WO2021227983A1 - 一种信息传输的方法、装置及系统 - Google Patents

一种信息传输的方法、装置及系统 Download PDF

Info

Publication number
WO2021227983A1
WO2021227983A1 PCT/CN2021/092356 CN2021092356W WO2021227983A1 WO 2021227983 A1 WO2021227983 A1 WO 2021227983A1 CN 2021092356 W CN2021092356 W CN 2021092356W WO 2021227983 A1 WO2021227983 A1 WO 2021227983A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
random access
terminal device
terminal
access
Prior art date
Application number
PCT/CN2021/092356
Other languages
English (en)
French (fr)
Inventor
张铭
余政
张向东
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021227983A1 publication Critical patent/WO2021227983A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Definitions

  • This application relates to the field of communication technology, and in particular to a method, device and system for information transmission.
  • Massive machine type communication is a typical application scenario in the fifth-generation communication technology (new radio, NR), which is widely used in smart grids, smart transportation, environmental protection, government work, and public safety , Smart home, smart fire protection, industrial monitoring and personal health.
  • NR fifth-generation communication technology
  • During initial access many terminal devices may choose to access the cell at the same random access opportunity.
  • the load of the cell under the random access opportunity is heavier, most of the resources of the cell may have been allocated to terminal devices that have already been accessed, resulting in fewer remaining available resources in the cell. Therefore, if these terminal devices are still allowed to use the random access opportunity to access the cell, the cell may not be able to allocate resources for these newly accessed terminal devices. In this case, it is necessary to restrict the access of the terminal equipment.
  • the cell can only restrict the access of all terminal devices, for example, prohibiting all terminal devices from accessing the cell, or allowing all terminal devices to access the cell. Obviously, this method makes the terminal equipment less flexible in accessing the cell.
  • This application provides a method, device and system for information transmission according to one or more of the configuration indication information of the random access opportunity, the characteristic parameter and the association relationship between the terminal equipment, and the association relationship between the preamble resource and the terminal equipment Restrict the random access of terminal equipment.
  • the terminal equipment can access the network equipment according to the first method corresponding to it or not access the network equipment, thereby improving the flexibility of the terminal equipment to access the network equipment .
  • the access amount of the terminal device in the network device can also be balanced to achieve the purpose of balancing the network load.
  • this application provides a method for information transmission.
  • the method includes: a terminal device receives first information sent by a network device, the first information may include configuration indication information of a random access opportunity, and the terminal device according to the random access The configuration indication information of the opportunity determines the first method.
  • the first method is: whether the terminal device continues to access the network when the terminal device sends a random access request; or, the first method is: the terminal device does not send random access If requested, whether the terminal device performs random access.
  • each terminal device can use its own random access opportunity to access the network device or not to access the network device.
  • each terminal device may have its own first mode. For example, each terminal device may have its own random access opportunity, or some terminal devices may be connected to the network device and some devices may not be connected to the network device. Thus, each terminal device may have its own random access opportunity.
  • the random access of terminal equipment can be more flexible.
  • the terminal device receives the first information sent by the network device, and determines the first method according to whether the first information contains the configuration indication information of the random access opportunity.
  • the first method is: sending at the terminal device In the case of a random access request, whether the terminal device continues to access the network; or, the first method is: whether the terminal device performs random access when the terminal device does not send a random access request.
  • the terminal device may not access the network device, for example, the network device may not enable the configuration of the random access opportunity of the terminal device, or the terminal device may terminate Access to the network, or the terminal device may not perform random access.
  • the terminal device can access the network, for example, the network device enables the configuration of the random access opportunity of the terminal device, or the terminal device accesses the network, or the terminal device performs random access Access.
  • the first information does not contain the configuration indication information of the random access opportunity to instruct the terminal device not to access the network device, so that no additional resources are needed for the situation of not accessing the network device. , So as to achieve the purpose of saving network overhead.
  • the terminal device receives the second information sent by the network device.
  • the second information indicates the first mode of the terminal device associated with each of the one or more feature parameters.
  • the first mode is : When the terminal device sends a random access request, whether the terminal device continues to access the network; or, the first method is: whether the terminal device performs random access when the terminal device does not send a random access request.
  • the random access configuration of the terminal device associated with the characteristic parameter can be realized.
  • the random access of one or more groups of terminal devices can be restricted in the form of terminal device grouping. This method can be used in a more fine-grained manner. It is more flexible to configure the random access of each terminal device.
  • the terminal device receives the second information sent by the network device, and the second information indicates the first method of one or more terminal devices associated with the preamble resource.
  • the first method is: the terminal device sends a random In the case of an access request, whether the terminal device continues to access the network; or, the first method is: whether the terminal device performs random access when the terminal device does not send a random access request.
  • the terminal device since there is an association relationship between the terminal device and the preamble resource, by configuring the random access of each group of preamble resources, it is possible to configure the random access of the terminal device associated with the group of preamble resources.
  • the terminal devices can access the network equipment in the form of groups according to the random access configuration of the preamble resources they are associated with. Without access to the network equipment, in this way, the random access of the terminal equipment associated with different preamble resources can be configured in a more fine-grained and more flexible manner.
  • the terminal device may refer to a certain type of terminal device, for example, a reduced capacity (REDCAP) terminal device.
  • REDCAP reduced capacity
  • the network equipment can configure the random access of a certain type of terminal equipment, so that this type of terminal equipment can use the first method different from other types of terminal equipment to access the network equipment or not to access the network equipment, In order to improve the flexibility of random access of this type of terminal equipment.
  • the configuration indication information of the random access opportunity when the configuration indication information of the random access opportunity is in the first state, the configuration indication information of the random access opportunity may be used to indicate: disabling the configuration of the random access opportunity of the terminal device , Or terminate access to the network, or do not perform random access. Or, in the case where the configuration indication information of the random access opportunity is in the second state, the configuration indication information of the random access opportunity may be used to indicate: enable the configuration of the random access opportunity of the terminal device, or continue to access the network, Or do not perform random access.
  • the configuration indication information of the random access opportunity can be used to indicate that a certain type of terminal equipment is connected to the network equipment or not to the network. In this way, the random access of a type of terminal equipment can be restricted, and The random access of other types of terminal equipment may not be restricted to reduce the business impact on other types of terminal equipment.
  • the configuration indication information of the random access opportunity may also be used to indicate: the first information also contains one or more types
  • the configuration information of the random access opportunity of the characteristic parameter, the configuration information of the random access opportunity of each characteristic parameter includes one or more of the following parameters: the random access time corresponding to the terminal device associated with the characteristic parameter Domain resources, frequency domain resources for random access corresponding to the terminal equipment associated with the characteristic parameter, random access period corresponding to the terminal equipment associated with the characteristic parameter, and identification information of the characteristic parameter.
  • the configuration indication information of the random access opportunity may indicate in a bitmap manner that the first information includes the configuration information of the random access opportunity of L types of characteristic parameters. In this way, the terminal device can according to the supported characteristic parameters and the The first method is determined by the configuration indication information of the random access opportunity of the characteristic parameter, where L is an integer greater than 0.
  • the terminal device can initiate random access according to the random access opportunity of the characteristic parameter supported by itself.
  • the random access opportunities of the various characteristic parameters are configured to be different, each terminal device associated with the various characteristic parameters can also use different random access opportunities to access the network device, thereby helping to reduce the network load.
  • the characteristic parameters include one or more of the following parameters: service type, terminal type, system bandwidth, terminal bandwidth, power consumption level, power consumption requirements, beam identification, subcarrier spacing, frequency range , Frequency band, carrier, duplex type, peak rate, delay, mobility and modulation order.
  • the terminal device can be divided into multiple groups in one or more characteristic dimensions, so that the random access of the terminal device associated with various characteristic parameters can be restricted according to the grouping basis.
  • the first information when the configuration indication information of the random access opportunity is in the third state, the first information further includes quantity indication information of the characteristic parameters for configuring the random access opportunity, and the quantity indication information may include Bits, the bit status of these bits is used to indicate the value of L. Among them, N is an integer not less than L, and N is used to indicate the total number of characteristic parameters.
  • the terminal device can obtain from the first information The configuration information of the random access opportunity to the characteristic parameter supported by the oneself is used to access the network device at the random access opportunity.
  • the second information is downlink control information or medium access control information
  • the second information includes N bits
  • the N bits indicate each of the N characteristic parameters in a bitmap manner.
  • the first method of associating the terminal device for example, the value of one of the N bits is used to indicate that the terminal device associated with the characteristic parameter corresponding to the bit is allowed to access the network device, or one of the N bits
  • the value of the bit is used to indicate that the terminal device associated with the characteristic parameter corresponding to the bit is not allowed to access the network device.
  • the terminal device can determine the first mode according to the supported feature parameters and the second information.
  • each of the N bits can be used to indicate whether the terminal equipment associated with the corresponding characteristic parameter can access the network equipment. In this way, the terminal equipment associated with the N characteristic parameters can be respectively supported according to their respective support.
  • the random access configuration of the characteristic parameter is connected to the network device, but the same random access configuration may not be required, so that the flexibility is better.
  • the second information is random access response or uplink scheduling authorization information, and the second information indicates the first mode of terminal equipment belonging to a certain type. In this way, if the terminal equipment belongs to this type, it is based on the first method.
  • the indication of the second information determines the first way.
  • the second information may include 1 bit, and the value of this bit is used to indicate: the terminal device receiving the second information is allowed to access the network device, or the terminal receiving the second information is not allowed The device is connected to the network device.
  • a reserved bit in the random access response can be used to indicate whether a certain type of terminal device can access the network device. In this case, it can be indicated with less occupied resources, which is helpful Reduce network overhead.
  • the first way for the second information to indicate the terminal device associated with one or more preamble resources includes: determining X groups of preamble resources, and these X groups of preamble resources may be determined according to a predefined rule, It may also be determined by receiving network equipment signaling and configuring X groups of preamble resources according to the information indicated by the signaling, and each group of preamble resources includes at least one preamble index.
  • the terminal device determines the first mode of the terminal device according to the associated preamble resource and the second information.
  • the second information indicates the first method for the terminal equipment associated with each Y group of preamble resources.
  • the value of Y is a configuration or a predefined integer. In this way, the terminal equipment is based on the Y to which the associated preamble resource belongs.
  • the group preamble resource and the second information determine the first mode of the terminal device. In this way, the network device can restrict the access capability of the terminal device associated with the preamble resource by restricting the random access of the preamble resource.
  • the signaling and/or the second information also includes the association relationship between the preamble resource and the characteristic parameter
  • the terminal device determines the first terminal device's first according to the association relationship between the preamble resource and the characteristic parameter and the supported characteristic parameters.
  • the terminal device can select the preamble index from the preamble resources corresponding to the supported characteristic parameters for random access. Since one preamble index can support the access of one terminal device, this situation can also be used for each characteristic parameter.
  • the number of terminal devices that can access the network device is limited, so that the number of terminal devices associated with various characteristic parameters is more balanced.
  • the terminal device determines to terminate access to the network device, or the terminal device determines not to perform random access
  • the terminal device starts the first timer, and after the duration of the first timer reaches the preset duration , The terminal device reconnects to the network device, or the terminal device reconnects randomly.
  • the preset duration of the first timer is determined according to a predefined rule, or configured by a network device.
  • the network device can adjust the time limit for the terminal device to access. If the preset time is set to a small value, the terminal device can re-connect after the preset time period is exceeded. This can also prevent the terminal device from being too long. The situation that the network equipment cannot be accessed within a period of time can avoid long-term congestion of the terminal equipment's business.
  • the first information is the main system information block, system information block or dedicated radio resource control information
  • the second information is system information, radio resource control information, random access response, medium access control information , Downlink control information, uplink scheduling authorization information or Msg4.
  • this application can configure the random access of the terminal device before the random access starts, and can also restrict the random access of the terminal device before the successful access after the random access starts, and it can also configure the random access of the terminal device before the random access starts. After entering, the next random access is configured, so the information transmission method in this application can be applied to each period of random access.
  • the first information may further include configuration indication information of the random access mode. If the bit state of the configuration indication information of the random access mode is the fourth state, it indicates that the terminal device is not allowed to access the network device. Or, if the bit state of the configuration indication information of the random access mode is the fifth state, it indicates that the random access mode of the terminal device is random access type 1. Or, if the bit state of the configuration indication information of the random access mode is the sixth state, it indicates that the random access mode of the terminal device is random access type 2. Or, if the bit state of the configuration indication information of the random access mode is the seventh state, it indicates that the random access mode of the terminal device is random access type 1 or random access type 2.
  • the network device can set the terminal device's random access mode for the terminal device's business urgency. If the terminal device's business is more urgent, it can be set to random access type 2. If the terminal device's business is not urgent, you can Set to random access type 1. In this way, because the random access type 2 is faster than the random access type 1, it can enable terminal devices with more urgent services to access network devices in a timely and rapid manner.
  • the present application provides an information transmission device, the device may be a terminal device, and the device includes:
  • a transceiver unit configured to receive first information sent by a network device, where the first information includes configuration indication information of a random access opportunity;
  • the processing unit is configured to determine the first mode according to the configuration indication information of the random access opportunity.
  • the first method is one of: accessing network equipment, not accessing network equipment, performing random access, and not performing random access.
  • the transceiving unit is further configured to receive the first information sent by the network device; the processing unit is further configured to determine whether the first information contains configuration indication information of random access opportunities Determine the first way.
  • the transceiver unit is further configured to receive second information sent by a network device, and the second information is used to indicate the terminal device associated with each of the one or more characteristic parameters The first mode; the processing unit is further configured to determine the first mode according to the second information.
  • the transceiver unit is further configured to receive second information sent by a network device, where the second information is used to indicate the first mode of the terminal device associated with one or more preamble resources;
  • the processing unit is further configured to determine the first mode according to the second information.
  • the configuration indication information of the random access opportunity is used to indicate at least one of the following: disabling the configuration of the random access opportunity of the terminal device, and enabling the random access of the terminal device Opportunity configuration, termination of access to the network equipment, continued access to the network equipment, no random access, random access, the first information also includes one or more characteristic parameters of random access opportunity configuration information.
  • the first information does not include the configuration indication information of the random access opportunity.
  • the processing unit is specifically configured to: determine that the first method is not accessing the network device or not performing random access.
  • the first information includes configuration indication information of the random access opportunity.
  • the processing unit is specifically configured to determine that the first method is to access network equipment or perform random access.
  • the configuration indication information of the random access opportunity indicates in a bitmap manner that the first information includes the configuration information of the random access opportunity with one or more characteristic parameters.
  • the processing unit is specifically configured to determine the first mode according to the supported feature parameters and the configuration indication information of the random access opportunity.
  • the second information is downlink control information or medium access control information
  • the second information includes N bits
  • the N bits indicate N characteristics in a bitmap manner.
  • the processing unit is specifically configured to determine the first mode according to the supported feature parameters and the second information.
  • the second information is random access response or uplink scheduling authorization information
  • the second information indicates the first mode of the terminal device.
  • the processing unit is specifically configured to: determine the first mode according to an indication of the second information.
  • the second information includes X bits, and the X bits indicate the first manner of the terminal device associated with each group of preamble resources in a bitmap manner.
  • the processing unit is specifically configured to determine X groups of preamble resources, and determine the first mode according to the associated preamble resources and the second information.
  • the X groups of preamble resources are determined according to a predefined rule or receive signaling from a network device, and the signaling is used to configure the X groups of preamble resources.
  • the X is an integer greater than 0 and not greater than 64.
  • the second information indicates the first manner of terminal devices associated with each Y group of preamble resources.
  • the processing unit is specifically configured to determine the first mode according to the Y group of preamble resources to which the associated preamble resources belong and the second information.
  • the value of Y is a configured or predefined integer.
  • the X groups of leading resources are associated with characteristic parameters.
  • the processing unit is specifically configured to determine the first mode according to the association relationship between the X groups of preamble resources and characteristic parameters and the supported characteristic parameters.
  • the processing unit is further configured to: determine not to access the network device or not to perform random access, and start the first timer.
  • the duration of the first timer is determined according to a predefined rule, or is configured by the network device.
  • the first information is a main system information block, a system information block, or dedicated radio resource control information.
  • the second information is one or more of the following information: system information, radio resource control information, random access response, medium access control information, downlink control information, uplink scheduling authorization Information, Msg4.
  • the characteristic parameter is one or more of the following parameters: service type, terminal type, system bandwidth, terminal bandwidth, power consumption level, power consumption requirement, beam identification, subcarrier spacing, Frequency range, frequency band, carrier, duplex type, peak rate, delay, mobility, modulation order, etc.
  • the present application provides a device for information transmission.
  • the device may be a network device, and the device includes:
  • the transceiver unit is configured to send first information to a terminal device, where the first information includes configuration indication information of a random access opportunity, and the first information is used by the terminal device according to the configuration indication information of the random access opportunity Determine the first way;
  • the processing unit is configured to allow the terminal device to access when the first information or the second information indicates that the terminal device accesses the network device or performs random access.
  • the first method is one of accessing network equipment, not accessing network equipment, performing random access, and not performing random access.
  • the transceiver unit is further configured to send first information to the terminal device, and the first information is used by the terminal device according to whether the first information includes a random access opportunity configuration
  • the instruction information determines the first method.
  • the transceiver unit is further configured to send second information to the terminal device, where the second information is used to indicate the status of the terminal device associated with each of the one or more characteristic parameters.
  • the second information is used by the terminal device to determine the first way.
  • the transceiving unit is further configured to send second information to the terminal device, and the second information is used to indicate the first mode of the terminal device to which one or more preamble resources are associated.
  • the second information is used by the terminal device to determine the first mode.
  • the configuration indication information of the random access opportunity is used to indicate at least one of the following: disabling the configuration of the random access opportunity of the terminal device, and enabling the random access of the terminal device Opportunity configuration, termination of access to the network equipment, continued access to the network equipment, no random access, random access, the first information also includes one or more characteristic parameters of random access opportunity configuration information.
  • the first information does not include the configuration indication information of the random access opportunity, and the first information is used to indicate that the first method is not to access the network device or not to perform random access. Access.
  • the first information includes configuration indication information of the random access opportunity, and the first information is used to indicate that the first method is to access a network device or perform random access.
  • the configuration indication information of the random access opportunity indicates in a bitmap manner that the first information includes the configuration information of the random access opportunity with one or more characteristic parameters.
  • the configuration indication information of the random access opportunity is used by the terminal device to determine the first mode according to the supported feature parameters and the configuration indication information of the random access opportunity.
  • the second information is downlink control information or medium access control information
  • the second information includes N bits
  • the N bits indicate N characteristics in a bitmap manner.
  • the first manner of the terminal device associated with each characteristic parameter in the parameters, and the second information is used by the terminal device to determine the first manner according to the supported characteristic parameter and the second information.
  • the second information is random access response or uplink scheduling authorization information
  • the second information indicates the first mode of the terminal device
  • the second information is used by the terminal device according to the The indication of the second information determines the first mode.
  • the transceiving unit is further configured to send signaling to the terminal device, where the signaling is used to configure X groups of preamble resources, and the second information includes X bits, and the X The bits indicate the first manner of the terminal device associated with each group of preamble resources in a bitmap manner, and the second information is used by the terminal device to determine the first manner according to the associated preamble resources and the second information.
  • the X is an integer greater than 0 and not greater than 64.
  • the transceiving unit is further configured to: the second information indicates the first manner of the terminal device associated with each Y group of preamble resources, and the second information is used by the terminal device according to the associated The Y group of preamble resources to which the preamble resource belongs and the second information determine the first mode.
  • the value of Y is a configured or predefined integer.
  • the X groups of leading resources are associated with characteristic parameters.
  • the association relationship between the X groups of preamble resources and the characteristic parameters is used by the terminal device to determine the first mode according to the association relationship between the X groups of preamble resources and the characteristic parameters and the supported characteristic parameters.
  • the processing unit is further configured to: determine not to access the network device or not to perform random access, and start the first timer.
  • the duration of the first timer is determined according to a predefined rule, or is configured by the network device.
  • the first information is a main system information block, a system information block, or dedicated radio resource control information.
  • the second information is one or more of the following information: system information, radio resource control information, random access response, medium access control information, downlink control information, uplink scheduling authorization Information, Msg4.
  • the characteristic parameter is one or more of the following parameters: service type, terminal type, system bandwidth, terminal bandwidth, power consumption level, power consumption requirement, beam identification, subcarrier spacing, Frequency range, frequency band, carrier, duplex type, peak rate, delay, mobility, modulation order, etc.
  • the present application provides an information transmission device, including a processor and a communication interface, where the communication interface is used to receive signals from other communication devices other than the information transmission device described in the third aspect and transmit To the processor or to send the signal from the processor to other communication devices other than the information transmission device described in the third aspect, the processor is used to implement logic circuits or executing code instructions as described in any one of the first aspect. The method described.
  • the present application provides an information transmission device, including a processor and a communication interface, wherein the communication interface is used to receive signals from other communication devices other than the information transmission device described in the fourth aspect and transmit To the processor or to send the signal from the processor to other communication devices other than the information transmission device described in the fourth aspect, the processor is used to implement the logic circuit or execute code instructions to implement any one of the second aspect The method described.
  • the present application provides an information transmission device, including a processor, the processor is connected to a memory, the memory is used to store a computer program, and the processor is used to execute the computer program stored in the memory, So that the device executes the method according to any one of the above-mentioned first aspects.
  • the present application provides an information transmission device, including a processor, the processor is connected to a memory, the memory is used to store a computer program, and the processor is used to execute the computer program stored in the memory, So that the device executes the method according to any one of the above-mentioned second aspects.
  • the present application provides a computer-readable storage medium that stores a computer program, and when the computer program is executed, the method according to any one of the above-mentioned first aspects is implemented.
  • the present application provides a computer-readable storage medium that stores a computer program, and when the computer program is executed, the method according to any one of the above-mentioned second aspects is implemented.
  • the present application provides a chip including a processor and an interface; the processor is configured to read instructions to execute the information transmission method according to any one of the above-mentioned first aspects.
  • the present application provides a chip including a processor and an interface; the processor is configured to read instructions to execute the information transmission method according to any one of the second aspects.
  • the embodiments of the present application provide a computer program product, the computer program product is used to store a computer program, when the computer program runs on a computer, the computer executes any of the above-mentioned first aspect Or execute any of the methods described in the second aspect above.
  • this application provides a system that includes a terminal device and a network device.
  • the terminal device can be used to execute any one of the above-mentioned first aspect or the first aspect
  • the network device can be used to execute Any one of the above-mentioned second aspect or the second aspect.
  • FIG. 1 is a schematic diagram of a possible system architecture to which an embodiment of this application is applicable;
  • Figure 2 exemplarily shows a schematic diagram of an access process of random access type 1
  • Fig. 3 exemplarily shows a schematic diagram of an access process of random access type 2
  • Fig. 4 exemplarily shows a schematic flowchart of an information transmission method provided by an embodiment of the present application
  • FIG. 5 exemplarily shows a schematic flowchart of another information transmission method provided by an embodiment of the present application.
  • Fig. 6 exemplarily shows configuration information of random access opportunities with two characteristic parameters
  • Fig. 7 exemplarily shows configuration information of random access opportunities with two characteristic parameters
  • FIG. 8 exemplarily shows a schematic flowchart of another information transmission method provided by an embodiment of the present application.
  • FIG. 9 exemplarily shows a schematic flowchart of an information transmission method provided by an embodiment of the present application.
  • FIG. 10 exemplarily shows a schematic flowchart of yet another information transmission method provided by an embodiment of the present application.
  • FIG. 11 exemplarily shows a schematic flowchart of another information transmission method provided by an embodiment of the present application.
  • FIG. 12 exemplarily shows a schematic flowchart of another information transmission method provided by an embodiment of the present application.
  • FIG. 13 exemplarily shows a schematic flowchart of another information transmission method provided by an embodiment of the present application.
  • FIG. 14 exemplarily shows a schematic structural diagram of an information transmission apparatus provided by an embodiment of the present application.
  • FIG. 15 exemplarily shows a schematic structural diagram of another information transmission apparatus provided by an embodiment of the present application.
  • FIG. 16 exemplarily shows a schematic diagram of another information transmission apparatus provided by an embodiment of the present application.
  • At least one means one or more, and “plurality” means two or more.
  • “And/or” describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
  • "The following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
  • at least one item (a) of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • ordinal numbers such as "first" and "second” mentioned in the embodiments of this application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects. degree.
  • the first information and the second information are only for distinguishing different information, but do not indicate the difference in priority or importance of the two information.
  • FIG. 1 is a schematic diagram of a possible system architecture to which an embodiment of this application is applicable.
  • the system architecture shown in Figure 1 includes network equipment and terminal equipment.
  • the embodiments of the present application do not limit the number of network devices and the number of terminal devices in the system architecture, and the system architecture to which the embodiments of the present application are applicable may include other devices in addition to network devices and terminal devices, such as Core network equipment, wireless relay equipment, and wireless backhaul equipment, etc., are not limited in this embodiment of the present application.
  • the network device in the embodiment of the present application may integrate all functions in one independent physical device, or may distribute the functions on multiple independent physical devices, which is not limited in the embodiment of the present application.
  • the terminal device in the embodiment of the present application may be connected to the network device in a wireless manner.
  • 5G or new radio (NR) communication systems
  • 6G communication systems long term evolution (LTE) systems
  • GSM Global system of mobile communication
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • general packet radio service general packet radio service
  • FDD frequency division duplex
  • TDD time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX worldwide interoperability for microwave access
  • the terminal device in the embodiment of the present application may be a device that provides voice and/or data connectivity to a user, for example, may include a handheld device with a wireless connection function, or a processing device connected to a wireless modem.
  • the terminal device can communicate with the core network via a radio access network (RAN), and exchange voice and/or data with the RAN.
  • RAN radio access network
  • the terminal equipment may include user equipment (UE), wireless terminal equipment, mobile terminal equipment, device-to-device communication (device-to-device, D2D) terminal equipment, vehicle to everything (V2X) terminal equipment , Machine-to-machine/machine-type communications (M2M/MTC) terminal equipment, Internet of things (IoT) terminal equipment, subscriber unit, subscriber station (subscriber) station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user Agent (user agent), or user equipment (user device), etc.
  • UE user equipment
  • M2M/MTC Machine-to-machine/machine-type communications
  • IoT Internet of things
  • subscriber unit subscriber station (subscriber) station)
  • mobile station mobile station
  • remote station remote station
  • access point access point
  • AP remote terminal
  • remote terminal remote terminal
  • access terminal access terminal
  • user terminal user terminal
  • user Agent
  • it may include mobile phones (or “cellular” phones), computers with mobile terminal equipment, portable, pocket-sized, hand-held, mobile devices with built-in computers, and so on.
  • PCS personal communication service
  • PCS cordless phones
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistants
  • restricted devices such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities. Examples include barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), laser scanners and other information sensing equipment.
  • RFID radio frequency identification
  • GPS global positioning system
  • laser scanners and other information sensing equipment.
  • each characteristic parameter may include at least one parameter and a parameter value range corresponding to the at least one parameter.
  • a characteristic parameter if the parameter value of the terminal device under each parameter included in the characteristic parameter satisfies the parameter value range corresponding to each parameter in the characteristic parameter, the terminal device is associated with the characteristic parameter, This kind of characteristic parameter is called the characteristic parameter supported by the terminal device.
  • each characteristic parameter may include one parameter or multiple parameters among the following parameters:
  • Terminal type service type, system bandwidth, terminal bandwidth, power consumption level, power consumption requirements, beam identification, subcarrier spacing, frequency range, frequency band, carrier, duplex type, peak rate, delay, mobility, modulation order Wait.
  • the terminal type may include reduced capacity (REDCAP) terminal equipment, traditional terminal equipment, V2X terminal equipment, and so on.
  • REDCAP terminal equipment is also called restricted equipment. Because REDCAP terminal equipment has lower complexity and smaller bandwidth occupancy capacity, REDCAP terminal equipment has better competitiveness than ordinary terminal equipment.
  • REDCAP terminal equipment can be mainly used in mMTC scenarios. In order to better serve people's lives, a large number of REDCAP terminal devices will be set up in the mMTC scenario. In this case, it is very likely that a large number of REDCAP terminal devices will choose the same random access opportunity to access the cell. However, the resources of the cell are limited.
  • the cell may be overloaded in a certain period of time.
  • the terminal device in this application mainly refers to the REDCAP terminal device, and this application is used to restrict the random access of the REDCAP terminal device.
  • the business type can refer to the business type of the REDCAP terminal equipment in the mMTC scenario, for example, it can include the industrial wireless sensor network (industry wireless sensor network, IWSN) type, camera type, wearable type and video surveillance type, etc.
  • the fixed service types can of course also include not limited service types.
  • the type of video surveillance may include, for example, a monitor used to monitor traffic conditions, a camera used to monitor people entering and leaving the community, and an alarm used to monitor criminal behavior.
  • Industrial wireless sensor types for example, can include electromagnetic sensors, temperature sensors, humidity sensors, noise sensors, light intensity sensors, pressure sensors, and operating sensors.
  • the type of wearable device can refer to a wearable device with a relatively single function, for example, it can include a bracelet that can only monitor the heartbeat, a bracelet that can only calculate the number of exercise steps, and a watch that can only time.
  • the system bandwidth may refer to the bandwidth frequency band supported by the terminal device. For example, if the bandwidth frequency band supported by the terminal device is not greater than 100 megahertz (megahertz, MHz), the system bandwidth of the terminal device is considered to be a low frequency band. If the bandwidth frequency band supported by the terminal device is greater than 100MHz and not greater than 400MHz, the system bandwidth of the terminal device is considered to be a high frequency band.
  • 100 megahertz megahertz
  • the terminal bandwidth can refer to the bandwidth that the terminal device can occupy for data transmission.
  • the terminal device can be divided into terminal devices with MAX BW equal to 5 megahertz (megahertz, MHz), and MAX BW equal to 10MHz terminal equipment and MAX BW equal to 20MHz terminal equipment.
  • the power consumption level can refer to the energy level consumed by the terminal device in a unit of time. For example, it can be divided into high power consumption level (unit power consumption greater than 400W) terminal equipment, medium power consumption level (unit power consumption greater than 200W and not greater than 400W) terminal equipment and low power consumption (unit power consumption is not more than 10W) terminal equipment.
  • Power consumption requirements can refer to the degree of power consumption required by terminal equipment to perform services.
  • terminal equipment can be divided into terminal equipment with high power consumption requirements and terminal equipment with low power consumption requirements according to power consumption requirements, and terminals with high power consumption requirements
  • the unit power consumption required by the equipment to perform services is not less than 200W, and the unit power consumption required for terminal devices with low power consumption requirements to perform services is not higher than 200W.
  • the beam identifier indicates the beams of different shapes or different directions received by the terminal device.
  • Carrier can refer to a radio wave of a specific frequency, which is an electromagnetic wave modulated in frequency, amplitude or phase to transmit speech, audio, image or other signals.
  • Different terminal devices can support different carriers. According to the carriers, terminal devices can be divided into terminal devices of different carrier types.
  • the subcarrier spacing may refer to the frequency spacing between two adjacent subcarriers.
  • 5G NR can support different types of subcarrier spacing.
  • a subcarrier spacing may take a value between 15kHz and 240kHz.
  • the symbol length is 1/15us
  • a slot has 14 symbols and 14 cyclic prefixes, so the length of the slot can be 1ms.
  • the subcarrier spacing is 30kHz
  • the symbol length is 1/30us
  • each slot is 0.5ms.
  • the subcarrier spacing is 120khz
  • the symbol length is 1/120us, and each time slot is 0.125ms.
  • Frequency range (FR) or frequency range can refer to the frequency range that the terminal device can receive.
  • the frequency range can be divided into FR1 and FR2.
  • the frequency range of FR1 is 450MHz ⁇ 6GHz, and the frequency of FR2
  • the range is 24GHz ⁇ 52GHz.
  • the duplex type can refer to whether the terminal device supports the ability to send and receive signals at the same time in the case of frequency division duplex (FDD). It can mainly include half-duplex FDD and full duplex. Full-duplex FDD (full-duplex FDD) two capabilities. Among them, half-duplex FDD means that the terminal device does not support simultaneous signal transmission and reception, that is, the terminal supports time-division reception and transmission of signals, and full-duplex FDD means that the terminal device supports simultaneous transmission and reception of signals.
  • FDD frequency division duplex
  • the peak rate can refer to the maximum transmission rate achievable by the terminal device. Under the same network state, the peak rate of a terminal device with a good software configuration and/or hardware configuration is compared with that of a terminal device with a poor software configuration and/or hardware configuration. The peak rate is higher. According to the peak rate, terminal equipment can be divided into terminal equipment with a peak rate greater than 100M/s, terminal equipment with a peak rate not greater than 100M/s and greater than 150M/s, and terminal equipment with a peak rate greater than 150M/s and not greater than 300M/s .
  • Delay can refer to the data transmission delay of the terminal device. Under the same network state, the delay of a terminal device with a good software configuration and/or hardware configuration is compared with that of a terminal device with a poor software configuration and/or hardware configuration. Extension is shorter. According to experiments, terminal devices can be divided into terminal devices with a delay greater than the first duration, terminal devices with a delay not greater than the first duration and greater than the second duration, and terminal devices with a delay not greater than the second duration and greater than the third duration. Among them, the first duration ⁇ the second duration ⁇ the third duration.
  • Mobility can refer to the mobility of terminal devices.
  • terminal devices can be divided into terminal devices with a fixed location, terminal devices with a location movement frequency less than the first frequency, and terminal devices with a location movement frequency not less than the first frequency.
  • the modulation order may refer to the maximum modulation order of the terminal device, that is, the order corresponding to the maximum quadrature amplitude modulation (MAXQAM).
  • terminal equipment can be divided into terminal equipment with a maximum modulation order not greater than 16 quadrature amplitude modulation (QAM), terminal equipment with a maximum modulation order greater than 16QAM and not greater than 64QAM, and a maximum modulation order Terminal equipment not greater than 64QAM and greater than 256QAM.
  • the characteristic parameters may also include other parameter value ranges corresponding to the above parameters, or may also include other parameters, such as antennas.
  • Quantity, processing time, reliability requirements for example, the maximum block error rate or maximum bit error rate required by the terminal device
  • SUL supplementary uplink
  • CA carrier aggregation
  • the CA capability may refer to the maximum number of carriers that the terminal device can support when the terminal supports CA.
  • each characteristic parameter may include only one parameter among the above-mentioned parameters and the parameter value range corresponding to the parameter.
  • Table 1 exemplarily shows the association relationship table between the characteristic parameter and the terminal device when the characteristic parameter only includes the service type parameter:
  • the characteristic parameter 1 is used for the terminal equipment whose associated service type is the industrial wireless sensor network type;
  • the characteristic parameter 2 is used for the terminal equipment whose associated service type is the video surveillance type;
  • the characteristic parameter 3 is used for the terminal device whose service type is the wearable device type.
  • each characteristic parameter may include at least two parameters among the above-mentioned parameters and a parameter value range corresponding to the at least two parameters.
  • Table 2 exemplarily shows the association relationship table between the characteristic parameter and the terminal device when the characteristic parameter includes the three parameters of terminal bandwidth, mobility, and service type:
  • the characteristic parameters include the three parameters of terminal bandwidth, mobility and service type:
  • Characteristic parameter 1 is used for association: fixed equipment with MAX BW equal to 5MHz in the IWSN service type;
  • Characteristic parameter 2 is used for association: fixed equipment with MAX BW equal to 10MHz in the IWSN service type;
  • Characteristic parameter 3 is used for association: fixed equipment with MAX BW equal to 20MHz in the camera service type;
  • Characteristic parameter 4 is used for association: a mobile device with MAX BW equal to 20MHz in the camera service type, and the mobile frequency is not less than the first frequency;
  • Characteristic parameter 5 is used for association: In the wearable service type, MAX BW is equal to 20MHz, and the mobile frequency is not less than the first frequency.
  • the characteristic parameter when the characteristic parameter includes multiple parameters and the parameter value ranges corresponding to the multiple parameters, it is not necessary to divide the terminal devices of the same parameter value range corresponding to the same parameter into a group, but can use multiple parameters.
  • Two parameters and the parameter value ranges corresponding to multiple parameters are randomly combined. For example, in Table 1, only terminal devices whose service type belongs to IWSN can be grouped into one group, but in Table 2, terminal devices whose service type belongs to IWSN can also be grouped according to the maximum terminal bandwidth and divided into Terminal equipment with MAX BW equal to 5MHz and terminal equipment with MAX BW equal to 10MHz. In this way, terminal devices can be grouped at a finer granularity, which facilitates subsequent configuration of random access opportunities for each group of terminal devices by configuring random access opportunities corresponding to various characteristic parameters.
  • At least one parameter included in each characteristic parameter and the parameter value range corresponding to the at least one parameter can be pre-configured.
  • the terminal device is configured inside the terminal device when it leaves the factory, or it can be issued by the network device. Terminal Equipment. In the latter way, even if the characteristic parameter associated with the terminal device has been configured before, the network device can update the terminal device associated with the characteristic parameter at any time according to actual needs, thereby improving the real-time performance of random access.
  • the network equipment in the embodiment of the present application may include multiple types, for example, including access network (access network, AN) equipment, such as a base station (e.g., access point), which may refer to the access network through one or more air interfaces.
  • the base station can be used to convert received air frames and Internet Protocol (IP) packets into each other, and act as a router between the terminal device and the rest of the access network, where the rest of the access network can include an IP network.
  • IP Internet Protocol
  • it includes a road side unit (RSB).
  • the RSB may be a fixed infrastructure entity that supports V2X applications, and can exchange messages with other entities that support V2X applications.
  • the network equipment can also coordinate the attribute management of the air interface.
  • the network equipment may include the LTE system or the evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in the long term evolution-advanced (LTE-A), or may also include the fifth-generation mobile Communication technology (the 5 th generation, 5G) new radio (new radio, NR) system next generation node B (next generation node B, gNB) or can also include cloud access network (cloud radio access network, Cloud RAN)
  • the centralized unit (centralized unit, CU) and distributed unit (distributed unit, DU) in the system are not limited in the embodiment of the present application.
  • the terminal equipment is connected to the network equipment.
  • the terminal device accessing the network device in the embodiment of the present application refers to the cell covered by the terminal device accessing the network device, for example, the terminal device accessing the cell covered by a base station.
  • a cell is an area that provides users with wireless communication services and is the basic unit of a wireless network.
  • NR is to add NR cell resources through MML commands ADD NRCELL and ADD NRDUCELL.
  • Random access type 1 refers to the terminal device accessing the network device after the four-way handshake between the terminal device and the network device, which is a competitive access method.
  • Random access type 2 refers to a two-step handshake between the terminal device and the network device and the terminal device accesses the network device, which is a non-competitive access method.
  • the existing procedures of random access type 1 and random access type 2 are respectively introduced below.
  • Fig. 2 exemplarily shows a schematic diagram of an access process of random access type 1. As shown in Fig. 2, the process includes:
  • the first handshake (msg1) is used for the terminal device to send a random access request to the network device, including the following steps:
  • Step 201 The terminal device obtains the synchronization signal block (synchronization signals block, SSB) of the cell to be accessed from the physical broadcast channel (PBCH) of the cell to be accessed to establish a downlink with the cell to be accessed Synchronize.
  • PBCH physical broadcast channel
  • the SSB of the cell to be accessed is periodically sent on the PBCH of the cell to be accessed by the network equipment that manages the cell to be accessed.
  • the SSB includes the master information block (MIB).
  • the MIB carries the index of this random access opportunity and the physical downlink control channel (physical downlink control channel) that carries the first downlink control information (DCI).
  • DCI downlink control information
  • Channel, PDCCH time domain resources and frequency domain resources may also carry the modulation and coding mode of the first DCI.
  • the first DCI is used to schedule a system information block (dystem information block, SIB) of the cell to be accessed.
  • SIB system information block
  • Step 202 The terminal device obtains the first DCI from the PDCCH according to the time domain resource and the frequency domain resource of the PDCCH obtained by parsing the MIB, and the modulation and coding mode of the first DCI.
  • the first DCI carries the time domain resources and frequency domain resources of the physical downlink shared channel (PDSCH) carrying the SIB of the cell to be accessed, and may also carry the modulation and coding mode of the SIB of the cell to be accessed. .
  • PDSCH physical downlink shared channel
  • Step 203 The terminal device obtains the SIB of the cell to be accessed from the PDSCH according to the time domain resource and the frequency domain resource of the PDSCH obtained by analyzing the first DCI, and the modulation and coding scheme of the SIB.
  • the SIB includes system information that the terminal device needs to know before accessing the cell to be accessed, such as a preamble index list, a random access opportunity list, and transmission power.
  • the preamble index list includes at most 64 preamble indexes.
  • the random access opportunity list includes each random access opportunity index and the corresponding relationship between each random access opportunity.
  • Step 204 The terminal device randomly selects a preamble index from the preamble index list as the preamble index corresponding to this random access, and selects from the random access opportunity list according to the opportunity index of this random access in the MIB The random access opportunity corresponding to the opportunity index is used as the random access opportunity corresponding to this random access.
  • Step 205 The terminal device sends a random access request to the network device at the random access opportunity corresponding to this random access, and the random access request includes the preamble index corresponding to this random access.
  • terminal devices that have obtained the same opportunity index can correspond to the same random access opportunity, so that the random access request is sent to the network device at the same random access opportunity.
  • different terminal devices may also randomly select the same preamble index. In this way, the random access requests sent by these terminal devices can carry the same preamble index, and one preamble index can only support one terminal device. Access the cell to be accessed.
  • the second-step handshake (msg2) is used by the network device to send a random access response to the terminal device, including the following steps:
  • Step 211 The network device scrambles the second DCI using the radio network temporary identity (RA-RNTI) of each random access request received, and sends the scrambled second DCI to the to-be-accessed On the PDCCH channel of the cell.
  • RA-RNTI radio network temporary identity
  • Step 212 The terminal device obtains and descrambles the second DCI from the PDCCH channel of the cell to be accessed according to the RA-RNTI of the sent random access request.
  • the second DCI carries the time domain resources and frequency domain resources of the PDSCH channel carrying the medium access control layer protocol data unit (MAC PDU), and may also carry the modulation of the MAC PDU. Encoding.
  • the terminal device obtains the MAC PDU from the PDSCH channel according to the time domain resources and frequency domain resources of the PDSCH channel carrying the MAC PDU, and the modulation and coding mode of the MAC PDU.
  • MAC PDU medium access control layer protocol data unit
  • MAC PDU can be composed of multiple media access control layer protocol data unit sub-headers MAC subPDU, and the number of bits contained in one MAC subPDU can be a multiple of 8, such as 8, 16, 24, ... 8*n, n is a positive integer.
  • a MAC subPDU can include one of the following:
  • Backoff indicator (backoff indicator, BI): Contains 2 bits and is used to indicate the range of time that a terminal device that has failed random access needs to wait for resending a random access request.
  • the random access failure means that the terminal device does not receive the corresponding random access response, or the terminal device determines that the contention resolution fails.
  • the terminal device can re-initiate the random access request according to the time range indicated by the BI, for example, randomly select a time between 0 and the time indicated by the BI, and re-initiate the random access request after this time;
  • Random access preamble identifier refers to the identifier of the preamble index carried in the random access request.
  • RAPID refers to the identifier of the preamble index carried in the random access request. The case that only RAPID is carried in the MAC subPDU is for a non-random access scenario, and this application does not specifically introduce it.
  • RAR refers to the random access response corresponding to the random access request identified by the preamble index as RAPID.
  • the terminal equipment that selects the same preamble index can receive the same Random access response.
  • the RAR may carry timing correction information, uplink scheduling authorization information UR-grand, and cell-radio network temporary identifier (TC-RNTI), and may also reserve a 1-bit reserved bit.
  • UR-grand is used to indicate the uplink scheduling resources of the terminal equipment, for example, including time domain resources and frequency domain resources when the terminal equipment performs uplink scheduling, and a reserved bit of 1 bit is also reserved in the UR-grand , The reserved bit is also called the CSI request field.
  • the MAC PDU is further explained: Assume that the network device receives 50 random access requests, and determines that 20 random access requests are allowed to access (assuming the preamble index carried by the 20 random access requests) Are not the same), the other 30 random access requests are not allowed to access, the MAC PDU may contain the following content:
  • One MAC subPDU is used to carry BI, which is used to indicate the time range for other 30 terminal devices to resend random access requests;
  • 20 MAC subPDUs are used to carry RAPID and RAR, and the RAR in each MAC subPDU is used to indicate the resource information of the terminal device indicated by the RAPID in the MAC subPDU for uplink scheduling.
  • the number of MAC subPDUs used to carry RAR in the MAC PDU may be less than 20 indivual.
  • the terminal device can determine whether there is a second MAC subPDU in the 20 second MAC subPDUs that contains the corresponding RAPID according to the RAPID of the random access request carried in the random access request sent by the terminal device If yes, the terminal device can obtain the RAR from the second MAC subPDU to continue to access the cell to be accessed.
  • the terminal device can obtain the BI from the first MAC subPDU, and re-initiate a random access request according to the time range indicated by the BI.
  • the third-step handshake (msg3) is used for the terminal device to send the contention resolution identification to the network device, including the following steps:
  • Step 221 The terminal device obtains the UR-grant from the RAR, uses the TC-RNTI in the UR-grant to scramble the contention resolution identifier, and sends the scrambled contention resolution identifier to the network device.
  • the contention resolution identification may be a unique identification of the terminal device.
  • the fourth step handshake (msg4) is used by the network device to send the contention resolution mechanism of the terminal device that is allowed to access to the terminal device, including the following steps:
  • Step 231 The network device may use the TC-RNTI in each received contention resolution identifier to scramble the third DCI, and send the scrambled third DCI to the PDCCH channel.
  • the third DIC is used to indicate the time domain resources and frequency domain resources of the PDSCH channel of the scheduling contention resolution mechanism.
  • Step 232 The network device may send a contention resolution mechanism on the PDSCH channel.
  • the contention resolution mechanism includes the unique identifier of the terminal device that is allowed to access and the cell-network temporary identifier (C-RNTI) corresponding to the terminal device. ).
  • C-RNTI cell-network temporary identifier
  • terminal devices that select the same preamble index can receive the same TC-RNTI, so the contention resolution identifiers sent by these terminal devices will also be scrambled with the same TC-RNTI.
  • a preamble index allows only one terminal device to access. Therefore, after the network device receives the contention resolution identification sent by these terminal devices, since the TC-RNTI is consistent, the network device can select a terminal device as the preamble index to allow access.
  • Incoming terminal equipment such as the terminal equipment with the best signal strength.
  • Step 233 The terminal device obtains the contention resolution mechanism from the PDSCH channel according to the third DCI. If the contention resolution mechanism includes the unique identifier of the terminal device, the terminal device determines that it has successfully accessed the cell. If the unique identification of the terminal device is not included in the contention resolution mechanism, the terminal device determines that the random access fails.
  • Step 241 After successfully accessing the cell, the terminal device can communicate with the network device through the C-RNTI corresponding to the unique identifier of the terminal device in the contention resolution mechanism, for example, receiving high-level signaling sent by the network device.
  • random access type 1 when the terminal device does not perform the fourth-step handshake, the terminal device does not go to the downlink shared channel to obtain a contention resolution mechanism, so the final confirmation step of this random access of the terminal device is not completed.
  • the terminal device performs the fourth-step handshake the terminal device goes to the downlink shared channel to obtain a contention resolution mechanism.
  • the contention resolution mechanism includes the unique identifier of the terminal device and the corresponding cell network identifier, and the terminal device successfully accesses the network In this case, the random access of the terminal device may no longer be changed.
  • the information transmission method in this application mainly configures the random access of the terminal device in the first-step handshake, the second-step handshake, or the third-step handshake, so that the terminal equipment can use different types of devices from other end devices.
  • Random access is configured to access network equipment or not to access network equipment.
  • the random access of the terminal device can also be configured in the fourth handshake, but this configuration is used to indicate the next random access of the terminal device.
  • Fig. 3 exemplarily shows a schematic diagram of an access process of random access type 2. As shown in Fig. 3, the process includes:
  • the first handshake is used for the terminal device to send a random access request to the network device, including the following steps:
  • Step 301 The network device assigns a specific preamble index to the terminal device through downlink dedicated signaling. Wherein, the specific preamble index does not conflict with the preamble index of other terminal devices. In this way, the terminal device and other terminal devices can no longer compete for access resources of the same preamble index.
  • Step 302 The terminal device sends a random access request to the network device at a random access opportunity, and the random access request includes a specific preamble index and a unique identifier of the terminal device.
  • the random access opportunity in the random access type 2 may be designated by the network device, or may be determined in the manner in the random access type 1, and is not limited.
  • the second-step handshake is used by the network device to send the random access result to the terminal device, including the following steps:
  • step 311 when the terminal device is allowed to access the network device, the unique identifier of the terminal device and the C-RNTI corresponding to the terminal device are carried in the random access result and sent to the PDSCH channel.
  • the random access result can also be scheduled by the downlink control information on the PDCCH channel.
  • the network device may not respond to the terminal device, or the unique identifier of the terminal device and the random access failure information may be carried in the random access result and sent to the PDSCH channel.
  • the terminal device obtains the random access result from the PDSCH channel. If the random access result includes the C-RNTI corresponding to the unique identifier of the terminal device, the terminal device determines that it has successfully accessed the cell to be accessed, and can subsequently access the cell to be accessed. C-RNTI communicates with network equipment. If the random access result does not include the unique identifier of the terminal device, or includes the information of random access failure, the terminal device determines that the random access fails.
  • the terminal device can connect to the network device by sending uplink shared data once and receiving downlink shared data once, while in random access type 1, the terminal device needs to send uplink shared data and data at least twice. Only receive two downlink shared data to access network equipment. Therefore, the access speed of random access type 2 is faster than that of random access type 1. However, each operation of the terminal device in random access type 1 needs to be confirmed by the network device. Therefore, compared with random access type 2, the access process of the terminal device can be more affected by the network equipment. Management and control may be more in line with the requirements of the standard agreement.
  • the network device may be the network device in FIG. 1, or a device capable of supporting the information transmission of the network device to realize the functions required by the method, and of course, it may also be other information transmission devices, such as a chip or a chip system.
  • the terminal device may be the terminal device in FIG. 1, or a device capable of supporting the information transmission of the terminal device to realize the functions required by the method, and of course, it may also be another device for information transmission, such as a chip or a chip system.
  • the first method is that the terminal device accesses the network device” refers to: in the case that the terminal device has initiated a random access request, the first method instructs the terminal device to continue random access;
  • the first method is that the terminal device does not access the network device” refers to: when the terminal device has initiated a random access request, the first method instructs the terminal device to terminate random access;
  • the first method is for the terminal device to perform random access” refers to: in the case that the terminal device does not initiate a random access request, the first method instructs the terminal device to initiate random access;
  • the first method is that the terminal device does not perform random access” refers to: when the terminal device does not initiate a random access request, the first method instructs the terminal device not to initiate random access.
  • the following embodiments of this application refer to "the first method is that the terminal device accesses the network device" as “the first method instructs the terminal device to continue random access”, and the “the first method is that the terminal device does not access the network” “Device” is called “the first method instructs the terminal device to terminate random access”, “the first method is for the terminal device to perform random access” is called “the first method instructs the terminal device to initiate random access”, and “the first method is used to instruct the terminal device to initiate random access” "Do not perform random access for the terminal device” is called “the first way to instruct the terminal device not to initiate random access”.
  • the following "the first method instructs the terminal device to continue random access” can be replaced with “the first method is the terminal device to access the network device”
  • the following "the first method instructs the terminal device to terminate” Random access can be replaced with “the first method is that the terminal device does not access the network device”
  • “the first method instructs the terminal device to start random access” that appears below can be replaced with “the first method is The terminal device performs random access”
  • the "first method instructs the terminal device not to initiate random access” appearing in the following can be replaced with "the first method is that the terminal device does not perform random access”.
  • the first method is actually to allow the terminal device to access the network device.
  • the terminal device can Perform operations to access network devices, for example, start random access, or continue random access.
  • the first method actually does not allow the terminal device to access the network device. In this way, the terminal device does not Perform the operation of accessing the network device, for example, random access may not be activated, or random access may not be continued.
  • Fig. 4 exemplarily shows a schematic flow chart of an information transmission method provided by an embodiment of the present application.
  • the method may be executed by a terminal device and a network device, and the terminal device is used to access a cell covered by the network device.
  • the method includes:
  • Step 401 The network device sends the first information or the second information to the terminal device.
  • the first information or the second information may be used to indicate:
  • “enable a certain configuration” in the above content refers to enabling terminal equipment to access network equipment according to a certain configuration.
  • “enable random access corresponding to terminal equipment associated with one or more characteristic parameters” “Opportunity” refers to: enabling terminal equipment to access network equipment according to the characteristic parameter grouping. For example, if three characteristic parameters divide the terminal equipment into three groups, the three groups of terminal equipment can be randomly connected according to the three characteristic parameters. Access opportunity to access network equipment.
  • enable the terminal device to access the network device according to the preamble resource grouping method for example, three sets of preamble resources connect the terminal device Divided into three groups, the three groups of terminal devices can respectively access the network equipment according to the random access opportunities corresponding to the three groups of preamble resources.
  • Step 402 The terminal device determines the first mode according to the first information or the second information:
  • step 403 is executed;
  • step 404 is executed.
  • the first method is to allow the terminal device to access the network device, including:
  • the first method instructs the terminal device to continue random access, for example, instructs the terminal device to receive a random access response, or instructs the terminal device to receive downlink shared information used to resolve contention; or,
  • the first method instructs the terminal device to start random access, for example, instructs the terminal device to send a random access request.
  • the first method is to not allow terminal devices to access network devices, including:
  • the first method instructs the terminal device to terminate random access, for example, instructs the terminal device not to receive a random access response, or instructs the terminal device not to receive downlink shared information used to resolve contention; or,
  • the first method instructs the terminal device not to initiate random access, for example, instructs the terminal device not to send a random access request, or instructs the terminal device not to select a preamble index.
  • Step 403 The terminal device accesses the network device, for example:
  • the terminal device can continue random access; or,
  • the terminal device can initiate random access.
  • the terminal device can be accessed according to the random access opportunity corresponding to the supported characteristic parameter. For example, as shown in Table 1, if the service type of the terminal device is an industrial wireless sensor network type, the characteristic parameter supported by the terminal device is characteristic parameter 1. In this case, the terminal device can use the random access corresponding to characteristic parameter 1. Access opportunity to access network equipment.
  • the terminal The device can access the network device according to the random access opportunity corresponding to the associated preamble resource.
  • the preamble index corresponding to preamble resource 1 ranges from 10 to 20. If the preamble index selected by the terminal device is 15, then the terminal device is associated with preamble resource 1, so the terminal device can use the random access opportunity corresponding to preamble resource 1. Access network equipment.
  • Step 404 the terminal device does not access the network device, for example:
  • the terminal device can terminate the random access; or,
  • the terminal device may not initiate random access.
  • the terminal device may refer to a terminal device of a certain type, such as a REDCAP terminal device.
  • a terminal device of a certain type such as a REDCAP terminal device.
  • the content in step 401 to step 404 is used for random access to terminal devices of the REDCAP type. Entry is restricted.
  • the terminal device of the REDCAP type has a built-in module for parsing the first information and the second information when it leaves the factory. Only this type of terminal device can analyze the first information and the second information, while other types of terminals The device cannot parse the first information and the second information.
  • the terminal device can parse the first information or the second information, the terminal device belongs to the REDCAP type terminal device, and can access the network device in the first manner indicated by the first information or the second information or not. Access network equipment. If the terminal device cannot resolve the first information and the second information, the terminal device does not belong to the REDCAP type of terminal device, and the terminal device can access the network device according to the inherent process of random access, for example, according to the random access type shown in Figure 2 The access process in 1 accesses network equipment. With this implementation manner, by flexibly controlling whether a certain type of terminal device can access the network device, it is possible to control the terminal device that accesses the network device, and achieve the purpose of balancing the network load.
  • the embodiment of the present application may use the configuration indication information of the random access opportunity, the association relationship between the characteristic parameter and the terminal device of this type, and the association relationship between the preamble resource and the terminal device of this type One or more of these restrict whether this type of terminal equipment can access the network.
  • this type of terminal equipment can access the network equipment or not according to the first method corresponding to it, Therefore, this type of terminal equipment can access network equipment more flexibly.
  • this application can also associate the preamble resource with this type of terminal device, or associate characteristic parameters with this type of terminal device. In this way, it is also possible to configure whether each group of preamble resources or the terminal device associated with each characteristic parameter can be accessed. Access to the network, so as to more fine-grained and more flexible control of this type of terminal equipment access to the network equipment.
  • the terminal device may refer to a certain type of terminal device, such as a REDCAP terminal, that is, the terminal devices described in the following of the application can be replaced with a REDCAP terminal.
  • a highly reliable and low latency (ultra reliable low latency communication, URLLC) terminal that is, the terminal devices described in the following of this application can be replaced with a URLLC terminal.
  • Embodiment 1 Some possible implementations of Embodiment 1 will be described below in conjunction with Embodiment 2 to Embodiment 8.
  • FIG. 5 exemplarily shows a schematic flowchart of an information transmission method provided by an embodiment of the present application.
  • the method may be executed by a terminal device and a network device, and the terminal device is used to access a cell covered by the network device.
  • the method includes:
  • Step 501 The terminal device receives the first information from the network device.
  • the first information may be carried in the main system information block, the system information block, or the dedicated radio resource control information.
  • the first information in the case where the first information is carried in the main system information block or the system information block, since the terminal device has not yet connected to the network device, the first information can be used to indicate whether the terminal device can access in the initial random access Network equipment.
  • the first information since the terminal device has already accessed the network device, the first information may be used to indicate whether the terminal device can access the network device in the next random access.
  • the first information may also be carried in downlink control information.
  • the first information since the network equipment is more inclined to allow the control signaling in the downlink control information to be quickly sent to each terminal device, if the first information contains the configuration information of the random access opportunity, the first information may be Occupies more control resources and affects the transmission efficiency of downlink control information. Therefore, in a preferred embodiment, the first information is carried in the main system information block, the system information block or the dedicated radio resource control information.
  • Step 502 The terminal device obtains the configuration indication information of the random access opportunity from the first information, and judges the state of the configuration indication information of the random access opportunity:
  • step 503 If the state of the configuration indication information of the random access opportunity is the first state, perform step 503;
  • step 504 If the state of the configuration indication information of the random access opportunity is the second state, perform step 504;
  • step 505 is executed.
  • Step 503 The terminal device accesses the network device.
  • Step 504 The terminal device does not access the network device.
  • the state of the configuration indication information of the random access opportunity is the first state, which is used to indicate:
  • the terminal device is allowed to access the network device, for example, when the terminal device has not initiated a random access request, the terminal device is instructed to initiate random access.
  • the first information can be carried in the main system information block or the system information block According to the first information, the terminal device may send a random access request to the network device; or, when the terminal device has initiated the random access request, instruct the terminal device to continue random access.
  • the first information It can be carried in the downlink control information, and according to the first information, the terminal device can receive a random access response or receive downlink shared information used to resolve contention; or,
  • “Enable the configuration of random access opportunities for terminal devices” is an indication method for allowing terminal devices to access network devices. This method is applicable to terminal devices of the same type, assuming that the first information can be parsed If the terminal devices belong to the same type of terminal device, the “configuration to enable the random access opportunity of the terminal device” refers to: allowing the terminal device of this type to access the network device, for example, enabling the terminal device of this type to start the random access Or allow terminal equipment belonging to this type to continue random access. In this way, terminal devices belonging to this type can access network devices.
  • the state of the configuration indication information of the random access opportunity is the second state, which is used to indicate:
  • the terminal device is not allowed to access the network device.
  • the terminal device is instructed not to initiate random access.
  • the first information can be carried in the main system information block MIB or In the system information block SIB, according to the first information, the terminal device may not send a random access request to the network device or select the preamble index; or, in the case that the terminal device has initiated a random access request, instruct the terminal device to terminate the random access request.
  • the first information can be carried in the downlink control information, and according to the first information, the terminal device can receive a random access response or receive downlink shared information used to resolve contention; or,
  • "disable configuration of random access opportunities for terminal devices” is an indication method for not allowing terminal devices to access network devices. This method is applicable to terminal devices of the same type. If the terminal equipment of a piece of information is of the same type, "disable the configuration of random access opportunities for terminal equipment” means that terminal equipment of this type is not allowed to access network equipment, for example, terminal equipment of this type is not activated Random access, or make terminal devices of this type terminate random access. In this way, terminal equipment belonging to this type may not be connected to the network equipment.
  • the state of the configuration indication information of the random access opportunity is the third state, which is used to indicate:
  • the first information also includes configuration information of random access opportunities of one or more characteristic parameters.
  • the configuration information of the random access opportunity for the characteristic parameter will be described in detail in step 505, and will not be introduced here.
  • the configuration indication information of the random access opportunity may include a first bit, the first bit may include at least two bits, and the bit status of the first bit is used to indicate:
  • the first information also includes configuration information of random access opportunities of one or more characteristic parameters.
  • Table 3 exemplarily shows an indication method when the first bit includes 2 bits:
  • bit status of the first bit When the bit status of the first bit is 11, it indicates that the terminal device is allowed to access the network device;
  • bit status of the first bit is 00, it indicates that the terminal device is not allowed to access the network device;
  • the bit state of the first bit When the bit state of the first bit is 01, it indicates that the first information also includes configuration information of random access opportunities of one or more characteristic parameters.
  • Table 3 is only an optional implementation manner.
  • the content indicated by the bit status of the first bit may also be in other situations, for example, in another situation:
  • bit status of the first bit is 00, it indicates that the terminal device is allowed to access the network device;
  • bit status of the first bit is 11, it indicates that the terminal device is not allowed to access the network device;
  • the bit status of the first bit is 10, it indicates that the first information also includes configuration information of random access opportunities of one or more characteristic parameters.
  • bit status of the first bit When the bit status of the first bit is 11, it indicates that the terminal device is allowed to access the network device;
  • bit status of the first bit is 10, it indicates that the terminal device is not allowed to access the network device;
  • the bit status of the first bit is 00, it indicates that the first information further includes configuration information of random access opportunities of one or more characteristic parameters.
  • the first bit occupies at least 2 bit positions, so the first bit can have 4 bit states (ie: 00, 01, 10, and 11), but the first state, the second state, and the third state
  • the state only uses three of the bit states, so a bit state can be reserved, and this bit state can be used to indicate other information in actual operation.
  • the first bit may also include only 1 bit, and this 1 bit is a preset bit in the first information. If the value of this 1 bit is 1, it is considered that the first bit indicates that the terminal device is allowed to access the network device. If the value of this 1 bit is 0, it is considered that the first bit indicates that the terminal device is not allowed to access the network device. If the value of this bit does not exist, that is, the first bit is not included in the first information, in this case, the first bit is considered to indicate the random access opportunity that the first information also includes one or more characteristic parameters Configuration information. In this way, the first bit can occupy fewer bits.
  • the first bit is not included in the first information, and it is considered that the first bit indicates that the first information also includes the configuration information of the random access opportunity with one or more characteristic parameters" is only an optional implementation example. In other optional embodiments, the first bit is not included in the first information, and it can also be considered that the first bit indicates that the terminal device is allowed to access the network device. Alternatively, the first information does not include the first bit, and it can also be considered that the first bit indicates that the terminal device is not allowed to access the network device, which is not limited.
  • Step 505 The terminal device obtains configuration information of random access opportunities of one or more characteristic parameters from the first information.
  • the indication first information when the configuration indication information of the random access opportunity is in the third state, the indication first information further includes the configuration information of the random access opportunity of one or more characteristic parameters.
  • This method is to configure the random access opportunities of a group of terminal devices associated with each characteristic parameter according to the way of terminal device grouping. For example, if there are 3 characteristic parameters (corresponding to 3 groups of terminal devices), each characteristic A group of terminal devices associated with the parameter can use the random access opportunity corresponding to the characteristic parameter to access the network device.
  • the configuration information of the random access opportunity corresponding to a characteristic parameter may include one or more of the following: random access time domain resources, random access frequency domain resources, and random access period.
  • the frequency domain resources for random access may include one or more of the following: the number of resource blocks for uplink scheduling, the index of the resource blocks for uplink scheduling, the number of subcarriers for uplink scheduling, and the subcarriers for uplink scheduling The index of the uplink scheduling resource block, the group number of the uplink scheduling resource block, the group index of the uplink scheduling resource block, and the frequency domain offset of the uplink scheduling.
  • Random access time domain resources may include one or more of the following: the number of time domain symbols, the index of time domain symbols, the number of time slots, the index of time slots, the number of sub-slots, and the number of sub-slots The index, the number of subframes, the index of subframes, the number of radio frames, the index of radio frames, and the time domain offset.
  • the configuration indication information of the random access opportunity may also include a second bit.
  • the second bit is used to indicate which characteristic parameters of the random access opportunity are configured. For example, there are N types of characteristic parameters.
  • the bit status of the second bit is used to indicate the value of L.
  • the bit state of the second bit must include at least N types in order to indicate that there are one feature parameter, two feature parameters, ..., N among the N feature parameters. The situation of a characteristic parameter.
  • the second bit may include N bits, the N bits correspond to N types of characteristic parameters, and the value of one bit is used to indicate whether the random access of the corresponding characteristic parameter is configured. Access opportunity. For example, when the value is 0, it indicates that the random access opportunity of the corresponding characteristic parameter is not configured, and when the value is 1, it indicates that the random access opportunity of the corresponding characteristic parameter is configured.
  • the terminal device can count the number of bits with a value of 1 in the second bit, and then learn which characteristic parameter random access opportunity configuration information is included in the first information.
  • N bits contain 2 N bit states, which can indicate at most 2 N values. When the value of N is not less than 5, 2 N Greater than N, so there will be some bit states that are wasted. Therefore, we prefer to use the next embodiment.
  • the second bit may include Bits, Refers to rounding up the result of log 2 N, for example:
  • log 2 N is an integer
  • the second bit may include log 2 N bits, and the second bit has N bit states
  • log 2 N is a non-integer
  • the second bit includes Bits
  • the second bit has more than N bit states.
  • the second bit may include 2 bits.
  • Table 4 exemplarily shows an indication method when the second bit includes 2 bits:
  • the second bit may include 3 bits.
  • Table 5 exemplarily shows an indication method when the second bit includes 3 bits:
  • the first information also includes configuration information of a random access opportunity of a characteristic parameter 010
  • the first information also includes the configuration information of the random access opportunity of 2 kinds of characteristic parameters 011
  • the first information also includes the configuration information of the random access opportunity of 3 kinds of characteristic parameters 100
  • the first information also includes the configuration information of the random access opportunity of 4 kinds of characteristic parameters 101
  • the first information also includes the configuration information of the random access opportunity of 5 characteristic parameters
  • the second bit in this embodiment may include 3 bits, while the second bit in the previous embodiment The second bit includes 5 bits. Obviously, this embodiment helps to reduce the resources occupied by the second bit.
  • the terminal device can learn the configuration information of the random access opportunity that also includes L types of characteristic parameters in the first information.
  • the value obtains L pieces of configuration information from the first information.
  • the terminal equipment is based on the starting position of the first configuration table, the value of L and the value of each configuration table.
  • L configuration tables can be obtained from the first information, and L configuration tables can be parsed to obtain L group configuration information.
  • each group of configuration information may also include the identifier of the characteristic parameter. In this way, the terminal device can determine which L type of characteristic parameter the L group of characteristic information corresponds to according to the identifier of the characteristic parameter included in the L group of configuration information.
  • the first bit and the second bit can be used in the embodiment of the present application to jointly indicate whether all terminal devices of a certain type are enabled for random access or a group of enabled terminal devices of this type, so as to facilitate The terminal device determines whether to connect to the network device or not to connect to the network device according to the content enabled this time.
  • This indication method is more flexible. It is understandable that, in the embodiment of the present application, the first bit and the second bit may also exist separately, for example, only the second bit is set but the first bit is not set, or only the first bit is set but the second bit is not set.
  • the random access opportunities corresponding to the at least two characteristic parameters can be configured according to actual needs.
  • the frequency domain resources of the random access of at least two characteristic parameters may be configured to be the same, and the period of the time domain resources of the random access of the at least two characteristic parameters may be configured to be the same, and The random access time domain resources of at least two sets of characteristic parameters are configured to be different.
  • FIG. 6 exemplarily shows the configuration information of the random access opportunity of two characteristic parameters.
  • the random access of the two characteristic parameters has the same frequency domain resource (ie frequency), assuming the duration indicated by a white box As the unit duration, the time domain resources of the random access of the two characteristic parameters circulate once every 3 unit duration.
  • the terminal device associated with the first type of characteristic parameter is a terminal device with a terminal bandwidth equal to 5MHz
  • the terminal device associated with the second type of characteristic parameter is a terminal device with a terminal bandwidth equal to 10MHz
  • the terminal device with a terminal bandwidth equal to 5MHz is diagonally in Figure 6 Access is performed on the time domain resource indicated by the wire frame
  • the terminal device with a terminal bandwidth equal to 10 MHz is accessed on the time domain resource indicated by the black frame in FIG. 6.
  • terminal devices associated with various characteristic parameters can use different random access time domain resources to access network equipment, so that Avoid the situation where there are terminal devices associated with multiple characteristic parameters on the same time domain resource requesting access at the same time, and reduce the load of the network device.
  • the grouping of characteristic parameters is relatively balanced, for example, the number of terminal devices associated with each characteristic parameter is balanced, then the number of terminal devices connected to the network device on each time domain resource can also be balanced.
  • the frequency domain resources for random access of at least two characteristic parameters may be configured to be the same, and the time domain resources for random access of at least two characteristic parameters may be configured to be different, and The period configurations of the random access time domain resources of the at least two characteristic parameters are different.
  • FIG. 7 exemplarily shows the configuration information of the random access opportunity of two characteristic parameters.
  • the random access of the two characteristic parameters has the same frequency domain resource (ie frequency), assuming the duration indicated by a white box As the unit duration, the random access time domain resource of the first characteristic parameter circulates every 3 unit duration, and the random access time domain resource of the second characteristic parameter circulates every 1 unit duration.
  • the terminal device associated with the first feature parameter is a terminal device whose service type is the video surveillance type
  • the terminal device associated with the second feature parameter is a terminal device whose service type is the industrial wireless sensor type
  • the terminal device of the video surveillance type is The access is performed on the time domain resource indicated by the diagonal frame in FIG. 7, and the terminal device of the industrial wireless sensor type is accessed on the time domain resource indicated by the black frame in FIG. 7.
  • terminal devices associated with these two characteristic parameters can access network equipment on different time domain resources.
  • the service type of the terminal equipment of the video surveillance type is more urgent and the network equipment is urgently needed.
  • a shorter access period can be configured. In this way, no matter when the terminal equipment belonging to the video surveillance type wants to access the network device, it can find the next accessible time.
  • the domain resources are relatively close, so that terminal equipment belonging to the video surveillance type can access network equipment in a timely and fast manner.
  • the network equipment can configure respective random access opportunities for various characteristic parameters according to the access amount of the terminal equipment associated with each characteristic parameter in the current period of time in the cell. For example, when various characteristic parameters are divided into terminal devices according to the terminal bandwidth, if the access amount of the terminal devices of each terminal bandwidth in the current period is not much different, the same random access time domain resources can be configured for the various characteristic parameters And cycle. If the number of terminal devices with a terminal bandwidth not greater than 10MHz in the current period is less, in order to increase the service transmission rate of a terminal device with a terminal bandwidth equal to 10MHz, the network device can be a feature supported by a terminal device with a terminal bandwidth equal to 5MHz or 20MHz Parameter allocation is more time domain resources.
  • the configuration indication information of the random access opportunity is in the third state, indicating that the first information also includes the configuration information of the random access opportunity with one or more characteristic parameters
  • the configuration indication information of the random access opportunity is in the third state, and it may also indicate whether the terminal device associated with one or more characteristic parameters can be accessed in the first information.
  • the configuration information of the network device for example, the first information further includes N bits, and the N bits correspond to N types of characteristic parameters. The value of one of the N bits is used to indicate:
  • the terminal device associated with the characteristic parameter corresponding to this bit is not allowed to access the network device.
  • the network device can configure whether the terminal device associated with each characteristic parameter can access the network device. In this case, if the terminal device determines that the characteristic parameter supported by the terminal device allows access to the network device, it can Normally access to the network equipment, if it is determined that the characteristic parameters supported by the terminal equipment do not allow access to the network equipment, the network equipment may not be connected. Compared with the method of configuring random access opportunities corresponding to L types of characteristic parameters, this method can eliminate the need to additionally configure random access opportunities for terminal devices associated with each characteristic parameter, so that fewer bits can be used to indicate The access capability of the terminal equipment associated with various characteristic parameters reduces the communication load.
  • Step 506 The terminal device determines whether there is configuration information of the random access opportunity corresponding to the supported feature parameter, if it exists, execute step 507, and if it does not exist, execute step 504.
  • the terminal device can determine the identifier of the characteristic parameter supported by the terminal device according to the association relationship between the characteristic parameter and the terminal device, and obtain the configuration information with the identifier of the characteristic parameter from the L group configuration information, and from the configuration The corresponding random access opportunity is determined in the information.
  • the association relationship between the characteristic parameter and the terminal device can be defined in the terminal device according to preset rules, for example, it is configured in the terminal device when the terminal device leaves the factory; or it can also be sent by the network device to the terminal device.
  • the association relationship between the characteristic parameter and the terminal device may include one or more parameters included in each characteristic parameter and the parameter corresponding to one or more parameters Value range.
  • the terminal device can determine the parameter value of the terminal device under each parameter of the characteristic parameter, and judge whether the parameter value meets the parameter range of the characteristic parameter.
  • the characteristic parameter is a characteristic parameter supported by the terminal device, and if it is not satisfied, the characteristic parameter is not a characteristic parameter supported by the terminal device.
  • the service type of the terminal device is the video surveillance type
  • the terminal device receives the association relationship shown in Table 1 sent by the network device, the terminal device is directed to the characteristic parameter 1, the characteristic parameter 2, and the characteristic parameter 3.
  • the parameter value of the terminal equipment under the parameter of service type is the video surveillance type
  • the parameter value range under the parameter of service type in the characteristic parameter 2 is the video surveillance type, so the characteristic parameter supported by the terminal equipment is the characteristic parameter 2.
  • Step 507 The terminal device accesses the network device according to the configuration information of the random access opportunity corresponding to the supported characteristic parameter.
  • the terminal device may obtain the time domain resource and period of random access from the configuration information of the random access opportunity corresponding to the supported characteristic parameter. If the current period happens to belong to the time domain resource for random access, a random access request can be sent to the network device in the time domain resource to initiate random access. If the current period does not belong to the time domain resource for random access, a random access request can be sent to the network device on the next random access time domain resource in a periodic manner to initiate random access. Of course, if there is no random access opportunity for the terminal device of the supported characteristic parameter, the terminal device may not access the network device, for example, the random access is not continued, or the random access is not started.
  • the network device can carry one or more of the following three types of configuration information in the first information: allowing a certain type of terminal device to access the network device, and disallowing a certain type of terminal device To access the network equipment, it indicates which random access opportunity is used to access the network equipment by a group of terminal equipment associated with each characteristic parameter in a manner of grouping the characteristic parameters.
  • the network equipment can not only configure the random access of a certain type of terminal equipment, but also configure the random access of each group of terminal equipment in a grouping manner, so that this type of terminal equipment can access the network equipment more flexibly .
  • FIG. 8 exemplarily shows a schematic flowchart of another information transmission method provided by an embodiment of the present application.
  • the method may be executed by a terminal device and a network device, and the terminal device is used to access a cell covered by the network device.
  • the method includes:
  • Step 801 The terminal device receives the first information from the network device.
  • the first information may be carried in the main system information block, the system information block, or the dedicated radio resource control information.
  • step 802 the terminal device determines whether the first information includes the configuration indication information of the random access opportunity, if it does not include it, executes step 803, and if it does, executes step 804.
  • a third bit may be set in the first information, and the third bit occupies at least one preset bit in the first information.
  • the terminal device finds that at least one preset bit does not exist, it is determined that the first information does not contain the configuration indication information of the random access opportunity, and if the terminal device finds the bit status at at least one preset bit If it exists, it is determined that the first information includes the configuration indication information of the random access opportunity.
  • Step 803 The terminal device does not access the network device.
  • the terminal device does not access the network device, which may mainly include the following content:
  • the terminal device does not enable the configuration of the random access opportunity of the terminal device; or,
  • the terminal device does not initiate random access.
  • the first information is carried in the main system information block MIB or the system information block SIB, and the terminal device may not send random access to the network device. Request; or,
  • the terminal device terminates the random access.
  • the first information is carried in the downlink control information, and the terminal device may not receive the random access response, or the terminal device may not receive the random access response.
  • Competitive downlink sharing information is carried in the downlink control information, and the terminal device may not receive the random access response, or the terminal device may not receive the random access response.
  • the terminal device may also start the first timer, and if the first timer completes one time, the terminal device may reconnect to the network device.
  • the completion of one timing by the first timer means that the elapsed time counted by the first timer satisfies the duration of the first timer. For example, when the terminal device accesses the network device for the first time or re-connects to the network device, the first timer completes a timing, and the terminal device can reselect the preamble index and send a random access request to the network device.
  • the duration of the first timer may be determined according to a predefined rule, for example, it may be preset inside the terminal device when the terminal device leaves the factory.
  • the duration of the first timer may also be configured by the network device, for example, it is carried in the first information and sent to the terminal device synchronously.
  • Step 804 The terminal device accesses the network device.
  • the terminal device accesses the network device, which may mainly include the following content:
  • the network device enables the configuration of the random access opportunity of the terminal device; or,
  • the terminal device continues random access.
  • the first information is carried in the downlink control information, and the terminal device can receive a random access response, or the terminal device can receive a contention resolution response.
  • Downlink shared information or,
  • the terminal device In the case that the terminal device does not initiate a random access request, the terminal device initiates random access.
  • the first information is carried in the main system information block MIB or the system information block SIB, and the terminal device can send a random access request to the network device; or,
  • the first information also includes configuration information of random access opportunities of one or more characteristic parameters.
  • the terminal device obtains the configuration information of random access opportunities corresponding to the supported characteristic parameters from the first information, and corresponds to the supported characteristic parameters. Random access opportunity to access network equipment.
  • the bit status of the third bit is also used to indicate at least one of the foregoing contents.
  • Table 6 exemplarily shows an indication mode of the third bit:
  • the terminal device determines that the first information contains the configuration indication information of the random access opportunity, it can obtain the third bit from the first information, and determine that the terminal device is connected to the network according to the bit status of the third bit. The device still accesses the network device according to the random access opportunity corresponding to the supported characteristic parameter.
  • the specific implementation process please refer to the second embodiment, which will not be introduced here.
  • the terminal device may also receive third information from the network device, the third information includes configuration indication information of the random access mode, and the third information may be carried in system information, downlink control information, One or more of media access layer information and high-level signaling.
  • the third information is carried in system information, the third information is used to indicate the random access mode of this random access.
  • the third information is carried in downlink control information, media access layer information or high-level signaling, the third information is used to indicate the random access mode of this random access.
  • the third information is used to indicate the random access mode for the next random access. For example, when the terminal device accesses the cell for the first time, the network device can carry the third information in the system information.
  • the terminal device can access the network device in a random access manner indicated by the third information.
  • the network device can carry the third information in the high-level signaling. In this way, when the terminal device is disconnected from the network device, the terminal device can follow the random access indicated in the high-level signaling. Way to reconnect.
  • the configuration indication information of the random access mode may be the fourth bit, the fourth bit includes 2 bits, and the fourth bit may have 4 bit states, which can all be used to indicate random
  • the access mode can also be partially used to indicate the random access mode.
  • Table 7 exemplarily shows an indication manner of the fourth bit.
  • bit status of the fourth bit is used to indicate:
  • the bit status of the fourth bit is 00, indicating that the terminal device is not allowed to access the network device; or,
  • the bit status of the fourth bit is 01, indicating that the random access mode of the terminal device is random access type 1; or,
  • the bit status of the fourth bit is 10, indicating that the random access mode of the terminal device is random access type 2; or,
  • the bit status of the fourth bit is 11, indicating that the random access mode of the terminal device is random access type 1 or random access type 2.
  • Table 8 exemplarily shows another indication mode of the fourth bit:
  • bit status of the fourth bit is used to indicate:
  • the bit status of the fourth bit is 01, indicating that the random access mode of the terminal device is random access type 1; or,
  • the bit status of the fourth bit is 10, indicating that the random access mode of the terminal device is random access type 2; or,
  • the bit status of the fourth bit is 11, indicating that the random access mode of the terminal device is random access type 1 or random access type 2.
  • the network device can set a random access method for a certain type of terminal equipment that is different from other types of terminal equipment. For example, if the service type of a certain type of terminal equipment is more urgent, it can be that type.
  • the terminal equipment is set to random access type 2. Since random access type 2 has a faster access speed than random access type 1, it can enable this type of terminal equipment to access network equipment more quickly and improve this type The terminal equipment handles the business in real time.
  • the terminal device may use the preset random access mode to access the network device.
  • the preset random access mode may be preset in the terminal device when the terminal device leaves the factory.
  • the terminal device can determine whether to access the network device according to whether the first information contains the configuration indication information of the random access opportunity.
  • the network device does not allow a certain type of terminal device When accessing, the configuration indication information of the random access opportunity may no longer be set in the first information, so that resources occupied by the first information can be reduced.
  • Fig. 9 exemplarily shows a schematic flowchart of an information transmission method provided in the fourth embodiment.
  • the method can be executed by a terminal device and a network device, and the terminal device is used to access a cell covered by the network device.
  • the method includes:
  • Step 901 The terminal device receives second information from the network device, where the second information is used to indicate whether to allow the terminal device associated with each characteristic parameter of one or more characteristic parameters to access the network device, or to indicate whether to allow a group of or Terminal devices associated with multiple sets of preamble resources access network devices.
  • the second information may be carried in one or more of the following information:
  • the second information is carried in system information, random access response, medium access control information, downlink control information, or uplink scheduling authorization information, since the terminal device has not received the contention resolution mechanism sent by the network device, This random access of the terminal device may also be terminated, so the second information may be applicable to this random access of the terminal device. If the second information is carried in the radio resource control information or Msg4, since the terminal device has received the contention resolution mechanism sent by the network device, this random access of the terminal device has been successful, so the second information can be applied to the terminal device Random access next time.
  • Step 902 The terminal device determines supported feature parameters or associated preamble resources.
  • Step 903 The terminal device determines whether the terminal device is allowed to access the network device according to whether the terminal device associated with the supported characteristic parameter is allowed to access the network device, and/or whether the terminal device associated with the supported preamble resource is allowed to access the network device, and if so , Go to step 904, if not, go to step 905.
  • the terminal device may determine whether to allow the terminal device to access the network device in the following manner:
  • the terminal device is allowed to access the network device according to whether the terminal device associated with the supported characteristic parameter is allowed, Determine whether to allow terminal equipment to access network equipment; or,
  • the terminal device determines whether to allow the terminal device according to whether the supported preamble resource-associated terminal devices are allowed to access the network device Access network equipment; or,
  • the terminal device corresponds to the supported preamble resource according to whether the supported preamble resource is allowed
  • the terminal device associated with the characteristic parameter of is connected to the network device, and it is determined whether the terminal device is allowed to access the network device.
  • Step 904 The terminal device accesses the network device.
  • Step 905 The terminal device does not access the network device.
  • the second information is used to indicate whether to allow terminal devices associated with each characteristic parameter of one or more characteristic parameters to access network equipment, or to indicate whether to allow one or more groups of terminals associated with preamble resources
  • “Device access network device” is only an optional implementation manner. In another optional implementation manner, the second information may also be used to indicate the terminal associated with each characteristic parameter in one or more characteristic parameters.
  • the network device can configure the random access of each group of terminal devices associated with the various characteristic parameters or each group of preamble resources by configuring the random access of various characteristic parameters or the configuration of each group of preamble resources.
  • terminal equipment can access network equipment in groups, and terminal equipment in the same group can have the same random access configuration, such as access to network equipment or not to access network equipment. In this way, it can be more flexible Manage random access of terminal equipment.
  • FIG. 10 exemplarily shows a schematic flow chart of a method for information transmission provided by Embodiment 5.
  • the method may be executed by a terminal device and a network device, and the terminal device is used to access a cell covered by the network device.
  • the method includes:
  • Step 1001 The terminal device receives downlink control information from the network device.
  • the downlink control information includes first indication information.
  • the first indication information is used to indicate whether the terminal device associated with each of the N types of characteristic parameters is allowed to access the network.
  • Device, N is an integer greater than 0.
  • the downlink control information may be one or more of the following information:
  • the second downlink control information used to carry the random access response where the downlink control information is scrambled by RA-RNTI;
  • the third downlink control information used to carry contention resolution information, the downlink control information is scrambled by TC-RNTI.
  • the first indication information is carried in the second downlink control information or the third downlink control information, since the terminal device does not receive the contention resolution information sent by the network device, it marks the random access of the terminal device this time. It can also be terminated, so the first indication information is applicable to this random access.
  • the network device can control the ongoing random access of the terminal device. In this way, the flexibility of random access is better.
  • the first indication information may indicate whether to allow terminal devices associated with each of the N types of characteristic parameters to access the network equipment in a bitmap manner.
  • the first indication information may be a fifth bit, the fifth bit includes N bits, and the N bits correspond to N types of characteristic parameters. For one of the fifth bits, the value of this bit is used to indicate:
  • the terminal device associated with the characteristic parameter corresponding to this bit is not allowed to access the network device.
  • the first characteristic parameter is associated with a terminal device with a terminal bandwidth equal to 5MHz
  • the second characteristic parameter is associated with a terminal device with a terminal bandwidth equal to 10MHz
  • the third characteristic parameter is associated with a terminal device with a terminal bandwidth equal to 20MHz.
  • the fifth bit may include 3 bits, and Table 9 exemplarily shows an indication manner of the fifth bit.
  • the value of this bit is 1, indicating that the terminal equipment associated with the characteristic parameter corresponding to this bit is allowed to access the network equipment, for example, the terminal equipment with the terminal bandwidth equal to 5MHz (that is, the terminal equipment associated with the first characteristic parameter) and the terminal are allowed A terminal device with a bandwidth equal to 20MHz (that is, a terminal device associated with the third characteristic parameter) accesses the network device; or,
  • the value of this bit is 0, indicating that the terminal device associated with the characteristic parameter corresponding to this bit is not allowed to access the network device, for example, the terminal device with the terminal bandwidth equal to 10MHz is not allowed (that is, the terminal device associated with the second characteristic parameter) Access network equipment.
  • This implementation manner can use the reserved N bits in the downlink control information to indicate whether the terminal equipment associated with each characteristic parameter among the N types of characteristic parameters is allowed to access the network equipment, so that the network equipment can associate each characteristic parameter with the network equipment.
  • Terminal equipment can access network equipment for configuration.
  • the number of bits reserved in the downlink control information of 5G NR is 16, the number of bits in the fifth bit may not be greater than 16.
  • the first indication information may be a sixth bit, and the sixth bit includes Bits, in this case, the bit status of the sixth bit can include a total of There is a possibility that each bit state can correspond to one or more characteristic parameters, and the one or more characteristic parameters corresponding to different bit states are not completely the same. Among them, the bit status of the sixth bit can be used to indicate:
  • the terminal equipment associated with one or more characteristic parameters corresponding to the bit state is not allowed to access the network equipment, and the terminal equipment associated with other characteristic parameters is allowed to access the network.
  • the first characteristic parameter is associated with a terminal device with a terminal bandwidth equal to 5MHz
  • the second characteristic parameter is associated with a terminal device with a terminal bandwidth equal to 10MHz
  • the third characteristic parameter is associated
  • terminal equipment with a terminal bandwidth equal to 20MHz there are several possibilities for the continuous one or more characteristic parameters and associated terminal equipment among these three characteristic parameters:
  • Three consecutive characteristic parameters there is one possibility, namely, the first characteristic parameter, the second characteristic parameter and the third characteristic parameter, which are associated with terminal equipment with any terminal bandwidth;
  • Two consecutive sets of characteristic parameters There are two possibilities. The first is the first and the second.
  • the associated terminal bandwidth is equal to 5MHz and 10MHz, and the second is the second feature.
  • Parameter and the third characteristic parameter the associated terminal bandwidth is equal to 10MHz and the terminal equipment equal to 20MHz;
  • the first type may be the first type of characteristic parameter, the associated terminal bandwidth is equal to the terminal equipment of 5MHz
  • the second type may be the second type of characteristic parameter, the associated terminal bandwidth is equal to the terminal equipment of 10MHz
  • the third possibility is the third characteristic parameter, which is a terminal device whose associated terminal bandwidth is equal to 20 MHz.
  • the sixth bit can be set to include Since log 2 6 is rounded up, the value obtained is 3, so the sixth bit may include 3 bits.
  • Table 10 exemplarily shows an indication mode of the sixth bit:
  • bit status of the sixth bit is used to indicate:
  • the bit status of the sixth bit is 001, indicating that the terminal device associated with the first characteristic parameter (that is, the terminal device with the terminal bandwidth equal to 5MHz) is allowed to access the network device; or,
  • the bit status of the sixth bit is 010, indicating that the terminal device associated with the second characteristic parameter (that is, the terminal device with the terminal bandwidth equal to 10MHz) is allowed to access the network device; or,
  • the bit status of the sixth bit is 011, indicating that the terminal device associated with the third characteristic parameter (that is, the terminal device with the terminal bandwidth equal to 20MHz) is allowed to access the network device; or,
  • the bit status of the sixth bit is 100, indicating that the terminal device associated with the first characteristic parameter and the second characteristic parameter (that is, the terminal device with a terminal bandwidth equal to 5MHz or 10MHz) is allowed to access the network device to access the network; or,
  • the bit status of the sixth bit is 101, it indicates that a terminal device (that is, a terminal device with a terminal bandwidth equal to 10MHz or 20MHz) associated with the second characteristic parameter and the third characteristic parameter is allowed to access the network device; or,
  • bit status of the sixth bit is 110, it indicates that the terminal device associated with the first characteristic parameter, the second characteristic parameter, and the third characteristic parameter (that is, the terminal device with any terminal bandwidth) is allowed to access the network device.
  • each bit state may correspond to one or more characteristic parameters, and may not be limited to continuous one or more characteristics. Parameters, although this will increase the number of bits in the sixth bit, it can increase the flexibility of indication. For example, when there are three characteristic parameters, there may also be a bit state 111, which is used to indicate the terminal device associated with the first characteristic parameter and the third characteristic parameter (that is, the terminal bandwidth is equal to 5MHz or the terminal bandwidth is equal to 20MHz). Terminal equipment) Whether to allow access to network equipment.
  • the first indication information may be indicated by a special bit state. For example, one or more reserved bits in the downlink control information are preselected as the bearer of the first indication information, then:
  • bit status of one or more reserved bits is all 0, it indicates that the terminal device is not allowed to access the network device; or,
  • bit status of one or more reserved bits is all 1, it indicates that the terminal device is allowed to access the network device.
  • the downlink control information includes 16 reserved bits, and 3 of the reserved bits are selected as the bearer of the first indication information, then: if the bit status of these 3 reserved bits is 111, the indication belongs to the All terminal devices of this type are allowed to access the network equipment. If the bit status of these 3 reserved bits is 000, it indicates that all terminal devices belonging to this type are not allowed to access the network equipment.
  • the first indication information may be carried in the scrambling sequence of the downlink control information.
  • the N types of characteristic parameters have their own dedicated group identifiers. If the network device allows one of the characteristic parameters to be associated If any terminal device accesses the network device, the group identifier of this characteristic parameter can be used to scramble the downlink control information. In this way, the terminal equipment associated with this characteristic parameter can successfully descramble the downlink control information using its own group identification, and then can obtain the random access response or contention resolution mechanism according to the downlink control information to the corresponding downlink shared channel. The terminal device associated with the parameter can continue to access the network.
  • terminal devices associated with other characteristic parameters cannot descramble the downlink control information using their own group IDs, so that they cannot go to the downlink shared channel to obtain random access responses or contention resolution mechanisms. Therefore, terminal devices associated with other characteristic parameters cannot continue to access the network. .
  • the network device when terminal devices associated with multiple characteristic parameters are allowed to access the network device, the network device can use the allowed group identification of each characteristic parameter to scramble the downlink control information separately, so that the network device is allowed to access the network device.
  • the terminal equipment associated with each characteristic parameter can use its own group identifier to successfully descramble the downlink control information.
  • Step 1002 The terminal device determines whether the terminal device associated with the supported characteristic parameter is allowed to access the network device according to the first indication information, if yes, execute step 1003, if not, execute step 1004.
  • Step 1003 The terminal device obtains a random access response from the downlink shared channel, or obtains contention resolution information from the downlink shared channel, and continues random access.
  • Step 1004 The terminal device does not obtain a random access response from the downlink shared channel, or does not obtain contention resolution information from the downlink shared channel, and terminates the random access.
  • the network device can randomly access the terminal device when the terminal device has initiated a random access request. Entry is restricted. In this case, if the number of terminal devices associated with a certain characteristic parameter is connected to the network device in the current period, the network device can also access the terminal devices associated with the characteristic parameter in the current period. Perform restrictions to reduce network load and allocate resources to terminal devices associated with various characteristic parameters in a balanced manner.
  • FIG. 11 exemplarily shows a schematic flow chart of another method for information transmission provided by the sixth embodiment.
  • the method may be executed by a terminal device and a network device, and the terminal device is used to access a cell covered by the network device.
  • the method includes:
  • Step 1101 The terminal device receives a media access layer protocol data unit MAC PDU from the network device, and the MAC PDU includes the second indication information.
  • Step 1102 The terminal device determines the position of the second indication information in the MAC PDU:
  • the second indication information is located in the preset media access control information (refers to one or more MAC subPDUs newly added in the MAC PDU)
  • the second indication information is used to indicate whether to allow the association of each of the N types of characteristic parameters If the terminal device is connected to the network device, go to step 1103; or,
  • the second indication information is in the random access response RAR, the second indication information is used to indicate whether the terminal device receiving the random access response is allowed to access the network device, and step 1104 is performed; or,
  • the second indication information is in the backoff indication BI, the second indication information is used to indicate whether to allow the terminal device associated with one or more characteristic parameters to access the network device, and step 1105 is executed.
  • Step 1103 The terminal device determines whether to allow the feature parameters supported by the terminal device to access the network device according to the second indication information in the preset media access control information, if yes, execute step 1106, if not, execute step 1107.
  • the second indication information may include S bits, and the S bits are the bits included in one or more MAC subheaders newly added in the MAC PDU, because one MAC subheader It can occupy 8 bits, so the value of S can be an integer multiple of 8.
  • the value of S is not less than N.
  • the value of one of the N bits can be used to indicate:
  • the terminal device associated with the characteristic parameter corresponding to this bit is not allowed to access the network device.
  • this bit when the value of this bit is 1, it indicates that the terminal device associated with the characteristic parameter corresponding to the bit is allowed to access the network device, and when the value of this bit is 0, it indicates that the corresponding terminal device of the bit is not allowed
  • the terminal equipment associated with the characteristic parameter is connected to the network equipment.
  • the N bits when the value of S is greater than N, the N bits may be consecutive N bits among the S bits, or may be non-contiguous N bits among the S bits.
  • the position is not limited.
  • Step 1104 The terminal device determines whether to allow the terminal device receiving the random access response to access the network device according to the second indication information in the random access response, if yes, execute step 1106, if not, execute step 1107.
  • the second indication information may include 1 bit, which may be 1 reserved bit in the random access response, or uplink scheduling authorization information in the random access response (I.e. UR-grant) 1 reserved bit (i.e. CSI request field). The value of this bit is used to indicate:
  • the terminal device that receives the random access response is not allowed to access the network device.
  • the terminal device that receives the random access response is allowed to access the network device, and when the value of this bit is 0, the terminal device that receives the random access response is not allowed Access network equipment.
  • the network device can set the value of the reserved bit in the random access response according to the load situation of the current access. For example, in the case that the number of currently accessed loads is greater than the preset number of reloads, the value of the preset bit in 90% of the random access responses can be set to 0, and the remaining 10% of the random access responses can be set to 0.
  • the value of the preset bit is set to 1, so that 10% of the terminal devices that apply for access to the network device are allowed to access the network device in the current period, thereby reducing the number of terminal devices that are connected to the network device and reducing the network load.
  • the value of the preset bit in each random access response can also be set to 1, so as not to restrict the access of the terminal device.
  • the second indication information may include 2 bits, and these 2 bits may be 1 reserved bit in the random access response and 1 in the uplink scheduling authorization information. Reserved bits (ie CSI request field). The bit status of these two bits is used to indicate:
  • the terminal device that receives the random access response is not allowed to access the network device.
  • bit status of these two bits when the bit status of these two bits is 11, it indicates that the terminal device that receives the random access response is allowed to access the network device.
  • value of the bit when the value of the bit is not 11, for example, 00, 01, or 10. , Indicating that the terminal device that receives the random access response is not allowed to access the network device.
  • the network device can use a reserved bit in the random access response or uplink scheduling authorization information to indicate whether the terminal device can access the network device, or use one of the random access responses.
  • the reserved bit and 1 reserved bit in the uplink scheduling authorization information are used to jointly indicate whether the terminal device can access the network device, so that the indication method is more flexible.
  • the random access configuration is carried in the random access response. , It is possible to configure only the terminal equipment that will be connected to the network equipment in the next step, instead of configuring all the terminal equipment, thereby saving configuration resources.
  • Step 1105 The terminal device determines whether to allow the characteristic parameter supported by the terminal device to access the network device according to the second indication information in the backoff instruction, if yes, execute step 1106, if not, execute step 1107.
  • the second indication information may include 2 bits, and these 2 bits may be 2 reserved bits in the backoff indication information BI. Since 2 bits can include up to 4 bit states, the bit states of these 2 bits can be used to indicate 4 possible random access configurations. These 4 random access configurations can be set according to actual needs. For example, in a scenario:
  • the bit state of 2 bits is 00, indicating that the terminal device is not allowed to access the network device; or,
  • the bit status of 2 bits is 11, indicating that the terminal device is allowed to access the network device;
  • the bit status of 2 bits is 00, indicating that the terminal device associated with characteristic parameter 1 is allowed to access the network device; or,
  • the bit state of the 2 bits is 01, indicating that the terminal device associated with the characteristic parameter 2 is allowed to access the network device; or,
  • the bit status of 2 bits is 10, indicating that the terminal device associated with the characteristic parameter 3 is allowed to access the network device; or,
  • the bit status of the 2 bits is 11, indicating that the terminal device associated with the characteristic parameter 4 is allowed to access the network device.
  • the first characteristic parameter is associated with a terminal device with a terminal bandwidth equal to 5MHz
  • the second characteristic parameter is associated with a terminal device with a terminal bandwidth equal to 5MHz and 10MHz
  • the third characteristic parameter is associated with a terminal with a terminal bandwidth equal to 20MHz.
  • Table 11 exemplarily shows an indication mode of the second indication information:
  • the terminal device When the bit status of 2 bits is 00, the terminal device is not allowed to access the network device;
  • the terminal device associated with the first characteristic parameter that is, the terminal device with the terminal bandwidth equal to 5MHz
  • the terminal device with the terminal bandwidth equal to 5MHz is allowed to access the network device
  • the terminal device associated with the second characteristic parameter (that is, the terminal device with the terminal bandwidth equal to 5MHz or equal to 10MHz) is allowed to access the network device;
  • the terminal device associated with the third characteristic parameter (that is, the terminal device with the terminal bandwidth equal to 20MHz) is allowed to access the network device;
  • Step 1106 The terminal device sends a contention resolution identifier to the network device.
  • the contention resolution identifier includes the unique identifier of the terminal device, and the terminal device continues random access.
  • Step 1107 The terminal device does not send a contention resolution identifier to the network device, and the terminal device terminates random access.
  • the random access of the terminal device that obtains the MAC PDU (for example, random access response) of the media access control layer protocol data unit can be configured.
  • the terminal equipment associated with a certain characteristic parameter is allowed to access network equipment before, the terminal equipment associated with this characteristic parameter in the cell currently has a heavier access load. Then in this case, It is also possible to restrict the random access of the terminal devices that have received the random access response among the terminal devices associated with the characteristic parameter, so as to reduce the network load in time.
  • the foregoing embodiments describe how to configure random access of terminal devices from the perspective of using characteristic parameters to group terminal devices.
  • this application since the random access of terminal devices is also associated with the preamble index, this application can also The preamble index is grouped to obtain multiple groups of preamble resources, and the random access of the terminal device is configured by configuring the random access of each group of preamble resources.
  • Embodiment 7 and Embodiment 8 as examples to describe two possible ways of configuring random access of a terminal device through preamble resources.
  • FIG. 12 exemplarily shows a schematic flow chart of a method for information transmission provided in the seventh embodiment.
  • the method may be executed by a terminal device and a network device, and the terminal device is used to access a cell covered by the network device.
  • the method includes:
  • Step 1201 The terminal device receives signaling from the network device.
  • the signaling includes configuration information of X groups of preamble resources, and X is an integer greater than zero.
  • the configuration information of the X groups of preamble resources is used to indicate the range of preamble indexes corresponding to the X groups of preamble resources.
  • the network device can select one or more of the 64 preamble indexes for configuration. For example, only one preamble index can be selected and configured as a group of preamble resources, or it can also be selected
  • the 50 preamble indexes are configured as 3 groups of preamble resources.
  • the following takes the configuration of 64 preamble indexes as X groups of preamble resources as an example to exemplarily introduce two possible configuration methods.
  • preamble indexes can be randomly configured as X groups of preamble resources, and the value of X can be any integer greater than 0 and not greater than 64.
  • Table 12 exemplarily shows a correspondence table for randomly configuring X groups of preamble resources:
  • the number of preamble indexes in each group of preamble resources can be different, for example:
  • Preamble resource group 1 includes preamble index 0 to preamble index 8, a total of 9 preamble indexes;
  • Preamble resource group 2 includes preamble index 9 to preamble index 20, a total of 12 preamble indexes;
  • Preamble resource group 3 includes preamble index 21 to preamble index 35, a total of 15 preamble indexes;
  • the preamble resource group 4 includes a preamble index 36 to a preamble index 44, a total of 9 preamble indexes;
  • the preamble resource group 5 includes a preamble index 45 to a preamble index 63, a total of 19 preamble indexes.
  • 64 preamble indexes can be averagely configured as X groups of preamble resources, and the value of X can be a power of 2, namely [2, 4, 8, 16, 32, 64 ] One of the values.
  • Table 13 exemplarily shows a corresponding relationship table for evenly configuring X groups of leading resources:
  • the number of preamble indexes in each group of preamble resources can be the same, for example:
  • Preamble resource group 1 includes preamble index 0 to preamble index 15, a total of 16 preamble indexes;
  • Preamble resource group 2 includes preamble index 16 to preamble index 31, a total of 16 preamble indexes;
  • Preamble resource group 3 includes preamble index 32 to preamble index 47, a total of 16 preamble indexes;
  • the preamble resource group 4 includes a preamble index 48 to a preamble index 63, a total of 16 preamble indexes.
  • the configuration information of the X group of preamble resources may also be determined according to a predefined rule, for example, set in the terminal device when the terminal device leaves the factory. internal.
  • Step 1202 The terminal device receives second information from the network device, where the second information is used to indicate whether to allow the terminal device associated with each group of preamble resources in the X groups of preamble resources to access the network device.
  • the second information may also indicate whether to allow terminal devices associated with each group of preamble resources to access network devices in a bitmap manner. Two possible indication methods are described below.
  • the second information may include a seventh bit, the seventh bit includes X bits, the X bits correspond to X groups of preamble resources, and X is an integer greater than 0 and not greater than 64.
  • the value of one of the X bits is used to indicate:
  • the terminal device associated with the preamble resource corresponding to this bit is not allowed to access the network device.
  • the seventh bit may include 4 bits, and Table 14 exemplarily shows an indication of the seventh bit:
  • the value of a bit in the seventh bit is 1, indicating that the terminal device associated with the preamble resource corresponding to the bit is allowed to access the network device, and the value of a bit in the seventh bit is 0, indicating that the terminal device associated with the preamble resource corresponding to this bit is not allowed to access the network device.
  • the second information may include an eighth bit, and the eighth bit includes One bit, each bit can correspond to the Y group of preamble resources in the X group of preamble resources, and the bit status of each bit is used to indicate whether the terminal device associated with the corresponding Y group of preamble resources is allowed to access the network device.
  • the value of Y can be an integer greater than 0 and not greater than X. For example, if there are 12 groups of preamble resources, and each of the 4 groups of preamble resources corresponds to 1 bit, the eighth bit may include 3 bits, and the value of the first bit is used to indicate whether the first group is allowed The terminal equipment associated with the fourth group of preamble resources is connected to the network equipment.
  • the value of the second bit is used to indicate whether the terminal equipment associated with the fifth to the eighth group of preamble resources is allowed to access the network equipment.
  • the third bit The value of the bit is used to indicate whether to allow terminal devices associated with the 9th to 12th groups of preamble resources to access the network device.
  • the value of Y may be configured by the network device to the terminal device, or may be a predefined integer, for example, set inside the terminal device when the terminal device leaves the factory. If the value of Y is configured by the network device to the terminal device, the terminal device does not know how large the value of Y is, so the ninth bit needs to be set in the second information, and the bit status of the ninth bit is used to indicate Y For the value of, refer to the second embodiment for specific implementation. If the value of Y is a predefined integer, since the terminal device knows how large the value of Y is, it is no longer necessary to set an additional ninth bit in the second information to indicate the value of Y.
  • each bit can correspond to any number of groups of preamble resources, for example, the first bit corresponds to 3 groups.
  • Preamble resources the second bit corresponds to 1 group of preamble resources
  • the third bit corresponds to 2 groups of preamble resources
  • the preamble resources corresponding to two adjacent bits can be continuous or discontinuous.
  • This situation can be more Flexible configuration of random access for each group of preamble resources.
  • the association relationship between each bit and the preamble resource can be preset in the terminal device.
  • Step 1203 The terminal device determines the preamble index corresponding to the random access, and determines the preamble resource associated with the terminal device according to the preamble index and the configuration information of the X groups of preamble resources.
  • the method for the terminal device to determine the preamble index corresponding to random access can refer to the existing process.
  • the system information can also include a preamble index set, and the terminal device can start from the preamble index.
  • a preamble index (for example, preamble index 12) is randomly selected from the code index set as the preamble index for this random access.
  • the terminal device can determine that the preamble resource associated with the terminal device is the preamble resource group 1.
  • Step 1204 The terminal device determines whether to allow the preamble resource associated with the terminal device to access the network device, if yes, execute step 1205, and if not, execute step 1206.
  • the preamble resource associated with the terminal device is allowed to access the network device. If the preamble index selected by the terminal device belongs to the preamble resource group 2 or the preamble resource group 3, the preamble resource associated with the terminal device is not allowed to access the network device.
  • Step 1205 the terminal device accesses the network device, for example, the terminal device initiates random access, or the terminal device continues random access.
  • Step 1206 The terminal device does not access the network device, for example, the terminal device does not initiate random access, or the terminal device terminates random access.
  • the network equipment can limit the random access of the terminal equipment by restricting the random access of the preamble resource. In this way, even if the terminal equipment is not grouped according to the characteristic parameters, it can also group different terminal equipment. Set up different random access configurations.
  • the second information may also include configuration information of random access opportunities for terminal devices associated with each group of preamble resources.
  • the terminal device can access the network device according to the random access opportunity corresponding to the associated preamble resource.
  • any indication of the configuration information including the random access opportunity of the terminal device associated with the X groups of preamble resources please refer to the second embodiment and the third embodiment of how the first information includes random access of N types of characteristic parameters. The configuration information of the opportunity will not be introduced here.
  • FIG. 13 exemplarily shows a schematic flow chart of a method for information transmission provided in Embodiment 8.
  • the method may be executed by a terminal device and a network device, and the terminal device is used to access a cell covered by the network device.
  • the method includes:
  • Step 1301 The terminal device receives signaling from the network device.
  • the signaling includes the configuration information of the X groups of preamble resources and the association relationship between the X groups of preamble resources and N types of characteristic parameters, where X and N are integers not less than 0.
  • association relationship between the X groups of leading resources and the N types of characteristic parameters may be:
  • a set of leading resources corresponds to a characteristic parameter
  • a set of leading resources corresponds to multiple characteristic parameters.
  • Table 15 shows an association table of X groups of leading resources and N types of characteristic parameters:
  • Leading Resource Group 1 2 3 Preamble index 0 ⁇ 19 20 ⁇ 39 40 ⁇ 63 Characteristic parameter Industrial wireless sensor network Wearable device Video Surveillance
  • preamble indexes are randomly configured as 3 groups of preamble resources, terminal devices associated with 3 characteristic parameters correspond to 3 service types, and one characteristic parameter can correspond to a group of preamble resources.
  • different preamble resources can be associated with terminal devices of different service types, for example:
  • the preamble resource group 1 is associated with terminal equipment of the industrial wireless sensor network type, and the preamble index ranges from 0 to 19;
  • the preamble resource group 2 is associated with terminal devices of the wearable device type, and the preamble index ranges from 20 to 39;
  • the preamble resource group 3 is associated with terminal equipment of the video surveillance type, and the preamble index ranges from 40 to 63.
  • Table 16 shows another association table of X groups of predecessor resources and N types of characteristic parameters:
  • 64 preamble indexes are randomly configured into 3 groups, terminal devices associated with two characteristic parameters correspond to two terminal bandwidths, and one characteristic parameter can correspond to multiple groups of preamble resources, for example:
  • Preamble resource group 1 and preamble resource group 2 correspond to terminal devices whose terminal bandwidth is not greater than 5MHz, the preamble index range of preamble resource group 1 is 0-19, and the preamble index range of preamble resource group 2 is 20-39;
  • the preamble resource 3 corresponds to a terminal device with a terminal bandwidth greater than 5 MHz and not greater than 10 MHz, and the preamble index ranges from 40 to 63.
  • Table 17 shows another association table of X group of predecessor resources and N types of characteristic parameters:
  • preamble indexes are configured into 2 groups on average, terminal devices associated with 3 characteristic parameters correspond to 3 types of mobility, and multiple characteristic parameters can correspond to a group of preamble resources, for example:
  • Preamble resource group 1 corresponds to fixed terminal equipment and terminal equipment with a mobile frequency lower than the first frequency, and the preamble index range of preamble resource group 1 is 0 to 31;
  • the preamble resource group 2 corresponds to a terminal device whose mobile frequency is greater than the first frequency, and the preamble index of the preamble resource group 2 ranges from 32 to 63.
  • Step 1302 The terminal device receives second information from the network device, where the second information is used to indicate the following:
  • Random access opportunities of terminal devices associated with each group of preamble resources in the X groups of preamble resources are Random access opportunities of terminal devices associated with each group of preamble resources in the X groups of preamble resources.
  • Random access opportunities of the terminal equipment associated with each of the N types of characteristic parameters are Random access opportunities of the terminal equipment associated with each of the N types of characteristic parameters.
  • the second information is used to indicate the random access opportunity of the terminal equipment associated with each group of preamble resources in the X group of preamble resources, or whether the terminal equipment associated with each group of preamble resources in the X group of preamble resources can access the network equipment as an example. Introduce the follow-up process.
  • Step 1303 The terminal device determines the preamble resource corresponding to the supported characteristic parameter according to the association relationship between the preamble resource and the characteristic parameter.
  • the preamble resource corresponding to the characteristic parameter supported by the terminal device is the preamble resource group 2.
  • Step 1304 The terminal device determines whether the terminal device is allowed to access the network device according to the preamble resource corresponding to the supported feature parameter, if yes, execute step 1305, if not, execute step 1306.
  • Step 1305 the terminal device accesses the network device.
  • Step 1306 The terminal device does not access the network device.
  • the second information can be used to indicate whether to allow the terminal equipment associated with each group of preamble resources in the X groups of preamble resources to access the network equipment.
  • the terminal device can continue random access. If the preamble resource corresponding to the characteristic parameter supported by the terminal device is not allowed to access the network device, the terminal The device can terminate random access.
  • the network device can determine the allowable use based on the number of terminal devices associated with various characteristic parameters that have been accessed in the cell and the association relationship between the characteristic parameters and the preamble resources.
  • the second information in the current period, if the number of video surveillance terminal devices in the cell is large, but the number of terminal devices of other types of services is small, the second information can be used for It indicates that the preamble resource group 3 corresponding to the video surveillance category is not allowed to be used for access, and/or, the second information may be used to indicate that the preamble resource group 1 and the preamble resource group 2 corresponding to other service types are allowed to be used for random access.
  • the first The second information may be used to indicate that the preamble resource group 1 with the maximum terminal bandwidth equal to 5 MHz is not allowed to be used for random access, and/or the second information is used to indicate that the maximum terminal bandwidth is not allowed to be supported is not equal to 5 MHz (for example, to support the maximum terminal bandwidth
  • the preamble resource group 2 that is equal to 10 MHz, and/or supports the maximum terminal bandwidth equal to 20 MHz) is used for random access.
  • the second information can be used to indicate the random access opportunity of the terminal device associated with each group of preamble resources in the X groups of preamble resources.
  • the terminal device can select a preamble index from the range of the preamble index corresponding to the preamble resource corresponding to the supported characteristic parameter as the preamble index for this random access, and can select the preamble index in the preamble resource corresponding to the supported characteristic parameter.
  • the random access opportunity sends a random access request to the network device.
  • the random access request includes the preamble index of this random access. In this way, the terminal device can initiate random access.
  • each preamble index allows one terminal device to access the network device, by associating X groups of preamble resources with N types of characteristic parameters, the terminal equipment associated with each characteristic parameter is The preamble is selected from the corresponding preamble resource for access, so that the number of access network devices for each characteristic parameter can also be controlled.
  • the embodiment of the application can use one or more of the configuration indication information of the random access opportunity, the association relationship between characteristic parameters and the terminal device, and the association relationship between the preamble resource and the terminal device to restrict the random access of the terminal device.
  • the terminal device can access the network device according to the first method corresponding to it or not access the network device, but does not need to have the same random access configuration as other terminal devices. In this way, terminal device access can be improved. Flexibility of network equipment.
  • each network element described above includes hardware structures and/or software modules corresponding to each function.
  • the present invention can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered as going beyond the scope of the present invention.
  • FIG. 14 is a schematic structural diagram of an information transmission apparatus 1401 provided by an embodiment of the application.
  • the information transmission apparatus 1401 may be a terminal device or a network device, or a chip or circuit, such as A chip or circuit that can be installed in a terminal device, for example, a chip or circuit that can be installed in a network device.
  • the information transmission device 1401 may further include a bus system, where the processor 1402, the memory 1404, and the transceiver 1403 may be connected through the bus system.
  • the aforementioned processor 1402 may be a chip.
  • the processor 1402 may be a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), or a system on chip (SoC). It can be a central processor unit (CPU), a network processor (NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (microcontroller). unit, MCU), and may also be a programmable logic device (PLD) or other integrated chips.
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • SoC system on chip
  • CPU central processor unit
  • NP network processor
  • DSP digital signal processing circuit
  • microcontroller microcontroller
  • unit, MCU and may also be a programmable logic device (PLD) or other integrated chips.
  • PLD programmable logic device
  • the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 1402 or instructions in the form of software.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor 1402.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 1404, and the processor 1402 reads the information in the memory 1404, and completes the steps of the foregoing method in combination with its hardware.
  • the processor 1402 in the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components .
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory 1404 in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM
  • the information transmission apparatus 1401 may include a processor 1402, a transceiver 1403, and a memory 1404.
  • the memory 1404 is used to store instructions
  • the processor 1402 is used to execute the instructions stored in the memory 1404, so as to implement the relevant solutions of the terminal device in any one or more of the corresponding methods shown in FIGS. 1 to 13 above. .
  • the information transmission device 1401 may be used to execute the method executed by the terminal device in any one of the foregoing Embodiment 1 to Embodiment 8.
  • the information transmission apparatus 1401 is the aforementioned terminal device, and when the first embodiment is implemented, the transceiver 1403 can receive the first information sent by the network device.
  • the first information includes the configuration indication information of the random access opportunity, and the processor 1402 can follow the random access
  • the configuration indication information of the opportunity determines the first way.
  • the transceiver 1403 may also receive the first information sent by the network device, and the processor 1402 may also determine the first mode according to whether the first information includes the configuration indication information of the random access opportunity.
  • the transceiver 1403 may also receive second information sent by the network device. The second information is used to indicate the first mode of the terminal device associated with each of the one or more characteristic parameters.
  • the processor 1402 may also The second information determines the first way.
  • the transceiver 1403 may also receive second information sent by the network device, where the second information is used to indicate the first mode of the terminal device associated with one or more preamble resources, and the processor 1402 may also determine the first mode according to the second information.
  • the first method is one of accessing network equipment, not accessing network equipment, performing random access, and not performing random access.
  • the information transmission apparatus 1401 may include a processor 1402, a transceiver 1403, and a memory 1404.
  • the memory 1404 is used to store instructions
  • the processor 1402 is used to execute the instructions stored in the memory 1404, so as to implement the relevant solutions of the terminal device in any one or more of the corresponding methods shown in FIGS. 1 to 13 above. .
  • the information transmission device 1401 may be used to execute the method executed by the network device in any one of the foregoing Embodiment 1 to Embodiment 8.
  • the information transmission apparatus 1401 is the above-mentioned network equipment, and when the first embodiment is implemented, the transceiver 1403 may send first information to the terminal equipment.
  • the first information includes the configuration indication information of the random access opportunity.
  • the configuration indication information of the access opportunity determines the first mode, and the processor 1402 may allow the terminal device to access the network device when the first mode is to access the network device or perform random access.
  • the transceiver 1403 may also send first information to the terminal device, where the first information is used by the terminal device to determine the first method according to whether the first information contains the configuration indication information of the random access opportunity, and the processor 1402 is in the first mode.
  • the terminal equipment can be allowed to access the network equipment.
  • the transceiver 1403 may also send second information to the terminal device, the second information indicating the first mode of the terminal device associated with each of the one or more characteristic parameters, and the second information is used by the terminal device according to the first method.
  • the second information determines the first mode
  • the processor 1402 may allow the terminal device to access the network device when the first mode is to access the network device or perform random access.
  • the transceiver 1403 may also send second information to the terminal device, the second information indicating the first mode of the terminal device associated with one or more preamble resources, and the second information is used by the terminal device to determine the first mode according to the second information
  • the processor 1402 may allow the terminal device to access the network device when the first method is to access the network device or perform random access.
  • the first method is one of accessing network equipment, not accessing network equipment, performing random access, and not performing random access.
  • FIG. 15 is a schematic structural diagram of an information transmission apparatus 1501 provided in an embodiment of the application.
  • the information transmission apparatus 1501 may include a communication interface 1503, a processor 1502, and a memory 1504.
  • the communication interface 1503 is used to input and/or output information; the processor 1502 is used to execute computer programs or instructions, so that the information transmission apparatus 1501 implements the terminal device side in the above-mentioned related solutions of FIGS. 1 to 13
  • the method, or the apparatus 1501 for information transmission implements the method on the network device side in the above-mentioned related solutions of FIG. 1 to FIG. 13.
  • the communication interface 1503 can implement the solution implemented by the transceiver 1403 in FIG. 14, the processor 1502 can implement the solution implemented by the processor 1402 in FIG. 14, and the memory 1504 can implement the memory 1404 in FIG. 14.
  • the implemented scheme will not be repeated here.
  • FIG. 16 is a schematic diagram of an information transmission apparatus 1601 provided by an embodiment of this application.
  • the information transmission apparatus 1601 may be a terminal device or a network device, or a chip or Circuits, such as chips or circuits that can be installed in terminal equipment or network equipment.
  • the information transmission apparatus 1601 may correspond to the terminal equipment in the foregoing method.
  • the information transmission apparatus 1601 can implement the steps performed by the terminal device in any one or more of the corresponding methods shown in FIG. 1 to FIG. 13 above.
  • the information transmission device 1601 may include a processing unit 1602 and a transceiver unit 1603.
  • the transceiver unit 1603 can be a sending unit or a transmitter when sending information, the transceiver unit 1603 can be a receiving unit or a receiver when receiving information, and the transceiver unit 1603 can be a transceiver.
  • the transceiver, transmitter, or receiver may be a radio frequency circuit.
  • the information transmission device 1601 includes a storage unit, the storage unit is used to store computer instructions.
  • the processing unit 1602 is in communication with the storage unit, and the processing unit 1602 executes the storage unit storage
  • the computer instructions enable the information transmission device 1601 to be used to execute the method executed by the terminal device in any one of the foregoing Embodiment 1 to Embodiment 8.
  • the processing unit 1602 may be a general-purpose central processing unit (CPU), a microprocessor, or an application specific integrated circuit (ASIC).
  • the information transmission apparatus 1601 is the aforementioned terminal device, and when the first embodiment is implemented, the transceiver unit 1603 can receive the first information sent by the network device.
  • the first information includes the configuration indication information of the random access opportunity, and the processing unit 1602 can follow the random access
  • the configuration indication information of the opportunity determines the first way.
  • the transceiving unit 1603 may also receive the first information sent by the network device, and the processing unit 1602 may also determine the first mode according to whether the first information includes the configuration indication information of the random access opportunity.
  • the transceiving unit 1603 may also receive second information sent by the network device. The second information is used to indicate the first mode of the terminal device associated with each of the one or more characteristic parameters.
  • the processing unit 1602 may also The second information determines the first way.
  • the transceiving unit 1603 may also receive second information sent by the network device, the second information is used to indicate the first mode of the terminal device associated with one or more preamble resources, and the processing unit 1602 may also determine the first mode according to the second information.
  • the first method is one of accessing network equipment, not accessing network equipment, performing random access, and not performing random access.
  • the transceiving unit 1603 can be a sending unit or a transmitter when sending information, the transceiving unit 1603 can be a receiving unit or a receiver when receiving information, and the transceiving unit 1603 can be a transceiver.
  • the transceiver, transmitter or receiver may be a radio frequency circuit.
  • the information transmission device 1601 includes a storage unit, the storage unit is used to store computer instructions.
  • the processor is in communication connection with the memory, and the processing unit 1602 executes the computer instructions stored in the memory.
  • the device 1601 for information transmission can be used to execute the method executed by the network device in any one of the foregoing Embodiment 1 to Embodiment 8.
  • the processing unit 1602 may be a general-purpose central processing unit (CPU), a microprocessor, or an application specific integrated circuit (ASIC).
  • the information transmission apparatus 1601 is the aforementioned network device, and when the first embodiment is executed, the transceiver unit 1603 may send first information to the terminal device.
  • the first information includes the configuration indication information of the random access opportunity.
  • the configuration indication information of the access opportunity determines the first mode, and the processing unit 1602 may allow the terminal device to access the network device when the first mode is to access the network device or perform random access.
  • the transceiving unit 1603 may also send first information to the terminal device, where the first information is used by the terminal device to determine the first method according to whether the first information contains the configuration indication information of the random access opportunity, and the processing unit 1602 is in the first mode. In the case of access to network equipment or random access, the terminal equipment can be allowed to access the network equipment.
  • the transceiver unit 1603 may also send second information to the terminal device, the second information indicating the first mode of the terminal device associated with each of the one or more characteristic parameters, and the second information is used by the terminal device according to the The second information determines the first method, and the processing unit 1602 may allow the terminal device to access the network device when the first method is to access the network device or perform random access.
  • the transceiver unit 1603 may also send second information to the terminal device, the second information indicating the first mode of the terminal device associated with one or more preamble resources, and the second information is used by the terminal device to determine the first mode according to the second information ,
  • the processing unit 1602 may allow the terminal device to access the network device when the first method is to access the network device or perform random access.
  • the first method is one of accessing network equipment, not accessing network equipment, performing random access, and not performing random access.
  • the transceiver unit 1603 may be an input and/or output interface, a pin, or a circuit.
  • the processing unit 1602 can execute the computer-executable instructions stored in the storage unit, so that the chip in the information transmission device 1601 executes the method executed in any one of the first to the eighth embodiments.
  • the storage unit is a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the information transmission device 1601, such as a read only memory (ROM) Or other types of static storage devices that can store static information and instructions, random access memory (Random Access Memory, RAM), etc.
  • ROM read only memory
  • RAM random access memory
  • the division of the units of the above information transmission apparatus 1601 is only a division of logical functions, and may be fully or partially integrated into one physical entity in actual implementation, or may be physically separated.
  • the transceiver unit 1603 may be implemented by the transceiver 1403 in FIG. 14 described above, and the processing unit 1602 may be implemented by the processor 1402 in FIG. 14 described above.
  • the present application also provides a computer program product.
  • the computer program product includes: computer program code, which when the computer program code runs on a computer, causes the computer to execute the steps shown in FIGS. 1 to 13 The method of any one of the embodiments is shown.
  • the present application also provides a computer-readable storage medium, the computer-readable medium stores program code, and when the program code runs on a computer, the computer executes FIGS. 1 to 13 The method of any one of the illustrated embodiments.
  • the present application also provides a system, which includes the aforementioned one or more terminal devices and one or more network devices.
  • the computer may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc, SSD)) etc.
  • the network equipment in the above device embodiments corresponds to the network equipment or terminal equipment in the terminal equipment and method embodiments, and the corresponding modules or units execute the corresponding steps.
  • the communication unit transmits the receiving or sending in the method embodiments.
  • other steps can be executed by the processing unit (processor).
  • the processing unit processor
  • the functions of specific units refer to the corresponding method embodiments. Among them, there may be one or more processors.
  • component used in this specification are used to denote computer-related entities, hardware, firmware, a combination of hardware and software, software, or software in execution.
  • the component may be, but is not limited to, a process, a processor, an object, an executable file, an execution thread, a program, and/or a computer running on a processor.
  • the application running on the computing device and the computing device can be components.
  • One or more components may reside in processes and/or threads of execution, and components may be located on one computer and/or distributed between two or more computers.
  • these components can be executed from various computer readable media having various data structures stored thereon.
  • a component may be based on a signal having one or more data packets (for example, data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet that interacts with other systems through signals). Communicate through local and/or remote processes.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种信息传输的方法、装置及系统,用于灵活控制终端设备的随机接入。方法包括:终端设备接收网络设备发送的第一信息,根据第一信息是否包含随机接入机会的配置指示信息或包含的随机接入机会的配置指示信息确定该终端设备的第一方式,或者,终端设备接收网络设备发送的第二信息,根据第二信息指示的特征参量关联的终端设备的第一方式或前导资源关联的终端设备的第一方式确定该终端设备的第一方式。根据随机接入机会的配置指示信息、特征参量和终端设备的关联关系、前导资源和终端设备的关联关系中的至少一项配置终端设备的随机接入,能灵活控制终端设备接入网络设备,有助于平衡终端设备在网络设备中的接入量,从而平衡网络负载。

Description

一种信息传输的方法、装置及系统
相关申请的交叉引用
本申请要求在2020年05月09日提交中国专利局、申请号为202010387505.3、申请名称为“一种信息传输的方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种信息传输的方法、装置及系统。
背景技术
海量机器类型通信(massive machine type communication,mMTC)是第五代通信技术(new radio,NR)中的一种典型应用场景,被广泛应用于智能电网、智能交通、环境保护、政府工作、公共安全、智能家居、智能消防、工业监测和个人健康等多个领域。mMTC场景中存在大量的终端设备,在初始接入时,可能会有很多终端设备选择在同一个随机接入机会接入小区。然而,如果小区在该随机接入机会下的负载较重,则小区的大部分资源可能已经分配给了已经接入的终端设备,导致小区剩余的可用资源较少。因此,如果仍然允许这些终端设备使用该随机接入机会接入小区,则小区可能没有办法再为这些新接入的终端设备分配资源。在这种情况下,则需要对终端设备的接入进行限制。
现有方案中,小区只能对全部终端设备的接入进行限制,例如禁止全部终端设备接入小区,或者允许全部终端设备接入小区。显然,这种方式使得终端设备接入小区的灵活性较差。
发明内容
本申请提供一种信息传输的方法、装置及系统,用以根据随机接入机会的配置指示信息、特征参量和终端设备的关联关系、前导资源和终端设备的关联关系中的一项或多项对终端设备的随机接入进行限制,在这种情况下,终端设备可以按照自己所对应的第一方式接入网络设备或者不接入网络设备,从而可以提高终端设备接入网络设备的灵活性。进一步地,通过对终端设备接入网络设备进行控制,还可以平衡终端设备在网络设备中的接入量,达到平衡网络负载的目的。
第一方面,本申请提供一种信息传输的方法,该方法包括:终端设备接收网络设备发送的第一信息,第一信息中可以包括随机接入机会的配置指示信息,终端设备根据随机接入机会的配置指示信息确定第一方式,第一方式为:在终端设备发送随机接入请求的情况下,终端设备是否继续接入网络;或者,第一方式为:在终端设备没有发送随机接入请求的情况下,终端设备是否进行随机接入。
在该设计中,通过在第一信息中携带随机接入机会的配置指示信息,使得终端设备能够使用自己的随机接入机会接入网络设备或者不接入网络设备。采用这种方式,一方面能够控制终端设备接入网络设备,从而可以平衡终端设备在网络设备中的接入量,达到平衡 网络负载的目的。另一方面,各个终端设备可以具有各自的第一方式,例如各个终端设备可以具有各自的随机接入机会,或者部分终端设备可以接入网络设备而部分设备可以不接入网络设备,如此,各个终端设备的随机接入可以更加灵活。
在另一种可能的设计中,终端设备接收网络设备发送的第一信息,根据第一信息中是否包含随机接入机会的配置指示信息,确定第一方式,第一方式为:在终端设备发送随机接入请求的情况下,终端设备是否继续接入网络;或者,第一方式为:在终端设备没有发送随机接入请求的情况下,终端设备是否进行随机接入。其中,若第一信息中不包含随机接入机会的配置指示信息,则终端设备可以不接入网络设备,例如网络设备可以不使能终端设备的随机接入机会的配置,或者终端设备可以终止接入网络,或者终端设备可以不进行随机接入。若第一信息中包含随机接入机会的配置指示信息,则终端设备可以接入网络,例如网络设备使能终端设备的随机接入机会的配置,或终端设备接入网络,或终端设备进行随机接入。
在该设计中,通过利用第一信息中不包含随机接入机会的配置指示信息的方式,来指示终端设备不接入网络设备,使得可以不用再为不接入网络设备的情况占用额外的资源,从而能够达到节省网络开销的目的。
在另一种可能的设计中,终端设备接收网络设备发送的第二信息,第二信息指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,第一方式为:在终端设备发送随机接入请求的情况下,终端设备是否继续接入网络;或者,第一方式为:在终端设备没有发送随机接入请求的情况下,终端设备是否进行随机接入。
通过该设计,由于终端设备和特征参量之间建立有关联关系,因此通过对每种特征参量的随机接入进行配置,可以实现对该种特征参量所关联的终端设备的随机接入进行配置。如此,如果为各种特征参量所关联的终端设备设置不同的随机接入配置,则能够以终端设备分组的形式限制一组或多组终端设备的随机接入,这种方式能够在更细粒度上更加灵活地配置各个终端设备的随机接入。
在另一种可能的设计中,终端设备接收网络设备发送的第二信息,第二信息指示一个或多个前导资源所关联的终端设备的第一方式,第一方式为:在终端设备发送随机接入请求的情况下,终端设备是否继续接入网络;或者,第一方式为:在终端设备没有发送随机接入请求的情况下,终端设备是否进行随机接入。
通过该设计,由于终端设备和前导资源之间建立有关联关系,因此通过对每组前导资源的随机接入进行配置,可以实现对该组前导资源所关联的终端设备的随机接入进行配置。在这种情况下,如果为各组前导资源所关联的终端设备设置不同的随机接入配置,则终端设备能够以分组的形式按照自己所关联的前导资源的随机接入配置接入网络设备或者不接入网络设备,如此,能够在更细粒度上更加灵活地配置不同前导资源所关联的终端设备的随机接入。
在一种可能的设计中,终端设备可以是指某一类型的终端设备,例如降低能力的(reduced capbility,REDCAP)终端设备。通过该设计,网络设备能够对某一类型的终端设备的随机接入进行配置,使该类型的终端设备能够使用不同于其它类型终端设备的第一方式接入网络设备或者不接入网络设备,以提高该类型终端设备随机接入的灵活性。
在一种可能的设计中,在随机接入机会的配置指示信息为第一状态的情况下,随机接入机会的配置指示信息可以用于指示:不使能终端设备的随机接入机会的配置,或者终止 接入网络,或者不进行随机接入。或者,在随机接入机会的配置指示信息为第二状态的情况下,随机接入机会的配置指示信息可以用于指示:使能终端设备的随机接入机会的配置,或者继续接入网络,或者不进行随机接入。
通过该设计,随机接入机会的配置指示信息能够用于指示属于某一类型的终端设备接入网络设备或者不接入网络,如此,可以对一个类型的终端设备的随机接入进行限制,而可以不对其它类型的终端设备的随机接入进行限制,以降低对其它类型的终端设备的业务影响。
在一种可能的设计中,在随机接入机会的配置指示信息为第三状态的情况下,随机接入机会的配置指示信息还可以用于指示:第一信息中还包含一种或多种特征参量的随机接入机会的配置信息,每种特征参量的随机接入机会的配置信息包括以下参数中的一项或多项:该种特征参量所关联的终端设备对应的随机接入的时域资源、该种特征参量所关联的终端设备对应的随机接入的频域资源、该种特征参量所关联的终端设备对应的随机接入的周期、该种特征参量的标识信息。一种方式中,随机接入机会的配置指示信息可以按照比特位图的方式指示第一信息包含L种特征参量的随机接入机会的配置信息,如此,终端设备能够根据支持的特征参量及该特征参量的随机接入机会的配置指示信息确定第一方式,其中,L为大于0的整数。
通过该设计,通过对每种特征参量所关联的终端设备的随机接入机会进行配置,使得终端设备能够按照自己所支持的特征参量的随机接入机会发起随机接入,在这种情况下,如果各种特征参量的随机接入机会配置为不同,则各种特征参量所关联的各个终端设备还能够使用不同的随机接入机会接入网络设备,从而有助于降低网络负载。
在一种可能的设计中,特征参量包括以下参数中的一项或多项:业务类型、终端类型、系统带宽、终端带宽、功耗等级、功耗需求、波束标识、子载波间隔、频率范围、频率band、载波、双工类型、峰值速率、时延、移动性和调制阶数。通过该设计,终端设备能够在一个或多个特征维度上划分为多个组,从而能够按照分组依据对各种特征参量所关联的终端设备的随机接入进行限制。
在一种可能的设计中,在随机接入机会的配置指示信息为第三状态的情况下,第一信息中还包括配置随机接入机会的特征参量的数量指示信息,该数量指示信息可以包括
Figure PCTCN2021092356-appb-000001
个比特位,这些比特位的比特状态用于指示L的取值。其中,N为不小于L的整数,N用于指示特征参量的总数量。如此,通过使用随机接入机会的配置指示信息和配置随机接入机会的特征参量的数量指示信息联合指示L种特征参量的随机接入机会的配置信息,使得终端设备能够从第一信息中获取到自己支持的特征参量的随机接入机会的配置信息,以在该随机接入机会接入网络设备。
在一种可能的设计中,第二信息是下行控制信息或媒体接入控制信息,第二信息包括N个比特,这N个比特按照比特位图的方式指示N种特征参量中每种特征参量关联的终端设备的第一方式,例如,N个比特位中一个比特位的取值用于指示允许该比特位对应的特征参量关联的终端设备接入网络设备,或者,N个比特位中一个比特位的取值用于指示不允许该比特位对应的特征参量关联的终端设备接入网络设备。如此,终端设备能够根据支持的特征参量及第二信息确定第一方式。通过该设计,能够使用N个比特位中的每个比特位指示对应的特征参量所关联的终端设备能否接入网络设备,这样,N种特征参量所关联的终端设备能够分别按照各自支持的特征参量的随机接入配置接入网络设备,而可以不用 具有相同的随机接入配置,从而灵活性较好。
在一种可能的设计中,第二信息是随机接入响应或上行调度授权信息,第二信息指示属于某一类型的终端设备的第一方式,如此,终端设备若属于该类型,则根据第二信息的指示确定第一方式。一种方式中,第二信息可以包括1个比特,该比特位的取值用于指示:允许接收所述第二信息的终端设备接入网络设备,或者不允许接收所述第二信息的终端设备接入网络设备。通过该设计,能够使用随机接入响应中的1个预留比特来指示某一类型的终端设备能否接入网络设备,这种情况下,能够以较少的占用资源进行指示,有助于降低网络开销。
在一种可能的设计中,第二信息指示一个或多个前导资源所关联的终端设备的第一方式,包括:确定X组前导资源,这X组前导资源可以是按照预定义规则确定的,也可以是接收网络设备信令,根据该信令指示的信息配置X组前导资源确定的,每组前导资源包括至少一个前导码索引。一种情况下,第二信息中存在X个比特,X个比特按照比特位图的方式指示每组前导资源所关联的终端设备的第一方式,X是大于0且不大于64的整数,如此,终端设备根据关联的前导资源及第二信息确定终端设备的第一方式。另一种情况下,第二信息指示每Y组前导资源关联的终端设备的第一方式,Y的取值是配置的,或者预定义的整数,如此,终端设备根据关联的前导资源所属的Y组前导资源及第二信息确定终端设备的第一方式。如此,网络设备能够通过对前导资源的随机接入进行限制来限制与前导资源关联的终端设备的接入能力。
在一种可能的设计中,信令和/或第二信息中还包括前导资源与特征参量的关联关系,终端设备根据前导资源与特征参量的关联关系以及支持的特征参量,确定终端设备的第一方式。如此,终端设备能够从支持的特征参量所对应的前导资源中选择前导码索引进行随机接入,由于一个前导码索引可以支持一个终端设备接入,因此,这种情况还能对每种特征参量中能够接入网络设备的终端设备的数量进行限定,从而使得各种特征参量所关联的终端设备的接入数量更为均衡。
在一种可能的设计中,若终端设备确定终止接入网络设备,或者,终端设备确定不进行随机接入,则终端设备启动第一计时器,在第一计时器的时长达到预设时长后,终端设备重新接入网络设备,或者终端设备重新进行随机接入。其中,第一计时器的预设时长根据预定义规则确定,或者由网络设备配置。通过该设计,网络设备可以调整限制终端设备接入的时长,如果预设时长设置为不大的值,则终端设备在超过预设时长后可以重新接入,这样还可以避免终端设备在很长时间内无法接入网络设备的情况,避免对终端设备的业务造成长时间的阻塞。
在一种可能的设计中,第一信息是主系统信息块、系统信息块或专有无线资源控制信息,第二信息是系统信息、无线资源控制信息、随机接入响应、媒体接入控制信息、下行控制信息、上行调度授权信息或Msg4。通过该设计,本申请能够在随机接入开始之前对终端设备的随机接入进行配置,也可以在随机接入开始之后成功接入之前对终端设备的随机接入进行限制,还能够在成功接入之后对下一次的随机接入进行配置,因此本申请中的信息传输的方法可以适用于随机接入的各个时段。
在一种可能的设计中,第一信息还可以包括随机接入方式的配置指示信息,若随机接入方式的配置指示信息的比特状态为第四状态,指示不允许终端设备接入网络设备。或者,若随机接入方式的配置指示信息的比特状态为第五状态,指示终端设备的随机接入方式为 随机接入类型1。或者,若随机接入方式的配置指示信息的比特状态为第六状态,指示终端设备的随机接入方式为随机接入类型2。或者,若随机接入方式的配置指示信息的比特状态为第七状态,指示终端设备的随机接入方式为随机接入类型1或随机接入类型2。通过该设计,网络设备能够终端设备的业务紧急程度设置终端设备的随机接入方式,如果终端设备的业务较为紧急,则可以设置为随机接入类型2,如果终端设备的业务不紧急,则可以设置为随机接入类型1。如此,由于随机接入类型2相比与随机接入类型1的速度更快,因此能够使得业务较为紧急的终端设备及时且快速地接入网络设备。
第三方面,本申请提供一种信息传输的装置,该装置可以为终端设备,该装置包括:
收发单元,用于接收网络设备发送的第一信息,所述第一信息包含随机接入机会的配置指示信息;
处理单元,用于根据所述随机接入机会的配置指示信息确定第一方式。
其中,所述第一方式为:接入网络设备、不接入网络设备、进行随机接入、不进行随机接入中的一项。
在一种可能的设计中,所述收发单元,还用于接收网络设备发送的第一信息;所述处理单元,还用于根据所述第一信息中是否包含随机接入机会的配置指示信息确定第一方式。
在一种可能的设计中,所述收发单元,还用于接收网络设备发送的第二信息,所述第二信息用于指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式;所述处理单元,还用于根据所述第二信息确定第一方式。
在一种可能的设计中,所述收发单元,还用于接收网络设备发送的第二信息,所述第二信息用于指示一个或多个前导资源所关联的终端设备的第一方式;所述处理单元,还用于根据所述第二信息确定第一方式。
在一种可能的设计中,所述随机接入机会的配置指示信息用于指示以下内容中的至少一种:不使能终端设备的随机接入机会的配置、使能终端设备的随机接入机会的配置、终止接入网络设备、继续接入网络设备、不进行随机接入、进行随机接入、第一信息还包含一种或多种特征参量的随机接入机会的配置信息。
在一种可能的设计中,所述第一信息中不包含所述随机接入机会的配置指示信息。在这种情况下,所述处理单元具体用于:确定所述第一方式为不接入网络设备或不进行随机接入。
在一种可能的设计中,所述第一信息中包含所述随机接入机会的配置指示信息。在这种情况下,所述处理单元具体用于:确定所述第一方式为接入网络设备或进行随机接入。
在一种可能的设计中,所述随机接入机会的配置指示信息按照比特位图的方式指示所述第一信息包含一种或多种特征参量的随机接入机会的配置信息。在这种情况下,所述处理单元具体用于:根据支持的特征参量及所述随机接入机会的配置指示信息确定所述第一方式。
在一种可能的设计中,所述第二信息是下行控制信息或媒体接入控制信息,所述第二信息中包括N个比特,所述N个比特按照比特位图的方式指示N种特征参量中每种特征参量关联的终端设备的第一方式。这种情况下,所述处理单元具体用于:根据支持的特征参量及所述第二信息确定第一方式。
在一种可能的设计中,所述第二信息是随机接入响应或上行调度授权信息,所述第二信息指示终端设备的第一方式。这种情况下,所述处理单元具体用于:根据所述第二信息 的指示确定所述第一方式。
在一种可能的设计中,所述第二信息中包括X个比特,所述X个比特按照比特位图的方式指示每组前导资源关联的终端设备的第一方式。这种情况下,所述处理单元具体用于:确定X组前导资源,并根据关联的前导资源及所述第二信息确定所述第一方式。其中,所述X组前导资源是按照预定义规则确定,或者接收来自网络设备的信令,所述信令用于配置X组前导资源。其中,所述X是大于0且不大于64的整数。
在一种可能的设计中,所述第二信息指示每Y组前导资源关联的终端设备的第一方式。这种情况下,所述处理单元具体用于:根据关联的前导资源所属的Y组前导资源及所述第二信息确定所述第一方式。其中,所述Y的值是配置的或者预定义的整数。
在一种可能的设计中,所述X组前导资源和特征参量关联。在这种情况下,所述处理单元具体用于:根据X组前导资源和特征参量的关联关系以及支持的特征参量,确定所述第一方式。
在一种可能的设计中,所述处理单元还用于:确定不接入网络设备或不进行随机接入,启动第一计时器。其中,所述第一计时器的时长根据预定义规则确定,或者由所述网络设备配置。
在一种可能的设计中,所述第一信息是主系统信息块、系统信息块或专有无线资源控制信息。
在一种可能的设计中,所述第二信息是以下信息中的一种或多种:系统信息、无线资源控制信息、随机接入响应、媒体接入控制信息、下行控制信息、上行调度授权信息、Msg4。
在一种可能的设计中,所述特征参量为以下参数中的一项或多项:业务类型、终端类型、系统带宽、终端带宽、功耗等级、功耗需求、波束标识、子载波间隔、频率范围、频率band、载波、双工类型、峰值速率、时延、移动性、调制阶数等。
第四方面,本申请提供一种信息传输的装置,该装置可以为网络设备,该装置包括:
收发单元,用于向终端设备发送第一信息,所述第一信息包含随机接入机会的配置指示信息,所述第一信息用于所述终端设备根据所述随机接入机会的配置指示信息确定第一方式;
处理单元,用于在所述第一信息或所述第二信息指示所述终端设备接入网络设备或进行随机接入的情况下,允许终端设备接入。
其中,所述第一方式为接入网络设备、不接入网络设备、进行随机接入、不进行随机接入中的一项。
在一种可能的设计中,所述收发单元,还用于向终端设备发送第一信息,所述第一信息用于所述终端设备根据所述第一信息中是否包含随机接入机会的配置指示信息确定第一方式。
在一种可能的设计中,所述收发单元,还用于向终端设备发送第二信息,所述第二信息用于指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,所述第二信息用于所述终端设备确定第一方式。
在一种可能的设计中,所述收发单元,还用于向终端设备发送第二信息,所述第二信息用于指示一个或多个前导资源所关联的终端设备的第一方式,所述第二信息用于所述终端设备确定第一方式。
在一种可能的设计中,所述随机接入机会的配置指示信息用于指示以下内容中的至少 一种:不使能终端设备的随机接入机会的配置、使能终端设备的随机接入机会的配置、终止接入网络设备、继续接入网络设备、不进行随机接入、进行随机接入、第一信息还包含一种或多种特征参量的随机接入机会的配置信息。
在一种可能的设计中,所述第一信息中不包含所述随机接入机会的配置指示信息,所述第一信息用于指示所述第一方式为不接入网络设备或不进行随机接入。
在一种可能的设计中,所述第一信息中包含所述随机接入机会的配置指示信息,所述第一信息用于指示所述第一方式为接入网络设备或进行随机接入。
在一种可能的设计中,所述随机接入机会的配置指示信息按照比特位图的方式指示所述第一信息包含一种或多种特征参量的随机接入机会的配置信息。其中,所述随机接入机会的配置指示信息用于所述终端设备根据支持的特征参量及所述随机接入机会的配置指示信息确定所述第一方式。
在一种可能的设计中,所述第二信息是下行控制信息或媒体接入控制信息,所述第二信息中包括N个比特,所述N个比特按照比特位图的方式指示N种特征参量中每种特征参量关联的终端设备的第一方式,所述第二信息用于所述终端设备根据支持的特征参量及所述第二信息确定第一方式。
在一种可能的设计中,所述第二信息是随机接入响应或上行调度授权信息,所述第二信息指示终端设备的第一方式,所述第二信息用于所述终端设备根据所述第二信息的指示确定所述第一方式。
在一种可能的设计中,所述收发单元还用于:向终端设备发送信令,所述信令用于配置X组前导资源,所述第二信息中包括X个比特,所述X个比特按照比特位图的方式指示每组前导资源关联的终端设备的第一方式,所述第二信息用于所述终端设备根据关联的前导资源及所述第二信息确定所述第一方式。其中,所述X是大于0且不大于64的整数。
在一种可能的设计中,所述收发单元还用于:所述第二信息指示每Y组前导资源关联的终端设备的第一方式,所述第二信息用于所述终端设备根据关联的前导资源所属的Y组前导资源及所述第二信息确定所述第一方式。其中,所述Y的值是配置的或者预定义的整数。
在一种可能的设计中,所述X组前导资源和特征参量关联。所述X组前导资源和特征参量的关联关系用于所述终端设备根据X组前导资源和特征参量的关联关系以及支持的特征参量,确定所述第一方式。
在一种可能的设计中,所述处理单元还用于:确定不接入网络设备或不进行随机接入,启动第一计时器。其中,所述第一计时器的时长根据预定义规则确定,或者由所述网络设备配置。
在一种可能的设计中,所述第一信息是主系统信息块、系统信息块或专有无线资源控制信息。
在一种可能的设计中,所述第二信息是以下信息中的一种或多种:系统信息、无线资源控制信息、随机接入响应、媒体接入控制信息、下行控制信息、上行调度授权信息、Msg4。
在一种可能的设计中,所述特征参量为以下参数中的一项或多项:业务类型、终端类型、系统带宽、终端带宽、功耗等级、功耗需求、波束标识、子载波间隔、频率范围、频率band、载波、双工类型、峰值速率、时延、移动性、调制阶数等。
第五方面,本申请提供一种信息传输的装置,包括处理器和通信接口,其中,通信接 口用于接收来自上述第三方面所述的信息传输的装置之外的其它通信装置的信号并传输至处理器或将来自处理器的信号发送给上述第三方面所述的信息传输的装置之外的其它通信装置,处理器通过逻辑电路或执行代码指令用于实现如第一方面任一项所述的方法。
第六方面,本申请提供一种信息传输的装置,包括处理器和通信接口,其中,通信接口用于接收来自上述第四方面所述的信息传输的装置之外的其它通信装置的信号并传输至处理器或将来自处理器的信号发送给上述第四方面所述的信息传输的装置之外的其它通信装置,处理器通过逻辑电路或执行代码指令用于实现如第二方面任一项所述的方法。
第七方面,本申请提供一种信息传输的装置,包括处理器,所述处理器与存储器相连,所述存储器用于存储计算机程序,所述处理器用于执行所述存储器中存储的计算机程序,以使得所述装置执行如上述第一方面任一项所述的方法。
第八方面,本申请提供一种信息传输的装置,包括处理器,所述处理器与存储器相连,所述存储器用于存储计算机程序,所述处理器用于执行所述存储器中存储的计算机程序,以使得所述装置执行如上述第二方面任一项所述的方法。
第九方面,本申请提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,当所述计算机程序被运行时,实现如上述第一方面任一项所述的方法。
第十方面,本申请提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,当所述计算机程序被运行时,实现如上述第二方面任一项所述的方法。
第十一方面,本申请提供一种芯片,包括处理器和接口;所述处理器用于读取指令以执行如上述第一方面任一项所述的信息传输的方法。
第十二方面,本申请提供一种芯片,包括处理器和接口;所述处理器用于读取指令以执行如上述第二方面任一项所述的信息传输的方法。
第十三方面,本申请实施例提供了一种计算机程序产品,该计算机程序产品用于存储计算机程序,当该计算机程序在计算机上运行时,使得所述计算机执行如上述第一方面任意所述的方法、或者执行上述第二方面任意所述的方法。
第十四方面,本申请提供一种系统,该系统包括终端设备和网络设备,其中,终端设备可以用于执行上述第一方面或第一方面中的任意一种方法,网络设备可以用于执行上述第二方面或第二方面中的任意一种方法。
附图说明
图1为本申请实施例适用的一种可能的系统架构示意图;
图2示例性示出一种随机接入类型1的接入流程示意图;
图3示例性示出一种随机接入类型2的接入流程示意图;
图4示例性地示出本申请实施例提供的一种信息传输的方法的流程示意图;
图5示例性地示出本申请实施例提供的另一种信息传输的方法的流程示意图;
图6示例性地示出两种特征参量的随机接入机会的配置信息;
图7示例性地示出两种特征参量的随机接入机会的配置信息;
图8示例性地示出本申请实施例提供的又一种信息传输的方法的流程示意图;
图9示例性地示出本申请实施例提供的一种信息传输的方法的流程示意图;
图10示例性地示出本申请实施例提供的又一种信息传输的方法的流程示意图;
图11示例性地示出本申请实施例提供的又一种信息传输的方法的流程示意图;
图12示例性地示出本申请实施例提供的又一种信息传输的方法的流程示意图;
图13示例性地示出本申请实施例提供的又一种信息传输的方法的流程示意图;
图14示例性示出本申请实施例提供的一种信息传输的装置的结构示意图;
图15示例性示出本申请实施例提供的另一种信息传输的装置的结构示意图;
图16示例性示出本申请实施例提供的又一种信息传输的装置的示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。
本申请实施例中的术语“系统”和“网络”可被互换使用。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
以及,除非有特别说明,本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度。例如,第一信息和第二信息,只是为了区分不同的信息,而并不是表示这两个信息的优先级或者重要程度等的不同。
图1为本申请实施例适用的一种可能的系统架构示意图。如图1所示的系统架构包括网络设备和终端设备。应理解,本申请实施例对系统架构中网络设备的数量、终端设备的数量不作限定,而且本申请实施例所适用的系统架构中除了包括网络设备和终端设备以外,还可以包括其它设备,如核心网设备、无线中继设备和无线回传设备等,对此本申请实施例也不作限定。以及,本申请实施例中的网络设备可以将所有的功能集成在一个独立的物理设备,也可以将功能分布在多个独立的物理设备上,对此本申请实施例也不作限定。此外,本申请实施例中的终端设备可以通过无线方式与网络设备连接。
本申请实施例的技术方案可以应用于各种通信系统,例如:5G(或者称为新无线(new radio,NR))通信系统、6G通信系统、长期演进(long term evolution,简称LTE)系统、全球移动通讯(global system of mobile communication,简称GSM)系统、码分多址(code division multiple access,简称CDMA)系统、宽带码分多址(wideband code division multiple access,简称WCDMA)通用分组无线业务(general packet radio service,简称GPRS)系统、LTE频分双工(frequency division duplex,简称FDD)系统、LTE时分双工(time division duplex,简称TDD)、通用移动通信系统(universal mobile telecommunication system,简称UMTS)、全球互联微波接入(worldwide interoperability for microwave access,简称WiMAX)通信系统等,当然也可以为其它非授权频段的通信系统,不作限定。
下面对本申请实施例涉及到的术语以及相关技术进行相关介绍。
1、终端设备。
本申请实施例中的终端设备可以是指向用户提供语音和/或数据连通性的设备,例如可以包括具有无线连接功能的手持式设备、或连接到无线调制解调器的处理设备。该终端设 备可以经无线接入网(radio access network,RAN)与核心网进行通信,与RAN交换语音和/或数据。该终端设备可以包括用户设备(user equipment,UE)、无线终端设备、移动终端设备、设备到设备通信(device-to-device,D2D)终端设备、车到万物(vehicle to everything,V2X)终端设备、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)终端设备、物联网(internet of things,IoT)终端设备、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、远程站(remote station)、接入点(access point,AP)、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)、或用户装备(user device)等。例如,可以包括移动电话(或称为“蜂窝”电话),具有移动终端设备的计算机,便携式、袖珍式、手持式、计算机内置的移动装置等。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiation protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、等设备。还包括受限设备,例如功耗较低的设备,或存储能力有限的设备,或计算能力有限的设备等。例如包括条码、射频识别(radio frequency identification,RFID)、传感器、全球定位系统(global positioning system,GPS)、激光扫描器等信息传感设备。
2、特征参量和特征参量关联的终端设备。
本申请实施例中,每种特征参量可以包括至少一项参数及至少一项参数对应的参数值范围。针对于一种特征参量,如果终端设备在该种特征参量包括的每项参数下的参数值满足该种特征参量中每项参数对应的参数值范围,则该终端设备与该种特征参量关联,该种特征参量称为终端设备支持的特征参量。
本申请实施例中,每种特征参量可以包括以下参数中的一项参数或多项参数:
终端类型、业务类型、系统带宽、终端带宽、功耗等级、功耗需求、波束标识、子载波间隔、频率范围、频段、载波、双工类型、峰值速率、时延、移动性、调制阶数等。
下面对每项参数和对应的参数值范围进行介绍。
终端类型,例如可以包括降低能力的(reduced capbility,REDCAP)终端设备、传统终端设备、V2X终端设备等。其中,REDCAP终端设备又称为受限设备,由于REDCAP终端设备具有较低的复杂度和较小的带宽占用能力,因此相比于普通终端设备来说,REDCAP终端设备具有较好的竞争力。REDCAP终端设备主要可以应用在mMTC场景中。为更好地服务于人们的生活,mMTC场景中会设置大量的REDCAP终端设备,在这种情况下,极有可能存在大量的REDCAP终端设备选择同一个随机接入机会来接入小区。然而,小区的资源是有限的,如果不对REDCAP终端设备的随机接入进行限制,可能会使得小区在某一时段内的负载过重。示例性地,本申请中的终端设备主要是指REDCAP终端设备,本申请用于对REDCAP终端设备的随机接入进行限制。
业务类型可以是指REDCAP终端设备在mMTC场景中的业务类型,例如可以包括工业无线传感器网络(industry wireless sensor network,IWSN)类型、摄像(camera)类型、可穿戴(wearable)类型和视频监控类型等固定的业务类型,当然还可以包括不限业务类型(not limited)。其中,视频监控类型,例如可以包括用于监控交通状况的监测器、用于监控小区进出人员的摄像机和用于监控犯罪行为的报警器等。工业无线传感器类型,例如可以包括电磁传感器、温度传感器、湿度传感器、噪声传感器、光强度传感器、压力传感器和运行传感器等。可穿戴设备类型可以是指功能较为单一的可穿戴设备,例如可以包括 仅能监控心跳的手环、仅能计算运动步数的手环和仅能计时的手表、等。
系统带宽可以是指终端设备支持的带宽频段,例如若终端设备支持的带宽频段不大于100兆赫兹(megahertz,MHz),则认为终端设备的系统带宽属于低频段。若终端设备支持的带宽频段大于100MHz且不大于400MHz,则认为终端设备的系统带宽属于高频段。
终端带宽可以是指终端设备传输数据所能占用的带宽,按照最大终端带宽(maximum bandwidth,MAX BW)可以将终端设备划分为MAX BW等于5兆赫兹(megahertz,MHz)的终端设备、MAX BW等于10MHz的终端设备和MAX BW等于20MHz的终端设备。
功耗等级可以是指终端设备在单位时间内所消耗的能源等级,例如可以分为高功耗等级(单位功耗大于400W)的终端设备、中功耗等级(单位功耗大于200W且不大于400W)的终端设备和低功耗等级(单位功耗不大于10W)的终端设备。
功耗需求可以是指终端设备执行业务对功耗的需求程度,例如按照功耗需求可以将终端设备划分为高功耗需求的终端设备和低功耗需求的终端设备,高功耗需求的终端设备执行业务时所需的单位功耗不低于200W,低功耗需求的终端设备执行业务时所需的单位功耗不高于200W。
波束标识指示终端设备接收的不同形状或不同方向的波束。
载波可以是指一个特定频率的无线电波,是一种在频率、幅度或相位方面被调制以传输语言、音频、图象或其它信号的电磁波。不同终端设备能够支持的载波不同,按照载波可以将终端设备划分为不同载波类型的终端设备。
子载波间隔可以是指相邻的两个子载波之间的频率间隔,5G NR可以支持不同类型的子载波间隔,例如一个子载波间隔可以取值为15kHz至240kHz之间的一个值。在子载波间隔为15KHz时,符号长度为1/15us,1个时隙共有14个符号和14个循环前缀,则时隙的长度可以为1ms。在子载波间隔为30kHz时,符号长度为1/30us,每个时隙为0.5ms。在子载波间隔为120khz时,符号长度为1/120us,每个时隙为0.125ms。
频率范围(frequency range,FR)或频段范围可以是指终端设备能够接收到的频率范围,例如在5G NR中,频率范围可以划分为FR1和FR2,FR1的频率范围为450MHz~6GHz,FR2的频率范围为24GHz~52GHz。
双工类型可以是指在频分双工(frequency division duplex,FDD)的情况下,终端设备是否支持同时收发信号的能力,主要可以包括半双工频分双工(half-duplex FDD)和全双工频分双工(full-duplex FDD)两种能力。其中,half-duplex FDD表示终端设备不支持同时收发信号,即终端支持时分地接收信号和发送信号,full-duplex FDD表示终端设备支持同时收发信号。
峰值速率可以是指终端设备可达到的最大传输速率,在相同的网络状态下,软件配置和/或硬件配置好的终端设备的峰值速率相比于软件配置和/或硬件配置差的终端设备的峰值速率更高。按照峰值速率可以将终端设备划分为峰值速率大于100M/s的终端设备、峰值速率不大于100M/s且大于150M/s的终端设备和峰值速率大于150M/s且不大于300M/s的终端设备。
时延可以是指终端设备的数据传输时延,在相同的网络状态下,软件配置和/或硬件配置好的终端设备的时延相比于软件配置和/或硬件配置差的终端设备的时延更短。按照实验可以将终端设备划分为时延大于第一时长的终端设备、时延不大于第一时长且大于第二时长的终端设备和时延不大于第二时长且大于第三时长的终端设备。其中,第一时长<第二 时长<第三时长。
移动性可以是指终端设备的移动能力,按照移动性可以将终端设备划分为位置固定的终端设备、位置移动频率小于第一频率的终端设备和位置移动频率不小于第一频率的终端设备。
调制阶数可以是指终端设备的最大调制阶数,即最大正交振幅调制(maximum quadrature amplitude modulation,MAX QAM)所对应的阶数。按照调制阶数可以将终端设备划分为最大调制阶数不大于16正交振幅调制(quadrature amplitude modulation,QAM)的终端设备、最大调制阶数大于16QAM且不大于64QAM的终端设备和最大调制阶数不大于64QAM且大于256QAM的终端设备。
上述内容仅是示例性示出几种可能的参数和参数值范围,在其他可选地实施例中,特征参量还可以包括上述参数对应的其它参数值范围,或者还可以包括其它参数,例如天线数量、处理时间、可靠性要求(例如是指终端设备要求的最大误块率或最大误码率)、是否支持增补上行(supplementary uplink,SUL)、是否支持载波聚合(carrier aggregation,CA)和支持CA的终端设备的CA能力等。其中,CA能力可以是指终端支持CA的情况下,终端设备所能支持的最大载波数。
在一种可选地实施方式中,每种特征参量可以只包括上述参数中的一项参数及该项参数对应的参数值范围。例如,表1示例性示出特征参量只包括业务类型这一项参数时特征参量与终端设备的关联关系表:
特征参量 业务类型
1 工业无线传感器网络类型IWSN
2 视频监控类型camera
3 可穿戴设备类型wearable
表1
如表1所示,在特征参量只包括业务类型这一项参数的情况下:
特征参量1用于关联业务类型为工业无线传感器网络类型的终端设备;
特征参量2用于关联业务类型为视频监控类型的终端设备;
特征参量3用于关联业务类型为可穿戴设备类型的终端设备。
在另一种可选地实施方式中,每种特征参量可以包括上述参数中的至少两项参数及至少两项参数对应的参数值范围。例如,表2示例性示出特征参量包括终端带宽、可移动性和业务类型这三项参数时特征参量与终端设备的关联关系表:
Figure PCTCN2021092356-appb-000002
表2
如表2所示,在特征参量包括终端带宽、可移动性和业务类型这三项参数的情况下:
特征参量1用于关联:IWSN业务类型中MAX BW等于5MHz的固定设备;
特征参量2用于关联:IWSN业务类型中MAX BW等于10MHz的固定设备;
特征参量3用于关联:camera业务类型中MAX BW等于20MHz的固定设备;
特征参量4用于关联:camera业务类型中MAX BW等于20MHz的可移动设备,且移动频率不小于第一频率;
特征参量5用于关联:wearable业务类型中MAX BW等于20MHz的可移动设备,且移动频率不小于第一频率。
本申请实施例中,在特征参量包括多个参数以及多个参数对应的参数值范围的情况下,可以不用将同一参数对应的同一参数值范围的终端设备划分为一组,而是可以使用多个参数和多个参数对应的参数值范围进行随机组合。例如,在表1中,只能将业务类型属于IWSN的终端设备划归为一组,但是在表2中,还可以对业务类型属于IWSN的终端设备按照最大终端带宽进行分组,将其划分为MAX BW等于5MHz的终端设备和MAX BW等于10MHz的终端设备。采用这种方式,可以在更细粒度上对终端设备进行分组,从而便于后续通过配置各种特征参数对应的随机接入机会来配置各组终端设备的随机接入机会。
本申请实施例中,每个特征参量包括的至少一项参数和至少一项参数对应的参数值范围可以预先配置,例如在终端设备出厂时配置在终端设备内部,也可以由网络设备下发给终端设备。采用后面这种方式,即使之前已经配置了终端设备关联的特征参量,网络设备也可以根据实际需要随时特征参量所关联的终端设备进行更新,提高随机接入的实时性。
3、网络设备。
本申请实施例中的网络设备可以包括多种类型,例如包括接入网(access network,AN)设备,例如基站(例如,接入点),可以是指接入网中在空口通过一个或多个小区与无线终端设备通信的设备。基站可用于将收到的空中帧与网际协议(IP)分组进行相互转换,作为终端设备与接入网的其余部分之间的路由器,其中接入网的其余部分可包括IP网络。例如包括路测单元(road side unit,RSB),RSB可以是支持V2X应用的固定基础设施实体,可以与支持V2X应用的其他实体交换消息。网络设备还可协调对空口的属性管理。例如,网络设备可以包括LTE系统或高级长期演进(long term evolution-advanced,LTE-A)中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),或者也可以包括第五代移动通信技术(the 5 th generation,5G)新无线(new radio,NR)系统中的下一代节点B(next generation node B,gNB)或者也可以包括云接入网(cloud radio access network,Cloud RAN)系统中的集中式单元(centralized unit,CU)和分布式单元(distributed unit,DU),本申请实施例并不限定。
4、终端设备接入网络设备。
本申请实施例中的终端设备接入网络设备是指终端设备接入网络设备所覆盖的小区,例如终端设备接入一个基站所覆盖的小区。小区是为用户提供无线通信业务的一片区域,是无线网络的基本组成单位。例如NR是通过MML命令ADD NRCELL、ADD NRDUCELL添加NR的小区资源。
5、终端设备接入网络设备的方式:随机接入类型1或随机接入类型2。
随机接入类型1是指终端设备与网络设备经过四步握手后终端设备接入网络设备,属于一种有竞争的接入方式。随机接入类型2是指终端设备与网络设备经过两步握手后终端设备接入网络设备,属于一种无竞争的接入方式。下面分别对随机接入类型1和随机接入类型2的现有流程进行介绍。
图2示例性示出一种随机接入类型1的接入流程示意图,如图2所示,该过程包括:
第一步握手(msg1),用于终端设备向网络设备发送随机接入请求,包括如下步骤:
步骤201,终端设备从待接入小区的物理广播信道(physical broadcast channel,PBCH)上获取待接入小区的同步信号块(synchronization signals block,SSB),以建立与待接入小区之间的下行同步。其中,待接入小区的SSB由管理待接入小区的网络设备周期性发送在待接入小区的PBCH上。SSB中包括主要信息块(master information block,MIB),MIB中携带有本次随机接入机会的索引、承载第一下行控制信息(downlink control information,DCI)的物理下行控制信道(physical downlink control channel,PDCCH)的时域资源和频域资源,还可以携带有第一DCI的调制编码方式。其中,第一DCI用于调度待接入小区的系统信息块(dystem information block,SIB)。
步骤202,终端设备根据解析MIB得到的PDCCH的时域资源和频域资源,以及第一DCI的调制编码方式,从该PDCCH上获取第一DCI。其中,第一DCI中携带有承载待接入小区的SIB的物理下行共享信道(physical downlink shared channel,PDSCH)的时域资源和频域资源,还可以携带有待接入小区的SIB的调制编码方式。
步骤203,终端设备根据解析第一DCI得到的PDSCH的时域资源和频域资源,以及SIB的调制编码方式,从该PDSCH上获取待接入小区的SIB。其中,SIB中包括终端设备接入待接入小区前需要获知的系统信息,例如前导码索引列表、随机接入机会列表和发送功率。前导码索引列表中包括至多64个前导码索引。随机接入机会列表中包括各个随机接入机会索引和各个随机接入机会的对应关系。
步骤204,终端设备从前导码索引列表中随机选择一个前导码索引作为本次随机接入对应的前导码索引,并根据MIB中本次随机接入的机会索引,从随机接入机会列表中选择该机会索引对应的随机接入机会作为本次随机接入对应的随机接入机会。
步骤205,终端设备在本次随机接入对应的随机接入机会向网络设备发送随机接入请求,随机接入请求中包括本次随机接入对应的前导码索引。
本申请实施例中,获取到同一个机会索引的终端设备可以对应同一个随机接入机会,从而在同一个随机接入机会向网络设备发送随机接入请求。且,不同的终端设备也可能会随机选择到同一个前导码索引,如此,这些终端设备发送的随机接入请求中可以携带有同一个前导码索引,而一个前导码索引只能支持一个终端设备接入待接入小区。
第二步握手(msg2),用于网络设备向终端设备发送随机接入响应,包括如下步骤:
步骤211,网络设备使用接收到的每个随机接入请求的无线网络临时标识(radio network tempory identity,RA-RNTI)加扰第二DCI,并将加扰后的第二DCI发送在待接入小区的PDCCH信道上。
步骤212,终端设备根据发送的随机接入请求的RA-RNTI,从待接入小区的PDCCH信道上获取并解扰得到第二DCI。其中,第二DCI中携带有承载媒体接入控制层协议数据单元(medium access control sub layer protocol data unit,MAC PDU)的PDSCH信道的时域资源和频域资源,还可以携带有MAC PDU的调制编码方式。之后,终端设备根据承载MAC PDU的PDSCH信道的时域资源和频域资源,以及MAC PDU的调制编码方式,从该PDSCH信道上获取MAC PDU。其中,MAC PDU可以由多个媒体接入控制层协议数据单元子头MAC subPDU组成,一个MAC subPDU包含的比特位的数量可以为8的倍数,例如8、16、24、……8*n,n为正整数。一个MAC subPDU可以包括以下内容中的一项:
退避指示(backoff indicator,BI):包含2个比特位,用于指示随机接入失败的终端设备重新发送随机接入请求所需要等待的时间范围。其中,随机接入失败是指:终端设备没有接收到对应的随机接入响应,或者终端设备确定竞争解决失败。在这种情况下,终端设备可以按照BI指示的时间范围重新发起随机接入请求,例如在0至BI指示的时间之间随机选择一个时间,在该时间后重新发起随机接入请求;
随机接入前导码标识(random access preamble identifier,RAPID):是指随机接入请求中携带的前导码索引的标识。MAC subPDU中仅携带RAPID的情况是针对于非随机接入场景来说的,本申请不作具体介绍。
RAPID和随机接入响应(random access response,RAR):RAR是指前导码索引的标识为RAPID的随机接入请求对应的随机接入响应,选择同一个前导码索引的终端设备能够接收到同一个随机接入响应。RAR中可以携带有定时修正信息、上行调度授权信息UR-grand和小区网络临时标识(cell-radio network temporary identifier,TC-RNTI),还可以预留有1个比特位的预留比特。其中,UR-grand用于指示终端设备的上行调度资源,例如包括终端设备进行上行调度时的时域资源和频域资源,且,UR-grand中也预留有1个比特位的预留比特,该预留比特又称为CSI请求字段。
为便于理解,进一步对MAC PDU进行解释:假设网络设备接收到50个随机接入请求,确定针对于其中的20个随机接入请求允许接入(假设20个随机接入请求携带的前导码索引均不相同),其它30个随机接入请求不允许接入,则MAC PDU中可以包含如下内容:
1个MAC subPDU用于携带BI,该BI用于指示其它30个终端设备重新发送随机接入请求的时间范围;
20个MAC subPDU用于携带RAPID和RAR,每个MAC subPDU中的RAR用于指示该MAC subPDU中RAPID指示的终端设备进行上行调度的资源信息。示例性地,在20个随机接入请求中存在两个或两个以上的随机接入请求携带相同的前导码索引的情况下,MAC PDU中用于携带RAR的MAC subPDU的数量可以少于20个。
假设将携带BI的MAC subPDU称为第一MAC subPDU,将携带RAPID和RAR的MAC subPDU称为第二MAC subPDU。示例性地,终端设备获取MAC PDU后,可以根据终端设备发送的随机接入请求中携带的随机接入请求的RAPID,判断20个第二MAC subPDU中是否存在一个第二MAC subPDU包含该RAPID对应的RAR,若是,则该终端设备可以从该第二MAC subPDU中获取该RAR,以继续接入待接入小区。若20个第二MAC subPDU中都不包含该RAPID对应的RAR,则该终端设备可以从第一MAC subPDU中获取BI,按照BI指示的时间范围重新发起随机接入请求。
第三步握手(msg3),用于终端设备将竞争解决标识发送给网络设备,包括如下步骤:
步骤221,终端设备从RAR中获取UR-grant,使用UR-grant中的TC-RNTI加扰竞争解决标识,将加扰后的竞争解决标识发送给网络设备。其中,竞争解决标识可以为终端设备的唯一标识。
第四步握手(msg4),用于网络设备将允许接入的终端设备的竞争解决机制发送给终端设备,包括如下步骤:
步骤231,网络设备可以使用接收到的每个竞争解决标识中的TC-RNTI加扰第三DCI,并将加扰后的第三DCI发送至PDCCH信道。其中,第三DIC用于指示调度竞争解决机 制的PDSCH信道的时域资源和频域资源。
步骤232,网络设备可以在PDSCH信道上发送竞争解决机制,竞争解决机制中包括允许接入的终端设备的唯一标识和该终端设备对应的小区无线临时网络标识(cell-network temporary identifier,C-RNTI)。
本申请实施例中,选择同一个前导码索引的终端设备可以接收到同一个TC-RNTI,因此这些终端设备发送的竞争解决标识也会使用同一个TC-RNTI加扰。然而,一个前导码索引只允许一个终端设备接入,因此网络设备接收到这些终端设备发送的竞争解决标识后,由于TC-RNTI一致,因此网络设备可以选择一个终端设备作为该前导码索引允许接入的终端设备,例如信号强度最好的终端设备。
步骤233,终端设备根据第三DCI从PDSCH信道中获取竞争解决机制,若竞争解决机制中包括该终端设备的唯一标识,则终端设备确定成功接入小区。若竞争解决机制中不包括该终端设备的唯一标识,则终端设备确定随机接入失败。
步骤241,终端设备在成功接入小区后,可通过竞争解决机制中该终端设备的唯一标识对应的C-RNTI与网络设备进行通信,例如接收网络设备发送的高层信令。
在随机接入类型1中,终端设备没有执行第四步握手的情况下,终端设备没有去下行共享信道获取竞争解决机制,因此终端设备的本次随机接入的最终确认步骤并未完成。而在终端设备执行了第四步握手的情况下,终端设备去下行共享信道获取竞争解决机制,该竞争解决机制中包含终端设备的唯一标识和对应的小区网络标识,则终端设备成功接入网络,这种情况下,终端设备的本次随机接入可能无法再改变。基于此,本申请中的信息传输的方法主要在第一步握手、第二步握手或第三步握手中对终端设备的随机接入进行配置,以使终端设备能够使用与其它端设备不同的随机接入配置接入网络设备或者不接入网络设备。当然,也可以在第四步握手中对终端设备的随机接入进行配置,但是这次配置用于指示终端设备的下次随机接入。
图3示例性示出一种随机接入类型2的接入流程示意图,如图3所示,该过程包括:
第一步握手,用于终端设备向网络设备发送随机接入请求,包括如下步骤:
步骤301,网络设备通过下行专用信令给终端设备指派特定前导码索引。其中,特定前导码索引与其它终端设备的前导码索引不冲突。这样,该终端设备和其它终端设备可以不再竞争同一前导码索引的接入资源。
步骤302,终端设备在随机接入机会向网络设备发送随机接入请求,随机接入请求中包括特定前导码索引和终端设备的唯一标识。
本申请实施例中,随机接入类型2中的随机接入机会可以由网络设备指定,也可以按照随机接入类型1中的方式确定,不作限定。
第二步握手,用于网络设备向终端设备发送随机接入结果,包括如下步骤:
步骤311,网络设备在允许终端设备接入的情况下,将该终端设备的唯一标识和该终端设备对应的C-RNTI携带在随机接入结果中,发送到PDSCH信道上。当然,随机接入结果也可以由PDCCH信道上的下行控制信息进行调度。网络设备在不允许终端设备接入的情况下,可以不响应该终端设备,也可以将该终端设备的唯一标识和随机接入失败的信息携带在随机接入结果中,发送到PDSCH信道上。
步骤312,终端设备从PDSCH信道中获取随机接入结果,若随机接入结果中包括该终端设备的唯一标识对应的C-RNTI,则终端设备确定成功接入待接入小区,后续可通过 该C-RNTI与网络设备通信。若随机接入结果中不包括该终端设备的唯一标识,或者包括随机接入失败的信息,则终端设备确定随机接入失败。
在随机接入类型2中,终端设备通过发送一次上行共享数据和接收一次下行共享数据即可接入至网络设备,而在随机接入类型1中,终端设备至少需要发送两次上行共享数据和接收两次下行共享数据才能接入网络设备。因此,随机接入类型2的接入速度比随机接入类型1的接入速度更快。但是,随机接入类型1中终端设备的每一步操作都需要经由网络设备来确认,因此随机接入类型1相比于随机接入类型2来说,终端设备的接入过程能够更加受到网络设备的管理和控制,可能更加符合标准协议的要求。
本申请的下列实施例基于随机接入类型1来描述如何配置终端设备的随机接入。
在下文的描述中,网络设备可以是图1中的网络设备,或能够支持网络设备实现该方法所需的功能的信息传输的装置,当然还可以是其他信息传输的装置,例如芯片或芯片系统。终端设备可以是图1中的终端设备,或能够支持终端设备实现该方法所需的功能的信息传输的装置,当然还可以是其他信息传输的装置,例如芯片或芯片系统。
在描述具体的实现方式之前,先对第一方式包含的可能情况进行介绍:
“第一方式为终端设备接入网络设备”是指:在终端设备已经发起随机接入请求的情况下,第一方式指示终端设备继续随机接入;
“第一方式为终端设备不接入网络设备”是指:在终端设备已经发起随机接入请求的情况下,第一方式指示终端设备终止随机接入;
“第一方式为终端设备进行随机接入”是指:在终端设备未发起随机接入请求的情况下,第一方式指示终端设备启动随机接入;
“第一方式为终端设备不进行随机接入”是指:在终端设备未发起随机接入请求的情况下,第一方式指示终端设备不启动随机接入。
为了统一描述,本申请的下列实施例将“第一方式为终端设备接入网络设备”称为“第一方式指示终端设备继续随机接入”,将“第一方式为终端设备不接入网络设备”称为“第一方式指示终端设备终止随机接入”,将“第一方式为终端设备进行随机接入”称为“第一方式指示终端设备启动随机接入”,将“第一方式为终端设备不进行随机接入”称为“第一方式指示终端设备不启动随机接入”。即:下文中所出现的“第一方式指示终端设备继续随机接入”均可以被替换为“第一方式为终端设备接入网络设备”,下文中所出现的“第一方式指示终端设备终止随机接入”均可以被替换为“第一方式为终端设备不接入网络设备”,下文中所出现的“第一方式指示终端设备启动随机接入”均可以被替换为“第一方式为终端设备进行随机接入”,下文中所出现的“第一方式指示终端设备不启动随机接入”均可以被替换为“第一方式为终端设备不进行随机接入”。
且,在“第一方式指示终端设备继续随机接入”和“第一方式指示终端设备启动随机接入”的情况下,第一方式实际为允许终端设备接入网络设备,如此,终端设备能执行接入网络设备的操作,例如可以启动随机接入,或者继续随机接入。在“第一方式指示终端设备终止随机接入”和“第一方式指示终端设备不启动随机接入”的情况下,第一方式实际为不允许终端设备接入网络设备,如此,终端设备不执行接入网络设备的操作,例如可以不启动随机接入,或者不继续随机接入。
实施例一
图4示例性地示出本申请实施例提供的一种信息传输的方法的流程示意图,该方法可以由终端设备和网络设备来执行,终端设备用于接入网络设备所覆盖的小区。如图4所示,该方法包括:
步骤401,网络设备向终端设备发送第一信息或第二信息。
本申请实施例中,第一信息或第二信息可以用于指示:
是否允许终端设备接入网络设备;或者,
使能N种特征参量中一种或多种特征参量所关联的终端设备对应的随机接入机会;或者,
是否允许N种特征参量中每种特征参量所关联的终端设备接入网络设备;或者,
使能X组前导资源中一组或多组前导资源所关联的终端设备对应的随机接入机会;或者,
是否允许X组前导资源中每组前导资源所关联的终端设备接入网络设备;或者,
N种特征参量与X组前导资源的关联关系。
其中,上述内容中的“使能某项配置”是指使终端设备按照某项配置接入网络设备,示例来说,“使能一种或多种特征参量所关联的终端设备对应的随机接入机会”是指:使终端设备按照特征参量分组的方式接入网络设备,例如,三种特征参量将终端设备分为三组,则这三组终端设备可以分别按照三种特征参量对应的随机接入机会接入网络设备。或者,“使能一组或多组前导资源所关联的终端设备对应的随机接入机会”是指:使终端设备按照前导资源分组的方式接入网络设备,例如,三组前导资源将终端设备分为三组,则这三组终端设备可以分别按照三组前导资源对应的随机接入机会接入网络设备。
关于第一信息或第二信息如何指示上述内容,将在实施例二至实施例八中进行详细描述,此处先不作介绍。
步骤402,终端设备根据第一信息或第二信息确定第一方式:
若第一方式为允许终端设备接入网络设备,则执行步骤403;
若第一方式为不允许终端设备接入网络设备,则执行步骤404。
本申请实施例中,第一方式为允许终端设备接入网络设备,包括:
在终端设备已经发送随机接入请求的情况下,第一方式指示终端设备继续随机接入,例如指示终端设备接收随机接入响应,或者指示终端设备接收用于解决竞争的下行共享信息;或者,
在终端设备还未发送随机接入请求的情况下,第一方式指示终端设备启动随机接入,例如指示终端设备发送随机接入请求。
本申请实施例中,第一方式为不允许终端设备接入网络设备,包括:
在终端设备已经发送随机接入请求的情况下,第一方式指示终端设备终止随机接入,例如指示终端设备不接收随机接入响应,或者指示终端设备不接收用于解决竞争的下行共享信息;或者,
在终端设备还未发送随机接入请求的情况下,第一方式指示终端设备不启动随机接入,例如指示终端设备不发送随机接入请求,或者指示终端设备不选择前导码索引。
步骤403,终端设备接入网络设备,例如:
在终端设备已经发送随机接入请求的情况下,终端设备可以继续随机接入;或者,
在终端设备还未发送随机接入请求的情况下,终端设备可以启动随机接入。
在一种可选地实施方式中,若第一信息或第二信息用于指示使能N种特征参量中一种或多种特征参量所关联的终端设备对应的随机接入机会,则终端设备可以按照支持的特征参量对应的随机接入机会接入网络设备。例如,如表1所示,若终端设备的业务类型为工业无线传感器网络类型,则终端设备支持的特征参量为特征参量1,这种情况下,终端设备可以使用特征参量1所对应的随机接入机会接入网络设备。在另一种可选地实施方式中,若第一信息或第二信息用于指示使能X组前导资源中一组或多组前导资源所关联的终端设备对应的随机接入机会,则终端设备可以按照关联的前导资源对应的随机接入机会接入网络设备。例如,前导资源1对应的前导码索引范围为10~20,若终端设备选择的前导码索引为15,则终端设备关联前导资源1,因此终端设备可以使用前导资源1所对应的随机接入机会接入网络设备。
此处仅介绍一种可选地实施方式,其它实施方式放在实施例二至实施例八中进行描述。
步骤404,终端设备不接入网络设备,例如:
在终端设备已经发送随机接入请求的情况下,终端设备可以终止随机接入;或者,
在终端设备还未发送随机接入请求的情况下,终端设备可以不启动随机接入。
在一种可选地实施方式中,终端设备可以是指属于某一类型的终端设备,例如REDCAP终端设备,如此,步骤401至步骤404中的内容用于对属于REDCAP类型的终端设备的随机接入进行限制。例如,在上述步骤402中,属于REDCAP类型的终端设备在出厂时内置有解析第一信息和第二信息的模块,只有该类终端设备能够解析第一信息和第二信息,而其它类型的终端设备无法解析第一信息和第二信息。在这种情况下,如果终端设备能够解析第一信息或第二信息,则终端设备属于REDCAP类型的终端设备,并能够按照第一信息或第二信息指示的第一方式接入网络设备或不接入网络设备。如果终端设备无法解析第一信息和第二信息,则终端设备不属于REDCAP类型的终端设备,终端设备可以按照随机接入的固有流程接入网络设备,例如按照图2所示意的随机接入类型1中的接入流程接入网络设备。采用该种实施方式,通过灵活控制某一类终端设备能否接入网络设备,能够实现对接入网络设备的终端设备进行控制,达到平衡网络负载的目的。
在终端设备为某一类型的终端设备的情况下,本申请实施例可以利用随机接入机会的配置指示信息、特征参量与该类终端设备的关联关系和前导资源与该类终端设备的关联关系中的一项或多项对该类终端设备能否接入网络进行限制,在这种情况下,该类终端设备可以按照自己所对应的第一方式接入网络设备或者不接入网络设备,从而该类终端设备能够更为灵活地接入网络设备。且,本申请还可以将前导资源与该类终端设备进行关联,或者将特征参量与该类终端设备进行关联,这样,还能够通过配置各组前导资源或各个特征参量关联的终端设备能否接入网络,从而在更细粒度上更灵活地控制该类终端设备在网络设备中的接入量。
下文中,终端设备可以是指某一类型的终端设备,例如REDCAP终端,即:本申请的下文中所述的终端设备均可以替换为REDCAP终端。再如,高可靠低时延(ultra reliable low latency communication,URLLC)终端,即:本申请的下文中所述的终端设备均可以替换为URLLC终端。
下面结合实施例二至实施例八描述实施例一的一些可能的实现方式。
实施例二
图5示例性示出本申请实施例提供的一种信息传输的方法的流程示意图,该方法可以由终端设备和网络设备来执行,终端设备用于接入网络设备所覆盖的小区。如图5所示,该方法包括:
步骤501,终端设备接收来自网络设备的第一信息。
本申请实施例中,第一信息可以承载于主系统信息块、系统信息块或专有无线资源控制信息。其中,在第一信息承载于主系统信息块或系统信息块的情况下,由于终端设备还没有接入网络设备,因此第一信息可以用于指示终端设备在初始随机接入中是否能够接入网络设备。在第一信息承载于专有无线资源控制信息的情况下,由于终端设备已经接入网络设备,因此第一信息可以用于指示终端设备在下次随机接入中是否能够接入网络设备。
示例性地,第一信息还可以承载于下行控制信息。然而,由于网络设备更倾向于让下行控制信息中的控制信令能够快速地下发给各个终端设备,因此如果是在第一信息包含随机接入机会的配置信息的情况下,第一信息可能会占用较多的控制资源,影响下行控制信息的传输效率。因此,在一种优选的实施方式中,第一信息承载于主系统信息块、系统信息块或专有无线资源控制信息中。
步骤502,终端设备从第一信息中获取随机接入机会的配置指示信息,判断随机接入机会的配置指示信息的状态:
若随机接入机会的配置指示信息的状态为第一状态,则执行步骤503;
若随机接入机会的配置指示信息的状态为第二状态,则执行步骤504;
若随机接入机会的配置指示信息的状态为第三状态,则执行步骤505。
步骤503,终端设备接入网络设备。
步骤504,终端设备不接入网络设备。
在一种可选地实施方式中,随机接入机会的配置指示信息的状态为第一状态,用于指示:
允许终端设备接入网络设备,例如在终端设备还没有发起随机接入请求的情况下,指示终端设备启动随机接入,这种情况下,第一信息可以携带在主要系统信息块或系统信息块中,根据第一信息,终端设备可以向网络设备发送随机接入请求;或者,在终端设备已经发起随机接入请求的情况下,指示终端设备继续随机接入,这种情况下,第一信息可以携带在下行控制信息中,根据第一信息,终端设备可以接收随机接入响应或接收用于解决竞争的下行共享信息;或者,
使能终端设备的随机接入机会的配置。
本申请实施例中,“使能终端设备的随机接入机会的配置”是允许终端设备接入网络设备的一种指示方式,该种方式适用于同一类型的终端设备,假设能够解析第一信息的终端设备属于同一类型的终端设备,则“使能终端设备的随机接入机会的配置”是指:允许属于该类型的终端设备接入网络设备,例如使属于该类型的终端设备启动随机接入,或者使属于该类型的终端设备继续随机接入。如此,属于该类型的终端设备能够接入网络设备。
在另一种可选地实施方式中,随机接入机会的配置指示信息的状态为第二状态,用于指示:
不允许终端设备接入网络设备,例如在终端设备还没有发起随机接入请求的情况下,指示终端设备不启动随机接入,这种情况下,第一信息可以携带在主要系统信息块MIB或 系统信息块SIB中,根据第一信息,终端设备可以不向网络设备发送随机接入请求或不选择前导码索引;或者,在终端设备已经发起随机接入请求的情况下,指示终端设备终止随机接入,这种情况下,第一信息可以携带在下行控制信息中,根据第一信息,终端设备可以接收随机接入响应或接收用于解决竞争的下行共享信息;或者,
不使能终端设备的随机接入机会的配置。
本申请实施例中,“不使能终端设备的随机接入机会的配置”是不允许终端设备接入网络设备的一种指示方式,该种方式适用于同一类型的终端设备,假设能够解析第一信息的终端设备属于同一类型,则“不使能终端设备的随机接入机会的配置”是指:不允许属于该类型的终端设备接入网络设备,例如使属于该类型的终端设备不启动随机接入,或者使属于该类型的终端设备终止随机接入。如此,属于该类型的终端设备可以不接入网络设备。
在又一种可选地实施方式中,随机接入机会的配置指示信息的状态为第三状态,用于指示:
第一信息中还包含一种或多种特征参量的随机接入机会的配置信息。
针对于特征参量的随机接入机会的配置信息,将在步骤505中进行详细描述,此处先不作介绍。
在一种可选地实施方式中,随机接入机会的配置指示信息可以包括第一比特,第一比特可以包括至少两个比特位,第一比特的比特状态用于指示:
允许终端设备接入网络设备;或者,
不允许终端设备接入网络设备;或者,
第一信息中还包括一种或多种特征参量的随机接入机会的配置信息。
例如,表3示例性示出第一比特包括2个比特位时的一种指示方式:
Figure PCTCN2021092356-appb-000003
表3
在表3所示意的指示方式中:
第一比特的比特状态为11时,指示允许终端设备接入网络设备;
第一比特的比特状态为00时,指示不允许终端设备接入网络设备;
第一比特的比特状态为01时,指示第一信息中还包括一种或多种特征参量的随机接入机会的配置信息。
本申请实施例中,表3只是一种可选地实施方式。在其它可选地实施方式中,第一比特的比特状态所指示的内容也可以为其它情况,例如,在另一种情况下:
第一比特的比特状态为00时,指示允许终端设备接入网络设备;
第一比特的比特状态为11时,指示不允许终端设备接入网络设备;
第一比特的比特状态为10时,指示第一信息中还包括一种或多种特征参量的随机接入机会的配置信息。
例如,在又一种情况下:
第一比特的比特状态为11时,指示允许终端设备接入网络设备;
第一比特的比特状态为10时,指示不允许终端设备接入网络设备;
第一比特的比特状态为00时,指示第一信息中还包括一种或多种特征参量的随机接入机会的配置信息。
可能的情况有很多,此处不再一一列举。
在这种实施方式中,第一比特占据至少2个比特位,因此第一比特可以有4种比特状态(即:00、01、10和11),但是第一状态、第二状态和第三状态只使用了其中三种比特状态,因此还能预留出一个比特状态,该比特状态可以用于在实际操作中指示其它信息。
在另一种可选地实施方式中,第一比特也可以只包括1个比特位,这1个比特位为第一信息中的一个预设比特位。如果这1个比特位的值为1,认为第一比特指示允许终端设备接入网络设备。如果这1个比特位的值为0,认为第一比特指示不允许终端设备接入网络设备。如果这1个比特位的值不存在,即第一信息中不包含第一比特,这种情况下,认为第一比特指示第一信息中还包括一种或多种特征参量的随机接入机会的配置信息。这种方式使得第一比特能够占据更少的比特位。
可以理解的,“第一信息中不包括第一比特,认为第一比特指示第一信息中还包括一种或多种特征参量的随机接入机会的配置信息”仅是一种可选地实施例。在其它可选地实施例中,第一信息中不包括第一比特,也可以认为第一比特指示允许终端设备接入网络设备。或者,第一信息中不包括第一比特,也可以认为第一比特指示不允许终端设备接入网络设备,不作限定。
步骤505,终端设备从第一信息中获取一种或多种特征参量的随机接入机会的配置信息。
本申请实施例中,在随机接入机会的配置指示信息处于第三状态时,指示第一信息中还包括一种或多种特征参量的随机接入机会的配置信息。该种方式是按照终端设备分组的方式对每种特征参量关联的一组终端设备的随机接入机会进行配置,例如,若存在3种特征参量(对应为3组终端设备),则每种特征参量所关联的一组终端设备可以使用该特征参量对应的随机接入机会接入网络设备。其中,一种特征参量对应的随机接入机会的配置信息可以包括以下内容中的一项或多项:随机接入的时域资源、随机接入的频域资源和随机接入的周期。其中,随机接入的频域资源可以包括如下内容中的一项或多项:上行调度的资源块的数量、上行调度的资源块的索引、上行调度的子载波的数量、上行调度的子载波的索引、上行调度的资源块的组数量、上行调度的资源块的组索引和上行调度的频域偏移量。随机接入的时域资源可以包括如下内容中的一项或多项:时域符号的数量、时域符号的索引、时隙的数量、时隙的索引、子时隙的数量、子时隙的索引、子帧的数量、子帧的索引、无线帧的数量、无线帧的索引和时域偏移量。
本申请实施例中,随机接入机会的配置指示信息中还可以包括第二比特,第二比特用于指示配置了哪些特征参量的随机接入机会,例如共有N种特征参量,若配置了其中L种特征参量的随机接入机会,则第二比特的比特状态用于指示L的取值。在这种情况下,由于共存在N种特征参量,因此第二比特的比特状态至少需要包括N种,才能指示出N种特征参量中存在1种特征参量、2种特征参量、……、N种特征参量的情况。
在一种可选地实施方式中,第二比特可以包括N个比特位,N个比特位与N种特征参 量对应,一个比特位的取值用于指示是否配置了对应的特征参量的随机接入机会。例如当取值为0时,指示未配置对应的特征参量的随机接入机会,当取值为1时,指示配置了对应的特征参量的随机接入机会。如此,终端设备可以统计第二比特中取值为1的比特位的数量,即可获知第一信息中包括哪些特征参量的随机接入机会的配置信息。然而,这种方式会存在部分比特状态的浪费现象,因为N个比特位包含2 N种比特状态,最多能够指示出2 N种取值,在N的取值不小于5的情况下,2 N大于N,因此会存在部分比特状态被浪费掉。因此,我们优选的使用下一种实施方式。
在另一种可选地实施方式中,第二比特可以包括
Figure PCTCN2021092356-appb-000004
个比特位,
Figure PCTCN2021092356-appb-000005
是指对log 2N的结果进行向上取整,例如:
在N为2的幂值的情况下,log 2N为整数,第二比特可以包括log 2N个比特位,第二比特具有N种比特状态;
在N不为2的幂值的情况下,log 2N为非整数,第二比特包括
Figure PCTCN2021092356-appb-000006
个比特位,
Figure PCTCN2021092356-appb-000007
为对log 2N的结果中的整数位加1得到的整数位的值,第二比特具有大于N种比特状态。
示例来说,在一种情况中,若N为4,则第二比特可以包括2个比特位,表4示例性示出第二比特包括2个比特位时的一种指示方式:
Figure PCTCN2021092356-appb-000008
表4
在另一种情况中,若N为5,则第二比特可以包括3个比特位,表5示例性示出第二比特包括3个比特位时的一种指示方式:
第二比特的比特状态 第二比特的指示内容
001 第一信息中还包括1种特征参量的随机接入机会的配置信息
010 第一信息中还包括2种特征参量的随机接入机会的配置信息
011 第一信息中还包括3种特征参量的随机接入机会的配置信息
100 第一信息中还包括4种特征参量的随机接入机会的配置信息
101 第一信息中还包括5种特征参量的随机接入机会的配置信息
表5
相比于上一种实施方式来说,在N不小于5(例如N为5)的情况下,该种实施方式中的第二比特可以包括3个比特位,而上一种实施方式中的第二比特包括5个比特位,显然地,该种实施方式有助于降低第二比特所占用的资源。
本申请实施例中,由于第二比特用于指示L的取值,因此终端设备能够获知第一信息中还包括L种特征参量的随机接入机会的配置信息,如此,终端设备能够根据L的取值从第一信息中获取到L个配置信息。例如,当L种特征参量的随机接入机会的配置信息在第一信息中按照相邻的L个配置表存储时,终端设备根据第一个配置表的起始位置、L的取值和每个配置表占用的预设比特位的数量,即可从第一信息中获取到L个配置表,并解析L个配置表得到L组配置信息。示例性地,每组配置信息中还可以包括特征参量的标识, 这样,终端设备根据L组配置信息中包括的特征参量的标识即可确定这L组特征信息对应哪L种特征参量。
根据上述内容可知,本申请实施例中可以使用第一比特和第二比特联合指示随机接入使能的是某一类型的全部终端设备,还是使能的该类终端设备的分组,从而能够便于终端设备按照这次使能的内容确定接入网络设备或者不接入网络设备,这种指示方式较为灵活。可以理解的,本申请实施例中,第一比特和第二比特也可以单独存在,例如只设置第二比特而不设置第一比特,或者只设置第一比特而不设置第二比特。
本申请实施例中,在存在至少两种特征参量时,至少两种特征参量对应的随机接入机会可以根据实际需要进行配置,下面介绍两种可能的配置方式。
在一种可选地配置方式中,可以将至少两种特征参量的随机接入的频域资源配置为相同,将至少两组特征参量的随机接入的时域资源的周期配置为相同,并将至少两组特征参量的随机接入的时域资源配置为不同。例如,图6示例性示出两种特征参量的随机接入机会的配置信息,这两种特征参量的随机接入具有相同的频域资源(即频率),假设一个白色框所指代的时长为单位时长,则这两种特征参量的随机接入的时域资源每间隔3个单位时长循环一次。假设第一种特征参量关联的终端设备为终端带宽等于5MHz的终端设备,第二种特征参量关联的终端设备为终端带宽等于10MHz的终端设备,则终端带宽等于5MHz的终端设备在图6中斜线框所示意的时域资源上进行接入,而终端带宽等于10MHz的终端设备在图6中黑色框所示意的时域资源上进行接入。
在这种配置方式下,由于各种特征参量的随机接入的时域资源错开,因此各种特征参量所关联的终端设备能够使用不同的随机接入的时域资源接入网络设备,从而可以避免在同一个时域资源上存在多种特征参量关联的终端设备同时请求接入的情况,降低网络设备的负载。且,如果特征参量的分组较为均衡的话,例如每种特征参量关联的终端设备的数量均衡,则还能够使得每个时域资源上接入网络设备的终端设备数量较为均衡。
在另一种可选地配置方式中,可以将至少两种特征参量的随机接入的频域资源配置为相同,将至少两种特征参量的随机接入的时域资源配置为不同,并将至少两种特征参量的随机接入的时域资源的周期配置为不同。例如,图7示例性示出两种特征参量的随机接入机会的配置信息,这两种特征参量的随机接入具有相同的频域资源(即频率),假设一个白色框所指代的时长为单位时长,则第一种特征参量的随机接入的时域资源每间隔3个单位时长循环一次,第二种特征参量的随机接入的时域资源每间隔1个单位时长循环一次。假设第一种特征参量关联的终端设备为业务类型是视频监控类型的终端设备,第二种特征参量关联的终端设备为业务类型是工业无线传感器类型的终端设备,则视频监控类型的终端设备在图7中斜线框所示意的时域资源上进行接入,而工业无线传感器类型的终端设备在图7中黑色框所示意的时域资源上进行接入。
在这种配置方式下,一方面,通过为这两种特征参量配置不同的随机接入的时域资源,使得这两种特征参量关联的终端设备能够在不同的时域资源上接入网络设备,降低网络设备的负载。另一方面,还能根据各种特征参量关联的终端设备对接入需求的紧急情况为其配置不同的接入周期,例如在视频监控类型的终端设备的业务类型较为紧急、急需接入网络设备的情况下,则可以为视频监控类型的终端设备配置较短的接入周期,这样,无论属于视频监控类型的终端设备何时想要接入网络设备,都能够发现下一个可接入的时域资源较为接近,从而属于视频监控类型的终端设备能够及时且快速地接入网络设备。
按照上述两种配置方式,网络设备能够根据小区中当前时段内每种特征参量关联的终端设备的接入量,为各种特征参量配置各自的随机接入机会。例如,在各种特征参量按照终端带宽划分终端设备时,如果当前时段内各个终端带宽的终端设备的接入量相差不大,则可以为各种特征参量配置相同的随机接入的时域资源和周期。如果当前时段内终端带宽不大于10MHz的终端设备的接入量较少,则为提高终端带宽等于10MHz的终端设备的业务传输速率,网络设备可以为终端带宽等于5MHz或20MHz的终端设备支持的特征参量分配较多的时域资源。同时,为使得支持其它终端带宽的终端设备也能顺利接入,则还可以为终端带宽等于10MHz的终端设备支持的特征参量配置较长的接入周期,为支持其它终端带宽的终端设备支持的特征参量配置较短的接入周期,从而减小对支持其它终端带宽的终端设备的业务的影响。
本申请实施例中,“随机接入机会的配置指示信息处于第三状态,指示第一信息中还包括一种或多种特征参量的随机接入机会的配置信息”只是一种可选地实施方式,在另一种可选地实施方式中,随机接入机会的配置指示信息处于第三状态,也可以指示第一信息中还包括一种或多种特征参量关联的终端设备是否能够接入网络设备的配置信息,例如,第一信息中还包括N个比特位,N个比特位与N种特征参量对应。N个比特位中的一个比特位的取值用于指示:
允许该比特位对应的特征参量关联的终端设备接入网络设备;或者,
不允许该比特位对应的特征参量关联的终端设备接入网络设备。
采用上述实施方式,网络设备能够对每种特征参量关联的终端设备能否接入网络设备进行配置,在这种情况下,终端设备若确定终端设备支持的特征参量允许接入网络设备,则可正常接入网络设备,若确定终端设备支持的特征参量不允许接入网络设备,则可不接入网络设备。这种方式相比于配置L种特征参量对应的随机接入机会的方式来说,可以不用再额外给每种特征参量关联的终端设备配置随机接入机会,从而可以以较少的比特位指示各种特征参量关联的终端设备的接入能力,降低通信负载。
关于如何指示一种或多种特征参量关联的终端设备是否能够接入网络设备,将在后续实施例中进行详细描述,此处不作具体介绍。
步骤506,终端设备确定是否存在支持的特征参量对应的随机接入机会的配置信息,若存在,则执行步骤507,若不存在,则执行步骤504。
本申请实施例中,终端设备可以根据特征参量和终端设备的关联关系,确定终端设备支持的特征参量的标识,并从L组配置信息中获取具有该特征参量的标识的配置信息,从该配置信息中确定对应的随机接入机会。其中,特征参量和终端设备的关联关系可以按照预设规则定义在终端设备的内部,例如在终端设备出厂时配置在终端设备中;或者,也可以由网络设备发送给终端设备。
若特征参量和终端设备的关联关系由网络设备发送给终端设备,则特征参量和终端设备的关联关系可以包括每种特征参量包括的一项或多项参数和一项或多项参数对应的参数值范围,这种情况下,针对于每个特征参量,终端设备可以确定终端设备在该特征参量的每个参数下的参数值,判断参数值是否满足该特征参量中参数的参数范围,若满足,则该特征参量是终端设备支持的特征参量,若不满足,则该特征参量不是终端设备支持的特征参量。示例来说,假设终端设备的业务类型为视频监控类型,则若终端设备接收到网络设备发送的如表1所示的关联关系,则终端设备针对于特征参量1、特征参量2和特征参 量3分别进行分析,由于终端设备在业务类型这个参数下的参数值为视频监控类型,而特征参量2中业务类型这个参数下的参数值范围为视频监控类型,因此终端设备支持的特征参量为特征参量2。
步骤507,终端设备根据支持的特征参量对应的随机接入机会的配置信息,接入网络设备。
本申请实施例中,终端设备可以从支持的特征参量对应的随机接入机会的配置信息中获取随机接入的时域资源和周期。如果当前时段刚好属于随机接入的时域资源,则可以在该时域资源向网络设备发送随机接入请求,以启动随机接入。如果当前时段不属于随机接入的时域资源,则可以按照周期方式在下一个随机接入的时域资源上向网络设备发送随机接入请求,以启动随机接入。当然,若没有支持的特征参量的终端设备的随机接入机会,则终端设备可以不接入网络设备,例如不继续随机接入,或者不启动随机接入。
采用实施例二中的方案,网络设备能够在第一信息中携带如下三种配置信息中的一种或多种:允许某一类型的终端设备接入网络设备、不允许某一类型的终端设备接入网络设备、按照特征参量分组的方式指示每种特征参量关联的一组终端设备采用哪个随机接入机会接入网络设备。如此,网络设备不仅能够配置某一类型的终端设备的随机接入,还能够按照分组的方式配置每组终端设备的随机接入,从而该种类型的终端设备能够更为灵活地接入网络设备。
实施例三
图8示例性示出本申请实施例提供的又一种信息传输的方法的流程示意图,该方法可以由终端设备和网络设备来执行,终端设备用于接入网络设备所覆盖的小区。如图8所示,该方法包括:
步骤801,终端设备接收来自网络设备的第一信息。
本申请实施例中,第一信息可以承载于主系统信息块、系统信息块或专有无线资源控制信息。
步骤802,终端设备判断第一信息中是否包含随机接入机会的配置指示信息,若不包含,则执行步骤803,若包含,则执行步骤804。
在一种可选地实施方式中,第一信息中可以设置有第三比特,第三比特占据第一信息中的至少一个预设比特位。在这种情况下,如果终端设备发现至少一个预设比特位不存在,则确定第一信息中不包含随机接入机会的配置指示信息,如果终端设备发现至少一个预设比特位处的比特状态为存在,则确定第一信息中包含随机接入机会的配置指示信息。
步骤803,终端设备不接入网络设备。
在上述步骤803中,终端设备不接入网络设备,主要可以包括以下内容:
终端设备不使能终端设备的随机接入机会的配置;或者,
在终端设备没有发起随机接入请求的情况下,终端设备不启动随机接入,例如第一信息携带在主要系统信息块MIB或系统信息块SIB中,终端设备可以不向网络设备发送随机接入请求;或者,
在终端设备已经发起随机接入请求的情况下,终端设备终止随机接入,例如第一信息携带在下行控制信息中,终端设备可以不接收随机接入响应,或者终端设备可以不接收用于解决竞争的下行共享信息。
在一种可选地实施方式中,终端设备确定不接入网络设备,则终端设备还可以启动第一计时器,若第一计时器完成一次计时,则终端设备可以重新接入网络设备。其中,第一计时器完成一次计时是指:第一计时器统计经过的时间满足第一计时器的时长。例如:在终端设备初次接入网络设备或重新接入网络设备时,经由第一计时器完成一次计时,终端设备可以重新选择前导码索引,并向网络设备发送随机接入请求。
本申请实施例中,第一计时器的时长可以根据预定义规则来确定,例如可以在终端设备出厂时预置在终端设备内部。或者,第一计时器的时长也可以由网络设备进行配置,例如携带在第一信息中同步发送给终端设备。
步骤804,终端设备接入网络设备。
在上述步骤804中,终端设备接入网络设备,主要可以包括以下内容:
网络设备使能终端设备的随机接入机会的配置;或者,
在终端设备已经发起随机接入请求的情况下,终端设备继续随机接入,例如第一信息携带在下行控制信息中,终端设备可以接收随机接入响应,或者终端设备可以接收用于解决竞争的下行共享信息;或者,
在终端设备没有发起随机接入请求的情况下,终端设备启动随机接入,例如第一信息携带在主要系统信息块MIB或系统信息块SIB中,终端设备可以向网络设备发送随机接入请求;或者,
第一信息还包含一种或多种特征参量的随机接入机会的配置信息,终端设备从第一信息中获取支持的特征参量对应的随机接入机会的配置信息,按照支持的特征参量对应的随机接入机会接入网络设备。
示例性地,在第三比特占据的至少一个预设比特位不为空的情况下,第三比特的比特状态还用于指示上述至少一项内容。表6示例性示出第三比特的一种指示方式:
Figure PCTCN2021092356-appb-000009
表6
在该种实施方式中,终端设备若确定第一信息中包含随机接入机会的配置指示信息,则可以从第一信息中获取第三比特,根据第三比特的比特状态确定终端设备接入网络设备,还是按照支持的特征参量对应的随机接入机会接入网络设备。具体实现过程可以参照实施例二,此处不再过多介绍。
在一种可选地实施方式中,终端设备还可以接收来自网络设备的第三信息,第三信息中包括随机接入方式的配置指示信息,第三信息可以承载于系统信息、下行控制信息、媒体接入层信息和高层信令中的一项或多项。当第三信息承载于系统信息时,第三信息用于指示本次随机接入的随机接入方式,当第三信息承载于下行控制信息、媒体接入层信息或高层信令中时,第三信息用于指示下次随机接入的随机接入方式。例如,在终端设备初次接入小区时,网络设备可以在系统信息中承载第三信息,如此,终端设备可以按照第三信息指示的随机接入方式接入网络设备。在终端设备接入网络设备后,网络设备可以在高层信令中携带第三信息,如此,在终端设备与网络设备断开连接的情况下,终端设备可以按 照高层信令中指示的随机接入方式重新接入。
本申请实施例中,随机接入方式的配置指示信息可以为第四比特,第四比特包括2个比特位,第四比特可以具有4种比特状态,这4种比特状态可以全部用于指示随机接入方式,也可以部分用于指示随机接入方式。例如,表7示例性示出第四比特的一种指示方式。
Figure PCTCN2021092356-appb-000010
表7
如表7所示,第四比特的比特状态用于指示:
第四比特的比特状态为00,指示不允许终端设备接入网络设备;或者,
第四比特的比特状态为01,指示终端设备的随机接入方式为随机接入类型1;或者,
第四比特的比特状态为10,指示终端设备的随机接入方式为随机接入类型2;或者,
第四比特的比特状态为11,指示终端设备的随机接入方式为随机接入类型1或随机接入类型2。
例如,表8示例性示出第四比特的另一种指示方式:
Figure PCTCN2021092356-appb-000011
表8
如表8所示,第四比特的比特状态用于指示:
第四比特的比特状态为01,指示终端设备的随机接入方式为随机接入类型1;或者,
第四比特的比特状态为10,指示终端设备的随机接入方式为随机接入类型2;或者,
第四比特的比特状态为11,指示终端设备的随机接入方式为随机接入类型1或随机接入类型2。
在该种实施方式中,网络设备可以为某一类型的终端设备设置不同于其他类型的终端设备的随机接入方式,例如若某一类型的终端设备的业务类型较为紧急,则可以为该类型的终端设备设置随机接入类型2,由于随机接入类型2相比随机接入类型1的接入速度更快,因此能够使得该类型的终端设备更为快速地接入网络设备,提高该类型的终端设备处理业务的实时性。
在另一种可选地实施方式中,如果网络设备没有向终端设备发送随机接入方式的配置指示信息,则终端设备可以使用预先设置的随机接入方式接入网络设备。其中,预先设置的随机接入方式可以在终端设备出厂时预设在终端设备内部。
采用实施例三中的方案,终端设备能够根据第一信息中是否包含随机接入机会的配置指示信息来确定是否接入网络设备,这种情况下,网络设备在不允许某一类型的终端设备接入时,可以不再在第一信息中设置随机接入机会的配置指示信息,从而可以减少对第一信息的占用资源。
实施例四
图9示例性示出实施例四提供的一种信息传输的方法的流程示意图,该方法可以由终 端设备和网络设备来执行,终端设备用于接入网络设备所覆盖的小区。如图9所示,该方法包括:
步骤901,终端设备接收来自网络设备的第二信息,第二信息用于指示是否允许一种或多种特征参量中每种特征参量关联的终端设备接入网络设备,或者指示是否允许一组或多组前导资源关联的终端设备接入网络设备。
本申请实施例中,第二信息可以承载于以下信息中的一种或多种:
系统信息、无线资源控制信息、随机接入响应、媒体接入控制信息、下行控制信息、上行调度授权信息、Msg4(即随机接入类型1中的第四步握手)。
示例性地,如果第二信息承载于系统信息、随机接入响应、媒体接入控制信息、下行控制信息或上行调度授权信息中,则由于终端设备还没有接收到网络设备发送的竞争解决机制,终端设备的本次随机接入还可以终止,因此第二信息可以适用于终端设备的本次随机接入。如果第二信息承载于无线资源控制信息或Msg4中,则由于终端设备已经接收到网络设备发送的竞争解决机制,终端设备的本次随机接入已经成功,因此第二信息可以适用于终端设备的下次随机接入。
步骤902,终端设备确定支持的特征参量或关联的前导资源。
步骤903,终端设备根据是否允许支持的特征参量关联的终端设备接入网络设备,和/或是否允许支持的前导资源关联的终端设备接入网络设备,确定是否允许终端设备接入网络设备,若是,则执行步骤904,若否,则执行步骤905。
本申请实施例中,终端设备可以通过如下方式确定是否允许终端设备接入网络设备:
如果第二信息仅用于指示是否允许一种或多种特征参量中每种特征参量关联的终端设备接入网络设备,则终端设备根据是否允许支持的特征参量关联的终端设备接入网络设备,确定是否允许终端设备接入网络设备;或者,
如果第二信息仅用于指示是否允许一种或多种前导资源关联的终端设备接入网络设备,则终端设备根据是否允许支持的前导资源关联的终端设备接入网络设备,确定是否允许终端设备接入网络设备;或者,
如果第二信息用于指示是否允许一种或多种特征参量中每种特征参量关联的终端设备接入网络设备以及前导资源与特征参量的关联关系,则终端设备根据是否允许支持的前导资源对应的特征参量关联的终端设备接入网络设备,确定是否允许终端设备接入网络设备。
关于如何根据特征参量和前导资源确定是否允许终端设备接入网络设备,将在实施例五至实施例八中进行具体描述,此处先不作介绍。
步骤904,终端设备接入网络设备。
步骤905,终端设备不接入网络设备。
本申请实施例中,“第二信息用于指示是否允许一种或多种特征参量中每种特征参量关联的终端设备接入网络设备,或者指示是否允许一组或多组前导资源关联的终端设备接入网络设备”仅是一种可选地实施方式,在另一种可选地实施方式中,第二信息也可以用于指示一种或多种特征参量中每种特征参量关联的终端设备的随机接入机会的配置信息,或者指示一组或多组前导资源关联的终端设备的随机接入机会的配置信息,在这种情况下,终端设备可以按照支持的特征参量或关联的前导资源对应的随机接入机会接入网络设备。
在实施例四中,网络设备能够通过配置各种特征参量或各组前导资源配置的随机接入, 为各种特征参量或各组前导资源所关联的各组终端设备的随机接入进行配置,这种情况下,终端设备能够按照分组的方式接入网络设备,同一分组的终端设备可以具有相同的随机接入配置,例如接入网络设备或者不接入网络设备,如此,能够更为灵活地管理终端设备的随机接入。
关于配置各种特征参量或各组前导资源对应的随机接入机会的方式可以参照实施例二,下文仅从配置各种特征参量或各组前导资源是否允许接入网络设备进行介绍。
实施例五
图10示例性示出实施例五提供的一种信息传输的方法的流程示意图,该方法可以由终端设备和网络设备来执行,终端设备用于接入网络设备所覆盖的小区。如图10所示,该方法包括:
步骤1001,终端设备接收来自网络设备的下行控制信息,下行控制信息中包括第一指示信息,第一指示信息用于指示是否允许N种特征参量中每种特征参量所关联的终端设备接入网络设备,N为大于0的整数。
在上述步骤1001中,下行控制信息可以为以下信息中的一项或多项:
用于承载随机接入响应的第二下行控制信息,该下行控制信息由RA-RNTI加扰;
用于承载竞争解决信息的第三下行控制信息,该下行控制信息由TC-RNTI加扰。
本申请实施例中,若第一指示信息承载在第二下行控制信息或第三下行控制信息中,则由于终端设备没有接收网络设备发送的竞争解决信息,标志着终端设备的本次随机接入还可以终止,因此第一指示信息适用于本次随机接入。通过在不同的下行控制信息中携带第一指示信息,使得网络设备能够控制终端设备正在进行的随机接入,如此,随机接入的灵活性更好。
本申请实施例中,第一指示信息可以按照比特位图的方式指示是否允许N种特征参量中每种特征参量关联的终端设备接入网络设备,下面介绍几种可能的指示方式。
在一种可选地实施方式中,第一指示信息可以为第五比特,第五比特包括N个比特位,N个比特位与N种特征参量对应。针对于第五比特中的一个比特位,该比特位的取值用于指示:
允许该比特位对应的特征参量关联的终端设备接入网络设备;或者,
不允许该比特位对应的特征参量关联的终端设备接入网络设备。
例如,假设存在3种特征参量,第一种特征参量关联终端带宽等于5MHz的终端设备,第二种特征参量关联终端带宽等于10MHz的终端设备,第三种特征参量关联终端带宽等于20MHz的终端设备,则:
第五比特可以包括3个比特位,表9示例性示出第五比特的一种指示方式。
Figure PCTCN2021092356-appb-000012
表9
在表9所示意的指示方式中,针对于第五比特中的一个比特位:
该比特位的取值为1,指示允许该比特位对应的特征参量关联的终端设备接入网络设备,例如允许终端带宽等于5MHz的终端设备(即第一种特征参量关联的终端设备)和终端带宽等于20MHz的终端设备(即第三种特征参量关联的终端设备)接入网络设备;或 者,
该比特位的取值为0,指示不允许该比特位对应的特征参量关联的终端设备接入网络设备,例如不允许终端带宽等于10MHz的终端设备(即第二种特征参量关联的终端设备)接入网络设备。
这种实施方式可以利用下行控制信息中预留的N个比特位,指示是否允许N种特征参量中每种特征参量关联的终端设备接入网络设备,从而网络设备能够对每种特征参量关联的终端设备能够接入网络设备进行配置。示例性地,由于5G NR在下行控制信息中预留的比特位数为16,因此第五比特中比特位的数量可以不大于16。
在另一种可选地实施方式中,第一指示信息可以为第六比特,第六比特包括
Figure PCTCN2021092356-appb-000013
Figure PCTCN2021092356-appb-000014
个比特位,在这种情况下,第六比特的比特状态一共可以包括
Figure PCTCN2021092356-appb-000015
种可能,每种比特状态可以对应一种或多种特征参量,不同的比特状态对应的一种或多种特征参量不完全相同。其中,第六比特的比特状态可以用于指示:
允许该比特状态对应的一种或多种特征参量关联的终端设备接入网络设备,且不允许其它特征参量关联的终端设备接入网络;或者,
不允许该比特状态对应的一种或多种特征参量关联的终端设备接入网络设备,且允许其它特征参量关联的终端设备接入网络。
下面以一个具体的示例进行说明:假设存在3种特征参量,第一种特征参量关联终端带宽等于5MHz的终端设备,第二种特征参量关联终端带宽等于10MHz的终端设备,第三种特征参量关联终端带宽等于20MHz的终端设备,则这3种特征参量中连续的一种或多种特征参量及关联的终端设备可以存在如下几种可能:
连续的3种特征参量:有1种可能,即第一种特征参量、第二种特征参量和第三种特征参量,关联终端带宽任意的终端设备;
连续的2组特征参量:有2种可能,第1种可能为第一种特征参量和第二种特征参量,关联终端带宽等于5MHz和等于10MHz的终端设备,第2种可能为第二种特征参量和第三种特征参量,关联终端带宽等于10MHz和等于20MHz的终端设备;
1组特征参量:有3种可能:第1种可能为第一种特征参量,关联终端带宽等于5MHz的终端设备,第2种可能为第二种特征参量,关联终端带宽等于10MHz的终端设备,第3种可能为第三种特征参量,关联终端带宽等于20MHz的终端设备。
由此可知,3种特征参量中连续的一种或多种特征参量共存在以上6种可能的情况,如此,可以设置第六比特包括
Figure PCTCN2021092356-appb-000016
个比特位,由于log 26向上取整后得到的值为3,因此第六比特可以包括3个比特位。
例如,表10示例性示出第六比特的一种指示方式:
Figure PCTCN2021092356-appb-000017
表10
在表10所示意的指示方式中,第六比特的比特状态用于指示:
第六比特的比特状态为001,指示允许第一种特征参量关联的终端设备(即终端带宽 等于5MHz的终端设备)接入网络设备;或者,
第六比特的比特状态为010,指示允许第二种特征参量关联的终端设备(即终端带宽等于10MHz的终端设备)接入网络设备;或者,
第六比特的比特状态为011,指示允许第三种特征参量所关联的终端设备(即终端带宽等于20MHz的终端设备)接入网络设备;或者,
第六比特的比特状态为100,指示允许第一种特征参量和第二种特征参量关联的终端设备(即终端带宽等于5MHz或10MHz的终端设备)接入网络设备接入网络;或者,
第六比特的比特状态为101时,指示允许第二种特征参量和第三种特征参量关联的终端设备(即终端带宽等于10MHz或20MHz的终端设备)接入网络设备;或者,
第六比特的比特状态为110时,指示允许第一种特征参量、第二种特征参量和第三种特征参量关联的终端设备(即终端带宽任意的终端设备)接入网络设备。
这种实施方式只能指示连续的一种或多种特征参量是否能够接入网络设备,而不能指示不连续的一种或多种特征参量是否能够接入网络设备,因此指示的灵活性不是很好。然而,这只是一种可选地实施方式,在另一种可选地实施方式中,每种比特状态可以对应一种或多种特征参量,而可以无需限定为连续的一种或多种特征参量,这样虽然会增加第六比特中比特位的数量,但是能够提高指示的灵活性。例如,在存在3种特征参量的情况下,还可以存在一个比特状态111,用于指示第一种特征参量和第三种特征参量关联的终端设备(即终端带宽等于5MHz或者终端带宽等于20MHz的终端设备)是否允许接入网络设备。
在又一种可选地实施方式中,第一指示信息可以由特殊比特状态来指示,例如预先选择下行控制信息中的一个或多个预留比特作为第一指示信息的承载主体,则:
在一个或多个预留比特的比特状态全为0时,指示终端设备不允许接入网络设备;或者,
在一个或多个预留比特的比特状态全为1时,指示终端设备允许接入网络设备。
例如,下行控制信息包括16个预留比特位,选择其中3个预留比特位作为第一指示信息的承载主体,则:如果这3个预留比特位的比特状态为111,则指示属于该类型的全部终端设备允许接入网络设备,如果这3个预留比特位的比特状态为000,则指示属于该类型的全部终端设备不允许接入网络设备。
在又一种可选地实施方式中,第一指示信息可以承载在下行控制信息的加扰序列中,例如,N种特征参量具有各自专用的组标识,网络设备若允许其中一种特征参量关联的终端设备接入网络设备,则可以使用该种特征参量的组标识加扰下行控制信息。如此,该种特征参量关联的终端设备使用自己的组标识能够成功解扰下行控制信息,进而能够根据下行控制信息去相应的下行共享信道获取随机接入响应或竞争解决机制,如此,该种特征参量所关联的终端设备可以继续接入网络。而其它特征参量关联的终端设备使用自己的组标识无法解扰下行控制信息,从而无法去下行共享信道获取随机接入响应或竞争解决机制,如此,其它特征参量关联的终端设备无法继续接入网络。
本申请实施例中,在允许多种特征参量关联的终端设备接入网络设备时,网络设备可以使用允许的每种特征参量的组标识分别加扰下行控制信息,这样,允许接入网络设备的每种特征参量关联的终端设备都能够使用自己的组标识成功解扰下行控制信息。
步骤1002,终端设备根据第一指示信息,确定是否允许支持的特征参量关联的终端设备接入网络设备,若是,则执行步骤1003,若否,则执行步骤1004。
步骤1003,终端设备从下行共享信道获取随机接入响应,或者从下行共享信道获取竞争解决信息,继续随机接入。
步骤1004,终端设备不从下行共享信道获取随机接入响应,或者不从下行共享信道获取竞争解决信息,终止随机接入。
在实施例五中,通过在下行控制信息中指示是否允许每种特征参量关联的终端设备接入网络设备,使得网络设备能够在终端设备已经发起随机接入请求的情况下对终端设备的随机接入进行限制。在这种情况下,如果某一特征参量关联的终端设备在当前时段内接入网络设备的数量较多,则网络设备还能够对使用当前时段接入的该特征参量关联的终端设备的接入进行限制,以减轻网络负载,将资源均衡的分配给各种特征参量关联的终端设备。
实施例六
图11示例性示出实施例六提供的又一种信息传输的方法的流程示意图,该方法可以由终端设备和网络设备来执行,终端设备用于接入网络设备覆盖的小区。如图11所示,该方法包括:
步骤1101,终端设备接收来自网络设备的媒体接入层协议数据单元MAC PDU,MAC PDU中包括第二指示信息。
步骤1102:终端设备确定第二指示信息在MAC PDU中的位置:
若第二指示信息位于预设的媒体接入控制信息(是指MAC PDU中新增的一个或多个MAC subPDU),第二指示信息用于指示是否允许N种特征参量中每种特征参量关联的终端设备接入网络设备,执行步骤1103;或者,
若第二指示信息位于随机接入响应RAR,第二指示信息用于指示是否允许接收该随机接入响应的终端设备接入网络设备,执行步骤1104;或者,
若第二指示信息位于退避指示BI,第二指示信息用于指示是否允许一种或多种特征参量关联的终端设备接入网络设备,执行步骤1105。
步骤1103,终端设备根据预设的媒体接入控制信息中的第二指示信息确定是否允许终端设备支持的特征参量接入网络设备,若是,则执行步骤1106,若否,则执行步骤1107。
在一种可选地实施方式中,第二指示信息可以包括S个比特位,S个比特位是MAC PDU中新添加的一个或多个MAC子头所包括的比特位,由于一个MAC子头可以占据8个比特位,因此S的取值可以取8的整数倍。示例性地,S的取值不小于N,如此,S个比特位中可以存在N个比特位,这N个比特位分别与N种特征参量对应。其中,N个比特位中的一个比特位的取值可以用于指示:
允许该比特位对应的特征参量关联的终端设备接入网络设备;或者,
不允许该比特位对应的特征参量关联的终端设备接入网络设备。
例如,在该比特位的取值为1时,指示允许该比特位对应的特征参量关联的终端设备接入网络设备,在该比特位的取值为0时,指示不允许该比特位对应的特征参量关联的终端设备接入网络设备。
本申请实施例中,在S的取值大于N的情况下,N个比特位可以为S个比特位中的连续的N个比特位,也可以为S个比特位中不连续的N个比特位,不作限定。
步骤1104,终端设备根据随机接入响应中的第二指示信息确定是否允许接收该随机接入响应的终端设备接入网络设备,若是,则执行步骤1106,若否,则执行步骤1107。
在一种可选地实施方式中,第二指示信息可以包括1个比特位,该比特位可以为随机接入响应中的1个预留比特位,或者为随机接入响应中上行调度授权信息(即UR-grant)中的1个预留比特位(即CSI请求字段)。该比特位的取值用于指示:
允许接收该随机接入响应的终端设备接入网络设备;或者,
不允许接收该随机接入响应的终端设备接入网络设备。
例如,在该比特位的取值为1时,允许接收该随机接入响应的终端设备接入网络设备,在该比特位的取值为0时,不允许接收该随机接入响应的终端设备接入网络设备。
采用这种方式,网络设备可以根据当前接入的负载情况,设置随机接入响应中该预留比特位的值。例如,在当前接入的负载数量大于预设重载数量的情况下,可以将90%的随机接入响应中该预设比特位的值设置为0,将剩余10%的随机接入响应中该预设比特位的值设置为1,以在当前时段申请接入网络设备的终端设备中选择10%的终端设备允许接入网络设备,从而减少接入网络设备的终端设备的数量,减轻网络负载。当然,在当前接入的负载数量小于预设轻载数量的情况下,也可以将每个随机接入响应中该预设比特位的值设置为1,从而不限制终端设备的接入。
在另一种可选地实施方式中,第二指示信息可以包括2个比特位,这2个比特位可以为随机接入响应中的1个预留比特位和上行调度授权信息中的1个预留比特位(即CSI请求字段)。这两个比特位的比特状态用于指示:
允许接收该随机接入响应的终端设备接入网络设备;或者,
不允许接收该随机接入响应的终端设备接入网络设备。
例如,在这两个比特位的比特状态为11时,指示允许接收该随机接入响应的终端设备接入网络设备,在该比特位的取值不为11时,例如为00、01或10,指示不允许接收该随机接入响应的终端设备接入网络设备。
在上述两种实施方式中,网络设备可以利用随机接入响应或上行调度授权信息中的1个预留比特来指示终端设备是否能够接入网络设备,也可以利用随机接入响应中的1个预留比特和上行调度授权信息中的1个预留比特来联合指示终端设备是否能够接入网络设备,从而指示的方式更为灵活。且,由于接收到随机接入响应的终端设备会继续进行随机接入,而没有接收到随机接入响应的终端设备不会继续进行随机接入,所以在随机接入响应中携带随机接入配置,能够只对下一步要接入网络设备的终端设备进行配置,而可以不用再对全部的终端设备进行配置,从而还可以节省配置资源。
步骤1105,终端设备根据退避指示中的第二指示信息确是否允许定终端设备支持的特征参量接入网络设备,若是,则执行步骤1106,若否,则执行步骤1107。
在一种可选地实施方式中,第二指示信息可以包括2个比特位,这2个比特位可以为退避指示信息BI中的2个预留比特位。由于2个比特位最多可以包括4种比特状态,因此这2个比特位的比特状态可以用于指示出4种可能的随机接入配置,这4种随机接入配置可以根据实际需要进行设置,例如,在一个场景中:
2个比特位的比特状态为00,指示不允许终端设备接入网络设备;或者,
2个比特位的比特状态为11,指示允许终端设备接入网络设备;
在另一个场景中:
2个比特位的比特状态为00,指示允许特征参量1关联的终端设备接入网络设备;或者,
2个比特位的比特状态为01,指示允许特征参量2关联的终端设备接入网络设备;或者,
2个比特位的比特状态为10,指示允许特征参量3关联的终端设备接入网络设备;或者,
2个比特位的比特状态为11,指示允许特征参量4关联的终端设备接入网络设备。
假设存在三种特征参量,第一种特征参量关联终端带宽等于5MHz的终端设备,第二种特征参量关联终端带宽等于5MHz和等于10MHz的终端设备,第三种特征参量关联终端带宽等于20MHz的终端设备,表11示例性示出第二指示信息的一种指示方式:
Figure PCTCN2021092356-appb-000018
表11
在表11所示意的指示方式中:
2个比特位的比特状态为00时,不允许终端设备接入网络设备;
2个比特位的比特状态为01时,允许第一种特征参量关联的终端设备(即终端带宽等于5MHz的终端设备)接入网络设备;
2个比特位的比特状态为10时,允许第二种特征参量关联的终端设备(即终端带宽等于5MHz或者等于10MHz的终端设备)接入网络设备;
2个比特位的比特状态为11时,允许第三种特征参量所关联的终端设备(即终端带宽等于20MHz的终端设备)接入网络设备;
步骤1106,终端设备向网络设备发送竞争解决标识,竞争解决标识中包括终端设备的唯一标识,终端设备继续随机接入。
步骤1107,终端设备不向网络设备发送竞争解决标识,终端设备终止随机接入。
在实施例六中,通过在下行数据信息中携带第二指示信息,能够对获取媒体接入控制层协议数据单元MAC PDU(例如随机接入响应)的终端设备的随机接入进行配置。例如在某种场景下,虽然之前允许某种特征参量关联的终端设备接入网络设备,但是现阶段小区中该种特征参量关联的终端设备的接入负载较重,那么在这种情况下,还可以对该种特征参量关联的终端设备中已经接收到随机接入响应的终端设备的随机接入进行限制,从而及时地降低网络负载。
上述实施例均是从使用特征参量对终端设备进行分组的角度描述如何配置终端设备的随机接入,本申请中,由于终端设备的随机接入还与前导码索引具有关联,因此本申请还可以对前导码索引进行分组得到多组前导资源,通过配置各组前导资源的随机接入实现对终端设备的随机接入进行配置。下面以实施例七和实施例八为例描述通过前导资源配置终端设备的随机接入的两种可能方式。
实施例七
图12示例性示出实施例七提供的一种信息传输的方法的流程示意图,该方法可以由终端设备和网络设备来执行,终端设备用于接入网络设备覆盖的小区。如图12所示,该方法包括:
步骤1201,终端设备接收来自网络设备的信令,信令中包括X组前导资源的配置信息,X为大于0的整数。
本申请实施例中,X组前导资源的配置信息用于指示X组前导资源对应的前导码索引范围,其中,5G NR中存在至多64个前导码索引,即索引0、索引1、索引2、……、索引63,因此X可以为大于0且不大于64的整数。在配置X组前导资源时,网络设备可以选择64个前导码索引中的一个或多个前导码索引进行配置,例如可以只选择1个前导码索引并配置为1组前导资源,或者也可以选择50个前导码索引配置为3组前导资源。
下面以将64个前导码索引配置为X组前导资源为例,示例性介绍两种可能的配置方式。
在一种可选地配置方式中,可以将64个前导码索引随机配置为X组前导资源,X的取值可以为大于0且不大于64的任意整数。例如表12示例性示出一种随机配置X组前导资源的对应关系表:
前导资源组 1 2 3 4 5
前导码索引范围 0~8 9~20 21~35 36~44 45~63
表12
如表12所示,随机配置X组前导资源时,每组前导资源中前导码索引的数量可以不同,例如:
前导资源组1中包括前导码索引0~前导码索引8,共9个前导码索引;
前导资源组2中包括前导码索引9~前导码索引20,共12个前导码索引;
前导资源组3中包括前导码索引21~前导码索引35,共15个前导码索引;
前导资源组4中包括前导码索引36~前导码索引44,共9个前导码索引;
前导资源组5中包括前导码索引45~前导码索引63,共19个前导码索引。
在另一种可选地配置方式中,可以将64个前导码索引平均配置为X组前导资源,X的取值可以为2的幂值,即[2,4,8,16,32,64]中的一个值。例如表13示例性示出一种平均配置X组前导资源的对应关系表:
前导资源组 1 2 3 4
前导码索引范围 0~15 16~31 32~47 48~63
表13
如表13所示,在平均配置X组前导资源时,每组前导资源中前导码索引的数量可以相同,例如:
前导资源组1中包括前导码索引0~前导码索引15,共16个前导码索引;
前导资源组2中包括前导码索引16~前导码索引31,共16个前导码索引;
前导资源组3中包括前导码索引32~前导码索引47,共16个前导码索引;
前导资源组4中包括前导码索引48~前导码索引63,共16个前导码索引。
上述内容只是一种可选地实施方式,在另一种可选地实施方式中,X组前导资源的配置信息也可以是按照预定义规则确定的,例如,在终端设备出厂时设置在终端设备内部。
步骤1202,终端设备接收来自网络设备的第二信息,第二信息用于指示是否允许X组前导资源中每组前导资源关联的终端设备接入网络设备。
本申请实施例中,第二信息还可以按照比特位图的方式指示是否允许每组前导资源关联的终端设备接入网络设备,下面介绍两种可能的指示方式。
在一种可选地实施方式中,第二信息中可以包括第七比特,第七比特包括X个比特位,X个比特位对应X组前导资源,X为大于0且不大于64的整数。在这种情况下,X个比特位中的一个比特位的取值用于指示:
允许该比特位对应的前导资源关联的终端设备接入网络设备;或者,
不允许该比特位对应的前导资源关联的终端设备接入网络设备。
例如,针对于表13所示意的4组前导资源,第七比特可以包括4个比特位,表14示例性示出第七比特的一种指示方式:
前导资源 1 2 3 4
前导码索引范围 0~15 16~31 32~47 48~63
第七比特 1 0 0 1
指示内容 允许 不允许 不允许 允许
表14
如表14所示,第七比特中的一个比特位的取值为1,指示允许该比特位对应的前导资源关联的终端设备接入网络设备,第七比特中的一个比特位的取值为0,指示不允许该比特位对应的前导资源关联的终端设备接入网络设备。
在另一种可选地实施方式中,第二信息可以包括第八比特,第八比特包括
Figure PCTCN2021092356-appb-000019
个比特位,每个比特位可以对应X组前导资源中的Y组前导资源,每个比特位的比特状态用于指示是否允许对应的Y组前导资源关联的终端设备接入网络设备。其中,Y的取值可以为大于0且不大于X的整数。举例来说,若存在12组前导资源,且每4组前导资源对应1个比特位,则第八比特可以包括3个比特位,第1个比特位的取值用于指示是否允许第1组至第4组前导资源关联的终端设备接入网络设备,第2个比特位的取值用于指示是否允许第5组至第8组前导资源关联的终端设备接入网络设备,第3个比特位的取值用于指示是否允许第9组至第12组前导资源关联的终端设备接入网络设备。
在这种实施方式中,Y的取值可以是由网络设备配置给终端设备的,也可以是预定义的整数,例如在终端设备出厂时设置在终端设备内部。若是Y的取值是由网络设备配置给终端设备的,则由于终端设备不知道Y的取值是多大,因此第二信息中还需要设置第九比特,第九比特的比特状态用于指示Y的取值,具体实现可以参照实施例二。若Y的取值是预定义的整数,则由于终端设备已知Y的取值是多大,因此第二信息中不再需要额外设置第九比特来指示Y的取值。
可以理解的,本申请的上述实施方式仅是几种可选地实施方式,在其它地实施方式中,还可以设置每个比特位对应任意多组前导资源,例如第1个比特位对应3组前导资源,第2个比特位对应1组前导资源,第3个比特位对应2组前导资源,且相邻两个比特位对应的前导资源可以连续,也可以不连续,这种情况能够更为灵活地配置各组前导资源的随机接入。当然,这种情况下每个比特位和前导资源的关联关系可以预先设置在终端设备中。
步骤1203,终端设备确定随机接入对应的前导码索引,根据前导码索引和X组前导资源的配置信息,确定终端设备关联的前导资源。
本申请实施例中,终端设备确定随机接入对应的前导码索引的方式可以参照现有流程,例如:在随机接入类型1中,系统信息还可以包括前导码索引集合,终端设备可以从前导码索引集合中随机选择一个前导码索引(例如前导码索引12)作为本次随机接入的前导码索引。如此,参照表13,由于前导码索引12位于前导资源组1的前导码索引范围内,因 此终端设备可以确定终端设备关联的前导资源为前导资源组1。
步骤1204,终端设备确定是否允许终端设备关联的前导资源接入网络设备,若是,则执行步骤1205,若否,则执行步骤1206。
参照表14,若终端设备选择的前导码索引属于前导资源组1或前导资源组4,则终端设备关联的前导资源允许接入网络设备。若终端设备选择的前导码索引属于前导资源组2或前导资源组3,则终端设备关联的前导资源不允许接入网络设备。
步骤1205,终端设备接入网络设备,例如终端设备启动随机接入,或者终端设备继续随机接入。
步骤1206,终端设备不接入网络设备,例如终端设备不启动随机接入,或者终端设备终止随机接入。
在实施例七中,网络设备能够通过限制前导资源的随机接入,对终端设备的随机接入进行限定,这种方式下,即使不对终端设备按照特征参量进行分组,也能够对不同的终端设备设置不同的随机接入配置。
上述内容仅是一种可选地实施方式,在另一种可选地实施方式中,第二信息中还可以包括每组前导资源关联的终端设备的随机接入机会的配置信息,在这种情况下,终端设备可以根据关联的前导资源对应的随机接入机会接入网络设备。其中,关于第二信息任何包括X组前导资源关联的终端设备的随机接入机会的配置信息指示,具体可以参照实施例二和实施例三中第一信息如何包括N种特征参量的随机接入机会的配置信息,此处不再作介绍。
实施例八
图13示例性示出实施例八提供的一种信息传输的方法的流程示意图,该方法可以由终端设备和网络设备来执行,终端设备用于接入网络设备覆盖的小区。如图13所示,该方法包括:
步骤1301,终端设备接收来自网络设备的信令,信令中包括X组前导资源的配置信息和X组前导资源与N种特征参量的关联关系,其中,X、N为不小于0的整数。
在一种可选地实施方式中,X组前导资源和N种特征参量的关联关系可以为:
一组前导资源对应一种特征参量;或者,
多组前导资源对应一种特征参量;或者,
一组前导资源对应多种特征参量。
示例来说,表15示意出一种X组前导资源和N种特征参量的关联关系表:
前导资源组 1 2 3
前导码索引 0~19 20~39 40~63
特征参量 工业无线传感网络 可穿戴设备 视频监控
表15
在表15所示意的关联关系中,64个前导码索引随机配置为3组前导资源,3种特征参量关联的终端设备对应3种业务类型,一种特征参量可以对应一组前导资源。如此,不同的前导资源可以关联不同业务类型的终端设备,例如:
前导资源组1关联工业无线传感网络类型的终端设备,前导码索引范围为0~19;
前导资源组2关联可穿戴设备类型的终端设备,前导码索引范围为20~39;
前导资源组3关联为视频监控类型的终端设备,前导码索引范围为40~63。
表16示意出另一种X组前导资源和N种特征参量的关联关系表:
Figure PCTCN2021092356-appb-000020
表16
在表16所示意的关联关系中,64个前导码索引随机配置为3组,2种特征参量关联的终端设备对应2种终端带宽,一种特征参量可以对应多组前导资源,例如:
前导资源组1和前导资源组2对应终端带宽不大于5MHz的终端设备,前导资源组1的前导码索引范围为0~19,前导资源组2的前导码索引范围为20~39;
前导资源3对应终端带宽大于5MHz且不大于10MHz的终端设备,前导码索引范围为40~63。
表17示意出又一种X组前导资源和N种特征参量的关联关系表:
Figure PCTCN2021092356-appb-000021
表17
在表17所示意的关联关系中,64个前导码索引平均配置为2组,3种特征参量关联的终端设备对应3种移动性,多种特征参量可以对应一组前导资源,例如:
前导资源组1对应固定的终端设备和移动频率小于第一频率的终端设备,前导资源组1的前导码索引范围为0~31;
前导资源组2对应移动频率大于第一频率的终端设备,前导资源组2的前导码索引范围为32~63。
步骤1302,终端设备接收来自网络设备的第二信息,第二信息用于指示以下内容:
X组前导资源中每组前导资源关联的终端设备的随机接入机会;或者,
是否允许X组前导资源中每组前导资源关联的终端设备接入网络设备;或者,
N种特征参量中每种特征参量关联的终端设备的随机接入机会;或者,
是否允许N种特征参量中每种特征参量关联的终端设备接入网络设备。
下面以第二信息用于指示X组前导资源中每组前导资源关联的终端设备的随机接入机会,或者X组前导资源中每组前导资源关联的终端设备能否接入网络设备为例,介绍后续流程。如果第二信息用于指示N种特征参量中每种特征参量关联的终端设备的随机接入机会,或者N种特征参量中每种特征参量关联的终端设备能否接入网络设备,则终端设备可以根据自己选择的前导码索引确定关联的前导资源,根据前导资源与特征参量的关联关系,确定关联的前导资源对应的特征参量,使用该特征参量的随机接入配置接入网络设备或者不接入网络设备。
步骤1303,终端设备根据前导资源与特征参量的关联关系,确定支持的特征参量对应的前导资源。
示例来说,参照表15,若终端设备的业务类型为可穿戴设备,则终端设备支持的特征参量对应的前导资源为前导资源组2。
步骤1304,终端设备根据支持的特征参量对应的前导资源,确定是否允许终端设备接 入网络设备,若是,则执行步骤1305,若否,则执行步骤1306。
步骤1305,终端设备接入网络设备。
步骤1306,终端设备不接入网络设备。
在一种可选地实施方式中,若第二信息承载于下行控制信息,则第二信息可以用于指示是否允许X组前导资源中每组前导资源关联的终端设备接入网络设备,在这种情况下,若终端设备支持的特征参量对应的前导资源允许接入网络设备,则终端设备可以继续随机接入,若终端设备支持的特征参量对应的前导资源不允许接入网络设备,则终端设备可以终止随机接入。在这种情况下,即使终端设备已经发送随机接入请求,网络设备也可以根据小区中已经接入的各种特征参量关联的终端设备的数量和特征参量与前导资源的关联关系,确定允许用于接入的前导资源和/或不允许用于接入的前导资源。例如,如表14所示,在当前时段内,如果小区中视频监控类的终端设备的接入数量较多,而其它业务类型的终端设备的接入量较少,则第二信息可以用于指示不允许视频监控类对应的前导资源组3用于接入,和/或,第二信息可以用于指示允许其它业务类型对应的前导资源组1和前导资源组2用于随机接入。又例如,如表15所示,在当前时段内,如果小区中最大终端带宽等于5MHz的终端设备的接入数量较多,而支持其它最大终端带宽的终端设备的接入数量较少,则第二信息可以用于指示不允许支持最大终端带宽等于5MHz的前导资源组1用于随机接入,和/或,第二信息用于指示允许支持最大终端带宽不等于5MHz(例如为支持最大终端带宽等于10MHz,和/或,支持最大终端带宽等于20MHz)的前导资源组2用于随机接入。
在一种可选地实施方式中,若第二信息承载于系统信息,则第二信息可以用于指示X组前导资源中每组前导资源关联的终端设备的随机接入机会,在这种情况下,终端设备可以从支持的特征参量对应的前导资源对应的前导码索引范围内选择一个前导码索引,作为本次随机接入的前导码索引,并可以在支持的特征参量对应的前导资源的随机接入机会向网络设备发送随机接入请求,随机接入请求中包括本次随机接入的前导码索引,如此,终端设备可以启动随机接入。
采用实施例八中的方案,由于每个前导码索引允许一个终端设备接入网络设备,因此通过关联X组前导资源和N种特征参量,使得每种特征参量关联的终端设备在该种特征参量对应的前导资源中选择前导码进行接入,这样,还能够对每种特征参量接入网络设备的数量进行控制。
本申请实施例能够利用随机接入机会的配置指示信息、特征参量和终端设备的关联关系、前导资源和终端设备的关联关系中的一项或多项对终端设备的随机接入进行限制,在这种情况下,终端设备可以按照自己所对应的第一方式接入网络设备或者不接入网络设备,而可以不用和其它终端设备具有相同的随机接入配置,如此,可以提高终端设备接入网络设备的灵活性。
需要说明的是,上述各个信息的名称仅仅是作为示例,随着通信技术的演变,上述任意信息均可能改变其名称,但不管其名称如何发生变化,只要其含义与本申请上述信息的含义相同,则均落入本申请的保护范围之内。
上述主要从各个网元之间交互的角度对本申请提供的方案进行了介绍。可以理解的是,上述实现各网元为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算 法步骤,本发明能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
根据前述方法,图14为本申请实施例提供的信息传输的装置1401的结构示意图,如图14所示,该信息传输的装置1401可以为终端设备或网络设备,也可以为芯片或电路,比如可设置于终端设备的芯片或电路,再比如可设置于网络设备内的芯片或电路。
进一步的,该信息传输的装置1401还可以进一步包括总线系统,其中,处理器1402、存储器1404、收发器1403可以通过总线系统相连。
应理解,上述处理器1402可以是一个芯片。例如,该处理器1402可以是现场可编程门阵列(field programmable gate array,FPGA),可以是专用集成芯片(application specific integrated circuit,ASIC),还可以是系统芯片(system on chip,SoC),还可以是中央处理器(central processor unit,CPU),还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。
在实现过程中,上述方法的各步骤可以通过处理器1402中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器1402中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器1404,处理器1402读取存储器1404中的信息,结合其硬件完成上述方法的步骤。
应注意,本申请实施例中的处理器1402可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器1404可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步 动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
该信息传输的装置1401对应上述方法中的终端设备的情况下,该信息传输的装置1401可以包括处理器1402、收发器1403和存储器1404。该存储器1404用于存储指令,该处理器1402用于执行该存储器1404存储的指令,以实现如上图1至图13中所示的任一项或任多项对应的方法中终端设备的相关方案。
当信息传输的装置1401为上述终端设备,信息传输的装置1401可以用于执行上述实施例一至实施例八中任一实施例中终端设备所执行的方法。
信息传输的装置1401为上述终端设备,且执行实施例一时,收发器1403可以接收网络设备发送的第一信息,第一信息包含随机接入机会的配置指示信息,处理器1402可以根据随机接入机会的配置指示信息确定第一方式。或者,收发器1403还可以接收网络设备发送的第一信息,处理器1402还可以根据所述第一信息中是否包含随机接入机会的配置指示信息确定第一方式。或者,收发器1403还可以接收网络设备发送的第二信息,第二信息用于指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,处理器1402还可以根据第二信息确定第一方式。或者,收发器1403还可以接收网络设备发送的第二信息,第二信息用于指示一个或多个前导资源所关联的终端设备的第一方式,处理器1402还可以根据第二信息确定第一方式。其中,第一方式为接入网络设备、不接入网络设备、进行随机接入和不进行随机接入中的一项。
该信息传输的装置1401对应上述方法中的网络设备的情况下,该信息传输的装置1401可以包括处理器1402、收发器1403和存储器1404。该存储器1404用于存储指令,该处理器1402用于执行该存储器1404存储的指令,以实现如上图1至图13中所示的任一项或任多项对应的方法中终端设备的相关方案。
当信息传输的装置1401为上述网络设备,信息传输的装置1401可以用于执行上述实施例一至实施例八中任一实施例中网络设备所执行的方法。
信息传输的装置1401为上述网络设备,且执行实施例一时,收发器1403可以向终端设备发送第一信息,第一信息包含随机接入机会的配置指示信息,第一信息用于终端设备根据随机接入机会的配置指示信息确定第一方式,处理器1402在第一方式为接入网络设备或进行随机接入的情况下,可以允许终端设备接入网络设备。或者,收发器1403还可以向终端设备发送第一信息,第一信息用于所述终端设备根据第一信息中是否包含随机接入机会的配置指示信息确定第一方式,处理器1402在第一方式为接入网络设备或进行随机接入的情况下,可以允许终端设备接入网络设备。或者,收发器1403还可以向终端设备发送第二信息,第二信息指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,第二信息用于终端设备根据第二信息确定第一方式,处理器1402在第一方式为接入网络设备或进行随机接入的情况下,可以允许终端设备接入网络设备。或者,收发器1403还可以向终端设备发送第二信息,第二信息指示一个或多个前导资源所关联的终端设备的第一方式,第二信息用于终端设备根据第二信息确定第一方式,处理器1402在第一方式为接入网络设备或进行随机接入的情况下,可以允许终端设备接入网络设备。其中,第一方式为接入网络设备、不接入网络设备、进行随机接入和不进行随机接入中的一 项。
该信息传输的装置所涉及的与本申请实施例提供的技术方案相关的概念,解释和详细说明及其他步骤请参见前述方法或其他实施例中关于这些内容的描述,此处不做赘述。
根据前述方法,图15为本申请实施例提供的信息传输的装置1501的结构示意图,如图15所示,信息传输的装置1501可以包括通信接口1503、处理器1502和存储器1504。所述通信接口1503,用于输入和/或输出信息;所述处理器1502,用于执行计算机程序或指令,使得信息传输的装置1501实现上述图1至图13的相关方案中终端设备侧的方法,或使得信息传输的装置1501实现上述图1至图13的相关方案中网络设备侧的方法。本申请实施例中,通信接口1503可以实现上述图14的收发器1403所实现的方案,处理器1502可以实现上述图14的处理器1402所实现的方案,存储器1504可以实现上述图14的存储器1404所实现的方案,在此不再赘述。
基于以上实施例以及相同构思,图16为本申请实施例提供的信息传输的装置1601的示意图,如图16所示,该信息传输的装置1601可以为终端设备或网络设备,也可以为芯片或电路,比如可设置于终端设备或网络设备的芯片或电路。
该信息传输的装置1601可以对应上述方法中的终端设备。该信息传输的装置1601可以实现如上图1至图13中所示的任一项或任多项对应的方法中终端设备所执行的步骤。该信息传输的装置1601可以包括处理单元1602和收发单元1603。
当信息传输的装置1601为上述终端设备,收发单元1603在发送信息时可以为发送单元或发射器,收发单元1603在接收信息时可以为接收单元或接收器,收发单元1603可以为收发器,此收发器、发射器或接收器可以为射频电路,当信息传输的装置1601包含存储单元时,该存储单元用于存储计算机指令,处理单元1602与存储单元通信连接,处理单元1602执行存储单元存储的计算机指令,使信息传输的装置1601可以用于执行上述实施例一至实施例八中任一实施例中终端设备所执行的方法。其中,处理单元1602可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(Application Specific Intergrated Circuit,ASIC)。
信息传输的装置1601为上述终端设备,且执行实施例一时,收发单元1603可以接收网络设备发送的第一信息,第一信息包含随机接入机会的配置指示信息,处理单元1602可以根据随机接入机会的配置指示信息确定第一方式。或者,收发单元1603还可以接收网络设备发送的第一信息,处理单元1602还可以根据所述第一信息中是否包含随机接入机会的配置指示信息确定第一方式。或者,收发单元1603还可以接收网络设备发送的第二信息,第二信息用于指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,处理单元1602还可以根据第二信息确定第一方式。或者,收发单元1603还可以接收网络设备发送的第二信息,第二信息用于指示一个或多个前导资源所关联的终端设备的第一方式,处理单元1602还可以根据第二信息确定第一方式。其中,第一方式为接入网络设备、不接入网络设备、进行随机接入和不进行随机接入中的一项。
当信息传输的装置1601为上述网络设备,收发单元1603在发送信息时可以为发送单元或发射器,收发单元1603在接收信息时可以为接收单元或接收器,收发单元1603可以为收发器,此收发器、发射器或接收器可以为射频电路,当信息传输的装置1601包含存储单元时,该存储单元用于存储计算机指令,该处理器与存储器通信连接,处理单元1602执行存储器存储的计算机指令,使信息传输的装置1601可以用于执行上述实施例一至实 施例八中任一实施例中网络设备所执行的方法。其中,处理单元1602可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(Application Specific Intergrated Circuit,ASIC)。
信息传输的装置1601为上述网络设备,且执行实施例一时,收发单元1603可以向终端设备发送第一信息,第一信息包含随机接入机会的配置指示信息,第一信息用于终端设备根据随机接入机会的配置指示信息确定第一方式,处理单元1602在第一方式为接入网络设备或进行随机接入的情况下,可以允许终端设备接入网络设备。或者,收发单元1603还可以向终端设备发送第一信息,第一信息用于所述终端设备根据第一信息中是否包含随机接入机会的配置指示信息确定第一方式,处理单元1602在第一方式为接入网络设备或进行随机接入的情况下,可以允许终端设备接入网络设备。或者,收发单元1603还可以向终端设备发送第二信息,第二信息指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,第二信息用于终端设备根据第二信息确定第一方式,处理单元1602在第一方式为接入网络设备或进行随机接入的情况下,可以允许终端设备接入网络设备。或者,收发单元1603还可以向终端设备发送第二信息,第二信息指示一个或多个前导资源所关联的终端设备的第一方式,第二信息用于终端设备根据第二信息确定第一方式,处理单元1602在第一方式为接入网络设备或进行随机接入的情况下,可以允许终端设备接入网络设备。其中,第一方式为接入网络设备、不接入网络设备、进行随机接入和不进行随机接入中的一项。
当信息传输的装置1601为芯片时,收发单元1603可以是输入和/或输出接口、管脚或电路等。处理单元1602可执行存储单元存储的计算机执行指令,以使该信息传输的装置1601内的芯片执行实施例一至实施例八中任一实施例所执行的方法。可选地,存储单元为芯片内的存储单元,如寄存器、缓存等,存储单元还可以是信息传输的装置1601内的位于该芯片外部的存储单元,如只读存储器(Read Only Memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(Random Access Memory,RAM)等。
该信息传输的装置1601所涉及的与本申请实施例提供的技术方案相关的概念,解释和详细说明及其他步骤请参见前述方法或其他实施例中关于这些内容的描述,此处不做赘述。
可以理解的是,上述信息传输的装置1601中各个单元的功能可以参考相应方法实施例的实现,此处不再赘述。
应理解,以上信息传输的装置1601的单元的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。本申请实施例中,收发单元1603可以由上述图14的收发器1403实现,处理单元1602可以由上述图14的处理器1402实现。
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行图1至图13所示实施例中任意一个实施例的方法。
根据本申请实施例提供的方法,本申请还提供一种计算机可读存储介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行图1至图13所示实施例中任意一个实施例的方法。
根据本申请实施例提供的方法,本申请还提供一种系统,其包括前述的一个或多个终 端设备以及一个或多个网络设备。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disc,SSD))等。
上述各个装置实施例中网络设备与终端设备和方法实施例中的网络设备或终端设备对应,由相应的模块或单元执行相应的步骤,例如通信单元(收发器)执行方法实施例中接收或发送的步骤,除发送、接收外的其它步骤可以由处理单元(处理器)执行。具体单元的功能可以参考相应的方法实施例。其中,处理器可以为一个或多个。
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在两个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远程进程来通信。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各种说明性逻辑块(illustrative logical block)和步骤(step),能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (36)

  1. 一种信息传输的方法,其特征在于,所述方法包括:
    接收网络设备发送的第一信息,所述第一信息包含随机接入机会的配置指示信息,根据所述随机接入机会的配置指示信息确定第一方式;或者,
    接收网络设备发送的第一信息,根据所述第一信息中是否包含随机接入机会的配置指示信息确定第一方式;或者,
    接收网络设备发送的第二信息,所述第二信息用于指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,根据所述第二信息确定第一方式;或者,
    接收网络设备发送的第二信息,所述第二信息用于指示一个或多个前导资源所关联的终端设备的第一方式,根据所述第二信息确定第一方式;
    所述第一方式为:
    接入网络设备;或者,
    不接入网络设备;或者,
    进行随机接入;或者,
    不进行随机接入。
  2. 如权利要求1所述的方法,其特征在于,所述随机接入机会的配置指示信息用于指示以下内容中的至少一种:
    不使能终端设备的随机接入机会的配置;
    使能终端设备的随机接入机会的配置;
    终止接入网络设备;
    继续接入网络设备;
    不进行随机接入;
    进行随机接入;
    第一信息还包含一种或多种特征参量的随机接入机会的配置信息。
  3. 如权利要求1或2所述的方法,其特征在于,所述终端设备根据所述第一信息中是否包含随机接入机会的配置指示信息确定第一方式,包括:
    所述第一信息中不包含所述随机接入机会的配置指示信息,所述第一方式为不接入网络设备或不进行随机接入;或者,
    所述第一信息中包含所述随机接入机会的配置指示信息,所述第一方式为接入网络设备或进行随机接入。
  4. 如权利要求1至3中任一项所述的方法,其特征在于,所述随机接入机会的配置指示信息按照比特位图的方式指示所述第一信息包含特征参量的随机接入机会的配置信息;
    所述根据所述随机接入机会的配置指示信息确定第一方式,包括:
    根据支持的特征参量及所述随机接入机会的配置指示信息确定所述第一方式。
  5. 如权利要求1所述的方法,其特征在于,所述第二信息指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,根据所述第二信息确定第一方式,包括:
    所述第二信息是下行控制信息或媒体接入控制信息,所述第二信息中包括N个比特,所述N个比特按照比特位图的方式指示N种特征参量中每种特征参量关联的终端设备的第一方式,根据支持的特征参量及所述第二信息确定第一方式;或者,
    所述第二信息是随机接入响应或上行调度授权信息,所述第二信息指示终端设备的第一方式,根据所述第二信息的指示确定所述第一方式;
    其中,N为正整数。
  6. 如权利要求1所述的方法,其特征在于,所述第二信息指示一个或多个前导资源所关联的终端设备的第一方式,根据所述第二信息确定第一方式,包括:
    确定X组前导资源;所述X组前导资源是按照预定义规则确定,或者接收来自网络设备的信令,所述信令用于配置X组前导资源;其中,所述X是大于0且不大于64的整数;
    所述第二信息中包括X个比特,所述X个比特按照比特位图的方式指示每组前导资源关联的终端设备的第一方式,根据关联的前导资源及所述第二信息确定所述第一方式;或者,
    所述第二信息指示每Y组前导资源关联的终端设备的第一方式,根据关联的前导资源所属的Y组前导资源及所述第二信息确定所述第一方式;其中,所述Y的值是配置的或者预定义的整数。
  7. 如权利要求6所述的方法,其特征在于,所述X组前导资源和特征参量关联;
    所述根据所述第二信息确定所述第一方式,包括:
    根据X组前导资源和特征参量的关联关系以及支持的特征参量,确定所述第一方式。
  8. 如权利要求1至7中任一项所述的方法,其特征在于,所述方法还包括:
    确定不接入网络设备或不进行随机接入,启动第一计时器;
    其中,所述第一计时器的时长根据预定义规则确定,或者由所述网络设备配置。
  9. 一种信息传输的方法,其特征在于,所述方法包括:
    向终端设备发送第一信息,所述第一信息包含随机接入机会的配置指示信息,所述第一信息用于所述终端设备根据所述随机接入机会的配置指示信息确定第一方式;或者,
    向终端设备发送第一信息,所述第一信息用于所述终端设备根据所述第一信息中是否包含随机接入机会的配置指示信息确定第一方式;或者,
    向终端设备发送第二信息,所述第二信息用于指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,所述第二信息用于所述终端设备确定第一方式;或者,
    向终端设备发送第二信息,所述第二信息用于指示一个或多个前导资源所关联的终端设备的第一方式,所述第二信息用于所述终端设备确定第一方式;
    所述第一方式为:
    接入网络设备;或者,
    不接入网络设备;或者,
    进行随机接入;或者,
    不进行随机接入;
    在所述第一信息或所述第二信息指示所述终端设备接入网络设备或进行随机接入的情况下,允许终端设备接入。
  10. 如权利要求9所述的方法,其特征在于,所述随机接入机会的配置指示信息用于指示以下内容中的至少一种:
    不使能终端设备的随机接入机会的配置;
    使能终端设备的随机接入机会的配置;
    终止接入网络设备;
    继续接入网络设备;
    不进行随机接入;
    进行随机接入;
    第一信息还包含一种或多种特征参量的随机接入机会的配置信息。
  11. 如权利要求9或10所述的方法,其特征在于,
    所述第一信息中不包含所述随机接入机会的配置指示信息,所述第一信息用于指示所述第一方式为不接入网络设备或不进行随机接入;或者,
    所述第一信息中包含所述随机接入机会的配置指示信息,所述第一信息用于指示所述第一方式为接入网络设备或进行随机接入。
  12. 如权利要求9至11中任一项所述的方法,其特征在于,所述随机接入机会的配置指示信息按照比特位图的方式指示所述第一信息包含一种或多种特征参量的随机接入机会的配置信息;
    所述随机接入机会的配置指示信息用于所述终端设备根据支持的特征参量及所述随机接入机会的配置指示信息确定所述第一方式。
  13. 如权利要求9所述的方法,其特征在于,所述第二信息指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,包括:
    所述第二信息是下行控制信息或媒体接入控制信息,所述第二信息中包括N个比特,所述N个比特按照比特位图的方式指示N种特征参量中每种特征参量关联的终端设备的第一方式,所述第二信息用于所述终端设备根据支持的特征参量及所述第二信息确定第一方式;或者,
    所述第二信息是随机接入响应或上行调度授权信息,所述第二信息指示终端设备的第一方式,所述第二信息用于所述终端设备根据所述第二信息的指示确定所述第一方式;
    其中,N为正整数。
  14. 如权利要求9所述的方法,其特征在于,所述第二信息指示一个或多个前导资源所关联的终端设备的第一方式,包括:
    向终端设备发送信令,所述信令用于配置X组前导资源;其中,所述X是大于0且不大于64的整数;
    所述第二信息中包括X个比特,所述X个比特按照比特位图的方式指示每组前导资源关联的终端设备的第一方式,所述第二信息用于所述终端设备根据关联的前导资源及所述第二信息确定所述第一方式;或者,
    所述第二信息指示每Y组前导资源关联的终端设备的第一方式,所述第二信息用于所述终端设备根据关联的前导资源所属的Y组前导资源及所述第二信息确定所述第一方式;其中,所述Y的值是配置的或者预定义的整数。
  15. 如权利要求14所述的方法,其特征在于,所述X组前导资源和特征参量关联;所述X组前导资源和特征参量的关联关系用于所述终端设备根据X组前导资源和特征参量的关联关系以及支持的特征参量,确定所述第一方式。
  16. 如权利要求9至15中任一项所述的方法,其特征在于,所述方法还包括:
    确定不接入网络设备或不进行随机接入,启动第一计时器;
    其中,所述第一计时器的时长根据预定义规则确定,或者由所述网络设备配置。
  17. 一种信息传输的装置,其特征在于,所述装置包括:
    收发单元,用于接收网络设备发送的第一信息,所述第一信息包含随机接入机会的配置指示信息;
    处理单元,用于根据所述随机接入机会的配置指示信息确定第一方式;
    或者,
    所述收发单元,还用于接收网络设备发送的第一信息;
    所述处理单元,还用于根据所述第一信息中是否包含随机接入机会的配置指示信息确定第一方式;
    或者,
    所述收发单元,还用于接收网络设备发送的第二信息,所述第二信息用于指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式;
    所述处理单元,还用于根据所述第二信息确定第一方式;
    或者,
    所述收发单元,还用于接收网络设备发送的第二信息,所述第二信息用于指示一个或多个前导资源所关联的终端设备的第一方式;
    所述处理单元,还用于根据所述第二信息确定第一方式;
    所述第一方式为:
    接入网络设备;或者,
    不接入网络设备;或者,
    进行随机接入;或者,
    不进行随机接入。
  18. 如权利要求17所述的装置,其特征在于,所述随机接入机会的配置指示信息用于指示以下内容中的至少一种:
    不使能终端设备的随机接入机会的配置;
    使能终端设备的随机接入机会的配置;
    终止接入网络设备;
    继续接入网络设备;
    不进行随机接入;
    进行随机接入;
    第一信息还包含一种或多种特征参量的随机接入机会的配置信息。
  19. 如权利要求17或18所述的装置,其特征在于,所述处理单元具体用于:
    所述第一信息中不包含所述随机接入机会的配置指示信息,确定所述第一方式为不接入网络设备或不进行随机接入;或者,
    所述第一信息中包含所述随机接入机会的配置指示信息,确定所述第一方式为接入网络设备或进行随机接入。
  20. 如权利要求17至19中任一项所述的装置,其特征在于,所述随机接入机会的配置指示信息按照比特位图的方式指示所述第一信息包含一种或多种特征参量的随机接入机会的配置信息;
    所述处理单元具体用于:
    根据支持的特征参量及所述随机接入机会的配置指示信息确定所述第一方式。
  21. 如权利要求20所述的装置,其特征在于,所述处理单元具体用于:
    所述第二信息是下行控制信息或媒体接入控制信息,所述第二信息中包括N个比特,所述N个比特按照比特位图的方式指示N种特征参量中每种特征参量关联的终端设备的第一方式,根据支持的特征参量及所述第二信息确定第一方式;或者,
    所述第二信息是随机接入响应或上行调度授权信息,所述第二信息指示终端设备的第一方式,根据所述第二信息的指示确定所述第一方式;
    其中,N为正整数。
  22. 如权利要求17所述的装置,其特征在于,所述处理单元具体用于:
    确定X组前导资源;所述X组前导资源是按照预定义规则确定,或者接收来自网络设备的信令,所述信令用于配置X组前导资源;其中,所述X是大于0且不大于64的整数;
    所述第二信息中包括X个比特,所述X个比特按照比特位图的方式指示每组前导资源关联的终端设备的第一方式,根据关联的前导资源及所述第二信息确定所述第一方式;或者,
    所述第二信息指示每Y组前导资源关联的终端设备的第一方式,根据关联的前导资源所属的Y组前导资源及所述第二信息确定所述第一方式;其中,所述Y的值是配置的或者预定义的整数。
  23. 一种信息传输的装置,其特征在于,所述装置包括:
    收发单元,用于向终端设备发送第一信息,所述第一信息包含随机接入机会的配置指示信息,所述第一信息用于所述终端设备根据所述随机接入机会的配置指示信息确定第一方式;
    或者,
    所述收发单元,还用于向终端设备发送第一信息,所述第一信息用于所述终端设备根据所述第一信息中是否包含随机接入机会的配置指示信息确定第一方式;或者,
    所述收发单元,还用于向终端设备发送第二信息,所述第二信息用于指示一种或多种特征参量中每种特征参量所关联的终端设备的第一方式,所述第二信息用于所述终端设备确定第一方式;或者,
    所述收发单元,还用于向终端设备发送第二信息,所述第二信息用于指示一个或多个前导资源所关联的终端设备的第一方式,所述第二信息用于所述终端设备确定第一方式;
    所述第一方式为:
    接入网络设备;或者,
    不接入网络设备;或者,
    进行随机接入;或者,
    不进行随机接入;
    处理单元,用于在所述第一信息或所述第二信息指示所述终端设备接入网络设备或进行随机接入的情况下,允许终端设备接入。
  24. 如权利要求23所述的装置,其特征在于,所述随机接入机会的配置指示信息用于指示以下内容中的至少一种:
    不使能终端设备的随机接入机会的配置;
    使能终端设备的随机接入机会的配置;
    终止接入网络设备;
    继续接入网络设备;
    不进行随机接入;
    进行随机接入;
    第一信息还包含一种或多种特征参量的随机接入机会的配置信息。
  25. 如权利要求23或24所述的装置,其特征在于,
    所述第一信息中不包含所述随机接入机会的配置指示信息,所述第一信息用于指示所述第一方式为不接入网络设备或不进行随机接入;或者,
    所述第一信息中包含所述随机接入机会的配置指示信息,所述第一信息用于指示所述第一方式为接入网络设备或进行随机接入。
  26. 如权利要求23至25中任一项所述的装置,其特征在于,所述随机接入机会的配置指示信息按照比特位图的方式指示所述第一信息包含一种或多种特征参量的随机接入机会的配置信息;
    所述随机接入机会的配置指示信息用于所述终端设备根据支持的特征参量及所述随机接入机会的配置指示信息确定所述第一方式。
  27. 如权利要求23所述的装置,其特征在于,所述第二信息是下行控制信息或媒体接入控制信息,所述第二信息中包括N个比特,所述N个比特按照比特位图的方式指示N种特征参量中每种特征参量关联的终端设备的第一方式,所述第二信息用于所述终端设备根据支持的特征参量及所述第二信息确定第一方式;或者,
    所述第二信息是随机接入响应或上行调度授权信息,所述第二信息指示终端设备的第一方式,所述第二信息用于所述终端设备根据所述第二信息的指示确定所述第一方式;
    其中,N为正整数。
  28. 如权利要求23所述的装置,其特征在于,所述收发单元还用于:
    向终端设备发送信令,所述信令用于配置X组前导资源;其中,所述X是大于0且不大于64的整数;
    所述第二信息中包括X个比特,所述X个比特按照比特位图的方式指示每组前导资源关联的终端设备的第一方式,所述第二信息用于所述终端设备根据关联的前导资源及所述第二信息确定所述第一方式;或者,
    所述第二信息指示每Y组前导资源关联的终端设备的第一方式,所述第二信息用于所述终端设备根据关联的前导资源所属的Y组前导资源及所述第二信息确定所述第一方式;其中,所述Y的值是配置的或者预定义的整数。
  29. 一种信息传输的装置,其特征在于,包括处理器和通信接口,所述通信接口用于接收来自所述信息传输的装置之外的其它通信装置的信号并传输至所述处理器或将来自所述处理器的信号发送给所述信息传输的装置之外的其它通信装置,所述处理器通过逻辑电路或执行代码指令用于实现如权利要求1至8中任一项、或9至16中任一项所述的方法。
  30. 一种信息传输的装置,其特征在于,包括处理器,所述处理器与存储器相连,所述存储器用于存储计算机程序,所述处理器用于执行所述存储器中存储的计算机程序,以使得所述装置执行如权利要求1至8中任一项、或9至16中任一项所述的方法。
  31. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有指令,当其在计算机上运行时,使得计算机执行权利要求1至8中任一项所述的方法。
  32. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有指令,当其在计算机上运行时,使得计算机执行权利要求9至16中任一项所述的方法。
  33. 一种芯片,其特征在于,包括处理器和接口;
    所述处理器用于读取指令以执行权利要求1至8中任一项所述的信息传输的方法。
  34. 一种芯片,其特征在于,包括处理器和接口;
    所述处理器用于读取指令以执行权利要求9至16中任一项所述的信息传输的方法。
  35. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序或指令,当所述计算机程序或指令被通信装置执行时,实现如权利要求1至8中任一项、或9至16中任一项所述的方法。
  36. 一种信息传输的系统,其特征在于,包括权利要求17-22任意一项所述的信息传输的装置、以及权利要求23-28任意一项所述的信息传输的装置。
PCT/CN2021/092356 2020-05-09 2021-05-08 一种信息传输的方法、装置及系统 WO2021227983A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010387505.3 2020-05-09
CN202010387505.3A CN113630878A (zh) 2020-05-09 2020-05-09 一种信息传输的方法、装置及系统

Publications (1)

Publication Number Publication Date
WO2021227983A1 true WO2021227983A1 (zh) 2021-11-18

Family

ID=78377483

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/092356 WO2021227983A1 (zh) 2020-05-09 2021-05-08 一种信息传输的方法、装置及系统

Country Status (2)

Country Link
CN (1) CN113630878A (zh)
WO (1) WO2021227983A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117835385A (zh) * 2024-03-06 2024-04-05 荣耀终端有限公司 数据传输方法、装置、芯片及存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022865A (zh) * 2021-03-04 2022-09-06 华为技术有限公司 一种通信方法及设备
CN114710822A (zh) * 2022-04-24 2022-07-05 维沃移动通信有限公司 无线接入处理方法、信息传输方法及设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102781065A (zh) * 2011-05-13 2012-11-14 华为技术有限公司 控制终端接入的方法及设备、终端接入方法及设备
CN103096495A (zh) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法和系统
CN107223351A (zh) * 2017-04-19 2017-09-29 北京小米移动软件有限公司 控制网络接入的方法及装置
CN110099459A (zh) * 2018-01-31 2019-08-06 华为技术有限公司 一种随机接入方法及装置
CN111918359A (zh) * 2020-07-03 2020-11-10 中兴通讯股份有限公司 接入控制方法、第一网络节点、第二网络节点及存储介质

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020258329A1 (zh) * 2019-06-28 2020-12-30 北京小米移动软件有限公司 初始接入指示方法、装置及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102781065A (zh) * 2011-05-13 2012-11-14 华为技术有限公司 控制终端接入的方法及设备、终端接入方法及设备
CN103096495A (zh) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法和系统
CN107223351A (zh) * 2017-04-19 2017-09-29 北京小米移动软件有限公司 控制网络接入的方法及装置
CN110099459A (zh) * 2018-01-31 2019-08-06 华为技术有限公司 一种随机接入方法及装置
CN111918359A (zh) * 2020-07-03 2020-11-10 中兴通讯股份有限公司 接入控制方法、第一网络节点、第二网络节点及存储介质

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117835385A (zh) * 2024-03-06 2024-04-05 荣耀终端有限公司 数据传输方法、装置、芯片及存储介质

Also Published As

Publication number Publication date
CN113630878A (zh) 2021-11-09

Similar Documents

Publication Publication Date Title
WO2021227983A1 (zh) 一种信息传输的方法、装置及系统
WO2020221055A1 (zh) 接收数据和发送数据的方法、通信装置
KR102096431B1 (ko) 전력 절약을 위한 무선 통신 방법 및 이를 이용한 무선 통신 단말
CN111315029B (zh) 信息传输的方法和通信装置
US20220167423A1 (en) Channel sensing for physical random access channel (prach) signals in new radio (nr) systems operating in the unlicensed spectrum
WO2019214424A1 (zh) 通信方法和通信装置
US20230087902A1 (en) Information sending and receiving method, apparatus, and system
US11924839B2 (en) Data transmission method and apparatus
US9622115B2 (en) Channel negotiation method, device, and system
US20220104199A1 (en) Method and apparatus for sharing communication channel
CN112997433B (zh) 用于harq传输的方法以及通信设备
JP2023512807A (ja) 無線通信において、低減した能力のデバイスをサポートする方法及び装置
US11979879B2 (en) Information transmission method, communications device, and network device
US20170150520A1 (en) Controlling Access to a Radio Medium for Wireless Communication
TWI806595B (zh) 資訊傳輸方法及裝置
WO2020151350A1 (zh) 一种资源预留方法及相关设备
CN116636251A (zh) 通信方法及装置
WO2023207718A1 (zh) 一种资源选择的方法和装置
WO2022082786A1 (zh) 一种通信方法及装置
EP4351247A1 (en) Resource selection method and apparatus
WO2022188630A1 (zh) 一种传输信息的方法及装置
WO2022110245A1 (zh) 一种资源指示方法及装置
WO2024067656A1 (zh) 上行传输的方法和通信装置
WO2023216048A1 (zh) 一种无线通信方法及装置、通信设备
WO2023197847A1 (zh) 通信方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21803146

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21803146

Country of ref document: EP

Kind code of ref document: A1