WO2022116099A1 - 随机接入的触发控制方法、装置、设备及存储介质 - Google Patents

随机接入的触发控制方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2022116099A1
WO2022116099A1 PCT/CN2020/133662 CN2020133662W WO2022116099A1 WO 2022116099 A1 WO2022116099 A1 WO 2022116099A1 CN 2020133662 W CN2020133662 W CN 2020133662W WO 2022116099 A1 WO2022116099 A1 WO 2022116099A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
step random
bsr
execution
trigger
Prior art date
Application number
PCT/CN2020/133662
Other languages
English (en)
French (fr)
Inventor
李海涛
胡奕
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2020/133662 priority Critical patent/WO2022116099A1/zh
Priority to CN202080105257.7A priority patent/CN116097880A/zh
Publication of WO2022116099A1 publication Critical patent/WO2022116099A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • the embodiments of the present application relate to the field of communications technologies, and in particular, to a random access trigger control method, apparatus, device, and storage medium.
  • the random access process is divided into two types: contention-based random access process and non-contention-based random access process.
  • the contention-based random access process is divided into 4 steps, and the non-contention-based random access process is divided into 2 steps .
  • the triggering method for the non-contention-based random access process needs further research and discussion.
  • Embodiments of the present application provide a random access trigger control method, apparatus, device, and storage medium.
  • the technical solution is as follows:
  • a random access trigger control method which is applied to a terminal device, and the method includes:
  • the first logical channel triggers a BSR (Buffer Status Report, buffer status report)
  • BSR Buffer Status Report, buffer status report
  • a random access triggering control method is provided, which is applied to a network device, and the method includes:
  • the network configuration information is used to determine whether to trigger a 2-step random access procedure when the first logical channel of the terminal device triggers the buffer status report BSR.
  • a random access trigger control device comprising:
  • the trigger control module is configured to determine, based on the network configuration information, whether to trigger the execution of the 2-step random access procedure when the first logical channel triggers the buffer status report BSR.
  • a random access trigger control device comprising:
  • an information sending module used for sending network configuration information to the terminal device
  • the network configuration information is used to determine whether to trigger a 2-step random access procedure when the first logical channel of the terminal device triggers the buffer status report BSR.
  • a terminal device includes a processor; wherein:
  • the processor is configured to determine, based on the network configuration information, whether to trigger the execution of the 2-step random access procedure when the buffer status report BSR is triggered by the first logical channel.
  • a network device includes a processor and a transceiver connected to the processor; wherein:
  • the transceiver configured to send network configuration information to the terminal device
  • the network configuration information is used to determine whether to trigger a 2-step random access procedure when the first logical channel of the terminal device triggers the buffer status report BSR.
  • a computer-readable storage medium where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a terminal device to implement the above-mentioned terminal device-side Trigger control method for random access.
  • a computer-readable storage medium where a computer program is stored in the storage medium, and the computer program is configured to be executed by a processor of a network device to implement the above-mentioned network device-side storage medium. Trigger control method for random access.
  • a chip is provided, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a terminal device, it is used to realize the random connection on the terminal device side. Input trigger control method.
  • a chip is provided, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a network device, it is used to realize the random connection on the network device side. Input trigger control method.
  • a computer program product when the computer program product runs on a processor of a terminal device, the terminal device is made to execute the above-mentioned trigger control method for random access on the terminal device side.
  • a computer program product which, when the computer program product runs on a processor of a network device, enables the network device to execute the foregoing method for triggering control of random access on the network device side.
  • Whether to trigger a 2-step random access process is determined by using network configuration information, and an embodiment of the present application provides a method for controlling a terminal device to trigger a 2-step random access process.
  • the embodiment of the present application can achieve more Fine-grained control of the frequency at which the terminal device triggers the 2-step random access process, thereby reducing the resource conflict probability of the 2-step random access process while taking into account the shortening of resource request delay.
  • FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a network architecture provided by another embodiment of the present application.
  • FIG. 3 is a schematic diagram of a network architecture provided by another embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a 4-step random access process provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a 2-step random access process provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a terminal device requesting uplink scheduling process provided by an embodiment of the present application
  • FIG. 7 is a flowchart of a triggering control method for random access provided by an embodiment of the present application.
  • FIG. 8 is a flowchart of a triggering control method for random access provided by another embodiment of the present application.
  • FIG. 9 is a sequence diagram of a BSR sending process provided by an embodiment of the present application.
  • FIG. 10 is a block diagram of an apparatus for triggering control of random access provided by an embodiment of the present application.
  • FIG. 11 is a block diagram of an apparatus for triggering random access provided by another embodiment of the present application.
  • FIG. 12 is a block diagram of an apparatus for triggering random access provided by another embodiment of the present application.
  • FIG. 13 is a block diagram of an apparatus for triggering random access provided by another embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 15 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the network architecture and service scenarios described in the embodiments of the present application are for the purpose of illustrating the technical solutions of the embodiments of the present application more clearly, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application.
  • the evolution of new business scenarios and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
  • FIG. 1 shows a schematic diagram of a network architecture provided by an embodiment of the present application.
  • the network architecture may include: a network device 10 and a terminal device 20 .
  • the network device 10 is a device for providing a wireless communication service for the terminal device 20 .
  • a connection can be established between the network device 10 and the terminal device 20, so as to communicate through the connection, including the interaction of signaling and data.
  • the number of network devices 10 may be multiple, and communication between two adjacent network devices 10 may also be performed in a wired or wireless manner.
  • the terminal device 20 can switch between different network devices 10 , that is, establish connections with different network devices 10 .
  • the network device 10 in the NTN network may be a satellite 11 .
  • a satellite 11 can cover a certain range of ground areas and provide wireless communication services for terminal devices 20 on the ground areas.
  • the satellites 11 can orbit around the earth, and by arranging a plurality of satellites 11, communication coverage of different areas on the earth's surface can be achieved.
  • Satellite communication is not limited by the user's geographical area.
  • general terrestrial communication cannot cover areas such as oceans, mountains, deserts, etc. where communication equipment cannot be set up or cannot be covered due to sparse population.
  • satellite communication due to a single Satellites can cover a large ground, and satellites can orbit around the earth, so theoretically every corner of the earth can be covered by satellite communications.
  • satellite communication has great social value. Satellite communications can be covered at low cost in remote mountainous areas and poor and backward countries or regions, so that people in these regions can enjoy advanced voice communication and mobile Internet technologies, which is conducive to narrowing the digital divide with developed regions and promoting development in these areas.
  • the satellite communication distance is long, and the communication cost does not increase significantly when the communication distance increases; finally, the satellite communication has high stability and is not limited by natural disasters.
  • Communication satellites are classified into LEO (Low-Earth Orbit, low earth orbit) satellites, MEO (Medium-Earth Orbit, medium earth orbit) satellites, GEO (Geostationary Earth Orbit, geosynchronous orbit) satellites, HEO (High Earth orbit) satellites according to the different orbital altitudes. Elliptical Orbit, high elliptical orbit) satellites, etc.
  • LEO Low-Earth Orbit, low earth orbit
  • MEO Medium-Earth Orbit, medium earth orbit
  • GEO Global-Earth Orbit, geosynchronous orbit
  • HEO High Earth orbit
  • the altitude range of low-orbit satellites is 500km to 1500km, and the corresponding orbital period is about 1.5 hours to 2 hours.
  • the signal propagation delay of single-hop communication between users is generally less than 20ms.
  • the maximum satellite viewing time is 20 minutes.
  • the signal propagation distance is short, the link loss is small, and the transmit power requirements of the user terminal equipment are not high.
  • the signal propagation delay of single-hop communication between users is generally 250ms.
  • satellites use multiple beams to cover the ground.
  • a satellite can form dozens or even hundreds of beams to cover the ground; a satellite beam can cover tens to hundreds of kilometers in diameter. ground area.
  • the network device 10 in the cellular communication network may be the base station 12 .
  • the base station 12 is a device deployed in an access network to provide a wireless communication function for the terminal device 20 .
  • Base stations 12 may include various forms of macro base stations, micro base stations, relay stations, access points, and the like.
  • the names of devices with base station functions may be different, for example, in 5G NR (New Radio, New Radio) systems, they are called gNodeB or gNB.
  • the name "base station” may change.
  • the above-mentioned apparatuses for providing wireless communication functions for the terminal device 20 are collectively referred to as base stations.
  • the terminal device 20 involved in the embodiments of the present application may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to wireless modems, as well as various forms of user Equipment (User Equipment, UE), mobile station (Mobile Station, MS), terminal equipment (terminal device) and so on.
  • UE User Equipment
  • MS Mobile Station
  • terminal device terminal equipment
  • the terminal equipment enables the serving base station to know the uplink buffered data volume of the terminal equipment through the BSR, so that the base station can schedule the terminal equipment according to the data volume information provided by the terminal equipment.
  • the method of packet reporting is adopted.
  • Each uplink logical channel corresponds to an LCG (Logical Channel Group, logical channel group), and multiple uplink logical channels can correspond to the same LCG.
  • the correspondence between LC (Logical Channel, logical channel) and LCG is determined by the network device through RRC ( Radio Resource Control, radio resource control) signaling configuration.
  • the terminal device reports the BSR based on the LCG.
  • Each terminal device in NR can support up to 8 LCGs.
  • the trigger conditions of BSR are as follows:
  • Regular BSR regular BSR
  • the padding (padding) part of the uplink resources allocated for the terminal equipment can carry the BSR MAC (Medium Access Control, medium access control) CE (Control Element, control unit) after carrying other uplink data. Issue a Padding BSR.
  • BSR MAC Medium Access Control, medium access control
  • CE Control Element, control unit
  • Periodic BSR-Timer timeout will trigger Periodic BSR (periodic BSR).
  • each of those logical channels triggers a separate Regular BSR.
  • the BSR is carried through the BSR MAC CE.
  • the terminal device triggers an SR (Scheduling Request, scheduling request).
  • the terminal device applies to the network device for uplink resources through the SR.
  • the network device does not know when the terminal device needs to send uplink data, that is, when the terminal device will send the SR. Therefore, the network device can allocate periodic PUCCH (Physical Uplink Control Channel, Physical Uplink Control Channel) resources for transmitting SR to the terminal device, and then the network device detects whether there is an SR report on the allocated SR resources.
  • PUCCH Physical Uplink Control Channel, Physical Uplink Control Channel
  • the network device may choose whether to configure the PUCCH resource for transmitting the SR for the uplink logical channel.
  • the network device may choose whether to configure the PUCCH resource for transmitting the SR for the uplink logical channel.
  • the terminal device sends an SR on the PUCCH resource corresponding to the logical channel for transmitting an SR; Otherwise, the terminal device initiates random access.
  • the network device may configure multiple PUCCH resources for transmitting the SR for the terminal device. For an uplink logical channel, if the network device configures the PUCCH resource for transmitting SR for the uplink logical channel, on each uplink BWP (Bandwidth Part, part of the bandwidth), the network device configures at most one for the logical channel for PUCCH resource for transmitting SR.
  • the network device configures the PUCCH resource for transmitting SR for the terminal device. For an uplink logical channel, if the network device configures the PUCCH resource for transmitting SR for the uplink logical channel, on each uplink BWP (Bandwidth Part, part of the bandwidth), the network device configures at most one for the logical channel for PUCCH resource for transmitting SR.
  • BWP Bandwidth Part, part of the bandwidth
  • Each PUCCH resource used for transmitting SR corresponds to the following configuration parameters: PUCCH resource period and slot/time symbol offset; PUCCH resource index.
  • the random access process is mainly triggered by the following events:
  • the wireless connection is established when the UE initially accesses: the UE changes from the RRC_IDLE (RRC idle) state to the RRC_CONNECTED (RRC connected) state;
  • RRC connection re-establishment process so that the UE can re-establish the radio connection after the radio link fails;
  • Handover UE needs to establish uplink synchronization with the new cell
  • the DL (Down Link, downlink) data arrives, and the UL (Up Link, uplink) is in an out-of-sync state at this time;
  • the UL data arrives, and the UL is in an out-of-sync state or there is no PUCCH resource for sending SR;
  • the UE transitions from the RRC_INACTIVE (RRC inactive) state to the RRC_CONNECTED state;
  • FIG. 4 shows a schematic diagram of a 4-step random access process.
  • the contention-based random access process shown in Figure 4 is divided into four steps, and the detailed steps are as follows:
  • Step 401 The terminal device sends Msg1 (Message1, message 1) to the network device.
  • Step 402 The network device sends Msg2 (Message2, message 2) to the terminal device, that is, the network device sends an RAR (Random Access Response, random access response) to the terminal device.
  • Msg2 Message2, message 2
  • RAR Random Access Response, random access response
  • Step 403 The terminal device transmits Msg3 (Message3, message 3) on the network scheduling resource.
  • Msg3 is mainly used to inform the network device what event triggers the random access process. For example, if it is an initial access random process, the UE ID (Identity, identity) and establishment cause (establishment cause) will be carried in Msg3; if it is RRC reestablishment, it will carry the connected state UE identity and establishment cause.
  • Step 404 The network device sends Msg4 (Message4, message 4) to the terminal device.
  • Msg4 has two functions, one is for contention conflict resolution, and the other is for the network device to transmit the RRC configuration message to the terminal device.
  • FIG. 5 shows a schematic diagram of a 2-step random access process
  • the non-contention-based random access process shown in Figure 5 is divided into 2 steps, and the detailed steps are as follows:
  • the NR Rel-16 version introduces a 2-step random access process, which can reduce delay and signaling overhead.
  • Step 501 the terminal device sends the MsgA to the network device.
  • MsgA (MessageA, Message A) in 2-step random access includes Preamble (preamble) transmitted on PRACH (Physical Random-Access Channel, physical random access channel) and PUSCH (Physical Uplink Shared Channel, Physical Uplink Shared Channel) ); in step 502, the network device sends indication information that the contention conflict is successfully resolved to the terminal device.
  • PRACH Physical Random-Access Channel
  • PUSCH Physical Uplink Shared Channel
  • the terminal device After MsgA is transmitted, the terminal device monitors the response from the network device side in the configured window, and if it receives the MsgB (indication of successful contention and conflict resolution) sent by the network device, the terminal device ends the random access process, as shown in Figure 5 If a fallback indication is received in MsgB (MessageB, message B), the terminal device executes the transmission of Msg3 and monitors the contention conflict resolution result. If the contention resolution is unsuccessful after the transmission of Msg3, the terminal continues the transmission of MsgA.
  • MsgB indication of successful contention and conflict resolution
  • the UE when the UE has uplink data arriving, but the UE does not have uplink resources for data transmission, the UE needs to go through the following five steps to send the data to the network device, as shown in Figure 6.
  • Step 601 the UE sends an SR to request an uplink resource from a network device.
  • the network device receives the SR and knows that the UE needs uplink resources for transmitting uplink data, but the network device does not know how much uplink data the UE needs to send, so the network device usually allocates enough resources to the UE to send the BSR. PUSCH resources.
  • Step 603 the UE sends a BSR on the PUSCH resource allocated by the network device, thereby informing the network device of the amount of data that the UE needs to send.
  • Step 604 the network device allocates appropriate PUSCH resources for the UE for uplink data transmission according to the BSR information reported by the UE.
  • Step 605 the UE transmits uplink data on the PUSCH resource allocated by the network device.
  • the signal transmission delay between the UE and the network equipment is very small, and the waiting time from when the UE has uplink data to when the UE sends the data to the network equipment is generally short, which has little impact on the service delay.
  • the signal propagation delay between the UE and the satellite in NTN is greatly increased. Therefore, when the UE has uplink data arriving, but the UE has no uplink resources for data transmission, the UE needs to wait. It takes a relatively long time to send the data to the network device, which leads to a significant increase in service delay and affects user experience.
  • CG Configured Grant, configuration grant
  • 2-step random access process can be used to report BSR to reduce uplink scheduling delay.
  • the terminal device will not trigger the SR, and will not trigger the random access process further. Since the RACH resources used for CBRA (Contention Based Random Access, contention-based random access) are shared by all UEs in the cell, if a large number of UEs directly use 2-step random access, it may increase RACH, especially PUSCH conflicts between UEs At the same time, the capacity of 2-step random access is limited. Therefore, relevant mechanisms need to be studied to further limit the use of 2-step random access.
  • CBRA Contention Based Random Access, contention-based random access
  • FIG. 7 shows a flowchart of a random access trigger control method provided by an embodiment of the present application.
  • the method can be applied to the network architecture shown in FIG. 1 to FIG. 3 , and the above method may include the following steps.
  • Step 701 the network device sends network configuration information to the terminal device.
  • Step 702 in the case that the first logical channel triggers the BSR, the terminal device determines whether to trigger the execution of the 2-step random access procedure based on the network configuration information.
  • the first logical channel may be any logical channel.
  • a logical channel is a channel that transmits different types of information on a physical channel, and can be divided into a control channel and a traffic channel.
  • the control channel is used to transmit control plane information
  • the traffic channel is used to transmit user plane information.
  • the control channel is used to transmit signaling or synchronization data
  • the traffic channel is used to transmit coded and encrypted voice or data.
  • the logical channels can be divided into eight logical channel groups at most, and are reported in groups.
  • the BSR includes any one of the following: regular BSR, periodic BSR, and padding BSR.
  • the first logical channel triggers a regular BSR; in another example, the first logical channel triggers a periodic BSR; in another example, the first logical channel triggers a padding BSR.
  • the type of BSR triggered by the channel is not limited.
  • the network configuration information is configuration information provided by the serving cell of the terminal device.
  • the network configuration information is used to determine whether to trigger the execution of the 2-step random access procedure when the first logical channel of the terminal device triggers the BSR.
  • the terminal device may determine whether to trigger the execution of the 2-step random access procedure in the following manner:
  • the terminal device determines whether to trigger the execution of the 2-step random access process based on whether it receives the network configuration information sent by the network device. Network configuration information is not sent to terminal devices, which saves transmission resources.
  • the network configuration information includes first indication information, where the first indication information is used to indicate that, in the case of triggering the BSR, the execution of the 2-step random access procedure is triggered.
  • the network configuration information includes attribute information of the first logical channel, and the attribute information of the first logical channel is used to indicate that when the first logical channel triggers the BSR, the execution of the 2-step random access procedure is triggered. If the terminal device receives the attribute information of the first logical channel, it is determined to trigger the execution of the 2-step random access process; if the terminal device does not receive the attribute information of the first logical channel, it is determined not to trigger the execution of the 2-step random access process. In this case, step 701 is executed when the network device determines that the terminal device triggers the execution of the 2-step random access procedure, and is not executed when the network device determines that the terminal device does not trigger the execution of the 2-step random access procedure.
  • the network configuration information includes first indication information; when the first indication information is the first value, the terminal device determines to trigger the execution of the 2-step random access procedure; when the first indication information is the second value In the case of the value, the terminal device determines not to trigger the execution of the 2-step random access procedure.
  • the first indication information may be represented by 1 bit (bit), the first value may be 1, and the second value may be 0. In the case where the first indication information is 1, it is determined to trigger the execution of 2 random steps. Access process; in the case that the first indication information is 0, it is determined that the execution of the 2-step random access process is not triggered.
  • the first indication information may also be represented by more bits, for example, represented by 2 bits, 3 bits or more bits; the first value and the second value may also be other values. value, which can be set according to the actual scene, and the embodiment of the present application does not limit the representation form of the first indication information and the value manners of the first value and the second value.
  • the network configuration information includes configuration information of a 2-step random access resource dedicated to transmitting the BSR.
  • the terminal device determines to trigger the execution of the 2-step random access process; on the network side, the terminal device is not configured with a 2-step random access resource dedicated to transmitting BSR.
  • the terminal device determines not to trigger the execution of the 2-step random access procedure.
  • the network side configures the terminal equipment with 2-step random access resources dedicated to transmitting BSR, it means that the terminal equipment is allowed to directly trigger the execution of the 2-step random access process; In the case of transmitting the 2-step random access resource of the BSR, it means that the terminal device is not allowed to directly trigger the execution of the 2-step random access procedure.
  • the network configuration information includes attribute information of the first logical channel; when the attribute information of the first logical channel is the third value, the terminal device determines to trigger the execution of the 2-step random access procedure; When the attribute information of the logical channel is the fourth value, the terminal device determines not to trigger the execution of the 2-step random access procedure.
  • the attribute information of the first logical channel may be extended in the configuration of the first logical channel.
  • the attribute information of the first logical channel may be represented by 1 bit (bit), the third value may be 1, and the fourth value may be 0.
  • the attribute information of the first logical channel is 1, It is determined that the execution of the 2-step random access procedure is triggered; in the case that the attribute information of the first logical channel is 0, it is determined that the execution of the 2-step random access procedure is not triggered.
  • the attribute information of the first logical channel may also be represented by more bits, for example, represented by 2 bits, 3 bits or more bits; the third value and the fourth value may also be other The value can be set according to the actual scene, and the embodiment of the present application does not limit the representation form of the first logical channel and the value manners of the third value and the fourth value.
  • the network configuration information includes a first BSR threshold value; when the sum of the amounts of data to be transmitted of the respective logical channels of the terminal device is less than the first BSR threshold value, the terminal device determines to trigger the execution of 2-step random Access process: in the case that the sum of the amounts of data to be transmitted on each logical channel of the terminal device is greater than the first BSR threshold value, the terminal device determines not to trigger the execution of the 2-step random access process.
  • the first BSR threshold value is used to indicate the threshold value of the sum total of data amounts to be transmitted of all logical channels of the terminal device.
  • the terminal device determines to trigger the execution of the 2-step random access procedure; when When the sum of the amount of data to be transmitted on each logical channel of the terminal device is greater than the first BSR threshold, it indicates that the terminal device cannot transmit data through the logical channel. At this time, the terminal device determines not to trigger the execution of the 2-step random access procedure.
  • the 2-step random access process can be used more effectively to report the BSR of the to-be-transmitted data as soon as possible, and to complete the transmission of the to-be-transmitted data as soon as possible.
  • the BSR is reported as soon as possible through the 2-step random access process, it may still require multiple transmissions to complete the amount of data to be transmitted, so it cannot reflect the triggering of the 2-step random access process.
  • the network configuration information includes a second BSR threshold value configured for the first logical channel; in the case that the amount of data to be transmitted on the first logical channel is less than the second BSR threshold value, it is determined to trigger the execution of step 2 Random access process; in the case that the amount of data to be transmitted on the first logical channel is greater than the second BSR threshold value, it is determined that the execution of the 2-step random access process is not triggered.
  • the second BSR threshold value is used to indicate the threshold value of the amount of data to be transmitted on the first logical channel of the terminal device. When the amount of data to be transmitted on the first logical channel is less than the second BSR threshold, it indicates that the terminal device can transmit data through the first logical channel.
  • the terminal device determines to trigger the execution of the 2-step random access procedure; when the first logical channel
  • the terminal device determines not to trigger the execution of the 2-step random access procedure.
  • the execution of the 2-step random access process can be triggered, and the 2-step random access process can be used more effectively to report the BSR of the data to be transmitted on the first logical channel as soon as possible, and to complete the first logical channel as soon as possible. Transmission of data to be transmitted for a logical channel.
  • the network device sends an RSRP (Reference Signal Received Power, reference signal received power) threshold value to the terminal device.
  • the terminal device can also determine whether to trigger the execution of the 2-step random access procedure based on the RSRP threshold value; if it is determined to trigger the execution of the 2-step random access procedure based on the network configuration information, and also determine to trigger the execution of the 2-step random access procedure based on the RSRP threshold value. access procedure, then it is determined to trigger the execution of the 2-step random access procedure.
  • RSRP Reference Signal Received Power, reference signal received power
  • the terminal device uses the resource dedicated to transmitting BSR.
  • the 2-step random access resource transmits the BSR triggered by the first logical channel.
  • the network device receives the BSR triggered from the first logical channel transmitted by the terminal device using the 2-step random access resource dedicated to transmitting the BSR.
  • the public 2-step random access when it is determined to trigger the execution of the 2-step random access process, if the network side does not configure the terminal equipment with 2-step random access resources dedicated to transmitting BSR, the public 2-step random access is used.
  • the resource transmits the BSR triggered by the first logical channel.
  • the network device receives the BSR triggered by the first logical channel transmitted from the terminal device using the common 2-step random access resource.
  • the public 2-step random access resource can transmit other information, such as beam failure recovery request, in addition to the BSR.
  • FIG. 8 shows a flowchart of a random access trigger control method provided by another embodiment of the present application.
  • the method can be applied to a terminal device, and the method can include the following steps:
  • Step 801 when new data arrives on the first logical channel, a regular BSR is triggered.
  • Step 802 the terminal device determines whether the regular BSR triggers a 2-step random access procedure based on the network configuration information. If the terminal device determines based on the network configuration information that the regular BSR triggers the 2-step random access process, then go to step 803; if the terminal device determines based on the network configuration information that the regular BSR does not trigger the two-step random access process, then execute from step 804 .
  • Step 803 the terminal device performs a 2-step random access procedure.
  • Step 804 the terminal device determines whether there is an uplink resource for initial transmission; if the terminal device determines that there is an uplink resource for initial transmission, execute step 805; if the terminal device determines that there is no uplink resource for initial transmission, start from step 806 implement.
  • Step 805 the terminal device sends a regular BSR to the network device using the initially transmitted uplink resource.
  • Step 806 the terminal device triggers the SR.
  • Step 807 the terminal device has no PUCCH resources available for SR transmission, and triggers a random access procedure.
  • whether to trigger the 2-step random access process is determined through network configuration information
  • the embodiments of the present application provide a method for controlling a terminal device to trigger the 2-step random access process.
  • the embodiments of the present application introduce network configuration information and determine whether to trigger the 2-step random access process based on the network configuration information.
  • the embodiments of the present application can achieve more Fine-grained control of the frequency at which the terminal device triggers the 2-step random access process, thereby reducing the resource conflict probability of the 2-step random access process while taking into account the shortening of resource request delay.
  • the terminal device may further perform the following steps: after determining to trigger the execution of the 2-step random access procedure, if there is an available uplink grant before the MsgA of the 2-step random access procedure, pass the available uplink It is authorized to report the BSR triggered by the first logical channel, and after the reporting of the BSR triggered by the first logical channel is completed, the BSR triggered by the first logical channel is cancelled, and the 2-step random access process is cancelled.
  • the network device receives the BSR triggered by the first logical channel reported by the terminal device through the available uplink grant.
  • the terminal device may further perform the following steps: after determining to trigger the execution of the 2-step random access procedure, if there is no available uplink grant before the MsgA in the 2-step random access procedure, report the first A BSR triggered by a logical channel, and after the reporting of the BSR triggered by the first logical channel is completed, the BSR triggered by the first logical channel is canceled.
  • the network device receives the BSR triggered by the first logical channel reported by the terminal device through the MsgA.
  • the available uplink grants include at least one of the following: dynamically scheduled uplink grants, Msg3 in the 4-step random access process, and configuration grants CG resources.
  • the terminal device cancels the 2-step random access procedure.
  • FIG. 9 shows a sequence diagram of a BSR sending process provided by an embodiment of the present application.
  • the first logical channel of the terminal device triggers a regular BSR, which in turn triggers a 2-step random access process;
  • the terminal device cancels the 2-step random access process triggered at time T1. Step random access procedure.
  • FIG. 10 shows a block diagram of an apparatus for triggering control of random access provided by an embodiment of the present application.
  • the apparatus has the function of implementing the above-mentioned method example on the terminal device side, and the function may be implemented by hardware or by executing corresponding software in hardware.
  • the apparatus may be a terminal device, or may be set in the terminal device.
  • the apparatus 1000 may include: a trigger control module 1010 .
  • the trigger control module 1010 is configured to determine, based on the network configuration information, whether to trigger the execution of the 2-step random access procedure when the first logical channel triggers the buffer status report BSR.
  • whether to trigger the 2-step random access process is determined through network configuration information
  • the embodiments of the present application provide a method for controlling a terminal device to trigger the 2-step random access process.
  • the embodiments of the present application introduce network configuration information and determine whether to trigger the 2-step random access process based on the network configuration information.
  • the embodiments of the present application can achieve more Fine-grained control of the frequency at which the terminal device triggers the 2-step random access process, thereby reducing the resource conflict probability of the 2-step random access process while taking into account the shortening of resource request delay.
  • the trigger control module 1010 is used to:
  • the network configuration information includes first indication information, where the first indication information is used to indicate that in the case of triggering the BSR, trigger the execution of the 2-step random access procedure;
  • the network configuration information includes attribute information of the first logical channel, where the attribute information of the first logical channel is used to indicate that the execution of the 2-step random access is triggered when the first logical channel triggers the BSR process.
  • the network configuration information includes first indication information;
  • the trigger control module 1010 is used for:
  • the first indication information is the first value, it is determined to trigger the execution of the 2-step random access procedure
  • the first indication information is the second value, it is determined that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes configuration information of a 2-step random access resource dedicated to transmitting BSR;
  • the trigger control module 1010 is used for:
  • the terminal device is configured with the 2-step random access resource dedicated to transmitting the BSR on the network side, determining to trigger the execution of the 2-step random access procedure;
  • the terminal device In the case that the terminal device is not configured with the 2-step random access resource dedicated to transmitting the BSR on the network side, it is determined that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes attribute information of the first logical channel
  • the trigger control module 1010 is used for:
  • the attribute information of the first logical channel is the third value, it is determined to trigger the execution of the 2-step random access procedure
  • the attribute information of the first logical channel is the fourth value, it is determined that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes a first BSR threshold
  • the trigger control module 1010 is used for:
  • the network configuration information includes a second BSR threshold value configured for the first logical channel
  • the trigger control module 1010 is used for:
  • the amount of data to be transmitted on the first logical channel is greater than the second BSR threshold value, it is determined that the execution of the 2-step random access procedure is not triggered.
  • the trigger control module 1010 is further configured to:
  • the apparatus further includes: a data transmission module 1020 for:
  • the 2-step random access resource dedicated to transmitting BSR is used. access resources to transmit the BSR triggered by the first logical channel;
  • the terminal equipment is not configured with 2-step random access resources dedicated to transmitting BSRs on the network side, the common 2-step random access resources are used to transmit the BSR triggered by the first logical channel.
  • the apparatus further includes: a data transmission module 1020 for:
  • the available uplink grant is used to report the trigger of the first logical channel.
  • BSR and after the reporting of the BSR triggered by the first logical channel is completed, cancel the BSR triggered by the first logical channel, and cancel the 2-step random access process.
  • the apparatus further includes: a data transmission module 1020 for:
  • the BSR triggered by the first logical channel is reported through the MsgA, and After the reporting of the BSR triggered by the first logical channel is completed, the BSR triggered by the first logical channel is canceled.
  • the available uplink grants include at least one of the following: dynamically scheduled uplink grants, Msg3 in a 4-step random access procedure, and configuration grants CG resources.
  • the network configuration information is configuration information provided by a serving cell of the terminal device.
  • the BSR includes any one of the following: a regular BSR, a periodic BSR, and a padding BSR.
  • FIG. 12 shows a block diagram of an apparatus for triggering random access provided by another embodiment of the present application.
  • the apparatus has the function of implementing the foregoing method example on the network device side, and the function may be implemented by hardware, or by executing corresponding software in hardware.
  • the apparatus may be a network device, or may be set in the network device.
  • the apparatus 1200 may include: an information sending module 1210 .
  • an information sending module 1210 configured to send network configuration information to the terminal device
  • the network configuration information is used to determine whether to trigger a 2-step random access procedure when the first logical channel of the terminal device triggers the buffer status report BSR.
  • whether to trigger the 2-step random access process is determined through network configuration information
  • the embodiments of the present application provide a method for controlling a terminal device to trigger the 2-step random access process.
  • the embodiments of the present application introduce network configuration information and determine whether to trigger the 2-step random access process based on the network configuration information.
  • the embodiments of the present application can achieve more Fine-grained control of the frequency at which the terminal device triggers the 2-step random access process, thereby reducing the resource conflict probability of the 2-step random access process while taking into account the shortening of resource request delay.
  • the terminal device if the network device sends the network configuration information to the terminal device, the terminal device is instructed to trigger the execution of the 2-step random access procedure when a BSR is triggered;
  • the network device does not send the network configuration information to the terminal device, it indicates to the terminal device that the execution of the 2-step random access procedure is not triggered when the BSR is triggered.
  • the network configuration information includes first indication information, where the first indication information is used to indicate that in the case of triggering the BSR, trigger the execution of the 2-step random access procedure;
  • the network configuration information includes attribute information of the first logical channel, where the attribute information of the first logical channel is used to indicate that the execution of the 2-step random access is triggered when the first logical channel triggers the BSR process.
  • the network configuration information includes first indication information
  • the first indication information is the first value, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the first indication information is the second value, it is used to indicate that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes configuration information of a 2-step random access resource dedicated to transmitting BSR;
  • the network side configures the terminal device with the 2-step random access resource dedicated to transmitting the BSR, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the network side When the network side does not configure the terminal equipment with the 2-step random access resource dedicated to transmitting the BSR, it is used to indicate that the execution of the 2-step random access process is not triggered.
  • the network configuration information includes attribute information of the first logical channel
  • the attribute information of the first logical channel is the third value, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the attribute information of the first logical channel is the fourth value, it is used to indicate that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes a first BSR threshold
  • the sum of the amounts of data to be transmitted of the respective logical channels of the terminal device is less than the first BSR threshold value, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the sum of the amounts of data to be transmitted of the respective logical channels of the terminal device is greater than the first BSR threshold value, it is used to indicate that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes a second BSR threshold value configured for the first logical channel
  • the amount of data to be transmitted on the first logical channel is less than the second BSR threshold value, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the amount of data to be transmitted on the first logical channel is greater than the second BSR threshold, it is used to indicate that the execution of the 2-step random access procedure is not triggered.
  • the apparatus further includes: a threshold value sending module 1220, configured to:
  • the terminal device determines Trigger to execute the 2-step random access procedure.
  • the apparatus further includes: a data receiving module 1230 for:
  • the terminal device determines to trigger the execution of the 2-step random access procedure, if the network side configures the terminal device with 2-step random access resources dedicated to transmitting BSRs, the terminal device receives information from the terminal device using The BSR triggered by the first logical channel of the 2-step random access resource transmission dedicated to transmitting the BSR;
  • the network side If the network side does not configure the terminal equipment with a 2-step random access resource dedicated to transmitting BSR, the network side receives a BSR triggered by the first logical channel transmitted by the terminal equipment using the common 2-step random access resource.
  • the apparatus further includes: a data receiving module 1230 for:
  • the terminal device After the terminal device determines to trigger the execution of the 2-step random access procedure, if there is an available uplink grant before the MsgA of the 2-step random access procedure, the the BSR triggered by the first logical channel authorized to be reported;
  • the terminal device cancels the BSR triggered by the first logical channel and cancels the 2-step random access process after the reporting of the BSR triggered by the first logical channel is completed.
  • the apparatus further includes: a data receiving module 1230 for:
  • the terminal device After the terminal device determines to trigger the execution of the 2-step random access process, if there is no available uplink grant before the MsgA of the 2-step random access process, the terminal device receives the message reported by the terminal device through the MsgA. the BSR triggered by the first logical channel;
  • the terminal device cancels the BSR triggered by the first logical channel after the reporting of the BSR triggered by the first logical channel is completed.
  • the available uplink grants include at least one of the following: dynamically scheduled uplink grants, Msg3 in a 4-step random access procedure, and configuration grants CG resources.
  • the network configuration information is configuration information provided by a serving cell of the terminal device.
  • the BSR includes any one of the following: a regular BSR, a periodic BSR, and a padding BSR.
  • FIG. 14 shows a schematic structural diagram of a terminal device 140 provided by an embodiment of the present application.
  • the terminal device 140 may include: a processor 141 , a receiver 142 , a transmitter 143 , a memory 144 and a bus 145 .
  • the processor 141 includes one or more processing cores, and the processor 141 executes various functional applications and information processing by running software programs and modules.
  • the receiver 142 and the transmitter 143 may be implemented as a transceiver 146, which may be a communication chip.
  • the memory 144 is connected to the processor 141 through the bus 145 .
  • the memory 144 can be used to store a computer program, and the processor 141 is used to execute the computer program, so as to implement each step performed by the terminal device in the above method embodiments.
  • the memory 144 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, and the volatile or non-volatile storage device includes but is not limited to: RAM (Random-Access Memory, random access memory) and ROM (Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory, Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory) memory), flash memory or other solid-state storage technology, CD-ROM (Compact Disc Read-Only Memory), DVD (Digital Video Disc, high-density digital video disc) or other optical storage, tape cassettes, magnetic tapes, magnetic disks storage or other magnetic storage devices. in:
  • the processor 141 is configured to determine, based on the network configuration information, whether to trigger the execution of the 2-step random access procedure when the buffer status report BSR is triggered by the first logical channel.
  • the processor 141 is configured to:
  • the network configuration information includes first indication information, where the first indication information is used to indicate that in the case of triggering the BSR, trigger the execution of the 2-step random access procedure;
  • the network configuration information includes attribute information of the first logical channel, where the attribute information of the first logical channel is used to indicate that the execution of the 2-step random access is triggered when the first logical channel triggers the BSR process.
  • the network configuration information includes first indication information
  • the processor 141 is used for:
  • the first indication information is the first value, it is determined to trigger the execution of the 2-step random access procedure
  • the first indication information is the second value, it is determined that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes configuration information of a 2-step random access resource dedicated to transmitting BSR;
  • the processor 141 is configured to determine to trigger the execution of the 2-step random access procedure when the terminal device is configured with the 2-step random access resource dedicated to transmitting the BSR on the network side;
  • the processor 141 is further configured to determine not to trigger the execution of the 2-step random access procedure when the terminal device is not configured with the 2-step random access resource dedicated to transmitting the BSR on the network side.
  • the network configuration information includes attribute information of the first logical channel
  • the processor 141 is configured to, in the case that the attribute information of the first logical channel is a third value, determine to trigger the execution of the 2-step random access procedure;
  • the processor 141 is further configured to determine that execution of the two-step random access procedure is not triggered when the attribute information of the first logical channel is a fourth value.
  • the network configuration information includes a first BSR threshold
  • the processor 141 is configured to determine to trigger the execution of the two-step random access procedure when the sum of the amounts of data to be transmitted of the respective logical channels of the terminal device is less than the first BSR threshold;
  • the processor 141 is further configured to determine not to trigger the execution of the two-step random access procedure when the sum of the amounts of data to be transmitted of the respective logical channels of the terminal device is greater than the first BSR threshold value .
  • the network configuration information includes a second BSR threshold value configured for the first logical channel
  • the processor 141 is configured to determine to trigger the execution of the two-step random access procedure when the amount of data to be transmitted on the first logical channel is less than the second BSR threshold;
  • the processor 141 is further configured to determine not to trigger the execution of the two-step random access procedure when the amount of data to be transmitted on the first logical channel is greater than the second BSR threshold.
  • the processor 141 is configured to determine, based on a reference signal received power RSRP threshold, whether to trigger the execution of the two-step random access procedure;
  • the processor 141 is further configured to trigger execution of the 2-step random access procedure based on the network configuration information, and also determine to trigger execution of the 2-step random access procedure based on the RSRP threshold, then: It is determined that the execution of the 2-step random access procedure is triggered.
  • the transmitter 143 is configured to, when it is determined to trigger the execution of the 2-step random access procedure, if the network side configures the terminal device with a 2-step random access dedicated to transmitting BSR input resource, then use the 2-step random access resource dedicated to transmitting BSR to transmit the BSR triggered by the first logical channel;
  • the transmitter 143 is further configured to use a common 2-step random access resource to transmit the first logical channel-triggered random access resource if the terminal device is not configured with a 2-step random access resource dedicated to transmitting the BSR on the network side. BSR.
  • the transmitter 143 is configured to, after determining to trigger the execution of the 2-step random access procedure, if there is an available uplink grant before the MsgA of the 2-step random access procedure, pass The available uplink authorization reports the BSR triggered by the first logical channel, and after the reporting of the BSR triggered by the first logical channel is completed, cancel the BSR triggered by the first logical channel, and cancel the 2-step random access process.
  • the transmitter 143 is configured to, after determining to trigger the execution of the 2-step random access procedure, if there is no available uplink grant before the MsgA of the 2-step random access procedure, pass The MsgA reports the BSR triggered by the first logical channel, and cancels the BSR triggered by the first logical channel after the reporting of the BSR triggered by the first logical channel is completed.
  • the available uplink grants include at least one of the following: dynamically scheduled uplink grants, Msg3 in a 4-step random access procedure, and configuration grants CG resources.
  • the network configuration information is configuration information provided by a serving cell of the terminal device.
  • the BSR includes any one of the following: a regular BSR, a periodic BSR, and a padding BSR.
  • FIG. 15 shows a schematic structural diagram of a network device 150 provided by an embodiment of the present application.
  • the network device 150 may include: a processor 151 , a receiver 152 , a transmitter 153 , a memory 154 and a bus 155 .
  • the processor 151 includes one or more processing cores, and the processor 151 executes various functional applications and information processing by running software programs and modules.
  • the receiver 152 and the transmitter 153 may be implemented as a transceiver 156, which may be a communication chip.
  • the memory 154 is connected to the processor 151 through the bus 155 .
  • the memory 154 can be used to store a computer program, and the processor 151 is used to execute the computer program, so as to implement each step performed by the network device in the above method embodiments.
  • the memory 154 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, and the volatile or non-volatile storage device includes but is not limited to: RAM (Random-Access Memory, random access memory) and ROM (Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory, Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory) memory), flash memory or other solid-state storage technology, CD-ROM (Compact Disc Read-Only Memory), DVD (Digital Video Disc, high-density digital video disc) or other optical storage, tape cassettes, magnetic tapes, magnetic disks storage or other magnetic storage devices. in:
  • the transmitter 153 is configured to send network configuration information to the terminal device
  • the network configuration information is used to determine whether to trigger a 2-step random access procedure when the first logical channel of the terminal device triggers the buffer status report BSR.
  • the terminal device if the network device sends the network configuration information to the terminal device, the terminal device is instructed to trigger the execution of the 2-step random access procedure when a BSR is triggered;
  • the network device does not send the network configuration information to the terminal device, it indicates to the terminal device that the execution of the 2-step random access procedure is not triggered when the BSR is triggered.
  • the network configuration information includes first indication information, where the first indication information is used to indicate that in the case of triggering the BSR, trigger the execution of the 2-step random access procedure;
  • the network configuration information includes attribute information of the first logical channel, where the attribute information of the first logical channel is used to indicate that the execution of the 2-step random access is triggered when the first logical channel triggers the BSR process.
  • the network configuration information includes first indication information
  • the first indication information is the first value, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the first indication information is the second value, it is used to indicate that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes configuration information of a 2-step random access resource dedicated to transmitting BSR;
  • the terminal device is configured with the 2-step random access resource dedicated to transmitting the BSR on the network side, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the network side When the network side does not configure the terminal equipment with the 2-step random access resource dedicated to transmitting the BSR, it is used to indicate that the execution of the 2-step random access process is not triggered.
  • the network configuration information includes attribute information of the first logical channel
  • the attribute information of the first logical channel is the third value, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the attribute information of the first logical channel is the fourth value, it is used to indicate that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes a first BSR threshold
  • the sum of the amounts of data to be transmitted of the respective logical channels of the terminal device is less than the first BSR threshold value, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the sum of the amounts of data to be transmitted of the respective logical channels of the terminal device is greater than the first BSR threshold value, it is used to indicate that the execution of the 2-step random access procedure is not triggered.
  • the network configuration information includes a second BSR threshold value configured for the first logical channel
  • the amount of data to be transmitted on the first logical channel is less than the second BSR threshold value, it is used to instruct to trigger the execution of the 2-step random access procedure;
  • the amount of data to be transmitted on the first logical channel is greater than the second BSR threshold, it is used to indicate that the execution of the 2-step random access procedure is not triggered.
  • the transmitter 153 is configured to send a reference signal received power RSRP threshold value to the terminal device;
  • the terminal device determines Trigger to execute the 2-step random access procedure.
  • the receiver 152 is configured to, when the terminal device determines to trigger the execution of the two-step random access procedure, if the network side configures the terminal device with a dedicated BSR transmission 2-step random access resource, receiving a BSR triggered by the first logical channel transmitted by the terminal device using the 2-step random access resource dedicated to transmitting BSR;
  • the receiver 152 is further configured to receive all information transmitted from the terminal device using the public 2-step random access resource if the terminal device is not configured with a 2-step random access resource dedicated to transmitting BSR on the network side. Describe the BSR triggered by the first logical channel.
  • the receiver 152 is configured to, after the terminal device determines to trigger the execution of the 2-step random access procedure, if there is an available uplink before the MsgA of the 2-step random access procedure grant, receiving a BSR triggered by the first logical channel reported by the terminal device through the available uplink grant;
  • the terminal device cancels the BSR triggered by the first logical channel and cancels the 2-step random access process after the reporting of the BSR triggered by the first logical channel is completed.
  • the receiver 152 is configured to, after the terminal device determines to trigger the execution of the 2-step random access procedure, if there is no available uplink before the MsgA of the 2-step random access procedure authorization, then receive the BSR triggered by the first logical channel reported by the terminal device through the MsgA;
  • the terminal device cancels the BSR triggered by the first logical channel after the reporting of the BSR triggered by the first logical channel is completed.
  • the available uplink grants include at least one of the following: dynamically scheduled uplink grants, Msg3 in a 4-step random access procedure, and configuration grants CG resources.
  • the network configuration information is configuration information provided by a serving cell of the terminal device.
  • the BSR includes any one of the following: a regular BSR, a periodic BSR, and a padding BSR.
  • An embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a terminal device, so as to realize the triggering of the random access on the side of the terminal device. Control Method.
  • An embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is configured to be executed by a processor of a network device, so as to realize the triggering of the random access on the network device side. Control Method.
  • An embodiment of the present application provides a chip, where the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a terminal device, the trigger control method for implementing the random access on the terminal device side is implemented as described above. .
  • An embodiment of the present application provides a chip, where the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a network device, a triggering control method for implementing the above-mentioned random access on the network device side .
  • the present application also provides a computer program product, which when the computer program product runs on the processor of the terminal device, enables the terminal device to execute the above-mentioned triggering control method for random access on the terminal device side.
  • the present application also provides a computer program product, which, when the computer program product runs on the processor of the network device, enables the network device to execute the above-mentioned method for triggering control of random access on the network device side.
  • Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a storage medium can be any available medium that can be accessed by a general purpose or special purpose computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种随机接入的触发控制方法、装置、设备及存储介质,涉及通信技术领域。所述方法包括:在第一逻辑信道触发BSR的情况下,基于网络配置信息,确定是否触发执行2步随机接入过程。本申请实施例提供了一种控制终端设备触发2步随机接入过程的方法,本申请实施例通过引入网络配置信息,并基于网络配置信息确定是否触发2步随机接入过程,相较于相关技术中任何终端都可以触发2步随机接入过程,本申请实施例可以实现更细粒度的控制终端设备触发2步随机接入过程的频率,进而在兼顾缩短资源请求时延的同时降低2步随机接入过程资源的冲突概率。

Description

随机接入的触发控制方法、装置、设备及存储介质 技术领域
本申请实施例涉及通信技术领域,特别涉及一种随机接入的触发控制方法、装置、设备及存储介质。
背景技术
随机接入过程分为两种:基于竞争的随机接入过程和基于非竞争的随机接入过程,基于竞争的随机接入过程分为4步,基于非竞争的随机接入过程分为2步。随着通信技术的发展和新业务场景的出现,针对基于非竞争的随机接入过程的触发方式还有待进一步研究讨论。
发明内容
本申请实施例提供了一种随机接入的触发控制方法、装置、设备及存储介质。所述技术方案如下:
根据本申请实施例的一个方面,提供了一种随机接入的触发控制方法,应用于终端设备,所述方法包括:
在第一逻辑信道触发BSR(Buffer Status Report,缓冲区状态报告)的情况下,基于网络配置信息,确定是否触发执行2步随机接入过程。
根据本申请实施例的一个方面,提供了一种随机接入的触发控制方法,应用于网络设备,所述方法包括:
向终端设备发送网络配置信息;
其中,所述网络配置信息用于在所述终端设备的第一逻辑信道触发缓冲区状态报告BSR的情况下,确定是否触发执行2步随机接入过程。
根据本申请实施例的一个方面,提供了一种随机接入的触发控制装置,所述装置包括:
触发控制模块,用于在第一逻辑信道触发缓冲区状态报告BSR的情况下,基于网络配置信息,确定是否触发执行2步随机接入过程。
根据本申请实施例的一个方面,提供了一种随机接入的触发控制装置,所述装置包括:
信息发送模块,用于向终端设备发送网络配置信息;
其中,所述网络配置信息用于在所述终端设备的第一逻辑信道触发缓冲区状态报告BSR的情况下,确定是否触发执行2步随机接入过程。
根据本申请实施例的一个方面,提供了一种终端设备,所述终端设备包括处理器;其中:
所述处理器,用于在第一逻辑信道触发缓冲区状态报告BSR的情况下,基于网络配置信息,确定是否触发执行2步随机接入过程。
根据本申请实施例的一个方面,提供了一种网络设备,所述网络设备包括处理器和与所述处理器相连的收发器;其中:
所述收发器,用于向终端设备发送网络配置信息;
其中,所述网络配置信息用于在所述终端设备的第一逻辑信道触发缓冲区状态报告BSR的情况下,确定是否触发执行2步随机接入过程。
根据本申请实施例的一个方面,提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序用于被终端设备的处理器执行,以实现上述终端设备侧的随机接入的触发控制方法。
根据本申请实施例的一个方面,提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序用于被网络设备的处理器执行,以实现上述网络设备侧的随机接入的触发控制方法。
根据本申请实施例的一个方面,提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在终端设备上运行时,用于实现上述终端设备侧的随机接入的触发控制方法。
根据本申请实施例的一个方面,提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在网络设备上运行时,用于实现上述网络设备侧的随机接入的触发控制方法。
根据本申请实施例的一个方面,提供了一种计算机程序产品,当所述计算机程序产品在终端设备 的处理器上运行时,使得终端设备执行上述终端设备侧的随机接入的触发控制方法。
根据本申请实施例的一个方面,提供了一种计算机程序产品,当所述计算机程序产品在网络设备的处理器上运行时,使得网络设备执行上述网络设备侧的随机接入的触发控制方法。
本申请实施例提供的技术方案可以包括如下有益效果:
通过网络配置信息确定是否触发2步随机接入过程,本申请实施例提供了一种控制终端设备触发2步随机接入过程的方法。本申请实施例通过引入网络配置信息,并基于网络配置信息确定是否触发2步随机接入过程,相较于相关技术中任何终端都可以触发2步随机接入过程,本申请实施例可以实现更细粒度的控制终端设备触发2步随机接入过程的频率,进而在兼顾缩短资源请求时延的同时降低2步随机接入过程资源的冲突概率。
附图说明
图1是本申请一个实施例提供的网络架构的示意图;
图2是本申请另一个实施例提供的网络架构的示意图;
图3是本申请另一个实施例提供的网络架构的示意图;
图4是本申请一个实施例提供的4步随机接入过程的流程示意图;
图5是本申请一个实施例提供的2步随机接入过程的流程示意图;
图6是本申请一个实施例提供的终端设备请求上行调度过程的流程示意图;
图7是本申请一个实施例提供的随机接入的触发控制方法的流程图;
图8是本申请另一个实施例提供的随机接入的触发控制方法的流程图;
图9是本申请一个实施例提供的BSR发送过程的时序图;
图10是本申请一个实施例提供的随机接入的触发控制装置的框图;
图11是本申请另一个实施例提供的随机接入的触发控制装置的框图;
图12是本申请另一个实施例提供的随机接入的触发控制装置的框图;
图13是本申请另一个实施例提供的随机接入的触发控制装置的框图;
图14是本申请一个实施例提供的终端设备的结构示意图;
图15是本申请一个实施例提供的网络设备的结构示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
本申请实施例描述的网络架构以及业务场景是为了更加清楚地说明本申请实施例的技术方案,并不构成对本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
请参考图1,其示出了本申请一个实施例提供的网络架构的示意图。该网络架构可以包括:网络设备10和终端设备20。
网络设备10是用于为终端设备20提供无线通信服务的设备。网络设备10与终端设备20之间可以建立连接,从而通过该连接进行通信,包括信令和数据的交互。网络设备10的数量可以有多个,两个邻近的网络设备10之间也可以通过有线或者无线的方式进行通信。终端设备20可以在不同的网络设备10之间进行切换,也即与不同的网络设备10建立连接。
在一个示例中,如图2所示,以5G NTN(Non-Terrestrial Networks,非地面网络)网络为例,NTN网络中的网络设备10可以是卫星11。一颗卫星11可以覆盖一定范围的地面区域,为该地面区域上的终端设备20提供无线通信服务。另外,卫星11可以围绕地球做轨道运动,通过布设多个卫星11,可以实现对地球表面的不同区域的通信覆盖。
相比于地面的蜂窝通信网络,卫星通信具有很多独特的优点。首先,卫星通信不受用户地域的限制,例如一般的陆地通信不能覆盖海洋、高山、沙漠等无法搭设通信设备或由于人口稀少而不做通信覆盖的区域,而对于卫星通信来说,由于一颗卫星即可以覆盖较大的地面,加之卫星可以围绕地球做轨道运动,因此理论上地球上每一个角落都可以被卫星通信覆盖。其次,卫星通信有较大的社会价值。卫星通信在边远山区、贫穷落后的国家或地区都可以以较低的成本覆盖到,从而使这些地区的人们享受到先进的语音通信和移动互联网技术,有利于缩小与发达地区的数字鸿沟,促进这些地区的发展。 再次,卫星通信距离远,且通信距离增大通讯的成本没有明显增加;最后,卫星通信的稳定性高,不受自然灾害的限制。
通信卫星按照轨道高度的不同分为LEO(Low-Earth Orbit,低地球轨道)卫星、MEO(Medium-Earth Orbit,中地球轨道)卫星、GEO(Geostationary Earth Orbit,地球同步轨道)卫星、HEO(High Elliptical Orbit,高椭圆轨道)卫星等等。目前阶段主要研究的是LEO和GEO。
1、LEO
低轨道卫星高度范围为500km~1500km,相应轨道周期约为1.5小时~2小时。用户间单跳通信的信号传播延迟一般小于20ms。最大卫星可视时间20分钟。信号传播距离短,链路损耗少,对用户终端设备的发射功率要求不高。
2、GEO
地球同步轨道卫星,轨道高度为35786km,围绕地球旋转周期为24小时。用户间单跳通信的信号传播延迟一般为250ms。
为了保证卫星的覆盖以及提升整个卫星通信系统的系统容量,卫星采用多波束覆盖地面,一颗卫星可以形成几十甚至数百个波束来覆盖地面;一个卫星波束可以覆盖直径几十至上百公里的地面区域。
在另一个示例中,如图3所示,以蜂窝通信网络为例,蜂窝通信网络中的网络设备10可以是基站12。基站12是一种部署在接入网中用以为终端设备20提供无线通信功能的装置。基站12可以包括各种形式的宏基站,微基站,中继站,接入点等等。在采用不同的无线接入技术的系统中,具备基站功能的设备的名称可能会有所不同,例如在5G NR(New Radio,新空口)系统中,称为gNodeB或者gNB。随着通信技术的演进,“基站”这一名称可能会变化。为方便描述,本申请实施例中,上述为终端设备20提供无线通信功能的装置统称为基站。
另外,本申请实施例中涉及的终端设备20,可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备,以及各种形式的用户设备(User Equipment,UE),移动台(Mobile Station,MS),终端设备(terminal device)等等。为方便描述,本申请实施例中,上面提到的设备统称为终端设备。
另外,在本申请实施例中,名词“网络”和“系统”通常混用,但本领域技术人员可以理解其含义。
本申请实施例描述的技术方案,可以适用于NTN系统,也可以适用于蜂窝网络系统。
下面,对5G NR BSR过程进行介绍说明。
终端设备通过BSR使服务基站获知终端设备的上行缓存数据量,这样基站就可以根据终端设备提供的数据量信息调度终端设备了。为了节省BSR上报开销,采用分组上报的方式。每个上行逻辑信道对应到一个LCG(Logical Channel Group,逻辑信道组),多个上行逻辑信道可以对应到同一个LCG,LC(Logical Channel,逻辑信道)到LCG的对应关系由网络设备通过RRC(Radio Resource Control,无线资源控制)信令配置。终端设备基于LCG上报BSR。NR中每个终端设备可支持最多8个LCG。
BSR的触发条件有以下几种:
1、终端设备的一个具有更高优先级的逻辑信道有上行数据到达,这种情况下会触发Regular BSR(常规BSR)。
2、为终端设备分配的上行资源在承载完其他上行数据后的padding(填充)部分能够承载BSR MAC(Medium Access Control,媒质接入控制)CE(Control Element,控制单元),这种情况下会发出Padding BSR(填充BSR)。
3、重传BSR定时器retxBSR-Timer超时,并且当前至少有一个上行逻辑信道有待发送的上行数据,此时会触发Regular BSR。
4、周期BSR定时器periodicBSR-Timer超时,会触发Periodic BSR(周期性BSR)。
如果有多个逻辑信道同时触发了Regular BSR,则这些逻辑信道中的每个逻辑信道会触发一个单独的Regular BSR。
可选地,BSR通过BSR MAC CE承载。
如果终端设备触发了Regular BSR,但是该终端设备没有用于传输新数据的上行资源或者给该终端设备分配的用于传输新数据的上行资源不能承载触发该Regular BSR的上行逻辑信道的数据,则终端设备触发SR(Scheduling Request,调度请求)。
下面,对5G NR SR过程进行介绍说明:
终端设备通过SR向网络设备申请上行资源。网络设备不知道终端设备什么时候需要发送上行数据,即不知道终端设备什么时候会发送SR。因此,网络设备可以为终端设备分配周期性的用于传输SR的PUCCH(Physical Uplink Control Channel,物理上行控制信道)资源,然后网络设备在已经分配的SR资源上检测是否有SR上报。
从上述SR的触发条件可以看出,NR中的SR是基于逻辑信道的。对于每个上行逻辑信道,网络设备可以选择是否为该上行逻辑信道配置用于传输SR的PUCCH资源。在一个上行逻辑信道触发了SR的情况下,如果网络设备为该上行逻辑信道配置了用于传输SR的PUCCH资源,则终端设备在该逻辑信道对应的用于传输SR的PUCCH资源上发送SR;否则,终端设备发起随机接入。
网络设备可以为终端设备配置多个用于传输SR的PUCCH资源。对于一个上行逻辑信道,如果网络设备为该上行逻辑信道配置了用于传输SR的PUCCH资源,则在每个上行BWP(Bandwidth Part,一部分带宽)上,网络设备为该逻辑信道配置最多一个用于传输SR的PUCCH资源。
每个用于传输SR的PUCCH资源对应以下配置参数:PUCCH资源周期和时隙/时间符号偏移;PUCCH资源索引。
下面,对NR系统中4步随机接入过程和2步随机接入过程进行介绍说明:
随机接入过程主要有如下事件触发:
1、UE初始接入时建立无线连接:UE从RRC_IDLE(RRC空闲)态到RRC_CONNECTED(RRC连接)态;
2、RRC连接重建过程:以便UE在无线链路失败后重建无线连接;
3、切换:UE需要与新的小区建立上行同步;
4、RRC_CONNECTED态下,DL(Down Link,下行)数据到达,此时UL(Up Link,上行)处于失步状态;
5、RRC_CONNECTED态下,UL数据到达,此时UL处于失步状态或者没有用于发送SR的PUCCH资源;
6、SR失败;
7、来自RRC的同步重配置请求;
8、UE从RRC_INACTIVE(RRC不活跃)态转换为RRC_CONNECTED态;
9、在SCell(小区)添加过程中建立时间校准;
10、请求其他SI(System Information,系统信息);
11、波束失败恢复。
在NR Rel-15版本中,主要支持以下两种随机接入方式,基于竞争的随机接入方式(即4步随机接入)和基于非竞争的随机接入方式(即2步随机接入),如图4所示,其示出了4步随机接入过程的示意图。对于图4所示的基于竞争随机接入过程分为4步,详细的步骤如下:
步骤401、终端设备向网络设备发送Msg1(Message1,消息1)。
步骤402、网络设备向终端设备发送Msg2(Message2,消息2),也即网络设备发送RAR(Random Access Response,随机接入响应)给终端设备。
步骤403、终端设备在网络调度资源上传输Msg3(Message3,消息3)。Msg3主要用于通知网络设备该随机接入过程是由什么事件触发。比如,如果是初始接入随机过程,则在Msg3中会携带UE ID(Identity,标识)和establishment cause(建立原因);如果是RRC重建,则会携带连接态UE标识和establishment cause。
步骤404、网络设备向终端设备发送Msg4(Message4,消息4)。Msg4有两个作用,一个是用于竞争冲突解决,另一个是网络设备向终端设备传输RRC配置消息。
如图5所示,其示出了2步随机接入过程的示意图,对于图5所示的基于非竞争的随机接入过程分为2步,详细的步骤如下:
NR Rel-16版本引入了2步随机接入过程,其引入可以降低时延同时减小信令开销。步骤501,终端设备向网络设备发送MsgA。2步随机接入中的MsgA(MessageA,消息A)包含在PRACH(Physical Random-Access Channel,物理随机接入信道)上传输的Preamble(前导)和在PUSCH(Physical Uplink Shared Channel,物理上行共享信道)上传输的负载信息;步骤502,网络设备向终端设备发送竞争冲突解决成功的指示信息。在MsgA传输后,终端设备在配置的窗口内监听网络设备侧的响应,如果收 到网络设备下发的MsgB(竞争冲突解决成功的指示),则终端设备结束随机接入过程,如图5所示;如果在MsgB(MessageB,消息B)中收到回退指示,则终端设备执行Msg3的传输并监听竞争冲突解决结果。如果在Msg3传输之后竞争解决不成功,终端继续MsgA的传输。
基于相关NR标准,当UE有上行数据到达,但UE没有用于数据传输的上行资源时,UE需要经历以下5个步骤将这些数据发送给网络设备,如图6所示。
步骤601,UE发送SR,向网络设备请求上行资源。
步骤602,网络设备收到SR,知道该UE需要上行资源用于传输上行数据,但网络设备并不知道UE有多少上行数据需要发送,因此网络设备通常的做法是给UE分配足够UE发送BSR的PUSCH资源。
步骤603,UE在网络设备分配的PUSCH资源上发送BSR,从而告知网络设备该UE需要发送的数据量大小。
步骤604,网络设备根据UE上报的BSR信息,为UE分配合适的PUSCH资源用于上行数据传输。
步骤605,UE在网络设备分配的PUSCH资源上传输上行数据。
在NR中,UE与网络设备之间的信号传输时延很小,从UE有上行数据到达到UE将这些数据发送给网络设备的这一段等待时间一般较短,对业务时延影响不大。
与相关技术中NR采用的蜂窝网络相比,NTN中UE与卫星之间的信号传播时延大幅增加,因此当UE有上行数据到达,但UE没有用于数据传输的上行资源时,UE需要等待相对较长的时间才能将这些数据发送给网络设备,从而导致业务时延明显增大,影响用户体验。
RAN2#111e次会议针对上述问题进行了讨论,并形成如下结论:至少可以使用CG(Configured Grant,配置授权)和2步随机接入过程上报BSR从而降低上行调度时延。
基于相关技术中的协议流程,当UE触发了regular BSR后,只要有可用的CG资源,终端设备就不会触发SR,也就不会进一步触发随机接入过程。由于用于CBRA(Contention Based Random Access,基于竞争的随机接入)的RACH资源被小区内所有UE共享,如果大量UE直接使用2步随机接入,可能会增加UE之间RACH尤其是PUSCH冲突的概率,同时造成2步随机接入容量受限,因此,需要研究相关的机制来进一步限制2步随机接入的使用。
请参考图7,其示出了本申请一个实施例提供的随机接入的触发控制方法的流程图。该方法可应用于图1至图3所示的网络架构中,上述方法可以包括如下几个步骤。
步骤701,网络设备向终端设备发送网络配置信息。
步骤702,在第一逻辑信道触发BSR的情况下,终端设备基于网络配置信息,确定是否触发执行2步随机接入过程。
第一逻辑信道可以是任意一种逻辑信道。逻辑信道是在物理信道上传递不同信息种类构成的信道,可以分为控制信道和业务信道。控制信道用于传输控制平面信息,而业务信道用于传输用户平面信息。控制信道用于传输信令或同步数据,业务信道用于传输编码及加密后的语音或数据。示例性地,逻辑信道最多可以分为八个逻辑信道组,并按组进行上报。当第一逻辑信道存在待传输数据时,该第一逻辑信道触发BSR。示例性地,BSR包括以下任意一种:常规BSR、周期性BSR、填充BSR。在一个示例中,第一逻辑信道触发常规BSR;在另一个示例中,第一逻辑信道触发周期性BSR;在另一个示例中,第一逻辑信道触发填充BSR,本申请实施例对第一逻辑信道触发的BSR类型不作限定。
示例性地,网络配置信息是终端设备的服务小区提供的配置信息。在本申请实施例中,网络配置信息用于在终端设备的第一逻辑信道触发BSR的情况下,确定是否触发执行2步随机接入过程。
在可能的实现方式中,终端设备可以通过如下方式确定是否触发执行2步随机接入过程:
在一个示例中,若终端设备接收到网络配置信息,则确定触发执行2步随机接入过程;若终端设备未接收到网络配置信息,则确定不触发执行2步随机接入过程。在本申请实施例中,终端设备基于是否接收到网络设备发送的网络配置信息,来确定是否触发执行2步随机接入过程,若确定不触发终端设备执行2步随机接入过程,则网络设备不向终端设备发送网络配置信息,节省了传输资源。在可能的实现方式中,网络配置信息包括第一指示信息,第一指示信息用于指示在触发BSR的情况下,触发执行2步随机接入过程。若终端设备接收到第一指示信息,则确定触发执行2步随机接入过程;若终端设备未接收到第一指示信息,则确定不触发执行2步随机接入过程。在可能的实现方式中,网络配置信息包括第一逻辑信道的属性信息,第一逻辑信道的属性信息用于指示在第一逻辑信道触发 BSR的情况下,触发执行2步随机接入过程。若终端设备接收到第一逻辑信道的属性信息,则确定触发执行2步随机接入过程;若终端设备未接收到第一逻辑信道的属性信息,则确定不触发执行2步随机接入过程。在这种情况下,步骤701在网络设备确定终端设备触发执行2步随机接入过程时执行,在网络设备确定终端设备不触发执行2步随机接入过程时不执行。
在另一个示例中,网络配置信息包括第一指示信息;在第一指示信息为第一取值的情况下,终端设备确定触发执行2步随机接入过程;在第一指示信息为第二取值的情况下,终端设备确定不触发执行2步随机接入过程。示例性地,第一指示信息可以采用1bit(比特)来表示,第一取值可以为1,第二取值可以为0,在第一指示信息为1的情况下,确定触发执行2步随机接入过程;在第一指示信息为0的情况下,确定不触发执行2步随机接入过程。当然,在其它可能的实现方式中,第一指示信息还可以采用更多比特来表示,例如,采用2bit、3bit或更多比特来表示;第一取值和第二取值还可以是其它取值,其可以根据实际场景进行设定,本申请实施例对第一指示信息的表示形式、以及第一取值和第二取值的取值方式不作限定。
在另一个示例中,网络配置信息包括专用于传输BSR的2步随机接入资源的配置信息。在网络侧为终端设备配置有专用于传输BSR的2步随机接入资源的情况下,终端设备确定触发执行2步随机接入过程;在网络侧为终端设备未配置专用于传输BSR的2步随机接入资源的情况下,终端设备确定不触发执行2步随机接入过程。示例性地,如果网络侧为终端设备配置有专用于传输BSR的2步随机接入资源的情况下,表示允许终端设备直接触发执行2步随机接入过程;如果网络侧为终端设备未配置专用于传输BSR的2步随机接入资源的情况下,表示不允许终端设备直接触发执行2步随机接入过程。
在另一个示例中,网络配置信息包括第一逻辑信道的属性信息;在第一逻辑信道的属性信息为第三取值的情况下,终端设备确定触发执行2步随机接入过程;在第一逻辑信道的属性信息为第四取值的情况下,终端设备确定不触发执行2步随机接入过程。在可能的实现方式中,第一逻辑信道的属性信息可以扩展在该第一逻辑信道的配置中。示例性地,第一逻辑信道的属性信息可以用1bit(比特)来表示,第三取值可以为1,第四取值可以为0,在第一逻辑信道的属性信息为1的情况下,确定触发执行2步随机接入过程;在第一逻辑信道的属性信息为0的情况下,确定不触发执行2步随机接入过程。在其它可能的实现方式中,第一逻辑信道的属性信息还可以采用更多比特来表示,例如,采用2bit、3bit或更多比特来表示;第三取值和第四取值还可以是其它取值,其可以根据实际场景进行设定,本申请实施例对第一逻辑信道的表示形式、以及第三取值和第四取值的取值方式不作限定。
在另一个示例中,网络配置信息包括第一BSR门限值;在终端设备的各个逻辑信道的待传输数据量之和小于第一BSR门限值的情况下,终端设备确定触发执行2步随机接入过程;在终端设备的各个逻辑信道的待传输数据量之和大于第一BSR门限值的情况下,终端设备确定不触发执行2步随机接入过程。第一BSR门限值用于指示终端设备的所有逻辑信道的待传输数据量的总和的门限值。当终端设备的各个逻辑信道的待传输数据量之和小于第一BSR门限值时,表明终端设备还可以通过逻辑信道传输数据,此时,终端设备确定触发执行2步随机接入过程;当终端设备的各个逻辑信道的待传输数据量之和大于第一BSR门限值时,表明终端设备不可以通过逻辑信道传输数据了,此时,终端设备确定不触发执行2步随机接入过程。待传输数据量小的情况下触发执行2步随机接入过程,可以更有效的利用2步随机接入过程尽早上报待传输数据的BSR,以及尽早完成待传输数据的传输。待传输数据量大的情况下,即使通过2步随机接入过程尽早的上报了BSR,但可能仍需多次传输才能传完待传输的数据量,因此无法体现触发执行2步随机接入过程上报BSR的优势。
在另一个示例中,网络配置信息包括配置给第一逻辑信道的第二BSR门限值;在第一逻辑信道的待传输数据量小于第二BSR门限值的情况下,确定触发执行2步随机接入过程;在第一逻辑信道的待传输数据量大于第二BSR门限值的情况下,确定不触发执行2步随机接入过程。第二BSR门限值用于指示终端设备的第一逻辑信道的待传输数据量的门限值。当第一逻辑信道的待传输数据量小于第二BSR门限值时,表明终端设备可以通过第一逻辑信道传输数据,此时,终端设备确定触发执行2步随机接入过程;当第一逻辑信道的待传输数据量大于第二BSR门限值时,表明终端设备不可以通过第一逻辑信道传输数据,此时,终端设备确定不触发执行2步随机接入过程。第一逻辑信道的待传输数据量小的情况下触发执行2步随机接入过程,可以更有效的利用2步随机接入过程尽早上报第一逻辑信道的待传输数据的BSR,以及尽早完成第一逻辑信道的待传输数据的传输。第一逻辑信道的待传输数据量大的情况下,即使通过2步随机接入过程尽早的上报了BSR,但可能仍需多次传输才能传完第一逻辑信道的待传输的数据量,因此无法体现触发执行2步随机接入过程上报BSR的优势。
在可能的实现方式中,网络设备向终端设备发送RSRP(Reference Signal Received Power,参考信号接收功率)门限值。终端设备还可以基于RSRP门限值,确定是否触发执行2步随机接入过程;若基于网络配置信息确定触发执行2步随机接入过程,且基于RSRP门限值也确定触发执行2步随机接入过程,则确定触发执行2步随机接入过程。在可能的实现方式中,通过如下方式确定基于RSRP门限值是否触发执行2步随机接入过程:当终端设备的服务小区RSRP值大于RSRP门限值时,确定触发执行2步随机接入过程;当终端设备的服务小区RSRP门限值小于RSRP门限值时,确定不触发执行2步随机接入过程。在本申请实施例中,只有当基于网络配置信息确定触发执行2步随机接入过程,且基于RSRP门限值也确定触发执行2步随机接入过程时,才确定触发执行2步随机接入过程。若基于网络配置信息确定触发执行2步随机接入过程,而基于RSRP门限值确定不触发执行2步随机接入过程,则确定不触发执行2步随机接入过程;或者,若基于网络配置信息确定不触发执行2步随机接入过程,而基于RSRP门限值确定触发执行2步随机接入过程,则确定不触发执行2步随机接入过程。
在可能的实现方式中,在确定触发执行2步随机接入过程的情况下,若网络侧为终端设备配置有专用于传输BSR的2步随机接入资源,则终端设备使用专用于传输BSR的2步随机接入资源传输第一逻辑信道触发的BSR。相应地,网络设备接收来自终端设备使用专用于传输BSR的2步随机接入资源传输的第一逻辑信道触发的BSR。
在可能的实现方式中,在确定触发执行2步随机接入过程的情况下,若网络侧为终端设备未配置专用于传输BSR的2步随机接入资源,则使用公共的2步随机接入资源传输第一逻辑信道触发的BSR。相应地,网络设备接收来自终端设备使用公共的2步随机接入资源传输的第一逻辑信道触发的BSR。公共的2步随机接入资源除了可以传输BSR,还可以传输其它信息,如波束失败恢复请求等。
以BSR为常规BSR为例对本申请实施例进行介绍说明。请参考图8,其示出了本申请另一个实施例提供的随机接入的触发控制方法的流程图。该方法可以应用于终端设备中,该方法可以包括如下几个步骤:
步骤801,第一逻辑信道有新数据到达,触发常规BSR。
步骤802,终端设备基于网络配置信息确定该常规BSR是否触发2步随机接入过程。若终端设备基于网络配置信息确定该常规BSR触发2步随机接入过程,则执行步骤803;若终端设备基于网络配置信息确定该常规BSR不触发2步随机接入过程,则从步骤804开始执行。
步骤803,终端设备执行2步随机接入过程。
步骤804,终端设备确定是否有用于初传的上行资源;若终端设备确定有用于初传的上行资源,则执行步骤805;若终端设备确定没有用于初传的上行资源,则从步骤806开始执行。
步骤805,终端设备使用初传的上行资源向网络设备发送常规BSR。
步骤806,终端设备触发SR。
步骤807,终端设备没有可用于SR传输的PUCCH资源,触发随机接入过程。
综上所述,本申请实施例提供的技术方案中,通过网络配置信息确定是否触发2步随机接入过程,本申请实施例提供了一种控制终端设备触发2步随机接入过程的方法。本申请实施例通过引入网络配置信息,并基于网络配置信息确定是否触发2步随机接入过程,相较于相关技术中任何终端都可以触发2步随机接入过程,本申请实施例可以实现更细粒度的控制终端设备触发2步随机接入过程的频率,进而在兼顾缩短资源请求时延的同时降低2步随机接入过程资源的冲突概率。
在示意性实施例中,终端设备还可以执行下述步骤:在确定触发执行2步随机接入过程之后,若在2步随机接入过程的MsgA之前有可用的上行授权,则通过可用的上行授权上报第一逻辑信道触发的BSR,并在第一逻辑信道触发的BSR上报完成之后,取消第一逻辑信道触发的BSR,以及取消2步随机接入过程。
相应地,网络设备接收来自终端设备通过可用的上行授权上报的第一逻辑信道触发的BSR。
在示意性实施例中,终端设备还可以执行下述步骤:在确定触发执行2步随机接入过程之后,若在2步随机接入过程的MsgA之前没有可用的上行授权,则通过MsgA上报第一逻辑信道触发的BSR,并在第一逻辑信道触发的BSR上报完成之后,取消第一逻辑信道触发的BSR。
相应地,网络设备接收来自所述终端设备通过所述MsgA上报的所述第一逻辑信道触发的BSR。
在可能的实现方式中,可用的上行授权包括以下至少一种:动态调度的上行授权、4步随机接入过程中的Msg3、配置授权CG资源。
在可能的实现方式中,在确定触发执行2步随机接入过程之后,若在MsgA发送之前已经完成BSR的发送,则终端设备取消2步随机接入过程。如图9所示,其示出了本申请一个实施例提供的BSR发送过程的时序图。在T1时刻,终端设备的第一逻辑信道触发了常规BSR,进而触发了2步随机接入过程;在T2时刻,终端设备通过CG资源发送了BSR MAC CE,则终端设备取消T1时刻触发的2步随机接入过程。
综上所述,本申请实施例提供的技术方案中,在触发2步随机接入过程之后,如果有可用的上行资源传输BSR,取消2步随机接入过程,可以进一步降低2步随机接入过程资源的冲突概率。
下述为本申请装置实施例,可以用于执行本申请方法实施例。对于本申请装置实施例中未披露的细节,请参照本申请方法实施例。
请参考图10,其示出了本申请一个实施例提供的随机接入的触发控制装置的框图。该装置具有实现上述终端设备侧方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是终端设备,也可以设置在终端设备中。如图10所示,该装置1000可以包括:触发控制模块1010。
触发控制模块1010,用于在第一逻辑信道触发缓冲区状态报告BSR的情况下,基于网络配置信息,确定是否触发执行2步随机接入过程。
综上所述,本申请实施例提供的技术方案中,通过网络配置信息确定是否触发2步随机接入过程,本申请实施例提供了一种控制终端设备触发2步随机接入过程的方法。本申请实施例通过引入网络配置信息,并基于网络配置信息确定是否触发2步随机接入过程,相较于相关技术中任何终端都可以触发2步随机接入过程,本申请实施例可以实现更细粒度的控制终端设备触发2步随机接入过程的频率,进而在兼顾缩短资源请求时延的同时降低2步随机接入过程资源的冲突概率。
在示意性实施例中,所述触发控制模块1010,用于:
若接收到所述网络配置信息,则确定触发执行所述2步随机接入过程;
若未接收到所述网络配置信息,则确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一指示信息,所述第一指示信息用于指示在触发BSR的情况下,触发执行所述2步随机接入过程;
或者,
所述网络配置信息包括所述第一逻辑信道的属性信息,所述第一逻辑信道的属性信息用于指示在所述第一逻辑信道触发BSR的情况下,触发执行所述2步随机接入过程。在示意性实施例中,所述网络配置信息包括第一指示信息;
所述触发控制模块1010,用于:
在所述第一指示信息为第一取值的情况下,确定触发执行所述2步随机接入过程;
在所述第一指示信息为第二取值的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括专用于传输BSR的2步随机接入资源的配置信息;
所述触发控制模块1010,用于:
在网络侧为所述终端设备配置有所述专用于传输BSR的2步随机接入资源的情况下,确定触发执行所述2步随机接入过程;
在网络侧为所述终端设备未配置所述专用于传输BSR的2步随机接入资源的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括所述第一逻辑信道的属性信息;
所述触发控制模块1010,用于:
在所述第一逻辑信道的属性信息为第三取值的情况下,确定触发执行所述2步随机接入过程;
在所述第一逻辑信道的属性信息为第四取值的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一BSR门限值;
所述触发控制模块1010,用于:
在所述终端设备的各个逻辑信道的待传输数据量之和小于所述第一BSR门限值的情况下,确定触发执行所述2步随机接入过程;
在所述终端设备的各个逻辑信道的待传输数据量之和大于所述第一BSR门限值的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括配置给所述第一逻辑信道的第二BSR门限值;
所述触发控制模块1010,用于:
在所述第一逻辑信道的待传输数据量小于所述第二BSR门限值的情况下,确定触发执行所述2步随机接入过程;
在所述第一逻辑信道的待传输数据量大于所述第二BSR门限值的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述触发控制模块1010,还用于:
基于参考信号接收功率RSRP门限值,确定是否触发执行所述2步随机接入过程;
若基于所述网络配置信息确定触发执行所述2步随机接入过程,且基于所述RSRP门限值也确定触发执行所述2步随机接入过程,则确定触发执行所述2步随机接入过程。
在示意性实施例中,所述装置还包括:数据传输模块1020,用于:
在确定触发执行所述2步随机接入过程的情况下,若网络侧为所述终端设备配置有专用于传输BSR的2步随机接入资源,则使用所述专用于传输BSR的2步随机接入资源传输所述第一逻辑信道触发的BSR;
若网络侧为所述终端设备未配置专用于传输BSR的2步随机接入资源,则使用公共的2步随机接入资源传输所述第一逻辑信道触发的BSR。
在示意性实施例中,如图11所示,所述装置还包括:数据传输模块1020,用于:
在确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前有可用的上行授权,则通过所述可用的上行授权上报所述第一逻辑信道触发的BSR,并在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR,以及取消所述2步随机接入过程。
在示意性实施例中,所述装置还包括:数据传输模块1020,用于:
在确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前没有可用的上行授权,则通过所述MsgA上报所述第一逻辑信道触发的BSR,并在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR。
在示意性实施例中,所述可用的上行授权包括以下至少一种:动态调度的上行授权、4步随机接入过程中的Msg3、配置授权CG资源。
在示意性实施例中,所述网络配置信息是所述终端设备的服务小区提供的配置信息。
在示意性实施例中,所述BSR包括以下任意一种:常规BSR、周期性BSR、填充BSR。
请参考图12,其示出了本申请另一个实施例提供的随机接入的触发控制装置的框图。该装置具有实现上述网络设备侧方法示例的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该装置可以是网络设备,也可以设置在网络设备中。如图12所示,该装置1200可以包括:信息发送模块1210。
信息发送模块1210,用于向终端设备发送网络配置信息;
其中,所述网络配置信息用于在所述终端设备的第一逻辑信道触发缓冲区状态报告BSR的情况下,确定是否触发执行2步随机接入过程。
综上所述,本申请实施例提供的技术方案中,通过网络配置信息确定是否触发2步随机接入过程,本申请实施例提供了一种控制终端设备触发2步随机接入过程的方法。本申请实施例通过引入网络配置信息,并基于网络配置信息确定是否触发2步随机接入过程,相较于相关技术中任何终端都可以触发2步随机接入过程,本申请实施例可以实现更细粒度的控制终端设备触发2步随机接入过程的频率,进而在兼顾缩短资源请求时延的同时降低2步随机接入过程资源的冲突概率。
在示意性实施例中,若所述网络设备向所述终端设备发送所述网络配置信息,则向所述终端设备指示在触发BSR的情况下,触发执行所述2步随机接入过程;
若所述网络设备未向所述终端设备发送所述网络配置信息,则向所述终端设备指示在触发BSR的情况下,不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一指示信息,所述第一指示信息用于指示在触发BSR的情况下,触发执行所述2步随机接入过程;
或者,
所述网络配置信息包括所述第一逻辑信道的属性信息,所述第一逻辑信道的属性信息用于指示在所述第一逻辑信道触发BSR的情况下,触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一指示信息;
在所述第一指示信息为第一取值的情况下,用于指示触发执行所述2步随机接入过程;
在所述第一指示信息为第二取值的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括专用于传输BSR的2步随机接入资源的配置信息;
在网络侧为所述终端设备配置有所述专用于传输BSR的2步随机接入资源的情况下,用于指示触发执行所述2步随机接入过程;
在网络侧为所述终端设备未配置所述专用于传输BSR的2步随机接入资源的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括所述第一逻辑信道的属性信息;
在所述第一逻辑信道的属性信息为第三取值的情况下,用于指示触发执行所述2步随机接入过程;
在所述第一逻辑信道的属性信息为第四取值的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一BSR门限值;
在所述终端设备的各个逻辑信道的待传输数据量之和小于所述第一BSR门限值的情况下,用于指示触发执行所述2步随机接入过程;
在所述终端设备的各个逻辑信道的待传输数据量之和大于所述第一BSR门限值的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括配置给所述第一逻辑信道的第二BSR门限值;
在所述第一逻辑信道的待传输数据量小于所述第二BSR门限值的情况下,用于指示触发执行所述2步随机接入过程;
在所述第一逻辑信道的待传输数据量大于所述第二BSR门限值的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,如图13所示,所述装置还包括:门限值发送模块1220,用于:
向所述终端设备发送参考信号接收功率RSRP门限值;
其中,在基于所述网络配置信息确定触发执行所述2步随机接入过程,且基于所述RSRP门限值也确定触发执行所述2步随机接入过程的情况下,所述终端设备确定触发执行所述2步随机接入过程。
在示意性实施例中,所述装置还包括:数据接收模块1230,用于:
在所述终端设备确定触发执行所述2步随机接入过程的情况下,若网络侧为所述终端设备配置有专用于传输BSR的2步随机接入资源,则接收来自所述终端设备使用所述专用于传输BSR的2步随机接入资源传输的所述第一逻辑信道触发的BSR;
若网络侧为所述终端设备未配置专用于传输BSR的2步随机接入资源,则接收来自所述终端设备使用公共的2步随机接入资源传输的所述第一逻辑信道触发的BSR。
在示意性实施例中,所述装置还包括:数据接收模块1230,用于:
在所述终端设备确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前有可用的上行授权,则接收来自所述终端设备通过所述可用的上行授权上报的所述第一逻辑信道触发的BSR;
其中,所述终端设备在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR,以及取消所述2步随机接入过程。
在示意性实施例中,所述装置还包括:数据接收模块1230,用于:
在所述终端设备确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前没有可用的上行授权,则接收来自所述终端设备通过所述MsgA上报的所述第一逻辑信道触发的BSR;
其中,所述终端设备在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR。
在示意性实施例中,所述可用的上行授权包括以下至少一种:动态调度的上行授权、4步随机接入过程中的Msg3、配置授权CG资源。
在示意性实施例中,所述网络配置信息是所述终端设备的服务小区提供的配置信息。
在示意性实施例中,所述BSR包括以下任意一种:常规BSR、周期性BSR、填充BSR。
请参考图14,其示出了本申请一个实施例提供的终端设备140的结构示意图。该终端设备140可以包括:处理器141、接收器142、发射器143、存储器144和总线145。
处理器141包括一个或者一个以上处理核心,处理器141通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。
接收器142和发射器143可以实现为一个收发器146,该收发器146可以是一块通信芯片。
存储器144通过总线145与处理器141相连。
存储器144可用于存储计算机程序,处理器141用于执行该计算机程序,以实现上述方法实施例中终端设备执行的各个步骤。
此外,存储器144可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:RAM(Random-Access Memory,随机存储器)和ROM(Read-Only Memory,只读存储器)、EPROM(Erasable Programmable Read-Only Memory,可擦写可编程只读存储器)、EEPROM(Electrically Erasable Programmable Read-Only Memory,电可擦写可编程只读存储器)、闪存或其他固态存储其技术,CD-ROM(Compact Disc Read-Only Memory,只读光盘)、DVD(Digital Video Disc,高密度数字视频光盘)或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。其中:
所述处理器141,用于在第一逻辑信道触发缓冲区状态报告BSR的情况下,基于网络配置信息,确定是否触发执行2步随机接入过程。
在示意性实施例中,所述处理器141,用于:
若接收到所述网络配置信息,则确定触发执行所述2步随机接入过程;
若未接收到所述网络配置信息,则确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一指示信息,所述第一指示信息用于指示在触发BSR的情况下,触发执行所述2步随机接入过程;
或者,
所述网络配置信息包括所述第一逻辑信道的属性信息,所述第一逻辑信道的属性信息用于指示在所述第一逻辑信道触发BSR的情况下,触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一指示信息;
所述处理器141,用于:
在所述第一指示信息为第一取值的情况下,确定触发执行所述2步随机接入过程;
在所述第一指示信息为第二取值的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括专用于传输BSR的2步随机接入资源的配置信息;
所述处理器141,用于在网络侧为所述终端设备配置有所述专用于传输BSR的2步随机接入资源的情况下,确定触发执行所述2步随机接入过程;
所述处理器141,还用于在网络侧为所述终端设备未配置所述专用于传输BSR的2步随机接入资源的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括所述第一逻辑信道的属性信息;
所述处理器141,用于在所述第一逻辑信道的属性信息为第三取值的情况下,确定触发执行所述2步随机接入过程;
所述处理器141,还用于在所述第一逻辑信道的属性信息为第四取值的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一BSR门限值;
所述处理器141,用于在所述终端设备的各个逻辑信道的待传输数据量之和小于所述第一BSR门限值的情况下,确定触发执行所述2步随机接入过程;
所述处理器141,还用于在所述终端设备的各个逻辑信道的待传输数据量之和大于所述第一BSR门限值的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括配置给所述第一逻辑信道的第二BSR门限值;
所述处理器141,用于在所述第一逻辑信道的待传输数据量小于所述第二BSR门限值的情况下,确定触发执行所述2步随机接入过程;
所述处理器141,还用于在所述第一逻辑信道的待传输数据量大于所述第二BSR门限值的情况下,确定不触发执行所述2步随机接入过程。
在示意性实施例中,所述处理器141,用于基于参考信号接收功率RSRP门限值,确定是否触发执行所述2步随机接入过程;
所述处理器141,还用于若基于所述网络配置信息确定触发执行所述2步随机接入过程,且基于 所述RSRP门限值也确定触发执行所述2步随机接入过程,则确定触发执行所述2步随机接入过程。
在示意性实施例中,所述发射器143,用于在确定触发执行所述2步随机接入过程的情况下,若网络侧为所述终端设备配置有专用于传输BSR的2步随机接入资源,则使用所述专用于传输BSR的2步随机接入资源传输所述第一逻辑信道触发的BSR;
所述发射器143,还用于若网络侧为所述终端设备未配置专用于传输BSR的2步随机接入资源,则使用公共的2步随机接入资源传输所述第一逻辑信道触发的BSR。
在示意性实施例中,所述发射器143,用于在确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前有可用的上行授权,则通过所述可用的上行授权上报所述第一逻辑信道触发的BSR,并在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR,以及取消所述2步随机接入过程。
在示意性实施例中,所述发射器143,用于在确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前没有可用的上行授权,则通过所述MsgA上报所述第一逻辑信道触发的BSR,并在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR。
在示意性实施例中,所述可用的上行授权包括以下至少一种:动态调度的上行授权、4步随机接入过程中的Msg3、配置授权CG资源。
在示意性实施例中,所述网络配置信息是所述终端设备的服务小区提供的配置信息。
在示意性实施例中,所述BSR包括以下任意一种:常规BSR、周期性BSR、填充BSR。
请参考图15,其示出了本申请一个实施例提供的网络设备150的结构示意图。该网络设备150可以包括:处理器151、接收器152、发射器153、存储器154和总线155。
处理器151包括一个或者一个以上处理核心,处理器151通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。
接收器152和发射器153可以实现为一个收发器156,该收发器156可以是一块通信芯片。
存储器154通过总线155与处理器151相连。
存储器154可用于存储计算机程序,处理器151用于执行该计算机程序,以实现上述方法实施例中网络设备执行的各个步骤。
此外,存储器154可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:RAM(Random-Access Memory,随机存储器)和ROM(Read-Only Memory,只读存储器)、EPROM(Erasable Programmable Read-Only Memory,可擦写可编程只读存储器)、EEPROM(Electrically Erasable Programmable Read-Only Memory,电可擦写可编程只读存储器)、闪存或其他固态存储其技术,CD-ROM(Compact Disc Read-Only Memory,只读光盘)、DVD(Digital Video Disc,高密度数字视频光盘)或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。其中:
所述发射器153,用于向终端设备发送网络配置信息;
其中,所述网络配置信息用于在所述终端设备的第一逻辑信道触发缓冲区状态报告BSR的情况下,确定是否触发执行2步随机接入过程。
在示意性实施例中,若所述网络设备向所述终端设备发送所述网络配置信息,则向所述终端设备指示在触发BSR的情况下,触发执行所述2步随机接入过程;
若所述网络设备未向所述终端设备发送所述网络配置信息,则向所述终端设备指示在触发BSR的情况下,不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一指示信息,所述第一指示信息用于指示在触发BSR的情况下,触发执行所述2步随机接入过程;
或者,
所述网络配置信息包括所述第一逻辑信道的属性信息,所述第一逻辑信道的属性信息用于指示在所述第一逻辑信道触发BSR的情况下,触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一指示信息;
在所述第一指示信息为第一取值的情况下,用于指示触发执行所述2步随机接入过程;
在所述第一指示信息为第二取值的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括专用于传输BSR的2步随机接入资源的配置信息;
在网络侧为所述终端设备配置有所述专用于传输BSR的2步随机接入资源的情况下,用于指示 触发执行所述2步随机接入过程;
在网络侧为所述终端设备未配置所述专用于传输BSR的2步随机接入资源的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括所述第一逻辑信道的属性信息;
在所述第一逻辑信道的属性信息为第三取值的情况下,用于指示触发执行所述2步随机接入过程;
在所述第一逻辑信道的属性信息为第四取值的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括第一BSR门限值;
在所述终端设备的各个逻辑信道的待传输数据量之和小于所述第一BSR门限值的情况下,用于指示触发执行所述2步随机接入过程;
在所述终端设备的各个逻辑信道的待传输数据量之和大于所述第一BSR门限值的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,所述网络配置信息包括配置给所述第一逻辑信道的第二BSR门限值;
在所述第一逻辑信道的待传输数据量小于所述第二BSR门限值的情况下,用于指示触发执行所述2步随机接入过程;
在所述第一逻辑信道的待传输数据量大于所述第二BSR门限值的情况下,用于指示不触发执行所述2步随机接入过程。
在示意性实施例中,所述发射器153,用于向所述终端设备发送参考信号接收功率RSRP门限值;
其中,在基于所述网络配置信息确定触发执行所述2步随机接入过程,且基于所述RSRP门限值也确定触发执行所述2步随机接入过程的情况下,所述终端设备确定触发执行所述2步随机接入过程。
在示意性实施例中,所述接收器152,用于在所述终端设备确定触发执行所述2步随机接入过程的情况下,若网络侧为所述终端设备配置有专用于传输BSR的2步随机接入资源,则接收来自所述终端设备使用所述专用于传输BSR的2步随机接入资源传输的所述第一逻辑信道触发的BSR;
所述接收器152,还用于若网络侧为所述终端设备未配置专用于传输BSR的2步随机接入资源,则接收来自所述终端设备使用公共的2步随机接入资源传输的所述第一逻辑信道触发的BSR。
在示意性实施例中,所述接收器152,用于在所述终端设备确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前有可用的上行授权,则接收来自所述终端设备通过所述可用的上行授权上报的所述第一逻辑信道触发的BSR;
其中,所述终端设备在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR,以及取消所述2步随机接入过程。
在示意性实施例中,所述接收器152,用于在所述终端设备确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前没有可用的上行授权,则接收来自所述终端设备通过所述MsgA上报的所述第一逻辑信道触发的BSR;
其中,所述终端设备在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR。
在示意性实施例中,所述可用的上行授权包括以下至少一种:动态调度的上行授权、4步随机接入过程中的Msg3、配置授权CG资源。
在示意性实施例中,所述网络配置信息是所述终端设备的服务小区提供的配置信息。
在示意性实施例中,所述BSR包括以下任意一种:常规BSR、周期性BSR、填充BSR。
本申请实施例提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序用于被终端设备的处理器执行,以实现上述终端设备侧的随机接入的触发控制方法。
本申请实施例提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序用于被网络设备的处理器执行,以实现上述网络设备侧的随机接入的触发控制方法。
本申请实施例提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在终端设备上运行时,用于实现上述终端设备侧的随机接入的触发控制方法。
本申请实施例提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在网络设备上运行时,用于实现上述网络设备侧的随机接入的触发控制方法。
本申请还提供了一种计算机程序产品,当计算机程序产品在终端设备的处理器上运行时,使得终端设备执行上述终端设备侧的随机接入的触发控制方法。
本申请还提供了一种计算机程序产品,当计算机程序产品在网络设备的处理器上运行时,使得网络设备执行上述网络设备侧的随机接入的触发控制方法。
本领域技术人员应该可以意识到,在上述一个或多个示例中,本申请实施例所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。
以上所述仅为本申请的示例性实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (64)

  1. 一种随机接入的触发控制方法,其特征在于,应用于终端设备,所述方法包括:
    在第一逻辑信道触发缓冲区状态报告BSR的情况下,基于网络配置信息,确定是否触发执行2步随机接入过程。
  2. 根据权利要求1所述的方法,其特征在于,所述基于网络配置信息,确定是否触发执行2步随机接入过程,包括:
    若接收到所述网络配置信息,则确定触发执行所述2步随机接入过程;
    若未接收到所述网络配置信息,则确定不触发执行所述2步随机接入过程。
  3. 根据权利要求2所述的方法,其特征在于,
    所述网络配置信息包括第一指示信息,所述第一指示信息用于指示在触发BSR的情况下,触发执行所述2步随机接入过程;
    或者,
    所述网络配置信息包括所述第一逻辑信道的属性信息,所述第一逻辑信道的属性信息用于指示在所述第一逻辑信道触发BSR的情况下,触发执行所述2步随机接入过程。
  4. 根据权利要求1所述的方法,其特征在于,所述网络配置信息包括第一指示信息;
    所述基于网络配置信息,确定是否触发执行2步随机接入过程,包括:
    在所述第一指示信息为第一取值的情况下,确定触发执行所述2步随机接入过程;
    在所述第一指示信息为第二取值的情况下,确定不触发执行所述2步随机接入过程。
  5. 根据权利要求1所述的方法,其特征在于,所述网络配置信息包括专用于传输BSR的2步随机接入资源的配置信息;
    所述基于网络配置信息,确定是否触发执行2步随机接入过程,包括:
    在网络侧为所述终端设备配置有所述专用于传输BSR的2步随机接入资源的情况下,确定触发执行所述2步随机接入过程;
    在网络侧为所述终端设备未配置所述专用于传输BSR的2步随机接入资源的情况下,确定不触发执行所述2步随机接入过程。
  6. 根据权利要求1所述的方法,其特征在于,所述网络配置信息包括所述第一逻辑信道的属性信息;
    所述基于网络配置信息,确定是否触发执行2步随机接入过程,包括:
    在所述第一逻辑信道的属性信息为第三取值的情况下,确定触发执行所述2步随机接入过程;
    在所述第一逻辑信道的属性信息为第四取值的情况下,确定不触发执行所述2步随机接入过程。
  7. 根据权利要求1所述的方法,其特征在于,所述网络配置信息包括第一BSR门限值;
    所述基于网络配置信息,确定是否触发执行2步随机接入过程,包括:
    在所述终端设备的各个逻辑信道的待传输数据量之和小于所述第一BSR门限值的情况下,确定触发执行所述2步随机接入过程;
    在所述终端设备的各个逻辑信道的待传输数据量之和大于所述第一BSR门限值的情况下,确定不触发执行所述2步随机接入过程。
  8. 根据权利要求1所述的方法,其特征在于,所述网络配置信息包括配置给所述第一逻辑信道的第二BSR门限值;
    所述基于网络配置信息,确定是否触发执行2步随机接入过程,包括:
    在所述第一逻辑信道的待传输数据量小于所述第二BSR门限值的情况下,确定触发执行所述2步随机接入过程;
    在所述第一逻辑信道的待传输数据量大于所述第二BSR门限值的情况下,确定不触发执行所述2步随机接入过程。
  9. 根据权利要求1至8任一项所述的方法,其特征在于,所述方法还包括:
    基于参考信号接收功率RSRP门限值,确定是否触发执行所述2步随机接入过程;
    若基于所述网络配置信息确定触发执行所述2步随机接入过程,且基于所述RSRP门限值也确定触发执行所述2步随机接入过程,则确定触发执行所述2步随机接入过程。
  10. 根据权利要求1至9任一项所述的方法,其特征在于,所述方法还包括:
    在确定触发执行所述2步随机接入过程的情况下,若网络侧为所述终端设备配置有专用于传输BSR的2步随机接入资源,则使用所述专用于传输BSR的2步随机接入资源传输所述第一逻辑信道触发的BSR;
    若网络侧为所述终端设备未配置专用于传输BSR的2步随机接入资源,则使用公共的2步随机接入资源传输所述第一逻辑信道触发的BSR。
  11. 根据权利要求1至10任一项所述的方法,其特征在于,所述方法还包括:
    在确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前有可用的上行授权,则通过所述可用的上行授权上报所述第一逻辑信道触发的BSR,并在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR,以及取消所述2步随机接入过程。
  12. 根据权利要求1至11任一项所述的方法,其特征在于,所述方法还包括:
    在确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前没有可用的上行授权,则通过所述MsgA上报所述第一逻辑信道触发的BSR,并在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR。
  13. 根据权利要求11或12所述的方法,其特征在于,所述可用的上行授权包括以下至少一种:动态调度的上行授权、4步随机接入过程中的Msg3、配置授权CG资源。
  14. 根据权利要求1至13任一项所述的方法,其特征在于,所述网络配置信息是所述终端设备的服务小区提供的配置信息。
  15. 根据权利要求1至14任一项所述的方法,其特征在于,所述BSR包括以下任意一种:常规BSR、周期性BSR、填充BSR。
  16. 一种随机接入的触发控制方法,其特征在于,应用于网络设备,所述方法包括:
    向终端设备发送网络配置信息;
    其中,所述网络配置信息用于在所述终端设备的第一逻辑信道触发缓冲区状态报告BSR的情况下,确定是否触发执行2步随机接入过程。
  17. 根据权利要求16所述的方法,其特征在于,
    若所述网络设备向所述终端设备发送所述网络配置信息,则向所述终端设备指示在触发BSR的情况下,触发执行所述2步随机接入过程;
    若所述网络设备未向所述终端设备发送所述网络配置信息,则向所述终端设备指示在触发BSR的情况下,不触发执行所述2步随机接入过程。
  18. 根据权利要求17所述的方法,其特征在于,
    所述网络配置信息包括第一指示信息,所述第一指示信息用于指示在触发BSR的情况下,触发执行所述2步随机接入过程;
    或者,
    所述网络配置信息包括所述第一逻辑信道的属性信息,所述第一逻辑信道的属性信息用于指示在所述第一逻辑信道触发BSR的情况下,触发执行所述2步随机接入过程。
  19. 根据权利要求16所述的方法,其特征在于,所述网络配置信息包括第一指示信息;
    在所述第一指示信息为第一取值的情况下,用于指示触发执行所述2步随机接入过程;
    在所述第一指示信息为第二取值的情况下,用于指示不触发执行所述2步随机接入过程。
  20. 根据权利要求16所述的方法,其特征在于,所述网络配置信息包括专用于传输BSR的2步随机接入资源的配置信息;
    在网络侧为所述终端设备配置有所述专用于传输BSR的2步随机接入资源的情况下,用于指示触发执行所述2步随机接入过程;
    在网络侧为所述终端设备未配置所述专用于传输BSR的2步随机接入资源的情况下,用于指示不触发执行所述2步随机接入过程。
  21. 根据权利要求16所述的方法,其特征在于,所述网络配置信息包括所述第一逻辑信道的属性信息;
    在所述第一逻辑信道的属性信息为第三取值的情况下,用于指示触发执行所述2步随机接入过程;
    在所述第一逻辑信道的属性信息为第四取值的情况下,用于指示不触发执行所述2步随机接入过程。
  22. 根据权利要求16所述的方法,其特征在于,所述网络配置信息包括第一BSR门限值;
    在所述终端设备的各个逻辑信道的待传输数据量之和小于所述第一BSR门限值的情况下,用于指示触发执行所述2步随机接入过程;
    在所述终端设备的各个逻辑信道的待传输数据量之和大于所述第一BSR门限值的情况下,用于指示不触发执行所述2步随机接入过程。
  23. 根据权利要求16所述的方法,其特征在于,所述网络配置信息包括配置给所述第一逻辑信道的第二BSR门限值;
    在所述第一逻辑信道的待传输数据量小于所述第二BSR门限值的情况下,用于指示触发执行所述2步随机接入过程;
    在所述第一逻辑信道的待传输数据量大于所述第二BSR门限值的情况下,用于指示不触发执行所述2步随机接入过程。
  24. 根据权利要求16至23任一项所述的方法,其特征在于,所述方法还包括:
    向所述终端设备发送参考信号接收功率RSRP门限值;
    其中,在基于所述网络配置信息确定触发执行所述2步随机接入过程,且基于所述RSRP门限值也确定触发执行所述2步随机接入过程的情况下,所述终端设备确定触发执行所述2步随机接入过程。
  25. 根据权利要求16至24任一项所述的方法,其特征在于,所述方法还包括:
    在所述终端设备确定触发执行所述2步随机接入过程的情况下,若网络侧为所述终端设备配置有专用于传输BSR的2步随机接入资源,则接收来自所述终端设备使用所述专用于传输BSR的2步随机接入资源传输的所述第一逻辑信道触发的BSR;
    若网络侧为所述终端设备未配置专用于传输BSR的2步随机接入资源,则接收来自所述终端设备使用公共的2步随机接入资源传输的所述第一逻辑信道触发的BSR。
  26. 根据权利要求16至25任一项所述的方法,其特征在于,所述方法还包括:
    在所述终端设备确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前有可用的上行授权,则接收来自所述终端设备通过所述可用的上行授权上报的所述第一逻辑信道触发的BSR;
    其中,所述终端设备在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR,以及取消所述2步随机接入过程。
  27. 根据权利要求16至26任一项所述的方法,其特征在于,所述方法还包括:
    在所述终端设备确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前没有可用的上行授权,则接收来自所述终端设备通过所述MsgA上报的所述第一逻辑信道触发的BSR;
    其中,所述终端设备在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR。
  28. 根据权利要求26或27所述的方法,其特征在于,所述可用的上行授权包括以下至少一种:动态调度的上行授权、4步随机接入过程中的Msg3、配置授权CG资源。
  29. 根据权利要求16至28任一项所述的方法,其特征在于,所述网络配置信息是所述终端设备的服务小区提供的配置信息。
  30. 根据权利要求16至29任一项所述的方法,其特征在于,所述BSR包括以下任意一种:常规BSR、周期性BSR、填充BSR。
  31. 一种随机接入的触发控制装置,其特征在于,所述装置包括:
    触发控制模块,用于在第一逻辑信道触发缓冲区状态报告BSR的情况下,基于网络配置信息,确定是否触发执行2步随机接入过程。
  32. 根据权利要求31所述的装置,其特征在于,所述触发控制模块,用于:
    若接收到所述网络配置信息,则确定触发执行所述2步随机接入过程;
    若未接收到所述网络配置信息,则确定不触发执行所述2步随机接入过程。
  33. 根据权利要求32所述的装置,其特征在于,
    所述网络配置信息包括第一指示信息,所述第一指示信息用于指示在触发BSR的情况下,触发执行所述2步随机接入过程;
    或者,
    所述网络配置信息包括所述第一逻辑信道的属性信息,所述第一逻辑信道的属性信息用于指示在 所述第一逻辑信道触发BSR的情况下,触发执行所述2步随机接入过程。
  34. 根据权利要求31所述的装置,其特征在于,所述网络配置信息包括第一指示信息;
    所述触发控制模块,用于:
    在所述第一指示信息为第一取值的情况下,确定触发执行所述2步随机接入过程;
    在所述第一指示信息为第二取值的情况下,确定不触发执行所述2步随机接入过程。
  35. 根据权利要求31所述的装置,其特征在于,所述网络配置信息包括专用于传输BSR的2步随机接入资源的配置信息;
    所述触发控制模块,用于:
    在网络侧为所述终端设备配置有所述专用于传输BSR的2步随机接入资源的情况下,确定触发执行所述2步随机接入过程;
    在网络侧为所述终端设备未配置所述专用于传输BSR的2步随机接入资源的情况下,确定不触发执行所述2步随机接入过程。
  36. 根据权利要求31所述的装置,其特征在于,所述网络配置信息包括所述第一逻辑信道的属性信息;
    所述触发控制模块,用于:
    在所述第一逻辑信道的属性信息为第三取值的情况下,确定触发执行所述2步随机接入过程;
    在所述第一逻辑信道的属性信息为第四取值的情况下,确定不触发执行所述2步随机接入过程。
  37. 根据权利要求31所述的装置,其特征在于,所述网络配置信息包括第一BSR门限值;
    所述触发控制模块,用于:
    在所述终端设备的各个逻辑信道的待传输数据量之和小于所述第一BSR门限值的情况下,确定触发执行所述2步随机接入过程;
    在所述终端设备的各个逻辑信道的待传输数据量之和大于所述第一BSR门限值的情况下,确定不触发执行所述2步随机接入过程。
  38. 根据权利要求31所述的装置,其特征在于,所述网络配置信息包括配置给所述第一逻辑信道的第二BSR门限值;
    所述触发控制模块,用于:
    在所述第一逻辑信道的待传输数据量小于所述第二BSR门限值的情况下,确定触发执行所述2步随机接入过程;
    在所述第一逻辑信道的待传输数据量大于所述第二BSR门限值的情况下,确定不触发执行所述2步随机接入过程。
  39. 根据权利要求31至38任一项所述的装置,其特征在于,所述触发控制模块,还用于:
    基于参考信号接收功率RSRP门限值,确定是否触发执行所述2步随机接入过程;
    若基于所述网络配置信息确定触发执行所述2步随机接入过程,且基于所述RSRP门限值也确定触发执行所述2步随机接入过程,则确定触发执行所述2步随机接入过程。
  40. 根据权利要求31至39任一项所述的装置,其特征在于,所述装置还包括:数据传输模块,用于:
    在确定触发执行所述2步随机接入过程的情况下,若网络侧为所述终端设备配置有专用于传输BSR的2步随机接入资源,则使用所述专用于传输BSR的2步随机接入资源传输所述第一逻辑信道触发的BSR;
    若网络侧为所述终端设备未配置专用于传输BSR的2步随机接入资源,则使用公共的2步随机接入资源传输所述第一逻辑信道触发的BSR。
  41. 根据权利要求31至40任一项所述的装置,其特征在于,所述装置还包括:数据传输模块,用于:
    在确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前有可用的上行授权,则通过所述可用的上行授权上报所述第一逻辑信道触发的BSR,并在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR,以及取消所述2步随机接入过程。
  42. 根据权利要求31至41任一项所述的装置,其特征在于,所述装置还包括:数据传输模块,用于:
    在确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前没有可用 的上行授权,则通过所述MsgA上报所述第一逻辑信道触发的BSR,并在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR。
  43. 根据权利要求41或42所述的装置,其特征在于,所述可用的上行授权包括以下至少一种:动态调度的上行授权、4步随机接入过程中的Msg3、配置授权CG资源。
  44. 根据权利要求31至43任一项所述的装置,其特征在于,所述网络配置信息是所述终端设备的服务小区提供的配置信息。
  45. 根据权利要求31至44任一项所述的装置,其特征在于,所述BSR包括以下任意一种:常规BSR、周期性BSR、填充BSR。
  46. 一种随机接入的触发控制装置,其特征在于,所述装置包括:
    信息发送模块,用于向终端设备发送网络配置信息;
    其中,所述网络配置信息用于在所述终端设备的第一逻辑信道触发缓冲区状态报告BSR的情况下,确定是否触发执行2步随机接入过程。
  47. 根据权利要求46所述的装置,其特征在于,
    若所述网络设备向所述终端设备发送所述网络配置信息,则向所述终端设备指示在触发BSR的情况下,触发执行所述2步随机接入过程;
    若所述网络设备未向所述终端设备发送所述网络配置信息,则向所述终端设备指示在触发BSR的情况下,不触发执行所述2步随机接入过程。
  48. 根据权利要求47所述的装置,其特征在于,
    所述网络配置信息包括第一指示信息,所述第一指示信息用于指示在触发BSR的情况下,触发执行所述2步随机接入过程;
    或者,
    所述网络配置信息包括所述第一逻辑信道的属性信息,所述第一逻辑信道的属性信息用于指示在所述第一逻辑信道触发BSR的情况下,触发执行所述2步随机接入过程。
  49. 根据权利要求46所述的装置,其特征在于,所述网络配置信息包括第一指示信息;
    在所述第一指示信息为第一取值的情况下,用于指示触发执行所述2步随机接入过程;
    在所述第一指示信息为第二取值的情况下,用于指示不触发执行所述2步随机接入过程。
  50. 根据权利要求46所述的装置,其特征在于,所述网络配置信息包括专用于传输BSR的2步随机接入资源的配置信息;
    在网络侧为所述终端设备配置有所述专用于传输BSR的2步随机接入资源的情况下,用于指示触发执行所述2步随机接入过程;
    在网络侧为所述终端设备未配置所述专用于传输BSR的2步随机接入资源的情况下,用于指示不触发执行所述2步随机接入过程。
  51. 根据权利要求46所述的装置,其特征在于,所述网络配置信息包括所述第一逻辑信道的属性信息;
    在所述第一逻辑信道的属性信息为第三取值的情况下,用于指示触发执行所述2步随机接入过程;
    在所述第一逻辑信道的属性信息为第四取值的情况下,用于指示不触发执行所述2步随机接入过程。
  52. 根据权利要求46所述的装置,其特征在于,所述网络配置信息包括第一BSR门限值;
    在所述终端设备的各个逻辑信道的待传输数据量之和小于所述第一BSR门限值的情况下,用于指示触发执行所述2步随机接入过程;
    在所述终端设备的各个逻辑信道的待传输数据量之和大于所述第一BSR门限值的情况下,用于指示不触发执行所述2步随机接入过程。
  53. 根据权利要求46所述的装置,其特征在于,所述网络配置信息包括配置给所述第一逻辑信道的第二BSR门限值;
    在所述第一逻辑信道的待传输数据量小于所述第二BSR门限值的情况下,用于指示触发执行所述2步随机接入过程;
    在所述第一逻辑信道的待传输数据量大于所述第二BSR门限值的情况下,用于指示不触发执行所述2步随机接入过程。
  54. 根据权利要求46至53任一项所述的装置,其特征在于,所述装置还包括:门限值发送模块, 用于:
    向所述终端设备发送参考信号接收功率RSRP门限值;
    其中,在基于所述网络配置信息确定触发执行所述2步随机接入过程,且基于所述RSRP门限值也确定触发执行所述2步随机接入过程的情况下,所述终端设备确定触发执行所述2步随机接入过程。
  55. 根据权利要求46至54任一项所述的装置,其特征在于,所述装置还包括:数据接收模块,用于:
    在所述终端设备确定触发执行所述2步随机接入过程的情况下,若网络侧为所述终端设备配置有专用于传输BSR的2步随机接入资源,则接收来自所述终端设备使用所述专用于传输BSR的2步随机接入资源传输的所述第一逻辑信道触发的BSR;
    若网络侧为所述终端设备未配置专用于传输BSR的2步随机接入资源,则接收来自所述终端设备使用公共的2步随机接入资源传输的所述第一逻辑信道触发的BSR。
  56. 根据权利要求46至55任一项所述的装置,其特征在于,所述装置还包括:数据接收模块,用于:
    在所述终端设备确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前有可用的上行授权,则接收来自所述终端设备通过所述可用的上行授权上报的所述第一逻辑信道触发的BSR;
    其中,所述终端设备在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR,以及取消所述2步随机接入过程。
  57. 根据权利要求46至56任一项所述的装置,其特征在于,所述装置还包括:数据接收模块,用于:
    在所述终端设备确定触发执行所述2步随机接入过程之后,若在所述2步随机接入过程的MsgA之前没有可用的上行授权,则接收来自所述终端设备通过所述MsgA上报的所述第一逻辑信道触发的BSR;
    其中,所述终端设备在所述第一逻辑信道触发的BSR上报完成之后,取消所述第一逻辑信道触发的BSR。
  58. 根据权利要求56或57所述的装置,其特征在于,所述可用的上行授权包括以下至少一种:动态调度的上行授权、4步随机接入过程中的Msg3、配置授权CG资源。
  59. 根据权利要求46至58任一项所述的装置,其特征在于,所述网络配置信息是所述终端设备的服务小区提供的配置信息。
  60. 根据权利要求46至59任一项所述的装置,其特征在于,所述BSR包括以下任意一种:常规BSR、周期性BSR、填充BSR。
  61. 一种终端设备,其特征在于,所述终端设备包括处理器;其中:
    所述处理器,用于在第一逻辑信道触发缓冲区状态报告BSR的情况下,基于网络配置信息,确定是否触发执行2步随机接入过程。
  62. 一种网络设备,其特征在于,所述网络设备包括处理器和与所述处理器相连的收发器;其中:
    所述收发器,用于向终端设备发送网络配置信息;
    其中,所述网络配置信息用于在所述终端设备的第一逻辑信道触发缓冲区状态报告BSR的情况下,确定是否触发执行2步随机接入过程。
  63. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序,所述计算机程序用于被终端设备的处理器执行,以实现如权利要求1至15任一项所述的随机接入的触发控制方法。
  64. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序,所述计算机程序用于被网络设备的处理器执行,以实现如权利要求16至30任一项所述的随机接入的触发控制方法。
PCT/CN2020/133662 2020-12-03 2020-12-03 随机接入的触发控制方法、装置、设备及存储介质 WO2022116099A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/133662 WO2022116099A1 (zh) 2020-12-03 2020-12-03 随机接入的触发控制方法、装置、设备及存储介质
CN202080105257.7A CN116097880A (zh) 2020-12-03 2020-12-03 随机接入的触发控制方法、装置、设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/133662 WO2022116099A1 (zh) 2020-12-03 2020-12-03 随机接入的触发控制方法、装置、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2022116099A1 true WO2022116099A1 (zh) 2022-06-09

Family

ID=81853790

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/133662 WO2022116099A1 (zh) 2020-12-03 2020-12-03 随机接入的触发控制方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN116097880A (zh)
WO (1) WO2022116099A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024032503A1 (zh) * 2022-08-10 2024-02-15 维沃移动通信有限公司 数据处理方法、终端及网络侧设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108391469A (zh) * 2017-11-20 2018-08-10 北京小米移动软件有限公司 请求上行传输资源的方法及装置
CN109565880A (zh) * 2018-10-31 2019-04-02 北京小米移动软件有限公司 传输随机接入指示信息的方法及装置
WO2020088652A1 (en) * 2018-11-02 2020-05-07 FG Innovation Company Limited Two-step random access procedure in next generation wireless networks
CN111294973A (zh) * 2019-01-25 2020-06-16 北京展讯高科通信技术有限公司 随机接入方法及装置、存储介质、用户终端
CN111436137A (zh) * 2019-02-02 2020-07-21 维沃移动通信有限公司 随机接入方法、装置、设备及介质
CN111565470A (zh) * 2019-02-13 2020-08-21 苹果公司 2步骤随机接入

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980575B (zh) * 2010-10-14 2013-04-24 华为技术有限公司 随机接入的处理方法和终端
WO2015137632A1 (en) * 2014-03-11 2015-09-17 Lg Electronics Inc. Method for allocating temporary identifier to terminal in random access procedure in wireless communication system and apparatus tehrefor
CN108781463B (zh) * 2016-03-02 2022-07-12 苹果公司 用于通信的装置、用户设备(ue)和由ue实施的方法
CN108271275B (zh) * 2017-01-04 2021-02-05 电信科学技术研究院 一种竞争随机接入的方法和装置
MX2019008092A (es) * 2017-01-05 2019-09-04 Guangdong Oppo Mobile Telecommunications Corp Ltd Metodo para acceso aleatorio y dispositivo terminal.
WO2018228507A1 (en) * 2017-06-14 2018-12-20 Fg Innovation Ip Company Limited Evolved buffer status report supporting multiple numerology factors
CN109309961B (zh) * 2017-07-28 2023-06-02 华为技术有限公司 一种配置随机接入的方法、网络设备及终端设备
US10986667B2 (en) * 2017-12-20 2021-04-20 Lenovo (Singapore) Pte. Ltd. Random-access procedure for scheduling request
WO2019237805A1 (zh) * 2018-06-14 2019-12-19 Oppo广东移动通信有限公司 一种随机接入方法及装置、通信设备
WO2020025023A1 (zh) * 2018-08-01 2020-02-06 Oppo广东移动通信有限公司 随机接入的方法、终端设备和网络设备
US20210329703A1 (en) * 2018-08-09 2021-10-21 Lg Electronics Inc. Method and apparatus for transmitting or receiving wireless signal in wireless communication system
CN112753274A (zh) * 2018-09-21 2021-05-04 三星电子株式会社 用于支持用于2步随机接入过程的多个消息a大小和上行链路覆盖的方法和装置
CN111385909A (zh) * 2018-12-29 2020-07-07 北京三星通信技术研究有限公司 信号传输方法、ue、基站以及计算机可读介质
JP7142729B2 (ja) * 2019-01-29 2022-09-27 ソフトバンク株式会社 端末装置、基地局装置、及び無線通信方法
US20220210827A1 (en) * 2019-02-07 2022-06-30 Telefonaktiebolaget Lm Ericsson (Publ) User equipment initiated channel occupancy time (cot) sharing between multiple user equipments
KR20200097467A (ko) * 2019-02-08 2020-08-19 삼성전자주식회사 무선통신 시스템에서 2단계 랜덤 엑세스 절차를 지시하는 방법 및 장치
EP3925373A4 (en) * 2019-02-14 2022-03-16 ZTE Corporation MULTI-ACCESS WIRELESS COMMUNICATION ENHANCEMENTS WITH LISTEN BEFORE SPEAK
CN111800883B (zh) * 2019-07-10 2022-06-10 维沃移动通信有限公司 信道接入方法、终端设备和网络设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108391469A (zh) * 2017-11-20 2018-08-10 北京小米移动软件有限公司 请求上行传输资源的方法及装置
CN109565880A (zh) * 2018-10-31 2019-04-02 北京小米移动软件有限公司 传输随机接入指示信息的方法及装置
WO2020088652A1 (en) * 2018-11-02 2020-05-07 FG Innovation Company Limited Two-step random access procedure in next generation wireless networks
CN111294973A (zh) * 2019-01-25 2020-06-16 北京展讯高科通信技术有限公司 随机接入方法及装置、存储介质、用户终端
CN111436137A (zh) * 2019-02-02 2020-07-21 维沃移动通信有限公司 随机接入方法、装置、设备及介质
CN111565470A (zh) * 2019-02-13 2020-08-21 苹果公司 2步骤随机接入

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "BSR over 2-step RA", 3GPP DRAFT; R2-2000390, vol. RAN WG2, 13 February 2020 (2020-02-13), Elbonia, pages 1 - 4, XP051848543 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024032503A1 (zh) * 2022-08-10 2024-02-15 维沃移动通信有限公司 数据处理方法、终端及网络侧设备

Also Published As

Publication number Publication date
CN116097880A (zh) 2023-05-09

Similar Documents

Publication Publication Date Title
WO2021031089A1 (zh) 资源配置的方法、终端设备和网络设备
WO2021062726A1 (zh) 随机接入方法、终端设备、网络设备及存储介质
US20220159732A1 (en) Random access method and device
WO2021016773A1 (zh) 监听随机接入响应的方法、终端设备、网络设备及存储介质
WO2021142807A1 (zh) 两步随机接入msg a资源的配置方法及相关装置
US20230208508A1 (en) Transmission control method and apparatus, device, and storage medium
US20220353855A1 (en) Random access resource configuration method and apparatus, device, and storage medium
US20220124824A1 (en) Method for random access and communication device
WO2022116099A1 (zh) 随机接入的触发控制方法、装置、设备及存储介质
WO2022141070A1 (zh) 无线通信方法和终端设备
CN117480815A (zh) 用于非地面网络卫星切换的方法、终端设备及网络设备
WO2023051171A1 (zh) 卫星通信方法及装置
WO2021207902A1 (zh) 数据传输方法及装置
WO2023097421A1 (zh) 信息上报方法、装置、设备、存储介质及程序产品
WO2023004552A1 (zh) 随机接入方法、装置、设备及存储介质
WO2024119496A1 (zh) 通信方法、装置、设备、存储介质、芯片、产品及程序
WO2023097504A1 (zh) 通信方法、装置、设备、存储介质、芯片、产品及程序
WO2023015406A1 (zh) 通信方法及装置
WO2022236505A1 (zh) 一种定时提前的上报方法及装置、终端设备
WO2023137643A1 (zh) 重复传输请求方法、装置、设备、系统、芯片及存储介质
WO2022040848A1 (zh) 信息传输方法、装置、设备及存储介质
WO2023082114A1 (zh) 通信方法及装置
WO2022116093A1 (zh) 无线通信方法和设备
WO2023039809A1 (zh) Sr触发方法、随机接入方法、装置、设备及存储介质
WO2023070682A1 (zh) 随机接入方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20963946

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20963946

Country of ref document: EP

Kind code of ref document: A1