WO2023279264A1 - 随机接入方法及装置、存储介质 - Google Patents
随机接入方法及装置、存储介质 Download PDFInfo
- Publication number
- WO2023279264A1 WO2023279264A1 PCT/CN2021/104834 CN2021104834W WO2023279264A1 WO 2023279264 A1 WO2023279264 A1 WO 2023279264A1 CN 2021104834 W CN2021104834 W CN 2021104834W WO 2023279264 A1 WO2023279264 A1 WO 2023279264A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- random access
- resource
- access resource
- resources
- network slice
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 141
- 238000003860 storage Methods 0.000 title claims abstract description 19
- 230000000977 initiatory effect Effects 0.000 claims abstract description 31
- 230000004044 response Effects 0.000 claims description 29
- 238000004590 computer program Methods 0.000 claims description 12
- 230000006870 function Effects 0.000 claims description 10
- 238000005516 engineering process Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000011664 signaling Effects 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 5
- 230000005236 sound signal Effects 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 101100533725 Mus musculus Smr3a gene Proteins 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000001186 cumulative effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 102100039292 Cbp/p300-interacting transactivator 1 Human genes 0.000 description 1
- 101000888413 Homo sapiens Cbp/p300-interacting transactivator 1 Proteins 0.000 description 1
- 101100274486 Mus musculus Cited2 gene Proteins 0.000 description 1
- 101150096622 Smr2 gene Proteins 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000009827 uniform distribution Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
- H04W74/006—Transmission of channel access control information in the downlink, i.e. towards the terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
- H04W74/0836—Random access procedures, e.g. with 4-step access with 2-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
- H04W74/0841—Random access procedures, e.g. with 4-step access with collision treatment
- H04W74/085—Random access procedures, e.g. with 4-step access with collision treatment collision avoidance
Definitions
- the present disclosure relates to the communication field, and in particular, to a random access method and device, and a storage medium.
- Network slicing can provide a complete end-to-end virtual network for specific users.
- 5G (5th generation mobile networks, 5th generation mobile communication technology) network slices can provide differentiated services for users with different service requirements.
- different service requirements include but are not limited to latency, reliability, capacity, isolation and other functions.
- the carrier network will not only serve the information consumption business characterized by Best Effort (best effort) transmission, but also meet the production control services with deterministic transmission as the communication demand, and provide services with different communication needs.
- a network slice can be composed of RAN (Radio Access Network, wireless access network) part and CN (Core Network, core network) part.
- the implementation of network slicing depends on the principle that the traffic of different slices is processed by different PDU (Protocol Data Unit, protocol data unit) sessions.
- the network can implement different network slices by scheduling and providing different L1 layer/L2 layer configurations.
- the random access process includes: contention random access and non-contention random access.
- contention random access the random access request resource (that is, the resource used by MSG1) is not dedicated to a UE (User Equipment, user equipment), that is, multiple users may initiate random access on the same time-frequency domain resource Request, the relationship between the base station and the UE needs to be established through the contention resolution process;
- non-contention random access the random access request resource is allocated by the base station to the specified UE, and the base station only needs to identify the random access resource dedicated to the UE , the UE can be uniquely identified.
- embodiments of the present disclosure provide a random access method and device, and a storage medium.
- a random access method is provided, the method is used for a user equipment UE, including:
- the resource configuration information is used to configure at least one of the following: public random access resources; designated random access resources corresponding to at least one network slice; two-step random access resources; four-step random access resources; Random access resources; four-step public random access resources; two-step designated random access resources; four-step designated random access resources.
- a random access method is provided, the method is used in a base station, including:
- the resource configuration information is used to configure at least one of the following: public random access resources; designated random access resources corresponding to at least one network slice; two-step random access resources; four-step random access resources; Random access resources; four-step public random access resources; two-step designated random access resources; four-step designated random access resources.
- a random access apparatus is provided, the apparatus is used for a user equipment UE, including:
- a receiving module configured to receive resource configuration information sent by the base station
- a first determining module configured to determine slice information of a target network slice that triggers random access
- a second determination module configured to determine a first random access resource based at least on the resource configuration information and the slice information
- a random access module configured to initiate random access based on the first random access resource
- the resource configuration information is used to configure at least one of the following: public random access resources; designated random access resources corresponding to at least one network slice; two-step random access resources; four-step random access resources; Random access resources; four-step public random access resources; two-step designated random access resources; four-step designated random access resources.
- a random access device is provided, the device is used in a base station, including:
- a sending module configured to send the resource configuration information to a user equipment UE
- the resource configuration information is used to configure at least one of the following: public random access resources; designated random access resources corresponding to at least one network slice; two-step random access resources; four-step random access resources; Random access resources; four-step public random access resources; two-step designated random access resources; four-step designated random access resources.
- a computer-readable storage medium stores a computer program, and the computer program is used to perform the random access described in any one of the UE side. method.
- a computer-readable storage medium stores a computer program, and the computer program is used to execute the random access method described in any one of the above-mentioned base stations .
- a random access device including:
- memory for storing processor-executable instructions
- the processor is configured to execute any one of the random access methods described above on the UE side.
- a random access device including:
- memory for storing processor-executable instructions
- the processor is configured to execute any one of the random access methods described above on the base station side.
- the first random access resource for initiating random access may be determined based on the slice information of the target network slice used for the user equipment to initiate random access and the resource configuration information sent by the network side, wherein the resource configuration information Can be used to configure at least one of the following: public random access resources; designated random access resources corresponding to the target network slice; two-step random access resources; four-step random access resources; two-step public random access resources; Four steps of public random access resources; two steps of designated random access resources; four steps of designated random access resources, so that the UE can determine the first random access resource among the resources configured in the resource configuration information, thereby quickly completing random access resources. input to obtain the desired slicing service.
- the user equipment may perform resource fallback, and re-initiate random access based on the second random access resource to which it falls back. This prevents the UE from initiating random access on the first random access resource until the maximum number of times of random access is reached, resulting in random access failure, and improves the success rate of UE random access.
- Fig. 1 is a schematic flowchart of a random access method according to an exemplary embodiment.
- Fig. 2 is a schematic flowchart of another random access method according to an exemplary embodiment.
- Fig. 3 is a schematic flowchart of another random access method according to an exemplary embodiment.
- Fig. 4 is a schematic flowchart of another random access method according to an exemplary embodiment.
- Fig. 5 is a block diagram of a random access device according to an exemplary embodiment.
- Fig. 6 is a block diagram showing another random access device according to an exemplary embodiment.
- Fig. 7 is a schematic structural diagram of a random access device according to an exemplary embodiment of the present disclosure.
- Fig. 8 is a schematic structural diagram of another random access device according to an exemplary embodiment of the present disclosure.
- first, second, third, etc. may be used in the present disclosure to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present disclosure, first information may also be called second information, and similarly, second information may also be called first information. Depending on the context, the word “if” as used herein may be interpreted as “at” or “when” or “in response to a determination.”
- a UE using a slice service may initiate random access based on a common RACH (Random Access Channel, random access channel) resource.
- RACH Random Access Channel
- a separate designated RACH resource corresponding to the network slice can be configured for each network slice or each network slice group.
- a two-step random access method was introduced, by merging Msg1 (message 1) and Msg3 (message 3) in the four-step random access method into MsgA (message A), and The two downlink channels Msg2 (message 2) and Msg4 (message 4) are merged into a new MsgB (message B), which simplifies the random access process and reduces delay and signaling overhead.
- UE User Equipment, user equipment
- the two-step random access method when the number of retransmissions of MsgA reaches a certain threshold, RA type switching will be triggered, and the four-step random access method will be switched to repeat the access attempt of Msg1.
- the threshold is configured by the base station in a system message.
- a fallback mechanism is also specified.
- the trigger condition of the fallback mechanism is when the preamble (preamble) in MsgA can be detected correctly, but the PUSCH (Physical Uplink Shared Channel, physical uplink shared channel) message demodulation fails, at this time the base station feeds back a fallbackRAR (fallback Random Access Response, fallback random response message), similar to msg2 of the four-step random access method, used to schedule Msg3 sent.
- a fallbackRAR Fallback Random Access Response, fallback random response message
- a suitable random access resource is selected to initiate random access.
- resource fallback how to implement resource fallback still needs to be further improved.
- the present disclosure provides the following random access scheme.
- the random access solution provided by the present disclosure will be introduced first from the user equipment side.
- FIG. 1 is a flowchart of a random access method according to an embodiment, and the method may include the following steps :
- step 101 resource configuration information sent by a base station is received.
- the resource configuration information is used to configure at least one of the following: public random access resources; designated random access resources corresponding to at least one network slice; two-step random access resources; four-step random access resources; two-step public random access resources; four-step public random access resources; two-step designated random access resources; four-step designated random access resources.
- the common random access resource is a random access resource shared among multiple UEs.
- the multiple UEs include UEs supporting the network slicing function and UEs not supporting the network slicing function. That is, the common random access resource is a random access resource shared by UEs supporting the network slicing function and UEs not supporting the network slicing function.
- the multiple UEs only include UEs that support the network slicing function. That is, the common random access resource is a random access resource shared among UEs supporting the network slicing function.
- the designated random access resources corresponding to at least one network slice refer to resources configured separately for each network slice and used for UEs under the network slice to initiate random access.
- the designated random access resources corresponding to network slice 1 include resource 1
- the designated random access resources corresponding to network slice 2 include resource 2, and so on.
- the designated random access resource corresponding to at least one network slice is a resource configured for each network slice group for UEs under each network slice in the network slice group to initiate random access.
- each network slice group may include two or more network slices.
- the two-step random access resources refer to the resources that can be used when the UE adopts the two-step random access method.
- the four-step random access resources refer to the resources that can be used by the UE when adopting the four-step random access manner.
- the two-step common random access resource refers to a combined resource that is shared among multiple UEs and can be used when the two-step random access method is adopted.
- the four-step common random access resource refers to a combined resource that is shared among multiple UEs and can be used when the four-step random access method is adopted.
- Two-step designated random access resources refer to random access resources provided to UEs in a certain network slice, and combined resources that can be used when the two-step random access method is adopted.
- the four-step designated random access resource refers to the random access resource provided to the UE of a certain network slice, and the combined resource that can be used when the four-step random access method is adopted.
- step 102 slice information of a target network slice that triggers random access is determined.
- the target network slice is a network slice used for the user equipment to initiate random access, that is, the target network slice may be a network slice where the user equipment is triggered to initiate random access.
- a first random access resource is determined based at least on the resource configuration information and the slice information.
- step 104 random access is initiated based on the first random access resource.
- the first random access resource configured in the resource configuration information may be determined to be the first network slice to initiate random access. Random access resources, reducing the possibility of collisions between UEs using a certain slice service and other UEs during random access, improving the success rate of UE random access, so that UE can quickly complete random access and obtain the desired slice Serve.
- the UE may receive resource configuration information in any of the following manners.
- the UE may receive a system message carrying resource configuration information delivered by the base station side.
- the UE may receive the PDCCH instruction carrying the resource configuration information.
- PDCCH Physical Downlink Control Channel
- the UE has established an RRC connection with the base station, that is, when the RRC message sent by the base station triggers the UE to initiate random access, the UE can receive the radio resource control RRC link carrying the resource configuration information. information.
- the resource configuration information is used to configure at least one of the following: public random access resources; designated random access resources corresponding to at least one network slice; two-step random access resources; four-step random access resources; two-step public random access resources; four-step public random access resources; two-step designated random access resources; four-step designated random access resources.
- the UE can obtain resource configuration information in various ways, which improves the success rate of random access and has high usability.
- the UE may determine slice information of a target network slice that triggers random access in any of the following manners, but not limited to.
- the UE can obtain the target sent by the NAS layer to the AS layer when the NAS (Non-Access Stratum, non-access) layer requests the AS (Access Stratum, access) layer to initiate an RRC connection.
- the slice information of the network slice can be obtained.
- the UE may receive a paging message carrying slice information of a target network slice delivered by the base station.
- the UE may receive the PDCCH command carrying the slice information of the target network slice delivered by the base station.
- the UE may determine that there is a logical channel with data to be transmitted, and determine the slice information associated with the logical channel according to the channel identifier of the logical channel , use the slice information as the slice information of the target network slice.
- the association between logical channel identifiers and slice information may include, but is not limited to, that different logical channel identifiers correspond to the same or different slice information.
- the number of target network slices that trigger random access may be one or more, which is not limited in the present disclosure.
- the designated random access resource corresponding to the target network slice with high priority can be determined as the first random access resource based on the priority of the target network slice .
- the priority sequence of different network slices may be determined by the NAS layer of the UE and provided to the AS layer.
- the slice information of the target network slice may include but not limited to at least one of the following: S-NSSAI (Single-Network Slice Selection Assistance Information, single network slice selection assistance information), SST (Slice Service Type, Slice service type), SD (Slice Differentiator, slice differential identifier), slice index, slice identifier (or slice group identifier), operator-defined access category (operator-defined access type).
- S-NSSAI Single-Network Slice Selection Assistance Information
- SST Single-Network Slice Selection Assistance Information
- SST Slice Service Type, Slice service type
- SD Slice Differentiator, slice differential identifier
- slice index slice identifier
- slice group identifier or slice group identifier
- operator-defined access category operator-defined access type
- the UE may determine the slice information of the target network slice in different ways, and then determine to initiate random access in the random access resources configured in the resource configuration information according to the slice information of the target network slice and the received resource configuration information.
- the input first random access resource. Reduce the possibility of UEs using the slice service colliding during the random access process, improve the success rate of UE random access, so that the UE can quickly complete random access and obtain the desired slice service.
- the UE may determine the first random access resource in any of the following manners.
- one item is selected as the first random access resource among the common random access resources and the designated random access resources corresponding to the target network slice.
- the base station if based on the resource configuration information and slice information of the target network slice, it is determined that the base station has at least configured the designated random access resource corresponding to the target network slice.
- the designated random access resource corresponding to the target network slice may be used as a candidate resource. Further, the candidate resource may be directly used as the first random access resource. That is, the UE may use the designated random access resource corresponding to the target network slice as the first random access resource to initiate random access.
- the base station if based on the resource configuration information and the slice information of the target network slice, it is determined that the base station has not configured the designated random access resources corresponding to the target network slice, but has configured public random access resources, then the The public random access resource is used as a candidate resource. Further, the candidate resource may be directly used as the first random access resource.
- the base station based on the resource configuration information and the slice information, it is determined that the base station has configured at least a designated random access resource corresponding to the target network slice and the common random access resource, and the UE In combination with the signal quality, it may be further determined which resource is selected as the candidate resource, and then the candidate resource is directly used as the first random access resource for initiating random access.
- the UE may measure the signal quality, and if the signal quality is greater than the first threshold value, use the designated random access resource corresponding to the target network slice as a candidate resource. Furthermore, the candidate resource is used as the first random access resource.
- the UE measures the signal quality of the channel, and in the case that the signal quality is less than or equal to the first threshold, the common random access resource may be used as a candidate resource. Furthermore, the candidate resource is used as the first random access resource.
- the first threshold value may be used by the UE to determine whether the designated random access resource corresponding to the target network slice can be selected as the first random access resource to initiate random access.
- the first threshold can be configured by the base station side.
- the configuration may be configured by the base station through a broadcasted first system message.
- the UE determines the first threshold value based on the received first system message for configuring the first threshold value corresponding to at least one network slice, and the first threshold value may be configured by the base station and the target network slice The corresponding first threshold value, or the first threshold value corresponding to the network slice group where the target network slice configured by the base station is located.
- the base station may configure the same or different first thresholds for each network slice through the first system message, or the base station may configure the same or different first thresholds for each network slice group through the first system message value, where each network slice group includes two or more network slices.
- the base station may configure the corresponding first threshold for network slice 1 as threshold 1 through a system message, configure the corresponding first threshold for network slice 2 as threshold 2, and so on, where threshold 1 and threshold 2 may be same or different.
- the target network slice is network slice 1
- the corresponding first threshold is threshold 1.
- the base station may configure the corresponding first threshold value for network slice group 1 as threshold value 3 through system messages, and configure the corresponding first threshold value 2 for network slice group 2 as threshold value 4, etc., wherein network slice group 1 includes network slice 1 and network slice 2, and network slice group 2 includes network slice 3 and network slice 4.
- the target network slice is network slice 1, and the corresponding first threshold is threshold 3.
- the base station may configure the first threshold corresponding to at least one network slice for the UE through dedicated signaling, where the dedicated signaling may be an RRC (Radio Resource Control, radio resource control) message. That is, the base station may configure the first threshold corresponding to at least one network slice for the UE through the first RRC message.
- RRC Radio Resource Control, radio resource control
- the UE may use the first threshold configured in the RRC message as the standard.
- the UE can select a designated random access resource or a public random access resource corresponding to the target network slice to initiate random access, which is easy to implement and has high usability.
- one of the two-step random access resources and the four-step random access resources is selected as the first random access resource.
- the UE directly uses the two-step random access resources or four-step random access resources configured by the base station As the candidate resource, then the candidate resource may be directly used as the first random access resource.
- the base station configures both two-step random access resources and four-step random access resources
- the UE may configure the two-step random access resources after determining that the signal quality is greater than the second threshold resource as an alternative resource.
- the candidate resource is directly used as the first random access resource.
- the base station configures both two-step random access resources and four-step random access resources, and the UE may configure the four-step random access resources when it determines that the signal quality is less than or equal to the second threshold Random access resources are used as alternative resources. Furthermore, the candidate resource is directly used as the first random access resource.
- the second threshold value may include a second threshold value #1, which is specifically used for the UE to determine whether the two-step common random access resource can be selected as the first random access resource to initiate random access.
- the second threshold value #1 can be configured by the base station through the second system message or the second RRC message.
- the second threshold value #1 can reuse the reference signal received power threshold in the related art, that is, legacy( Legacy) RSRP (Reference Signal Receiving Power, reference signal receiving power) threshold, or other values configured by the base station to be different from the legacy RSRP threshold.
- the base station configures two-step common random access resources, four-step common random access resources and four-step designated random access resources, if the signal quality is greater than the second threshold #1, the UE Two-step public random access resources may be selected to initiate random access.
- the second threshold may include a second threshold #2, which is used for the UE to determine whether the two-step designated random access resource can be selected as the first random access resource to initiate random access.
- the second threshold #2 can also be configured by the base station side through the second system message or the second RRC message, and the legacyRSRP threshold can be reused, or configured by the base station for each network slice or each network slice group, or multiplexed
- the first threshold value is used, which is not limited in the present disclosure.
- the second threshold #2 may be the same as or different from the second threshold #1, which is also not limited in the present disclosure.
- the base station may In #2, select the two-step designated random access resource as the first random access resource.
- the base station may configure the second threshold through a broadcasted second system message, including but not limited to at least one of the second threshold #1 and the second threshold #2 item.
- the second system message may be the same as or different from the first system message, which is not limited in the present disclosure.
- the base station may configure the second threshold for the UE through dedicated signaling, including but not limited to at least one of the second threshold #1 and the second threshold #2, Wherein, the dedicated signaling may be the second RRC message.
- the second RRC message may be the same as or different from the first RRC message, which is not limited in the present disclosure.
- the UE may use the second threshold value configured in the RRC message as the standard.
- the UE can select two-step random access resources or four-step random access resources to initiate random access based on the second threshold configured by the base station and the measured signal quality, which is easy to implement and has high usability.
- the candidate resources include the public random access resource, the designated random access resource corresponding to the target network slice, and the two-step random access resource.
- the candidate resource is directly used as the first random access resource.
- the above two manners may also exist in combination, that is, the third manner described below.
- the order of combination is not distinguished. That is, after the candidate resources are determined according to the first method above, the first random access resource is determined among the candidate resources based on the second method. Alternatively, after the candidate resources are determined according to the above-mentioned second method, among the candidate resources, the first random access resource is determined based on the first method, and the specific method is as follows:
- the first random access resource may be determined after combining the foregoing first manner and the second manner.
- the public random access resource or the designated random access resource corresponding to the target network slice may be selected as a candidate resource according to the first method above, and then combined with the second method above, in Among the candidate resources, a two-step random access resource or a four-step random access resource is selected, and finally a combined resource is selected as the first random access resource.
- the UE directly uses the two-step public random access resources as the first random access resource. Access resources.
- the UE after using the public random access resource as a candidate resource, if it is determined based on the resource configuration information that the base station has only configured four-step public random access resources, then the UE directly uses the four-step public random access resource as the first random access resource. into resources.
- the UE can use the channel signal quality greater than In the case of the second threshold #1 above, the two-step common random access resource is selected as the first random access resource. In the case that the signal quality of the channel is less than or equal to the second threshold #1, the four-step common random access resource is selected as the first random access resource.
- the second threshold #1 is used for the UE to judge whether the two-step common random access resource can be selected as the first random access resource to initiate random access.
- the second threshold #1 can also be configured by the base station side through the second system message or the second RRC message, specifically, the legacy RSRP threshold can be multiplexed, or configured by the base station as a value different from the legacy RSRP threshold.
- the designated random access resource corresponding to the target network slice can be determined as a candidate resource according to the above-mentioned first method. Further, in combination with the above-mentioned second method, among the candidate resources, a two-step random access resource is selected. access resources or four-step random access resources, finally two-step designated random access resources or the four-step designated random access resources may be used as the first random access resources.
- the UE after using the random access resource corresponding to the target network slice as a candidate resource, if it is determined based on the resource configuration information that the base station only configures two-step designated random access resources or four-step designated random access resources, then the UE directly The two-step designated random access resource or the four-step designated random access resource may be used as the first random access resource.
- the UE can When the signal quality is greater than the second threshold #2, the two-step designated random access resource is used as the first random access resource. If the signal quality is less than or equal to the second threshold #2, the four-step designated random access resource is used as the first random access resource.
- the second threshold value #2 is used for the UE to judge whether the two-step designated random access resource can be selected as the first random access resource to initiate random access.
- the second threshold value can also be configured by the base station side through the second system message or the second RRC message.
- the legacyRSRP threshold can be multiplexed, or configured by the base station for each network slice or each network slice group, or multiplexed
- the first threshold is not limited in the present disclosure.
- the second threshold #2 may be the same as or different from the second threshold #1, which is also not limited in the present disclosure.
- the two-step random access resource can be selected as a candidate resource according to the second method above, and then combined with the first method above, the public random access resource or the target network can be selected among the candidate resources
- the designated random access resource corresponding to the slice finally selects the two-step public random access resource or the two-step designated random access resource as the first random access resource as the first random access resource.
- the UE may directly select the two-step common random access resources as the first random access resources.
- the two-step designated random access resource is directly selected as the first random access resource.
- the UE preferentially selects the two-step designated random access resources as the first random access resources.
- the UE selects two-step designated random access resources as the channel quality when the channel quality is greater than the second threshold #2 A first random access resource. Otherwise, select a two-step common random access resource as the first random access resource.
- the second threshold #2 is used for the UE to judge whether the two-step designated random access resource can be selected as the first random access resource to initiate random access.
- the second threshold value #2 can be configured by the base station side through the second system message or the second RRC message, and the second threshold value can be multiplexed with the legacy RSRP threshold value, or the base station can configure each network slice or each network slice group configuration, or the first threshold may also be multiplexed, which is not limited in the present disclosure.
- the four-step random access resource can be selected as a candidate resource according to the second method above, and then combined with the first method above, the public random access resource or the target network can be selected among the candidate resources
- the designated random access resource corresponding to the slice finally selects the four-step common random access resource or the four-step designated random access resource as the first random access resource as the first random access resource.
- the UE may directly select the four-step common random access resource as the first random access resource.
- the four-step designated random access resource is directly selected as the first random access resource.
- the UE selects four-step designated random access resources as the first channel quality when the channel quality is greater than the first threshold Random access to resources.
- the four-step common random access resource is selected as the first random access resource.
- other values different from the first threshold value may also be configured, which are not limited in the present disclosure.
- the first random access resource for initiating random access may be determined among at least one random access resource configured in the resource configuration information, so as to quickly complete the random access and obtain the expected Slicing service with high availability.
- an embodiment of the present disclosure provides a random access method, which can be used for a user equipment UE.
- FIG. 2 is a flowchart of a random access method according to an embodiment. Figure, the method may include the following steps:
- step 201 resource configuration information sent by a base station is received.
- step 202 slice information of a target network slice that triggers random access is determined.
- a first random access resource is determined based at least on the resource configuration information and the slice information.
- step 204 random access is initiated based on the first random access resource.
- step 205 resource rollback is not performed in response to meeting the preset rollback condition.
- the preset fallback condition is met, and no resource fallback is performed.
- the preset fallback condition is met, and resource fallback is not performed.
- the preset fallback condition includes any of the following: the number of failures to initiate random access based on the first random access resource reaches the first fallback times threshold; the first backoff timer expires; or, receiving A random access resource fallback instruction message corresponding to the target network slice.
- an embodiment of the present disclosure provides a random access method, which can be used for a user equipment UE.
- FIG. 3 is a flowchart of a random access method according to an embodiment. Figure, the method may include the following steps:
- step 301 resource configuration information sent by a base station is received.
- step 302 slice information of a target network slice that triggers random access is determined.
- a first random access resource is determined based at least on the resource configuration information and the slice information.
- step 304 random access is initiated based on the first random access resource.
- step 305 in response to meeting the preset fallback condition, determine the second random access resource to which fallback is required.
- the preset fallback condition includes any of the following: the number of failures to initiate random access based on the first random access resource reaches the first fallback times threshold; the first backoff timer expires; or, receiving A random access resource fallback instruction message corresponding to the target network slice.
- step 306 random access is re-initiated based on the second random access resource.
- the user equipment may perform resource fallback, and re-initiate random access based on the second random access resource to which it falls back. Prevent UE from always initiating random access on the first random access resource until the maximum number of random accesses is reached, resulting in random access failure, and improve the success rate of UE random access.
- the UE may respond to determining that the preset fallback condition is satisfied, and may perform processing in any of the following ways:
- the first method does not perform resource fallback.
- the second method is to perform resource rollback.
- the UE may determine the random access resource to which it needs to fall back, and re-initiate random access based on the random access resource to which it falls back.
- the random access resource that initiates the random access is different from the random access resource that needs to fall back to.
- the UE initiates random access based on the first random access resource, and in response to determining that the preset fallback condition is met, the UE re-initiates random access based on the second random access resource to which it fell back.
- the second random access resource is different from the first random access resource.
- the UE when the preset fallback condition is satisfied, the UE may not perform resource fallback or re-initiate random access based on the second random access resource that was fallback to, so as to avoid reusing the first random access resource
- the UE may not perform the fallback again at this time, or still perform the fallback , at this time, it is necessary to determine the third random access resource to fall back to, and initiate random access again based on the third random access resource.
- the process of determining the third random access resource is similar to the process of determining the second random access resource, and will not be repeated here. Wherein, the third random access resource is different from the second random access resource.
- the above two situations may be combined, that is, no resource fallback is performed in response to the preset fallback condition being satisfied when the random access is reinitiated based on the second random access resource.
- the process of determining the third random access resource is similar to the process of determining the second random access resource, which will be introduced uniformly in the following embodiments and will not be introduced here.
- the preset backoff condition may include that the number of failures to initiate random access based on the first random access resource reaches a first backoff times threshold.
- the first backoff times threshold may be used to indicate the cumulative number of random access failures that are allowed to be initiated based on the first random access resource before backoff to the second random access resource for random access.
- the UE fails to initiate random access based on the first random access resource for N1 times, and the UE determines that the preset backoff condition is met, and can fallback to the second random access resource Re-initiate random access.
- the first backoff times threshold may be configured by the base station.
- the configuration may be performed by the base station through a broadcasted third system message.
- the first backoff times threshold may reuse the backoff times threshold in related mechanisms, that is, the legacy threshold. Or it may be configured by the base station for each network slice or each network slice group through the third system message.
- the configuration may be performed by the base station through a third RRC message.
- the first rollback times threshold may reuse the rollback times threshold in the related mechanism, that is, the legacy threshold. Or it may be configured by the base station for each network slice or each network slice group through the third RRC message.
- the preset backoff condition may include: expiration of the first backoff timer.
- the first back-off timer is used to indicate the accumulative length of time allowed to initiate random access based on the first random access resource before backing off to the second random access resource to perform random access.
- the UE determines that the preset backoff condition is met, and may fallback to the second random access Random access is re-initiated on the resource.
- the first backoff timer may be configured by the base station.
- the configuration may be performed by the base station through a broadcasted fourth system message.
- the configuration may be performed by the base station through a fourth RRC message.
- the preset fallback condition may include: receiving a random access resource fallback indication message corresponding to the target network slice.
- the UE may determine that the preset fallback condition is met, so as to fall back to the second random access resource and start again. Initiate random access.
- preset rollback condition may include any one or a combination of multiple items above, and other possible preset rollback conditions shall fall within the protection scope of the present disclosure.
- the UE can perform resource fallback on the basis of meeting the above preset fallback conditions, and re-initiate random access on the second random access resource to which it falls back, which improves the success rate of random access .
- the random access backoff indication message may be used to configure at least one of the second backoff times threshold and the second backoff timer.
- the second back-off times threshold is used to indicate that before the random access is initiated from the second random access resource to the first random access resource, it is allowed to use the second random access resource
- the second backoff timer is used to indicate that before starting random access from the second random access resource to the first random access resource, it is allowed to use the second random access resource based on the second random access resource The accumulative duration of random access initiated by the access resource.
- the threshold for the second number of back-off times is N2
- the number of times the UE re-initiates random access from the first random access resource to the second random access resource reaches N2 times
- the total number of times the current random access is initiated is less than
- the preamble TransMax the maximum number of times of random access
- the UE may preferentially fall back to resources in the designated random access resource pool corresponding to the target network slice. Until the preset fallback condition is met again, the UE performs resource fallback again. Or the UE falls back to resources in the designated random access resource pool corresponding to the target network slice, and the total number of random access initiations reaches the maximum number of random accesses, and the UE can report a random access failure message to the upper layers.
- the UE may fall back to the first random access resource to initiate random access. That is, the UE may preferentially select resources in the designated random access resource pool corresponding to the target network slice to initiate random access again. Until the preset fallback condition is met again, the UE performs resource fallback again. Or the UE falls back to resources in the designated random access resource pool corresponding to the target network slice, and the total number of random access initiations reaches the maximum number of random accesses, and the UE can report a random access failure message to the upper layers.
- the UE after falling back to the second access resource, the UE keeps initiating random access on the second random access resource until the maximum number of times of random access is reached, which also leads to random access failure. After at least one collision occurs in the second random access resource, the UE may fall back to the first random access resource to initiate random access, so as to improve the success rate of UE random access.
- the UE if the second backoff times threshold is not configured in the random access resource backoff indication message, and the second backoff timer is not configured, then the UE falls back from the first random access resource to the second After the random access resource fails to perform random access once, and the total number of random access initiations currently does not reach the maximum number of random access times, the UE may fall back to the first random access resource and initiate random access again.
- the first random access resource may include resources in a designated random access resource pool corresponding to the target network slice.
- the UE after falling back to the second access resource, the UE keeps initiating random access on the second random access resource until the maximum number of times of random access is reached, which also leads to random access failure. After a collision occurs on the second random access resource, the UE may fall back to the first random access resource to initiate random access, so as to improve the success rate of UE random access.
- the random access resource fallback indication message may carry a fallbackFactor (fallback factor).
- the fallbackFactor may be a fallback probability value, so that the UE implements probability fallback.
- the UE may generate a random number, so as to determine Whether resource fallback is required.
- random access may be re-initiated based on the second random access resource to which the fallback is made.
- the UE may randomly generate, but is not limited to, a random number that satisfies a uniform distribution, and the random number may be, but not limited to, within a range of [0, 1]. If the generated random number is less than the fallback probability value, the UE performs random access resource fallback, and if the generated random number is greater than or equal to the fallback probability value, the random access resource fallback may not be performed .
- the UE may generate random numbers satisfying other distributions. If the generated random number is greater than the fallback probability value, the UE performs random access resource fallback. If the generated random number is less than or equal to the fallback probability value, the UE performs random access resource fallback. Probability value, the UE may not perform resource fallback.
- the UE may determine whether to perform resource fallback based on the fallback probability value carried in the random access resource fallback indication message and the generated random number, and then re-initiate the random access. This prevents the UE from always initiating random access on the first random access resource until the maximum number of random access times is reached, resulting in random access failure, achieving the purpose of UE performing probability fallback and improving the success rate of UE random access.
- the fallbackFactor is not carried in the random access resource fallback indication message, then all UEs that receive the random access resource fallback indication message perform resource fallback.
- the base station may carry the random access resource fallback indication message corresponding to the target network slice in the random access response message.
- the base station may carry the random access resource fallback indication message corresponding to the target network slice in the fifth RRC message.
- the UE may determine the second random access resource in a corresponding manner for any of the following situations.
- the UE can initiate a random access on the two-step designated random access resource and satisfy at least one of the above preset fallback conditions item, and based on the resource configuration information and the slice information, if it is determined that the base station has configured the four-step designated random access resources, choose to fall back to the four-step designated random access resources and re-initiate random access . That is, the four-step designated random access resource is used as the second random access resource.
- the UE can initiate random access on the two-step designated random access resource and satisfy at least one of the above preset fallback conditions item, and based on the resource configuration information and the slice information, if it is determined that the base station has configured the common random access resource, based on the resource configuration information and signal quality.
- a second random access resource is determined. That is, a two-step common random access resource or a four-step common random access resource is selected as the second random access resource.
- the UE can initiate random access on the two-step designated random access resource and satisfy at least one of the above preset fallback conditions item, and based on the resource configuration information and the slice information, if it is determined that the base station has configured the public random access resources, based on the first indication information sent by the base station, first determine that it is possible to fall back to the public random access resource After the random access is re-initiated based on the resource configuration information and signal quality.
- a second random access resource is determined. That is, a two-step common random access resource or a four-step common random access resource is selected as the second random access resource.
- the UE may use the two-step common random access resources as the second random access resources .
- the third threshold value is used for the UE to judge whether it can fall back to the two-step common random access resources and re-initiate the random access.
- the base station may configure the third threshold corresponding to at least one network slice through the fifth system message or the sixth RRC message.
- the third threshold may reuse the legacy RSRP threshold, or be configured separately by the base station.
- the base station may configure the same or different third thresholds for each network slice, or the base station may configure the same or different third thresholds for each network slice group.
- the base station configures two-step common random access resources and four-step common random access resources, but the signal quality is less than or equal to the third threshold, then the UE can set the four-step designated random access resource as the second random access resource.
- the UE may not fall back.
- the first random access resource belongs to the public random access resource, that is, when the UE initiates the random access on the public random access resource and meets the preset fallback condition, the fallback may not be performed.
- the base station may be determined that the base station has configured the four-step common random access resource, and the four-step common random access resource is used as the second random access resource .
- the designated random access resource corresponding to the target network slice may be .
- the second random access resource is determined based on the resource configuration information and signal quality in the designated random access resource corresponding to the target network slice.
- the four-step designated random access resource may be directly used as the second random access resource. resource.
- the four-step designated random access resource may be configured as a four-step designated random access resource.
- the input resource is used as the second random access resource.
- the fourth threshold value is used for the UE to judge whether it can fall back to the designated random access resource to re-initiate the random access.
- the fourth threshold can be configured by the base station through the sixth system message or the seventh RRC message, and the fourth threshold can also be multiplexed with the legacy RSRP threshold, or configured separately by the base station.
- the base station may configure the same or different fourth thresholds for each network slice, or the base station may configure the same or different fourth thresholds for each network slice group.
- the UE may determine the second random access resource based on any one or a combination of the above items, or re-initiate the random access based on the second random access resource and meet the preset fallback condition again
- the third random access resource is determined without fallback or based on a similar method, thereby preventing the UE from initiating random access on the same random access resource until the maximum number of random accesses is reached, resulting in random access failure and improving UE random access. Access success rate.
- the UE can base the threshold values configured by the RRC message on the basis.
- FIG. 4 is a flowchart of a random access method according to an embodiment, and the method may include the following steps:
- step 401 the resource configuration information is sent to a user equipment UE.
- the resource configuration information is used to configure at least one of the following: public random access resources; designated random access resources corresponding to at least one network slice; two-step random access resources; four-step random access resources; two-step public random access resources; four-step public random access resources; two-step designated random access resources; four-step designated random access resources.
- the base station may configure at least one resource for the UE through the resource configuration information, so that the UE determines the first random access resource to initiate random access, which has high availability.
- the base station may configure the first threshold corresponding to at least one network slice through a system message or an RRC message.
- the first threshold value may be used by the UE to determine whether the designated random access resource corresponding to the target network slice can be selected as the first random access resource to initiate random access.
- the base station may configure the first threshold through a first system message or a first RRC message.
- the base station may configure the second threshold corresponding to at least one network slice through a system message or an RRC message.
- the second threshold value may be used for the UE to judge whether the two-step random access resource can be selected as the first random access resource to initiate random access.
- the base station may configure the second threshold through a second system message or a second RRC message.
- the second threshold may include a second threshold #1, which is specifically used for the UE to determine whether the two-step common random access resource can be selected.
- the second threshold #1 can be configured by the base station through the second system message or the second RRC message.
- the second threshold #1 can be multiplexed with the reference signal received power threshold in the related art, that is, legacy RSRP threshold.
- the second threshold may include a second threshold #2, which is used for the UE to determine whether the two-step designated random access resource can be selected as the first random access resource to initiate random access.
- the second threshold #2 can also be configured by the base station side through the second system message or the second RRC message, and the legacyRSRP threshold can be reused, or configured by the base station for each network slice or each network slice group, or multiplexed
- the first threshold value is used, which is not limited in the present disclosure.
- the second threshold #2 may be the same as or different from the second threshold #1, which is also not limited in the present disclosure.
- the base station may configure the first backoff times threshold corresponding to at least one network slice through a system message or an RRC message.
- the first backoff times threshold may be used to indicate the cumulative number of random access failures that are allowed to be initiated based on the first random access resource before backoff to the second random access resource for random access.
- the base station may configure the first backoff times threshold through a third system message or a third RRC message.
- the first backoff times threshold may be multiplexed with the legacy threshold, or configured additionally by the base station.
- the base station may configure the first backoff timer through a system message or an RRC message.
- the first back-off timer is used to indicate the accumulative length of time allowed to initiate random access based on the first random access resource before backing off to the second random access resource to perform random access.
- the base station may configure the first backoff timer through a fourth system message or a fourth RRC message.
- the base station may use a random access response message or a fifth RRC message to carry the random access resource fallback indication corresponding to the target network slice.
- the base station may use the first indication information to indicate that the UE can fall back to common random access resources and re-initiate random access.
- the base station may use the second indication information to instruct the UE to fall back to the designated random access resource corresponding to the target network slice and re-initiate the random access.
- the base station may configure the third threshold through a system message or an RRC message.
- the third threshold value is used for the UE to judge whether it can fall back to the two-step common random access resources and re-initiate the random access.
- the base station may configure the third threshold through the fifth system message or the sixth RRC message.
- the third threshold may reuse the legacy RSRP threshold, or be configured separately by the base station.
- the base station may configure the fourth threshold through a system message or an RRC message.
- the fourth threshold value is used for the UE to judge whether it can fall back to the designated random access resource to re-initiate the random access.
- the base station may configure the third threshold through the sixth system message or the seventh RRC message.
- the fourth threshold may reuse the legacy RSRP threshold, or be configured by the base station for each network slice or each network slice group.
- the base station configures four-step designated random access resources and two-step public random access resources for the UE through resource configuration information.
- four-step designated random access resources are always selected to initiate random access. If the preset fallback condition is satisfied, do not fall back or fall back to the common random access resource.
- Resource fallback includes the following two situations:
- Solution 2 Go back to step 4 and designate random access resources to re-initiate random access.
- Solution 3 In the case that the signal quality is greater than the fourth threshold, fall back to step 4 to designate random access resources and re-initiate random access, otherwise no fallback.
- Solution 4 If it is determined based on the second indication information sent by the base station that it is possible to fall back to the designated random access resource corresponding to the target network slice, then fall back to step 4 to designate the random access resource and re-initiate random access, otherwise no fallback .
- Solution 5 If it is determined based on the second indication information sent by the base station that the specified random access resource corresponding to the target network slice can be rolled back, and the signal quality is greater than the fourth threshold value, fall back to the four-step specified random access resource Re-initiate random access, otherwise no rollback.
- the base station configures two-step designated random access resources and two-step common random access resources for the UE through resource configuration information.
- two-step designated random access resources are always selected to initiate random access. If the preset fallback condition is satisfied, do not fall back or fall back to the common random access resource.
- two-step designated random access resources or two-step public random access resources can be selected to initiate random access in the above manner.
- resource fallback in general, the two-step designated random access resource can fall back to the two-step public random access resource.
- only the random access initiated by the two-step designated random access resource meets the preset fallback condition.
- Solution 2 Falling back to two steps and specifying random access resources to re-initiate random access.
- Solution 3 If it is determined based on the first indication information sent by the base station that it is possible to fall back to the common random access resource, fall back to the two-step designated random access resource and re-initiate the random access, otherwise no fallback.
- the base station configures two-step designated random access resources, two-step public random access resources, and four-step public random access resources for the UE through resource configuration information.
- four-step designated random access resources are always selected to initiate random access.
- the preset fallback condition is met, the four-step designated random access resource is rolled back to the four-step common random access resource.
- any one of two-step designated random access resources, two-step public random access resources, or four-step public random access resources can be selected to initiate random access in the above manner.
- resource fallback can include initiating random access on two-step designated random access resources to meet preset fallback conditions:
- Solution 2 Fall back to the four-step public random access resources and re-initiate random access.
- Solution 3 If the signal quality is greater than the third threshold, fall back to the two-step public random access resource and re-initiate the random access, otherwise fall back to the four-step public random access resource to re-initiate the random access.
- Solution 4 If it is determined based on the first indication information sent by the base station that it is possible to fall back to the public random access resource, then fall back to the two-step public random access resource or the four-step public random access resource and re-initiate the random access, otherwise No fallback.
- the random access may be reinitiated by falling back to the two-step common random access resource, otherwise, the random access may be reinitiated by falling back to the four-step common random access resource.
- Solution 1 Fall back to the four-step public random access resources and re-initiate random access.
- Solution 2 Go back to step 4 and designate random access resources to re-initiate random access.
- Solution 3 In the case that the signal quality is greater than the fourth threshold, fall back to step 4 to designate random access resources and re-initiate random access, otherwise no fallback.
- Solution 4 If it is determined based on the second indication information sent by the base station that the designated random access resource corresponding to the target network slice can be returned to, then fall back to step 4 to designate the random access resource to re-initiate random access, otherwise fall back to The four-step public random access resource re-initiates random access.
- the base station configures four-step designated random access resources, two-step public random access resources, and four-step public random access resources for the UE through resource configuration information.
- the base station configures four-step designated random access resources, two-step public random access resources, and four-step public random access resources for the UE through resource configuration information.
- any one may be selected to initiate random access.
- the fallback of resources includes the following three situations:
- Solution 2 Go back to step 4 and designate random access resources to re-initiate random access.
- Solution 3 Fall back to the two-step public random access resources and re-initiate random access.
- Solution 4 If it is determined based on the first indication information sent by the base station that it is possible to fall back to the public random access resource, then fall back to the two-step public random access resource and re-initiate the random access, otherwise no fallback.
- Solution 2 Fall back to the two-step public random access resources and re-initiate random access.
- Solution 3 When the signal quality is greater than the third threshold, fall back to the two-step public access resource and re-initiate random access, otherwise no fallback.
- Solution 4 If it is determined based on the first indication information sent by the base station that it is possible to fall back to the public random access resource, then fall back to the two-step public random access resource and re-initiate the random access, otherwise no fallback.
- Solution 5 If it is determined based on the first indication information sent by the base station that it is possible to fall back to the public random access resource, and the signal quality is greater than the third threshold, fall back to the two-step public random access resource and re-initiate the random access , otherwise no fallback.
- Solution 2 Go back to step 4 and designate random access resources to re-initiate random access.
- Solution 3 When the signal quality is greater than the fourth threshold, fall back to step 4 to specify access resources and re-initiate random access, otherwise no fallback.
- Solution 4 If it is determined based on the second indication information sent by the base station that the specified random access resource corresponding to the target network slice can be rolled back, and the signal quality is greater than the fourth threshold value, then fall back to step 4 to specify the random access resource Re-initiate random access, otherwise no rollback.
- Solution 5 If it is determined that the specified random access resource corresponding to the target network slice can be rolled back based on the second indication information sent by the base station, then roll back to the four-step specified random access resource and re-initiate random access, otherwise no rollback .
- the present disclosure also provides embodiments of apparatuses for implementing application functions.
- Fig. 5 shows a random access device according to an exemplary embodiment, the device is used for user equipment UE, including:
- the receiving module 501 is configured to receive resource configuration information sent by the base station;
- the first determining module 502 is configured to determine slice information of a target network slice that triggers random access
- the second determining module 503 is configured to determine a first random access resource based at least on the resource configuration information and the slice information;
- a random access module 504 configured to initiate random access based on the first random access resource
- the resource configuration information is used to configure at least one of the following: public random access resources; designated random access resources corresponding to at least one network slice; two-step random access resources; four-step random access resources; Random access resources; four-step public random access resources; two-step designated random access resources; four-step designated random access resources.
- FIG. 6 shows a random access device according to an exemplary embodiment, the device is used in a base station, and includes:
- the sending module 601 is configured to send the resource configuration information to the user equipment UE;
- the resource configuration information is used to configure at least one of the following: public random access resources; designated random access resources corresponding to at least one network slice; two-step random access resources; four-step random access resources; Random access resources; four-step public random access resources; two-step designated random access resources; four-step designated random access resources.
- the device embodiment since it basically corresponds to the method embodiment, for related parts, please refer to the part description of the method embodiment.
- the device embodiments described above are only illustrative, and the above-mentioned units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in a place, or can also be distributed to multiple network elements. Part or all of the modules can be selected according to actual needs to achieve the purpose of the disclosed solution. It can be understood and implemented by those skilled in the art without creative effort.
- the present disclosure also provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and the computer program is used to execute any one of the above random access methods on the UE side.
- the present disclosure also provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program is used to execute any one of the above random access methods on the base station side.
- the present disclosure also provides a random access device, including:
- memory for storing processor-executable instructions
- the processor is configured to execute any one of the above random access methods on the UE side.
- Fig. 7 is a block diagram of an electronic device 700 according to an exemplary embodiment.
- the electronic device 700 may be user equipment such as a mobile phone, a tablet computer, an e-book reader, a multimedia player, a wearable device, a vehicle-mounted user equipment, an ipad, and a smart TV.
- electronic device 700 may include one or more of the following components: processing component 702, memory 704, power supply component 706, multimedia component 708, audio component 710, input/output (I/O) interface 712, sensor component 716, and communication component 718 .
- the processing component 702 generally controls the overall operations of the electronic device 700, such as operations associated with display, phone calls, data random access, camera operations, and recording operations.
- the processing component 702 may include one or more processors 720 to execute instructions to complete all or part of the steps of the above random access method.
- processing component 702 may include one or more modules that facilitate interaction between processing component 702 and other components.
- processing component 702 may include a multimedia module to facilitate interaction between multimedia component 708 and processing component 702 .
- the processing component 702 may read executable instructions from the memory, so as to implement the steps of a random access method provided in the foregoing embodiments.
- the memory 704 is configured to store various types of data to support operations at the electronic device 700 . Examples of such data include instructions for any application or method operating on the electronic device 700, contact data, phonebook data, messages, pictures, videos, and the like.
- the memory 704 can be realized by any type of volatile or non-volatile storage device or their combination, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read-only memory
- EPROM erasable Programmable Read Only Memory
- PROM Programmable Read Only Memory
- ROM Read Only Memory
- Magnetic Memory Flash Memory
- Magnetic or Optical Disk Magnetic Disk
- the power supply component 706 provides power to various components of the electronic device 700 .
- Power components 706 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for electronic device 700 .
- the multimedia component 708 includes a display screen providing an output interface between the electronic device 700 and the user.
- the multimedia component 708 includes a front camera and/or a rear camera.
- the front camera and/or the rear camera can receive external multimedia data.
- Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
- the audio component 710 is configured to output and/or input audio signals.
- the audio component 710 includes a microphone (MIC), which is configured to receive external audio signals when the electronic device 700 is in operation modes, such as call mode, recording mode and voice recognition mode. Received audio signals may be further stored in memory 704 or sent via communication component 718 .
- the audio component 710 also includes a speaker for outputting audio signals.
- the I/O interface 712 provides an interface between the processing component 702 and a peripheral interface module, which may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.
- Sensor assembly 716 includes one or more sensors for providing various aspects of status assessment for electronic device 700 .
- the sensor component 716 can detect the open/closed state of the electronic device 700, the relative positioning of components, such as the display and the keypad of the electronic device 700, the sensor component 716 can also detect the electronic device 700 or a The position of components changes, the presence or absence of user contact with the electronic device 700 , the orientation or acceleration/deceleration of the electronic device 700 and the temperature change of the electronic device 700 .
- Sensor assembly 716 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
- Sensor assembly 716 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor component 716 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
- the communication component 718 is configured as a component that facilitates wired or wireless communication between the electronic device 700 and other devices.
- the electronic device 700 can access a wireless network based on component standards, such as Wi-Fi, 2G, 3G, 4G, 5G or 6G, or a combination thereof.
- the communication component 718 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
- the communication component 718 also includes a near field component (NFC) module to facilitate short-range communication.
- the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wide Band (UWB) technology, Bluetooth (BT) technology and other technologies.
- RFID Radio Frequency Identification
- IrDA Infrared Data Association
- UWB Ultra Wide Band
- Bluetooth Bluetooth
- electronic device 700 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable Implemented by a programmable gate array (FPGA), a controller, a microcontroller, a microprocessor or other electronic components, and is used to execute any of the random access methods described above on the user equipment side.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable Implemented by a programmable gate array (FPGA), a controller, a microcontroller, a microprocessor or other electronic components, and is used to execute any of the random access methods described above on the user equipment side.
- non-transitory machine-readable storage medium including instructions, such as the memory 704 including instructions, which can be executed by the processor 720 of the electronic device 700 to implement the above random access method.
- the non-transitory computer readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
- the present disclosure also provides a random access device, including:
- memory for storing processor-executable instructions
- the processor is configured to execute any random access method described above on the base station side.
- FIG. 8 is a schematic structural diagram of a random access apparatus 800 according to an exemplary embodiment.
- the apparatus 800 may be provided as a base station.
- the device 800 includes a processing component 822, a wireless transmitting/receiving component 824, an antenna component 826, and a signal processing part specific to a wireless interface.
- the processing component 822 may further include one or more processors.
- One of the processors in the processing component 822 may be configured to execute any random access method described above on the base station side.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (50)
- 一种随机接入方法,其特征在于,所述方法用于用户设备UE,包括:接收基站发送的资源配置信息;确定触发随机接入的目标网络切片的切片信息;至少基于所述资源配置信息和所述切片信息,确定第一随机接入资源;基于所述第一随机接入资源发起随机接入;其中,所述资源配置信息用于配置以下至少一项:公共随机接入资源;至少一个网络切片对应的指定随机接入资源;两步随机接入资源;四步随机接入资源;两步公共随机接入资源;四步公共随机接入资源;两步指定随机接入资源;四步指定随机接入资源。
- 根据权利要求1所述的方法,其特征在于,所述至少基于所述资源配置信息和所述切片信息,确定第一随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站至少配置了所述目标网络切片对应的指定随机接入资源;将所述目标网络切片对应的指定随机接入资源作为备选资源;基于所述备选资源,确定所述第一随机接入资源。
- 根据权利要求1所述的方法,其特征在于,所述至少基于所述资源配置信息和所述切片信息,确定第一随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站未配置所述目标网络切片对应的指定随机接入资源,但配置了公共随机接入资源;将所述公共随机接入资源作为备选资源;基于所述备选资源,确定所述第一随机接入资源。
- 根据权利要求1所述的方法,其特征在于,所述至少基于所述资源配置信息和所述切片信息,确定第一随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站至少配置了所 述目标网络切片对应的指定随机接入资源,以及所述公共随机接入资源;响应于确定信号质量大于第一门限值,将所述目标网络切片对应的指定随机接入资源作为备选资源;响应于确定信号质量小于或等于第一门限值,将所述公共随机接入资源作为备选资源;基于所述备选资源,确定所述第一随机接入资源。
- 根据权利要求4所述的方法,其特征在于,还包括以下至少一项:接收所述基站广播的第一系统消息,所述第一系统消息用于配置与至少一个网络切片对应的所述第一门限值;或,接收所述基站发送的第一RRC消息,所述第一RRC消息用于配置与至少一个网络切片对应的所述第一门限值。
- 根据权利要求1所述的方法,其特征在于,所述至少基于所述资源配置信息和所述切片信息,确定第一随机接入资源,包括:基于所述资源配置信息,确定所述基站配置了所述两步随机接入资源或所述四步随机接入资源;将所述两步随机接入资源或所述四步随机接入资源作为备选资源;基于所述备选资源,确定所述第一随机接入资源。
- 根据权利要求1所述的方法,其特征在于,所述至少基于所述资源配置信息和所述切片信息,确定第一随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站配置了所述两步随机接入资源,以及所述四步随机接入资源;响应于确定信号质量大于第二门限值,将所述两步随机接入资源作为备选资源;响应于确定信号质量小于或等于第二门限值,将所述四步随机接入资源作为备选资源;基于所述备选资源,确定所述第一随机接入资源。
- 根据权利要求7所述的方法,其特征在于,还包括以下任一项:接收所述基站广播的第二系统消息,所述第二系统消息用于配置与至少一个网络切片对应的所述第二门限值;或,接收所述基站发送的第二RRC消息,所述第二RRC消息用于配置与至少一个网络切片对应的所述第二门限值。
- 根据权利要求2-8任一项所述的方法,其特征在于,所述基于所述备选资源,确定所述第一随机接入资源,包括以下任一项:在所述备选资源包括所述公共随机接入资源、所述目标网络切片对应的指定随机接入资源、所述两步随机接入资源或所述四步随机接入资源中任一项的情况下,将所述备选资源作为所述第一随机接入资源;在所述备选资源包括所述公共随机接入资源的情况下,将所述两步公共随机接入资源或所述四步公共随机接入资源作为所述第一随机接入资源;在所述备选资源包括所述目标网络切片对应的指定随机接入资源的情况下,将所述两步指定随机接入资源或所述四步指定随机接入资源作为所述第一随机接入资源;在所述备选资源包括两步随机接入资源的情况下,将所述两步公共随机接入资源或所述两步指定随机接入资源作为所述第一随机接入资源;或,在所述备选资源包括四步随机接入资源的情况下,将所述四步公共随机接入资源或所述四步指定随机接入资源作为所述第一随机接入资源。
- 根据权利要求9所述的方法,其特征在于,所述在所述备选资源包括所述目标网络切片对应的指定随机接入资源的情况下,将所述两步指定随机接入资源或所述四步指定随机接入资源作为所述第一随机接入资源,包括:在备选资源包括所述目标网络切片对应的指定随机接入资源的情况下,基于所述资源配置信息,确定所述基站至少配置了所述两步指定随机接入资源,以及所述四步指定随机接入资源;响应于确定信号质量大于第二门限值,将所述两步指定随机接入资源作为所述第一随机接入资源;或,响应于确定信号质量小于或等于所述第二门限值,将所述四步指定随机接入资源作为所述第一随机接入资源。
- 根据权利要求9所述的方法,其特征在于,所述在所述备选资源包括两步随机接入资源的情况下,将所述两步公共随机接入资源或所述两步指定随机接入资源作为所述第一随机接入资源,包括:在所述备选资源包括两步随机接入资源的情况下,基于所述资源配置信息,确定所述基站配置了所述两步公共随机接入资源和所述两步指定随机接入资源;将两步指定随机接入资源作为所述第一随机接入资源;或,响应于确定信号质量大于第二门限值,将所述两步指定随机接入资源作为所述第一随机接入资源;或,响应于确定信号质量小于或等于第二门限值,将所述两步公共随机接入资源作为所述第一随机接入资源。
- 根据权利要求9所述的方法,其特征在于,所述在所述备选资源包括四步随机接入资源的情况下,基于所述资源配置信息,将所述四步公共随机接入资源或所述四步指定随机接入资源作为所述第一随机接入资源,包括:在所述备选资源包括四步随机接入资源的情况下,基于所述资源配置信息,确定所述基站配置了所述四步公共随机接入资源和所述四步指定随机接入资源;将所述四步指定随机接入资源作为所述第一随机接入资源;或,响应于确定信号质量大于第一门限值,将所述四步指定随机接入资源作为所述第一随机接入资源;或,响应于确定信号质量小于或等于第一门限值,将所述四步公共随机接入资源作为所述第一随机接入资源。
- 根据权利要求1所述的方法,其特征在于,所述公共随机接入资源是多个UE之间共享的随机接入资源,所述多个UE包括支持网络切片 功能的UE和不支持网络切片功能的UE,或,所述多个UE包括支持网络切片功能的UE。
- 根据权利要求1所述的方法,其特征在于,还包括:响应于满足预设回退条件,不进行资源回退。
- 根据权利要求14所述的方法,其特征在于,所述响应于满足预设回退条件,不进行资源回退,包括以下任一项:响应于将所述目标网络切片对应的指定随机接入资源作为所述第一随机接入资源发起随机接入时,满足所述预设回退条件,不进行资源回退;或,响应于将所述公共随机接入资源作为所述第一随机接入资源发起随机接入时,满足所述预设回退条件,不进行资源回退。
- 根据权利要求1所述的方法,其特征在于,还包括:响应于满足预设回退条件,确定需要回退到的第二随机接入资源;基于所述第二随机接入资源重新发起随机接入。
- 根据权利要求16所述的方法,其特征在于,还包括以下任一项:响应于基于所述第二随机接入资源重新发起随机接入时满足所述预设回退条件,不进行资源回退;或,响应于基于所述第二随机接入资源重新发起随机接入时满足所述预设回退条件,确定需要回退到的第三随机接入资源;基于所述第三随机接入资源重新发起随机接入。
- 根据权利要求14-17任一项所述的方法,其特征在于,所述预设回退条件包括以下任一项:基于所述第一随机接入资源发起随机接入的失败次数达到第一回退次数阈值;第一回退定时器到期;或,接收到与所述目标网络切片对应的随机接入资源回退指示消息。
- 根据权利要求18所述的方法,其特征在于,还包括以下任一项:接收所述基站广播的第三系统消息,所述第三系统消息用于配置与至少一个网络切片对应的所述第一回退次数阈值;或,接收所述基站发送的第三RRC消息,所述第三RRC消息用于配置与至少一个网络切片对应的所述第一回退次数阈值。
- 根据权利要求18所述的方法,其特征在于,还包括以下任一项:接收所述基站广播的第四系统消息,所述第四系统消息用于配置所述第一回退定时器;或,接收所述基站发送的第四RRC消息,所述第四RRC消息用于配置所述第一回退定时器。
- 根据权利要求18所述的方法,其特征在于,所述目标网络切片对应的随机接入资源回退指示消息用于配置第二回退次数阈值和第二回退定时器中的至少一项。
- 根据权利要求18所述的方法,其特征在于,所述目标网络切片对应的随机接入资源回退指示消息中携带回退概率值,所述基于回退到的第二随机接入资源重新发起随机接入,包括:响应于根据生成的随机数和所述回退概率值确定进行回退,基于回退到的第二随机接入资源重新发起随机接入。
- 根据权利要求18所述的方法,其特征在于,还包括以下任一项:接收携带所述目标网络切片对应的随机接入资源回退指示消息的随机接入响应消息;或,接收携带所述目标网络切片对应的随机接入资源回退指示消息的第五RRC消息。
- 根据权利要求16所述的方法,其特征在于,所述第一随机接入资源为所述两步指定随机接入资源,所述确定需要回退到的第二随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站配置了所述四步指定随机接入资源;将所述四步指定随机接入资源作为所述第二随机接入资源。
- 根据权利要求16所述的方法,其特征在于,所述第一随机接入资源为所述两步指定随机接入资源,所述确定需要回退到的第二随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站配置了所述公共随机接入资源;在所述公共随机接入资源中,基于所述资源配置信息和信号质量,确定所述第二随机接入资源。
- 根据权利要求16所述的方法,其特征在于,所述第一随机接入资源为所述两步指定随机接入资源,所述确定需要回退到的第二随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站配置了所述公共随机接入资源;基于所述基站发送的第一指示信息,确定能够回退到所述公共随机接入资源重新发起随机接入;在所述公共随机接入资源中,基于所述资源配置信息和信号质量,确定所述第二随机接入资源。
- 根据权利要求25或26所述的方法,其特征在于,所述在所述公共随机接入资源中,基于所述资源配置信息和信号质量,确定所述第二随机接入资源,包括:基于所述资源配置信息,确定所述基站配置了所述两步公共随机接入资源;确定信号质量大于第三门限值;将所述两步公共随机接入资源作为所述第二随机接入资源。
- 根据权利要求27所述的方法,其特征在于,还包括以下任一项:接收所述基站发送的第五系统消息,所述第五系统消息用于配置与至少一个网络切片对应的第三门限值;或,接收所述基站发送的第六RRC消息,所述第六RRC消息用于配置与至少一个网络切片对应的第三门限值。
- 根据权利要求16所述的方法,其特征在于,所述第一随机接入资源属于所述公共随机接入资源,所述确定需要回退到的第二随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站配置了所述四步公共随机接入资源;将所述四步公共随机接入资源作为所述第二随机接入资源。
- 根据权利要求16所述的方法,其特征在于,所述第一随机接入资源属于所述公共随机接入资源,所述确定需要回退到的第二随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站配置了与所述目标网络切片对应的指定随机接入资源;在所述目标网络切片对应的指定随机接入资源中,基于所述资源配置信息和信号质量,确定所述第二随机接入资源。
- 根据权利要求16所述的方法,其特征在于,所述第一随机接入资源属于所述公共随机接入资源,所述确定需要回退到的第二随机接入资源,包括:基于所述资源配置信息和所述切片信息,确定所述基站配置了与所述目标网络切片对应的指定随机接入资源;基于所述基站发送的第二指示信息,确定能够回退到与所述目标网络切片对应的指定随机接入资源重新发起随机接入;在所述目标网络切片对应的指定随机接入资源中,基于所述资源配置信息和信号质量,确定所述第二随机接入资源。
- 根据权利要求30或31所述的方法,其特征在于,所述在所述目标网络切片对应的指定随机接入资源中,基于所述资源配置信息和信号质量,确定所述第二随机接入资源,包括:基于所述资源配置信息,确定所述基站配置了所述四步指定随机接入资源;将所述四步指定随机接入资源作为所述第二随机接入资源。
- 根据权利要求30或31所述的方法,其特征在于,所述在所述目标网络切片对应的指定随机接入资源中,基于所述资源配置信息和信号质量,确定所述第二随机接入资源,包括:基于所述资源配置信息,确定所述基站配置了所述四步指定随机接入资源;确定信号质量大于第四门限值;将所述四步指定随机接入资源作为所述第二随机接入资源。
- 根据权利要求33所述的方法,其特征在于,还包括以下任一项:接收所述基站广播的第六系统消息,所述第六系统消息用于配置与至少一个网络切片对应的第四门限值;或,接收所述基站发送的第七RRC消息,所述第七RRC消息用于配置与至少一个网络切片对应的第四门限值。
- 一种随机接入方法,其特征在于,所述方法用于基站,包括:向用户设备UE发送资源配置信息;其中,所述资源配置信息用于配置以下至少一项:公共随机接入资源;至少一个网络切片对应的指定随机接入资源;两步随机接入资源;四步随机接入资源;两步公共随机接入资源;四步公共随机接入资源;两步指定随机接入资源;四步指定随机接入资源。
- 根据权利要求35所述的方法,其特征在于,还包括以下任一项:广播第一系统消息,所述第一系统消息用于配置与至少一个网络切片对应的第一门限值;或,向所述UE发送第一RRC消息,所述第一RRC消息用于配置与至少一个网络切片对应的第一门限值。
- 根据权利要求35所述的方法,其特征在于,还包括以下任一项:广播第二系统消息,所述第二系统消息用于配置与至少一个网络切片对应的第二门限值;或,向所述UE发送第二RRC消息,所述第二RRC消息用于配置与至少一个网络切片对应的第二门限值。
- 根据权利要求35所述的方法,其特征在于,还包括以下任一项:广播第三系统消息,所述第三系统消息用于配置与至少一个网络切片对应的第一回退次数阈值;或,向所述UE发送第三RRC消息,所述第三RRC消息用于配置与至少一个网络切片对应的所述第一回退次数阈值。
- 根据权利要求35所述的方法,其特征在于,还包括以下任一项:广播第四系统消息,所述第四系统消息用于配置第一回退定时器;或,向所述UE发送第四RRC消息,所述第四RRC消息用于配置所述第一回退定时器。
- 根据权利要求35所述的方法,其特征在于,还包括以下任一项:向所述UE发送携带目标网络切片对应的随机接入资源回退指示消息的随机接入响应消息;或,向所述UE发送携带目标网络切片对应的随机接入资源回退指示消息的第五RRC消息。
- 根据权利要求35所述的方法,其特征在于,还包括:向所述UE发送第一指示信息,所述第一指示信息用于指示能够回退到公共随机接入资源重新发起随机接入。
- 根据权利要求35所述的方法,其特征在于,还包括以下任一项:向所述UE发送第二指示信息,所述第二指示信息用于指示能够回退到与目标网络切片对应的指定随机接入资源重新发起随机接入。
- 根据权利要求35所述的方法,其特征在于,还包括以下任一项:广播第五系统消息,所述第五系统消息用于配置与至少一个网络切片对应的第三门限值;或,向所述UE发送第六RRC消息,所述第六RRC消息用于配置与至少一个网络切片对应的第三门限值。
- 根据权利要求35所述的方法,其特征在于,还包括以下任一项:广播第六系统消息,所述第六系统消息用于配置与至少一个网络切片对应的第四门限值;或,向所述UE第七RRC消息,所述第七RRC消息用于配置与至少一个网络切片对应的第四门限值。
- 一种随机接入装置,其特征在于,所述装置用于用户设备UE,包括:接收模块,被配置为接收基站发送的资源配置信息;第一确定模块,被配置为确定触发随机接入的目标网络切片的切片信息;第二确定模块,被配置为至少基于所述资源配置信息和所述切片信息,确定第一随机接入资源;随机接入模块,被配置为基于所述第一随机接入资源发起随机接入;其中,所述资源配置信息用于配置以下至少一项:公共随机接入资源;至少一个网络切片对应的指定随机接入资源;两步随机接入资源;四步随机接入资源;两步公共随机接入资源;四步公共随机接入资源;两步指定随机接入资源;四步指定随机接入资源。
- 一种随机接入装置,其特征在于,所述装置用于基站,包括:发送模块,被配置为向用户设备UE发送资源配置信息;其中,所述资源配置信息用于配置以下至少一项:公共随机接入资源;至少一个网络切片对应的指定随机接入资源;两步随机接入资源;四步随机接入资源;两步公共随机接入资源;四步公共随机接入资源;两步指定随机接入资源;四步指定随机接入资源。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序用于执行上述权利要求1-34任一项 所述的随机接入方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序用于执行上述权利要求35-44任一项所述的随机接入方法。
- 一种随机接入装置,其特征在于,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为用于执行上述权利要求1-34任一项所述的随机接入方法。
- 一种随机接入装置,其特征在于,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为用于执行上述权利要求35-44任一项所述的随机接入方法。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202180001902.5A CN115777230A (zh) | 2021-07-06 | 2021-07-06 | 随机接入方法及装置、存储介质 |
PCT/CN2021/104834 WO2023279264A1 (zh) | 2021-07-06 | 2021-07-06 | 随机接入方法及装置、存储介质 |
EP21948762.6A EP4369837A4 (en) | 2021-07-06 | 2021-07-06 | RANDOM ACCESS METHOD AND APPARATUS, AND STORAGE MEDIUM |
US18/576,013 US20240340963A1 (en) | 2021-07-06 | 2021-07-06 | Random access method and apparatus, and storage medium |
KR1020247004246A KR20240028524A (ko) | 2021-07-06 | 2021-07-06 | 랜덤 액세스 방법, 장치 및 저장 매체 |
JP2024500328A JP2024527572A (ja) | 2021-07-06 | 2021-07-06 | ランダムアクセス方法、装置及び記憶媒体 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/104834 WO2023279264A1 (zh) | 2021-07-06 | 2021-07-06 | 随机接入方法及装置、存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023279264A1 true WO2023279264A1 (zh) | 2023-01-12 |
Family
ID=84801140
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/104834 WO2023279264A1 (zh) | 2021-07-06 | 2021-07-06 | 随机接入方法及装置、存储介质 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20240340963A1 (zh) |
EP (1) | EP4369837A4 (zh) |
JP (1) | JP2024527572A (zh) |
KR (1) | KR20240028524A (zh) |
CN (1) | CN115777230A (zh) |
WO (1) | WO2023279264A1 (zh) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111200847A (zh) * | 2018-11-16 | 2020-05-26 | 华为技术有限公司 | 通信方法及装置 |
CN112913319A (zh) * | 2021-02-05 | 2021-06-04 | 北京小米移动软件有限公司 | 随机接入方法及装置、存储介质 |
-
2021
- 2021-07-06 EP EP21948762.6A patent/EP4369837A4/en active Pending
- 2021-07-06 CN CN202180001902.5A patent/CN115777230A/zh active Pending
- 2021-07-06 US US18/576,013 patent/US20240340963A1/en active Pending
- 2021-07-06 WO PCT/CN2021/104834 patent/WO2023279264A1/zh active Application Filing
- 2021-07-06 KR KR1020247004246A patent/KR20240028524A/ko unknown
- 2021-07-06 JP JP2024500328A patent/JP2024527572A/ja active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111200847A (zh) * | 2018-11-16 | 2020-05-26 | 华为技术有限公司 | 通信方法及装置 |
CN112913319A (zh) * | 2021-02-05 | 2021-06-04 | 北京小米移动软件有限公司 | 随机接入方法及装置、存储介质 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4369837A4 * |
Also Published As
Publication number | Publication date |
---|---|
KR20240028524A (ko) | 2024-03-05 |
JP2024527572A (ja) | 2024-07-25 |
EP4369837A4 (en) | 2024-08-14 |
EP4369837A1 (en) | 2024-05-15 |
CN115777230A (zh) | 2023-03-10 |
US20240340963A1 (en) | 2024-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022165764A1 (zh) | 随机接入方法及装置、存储介质 | |
EP3952551B1 (en) | Random access method and device, and computer readable storage medium | |
EP3783959A1 (en) | Method and apparatus for controlling network access | |
WO2020051744A1 (zh) | 辅服务小区波束失败的上报方法,装置和存储介质 | |
CN108521890B (zh) | 随机接入方法及装置 | |
WO2020237681A1 (zh) | 随机接入方法及装置、通信设备及存储介质 | |
WO2020087380A1 (zh) | 传输随机接入指示信息的方法及装置 | |
WO2022236498A1 (zh) | 连接失败检测方法及装置、通信设备及存储介质 | |
WO2021063153A1 (zh) | 信息处理方法、网元设备、终端及存储介质 | |
CN111183703B (zh) | 帧传输方法及装置、通信端及存储介质 | |
CN109496448B (zh) | 网络参数配置方法、装置及计算机可读存储介质 | |
WO2024020888A1 (zh) | 上行定时维护、终端行为确定方法及装置、存储介质 | |
WO2023279264A1 (zh) | 随机接入方法及装置、存储介质 | |
CN114902730A (zh) | 信息传输方法、装置、通信设备和存储介质 | |
WO2020252744A1 (zh) | 确定随机接入信道机会ro的方法及装置 | |
WO2024007346A1 (zh) | 信息记录、信息发送方法及装置、存储介质 | |
WO2024007347A1 (zh) | 信息上报、信息接收方法及装置、存储介质 | |
WO2020014967A1 (zh) | 随机接入的处理方法及装置 | |
WO2024000545A1 (zh) | 信息上报、信息接收方法及装置、存储介质 | |
WO2024000546A1 (zh) | 信息记录、信息发送方法及装置、存储介质 | |
RU2815739C1 (ru) | Способ и устройство произвольного доступа и носитель данных | |
WO2023160712A1 (zh) | 数据传输的方法、终端及网络侧设备 | |
WO2023066129A1 (zh) | 信息上报方法、设备及可读存储介质 | |
WO2024168907A1 (zh) | 信息处理方法以及装置、通信设备及存储介质 | |
WO2022133720A1 (zh) | 寻呼消息类型确定方法、装置、通信设备和存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21948762 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18576013 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2024500328 Country of ref document: JP Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112024000179 Country of ref document: BR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202447006840 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 20247004246 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020247004246 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2021948762 Country of ref document: EP Ref document number: 2024102295 Country of ref document: RU |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2021948762 Country of ref document: EP Effective date: 20240206 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11202400043X Country of ref document: SG |
|
ENP | Entry into the national phase |
Ref document number: 112024000179 Country of ref document: BR Kind code of ref document: A2 Effective date: 20240105 |