WO2023207675A1 - Procédé et appareil de rapport d'information, et terminal, périphérique côté réseau et support - Google Patents

Procédé et appareil de rapport d'information, et terminal, périphérique côté réseau et support Download PDF

Info

Publication number
WO2023207675A1
WO2023207675A1 PCT/CN2023/088993 CN2023088993W WO2023207675A1 WO 2023207675 A1 WO2023207675 A1 WO 2023207675A1 CN 2023088993 W CN2023088993 W CN 2023088993W WO 2023207675 A1 WO2023207675 A1 WO 2023207675A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
information
msg
target
terminal
Prior art date
Application number
PCT/CN2023/088993
Other languages
English (en)
Chinese (zh)
Inventor
潘翔
鲍炜
莫毅韬
杨坤
吴凯
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023207675A1 publication Critical patent/WO2023207675A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0205Traffic management, e.g. flow control or congestion control at the air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Definitions

  • This application belongs to the field of communication technology, and specifically relates to an information reporting method, device, terminal, network-side equipment and medium.
  • terminals located in cell edge areas can repeatedly send random access based on network instructions and configurations during the random access process.
  • Input a message (such as Message (Msg) 3) to enhance the uplink coverage performance of the terminal, thereby improving the random access success rate of the terminal.
  • Msg Message
  • the terminal needs to occupy additional air interface resources to repeatedly send messages. If the network instructions and configuration are unreasonable, it will lead to a waste of air interface resources in the process of random access of the terminal.
  • Embodiments of the present application provide an information reporting method, device, terminal, network-side equipment and medium, which can solve the problem of waste of air interface resources in the process of random access of terminals due to unreasonable instructions and configurations of the network. .
  • an information reporting method is provided, which is applied to a terminal.
  • the method includes: the terminal receives request information from a network side device.
  • the request information is used to request random access information.
  • the random access information is: the terminal is randomly accessed. During the access process, the relevant information of the message is repeatedly sent; and in response to the request information, random access information is sent to the network side device.
  • an information reporting device includes: a receiving module.
  • the receiving module is configured to receive request information from a network side device.
  • the request information is used to request random access information.
  • the random access is: information related to messages repeatedly sent by the information reporting device during the random access process.
  • the sending module is configured to send random access information to the network side device in response to the request information received by the receiving module.
  • an information reporting method is provided, which is applied to network side equipment.
  • the method includes: the network side equipment sends request information to the terminal.
  • the request information is used to request random access information.
  • the random access information is: terminal During the random access process, the relevant information of the message is repeatedly sent; and the random access information is received from the terminal.
  • an information reporting device includes: a sending module.
  • the sending module is used to send request information to the terminal.
  • the request information is used to request random access information.
  • the random access information is : Information about the terminal repeatedly sending messages during the random access process.
  • a receiving module the receiving module is used to receive random access information from the terminal.
  • a terminal in a fifth aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are executed by the processor, the following implementations are implemented: The steps of the method described in one aspect.
  • a terminal including a processor and a communication interface, wherein the communication interface is used to receive request information from a network side device, the request information is used to request random access information, and the random access information is : The terminal repeatedly sends relevant information of the message during the random access process; and responds to the request information by sending random access information to the network side device.
  • a network side device in a seventh aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are executed by the processor.
  • a network side device including a processor and a communication interface, wherein the communication interface is used to send request information to a terminal, and the request information is used to request random access information.
  • the random access information is : The terminal repeatedly sends message-related information during the random access process; and receives random access information from the terminal.
  • a ninth aspect provides an information reporting system, including: a terminal and a network side device.
  • the terminal can be used to perform the steps of the method described in the first aspect.
  • the network side device can be used to perform the steps of the method described in the third aspect. steps of the method described steps.
  • a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented as described in the first aspect. The steps of the method described in the third aspect.
  • a chip in an eleventh aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect. The steps of a method, or steps of implementing a method as described in the third aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement as described in the first aspect steps of the method.
  • the terminal can receive request information for requesting random access information (that is, information related to the terminal repeatedly sending messages during the random access process) from the network side device, and respond to the request information to the network.
  • the side device sends the random access information.
  • the terminal can respond to the request information sent by the network side device, send relevant information about the terminal's repeated sending of messages during the random access process to the network side device, so that the network side device can respond to the terminal's repeated sending of messages during the random access process.
  • the relevant information of the message is used to optimize the configuration parameters of repeated message sending. Therefore, it is possible to avoid unreasonable instructions and configurations of the network side equipment while ensuring the random access success rate of the terminal during the random access process.
  • the resulting waste of air interface resources can reduce the waste of air interface resources.
  • Figure 1 is a block diagram of a wireless communication system provided by an embodiment of the present application.
  • FIG. 2 is one of the flow diagrams of the information reporting method provided by the embodiment of the present application.
  • Figure 3 is the second schematic flow chart of the information reporting method provided by the embodiment of the present application.
  • Figure 4 is one of the schematic diagrams of a random access attempt of a terminal provided by an embodiment of the present application.
  • Figure 5 is a second schematic diagram of a random access attempt of a terminal provided by an embodiment of the present application.
  • Figure 6 is a third schematic diagram of a random access attempt of a terminal provided by an embodiment of the present application.
  • Figure 7 is a fourth schematic diagram of a random access attempt of a terminal provided by an embodiment of the present application.
  • Figure 8 is one of the structural schematic diagrams of the information reporting device provided by the embodiment of the present application.
  • Figure 9 is the second structural schematic diagram of the information reporting device provided by the embodiment of the present application.
  • Figure 10 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 11 is a schematic diagram of the hardware structure of a terminal provided by an embodiment of the present application.
  • Figure 12 is a schematic diagram of the hardware structure of a network-side device provided by an embodiment of the present application.
  • 4-step RACH generally includes the following five steps:
  • Step 1 The terminal sends message Msg 1 (random access preamble) to the network side device.
  • Step 2 After receiving Msg 1, the network side device will send the second message Msg 2 to the terminal, that is, the random access response (Random Access Response, RAR) message.
  • the RAR message uses the random access wireless network temporary identifier (Random Access Radio Network Tempory Identity, RA-RNTI) scrambling, the RAR message includes uplink grant (UL grant), random access preamble identification code (Random Access preamble Identification, RAPID), temporary cell wireless network temporary identification (Temple Cell Radio Network Tempory Identity, TC-RNTI), etc.
  • Step 3 The terminal detects the RAPID terminal corresponding to the preamble sent by itself, and sends message 3Msg 3 according to the position of UL grant.
  • Step 4 The terminal receives the fourth message Msg 4 sent by the network side.
  • the Msg4 contains the competition resolution identifier, and upgrades the TC-RNTI to the Cell Radio Network Tempory Identity (C-RNTI). Subsequently, the network side The device can use C-RNTI to schedule the terminal.
  • C-RNTI Cell Radio Network Tempory Identity
  • the network side device if it does not receive Msg3, it can scramble the physical downlink control channel in the TC-RNTI (Physical Downlink Control Channel, PDCCH) schedules the terminal to resend Msg 3.
  • TC-RNTI Physical Downlink Control Channel, PDCCH
  • different terminals randomly select preambles for transmission. In this way, different terminals may select the same preamble to transmit on the same time-frequency wireless resources. This situation can be understood as a preamble conflict among terminals.
  • the different terminals will transmit Msg 3 according to the scheduling information in the UL grant of the RAR message.
  • the network side device schedules Msg 3 in one The resource can only decode Msg 3 sent by one terminal, so the network side device will include the contention resolution information received in Msg 3 in Msg 4.
  • the terminal If the competition resolution information in Msg 4 received by the terminal matches the competition resolution information sent by the terminal in Msg 3, the terminal considers the competition resolution to be successful; if they do not match, the competition resolution is considered to be unsuccessful; if the competition resolution is not successful, then The terminal reselects the random access channel (Random Access Channel, RACH) to send resources, transmits the physical random access channel (Physical Random Access Channel, PRACH), and conducts the next random access attempt.
  • RACH Random Access Channel
  • 2-step RACH specifically includes the following two steps:
  • Step 1 The terminal triggers the 2-step RACH process and sends the request information (A message Msg A) to the network side device.
  • Step 2 The network side device sends confirmation information (B message MsgB) to the terminal.
  • the network side device will configure the configuration information of two-step random access for the terminal.
  • the configuration information includes: the sending resource information corresponding to Msg A and MsgB.
  • Msg A in two-step random access includes Msg 1 and Msg 3 in four-step random access
  • Msg B in two-step random access includes Msg in four-step random access. 2 and Msg 4.
  • the network side device will configure the two-step random access configuration information for the terminal, such as the sending resource information corresponding to Msg A and Msg B.
  • the terminal can start another random access attempt to perform multiple random access attempts, thereby improving the performance of the random access process. Random access success rate.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • system and “network” in the embodiments of this application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies.
  • NR New Radio
  • the following description describes a New Radio (NR) system for example purposes, and uses NR terminology in much of the following description, but these techniques can also be applied to applications other than NR system applications, such as 6th Generation , 6G) communication system.
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • UMPC ultra-mobile personal computer
  • UMPC mobile Internet device
  • MID mobile Internet Device
  • AR augmented reality
  • VR virtual reality
  • robots wearable devices
  • VUE vehicle-mounted equipment
  • PUE pedestrian terminal
  • smart home home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.
  • PC personal computers
  • teller machines or self-service Terminal devices such as mobile phones
  • wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart watches bracelets, smart bracelets, smart rings, smart necklaces, smart anklets, smart anklets, etc.), smart wristbands, smart clothing, etc.
  • the network side device 12 may include an access network device or a core network device, where the access network device 12 may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or Wireless access network unit.
  • the access network device 12 may include a base station, a WLAN access point or a WiFi node, etc.
  • the base station may be called a Node B, an evolved Node B (eNB), an access point, a Base Transceiver Station (BTS), a radio Base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), Home Node B, Home Evolved Node B, Transmitting Receiving Point (TRP) or all
  • eNB evolved Node B
  • BTS Base Transceiver Station
  • BSS Basic Service Set
  • ESS Extended Service Set
  • Home Node B Home Evolved Node B
  • TRP Transmitting Receiving Point
  • Figure 2 shows a flow chart of an information reporting method provided by an embodiment of the present application.
  • the information reporting method provided by the embodiment of the present application may include the following steps 101 to 104.
  • Step 101 The network side device sends request information to the terminal.
  • the network side device may send request information to the terminal if specific conditions are met.
  • the specific conditions may include at least one of the following: within a specific time period, the network side device needs to optimize the configuration parameters of the terminal, the terminal ends after a random access process, etc.
  • the above-mentioned specific conditions may be: pre-configured or agreed upon in an agreement.
  • the above request information is used to request random access information.
  • the random access information is: information related to the terminal repeatedly sending messages during the random access process.
  • the above message may include at least one of the following: Msg 1, Msg 3, Msg A.
  • the message when the random access process is a four-step random access 4-step RACH process, the message can be Msg 1 and/or Msg 3; when the random access process is a two-step random access 2-step RACH In the case of a process, the message can be Msg A.
  • the information content of the above random access information may specifically be: network side device configuration or protocol agreement.
  • the above random access information includes at least one of the following:
  • the terminal When the terminal reaches the maximum transmission power of Msg 1, the terminal repeatedly sends Msg 1 the number of times.
  • the above target random access method includes at least one of the following: repeatedly sending Msg 1, repeatedly sending Msg 3, and repeatedly sending Msg 1 and Msg 3.
  • the terminal may make multiple random access attempts.
  • the number of random access attempts in the above random access process includes at least one of the following:
  • the terminal can start the first counter at the beginning of the random access process, and update the count value of the first counter according to the number of status changes of random access attempts to obtain The number of random access attempts during the random access process.
  • the above-mentioned first random access attempt may be: a part of a random access attempt or all of the random access attempts among multiple random access attempts performed by the terminal.
  • the above "target information of the first random access attempt in the random access process” can be understood as: The random access Target information for each random access attempt during the process.
  • the first random access attempt is: a random access attempt using repeated sending of Msg 3;
  • the above target information includes at least one of the following:
  • the above-mentioned third identifier is used to indicate that the terminal sends Msg 3 repeatedly.
  • the first random access attempt is: a random access attempt that repeatedly sends Msg 1;
  • the above target information includes at least one of the following:
  • the above-mentioned fourth identifier is used to indicate that the terminal uses repeated transmission of Msg 1;
  • the above-mentioned second reference object is: the reference object associated with the random access resource used in the first random access attempt;
  • the second reference object includes any of the following Items: Synchronization Signal Block (SSB), Channel State Information Reference Signal (CSI-RS).
  • SSB Synchronization Signal Block
  • CSI-RS Channel State Information Reference Signal
  • the above random access resource may specifically be a random access opportunity (RACH Occasion, RO).
  • the list of second reference objects may include any of the following: SSB Index Index list, CSI-RS Index list.
  • the target information includes: whether the signal quality parameter of the second reference object is greater than or equal to the first signal quality parameter threshold.
  • the above-mentioned second reference object is: a reference object associated with the random access resource used in the first random access attempt, and the second reference object includes any of the following: SSB, CSI-RS;
  • the above-mentioned first signal quality parameter threshold is: the associated signal quality parameter threshold when the terminal selects random access resources for the first random access attempt.
  • the first signal quality parameter threshold may specifically be: configured by the network side device or agreed upon by the protocol.
  • the target information also includes: a first indication.
  • the value of the first indication is the first value; when the signal quality parameter of the second reference object is less than the first signal quality parameter In the case of threshold, the value of the first indication is the second value; the first value and the second value are different.
  • the above-mentioned first value may specifically be a true value
  • the above-mentioned second value may specifically be a non-true value
  • the target information also includes: a fifth identifier.
  • the above-mentioned fifth identifier is used to indicate: the first signal quality parameter threshold.
  • the sixth identification may include a fifth identification.
  • the sixth identifier may specifically be: dlRSRPAboveThreshold identifier.
  • explicit indication can be used to reuse the dlRSRPAboveThreshold identifier and introduce a new identifier in the random access information to indicate the first signal quality parameter threshold.
  • the first signal quality parameter threshold is: the signal quality parameter threshold of the random access method used in the first random access attempt.
  • the random access methods adopted by the terminal for random access attempts may be exactly the same, partially the same, or completely different.
  • the terminal performs two random access attempts, such as random access attempt 1 and random access attempt 2.
  • the random access method used in random access attempt 1 is to repeatedly send Msg. 1.
  • the random access method used in the random access attempt 2 is to repeatedly send Msg 1, that is, in the random access process, the random access method used by the terminal in the random access attempt is exactly the same.
  • the identifier of the target random access method adopted by the terminal for random access attempts is: the identifier of repeatedly sending Msg 1.
  • the terminal performs three random access attempts, such as random access attempt 3, random access attempt 4, and random access attempt 5.
  • the random access attempt 3 uses random access.
  • the access method is to repeatedly send Msg 1
  • the random access method used in this random access attempt 4 is to repeatedly send Msg 3
  • the random access method used in this random access attempt 5 is to repeatedly send Msg 3, that is, in this random access
  • the random access method adopted by the terminal for random access attempts is partly the same.
  • the target random access method used by the terminal for random access attempts The identifiers are: the identifier for repeatedly sending Msg 1 and the identifier for repeatedly sending Msg 3.
  • the terminal performs three random access attempts, such as random access attempt 6, random access attempt 7, and random access attempt 8.
  • the random access attempt 6 uses random access.
  • the access method is to repeatedly send Msg 1.
  • the random access method used in this random access attempt 7 is to repeatedly send Msg 3.
  • the random access method used in this random access attempt 8 is to repeatedly send Msg 1 and Msg 3, that is, in In this random access process, the terminal uses completely different random access methods for random access attempts.
  • the identification of the target random access method adopted by the terminal for random access attempts is: the identification of repeatedly sending Msg 1, the identification of repeatedly sending Msg 3, and the identification of repeatedly sending Msg 1 and Msg 3.
  • the above-mentioned identification of occurrence of random access mode conversion includes at least one of the following:
  • the above-mentioned first identifier is used to indicate: the random access mode in which the random access mode conversion occurs;
  • the above-mentioned second identifier is used to indicate: the number of times of the second random access attempt in the random access process; the second random access attempt is: a random access attempt in which a random access mode conversion occurs.
  • the random access mode in which the random access mode conversion occurs may include: the random access mode in which the conversion occurs, and the random access method to which the conversion occurs.
  • the first identifier may be used to indicate any of the following:
  • the second identifier may be used to indicate: at what time in the random access process is the random access attempt at which the random access mode conversion occurs.
  • the information on the target random access method includes at least one of the following:
  • the target signal quality parameter threshold for the target random access method is the target signal quality parameter threshold for the target random access method
  • the above target reference object is: a reference object associated with a target random access resource
  • the target random access resource is: a random access resource used by the terminal for random access attempts
  • the target reference object includes any of the following: SSB, CSI-RS.
  • the above signal quality parameter may include at least one of the following: reference signal received power (Reference Signal Received Power, RSRP), reference signal received quality (Reference Signal Received Quality, RSRQ).
  • RSRP Reference Signal Received Power
  • RSRQ Reference Signal Received Quality
  • the above-mentioned first reference object is: among the target reference objects, a reference object whose signal quality parameter is less than the target signal quality parameter threshold; the above-mentioned specific random access resource is a random access resource among the target random access resources, and the specific random access resource is The input resource corresponds to the first reference object.
  • the specific random access resource may include a plurality of random access resources, and each random access resource in the plurality of random access resources is related to other random access resources (i.e., among the plurality of random access resources, except each Random access resources other than random access resources) are different.
  • the reasons why the terminal selects the target random access method include at least one of the following:
  • the number of random access attempts in the random access process is greater than or equal to the preset number threshold, and the signal quality parameter of the target reference object is less than the target signal quality parameter threshold.
  • the above-mentioned preset times threshold may be: configured by the network side device or agreed upon by the protocol.
  • the following uses the target random access method including different random access methods as an example to illustrate the reasons for the target random access method.
  • the above-mentioned target random access method includes any of the following: repeatedly sending Msg 1, repeatedly sending Msg 3; the above-mentioned preset number threshold includes: the first number threshold; the above-mentioned random access process The number of random access attempts in is greater than or equal to the preset threshold, including:
  • the number of random access attempts by sending Msg 1 and Msg 3 without repetition is greater than or equal to the first number threshold.
  • the above-mentioned first number threshold may be: configured by the network side device or agreed upon by the protocol.
  • the above-mentioned target random access method includes repeatedly sending Msg 1 and Msg 3; the above-mentioned preset number thresholds include: the first number threshold, the second number threshold, and the third number threshold; the above-mentioned random The number of random access attempts during the access process is greater than or equal to the preset threshold, including:
  • the number of random access attempts by sending Msg 1 and Msg 3 without repetition is greater than or equal to the first number threshold
  • the number of random access attempts by repeatedly sending Msg 1 is greater than or equal to the second threshold
  • the number of random access attempts by repeatedly sending Msg 3 is greater than or equal to the third threshold.
  • the first number threshold can be: the network side device configuration or the protocol agreement;
  • the second number threshold can be: the network side device configuration or the agreement agreement;
  • the third number threshold can be: the network side device configuration or the agreement agreement .
  • the network side device may send the request information to the terminal through the first target message.
  • the above-mentioned first target message may be any of the following: a broadcast message (such as System Information Block (System Information Block, SIB) 1) or a dedicated message (such as RRC Reconfiguration).
  • SIB System Information Block
  • RRC Reconfiguration a dedicated message
  • Step 102 The terminal receives request information from the network side device.
  • the terminal may receive the request information through the first target message.
  • Step 103 The terminal responds to the request information and sends random access information to the network side device.
  • the terminal can obtain the random access information from the information recorded by the terminal during the random access process according to the request information, and send the random access information to the network side device.
  • Step 104 The network side device receives random access information from the terminal.
  • the network side device can optimize the configuration parameters for the terminal to repeatedly send messages during the random access process based on the random access information, and Send the optimized configuration parameters to the terminal, so that the terminal updates the configuration parameters that repeatedly send messages during the random access process.
  • the network side device can adjust the configuration parameters of the terminal to repeatedly send messages during the random access process according to the random access information to optimize the configuration parameters.
  • the above configuration parameters may include at least one of the following: the number of times the message is repeatedly sent, the random access resource used to repeatedly send the message, etc.
  • the terminal can receive request information for requesting random access information (that is, information related to the terminal repeatedly sending messages during the random access process) from the network side device, and respond to the request information. , sending the random access information to the network side device. Because the terminal can respond to the request information sent by the network side device, send relevant information about the terminal's repeated sending of messages during the random access process to the network side device, so that the network side device can respond to the terminal's repeated sending of messages during the random access process. The relevant information of the message is used to optimize the configuration parameters of repeated message sending. Therefore, it is possible to avoid unreasonable instructions and configurations of the network side equipment while ensuring the random access success rate of the terminal during the random access process. The resulting waste of air interface resources can reduce the waste of air interface resources.
  • the network side device can also send the random access information configuration to the terminal so that the terminal can generate random access information that meets the conditions to further improve the effect of optimizing the configuration parameters of repeated sending messages.
  • the information reporting method provided by the embodiment of the present application may also include the following steps 201 to 203.
  • Step 201 The network side device sends random access information configuration to the terminal.
  • the above random access information configuration is used to configure target conditions for the terminal to generate random access information.
  • the above target conditions include at least one of the following:
  • the number of random access attempts using the first random access method is greater than or equal to the first preset threshold
  • the number of random access attempts is greater than or equal to the second preset threshold
  • Random access attempts are performed with Contention Based Random Access (CBRA);
  • Random access attempts are performed using Contention Free Random Access (CFRA);
  • CFRA Contention Free Random Access
  • the random access attempt is performed with four-step random access 4-step RACH;
  • Random access attempts are performed with two-step random access 2-step RACH.
  • the above-mentioned first random access method includes at least one of the following: not repeatedly sending Msg 1 and Msg 3, repeatedly sending Msg 1, repeatedly sending Msg 3, and repeatedly sending Msg 1 and Msg 3.
  • the first random access method may include one random access method or multiple random access methods.
  • the first random access method may include one random access method, such as not repeatedly sending Msg 1 and Msg 3; or the first random access method may include multiple random access methods, such as repeatedly sending Msg 1 , Repeat sending Msg 3 and Repeat sending Msg 1 and Msg 3.
  • the above-mentioned first preset threshold may specifically be: configured by a network side device or agreed upon by a protocol.
  • the above “the number of random access attempts is greater than or equal to the second preset threshold” can be understood as: the total number of random access attempts is greater than or equal to the second preset threshold; the second preset threshold specifically can be: Network-side device configuration or protocol agreement.
  • the terminal can generate random access information.
  • the network side device may send the request information to the terminal through the second target message.
  • the above-mentioned second target message may be any of the following: a broadcast message (such as SIB1) or a dedicated message (such as RRC Reconfiguration).
  • a broadcast message such as SIB1
  • a dedicated message such as RRC Reconfiguration
  • Step 202 The terminal receives random access information configuration from the network side device.
  • the terminal may receive the request information through the second target message.
  • Step 203 The terminal generates random access information when the target conditions are met.
  • the terminal can determine whether a random access attempt satisfies the target condition, and determines whether the target condition is met. If conditions exist, generate a random access report for the one random access attempt to generate multiple random access reports to generate random access information. It can be understood that the random access information includes multiple random access reports.
  • the network side device can configure the target conditions for generating random access information for the terminal, so that the terminal can generate random access information that meets the conditions, therefore, the network side device can improve the ability to optimize the configuration parameters of repeated message sending. Effect.
  • the network side device can also send a random access configuration to the terminal.
  • the random access configuration is used by the terminal to select a random access method, so that the terminal can choose to perform random access during the random access process based on the random access configuration.
  • the information reporting method provided by the embodiment of the present application may also include the following steps 301 to 303.
  • Step 301 The network side device sends random access configuration to the terminal.
  • the above random access configuration is used for the terminal to select a random access method.
  • the random access method may include at least one of the following: not sending Msg 1 and Msg 3 repeatedly, sending Msg 1 repeatedly, sending Msg 3 repeatedly, and sending Msg 1 and Msg 3 repeatedly.
  • the above random access configuration may include at least one of the following:
  • the fourth threshold is the fourth threshold
  • the third signal quality parameter threshold is the third signal quality parameter threshold.
  • the above-mentioned first number threshold is: the number threshold of random access attempts by sending Msg 1 and Msg 3 without repeating. It can be understood that if the number of random access attempts by the terminal by not repeatedly sending Msg 1 and Msg 3 is greater than or equal to the first number threshold, the terminal can use other random access methods (such as repeatedly sending Msg 1, repeatedly sending Msg 3, Send Msg 1 and Msg 3 repeatedly), or determine that the random access process failed.
  • the above-mentioned second threshold number is: the threshold number of random access attempts by repeatedly sending Msg 1. It can be understood that if the number of random access attempts by the terminal by repeatedly sending Msg 1 is greater than or equal to the second threshold, the terminal can use other random access methods, or determine that the random access process has failed.
  • the above-mentioned third number threshold is: the number threshold of random access attempts by repeatedly sending Msg 3. It can be understood that if the number of random access attempts by the terminal by repeatedly sending Msg 3 is greater than or equal to the third threshold, the terminal can use other random access methods, or determine that the random access process has failed.
  • the above-mentioned fourth threshold is: the threshold of the number of random access attempts by repeatedly sending Msg 1 and Msg 3. It can be understood that if the number of random access attempts by the terminal by repeatedly sending Msg 1 and Msg 3 is greater than or equal to the fourth threshold, the terminal can use other random access methods, or determine that the random access process has failed.
  • the second signal quality parameter threshold when the second signal quality parameter threshold is RSRP, the second signal quality parameter threshold includes at least one of the following: a first RSRP threshold, a third RSRP threshold, and a fifth RSRP threshold.
  • the first RSRP threshold is: the RSRP threshold for selecting to repeatedly send Msg 1
  • the third RSRP threshold is: the RSRP threshold for selecting to repeatedly send Msg 3
  • the fifth RSRP threshold is: the RSRP threshold for selecting to repeatedly send Msg 1 and Msg 3 .
  • the terminal may choose to repeatedly send the Msg 1 to perform this random access attempt; if the actual measured RSRP value of the reference object selected for a random access attempt is less than the third RSRP threshold, the terminal can choose to repeatedly send Msg 3 to perform this random access attempt; if a random access attempt is If the actual measured RSRP value of the reference object selected in the entry attempt is less than the fifth RSRP threshold, the terminal can choose to repeatedly send Msg 1 and Msg 3 for this random access attempt.
  • the reference object such as SSB, or CSI-RS
  • the third signal quality parameter threshold is: the signal quality parameter threshold of a third reference object associated with the selected random access resource.
  • the third reference object may include any of the following: SSB, CSI-RS.
  • the third signal quality parameter threshold includes at least one of the following: a second RSRP threshold, a fourth RSRP threshold, and a sixth RSRP threshold.
  • the second RSRP threshold is: after selecting to repeatedly send Msg 1, the signal quality parameter threshold associated when selecting random access resources;
  • the fourth RSRP threshold is: after selecting to repeatedly send Msg 3, the signal associated when selecting random access resources Quality parameter threshold;
  • the sixth RSRP threshold is: after selecting to repeatedly send Msg 1 and Msg 3, the signal quality parameter threshold associated when selecting random access resources.
  • the terminal can select a random access resource with a signal quality parameter greater than or equal to the second RSRP threshold when selecting random access resources. resources; if a random access attempt chooses to repeatedly send Msg 3, the terminal can select a random access resource with a signal quality parameter greater than or equal to the fourth RSRP threshold when selecting random access resources; if a random access attempt selects By repeatedly sending Msg 1 and Msg 3, the terminal can select random access resources with signal quality parameters greater than or equal to the sixth RSRP threshold when selecting random access resources.
  • the network side device may send the request information to the terminal through a third target message.
  • the above-mentioned third target message may be any of the following: a broadcast message (such as SIB1) or a dedicated message (such as RRC Reconfiguration).
  • a broadcast message such as SIB1
  • a dedicated message such as RRC Reconfiguration
  • Step 302 The terminal receives random access configuration from the network side device.
  • the terminal may receive the random access configuration through the third target message.
  • Step 303 The terminal determines the random access method to be used for random access attempts during the random access process according to the random access configuration.
  • the terminal when the number of times the terminal makes random access attempts by sending Msg 1 and Msg 3 without repeating is greater than or equal to the first number threshold, the terminal can determine to perform random access during the random access process.
  • the random access method used in the random access attempt is to repeatedly send Msg 1 (or repeatedly send Msg 3, or repeatedly send Msg 1 and Msg 3).
  • the terminal when the number of times the terminal repeatedly sends Msg 1 for random access attempts is greater than or equal to the second threshold, the terminal can determine to use the random access attempt during the random access process.
  • the random access method is to repeatedly send Msg 1 and Msg 3.
  • the terminal may determine that the random access method used in the random access attempt during the random access process is to repeatedly send Msg 1 and Msg 3.
  • the terminal may choose to repeatedly send Msg 1 to perform the random access attempt.
  • the terminal may choose to repeatedly send Msg 3 to perform the random access attempt.
  • the terminal may choose to repeatedly send Msg 1 and Msg 3 to perform the random access attempt.
  • the number of times the terminal performs random access attempts by sending Msg 1 and Msg 3 without repetition is greater than or equal to the first number threshold, and the actual RSRP of the reference object selected for one random access attempt is If the measured value is less than the first RSRP threshold, the terminal may choose to repeatedly send Msg 1 for this random access attempt.
  • the number of times the terminal performs random access attempts by sending Msg 1 and Msg 3 without repetition is greater than or equal to the first number threshold, and the actual RSRP of the reference object selected for one random access attempt is When the measured value is less than the third RSRP threshold, the terminal may choose to repeatedly send Msg 3 for this random access attempt.
  • the number of times the terminal performs random access attempts by sending Msg 1 and Msg 3 without repetition is greater than or equal to the first number threshold, and the actual RSRP of the reference object selected for one random access attempt is When the measured value is less than the fifth RSRP threshold, the terminal may choose to repeatedly send Msg 1 and Msg 3 for this random access attempt.
  • the number of times the terminal repeatedly sends Msg 1 for random access attempts is greater than or equal to the second threshold, and the actual RSRP measurement value of the reference object selected for one random access attempt is less than the fifth
  • the terminal can choose to repeatedly send Msg 1 and Msg 3 for this random access attempt.
  • the number of times the terminal repeatedly sends Msg 3 for random access attempts is greater than or equal to the third threshold, and the actual RSRP measurement value of the reference object selected for one random access attempt is less than the fifth
  • the terminal can choose to repeatedly send Msg 1 and Msg 3 for this random access attempt.
  • the terminal can first choose not to repeatedly send Msg 1 and Msg 3 according to the random access configuration, that is, perform a 4-step RACH random access attempt in related technologies.
  • the terminal when the terminal chooses to repeatedly send Msg 1 according to the random access configuration, the terminal can select a specific random access resource combination (the specific random access resource combination).
  • the incoming resource combination includes multiple random access resources.
  • the multiple random access resources can be random access resources with a signal quality parameter threshold greater than or equal to the second RSRP threshold), and the specific random access resource combination is used to repeatedly send Msg 1.
  • the terminal when the terminal chooses to repeatedly send Msg 3 according to the random access configuration, the terminal can select a specific random access resource (the specific random access resource
  • the resource can be a random access resource with a signal quality parameter greater than or equal to the fourth RSRP), and use the specific random access resource to send Msg 1, so that the network side device can send Msg 2 to the terminal according to the specific random access resource.
  • the Msg 2 includes the number of times to re-send Msg 3 and the uplink grant (UL grant), so that the terminal can re-send Msg 3 this number of times within the UL grant.
  • the terminal when the terminal chooses to repeatedly send Msg 1 and Msg 3 according to the random access configuration, the terminal can select a specific random access resource combination (the The specific random access resource combination includes multiple random access resources, and the multiple random access resources can be random access resources with a signal quality parameter threshold greater than or equal to the sixth RSRP threshold), and the specific random access resource is used Msg 1 is sent repeatedly in combination, so that the network side device can send Msg 2 to the terminal according to the specific random access resource combination.
  • the Msg 2 includes the number of times Msg 3 is repeatedly sent and the uplink grant (UL grant), so that the terminal can Repeat this number of Msg 3 within the UL grant.
  • the network side device can configure a random access configuration for the terminal for the terminal to select a random access method, so that the terminal can select a random access method that meets the conditions, therefore the random access success rate of the terminal can be improved.
  • the execution subject may be an information reporting device.
  • the information reporting method performed by the information reporting device is used as an example to illustrate the information reporting device provided by the embodiment of this application.
  • FIG. 8 shows a possible structural diagram of the information reporting device involved in the embodiment of the present application.
  • the information reporting device 40 may include: a receiving module 41, which is used to receive request information from the network side device.
  • the request information is used to request random access information.
  • the random access information is:
  • the information reporting device 40 randomly Information related to repeated sending of messages during the access process.
  • the sending module 42 is configured to send random access information to the network side device in response to the request information received by the receiving module 41 .
  • the above random access information includes at least one of the following: the number of random access attempts in the random access process; target information of the first random access attempt in the random access process; During the random access process, the identification of the target random access method adopted by the information reporting device 40 for the random access attempt; the information of the target random access method; the identification of random access mode conversion; when the information reporting device 40 reaches Msg 1 When the maximum transmission power is , the number of times the information reporting device 40 repeatedly sends Msg 1.
  • the above target random access method includes at least one of the following: repeatedly sending Msg 1, repeatedly sending Msg 3, and repeatedly sending Msg 1 and Msg 3.
  • the number of random access attempts in the above random access process includes at least one of the following: the number of random access attempts using non-repeated sending of Msg 1 and Msg 3; using target random access The number of random access attempts in this way; the number of random access attempts without receiving RAR; the number of random access attempts with unsuccessful contention resolution after receiving RAR.
  • the above-mentioned identifier for random access mode conversion includes at least one of the following: a first identifier; a second identifier.
  • the above-mentioned first identifier is used to indicate: the random access mode in which the random access mode conversion occurs;
  • the above-mentioned second identifier is used to indicate: the number of second random access attempts in the random access process; the second random access
  • the entry attempt is: a random access attempt in which random access mode conversion occurs.
  • the above information about the target random access method includes at least one of the following: target signal quality parameter threshold of the target random access method; signal quality parameter of the target reference object; when using specific random access resources. , and when using the target random access method to perform a random access attempt, the number of first reference objects; the reason why the information reporting device 40 selects the target random access method.
  • the above-mentioned target reference object is: a reference object associated with a target random access resource
  • the target random access resource is: a random access resource used by the information reporting device 40 for random access attempts
  • the target reference object includes any of the following: One item: SSB, CSI-RS
  • the above-mentioned first reference object is: among the target reference objects, the signal quality parameter is less than the target signal quality parameter threshold
  • the above-mentioned specific random access resource is among the target random access resources, and the The specific random access resource corresponds to the first reference object
  • the reason why the information reporting device 40 selects the target random access method includes at least one of the following: the number of random access attempts in the random access process is greater than or equal to the preset number threshold, The signal quality parameter of the target reference object is less than the target signal quality parameter threshold.
  • the above-mentioned target random access method includes any of the following: repeatedly sending Msg 1, repeatedly sending Msg 3; the above-mentioned preset number threshold includes: the first number threshold; during the above-mentioned random access process The number of random access attempts is greater than or equal to the preset threshold, including: the number of random access attempts using non-repeated sending of Msg 1 and Msg 3 is greater than or equal to the first threshold.
  • the above-mentioned target random access method includes repeatedly sending Msg 1 and Msg 3;
  • the above-mentioned preset number thresholds include: a first number threshold, a second number threshold, and a third number threshold; the above-mentioned random access
  • the number of random access attempts during the entry process is greater than or equal to the preset threshold, including: the number of random access attempts using non-repeated sending of Msg 1 and Msg 3 is greater than or equal to the first number threshold; using repeated sending of Msg 1
  • the number of random access attempts is greater than or equal to the second threshold; the number of random access attempts by repeatedly sending Msg 3 is greater than or equal to the third threshold.
  • the above-mentioned first random access attempt is: a random access attempt that repeatedly sends Msg 3; the above-mentioned target information includes at least one of the following: a third identifier; the number of times Msg 3 is repeatedly sent.
  • the above-mentioned third identifier is used to indicate that the information reporting device 40 uses repeated sending of Msg 3.
  • the above-mentioned first random access attempt is: a random access attempt using repeated sending of Msg 1;
  • the above-mentioned target information includes at least one of the following: a fourth identifier; the number of times of repeated sending of Msg 1; A list of two reference objects.
  • the above-mentioned fourth identifier is used to indicate that: the information reporting device 40 adopts repeated transmission of Msg 1;
  • the above-mentioned second reference object is: the reference object associated with the random access resource used in the first random access attempt;
  • the second reference object includes Any of the following: SSB, CSI-RS.
  • the above target information includes: whether the signal quality parameter of the second reference object is greater than or equal to the first signal quality parameter threshold.
  • the above-mentioned second reference object is: a reference object associated with the random access resource used in the first random access attempt, and the second reference object includes any of the following: SSB, CSI-RS;
  • the above-mentioned first signal quality parameter threshold is: the associated signal quality parameter threshold when the information reporting device 40 selects a random access resource for the first random access attempt.
  • the above target information further includes: a first indication.
  • the value of the first indication is the first value; when the signal quality parameter of the second reference object is less than the first signal quality parameter threshold, the value of the first indication is the second value; the first value and the second value are different.
  • the above target information also includes: a fifth identifier.
  • the above-mentioned fifth identifier is used to indicate: the first signal quality parameter threshold.
  • the above-mentioned first signal quality parameter threshold is: the signal quality parameter threshold of the random access method adopted in the first random access attempt.
  • the above-mentioned receiving module 41 is also used to receive random access information configuration from the network side device.
  • the random access information configuration is used to configure the target conditions for the information reporting device 40 to generate random access information;
  • the above-mentioned information reporting device 40 also includes: a generating module; the generating module is used to generate random access information when the target conditions are met.
  • the above target conditions include at least one of the following: using the first random access method; using the first random access method to make random access attempts greater than or equal to the first preset threshold; performing The number of random access attempts is greater than or equal to the second preset threshold; the random access attempts are performed by contention-based random access; the random access attempts are performed by non-contention random access; the random access attempts are performed by Four-step random access is performed; random access attempts are performed with two-step random access.
  • the above-mentioned first random access method includes at least one of the following: not repeatedly sending Msg 1 and Msg 3, repeatedly sending Msg 1, repeatedly sending Msg 3, and repeatedly sending Msg 1 and Msg 3.
  • the information reporting device provided by the embodiment of the present application can respond to the request information sent by the network side device and send the relevant information of the message to the network side device.
  • the information reporting device repeatedly sends the message during the random access process, so that the network
  • the side device can optimize the configuration parameters of repeatedly sending messages based on the information about the information reporting device repeatedly sending messages during the random access process. Therefore, random access can be ensured in the process of random access of the information reporting device.
  • the success rate is high, the waste of air interface resources caused by unreasonable instructions and configurations of network-side devices can be avoided. In this way, the waste of air interface resources can be reduced.
  • the information reporting device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • NAS Network Attached Storage
  • the information reporting device provided by the embodiments of the present application can implement each process implemented by the method embodiments in Figures 1 to 7 and achieve the same technical effect. To avoid duplication, details will not be described here.
  • Figure 9 shows a possible structural diagram of the information reporting device involved in the embodiment of the present application.
  • the information reporting device 50 may include: a sending module 51, the sending module 51 is used to send request information to the terminal, the request information is used to request random access information, the random access information is: the terminal is in Information related to repeated sending of messages during random access.
  • the receiving module 52 is configured to receive random access information from the terminal.
  • the above-mentioned sending module 51 is also used to send random access information configuration to the terminal.
  • the random access information configuration is used to configure target conditions for the terminal to generate random access information.
  • the terminal can respond to the request information sent by the information reporting device and send relevant information about the terminal's repeated sending of messages during the random access process to the information reporting device, so that the information reporting device can respond to the request information sent by the information reporting device.
  • the terminal repeatedly sends the relevant information of the message during the random access process, and optimizes the configuration parameters of the repeated message. Therefore, it is possible to avoid errors due to random access while ensuring the random access success rate of the terminal during the random access process.
  • the instructions and configuration of the information reporting device are unreasonable, resulting in a waste of air interface resources. In this way, the waste of air interface resources can be reduced.
  • the information reporting device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • the terminal may include but is not limited to the types of network side devices 12 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • NAS Network Attached Storage
  • the information reporting device provided by the embodiments of the present application can implement each process implemented by the method embodiments in Figures 1 to 7 and achieve the same technical effect. To avoid duplication, details will not be described here.
  • this embodiment of the present application also provides a communication device 60, which includes a processor 61 and a memory 62.
  • the memory 62 stores information that can run on the processor 61.
  • a program or instruction For example, when the communication device 60 is a terminal, the program or instruction is executed by the processor 61 to implement the above information reporting method embodiment. Each step, and can achieve the same technical effect.
  • the communication device 60 is a network-side device, when the program or instruction is executed by the processor 61, each step of the above information reporting method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details are not repeated here.
  • Embodiments of the present application also provide a terminal, including a processor and a communication interface.
  • the communication interface is used to receive request information from a network side device.
  • the request information is used to request random access information.
  • the random access information is: the terminal is randomly accessed. During the access process, the relevant information of the message is repeatedly sent; and in response to the request information, random access information is sent to the network side device.
  • This terminal embodiment corresponds to the above-mentioned terminal-side method embodiment.
  • Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this terminal embodiment, and can achieve the same technical effect.
  • FIG. 11 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 100 includes but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, etc. At least some parts.
  • the terminal 100 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 110 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal structure shown in FIG. 11 does not constitute a limitation on the terminal.
  • the terminal may include more or fewer components than shown in the figure, or some components may be combined or arranged differently, which will not be described again here.
  • the input unit 104 may include a graphics processing unit (Graphics Processing Unit, GPU) 1041 and a microphone 1042.
  • the graphics processor 1041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 106 may include a display panel 1061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 107 includes a touch panel 1071 and at least one of other input devices 1072 .
  • Touch panel 1071 is also called a touch screen.
  • the touch panel 1071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 1072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the radio frequency unit 101 after receiving downlink data from the network side device, the radio frequency unit 101 can transmit it to the processor 110 for processing; in addition, the radio frequency unit 101 can send uplink data to the network side device.
  • the radio frequency unit 101 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
  • Memory 109 may be used to store software programs or instructions as well as various data.
  • the memory 109 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 109 may include volatile memory or nonvolatile memory, or memory 109 may include both volatile and nonvolatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM Double Data Rate SDRAM
  • DDRSDRAM double data rate synchronous dynamic random access memory
  • Enhanced SDRAM, ESDRAM synchronous dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory
  • the processor 110 may include one or more processing units; optionally, the processor 110 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 110 .
  • the radio frequency unit 101 is used to receive request information from the network side device.
  • the request information is used to request random access information.
  • the random access information is: information related to the terminal repeatedly sending messages during the random access process; and responds To request information, send random access information to the network side device.
  • the terminal provided by the embodiment of the present application can respond to the request information sent by the network side device and send relevant information about the terminal repeatedly sending messages during the random access process to the network side device, so that the network side device can respond to the request information sent by the terminal.
  • the radio frequency unit 101 is also configured to receive random access information configuration from the network side device.
  • the random access information configuration is used to configure target conditions for the terminal to generate random access information.
  • the processor 110 is configured to generate random access information when the target conditions are met.
  • the network side device can configure the target conditions for generating random access information for the terminal, so that the terminal can generate random access information that meets the conditions, therefore, the network side device can improve the ability to optimize the configuration parameters of repeated message sending. Effect.
  • Embodiments of the present application also provide a network side device, including a processor and a communication interface.
  • the communication interface is used to send request information to a terminal.
  • the request information is used to request random access information.
  • the random access information is: the terminal is randomly accessed. During the access process, the relevant information of the message is repeatedly sent; and random access information is received from the terminal.
  • This network-side device embodiment corresponds to the above-mentioned network-side device method embodiment.
  • Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this network-side device embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a network side device.
  • the network side device 200 includes: an antenna 201, a radio frequency device 202, a baseband device 203, a processor 204 and a memory 205.
  • the antenna 201 is connected to the radio frequency device 202.
  • the radio frequency device 202 receives information through the antenna 201 and sends the received information to the baseband device 203 for processing.
  • the baseband device 203 processes the information to be sent and sends it to the radio frequency device 202.
  • the radio frequency device 202 processes the received information and then sends it out through the antenna 201.
  • the method performed by the network side device in the above embodiment can be implemented in the baseband device 203, which includes a baseband processor.
  • the baseband device 203 may include, for example, at least one baseband board on which multiple chips are disposed, as shown in FIG. Program to perform the network device operations shown in the above method embodiments.
  • the network side device may also include a network interface 206, which is, for example, a common public radio interface (CPRI).
  • a network interface 206 which is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 200 in this embodiment of the present invention also includes: instructions or programs stored in the memory 205 and executable on the processor 204.
  • the processor 204 calls the instructions or programs in the memory 205 to execute each of the steps shown in Figure 12. The method of module execution and achieving the same technical effect will not be described in detail here to avoid duplication.
  • Embodiments of the present application also provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the program or instructions are executed by a processor, each process of the above information reporting method embodiment is implemented, and the same can be achieved. The technical effects will not be repeated here to avoid repetition.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the above information reporting method embodiment. Each process can achieve the same technical effect. To avoid duplication, it will not be described again here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product.
  • the computer program/program product is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the above information reporting method embodiment.
  • Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
  • Embodiments of the present application also provide an information reporting system, including: a terminal and a network side device.
  • the terminal can be used to perform the steps of the information reporting method as described above.
  • the network side device can be used to perform the information reporting method as described above. Steps of the reporting method.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Alarm Systems (AREA)

Abstract

La présente invention concerne un procédé et un appareil de rapport d'information, ainsi qu'un terminal, un périphérique côté réseau et un support. Selon les modes de réalisation de la présente invention, le procédé de rapport d'information comprend les étapes suivantes: un terminal reçoit une information de demande en provenance d'un périphérique côté réseau, l'information de demande étant utilisée pour demander une information d'accès aléatoire, et l'information d'accès aléatoire étant une information associée concernant l'envoi répété par un terminal d'un message lors d'un processus d'accès aléatoire; et en réponse à l'information de demande, l'envoi de l'information d'accès aléatoire au périphérique côté réseau.
PCT/CN2023/088993 2022-04-25 2023-04-18 Procédé et appareil de rapport d'information, et terminal, périphérique côté réseau et support WO2023207675A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210444194.9 2022-04-25
CN202210444194.9A CN116996931A (zh) 2022-04-25 2022-04-25 信息上报方法、装置、终端、网络侧设备及介质

Publications (1)

Publication Number Publication Date
WO2023207675A1 true WO2023207675A1 (fr) 2023-11-02

Family

ID=88517615

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/088993 WO2023207675A1 (fr) 2022-04-25 2023-04-18 Procédé et appareil de rapport d'information, et terminal, périphérique côté réseau et support

Country Status (2)

Country Link
CN (1) CN116996931A (fr)
WO (1) WO2023207675A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180220450A1 (en) * 2017-02-02 2018-08-02 Sharp Laboratories Of America, Inc. User equipments, base stations and methods
CN113973271A (zh) * 2020-07-24 2022-01-25 维沃移动通信有限公司 重复传输方法、装置及用户设备
CN113973395A (zh) * 2020-07-24 2022-01-25 维沃移动通信有限公司 随机接入方法、配置方法及相关设备
CN114303437A (zh) * 2019-08-30 2022-04-08 高通股份有限公司 在物联网通信中的随机接入过程修改
CN114363986A (zh) * 2020-09-29 2022-04-15 维沃移动通信有限公司 Pucch重复传输次数确定方法、装置及终端
US20220124833A1 (en) * 2020-10-16 2022-04-21 Qualcomm Incorporated Message 3 repetition conditioned on prach coverage enhancement

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180220450A1 (en) * 2017-02-02 2018-08-02 Sharp Laboratories Of America, Inc. User equipments, base stations and methods
CN114303437A (zh) * 2019-08-30 2022-04-08 高通股份有限公司 在物联网通信中的随机接入过程修改
CN113973271A (zh) * 2020-07-24 2022-01-25 维沃移动通信有限公司 重复传输方法、装置及用户设备
CN113973395A (zh) * 2020-07-24 2022-01-25 维沃移动通信有限公司 随机接入方法、配置方法及相关设备
CN114363986A (zh) * 2020-09-29 2022-04-15 维沃移动通信有限公司 Pucch重复传输次数确定方法、装置及终端
US20220124833A1 (en) * 2020-10-16 2022-04-21 Qualcomm Incorporated Message 3 repetition conditioned on prach coverage enhancement

Also Published As

Publication number Publication date
CN116996931A (zh) 2023-11-03

Similar Documents

Publication Publication Date Title
WO2022152275A1 (fr) Appareil et procédé de transmission de msg3, dispositif et support de stockage
WO2023116883A1 (fr) Procédé et appareil de détermination d'une ressource temps-fréquence pour une transmission de répétition msg1, et terminal
US20230163814A1 (en) Auxiliary information transmission method, terminal device, and network device
CN114080047A (zh) 随机接入的信号传输方法、终端及网络侧设备
WO2020061945A1 (fr) Procédé d'accès aléatoire, dispositif de réseau et dispositif terminal
WO2020221030A1 (fr) Procédé et dispositif de configuration d'informations de panneau d'antenne
WO2023207675A1 (fr) Procédé et appareil de rapport d'information, et terminal, périphérique côté réseau et support
WO2019119317A1 (fr) Procédé de transmission de préambule d'accès aléatoire et dispositif terminal
CN115134919A (zh) 时间单元确定方法、装置、终端及网络侧设备
WO2023134580A1 (fr) Procédés de transmission d'informations, appareil, terminal et dispositif côté réseau
WO2024022166A1 (fr) Procédé et appareil ra, et ue, dispositif côté réseau, système de communication et support de stockage lisible
WO2023116599A1 (fr) Procédés et appareil de transmission de prach, terminal et dispositif côté réseau
WO2024022197A1 (fr) Procédé et appareil ra, et ue, dispositif côté réseau, système de communication et support de stockage lisible
WO2023138587A1 (fr) Procédé de détermination de forme d'onde sur une bwp, et terminal
WO2023083304A1 (fr) Procédé d'accès aléatoire, terminal et dispositif côté réseau
WO2023083290A1 (fr) Procédé et appareil d'accès aléatoire, terminal et dispositif côté réseau
WO2023083227A1 (fr) Procédé de transmission répétée de prach, et terminal et dispositif côté réseau
WO2023186157A1 (fr) Procédé de configuration de ressources d'accès aléatoire, appareil, terminal et dispositif côté réseau
WO2023217007A1 (fr) Procédé de commutation, terminal et dispositif côté réseau
WO2023143532A1 (fr) Procédé et appareil de sélection de ressources, et terminal
WO2024041593A1 (fr) Procédé et appareil de traitement de communication de rétrodiffusion, terminal et dispositif côté réseau
WO2023151650A1 (fr) Procédé d'activation d'informations, terminal et dispositif côté réseau
WO2023151628A1 (fr) Procédé et appareil de transmission de pusch, terminal et dispositif côté réseau
WO2023061489A1 (fr) Procédé et appareil de traitement d'accès aléatoire, terminal, dispositif côté réseau et support de stockage
WO2023198183A1 (fr) Procédé et appareil d'acquisition d'informations, procédé et appareil d'envoi d'informations, terminal, et dispositif côté réseau

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23795108

Country of ref document: EP

Kind code of ref document: A1