing service.
  • the first random access time-frequency resource may only include random access time-frequency resources under one type of random access, for example, when the random access type corresponding to the first network slicing service is 2-step random access ,
  • the first random access time-frequency only includes 2-step random access time-frequency resources.
  • the first random access time-frequency resource may also include random access time-frequency resources under multiple random access types. For example, when the random access type corresponding to the first network slicing service is 2-step random access,
  • the first random access time-frequency may include 2-step random access time-frequency resources and 4-step random access time-frequency resources.
  • the terminal device determines the corresponding random access type according to the network slicing service to be initiated. For example, when the network slicing service to be initiated is a network slicing service with high timeliness requirements, the terminal device preferentially selects 2 steps Random access type; when the network slicing service to be initiated does not require high timeliness, the terminal device selects the 4-step random access type, so that different types of network slicing services can be randomly accessed through different random access types.
  • Network slicing services that require high immediacy can be accessed first with random access types with less interactive signaling to increase the random access rate of these network slicing services; network slicing services that require less timeliness are Random access is performed with random access types with less interactive signaling to save random access resources corresponding to random access types with less interactive signaling, and the limited 2-step random access time-frequency resources are reserved for other users. Quickly access the terminal equipment required to improve the network experience.
  • the terminal device determining the first random access time-frequency resource corresponding to the first network slicing service specifically includes: the terminal device determining the first random access time-frequency resource according to the identifier of the first network slicing service and the first mapping relationship;
  • the first mapping relationship is the mapping relationship between the network slicing service identifier and the random access time-frequency resource.
  • the terminal device may obtain the first mapping relationship in a variety of ways.
  • one network slice service identifier may correspond to one or more random access time-frequency resource identifiers. That is, one or more random access time-frequency resources corresponding to the first network slicing service can be determined according to the identifier of the first network slicing service.
  • the method further includes: the terminal device receives a first message, the first message including the first A mapping relationship.
  • the first message received by the terminal device may specifically be a system message broadcast by the access network device, that is, the terminal device obtains the first mapping relationship by receiving the system message broadcast by the access network device.
  • the first message includes a physical random access channel mask index, and the physical random access channel mask index is used to indicate the first mapping relationship.
  • the first message received by the terminal device may specifically be a radio resource control (radio resource control, RRC) message, a physical downlink control channel (physical downlink control channel, PDCCH) message, or a system message sent by the access network device.
  • RRC radio resource control
  • PDCCH physical downlink control channel
  • the terminal device determining the random access type corresponding to the first network slicing service includes: the terminal device obtains the signal quality of the reference signal; when the signal quality is greater than or equal to a preset threshold , And when the first network slice service corresponds to 2-step random access in the second mapping relationship, it is determined that the random access type corresponding to the first network slice service is 2-step random access; When the signal quality is less than the preset threshold, or the first network slice service corresponds to 4-step random access in the second mapping relationship, it is determined that the random access type corresponding to the first network slice service is 4 Step random access; wherein, the second mapping relationship is a mapping relationship between a network slicing service and a random access type, and the second mapping relationship may be carried in a second message, and the terminal device receives the second Message to obtain the second mapping relationship; the second message is one of a system message, an RRC message, or a PDCCH message; that is, the terminal device can receive a system message, an RRC message,
  • the terminal device determines to use the 2-step random access. Initiate the first network slicing service.
  • the measured signal quality refers to the signal quality obtained by the terminal device by measuring the reference signal sent by the access network device, and the signal quality can be determined by reference signal receiving power (RSRP) or reference signal receiving power (RSRP).
  • Signal receiving quality reference signal receiving quality, RSRQ.
  • the reference signal sent by the access network device may include a demodulation reference signal (DMRS), a phase-tracking reference signal (PTRS), or a channel state information reference signal (channel state information).
  • DMRS demodulation reference signal
  • PTRS phase-tracking reference signal
  • CSI-RS channel state information reference signal
  • the terminal equipment determines the signal quality by measuring the RSRP or RSRQ of the reference signal.
  • the preset threshold may be specifically determined by the access network device and notified to the terminal device, or may be defined in the standard, or may be determined by the terminal device itself, which is not specifically limited here.
  • the terminal device determines its corresponding random access type according to the measured signal quality and the network slice service to be initiated.
  • the signal quality is greater than or equal to the preset threshold and the first network slice service is in the second mapping relationship
  • the random access type of the network slicing service is determined to be 2-step random access; otherwise, the random access type of the network slicing service is determined to be 4-step random access.
  • the random access type of the network slicing service is further determined, which can effectively avoid the appearance of access congestion, that is, the terminal equipment with better signal quality can give priority to interaction
  • the random access type with less signaling initiates network slicing services with high timeliness requirements, and reserves the limited 2-step random access time-frequency resources to other terminal devices that require fast access, thereby improving the network experience.
  • the method further includes: if the terminal device has multiple network slicing services to be initiated, determining the initiation location among the multiple network slicing services to be initiated according to the priority of the network slicing service.
  • the first network slicing service is a network slicing service with the highest priority among the plurality of network slicing services to be initiated.
  • the RRC layer of the terminal device can sort multiple network slicing services from high to low based on the priority of the network slicing service; that is, the higher the priority of the network slicing service, the higher the order of initiation of the network slicing service and the higher the priority.
  • the network slicing service with the highest level is the network slicing service initiated first.
  • the access network device may carry priority information of the network slicing service in the system message, PDCCH message or RRC message, and the terminal device can obtain the priority of the network slicing service by reading the system message, PDCCH message or RRC message.
  • the method further includes: if the terminal device has multiple network slicing services to be initiated, determining that the first network slicing service corresponding to the third random access time-frequency resource is the initiated network slicing Service, wherein the third random access time-frequency resource is a random access time-frequency resource located after the first time point and closest to the first time point, and the first time point is the media access of the terminal device The time point at which the media access control (MAC) entity obtains the instruction to initiate random access.
  • the MAC layer of the terminal device determines the random time-frequency resource that can be used to initiate random access first, and then determines the network slicing service corresponding to the random time-frequency resource. The network slicing service initiated first is determined.
  • the method further includes: if the terminal device has multiple network slicing services to be initiated, according to the number of random access time-frequency resources corresponding to the network slicing service within a preset time period. Number, determine to initiate the first network slicing service, where the first network slicing service is the number of random access time-frequency resources corresponding to the plurality of network slicing services to be initiated within a preset time period The largest number of network slicing services. Among them, the size of the preset time period can be set according to actual conditions, for example, it can be 10ms, 20ms, or 50ms, etc., which is not specifically limited here.
  • the network slicing service to be initiated includes network slicing service 1 and network slicing service 2.
  • network slicing service 1 has n random access time-frequency resources
  • network slicing service 2 has m Random access to time-frequency resources, if n>m, select network slicing service 1 as the network slicing service initiated first.
  • the method further includes: the terminal device receives a third message, the third message includes first configuration information and second configuration information, and the first configuration information is used to indicate a network slicing service Corresponding random access configuration, the second configuration information is used to indicate the random access configuration corresponding to the default slice service.
  • the terminal device can obtain the random access configuration corresponding to the network slicing service and the random access configuration corresponding to the default slicing service by receiving the system message, the RRC message or the PDCCH message sent by the access network device.
  • a terminal device when it initiates a service, it can be considered that the terminal device initiates a network slice service, and the network slice corresponding to the network slice identifier executes the network slice service initiated by the terminal device.
  • the terminal device does not carry the network slice identifier when initiating the service, it can be considered that the terminal device initiates the default slice service, and the default slice service initiated by the terminal device can be executed by the default slice assigned to the terminal device by the core network device in advance. .
  • the method further includes: if there are both a network slicing service to be initiated and a default slicing service, counting the number of random accesses of the network slicing service; if the number of random accesses of the network slicing service When the preset number of times is reached, the random access of the network slicing service is stopped, and the random access of the default slicing service is initiated. In this way, by counting the number of random access corresponding to the network slicing service, it is possible to ensure the possibility of initiating random access by the default slicing service on the premise that the random access of the network slicing service is initiated first.
  • the method further includes: if the first random access time-frequency resource includes random access time-frequency resources under different random access types, then the terminal device according to the The random access type determines a second random access time-frequency resource in the first random access time-frequency resource, and the second random access time-frequency resource is a random access time-frequency resource corresponding to the random access type Resource; the terminal device initiates random access based on the first random access time-frequency resource and the random access type corresponding to the first network slicing service, including: the terminal device is based on the second random access Random access is initiated by the time-frequency resource and the random access type corresponding to the first network slicing service.
  • the terminal device may perform the first random access time-frequency resource according to the random access type.
  • the second random access time-frequency resource is determined from the incoming time-frequency resource.
  • the first random access time-frequency resource determined by the terminal device includes multiple random access time-frequency resources, and the multiple random access time-frequency resources include time-frequency resources corresponding to 2-step random access. And 4-step random access to the corresponding time-frequency resources.
  • the terminal device can determine the random access time-frequency resource corresponding to the random access type in the first random access time-frequency resource (that is, the second random access time-frequency resource) ) As a candidate random access time-frequency resource for initiating random access.
  • the first random access time-frequency resource includes random access time-frequency resource 1, random access time-frequency resource 2, random access time-frequency resource 3, and random access time-frequency resource 4.
  • Frequency resource 1 and random access time-frequency resource 2 are time-frequency resources corresponding to 2-step random access
  • random access time-frequency resource 3 and random access time-frequency resource 4 are time-frequency resources corresponding to 4-step random access.
  • the terminal device may further determine that random access time-frequency resource 1 and random access time-frequency resource 2 are candidates that are available when random access is initiated. Frequency resources.
  • the terminal device in the case that the second random access time-frequency resource further determined by the terminal device includes only one random access time-frequency resource, the terminal device can use the second random access time-frequency resource to initiate random access ; In the case that the second random access time-frequency resource includes multiple random access time-frequency resources, the terminal device may randomly select a random access time-frequency resource from the second random access time-frequency resource, and then Random access is initiated based on the selected random access time-frequency resource, thereby establishing a connection with the access network device.
  • a second aspect of the embodiments of the present application provides a terminal device, including: a processing unit and a transceiving unit; the processing unit is configured to determine a first random access time-frequency resource corresponding to a first network slicing service, and the first network The slicing service is a network slicing service to be initiated; the processing unit is further configured to determine the random access type corresponding to the first network slicing service; the transceiving unit is configured to be based on the first random access time-frequency The resource and the random access type initiate random access.
  • the processing unit is further configured to determine the first random access time-frequency resource corresponding to the first network slicing service according to the identifier of the first network slicing service and the first mapping relationship ,
  • the first mapping relationship is a mapping relationship between a network slicing service and a random access time-frequency resource.
  • the transceiver unit is further configured to receive a first message, where the first message includes the first mapping relationship.
  • the first message includes a physical random access channel mask index
  • the physical random access channel mask index is used to indicate the first mapping relationship
  • the processing unit is further configured to:
  • the signal quality is greater than or equal to the preset threshold, and the first network slice service corresponds to the 2-step random access in the second mapping relationship, determine the random access corresponding to the first network slice service
  • the type is 2-step random access
  • the signal quality is less than the preset threshold, or the first network slice service corresponds to 4-step random access in the second mapping relationship, determine the random access corresponding to the first network slice service
  • the type is 4-step random access
  • the second mapping relationship is a mapping relationship between a network slicing service and a random access type.
  • the transceiver unit is further configured to receive a second message, where the second message includes the second mapping relationship.
  • the processing unit is further configured to:
  • a network slicing service is the network slicing service with the highest priority among the plurality of network slicing services to be initiated.
  • the processing unit is further configured to:
  • the terminal device has multiple network slicing services to be initiated, it is determined that the first network slicing service corresponding to the third random access time-frequency resource is the initiated network slicing service, where the third random access time-frequency resource is the initiated network slicing service.
  • the frequency resource is a random access time-frequency resource located after the first time point and closest to the first time point, and the first time point is the time point at which the MAC entity of the terminal device obtains the instruction to initiate random access.
  • the processing unit is further configured to:
  • the terminal device If the terminal device has multiple network slicing services to be initiated, it is determined to initiate the first network slicing service according to the number of random access time-frequency resources corresponding to the network slicing service within a preset time period, where The first network slicing service is a network slicing service with the largest number of random access time-frequency resources corresponding to the plurality of network slicing services to be initiated within a preset time period.
  • the transceiver unit is further configured to:
  • a third message is received, where the third message includes first configuration information and second configuration information, the first configuration information is used to indicate the random access configuration corresponding to the network slicing service, and the second configuration information is used to indicate The random access configuration corresponding to the default slice service.
  • the processing unit is further configured to, if there is a network slicing service to be initiated and a default slicing service at the same time, count the number of random accesses of the network slicing service;
  • the transceiver unit is further configured to stop random access of the network slicing service and initiate random access of the default slicing service if the number of random accesses of the network slicing service reaches a preset number of times.
  • the processing unit is further configured to: if the first random access time-frequency resource includes random access time-frequency resources of different random access types, perform random access according to the random access time-frequency resources.
  • the access type determines a second random access time-frequency resource from the first random access time-frequency resource, where the second random access time-frequency resource is a random access time-frequency resource corresponding to the random access type
  • the transceiving unit is further configured to initiate random access based on the second random access time-frequency resource and the random access type corresponding to the first network slicing service.
  • the third aspect of the embodiments of the present application provides a device.
  • the device provided by the embodiment of the present application has the function of realizing the behavior of the terminal device in the foregoing method aspect, and includes a means for executing the steps or functions corresponding to the steps or functions described in the foregoing method aspect.
  • the steps or functions can be realized by software, or by hardware (such as a circuit), or by a combination of hardware and software.
  • the above device includes one or more processors and transceivers.
  • the one or more processors are configured to support the apparatus to perform corresponding functions of the terminal device in the foregoing method.
  • the transceiver is used to support the device to communicate with other devices, and realize the function of receiving and/or sending.
  • the device may further include one or more memories, where the memory is used for coupling with the processor and stores necessary program instructions and/or data for the device.
  • the one or more memories may be integrated with the processor, or may be provided separately from the processor. This application is not limited.
  • the device may be a smart terminal or a wearable device, etc.
  • the transceiver may be a transceiver or a transceiver circuit.
  • the transceiver may also be an input/output circuit or interface.
  • the device may also be a communication chip.
  • the transceiver may be an input/output circuit or interface of a communication chip.
  • the above device includes a transceiver, a processor, and a memory.
  • the processor is used to control a transceiver or an input/output circuit to send and receive signals
  • the memory is used to store a computer program
  • the processor is used to run the computer program in the memory, so that the device executes the first aspect or any one of the first aspect It is possible to implement the method completed by the terminal device in the manner.
  • the above device includes one or more processors and transceivers.
  • the one or more processors are configured to support the apparatus to perform corresponding functions of the network device in the above method.
  • the transceiver is used to support the device to communicate with other devices, and realize the function of receiving and/or sending.
  • the apparatus may further include one or more memories, where the memories are used for coupling with the processor, and the memory stores necessary program instructions and/or data for the network device.
  • the one or more memories may be integrated with the processor, or may be provided separately from the processor. This application is not limited.
  • a fourth aspect of the embodiments of the present application provides a computer-readable storage medium for storing a computer program, and the computer program includes instructions for executing a method in any one of the possible implementation manners of the first aspect.
  • the fifth aspect of the embodiments of the present application provides a computer program product, the computer program product includes: computer program code, when the computer program code runs on a computer, the computer can execute any one of the above-mentioned first aspects.
  • the method in the way includes: computer program code, when the computer program code runs on a computer, the computer can execute any one of the above-mentioned first aspects. The method in the way.
  • the terminal device determines the corresponding random access type according to the network slicing service to be initiated. For example, when the network slicing service to be initiated is a network slicing service with high timeliness requirements, the terminal device preferentially selects 2 steps Random access type; when the network slicing service to be initiated does not require high timeliness, the terminal device selects the 4-step random access type, so that different types of network slicing services can be randomly accessed through different random access types.
  • Network slicing services that require high immediacy can be accessed first with random access types with less interactive signaling to increase the random access rate of these network slicing services; network slicing services that require less timeliness are Random access is performed with random access types with less interactive signaling to save random access resources corresponding to random access types with less interactive signaling, and the limited 2-step random access time-frequency resources are reserved for other users. Quickly access the terminal equipment required to improve the network experience.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the application
  • FIG. 2 is a schematic flowchart of a random access method 200 provided by an embodiment of this application;
  • FIG. 3 is a schematic diagram of another flow of a random access method 200 according to an embodiment of this application.
  • FIG. 4 is a schematic flowchart of a random access method 400 provided by an embodiment of this application.
  • FIG. 5 is a schematic flowchart of a random access method 500 provided by an embodiment of this application.
  • FIG. 6 is a schematic flowchart of a random access method 600 provided by an embodiment of this application.
  • FIG. 7 is a schematic flowchart of a random access method 700 provided by an embodiment of this application.
  • FIG. 8 is a schematic flowchart of a random access method 800 provided by an embodiment of this application.
  • FIG. 9 is a schematic diagram of triggering a counter action provided in an embodiment of the application.
  • FIG. 10 is a schematic structural diagram of a terminal device 1000 provided by an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a terminal device 1100 according to an embodiment of the application.
  • the naming or numbering of steps appearing in this application does not mean that the steps in the method flow must be executed in the time/logical sequence indicated by the naming or numbering.
  • the named or numbered process steps can be implemented according to the The technical purpose changes the execution order, as long as the same or similar technical effects can be achieved.
  • the division of units presented in this application is a logical division. In actual applications, there can be other divisions. For example, multiple units can be combined or integrated in another system, or some features can be ignored , Or not to execute, in addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, and the indirect coupling or communication connection between the units may be in electrical or other similar forms. There are no restrictions in the application.
  • the units or subunits described as separate components may or may not be physically separate, may or may not be physical units, or may be distributed to multiple circuit units, and some or all of them may be selected according to actual needs. Unit to achieve the purpose of this application program.
  • a terminal device When a terminal device initiates a service, the terminal device usually needs to select a random access type, and then initiate random access based on the selected random access type.
  • a terminal device selects the type of random access by measuring the signal strength of a reference signal sent by a radio access network (RAN) device. For example, when the signal strength is strong, the terminal device selects 2-step random access with less interactive signaling; when the signal strength is weak, the terminal device selects 4-step random access with more interactive signaling.
  • RAN radio access network
  • QoS network quality of service
  • the QoS requirement of service A is low latency
  • the QoS requirement of service B is high reliability
  • C's QoS requirement is high bandwidth. If a single network is used to carry these services, it will be difficult to meet the requirements of low latency, high reliability, and high bandwidth at the same time. However, building a separate network for each business will bring huge costs.
  • network slicing uses NFV technology to create multiple virtual networks on a shared physical network resource. Multiple virtual networks are used to carry different types of services, and the virtual networks are isolated from each other to achieve business isolation. By performing different configurations on multiple virtual networks, multiple virtual networks can be made to meet the requirements of different types of services.
  • network slice A may be configured to meet the requirements of low-latency services, that is, network slice A may be used to carry service A with low-latency requirements to meet the QoS requirements of service A.
  • the service A may also be referred to as the network slicing service A.
  • the embodiments of the present application provide a random access method.
  • the terminal device determines the corresponding random access type according to the network slicing service to be initiated.
  • the network slicing service to be initiated is a network with high timeliness requirements.
  • the terminal device preferentially selects the 2-step random access type; when the network slicing service to be initiated does not require high timeliness, the terminal device preferentially selects the 4-step random access type, so that different types of network slicing services pass different Random access can be performed on the random access type of the network, and the network slicing service with high immediacy requirements can be preferentially performed by the random access type with less interactive signaling.
  • Random access can include a process from the terminal device sending a random access preamble to the establishment of a basic signaling connection between the terminal device and the network.
  • random access can include 4-step random access and 2-step random access.
  • the 4-step random access includes the following 4 processes:
  • the terminal device sends a random access preamble. This process is usually also referred to as the process in which the terminal device sends MSG1.
  • the access network device sends a random access response message. This process is usually also referred to as the process in which the access network device sends MSG2.
  • the UE sends an RRC connection request message. This process is usually also referred to as the process in which the terminal device sends MSG3.
  • the access network device sends an RRC connection establishment message. This process is usually also referred to as the process in which the access network device sends MSG4.
  • the 2-step random access includes the following two processes:
  • the terminal device sends a random access preamble and an RRC connection request message. This process is usually also referred to as the process in which the terminal device sends MSGA.
  • the access network device sends an RRC connection establishment message. This process is usually also referred to as the process in which the access network device sends the MSGB.
  • Random access resources refer to the resources that a terminal device needs to use in the process of initiating random access.
  • random access resources include time domain resources, frequency domain resources, and code resources.
  • the access network device can allocate a dedicated preamble to the terminal device, and the terminal device initiates non-competitive random access based on the dedicated preamble.
  • the access network device can send a PDCCH message or an RRC message to the terminal device.
  • the PDCCH message or RRC message can indicate the preamble index used for random access; the PDCCH message or RRC message can also indicate the physical layer randomness.
  • Access channel mask index physical random access channel mask index, PRACH Mask Index
  • the preamble index is used to indicate the preamble used by the terminal device to perform random access
  • the PRACH Mask Index is used to indicate the terminal device can send the preamble on the PRACH corresponding to which subframe in the system frame.
  • the access network device can broadcast the available preamble resource pool information to the terminal device through a cell broadcast message, and the terminal device can select a preamble from the preamble resource pool and send it to the access network device. At this time, it may happen that multiple terminal devices simultaneously select the same preamble on the same time-frequency resource to send to the access network device, that is, multiple terminal devices will compete and conflict.
  • the technical solutions of the embodiments of the present application can be applied to a scenario in which a terminal device initiates competitive random access, and can also be applied to a scenario in which a terminal device initiates non-competitive random access, which is not specifically limited here.
  • S-NSSAI Single network slice selection support information refers to the identifier of a network slice, which can indicate a certain network slice in the network. Generally, each network slice in the network has a unique S-NSSAI.
  • the ran slicing area Identity refers to the network slicing identity of a RAN area, which can be used to indicate one or more network slices.
  • one RSA ID can correspond to one or more S-NSSAIs, and the correspondence between RSA ID and S-NSSAI is valid within a tracking area (TA).
  • TA is a geographic area composed of a continuous coverage cell, which is used for paging and to update the location of terminal equipment. Because one RSA ID can correspond to multiple S-NSSAIs, and the number of RSA ID bits is less than that of S-NSSAI. Therefore, compared to broadcasting multiple S-NSSAIs, the base station directly broadcasting the RSA ID can save resource overhead.
  • CDMA code division multiple access
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • OFDMA orthogonal frequency-division multiple access
  • SC-FDMA single carrier frequency-division multiple access
  • LTE long term evolution
  • 5G fifth generation
  • NR new radio
  • the communication system may also be suitable for future-oriented communication technologies, all of which are applicable to the technical solutions provided in the embodiments of the present application.
  • the system architecture and business scenarios described in the embodiments of this application are intended to more clearly illustrate the technical solutions of the embodiments of this application, and do not constitute a limitation on the technical solutions provided in the embodiments of this application. Those of ordinary skill in the art will know that with the network With the evolution of architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are equally applicable to similar technical problems.
  • the application scenario includes a terminal device 101 and an access network device 102.
  • the terminal device 101 is wirelessly connected to the access network device 102, and the access network device 102 is used to connect the terminal device 101 to the wireless network.
  • the terminal device 101 is also referred to as user equipment (UE), mobile station (MS), mobile terminal (MT), etc., which provide users with voice and/or data connectivity.
  • UE user equipment
  • MS mobile station
  • MT mobile terminal
  • the device, or the chip set in the device for example, a handheld device with a wireless connection function, a vehicle-mounted device, etc.
  • terminal devices are: mobile phones (mobile phones), tablet computers, notebook computers, handheld computers, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, augmented Augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving (self-driving), wireless terminals in remote medical surgery, and smart grid (smart grid)
  • the access network device 102 may be any device with a wireless transceiving function, or a chip set in a device with a specific wireless transceiving function.
  • the access network equipment 102 includes, but is not limited to: base stations (such as base stations BS, base stations NodeB, evolved base stations eNodeB or eNB, base stations gNodeB or gNB in the fifth generation 5G communication system, base stations in future communication systems, Access nodes, wireless relay nodes, wireless backhaul nodes), etc.
  • the base station may be: a macro base station, a micro base station, a pico base station, a small station, a relay station, etc. Multiple base stations can support networks of one or more of the aforementioned technologies, or future evolution networks.
  • the base station may include one or more co-site or non co-site transmission reception points (TRP).
  • the access network device 102 may also be a wireless controller, a centralized unit (CU), or a distributed unit (DU) in a cloud radio access network (cloud radio access network, CRAN) scenario.
  • the multiple access network devices 102 may be base stations of the same type, or base stations of different types.
  • the base station can communicate with the terminal device 101, and can also communicate with the terminal device 101 through a relay station.
  • the terminal device 101 can support communication with multiple base stations of different technologies.
  • the terminal device 101 can support communication with a base station that supports an LTE network, can also support communication with a base station that supports a 5G network, and can also support communication with a base station that supports an LTE network. Dual connection of the base station of the 5G network.
  • the terminal device 101 is connected to the RAN node of the wireless network.
  • RAN nodes are: gNB, TRP, evolved Node B (evolved Node B, eNB), next generation evolved Node B (LTE ng-eNB), radio network controller (radio network controller (RNC), node B (Node B, NB), base station controller (BSC), base transceiver station (BTS), home base station (for example, home evolved NodeB, or home Node B) , HNB), base band unit (BBU), or Wifi access point (access point, AP), etc.
  • RNC radio network controller
  • Node B Node B
  • BSC base station controller
  • BTS base transceiver station
  • HNB home evolved NodeB, or home Node B
  • BBU base band unit
  • Wifi access point access point, AP
  • the random access method 200 includes:
  • a terminal device determines a first random access time-frequency resource corresponding to a first network slicing service, where the first network slicing service is a network slicing service to be initiated.
  • the terminal device may determine the first random corresponding to the first network slicing service according to the first network slicing service and the first mapping relationship.
  • the first mapping relationship is a mapping relationship between a network slicing service and random access time-frequency resources used for accessing the network slicing service.
  • the terminal device may obtain the first mapping relationship in a variety of ways.
  • the access network device broadcasts a system message, and the system message carries the first mapping relationship.
  • the terminal device can obtain the first mapping relationship by receiving the system message broadcast by the access network device.
  • the first mapping relationship carried in the system message may be as shown in Table 1.
  • Table 1 is a structural table of a possible first mapping relationship.
  • one network slice service identifier may correspond to one or more random access time-frequency resource identifiers. That is, one or more random access time-frequency resources corresponding to the first network slicing service can be determined according to the identifier of the first network slicing service. Specifically, the one or more random access time-frequency resources corresponding to the first network slicing service may be one or more random access time-frequency resources in the cell accessed by the terminal device. Generally, a random access time-frequency resource may specifically be one or more resource blocks (resource blocks, RBs).
  • resource blocks resource blocks
  • the first mapping relationship may be indicated by PRACH Mask Index.
  • PRACH Mask Index is used to indicate the random access time-frequency resources related to synchronization signal and PBCH block (synchronization signal and PBCH block, SSB); PRACH Mask Index with different values can indicate random access corresponding to SSB in different situations Time-frequency resources.
  • the terminal equipment may involve synchronization signal (synchronization signal, SS) and PBCH during the synchronization and access process, and the SSB includes the aforementioned SS and PBCH.
  • PRACH Mask Index indicating the random access time-frequency resources corresponding to SSB
  • PRACH Mask Index with other values can be used to indicate the first mapping relationship, that is, PRACH Mask Index with other values can be used to indicate network slicing services and random access. Correspondence between access resources.
  • PRACH Mask Index indicating the first mapping relationship
  • Table 2 a possible manner for the PRACH Mask Index to indicate the first mapping relationship may be as shown in Table 2.
  • PRACH Mask Index indicates the random access time-frequency resource selected when the terminal device initiates random access; random access time-frequency resource indexes 1 to 8 indicate random access The identifier of the incoming time-frequency resource is used to indicate the specific random access time-frequency resource; when the value of PRACH Mask Index is 11 and 12, the PRACH Mask Index indicates the network slicing service and one or more random access resources.
  • the corresponding relationship between the random access time-frequency resources Y1 and the random access time-frequency resource Y2 in Table 2 may include one or more random access time-frequency resources; the value of PRACH Mask Index is 13 to At 15:00, PRACH Mask Index is reserved to indicate random access time-frequency resources in other situations.
  • PRACH Mask Index when the value of PRACH Mask Index is 10 to 15, the value of PRACH Mask Index can be used to indicate the mapping relationship between network slicing services and random access time-frequency resources. In practical applications, it is possible to determine which PRACH Mask Index values to use to indicate the mapping relationship between network slicing services and random access time-frequency resources according to actual needs.
  • the PRACH Mask Index can be set to 11 and 12 to indicate the mapping relationship between the network slicing service and the random access time-frequency resources;
  • the value of PRACH Mask Index can be 11 to 15 to indicate the mapping relationship between the network slicing service and the random access time-frequency resources.
  • the PRACH Mask Index can be carried in an RRC message, a PDCCH message, or a system message. That is, the terminal device may obtain the PRACH Mask Index by receiving the RRC message, PDCCH message or system message sent by the access network device, and determine the first mapping relationship according to the indication in the PRACH Mask Index.
  • the first mapping relationship may be carried in an RRC message or a PDCCH message, that is, the terminal device can obtain the first mapping relationship by receiving the RRC message or the PDCCH message sent by the access network device.
  • the terminal device determines the random access type corresponding to the first network slicing service.
  • the terminal device may determine the random access type corresponding to the first network slicing service according to the second mapping relationship between the network slicing service and the random access type.
  • the second mapping relationship between the network slicing service and the random access type can be carried in a system message, an RRC message, or a PDCCH message; the terminal device receives the system message, RRC message, or PDCCH message sent by the access network device, To obtain the second mapping relationship between the network slicing service and the random access type.
  • the terminal device determines, according to the second mapping relationship between the network slicing service and the random access type, that the random access type corresponding to network slicing service 1 is 2-step random access, and the random access type corresponding to network slicing service 2 is 4 Step random access.
  • the access network device may determine the second mapping relationship between the network slicing service and the random access type according to the type of the network slicing service. Specifically, the access network device may determine that network slice services with higher timeliness requirements or higher access priority correspond to 2-step random access with less interactive signaling, so as to increase the random access rate of these network slice services; The access network equipment can also determine that network slice services with low timeliness requirements or low access priority correspond to 4-step random access with more interactive signaling, so as to save the overhead of 2-step random access resources.
  • the terminal device can also determine the random access type corresponding to the network slicing service according to the type of the network slicing service. For example, when the first network slicing service is a network slicing service with high timeliness requirements, the terminal device may determine that the random access type corresponding to the first network slicing service is a 2-step random access with less interactive signaling. enter. The terminal device may also determine the random access type corresponding to the network slicing service in other ways, which is not specifically limited here.
  • the terminal device initiates random access based on the first random access time-frequency resource and the random access type.
  • the first random access time-frequency resource may only include random access time-frequency resources under one type of random access.
  • the random access type corresponding to the first network slicing service is 2-step random.
  • the first random access time-frequency only includes 2-step random access time-frequency resources.
  • the first random access time-frequency resource may also include random access time-frequency resources under multiple random access types. For example, when the random access type corresponding to the first network slicing service is 2-step random access, The first random access time-frequency may include 2-step random access time-frequency resources and 4-step random access time-frequency resources.
  • the terminal device may directly base on the first random access time-frequency resource.
  • the resource initiates random access.
  • the terminal device can directly initiate random access according to the random access time-frequency resource;
  • a random access time-frequency resource includes multiple random access time-frequency resources of the same random access type, the terminal device selects a random access time-frequency resource from the multiple random access time-frequency resources to initiate a random access time-frequency resource. enter.
  • the terminal device may perform the A second random access time-frequency resource is determined from the first random access time-frequency resource, and the second random access time-frequency resource is a random access time-frequency resource corresponding to the random access type.
  • the first random access time-frequency resource determined by the terminal device includes multiple random access time-frequency resources, and the multiple random access time-frequency resources include time-frequency resources corresponding to 2-step random access. Frequency resources and time-frequency resources corresponding to 4-step random access.
  • the terminal device can determine the random access time-frequency resource corresponding to the random access type in the first random access time-frequency resource (that is, the second random access time-frequency resource) ) As a candidate random access time-frequency resource for initiating random access.
  • the first random access time-frequency resource includes random access time-frequency resource 1, random access time-frequency resource 2, random access time-frequency resource 3, and random access time-frequency resource 4.
  • Frequency resource 1 and random access time-frequency resource 2 are time-frequency resources corresponding to 2-step random access
  • random access time-frequency resource 3 and random access time-frequency resource 4 are time-frequency resources corresponding to 4-step random access.
  • the terminal device may further determine that random access time-frequency resource 1 and random access time-frequency resource 2 are candidates that are available when random access is initiated. Frequency resources.
  • the terminal device in the case that the second random access time-frequency resource further determined by the terminal device includes only one random access time-frequency resource, the terminal device can use the second random access time-frequency resource to initiate random access ; In the case that the second random access time-frequency resource includes multiple random access time-frequency resources, the terminal device may randomly select a random access time-frequency resource from the second random access time-frequency resource, and then Random access is initiated based on the selected random access time-frequency resource, thereby establishing a connection with the access network device.
  • the terminal device determines the corresponding random access type according to the network slicing service to be initiated. For example, when the network slicing service to be initiated is a network slicing service with high timeliness requirements, the terminal device preferentially selects 2 steps Random access type; when the network slicing service to be initiated does not require high timeliness, the terminal device preferentially selects the 4-step random access type; it can make different types of network slicing services perform random access through different random access types , Network slicing services that require high immediacy can preferentially use random access types with less interactive signaling for random access.
  • the terminal device may further determine the first network slicing service correspondence based on the second mapping relationship between the network slicing service and the random access type and the measured signal quality.
  • the type of random access refers to the signal quality obtained by the terminal device by measuring the reference signal sent by the access network device, and the signal quality can be determined by reference signal receiving power (RSRP) or reference signal receiving power (RSRP).
  • Signal receiving quality reference signal receiving quality, RSRQ.
  • the reference signal sent by the access network device may include a demodulation reference signal (DMRS), a phase-tracking reference signal (PTRS), or a channel state information reference signal (channel state information).
  • DMRS demodulation reference signal
  • PTRS phase-tracking reference signal
  • CSI-RS channel state information reference signal
  • the terminal equipment determines the signal quality by measuring the RSRP or RSRQ of the reference signal.
  • FIG. 3 is a schematic diagram of another flow of a random access method 200 according to an embodiment of this application.
  • the step 202 specifically includes:
  • the terminal device determines whether the signal quality of the measured reference signal is greater than or equal to a preset threshold.
  • the terminal device can obtain the signal quality by measuring the reference signal sent by the access network device, and compare the signal quality with a preset threshold.
  • the preset threshold may be specifically determined by the access network device and notified to the terminal device, may also be defined in the standard, or may be determined by the terminal device itself, which is not specifically limited here.
  • the terminal device executes step 2022; otherwise, the terminal device executes step 2024.
  • the terminal device determines whether the random access type corresponding to the identifier of the first network slice service is 2-step random access.
  • the terminal device may determine whether the random access type corresponding to the first network slicing service is 2-step random access according to the second mapping relationship between the network slicing service and the random access type.
  • the second mapping relationship can be carried in a system message, an RRC message, or a PDCCH message; the terminal device obtains the relationship between the network slicing service and the random access type by receiving the system message, the RRC message, or the PDCCH message sent by the access network device The second mapping relationship.
  • the terminal device determines the random access type corresponding to the network slicing service by itself, the terminal device can determine whether the random access type corresponding to the first network slicing service is 2-step random access according to the type of the network slicing service.
  • the terminal device Since the 2-step random access has certain requirements on the signal quality of the terminal device, when the signal quality measured by the terminal device is greater than or equal to the preset threshold, the terminal device will more easily initiate the 2-step random access to succeed. Therefore, when it is determined that the measured signal quality is greater than or equal to the preset threshold, the terminal device may further determine whether the first network slicing service corresponds to 2-step random access.
  • the terminal device determines that the random access type corresponding to the first network slicing service is 2-step random access, the terminal device executes step 2023; otherwise, the terminal device executes step 2024.
  • the terminal device determines that the 2-step random access is the random access type to be initiated corresponding to the first network slicing service.
  • the random access type corresponding to the first network slicing service is 2-step random access
  • the terminal device determines that the 2-step random access is the random access type to be initiated corresponding to the first network slicing service, then in the above step 203, the terminal device specifically initiates the 2-step random access based on the first random time-frequency resource. Step random access.
  • the terminal device determines that the 4-step random access is the random access type to be initiated corresponding to the first network slicing service.
  • the signal quality is less than the preset threshold, or the random access type corresponding to the first network slicing service is 4-step random access
  • the terminal device determines that the 4-step random access is the random access type to be initiated corresponding to the first network slicing service, then in the above step 203, the terminal device specifically initiates the 4-step random access based on the first random time-frequency resource. Step random access.
  • the terminal device when the signal quality measured by the terminal device is less than the preset threshold, because the first network slicing service does not meet the conditions for initiating 2-step random access, it does not matter the random access type corresponding to the first network slicing service. Whether it is a 2-step random access, the terminal device initiates a 4-step random access. In addition, when the signal quality measured by the terminal device is greater than or equal to the preset threshold, but the random access type corresponding to the first network slicing service is 4-step random access, the terminal device also initiates 4-step random access. Save 2-step random access time-frequency resources, and reserve the limited 2-step random access time-frequency resources for other terminal devices that require fast access, thereby improving network experience.
  • the terminal device determines its corresponding random access type according to the measured signal quality and the network slicing service to be initiated.
  • the signal quality is greater than or equal to the preset threshold and the random access type corresponding to the network slicing service is In 2-step random access, 2-step random access is initiated first; otherwise, 4-step random access is initiated first.
  • the random access type used when the network slicing service is initiated is further determined, which can effectively avoid the occurrence of access congestion, that is, the signal quality.
  • Better terminal equipment can preferentially initiate network slicing services with high timeliness requirements with random access types with less interactive signaling, and reserve the limited 2-step random access time-frequency resources to other terminals with fast access requirements Equipment to enhance the network experience.
  • the above is an introduction to the random access method from the perspective of a terminal device, and the following describes the random access method in detail from the perspective of each communication protocol layer in the terminal device.
  • the random access method 400 includes:
  • the non-access stratum (NAS) of the terminal device sends an identifier of the first network slicing service to the RRC layer to instruct the RRC layer to initiate the first network slicing service.
  • NAS non-access stratum
  • the NAS may transfer the identifier of the first network slicing service to the RRC layer in the terminal device, indicating that the first network slicing service will be initiated in the current cell.
  • the NAS may determine the identity of the first network slicing service according to the protocol data unit (protocol data unit session, PDU) session to be initiated.
  • PDU protocol data unit session
  • one PDU session may correspond to one or more network slicing services, that is, the PDU session may be initiated by selecting one of the network slicing services from the corresponding one or more network slicing services.
  • a network slice remapping (slice remapping) list is used to indicate the correspondence between a certain PDU session and one or more network slice services.
  • the message structure used to represent the network slice remapping list may be as shown in Table 3.
  • the network slice remapping list can be carried in the RRC message sent by the access network device to the terminal device, so that the terminal device can obtain the network slice remapping list; the network slice remapping list can also be carried in the terminal device and sent to the access network.
  • the access network device obtains the network slice remapping list.
  • the RRC layer sends the identifier of the first network slice service to the MAC layer to instruct the MAC layer to determine the corresponding random access time-frequency resource according to the identifier of the first network slice service. 403.
  • the MAC layer determines the first random access time-frequency resource corresponding to the first network slicing service.
  • step 403 is similar to step 201 described above, for details, please refer to step 201, which will not be repeated here.
  • the terminal device can remap the network slice according to the PDU session to be initiated In the list, reselect a network slicing service supported by the current cell as the first network slicing service to be initiated to ensure the normal initiation of the network slicing service.
  • the operation of the terminal device to select a new network slice service in the network slice remapping list can be performed on the NAS, or on the RRC layer or the MAC layer, which is not specifically limited in this embodiment.
  • the MAC layer determines the random access type corresponding to the first network slicing service.
  • step 404 is similar to step 202 described above, and for details, reference may be made to step 202, which will not be repeated here.
  • the MAC layer initiates random access.
  • step 405 is similar to step 203 described above, for details, please refer to step 203, which will not be repeated here.
  • the terminal device sends a PDU session establishment request.
  • the NAS layer of the terminal device may send a PDU session establishment request to the core network device through the AS layer and the access network device.
  • the PDU session establishment request reaches the core network device through the AS layer of the terminal device and the access network device.
  • the access network device After receiving the PDU session request, the access network device sends the PDU session establishment request to the core network device.
  • the PDU session establishment request may include, but is not limited to, information such as the PDU session identifier and the identifier of the first network slice service.
  • the core network device sends a PDU session establishment request response message to the access network device.
  • the core network device may send a PDU session establishment request response message to the access network device to indicate that the core network device has accepted the PDU session establishment request sent by the terminal device.
  • the access network device sends a PDU session establishment request acceptance message to the terminal device.
  • the PDU session establishment request acceptance message may carry a network slicing service identifier to indicate the network slicing service that the terminal device can initiate.
  • the network slice service identifier carried in the PDU session establishment request accept message may be the identifier of the first network slice service, which means that the terminal device can initiate the first network slice service; the PDU session establishment request accept message carries The network slicing service identifier may also be the identifier of other network slicing services, indicating that the terminal device can initiate other network slicing services.
  • the access network device may also send a PDCCH message to the terminal device, and the downlink control information (DCI) of the PDCCH message carries the network slicing service identifier.
  • DCI downlink control information
  • the terminal device sends data of the network slicing service to the access network device.
  • the terminal device After the terminal device receives the PDU session establishment request acceptance message, it can be considered that the PDU session has been established, and the terminal device can send data of the network slicing service to the access network device, and the data of the network slicing service can also carry the first network slice.
  • the identity of the business is the identity of the business.
  • the above is an introduction to the random access method from the perspective of the sublayer in the terminal device.
  • the following will describe in detail how the sublayer in the terminal device determines the first random access time-frequency resource corresponding to the first network slice service.
  • the random access method 500 includes:
  • the NAS of the terminal device sends an identifier of the network slicing service to be initiated to the RRC layer.
  • the identifier of the network slicing service may specifically be S-NSSAI, and one S-NSSAI may be used to indicate one network slicing service.
  • the NAS can send one or more S-NSSAIs to the RRC layer.
  • the NAS may also send the RSA ID to the RRC layer.
  • there is a one-to-many mapping relationship between RSA ID and S-NSSAI that is, one RSA ID corresponds to one or more S-NSSAIs at the same time, and one or more S-NSSAIs corresponding to it can be determined according to the RSA ID.
  • the mapping relationship between RSA ID and S-NSSAI can be sent by the access network device to the terminal device in advance through a system message or RRC message, so that the terminal device can obtain the relationship between the RSA ID and S-NSSAI. Mapping relations.
  • the access stratum (AS) of the terminal device determines the random access resources corresponding to the network slicing service, where the AS includes the RRC layer, the radio link control (radio link control, RLC) layer, the MAC layer, and the physical The (physical, PHY) layer, the packet data convergence protocol (PDCP) layer, and the service data adaptation protocol (SDAP) layer.
  • AS includes the RRC layer, the radio link control (radio link control, RLC) layer, the MAC layer, and the physical The (physical, PHY) layer, the packet data convergence protocol (PDCP) layer, and the service data adaptation protocol (SDAP) layer.
  • the AS determines a network slicing service to be initiated, and then determines the random access resource corresponding to the network slicing service.
  • the method for the AS to determine the random access resource corresponding to the network slicing service includes but is not limited to the following five methods:
  • the RRC layer of the AS determines the corresponding random access time-frequency resource according to S-NSSAI, and the RRC layer sends the PRACH Mask Index corresponding to the determined random access time-frequency resource to the MAC layer so that the MAC layer knows that it has been determined Random access time-frequency resources. That is to say, the process of determining the random access time-frequency resource can be performed by the RRC layer, and the MAC layer only needs to know the final random access time-frequency resource, and it does not need to know the specific S-NSSAI. Specifically, the RRC layer may determine the corresponding random access time-frequency resources according to the mapping relationship between S-NSSAI and S-NSSAI and random access time-frequency resources. For details, please refer to the above description, which will not be repeated here. Go into details.
  • the RRC layer of the AS sends the S-NSSAI to the MAC layer, and the MAC layer determines the corresponding random access time-frequency resource according to the S-NSSAI, that is, the process of determining the random access time-frequency resource is performed by the MAC layer.
  • the RRC layer of the AS determines the corresponding RSA ID according to the S-NSSAI, and then determines the corresponding random access time-frequency resource according to the RSA ID, and finally the RRC layer sends the PRACH Mask Index corresponding to the random access time-frequency resource to the MAC layer. So that the MAC layer knows the determined random access time-frequency resources. Among them, the mapping relationship between the RSA ID and the random access time-frequency resource may be issued by the access network device to the terminal device in advance through a system message or an RRC message.
  • the RRC layer of the AS sends the S-NSSAI to the MAC layer.
  • the MAC layer determines the corresponding RSA ID according to the S-NSSAI, and then determines the corresponding random access time-frequency resource according to the RSA ID.
  • the RRC layer of the AS determines the corresponding RSA ID according to the S-NSSAI, and then sends the RSA ID to the MAC layer.
  • the MAC layer determines the corresponding random access time-frequency resource according to the RSA ID.
  • the method for the AS to determine the random access resource corresponding to the network slicing service includes but is not limited to the following four methods:
  • the RRC layer of the AS determines the corresponding S-NSSAI according to the RSA ID, then determines the corresponding random access time-frequency resource according to the S-NSSAI, and finally sends the PRACH Mask Index corresponding to the random access time-frequency resource to the MAC layer.
  • the RRC layer of the AS determines the corresponding S-NSSAI according to the RSA ID, and sends the S-NSSAI to the MAC layer.
  • the MAC layer determines the corresponding random access time-frequency resource according to the S-NSSAI.
  • the RRC layer of the AS determines the corresponding random access time-frequency resource according to the RSA ID, and sends the PRACH Mask Index corresponding to the random access time-frequency resource to the MAC layer.
  • the RRC layer of the AS sends the RSA ID to the MAC layer, and the MAC layer determines the corresponding random access time-frequency resource according to the RSA ID.
  • the MAC layer of the terminal device initiates random access.
  • the MAC layer can initiate random access to the access network device based on the determined random access time-frequency resource.
  • the specific initiation process refer to the above description, and will not be repeated here.
  • the MAC layer of the terminal device updates the network slicing service initiated.
  • the random access initiated by the terminal device may fail.
  • the terminal device can determine whether the random access initiated by the terminal device fails in a variety of ways. For example, in the case that the terminal device initiates 4-step random access, if the terminal device receives MSG4 sent by the access network device, and the MSG4 does not have its own identity, the terminal device can determine that the random access has failed; or After the terminal device sends MSG3 to the access network device, if it does not receive the MSG4 reply from the access device, the terminal device can also determine that the random access has failed.
  • the MAC layer can re-initiate a new network slicing service, that is, update the initiated network slicing service.
  • the ways of network slicing services initiated by the MAC layer update include but are not limited to the following multiple ways:
  • the MAC layer removes the identities of the network slicing services that have tried to initiate but failed to initiate from the identities of the multiple network slicing services sent by the NAS layer, and then selects a new network slicing service from the remaining network slicing services. Initiated.
  • the way for the MAC layer to reselect the network slice service among the remaining network slice services may be: the MAC layer selects according to the network slice remapping list, or the MAC layer according to the instructions in the system message issued by the access network device To choose.
  • the MAC layer sends a request for reselecting the network slicing service to the RRC layer, so that the RRC layer reselects a new network slicing service.
  • the MAC layer can receive the identifier of the network slicing service sent by the RRC layer, and the identifier of the network slicing service is the identifier of the newly selected network slicing service.
  • the MAC layer of the terminal device initiates random access according to the updated identifier of the network slicing service.
  • the above is the description of the process in which the terminal device initiates random access based on the determined network slicing service.
  • the following will describe in detail how the terminal device determines the first network slice to be initiated when the terminal device has multiple network slicing services to be initiated.
  • the process of business is the description of the process in which the terminal device initiates random access based on the determined network slicing service. The following will describe in detail how the terminal device determines the first network slice to be initiated when the terminal device has multiple network slicing services to be initiated. The process of business.
  • the random access method 600 includes:
  • the NAS of the terminal device sends identifiers of multiple network slicing services to the RRC layer.
  • the NAS may send the identifiers of the network slicing services to be initiated to the RRC layer, and the RRC layer determines the network slicing service to be initiated first.
  • the RRC layer of the terminal device determines the network slicing service initiated first.
  • the RRC layer may determine the network slicing service initiated first among the identities of the multiple network slicing services.
  • the manner in which the RRC layer determines the network slicing service initiated first may include but is not limited to the following two manners:
  • the RRC layer determines the initiation order of the network slicing service according to the priority of the network slicing service, and then determines the network slicing service to be initiated first. For example, the RRC layer can sort multiple network slicing services from high to low based on the priority of the network slicing service; that is, the higher the priority of the network slicing service, the higher the initiation order of the network slicing service, and the one with the highest priority
  • the network slicing service is the first network slicing service initiated.
  • the access network device may carry priority information of the network slicing service in the system message, PDCCH message or RRC message, and the terminal device can obtain the priority of the network slicing service by reading the system message, PDCCH message or RRC message.
  • the RRC layer randomly selects a network slicing service initiated first among multiple network slicing services with medium probability.
  • the RRC layer of the terminal device sends the identifier of the network slicing service to the MAC layer.
  • the RRC layer After the RRC layer determines the network slicing service initiated first, the RRC layer can send the identifier of the network slicing service initiated first to the MAC layer, so that the MAC layer determines the random access time-frequency resource of the network slicing service and initiates random access .
  • the above-mentioned embodiment corresponding to FIG. 6 describes the process in which the RRC layer determines the network slicing service initiated first, and the process of determining the network slicing service initiated first by the MAC layer will be described below.
  • the random access method 700 includes:
  • the NAS of the terminal device sends identifiers of multiple network slicing services to the RRC layer.
  • the NAS may send the identifiers of the network slicing services to be initiated to the RRC layer, and the RRC layer determines the network slicing service to be initiated first.
  • the RRC layer of the terminal device sends identifiers of multiple network slicing services to the MAC layer.
  • the RRC layer can send the identifiers of multiple network slicing services received to the MAC layer, and the MAC layer determines the network that was initiated first. Slice business.
  • the MAC layer of the terminal device determines the network slicing service initiated first.
  • the MAC layer may determine the network slicing service initiated first among the identifiers of the multiple network slicing services.
  • the manner in which the MAC layer determines the network slicing service initiated first may include but is not limited to the following four methods:
  • the first point in time is the point in time when the MAC layer receives the instruction to initiate random access, that is, the first point in time may specifically be that the MAC layer receives the identifiers of multiple network slice services sent by the RRC layer and instructs the MAC layer to initiate The time point of random access.
  • the MAC layer determines the random time-frequency resource that can be used to initiate random access first, and then determines the network slicing service corresponding to the random time-frequency resource, thereby determining the most The network slicing service initiated first.
  • the network slicing service to be initiated includes network slicing service 1 and network slicing service 2.
  • network slicing service 1 has n random access time-frequency resources, and network slicing service 2 has m Random access to time-frequency resources, if n>m, select network slicing service 1 as the network slicing service initiated first.
  • the size of the preset time period can be set according to actual conditions, for example, it can be 10ms, 20ms, 50ms, etc., which is not specifically limited here.
  • the MAC layer randomly selects a network slicing service initiated first among multiple network slicing services with medium probability.
  • the above is the description of the process in which the terminal device initiates random access based on multiple network slicing services.
  • the following will describe in detail how the terminal device initiates the network slicing service when the terminal device has the network slicing service to be initiated and the default slicing service.
  • network slicing is usually a logical network configured with specific network functions, and network slicing services are services executed by the network slicing.
  • a terminal device carries a network slice identifier when initiating a service, it can be considered that the terminal device initiates a network slice service, and the network slice corresponding to the network slice identifier executes the network slice service initiated by the terminal device.
  • the terminal device When the terminal device does not carry the network slice identifier when initiating the service, it can be considered that the terminal device initiates the default slice service, and the default slice service initiated by the terminal device can be executed by the default slice assigned to the terminal device by the core network device in advance. .
  • the random access method 800 includes:
  • the NAS of the terminal device sends the identifier of the network slicing service and the identifier of the default slicing service to the RRC layer.
  • the NAS sends the identifier of the network slicing service to be initiated and the identifier of the default slicing service to the RRC layer.
  • the RRC layer of the terminal device sends the identifier of the network slicing service and the identifier of the default slicing service to the MAC layer.
  • the MAC layer determines the initiated service, so the RRC layer sends the identifier of the network slicing service and the identifier of the default slicing service to the MAC layer. It is understandable that the RRC layer may also determine the service to be initiated. In this case, the RRC layer only needs to send the identifier of the service to be initiated to the MAC layer, which is not specifically limited in this embodiment.
  • the MAC layer of the terminal device initiates random access corresponding to the network slicing service.
  • the MAC layer may decide to initiate the network slicing service first, that is, the MAC layer selects and initiates one of the network slicing services from one or more network slicing services.
  • the MAC layer of the terminal device counts the number of random accesses of the network slicing service.
  • the MAC layer can count the number of times the network slicing service initiates the random access.
  • a counter can be configured at the MAC layer, and each time the MAC layer initiates random access of the network slicing service, the value of the counter is increased by 1, so as to realize the statistics of the number of times that the network slicing service initiates random access.
  • FIG. 9 is a schematic diagram of triggering a counter action provided in an embodiment of this application.
  • the situations that trigger the counter action specifically include but are not limited to the following four situations:
  • the terminal device when the terminal device initiates 2-step random access, the terminal device sends MSGA corresponding to a network slicing service to the access network device, and the terminal device is in the window period corresponding to MSGA If no response (ie MSGB) from the access network device is received in the (MSGB window), the value of the trigger counter is increased by 1, and the terminal device needs to resend the MSGA of the network slicing service.
  • the terminal device when the terminal device initiates 2-step random access, the terminal device sends the MSGA corresponding to a network slicing service to the access network device, and receives the message sent by the access network device.
  • Random access fallback response (fallback random access response, fallback RAR)
  • the terminal equipment continues to send MSG3 to the access network equipment, and the terminal equipment is in the random access contention resolution timer (random access contention resolution timer, ra-CR)
  • the response of the access network device ie MSG4 is not received within the time set by Timer
  • the value of the trigger counter is increased by 1, and the terminal device needs to resend the MSGA of the network slicing service.
  • the fallback RAR is used to instruct the terminal device to resend MSG3 separately.
  • the terminal device when the terminal device initiates 4-step random access, the terminal device sends MSG1 corresponding to a network slicing service to the access network device, and the terminal device is in the random access response window If the response of the access network device (ie MSG2) is not received in the (random access channel access response window, RAR window), the value of the trigger counter is increased by 1, and the terminal device needs to resend the preamble of the network slicing service.
  • the RAR window is a time window for monitoring the resource issued by the access network device, and the terminal device may send MSG3 to the access network device based on the resource issued by the access network device.
  • the terminal device when the terminal device initiates 4-step random access, the terminal device sends MSG1 corresponding to a network slicing service to the access network device, and after the terminal device receives the RAR, the terminal device The device continues to send MSG3 to the access network device, and the terminal device does not receive the response from the access network device (ie MSG4) within the time set by ra-CR Timer, the trigger counter value is increased by 1, and the terminal device needs to be restarted Send the preamble of the network slicing service.
  • the number of random access initiated by the network slicing service reaches the preset number of times, for example, the number of random access initiated by the network slicing service reaches 5 times, the random access of the network slicing service is stopped, and the default slicing service is initiated Random access.
  • the number of random accesses of the network slicing service includes the number of failures of random access initiated by the network slicing service. For example, assuming that the preset number of times is 5, when the random access corresponding to the network slicing service fails to be initiated for 5 consecutive times, it can be considered that the number of random accesses of the network slicing service has reached the preset number of times. In this way, by counting the number of random access corresponding to the network slicing service, it is possible to ensure the possibility of initiating random access by the default slicing service on the premise that the random access of the network slicing service is initiated first.
  • the preset number of times may be set or adjusted by the access network device according to actual conditions, for example, it may be set to 3 times or 5 times, and the specific value of the preset times is not limited in this embodiment.
  • the terminal device can obtain the random access configuration corresponding to the network slicing service and the random access configuration corresponding to the default slicing service.
  • the terminal device can obtain the random access configuration corresponding to the network slicing service and the random access configuration corresponding to the default slicing service by receiving the system message, the RRC message or the PDCCH message sent by the access network device.
  • the random access configuration corresponding to the network slicing service and the random access configuration corresponding to the default slicing service may include but are not limited to:
  • scaling_factor_BI Back-off scaling factor
  • the fallback scaling factor refers to the event scaling factor when a fallback situation occurs, and the value range of the fallback scaling factor is 0 to 1.
  • a lower value of the fallback scaling factor can be configured for the network slicing service, and a higher value of the fallback scaling factor can be configured for the default slicing service.
  • the size of the RAR window may be different from the size of the RAR window corresponding to the default slicing service.
  • the size of the MSGB window may be different from the size of the MSGB window corresponding to the default slicing service.
  • the size of Ra-CR Timer may be different from the size of the Ra-CR Timer corresponding to the default slicing service.
  • the terminal device 1000 includes: a processing unit 1001 and a transceiver unit 1002; the processing unit 1001 is configured to determine a first random access time-frequency resource corresponding to a first network slicing service, and the first network The slicing service is a network slicing service to be initiated; the processing unit 1001 is further configured to determine the random access type corresponding to the first network slicing service; the transceiving unit 1002 is configured to be based on the first random access The time-frequency resource and the random access type initiate random access.
  • the processing unit 1001 is further configured to determine the first random access time frequency corresponding to the first network slice service according to the identifier of the first network slice service and the first mapping relationship.
  • Resources, the first mapping relationship is a mapping relationship between a network slicing service identifier and a random access time-frequency resource.
  • the transceiving unit 1002 is further configured to receive a first message, where the first message includes the first mapping relationship.
  • the first message includes a physical random access channel mask index
  • the physical random access channel mask index is used to indicate the first mapping relationship
  • the processing unit 1001 is further configured to: obtain the signal quality of the reference signal; when the signal quality is greater than or equal to a preset threshold, and the first network slice service is mapped in the second
  • the relationship corresponds to 2-step random access
  • the signal quality is greater than or equal to the preset threshold, or
  • the first network slicing service corresponds to 4-step random access in the second mapping relationship
  • the second The mapping relationship is the mapping relationship between the network slicing service and the random access type.
  • the transceiving unit 1002 is further configured to receive a second message, and the second message includes the second mapping relationship.
  • the processing unit 1001 is further configured to: if the terminal device has multiple network slicing services to be initiated, select the priority of the network slicing services in the multiple network slicing services to be initiated. It is determined in the network slicing service to initiate the first network slicing service, where the first network slicing service is the network slicing service with the highest priority among the plurality of network slicing services to be initiated.
  • the processing unit 1001 is further configured to: if the terminal device has multiple network slicing services to be initiated, determine the first network corresponding to the third random access time-frequency resource
  • the slicing service is an initiated network slicing service, wherein the third random access time-frequency resource is a random access time-frequency resource located after the first time point and closest to the first time point, and the first time point is The time point at which the MAC entity of the terminal device obtains the instruction to initiate random access.
  • the processing unit 1001 is further configured to: if the terminal device has multiple network slicing services to be initiated, according to the random access corresponding to the network slicing service within a preset time period.
  • the number of incoming time-frequency resources is determined to initiate the first network slicing service, where the first network slicing service is the random access corresponding to the plurality of network slicing services to be initiated within a preset time period.
  • the network slicing service with the largest number of incoming time-frequency resources.
  • the transceiver unit 1002 is further configured to: receive a third message, where the third message includes first configuration information and second configuration information, and the first configuration information is used to indicate The random access configuration corresponding to the network slicing service, and the second configuration information is used to indicate the random access configuration corresponding to the default slicing service.
  • the processing unit 1001 is further configured to, if there are both a network slicing service to be initiated and a default slicing service, count the number of random accesses to the network slicing service; the transceiver unit 1002 also uses Therefore, if the number of random accesses of the network slicing service reaches the preset number of times, the random access of the network slicing service is stopped, and the random access of the default slicing service is initiated.
  • the processing unit 1001 is further configured to: if the first random access time-frequency resource includes random access time-frequency resources under different random access types, perform according to the The random access type determines a second random access time-frequency resource in the first random access time-frequency resource, and the second random access time-frequency resource is a random access time-frequency resource corresponding to the random access type Resources; the transceiver unit 1002 is further configured to: initiate random access based on the second random access time-frequency resource and the random access type corresponding to the first network slicing service.
  • FIG. 11 is a schematic structural diagram of a terminal device 1100 according to an embodiment of the application.
  • the terminal device 1100 may be applicable to the system shown in FIG. 1 to perform the functions of the terminal device in the foregoing method embodiment.
  • FIG. 11 only shows the main components of the terminal device.
  • the terminal device 1100 includes a processor, a memory, a control circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, and to control the entire terminal device, execute the software program, and process the data of the software program, for example, to support the terminal device to perform the actions described in the above method embodiments, such as Receive the use threshold of the wake-up signal, and determine whether to monitor the wake-up signal according to the use threshold and the eDRX cycle.
  • the memory is mainly used to store software programs and data, for example, to store the use threshold of the wake-up signal described in the above embodiments.
  • the control circuit is mainly used for the conversion of baseband signals and radio frequency signals and the processing of radio frequency signals.
  • the control circuit and the antenna together can also be called a transceiver, which is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users.
  • the processor can read the software program in the storage unit, interpret and execute the instructions of the software program, and process the data of the software program.
  • the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 11 only shows one memory and one processor. In an actual terminal device, there may be multiple processors and multiple memories.
  • the memory may also be referred to as a storage medium or a storage device, etc., which is not limited in the embodiment of the present application.
  • the processor may include a baseband processor and/or a central processing unit.
  • the baseband processor is mainly used to process communication protocols and communication data
  • the central processing unit is mainly used to control the entire terminal device. , Execute the software program, and process the data of the software program.
  • the processor in FIG. 11 can integrate the functions of the baseband processor and the central processing unit.
  • the baseband processor and the central processing unit can also be independent processors and are interconnected by technologies such as a bus.
  • the terminal device may include multiple baseband processors to adapt to different network standards, the terminal device may include multiple central processors to enhance its processing capabilities, and the various components of the terminal device may be connected through various buses.
  • the baseband processor may also be expressed as a baseband processing circuit or a baseband processing chip.
  • the central processing unit can also be expressed as a central processing circuit or a central processing chip.
  • the function of processing the communication protocol and the communication data can be built in the processor, or can be stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
  • the antenna and the control circuit with the transceiving function can be regarded as the transceiver 1101 of the terminal device 1100, for example, to support the terminal device to perform the aforementioned receiving function and sending function.
  • the processor having processing functions is regarded as the processor 1102 of the terminal device 1100.
  • the terminal device 1100 includes a transceiver 1101 and a processor 1102.
  • the transceiver may also be referred to as a transceiver, a transceiving device, and so on.
  • the device for implementing the receiving function in the transceiver 1101 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver 1101 can be regarded as the sending unit, that is, the transceiver 1101 includes a receiving unit and a sending unit,
  • the receiving unit may also be called a receiver, an input port, a receiving circuit, etc.
  • the sending unit may be called a transmitter, a transmitter, or a transmitting circuit, etc.
  • the processor 1102 may be used to execute instructions stored in the memory to control the transceiver 1101 to receive signals and/or send signals, and complete the functions of the terminal device in the foregoing method embodiment.
  • the function of the transceiver 1101 may be implemented by a transceiver circuit or a dedicated chip for transceiver.
  • one embodiment or “an embodiment” mentioned throughout the specification means that a specific feature, structure, or characteristic related to the embodiment is included in at least one embodiment of the present application. Therefore, the appearances of "in one embodiment” or “in an embodiment” in various places throughout the specification do not necessarily refer to the same embodiment. In addition, these specific features, structures or characteristics can be combined in one or more embodiments in any suitable manner. It should be understood that in the various embodiments of the present application, the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not correspond to the embodiments of the present application. The implementation process constitutes any limitation.
  • system and “network” in this article are often used interchangeably in this article.
  • the term “and/or” in this article is only an association relationship that describes associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone B these three situations.
  • the character "/" in this text generally indicates that the associated objects before and after are in an "or" relationship.
  • B corresponding to A means that B is associated with A, and B can be determined according to A.
  • determining B based on A does not mean that B is determined only based on A, and B can also be determined based on A and/or other information.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , Including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory, random access memory, magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种随机接入方法及终端设备,能够避免网络切片业务容易受到网络堵塞的影响,保证网络切片业务的正常开展。本申请方法包括:确定第一网络切片业务对应的第一随机接入时频资源,所述第一网络切片业务为待发起的网络切片业务;确定所述第一网络切片业务对应的随机接入类型;根据所述随机接入类型在所述第一随机接入时频资源中确定第二随机接入时频资源,所述第二随机接入时频资源为所述随机接入类型对应的随机接入时频资源;基于所述第二随机接入时频资源发起随机接入。

Description

一种随机接入方法及终端设备 技术领域
本申请涉及通信技术领域,尤其涉及一种随机接入方法及终端设备。
背景技术
随着移动通信技术的发展,各类新业务以及应用场景不断涌现,这些业务对网络功能、连接性能及安全性等方面的需求存在很大的差别。如果利用单一网络去承载这些业务,将很难同时满足高带宽、低时延、高可靠性等需求。然而,为每种业务单独新建网络又会带来巨大的成本。
网络功能虚拟化(network function virtualization,NFV)技术的发展,使得运营商可以为不同的业务需求构建不同的虚拟网络。网络切片就是基于通用物理基础设施,对网络进行逻辑上的定义和划分,所形成的端到端的虚拟网络。其中,每个虚拟网络具备不同的功能特点,从而动态地满足各种各样的需求和商业模式。
现有技术中,终端设备在发起网络切片业务时通常是根据测量小区发出的参考信号的信号强度来选择随机接入的类型。这样一来,在多个终端设备均测量得到相当的信号强度时,该多个终端设备会同时选择某一随机接入类型发起随机接入,容易由于随机接入资源不足而影响了终端设备的正常接入,导致一些时效性要求较高的网络切片业务受到影响。
发明内容
本申请实施例中提供了一种随机接入方法及终端设备,根据待发起的网络切片业务确定其对应的随机接入类型,使得类型不同的网络切片业务通过不同的随机接入类型进行随机接入,即时效性要求较高的网络切片业务可以优先以交互信令较少的随机接入类型进行随机接入;时效性要求不高的网络切片业务则以交互信令较少的随机接入类型进行随机接入,将有限的2步随机接入时频资源留给其他有快速接入需求的终端设备,从而提升网络体验。
本申请实施例的第一方面提供一种随机接入方法,包括:在终端设备要发起第一网络切片业务时,终端设备确定第一网络切片业务对应的第一随机接入时频资源,其中,第一网络切片业务对应的第一随机接入时频资源可以是预先定义好的;然后,终端设备确定该第一网络切片业务对应的随机接入类型,即终端设备可以基于第一网络切片业务的类型确定以何种随机接入类型发起该网络切片业务的随机接入;终端设备基于该第一随机接入时频资源以及第一网络切片业务对应的随机接入类型发起随机接入。其中,所述第一随机接入时频资源可以只包括一种随机接入类型下的随机接入时频资源,例如在第一网络切片业务对应的随机接入类型为2步随机接入时,第一随机接入时频只包括有2步随机接入时频资源。所述第一随机接入时频资源也可以包括有多种随机接入类型下的随机接入时频资源,例如在第一网络切片业务对应的随机接入类型为2步随机接入时,第一随机接入时频可以包括有2步随机接入时频资源和4步随机接入时频资源。
本申请实施例中,终端设备根据待发起的网络切片业务确定其对应的随机接入类型,例如在待发起的网络切片业务为时效性要求较高的网络切片业务时,终端设备优先选择2步随机接入类型;在待发起的网络切片业务对时效性要求不高时,终端设备选择4步随机接入类型,从而使得类型不同的网络切片业务通过不同的随机接入类型进行随机接入,即时效性要求较高的网络切片业务可以优先以交互信令较少的随机接入类型进行随机接入,以提高这些网络切片业务的随机接入速率;时效性要求不高的网络切片业务则以交互信令较少的随机接入类型进行随机接入,以节省交互信令较少的随机接入类型对应的随机接入资源,将有限的2步随机接入时频资源留给其他有快速接入需求的终端设备,从而提升网络体验。
在一种可能的实施方式中,终端设备确定第一网络切片业务对应的第一随机接入时频资源,具体包括:终端设备根据所述第一网络切片业务的标识以及第一映射关系确定所述第一网络切片业务对应的第一随机接入时频资源,所述第一映射关系为网络切片业务标识与随机接入时频资源之间的映射关系。其中,终端设备可以通过多种方式来获取所述第一映射关系。在第一映射关系中,一个网络切片业务标识可以与一个或多个随机接入时频资源标识对应。也就是说,根据第一网络切片业务的标识可以确定第一网络切片业务对应的一个或多个随机接入时频资源。
在一种可能的实施方式中,在终端设备确定第一网络切片业务对应的第一随机接入时频资源之前,该方法还包括:终端设备接收第一消息,该第一消息包括有前述第一映射关系。具体地,终端设备接收的第一消息具体可以是接入网设备广播的系统消息,即终端设备通过接收接入网设备广播的系统消息来获得第一映射关系。
在一种可能的实施方式中,该第一消息包括有物理随机接入信道掩码索引,该物理随机接入信道掩码索引用于指示所述第一映射关系。具体地,终端设备接收的第一消息具体可以是接入网设备发送的无线资源控制(radio resource control,RRC)消息、物理下行控制信道(physical downlink control channel,PDCCH)消息或者系统消息。
在一种可能的实施方式中,终端设备确定所述第一网络切片业务对应的随机接入类型,包括:所述终端设备获取参考信号的信号质量;在所述信号质量大于或等于预设阈值,且所述第一网络切片业务在第二映射关系中与2步随机接入对应的情况下,确定所述第一网络切片业务对应的随机接入类型为2步随机接入;在所述信号质量小于所述预设阈值,或者所述第一网络切片业务在第二映射关系中与4步随机接入对应的情况下,确定所述第一网络切片业务对应的随机接入类型为4步随机接入;其中,所述第二映射关系为网络切片业务与随机接入类型之间的映射关系,所述第二映射关系可以携带于第二消息中,所述终端设备通过接收第二消息来获得所述第二映射关系;所述第二消息为系统消息、RRC消息或者PDCCH消息中的一种;即终端设备可以通过接收接入网设备所发送的系统消息、RRC消息或者PDCCH消息,来获取网络切片业务与随机接入类型之间的第二映射关系。换句话说,只有在终端设备测量到的信号质量大于预设阈值且基于第二映射关系确定第一网络切片业务与2步随机接入对应的情况下,终端设备确定通过2步随机接入来发起第一网络切片业务。
其中,所述测量得到的信号质量指的是终端设备通过测量接入网设备所发送的参考信号而得到的信号质量,该信号质量可以通过参考信号接收功率(reference signal receiving power,RSRP)或者参考信号接收质量(reference signal receiving quality,RSRQ)来表示。示例性地,接入网设备所发送的参考信号可以包括解调参考信号(demodulation reference signal,DMRS)、相位追踪参考信号(phase-tracking reference signal,PTRS)或者信道状态信息参考信号(channel state information-reference signal,CSI-RS),终端设备通过测量参考信号的RSRP或者RSRQ来确定信号质量。所述预设阈值具体可以是由接入网设备确定且通知终端设备的,也可以是标准中所定义的,还可以是终端设备自行确定的,此处不做具体限定。
本申请实施例中,终端设备根据测量得到的信号质量以及待发起的网络切片业务确定其对应的随机接入类型,在信号质量大于或等于预设阈值且第一网络切片业务在第二映射关系中与2步随机接入对应时,确定网络切片业务的随机接入类型为2步随机接入;否则,则确定网络切片业务的随机接入类型为4步随机接入。这样一来,基于终端设备的信号质量以及网络切片业务的类型进一步确定了网络切片业务的随机接入类型,可以有效避免接入拥塞现象的出现,即信号质量较好的终端设备可以优先以交互信令较少的随机接入类型发起时效性要求较高的网络切片业务,将有限的2步随机接入时频资源留给其他有快速接入需求的终端设备,从而提升网络体验。
在一种可能的实施方式中,该方法还包括:若终端设备有多个待发起的网络切片业务,则根据网络切片业务的优先级在所述多个待发起的网络切片业务中确定发起所述第一网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中优先级最高的网络切片业务。例如,终端设备的RRC层可以基于网络切片业务的优先级,从高到低对多个网络切片业务进行排序;即网络切片业务的优先级越高,网络切片业务的发起顺序越靠前,优先级最高的网络切片业务则为最先发起的网络切片业务。其中,接入网设备可以在系统消息、PDCCH消息或者RRC消息中携带网络切片业务的优先级信息,终端设备通过读取系统消息、PDCCH消息或者RRC消息即可获取到网络切片业务的优先级。
在一种可能的实施方式中,该方法还包括:若终端设备有多个待发起的网络切片业务,则确定第三随机接入时频资源所对应的第一网络切片业务为发起的网络切片业务,其中,所述第三随机接入时频资源为位于第一时间点之后且距离第一时间点最近的随机接入时频资源,所述第一时间点为所述终端设备的媒体接入控制(media access control,MAC)实体获取到发起随机接入的指令的时间点。简单来说,终端设备的MAC层在接收到发起随机接入的指令之后,确定能够用于最先发起随机接入的随机时频资源,再确定该随机时频资源对应的网络切片业务,从而确定了最先发起的网络切片业务。
在一种可能的实施方式中,所述方法还包括:若终端设备有多个待发起的网络切片业务,则根据网络切片业务在预设时间段内所对应的随机接入时频资源的个数,确定发起所述第一网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中在预设时间段内所对应的随机接入时频资源的个数最多的网络切片业务。其中,预设时间段的大小可以根据实际情况进行设置,例如可以是10ms、20ms或者50ms等等,此处不做 具体限定。例如,假设待发起的网络切片业务包括有网络切片业务1和网络切片业务2;在一个10ms的无线帧内,网络切片业务1有n个随机接入时频资源,网络切片业务2有m个随机接入时频资源,如果n>m,则选择网络切片业务1为最先发起的网络切片业务。
在一种可能的实施方式中,该方法还包括:终端设备接收第三消息,所述第三消息包括有第一配置信息和第二配置信息,所述第一配置信息用于指示网络切片业务对应的随机接入配置,所述第二配置信息用于指示默认切片业务对应的随机接入配置。其中,终端设备可以通过接收接入网设备所发送的系统消息、RRC消息或者PDCCH消息来获取网络切片业务对应的随机接入配置以及默认切片业务对应的随机接入配置。具体地,当终端设备在发起业务时携带有网络切片的标识,则可以认为终端设备发起的是网络切片业务,由该网络切片的标识所对应的网络切片来执行终端设备发起的网络切片业务。当终端设备在发起业务时没有携带有网络切片的标识,则可以认为终端设备发起的是默认切片业务,可以由核心网设备预先给终端设备所分配的默认切片来执行终端设备发起的默认切片业务。
在一种可能的实施方式中,该方法还包括:若同时存在有待发起的网络切片业务以及默认切片业务,则统计网络切片业务随机接入的次数;若所述网络切片业务随机接入的次数达到预设次数,则停止所述网络切片业务的随机接入,以及发起所述默认切片业务的随机接入。这样一来,通过统计网络切片业务对应的随机接入的次数,可以在优先发起网络切片业务的随机接入的前提下,保证默认切片业务发起随机接入的可能性。
在一种可能的实施方式中,该方法还包括:若所述第一随机接入时频资源包括有不同的随机接入类型下的随机接入时频资源,则所述终端设备根据所述随机接入类型在所述第一随机接入时频资源中确定第二随机接入时频资源,所述第二随机接入时频资源为所述随机接入类型对应的随机接入时频资源;所述终端设备基于所述第一随机接入时频资源以及所述第一网络切片业务对应的随机接入类型发起随机接入,包括:所述终端设备基于所述第二随机接入时频资源以及所述第一网络切片业务对应的随机接入类型发起随机接入。也就是说,在第一随机接入时频资源包括有多种随机接入类型下的随机接入时频资源的情况下,终端设备可以根据所述随机接入类型在所述第一随机接入时频资源中确定第二随机接入时频资源。具体地,终端设备所确定的第一随机接入时频资源中包括有多个随机接入时频资源,该多个随机接入时频资源中包括有2步随机接入对应的时频资源以及4步随机接入对应的时频资源。由于终端设备已经确定了随机接入类型,因此终端设备可以在第一随机接入时频资源中确定与该随机接入类型对应的随机接入时频资源(即第二随机接入时频资源)作为候选随机接入时频资源,以用于发起随机接入。例如,第一随机接入时频资源包括有随机接入时频资源1、随机接入时频资源2、随机接入时频资源3以及随机接入时频资源4,其中,随机接入时频资源1和随机接入时频资源2为2步随机接入对应的时频资源,随机接入时频资源3以及随机接入时频资源4为4步随机接入对应的时频资源。在终端设备确定了随机接入类型为2步随机接入的情况下,终端设备可以进一步确定随机接入时频资源1和随机接入时频资源2为在发起随机接入时可用的候选时频资源。
本实施例中,在终端设备进一步确定的第二随机接入时频资源只包括有一个随机接入时频资源的情况下,终端设备可以使用该第二随机接入时频资源发起随机接入;在第二随 机接入时频资源包括有多个随机接入时频资源的情况下,终端设备可以在所述第二随机接入时频资源中随机选择一个随机接入时频资源,然后基于所选择的随机接入时频资源发起随机接入,从而和接入网设备建立连接。
本申请实施例第二方面提供一种终端设备,包括:处理单元和收发单元;所述处理单元,用于确定第一网络切片业务对应的第一随机接入时频资源,所述第一网络切片业务为待发起的网络切片业务;所述处理单元,还用于确定所述第一网络切片业务对应的随机接入类型;所述收发单元,用于基于所述第一随机接入时频资源以及所述随机接入类型发起随机接入。
在一种可能的实施方式中,所述处理单元,还用于根据所述第一网络切片业务的标识以及第一映射关系确定所述第一网络切片业务对应的第一随机接入时频资源,所述第一映射关系为网络切片业务与随机接入时频资源之间的映射关系。
在一种可能的实施方式中,所述收发单元,还用于接收第一消息,所述第一消息包括有所述第一映射关系。
在一种可能的实施方式中,所述第一消息包括有物理随机接入信道掩码索引,所述物理随机接入信道掩码索引用于指示所述第一映射关系。
在一种可能的实施方式中,所述处理单元,还用于:
获取参考信号的信号质量;
在所述信号质量大于或等于预设阈值,且所述第一网络切片业务在第二映射关系中与2步随机接入对应的情况下,确定所述第一网络切片业务对应的随机接入类型为2步随机接入;
在所述信号质量小于所述预设阈值,或者所述第一网络切片业务在第二映射关系中与4步随机接入对应的情况下,确定所述第一网络切片业务对应的随机接入类型为4步随机接入;
其中,所述第二映射关系为网络切片业务与随机接入类型之间的映射关系。
在一种可能的实施方式中,所述收发单元,还用于接收第二消息,所述第二消息包括有所述第二映射关系。
在一种可能的实施方式中,所述处理单元,还用于:
若所述终端设备有多个待发起的网络切片业务,则根据网络切片业务的优先级在所述多个待发起的网络切片业务中确定发起所述第一网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中优先级最高的网络切片业务。
在一种可能的实施方式中,所述处理单元,还用于:
若所述终端设备有多个待发起的网络切片业务,则确定第三随机接入时频资源所对应的第一网络切片业务为发起的网络切片业务,其中,所述第三随机接入时频资源为位于第一时间点之后且距离第一时间点最近的随机接入时频资源,所述第一时间点为所述终端设备的MAC实体获取到发起随机接入的指令的时间点。
在一种可能的实施方式中,所述处理单元,还用于:
若所述终端设备有多个待发起的网络切片业务,则根据网络切片业务在预设时间段内 所对应的随机接入时频资源的个数,确定发起所述第一网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中在预设时间段内所对应的随机接入时频资源的个数最多的网络切片业务。
在一种可能的实施方式中,所述收发单元,还用于:
接收第三消息,所述第三消息包括有第一配置信息和第二配置信息,所述第一配置信息用于指示网络切片业务对应的随机接入配置,所述第二配置信息用于指示默认切片业务对应的随机接入配置。
在一种可能的实施方式中,所述处理单元还用于,若同时存在有待发起的网络切片业务以及默认切片业务,则统计网络切片业务随机接入的次数;
所述收发单元还用于,若所述网络切片业务随机接入的次数达到预设次数,则停止所述网络切片业务的随机接入,以及发起所述默认切片业务的随机接入。
在一种可能的实施方式中,所述处理单元还用于:若所述第一随机接入时频资源包括有不同的随机接入类型下的随机接入时频资源,则根据所述随机接入类型在所述第一随机接入时频资源中确定第二随机接入时频资源,所述第二随机接入时频资源为所述随机接入类型对应的随机接入时频资源;所述收发单元还用于:基于所述第二随机接入时频资源以及所述第一网络切片业务对应的随机接入类型发起随机接入。
本申请实施例第三方面提供一种装置。本申请实施例提供的装置具有实现上述方法方面中终端设备行为的功能,其包括用于执行上述方法方面所描述的步骤或功能相对应的部件(means)。所述步骤或功能可以通过软件实现,或硬件(如电路)实现,或者通过硬件和软件结合来实现。
在一种可能的设计中,上述装置包括一个或多个处理器和收发器。所述一个或多个处理器被配置为支持所述装置执行上述方法中终端设备相应的功能。所述收发器用于支持所述装置与其他设备通信,实现接收和/或发送功能。
可选的,所述装置还可以包括一个或多个存储器,所述存储器用于与处理器耦合,其保存装置必要的程序指令和/或数据。所述一个或多个存储器可以和处理器集成在一起,也可以与处理器分离设置。本申请并不限定。
所述装置可以为智能终端或者可穿戴设备等,所述收发器可以是收发器,或收发电路。可选的,所述收发器也可以为输入/输出电路或者接口。
所述装置还可以为通信芯片。所述收发器可以为通信芯片的输入/输出电路或者接口。
另一个可能的设计中,上述装置,包括收发器、处理器和存储器。该处理器用于控制收发器或输入/输出电路收发信号,该存储器用于存储计算机程序,该处理器用于运行该存储器中的计算机程序,使得该装置执行第一方面或第一方面中任一种可能实现方式中终端设备完成的方法。
在一种可能的设计中,上述装置包括一个或多个处理器和收发器。所述一个或多个处理器被配置为支持所述装置执行上述方法中网络设备相应的功能。所述收发器用于支持所述装置与其他设备通信,实现接收和/或发送功能。
可选的,所述装置还可以包括一个或多个存储器,所述存储器用于与处理器耦合,其 保存网络设备必要的程序指令和/或数据。所述一个或多个存储器可以和处理器集成在一起,也可以与处理器分离设置。本申请并不限定。
本申请实施例第四方面提供一种计算机可读存储介质,用于存储计算机程序,该计算机程序包括用于执行第一方面中任一种可能实现方式中的方法的指令。
本申请实施例第五方面提供一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行上述第一方面中任一种可能实现方式中的方法。
从以上技术方案可以看出,本申请具有以下优点:
本申请实施例中,终端设备根据待发起的网络切片业务确定其对应的随机接入类型,例如在待发起的网络切片业务为时效性要求较高的网络切片业务时,终端设备优先选择2步随机接入类型;在待发起的网络切片业务对时效性要求不高时,终端设备选择4步随机接入类型,从而使得类型不同的网络切片业务通过不同的随机接入类型进行随机接入,即时效性要求较高的网络切片业务可以优先以交互信令较少的随机接入类型进行随机接入,以提高这些网络切片业务的随机接入速率;时效性要求不高的网络切片业务则以交互信令较少的随机接入类型进行随机接入,以节省交互信令较少的随机接入类型对应的随机接入资源,将有限的2步随机接入时频资源留给其他有快速接入需求的终端设备,从而提升网络体验。
附图说明
图1为本申请实施例提供的一种应用场景的示意图;
图2为本申请实施例提供的一种随机接入方法200的流程示意图;
图3为本申请实施例提供的一种随机接入方法200的另一流程示意图;
图4为本申请实施例提供的一种随机接入方法400的流程示意图;
图5为本申请实施例提供的一种随机接入方法500的流程示意图;
图6为本申请实施例提供的一种随机接入方法600的流程示意图;
图7为本申请实施例提供的一种随机接入方法700的流程示意图;
图8为本申请实施例提供的一种随机接入方法800的流程示意图;
图9为本申请实施例中提供的触发计数器动作的示意图;
图10为本申请实施例提供的一种终端设备1000的结构示意图;
图11为本申请实施例提供的一种终端设备1100的结构示意图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,下面结合附图,对本申请的实施例进行描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。本领域普通技术人员可知,随着新应用场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别 类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或模块的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或模块,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或模块。在本申请中出现的对步骤进行的命名或者编号,并不意味着必须按照命名或者编号所指示的时间/逻辑先后顺序执行方法流程中的步骤,已经命名或者编号的流程步骤可以根据要实现的技术目的变更执行次序,只要能达到相同或者相类似的技术效果即可。本申请中所出现的单元的划分,是一种逻辑上的划分,实际应用中实现时可以有另外的划分方式,例如多个单元可以结合成或集成在另一个系统中,或一些特征可以忽略,或不执行,另外,所显示的或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元之间的间接耦合或通信连接可以是电性或其他类似的形式,本申请中均不作限定。并且,作为分离部件说明的单元或子单元可以是也可以不是物理上的分离,可以是也可以不是物理单元,或者可以分布到多个电路单元中,可以根据实际的需要选择其中的部分或全部单元来实现本申请方案的目的。
终端设备在发起业务时,终端设备通常需要选择随机接入的类型,然后基于所选择的随机接入类型发起随机接入。一般地,终端设备是通过测量无线接入网(radio access network,RAN)设备发送的参考信号的信号强度来选择随机接入的类型。例如,在信号强度较强时,终端设备选择交互信令较少的2步随机接入;在信号强度较弱时,终端设备选择交互信令较多的4步随机接入。这样一来,在多个信号强度较强的终端设备同时发起随机接入时,该多个终端设备会选择同一随机接入类型发起随机接入,例如多个终端设备均同时选择2步随机接入类型发起随机接入。由于同一随机接入类型下的随机接入资源有限,在较多终端设备同时选择相同的随机接入类型发起随机接入时,容易由于随机接入资源不足而影响了终端设备的正常接入,从而影响了时效性要求较高的业务的快速发起。
在无线网络中,不同类型的业务对于网络的服务质量(quality of service,QoS)的需求可能是不同的,例如业务A的QoS需求为低时延,业务B的QoS需求为高可靠性,业务C的QoS需求为高带宽。如果采用单一网络来承载这些业务,将很难同时满足低时延、高可靠性、高带宽等要求。然而,为每种业务单独新建网络又会带来巨大的成本。
得益于网络功能虚拟化(network function virtualization,NFV)技术的发展,运营商可以为不同类型的业务构建不同的虚拟网络,以满足不同业务的需求。其中,网络切片是利用NFV技术在一个共享的物理网络资源之上创建多个虚拟网络,多个虚拟网络分别用于承载不同类型的业务,且虚拟网络之间是相互隔离的,以实现业务的隔离。通过对多个虚拟网络进行不同的配置,可以使得多个虚拟网络能够满足不同类型的业务的需求。例如,网络切片A可以被配置为用于满足低时延业务的需求,即网络切片A可以用于承载具有低时延需求的业务A,以满足业务A的QoS需求。其中,该业务A也可以称为网络切片业务A。
有鉴于此,本申请实施例提供一种随机接入方法,终端设备根据待发起的网络切片业务确定其对应的随机接入类型,例如在待发起的网络切片业务为时效性要求较高的网络切 片业务时,终端设备优先选择2步随机接入类型;在待发起的网络切片业务对时效性要求不高时,终端设备优先选择4步随机接入类型,使得类型不同的网络切片业务通过不同的随机接入类型进行随机接入,即时效性要求较高的网络切片业务可以优先以交互信令较少的随机接入类型进行随机接入。
为了便于理解,以下将对本申请实施例所涉及的专业术语进行解释。
随机接入可以包含从终端设备发送随机接入前导码,到终端设备与网络间建立起基本信令连接的过程。一般地,随机接入可以包括有4步随机接入和2步随机接入。
其中,4步随机接入包括有如下4个过程:
1.终端设备发送随机接入前导码,该过程通常也称为终端设备发送MSG1的过程。
2.接入网设备发送随机接入响应消息,该过程通常也称为接入网设备发送MSG2的过程。
3.UE发送RRC连接请求消息,该过程通常也称为终端设备发送MSG3的过程。
4.接入网设备发送RRC连接建立消息,该过程通常也称为接入网设备发送MSG4的过程。
其中,2步随机接入包括有如下2个过程:
1.终端设备发送随机接入前导码以及RRC连接请求消息,该过程通常也称为终端设备发送MSGA的过程。
2.接入网设备发送RRC连接建立消息,该过程通常也称为接入网设备发送MSGB的过程。
随机接入资源,指的是终端设备在发起随机接入的过程中需要用到的资源。通常,随机接入资源包括时域资源、频域资源和码资源。在非竞争随机接入场景下,接入网设备可以向终端设备分配专用前导码,终端设备基于专用前导码发起非竞争随机接入。具体地,接入网设备可以向终端设备发送PDCCH消息或RRC消息,该PDCCH消息或RRC消息能够指示随机接入使用的前导码索引(Preamble Index);PDCCH消息或RRC消息还能够指示物理层随机接入信道掩码索引(physical random access channel mask index,PRACH Mask Index),即时频资源。其中,前导码索引用于指示终端设备执行随机接入所使用的前导码;PRACH Mask Index则用于指示终端设备可以在系统帧内的第几个子帧对应的PRACH上发送前导码。在竞争随机接入场景下,接入网设备可以通过小区广播消息向终端设备广播可以使用的前导码资源池信息,终端设备可以在前导码资源池中选择一个前导码发送给接入网设备。此时,可能会出现多个终端设备同时在相同的时频资源上选择同一个前导码发送给接入网设备的情况,即多个终端设备会发生竞争冲突。
其中,本申请实施例的技术方案可以应用于终端设备发起竞争随机接入的场景,也可以应用于终端设备发起非竞争随机接入的场景,此处不做具体限定。
单网络切片选择支撑信息(single network slice selection assistance information,S-NSSAI),指的是一个网络切片的标识,能够表示网络中的某一个网络切片。通常,在网络中每一个网络切片都有一个唯一的S-NSSAI。
无线接入网切片区域标识(ran slicing area Identity,RSA ID),指的是一个RAN区域的网络切片标识,可以用于表示一个或多个网络切片。一般地,一个RSA ID可以与一 个或多个S-NSSAI对应,RSA ID与S-NSSAI之间的对应关系在一个跟踪区(tracking area,TA)的范围内有效。其中,TA是由一片连续覆盖的小区所组成的地理区域,用于寻呼和实现终端设备的位置更新。由于一个RSA ID可以对应多个S-NSSAI,且RSA ID的比特数少于S-NSSAI。因此,相较于广播多个S-NSSAI,基站直接广播RSA ID可以节省资源开销。
本申请实施例的技术方案可以应用于各种通信系统,例如:例如码分多址(code division multiple access,CDMA)、时分多址(time division multiple access,TDMA)、频分多址(frequency division multiple access,FDMA)、正交频分多址(orthogonal frequency-division multiple access,OFDMA)、单载波频分多址(single carrier FDMA,SC-FDMA)和其它系统等。术语“系统”可以和“网络”相互替换。例如,3GPP长期演进(long term evolution,LTE)系统和基于LTE演进的各种版本、以及第五代(5Generation,5G)通信系统、新空口(new radio,NR)等通信系统。此外,所述通信系统还可以适用于面向未来的通信技术,都适用本申请实施例提供的技术方案。本申请实施例描述的系统架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
为了便于理解,下面将结合图1,对本申请实施例的应用场景进行简单的介绍。如图1所示,该应用场景包括终端设备101和接入网设备102。其中,终端设备101与接入网设备102无线连接,接入网设备102用于将终端设备101接入到无线网络。
其中,终端设备101又称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)等,是一种向用户提供语音和/或数据连通性的设备,或,设置于该设备内的芯片,例如,具有无线连接功允许的手持式设备、车载设备等。目前,一些终端设备的举例为:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。
接入网设备102可以是任意一种具有无线收发功能的设备,或,设置于具体无线收发功能的设备内的芯片。接入网设备102包括但不限于:基站(例如基站BS,基站NodeB、演进型基站eNodeB或eNB、第五代5G通信系统中的基站gNodeB或gNB、未来通信系统中的基站、WiFi系统中的接入节点、无线中继节点、无线回传节点)等。基站可以是:宏基站,微基站,微微基站,小站,中继站等。多个基站可以支持上述提及的一种或者多种技术的网络,或者未来演进网络。基站可以包含一个或多个共站或非共站的传输接收点(transmission reception point,TRP)。接入网设备102还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器、集中单元(central unit,CU)或者分布单元(distributed unit,DU)等。以下以接入网设备102为基站为例进行说明。 所述多个接入网设备102可以为同一类型的基站,也可以为不同类型的基站。基站可以与终端设备101进行通信,也可以通过中继站与终端设备101进行通信。终端设备101可以支持与不同技术的多个基站进行通信,例如,终端设备101可以支持与支持LTE网络的基站通信,也可以支持与支持5G网络的基站通信,还可以支持与LTE网络的基站以及5G网络的基站的双连接。例如将终端设备101接入到无线网络的RAN节点。目前,一些RAN节点的举例为:gNB、TRP、演进型节点B(evolved Node B,eNB)、下一代演进型节点B(next generation evolved Node B,LTE ng-eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU),或Wifi接入点(access point,AP)等。
可以参阅图2,图2为本申请实施例提供的一种随机接入方法200的流程示意图。该随机接入方法200,包括:
201、终端设备确定第一网络切片业务对应的第一随机接入时频资源,所述第一网络切片业务为待发起的网络切片业务。
在一个可能的实施例中,终端设备在确定了待发起的第一网络切片业务之后,可以根据所述第一网络切片业务以及第一映射关系确定所述第一网络切片业务对应的第一随机接入时频资源,该第一映射关系为一种网络切片业务与用于接入该网络切片业务所使用的随机接入时频资源之间的映射关系。
其中,终端设备可以通过多种方式来获取所述第一映射关系。
在一种可能的实现方式中,接入网设备广播系统消息,该系统消息中携带有所述第一映射关系。终端设备通过接收接入网设备广播的系统消息,可以获取到第一映射关系。示例性地,系统消息中所携带的第一映射关系可以如表1所示。其中,表1为一种可能的第一映射关系的结构表。
表1
Figure PCTCN2020084596-appb-000001
其中,一个网络切片业务标识可以与一个或多个随机接入时频资源标识对应。也就是说,根据第一网络切片业务的标识可以确定第一网络切片业务对应的一个或多个随机接入时频资源。具体地,第一网络切片业务对应的一个或多个随机接入时频资源可以是终端设备所接入的小区下的一个或多个随机接入时频资源。一般地,一个随机接入时频资源具体可以是一个或者多个资源块(resource block,RB)。
在另一种可能的实现方式中,第一映射关系可以由PRACH Mask Index来指示。一般地, PRACH Mask Index用于指示同步信号和PBCH块(synchronization signal and PBCH block,SSB)相关的随机接入时频资源;不同取值的PRACH Mask Index可以表示不同情况下SSB对应的随机接入时频资源。其中,终端设备在同步和接入过程中可能会涉及到同步信号(synchronization signal,SS)以及PBCH,SSB则包括了上述的SS和PBCH。在PRACH Mask Index指示SSB对应的随机接入时频资源的基础上,可以用其他取值的PRACH Mask Index来指示第一映射关系,即用其他取值的PRACH Mask Index来指示网络切片业务与随机接入资源之间的对应关系。示例性地,PRACH Mask Index指示第一映射关系的一种可能的方式可以如表2所示。
表2
Figure PCTCN2020084596-appb-000002
其中,PRACH Mask Index的取值为0至10时,PRACH Mask Index指示的是终端设备发起随机接入时所选择的随机接入时频资源;随机接入时频资源索引1至8表示随机接入时频资源的标识,用于指示具体的随机接入时频资源;PRACH Mask Index的取值为11和12时,PRACH Mask Index指示的是网络切片业务与一个或多个随机接入资源之间的对应关系,其中,表2中的随机接入时频资源Y1以及随机接入时频资源Y2均可以是包括一个或多个随机接入时频资源;PRACH Mask Index的取值为13至15时,PRACH Mask Index被预留用作指示其他情况下的随机接入时频资源。需要说明的是,PRACH Mask Index的取值为10至15的情况下,PRACH Mask Index的取值均可以用于指示网络切片业务与随机接入时频资源之间的映射关系。在实际应用中,可以根据实际需要确定采用哪些PRACH Mask Index的值来指示网络切片业务与随机接入时频资源之间的映射关系。例如,在需要指示两个网络切片业务对应的随机接入时频资源时,可以通过PRACH Mask Index取值为11以及12, 来指示网络切片业务与随机接入时频资源之间的映射关系;在需要指示五个网络切片业务对应的随机接入时频资源时,可以通过PRACH Mask Index取值为11至15,来指示网络切片业务与随机接入时频资源之间的映射关系。
可选的,PRACH Mask Index可以携带于RRC消息、PDCCH消息或者系统消息中。也就是说,终端设备可以通过接收接入网设备所发送的RRC消息、PDCCH消息或者系统消息来获得PRACH Mask Index,并且根据PRACH Mask Index中的指示确定第一映射关系。
在另一种可能的实现方式中,第一映射关系可以携带于RRC消息或者PDCCH消息中,即终端设备通过接收接入网设备发送的RRC消息或者PDCCH消息即可获取到第一映射关系。
202、终端设备确定所述第一网络切片业务对应的随机接入类型。
在一个可能的实施例中,终端设备可以根据网络切片业务与随机接入类型之间的第二映射关系确定第一网络切片业务对应的随机接入类型。其中,网络切片业务与随机接入类型之间的第二映射关系可以携带于系统消息、RRC消息或者PDCCH消息中;终端设备通过接收接入网设备所发送的系统消息、RRC消息或者PDCCH消息,来获取网络切片业务与随机接入类型之间的第二映射关系。例如,终端设备根据网络切片业务与随机接入类型之间的第二映射关系确定网络切片业务1对应的随机接入类型为2步随机接入,网络切片业务2对应的随机接入类型为4步随机接入。
其中,接入网设备可以根据网络切片业务的类型来确定网络切片业务与随机接入类型之间的第二映射关系。具体地,接入网设备可以确定时效性要求较高或者接入优先级较高的网络切片业务对应交互信令较少的2步随机接入,以提高这些网络切片业务的随机接入速率;接入网设备还可以确定时效性要求不高或者接入优先级较低的网络切片业务对应交互信令较多的4步随机接入,以节省2步随机接入资源的开销。
此外,终端设备也可以根据网络切片业务的类型自行确定网络切片业务对应的随机接入类型。例如,在所述第一网络切片业务为时效性要求较高的网络切片业务时,终端设备可以确定所述第一网络切片业务对应的随机接入类型为交互信令较少的2步随机接入。终端设备还可以通过其他方式来确定网络切片业务对应的随机接入类型,此处不做具体限定。
203、终端设备基于所述第一随机接入时频资源以及所述随机接入类型发起随机接入。
本实施例中,所述第一随机接入时频资源可以只包括一种随机接入类型下的随机接入时频资源,例如在第一网络切片业务对应的随机接入类型为2步随机接入时,第一随机接入时频只包括有2步随机接入时频资源。所述第一随机接入时频资源也可以包括有多种随机接入类型下的随机接入时频资源,例如在第一网络切片业务对应的随机接入类型为2步随机接入时,第一随机接入时频可以包括有2步随机接入时频资源和4步随机接入时频资源。
在一种可能的实施方式中,在第一随机接入时频资源只包括一种随机接入类型下的随机接入时频资源的情况下,终端设备可以直接基于第一随机接入时频资源发起随机接入。例如,在第一随机接入时频资源只包括有一个某一随机接入类型下的随机接入时频资源时,终端设备可以直接根据该随机接入时频资源发起随机接入;在第一随机接入时频资源包括有多个同一随机接入类型的随机接入时频资源时,终端设备在多个随机接入时频资源中选 择一个随机接入时频资源,以发起随机接入。
在另一种可能的实施方式中,在第一随机接入时频资源包括有多种随机接入类型下的随机接入时频资源的情况下,终端设备可以根据所述随机接入类型在所述第一随机接入时频资源中确定第二随机接入时频资源,所述第二随机接入时频资源为所述随机接入类型对应的随机接入时频资源。本实施例中,终端设备所确定的第一随机接入时频资源中包括有多个随机接入时频资源,该多个随机接入时频资源中包括有2步随机接入对应的时频资源以及4步随机接入对应的时频资源。由于终端设备已经确定了随机接入类型,因此终端设备可以在第一随机接入时频资源中确定与该随机接入类型对应的随机接入时频资源(即第二随机接入时频资源)作为候选随机接入时频资源,以用于发起随机接入。
例如,第一随机接入时频资源包括有随机接入时频资源1、随机接入时频资源2、随机接入时频资源3以及随机接入时频资源4,其中,随机接入时频资源1和随机接入时频资源2为2步随机接入对应的时频资源,随机接入时频资源3以及随机接入时频资源4为4步随机接入对应的时频资源。在终端设备确定了随机接入类型为2步随机接入的情况下,终端设备可以进一步确定随机接入时频资源1和随机接入时频资源2为在发起随机接入时可用的候选时频资源。
本实施例中,在终端设备进一步确定的第二随机接入时频资源只包括有一个随机接入时频资源的情况下,终端设备可以使用该第二随机接入时频资源发起随机接入;在第二随机接入时频资源包括有多个随机接入时频资源的情况下,终端设备可以在所述第二随机接入时频资源中随机选择一个随机接入时频资源,然后基于所选择的随机接入时频资源发起随机接入,从而和接入网设备建立连接。
本申请实施例中,终端设备根据待发起的网络切片业务确定其对应的随机接入类型,例如在待发起的网络切片业务为时效性要求较高的网络切片业务时,终端设备优先选择2步随机接入类型;在待发起的网络切片业务对时效性要求不高时,终端设备优先选择4步随机接入类型;可以使得类型不同的网络切片业务通过不同的随机接入类型进行随机接入,即时效性要求较高的网络切片业务可以优先以交互信令较少的随机接入类型进行随机接入。
在一个可能的实施例中,在所述步骤202中,终端设备具体可以进一步基于网络切片业务与随机接入类型之间的第二映射关系以及测量得到的信号质量来确定第一网络切片业务对应的随机接入类型。其中,所述测量得到的信号质量指的是终端设备通过测量接入网设备所发送的参考信号而得到的信号质量,该信号质量可以通过参考信号接收功率(reference signal receiving power,RSRP)或者参考信号接收质量(reference signal receiving quality,RSRQ)来表示。示例性地,接入网设备所发送的参考信号可以包括解调参考信号(demodulation reference signal,DMRS)、相位追踪参考信号(phase-tracking reference signal,PTRS)或者信道状态信息参考信号(channel state information-reference signal,CSI-RS),终端设备通过测量参考信号的RSRP或者RSRQ来确定信号质量。
具体地,可以参阅图3,图3为本申请实施例提供的一种随机接入方法200的另一流程示意图。如图3所示,所述步骤202具体包括:
2021、终端设备判断测量得到的参考信号的信号质量是否大于或等于预设阈值。
具体地,终端设备可以通过测量接入网设备所发送的参考信号来获得信号质量,并且比较信号质量与预设阈值之间的大小。其中,所述预设阈值具体可以是由接入网设备确定且通知终端设备的,也可以是标准中所定义的,还可以是终端设备自行确定的,此处不做具体限定。
其中,若终端设备测量得到的信号质量大于或等于预设阈值,则终端设备执行步骤2022;否则终端设备执行步骤2024。
2022、若测量得到的信号质量大于或等于预设阈值,则终端设备判断第一网络切片业务的标识对应的随机接入类型是否为2步随机接入。
其中,终端设备可以根据网络切片业务与随机接入类型之间的第二映射关系来判断第一网络切片业务对应的随机接入类型是否为2步随机接入。该第二映射关系可以携带于系统消息、RRC消息或者PDCCH消息中;终端设备通过接收接入网设备所发送的系统消息、RRC消息或者PDCCH消息,来获取网络切片业务与随机接入类型之间的第二映射关系。此外,在终端设备自行确定网络切片业务对应的随机接入类型的情况下,终端设备可以根据网络切片业务的类型来判断第一网络切片业务对应的随机接入类型是否为2步随机接入。
由于2步随机接入对终端设备的信号质量具有一定的要求,在终端设备测量得到的信号质量大于或等于预设阈值时,终端设备发起2步随机接入会更容易成功。因此,在确定测量得到的信号质量大于或等于预设阈值时,终端设备可以进一步确定第一网络切片业务是否对应2步随机接入。
其中,若终端设备确定第一网络切片业务对应的随机接入类型为2步随机接入,则终端设备执行步骤2023;否则终端设备执行步骤2024。
2023、终端设备确定2步随机接入为第一网络切片业务对应的待发起随机接入类型。
具体地,在信号质量大于或等于预设阈值,且第一网络切片业务对应的随机接入类型为2步随机接入的情况下,则可以确定2步随机接入为发起第一网络切片业务时所采用的随机接入类型。
可以理解的是,如果终端设备确定2步随机接入为第一网络切片业务对应的待发起随机接入类型,则在上述的步骤203中,终端设备具体是基于第一随机时频资源发起2步随机接入。
2024、终端设备确定4步随机接入为第一网络切片业务对应的待发起随机接入类型。
具体地,在信号质量小于预设阈值,或者第一网络切片业务对应的随机接入类型为4步随机接入的情况下,则可以确定4步随机接入为发起第一网络切片业务时所采用的随机接入类型。
可以理解的是,如果终端设备确定4步随机接入为第一网络切片业务对应的待发起随机接入类型,则在上述的步骤203中,终端设备具体是基于第一随机时频资源发起4步随机接入。
可以理解的是,在终端设备测量得到的信号质量小于预设阈值时,由于第一网络切片业务并不满足发起2步随机接入的条件,因此无论第一网络切片业务对应的随机接入类型 是否是2步随机接入,终端设备都是发起4步随机接入。此外,在终端设备测量得到的信号质量大于或等于预设阈值,但是第一网络切片业务对应的随机接入类型为4步随机接入的情况下,终端设备也是发起4步随机接入,以节省2步随机接入时频资源,将有限的2步随机接入时频资源留给其他有快速接入需求的终端设备,从而提升网络体验。
本申请实施例中,终端设备根据测量得到的信号质量以及待发起的网络切片业务确定其对应的随机接入类型,在信号质量大于或等于预设阈值且网络切片业务对应的随机接入类型为2步随机接入时,优先发起2步随机接入;否则,则优先发起4步随机接入。这样一来,基于终端设备的信号质量以及网络切片业务对应的随机接入类型进一步确定了在发起网络切片业务时所采用的随机接入类型,可以有效避免接入拥塞现象的出现,即信号质量较好的终端设备可以优先以交互信令较少的随机接入类型发起时效性要求较高的网络切片业务,将有限的2步随机接入时频资源留给其他有快速接入需求的终端设备,从而提升网络体验。
以上为从终端设备的角度对随机接入方法进行的介绍,以下将从终端设备中的各通信协议层的角度对随机接入方法进行详细的介绍。
可以参阅图4,图4为本申请实施例提供的一种随机接入方法400的另一流程示意图。该随机接入方法400,包括:
401、终端设备的非接入层(non access stratum,NAS)向RRC层发送第一网络切片业务的标识,以指示RRC层发起第一网络切片业务。
在终端设备的NAS需要发起第一网络切片业务时,NAS可以向终端设备中的RRC层传递第一网络切片业务的标识,表示将要在当前小区发起第一网络切片业务。
在一个可能的实现方式中,NAS可以是根据待发起的协议数据单元(protocol data unit session,PDU)会话确定第一网络切片业务的标识。其中,一个PDU会话可以与一个或多个网络切片业务对应,即该PDU会话可以在与其对应的一个或多个网络切片业务中选择其中的一个网络切片业务来发起。通常,网络切片重映射(slice remapping)列表用于表示某个PDU会话与一个或多个网络切片业务之间的对应关系。具体地,用于表示网络切片重映射列表的消息结构可以如表3所示。
表3
Figure PCTCN2020084596-appb-000003
具体地,网络切片重映射列表可以携带于接入网设备发送给终端设备的RRC消息中,以使得终端设备获得网络切片重映射列表;网络切片重映射还可以携带于终端设备发送给接入网设备的RRC消息中,以使得接入网设备获得网络切片重映射列表。
402、RRC层向MAC层发送第一网络切片业务的标识,以指示MAC层根据所述第一网络 切片业务的标识确定对应的随机接入时频资源。403、MAC层确定第一网络切片业务对应的第一随机接入时频资源。
其中,步骤403与上述的步骤201类似,具体可以参考步骤201,此处不再赘述。
在一个可能的实施例中,如果终端设备接收到当前小区的广播消息,且获知当前小区并不支持待发起的第一网络切片业务时;终端设备可以根据待发起的PDU会话在网络切片重映射列表中重新选择一个当前小区支持的网络切片业务作为待发起的第一网络切片业务,以保证网络切片业务的正常发起。
需要说明的是,终端设备在网络切片重映射列表中选择新的网络切片业务的操作可以在NAS执行,也可以是RRC层或者MAC层执行,本实施例并不做具体限定。
404、MAC层确定所述第一网络切片业务对应的随机接入类型。
其中,步骤404与上述的步骤202类似,具体可以参考步骤202,此处不再赘述。
405、MAC层发起随机接入。
其中,步骤405与上述的步骤203类似,具体可以参考步骤203,此处不再赘述。
406、终端设备发送PDU会话建立请求。
具体地,终端设备的NAS层可以通过AS层以及接入网设备,向核心网设备发送PDU会话建立请求。该PDU会话建立请求经过终端设备的AS层以及接入网设备而到达核心网设备。接入网设备在接收到PDU会话请求之后,向核心网设备发送该PDU会话建立请求。其中,该PDU会话建立请求中可以包括但不限于PDU会话标识以及第一网络切片业务的标识等信息。
407、核心网设备向接入网设备发送PDU会话建立请求回应消息。
核心网设备在处理了该PDU会话建立请求之后,核心网设备可以向接入网设备发送PDU会话建立请求回应消息,以表示核心网设备已经接受了终端设备所发送的PDU会话建立请求。
408、接入网设备向终端设备发送PDU会话建立请求接受消息。
其中,该PDU会话建立请求接受消息中可以携带有网络切片业务标识,以表示终端设备可以发起的网络切片业务。
可选地,PDU会话建立请求接受消息中所携带的网络切片业务标识可以是第一网络切片业务的标识,即表示终端设备可以发起第一网络切片业务;PDU会话建立请求接受消息中所携带的网络切片业务标识也可以是其他的网络切片业务的标识,表示终端设备可以发起其他的网络切片业务。
在一种可能的实现方式中,接入网设备也可以给终端设备发送PDCCH消息,并且在PDCCH消息的下行控制信息(downlink control information,DCI)中携带网络切片业务标识。
409、终端设备向接入网设备发送网络切片业务的数据。
在终端设备接收到PDU会话建立请求接受消息之后,可以认为已建立PDU会话,终端设备可以向接入网设备发送网络切片业务的数据,该网络切片业务的数据中还可以携带有第一网络切片业务的标识。
以上为从终端设备中的子层的角度对随机接入方法所进行的介绍,以下将详细介绍终端设备中的子层如何确定第一网络切片业务对应的第一随机接入时频资源。
可以参阅图5,图5为本申请实施例提供的一种随机接入方法500的流程示意图。该随机接入方法500,包括:
501、终端设备的NAS向RRC层发送待发起的网络切片业务的标识。
在一种可能的实现方式中,网络切片业务的标识具体可以为S-NSSAI,一个S-NSSAI可以用于表示一个网络切片业务。也就是说,在存在有一个或多个待发起的网络切片业务时,NAS可以向RRC层发送一个或多个S-NSSAI。
在另一种可能的实现方式中,NAS也可以向RRC层发送RSA ID。其中,RSA ID与S-NSSAI之间具有一对多的映射关系,即一个RSA ID同时对应着一个或多个S-NSSAI,根据RSA ID可以确定与其对应的一个或多个S-NSSAI。需要说明的是,RSA ID与S-NSSAI之间的映射关系可以由接入网设备提前通过系统消息或者RRC消息发送给终端设备,以使得终端设备能够获取到RSA ID与S-NSSAI之间的映射关系。
502、终端设备的接入层(access stratum,AS)确定网络切片业务对应的随机接入资源,其中,AS包括有RRC层、无线链路控制(radio link control,RLC)层、MAC层、物理(physical,PHY)层、分组数据汇聚层协议(packet data convergence protocol,PDCP)层和业务数据适配协议(service data adaptation protocol,SDAP)层。
具体地,AS在获取到NAS发送的待发起的网络切片业务的标识之后,AS确定一个需要发起的网络切片业务,然后再确定该网络切片业务对应的随机接入资源。其中,在AS获取到的网络切片业务的标识为S-NSSAI时,AS确定网络切片业务对应的随机接入资源的方式包括但不限于以下的五种方式:
1、AS的RRC层根据S-NSSAI确定对应的随机接入时频资源,且RRC层将所确定的随机接入时频资源对应的PRACH Mask Index发送给MAC层,以使得MAC层获知已确定的随机接入时频资源。也就是说,确定随机接入时频资源的过程可以由RRC层来执行,MAC层获知最终所确定的随机接入时频资源即可,并不需要获知具体的S-NSSAI。具体地,RRC层可以是根据S-NSSAI以及S-NSSAI与随机接入时频资源之间的映射关系来确定对应的随机接入时频资源,具体可以参考上文的叙述,此处不再赘述。
2、AS的RRC层将S-NSSAI发送给MAC层,MAC层根据S-NSSAI确定对应的随机接入时频资源,即确定随机接入时频资源的过程由MAC层来执行。
3、AS的RRC层根据S-NSSAI确定对应的RSA ID,然后根据RSA ID确定对应的随机接入时频资源,最后RRC层将随机接入时频资源对应的PRACH Mask Index发送给MAC层,以使得MAC层获知已确定的随机接入时频资源。其中,RSA ID与随机接入时频资源之间的映射关系可以由接入网设备提前通过系统消息或者RRC消息下发给终端设备。
4、AS的RRC层将S-NSSAI发送给MAC层。MAC层根据S-NSSAI确定对应的RSA ID,然后根据RSA ID确定对应的随机接入时频资源。
5、AS的RRC层根据S-NSSAI确定对应的RSA ID,然后将RSA ID发送给MAC层。MAC层根据RSA ID确定对应的随机接入时频资源。
此外,在NAS向AS发送RSA ID的情况下,AS确定网络切片业务对应的随机接入资源的方式包括但不限于以下的四种方式:
a、AS的RRC层根据RSA ID确定对应的S-NSSAI,然后根据该S-NSSAI确定对应的随机接入时频资源,最后将随机接入时频资源对应的PRACH Mask Index发送给MAC层。
b、AS的RRC层根据RSA ID确定对应的S-NSSAI,并且将该S-NSSAI发送给MAC层。MAC层根据S-NSSAI确定对应的随机接入时频资源。
c、AS的RRC层根据RSA ID确定对应的随机接入时频资源,并且将随机接入时频资源对应的PRACH Mask Index发送给MAC层。
d、AS的RRC层向MAC层发送RSA ID,MAC层根据该RSA ID确定对应的随机接入时频资源。
503、终端设备的MAC层发起随机接入。
具体地,MAC层可以基于确定的随机接入时频资源向接入网设备发起随机接入,具体的发起过程可以参考上文的叙述,此处不再赘述。
504、若终端设备发起的随机接入失败,终端设备的MAC层更新发起的网络切片业务。
可以理解的是,在基站没有足够的上行资源分配给终端设备时,终端设备发起的随机接入可能会失败。其中,终端设备可以通过多种方式来确定其发起的随机接入是否失败。例如,在终端设备发起4步随机接入的情况下,若终端设备接收到了接入网设备发送的MSG4,而该MSG4中没有自身的身份标识,则终端设备可以确定发起随机接入失败;或者,终端设备在向接入网设备发送了MSG3之后,若没有接收到接入设备回复的MSG4,则终端设备同样可以确定发起随机接入失败。
在终端设备确定发起随机接入失败之后,MAC层可以重新发起一个新的网络切片业务,即更新发起的网络切片业务。其中,MAC层更新发起的网络切片业务的方式包括但不限于以下的多种方式:
A、MAC层在NAS层所发送的多个网络切片业务的标识中剔除已经尝试过发起但发起失败的网络切片业务的标识,然后在剩余的网络切片业务中重新选择一个新的网络切片业务来发起。具体地,MAC层在剩余的网络切片业务中重新选择网络切片业务的方式可以是:MAC层根据网络切片重映射列表来选择,或者MAC层根据接入网设备所下发的系统消息中的指示来选择。
B、MAC层向RRC层发送重新选择网络切片业务的请求,以使得RRC层重新选择一个新的网络切片业务。在RRC层选择好新的网络切片业务之后,MAC层可以接收RRC层所发送的网络切片业务的标识,该网络切片业务的标识即为重新选择的网络切片业务的标识。
505、终端设备的MAC层根据更新后的网络切片业务的标识,发起随机接入。
以上为对终端设备基于已确定的网络切片业务发起随机接入的过程所进行的叙述,以下将详细描述当终端设备具有多个待发起的网络切片业务时,终端设备如何确定先发起的网络切片业务的过程。
可以参阅图6,图6为本申请实施例提供的一种随机接入方法600的流程示意图。该随机接入方法600,包括:
601、终端设备的NAS向RRC层发送多个网络切片业务的标识。
在待发起的网络切片业务有多个时,NAS可以将待发起的网络切片业务的标识均发送给RRC层,由RRC层确定先发起的网络切片业务。
602、终端设备的RRC层确定先发起的网络切片业务。
RRC层在接收到多个网络切片业务的标识之后,RRC层可以在多个网络切片业务的标识中确定先发起的网络切片业务。具体地,RRC层确定先发起的网络切片业务的方式可以包括但不限于以下的两种方式:
(1)、RRC层根据网络切片业务的优先级确定网络切片业务的发起顺序,进而确定先发起的网络切片业务。例如,RRC层可以基于网络切片业务的优先级,从高到低对多个网络切片业务进行排序;即网络切片业务的优先级越高,网络切片业务的发起顺序越靠前,优先级最高的网络切片业务则为最先发起的网络切片业务。其中,接入网设备可以在系统消息、PDCCH消息或者RRC消息中携带网络切片业务的优先级信息,终端设备通过读取系统消息、PDCCH消息或者RRC消息即可获取到网络切片业务的优先级。
(2)、RRC层在多个网络切片业务中等概率随机选择一个先发起的网络切片业务。
603、终端设备的RRC层向MAC层发送网络切片业务的标识。
在RRC层确定了先发起的网络切片业务之后,RRC层可以向MAC层发送先发起的网络切片业务的标识,以使得MAC层确定该网络切片业务的随机接入时频资源并发起随机接入。
上述图6对应的实施例叙述的是RRC层确定先发起的网络切片业务的过程,以下将描述由MAC层确定先发起的网络切片业务的过程。
可以参阅图7,图7为本申请实施例提供的一种随机接入方法700的流程示意图。该随机接入方法700,包括:
701、终端设备的NAS向RRC层发送多个网络切片业务的标识。
在待发起的网络切片业务有多个时,NAS可以将待发起的网络切片业务的标识均发送给RRC层,由RRC层确定先发起的网络切片业务。
702、终端设备的RRC层向MAC层发送多个网络切片业务的标识。
本实施例中,由于确定先发起哪个网络切片业务的决策主体为MAC层,因此,RRC层可以将接收到的多个网络切片业务的标识发送给MAC层,由MAC层自行确定先发起的网络切片业务。
703、终端设备的MAC层确定先发起的网络切片业务。
MAC层在接收到RRC层发送的多个网络切片业务的标识之后,MAC层可以在多个网络切片业务的标识中确定先发起的网络切片业务。具体地,MAC层确定先发起的网络切片业务的方式可以包括但不限于以下的四种方式:
1)、首先确定位于第一时间点之后且距离第一时间点最近的随机接入时频资源,然后确定该随机接入时频资源对应的网络切片业务为最先发起的网络切片业务。其中,第一时间点是MAC层接收到发起随机接入的指令的时间点,即第一时间点具体可以为MAC层接收到RRC层所发送的多个网络切片业务的标识以及指示MAC层发起随机接入的时间点。简单来说,MAC层在接收到发起随机接入的指令之后,确定能够用于最先发起随机接入的随机 时频资源,再确定该随机时频资源对应的网络切片业务,从而确定了最先发起的网络切片业务。
2)、确定在单位时间内随机接入时频资源最多的网络切片业务最先发起的网络切片业务。具体地,可以确定每个网络切片业务在单位时间内所对应的随机接入时频资源的个数,然后选择随机接入时频资源个数最多的一个网络切片业务为最先发起的网络切片业务。例如,假设待发起的网络切片业务包括有网络切片业务1和网络切片业务2;在一个10ms的无线帧内,网络切片业务1有n个随机接入时频资源,网络切片业务2有m个随机接入时频资源,如果n>m,则选择网络切片业务1为最先发起的网络切片业务。
3)、确定在预设时间段内随机接入时频资源最多的网络切片业务最先发起的网络切片业务。其中,预设时间段的大小可以根据实际情况进行设置,例如可以是10ms、20ms或者50ms等等,此处不做具体限定。
4)、MAC层在多个网络切片业务中等概率随机选择一个先发起的网络切片业务。
以上为对终端设备基于多个网络切片业务发起随机接入的过程所进行的叙述,以下将详细描述当终端设备具有待发起的网络切片业务以及默认切片业务时,终端设备如何发起网络切片业务以及默认切片业务的过程。其中,网络切片通常为配置了特定的网络功能的逻辑网络,而网络切片业务则为由所述网络切片所执行的业务。当终端设备在发起业务时携带有网络切片的标识,则可以认为终端设备发起的是网络切片业务,由该网络切片的标识所对应的网络切片来执行终端设备发起的网络切片业务。当终端设备在发起业务时没有携带有网络切片的标识,则可以认为终端设备发起的是默认切片业务,可以由核心网设备预先给终端设备所分配的默认切片来执行终端设备发起的默认切片业务。
可以参阅图8,图8为本申请实施例提供的一种随机接入方法800的流程示意图。该随机接入方法800,包括:
801、终端设备的NAS向RRC层发送网络切片业务的标识以及默认切片业务的标识。
在待发起的业务同时包括有网络切片业务和默认切片业务时,NAS则将待发起的网络切片业务的标识以及默认切片业务的标识发送给RRC层。
802、终端设备的RRC层向MAC层发送网络切片业务的标识以及默认切片业务的标识。
本实施例中,由MAC层决定所发起的业务,因此RRC层将网络切片业务的标识以及默认切片业务的标识发送给MAC层。可以理解的是,也可以由RRC层决定所发起的业务,此时RRC层将需要发起的业务的标识发送给MAC层即可,本实施例并不做具体限定。
803、终端设备的MAC层发起网络切片业务对应的随机接入。
在MAC层在接收到网络切片业务的标识以及默认切片业务的标识之后,MAC层可以决定优先发起网络切片业务,即MAC层从一个或多个网络切片业务中选择发起其中一个网络切片业务。
804、终端设备的MAC层统计网络切片业务随机接入的次数。
在MAC层发起网络切片业务的随机接入之后,MAC层可以统计网络切片业务发起随机接入的次数。具体地,可以在MAC层配置一个计数器,每次MAC层发起网络切片业务的随机接入之后,计数器的值加1,从而实现网络切片业务发起随机接入的次数的统计。
在一种可能的实现方式中,触发计数器的值加1的情况可以有多种。可以参阅图9,图9为本申请实施例中提供的触发计数器动作的示意图。如图9所示,触发计数器动作的情况具体包括但不限于以下四种情况:
如图9中的(a)所示,在终端设备发起2步随机接入的情况下,终端设备向接入网设备发送了对应一个网络切片业务的MSGA,且终端设备在MSGA对应的窗口期(MSGB window)内没有收到来自接入网设备的回应(即MSGB),则触发计数器的值加1,且终端设备需要重新发送该网络切片业务的MSGA。
如图9中的(b)所示,在终端设备发起2步随机接入的情况下,终端设备向接入网设备发送了对应一个网络切片业务的MSGA,以及接收到了接入网设备发送的随机接入回退响应(fall back random access response,fall back RAR),终端设备向接入网设备继续发送MSG3,且终端设备在随机接入竞争解决计时器(random access contention resolution timer,ra-CR Timer)设定的时间内没有接收到接入网设备的回应(即MSG4),则触发计数器的值加1,且终端设备需要重新发送该网络切片业务的MSGA。其中,该fall back RAR是用于指示终端设备重新单独发送MSG3。
如图9中的(c)所示,在终端设备发起4步随机接入的情况下,终端设备向接入网设备发送了对应一个网络切片业务的MSG1,且终端设备在随机接入回应窗口(random access channel access response window,RAR window)内没有接收到接入网设备的回应(即MSG2),则触发计数器的值加1,且终端设备需要重新发送该网络切片业务的前导码。其中,该RAR window是用于监听接入网设备下发的资源的时间窗口,终端设备可以基于接入网设备下发的该资源向接入网设备发送MSG3。
如图9中的(d)所示,在终端设备发起4步随机接入的情况下,终端设备向接入网设备发送了对应一个网络切片业务的MSG1,且终端设备接收到RAR之后,终端设备继续向接入网设备发送MSG3,且终端设备在ra-CR Timer设定的时间内没有接收到接入网设备的回应(即MSG4),则触发计数器的值加1,且终端设备需要重新发送该网络切片业务的前导码。
805、若网络切片业务随机接入的次数达到预设次数,则发起默认切片业务的随机接入。
如果网络切片业务发起随机接入的次数达到了预设次数,例如网络切片业务发起随机接入的次数达到了5次,则停止所述网络切片业务的随机接入,以及发起所述默认切片业务的随机接入。
可以理解的是,所述网络切片业务随机接入的次数包括网络切片业务发起随机接入失败的次数。比如,假设预设次数为5次,在连续5次发起网络切片业务对应的随机接入失败时,可以认为网络切片业务随机接入的次数达到了预设次数。这样一来,通过统计网络切片业务对应的随机接入的次数,可以在优先发起网络切片业务的随机接入的前提下,保证默认切片业务发起随机接入的可能性。
其中,预设次数可以由接入网设备根据实际情况进行设置或者调整,例如可以设置为3次或者5次,本实施例不对预设次数的具体取值做限定。
需要说明的是,在终端设备发起网络切片业务的随机接入或者默认切片业务的随机接入之前,终端设备可以获取网络切片业务对应的随机接入配置以及默认切片业务对应的随 机接入配置。其中,终端设备可以通过接收接入网设备所发送的系统消息、RRC消息或者PDCCH消息来获取网络切片业务对应的随机接入配置以及默认切片业务对应的随机接入配置。具体地,网络切片业务对应的随机接入配置以及默认切片业务对应的随机接入配置可以包括但不限于:
功率攀升最大次数(power_ramping max time)和功率攀升步长(power_ramping maxstep)。具体地,终端设备在RAR window没有监听到接入网设备的回应后,会增大发送前导码的功率。其中,终端设备最大增加功率的次数则为功率攀升最大次数,终端设备每次提升功率的幅值为功率攀升步长。可选的,在配置时,可以为网络切片业务配置较大的功率攀升最大次数(即多次数)以及较大的功率攀升步长(即大步长),为默认切片业务配置较小的功率攀升最大次数(即少次数)以及较小的功率攀升步长(即小步长)。
回退缩放因子(scaling_factor_BI)。其中,回退缩放因子指的是发生回退情况时的事件缩放因子,该回退缩放因子的的取值范围为0至1。可选的,在配置时,可以为网络切片业务配置数值较低的回退缩放因子,为默认切片业务配置数值较高的回退缩放因子。
RAR window的大小。可选的,在配置时,网络切片业务对应的RAR window的大小与默认切片业务对应的RAR window的大小可以是不相同的。MSGB window的大小。可选的,在配置时,网络切片业务对应的MSGB window的大小与默认切片业务对应的MSGB window的大小可以是不相同的。
Ra-CR Timer的大小。可选的,在配置时,网络切片业务对应的Ra-CR Timer的大小与默认切片业务对应的Ra-CR Timer的大小可以是不相同的。
参阅图10,图10为本申请实施例提供的一种终端设备1000的结构示意图。如图10所示,终端设备1000,包括:处理单元1001和收发单元1002;所述处理单元1001,用于确定第一网络切片业务对应的第一随机接入时频资源,所述第一网络切片业务为待发起的网络切片业务;所述处理单元1001,还用于确定所述第一网络切片业务对应的随机接入类型;所述收发单元1002,用于基于所述第一随机接入时频资源以及所述随机接入类型发起随机接入。
在一种可能的实施方式中,所述处理单元1001,还用于根据所述第一网络切片业务的标识以及第一映射关系确定所述第一网络切片业务对应的第一随机接入时频资源,所述第一映射关系为网络切片业务标识与随机接入时频资源之间的映射关系。
在一种可能的实施方式中,所述收发单元1002,还用于接收第一消息,所述第一消息包括有所述第一映射关系。
在一种可能的实施方式中,所述第一消息包括有物理随机接入信道掩码索引,所述物理随机接入信道掩码索引用于指示所述第一映射关系。
在一种可能的实施方式中,所述处理单元1001,还用于:获取参考信号的信号质量;在所述信号质量大于或等于预设阈值,且所述第一网络切片业务在第二映射关系中与2步随机接入对应的情况下,确定所述第一网络切片业务对应的随机接入类型为2步随机接入;在所述信号质量大于或等于所述预设阈值,或者所述第一网络切片业务在第二映射关系中与4步随机接入对应的情况下,确定所述第一网络切片业务对应的随机接入类型为4步随 机接入;其中,所述第二映射关系为网络切片业务与随机接入类型之间的映射关系。
在一种可能的实施方式中,所述收发单元1002,还用于接收第二消息,所述第二消息包括有所述第二映射关系。
在一种可能的实施方式中,所述处理单元1001,还用于:若所述终端设备有多个待发起的网络切片业务,则根据网络切片业务的优先级在所述多个待发起的网络切片业务中确定发起所述第一网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中优先级最高的网络切片业务。
在一种可能的实施方式中,所述处理单元1001,还用于:若所述终端设备有多个待发起的网络切片业务,则确定第三随机接入时频资源所对应的第一网络切片业务为发起的网络切片业务,其中,所述第三随机接入时频资源为位于第一时间点之后且距离第一时间点最近的随机接入时频资源,所述第一时间点为所述终端设备的MAC实体获取到发起随机接入的指令的时间点。
在一种可能的实施方式中,所述处理单元1001,还用于:若所述终端设备有多个待发起的网络切片业务,则根据网络切片业务在预设时间段内所对应的随机接入时频资源的个数,确定发起所述第一网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中在预设时间段内所对应的随机接入时频资源的个数最多的网络切片业务。
在一种可能的实施方式中,所述收发单元1002,还用于:接收第三消息,所述第三消息包括有第一配置信息和第二配置信息,所述第一配置信息用于指示网络切片业务对应的随机接入配置,所述第二配置信息用于指示默认切片业务对应的随机接入配置。
在一种可能的实施方式中,所述处理单元1001还用于,若同时存在有待发起的网络切片业务以及默认切片业务,则统计网络切片业务随机接入的次数;所述收发单元1002还用于,若所述网络切片业务随机接入的次数达到预设次数,则停止所述网络切片业务的随机接入,以及发起所述默认切片业务的随机接入。
在一种可能的实施方式中,所述处理单元1001还用于:若所述第一随机接入时频资源包括有不同的随机接入类型下的随机接入时频资源,则根据所述随机接入类型在所述第一随机接入时频资源中确定第二随机接入时频资源,所述第二随机接入时频资源为所述随机接入类型对应的随机接入时频资源;所述收发单元1002还用于:基于所述第二随机接入时频资源以及所述第一网络切片业务对应的随机接入类型发起随机接入。
图11为本申请实施例提供的一种终端设备1100的结构示意图。该终端设备1100可适用于图1所示出的系统中,执行上述方法实施例中终端设备的功能。为了便于说明,图11仅示出了终端设备的主要部件。如图11所示,终端设备1100包括处理器、存储器、控制电路、天线以及输入输出装置。处理器主要用于对通信协议以及通信数据进行处理,以及对整个终端设备进行控制,执行软件程序,处理软件程序的数据,例如用于支持终端设备执行上述方法实施例中所描述的动作,如接收唤醒信号的使用门限,根据该使用门限和eDRX周期确定是否监听唤醒信号。存储器主要用于存储软件程序和数据,例如存储上述实施例中所描述唤醒信号的使用门限等。控制电路主要用于基带信号与射频信号的转换以及对射频信号的处理。控制电路和天线一起也可以叫做收发器,主要用于收发电磁波形式的射频 信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。
当终端设备开机后,处理器可以读取存储单元中的软件程序,解释并执行软件程序的指令,处理软件程序的数据。当需要通过无线发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。
本领域技术人员可以理解,为了便于说明,图11仅示出了一个存储器和一个处理器。在实际的终端设备中,可以存在多个处理器和多个存储器。存储器也可以称为存储介质或者存储设备等,本申请实施例对此不做限定。
作为一种可选的实现方式,处理器可以包括基带处理器和/或中央处理器,基带处理器主要用于对通信协议以及通信数据进行处理,中央处理器主要用于对整个终端设备进行控制,执行软件程序,处理软件程序的数据。图11中的处理器可以集成基带处理器和中央处理器的功能,本领域技术人员可以理解,基带处理器和中央处理器也可以是各自独立的处理器,通过总线等技术互联。本领域技术人员可以理解,终端设备可以包括多个基带处理器以适应不同的网络制式,终端设备可以包括多个中央处理器以增强其处理能力,终端设备的各个部件可以通过各种总线连接。所述基带处理器也可以表述为基带处理电路或者基带处理芯片。所述中央处理器也可以表述为中央处理电路或者中央处理芯片。对通信协议以及通信数据进行处理的功能可以内置在处理器中,也可以以软件程序的形式存储在存储单元中,由处理器执行软件程序以实现基带处理功能。
在本申请实施例中,可以将具有收发功能的天线和控制电路视为终端设备1100的收发器1101,例如,用于支持终端设备执行前述的接收功能和发送功能。将具有处理功能的处理器视为终端设备1100的处理器1102。如图11所示,终端设备1100包括收发器1101和处理器1102。收发器也可以称为收发机、收发装置等。可选的,可以将收发器1101中用于实现接收功能的器件视为接收单元,将收发器1101中用于实现发送功能的器件视为发送单元,即收发器1101包括接收单元和发送单元,接收单元也可以称为接收机、输入口、接收电路等,发送单元可以称为发射机、发射器或者发射电路等。
处理器1102可用于执行该存储器存储的指令,以控制收发器1101接收信号和/或发送信号,完成上述方法实施例中终端设备的功能。作为一种实现方式,收发器1101的功能可以考虑通过收发电路或者收发的专用芯片实现。
应理解,说明书通篇中提到的“一个实施例”或“一实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各处出现的“在一个实施例中”或“在一实施例中”未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
另外,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,在本申请实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。

Claims (26)

  1. 一种随机接入方法,其特征在于,包括:
    终端设备确定第一网络切片业务对应的第一随机接入时频资源,所述第一网络切片业务为待发起的网络切片业务;
    所述终端设备确定所述第一网络切片业务对应的随机接入类型;
    所述终端设备基于所述第一随机接入时频资源以及所述随机接入类型发起随机接入。
  2. 根据权利要求1所述的随机接入方法,其特征在于,所述终端设备确定第一网络切片业务对应的第一随机接入时频资源,包括:
    所述终端设备根据所述第一网络切片业务的标识以及第一映射关系确定所述第一网络切片业务对应的第一随机接入时频资源,所述第一映射关系为网络切片业务与随机接入时频资源之间的映射关系。
  3. 根据权利要求1或2所述的随机接入方法,其特征在于,所述终端设备确定所述第一网络切片业务对应的随机接入类型,包括:
    所述终端设备获取参考信号的信号质量;
    在所述信号质量大于或等于预设阈值,且所述第一网络切片业务在第二映射关系中与2步随机接入对应的情况下,所述终端设备确定所述第一网络切片业务对应的随机接入类型为2步随机接入;
    在所述信号质量小于所述预设阈值,或者所述第一网络切片业务在第二映射关系中与4步随机接入对应的情况下,所述终端设备确定所述第一网络切片业务对应的随机接入类型为4步随机接入;
    其中,所述第二映射关系为网络切片业务与随机接入类型之间的映射关系。
  4. 根据权利要求2所述的随机接入方法,其特征在于,所述方法还包括:
    所述终端设备接收第一消息,所述第一消息包括有所述第一映射关系。
  5. 根据权利要求4所述的随机接入方法,其特征在于,所述第一消息包括有物理随机接入信道掩码索引,所述物理随机接入信道掩码索引用于指示所述第一映射关系。
  6. 根据权利要求3所述的随机接入方法,其特征在于,所述方法还包括:
    所述终端设备接收第二消息,所述第二消息包括有所述第二映射关系。
  7. 根据权利要求1至6任意一项所述的随机接入方法,其特征在于,所述方法还包括:
    若所述终端设备有多个待发起的网络切片业务,则所述终端设备根据网络切片业务的优先级在所述多个待发起的网络切片业务中确定发起所述第一网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中优先级最高的网络切片业务。
  8. 根据权利要求1至6任意一项所述的随机接入方法,其特征在于,所述方法还包括:
    若所述终端设备有多个待发起的网络切片业务,则所述终端设备确定第三随机接入时频资源所对应的第一网络切片业务为发起的网络切片业务,其中,所述第三随机接入时频资源为位于第一时间点之后且距离第一时间点最近的随机接入时频资源,所述第一时间点为所述终端设备的媒体接入控制MAC实体获取到发起随机接入的指令的时间点。
  9. 根据权利要求1至6任意一项所述的随机接入方法,其特征在于,所述方法还包括:
    若所述终端设备有多个待发起的网络切片业务,则所述终端设备根据网络切片业务在预设时间段内所对应的随机接入时频资源的个数,确定发起所述第一网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中在预设时间段内所对应的随机接入时频资源的个数最多的网络切片业务。
  10. 根据权利要求1至9任意一项所述的随机接入方法,其特征在于,所述方法还包括:
    所述终端设备接收第三消息,所述第三消息包括有第一配置信息和第二配置信息,所述第一配置信息用于指示网络切片业务对应的随机接入配置,所述第二配置信息用于指示默认切片业务对应的随机接入配置。
  11. 根据权利要求1至9任意一项所述的随机接入方法,其特征在于,所述方法还包括:
    若同时存在有待发起的网络切片业务以及默认切片业务,则统计网络切片业务随机接入的次数;
    若所述网络切片业务随机接入的次数达到预设次数,则停止所述网络切片业务的随机接入,以及发起所述默认切片业务的随机接入。
  12. 根据权利要求1至11任意一项所述的随机接入方法,其特征在于,所述方法还包括:
    若所述第一随机接入时频资源包括有不同的随机接入类型下的随机接入时频资源,则所述终端设备根据所述随机接入类型在所述第一随机接入时频资源中确定第二随机接入时频资源,所述第二随机接入时频资源为所述随机接入类型对应的随机接入时频资源;
    所述终端设备基于所述第一随机接入时频资源以及所述第一网络切片业务对应的随机接入类型发起随机接入,包括:
    所述终端设备基于所述第二随机接入时频资源以及所述第一网络切片业务对应的随机接入类型发起随机接入。
  13. 一种终端设备,其特征在于,包括:处理单元和收发单元;
    所述处理单元,用于确定第一网络切片业务对应的第一随机接入时频资源,所述第一网络切片业务为待发起的网络切片业务;
    所述处理单元,还用于确定所述第一网络切片业务对应的随机接入类型;
    所述收发单元,用于基于所述第一随机接入时频资源以及所述随机接入类型发起随机接入。
  14. 根据权利要求13所述的终端设备,其特征在于,所述处理单元,还用于根据所述第一网络切片业务的标识以及第一映射关系确定所述第一网络切片业务对应的第一随机接入时频资源,所述第一映射关系为网络切片业务与随机接入时频资源之间的映射关系。
  15. 根据权利要求13或14所述的终端设备,其特征在于,所述处理单元,还用于:
    获取参考信号的信号质量;
    在所述信号质量大于或等于预设阈值,且所述第一网络切片业务在第二映射关系中与 2步随机接入对应的情况下,确定所述第一网络切片业务对应的随机接入类型为2步随机接入;
    在所述信号质量小于所述预设阈值,或者所述第一网络切片业务在第二映射关系中与4步随机接入对应的情况下,确定所述第一网络切片业务对应的随机接入类型为4步随机接入;
    其中,所述第二映射关系为网络切片业务与随机接入类型之间的映射关系。
  16. 根据权利要求14所述的终端设备,其特征在于,所述收发单元,还用于接收第一消息,所述第一消息包括有所述第一映射关系。
  17. 根据权利要求16所述的终端设备,其特征在于,所述第一消息包括有物理随机接入信道掩码索引,所述物理随机接入信道掩码索引用于指示所述第一映射关系。
  18. 根据权利要求15所述的终端设备,其特征在于,所述收发单元,还用于接收第二消息,所述第二消息包括有所述第二映射关系。
  19. 根据权利要求13至18任意一项所述的终端设备,其特征在于,所述处理单元,还用于:
    若所述终端设备有多个待发起的网络切片业务,则根据网络切片业务的优先级在所述多个待发起的网络切片业务中确定发起所述第一网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中优先级最高的网络切片业务。
  20. 根据权利要求13至18任意一项所述的终端设备,其特征在于,所述处理单元,还用于:
    若所述终端设备有多个待发起的网络切片业务,则确定第三随机接入时频资源所对应的第一网络切片业务为发起的网络切片业务,其中,所述第三随机接入时频资源为位于第一时间点之后且距离第一时间点最近的随机接入时频资源,所述第一时间点为所述终端设备的MAC实体获取到发起随机接入的指令的时间点。
  21. 根据权利要求13至18任意一项所述的终端设备,其特征在于,所述处理单元,还用于:
    若所述终端设备有多个待发起的网络切片业务,则根据网络切片业务在预设时间段内所对应的随机接入时频资源的个数,确定发起所述第一网络切片业务为先发起的网络切片业务,其中,所述第一网络切片业务为所述多个待发起的网络切片业务中在预设时间段内所对应的随机接入时频资源的个数最多的网络切片业务。
  22. 根据权利要求13至21任意一项所述的终端设备,其特征在于,所述收发单元,还用于:
    接收第三消息,所述第三消息包括有第一配置信息和第二配置信息,所述第一配置信息用于指示网络切片业务对应的随机接入配置,所述第二配置信息用于指示默认切片业务对应的随机接入配置。
  23. 根据权利要求13至21任意一项所述的终端设备,其特征在于,所述处理单元还用于,若同时存在有待发起的网络切片业务以及默认切片业务,则统计网络切片业务随机接入的次数;
    所述收发单元还用于,若所述网络切片业务随机接入的次数达到预设次数,则停止所述网络切片业务的随机接入,以及发起所述默认切片业务的随机接入。
  24. 根据权利要求12至23任意一项所述的随机接入方法,其特征在于,所述处理单元还用于:若所述第一随机接入时频资源包括有不同的随机接入类型下的随机接入时频资源,则根据所述随机接入类型在所述第一随机接入时频资源中确定第二随机接入时频资源,所述第二随机接入时频资源为所述随机接入类型对应的随机接入时频资源;
    所述收发单元,还用于基于所述第二随机接入时频资源以及所述第一网络切片业务对应的随机接入类型发起随机接入。
  25. 一种终端设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序,其特征在于,所述处理器执行所述程序时实现权利要求1至12中任一项所述的方法。
  26. 一种计算机可读存储介质,其特征在于,当指令在计算机装置上运行时,使得所述计算机装置执行如权利要求1至12任一所述的方法。
PCT/CN2020/084596 2020-04-14 2020-04-14 一种随机接入方法及终端设备 WO2021207908A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN202080099807.9A CN115428483A (zh) 2020-04-14 2020-04-14 一种随机接入方法及终端设备
PCT/CN2020/084596 WO2021207908A1 (zh) 2020-04-14 2020-04-14 一种随机接入方法及终端设备
EP20931596.9A EP4124078A4 (en) 2020-04-14 2020-04-14 RANDOM ACCESS METHOD AND TERMINAL DEVICE
US17/965,577 US20230049532A1 (en) 2020-04-14 2022-10-13 Random access method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/084596 WO2021207908A1 (zh) 2020-04-14 2020-04-14 一种随机接入方法及终端设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/965,577 Continuation US20230049532A1 (en) 2020-04-14 2022-10-13 Random access method and terminal device

Publications (1)

Publication Number Publication Date
WO2021207908A1 true WO2021207908A1 (zh) 2021-10-21

Family

ID=78083710

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/084596 WO2021207908A1 (zh) 2020-04-14 2020-04-14 一种随机接入方法及终端设备

Country Status (4)

Country Link
US (1) US20230049532A1 (zh)
EP (1) EP4124078A4 (zh)
CN (1) CN115428483A (zh)
WO (1) WO2021207908A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3632156A4 (en) * 2017-06-02 2021-03-03 Fg Innovation Company Limited PROCEDURES, DEVICES AND SYSTEMS FOR SERVICE-DRIVEN MOBILITY MANAGEMENT

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572516A (zh) * 2016-09-28 2017-04-19 华为技术有限公司 一种网络切片选择方法、终端设备及网络设备
CN106851589A (zh) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 无线网络接入方法、装置及系统
CN110461027A (zh) * 2018-05-07 2019-11-15 华为技术有限公司 一种网络切片选择方法及装置
WO2020056736A1 (zh) * 2018-09-21 2020-03-26 Oppo广东移动通信有限公司 一种随机接入控制方法及装置、网络设备、终端
WO2020056721A1 (zh) * 2018-09-21 2020-03-26 Oppo广东移动通信有限公司 一种随机接入方法及装置、网络设备、终端

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107343306B (zh) * 2016-04-28 2019-03-22 中兴通讯股份有限公司 网络切片的选择方法及装置
CN107872884A (zh) * 2016-09-26 2018-04-03 电信科学技术研究院 一种随机接入资源分配和随机接入方法、设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572516A (zh) * 2016-09-28 2017-04-19 华为技术有限公司 一种网络切片选择方法、终端设备及网络设备
CN106851589A (zh) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 无线网络接入方法、装置及系统
CN110461027A (zh) * 2018-05-07 2019-11-15 华为技术有限公司 一种网络切片选择方法及装置
WO2020056736A1 (zh) * 2018-09-21 2020-03-26 Oppo广东移动通信有限公司 一种随机接入控制方法及装置、网络设备、终端
WO2020056721A1 (zh) * 2018-09-21 2020-03-26 Oppo广东移动通信有限公司 一种随机接入方法及装置、网络设备、终端

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CMCC: "Study on enhancement of RAN Slicing", 3GPP DRAFT; RP-192600, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. TSG RAN, no. Sitges, Barcelona; 20191209 - 20191212, 2 December 2019 (2019-12-02), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051834250 *
See also references of EP4124078A4 *

Also Published As

Publication number Publication date
EP4124078A1 (en) 2023-01-25
CN115428483A (zh) 2022-12-02
EP4124078A4 (en) 2023-04-26
US20230049532A1 (en) 2023-02-16

Similar Documents

Publication Publication Date Title
US11303343B2 (en) Method, terminal device, and network device for beam failure management and beam recovery
WO2019184956A1 (zh) 一种随机接入的方法及装置
WO2018127066A1 (zh) 一种上行测量信号的指示方法及装置
US20190140880A1 (en) Communication Method, Communications Apparatus, and Communications System
WO2020221318A1 (zh) 一种上行波束管理方法及装置
WO2020221223A1 (zh) 通信方法、装置和系统
US20220225425A1 (en) Random Access Method And Apparatus
WO2022037352A1 (zh) 一种信息传输方法和通信装置
JP2021517416A (ja) 信号伝送方法、ネットワーク装置及び端末装置
EP4167647A1 (en) Method and apparatus for accessing cell
US20230164723A1 (en) Communication method and apparatus
EP4221305A1 (en) Communication method and communication apparatus
JPWO2020031358A1 (ja) ユーザ装置及び送信方法
EP4152881A1 (en) Communication method and communication apparatus
US20240057127A1 (en) Pscch detection method and communication apparatus
US20230049532A1 (en) Random access method and terminal device
WO2020164527A1 (zh) 一种随机接入方法和装置
WO2021026929A1 (zh) 一种通信方法及装置
US20230074305A1 (en) Resource determining method, apparatus, and system
WO2020030008A1 (zh) 一种传输信号的方法和装置
WO2017156789A1 (zh) 基于设备到设备的通信方法和终端
WO2020258051A1 (zh) 小区接入的方法和设备
WO2022021996A1 (zh) 一种随机接入资源选择的方法以及相关装置
WO2019028922A1 (zh) 一种发送小区配置信息的方法及装置
US20240056926A1 (en) Communication method and apparatus for obtaining load information

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20931596

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020931596

Country of ref document: EP

Effective date: 20221021

NENP Non-entry into the national phase

Ref country code: DE