WO2023065357A1 - Appareil et procédé d'accès aléatoire, et dispositif terminal et dispositif de réseau - Google Patents

Appareil et procédé d'accès aléatoire, et dispositif terminal et dispositif de réseau Download PDF

Info

Publication number
WO2023065357A1
WO2023065357A1 PCT/CN2021/125893 CN2021125893W WO2023065357A1 WO 2023065357 A1 WO2023065357 A1 WO 2023065357A1 CN 2021125893 W CN2021125893 W CN 2021125893W WO 2023065357 A1 WO2023065357 A1 WO 2023065357A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
terminal device
trigger
cause
triggering
Prior art date
Application number
PCT/CN2021/125893
Other languages
English (en)
Chinese (zh)
Inventor
杜忠达
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN202180100613.0A priority Critical patent/CN117694016A/zh
Priority to PCT/CN2021/125893 priority patent/WO2023065357A1/fr
Publication of WO2023065357A1 publication Critical patent/WO2023065357A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the embodiments of the present application relate to the field of mobile communication technologies, and in particular to a random access method and device, terminal equipment, and network equipment.
  • the three major application scenarios of the fifth generation mobile communication technology include enhanced mobile broadband (eMBB), massive machine-type communication (mMTC) and ultra-reliable low-latency communication (uRLLC). Terminals have put forward requirements for greater throughput, lower latency, higher reliability, and lower power consumption.
  • eMBB enhanced mobile broadband
  • mMTC massive machine-type communication
  • uRLLC ultra-reliable low-latency communication
  • Terminals have put forward requirements for greater throughput, lower latency, higher reliability, and lower power consumption.
  • 3rd Generation Partnership Project 3rd Generation Partnership Project, 3GPP introduced new wireless communication technologies in the version 17 (Release 17, Rel-17) of the standardization process, such as uplink coverage enhancement technology, low-capability terminal equipment (Reduced capability UE, RedCap UE) technology, small data packet transmission (Small Data Transmission, SDT) technology, network slicing technology, etc.
  • Embodiments of the present application provide a random access method and device, terminal equipment, and network equipment.
  • An embodiment of the present application provides a random access method, the method including:
  • the terminal device determines random access parameters and/or radio resources corresponding to the triggering cause
  • the terminal device performs random access based on the random access parameter and/or the wireless resource.
  • An embodiment of the present application provides a method for random access, the method comprising:
  • the network device sends configuration information to the terminal device; the configuration information is used for a first mapping relationship and/or a second mapping relationship, and the first mapping relationship is used to characterize the relationship between a random access trigger cause and a random access parameter An association relationship, where the second mapping relationship is used to represent an association relationship between a random access trigger cause and a radio resource.
  • An embodiment of the present application provides a random access device, which is applied to a terminal device, and the device includes:
  • An acquisition unit configured to acquire a triggering cause of random access
  • a first determining unit configured to determine random access parameters and/or radio resources corresponding to the triggering cause
  • a processing unit configured to perform random access based on the random access parameters and/or radio resources.
  • An embodiment of the present application provides a random access device, which is applied to network equipment, and the device includes:
  • the sending unit is configured to send configuration information to the terminal device; the configuration information is used to configure a first mapping relationship and/or a second mapping relationship, and the first mapping relationship is used to represent a random access trigger cause and a random access An association relationship between parameters, the second mapping relationship is used to characterize the association relationship between a random access trigger cause and a radio resource.
  • the terminal device provided in the embodiment of the present application includes a processor and a memory.
  • the memory is used to store computer programs, and the processor is used to call and run the computer programs stored in the memory to execute the above random access method.
  • the network device provided in the embodiment of the present application includes a processor and a memory.
  • the memory is used to store computer programs, and the processor is used to call and run the computer programs stored in the memory to execute the above random access method.
  • the chip provided by the embodiment of the present application is used to implement the above random access method.
  • the chip includes: a processor, configured to invoke and run a computer program from the memory, so that the device installed with the chip executes the above random access method.
  • the computer-readable storage medium provided by the embodiment of the present application is used for storing a computer program, and the computer program causes a computer to execute the above random access method.
  • the computer program product provided by the embodiments of the present application includes computer program instructions, where the computer program instructions cause a computer to execute the foregoing random access method.
  • the computer program provided in the embodiment of the present application when running on a computer, enables the computer to execute the above random access method.
  • the terminal device obtains the trigger cause of random access; the terminal device determines the random access parameters and/or wireless resources corresponding to the trigger cause; parameters and/or radio resources for random access. That is to say, in this application, the terminal device can record the trigger reason of random access. In this way, the terminal device can fully consider the reason for triggering random access during the random access process, and select an random access parameters, and random access radio resources to perform a random access procedure. In this way, terminal devices with different random access triggering reasons can all successfully complete the random access process, improving the success rate of random access.
  • FIG. 1 is a schematic diagram of an application scenario of an embodiment of the present application
  • FIG. 2 is a schematic flow diagram of a four-step random access method in the related art
  • FIG. 3 is a schematic flow diagram of a two-step random access method in the related art
  • FIG. 4 is a first schematic flow diagram of a random access method provided by an embodiment of the present application.
  • FIG. 5 is a second schematic flow diagram of a random access method provided in an embodiment of the present application.
  • FIG. 6 is a third schematic flow diagram of a random access method provided in an embodiment of the present application.
  • FIG. 7 is a first structural diagram of a random access device provided by an embodiment of the present application.
  • FIG. 8 is a second structural diagram of a random access device provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • Fig. 11 is a schematic block diagram of a communication system provided by an embodiment of the present application.
  • FIG. 1 is a schematic diagram of an application scenario of an embodiment of the present application.
  • a communication system 100 may include a terminal device 110 and a network device 120 .
  • the network device 120 may communicate with the terminal device 110 through an air interface. Multi-service transmission is supported between the terminal device 110 and the network device 120 .
  • the embodiment of the present application is only described with the communication system 100 as an example, but the embodiment of the present application is not limited thereto. That is to say, the technical solutions of the embodiments of the present application can be applied to various communication systems, such as: Long Term Evolution (Long Term Evolution, LTE) system, LTE Time Division Duplex (Time Division Duplex, TDD), Universal Mobile Communication System (Universal Mobile Telecommunication System, UMTS), Internet of Things (Internet of Things, IoT) system, Narrow Band Internet of Things (NB-IoT) system, enhanced Machine-Type Communications (eMTC) system, 5G communication system (also known as New Radio (NR) communication system), or future communication systems, etc.
  • LTE Long Term Evolution
  • LTE Time Division Duplex Time Division Duplex
  • TDD Time Division Duplex
  • Universal Mobile Telecommunication System Universal Mobile Telecommunication System
  • UMTS Universal Mobile Communication System
  • Internet of Things Internet of Things
  • NB-IoT Narrow Band Internet of Things
  • eMTC enhanced Machine-Type Communications
  • the network device 120 may be an access network device that communicates with the terminal device 110 .
  • the access network device can provide communication coverage for a specific geographical area, and can communicate with terminal devices 110 (such as UEs) located in the coverage area.
  • the network device 120 may be an evolved base station (Evolutional Node B, eNB or eNodeB) in a Long Term Evolution (Long Term Evolution, LTE) system, or a Next Generation Radio Access Network (NG RAN) device, Either a base station (gNB) in the NR system, or a wireless controller in a cloud radio access network (Cloud Radio Access Network, CRAN), or the network device 120 can be a relay station, an access point, a vehicle-mounted device, a wearable Devices, hubs, switches, bridges, routers, or network devices in the future evolution of the Public Land Mobile Network (Public Land Mobile Network, PLMN), etc.
  • Evolutional Node B, eNB or eNodeB in a Long Term Evolution (Long Term Evolution, LTE) system
  • NG RAN Next Generation Radio Access Network
  • gNB base station
  • CRAN Cloud Radio Access Network
  • the network device 120 can be a relay station, an access point, a vehicle-mounted device, a wear
  • the terminal device 110 may be any terminal device, including but not limited to a terminal device connected to the network device 120 or other terminal devices by wire or wirelessly.
  • the terminal equipment 110 may refer to an access terminal, a user equipment (User Equipment, UE), a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, user agent, or user device.
  • Access terminals can be cellular phones, cordless phones, Session Initiation Protocol (SIP) phones, IoT devices, satellite handheld terminals, Wireless Local Loop (WLL) stations, Personal Digital Assistant , PDA), handheld devices with wireless communication functions, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks or terminal devices in future evolution networks, etc.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • the terminal device 110 can be used for device-to-device (Device to Device, D2D) communication.
  • D2D Device to Device
  • the wireless communication system 100 may also include a core network device 130 that communicates with the base station.
  • the core network device 130 may be a 5G core network (5G Core, 5GC) device, for example, Access and Mobility Management Function (Access and Mobility Management Function , AMF), and for example, authentication server function (Authentication Server Function, AUSF), and for example, user plane function (User Plane Function, UPF), and for example, session management function (Session Management Function, SMF).
  • the core network device 130 may also be a packet core evolution (Evolved Packet Core, EPC) device of the LTE network, for example, a data gateway (Session Management Function+Core Packet Gateway, SMF+PGW- C) Equipment.
  • EPC packet core evolution
  • SMF+PGW-C can realize the functions of SMF and PGW-C at the same time.
  • the above-mentioned core network equipment may be called by other names, or a new network entity may be formed by dividing functions of the core network, which is not limited in this embodiment of the present application.
  • Various functional units in the communication system 100 may also establish a connection through a next generation network (next generation, NG) interface to implement communication.
  • NG next generation network
  • the terminal device establishes an air interface connection with the access network device through the NR interface to transmit user plane data and control plane signaling; the terminal device can establish a control plane signaling connection with the AMF through the NG interface 1 (N1 for short); access Network equipment such as the next generation wireless access base station (gNB), can establish a user plane data connection with UPF through NG interface 3 (abbreviated as N3); access network equipment can establish control plane signaling with AMF through NG interface 2 (abbreviated as N2) connection; UPF can establish a control plane signaling connection with SMF through NG interface 4 (abbreviated as N4); UPF can exchange user plane data with the data network through NG interface 6 (abbreviated as N6); AMF can communicate with SMF through NG interface 11 (abbreviated as N11) The SMF establishes a control plane signaling connection; the SMF may establish a control plane signaling connection with the PCF through an NG interface 7 (N7 for short).
  • gNB next generation wireless access base station
  • Figure 1 exemplarily shows a base station, a core network device, and two terminal devices.
  • the wireless communication system 100 may include multiple base station devices and each base station may include other numbers of terminals within the coverage area.
  • the device is not limited in the embodiment of this application.
  • FIG. 1 is only an illustration of a system applicable to this application, and of course, the method shown in the embodiment of this application may also be applicable to other systems.
  • system and “network” are often used interchangeably herein.
  • the term “and/or” in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and/or B can mean: A exists alone, A and B exist simultaneously, and there exists alone B these three situations.
  • the character "/" in this article generally indicates that the contextual objects are an "or” relationship.
  • the "indication” mentioned in the embodiments of the present application may be a direct indication, may also be an indirect indication, and may also mean that there is an association relationship.
  • A indicates B, which can mean that A directly indicates B, for example, B can be obtained through A; it can also indicate that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also indicate that there is an association between A and B relation.
  • the "correspondence” mentioned in the embodiments of the present application may mean that there is a direct correspondence or an indirect correspondence between the two, or that there is an association between the two, or that it indicates and is indicated. , configuration and configured relationship.
  • the "predefined” or “predefined rules” mentioned in the embodiments of this application can be used by pre-saving corresponding codes, tables or other It is implemented by indicating related information, and this application does not limit the specific implementation.
  • pre-defined may refer to defined in the protocol.
  • the "protocol” may refer to a standard protocol in the communication field, for example, it may include the LTE protocol, the NR protocol, and related protocols applied to future communication systems, and this application does not limit this .
  • Random access is a necessary process for establishing a wireless communication link between a terminal device and a network device. Only after the random access process is completed, the terminal equipment and network equipment may perform regular data transmission and reception.
  • Release 15 (Release 15, Rel-15) of the standardization process, a contention-based four-step random access method is supported.
  • the competition-based random method is divided into four steps.
  • the preamble sequence is sent.
  • the terminal device selects a physical random access channel (Physical Random Access Channel, PRACH) resource, and sends a message 1 (Message1, Msg1) to the network device on the PRACH resource, and sends a preamble (preamble) to the network device through Msg1.
  • PRACH Physical Random Access Channel
  • the second step is random access response.
  • the network device sends a random access message 2 (Message2, Msg2). Specifically, after receiving Msg1, the network device sends a random access response to the terminal device through Msg2. The sending of Msg2 indicates that the network device has received the preamble.
  • the third step is to schedule the transmission.
  • the terminal device sends a message 3 (Message3, Msg3) to the network device, wherein, after correctly receiving Msg2, the terminal device uses the uplink authorization resource indicated by Msg2 to send Msg3.
  • the fourth step is to resolve the competition.
  • the network device sends a random access message 4 (Message4, Msg4) to the terminal device.
  • Msg4 random access message 4
  • the network device and the terminal device complete the conflict resolution through Msg4 and end the random access process.
  • the contention-based four-step random access method may be initiated by the terminal device or by the network device.
  • the network device can actively request the terminal device to initiate a contention-based random access process, so that the terminal device can perform random access based on the above four steps.
  • the NR system introduces a two-step random access method in Rel-16.
  • the two-step random access includes the following steps.
  • the terminal device sends a message A (Message A, MsgA) to the network device.
  • MsgA includes Preamble transmitted on PRACH and load information transmitted on Physical Uplink Shared Channel (PUSCH).
  • the load information may include the content of Msg3 in the four-step random access method, such as the identification information of the terminal equipment (ie, UE ID), and the cause value for triggering random access (ie, establishment cause).
  • the network device sends a message B (Message B, MsgB) to the terminal device.
  • the terminal device can monitor the random access response of the network device within the configured window, and if it receives an indication of successful contention conflict resolution from the network device in MsgB, the terminal device ends the random access process.
  • the terminal device executes the transmission of Msg3 and monitors the contention conflict resolution result, and if the contention resolution fails after the transmission of Msg3, the terminal device continues the transmission of MsgA.
  • the network device can configure resources for transmitting the MsgA in the two-step random access manner for the terminal device in advance, which is referred to as MsgA resource here.
  • the MsgA resources include RACH resources and PUSCH resources.
  • RACH resources can be used to transmit Preamble
  • PUSCH resources can be used to transmit UE ID and establishment cause.
  • the configuration of MsgA resources may include RACH resource configuration and PUSCH resource configuration.
  • the configuration of the RACH resource may specifically include the configuration of the time-frequency resource of the RACH and the configuration of the initial preamble root sequence.
  • the network device can broadcast an initial preamble root sequence in each cell, and the terminal device can obtain the preamble set available in the cell through cyclic shift based on the configured initial preamble root sequence.
  • the PUSCH resource configuration in the MsgA resource configuration may include: time offset, MCS level and transmission block size (Transmission Block Size, TBS) supported by the PUSCH transmission opportunity (PUSCH occasion, PO), PUSCH time domain resources, and frequency domain resources of the PUSCH.
  • TBS Transmission Block Size
  • the terminal device Before performing random access, it is first necessary to select a random access type. Specifically, the terminal device may select a random access type based on a reference signal receiving power (Reference Signal Receiving Power, RSRP) measurement result. If the RSRP measurement result is higher than the RSRP threshold configured by the network device, the terminal device uses a two-step random access method for random access; otherwise, the terminal device uses a four-step random access method for random access.
  • RSRP Reference Signal Receiving Power
  • the random access process may include a random access radio resource selection process and a selection process of control parameters related to the random access process.
  • the random access radio resources and related control parameters selected by the terminal equipment are used in the subsequent random access process for sending and receiving messages, power control, conflict access, fallback mechanism, and two-step random access methods to four-step The fallback process of the random access method, etc.
  • 3GPP introduced uplink coverage enhancement technology, RedCap UE technology, SDT technology, network slicing technology, etc. in Rel-17.
  • terminal devices using different wireless communication technologies have different requirements for random access.
  • the uplink coverage enhancement technology needs to be enabled to perform random access. Therefore, the distance between the terminal device and the base station should be considered when the base station is required to send a random access response.
  • the base station needs to consider the service priority of the network slice requested by the terminal device.
  • the embodiment of the present application provides the following random access method, which improves the success rate of random access triggered by different wireless communication technologies.
  • FIG. 4 is a first schematic flowchart of a random access method provided by an embodiment of the present application. This method can optionally be applied to the system shown in FIG. 1 , but is not limited thereto. The method includes the following contents.
  • step 110 the terminal device obtains the triggering cause of random access.
  • the triggering cause of the random access may be determined by the communication technology used by the terminal device during the random access process. That is to say, the triggering cause of the random access is associated with the communication technology used by the terminal device during the random access process.
  • the communication technology may be uplink coverage enhancement technology, RedCap UE technology, SDT technology, network slicing technology, etc., which is not limited in this embodiment of the present application.
  • the triggering reason of random access includes a first triggering reason and/or a second triggering reason;
  • the first trigger reason indicates that the terminal device uses at least one of the following technologies for random access: uplink coverage enhancement technology, RedCap UE technology, SDT technology, and network slicing technology.
  • the first triggering reason is that the terminal device performs random access using one or more of the above-mentioned uplink coverage enhancement technology, RedCap UE technology, SDT technology, and network slicing technology.
  • the first triggering reason is one type of triggering reason, that is, the number of first triggering reasons may include multiple.
  • the above four wireless communication technologies used in the random access process are different. That is to say, any combination of the above four wireless communication technologies may constitute a random access trigger.
  • the second trigger cause may indicate a common random access trigger cause.
  • the common random access trigger reason is that the terminal device does not use a newly introduced communication technology to perform random access.
  • the newly cited communication technologies include but are not limited to uplink coverage enhancement technology, RedCap UE technology, SDT technology, and network slicing technology. That is to say, the second triggering cause corresponds to a traditional random access procedure in the related art.
  • first triggering reason and the second triggering reason are only used to distinguish different triggering reasons, and are not used to limit a specific order and a specific number.
  • the terminal device determines the triggering cause of the random access according to the communication technology it actually uses, and records and saves the triggering reason of the random access.
  • a first field may be defined in a media access control (Media Access Control, MAC) layer protocol, and the value of the first field is used to indicate the triggering reason for the random access. For example, when the value of the first field is 1, it indicates that the trigger reason is that the terminal uses the uplink coverage enhancement technology for random access, and when the value of the first field is 2, it indicates that the trigger reason is a public random access trigger reason.
  • Media Access Control Media Access Control
  • the second triggering cause is a public random access triggering cause, which may be indicated by a certain value result of the first field, or may be indicated by a default value corresponding to the first field. That is to say, when the first field has no corresponding value result, it may indicate that the current trigger cause is a public random access trigger cause.
  • step 120 the terminal device determines random access parameters and/or radio resources corresponding to random access triggering reasons.
  • first triggering reasons may include multiple, wherein different first triggering reasons correspond to different random access parameters.
  • Step 130 the terminal device performs random access based on random access parameters and/or radio resources.
  • the terminal device may determine the random access parameter and/or wireless resource corresponding to the trigger cause during the random access process based on the trigger cause, and determine the random access parameter and/or radio resource based on the random access parameter and/or The radio resource completes the random access process.
  • the random access trigger reason can be recorded.
  • the terminal device can fully consider the random access trigger reason during the random access process, and select the random access trigger reason that matches the recorded random access trigger reason. Random access parameters and/or radio resources to perform a random access procedure. In this way, terminal devices with different random access triggering reasons can successfully complete the random access process, improving the success rate of random access.
  • the foregoing random access process may be a contention-based random access process, which may be initiated by a terminal device or by a network device, which is not limited in this embodiment of the present application.
  • the above random access process may be a two-step random access process.
  • the random access process may include any one process of initialization of parameters related to the two-step random access process, MSGA sending process, MSGB receiving process, and conflict resolution process.
  • the above random access process may also be a four-step random access process.
  • the random access process may include any process of initializing parameters related to the four-step random access process, sending MSG1 and/or MSG3, receiving MSG2 or/and MSG4, and conflict resolution .
  • the terminal device may determine the random access parameter and/or radio resource corresponding to the triggering cause according to a predefined rule.
  • the first mapping relationship and/or the second mapping relationship may be pre-stored in the terminal device, the first mapping relationship is used to indicate the association between the trigger cause of the random access and the random access parameter, and the second mapping relationship It is used to characterize the association between the triggering cause of the random access and the radio resource.
  • the terminal device may determine the random access parameter and/or radio resource corresponding to the current trigger cause according to the mapping rule (ie, the predefined rule) of the first mapping relationship and/or the second mapping relationship.
  • the terminal device may determine the random access parameter and/or radio resource corresponding to the random access triggering cause under the configuration of the network device.
  • the random access method provided by the implementation of this application further includes:
  • Step 100 the terminal device receives the configuration information sent by the network device, the configuration information is used to configure the first mapping relationship and/or the second mapping relationship; the first mapping relationship is used to indicate the trigger reason representing the random access and the random access parameter
  • the second mapping relationship is used to characterize the association relationship between the random access trigger cause and the radio resource.
  • the terminal device determines the random access parameters and/or radio resources corresponding to the triggering cause, which may be implemented in the following manner:
  • the terminal device determines the random access parameter corresponding to the trigger cause based on the first mapping relationship; and/or the terminal device determines the radio resource corresponding to the trigger cause based on the second mapping relationship.
  • the network device may carry the configuration information in the SIB or RRC signaling.
  • the network device may broadcast the SIB, and configure random access parameters corresponding to each random access trigger reason for the terminal device in the idle state through the SIB.
  • the SIB here may be SIBX (X is an integer greater than or equal to 1).
  • the embodiment of the present application does not limit the type of the SIB.
  • the network device may configure the terminal device with random access parameters corresponding to each random access triggering cause through RRC signaling when the terminal device is in the connected state.
  • the RRC signaling may be RRC connection reconfiguration information, RRC connection release information, etc., which are not limited in this embodiment of the present application.
  • the random access parameters may include at least one of the following:
  • a priority control parameter a first selection threshold, a second selection threshold, a first parameter, and a second parameter.
  • the priority control parameters may include modulation and coding strategy (Modulation and Coding Scheme, MCS) priority, back-off time scaling parameter (scalingFactorBI) and power increase step parameter (powerRampingStepHighPriority), etc.
  • MCS Modulation and Coding Scheme
  • scalingFactorBI back-off time scaling parameter
  • powerRampingStepHighPriority power increase step parameter
  • the first selection threshold is used to select a random access mode.
  • the random access method includes two-step random access method and four-step random access method.
  • the network device may simultaneously configure radio resources for a two-step random access manner and radio resources for a four-step random access manner for a certain triggering cause.
  • a terminal device performs random access, it needs to select one of two random access methods to perform a random access process.
  • the network device when the network device configures radio resources for a two-step random access method and radio resources for a four-step random access method for a certain trigger reason, the network device may also configure a wireless resource for the trigger reason. Based on the first selection threshold for selecting a random access mode.
  • the first selection threshold may be an RSRP threshold.
  • the basic process for the terminal device to select the random access method is: if the terminal device measures that the RSRP measurement value of the reference signal is greater than the first selection threshold, the terminal device determines to use the two-step random access method. If the terminal device measures that the RSRP measurement value of the reference signal is smaller than the first selection threshold, the terminal device uses a four-step random access manner. That is to say, the terminal device can select the two-step random access method to implement the random access process when the channel quality is good, and select the four-step random access method to implement the random access process when the channel quality is poor.
  • the network device may configure different first selection thresholds for different triggering reasons.
  • the terminal equipment using the uplink coverage enhancement technology is usually far away from the base station, and the uplink coverage of the terminal equipment is poor. Therefore, when the triggering reason is that the terminal device uses the uplink coverage enhancement technology to perform random access, the network device can configure a higher first selection threshold for the triggering reason, so that the terminal device using the triggering reason preferentially uses the four-step random access Random access is performed in an input mode to ensure that the random access of the terminal device is carried out smoothly.
  • the terminal device may use the public RSRP threshold as the first selection threshold for the trigger cause.
  • the common RSRP threshold may be a threshold configured by the network device for the second trigger cause (ie, a common random access trigger cause) for selecting a random access mode. That is to say, the public RSRP threshold is the RSRP threshold used when selecting a random access mode in a traditional random access process in the related art.
  • the second selection threshold is used to select the SSB.
  • the second selection threshold is also the RSRP threshold. It can be understood that, based on the second selection threshold, the terminal device may select one or more SSBs from the synchronization signal burst set of the network device for synchronization processing.
  • the network device may configure different second selection thresholds for different random access triggering reasons, so as to meet different requirements of different random access triggering reasons for SSB in the random access process.
  • the first parameter is used to determine the set of preamble sequences. That is to say, the first parameter may be a related control parameter for the terminal device to select the preamble set in the random access process.
  • the network device may configure different first parameters for different random access triggering reasons, so as to meet different requirements of different random access triggering reasons for the preamble in the random access process.
  • the second parameter is used to determine the transmit power. That is to say, the second parameter may be a related control parameter for the terminal device to determine the transmit power during the random access process.
  • the network device may configure different second parameters for different random access triggering reasons, so as to meet different requirements of different random access triggering reasons for the transmission power in the random access process.
  • the radio resources corresponding to the triggering cause may include radio resources used in a two-step random access manner, and/or wireless resources used in a four-step random access manner. That is to say, the network device may separately configure radio resources for the two-step random access method for a certain trigger cause, or separately configure radio resources for the four-step random access method for the trigger cause, or configure the radio resources for the four-step random access method for the trigger cause.
  • the triggering reason configures radio resources for the four-step random access mode and radio resources for the two-step random access mode at the same time. This embodiment of the present application does not limit this.
  • the wireless resources used for the four-step random access may include PRACH resources, preamble resources, etc., which are not limited in this embodiment of the present application.
  • the radio resources used for two-step random access may include PRACH resources and PUSCH resources for sending MSG A, and may also include preamble resources, etc., which are not limited in this embodiment of the present application.
  • the different radio resources may include at least one of a time-domain resource location, a frequency-domain resource location, and a preamble resource of the PRACH/PUSCH being different, which is not limited in this embodiment of the present application.
  • the network device needs to determine which trigger reason the current terminal device triggers random access based on the wireless resources selected by the terminal device, that is, to determine whether the current terminal device uses uplink coverage enhancement technology, RedCap UE technology, SDT technology, network A certain technology or some combination of technologies in slicing technology. Therefore, the network device can configure different radio resources for different triggering causes, that is, the radio resources corresponding to different triggering causes are different, so that the network device can determine the terminal according to the radio resources used by the terminal device in the random access process. The trigger reason for the device.
  • the different radio resources may include at least one of a time-domain resource location, a frequency-domain resource location, and a preamble resource of the PRACH/PUSCH being different, which is not limited in this embodiment of the present application.
  • the network device can configure different random access parameters and/or wireless resources for different random access trigger reasons, so that the network device can The resource judges the reason for triggering the random access process, so as to provide appropriate services for the terminal device based on the trigger reason.
  • the special needs of different random access trigger reasons are fully considered, so as to ensure that the random access triggered by different random access trigger reasons entry can be successfully completed.
  • the random access method provided in the embodiment of the present application may further include the following content before step 110:
  • Step 140 the terminal device selects the first carrier and the first BWP in the first carrier; the first BWP is used for random access.
  • the terminal device will select the carrier and UL BWP used for this random access to obtain the first carrier and the first BWP.
  • the first carrier may be a UL carrier configured by the network device, or may be a supplementary uplink (Supplementary UL, SUL) carrier configured by the network, which is not limited in this embodiment of the present application.
  • UL UL carrier
  • SUL Supplemental UL
  • the first BWP is an uplink BWP.
  • the triggering cause of the random access can be obtained.
  • step 110 the terminal device obtains the triggering reason of the random access, which may be implemented in the following manner:
  • Step 1101 the terminal device determines the trigger cause as the second trigger cause.
  • the random access process may include a radio resource selection process and a selection process of control parameters required by the random access process.
  • the wireless resources and related control parameters selected by the terminal equipment are used in the subsequent random access process for sending and receiving messages, power control, conflict access, fallback mechanism, and two-step random access to four-step random access The fallback process of the method and so on.
  • the terminal device before each random access, the terminal device initializes a triggering cause of the random access. That is to say, the terminal device may initialize the trigger cause as the second trigger cause, that is, the public random access trigger cause.
  • step 110 the terminal device obtains the triggering reason of the random access, which may also be implemented in the following manner:
  • Step 1102 If the random access is triggered by the first trigger cause, and the first BWP is configured with a wireless resource corresponding to the first trigger cause, the terminal device determines the trigger cause as the first trigger cause.
  • the terminal device can further determine the selected Whether the wireless resource corresponding to the first trigger cause is configured in the first BWP of the
  • the terminal device may determine the trigger cause as the current first trigger cause. In this way, in a subsequent random access process, the terminal device may perform random access based on the corresponding random access parameters and/or radio resources of the first trigger cause.
  • the terminal device may determine that the trigger cause is the second trigger cause, that is, continue to use the initialized second trigger cause to perform random access.
  • the terminal device initializes the target random access trigger cause as the second trigger cause. Moreover, this random access process is triggered by the first triggering cause. Based on this, if the first BWP selected by the terminal device includes the wireless resource corresponding to the first trigger cause, the terminal device determines the trigger cause as the first trigger cause. If the first BWP selected by the terminal device is not configured with the radio resource corresponding to the first trigger cause, the trigger cause remains the initialization result, that is, the second trigger cause.
  • the radio resources corresponding to the first trigger cause are configured in the first BWP, which may mean that the first BWP includes radio resources for the two-step random access method corresponding to the first trigger cause, and/or , the first BWP includes the radio resource for the four-step random access mode corresponding to the first trigger cause, which is not limited in this embodiment of the present application.
  • the terminal device may select the two-step random access manner to perform random access.
  • the terminal device may use the radio resources to perform two-step random access. If the radio resources corresponding to the trigger cause include both radio resources for two-step random access and four-step random access, then the terminal device can select the random access method according to the first selection threshold. Way.
  • the selection of the random access mode refer to the above description for details, and for the sake of brevity, details are not repeated here.
  • the terminal device can handle it in the following manner:
  • Method 1 When the terminal device selects the two-step random access method for random access, if the terminal device switches the two-step random access method to the four-step random access method, and the first BWP does not include a trigger If the cause corresponds to the radio resources used for the four-step random access, the terminal device determines the trigger cause as the second trigger cause.
  • the triggering cause is set as the second triggering cause. That is to say, if there is no ideal four-step random access wireless resource on the first BWP, the terminal device falls back to the traditional random access mode, and uses the four-step random access resource configured by the terminal device for the common random access trigger reason Perform random access. In this way, it is ensured that the random access process can be successfully performed.
  • Method 2 When the terminal device selects the two-step random access method for random access, if the terminal device switches the two-step random access method to the four-step random access method, and the trigger reason is configured in the first BWP The radio resources used for the four-step random access, then keep the triggering cause.
  • the terminal device can use the ideal four-step random access radio resource to perform random access, thereby improving the success rate of random access.
  • the terminal device may select the four-step random access manner to perform random access.
  • the terminal device may use the radio resources to perform two-step random access. If the radio resources corresponding to the trigger cause include both radio resources for two-step random access and four-step random access, then the terminal device can select the random access method according to the first selection threshold. Way.
  • the selection of the random access mode refer to the above description for details, and for the sake of brevity, details are not repeated here.
  • the terminal device selects a four-step random access method for random access, if the random access fails, the terminal device determines the trigger cause as the second trigger cause.
  • the terminal device may determine the trigger cause as the second trigger cause. That is to say, if the terminal device fails to access the wireless resource corresponding to the four-step random access method, the terminal device falls back to the traditional random access method, and uses the four-step random access method configured for the traditional random access method on the terminal device. Incoming resources for random access. In this way, it is ensured that the random access process can be successfully performed.
  • sequence numbers of the above-mentioned processes do not mean the order of execution, and the order of execution of the processes should be determined by their functions and internal logic, and should not be used in this application.
  • the implementation of the examples constitutes no limitation.
  • the terms “downlink”, “uplink” and “sidelink” are used to indicate the transmission direction of signals or data, wherein “downlink” is used to indicate that the transmission direction of signals or data is sent from the station The first direction to the user equipment in the cell, “uplink” is used to indicate that the signal or data transmission direction is the second direction sent from the user equipment in the cell to the station, and “side line” is used to indicate that the signal or data transmission direction is A third direction sent from UE1 to UE2.
  • “downlink signal” indicates that the transmission direction of the signal is the first direction.
  • the term “and/or” is only an association relationship describing associated objects, indicating that there may be three relationships. Specifically, A and/or B may mean: A exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" in this article generally indicates that the contextual objects are an "or” relationship.
  • Fig. 7 is a schematic diagram of the first structural composition of the random access device provided by the embodiment of the present application, which is applied to a terminal device. As shown in Fig. 7, the random access device includes:
  • the obtaining unit 701 is configured to obtain a triggering cause of random access
  • the first determining unit 702 is configured to determine a random access parameter and/or radio resource corresponding to the trigger cause
  • the processing unit 703 is configured to perform random access based on the random access parameters and/or radio resources.
  • the triggering reason is the first triggering reason and/or the second triggering reason;
  • the first trigger reason indicates that the terminal device uses at least one of the following technologies to perform random access:
  • Uplink coverage enhancement technology low-capability terminal equipment technology, small data packet transmission technology, and network slicing technology
  • the second trigger reason is used to indicate a public random access trigger reason.
  • the target random access parameters include at least one of the following:
  • a priority control parameter a first selection threshold, a second selection threshold, a first parameter, and a second parameter
  • the first selection threshold is used to select a random access mode; the second selection threshold is used to select a synchronization signal block SSB; the first parameter is used to determine a set of preamble sequences; the second parameter is used to determine transmit power.
  • the random access manner includes: a two-step random access manner and a four-step random access manner.
  • the wireless resources include: wireless resources used in a two-step random access manner, and/or wireless resources used in a four-step random access manner.
  • the random access device further includes:
  • the selection unit is configured to select a first carrier and a first uplink bandwidth part UL BWP in the first carrier; the first UL BWP is used for random access.
  • the random access device further includes:
  • the second determination unit is configured to determine the trigger cause by the terminal device if the random access is triggered by the first trigger cause, and the first BWP is configured with a wireless resource corresponding to the first trigger cause for the first trigger.
  • the second determining unit is further configured to determine the trigger cause as the second trigger cause.
  • the second determining unit is specifically configured to, when the terminal device selects a two-step random access method for random access, if the terminal device switches the two-step random access method to the four-step random access method , and the first BWP is not configured with the radio resource for four-step random access corresponding to the trigger cause, then the terminal device determines the trigger cause as the second trigger cause.
  • the second determining unit is specifically configured to, when the terminal device selects a two-step random access method for random access, if the terminal device switches the two-step random access method to the four-step random access method , and the first BWP is configured with the radio resource for four-step random access corresponding to the triggering cause, then keep the triggering cause.
  • the second determining unit is specifically configured to determine, by the terminal device, the trigger cause as Second trigger.
  • the device for determining random access parameters further includes:
  • the receiving unit is configured to receive configuration information; the configuration information is used to configure a first mapping relationship and/or a second mapping relationship, and the first mapping relationship is used to represent an association between a trigger cause and a random access parameter, The second mapping relationship is used to characterize the association relationship between the trigger cause and the wireless resource;
  • the first determining unit is configured such that the terminal device determines a random access parameter corresponding to the trigger cause based on the first mapping relationship, and/or, the terminal device determines a random access parameter corresponding to the trigger cause based on the second mapping relationship The radio resource corresponding to the triggering cause.
  • the configuration information is carried in system information SIB, or the configuration information is carried in radio resource control RRC signaling.
  • FIG. 8 is a second schematic diagram of the structure and composition of the random access device provided by the embodiment of the present application, which is applied to network equipment. As shown in FIG. 8, the random access device includes:
  • the sending unit 801 is configured to send configuration information to the terminal device; the configuration information is used to configure a first mapping relationship and/or a second mapping relationship, and the first mapping relationship is used to represent a random access trigger reason and random access
  • the association relationship between input parameters, the second mapping relationship is used to characterize the association relationship between the random access trigger cause and the radio resource.
  • the multiple random access triggering reasons include a first triggering reason and/or a second triggering reason; wherein,
  • the first trigger reason indicates that the terminal device uses at least one of the following technologies to perform random access:
  • the second trigger reason is used to indicate a public random trigger reason.
  • the random access parameters include at least one of the following:
  • a priority control parameter a first selection threshold, a second selection threshold, a first parameter, and a second parameter
  • the first selection threshold is used to select a random access mode; the second selection threshold is used to select a synchronization signal block SSB; the first parameter is used to determine a selection parameter of a preamble sequence set; the second parameter Used to determine transmit power.
  • the random access manner includes: a two-step random access manner and a four-step random access manner.
  • the wireless resources include: wireless resources used in a two-step random access manner, and/or wireless resources used in a four-step random access manner.
  • the configuration information is carried in system information SIB, or the configuration information is carried in radio resource control RRC signaling.
  • FIG. 9 is a schematic structural diagram of a communication device 900 provided by an embodiment of the present application.
  • the communication device may be a terminal device or a network device.
  • the communication device 900 shown in FIG. 9 includes a processor 910, and the processor 910 can invoke and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
  • the communication device 900 may further include a memory 920 .
  • the processor 910 can invoke and run a computer program from the memory 920, so as to implement the method in the embodiment of the present application.
  • the memory 920 may be an independent device independent of the processor 910 , or may be integrated in the processor 1810 .
  • the communication device 1900 may further include a transceiver 930, and the processor 910 may control the transceiver 930 to communicate with other devices, specifically, to send information or data to other devices, or receive other Information or data sent by the device.
  • the processor 910 may control the transceiver 930 to communicate with other devices, specifically, to send information or data to other devices, or receive other Information or data sent by the device.
  • the transceiver 930 may include a transmitter and a receiver.
  • the transceiver 930 may further include antennas, and the number of antennas may be one or more.
  • the communication device 900 may specifically be the network device of the embodiment of the present application, and the communication device 900 may implement the corresponding processes implemented by the network device in each method of the embodiment of the present application. For the sake of brevity, details are not repeated here. .
  • the communication device 900 may specifically be the mobile terminal/terminal device of the embodiment of the present application, and the communication device 900 may implement the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiment of the present application, for the sake of brevity , which will not be repeated here.
  • FIG. 10 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the chip 1000 shown in FIG. 10 includes a processor 1010, and the processor 1010 can call and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
  • the chip 1000 may further include a memory 1020 .
  • the processor 1010 can invoke and run a computer program from the memory 1020, so as to implement the method in the embodiment of the present application.
  • the memory 1020 may be an independent device independent of the processor 1010 , or may be integrated in the processor 1010 .
  • the chip 1000 may also include an input interface 1030 .
  • the processor 1010 can control the input interface 1030 to communicate with other devices or chips, specifically, can obtain information or data sent by other devices or chips.
  • the chip 1000 may also include an output interface 1040 .
  • the processor 1010 can control the output interface 1040 to communicate with other devices or chips, specifically, can output information or data to other devices or chips.
  • the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the network device in the methods of the embodiment of the present application.
  • the chip can implement the corresponding processes implemented by the network device in the methods of the embodiment of the present application.
  • the chip can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the mobile terminal/terminal device in the various methods of the embodiments of the present application.
  • the chip can implement the corresponding processes implemented by the mobile terminal/terminal device in the various methods of the embodiments of the present application.
  • the chip can implement the corresponding processes implemented by the mobile terminal/terminal device in the various methods of the embodiments of the present application.
  • the chip can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the mobile terminal/terminal device in the various methods of the embodiments of the present application.
  • the chip mentioned in the embodiment of the present application may also be called a system-on-chip, a system-on-chip, a system-on-a-chip, or a system-on-a-chip.
  • Fig. 11 is a schematic block diagram of a communication system 1100 provided by an embodiment of the present application. As shown in FIG. 11 , the communication system 1100 includes a terminal device 1110 and a network device 1120 .
  • the terminal device 1110 can be used to realize the corresponding functions realized by the terminal device in the above method
  • the network device 1120 can be used to realize the corresponding functions realized by the network device in the above method.
  • the processor in the embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
  • each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other available Program logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electronically programmable Erase Programmable Read-Only Memory (Electrically EPROM, EEPROM) or Flash.
  • the volatile memory can be Random Access Memory (RAM), which acts as external cache memory.
  • RAM Static Random Access Memory
  • SRAM Static Random Access Memory
  • DRAM Dynamic Random Access Memory
  • Synchronous Dynamic Random Access Memory Synchronous Dynamic Random Access Memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM, DDR SDRAM enhanced synchronous dynamic random access memory
  • Enhanced SDRAM, ESDRAM synchronous connection dynamic random access memory
  • Synchlink DRAM, SLDRAM Direct Memory Bus Random Access Memory
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is, the memory in the embodiments of the present application is intended to include, but not be limited to, these and any other suitable types of memory.
  • the embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium can be applied to the network device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the network device in the methods of the embodiments of the present application.
  • the computer program enables the computer to execute the corresponding processes implemented by the network device in the methods of the embodiments of the present application.
  • the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in the various methods of the embodiments of the present application , for the sake of brevity, it is not repeated here.
  • the embodiment of the present application also provides a computer program product, including computer program instructions.
  • the computer program product may be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the Let me repeat for the sake of brevity, the Let me repeat.
  • the computer program product can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in the methods of the embodiments of the present application, For the sake of brevity, details are not repeated here.
  • the embodiment of the present application also provides a computer program.
  • the computer program can be applied to the network device in the embodiment of the present application.
  • the computer program executes the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program executes the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program can be applied to the mobile terminal/terminal device in the embodiment of the present application.
  • the computer program executes each method in the embodiment of the present application to be implemented by the mobile terminal/terminal device
  • the corresponding process will not be repeated here.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disc, etc., which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Les modes de réalisation de la présente invention concernent un appareil et un procédé d'accès aléatoire, et un dispositif terminal et un dispositif de réseau. Le procédé comprend les étapes suivantes : un dispositif terminal acquiert une cause de déclenchement pour un accès aléatoire ; le dispositif terminal détermine un paramètre d'accès aléatoire et/ou une ressource sans fil correspondant à la cause de déclenchement ; et le dispositif terminal réalise un accès aléatoire sur la base du paramètre d'accès aléatoire et/ou de la ressource sans fil.
PCT/CN2021/125893 2021-10-22 2021-10-22 Appareil et procédé d'accès aléatoire, et dispositif terminal et dispositif de réseau WO2023065357A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202180100613.0A CN117694016A (zh) 2021-10-22 2021-10-22 随机接入方法及装置、终端设备、网络设备
PCT/CN2021/125893 WO2023065357A1 (fr) 2021-10-22 2021-10-22 Appareil et procédé d'accès aléatoire, et dispositif terminal et dispositif de réseau

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/125893 WO2023065357A1 (fr) 2021-10-22 2021-10-22 Appareil et procédé d'accès aléatoire, et dispositif terminal et dispositif de réseau

Publications (1)

Publication Number Publication Date
WO2023065357A1 true WO2023065357A1 (fr) 2023-04-27

Family

ID=86057788

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/125893 WO2023065357A1 (fr) 2021-10-22 2021-10-22 Appareil et procédé d'accès aléatoire, et dispositif terminal et dispositif de réseau

Country Status (2)

Country Link
CN (1) CN117694016A (fr)
WO (1) WO2023065357A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980575A (zh) * 2010-10-14 2011-02-23 华为技术有限公司 随机接入的处理方法和终端
CN106851589A (zh) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 无线网络接入方法、装置及系统
US20180324872A1 (en) * 2017-05-04 2018-11-08 Ofinno Technologies, Llc Scheduling Request Transmission
CN110719647A (zh) * 2018-07-13 2020-01-21 维沃移动通信有限公司 一种随机接入方法、终端及网络设备
CN112423402A (zh) * 2019-08-21 2021-02-26 中国移动通信有限公司研究院 随机接入的选择方法、装置及终端
CN112544118A (zh) * 2018-08-09 2021-03-23 上海诺基亚贝尔股份有限公司 用于随机接入的方法、设备和计算机可读介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980575A (zh) * 2010-10-14 2011-02-23 华为技术有限公司 随机接入的处理方法和终端
CN106851589A (zh) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 无线网络接入方法、装置及系统
US20180324872A1 (en) * 2017-05-04 2018-11-08 Ofinno Technologies, Llc Scheduling Request Transmission
CN110719647A (zh) * 2018-07-13 2020-01-21 维沃移动通信有限公司 一种随机接入方法、终端及网络设备
CN112544118A (zh) * 2018-08-09 2021-03-23 上海诺基亚贝尔股份有限公司 用于随机接入的方法、设备和计算机可读介质
CN112423402A (zh) * 2019-08-21 2021-02-26 中国移动通信有限公司研究院 随机接入的选择方法、装置及终端

Also Published As

Publication number Publication date
CN117694016A (zh) 2024-03-12

Similar Documents

Publication Publication Date Title
WO2020147115A1 (fr) Procédé de communication sans fil destiné à un spectre sans licence, et dispositif
WO2021016973A1 (fr) Procédé de transmission d'informations, appareil électronique et support d'enregistrement
WO2020020270A1 (fr) Procédé d'accès aléatoire, et dispositif de communication
JP7191248B2 (ja) ランダムアクセス方法、端末装置及びネットワーク装置
CN111565473A (zh) 一种随机接入方法和装置
WO2020186546A1 (fr) Procédé et dispositif d'accès aléatoire
WO2019242452A1 (fr) Procédé et appareil d'accès à un canal de transmission de canal physique d'accès aléatoire et programme
WO2020248259A1 (fr) Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau
WO2020019230A1 (fr) Procédé et dispositif de configuration de ressources, borne et dispositif réseau
US20170331639A1 (en) Method, Terminal, and Base Station for Asynchronous Uplink Transmission
WO2020108384A1 (fr) Procédé et dispositif d'accès aléatoire
WO2020029310A1 (fr) Procédé et dispositif de transmission de données, et terminal
WO2020024616A1 (fr) Procédé d'accès aléatoire et dispositif associé
JP7213341B2 (ja) 無線通信方法、ネットワークデバイス、コンピュータ可読記憶媒体及びコンピュータプログラム
WO2020210963A1 (fr) Procédé et dispositif de transmission de message
WO2020124598A1 (fr) Procédé et dispositif d'accès aléatoire
WO2020223878A1 (fr) Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau
WO2020227907A1 (fr) Procédé et appareil de détermination de ressource et terminal
WO2020124534A1 (fr) Procédé et dispositif de transmission de données
US20220159685A1 (en) Data transmission method and apparatus
WO2023065357A1 (fr) Appareil et procédé d'accès aléatoire, et dispositif terminal et dispositif de réseau
WO2021077377A1 (fr) Procédé et appareil d'indication d'informations, dispositif terminal et dispositif réseau
WO2020082394A1 (fr) Procédé d'accès aléatoire, dispositif terminal et dispositif de réseau
WO2023050199A1 (fr) Appareil et procédé d'accès aléatoire, équipement terminal et dispositif de réseau
WO2023130393A1 (fr) Procédé et appareil de communication sans fil, dispositif terminal, et dispositif de réseau

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21961100

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 202180100613.0

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE