WO2023065244A1 - Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau - Google Patents

Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau Download PDF

Info

Publication number
WO2023065244A1
WO2023065244A1 PCT/CN2021/125411 CN2021125411W WO2023065244A1 WO 2023065244 A1 WO2023065244 A1 WO 2023065244A1 CN 2021125411 W CN2021125411 W CN 2021125411W WO 2023065244 A1 WO2023065244 A1 WO 2023065244A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
access procedure
slice
information
terminal device
Prior art date
Application number
PCT/CN2021/125411
Other languages
English (en)
Chinese (zh)
Inventor
付喆
林雪
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN202180100344.8A priority Critical patent/CN117730614A/zh
Priority to PCT/CN2021/125411 priority patent/WO2023065244A1/fr
Publication of WO2023065244A1 publication Critical patent/WO2023065244A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access

Definitions

  • the present application relates to the communication field, and more specifically, to a random access method, terminal equipment, network equipment, chip, computer-readable storage medium, computer program product, computer program and communication system.
  • Radio Access Network Radio Access Network
  • RAN Radio Access Network
  • Support vertical business for enhancement one way is to provide lower latency, more targeted, greater flexibility and higher scalability services for multiple services with different requirements based on network slicing. More specifically, the introduction of network slicing allows application providers to participate in the design, deployment, and operation of customized RANs to better support application providers' businesses.
  • the access network can be introduced to enhance slices, such as random access channel (Random Access Channel, RACH) configuration for slices. How to implement switching or fallback between different RACHs is a problem to be solved.
  • RACH random access channel
  • embodiments of the present application provide a random access method, terminal device, network device, chip, computer-readable storage medium, computer program product, computer program, and communication system, which can be used for rollback of the random access process.
  • the embodiment of this application provides a random access method, including:
  • the terminal device determines whether to perform a fallback from the first random access procedure to the second random access procedure based on the first information sent by the network device;
  • the first information is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the fallback of the access process is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the embodiment of this application provides a random access method, including:
  • the network device sends the first information to the terminal device, so that the terminal device determines whether to perform a fallback from the first random access procedure to the second random access procedure based on the first information;
  • the first information is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the fallback of the access process is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the embodiment of the present application also provides a terminal device, including:
  • a first processing module configured to determine whether to perform a fallback from the first random access procedure to the second random access procedure based on the first information sent by the network device;
  • the first information is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the fallback of the access process is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the embodiment of the present application also provides a network device, including:
  • the first communication module is configured to send first information to the terminal device, so that the terminal device determines whether to perform a fallback from the first random access procedure to the second random access procedure based on the first information;
  • the first information is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the fallback of the access process is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • An embodiment of the present application also provides a terminal device, including: a processor and a memory, the memory is used to store a computer program, and the processor invokes and runs the computer program stored in the memory to execute the random access method of any embodiment of the present application.
  • An embodiment of the present application also provides a network device, including: a processor and a memory, the memory is used to store a computer program, and the processor invokes and runs the computer program stored in the memory to execute the random access method of any embodiment of the present application.
  • An embodiment of the present application further provides a chip, including: a processor, configured to invoke and run a computer program from a memory, so that a device equipped with the chip executes the random access method of any embodiment of the present application.
  • An embodiment of the present application further provides a computer-readable storage medium for storing a computer program, where the computer program causes a computer to execute the random access method of any embodiment of the present application.
  • An embodiment of the present application further provides a computer program product, including computer program instructions, where the computer program instructions cause a computer to execute the random access method of any embodiment of the present application.
  • An embodiment of the present application further provides a computer program, which enables a computer to execute the random access method of any embodiment of the present application.
  • An embodiment of the present application further provides a communication system, including a terminal device and a network device for performing the random access method in any embodiment of the present application.
  • whether the terminal device performs rollback from the first random access procedure to the second random access procedure is based on whether the network device supports or instructs the terminal device to perform the fallback to the second random access procedure.
  • the fallback is determined, or is executed based on whether the network device supports or instructs the terminal device to perform fallback to other random access procedures. In this way, the terminal device can correctly implement the rollback of the random access procedure.
  • FIG. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
  • Fig. 2A is a schematic flow chart of four-step random access according to the embodiment of the present application.
  • FIG. 2B is a schematic flow diagram of two-step random access according to the embodiment of the present application.
  • Fig. 3 is a schematic flow chart of MsgB-based fallback in two-step random access according to an embodiment of the present application.
  • Fig. 4 is a schematic flowchart of a random access method according to an embodiment of the present application.
  • Fig. 5 is a schematic flowchart of a random access method according to another embodiment of the present application.
  • FIG. 6 is an interaction diagram of application example 1 of the random access method according to the embodiment of the present application.
  • FIG. 7 is an interaction diagram of application example 2 of the random access method according to the embodiment of the present application.
  • Fig. 8 is a schematic structural block diagram of a terminal device according to an embodiment of the present application.
  • Fig. 9 is a schematic structural block diagram of a network device according to another embodiment of the present application.
  • Fig. 10 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • Fig. 11 is a schematic block diagram of a chip according to an embodiment of the present application.
  • Fig. 12 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • the technical solution of the embodiment of the present application can be applied to various communication systems, such as: Global System of Mobile communication (Global System of Mobile communication, GSM) system, code division multiple access (Code Division Multiple Access, CDMA) system, broadband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, Advanced long term evolution (LTE-A) system , New Radio (NR) system, evolution system of NR system, LTE (LTE-based access to unlicensed spectrum, LTE-U) system on unlicensed spectrum, NR (NR-based access to unlicensed spectrum) on unlicensed spectrum unlicensed spectrum (NR-U) system, Non-Terrestrial Networks (NTN) system, Universal Mobile Telecommunications System (UMTS), Wireless Local Area Networks (WLAN), Wireless Fidelity (Wireless Fidelity, WiFi), fifth-generation communication (5th-Generation, 5G) system or other communication systems, etc.
  • GSM Global System of Mobile
  • D2D Device to Device
  • M2M Machine to Machine
  • MTC Machine Type Communication
  • V2V Vehicle to Vehicle
  • V2X Vehicle to everything
  • the communication system in the embodiment of the present application may be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, may also be applied to a dual connectivity (Dual Connectivity, DC) scenario, and may also be applied to an independent (Standalone, SA) deployment Web scene.
  • Carrier Aggregation, CA Carrier Aggregation
  • DC Dual Connectivity
  • SA independent deployment Web scene
  • the embodiments of the present application describe various embodiments in conjunction with network equipment and terminal equipment, wherein the terminal equipment may also be referred to as user equipment (User Equipment, UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc.
  • user equipment User Equipment, UE
  • access terminal user unit
  • user station mobile station
  • mobile station mobile station
  • remote station remote terminal
  • mobile device user terminal
  • terminal wireless communication device
  • wireless communication device user agent or user device
  • the terminal device can be a station (STAION, ST) in the WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (Session Initiation Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA) devices, handheld devices with wireless communication functions, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, next-generation communication systems such as terminal devices in NR networks, or future Terminal equipment in the evolved public land mobile network (Public Land Mobile Network, PLMN) network, etc.
  • STAION, ST Session Initiation Protocol
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • the terminal device can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted; it can also be deployed on water (such as ships, etc.); it can also be deployed in the air (such as aircraft, balloons and satellites) superior).
  • the terminal device may be a mobile phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (Virtual Reality, VR) terminal device, an augmented reality (Augmented Reality, AR) terminal Equipment, wireless terminal equipment in industrial control, wireless terminal equipment in self driving, wireless terminal equipment in remote medical, wireless terminal equipment in smart grid , wireless terminal equipment in transportation safety, wireless terminal equipment in smart city, or wireless terminal equipment in smart home.
  • a virtual reality (Virtual Reality, VR) terminal device an augmented reality (Augmented Reality, AR) terminal Equipment
  • wireless terminal equipment in industrial control wireless terminal equipment in self driving
  • wireless terminal equipment in remote medical wireless terminal equipment in smart grid
  • wireless terminal equipment in transportation safety wireless terminal equipment in smart city, or wireless terminal equipment in smart home.
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices, which is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not only a hardware device, but also achieve powerful functions through software support, data interaction, and cloud interaction.
  • Generalized wearable smart devices include full-featured, large-sized, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, etc., and only focus on a certain type of application functions, and need to cooperate with other devices such as smart phones Use, such as various smart bracelets and smart jewelry for physical sign monitoring.
  • the network device may be a device for communicating with the mobile device, and the network device may be an access point (Access Point, AP) in WLAN, a base station (Base Transceiver Station, BTS) in GSM or CDMA , or a base station (NodeB, NB) in WCDMA, or an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and an NR network
  • BTS Base Transceiver Station
  • NodeB, NB base station
  • Evolutional Node B, eNB or eNodeB evolved base station
  • LTE Long Term Evolution
  • eNB evolved base station
  • gNB network equipment
  • the network device may have a mobile feature, for example, the network device may be a mobile device.
  • the network equipment may be a satellite or a balloon station.
  • the satellite can be a low earth orbit (low earth orbit, LEO) satellite, a medium earth orbit (medium earth orbit, MEO) satellite, a geosynchronous earth orbit (geosynchronous earth orbit, GEO) satellite, a high elliptical orbit (High Elliptical Orbit, HEO) satellite. ) Satellite etc.
  • the network device may also be a base station installed on land, water, and other locations.
  • the network device may provide services for a cell, and the terminal device communicates with the network device through the transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell, and the cell may be a network device ( For example, a cell corresponding to a base station), the cell may belong to a macro base station, or may belong to a base station corresponding to a small cell (Small cell), and the small cell here may include: a metro cell (Metro cell), a micro cell (Micro cell), a pico cell ( Pico cell), Femto cell, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • the transmission resources for example, frequency domain resources, or spectrum resources
  • the cell may be a network device (
  • the cell may belong to a macro base station, or may belong to a base station corresponding to a small cell (Small cell)
  • the small cell here may include: a metro cell (Metro cell), a micro cell (Micro
  • FIG. 1 schematically shows a wireless communication system 1000 including one network device 1100 and two terminal devices 1200 .
  • the wireless communication system 1000 may include multiple network devices 1100, and the coverage of each network device 1100 may include other numbers of terminal devices, which is not limited in this embodiment of the present application.
  • the wireless communication system 1000 shown in FIG. 1 may also include other network entities such as a mobility management entity (Mobility Management Entity, MME), an access and mobility management function (Access and Mobility Management Function, AMF), etc.
  • MME Mobility Management Entity
  • AMF Access and Mobility Management Function
  • a device with a communication function in the network/system in the embodiment of the present application may be referred to as a communication device.
  • the communication equipment may include network equipment and terminal equipment with communication functions. It may include other devices in the communication system, such as network controllers, mobility management entities and other network entities, which are not limited in this embodiment of the present application.
  • the "indication" mentioned in the embodiments of the present application may be a direct indication, may also be an indirect indication, and may also mean that there is an association relationship.
  • a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also indicate that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also indicate that there is an association between A and B relation.
  • the term "corresponding" may indicate that there is a direct or indirect correspondence between the two, or that there is an association between the two, or that it indicates and is indicated, configuration and is configuration etc.
  • the random access process is a basic process defined by the MAC (Medium Access Control) layer.
  • MAC Medium Access Control
  • NR MAC follows the four-step contention-based random access process and the non-contention-based random access process of LTE.
  • the two-step random access process can further reduce the number of channel preemption compared with the four-step random access process, thereby improving spectrum utilization.
  • the contention-based random access procedure is shown in FIG. 2A
  • the two-step random access procedure is shown in FIG. 2B .
  • the contention-based four-step random access process requires four signaling interactions.
  • Step 1 UE selects a random access resource and transmits a preamble.
  • the message in this step is called the first step message (Msg1).
  • Msg1 the first step message
  • the UE Before sending Msg1, the UE needs to measure the quality of the reference signal, so as to select a relatively good reference signal and the corresponding random access resource and preamble.
  • Step 2 The UE receives the RAR (Random Access Response, Random Access Response) sent by the network in the pre-configured receiving window.
  • the message in this step is called the second step message (Msg2).
  • the RAR includes the timing advance for subsequent uplink data transmission, the uplink authorization and TC-RNTI (Temporary Cell-Radio Network Temporary Identifier, temporary cell radio network temporary identifier).
  • Step 3 The UE performs uplink transmission according to the scheduling information in the random access response, that is, the transmission of the third step message (Msg3).
  • Msg3 will carry the UE identity for subsequent contention conflict resolution; In the RRC (Radio Resource Control, radio resource control) state at the location, this identifier will be different.
  • a UE in the RRC connected state will carry a C-RNTI in Msg3, while a UE in the RRC idle state and inactive state will carry an RRC layer UE identifier in Msg3. Regardless of the form of identification, this identification can allow the network to uniquely identify the UE.
  • Step 4 After sending the Msg3, the UE will receive the contention conflict resolution message sent by the network within a specified time. Generally speaking, if the network can successfully receive the Msg3 sent by the UE, the network has identified the UE, which means that the contention conflict is resolved on the network side. For the UE side, if the UE can detect the contention conflict resolution identifier in the fourth step message (Msg4) of network scheduling, it means that the conflict has also been resolved on the UE side.
  • Msg4 fourth step message
  • NR further introduces a contention-based two-step random access process, which only includes two signaling interactions.
  • the first message is called message A (MsgA)
  • MsgA includes the preamble transmitted on the random access resource and the PUSCH (Physical Uplink Shared Channel, Physical Uplink Shared Channel) transmitted on the
  • the load information may correspond to Msg1 and Msg3 in the contention-based four-step random access process.
  • the second message is called message B (MsgB), and MsgB may correspond to Msg2 and Msg4 in the contention-based four-step random access process.
  • the UE After the UE selects the two-step random access procedure and transmits MsgA, it needs to monitor MsgB within the configured window.
  • MsgB monitoring behaviors for UEs in different RRC connection states.
  • the UE when the UE is in the RRC connection state, that is to say, when the UE carries the C-RNTI in MsgA, the UE will monitor the C-RNTI scrambled PDCCH (Physical Downlink Control Channel, physical downlink control channel) and MsgB-RNTI Scrambled PDCCH.
  • PDCCH Physical Downlink Control Channel
  • MsgB-RNTI Scrambled PDCCH Physical Downlink Control Channel
  • MsgB-RNTI refers to the design of RA-RNTI (Random Access-Radio Network Temporary Identifier, Random Access-Radio Network Temporary Identifier) used to schedule RAR in the four-step random access process, that is, based on the UE transmitting MsgA The time-frequency position of the selected random access resource.
  • RA-RNTI Random Access-Radio Network Temporary Identifier
  • MsgB-RNTI adds an offset on the basis of RA-RNTI.
  • MsgB For the MsgB message, as before, it corresponds to Msg2 and Msg4 in the contention-based four-step random access process, so its design needs to consider the functions of Msg2 and Msg4.
  • the MsgB should support contention conflict resolution, such as the contention conflict resolution identifier and the RRC message corresponding to the UE.
  • MsgB also needs to support the contents of Msg2, such as random avoidance instructions and contents in RAR.
  • the network when receiving and decoding MsgA, on the one hand, the network may be able to successfully decode all the content of MsgA, such as the preamble and the payload message of MsgA, so that the network can send contention conflict resolution messages through MsgB, That is, the function corresponding to Msg4.
  • MsgB contention conflict resolution messages
  • the network only decodes the preamble in MsgA but does not solve the payload in MsgA.
  • the network does not recognize the UE, but the network can still send a fallback indication through MsgB (corresponding to the function of Msg2) to instruct the UE to continue sending Msg3 without retransmitting MsgA.
  • This fallback can also be called fallback based on MsgB, as shown in FIG. 3 .
  • the terminal can retry the transmission of MsgA.
  • the network can configure the maximum number of MsgA attempts (msgA-TransMax) for the terminal. When the number of MsgA attempts by the terminal exceeds the configured maximum number, the terminal can switch/fall back to the contention-based four-step random access process Proceed with the access attempt.
  • the random access process for slices supports the fallback from the two-step random access process for slices to the four-step random access process for slices, or the fallback from the two-step random access process for slices to the four-step universal random access process.
  • Fig. 4 is a schematic flowchart of a random access method according to an embodiment of the present application. The method can optionally be applied to the system shown in Fig. 1, but is not limited thereto. The method includes:
  • the terminal device determines whether to perform rollback from the first random access procedure to the second random access procedure based on the first information sent by the network device;
  • the first information is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the fallback of the access process is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • FIG. 5 is a schematic flowchart of a random access method according to another embodiment of the present application.
  • the method can optionally be applied to the system shown in Fig. 1, but is not limited thereto.
  • the method includes:
  • the network device sends first information to the terminal device, so that the terminal device determines whether to perform a fallback from the first random access procedure to the second random access procedure based on the first information;
  • the first information is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the fallback of the access process is used to indicate whether to support or perform a fallback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a fallback from the first random access procedure to the third random access procedure.
  • the rollback of the random access procedure may also be referred to as switching of the random access procedure.
  • the first information may be information for falling back to the second random access procedure. It may indicate whether to support the fallback of the terminal device from the first random access procedure to the second random access procedure, and may also indicate whether to perform a fallback from the first random access procedure to the second random access procedure.
  • the terminal device may perform fallback from the first random access procedure to the second random access procedure.
  • the terminal device does not perform the fallback from the first random access procedure to the second random access procedure; Rollback of the third random access procedure.
  • the first information may also be information for falling back to the third random access procedure. It may indicate whether to support the fallback of the terminal device from the first random access procedure to the third random access procedure, and may also indicate whether to perform a fallback from the first random access procedure to the third random access procedure.
  • the terminal device may perform fallback from the first random access procedure to the second random access procedure.
  • the terminal device does not perform the fallback from the first random access procedure to the second random access procedure; alternatively, the terminal device may perform the fallback from the first random access procedure to the third Fallback of the random access procedure.
  • the first information from the network device may directly or indirectly indicate whether random access backoff is supported or performed.
  • the following uses an example in which the first information is information for falling back to the second random access procedure as an example to describe in detail. It can be understood that, in a case where the first information is information for falling back to the third random access procedure, a similar implementation manner may be adopted.
  • the first information may be confirmation information (true) or non-confirmation information (false).
  • the value of the first information is true, which means that the network device supports the fallback of the terminal device from the first random access process to the second random access process, or the network device instructs the terminal device to perform the transition from the first random access process to the second random access process.
  • the fallback of the access process The value of the first information is false, which means that the network device does not support the fallback of the terminal device from the first random access process to the second random access process, or the network device instructs the terminal device not to perform the transition from the first random access process to the second random access process.
  • the first information can be 1-bit information, and the value of 1 is confirmation information, and the value of 0 is non-confirmation information; or, the value of 1 is non-confirmation information, and the value of 0 is confirmation information .
  • the first information may be sent when the network device supports or needs to instruct the terminal device to perform a fallback from the first random access procedure to the second random access procedure.
  • the terminal device receives the first information, it may be determined that the network device supports or the network device instructs the terminal device to perform fallback from the first random access procedure to the second random access procedure.
  • the terminal device does not receive the first information, it may be determined that the network device does not support or the network device instructs the terminal device not to perform the fallback from the first random access procedure to the second random access procedure.
  • the first message sent by the network device to the terminal device includes the first information ;
  • the first message sent by the network device to the terminal device does not include the second random access procedure a message.
  • the terminal device may determine whether to perform a rollback from the first random access procedure to the second random access procedure according to whether the first information appears in the received first message.
  • the first information may also include the maximum number of transmissions and/or resources for the random access procedure.
  • the first information may be configuration information about the maximum number of transmissions, or resource configuration information.
  • the resources of the random access process may include a preamble group and/or a random access opportunity (RACH Occasion, RO).
  • the first information indirectly indicates whether to support or perform fallback from the first random access procedure to the second random access procedure or the third random access procedure based on the maximum number of transmission times and/or resources.
  • the first information when the first information includes the maximum number of transmissions for the second random access procedure, and/or, the first information does not include the maximum number of transmissions for the third random access procedure, and/or, the first information for In the case where the maximum number of transmissions of the second random access procedure is greater than or equal to 1, the first information is used to indicate that the terminal device is supported to perform a fallback from the first random access procedure to the second random access procedure, or to indicate not The terminal device is supported to perform fallback from the first random access procedure to the third random access procedure.
  • the first information when the first information includes the maximum number of transmissions for the third random access procedure, and/or, the first information does not include the maximum number of transmissions for the second random access procedure, and/or, in the first information
  • the first information is used to instruct the terminal device to support the rollback from the first random access procedure to the third random access procedure, or to indicate The terminal device is not supported to perform fallback from the first random access procedure to the second random access procedure.
  • the first information when the first information includes the maximum number of transmissions for the third random access procedure, and/or, the maximum number of transmissions for the third random access procedure in the first information is greater than or equal to 1, if the first If the information does not include resources for the third random access procedure, the first information is used to instruct the support terminal device to perform fallback from the first random access procedure to the second random access procedure.
  • the first information includes the maximum number of transmissions for the third random access procedure, and/or, the maximum number of transmissions for the third random access procedure in the first information is greater than or equal to 1, if the first The information includes resources for the second random access procedure, and the first information is used to instruct the support terminal device to perform fallback from the first random access procedure to the second random access procedure.
  • the first information includes the maximum number of transmissions for the second random access procedure, and the first information indicates that the maximum number of transmissions for the second random access procedure is not used for the third random access procedure
  • the terminal device performs a rollback from the first random access procedure to the second random access procedure, or the terminal device does not perform a fallback from the first random access procedure A fallback procedure to the third random access procedure, or, the terminal device does not perform a fallback from the first random access procedure.
  • the first information includes the maximum number of transmissions for the second random access procedure, and the first information indicates that the maximum number of transmissions for the second random access procedure is not used to fall back to
  • the terminal device performs a rollback from the first random access procedure to the second random access procedure, or the terminal device does not perform the fallback from the The fallback from the first random access procedure to the third random access procedure, or, the terminal device does not perform the fallback from the first random access procedure.
  • the first information includes a maximum number of transmissions for a random access procedure, and the first information indicates that the maximum number of transmissions for a random access procedure is not used for the third random access procedure
  • the terminal device performs a fallback from the first random access procedure to the second random access procedure, or the terminal device does not perform the fallback from the first random access procedure to the The fallback of the third random access procedure, or, the terminal device does not perform the fallback from the first random access procedure.
  • the first information may include multiple types of information.
  • the first information includes direct indication information and/or maximum transmission times and/or resources.
  • the first information includes multiple maximum transmission times.
  • the above multiple information may be carried in the first information, or may be carried in different information.
  • the first random access procedure may include a slice-specific random access procedure.
  • the second random access process may include a random access process for non-slicing, or a random access process for general resources, or a general random access process.
  • the third random access procedure includes a random access procedure for slices.
  • the first random access process may include a two-step random access process for a slice
  • the third random access process may include a four-step random access process for a slice.
  • the second random access process may include a four-step random access process for non-slicing, or a four-step random access process for common resources, or a four-step universal random access process.
  • the second random access procedure may include a slice-specific random access procedure.
  • the third random access procedure may include a random access procedure for non-slicing, or a random access procedure for general resources, or a general random access procedure.
  • the first random access process may include a two-step random access process for a slice
  • the second random access process may include a four-step random access process for a slice.
  • the third random access procedure may include a four-step random access procedure for non-slicing, or a four-step random access procedure for common resources, or a four-step universal random access procedure.
  • the aforementioned maximum number of transmissions for the second random access procedure is the maximum number of random access transmissions for a slice.
  • the foregoing maximum number of transmissions for the third random access procedure is the maximum number of random access transmissions for a slice.
  • the maximum number of random access transmissions for a slice is different from the maximum number of transmissions (parameter msgA-TransMax) of message A in the two-step random access process in the aforementioned related art.
  • the maximum number of transmissions for a slice is one of positive integers greater than or equal to 1.
  • the maximum number of random access transmissions for a slice may be a common parameter for each slice or a different parameter for different slices.
  • the first information corresponds to one of the multiple slices, and the first information is applicable to the corresponding slice.
  • the first information may include the aforementioned maximum number of random access transmissions for a slice, each slice corresponds to a maximum number of random access transmissions for a slice, and the maximum number of random access transmissions for a slice corresponding to different slices may be different.
  • the first information corresponds to one slice group in the multiple slice groups, and the first information is applicable to multiple slices in the corresponding slice group.
  • the first information may include the aforementioned maximum number of random access transmissions for a slice, each slice group corresponds to a maximum number of random access transmissions for a slice, and each slice in the same slice group corresponds to the same number of random access transmissions for a slice.
  • the maximum number of random access transmissions; the maximum number of random access transmissions for slices corresponding to different slice groups may be different.
  • the first information is applicable to multiple slices or multiple slice groups, that is, the first information is common to all slices.
  • whether the terminal device performs the fallback from the first random access procedure to the second random access procedure is based on whether the network device supports or instructs the terminal device to perform the fallback from the first random access procedure to the second random access procedure.
  • the fallback of the second random access procedure is determined, or based on whether the network device supports or instructs the terminal device to perform fallback to other random access procedures.
  • the terminal device can correctly implement the rollback of the random access procedure.
  • the terminal device may determine whether the first condition is satisfied based on the first information, and thus determine whether to perform a rollback from the first random access procedure to the second random access procedure according to whether the first condition is satisfied. That is, the first condition is a condition for the terminal device to fall back to the second random access procedure.
  • the terminal device determines whether to perform a fallback from the first random access procedure to the second random access procedure based on the first information sent by the network device, including:
  • the terminal device executes rollback from the first random access procedure to the second random access procedure when it is determined based on the first information that the first condition is met.
  • the terminal device determines whether to perform a fallback from the first random access procedure to the second random access procedure based on the first information sent by the network device, and may further include:
  • the terminal device determines based on the first information that the first condition is not met, the terminal device does not perform rollback from the first random access procedure to the second random access procedure.
  • the terminal device may also determine whether to perform a fallback from the first random access procedure to the third random access procedure according to whether the first condition is satisfied.
  • the terminal device does not perform rollback from the first random access procedure to the third random access procedure when it is determined based on the first information that the first condition is satisfied.
  • the terminal device executes a fallback from the first random access procedure to the third random access procedure when it is determined based on the first information that the first condition is not satisfied.
  • the first random access process is a slice-specific two-step random access process (2-step slice-specific RACH), and the second random access process is a four-step general random access process (4-step common RACH).
  • the three random access process is a slice-oriented four-step random access process (4-step slice-specific RACH) as an example, and the first condition is a condition for falling back to the general random access process.
  • the first condition is met, for example, the first information indicates that the fallback to the general random access procedure is supported, the first information indicates that the fallback to the slice-specific random access procedure is not supported, and the maximum transmission of the general random access procedure is configured.
  • the terminal device can determine that the fallback from the two-step random access process for the slice to the four-step general random access process is not the four-step random access process for the slice. Access process. If the first condition is not satisfied, the terminal device may determine that the fallback from the two-step random access procedure for the slice is the four-step random access procedure for the slice instead of the four-step general random access procedure.
  • the first random access process is a two-step random access process (2-step slice-specific RACH) for slices
  • the second random access process is a four-step random access process (4-step slice-specific RACH) for slices.
  • RACH random access process
  • the third random access process is a four-step common random access process (4-step common RACH) as an example
  • the first condition is a condition for falling back to the four-step random access process for slices.
  • the first condition is met, for example, the first information indicates that the fallback to the random access procedure for the slice is supported, the first information indicates that the fallback to the general random access procedure is not supported, and the maximum random access procedure for the slice is configured.
  • the terminal device can determine that the fallback from the two-step random access process for the slice is the four-step random access process for the slice, not the four-step general random access process random access process. If the first condition is not satisfied, the terminal device may determine that the fallback from the two-step random access process for the slice is the four-step general random access process instead of the four-step random access process for the slice.
  • the first information may be used in some specific cases to determine whether to fall back to the second random access procedure.
  • the above method may also include:
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the second random access procedure, or the preamble group selection threshold configured in the first random access procedure is different from the preamble group configured in the second random access procedure If the code group selection thresholds are different, the terminal device falls back to the second random access procedure or determines whether the first condition is met based on the first information;
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure is different from the preamble group configured in the third random access procedure If the code group selection thresholds are different, the terminal device falls back to the second random access procedure or determines whether the first condition is met based on the first information;
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the second random access procedure, or the preamble group selection threshold configured in the first random access procedure is the same as the preamble group configured in the second random access procedure In the case that the code group selection threshold is the same, the terminal device falls back to the second random access procedure or determines whether the first condition is met based on the first information;
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure is the same as the preamble group configured in the third random access procedure In the case that the code group selection threshold is the same, the terminal device falls back to the second random access procedure or determines whether the first condition is met based on the first information.
  • preamble groups configured in the two random access procedures are different, which means that the preamble groups configured in the two random access procedures are not completely the same.
  • preamble group A and preamble group B are configured for 2-step slice-specific RACH, but only preamble group B is configured for 4-step common RACH.
  • group A or preamble group B the preamble group configured for 2-step slice-specific RACH is different from the preamble group configured for 4-step common RACH.
  • 2-step slice-specific RACH is only configured with preamble group A or preamble group B, however, 4-step common RACH is configured with preamble group A and preamble group B, then the preamble of 2-step slice-specific RACH configuration The group is different from the preamble group for 4-step common RACH configuration.
  • the terminal device can directly determine to fall back to the second random access procedure. Or, when the preamble group configuration of the random access procedure satisfies the condition, the terminal device needs to use the first information to judge whether the first condition is met, such as whether the network supports it, and whether the network indicates execution, so as to determine whether to fall back to the second random access procedure. Access process.
  • the network device sends the first information to the terminal device, including:
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the second random access procedure, or the preamble group selection threshold configured in the first random access procedure is different from the preamble group configured in the second random access procedure
  • the network device sends the first information to the terminal device
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure is different from the preamble group configured in the third random access procedure
  • the network device sends the first information to the terminal device
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the second random access procedure, or the preamble group selection threshold configured in the first random access procedure is the same as the preamble group configured in the second random access procedure
  • the network device sends the first information to the terminal device
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure is the same as the preamble group configured in the third random access procedure In the case that the group selection thresholds are the same, the network device sends the first information to the terminal device.
  • the above method may further include: the preamble group configured in the first random access procedure is the same as the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure In a case where the preamble group selection threshold configured in the third random access procedure is the same, the terminal device falls back to the third random access procedure. That is to say, in some cases, the terminal device can directly fall back to the third random access procedure.
  • the first condition may include at least one of the following conditions 1-11:
  • Condition 1 The first message is received.
  • the first information is sent only when the network device supports fallback to the second random access procedure, then the first condition includes condition 1.
  • Condition 2 first information appears in the first message sent by the network device.
  • the network device will send the first message carrying the first information, and the first condition includes condition 2.
  • Condition 3 the first information indicates that the terminal device is supported to perform fallback from the first random access procedure to the second random access procedure.
  • the first condition includes condition 3.
  • Condition 4 the first information includes the maximum number of transmissions for the second random access procedure.
  • the first condition includes condition 4.
  • Condition 5 the first information does not include the maximum number of transmissions for the third random access procedure.
  • the first condition includes condition 5.
  • Condition 6 the first information does not include the maximum number of random access transmissions for the slice.
  • the second random access procedure is a general random access procedure
  • the first information is used to configure the maximum number of transmission times, based on the maximum number of transmission times, it indicates whether to support the process from the first random access procedure to the second random access procedure
  • the first condition includes condition 6.
  • Condition 7 No resources for the third random access procedure are configured.
  • the first condition includes condition 7.
  • Condition 8 the first information includes the maximum number of random access transmissions for a slice.
  • the second random access procedure is a random access procedure for a slice
  • the first information is used to configure the maximum number of transmission times, based on the maximum number of transmission times, it indicates whether to support the transition from the first random access procedure to the second random access procedure
  • the first condition includes condition 8.
  • Condition 9 The maximum number of random access transmissions for a slice is less than 1.
  • the second random access procedure is a general random access procedure
  • the first information is used to configure the maximum number of transmission times, based on the maximum number of transmission times, it indicates whether to support the process from the first random access procedure to the second random access procedure
  • the first condition includes condition 9.
  • Condition 10 resources for the second random access procedure are configured.
  • the first information sent by the network device is resource configuration information.
  • the second A condition includes condition 10.
  • Condition 11 the use condition of the first information is met.
  • condition 11 must also be satisfied before the rollback can be performed, that is, the first condition Condition 11 is included.
  • the first condition may include the above conditions 1, 3 and 11 at the same time.
  • the first condition may include the above-mentioned conditions 4, 5, and 11 at the same time, or include the above-mentioned Conditions 4, 6, 11, or both conditions 8 and 9 above.
  • the usage conditions of the first information may include at least one of the following conditions A-K:
  • Condition A the number of preamble transmissions in the first random access process is greater than the maximum number of random access transmissions for the slice;
  • Condition B No resources for the third random access procedure are configured
  • Condition C the preamble group configured in the first random access procedure is the same as the preamble group configured in the second random access procedure;
  • Condition D the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure;
  • Condition E configuring resources for the second random access procedure
  • Condition F configure the maximum number of transmissions for the second random access procedure
  • Condition G the maximum number of transmissions for the third random access procedure is not configured
  • Condition H The maximum number of random access transmissions for slices is not configured
  • Condition 1 configure the maximum number of transmissions for the third random access procedure
  • Condition J Configure the maximum number of random access transmissions for slices
  • Condition K the maximum number of random access transmissions for the slice or the maximum number of transmissions for the third random access procedure is greater than or equal to 1.
  • the first condition may include the above-mentioned conditions A-G at the same time, or include the above-mentioned conditions A-F and H at the same time.
  • this embodiment of the present application may also include obtaining a MAC PDU (Protocol Data Unit, protocol data unit).
  • MAC PDU Protocol Data Unit, protocol data unit
  • the above method further includes:
  • the terminal device obtains the first random access procedure in the second random access procedure based on the MAC PDU of message A in the first random access procedure MAC PDU of the three-step message.
  • the first random access process may be a two-step random access process such as a two-step random access process for a slice.
  • the second random access process may be a four-step random access process, such as a four-step general random access process, a four-step random access process for non-slicing, or a four-step random access process for slices.
  • message A may be MsgA in the two-step random access process
  • the third-step message may be Msg 3 in the four-step random access process.
  • the terminal device obtains the MAC PDU of the third step message in the second random access process based on the MAC PDU of message A in the first random access process, including:
  • the terminal device uses the MAC PDU of message A in the first random access process as the MAC PDU of the third step message in the second random access process;
  • the terminal device reassembles the packet based on the MAC PDU of message A in the first random access process, and obtains the MAC PDU in the third step message of the second random access process.
  • the second condition includes at least one of the following:
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the second random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is the same as the preamble group selection threshold configured in the second random access procedure;
  • the grant size of the third step message in the second random access procedure is the same as the MAC PDU size of message A in the first random access procedure.
  • the third condition may include at least one of the following:
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the second random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
  • the authorization size of the third step message in the second random access procedure is different from the MAC PDU size of message A in the first random access procedure.
  • the terminal device multiplexes the data and/or the MAC CE according to the priority of the data and/or the priority of the MAC CE .
  • the terminal device may multiplex data and/or MAC CE according to logical channel priority (Logical channel priority, LCP), including data priority and/or MAC CE priority.
  • logical channel priority Logical channel priority, LCP
  • the terminal device preferentially multiplexes data.
  • the priority of data is higher than that of MAC CE, and the terminal equipment prioritizes multiplexing data.
  • the terminal device in the process that the terminal device reassembles packets based on the MAC PDU of message A in the first random access process, if the resource size of the third step message in the second random access process is greater than that of the first random access process The authorized size of message A in the process, the terminal device fills the remaining space of the PDU based on preset bits or new data.
  • the preset bit is 0 or 1, for example.
  • the above method further Can include:
  • the terminal device obtains the MAC PDU of message A in the message A buffer.
  • the above method may also include:
  • the terminal device saves the MAC PDU of the third-step message in the second random access process obtained based on the MAC PDU of message A in the first random access process in the third-step message buffer.
  • the above method further includes:
  • the terminal device obtains the third The MAC PDU of the third step message in the random access process.
  • the first random access process may be a two-step random access process such as a two-step random access process for a slice.
  • the third random access process may be a four-step random access process, such as a four-step random access process for slices, a four-step general random access process, or a four-step random access process for non-slices.
  • message A may be MsgA in the two-step random access process
  • the third-step message may be Msg 3 in the four-step random access process.
  • the second condition includes at least one of the following:
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the third random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is the same as the preamble group selection threshold configured in the third random access procedure;
  • the grant size of the third step message in the third random access procedure is the same as the MAC PDU size of message A in the first random access procedure.
  • the third condition includes at least one of the following:
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
  • the authorization size of the third step message in the third random access procedure is different from the MAC PDU size of message A in the first random access procedure.
  • the terminal device multiplexes the data and/or the MAC CE according to the priority of the data and/or the priority of the MAC CE .
  • the terminal device can multiplex data and/or MAC CE according to LCP (including priority of data and/or priority of MAC CE).
  • the terminal device preferentially multiplexes data.
  • the priority of data is higher than that of MAC CE, and the terminal equipment prioritizes multiplexing data.
  • the terminal device fills the remaining space of the PDU based on preset bits or new data.
  • the method further includes :
  • the terminal device obtains the MAC PDU of message A in the message A buffer.
  • the above method also includes:
  • the terminal device saves the MAC PDU of the third-step message in the third random access process obtained based on the MAC PDU of message A in the first random access process in the third-step message buffer.
  • this embodiment of the present application may further provide a manner of stopping random access, stopping performing rollback of a random access procedure, or determining random access failure.
  • the above method further includes:
  • the terminal device stops random access, stops performing rollback from the first random access procedure to the second random access procedure, or determines that the random access fails.
  • the method also includes:
  • the terminal device stops random access, stops performing rollback from the first random access procedure to the third random access procedure, or determines that the random access fails.
  • the fourth condition includes:
  • Condition L the preamble group configured in the first random access procedure is different from the preamble group configured in the second random access procedure;
  • Condition M the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
  • Condition 0 the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure;
  • Condition P the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
  • Condition Q So the grant size of the third step message in the third random access procedure is different from the MAC PDU size of message A in the first random access procedure.
  • the fourth condition may include the above-mentioned conditions L-M at the same time.
  • the fourth condition may include the above conditions O-Q at the same time.
  • the fourth condition may include the above-mentioned conditions L-Q at the same time.
  • the embodiment of the present application further provides a configuration manner of random access resources.
  • the configuration manner of random access resources may be combined with the aforementioned random access method, or may be implemented independently.
  • the above method further includes:
  • the terminal device acquires random access resources based on the resource configuration information sent by the network device; wherein the random access resources include general random access resources and/or slice-specific random access resources.
  • the method further includes:
  • the network device sends resource configuration information to the terminal device, where the resource configuration information is used to indicate random access resources, and the random access resources include general random access resources and/or slice-specific random access resources.
  • the terminal device uses general random access resources to perform a random access process.
  • the terminal device can fall back from the two-step random access resources for slices to the four-step universal random access process, and A four-step universal random access procedure is performed using universal random access resources.
  • the terminal device may use general random access resources to perform a general random access procedure or a slice-specific random access procedure.
  • the random access resource for a slice is applicable to its corresponding slice or multiple slices in a corresponding slice group.
  • the network configures corresponding random access resources for each slice, and each configured random access resource is only applicable to its corresponding slice, and random access resources used by different slices may be different.
  • the network configures corresponding random access resources for each slice group, and each configured random access resource is applicable to multiple slices in its corresponding slice group, and the random access resources used by different slice groups Can be different.
  • the random access resource for a slice corresponds to at least one slice or at least one slice group.
  • the network can configure one or more slice-specific random access resources (slice-specific RA resources), wherein one slice-specific RA resource can be associated with one or more slices/slice groups.
  • slice-specific RA resources slice-specific random access resources
  • each slice or each slice group corresponds to only one slice-specific random access resource.
  • a slice or slice group can only be associated with one slice-specific RA resource. Based on this, the terminal device can uniquely determine the corresponding random access resource according to the slice information currently triggering the random access.
  • the above random access method further includes:
  • the terminal device determines the slice group to which the first slice belongs based on the mapping relationship between the slice and the slice group, and based on the random access corresponding to the slice group, Incoming resources for random access.
  • the mapping relationship between slices and slice groups is used to represent which slices are included in a slice group, or which slice group a slice belongs to. Specifically, if a slice group (slice group) includes multiple slices (slices), then if the UE's Non-Access Stratum (Non-Access Stratum, NAS) triggers
  • the slice information of the RA is a slice, and the UE needs to determine the slice group to which it belongs according to the mapping relationship between the slice and the slice group, and use the RA resources corresponding to the slice group to perform random access.
  • the RA resources used by each slice in the slice group are the same as the RA resource parameters.
  • the mapping relationship between slice and slice group can be saved by UE AS or given by UE NAS.
  • the above random access method further includes:
  • the terminal device In the case where the random access resource for a slice configured in the resource configuration information is applicable to its corresponding slice group, if the slice information triggering random access is the first slice, the terminal device, based on the slice and The mapping relationship of the slice group determines the slice group to which the first slice belongs, and performs random access based on the random access resource corresponding to the slice group.
  • a slice group includes multiple slices, and the slice-specific RA resource indicated by the network is for the slice group, then, if the slice information that triggers RA to the AS from the UE NAS is slice, the UE needs to The mapping relationship with the slice group determines the slice group to which it belongs, and uses the RA resources corresponding to the slice group to perform random access. Wherein, further, the RA resources used by each slice in the slice group are the same as the RA resource parameters.
  • the above random access method further includes:
  • the terminal device In the case where the random access resource for a slice configured in the resource configuration information is applicable to its corresponding slice group, if the slice information triggering random access is the first slice group, the terminal device, based on the performing random access on the random access resource corresponding to the first slice group.
  • a slice group includes multiple slices, and the slice-specific RA resource indicated by the network is for the slice group, then if the slice information of the AS that triggers the RA given by the UE NAS is the slice group, the UE uses The RA resources corresponding to the slice group are randomly accessed.
  • the resource configuration information is included in a system information block (System Information Block, SIB) and/or RRC signaling. That is, resource configuration information can be carried by SIB or RRC signaling.
  • SIB System Information Block
  • the above method further includes:
  • the terminal device executes a first random access process based on the random access resource for the slice.
  • the preamble group configured for the two-step random access procedure of the slice includes the first preamble group
  • the preamble group configured for the four-step random access procedure includes the The first preamble group
  • 4step RA should also be configured with preamble group B.
  • 4step RA includes but not limited to 4step slice-specific RA, and/or, 4step common RA.
  • the preamble group configured for the two-step random access procedure for the slice includes the The first preamble group
  • the preamble group configured in the four-step random access procedure includes the first preamble group
  • the four-step random access process includes at least one of the following: a four-step random access process for slices, a four-step random access process for non-slices, a four-step random access process for general resources, Four-step universal random access procedure.
  • the random access resources include resources for a two-step random access process for a slice and resources for a four-step random access process for a slice
  • the four-step random access process is for a slice Four-step random access process.
  • the 4step RA can be 4step slice-specific RA.
  • the random access resources include resources for a two-step random access process for a slice but do not include resources for a four-step random access process for a slice, or if the random access resources include resources for a slice
  • the resources of the two-step random access process but the resources of the four-step random access process in the random access resources are only configured with general random access resources
  • the four-step random access process is a four-step random access process for non-slicing One-step random access procedure or four-step random access procedure for common resources or four-step universal random access procedure.
  • the 4step RA can be 4step common RA.
  • the above random access method also includes:
  • the access stratum (AS) of the terminal device sends second information to the non-access stratum (NAS) of the terminal device, and the second information is used to indicate the non-access The layer does not send slice information to the access layer.
  • the embodiment of the present application further provides a cell reselection method, which may be combined with the above random access method, or may be implemented independently.
  • the method includes:
  • the network device sends slice-specific cell reselection information to the terminal device, and/or, the terminal device obtains slice-specific cell reselection information (slice-specific cell reselection) configured by the network device;
  • slice-specific cell reselection information (slice-specific cell reselection) configured by the network device;
  • the cell reselection information of is applicable to its corresponding slice or corresponding slice group.
  • the network can configure cell reselection information for slices.
  • the cell reselection information for a slice may be the cell reselection information used by a specific slice, or the cell reselection information used by a specific slice group.
  • the cell reselection information also includes cell reselection parameters.
  • the network may configure one or more pieces of cell reselection information for slices.
  • the slice-specific cell reselection information corresponds to at least one slice or at least one slice group.
  • a slice-specific cell reselection parameter or information can be associated with one or more slices/slice groups.
  • each slice or each slice group corresponds to only one slice-specific cell reselection information.
  • a slice or slice group can only be associated with one slice-specific cell reselection parameter or information. Based on this, the terminal device can uniquely determine the parameters or information of the corresponding slice-specific cell reselection based on the slice information that triggers the reselection.
  • the above method also includes:
  • the terminal device determines the slice group to which the second slice belongs based on the mapping relationship between the slice and the slice group, and based on the cell reselection information corresponding to the slice group , to perform cell reselection.
  • a slice group includes multiple slices
  • the slice information of the AS that triggers cell reselection (cell reselection) given by the UE NAS is a slice
  • the UE needs to determine the slice according to the mapping relationship between the slice and the slice group
  • the slice group it belongs to and use the parameters or information of reselection (reselection) corresponding to the slice group to perform cell reselection.
  • the reselection parameters or information used by each slice in the slice group are the same.
  • the mapping relationship between slice and slice group can be saved by UE AS or given by UE NAS.
  • the above method also includes:
  • the terminal device determines the the slice group described in the second slice, and perform cell reselection based on the cell reselection information corresponding to the slice group.
  • a slice group includes multiple slices, and the slice-specific reselection parameters or information indicated by the network are for the slice group, then, if the slice information that triggers the cell reselection from the UE NAS to the AS is slice, then The UE needs to determine the slice group it belongs to according to the mapping relationship between the slice and the slice group, and use the reselection parameters or information corresponding to the slice group to perform cell reselection. Wherein, further, the reselection parameters or information used by each slice in the slice group are the same.
  • the mapping relationship between slice and slice group can be saved by UE AS or given by UE NAS.
  • the above method also includes:
  • the terminal device Reselection information for cell reselection.
  • a slice group includes multiple slices, and the slice-specific reselection parameters or information indicated by the network are for the slice group, then if the slice information that triggers the cell reselection from the UE NAS to the AS is slice group, Then the UE uses the reselection parameters or information corresponding to the slice group to perform cell reselection.
  • the above method also includes:
  • the terminal device is based on the cell reselection information corresponding to the second slice Perform cell reselection.
  • the slice-specific reselection parameters or information indicated by the network are for slices
  • the slice information that triggers cell reselection sent by the UE NAS to the AS is a slice
  • the UE uses the slice-specific reselection parameters or information corresponding to the slice , to perform cell reselection.
  • the above method also includes:
  • the terminal device In the case that the cell reselection information for a slice is applicable to its corresponding slice, if the slice information triggering cell reselection is the second slice group, then the terminal device, based on the mapping relationship between the slice and the slice group, in the Determine a second slice from the second slice group, and perform cell reselection based on cell reselection information corresponding to the second slice.
  • the terminal device may randomly select a slice in the second slice group as the second slice, or select the slice at the first position in the group as the second slice, or select the slice with the highest priority in the group as the second slice.
  • the second slice or select the slice at the last position in the group as the second slice, or select the slice with the lowest priority in the group as the second slice, or select the slice with the smallest slice identifier in the group as the second slice, Or select the slice with the largest slice ID in the group as the second slice.
  • a slice group includes multiple slices, and the parameters or information of the slice-specific reselection indicated by the network are for the slice group, then, if the slice information that triggers the cell reselection from the UE NAS to the AS is the slice group, Then the terminal device selects a slice in the slice group, and uses the parameters or information of reselection corresponding to the selected slice to perform cell reselection.
  • the cell reselection information for a slice includes a frequency point corresponding to a slice or a cell corresponding to a slice.
  • the slice-specific cell reselection information is carried by SIB or dedicated signaling.
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice. That is to say, when indicating supported slices, only the frequency point corresponding to the cell can be indicated without indicating the identity of the cell or the physical cell identifier (Physical Cell Identifier, PCI).
  • PCI Physical Cell Identifier
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identifier (Cell Identifier, CI) corresponding to the slice ) or PCI.
  • the cell reselection information for a slice includes a cell identity CI or PCI corresponding to the cell, a frequency point corresponding to the cell, and slice information supported by the cell.
  • the slice-specific cell reselection information includes a cell identity CI or PCI corresponding to the cell and slice information supported by the cell.
  • the slice information includes at least one of a slice identifier, a slice group identifier, and a frequency point priority corresponding to the slice. That is to say, when the slice supported by the cell is different from the slice supported by the service frequency point, the cell reselection information for the slice indicates the granularity of the cell, including the information used to identify the cell and the information used to identify the cell supported. slice information.
  • the slice information supported by the serving cell is the same as the slice supported by the serving frequency point.
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice. That is to say, when indicating supported slices, only the frequency points corresponding to the cell may be indicated without indicating the identifier or PCI of the cell.
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identity or PCI corresponding to the slice.
  • the above method applied to cell reselection is also applicable to the cell selection (cell selection) process, that is, the embodiment of the present application also provides a cell selection method, which can be combined with the above random access method, cell reselection Methods can be combined or implemented independently.
  • cell selection cell selection
  • the embodiment of the present application also provides a cell selection method, which can be combined with the above random access method, cell reselection Methods can be combined or implemented independently.
  • cell selection method refer to the following optional methods for details.
  • the method includes:
  • the network device sends cell selection information for the slice to the terminal device, and/or the terminal device acquires the cell selection information for the slice configured by the network device; wherein the cell selection information for the slice is applicable to its corresponding A slice or corresponding slice group.
  • the slice-specific cell selection information corresponds to at least one slice or at least one slice group.
  • each slice or each slice group corresponds to only one slice-specific cell selection information.
  • the above method further includes: if the slice information triggering cell selection is a third slice, the terminal device determines the slice group to which the third slice belongs based on the mapping relationship between the slice and the slice group, and based on the The cell selection information corresponding to the slice group is used for cell selection.
  • the above method further includes: in the case that the cell selection information for a slice is applicable to its corresponding slice group, if the slice information triggering cell selection is the third slice, the terminal device determine the slice group described in the third slice, and perform cell selection based on the cell selection information corresponding to the slice group.
  • the above method further includes: in the case that the cell selection information for a slice is applicable to its corresponding slice group, if the slice information triggering cell selection is the third slice group, then the terminal device based on the The cell selection information corresponding to the third slice group performs cell selection.
  • the above method further includes: in the case that the cell selection information for a slice is applicable to its corresponding slice, if the slice information triggering cell selection is a third slice, the terminal device, based on the third slice, The cell selection information corresponding to the slice is used for cell selection.
  • the above method further includes: in the case that the cell selection information for a slice is applicable to its corresponding slice, if the slice information triggering cell selection is the third slice group, the terminal device The third slice is determined in the third slice group, and the cell selection is performed based on the cell selection information corresponding to the third slice.
  • the terminal device may randomly select a slice in the third slice group as the third slice, or select the slice at the first position in the group as the third slice, or select the slice with the highest priority in the group as the third slice.
  • the third slice or select the slice at the last position in the group as the third slice, or select the slice with the lowest priority in the group as the third slice, or select the slice with the smallest slice identifier in the group as the third slice, or The slice with the largest slice identity within the group is selected as the third slice.
  • the cell selection information for a slice includes a frequency point corresponding to a slice or a cell corresponding to a slice.
  • the slice-specific cell selection information is carried by SIB or dedicated signaling.
  • the cell selection information for the slice includes the frequency point of the cell corresponding to the slice. That is to say, when indicating supported slices, only the frequency points corresponding to the cell may be indicated without indicating the identifier or PCI of the cell.
  • the cell selection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identity CI or physical cell identity PCI corresponding to the slice .
  • the cell reselection information for a slice includes a cell identity CI or PCI corresponding to the cell, a frequency point corresponding to the cell, and slice information supported by the cell.
  • the cell reselection information for a slice includes a cell identity CI or PCI corresponding to the cell and slice information supported by the cell.
  • the slice information includes at least one of a slice identifier, a slice group identifier, and a frequency point priority corresponding to the slice.
  • the cell selection information for the slice includes the frequency point of the cell corresponding to the slice. That is to say, when indicating supported slices, only the frequency points corresponding to the cell may be indicated without indicating the identifier or PCI of the cell.
  • the cell selection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identity CI or physical cell identity PCI corresponding to the slice.
  • the UE when the first condition is satisfied, the UE performs the first random access process (two-step random access process for slices, 2-step slice-specific RACH) to the second random access process (four Step common random access process, four-step random access process for common resources, 4-step common RACH) fallback or handover.
  • first random access process two-step random access process for slices, 2-step slice-specific RACH
  • second random access process four Step common random access process, four-step random access process for common resources, 4-step common RACH
  • the network configures RACH resources. Refer to one or more of the following implementation details:
  • the RACH resources include common random access resources (common RACH resources) and/or slice-specific RACH resources.
  • the slice is not configured with the RACH resource of the corresponding slice, it means that the UE uses the common RACH resource.
  • the RACH resources for slices may be RACH resources for slice groups.
  • all slices belonging to the same slice group use the same RACH resources
  • the network indicates the first information, and the first information is used to indicate whether the UE is supported to perform fallback or switching from 2-step slice-specific RACH to 4-step common RACH:
  • the first information is for each slice (per slice) or for each slice group (per slice group).
  • the first information is common to each slice/slice group (slice/slice group common).
  • the first information is the maximum number of MsgA transmissions for the slice, and this parameter is different from the msgA-TransMax parameter in the aforementioned related art.
  • the maximum number of MsgA transmissions for a slice is one of positive integers greater than or equal to 1.
  • the maximum number of MsgA transmissions for a slice may be common to the slice, or different for different slices.
  • the first information is used when the preamble (preamble) groups configured by the 2-step slice-specific RACH and the 4-step common RACH are different.
  • the first information is used when the preamble groups configured by the 2-step slice-specific RACH and the 4-step slice-specific RACH are different.
  • vice versa used when the preamble groups configured by 2-step slice-specific RACH and 4-step common RACH are the same.
  • the first information, in 2-step slice-specific RACH and 4-step slice-specific RACH configured preamble groups are the same).
  • 2-step slice-specific RACH is configured with preamble group A and preamble group B
  • 4-step common RACH is only configured with preamble group A or preamble group B, that is, 2-step slice-specific RACH and 4-step slice -specific
  • the preamble group configured by RACH is different.
  • 2-step slice-specific RACH is only configured with preamble group A or preamble group B, however, 4-step common RACH is configured with preamble group A and preamble group B, that is, 2-step slice-specific RACH and 4-step slice -specific
  • the preamble group configured by RACH is different.
  • the UE obtains the RACH configuration, and performs slice-specific RACH transmission according to the RACH resource corresponding to the slice. For example, when 2-step slice-specific RACH transmission is satisfied, the UE performs 2-step slice-specific RACH.
  • the UE When the first condition is met, the UE performs fallback or switching from 2-step slice-specific RACH to 4-step common RACH.
  • the first condition includes at least one of the following: the first information is received, the first information appears, the first information is set to true, the value of the first information is greater than or equal to 1, and the first Conditions of Use of Information.
  • the usage conditions of the first information may include at least one of the following:
  • PREAMBLE_TRANSMISSION_COUNTER MsgA maximum transmission times + 1 for the slice;
  • 2-step slice-specific RACH and 4-step common RACH configure the same preamble group (for example, both configure preamble group A and preamble group B, and/or, preamble group A and preamble group B have the same selection threshold);
  • the preamble groups configured for 2-step slice-specific RACH and 4-step slice-specific RACH are different (for example, preamble group A and preamble group B are not both configured, and/or, the selection thresholds of preamble group A and preamble group B are different ).
  • the UE performs subsequent RACH procedures.
  • the third random access process in the second random access process is obtained MAC PDU of step message (Msg 3MAC PDU).
  • the network configures RACH resources. Refer to one or more of the following implementation details:
  • the RACH resources include common random access resources (common RACH resources) and/or slice-specific RACH resources.
  • the slice is not configured with the RACH resource of the corresponding slice, it means that the UE uses the common RACH resource.
  • the RACH resources for slices may be RACH resources for slice groups.
  • all slices belonging to the same slice group use the same RACH resource
  • the UE obtains the RACH configuration, and performs slice-specific RACH transmission according to the RACH resource corresponding to the slice. For example, when 2-step slice-specific RACH transmission is satisfied, the UE performs 2-step slice-specific RACH.
  • the UE When performing RACH fallback or handover, the UE obtains the Msg3MAC PDU. Specifically, refer to one or more of the following implementation details:
  • group A is selected for 2-step slice-specific RACH, and group A is also selected for 4-step common RACH.
  • Msg3MAC PDU is MsgA MAC PDU.
  • the second condition includes at least one of the following:
  • 2-step slice-specific RACH and 4-step common RACH configure the same preamble group (for example, both configure preamble group A and preamble group B, for example, both configure only preamble group A or preamble group B);
  • 2-step slice-specific RACH and 4-step common RACH configure the same preamble group selection threshold (for example, 2-step slice-specific RACH and 4-step common RACH have the same selection threshold for preamble group A and preamble group B);
  • 2-step slice-specific RACH and 4-step slice-specific RACH configure the same preamble group (for example, both configure preamble group A and preamble group B, for example, both configure only preamble group A or preamble group B;
  • 2-step slice-specific RACH and 4-step slice-specific RACH configure the same preamble group selection threshold (for example, 2-step slice-specific RACH and 4-step slice-specific RACH select preamble group A and preamble group B same threshold);
  • the grant size of Msg3 is the same as the MsgA MAC PDU size.
  • the MsgA MAC PDU is reassembled, and the reassembled MAC PDU is stored in the Msg3buffer, that is to say, the Msg3MAC PDU is the MAC PDU of the MsgA MAC PDU reassembled packet.
  • the third condition includes at least one of the following:
  • 2-step slice-specific RACH and 4-step common RACH configure different preamble groups (for example, preamble group A and preamble group B are not both configured);
  • 2-step slice-specific RACH and 4-step common RACH have different preamble selection thresholds (for example, 2-step slice-specific RACH and 4-step common RACH have different selection thresholds for preamble group A and preamble group B);
  • the preamble groups configured by 2-step slice-specific RACH and 4-step slice-specific RACH are different (for example, preamble group A and preamble group B are not both configured);
  • 2-step slice-specific RACH and 4-step slice-specific RACH configure different preamble group selection thresholds (for example, 2-step slice-specific RACH and 4-step slice-specific RACH select preamble group A and preamble group B different thresholds);
  • Msg3grant size is different from MsgA MAC PDU size.
  • How to reassemble the packet may depend on UE implementation
  • the UE performs subsequent RACH procedures.
  • the UE stops the current RACH transmission, or the UE stops the RACH fallback/handover, or the UE considers that the RACH process fails.
  • the network configures RACH resources. Refer to one or more of the following implementation details:
  • the RACH resources include common random access resources (common RACH resources) and/or slice-specific RACH resources.
  • the slice is not configured with the RACH resource of the corresponding slice, it means that the UE uses the common RACH resource.
  • the RACH resources for slices may be RACH resources for slice groups.
  • all slices belonging to the same slice group use the same RACH resource
  • the UE obtains the RACH configuration, and performs slice-specific RACH transmission according to the RACH resource corresponding to the slice. For example, when 2-step slice-specific RACH transmission is satisfied, the UE performs 2-step slice-specific RACH.
  • the UE stops the current RACH transmission, or the UE stops the RACH fallback/handover, or the UE considers that the RACH procedure fails.
  • the fourth condition is at least one of the following:
  • 2-step slice-specific RACH and 4-step common RACH configure different preamble groups (for example, preamble group A and preamble group B are not both configured);
  • 2-step slice-specific RACH and 4-step common RACH have different preamble selection thresholds (for example, 2-step slice-specific RACH and 4-step common RACH have different selection thresholds for preamble group A and preamble group B);
  • Msg3grant size is different from MsgA MAC PDU size.
  • this application example provides a way to stop RACH or stop RACH fallback.
  • the UE when the maximum number of transmissions for the slice-specific random access procedure is configured, the UE performs the transition from the 2-step slice-specific RACH to the slice-specific RACH based on the number of transmissions.
  • the network configures RACH resources. Refer to one or more of the following implementation details:
  • the RACH resources include common random access resources (common RACH resources) and/or slice-specific RACH resources.
  • the slice is not configured with the RACH resource of the corresponding slice, it means that the UE uses the common RACH resource.
  • the RACH resources for slices may be RACH resources for slice groups.
  • all slices belonging to the same slice group use the same RACH resource
  • the network indicates the first information.
  • the first information is the maximum random access transmission times (MsgA maximum transmission times) for the slice, and this parameter is different from the msgA-TransMax parameter in the aforementioned related art.
  • MsgA maximum transmission times the maximum random access transmission times
  • the maximum number of MsgA transmissions for a slice is one of positive integers greater than or equal to 1.
  • the maximum number of MsgA transmissions for a slice may be common to the slice, or different for different slices.
  • the UE obtains the RACH configuration, and performs slice-specific RACH transmission according to the RACH resource corresponding to the slice. For example, when 2-step slice-specific RACH transmission is satisfied, the UE performs 2-step slice-specific RACH.
  • PREAMBLE_TRANSMISSION_COUNTER When the number of preamble transmissions (PREAMBLE_TRANSMISSION_COUNTER) reaches the maximum number of MsgA transmissions for the slice, the UE performs fallback or switching from 2-step slice-specific RACH to 4-step slice-specific RACH.
  • the UE performs subsequent RACH procedures.
  • the UE performs a 2-step slice-specific random access procedure (2-step slice-specific RACH) to a four-step random access procedure (4-step slice-specific RACH or 4-step common RACH) fallback or handover.
  • a 2-step slice-specific random access procedure (2-step slice-specific RACH)
  • a four-step random access procedure (4-step slice-specific RACH or 4-step common RACH) fallback or handover.
  • the network configures RACH resources. Refer to one or more of the following implementation details:
  • the RACH resources include common random access resources (common RACH resources) and/or slice-specific RACH resources.
  • the slice is not configured with the RACH resource of the corresponding slice, it means that the UE uses the common RACH resource.
  • the RACH resources for slices may be RACH resources for slice groups.
  • all slices belonging to the same slice group use the same RACH resource
  • the network is only configured with msgA-TransMax, and the maximum number of random access transmissions for slices (the maximum number of transmissions of MsgA) is not configured.
  • the UE obtains the RACH configuration, and performs slice-specific RACH transmission according to the RACH resource corresponding to the slice. For example, when 2-step slice-specific RACH transmission is satisfied, the UE performs 2-step slice-specific RACH.
  • PREAMBLE_TRANSMISSION_COUNTER When the number of preamble transmissions (PREAMBLE_TRANSMISSION_COUNTER) reaches msgA-TransMax, the UE performs fallback or switching from 2-step slice-specific RACH to 4-step slice-specific RACH or 4-step common RACH.
  • the UE performs subsequent RACH procedures.
  • the UE performs a 2-step slice-specific random access procedure (2-step slice-specific RACH) to a four-step random access procedure (4-step slice-specific RACH or 4-step common RACH) fallback or handover.
  • a 2-step slice-specific random access procedure (2-step slice-specific RACH)
  • a four-step random access procedure (4-step slice-specific RACH or 4-step common RACH) fallback or handover.
  • the network configures RACH resources. Refer to one or more of the following implementation details:
  • the RACH resources include common random access resources (common RACH resources) and/or slice-specific RACH resources.
  • the slice is not configured with the RACH resource of the corresponding slice, it means that the UE uses the common RACH resource.
  • the RACH resources for slices may be RACH resources for slice groups.
  • all slices belonging to the same slice group use the same RACH resource
  • the network is only configured with msgA-TransMax, and the maximum number of random access transmissions for slices (the maximum number of transmissions of MsgA) is not configured.
  • the network indicates that the configured msgA-TransMax is used or can also be used to perform random access fallback for slices.
  • the UE obtains the RACH configuration, and performs slice-specific RACH transmission according to the RACH resource corresponding to the slice. For example, when 2-step slice-specific RACH transmission is satisfied, the UE performs 2-step slice-specific RACH.
  • PREAMBLE_TRANSMISSION_COUNTER When the number of preamble transmissions (PREAMBLE_TRANSMISSION_COUNTER) reaches msgA-TransMax, the UE performs fallback or switching from 2-step slice-specific RACH to 4-step slice-specific RACH or 4-step common RACH.
  • the UE performs subsequent RACH procedures.
  • the slice-specific UE capability is added, which belongs to optional features without UE radio access capability parameters (optional features without UE radio access capability parameters). It should be noted that the solution for introducing this capability provided in this application example can be implemented in combination with the aforementioned methods, or can be implemented independently. Optionally, this capability is introduced separately for the cell reselection of the slice and the RACH of the slice.
  • RACH partitioning the ability to support RACH partitioning
  • RACH fallback the ability to support RACH prioritization
  • RACH prioritization the ability to support slice-based RACH processes
  • Capability at least one of slice-based RACH resource selection capability. That is, at least one of them is an independent capability or an overall capability.
  • a capability of slice frequency priority and/or frequency sub priority is introduced.
  • the UE capability for the slice is added, and the capability belongs to UE radio access capability parameters (UE radio access capability parameters).
  • UE radio access capability parameters UE radio access capability parameters
  • the cell reselection for the slice and/or the RACH for the slice respectively introduce this capability.
  • the capability of frequency point priority and/or frequency point sub priority for slice is introduced. That is, at least one of them is an independent ability, or an overall ability.
  • At least one of the ability to support RACH partitioning, the ability to support RACH fallback, the ability to support RACH prioritization, the ability to support slice-based RACH processes, and the ability to support slice-based RACH resource selection can be further introduced.
  • at least one of them is an independent capability or an overall capability.
  • the capability is whether the UE supports receiving slice-related information in dedicated RRC, such as RRCrelease.
  • the slice-related information may be slice-specific cell selection information, and/or slice-specific cell reselection information, and/or slice-specific RACH information, such as slice-based RACH fallback, Slice-based RACH selection, slice-based RA priority parameter selection, slice-based RACH process, and the aforementioned maximum number of transmissions, etc.
  • the capability is whether the UE supports receiving the reselection priority and/or sub-priority for the slice in dedicated RRC, such as RRCelelease.
  • this capability is based on UE or BC (band combination, band combination).
  • the capability is optional.
  • this capability does not distinguish FDD (Frequency Division Duplexing, frequency division duplexing) and TDD (Time Division Duplexing, time division duplexing), or, distinguishes FDD-TDD.
  • the capability does not distinguish frequency bands or distinguishes frequency bands, for example, does not distinguish between FR1 and FR2, or distinguishes between FR1 and FR2.
  • whether the terminal device performs a fallback from the first random access procedure to the second random access procedure is based on whether the network device supports or instructs the terminal device to perform a fallback to the second random access procedure Determined, or based on whether the network device supports or instructs the terminal device to perform fallback to other random access procedures. In this way, the terminal device can correctly implement the rollback of the random access procedure.
  • this embodiment of the present application further provides a terminal device 100, referring to FIG. 8 , which includes:
  • the first processing module 110 is configured to determine whether to perform a fallback from the first random access procedure to the second random access procedure based on the first information sent by the network device;
  • the first information is used to indicate whether to support or perform a rollback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a rollback from the first random access procedure to the second random access procedure. Rollback from the random access procedure to the third random access procedure.
  • the first random access procedure includes a slice-specific random access procedure.
  • the second random access procedure includes a random access procedure for non-slicing, or a random access procedure for general resources, or a general random access procedure.
  • the third random access procedure includes a random access procedure for slices.
  • the first random access procedure includes a two-step random access procedure for slices
  • the third random access procedure includes a four-step random access procedure for slices.
  • the second random access procedure includes a four-step random access procedure for non-slicing, or a four-step random access procedure for common resources, or a four-step universal random access procedure.
  • the first information includes maximum number of transmissions and/or resources for a random access procedure.
  • the first information when the first information includes the maximum number of transmissions for the second random access procedure, and/or the first information does not include the maximum number of transmissions for the third random access procedure, And/or, when the maximum number of transmissions for the second random access procedure in the first information is greater than or equal to 1, the first information is used to indicate that the terminal device is supported to execute A fallback from a random access procedure to the second random access procedure.
  • the first information when the first information includes the maximum number of transmissions for the third random access procedure, and/or the first information does not include the maximum number of transmissions for the second random access procedure, And/or, when the maximum number of transmissions for the third random access procedure in the first information is greater than or equal to 1, the first information is used to indicate that the terminal device is supported to perform The rollback from the random access procedure to the third random access procedure.
  • the first information includes a maximum number of transmissions for the third random access procedure, and/or, the maximum number of transmissions for the third random access procedure in the first information is greater than In the case of being equal to 1, if the first information does not include resources for the third random access procedure, the first information is used to indicate that the terminal device is supported to perform the resource from the first random access procedure A fallback to the second random access procedure.
  • the first information includes a maximum number of transmissions for the third random access procedure, and/or, the maximum number of transmissions for the third random access procedure in the first information is greater than When it is equal to 1, if the first information includes resources for the second random access procedure, the first information is used to indicate that the terminal device is supported to perform the process from the first random access procedure to Rollback of the second random access procedure.
  • the first information corresponds to one of the multiple slices, and the first information is applicable to the corresponding slice.
  • the first information corresponds to one slice group in the multiple slice groups, and the first information is applicable to multiple slices in the corresponding slice group.
  • the first information is applicable to multiple slices or multiple slice groups.
  • the first processing module 110 is configured to:
  • the first processing module 110 is configured to:
  • the first processing module 110 is configured to:
  • the first processing module 110 is configured to:
  • the first processing module 110 is further configured to:
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the second random access procedure, or the preamble group selection threshold configured in the first random access procedure is different from that configured in the second random access procedure If the preamble group selection thresholds configured in the two random access procedures are different, the terminal device falls back to the second random access procedure or determines whether the first condition is met based on the first information;
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure is different from that configured in the third random access procedure If the preamble group selection thresholds configured by the three random access procedures are different, the terminal device falls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the second random access procedure, or the preamble group selection threshold configured in the first random access procedure is the same as that configured in the second random access procedure If the preamble group selection thresholds configured in the two random access procedures are the same, the terminal device falls back to the second random access procedure or determines whether the first condition is satisfied based on the first information;
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure is the same as that configured in the third random access procedure If the preamble group selection thresholds configured by the three random access procedures are the same, the terminal device falls back to the second random access procedure or determines whether the first condition is met based on the first information.
  • the first processing module 110 is further configured to:
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure is the same as that configured in the third random access procedure In a case where the preamble group selection thresholds configured by the three random access procedures are the same, the terminal device falls back to the third random access procedure.
  • the first condition includes at least one of the following:
  • the first information appears in a first message sent by the network device
  • the first information indicates that the terminal device is supported to perform rollback from the first random access procedure to the second random access procedure
  • the first information includes a maximum number of transmissions for the second random access procedure
  • the first information does not include a maximum number of transmissions for the third random access procedure
  • the first information does not include a maximum number of random access transmissions for a slice
  • the first information includes a maximum number of random access transmissions for a slice
  • the maximum number of random access transmissions for slices is less than 1;
  • the use condition of the first information is satisfied.
  • the usage conditions of the first information include at least one of the following:
  • the number of preamble transmissions of the first random access procedure is greater than the maximum number of random access transmissions for the slice
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the second random access procedure;
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure;
  • the maximum number of transmissions for the third random access procedure is not configured
  • the maximum number of random access transmissions for slices is not configured
  • the maximum number of random access transmissions for the slice or the maximum number of transmissions for the third random access procedure is greater than or equal to 1.
  • the first processing module 110 is further configured to:
  • the terminal device In the case of performing a fallback from the first random access procedure to the second random access procedure, the terminal device is based on the medium access control protocol of message A in the first random access procedure
  • the data unit MAC PDU obtains the MAC PDU of the third step message in the second random access process.
  • the first processing module 110 is configured to:
  • the MAC PDU of message A in the first random access process is used as the MAC PDU of the third step message in the second random access process;
  • repacking is performed based on the MAC PDU of message A in the first random access process to obtain the MAC PDU in the third step message of the second random access process.
  • the terminal device fills the remaining space of the PDU based on preset bits or new data.
  • the first processing module 110 is further configured to:
  • the first processing module 110 is further configured to:
  • the MAC PDU of the third step message in the second random access process obtained based on the MAC PDU of message A in the first random access process is stored in the third step message buffer.
  • the first processing module 110 is further configured to:
  • the terminal device In the case of performing a fallback from the first random access procedure to the third random access procedure, the terminal device is based on the medium access control protocol of message A in the first random access procedure
  • the data unit MAC PDU is to obtain the MAC PDU of the third step message in the third random access process.
  • the first processing module 110 is specifically configured to:
  • the MAC PDU of message A in the first random access process is used as the MAC PDU of the third step message in the third random access process;
  • repacking is performed based on the MAC PDU of message A in the first random access process, to obtain the MAC PDU of the third step message in the third random access process.
  • the terminal device fills the remaining space of the PDU based on preset bits or new data.
  • the first processing module 110 is further configured to:
  • the first processing module 110 is further configured to:
  • the MAC PDU of the third step message in the third random access process obtained based on the MAC PDU of message A in the first random access process is stored in the third step message buffer.
  • the second condition includes at least one of the following:
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the second random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is the same as the preamble group selection threshold configured in the second random access procedure;
  • the authorization size of the third step message in the second random access procedure is the same as the MAC PDU size of the message A in the first random access procedure;
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the third random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is the same as the preamble group selection threshold configured in the third random access procedure;
  • the grant size of the third-step message in the third random access procedure is the same as the MAC PDU size of message A in the first random access procedure.
  • the third condition includes at least one of the following:
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the second random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
  • the authorization size of the third step message in the second random access procedure is different from the MAC PDU size of message A in the first random access procedure;
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
  • the authorization size of the third step message in the third random access procedure is different from the MAC PDU size of message A in the first random access procedure.
  • the terminal device multiplexes the data and/or the MAC CE.
  • the terminal device preferentially multiplexes data.
  • the first processing module 110 is further configured to:
  • the terminal device stops random access, stops performing rollback from the first random access procedure to the second random access procedure, or determines that random access fails.
  • the first processing module 110 is further configured to:
  • the terminal device stops random access, stops performing rollback from the first random access procedure to the third random access procedure, or determines that random access fails.
  • the fourth condition includes:
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the second random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the second random access procedure;
  • the authorization size of the third step message in the second random access procedure is different from the MAC PDU size of message A in the first random access procedure;
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure;
  • the preamble group selection threshold configured in the first random access procedure is different from the preamble group selection threshold configured in the third random access procedure;
  • the authorization size of the third step message in the third random access procedure is different from the MAC PDU size of message A in the first random access procedure.
  • the first processing module 110 is further configured to:
  • the first processing module 110 is further configured to:
  • random access resources do not include random access resources for slices
  • a random access procedure is performed using general random access resources.
  • the random access resource for a slice is applicable to its corresponding slice or multiple slices in a corresponding slice group.
  • the first processing module 110 is further configured to: if the slice information triggering random access is the first slice, determine the slice group to which the first slice belongs based on the mapping relationship between slices and slice groups , and perform random access based on the random access resource corresponding to the slice group.
  • the first processing module 110 is further configured to: in the case that the random access resource for a slice configured in the resource configuration information is applicable to its corresponding slice group, if the slice that triggers random access If the information is the first slice, the slice group to which the first slice belongs is determined based on the mapping relationship between the slice and the slice group, and random access is performed based on the random access resource corresponding to the slice group.
  • the first processing module 110 is further configured to: in the case that the random access resource for a slice configured in the resource configuration information is applicable to its corresponding slice group, if the slice that triggers random access If the information is the first slice group, the terminal device performs random access based on the random access resource corresponding to the first slice group.
  • the resource configuration information is included in a system information block (SIB) and/or radio resource control (RRC) signaling.
  • SIB system information block
  • RRC radio resource control
  • the first processing module 110 is further configured to:
  • the first random access procedure is performed based on the slice-specific random access resources.
  • the first processing module 110 is further configured to: obtain slice-specific cell reselection information configured by the network device; wherein, the slice-specific cell reselection information is applicable to its corresponding slice or corresponding slice group.
  • the slice-specific cell reselection information corresponds to at least one slice or at least one slice group.
  • each slice or each slice group corresponds to only one slice-specific cell reselection information.
  • the method also includes:
  • the terminal device determines the slice group to which the second slice belongs based on the mapping relationship between the slice and the slice group, and based on the cell reselection information corresponding to the slice group , to perform cell reselection.
  • the first processing module 110 is further configured to: in the case that the cell reselection information for a slice is applicable to its corresponding slice group, if the slice information triggering cell reselection is the second slice, then Determining the slice group described in the second slice based on the mapping relationship between the slice and the slice group, and performing cell reselection based on the cell reselection information corresponding to the slice group.
  • the first processing module 110 is further configured to: in the case that the cell reselection information for a slice is applicable to its corresponding slice group, if the slice information triggering cell reselection is the second slice group, Then perform cell reselection based on the cell reselection information corresponding to the second slice group.
  • the first processing module 110 is further configured to: in the case that the cell reselection information for a slice is applicable to its corresponding slice, if the slice information triggering cell reselection is the second slice, then based on The cell reselection information corresponding to the second slice performs cell reselection.
  • the first processing module 110 is further configured to: in the case that the cell reselection information for a slice is applicable to its corresponding slice, if the slice information triggering cell reselection is the second slice group, then Based on the mapping relationship between slices and slice groups, determine a second slice in the second slice group, and perform cell reselection based on cell reselection information corresponding to the second slice.
  • the terminal device may randomly select a slice in the second slice group as the second slice, or select the slice at the first position in the group as the second slice, or select the slice with the highest priority in the group as the second slice.
  • the second slice or select the slice at the last position in the group as the second slice, or select the slice with the lowest priority in the group as the second slice, or select the slice with the smallest slice identifier in the group as the second slice, Or select the slice with the largest slice ID in the group as the second slice.
  • the cell reselection information for a slice includes a frequency point corresponding to a slice or a cell corresponding to a slice.
  • the slice-specific cell reselection information is carried by SIB or dedicated signaling.
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice. That is to say, when indicating supported slices, only the frequency points corresponding to the cell may be indicated without indicating the identifier or PCI of the cell.
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identity CI or physical cell identity corresponding to the slice PCI.
  • the cell reselection information for a slice includes a cell identity CI or PCI corresponding to the cell, a frequency point corresponding to the cell, and slice information supported by the cell.
  • the slice-specific cell reselection information includes a cell identity CI or PCI corresponding to the cell and slice information supported by the cell.
  • the slice information includes at least one of a slice identifier, a slice group identifier, and a frequency point priority corresponding to the slice.
  • the slice information supported by the serving cell is the same as the slice supported by the serving frequency point.
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice. That is to say, when indicating supported slices, only the frequency points corresponding to the cell may be indicated without indicating the identifier or PCI of the cell.
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identity or PCI corresponding to the slice.
  • the first processing module 110 is further configured to: acquire slice-specific cell selection information configured by the network device; wherein, the slice-specific cell selection information is applicable to its corresponding slice or corresponding slice group .
  • the slice-specific cell selection information corresponds to at least one slice or at least one slice group.
  • each slice or each slice group corresponds to only one slice-specific cell selection information.
  • the method also includes:
  • the terminal device determines the slice group to which the third slice belongs based on the mapping relationship between slices and slice groups, and performs cell selection based on the cell selection information corresponding to the slice group. Cell selection.
  • the first processing module 110 is further configured to: in the case that the cell selection information for a slice is applicable to its corresponding slice group, if the slice information triggering the cell selection is the third slice, then based on the slice The mapping relationship with the slice group determines the slice group described in the third slice, and performs cell selection based on the cell selection information corresponding to the slice group.
  • the first processing module 110 is further configured to: in the case that the cell selection information for a slice is applicable to its corresponding slice group, if the slice information triggering cell selection is the third slice group, then based on The cell selection information corresponding to the third slice group performs cell selection.
  • the first processing module 110 is further configured to: in the case that the cell selection information for a slice is applicable to its corresponding slice, if the slice information triggering the cell selection is the third slice, based on the The cell selection information corresponding to the third slice performs cell selection.
  • the first processing module 110 is further configured to: in the case that the cell selection information for a slice is applicable to its corresponding slice, if the slice information triggering the cell selection is the third slice group, then based on the slice For the mapping relationship with the slice group, determine the third slice in the third slice group, and perform cell selection based on the cell selection information corresponding to the third slice.
  • the terminal device may randomly select a slice in the third slice group as the third slice, or select the slice at the first position in the group as the third slice, or select the slice with the highest priority in the group as the third slice.
  • the third slice or select the slice at the last position in the group as the third slice, or select the slice with the lowest priority in the group as the third slice, or select the slice with the smallest slice identifier in the group as the third slice, or The slice with the largest slice identity within the group is selected as the third slice.
  • the cell selection information for a slice includes a frequency point corresponding to a slice or a cell corresponding to a slice.
  • the slice-specific cell selection information is carried by SIB or dedicated signaling.
  • the cell selection information for the slice includes the frequency point of the cell corresponding to the slice. That is to say, when indicating supported slices, only the frequency points corresponding to the cell may be indicated without indicating the identifier or PCI of the cell.
  • the cell selection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identity CI or physical cell identity PCI corresponding to the slice .
  • the cell reselection information for a slice includes a cell identity CI or PCI corresponding to the cell, a frequency point corresponding to the cell, and slice information supported by the cell.
  • the cell reselection information for a slice includes a cell identity CI or PCI corresponding to the cell and slice information supported by the cell.
  • the slice information includes at least one of a slice identifier, a slice group identifier, and a frequency point priority corresponding to the slice.
  • the cell selection information for the slice includes a frequency point of the cell corresponding to the slice. That is to say, when indicating supported slices, only the frequency points corresponding to the cell may be indicated without indicating the identifier or PCI of the cell.
  • the cell selection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identity CI or physical cell identity PCI corresponding to the slice.
  • the first processing module 110 is further configured to:
  • the access layer of the terminal device sends second information to the non-access layer of the terminal device, where the second information is used to indicate that the non-access The access layer does not send slice information to the access layer.
  • the terminal device 100 in the embodiment of the present application can realize the corresponding functions of the terminal device in the foregoing method embodiments, and the corresponding processes, functions, implementation methods and benefits of each module (submodule, unit or component, etc.) in the terminal device 100
  • each module submodule, unit or component, etc.
  • the functions described by the various modules (submodules, units or components, etc.) in the terminal device 100 in the embodiment of the present application may be implemented by different modules (submodules, units or components, etc.), or may be implemented by the same One module (submodule, unit or component, etc.) realizes, for example, the first sending module and the second sending module can be different modules, also can be the same module, all can realize its in the embodiment of the present application corresponding function.
  • the communication module in the embodiment of the present application may be implemented by a transceiver of the device, and part or all of the other modules may be implemented by a processor of the device.
  • Fig. 9 is a schematic block diagram of a network device 200 according to an embodiment of the present application.
  • the network device 200 may include:
  • the first communication module 210 is configured to send first information to the terminal device, so that the terminal device determines whether to perform a rollback from the first random access procedure to the second random access procedure based on the first information;
  • the first information is used to indicate whether to support or perform a rollback from the first random access procedure to the second random access procedure, or to indicate whether to support or perform a rollback from the first random access procedure to the second random access procedure. Rollback from the random access procedure to the third random access procedure.
  • the first communication module 210 is specifically configured to:
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the second random access procedure, or the preamble group selection threshold configured in the first random access procedure is different from that configured in the second random access procedure. If the preamble group selection thresholds configured in the random access process are different, sending the first information to the terminal device;
  • the preamble group configured in the first random access procedure is different from the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure is different from that configured in the third random access procedure. Sending the first information to the terminal device when the preamble group selection thresholds configured in the entry process are different;
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the second random access procedure, or the preamble group selection threshold configured in the first random access procedure is the same as that configured in the second random access procedure.
  • the preamble group selection thresholds configured in the random access process are the same, sending the first information to the terminal device;
  • the preamble group configured in the first random access procedure is the same as the preamble group configured in the third random access procedure, or the preamble group selection threshold configured in the first random access procedure is the same as that configured in the third random access procedure. If the preamble group selection thresholds configured in the random access procedure are the same, the first information is sent to the terminal device.
  • the first communication module 210 is also used for:
  • the random access resource for a slice is applicable to its corresponding slice or multiple slices in a corresponding slice group.
  • the resource configuration information is included in a system information block (SIB) and/or radio resource control (RRC) signaling.
  • SIB system information block
  • RRC radio resource control
  • the first communication module 210 is further configured to: send cell reselection information for a slice to the terminal device; wherein the cell reselection information for a slice is applicable to a corresponding slice or a corresponding slice group.
  • the slice-specific cell reselection information corresponds to at least one slice or at least one slice group.
  • each slice or each slice group corresponds to only one slice-specific cell reselection information.
  • the cell reselection information for a slice includes a frequency point corresponding to a slice or a cell corresponding to a slice.
  • the slice-specific cell reselection information is carried by SIB or dedicated signaling.
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice.
  • the cell reselection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identity CI or physical cell identity corresponding to the slice PCI.
  • the first communication module 210 is further configured to: send slice-specific cell selection information to the terminal device; wherein the slice-specific cell selection information is applicable to a corresponding slice or a corresponding slice group.
  • the slice-specific cell selection information corresponds to at least one slice or at least one slice group.
  • each slice or each slice group corresponds to only one slice-specific cell selection information.
  • the cell selection information for a slice includes a frequency point corresponding to a slice or a cell corresponding to a slice.
  • the slice-specific cell selection information is carried by SIB or dedicated signaling.
  • the cell selection information for the slice includes the frequency point of the cell corresponding to the slice.
  • the cell selection information for the slice includes the frequency point of the cell corresponding to the slice and the cell identity CI or physical cell identity PCI corresponding to the slice .
  • the network device 200 in the embodiment of the present application can implement the corresponding functions of the network device in the foregoing method embodiments.
  • the functions described by the modules (submodules, units or components, etc.) in the network device 200 of the embodiment of the application can be realized by different modules (submodules, units or components, etc.), or by the same module (submodule, unit or component, etc.), for example, the first sending module and the second sending module can be different modules, or the same module, all of which can realize their corresponding functions in the embodiments of the present application.
  • the communication module in the embodiment of the present application may be implemented by a transceiver of the device, and part or all of the other modules may be implemented by a processor of the device.
  • Fig. 10 is a schematic structural diagram of a communication device 600 according to an embodiment of the application, wherein the communication device 600 includes a processor 610, and the processor 610 can call and run a computer program from a memory to implement the method in the embodiment of the application.
  • the communication device 600 may further include a memory 620 .
  • the processor 610 can invoke and run a computer program from the memory 620, so as to implement the method in the embodiment of the present application.
  • the memory 620 may be an independent device independent of the processor 610 , or may be integrated in the processor 610 .
  • the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices, specifically, to send information or data to other devices, or to receive information or data sent by other devices .
  • the transceiver 630 may include a transmitter and a receiver.
  • the transceiver 630 may further include antennas, and the number of antennas may be one or more.
  • the communication device 600 may be the network device of the embodiment of the present application, and the communication device 600 may implement the corresponding processes implemented by the network device in the methods of the embodiment of the present application.
  • the communication device 600 may implement the corresponding processes implemented by the network device in the methods of the embodiment of the present application. For the sake of brevity, details are not repeated here.
  • the communication device 600 may be the terminal device of the embodiment of the present application, and the communication device 600 may implement the corresponding processes implemented by the terminal device in the methods of the embodiment of the present application.
  • the communication device 600 may implement the corresponding processes implemented by the terminal device in the methods of the embodiment of the present application. For the sake of brevity, details are not repeated here.
  • Fig. 11 is a schematic structural diagram of a chip 700 according to an embodiment of the present application, wherein the chip 700 includes a processor 710, and the processor 710 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the chip 700 may further include a memory 720 .
  • the processor 710 can invoke and run a computer program from the memory 720, so as to implement the method in the embodiment of the present application.
  • the memory 720 may be an independent device independent of the processor 710 , or may be integrated in the processor 710 .
  • the chip 700 may also include an input interface 730 .
  • the processor 710 can control the input interface 730 to communicate with other devices or chips, specifically, can obtain information or data sent by other devices or chips.
  • the chip 700 may also include an output interface 740 .
  • the processor 710 can control the output interface 740 to communicate with other devices or chips, specifically, can output information or data to other devices or chips.
  • the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the network device in the methods of the embodiment of the present application.
  • the chip can implement the corresponding processes implemented by the network device in the methods of the embodiment of the present application.
  • the chip can be applied to the terminal device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the terminal device in the methods of the embodiments of the present application.
  • the chip can implement the corresponding processes implemented by the terminal device in the methods of the embodiments of the present application.
  • the chip mentioned in the embodiment of the present application may also be called a system-on-chip, a system-on-chip, a system-on-a-chip, or a system-on-a-chip.
  • the processor mentioned above can be a general-purpose processor, a digital signal processor (DSP), an off-the-shelf programmable gate array (FPGA), an application specific integrated circuit (ASIC) or Other programmable logic devices, transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processor
  • FPGA off-the-shelf programmable gate array
  • ASIC application specific integrated circuit
  • the general-purpose processor mentioned above may be a microprocessor or any conventional processor or the like.
  • the aforementioned memories may be volatile memories or nonvolatile memories, or may include both volatile and nonvolatile memories.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM).
  • the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is, the memories in the embodiments of the present application are intended to include, but are not limited to, these and any other suitable types of memories.
  • FIG. 12 is a schematic block diagram of a communication system 800 according to an embodiment of the present application.
  • the communication system 800 includes a terminal device 810 and a network device 820 .
  • the terminal device 810 can be used to realize the corresponding functions realized by the terminal device in the methods of the various embodiments of the present application
  • the network device 820 can be used to realize the corresponding functions realized by the network device in the methods of the various embodiments of the present application function.
  • details are not repeated here.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transferred from a website, computer, server, or data center by wire (such as coaxial cable, optical fiber, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer, server or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • sequence numbers of the above-mentioned processes do not mean the order of execution, and the execution order of the processes should be determined by their functions and internal logic, and should not be used in the embodiments of the present application.
  • the implementation process constitutes any limitation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande concerne un procédé d'accès aléatoire, un dispositif terminal, un dispositif de réseau, une puce, un support de stockage lisible par ordinateur, un produit-programme d'ordinateur, un programme informatique et un système de communication. Le procédé comprend l'étape suivante : un dispositif terminal détermine, sur la base de premières informations envoyées à partir d'un dispositif de réseau, s'il faut effectuer un repli d'une première procédure d'accès aléatoire à une deuxième procédure d'accès aléatoire, les premières informations étant utilisées pour indiquer s'il faut prendre en charge ou effectuer le repli de la première procédure d'accès aléatoire à la deuxième procédure d'accès aléatoire, ou pour indiquer s'il faut prendre en charge ou effectuer le repli de la première procédure d'accès aléatoire à une troisième procédure d'accès aléatoire. Le repli d'une procédure d'accès aléatoire peut être correctement réalisé selon des modes de réalisation de la présente demande.
PCT/CN2021/125411 2021-10-21 2021-10-21 Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau WO2023065244A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202180100344.8A CN117730614A (zh) 2021-10-21 2021-10-21 随机接入方法、终端设备和网络设备
PCT/CN2021/125411 WO2023065244A1 (fr) 2021-10-21 2021-10-21 Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/125411 WO2023065244A1 (fr) 2021-10-21 2021-10-21 Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau

Publications (1)

Publication Number Publication Date
WO2023065244A1 true WO2023065244A1 (fr) 2023-04-27

Family

ID=86058650

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/125411 WO2023065244A1 (fr) 2021-10-21 2021-10-21 Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau

Country Status (2)

Country Link
CN (1) CN117730614A (fr)
WO (1) WO2023065244A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111263462A (zh) * 2019-01-30 2020-06-09 维沃移动通信有限公司 一种随机接入方法及装置
WO2020154992A1 (fr) * 2019-01-30 2020-08-06 Qualcomm Incorporated Procédure d'accès aléatoire basée sur une procédure de canal d'accès aléatoire en deux étapes et sur une procédure de canal d'accès aléatoire en quatre étapes
CN111757529A (zh) * 2019-03-29 2020-10-09 华为技术有限公司 通信方法、装置及设备
CN113383605A (zh) * 2019-02-01 2021-09-10 高通股份有限公司 随机接入规程回退

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111263462A (zh) * 2019-01-30 2020-06-09 维沃移动通信有限公司 一种随机接入方法及装置
WO2020154992A1 (fr) * 2019-01-30 2020-08-06 Qualcomm Incorporated Procédure d'accès aléatoire basée sur une procédure de canal d'accès aléatoire en deux étapes et sur une procédure de canal d'accès aléatoire en quatre étapes
CN113383605A (zh) * 2019-02-01 2021-09-10 高通股份有限公司 随机接入规程回退
CN111757529A (zh) * 2019-03-29 2020-10-09 华为技术有限公司 通信方法、装置及设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SAMSUNG: "Slice based RACH configuration", 3GPP DRAFT; R2-2103089, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Online; 20210412 - 20210420, 2 April 2021 (2021-04-02), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052174707 *

Also Published As

Publication number Publication date
CN117730614A (zh) 2024-03-19

Similar Documents

Publication Publication Date Title
CN113068271B (zh) 一种随机接入方法及装置、网络设备、终端
CN111837446B (zh) 随机接入的方法和通信设备
US20230239774A1 (en) Network slicing information processing method, terminal device, and network device
WO2019237805A1 (fr) Procédé et appareil d'accès aléatoire, et dispositif de communication
TW202010334A (zh) 一種資料傳輸方法及裝置、終端
WO2020107429A1 (fr) Procédé et dispositif d'accès aléatoire
JP7297866B2 (ja) ランダムアクセス方法及び関連機器
CN114246013A (zh) 无线通信方法和终端设备
WO2020124763A1 (fr) Procédé et dispositif d'accès aléatoire
WO2022067519A1 (fr) Procédés et terminaux d'accès aléatoire
US20230129426A1 (en) Wireless communication method and terminal device
WO2022126667A1 (fr) Procédé de traitement de réponse d'accès aléatoire, ainsi que dispositif de réseau et dispositif terminal
WO2023065244A1 (fr) Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau
WO2022099634A1 (fr) Procédé de communication sans fil, dispositif terminal, et dispositif de réseau
WO2022067614A1 (fr) Procédé de communication sans fil, dispositif terminal et dispositif de réseau
EP3619991B1 (fr) Dispositif de communication, procédé associés et programme informatique pour la transmission d'un message en réponse à une réponse d'accès aléatoire comprenant de multiples autorisations
WO2020056717A1 (fr) Procédé et dispositif d'association de ressources, terminal, et appareil de réseau
WO2023019409A1 (fr) Procédé d'indication d'informations, dispositif terminal, dispositif de réseau, puce et support de stockage
US20220225433A1 (en) Wireless communication method, terminal device, and network device
WO2022246588A1 (fr) Procédé de communication sans fil, équipement terminal et dispositif de réseau
WO2023060577A1 (fr) Procédé d'établissement de connexion, dispositif terminal et dispositif de réseau
CN118104330A (zh) 上行定时的调整方法以及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21960993

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 202180100344.8

Country of ref document: CN