WO2021254095A1 - Procédé d'accès aléatoire, équipement utilisateur (ue) et dispositif côté réseau - Google Patents

Procédé d'accès aléatoire, équipement utilisateur (ue) et dispositif côté réseau Download PDF

Info

Publication number
WO2021254095A1
WO2021254095A1 PCT/CN2021/095263 CN2021095263W WO2021254095A1 WO 2021254095 A1 WO2021254095 A1 WO 2021254095A1 CN 2021095263 W CN2021095263 W CN 2021095263W WO 2021254095 A1 WO2021254095 A1 WO 2021254095A1
Authority
WO
WIPO (PCT)
Prior art keywords
rnti
random access
value
scrambling sequence
bits
Prior art date
Application number
PCT/CN2021/095263
Other languages
English (en)
Chinese (zh)
Inventor
王俊伟
赵锐
刘天心
郑方政
Original Assignee
大唐移动通信设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 大唐移动通信设备有限公司 filed Critical 大唐移动通信设备有限公司
Publication of WO2021254095A1 publication Critical patent/WO2021254095A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2602Signal structure
    • H04L27/261Details of reference signals
    • H04L27/2613Structure of the reference signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2647Arrangements specific to the receiver only
    • H04L27/2655Synchronisation arrangements
    • H04L27/2689Link with other circuits, i.e. special connections between synchronisation arrangements and other circuits for achieving synchronisation
    • H04L27/2692Link with other circuits, i.e. special connections between synchronisation arrangements and other circuits for achieving synchronisation with preamble design, i.e. with negotiation of the synchronisation sequence with transmitter or sequence linked to the algorithm used at the receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • the application number is 202011125369.7 and the application title is a Chinese patent of "a random access method and user terminal UE and network side equipment"
  • the present disclosure relates to the field of wireless communication technology, and in particular to a random access method, User Equipment (UE) and network side equipment.
  • UE User Equipment
  • the user terminal UE establishes a basic communication connection with the network side device through a random access process, and performs information exchange.
  • the UE and the network side device use the random access radio network temporary identifier (RA-RNTI) as the UE's identifier.
  • RA-RNTI random access radio network temporary identifier
  • the current random access process mainly includes four-step random access and two-step random access, among which:
  • the four-step random access mainly includes the following steps:
  • the UE needs to send a random access preamble as the first message Msg1 to the network side device;
  • the physical layer of the UE Before sending, the physical layer of the UE needs to obtain the RA-RNTI parameter corresponding to the random access preamble from the higher layer, and the time-frequency resource location of sending Msg1, and according to the time-frequency resource location, send the random access to the network side device through Msg 1 Enter the preamble.
  • the network side device returns a random access response message Msg2 scrambled by RA-RNTI to the UE;
  • the network side device After the UE sends the random access preamble to the network side device, the network side device determines to receive the random access preamble, determines the corresponding RA-RNTI according to the time-frequency resource position of the received random access preamble, and uses the RA-RNTI In a scrambling manner, the random access response message Msg2 that needs to be sent to the UE is scrambled.
  • Msg2 includes DCI in the downlink control information (Downlink Control Information, DCI) format 1_0, and the relevant information carried by the physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) scheduled by the DCI, and the network side device carries the DCI and PDSCH After scrambling code processing, it returns to the UE.
  • DCI Downlink Control Information
  • PDSCH Physical Downlink Shared Channel
  • the UE After the UE successfully detects the DCI format 1_0 scrambled by RA-RNTI and the related information carried by the PDSCH within the time window, it sends the scrambled Physical Uplink Shared Channel (PUSCH) to the network side device Send Msg3;
  • PUSCH Physical Uplink Shared Channel
  • the physical layer of the UE monitors the DCI format 1_0 in the random access response sent by the network side device within the time window configured by the higher layer. If the UE successfully detects the DCI format 1_0 scrambled by RA-RNTI within the time window, and the DCI The related information carried by the scheduled PDSCH scrambled by RA-RNTI indicates that the random access is responded. After the UE parses and recognizes the random access preamble index (RAPID) through the higher layer, it is sent through the scrambled PUSCH The third message is Msg3, thereby establishing a connection with the network side device.
  • RAPID random access preamble index
  • the two-step random access is responsible for the functions of the four-step random access messages Msg1 and Msg3 by setting the message Msg A, which is transmitted by the UE to the network side device at one time.
  • the random access response message Msg B corresponding to the message MsgA bears Msg 2 and Msg.
  • the function of 4 is sent to the UE by the network side device at one time.
  • the specific two-step random access process is: the UE sends the random access preamble to the network side device, and sends the PUSCH bearer information associated with the random access preamble through the scrambled PUSCH, as the message Msg A, where the PUSCH bearer information is determined by the specific The random access trigger event is determined; after receiving Msg A, the network side device sends a random access response message Msg B including related information carried by DCI and PDSCH to the UE; after receiving the random access response message, the UE communicates with the network side The device establishes a connection.
  • the UE and the network side equipment determine the RA-RNTI according to the first time slot index (time slot number) of the random access timing (RACH Occasion, RO) when the random access preamble is sent.
  • the first time slot index time slot number
  • RO random access timing
  • a subcarrier interval larger than the current maximum subcarrier interval of 120KHz is introduced, such as 480KHz, 960KHz, etc., the value range of the index of the first time slot of the RO in the system frame It will also increase, so that the determined RA-RNTI will exceed the specified 16-bit display range, which may cause various problems such as failure to be recognized and subsequent processing.
  • the present disclosure provides a random access method, user terminal UE, and network-side equipment to solve the problem that the method of calculating RA-RNTI is not suitable for larger signal transmission frequency band scenarios in the existing random access process.
  • a random access method which is applied to a UE, and the method includes:
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • limiting the number of bits corresponding to the generated scrambling sequence includes:
  • the RA-RNTI value in the PUSCH/PDSCH scrambling sequence formula defined by the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where the random The access response message includes the PDSCH.
  • limiting the number of bits corresponding to the generated scrambling sequence includes:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of radio frame payload and cyclic redundancy check (Cyclic Redundancy Check, CRC) in DCI after scrambling
  • b k is the combined sequence of radio frame payload and CRC check in DCI before scrambling
  • c is random The number of bits corresponding to the upper limit of the RA-RNTI value range during the access process.
  • limiting the number of bits corresponding to the generated scrambling sequence includes:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes the DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI value, and the value corresponding to the remaining bits after the second preset number of bits is selected.
  • performing descrambling according to the corresponding modified scrambling sequence formula includes:
  • the value corresponding to the remaining bits carried in the bits in the DCI is compared with the value of the corresponding bit of the calculated RA-RNTI;
  • the PDSCH scheduled by the DCI is descrambled according to the corresponding modified scrambling sequence formula.
  • a random access method is provided, which is applied to a network side device, and the method includes:
  • Receive the random access preamble sent by the user terminal UE determine the index value t_id of the first time slot where the random access opportunity RO for receiving the random access preamble is located, and calculate the RA-RNTI according to the index value t_id ;
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • limiting the number of bits corresponding to the generated scrambling sequence includes:
  • the RA-RNTI value in the PUSCH/PDSCH scrambling sequence formula defined by the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where the random The access response message includes the PDSCH.
  • limiting the number of bits corresponding to the generated scrambling sequence includes:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the number of bits of the wireless frame payload
  • X rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is the value of RA-RNTI during random access The number of bits corresponding to the upper limit of the range.
  • limiting the number of bits corresponding to the generated scrambling sequence includes:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes the DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI value, and the value corresponding to the remaining bits after the second preset number of bits is selected.
  • a random access method is provided, which is applied to a UE, and the method includes:
  • PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device, or receive the random access response message scrambled by the network side device using the calculated RA-RNTI, and use calculation to obtain The RA-RNTI descrambles the random access response message.
  • the restricting the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id includes:
  • the number of bits corresponding to RA-RNTI is limited.
  • the limiting the value range of the index value t_id includes:
  • the slot positions are numbered in order, and the number corresponding to the first slot where the selected RO is located is determined as the index value t_id.
  • numbering the slot positions in sequence includes:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • said correcting the formula for calculating RA-RNTI includes:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • sending the random access preamble to the network side device includes:
  • restricting the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id during calculation includes:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • using the calculated RA-RNTI to descramble the random access response message includes:
  • the value of the RA-RNTI identification index carried by the bits in the DCI is determined as follows: comparing;
  • the calculated RA-RNTI is used to descramble the random access response message.
  • a random access method is provided, which is applied to a network side device, and the method includes:
  • the restricting the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id includes:
  • the number of bits corresponding to RA-RNTI is limited.
  • the limiting the value range of the index value t_id includes:
  • the positions of the time slots are numbered in order, and the number corresponding to the first time slot where the RO receiving the random access preamble is located is determined as the index value t_id.
  • numbering the slot positions in sequence includes:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • said correcting the formula for calculating RA-RNTI includes:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • receiving the random access preamble sent by the UE includes:
  • the total number of ROs selected by the receiving UE does not exceed the T1 or T2 radio frame configuration parameters, and the random access preamble sent by the radio frame configured according to the configuration parameters is used.
  • limiting the number of bits corresponding to RA-RNTI by limiting the value range of the index value t_id in the calculation process includes:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • a user terminal UE including:
  • the calculation module is configured to send a random access preamble to the network side device, determine the index value t_id of the first time slot where the random access opportunity RO for selecting the random access preamble is sent, and according to the index value t_id calculates the RA-RNTI of the random access wireless network;
  • the scrambling and descrambling module is used for sending PUSCH bearer information to the network side device by using the physical uplink shared channel PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI, or receiving the network side device scrambled by the calculated RA-RNTI Using the calculated RA-RNTI to descramble the random access response message;
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/physical downlink shared channel PDSCH scrambling sequence formula defined in the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where ,
  • the random access response message includes the PDSCH.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and cyclic redundancy CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the combined sequence of the wireless frame payload Number of bits, x rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is RA- in the process of random access The number of bits corresponding to the upper limit of the RNTI value range.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes the DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI value, and the value corresponding to the remaining bits after the second preset number of bits is selected.
  • the descrambling module performs descrambling according to the corresponding modified scrambling sequence formula, including:
  • the value corresponding to the remaining bits carried in the bits in the DCI is compared with the value of the corresponding bit of the calculated RA-RNTI;
  • the PDSCH scheduled by the DCI is descrambled according to the corresponding modified scrambling sequence formula.
  • a network side device including:
  • the calculation module is used to receive the random access preamble sent by the user terminal UE, determine the index value t_id of the first time slot where the random access opportunity RO for receiving the random access preamble is located, and according to the index value t_id calculates RA-RNTI;
  • the scrambling and descrambling module is used to receive the PUSCH bearer information sent by the UE through the PUSCH scrambled by the scrambling sequence, and use the calculated RA-RNTI to descramble the PUSCH bearer information, or send the calculated RA- to the UE Random access response message scrambled by RNTI;
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH scrambling sequence formula defined by the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where the random The access response message includes the PDSCH.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the number of bits of the wireless frame payload
  • X rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is the value of RA-RNTI during random access The number of bits corresponding to the upper limit of the range.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes the DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI value, and the value corresponding to the remaining bits after the second preset number of bits is selected.
  • a user terminal UE including:
  • the parameter determination module is configured to send a random access preamble to the network side device, and determine the index value t_id of the first time slot where the random access timing RO for selecting and sending the random access preamble is located;
  • the calculation module is configured to calculate the RA-RNTI of the temporary random access wireless network identifier according to the index value t_id, and limit the number of bits corresponding to the RA-RNTI by limiting the value range of the index value t_id during calculation;
  • the scrambling and descrambling module is configured to use the PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device, or to receive random access scrambled by the network side device using the calculated RA-RNTI Respond to the message, and use the calculated RA-RNTI to descramble the random access response message.
  • the calculation module restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id, including:
  • the number of bits corresponding to RA-RNTI is limited.
  • the calculation module restricting the value range of the index value t_id includes:
  • the slot positions are numbered in order, and the number corresponding to the first slot where the selected RO is located is determined as the index value t_id.
  • the calculation module numbering the slot positions in sequence includes:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • the calculation module corrects the formula for calculating RA-RNTI, including:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • the parameter determination module sending a random access preamble to the network side device includes:
  • the calculation module restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id during calculation, including:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • the scrambling and descrambling module uses the calculated RA-RNTI to descramble the random access response message, including:
  • the value of the RA-RNTI identification index carried by the bits in the DCI is determined as follows: comparing;
  • the calculated RA-RNTI is used to descramble the random access response message.
  • a network side device including:
  • the parameter determination module is configured to receive the random access preamble sent by the user terminal UE, and determine the index value t_id of the first time slot where the random access timing RO for receiving the random access preamble is located;
  • the calculation module is configured to calculate the RA-RNTI according to the index value t_id, and limit the number of bits corresponding to the RA-RNTI by limiting the value range of the index value t_id in the calculation process;
  • the scrambling and descrambling module is used to receive the PUSCH bearer information sent by the UE through the PUSCH scrambled by the scrambling sequence, and use the calculated RA-RNTI to descramble the PUSCH bearer information, or send the calculated RA- to the UE Random access response message scrambled by RNTI.
  • the calculation module restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id, including:
  • the number of bits corresponding to RA-RNTI is limited.
  • the calculation module restricting the value range of the index value t_id includes:
  • the positions of the time slots are numbered in order, and the number corresponding to the first time slot where the RO receiving the random access preamble is located is determined as the index value t_id.
  • the calculation module numbering the slot positions in sequence includes:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • the calculation module corrects the formula for calculating RA-RNTI, including:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • the parameter determination module receiving the random access preamble sent by the UE includes:
  • the total number of ROs selected by the receiving UE does not exceed the T1 or T2 radio frame configuration parameters, and the random access preamble sent by the radio frame configured according to the configuration parameters is used.
  • the calculation module restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id in the calculation process, including:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • a user terminal UE including: a memory and a processor; wherein:
  • the memory is used to store a computer program
  • the processor is used to read and execute the program in the memory:
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/physical downlink shared channel PDSCH scrambling sequence formula defined in the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where ,
  • the random access response message includes the PDSCH.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and cyclic redundancy CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the combined sequence of the wireless frame payload Number of bits, x rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is RA- in the process of random access The number of bits corresponding to the upper limit of the RNTI value range.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes the DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI value, and the value corresponding to the remaining bits after the second preset number of bits is selected.
  • the processor performs descrambling according to the corresponding modified scrambling sequence formula, including:
  • the value corresponding to the remaining bits carried in the bits in the DCI is compared with the value of the corresponding bit of the calculated RA-RNTI;
  • the PDSCH scheduled by the DCI is descrambled according to the corresponding modified scrambling sequence formula.
  • a network side device including: a memory and a processor; wherein:
  • the memory is used to store a computer program
  • the processor is used to read and execute the program in the memory:
  • Receive the random access preamble sent by the user terminal UE determine the index value t_id of the first time slot where the random access opportunity RO for receiving the random access preamble is located, and calculate the RA-RNTI according to the index value t_id ;
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH scrambling sequence formula defined by the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where the random The access response message includes the PDSCH.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the number of bits of the wireless frame payload
  • X rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is the value of RA-RNTI during random access The number of bits corresponding to the upper limit of the range.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes the DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI value, and the value corresponding to the remaining bits after the second preset number of bits is selected.
  • a user terminal UE including: a memory and a processor; wherein:
  • the memory is used to store a computer program
  • the processor is used to read and execute the program in the memory:
  • PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device, or receive the random access response message scrambled by the network side device using the calculated RA-RNTI, and use calculation to obtain The RA-RNTI descrambles the random access response message.
  • the processor restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id, including:
  • the number of bits corresponding to RA-RNTI is limited.
  • the processor restricting the value range of the index value t_id includes:
  • the slot positions are numbered in order, and the number corresponding to the first slot where the selected RO is located is determined as the index value t_id.
  • the processor sequentially numbering the slot positions, including:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • the processor corrects the formula for calculating RA-RNTI, including:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • the processor sending the random access preamble to the network side device includes:
  • the processor restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id during calculation, including:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • the processor using the calculated RA-RNTI to descramble the random access response message includes:
  • the value of the RA-RNTI identification index carried by the bits in the DCI is determined as follows: comparing;
  • the calculated RA-RNTI is used to descramble the random access response message.
  • a network side device including: a memory and a processor; wherein:
  • the memory is used to store a computer program
  • the processor is used to read and execute the program in the memory:
  • the processor restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id, including:
  • the number of bits corresponding to RA-RNTI is limited.
  • the processor restricting the value range of the index value t_id includes:
  • the positions of the time slots are numbered in order, and the number corresponding to the first time slot where the RO receiving the random access preamble is located is determined as the index value t_id.
  • the processor sequentially numbering the slot positions, including:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • the processor corrects the formula for calculating RA-RNTI, including:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • the processor receiving the random access preamble sent by the UE includes:
  • the total number of ROs selected by the receiving UE does not exceed the T1 or T2 radio frame configuration parameters, and the random access preamble sent by the radio frame configured according to the configuration parameters is used.
  • the processor restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id in the calculation process, including:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • a chip which is coupled with a memory in a device, so that the chip invokes program instructions stored in the memory during operation to implement each of the above-mentioned embodiments of the present disclosure.
  • a computer-readable storage medium stores program instructions that, when run on a computer, cause the computer to execute the various aspects and aspects of the embodiments of the present disclosure. Any possible method involved.
  • a computer program product which when the computer program product runs on an electronic device, causes the electronic device to execute and implement the above-mentioned aspects and aspects involved in the embodiments of the present disclosure. Any method that may be involved.
  • the UE and the network side equipment modify the current RA-RNTI calculation method.
  • the first random access opportunity RO where the random access preamble is selected is selected.
  • the value range of the time slot index value t_id is limited to limit the number of bits corresponding to RA-RNTI to avoid the calculated RA-RNTI from exceeding the specified number of bits; or, the UE and the network side equipment do not modify the current RA-RNTI
  • the corresponding scrambling sequence formula is modified to limit the number of bits corresponding to the generated scrambling sequence.
  • FIG. 1 is a schematic diagram of RO distribution in a radio frame corresponding to a subcarrier spacing of 60KHz provided in an embodiment of the disclosure
  • FIG. 2 is a schematic diagram of RO distribution in a radio frame corresponding to a subcarrier spacing of 120KHz provided in an embodiment of the disclosure
  • FIG. 3 is a schematic diagram of RO distribution in a radio frame corresponding to a subcarrier spacing of 960KHz provided in an embodiment of the disclosure
  • FIG. 4 is a schematic diagram of a framework of a random access method application system provided in an embodiment of the disclosure.
  • FIG. 5 is a schematic diagram of a random access method provided in an embodiment of the disclosure.
  • FIG. 6 is a schematic diagram of a random access method provided in an embodiment of the disclosure.
  • FIG. 7 is a schematic diagram of DCI scrambling provided in an embodiment of the disclosure.
  • FIG. 8 is a schematic diagram of a random access method provided in an embodiment of the disclosure.
  • FIG. 9 is an example diagram of a method for modifying the value of an index value t_id provided in an embodiment of the disclosure.
  • FIG. 10 is a schematic diagram of a random access method provided in an embodiment of the disclosure.
  • FIG. 11 is a schematic diagram of a user terminal UE provided in an embodiment of the disclosure.
  • FIG. 12 is a schematic diagram of a network side device provided in an embodiment of the disclosure.
  • FIG. 13 is a schematic diagram of a user terminal UE provided in an embodiment of the disclosure.
  • FIG. 14 is a schematic diagram of a network side device provided in an embodiment of the disclosure.
  • FIG. 15 is a schematic structural diagram of a user terminal UE provided in an embodiment of the disclosure.
  • FIG. 16 is a schematic structural diagram of a network side device provided in an embodiment of the disclosure.
  • FIG. 17 is a schematic structural diagram of a user terminal UE provided in an embodiment of the disclosure.
  • FIG. 18 is a schematic structural diagram of a network side device provided in an embodiment of the disclosure.
  • FIG. 19 is a schematic diagram of the network side device transmitting the remaining bits through the bits in the DCI in an embodiment of the disclosure
  • FIG. 20 is a schematic diagram of an example in which the network side device transmits the remaining bits through the bits in the DCI in an embodiment of the disclosure.
  • Radio network temporary identifier RNTI is used as the UE identifier in the signal between the network side device and the UE.
  • RA-RNTI is the wireless network temporary identifier used in the random access process, which is based on the random access of the UE. The identification information determined by the random access preamble sent in the incoming process.
  • the UE can choose to work in three modes: only four-step random access, only two-step random access, or four-step random access and two-step random access.
  • the only four-step random access mode the UE and the network-side device complete random access according to the four-step random access process; in the only two-step random access mode, the UE and the network-side device complete the random access according to the two-step random access process Random access: In the four-step random access and two-step random access modes, the UE and the network side device select any one of the above-mentioned four-step random access process and the two-step random access process to complete random access.
  • the formula for the UE and the network side equipment to calculate the RA-RNTI based on the random access preamble is:
  • RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id (1)
  • the ul_carrier_id is 0 when the link is NUL transmission, and ul_carrier_id is 1 when the auxiliary uplink transmission is used.
  • Table 1 is a schematic table of random access configuration information corresponding to the FR2 frequency band during the random access process.
  • FIG. 1 it is a schematic diagram of RO distribution in a radio frame corresponding to a sub-carrier spacing of 60 KHz.
  • the transmission frequency range corresponding to the FR2 frequency band is 24.25GHz-52.6GHz.
  • the configuration index is 1.
  • the position of the random access opportunity (RACH Occasion, RO) in the corresponding radio frame is shown in Fig. 1.
  • an example radio frame is 10ms
  • the corresponding subcarrier interval is 60KHz
  • FIG. 2 it is a schematic diagram of RO distribution in a radio frame corresponding to a sub-carrier spacing of 120 KHz.
  • the position of the random access opportunity (RACH Occasion, RO) in the corresponding radio frame is shown in Figure 2, where the table
  • the number of PRACH slots in a 60KHz slot in 1 is 2, that is, the length of a slot with a subcarrier interval of 60KHz is 0.125ms, which corresponds to the length of two slots with a subcarrier interval of 120KHz. Therefore, the example in Figure 2
  • the RO configuration information is: a radio frame is 10ms, the corresponding sub-carrier interval is 120KHz, and it contains a total of 80 time slots.
  • the value range of t_id is 0-79.
  • the corresponding maximum subcarrier spacing is 120KHz.
  • the maximum value range of t_id is 0-79, which can be determined according to the value range of t_id
  • a larger sub-carrier spacing than 120KHz will be introduced, such as 480KHz, 960KHz, etc., so the sub-carrier spacing can reach 480KHz or 960KHz.
  • FIG. 3 it is a schematic diagram of RO distribution in a radio frame corresponding to a subcarrier spacing of 960KHz.
  • each time slot with a sub-carrier spacing of 60KHz contains 16 sub-carriers.
  • the sub-carrier spacing SCS is 480KHz
  • the value range of t_id is 0-319, that is, 0 ⁇ t_id ⁇ 319, according to the corresponding RA-RATI
  • the carrier spacing is 480KHz.
  • t_id limited by 16bit is 0 ⁇ t_id ⁇ 293, but when the subcarrier spacing is 960KHz and 480KHz, the actual number of time slots in the radio frame are both greater than 293. If the same value method of t_id and time slot number is used, then It may not be possible to use t_id to indicate the positions of all ROs that may appear in the time slot.
  • the calculation result may exceed the current 16bit (bit) representation range of the RA-RNTI.
  • bit 16bit
  • the embodiments of the present disclosure propose a random access method, which is applied in the random access process between the UE and the network side device, by adjusting the parameters of the RA-RNTI calculation formula in the random access process, or adjusting the parameters according to the RA -The parameters of the scrambling formula for scrambling by RNTI, so that the RA-RNTI calculation method is suitable for the random access process in the high frequency band above 52.6GHz.
  • FIG. 4 is a schematic diagram of a framework of a random access method application system provided by an embodiment of the present disclosure.
  • the system to which the random access method provided in the embodiment of the present disclosure is applied includes a user terminal 401 and a network side device 402.
  • the user terminal UE may specifically refer to an access terminal, a user unit, a user station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, a user agent, or a user Device.
  • the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA), with wireless communication Functional handheld devices, computing devices, or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, and mobile stations in 5G networks or subscriptions in the future evolution of the Public Land Mobile Network (PLMN) network Equipment, etc.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • the network side equipment can be the next-generation base station (generation Node B, gNB) in the 5G system, the global system of mobile communication (GSM) system or the code division multiple access (Code Division Multiple Access, CDMA) system
  • the base station (Base Transceiver Station, BTS), can also be the base station (NodeB, NB) in the Wideband Code Division Multiple Access (WCDMA) system, or the long-term evolution (Long Term Evolution, LTE) system
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • FIG. 4 only illustrates one user terminal UE and network side equipment. In an actual system, there may be multiple terminals and network side equipment coexisting, which will not be repeated here.
  • system architecture is only an example of the applicable system architecture of the embodiment of the present disclosure. Compared with the system architecture shown in FIG. 4, the system architecture applicable to the embodiment of the present disclosure can also add other entities or reduce some entities.
  • the embodiments of the present disclosure provide a random access method, which is applied to a user terminal UE. As shown in Figure 5, the method includes:
  • Step S501 Send a random access preamble to the network side device, determine the index value t_id of the first time slot where the random access opportunity RO for selecting and send the random access preamble is located, and calculate according to the index value t_id RA-RNTI;
  • the UE After triggering random access, the UE sends a random access preamble to the network side device, and in the process of calculating RA-RNTI, determines the first random access opportunity RO selected when sending the random access preamble.
  • the RA-RNTI is calculated according to the index value t_id.
  • the corresponding RA-RNTI can be calculated according to the existing method for calculating the RA-RNTI provided by the above formula (1).
  • Step S502 Send PUSCH bearer information to the network side device by using the PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI, or receive the random access response message scrambled by the network side device using the calculated RA-RNTI, and use The calculated RA-RNTI descrambles the random access response message; in the scrambling/descrambling process, scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, where the scrambling is modified The sequence formula limits the number of bits corresponding to the generated scrambling sequence.
  • the UE uses the PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device.
  • the UE may choose to adopt a four-step random access or a two-step random access method, and the current network side device initiates random access. If the two-step random access method is adopted, after the UE sends the random access preamble to the network side device, it also sends the PUSCH bearer information to the network side device through the scrambled PUSCH. Among them, the UE sends the random access preamble and PUSCH bearer information to the network side device through the message Msg A.
  • the PUSCH bearer information carries at least the C-RNTI (Cell Radio Network Temporary Identity) used by the UE in the satellite cell, the radio resource control RRC connection message, and the like.
  • C-RNTI Cell Radio Network Temporary Identity
  • the UE When the UE adopts two-step random access, it is determined to send the random access preamble through Msg A. Therefore, the UE also uses the RA-RNTI calculated above to scramble the PUSCH, and sends the PUSCH to the network side device through the scrambled PUSCH channel Carrying information.
  • the UE performs scrambling according to the corresponding modified PUSCH scrambling sequence formula, where the modified PUSCH scrambling sequence formula limits the number of bits corresponding to the generated scrambling sequence.
  • any of the following methods is used:
  • the first preset number is 16.
  • the scrambling sequence formula used by the UE when scrambling PUSCH is:
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter.
  • the value of n RNTI in the scrambling sequence formula directly uses the value of RA-RNTI.
  • the value of RA-RNTI can reach a maximum of 18 bits.
  • the value of n RNTI can correspond to a maximum of 18 bits, and the value of n RNTI ⁇ 2 16 will be greater than the currently specified maximum magnitude 2 31 , resulting in the calculated scrambling sequence exceeding the specified range.
  • the calculation of the RA-RNTI is still performed according to the existing method, but when the PUSCH scrambling sequence is determined according to the RA-RNTI, if it is determined that the calculated RA-RNTI value is not greater than 16 bits, Then determine n RNTI as the value of RA-RNTI, otherwise, determine n RNTI as the value of the lower 16 bits of RA-RNTI. In this way, the PUSCH scrambling sequence is limited to the prescribed maximum magnitude of 2 31 .
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter.
  • n RNTI When calculating the PUSCH scrambling sequence according to this formula, n RNTI directly takes the value of RA-RNTI. Although the value of n RNTI ⁇ 2 16 may exceed the currently specified maximum magnitude of 2 31 , the calculation is guaranteed by modulo operation The result of will not exceed the specified maximum magnitude, and it can be guaranteed that the obtained scrambling sequence will not exceed the specified range.
  • c init n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID is modified to obtain the following formula:
  • c init n RNTI ⁇ 2 31-c-1 +n RAPID ⁇ 2 10 +n ID
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits.
  • the current maximum subcarrier interval introduced in the random access process is 960KHz.
  • the calculated RA-RNTI can be up to 18 bits, that is, the value of RA-RNTI
  • c init-u n RNTI ⁇ 2 12 +n RAPID ⁇ 2 10 +n ID
  • the RA-RNTI value in the PUSCH scrambling sequence formula defined by the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of the bits from low to high.
  • the above-mentioned second preset number is 15.
  • the upper layer of the terminal performs RA-RNTI calculation based on the following information:
  • RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 640 ⁇ f_id+14 ⁇ 640 ⁇ 8 ⁇ ul_carrier_id.
  • Converted to binary is 10 0010 1101 1101 0010, where the bits higher than 15 bits are 100.
  • the scrambling sequence formula used by the UE when scrambling the PUSCH is as described above.
  • n RNTI is determined as the value of RA-RNTI; otherwise, n RNTI is determined as the value of the lower 15 bits of RA-RNTI. According to the above example, n RNTI is determined as 010 1101 1101 0010.
  • the UE uses the PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device.
  • the UE uses the calculated RA-RNTI to determine the corresponding PUSCH scrambling sequence according to any of the above methods, and scrambles the PUSCH, sends the PUSCH bearer information to the network side device through the scrambled PUSCH, and receives it.
  • the network side device descrambles the PUSCH according to the calculated RA-RNTI, it sends the random access response message Msg B, or when the receiving network side device fails to receive the PUSCH bearer information after receiving the message Msg A, it uses the calculated RA -RNTI scrambled random access response message.
  • the transmission may fail. Therefore, if the network side device receives the random access preamble sent by the UE through the message Msg A, but it does not receive it successfully When PUSCH bears information, the random access response message Msg 2 in the four-step random access process is sent to the UE, and the UE receives the random access response message Msg 2 sent by the network side device.
  • the UE if the UE adopts the aforementioned four-step random access, it is determined that the random access preamble is not sent through the message Msg A. Therefore, the UE only sends the random access preamble to the network side device, and then receives The network side device uses the calculated RA-RNTI to scramble the random access response message Msg2.
  • the UE When the UE receives the random access response message Msg B, it establishes a connection with the network side device.
  • the related existing technology of two-step random access is adopted, which will not be described in detail here.
  • the UE When the UE receives the random access response message Msg 2, it uses the calculated RA-RNTI to descramble the random access response message.
  • the network side device determines the index value t_id of the first time slot where the RO receiving the random access preamble is located, and calculates the RA-RNTI according to the index value t_id , And use the calculated RA-RNTI to scramble the random access response message returned to the UE before sending it to the UE.
  • the random access response message Msg 2 received by the UE above is that after the network side device receives the random access preamble, it calculates the RA-RNTI according to the preamble, and uses the calculated RA-RNTI to scramble the random access response message Sent.
  • the network side device scrambles the random access response message by using the calculated RA-RNTI, it scrambles according to the corresponding modified scrambling sequence formula, where the modified scrambling sequence formula is used to limit the generated scrambling sequence The corresponding number of bits.
  • the modified scrambling sequence formula includes a modified DCI scrambling sequence formula and a modified PDSCH scrambling sequence formula.
  • the modified DCI scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the number of bits of the wireless frame payload
  • X rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is the value of RA-RNTI during random access The number of bits corresponding to the upper limit of the range.
  • the number of bits corresponding to the generated scrambling sequence is limited, specifically: the RA-RNTI value in the PDSCH scrambling sequence formula defined by the protocol is modified to follow the order of bits from low to high , The selected value corresponding to the first preset number of bits; or, perform the modulo operation on the PDSCH scrambling sequence formula defined by the protocol; or reduce the setting coefficient in the PDSCH scrambling sequence formula defined by the protocol The value of.
  • the modified PDSCH scrambling sequence obtained by modulo operation is:
  • the modified PDSCH scrambling sequence obtained by modifying the coefficient is:
  • c init n RNTI ⁇ 2 15-(c-16) +q ⁇ 2 14-(c-16) +n ID
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the UE monitors the message sent by the network side device, and uses the determined RA-RNTI to descramble the received random access response message according to the modified DCI scrambling sequence formula and the modified PDSCH formula.
  • the UE After the UE successfully descrambles the random access response message sent by the network-side device, it can determine that the random access response message is sent to itself. Therefore, the UE determines that the random access request initiated by the device is responded to, and then sends it to the network-side device. Send a random access message to establish a connection with the network side device.
  • the modified scrambling sequence formula is used to limit the number of bits corresponding to the generated scrambling sequence, specifically:
  • the RA-RNTI value in the PDSCH/DCI scrambling sequence formula defined by the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where the random The access response message includes the DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the value corresponding to the remaining bits after the second preset number of bits are selected among the RA-RNTI values.
  • the above-mentioned second preset number is 15.
  • the physical layer of the UE receives the time-frequency domain resource configuration and RA-RNTI from the higher layer, and sends Msg1 to the base station according to the configured time-frequency domain resource;
  • the lower 15 bits of RA-RNTI are used for DCI demodulation.
  • the DCI is successfully demodulated.
  • the RA-RNTI carried in the DCI is higher than 15 bits.
  • the RA-RNTI is higher than 15 bits of bit 100 for comparison, the results are consistent, and the lower 15 bits of RA-RNTI are used to continue the subsequent PDSCH demodulation.
  • the embodiment of the present disclosure also provides a random access method, which is applied to a network side device. As shown in Figure 6, the method includes:
  • Step S601 Receive the random access preamble sent by the user terminal UE, determine the index value t_id of the first time slot where the random access opportunity RO for receiving the random access preamble is located, and calculate according to the index value t_id RA-RNTI;
  • the UE After the random access is triggered, the UE will send a random access preamble to the network side device, or send a random access preamble to the network side device, and send PUSCH bearer information to the network side device through the scrambled PUSCH.
  • the network side device receives the random access preamble sent by the UE, determines the index value t_id of the first time slot where the RO receiving the random access preamble is located, and calculates the corresponding RA-RNTI according to the index value t_id.
  • Step S602 Receive the PUSCH bearer information sent by the UE through the PUSCH scrambled by the scrambling sequence, and use the calculated RA-RNTI to descramble the PUSCH bearer information, or send the calculated RA-RNTI to the UE.
  • Random access response message in the scrambling/descrambling process, scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, where the scrambling sequence formula is modified to limit the generated scrambling sequence corresponding to Number of bits.
  • the network-side device When the network-side device receives the random access preamble sent by the UE through Msg A, it means that the UE uses two-step random access to initiate the random access process, and the network-side device uses the same method as the above-mentioned UE, according to the received random access
  • the preamble calculates the RA-RNTI, uses the calculated RA-RNTI to descramble the PUSCH, and receives the PUSCH bearer information sent by the UE.
  • the UE sends the PUSCH bearer information to the network side device through the PUSCH scrambled by the modified PUSCH scrambling sequence. And through the modified scrambling sequence formula, the number of bits corresponding to the generated scrambling sequence is limited.
  • the network side device adopts the same implementation manner as in the foregoing random access method applied to the UE, which is not repeated here.
  • the network side device descrambles the PUSCH receiving the PUSCH carrying information according to the same modified PUSCH formula as the above UE.
  • modifying the scrambling sequence formula includes: modifying the RA-RNTI value in the PUSCH scrambling sequence formula defined by the protocol to follow the order of bits from low to high , The selected value corresponding to the second preset number of bits.
  • the network side device can calculate the RA-RNTI according to the time-frequency domain position of the random access preamble, and select the lower 15 bits to descramble the PUSCH scrambling sequence.
  • a random access response message Msg B is sent to the UE, and a random connection is established with the UE.
  • a random connection is established with the UE.
  • the related prior art in the existing two-step random connection process is adopted, which will not be described in detail here.
  • the network-side device When the network-side device receives the random access preamble sent by the UE through Msg A but fails to receive the PUSCH bearer information sent by the UE, and determines that the UE has failed to send the PUSCH bearer information, it uses the same method as the above-mentioned UE, based on the received random access Enter the preamble to calculate the RA-RNTI, use the calculated RA-RNTI to scramble the DCI and PDSCH, and send a random access response message Msg 1 to the UE on the downlink channel.
  • the network-side device When the network-side device receives the random access preamble sent by the UE through Msg 1, it means that the UE uses four-step random access to initiate the random access process, and the network-side device uses the same method as the above-mentioned UE, according to the received random access
  • the preamble calculates the RA-RNTI, uses the calculated RA-RNTI to scramble the DCI and PDSCH, and sends a random access response message Msg 2 to the UE on the downlink channel.
  • the network side device When the network side device scrambles the DCI and PDSCH, it performs scrambling according to the corresponding modified scrambling sequence formula, where the modified scrambling sequence formula is used to limit the number of bits corresponding to the generated scrambling sequence.
  • the modified scrambling sequence formula includes a modified DCI scrambling sequence formula and a modified PDSCH scrambling sequence formula.
  • limiting the number of bits corresponding to the generated scrambling sequence includes:
  • the RA-RNTI value in the PDSCH/DCI scrambling sequence formula defined by the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high; wherein, the random The access response message includes the DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry values corresponding to the remaining bits after the second preset number of bits are selected among the RA-RNTI values.
  • the second preset number is 15;
  • the scrambling sequence formula used by the network side equipment to scramble the PDSCH is as described above.
  • the value of RA-RNTI is determined If it is not more than 15 bits, then n RNTI is determined as the value of RA-RNTI, otherwise, n RNTI is determined as the value of the lower 15 bits of RA-RNTI. This ensures that the calculated scrambling sequence will not exceed the specified range.
  • the remaining bits higher than 15 bits are transmitted in DCI for more accurate terminal identification.
  • N bits higher than 15 bits are transmitted in DCI, as shown in Figure 19, they can occupy N bits in the order from high to low, or from low to high. The sequence of occupies N bits.
  • DCI 1_0 has 16-bit reserved bits. As shown in Figure 20, the highest 3 bits of the reserved bits can be used: calculate RA-RNTI As a result, 3 bits higher than 15 bits in binary form are placed in the highest 3 bits of the reserved bits.
  • modified DCI scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the number of bits of the wireless frame payload
  • X rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is the value of RA-RNTI during random access The number of bits corresponding to the upper limit of the range.
  • FIG. 7 a schematic diagram of DCI scrambling provided by an embodiment of the present disclosure.
  • the value of RA-RNTI can reach up to 18bit, then the value of c is 18, and the corresponding modified DCI formula is:
  • c k is the combined sequence of the wireless frame payload and CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the number of bits of the wireless frame payload ,X rnti,0 ,x rnti,1 ,...,x rnti,17 , which means to take the 18 most significant bits of RA-RNTI.
  • the 18 most significant bits of the calculated RA-RNTI can be taken. Therefore, when the calculated RA-RNTI exceeds the prescribed 16 bits, the DCI can also be scrambled according to the formula.
  • the cyclic redundancy check CRC provides error detection in DCI transmission.
  • the payload in the wireless frame that transmits the DCI is used to calculate the CRC check bit.
  • the payload sequence in the wireless frame that transmits the DCI is a k , and the bits of the payload are a 0 , a 1 , a 2 ,..., a A-1 , where A is the number of bits of the payload.
  • the CRC check sequence is p k , and the bits of the payload are p 0 , p 1 , p 2 ,..., p L-1 , where L is the number of CRC check bits.
  • the payload CRC check sequence composition obtained DCI radio frame payload and CRC check combined sequence b k, calculated using the RA-RNTI for scrambling b k.
  • b k is determined according to the following formula:
  • k A+L
  • b k is the sequence composed of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the bit number of the wireless frame payload
  • L is the CRC check bit
  • L 24 .
  • the network side device When the network side device scrambles the PDSCH, it performs scrambling according to the corresponding modified PDSCH scrambling sequence formula, where the modified PDSCH scrambling sequence formula limits the number of bits corresponding to the generated scrambling sequence. Specifically, any of the following methods is used:
  • the scrambling sequence formula used by the network side equipment when scrambling the PDSCH is:
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n ID is the ID of the cell corresponding to the UE
  • q is the codeword type, q ⁇ ⁇ 0, 1 ⁇ , n ID ⁇ ⁇ 0, 1, ..., 1023 ⁇ .
  • n RNTI in the scrambling sequence formula directly uses the value of RA-RNTI.
  • the value of RA-RNTI can reach a maximum of 18bit.
  • the value of n RNTI can correspond to a maximum of 18 bits, and the value of n RNTI ⁇ 2 16 will be greater than the currently specified maximum magnitude of 2 31 , causing the calculated scrambling sequence to exceed the specified range.
  • the calculation of RA-RNTI is still performed according to the above-mentioned existing method, but when the PDSCH scrambling sequence is determined according to RA-RNTI, if it is determined that the value of RA-RNTI is not greater than 16 bits, then n RNTI Determine as the value of RA-RNTI, otherwise, determine n RNTI as the value of the lower 16 bits of RA-RNTI. This ensures that the calculated scrambling sequence will not exceed the specified range.
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n ID is the ID of the cell corresponding to the UE
  • c is the number of bits corresponding to the upper limit of the RA-RNTI value range during random access, q ⁇ 0,1 ⁇ , n ID ⁇ 0,1,...,1023 ⁇ .
  • n RNTI When calculating the PDSCH scrambling sequence according to this formula, n RNTI directly takes the value of RA-RNTI. Although the value of n RNTI ⁇ 2 15 may exceed the currently specified maximum magnitude of 2 31 , the calculation is guaranteed by modulo operation The result of will not exceed the specified maximum magnitude, and it can be guaranteed that the obtained scrambling sequence will not exceed the specified range.
  • c init n RNTI ⁇ 2 15-(c-16) +q ⁇ 2 14-(c-16) +n ID
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits, q ⁇ 0,1 ⁇ , n ID ⁇ 0,1,...,1023 ⁇ .
  • the maximum subcarrier interval introduced in the random access process is 960KHz.
  • the calculated RA-RNTI can be up to 18bit, that is, the RA-RNTI value range
  • the network side device receives the random access preamble and PUSCH bearer information through Msg A, it sends a scrambled random access response message Msg B to the UE.
  • the existing technology is adopted, which will not be described in detail here.
  • the network side device if it does not receive the random access preamble through Msg A, or fails to receive PUSCH bearer information through Msg A, it sends the random access scrambled by the calculated RA-RNTI to the UE. Response message Msg 2.
  • the network side device uses the calculated RA-RNTI to determine the corresponding DCI scrambling sequence and PDSCH scrambling sequence according to any of the above methods, and scrambles the DCI and PDSCH respectively, and sends a random access response to the UE Message Msg2.
  • the network side device After the network side device sends the random access response message Msg 2 to the UE, it receives the random access message Msg 2 sent by the UE after the UE uses the calculated RA-RNTI to descramble the random access response message Msg 3 and the subsequent four steps of random access Enter the step to establish a connection with the UE.
  • the UE and the network side device do not modify the current RA-RNTI calculation method, but modify the method of scrambling the transmitted signal according to the calculated RA-RNTI, and modify the corresponding
  • the scrambling sequence formula is used to limit the number of bits corresponding to the generated scrambling sequence.
  • the calculated RA-RNTI exceeds the specified number of bits, corresponding identification and processing can also be performed. It solves the problem that the method of calculating RA-RNTI in the existing random access process is not suitable for the scenario of a larger signal transmission frequency band.
  • the embodiments of the present disclosure provide a random access method, which is applied to a user terminal UE. As shown in Figure 8, the method includes:
  • Step S801 Send a random access preamble to the network side device, and determine the index value t_id of the first time slot where the random access opportunity RO for selecting and sending the random access preamble is located;
  • the UE When the UE initiates random access, if the above four-step random access process is adopted, it first sends a random access preamble to the network side device through Msg 1, and then calculates and saves the corresponding RA-RNTI. If the above two-step random access process is adopted, the random access preamble and PUSCH bearer information are first sent to the network side device through Msg A. Specifically, the UE first sends a random access preamble, calculates and saves the corresponding RA-RNTI, then determines the PUSCH scrambling sequence according to the calculated RA-RNTI, scrambles the PUSCH, and then sends the scrambled PUSCH to the network side device Send PUSCH bearer information.
  • the UE After the random access is triggered, the UE first chooses the configuration using the four-step random access process or the two-step random access process, initiates random access to the network side device, and then sends the random access preamble to the network side device according to the selected configuration , And determine the index value t_id of the first time slot where the random access opportunity RO selected when the random access preamble is sent.
  • the UE determines the index value t_id of the first time slot in which the RO is located, and after calculating the RA-RNTI according to the index value t_id, stores the calculated RA-RNTI for subsequent descrambling process.
  • the embodiment of the present disclosure modifies the value method of the index value t_id, thereby limiting the size of the RA-RNTI value, and making it possible to indicate the position of the RO with the time slot number after 293.
  • t_id is taken from the set S ⁇ si ⁇ of the slot numbers of the current subcarrier interval arranged in the sequence of the slots configured with RO, and the sequence index i corresponding to the slot number is taken from the set S ⁇ si ⁇ Value, where i ⁇ 0,1,...,n-1 ⁇ , n is the size of the set S, that is, the number of time slots containing RO in a wireless frame configured by the system.
  • the timeslot positions are numbered in order, when the timeslot positions are sorted in the order of the timeslot number from small to large, and the corresponding sequence number of the timeslot position in the sorted sequence is reduced by 1, As the number of the slot position.
  • the value range of the index value t_id is 0 ⁇ t_id ⁇ the number of time slots containing RO in the radio frame under the current subcarrier interval.
  • FIG. 9 an example diagram of a method for modifying the value of an index value t_id provided by an embodiment of the present disclosure.
  • a radio frame includes a total of 8 time slots ⁇ 4, 9, 14, 19, 24, 29, 34, 39 ⁇ RO may exist.
  • the positions corresponding to the 8 time slots are sorted according to the time slot number from small to large, and the set ⁇ 4,9,14,19,24,29,34,39 ⁇ is obtained.
  • the time slot with the time slot number of 4 is the first time slot in which RO may exist, then the corresponding sequence number in the sequence after sorting is 1, and the sequence number is subtracted by 1 as the time The number of the slot position, the corresponding number value of the time slot with the time slot number of 4 is 0, and so on, the value range of t_id can be changed from the original 0-39 to 0-7 as shown in Figure 9. , Thus narrowing the value range of t_id.
  • the maximum value of the modified t_id value range becomes n-1, where n is the number of time slots containing RO in the radio frame configured by the system under the current subcarrier interval.
  • the network side device after receiving the random access preamble sent by the UE, uses the same method as the UE to determine the index of the first time slot where the random access opportunity RO for sending the random access preamble is selected.
  • the value t_id After receiving the random access preamble sent by the UE, the network side device uses the same method as the UE to determine the index of the first time slot where the random access opportunity RO for sending the random access preamble is selected. The value t_id.
  • the method defined by the protocol is used to determine the index value t_id of the first time slot where the random access opportunity RO for sending the random access preamble is selected, that is, when the SCS is 960KHz, the maximum value of the determined index value t_id is 640.
  • Step S802 Calculate the random access wireless network temporary identifier RA-RNTI according to the index value t_id, and limit the number of bits corresponding to the RA-RNTI by limiting the value range of the index value t_id during calculation;
  • the UE uses the above method 1 to determine the index value t_id of the first time slot in which the RO is located, that is, the UE determines the random access timing RO for selecting the random access preamble according to the above-mentioned modified index value t_id value method
  • the corresponding RA-RNTI is calculated according to the index value t_id, thereby limiting the value range of the index value t_id to limit the number of bits corresponding to the RA-RNTI.
  • the corresponding RA-RNTI is calculated according to the above-mentioned existing RA-RNTI calculation formula (1) according to the determined index value t_id.
  • the value range of the index value t_id is restricted according to the above method, and the formula for calculating RA-RNTI is modified at the same time, thereby restricting the bit position corresponding to RA-RNTI number.
  • any one of the following methods is used to modify the formula for calculating RA-RNTI:
  • RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ T1 ⁇ f_id+14 ⁇ T1 ⁇ 8 ⁇ ul_carrier_id (2)
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • s_id is the selected RO The index of an orthogonal amplitude modulation OFDM symbol;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble, 0 ⁇ s_id ⁇ 14, 0 ⁇ f_id ⁇ 14.
  • the bit range of the aforementioned PUSCH scrambling sequence is 31 bits, the corresponding RA-RNTI value is ⁇ 32767, and the preset subcarrier interval is 120Khz.
  • the value of RA-RNTI is less than 32767.
  • the UE calculates the RA-RNTI according to the above formula and sends the random access preamble to the network side device, it selects the radio frame configuration parameters whose total number of ROs does not exceed the T1, and uses the configuration parameters according to the configuration parameters.
  • the PRACH configuration index is 12 as shown in the configuration table of Table 1
  • the time slots containing the 60KHz subcarrier interval of RO are the time slots corresponding to time slot numbers 19 and 39, and the corresponding time slots of each 60KHz time slot
  • the number of timeslots of the 480KHz subcarrier interval included in the time is 8 from the set ⁇ 1, 2,..., 8 ⁇
  • the set of timeslot numbers corresponding to the timeslots of the 480KHz subcarrier interval carrying RO in the radio frame can be determined as ⁇ 152 0 , 153 1 , 154 2 , ..., 159 7 , 312 8 , 313 9 , 319 15 ⁇
  • the set size is 16, where the slot index corresponding to each slot number, that is, the numbered set is ⁇ 0, 1,...
  • the above RA-RNTI calculation formula supports application scenarios above 52.6GHz and subcarrier spacing of 480KHz.
  • the PRACH configuration index is 12 as shown in the configuration table of Table 1
  • the time slots containing the 60KHz subcarrier interval of RO are the time slots corresponding to time slot numbers 19 and 39, and the corresponding time slots of each 60KHz time slot
  • the number of timeslots of the 480KHz subcarrier interval included in the time is 16 from the set ⁇ 1, 2,..., 16 ⁇
  • the set of timeslot numbers corresponding to the timeslot of the 960KHz subcarrier interval carrying RO in the radio frame can be determined as ⁇ 304 0 , 305 1 , 306 2 , ..., 319 15 , 624 16 , 625 17 , ..., 639 31 ⁇
  • the set size is 32, where the slot index corresponding to each slot number, that is, the numbered set is ⁇ 0
  • the above RA-RNTI calculation formula supports application scenarios above 52.6GHz and subcarrier spacing of 960KHz.
  • RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ T2 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ 2 (3)
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble, 0 ⁇ s_id ⁇ 14, 0 ⁇ f_id ⁇ 1.
  • the value of RA-RNTI is less than 32767.
  • the UE calculates the RA-RNTI according to the above formula and sends the random access preamble to the network side device, it selects the radio frame configuration parameters whose total number of ROs does not exceed the T2, and uses the configuration parameters according to the configuration parameters.
  • the configured radio frame sends the random access preamble.
  • the existing RA-RNTI calculation formula is modified as described in the above method 2.
  • the method of calculating RA-RNTI according to the modified RA-RNTI calculation formula of Method 2 can be used simultaneously with the existing RA-RNTI calculation method.
  • the RA-RNTI calculation method corresponding to the formula obtained by the above method 2 is used to calculate the RA-RNTI.
  • a system includes two UEs, where UE1 sends an access preamble on an uplink carrier below 52.6GHz, and determines the RA-RNTI according to the existing RA-RNTI calculation method, and UE2 sends access on an uplink carrier above 52.6GHz Preamble, and determine the RA-RNTI according to the RA-RNTI calculation method provided by the above formula (1) in the embodiment of the present disclosure.
  • the maximum RA-RNTI obtained by the existing RA-RNTI calculation method is added to avoid the RA-RNTI determined by UEs in different frequency bands.
  • RNTI conflicts with each other can enable each UE to correctly receive corresponding information by distinguishing RA-RNTI when monitoring random access response messages.
  • the UE determines the index value t_id of the first time slot in which the RO is located by adopting the above-mentioned embodiment 2, it will limit the number of bits corresponding to the RA-RNTI by limiting the value range of the index value t_id during calculation, including:
  • the RA-RNTI is calculated by using the modified index value t_id'.
  • RA-RNTI calculation formula is changed to:
  • RA-RNTI 1+s_id+14 ⁇ (t_id mod80)+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id
  • the difference between the modified formula and the above formula (1) is that the index value t_id is modulo operation according to the modulus 80, and the modified index value t_id' is obtained, and the value range of the modified index value t_id' is limited to within 80 Therefore, the number of bits corresponding to RA-RNTI is limited.
  • the above-mentioned modulus is determined according to the requirements of the value range of RA-RNTI, and is not limited to 80.
  • the network side device After the network side device receives the random access preamble sent by the UE and determines the index value t_id, it uses the same method as the UE to calculate the random access wireless network temporary identifier RA-RNTI according to the index value t_id, and calculates At this time, by limiting the value range of the index value t_id, the number of bits corresponding to the RA-RNTI is limited.
  • Step S803 Use the PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device, or receive the random access response message scrambled by the network side device using the calculated RA-RNTI, and Use the calculated RA-RNTI to descramble the random access response message.
  • the UE uses the PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device.
  • the UE may choose to adopt a four-step random access or a two-step random access method, and the current network side device initiates random access. If the two-step random access method is adopted, after the UE sends the random access preamble to the network side device, it also sends the PUSCH bearer information to the network side device through the scrambled PUSCH.
  • the PUSCH bearer information carries at least the information used by the UE in the satellite cell C-RNTI (Cell Radio Network Temporary Identity), radio resource control RRC connection message, etc. Among them, the UE sends the random access preamble and PUSCH bearer information to the network side device through the message Msg A.
  • the UE When the UE adopts two-step random access, it is determined to send the random access preamble through Msg A. Therefore, the UE also uses the RA-RNTI calculated above to scramble the PUSCH, and sends the PUSCH to the network side device through the scrambled PUSCH channel Carrying information.
  • the UE determines the PUSCH scrambling sequence formula according to the calculated RA-RNTI, and scrambles the PUSCH.
  • the corresponding PUSCH scrambling sequence formula is:
  • c init n RNTI ⁇ 2 16 +n RAPID ⁇ 2 10 +n ID
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter, q ⁇ ⁇ 0, 1 ⁇ , n ID ⁇ ⁇ 0, 1,..., 1023 ⁇ .
  • the foregoing UE uses RA-RNTI to scramble the PUSCH, and sends PUSCH bearer information to the network side device through the scrambled PUSCH channel.
  • the specific embodiment adopts the existing two-step random access process related method, which will not be described in detail here.
  • the UE uses the PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device.
  • the UE calculates the RA-RNTI obtained according to any of the above methods, determines the corresponding PUSCH scrambling sequence, scrambles the PUSCH, sends the PUSCH bearer information to the network side device through the scrambled PUSCH, and receives the network After the side device descrambles the PUSCH according to the calculated RA-RNTI, it sends a random access response message Msg B, or when the receiving network side device fails to receive the PUSCH bearer information after receiving the message Msg A, it uses the calculated RA- Random access response message scrambled by RNTI.
  • the transmission may fail. Therefore, if the network side device receives the random access preamble sent by the UE through the message Msg A, but it does not receive it successfully When PUSCH bears information, the random access response message Msg 2 in the four-step random access process is sent to the UE, and the UE receives the random access response message Msg 2 sent by the network side device.
  • the UE if the UE adopts the aforementioned four-step random access, it is determined that the random access preamble is not sent through the message Msg A. Therefore, the UE only sends the random access preamble to the network side device, and then receives The network side device uses the calculated RA-RNTI to scramble the random access response message Msg2.
  • the UE When the UE receives the random access response message Msg B, it establishes a connection with the network side device.
  • the related existing technology of two-step random access is adopted, which will not be described in detail here.
  • the UE When the UE receives the random access response message Msg 2, it uses the calculated RA-RNTI to descramble the random access response message.
  • the network side device determines the index value t_id of the first time slot where the RO receiving the random access preamble is located, and calculates the RA-RNTI according to the index value t_id , And use the calculated RA-RNTI to scramble the random access response message returned to the UE before sending it to the UE.
  • the network-side device uses the calculated RA-RNTI to scramble the random access response message, it scrambles according to the corresponding scrambling sequence formula, where the DCI scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the number of bits of the wireless frame payload
  • X rnti, kA-8 means to take the kA-8th bit from high to low in RA-RNTI.
  • the PDSCH scrambling sequence is:
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE, q ⁇ ⁇ 0, 1 ⁇ , n ID ⁇ ⁇ 0, 1, ..., 1023 ⁇ .
  • the UE monitors the message sent by the network side device, and uses the determined RA-RNTI to descramble the received random access response message according to the modified DCI scrambling sequence formula and the modified PDSCH formula.
  • the UE After the UE successfully descrambles the random access response message sent by the network-side device, it can determine that the random access response message is sent to itself. Therefore, the UE determines that the random access request initiated by the device is responded to, and then sends it to the network-side device. Send a random access message to establish a connection with the network side device.
  • the related method of the existing two-step random access process is adopted, which will not be described in detail here.
  • the foregoing random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification Index, the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • the UE uses the calculated RA-RNTI to descramble the random access response message, including:
  • the value of the RA-RNTI identification index carried by the bits in the DCI is determined as follows: comparing;
  • the calculated RA-RNTI is used to descramble the random access response message.
  • the embodiment of the present disclosure also provides a random access method, which is applied to a network side device. As shown in Figure 10, the method includes:
  • Step S1001 Receive the random access preamble sent by the user terminal UE, and determine the index value t_id of the first time slot where the random access opportunity RO for receiving the random access preamble is located;
  • the UE After the random access is triggered, the UE will send a random access preamble to the network side device, or send a random access preamble to the network side device, and send PUSCH bearer information to the network side device through the scrambled PUSCH.
  • the network side device receives the random access preamble sent by the UE, determines the index value t_id of the first time slot where the RO receiving the random access preamble is located, and calculates the corresponding RA-RNTI according to the index value t_id.
  • the network side device uses the same method as the UE to determine the index value t_id of the first time slot in which the RO is located, and calculates the RA-RNTI according to the index value t_id.
  • the above-mentioned Embodiment 1 may be adopted to modify the existing method of determining the index value t_id to limit the value range of the index value t_id. It is also possible to determine the index value t_id in the manner prescribed by the protocol in Embodiment 2.
  • the value method of the index value t_id is modified to: t_id is arranged from the time slot number set S ⁇ si ⁇ of the current subcarrier interval in the order of the time slot configured with RO, the order corresponding to the time slot number
  • the index i is a value in the set, where i ⁇ 0,1,...,n-1 ⁇ , n is the size of the set S, that is, the number of time slots that contain RO in a wireless frame configured by the system.
  • the timeslot positions are numbered in order, when the timeslot positions are sorted in the order of the timeslot number from small to large, and the corresponding sequence number of the timeslot position in the sorted sequence is reduced by 1, As the number of the slot position.
  • the value range of the index value t_id is 0 ⁇ t_id ⁇ the number of time slots containing RO in the radio frame under the current subcarrier interval.
  • Step S1002 Calculate RA-RNTI according to the index value t_id, and limit the number of bits corresponding to the RA-RNTI by limiting the value range of the index value t_id in the calculation process;
  • the network-side device determines the index value t_id of the first time slot in which the RO is located by using the above-mentioned embodiment 1, that is, the network-side device determines the random access that receives the random access preamble according to the value method of the modified index value t_id.
  • the index value t_id of the first time slot where the incoming time RO is located is calculated according to the index value t_id, and the corresponding RA-RNTI is calculated, thereby restricting the number of bits corresponding to the RA-RNTI by limiting the value range of the index value t_id.
  • the corresponding RA-RNTI is calculated according to the above-mentioned existing RA-RNTI calculation formula (1) according to the determined index value t_id.
  • the value range of the index value t_id is restricted according to the above method, and the formula for calculating RA-RNTI is modified at the same time, thereby restricting the bit position corresponding to RA-RNTI number.
  • any one of the following methods is used to modify the formula for calculating RA-RNTI:
  • RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ T1 ⁇ f_id+14 ⁇ T1 ⁇ 8 ⁇ ul_carrier_id
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • s_id is the selected RO The index of an orthogonal amplitude modulation OFDM symbol;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble, 0 ⁇ s_id ⁇ 14, 0 ⁇ f_id ⁇ 14.
  • the bit range of the aforementioned PUSCH scrambling sequence is 31 bits, the corresponding RA-RNTI value is ⁇ 32767, and the preset subcarrier interval is 120Khz.
  • T1 146, 0 ⁇ t_id ⁇ 146.
  • RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ T2 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ 2
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble, 0 ⁇ s_id ⁇ 14, 0 ⁇ f_id ⁇ 1.
  • T2 132, 0 ⁇ t_id ⁇ 132.
  • the method for calculating the RA-RNTI according to the modified RA-RNTI calculation formula of way 2 can be used simultaneously with the existing RA-RNTI calculation method.
  • the network-side device uses the foregoing implementation mode 2 to determine the index value t_id of the first time slot where the RO is located, in the calculation process, by limiting the value range of the index value t_id, the number of bits corresponding to the RA-RNTI is limited, including :
  • the RA-RNTI is calculated by using the modified index value t_id'.
  • the foregoing network side device determines the index value t_id of the first time slot where the RO is located, and calculates the RA-RNTI specific implementation manner according to the index value t_id, which is similar to the above-mentioned UE determining the index value of the first time slot where the RO is located in this embodiment.
  • t_id, and the specific implementation manner of calculating RA-RNTI according to the index value t_id is the same, and will not be repeated here.
  • Step S1003 Receive the PUSCH bearer information sent by the UE through the PUSCH scrambled by the scrambling sequence, and use the calculated RA-RNTI to descramble the PUSCH bearer information, or send the calculated RA-RNTI to the UE. Random access response message.
  • the network side device When the network side device receives the random access preamble sent by the UE through Msg A, it means that the UE uses two-step random access to initiate the random access process, and the network side device receives the PUSCH bearer information sent by the UE and uses the same as the above UE According to the method, the RA-RNTI is calculated according to the received random access preamble, and the calculated RA-RNTI is used to descramble the PUSCH bearer information sent by the UE.
  • the UE sends PUSCH bearer information to the network side device through the PUSCH scrambled by the PUSCH scrambling sequence.
  • the related method of the existing two-step random access process is adopted, which will not be described in detail here.
  • the network side device descrambles the PUSCH receiving the PUSCH carrying information according to the same modified PUSCH formula as the above UE.
  • a random access response message Msg B is sent to the UE, and a random connection is established with the UE.
  • a random connection is established with the UE.
  • the related prior art in the existing two-step random connection process is adopted, which will not be described in detail here.
  • the network-side device When the network-side device receives the random access preamble sent by the UE through Msg A but fails to receive the PUSCH bearer information sent by the UE, and determines that the UE has failed to send the PUSCH bearer information, it uses the same method as the above-mentioned UE, based on the received random access Enter the preamble to calculate the RA-RNTI, use the calculated RA-RNTI to scramble the DCI and PDSCH, and send a random access response message Msg 1 to the UE on the downlink channel.
  • the network-side device When the network-side device receives the random access preamble sent by the UE through Msg 1, it means that the UE uses four-step random access to initiate the random access process, and the network-side device uses the same method as the above-mentioned UE, according to the received random access
  • the preamble calculates the RA-RNTI, uses the calculated RA-RNTI to scramble the DCI and PDSCH, and sends a random access response message Msg 2 to the UE on the downlink channel.
  • the network side device scrambles the DCI and PDSCH, it scrambles according to the corresponding scrambling sequence formula.
  • the related method of the existing four-step random access process is adopted, which will not be described in detail here.
  • the network side device receives the random access preamble and PUSCH bearer information through Msg A, it sends a scrambled random access response message Msg B to the UE.
  • the existing technology is adopted, which will not be described in detail here.
  • the network side device if it does not receive the random access preamble through Msg A, or fails to receive PUSCH bearer information through Msg A, it sends the random access scrambled by the calculated RA-RNTI to the UE. Response message Msg 2.
  • the network side device uses the calculated RA-RNTI to determine the corresponding DCI scrambling sequence and PDSCH scrambling sequence according to any of the above methods, and scrambles the DCI and PDSCH respectively, and sends a random access response to the UE Message Msg2.
  • the network side device After the network side device sends the random access response message Msg 2 to the UE, it receives the random access message Msg 2 sent by the UE after the UE uses the calculated RA-RNTI to descramble the random access response message Msg 3 and the subsequent four steps of random access Enter the step to establish a connection with the UE.
  • the network side device uses the foregoing implementation manner 2 to determine the index value t_id of the first time slot in which the RO is located,
  • the aforementioned random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • the network side device can use the bit field in DCI 1_0 with the CRC check bit scrambled by RA-RNTI to indicate the RNTI identification index RNTI_id, as shown in Figure 19, specifically in the following manner:
  • the higher layer of the UE After determining t_id according to the existing method, the higher layer of the UE performs RA-RNTI calculation according to the following information:
  • RA-RNTI 1+s_id+14 ⁇ (t_id mod 80)+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id;
  • the physical layer of the UE receives the configuration of time-frequency domain resources and the RA-RNTI from the higher layer, and sends Msg1 to the base station according to the configured time-frequency domain resources.
  • the base station receives the Msg1 sent by the UE, calculates the RA-RNTI according to the time-frequency domain position where Msg1 is located, and calculates the RA-RNTI in the same way as the UE, and uses the RA-RNTI to scramble the DCI, CRC check bits and PDSCH according to the existing protocol;
  • Base station calculation Convert the value of RNTI_id into binary 111 and place it in the reserved bit field in DCI 1_0 scrambled by RA-RNTI;
  • the base station sends a random access response message Msg2.
  • Msg2 includes the DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry RNTI_id.
  • the UE performs Msg2 monitoring, uses RA-RNTI for demodulation, and DCI demodulates successfully.
  • the UE performs Msg3 transmission and Msg4 reception according to the existing protocol.
  • the foregoing example is a four-step random access process, and the foregoing RA-RNTI calculation method can also be used in two-step random access, and the specific process is not described in detail here.
  • the UE and the network side device modify the current RA-RNTI calculation method, and in the process of calculating the RA-RNTI, select the random access timing RO for sending the random access preamble.
  • the value range of the index value t_id of the first time slot is limited to limit the number of bits corresponding to the RA-RNTI and avoid the calculated RA-RNTI from exceeding the specified number of bits. It solves the problem that the method of calculating RA-RNTI in the existing random access process is not suitable for the scenario of a larger signal transmission frequency band.
  • step S902 after the above method 1 and method 2 are modified, when the UE sends the random access preamble to the network side device, it needs to select the radio frame whose total number of ROs does not exceed the above T1 or T2
  • the configuration parameter is used to send the random access preamble by using a radio frame configured according to the configuration parameter.
  • the UE can arbitrarily select the radio frame configuration parameters, and when sending the random access preamble to the network side device, the selected radio frame configuration parameters determine whether the total number of RO carried in the radio frame does not exceed If the above-mentioned T1 or T2 radio frame configuration parameters are yes, the UE and the network side device use the above-mentioned method in this embodiment to initiate random access. Otherwise, the UE and the network side device do not limit the value range of the index value t_id during the random access process, and calculate the RA-RNTI according to the existing RA-RNTI calculation method, but add the PUSCH, DCI, and PDSCH The scrambling method is modified. In the scrambling/descrambling process, scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, where the scrambling sequence formula is modified to limit the number of bits corresponding to the generated scrambling sequence .
  • the UE sends the random access preamble to the network side device, if it is determined according to the selected radio frame configuration parameters that the total number of RO carried in the radio frame exceeds the T1 or T2 radio frame configuration parameters, the following method is performed:
  • Send a random access preamble to the network side device determine the index value t_id of the first time slot where the random access opportunity RO for sending the random access preamble is selected, and calculate the RA-RNTI according to the index value t_id ;
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the network side device executes the following methods:
  • Receive the random access preamble sent by the user terminal UE determine the index value t_id of the first time slot where the random access opportunity RO for receiving the random access preamble is located, and calculate the RA-RNTI according to the index value t_id ;
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the above embodiment 1 describes a random access method in the present disclosure, and the following describes a device that executes the above random access method.
  • an embodiment of the present disclosure provides a user terminal UE, including:
  • the calculation module 1101 is configured to send a random access preamble to the network side device, and determine the index value t_id of the first time slot where the random access opportunity RO for selecting and sending the random access preamble is located, and according to the index
  • the value t_id calculates the RA-RNTI of the random access wireless network
  • the scrambling and descrambling module 1102 is configured to send PUSCH bearer information to the network side device by using the physical uplink shared channel PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI, or to receive the RA-RNTI added by the network side device using the calculation Scrambled random access response message, using the calculated RA-RNTI to descramble the random access response message;
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PDSCH scrambling sequence formula for the physical downlink shared channel defined by the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where all The random access response message includes the PDSCH.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and cyclic redundancy CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the combined sequence of the wireless frame payload Number of bits, x rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is RA- in the process of random access The number of bits corresponding to the upper limit of the RNTI value range.
  • the aforementioned scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the value of the RA-RNTI, and the value corresponding to the remaining bits after the second preset number of bits is selected .
  • the aforementioned scrambling and descrambling module performs descrambling according to the corresponding modified scrambling sequence formula, including:
  • the value corresponding to the remaining bits carried in the bits in the DCI is compared with the value of the corresponding bit of the calculated RA-RNTI;
  • the PDSCH scheduled by the DCI is descrambled according to the corresponding modified scrambling sequence formula.
  • the above-mentioned user terminal UE provided in the embodiment of the present disclosure and the user terminal UE provided in the above-mentioned embodiment 1 of the present disclosure belong to the same inventive concept, which is applied to the various implementation modes of the user terminal provided in the above-mentioned embodiment 1, and can be applied to this embodiment It is implemented by the user terminal UE, which will not be repeated here.
  • an embodiment of the present disclosure also provides a network side device, including:
  • the calculation module 1201 is configured to receive the random access preamble sent by the user terminal UE, determine the index value t_id of the first time slot where the random access opportunity RO for receiving the random access preamble is located, and according to the index The value t_id calculates RA-RNTI;
  • the scrambling and descrambling module 1202 is configured to receive the PUSCH bearer information sent by the UE through the PUSCH scrambled by the scrambling sequence, and use the calculated RA-RNTI to descramble the PUSCH bearer information, or send the calculated RA to the UE -RNTI scrambled random access response message;
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH scrambling sequence formula defined by the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where the random The access response message includes the PDSCH.
  • the scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the number of bits of the wireless frame payload
  • X rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is the value of RA-RNTI during random access The number of bits corresponding to the upper limit of the range.
  • the aforementioned scrambling and descrambling module modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the value of the RA-RNTI, and the value corresponding to the remaining bits after the second preset number of bits is selected .
  • the above-mentioned network-side equipment provided in the embodiments of the present disclosure and the above-mentioned embodiment 1 of the present disclosure provide the same inventive concept, and are applied to the various implementations of the network-side equipment provided in the above-mentioned embodiment 1, and can be applied to this embodiment
  • the network side equipment in the implementation is implemented, and will not be repeated here.
  • the foregoing embodiment 2 describes a random access method in the present disclosure, and the following describes a device that executes the foregoing random access method.
  • an embodiment of the present disclosure provides a user terminal UE, including:
  • the parameter determination module 1301 is configured to send a random access preamble to the network side device, and determine the index value t_id of the first time slot where the random access opportunity RO for selecting and sending the random access preamble is located;
  • the calculation module 1302 is configured to calculate the random access wireless network temporary identifier RA-RNTI according to the index value t_id, and limit the number of bits corresponding to the RA-RNTI by limiting the value range of the index value t_id during calculation;
  • the scrambling and descrambling module 1303 is configured to use the PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device, or to receive random access scrambled by the network side device using the calculated RA-RNTI Input the response message, and use the calculated RA-RNTI to descramble the random access response message.
  • the calculation module restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id, including:
  • the number of bits corresponding to RA-RNTI is limited.
  • the calculation module restricting the value range of the index value t_id includes:
  • the slot positions are numbered in order, and the number corresponding to the first slot where the selected RO is located is determined as the index value t_id.
  • the calculation module numbering the slot positions in sequence includes:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • the calculation module corrects the formula for calculating RA-RNTI, including:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • the parameter determination module sending a random access preamble to the network side device includes:
  • the calculation module restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id during calculation, including:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • the scrambling and descrambling module uses the calculated RA-RNTI to descramble the random access response message, including:
  • the value of the RA-RNTI identification index carried by the bits in the DCI is determined as follows: comparing;
  • the calculated RA-RNTI is used to descramble the random access response message.
  • the above-mentioned user terminal UE provided in the embodiment of the present disclosure belongs to the same inventive concept as the user terminal UE provided in the above-mentioned embodiment 2 of the present disclosure. It is applied to various implementations of the user terminal provided in the above-mentioned embodiment 2 and can be applied to this embodiment. It is implemented by the user terminal UE, which will not be repeated here.
  • an embodiment of the present disclosure also provides a network side device, including:
  • the parameter determination module 1401 is configured to receive the random access preamble sent by the user terminal UE, and determine the index value t_id of the first time slot where the random access opportunity RO for receiving the random access preamble is located;
  • the calculation module 1402 is configured to calculate the RA-RNTI according to the index value t_id, and limit the number of bits corresponding to the RA-RNTI by limiting the value range of the index value t_id in the calculation process;
  • the scrambling and descrambling module 1403 is configured to receive PUSCH bearer information sent by the UE through the PUSCH scrambled by the scrambling sequence, and use the calculated RA-RNTI to descramble the PUSCH bearer information, or send the calculated RA to the UE -RNTI scrambled random access response message.
  • the calculation module restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id, including:
  • the number of bits corresponding to RA-RNTI is limited.
  • the calculation module restricting the value range of the index value t_id includes:
  • the positions of the time slots are numbered in order, and the number corresponding to the first time slot where the RO receiving the random access preamble is located is determined as the index value t_id.
  • the calculation module numbering the slot positions in sequence includes:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • the calculation module corrects the formula for calculating RA-RNTI, including:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • the parameter determination module receiving the random access preamble sent by the UE includes:
  • the total number of ROs selected by the receiving UE does not exceed the T1 or T2 radio frame configuration parameters, and the random access preamble sent by the radio frame configured according to the configuration parameters is used.
  • the calculation module restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id in the calculation process, including:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • the above-mentioned network-side device provided by the embodiment of the present disclosure and the network-side device provided in the above-mentioned embodiment 2 of this disclosure belong to the same inventive concept, which is applied to the various implementations of the network-side device provided in the above-mentioned embodiment 2 and can be applied to this embodiment
  • the network side equipment in the implementation is implemented, and will not be repeated here.
  • the user terminal UE and the network side device in the embodiments of the present disclosure are described above from the perspective of a modular functional entity, and the user terminal UE and the network side device in the embodiments of the present disclosure are described below from the perspective of hardware processing.
  • another embodiment of the user terminal UE in the embodiment of the present disclosure includes:
  • a processor 1500 A processor 1500, a memory 1501, a transceiver 1502, and a bus interface 1503.
  • the processor 1500 is responsible for managing the bus architecture and general processing, and the memory 1501 can store data used by the processor 1500 when performing operations.
  • the transceiver 1502 is used to receive and send data under the control of the processor 1500.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 1500 and various circuits of the memory represented by the memory 1501 are linked together. The bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the processor 1500 is responsible for managing the bus architecture and general processing, and the memory 1501 can store data used by the processor 1500 when performing operations.
  • the processes disclosed in the embodiments of the present disclosure may be applied to the processor 1500 or implemented by the processor 1500.
  • each step of the signal processing flow can be completed by an integrated logic circuit of hardware in the processor 1500 or instructions in the form of software.
  • the processor 1500 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, and may implement or execute the The disclosed methods, steps and logic block diagrams.
  • the general-purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present disclosure may be directly embodied as executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 1501, and the processor 1500 reads the information in the memory 1501, and completes the steps of the signal processing flow in combination with its hardware.
  • the processor 1500 is configured to read a program in the memory 1501 and execute:
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PDSCH scrambling sequence formula for the physical downlink shared channel defined by the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where all The random access response message includes the PDSCH.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and cyclic redundancy CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the combined sequence of the wireless frame payload Number of bits, x rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is RA- in the random access process The number of bits corresponding to the upper limit of the RNTI value range.
  • the foregoing processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the value of the RA-RNTI, and the value corresponding to the remaining bits after the second preset number of bits is selected .
  • the foregoing processor performs descrambling according to the corresponding modified scrambling sequence formula, including:
  • the value corresponding to the remaining bits carried in the bits in the DCI is compared with the value of the corresponding bit of the calculated RA-RNTI;
  • the PDSCH scheduled by the DCI is descrambled according to the corresponding modified scrambling sequence formula.
  • the above-mentioned user terminal UE provided in the embodiment of the present disclosure belongs to the same inventive concept as the user terminal UE provided in the above-mentioned embodiment 1 of the present disclosure. It is applied to various implementations of the user terminal UE provided in the above-mentioned embodiment 1 and can be applied to this embodiment. It is implemented by the user terminal UE in, and will not be repeated here.
  • another embodiment of the network side device in the embodiment of the present disclosure includes:
  • a processor 1600 a memory 1601, a transceiver 1602, and a bus interface 1603.
  • the processor 1600 is responsible for managing the bus architecture and general processing, and the memory 1601 can store data used by the processor 1600 when performing operations.
  • the transceiver 1602 is used to receive and send data under the control of the processor 1600.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 1600 and various circuits of the memory represented by the memory 1601 are linked together. The bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the processor 1600 is responsible for managing the bus architecture and general processing, and the memory 1601 can store data used by the processor 1600 when performing operations.
  • the processes disclosed in the embodiments of the present disclosure may be applied to the processor 1600 or implemented by the processor 1600.
  • each step of the signal processing flow can be completed by an integrated logic circuit of hardware in the processor 1600 or instructions in the form of software.
  • the processor 1600 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, and can implement or execute the The disclosed methods, steps and logic block diagrams.
  • the general-purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present disclosure may be directly embodied as executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 1601, and the processor 1600 reads the information in the memory 1601, and completes the steps of the signal processing flow in combination with its hardware.
  • the processor 1600 is configured to read a program in the memory 1601 and execute:
  • Receive the random access preamble sent by the user terminal UE determine the index value t_id of the first time slot where the random access opportunity RO for receiving the random access preamble is located, and calculate the RA-RNTI according to the index value t_id ;
  • scrambling/descrambling is performed according to the corresponding modified scrambling sequence formula, wherein the number of bits corresponding to the generated scrambling sequence is limited by modifying the scrambling sequence formula.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH scrambling sequence formula defined by the protocol is corrected to the value corresponding to the first preset number of bits selected in the order of bits from low to high, where the random The access response message includes the PDSCH.
  • the processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the modified scrambling sequence formula includes at least one of the following:
  • c init (n RNTI ⁇ 2 16 + n RAPID ⁇ 2 10 + n ID ) mod2 31 ;
  • c init is the PUSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • n RAPID is the index of the random access preamble
  • n ID is the high-level configuration parameter
  • c is the upper limit of the RA-RNTI value range during random access The corresponding number of bits
  • c init (n RNTI ⁇ 2 15 +q ⁇ 2 14 +n ID )mod2 31 ;
  • c init is the PDSCH scrambling sequence
  • n RNTI is the value of RA-RNTI
  • q is the codeword type
  • n ID is the ID of the cell corresponding to the UE
  • c is the upper limit of the RA-RNTI value range during random access Number of bits.
  • the random access response message includes DCI
  • the modified scrambling sequence formula is:
  • c k is the combined sequence of the wireless frame payload and CRC check in the DCI after scrambling
  • b k is the combined sequence of the wireless frame payload and CRC check in the DCI before scrambling
  • A is the number of bits of the wireless frame payload
  • X rnti, kA-8+(c-16) means to take the kA-8+(c-16)th bit from high to low in RA-RNTI
  • c is the value of RA-RNTI during random access The number of bits corresponding to the upper limit of the range.
  • the foregoing processor modifies the scrambling sequence formula to limit the number of bits corresponding to the generated scrambling sequence, including:
  • the RA-RNTI value in the PUSCH/PDSCH/DCI scrambling sequence formula defined in the protocol is corrected to the value corresponding to the second preset number of bits selected in the order of bits from low to high, where all
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the value of the RA-RNTI, and the value corresponding to the remaining bits after the second preset number of bits is selected .
  • the above-mentioned network-side equipment provided in the embodiments of the present disclosure and the network-side equipment provided in the above-mentioned embodiment 1 of the present disclosure belong to the same inventive concept, and are applied to the various implementations of the network-side equipment provided in the above-mentioned embodiment 1 and can be applied to this embodiment
  • the network side equipment in the implementation is implemented, and will not be repeated here.
  • another embodiment of the user terminal UE in the embodiment of the present disclosure includes:
  • a processor 1700 a memory 1701, a transceiver 1702, and a bus interface 1703.
  • the processor 1700 is responsible for managing the bus architecture and general processing, and the memory 1701 can store data used by the processor 1700 when performing operations.
  • the transceiver 1702 is used to receive and send data under the control of the processor 1700.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 1700 and various circuits of the memory represented by the memory 1701 are linked together.
  • the bus architecture can also link various other circuits such as peripherals, voltage regulators, and power management circuits. These are all known in the art, and therefore, no further description will be given here.
  • the bus interface provides the interface.
  • the processor 1700 is responsible for managing the bus architecture and general processing, and the memory 1701 can store data used by the processor 1700 when performing operations.
  • the processes disclosed in the embodiments of the present disclosure may be applied to the processor 1700 or implemented by the processor 1700.
  • each step of the signal processing flow can be completed by hardware integrated logic circuits in the processor 1700 or instructions in the form of software.
  • the processor 1700 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, and can implement or execute the The disclosed methods, steps and logic block diagrams.
  • the general-purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present disclosure may be directly embodied as executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 1701, and the processor 1700 reads the information in the memory 1701, and completes the steps of the signal processing flow in combination with its hardware.
  • the processor 1700 is configured to read a program in the memory 1701 and execute:
  • PUSCH scrambled by the scrambling sequence corresponding to the RA-RNTI to send PUSCH bearer information to the network side device, or receive the random access response message scrambled by the network side device using the calculated RA-RNTI, and use calculation to obtain The RA-RNTI descrambles the random access response message.
  • the processor restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id, including:
  • the number of bits corresponding to RA-RNTI is limited.
  • the processor restricting the value range of the index value t_id includes:
  • the slot positions are numbered in order, and the number corresponding to the first slot where the selected RO is located is determined as the index value t_id.
  • the processor sequentially numbering the slot positions, including:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • the processor corrects the formula for calculating RA-RNTI, including:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • the processor sending the random access preamble to the network side device includes:
  • the processor restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id during calculation, including:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • the processor using the calculated RA-RNTI to descramble the random access response message includes:
  • the value of the RA-RNTI identification index carried by the bits in the DCI is determined as follows: comparing;
  • the calculated RA-RNTI is used to descramble the random access response message.
  • the above-mentioned user terminal UE provided in the embodiment of the present disclosure belongs to the same inventive concept as the user terminal UE provided in the above-mentioned embodiment 2 of the present disclosure. It is applied to various implementations of the user terminal UE provided in the above-mentioned embodiment 2 and can be applied to this embodiment. It is implemented by the user terminal UE in, and will not be repeated here.
  • another embodiment of the network side device in the embodiment of the present disclosure includes:
  • a processor 1800 a memory 1801, a transceiver 1802, and a bus interface 1803.
  • the processor 1800 is responsible for managing the bus architecture and general processing, and the memory 1801 can store data used by the processor 1800 when performing operations.
  • the transceiver 1802 is used to receive and send data under the control of the processor 1800.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 1800 and various circuits of the memory represented by the memory 1801 are linked together. The bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the processor 1800 is responsible for managing the bus architecture and general processing, and the memory 1801 can store data used by the processor 1800 when performing operations.
  • the processes disclosed in the embodiments of the present disclosure may be applied to the processor 1800 or implemented by the processor 1800.
  • each step of the signal processing flow can be completed by an integrated logic circuit of hardware in the processor 1800 or instructions in the form of software.
  • the processor 1800 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, and can implement or execute the The disclosed methods, steps and logic block diagrams.
  • the general-purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present disclosure may be directly embodied as executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 1801, and the processor 1800 reads the information in the memory 1801, and completes the steps of the signal processing flow in combination with its hardware.
  • the processor 1800 is configured to read a program in the memory 1801 and execute:
  • the processor restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id, including:
  • the number of bits corresponding to RA-RNTI is limited.
  • the processor restricting the value range of the index value t_id includes:
  • the positions of the time slots are numbered in order, and the number corresponding to the first time slot where the RO receiving the random access preamble is located is determined as the index value t_id.
  • the processor sequentially numbering the slot positions, including:
  • Subtract 1 from the sequence number corresponding to the slot position in the sorted sequence as the number of the slot position.
  • the processor corrects the formula for calculating RA-RNTI, including:
  • T1 is the corresponding RA-RNTI value range determined according to the bit range of the PUSCH scrambling sequence, and the number of index values t_id determined according to the RA-RNTI value range;
  • T2 is the value of the index value t_id determined according to the RA-RNTI The maximum value range, the difference between the maximum value of RA-RNTI under the preset subcarrier interval, and the number of determined index values t_id;
  • s_id is the first quadrature amplitude modulation OFDM symbol of the selected RO Index;
  • f_id is the index for selecting RO in the frequency domain;
  • ul_carrier_id is the identification code of the uplink carrier transmitting the random access preamble.
  • the processor receiving the random access preamble sent by the UE includes:
  • the total number of ROs selected by the receiving UE does not exceed the T1 or T2 radio frame configuration parameters, and the random access preamble sent by the radio frame configured according to the configuration parameters is used.
  • the processor restricts the number of bits corresponding to RA-RNTI by restricting the value range of the index value t_id in the calculation process, including:
  • RA-RNTI is calculated by using the modified index value t_id’;
  • the random access response message includes DCI and the PDSCH scheduled by the DCI, and the bits of the DCI carry the RA-RNTI identification index, and the RA-RNTI identification index is M is the modulus for performing modulo operation on the index value t_id.
  • the above-mentioned network-side device provided in the embodiment of the present disclosure and the network-side device provided in the above-mentioned embodiment 2 of the present disclosure belong to the same inventive concept, which is applied to the various implementations of the network-side device provided in the above-mentioned embodiment 2 and can be applied to this embodiment
  • the network side equipment in the implementation is implemented, and will not be repeated here.
  • the embodiments of the present disclosure also provide a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the random access method provided in the foregoing embodiments.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the modules is only a logical function division, and there may be other divisions in actual implementation, for example, multiple modules or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or modules, and may be in electrical, mechanical or other forms.
  • modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, that is, they may be located in one place, or they may be distributed on multiple network modules. Some or all of the modules can be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional modules in the various embodiments of the present disclosure may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software function modules. If the integrated module is implemented in the form of a software function module and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website site, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • wired such as coaxial cable, optical fiber, digital subscriber line (DSL)
  • wireless such as infrared, wireless, microwave, etc.
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • the embodiments of the present disclosure can be provided as a method, a system, or a computer program product. Therefore, the present disclosure may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, the present disclosure may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can direct a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé d'accès aléatoire, un équipement utilisateur (UE) et un dispositif côté réseau. Le procédé consiste à : envoyer un préambule d'accès aléatoire à un dispositif côté réseau, déterminer une valeur d'indice t_id d'un premier intervalle dans lequel se situe une RO sélectionnée, et calculer un RA-RNTI en fonction de t_id ; et envoyer des informations de transport de PUSCH au dispositif côté réseau au moyen d'un PUSCH qui est brouillé au moyen d'une séquence de brouillage correspondant au RA-RNTI, ou recevoir un message de réponse d'accès aléatoire qui est brouillé par le dispositif côté réseau au moyen du RA-RNTI calculé, et désembrouiller le message de réponse d'accès aléatoire au moyen du RA-RNTI calculé. Pendant le processus d'embrouillage/désembrouillage, un brouillage/désembrouillage est réalisé selon une formule de séquence de brouillage modifiée correspondante, et le nombre de bits correspondant à une séquence de brouillage générée est limité par une modification d'une formule de séquence de brouillage. La solution proposée dans la présente divulgation permet de résoudre le problème selon lequel un procédé de calcul d'un RA-RNTI ne peut pas s'appliquer à un scénario comportant une bande de fréquence de transmission de signal relativement grande pendant le processus d'accès aléatoire existant.
PCT/CN2021/095263 2020-06-16 2021-05-21 Procédé d'accès aléatoire, équipement utilisateur (ue) et dispositif côté réseau WO2021254095A1 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
CN202010550852.3 2020-06-16
CN202010550852 2020-06-16
CN202011125369.7 2020-10-20
CN202011125369.7A CN113811016A (zh) 2020-06-16 2020-10-20 一种随机接入方法和用户终端ue及网络侧设备
CN202110358267.8A CN113811017A (zh) 2020-06-16 2021-04-01 一种随机接入方法和用户终端ue及网络侧设备
CN202110358267.8 2021-04-01

Publications (1)

Publication Number Publication Date
WO2021254095A1 true WO2021254095A1 (fr) 2021-12-23

Family

ID=78892960

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/095263 WO2021254095A1 (fr) 2020-06-16 2021-05-21 Procédé d'accès aléatoire, équipement utilisateur (ue) et dispositif côté réseau

Country Status (2)

Country Link
CN (2) CN113811016A (fr)
WO (1) WO2021254095A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115052348A (zh) * 2021-03-09 2022-09-13 维沃移动通信有限公司 随机接入方法、装置、终端及存储介质
CN114269026B (zh) * 2022-03-01 2022-05-10 成都爱瑞无线科技有限公司 随机接入信号处理方法、随机接入方法、装置及存储介质
WO2023184529A1 (fr) * 2022-04-02 2023-10-05 Qualcomm Incorporated Sélection d'identifiant temporaire de réseau radio pour de multiples transmissions à accès aléatoire

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200077446A1 (en) * 2018-09-05 2020-03-05 Samsung Electronics Co., Ltd. Method and apparatus of performing random access on unlicensed carrier
CN111107662A (zh) * 2016-01-13 2020-05-05 中兴通讯股份有限公司 一种随机接入方法及装置
US20200146054A1 (en) * 2018-11-01 2020-05-07 Comcast Cable Communications, Llc Random Access Response Reception
CN111132364A (zh) * 2018-10-31 2020-05-08 华为技术有限公司 随机接入方法、装置、设备及存储介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3089542B1 (fr) * 2014-01-24 2021-06-09 Huawei Technologies Co., Ltd. Procédé et dispositif d'accès aléatoire
CN109495222B (zh) * 2017-09-11 2021-06-15 大唐移动通信设备有限公司 一种ra-rnti确定方法及装置
CN109600198A (zh) * 2017-09-30 2019-04-09 株式会社Ntt都科摩 加扰方法、用于发送rnti的方法及相应的装置
CN110035485B (zh) * 2018-01-11 2022-11-22 华为技术有限公司 上行信息的传输方法和装置
WO2020020278A1 (fr) * 2018-07-25 2020-01-30 Oppo广东移动通信有限公司 Procédé d'accès aléatoire et dispositif de communication
CN111182648B (zh) * 2019-01-18 2022-05-17 维沃软件技术有限公司 一种随机接入传输方法及终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111107662A (zh) * 2016-01-13 2020-05-05 中兴通讯股份有限公司 一种随机接入方法及装置
US20200077446A1 (en) * 2018-09-05 2020-03-05 Samsung Electronics Co., Ltd. Method and apparatus of performing random access on unlicensed carrier
CN111132364A (zh) * 2018-10-31 2020-05-08 华为技术有限公司 随机接入方法、装置、设备及存储介质
US20200146054A1 (en) * 2018-11-01 2020-05-07 Comcast Cable Communications, Llc Random Access Response Reception

Also Published As

Publication number Publication date
CN113811016A (zh) 2021-12-17
CN113811017A (zh) 2021-12-17

Similar Documents

Publication Publication Date Title
US10952255B2 (en) PUSCH transmission using an aggregation factor
WO2021254095A1 (fr) Procédé d'accès aléatoire, équipement utilisateur (ue) et dispositif côté réseau
CN104602359B (zh) 在无线通信系统中处理随机接入的方法
US11539422B2 (en) Beam management method, terminal, network device, and storage medium
CN112567874B (zh) 基于空闲信道评估的带宽部分配置
EP3562239A1 (fr) Procédé et appareil de communication
US20180310329A1 (en) Apparatus and Method for Random Access and Data Transmission and Communication System
US11601248B2 (en) Communication method and communications apparatus
EP4192164A1 (fr) Procédé de détermination de ressources de domaine fréquentiel, dispositif, et support de stockage
WO2021159856A1 (fr) Procédé pour réaliser une communication sur la base de la capacité d'ue, et ue et dispositif côté réseau
EP4184969A1 (fr) Procédé d'amélioration de canal physique de commande de liaison descendante, dispositif de communication et système
WO2022151868A1 (fr) Procédé et appareil de détermination de fenêtre de groupage de signal dmrs et support de stockage
WO2020029983A1 (fr) Procédé d'envoi et de réception d'un préambule d'accès aléatoire, et appareil de communication
CN116746084A (zh) 与物理上行链路共享信道重复相关的方法、用户设备和网络设备
US20220140972A1 (en) Uplink Reference Signal Sending Method, Uplink Reference Signal Receiving Method, And Apparatus
WO2020052573A1 (fr) Procédé et appareil de communication, et support de stockage informatique
WO2020164013A1 (fr) Procédé et dispositif de transmission d'informations et procédé et dispositif de réception d'informations
WO2022152068A1 (fr) Procédé de détermination de ressources, dispositif de communication et support de stockage
US20240030964A1 (en) Communication method and apparatus
US20200067644A1 (en) Data feedback method and related device
EP4080972A1 (fr) Procédé et dispositif de communication
WO2021030967A1 (fr) Procédé et appareil permettant de recevoir une réponse d'accès aléatoire et procédé et appareil permettant d'envoyer une réponse d'accès aléatoire dans un accès aléatoire en deux étapes
WO2021056581A1 (fr) Procédé et appareil d'envoi et de réception de signaux de liaison montante
TWI769324B (zh) 傳輸資料的方法、終端設備和網路設備
WO2020211095A1 (fr) Procédé et dispositif de brouillage de signal et dispositif de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21824986

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21824986

Country of ref document: EP

Kind code of ref document: A1