WO2024076183A1 - Method and apparatus for random access in a wireless communication system - Google Patents

Method and apparatus for random access in a wireless communication system Download PDF

Info

Publication number
WO2024076183A1
WO2024076183A1 PCT/KR2023/015360 KR2023015360W WO2024076183A1 WO 2024076183 A1 WO2024076183 A1 WO 2024076183A1 KR 2023015360 W KR2023015360 W KR 2023015360W WO 2024076183 A1 WO2024076183 A1 WO 2024076183A1
Authority
WO
WIPO (PCT)
Prior art keywords
ssb
group
random access
condition
satisfied
Prior art date
Application number
PCT/KR2023/015360
Other languages
French (fr)
Inventor
Jonas SEDIN
Milos Tesanovic
Original Assignee
Samsung Electronics Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co., Ltd. filed Critical Samsung Electronics Co., Ltd.
Publication of WO2024076183A1 publication Critical patent/WO2024076183A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0048Allocation of pilot signals, i.e. of signals known to the receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • H04B17/328Reference signal received power [RSRP]; Reference signal received quality [RSRQ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0091Signaling for the administration of the divided path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements
    • H04W56/001Synchronization between nodes

Definitions

  • Embodiments of the present disclosure provide a technique for performing random access to a network.
  • embodiments of the disclosure provide a technique for performing random access to a 3 rd Generation Partnership Project (3GPP) 5 th Generation (5G) New Radio (NR) network including a Network Control Repeater (NCR).
  • 3GPP 3 rd Generation Partnership Project
  • 5G 5 th Generation
  • NR New Radio
  • NCR Network Control Repeater
  • 5G mobile communication technologies define broad frequency bands such that high transmission rates and new services are possible, and can be implemented not only in “Sub 6GHz” bands such as 3.5GHz, but also in “Above 6GHz” bands referred to as mmWave including 28GHz and 39GHz.
  • 6G mobile communication technologies referred to as Beyond 5G systems
  • THz terahertz
  • IIoT Industrial Internet of Things
  • IAB Integrated Access and Backhaul
  • DAPS Dual Active Protocol Stack
  • 5G baseline architecture for example, service based architecture or service based interface
  • NFV Network Functions Virtualization
  • SDN Software-Defined Networking
  • MEC Mobile Edge Computing
  • multi-antenna transmission technologies such as Full Dimensional MIMO (FD-MIMO), array antennas and large-scale antennas, metamaterial-based lenses and antennas for improving coverage of terahertz band signals, high-dimensional space multiplexing technology using OAM (Orbital Angular Momentum), and RIS (Reconfigurable Intelligent Surface), but also full-duplex technology for increasing frequency efficiency of 6G mobile communication technologies and improving system networks, AI-based communication technology for implementing system optimization by utilizing satellites and AI (Artificial Intelligence) from the design stage and internalizing end-to-end AI support functions, and next-generation distributed computing technology for implementing services at levels of complexity exceeding the limit of UE operation capability by utilizing ultra-high-performance communication and computing resources.
  • FD-MIMO Full Dimensional MIMO
  • OAM Organic Angular Momentum
  • RIS Reconfigurable Intelligent Surface
  • Random access is a procedure that allows a User Equipment (UE) to make an unscheduled connection to a network. Random access may be triggered by a number of situations, for example initial UE access to the network, handover, reconnection following connection failure, etc.
  • UE User Equipment
  • Figure 1A illustrates a typical random access procedure in which a UE connects to a base station (e.g. eNB or gNB).
  • a base station e.g. eNB or gNB
  • the procedure in Figure 1A is used in Long Term Evolution (LTE).
  • LTE Long Term Evolution
  • the UE selects resources (e.g. time and frequency resources) for performing random access.
  • the UE(100) and eNB(105) exchange a sequence of four messages.
  • the first message (Msg1: preamble/PRACH) transmitted from UE(100) to eNB(105) includes a preamble selected from a set of (e.g. 64) orthogonal preambles.
  • the second message (Msg2: Random Access Response (RAR)) transmitted from eNB(105) to UE(100) is a response to Msg1 and includes timing advance information to correct the timing of the UE(100), and an uplink grant for the third message.
  • the third message (Msg3) transmitted from UE(100) to eNB(105) over Physical Uplink Shared CHannel (PUSCH) includes a (scheduled) first Radio Resource Control (RRC) message (e.g. RRCSetupRequest, RRCResumeRequest, RRCReestablishmentRequest, RRCReconfigurationComplete, etc. depending on the situation) and may also contain user plane data.
  • RRC Radio Resource Control
  • the fourth message (Msg4) transmitted from eNB(105) to UE(100) over Physical Downlink Shared CHannel (PDSCH) includes a second RRC message in response to the first RRC message (e.g. RRCSetup, RRCResume, etc.) and includes a contention resolution Medium Access Control (MAC) Control Element (CE).
  • the fourth message is sent in the case of Contention-Based Random Access (CBRA) but not in the case of Contention-Free Random Access (CFRA).
  • CBRA Contention-Based Random Access
  • CFRA Contention-Free Random Access
  • Figure 1B illustrates an alternative random access procedure adopted in 3GPP Release 16 in which the four-step procedure of Figure 1A is reduced to two steps by combining messages.
  • the UE(100) selects resources for performing random access.
  • the UE(100) and gNB(110) exchange a sequence of two messages.
  • the first message (MsgA) transmitted from UE(100) to gNB(110) corresponds to a combination of Msg1 and Msg3 of Figure 1A and includes a preamble, and a first RRC message or user plane data.
  • the second message (MsgB) transmitted from gNB(110) to UE(100) corresponds to a combination of Msg2 and Msg4 of Figure 1A and includes timing advance information and contention resolution information.
  • the UE(100) needs to select the correct random access resources, comprising PRACH (Physical Random Access CHannel) resources in time and frequency as well as a specific preamble.
  • PRACH Physical Random Access CHannel
  • Supplementary UpLink SUL
  • NUL Normal UpLink
  • RSRP Reference Signal Received Power
  • BWP Bandwidth Part
  • ⁇ 2-step vs 4-step which may be preamble divided or entirely separate PRACH resources.
  • ⁇ Msg3 repetitions in which the UE selects a specific preamble to signal that it is capable of performing Msg3 repetitions and that it may be needed for coverage purposes.
  • the UE may instead select the configured CBRA resources.
  • Random access group A/B in which if the UE has good coverage and a large Msg3 payload, it can signal through preambles that it needs a larger Msg3 payload.
  • the random access procedure may be triggered by a number of events, for example as described in 3GPP 38.300, V17.2.0, Clause 9.2.6:
  • a Radio Frequency (RF) repeater may be deployed to amplify and forward any signal that it receives to supplement coverage provided by a regular cell.
  • RF Radio Frequency
  • An enhanced type of repeater node, called a Network-Controlled Repeater (NCR) is currently under development and is a Release 18 Study Item/Work Item (3GPP RP-213700).
  • Figure 2 illustrates the network architecture of NCR communication.
  • the NCR(220) receives and forwards signals from gNB(210) to UE(200) via an NCR-Fwd(Forward) link.
  • the NCR(220) also receives control signals from gNB(210) via a NCR-Mobile Termination (MT) link, which are used to configure the NCR(220).
  • MT NCR-Mobile Termination
  • the NCR(220) provides an amplify-and-forward function that is transparent to the UE(200). Accordingly, gNB(210) may communicate with UE(200) directly or through an NCR(220).
  • a 5G NR(New Radio) base station provides multi-beam operation in which the base station may transmit a signal through a relatively narrow beam (in the spatial domain) steered in a particular direction (directional transmission).
  • the base station may transmit a signal through two or more such beams steered in respective different directions (see Figure 3).
  • Each beam may be identified by a beam index (e.g. SSB index). It is intended that an NCR(320) deployed in a 5G NR network is also capable of directional transmission via beamforming.
  • a UE(300) may detect signals transmitted through the different beams. Due to factors including the relative locations of the UE(300) and base station, and the different steering directions of the beams, the UE(300) typically detects the signals with different signal strengths/power, with beams steered towards the UE(300) typically being received with the highest signal strength/power.
  • the beam-based concept for 5G NR may be used in the random access procedure.
  • a UE(300) may measure different SSBs of a cell, and during the random access procedure the UE(300) will select one SSB and a preamble that is associated with that specific SSB. When the network receives a preamble, the network will thus be aware of which SSB that the UE(300) is attempting to connect through.
  • the gNB(310) may allocate a set of SSB indices to the NCR(320) when the NCR(320) registers to the network, for example as described in 3GPP R1-2203741, Section 5. This procedure is illustrated in Figure 3, in which SSB indices 9 and 10 are allocated to the NCR(320) while other SSB indices 1-8 remain with gNB(310). The UE(300) may then perform the random access procedure via SSBs transmitted via SSB indices allocated to the NCR(320) as though the random access procedure was performed via the gNB(310). As illustrated in Figure 3, the UE(300) may measure and perform random access to a beam originating from a different location compared to the gNB(310).
  • an aspect of the disclosure is to provide efficient communication methods in a wireless communication system.
  • Figures 1A and 1B illustrate examples of a random access procedure
  • FIG. 2 illustrates the network architecture of NCR communication
  • Figure 3 illustrates a technique in which gNB allocate a set of SSB indices to an NCR for a random access procedure
  • Figure 4 illustrates an example of a UE selecting an NCR-associated SSB during a random access event
  • Figure 5 is a flow diagram of a method for performing a random access procedure
  • Figures 6A-D and 7 are flow diagrams of various methods for selecting an SSB.
  • Figure 8 is a block diagram of an exemplary network entity that may be used in embodiments of the disclosure.
  • Figure 9 illustrates an example of a UE according to an embodiment.
  • Figure 10 illustrates an example of a base station according to an embodiment.
  • an aspect of the disclosure is to provide a terminal and a communication method thereof in a wireless communication system.
  • any reference to “an example” or “example”, “an implementation” or “implementation”, “an embodiment” or “embodiment” means that particular elements, features, structures or characteristics described in connection with the embodiment is included in at least one embodiment.
  • the phrases “in one embodiment” or “in one example” appearing in different places in the specification do not necessarily refer to the same embodiment.
  • a portion of something means “at least some of” the thing, and as such may mean less than all of, or all of, the thing.
  • a portion of a thing includes the entire thing as a special case, i.e., the entire thing is an example of a portion of the thing.
  • a set of items means one or more. Accordingly, a set of items can be a single item or a collection of two or more items.
  • expressions such as “greater than” or “less than” are used by way of example and expressions, such as “greater than or equal to” or “less than or equal to” are also applicable and not excluded.
  • a condition defined with “greater than or equal to” may be replaced by “greater than” (or vice-versa)
  • a condition defined with “less than or equal to” may be replaced by “less than” (or vice-versa)
  • the technical schemes of the embodiments of the application can be applied to various communication systems, and for example, the communication systems may include global systems for mobile communications (GSM), code division multiple access (CDMA) systems, wideband code division multiple access (WCDMA) systems, general packet radio service (GPRS) systems, long term evolution (LTE) systems, LTE frequency division duplex (FDD) systems, LTE time division duplex (TDD) systems, universal mobile telecommunications system (UMTS), worldwide interoperability for microwave access (WiMAX) communication systems, 5th generation (5G) systems or new radio (NR) systems, etc.
  • GSM global systems for mobile communications
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • GPRS general packet radio service
  • LTE long term evolution
  • TDD LTE time division duplex
  • UMTS universal mobile telecommunications system
  • WiMAX worldwide interoperability for microwave access
  • 5G 5th generation
  • NR new radio
  • 5G or pre-5G communication systems are also called “Beyond 4G networks” or “Post-LTE systems”.
  • Embodiments of the disclosure provide methods, apparatus and systems for performing random access to a network.
  • embodiments of the disclosure provide methods, apparatus and systems for performing random access to a 3GPP 5G NR network including an NCR.
  • the present invention is not limited to these examples, and may be applied in any suitable system or standard, for example one or more existing and/or future generation wireless communication systems or standards, including any existing or future releases of the same standards specification, for example 3GPP 5G.
  • 3GPP 5G 3rd Generation Partnership Project 5G
  • the techniques disclosed herein are not limited to 3GPP 5G.
  • the functionality of the various network entities and other features disclosed herein may be applied to corresponding or equivalent entities or features in other communication systems or standards.
  • Corresponding or equivalent entities or features may be regarded as entities or features that perform the same or similar role, function or purpose within the network.
  • a particular network entity may be implemented as a network element on a dedicated hardware, as a software instance running on a dedicated hardware, and/or as a virtualised function instantiated on an appropriate platform, e.g. on a cloud infrastructure.
  • Embodiments of the disclosure may be provided in the form of an apparatus/device/network entity configured to perform one or more defined network functions and/or a method therefor.
  • Embodiments of the disclosure may be provided in the form of a system (e.g. network or wireless communication system) comprising one or more such apparatuses/devices/network entities, and/or a method therefor.
  • NCR While an NCR can be deployed without expected impact to a UE through appropriate SSB-layouts, some problem may arise. For example, one problem is that a control link is needed between the NCR and the gNB(5G NR Base Station) in order to control the NCR transmissions. Therefore, when a UE connects to an NCR rather than a gNB, the NCR-MT and NCR-Fwd components may need to be activated.
  • the selection of an SSB can be rather dynamic. For example, the following is described in 3GPP TS(Technical Specification) 38.321, Clause 5.1.2, in relation to how an SSB is selected (emphasis added):
  • how a UE selects a specific SSB is not always specified if there are multiple SSBs that are above the rsrp-ThresholdSSB. For example, this may cause problems if selecting an SSB actually results in selecting a different access point (e.g. NCR vs gNB) very dynamically.
  • a different access point e.g. NCR vs gNB
  • random access is performed in many different cases. For example, some cases involve radio-related failures and some involve synchronization issues.
  • the UE(400) might select an SSB associated with an NCR(420).
  • the NCR(420) might not be activated rapidly and therefore a quick response might not be possible.
  • This problem may be especially acute in the case of non-initial random access, such as for Beam Failure Recovery (BFR) and similar.
  • BFR Beam Failure Recovery
  • Embodiments of the disclosure provide one or more techniques for selecting an SSB that aims to restrict a UE from dynamically switching between gNB and NCR.
  • NCR and gNB may be referred to as different network elements, entities and/or nodes.
  • the skilled person will appreciate that the techniques described herein may be applied to network elements, entities and/or nodes other than NCR and gNB.
  • Embodiments of the disclosure provide a method, for a User Equipment (UE), for performing random access in a network, the method comprising: selecting a Synchronisation Signal Block (SSB); and performing random access to a network entity based on the selected SSB, wherein the SSB is selected based on an SSB group to which the SSB belongs.
  • UE User Equipment
  • SSB Synchronisation Signal Block
  • a plurality of SSB groups may be configured including a first SSB group and one or more second SSB groups.
  • the first SSB group may be associated with a first network entity (e.g. gNB), and the one or more second SSB groups may be associated with one or more second network entities (e.g. NCR).
  • a first network entity e.g. gNB
  • the one or more second SSB groups may be associated with one or more second network entities (e.g. NCR).
  • the method may further comprise determining a network entity to which the UE is, or was, connected, wherein the first SSB group may be associated with the determined network entity.
  • the method may further comprise receiving, by the UE from the network, when the UE is in connected mode, information (e.g. a flag, system information, dedicated signalling and/or broadcast signal) indicating to which network entity, or through which SSB group, the UE is connected.
  • information e.g. a flag, system information, dedicated signalling and/or broadcast signal
  • the SSB may be selected from the first SSB group.
  • the method may further comprise selecting, by the UE, one of the first SSB group and the second SSB group.
  • the SSB may be selected from the first SSB group, and if the second SSB group is selected, the SSB may be selected from the second SSB group.
  • the SSB may be selected based on a first condition and/or a second condition, wherein the first condition may comprise: the first SSB group includes an SSB for which the Reference Signal Received Power (RSRP) for the SSB exceeds a first threshold, and wherein the second condition may comprise: the second SSB group includes an SSB for which the RSRP for the SSB exceeds a second threshold.
  • the first condition may comprise: the first SSB group includes an SSB for which the Reference Signal Received Power (RSRP) for the SSB exceeds a first threshold
  • the second condition may comprise: the second SSB group includes an SSB for which the RSRP for the SSB exceeds a second threshold.
  • RSRP Reference Signal Received Power
  • the first threshold and/or the second threshold may be dynamically configurable.
  • the SSB may be selected based on one or more of: if the first condition is satisfied, the SSB may be selected from the first SSB group; if the first condition is not satisfied and the second condition is satisfied, the SSB may be selected from the second SSB group; if the first condition is not satisfied and the second condition is not satisfied, the SSB may be selected from the first SSB group and/or the second SSB group; and if both the first condition and the second condition are satisfied, the SSB may be selected from the SSB group through which the UE is currently connected or was previously connected.
  • the SSB may be selected based on one or more of: when the first condition is satisfied and the SSB is selected from the first SSB group, the SSB may be selected from among SSBs of the first SSB group for which the first threshold is exceeded; when the second condition is satisfied and the SSB is selected from the second SSB group, the SSB may be selected from among SSBs of the second SSB group for which the second threshold is exceeded; when the first condition is not satisfied and the SSB is selected from the first SSB group, the SSB may be selected from among any SSBs of the first SSB group; when the second condition is not satisfied and the SSB is selected from the second SSB group, the SSB may be selected from among any SSBs of the second SSB group; and when both the first condition and the second condition are satisfied, the SSB through which the UE is currently connected or was previously connected may be selected as the SSB.
  • the method may further comprise receiving signalling for determining which SSBs belong to the first and second SSB groups.
  • performing random access based on the selected SSB may comprise: attempting random access a first time based on the selected SSB; and attempting random access a second time based on the same selected SSB.
  • performing random access based on the selected SSB may comprise: attempting random access a first time based on the selected SSB; and attempting random access a second time based on an SSB belonging to the same SSB group as the selected SSB.
  • the method may further comprise: triggering the random access based on occurrence of an event; and selecting a scheme for selecting the SSB based on the type of event that triggers the random access.
  • the type of event may include one or more of: initial access from RRC_IDLE; RRC Connection Re-establishment procedure; DL(Down Link) and/or UL(Uplink) data arrival; SR failure; request by RRC upon synchronous reconfiguration; RRC Connection Resume procedure from RRC_INACTIVE; establishment of time alignment for a secondary TAG; request for Other SI; beam failure recovery; consistent UL LBT(Listen Before Talk) failure on SpCell; SDT in RRC_INACTIVE; and positioning purpose during RRC_CONNECTED.
  • performing random access based on the selected SSB may comprise: selecting a preamble based on the selected SSB; and performing random access using the selected preamble.
  • Embodiments of the disclosure provide an apparatus (e.g. a UE) for performing random access in a network, the apparatus comprising a transceiver and a processor coupled with the transceiver, and the processor configured to: perform a method according to any aspect, example, claim or embodiment disclosed herein.
  • the processor configured to select a Synchronisation Signal Block (SSB), and perform random access to a network entity based on the selected SSB.
  • the SSB is selected based on an SSB group to which the SSB belongs.
  • SSB Synchronisation Signal Block
  • Embodiments of the disclosure provide a network (or wireless communication system) comprising an apparatus according to any aspect, example, claim or embodiment disclosed herein.
  • Embodiments of the disclosure provide a computer program comprising instructions which, when the program is executed by a computer or processor, cause the computer or processor to carry out a method according to any aspect, example, claim or embodiment disclosed herein.
  • Embodiments of the disclosure provide a computer or processor-readable data carrier having stored thereon a computer program according to any aspect, example, claim or embodiment disclosed herein.
  • Figure 5 is a flowchart of a method for performing a random access procedure.
  • the method of Figure 5 may be applied in a network configurations illustrated in any of Figures 1-4.
  • the UE triggers random access. Any suitable trigger may be used in various examples of the disclosure. Various non-limiting examples are described above.
  • the UE selects an SSB.
  • the UE may select an SSB from among a first set of SSBs (e.g. gNB SSBs) and a second set of SSBs (e.g. NCR SSBs).
  • a first set of SSBs e.g. gNB SSBs
  • a second set of SSBs e.g. NCR SSBs
  • rules for selecting the SSB are described further below.
  • the UE may perform a step of selecting a preamble from a preamble group associated with the selected SSB.
  • the UE performs random access based on the selected SSB (e.g. using the selected preamble).
  • the particular rule(s) used to select the SSB may depend on the type of event that triggered the random access.
  • one or more rules may be applied to select an SSB with no or relatively few restrictions, for example to allow the UE to perform random access to an NCR node from RRC_IDLE, rather than being restricted from accessing the NCR in favour of the gNB.
  • one or more rules may be applied to select an SSB with more restrictions. For SR failure, this may be important to prevent the UE from suddenly “disappearing” from a gNB to an NCR or the other way around, where, for example, the failure might be due to congestion in the network rather than related to failures of the Scheduling Request.
  • one or more other rules may be applied, for example one or more rules disclosed herein with one or more modifications.
  • modification may include changes to the SSB selection thresholds, for example so that another NCR beam is only selected following NCR beam failure if the quality is higher than nominally expected.
  • the UE may determine a network entity (e.g. NCR or gNB) and may select an SSB in consideration of the determined network entity. In embodiments, the determination may be made based on which network entity the UE is, or has been, connected to. In other examples, the determination may be made based on a selection by the UE.
  • a network entity e.g. NCR or gNB
  • the UE may determine whether it is connected to an NCR or gNB. For example, this determination may be made in advance of a random access procedure.
  • the UE may select an SSB based on a result of the determination. For example, the UE may select an SSB such that the UE does not switch connection from a current network node to a different network node (e.g. from an NCR to a gNB, or the other way around).
  • the relevant information for allowing the UE to make the determination could be indicated by the network to the UE, for example through system information, or any dedicated signaling.
  • the information may be indicated only when a UE is connected to an NCR node.
  • the information may be implicit.
  • the information may be deduced based on information obtained by the UE indicating which SSB the UE is connected to. For example, the UE may save the SSB-index used by the UE to perform initial access and/or subsequent access.
  • one or more of the following rules may be applied in order to restrict or improve the dynamic movement between a gNB and an NCR SSB.
  • different levels of restrictions may be applied. For example, one or more rules imposing a “hard” restriction” may be applied. Alternatively, one or more rules may be applied imposing a “soft” restriction.
  • a UE should remain on an SSB that is associated with either the gNB or the NCR and not switch between if random access is triggered.
  • the network may signal and configure certain SSBs that are associated with the gNB and certain SSBs that are associated with the NCR. For example, this may be possible for UEs in connected mode or inactive mode (RRC_INACTIVE) that are aware of whether they are connected to a gNB or an NCR.
  • RRC_INACTIVE in connected mode or inactive mode
  • UE is configured with information regarding a first set of SSBs associated with NCR and a second set of SSBs associated with gNB, so that the UE knows which SSBs are associated with NCR and which SSBs are associated with gNB
  • UE selects from SSBs associated with NCR (first set) and SSBs associated with gNB (second set) according to the following rules:
  • UE performs random access to gNB or NCR according to the selection
  • a UE should preferably remain on an SSB that is associated with either the gNB or the NCR and not switch between if random access is triggered, but some switching may be allowed in certain situations. For example, if a UE is connected to a certain network entity, SSBs associated with that network entity may be prioritised over SSBs associated with other network entities in the SSB selection process.
  • one or more thresholds may be configured, and switching may be permitted based on the thresholds.
  • UE may be configured with one or more thresholds associated with NCR and gNB SSBs and the one or more thresholds may be used to select between NCR SSB and gNB SSB.
  • a single threshold rsrp-ThresholdSSB may apply to both NCR and gNB, while in other examples independent thresholds rsrp-ThresholdSSB-NCR and rsrp-ThresholdSSB-gNB may apply to NCR and gNB, respectively.
  • the thresholds may be configurable (e.g. dynamically configurable).
  • a UE is configured with two thresholds.
  • UE may select an NCR SSB.
  • RSRP to gNB SSB is larger than rsrp-ThresholdSSB-gNB then UE may select a gNB SSB.
  • both NCR and gNB SSBs are above the respective threshold then UE may select any SSB.
  • UE may select the same SSB (group) as previously used/associated with.
  • UE may select any SSB.
  • UE may select an SSB that UE was associated with before triggering the random access procedure.
  • Figures 6A-D are flow diagrams of various exemplary methods for selecting an SSB according to the application of certain rules.
  • switching between gNB and NCR is not fully restricted, but rather switching is permitted, for example if the RSRP is much higher to a specific gNB or NCR.
  • UE is connected to NCR and the UE selects any NCR or gNB SSB at the last step.
  • the UE only selects gNB SSB.
  • the UE is connected to gNB and selects any NCR or gNB SSB at the last step.
  • the UE only selects NCR SSB.
  • the selection of SSBs may be performed based on rsrp-Threshold offsets instead of configuring full threshold(s) for the NCR or gNB SSBs.
  • the two thresholds rsrp-ThresholdSSB-NCR and rsrp-ThresholdSSB-gNB may be defined based on a single threshold rsrp-ThresholdSSB and respective offset values rsrp-OffsetSSB-NCR and rsrp-OffsetSSB-gNB.
  • this may be an offset with a value range of ⁇ -10, -8, ..., 0, 2, ...., 10 ⁇ , or any other suitable values, that is configured each of NCR and gNB.
  • the threshold rsrp-ThresholdSSB may be pre-configured, or may be signaled separately or together with the offset values.
  • the selection of an SSB may be based on UE selection of a network entity. For example, the selection of the NCR or gNB may be done before SSB selection.
  • Figure 7 is a flow diagram of an exemplary method for selecting an SSB based on a selection.
  • the UE first selects whether to perform random access to NCR or to gNB and then uses the appropriate rsrp threshold. In embodiments, this may be done through the Random Access Indication and Partitioning framework (also referred to as common RACH(Random Access Channel) framework). In embodiments, this may be done by the UE comparing the RSRP to a threshold to an SSB that is associated with NCR or gNB and then determining based upon this that NCR or gNB should be selected.
  • the Random Access Indication and Partitioning framework also referred to as common RACH(Random Access Channel) framework
  • an SSB is selected from among a first set (or group) of SSBs associated with a first network entity (e.g. NCR) and a second set (or group) of SSBs associated with a second network entity (e.g. gNB).
  • a first network entity e.g. NCR
  • a second set (or group) of SSBs associated with a second network entity e.g. gNB
  • an SSB may be selected from among a first set (or group) of SSBs (SSB set/group) and a second set (or group) of SSBs (SSB set/group), where the first and second sets of SSBs are not necessarily associated with particular network entities.
  • various techniques disclosed herein may be applied with this more general definition.
  • the UE is not allowed to switch SSBs in between Msg1 (preamble) attempts.
  • Msg1 preamble
  • the UE selects one SSB and continues to use the same SSB and selects preamble from that preamble group.
  • the UE does not switch between NCR and gNB once one SSB has been selected. This may be important, for example when performing idle mode random access.
  • Suitable exemplary techniques include one or more of the following, which may be used individually or in any suitable combination.
  • a list of preambles for each of gNB and NCR may be explicitly signalled.
  • the UE may deduce the gNB preambles, for example based on the number of SSBs, which the UE may be aware of.
  • the first NCR preamble only may be signalled.
  • the set of SSBs ⁇ 1,...,X-1 ⁇ may be gNB SSBs
  • the set of preambles ⁇ X,...,Y ⁇ may be NCR SSBS, where X is the first NCR preamble and Y is the total number of preambles.
  • ⁇ Differential signalling may be used. In this case, only indices in a previously shared list for those SSBs (preambles) whose allocation has changed may be signalled.
  • New system information or other dedicated signaling indicating a pre-configured split of preambles may be used.
  • FIG 8 is a block diagram of an exemplary network entity that may be used in examples of the disclosure.
  • a network entity may be implemented, for example, as a network element on a dedicated hardware, as a software instance running on a dedicated hardware, and/or as a virtualised function instantiated on an appropriate platform, e.g. on a cloud infrastructure.
  • the entity 800 comprises a processor (or controller) 801, a transmitter 803 and a receiver 805.
  • the receiver 805 is configured for receiving one or more messages from one or more other network entities, for example as described above.
  • the transmitter 803 is configured for transmitting one or more messages to one or more other network entities, for example as described above.
  • the processor 801 is configured for performing one or more operations, for example according to the operations as described above.
  • Figure 9 illustrates an example of a UE according to an embodiment of the disclosure.
  • the UE may include a transceiver 910, a memory 920, and a processor 930.
  • the transceiver 910, the memory 920, and the processor 930 of the UE may operate according to a communication method of the UE described above.
  • the components of the UE are not limited thereto.
  • the UE may include more or fewer components than those described above.
  • the processor 930, the transceiver 910, and the memory 920 may be implemented as a single chip.
  • the processor 930 may include at least one processor.
  • the UE of FIG. 9 corresponds to the UE of the other Figures.
  • the transceiver 910 collectively refers to a UE receiver and a UE transmitter, and may transmit/receive a signal to/from a base station or a network entity.
  • the signal transmitted or received to or from the base station or a network entity may include control information and data.
  • the transceiver 910 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal.
  • the transceiver 910 may receive and output, to the processor 930, a signal through a wireless channel, and transmit a signal output from the processor 930 through the wireless channel.
  • the memory 920 may store a program and data required for operations of the UE. Also, the memory 920 may store control information or data included in a signal obtained by the UE.
  • the memory 920 may be a storage medium, such as read-only memory (ROM), random access memory (RAM), a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
  • the processor 930 may control a series of processes such that the UE operates as described above.
  • the transceiver 910 may receive a data signal including a control signal transmitted by the base station or the network entity, and the processor 930 may determine a result of receiving the control signal and the data signal transmitted by the base station or the network entity.
  • Figure 10 illustrates an example of a base station according to an embodiment of the disclosure.
  • the base station may include a transceiver 1010, a memory 1020, and a processor 1030.
  • the transceiver 1010, the memory 1020, and the processor 1030 of the base station may operate according to a communication method of the base station described above.
  • the components of the base station are not limited thereto.
  • the base station may include more or fewer components than those described above.
  • the processor 1030, the transceiver 1010, and the memory 1020 may be implemented as a single chip.
  • the processor 1030 may include at least one processor.
  • the base station of FIG. 10 corresponds to a gNB or like.
  • the transceiver 1010 collectively refers to a base station receiver and a base station transmitter, and may transmit/receive a signal to/from a terminal (UE) or a network entity.
  • the signal transmitted or received to or from the terminal or a network entity may include control information and data.
  • the transceiver 1010 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal.
  • the transceiver 1010 may receive and output, to the processor 1030, a signal through a wireless channel, and transmit a signal output from the processor 1030 through the wireless channel.
  • the memory 1020 may store a program and data required for operations of the base station. Also, the memory 1020 may store control information or data included in a signal obtained by the base station.
  • the memory 1020 may be a storage medium, such as read-only memory (ROM), random access memory (RAM), a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
  • the processor 1030 may control a series of processes such that the base station operates as described above.
  • the transceiver 1010 may receive a data signal including a control signal transmitted by the terminal, and the processor 1030 may determine a result of receiving the control signal and the data signal transmitted by the terminal.
  • Such an apparatus and/or system may be configured to perform a method according to any aspect, embodiment, example or claim disclosed herein.
  • Such an apparatus may comprise one or more elements, for example one or more of receivers, transmitters, transceivers, processors, controllers, modules, units, and the like, each element configured to perform one or more corresponding processes, operations and/or method steps for implementing the techniques described herein.
  • an operation/function of X may be performed by a module configured to perform X (or an X-module).
  • the one or more elements may be implemented in the form of hardware, software, or any combination of hardware and software.
  • examples of the disclosure may be implemented in the form of hardware, software or any combination of hardware and software. Any such software may be stored in the form of volatile or non-volatile storage, for example a storage device like a ROM, whether erasable or rewritable or not, or in the form of memory such as, for example, RAM, memory chips, device or integrated circuits or on an optically or magnetically readable medium such as, for example, a CD, DVD, magnetic disk or magnetic tape or the like.
  • volatile or non-volatile storage for example a storage device like a ROM, whether erasable or rewritable or not
  • memory such as, for example, RAM, memory chips, device or integrated circuits or on an optically or magnetically readable medium such as, for example, a CD, DVD, magnetic disk or magnetic tape or the like.
  • the storage devices and storage media are embodiments of machine-readable storage that are suitable for storing a program or programs comprising instructions that, when executed, implement embodiments of the disclosure. Accordingly, embodiments provide a program comprising code for implementing a method, apparatus or system according to any example, embodiment, aspect and/or claim disclosed herein, and/or a machine-readable storage storing such a program. Still further, such programs may be conveyed electronically via any medium, for example a communication signal carried over a wired or wireless connection.
  • all operations and messages may be selectively performed or may be omitted.
  • the operations in each embodiment do not need to be performed sequentially, and the order of operations may vary.
  • Messages do not need to be transmitted in order, and the transmission order of messages may change.
  • Each operation and transfer of each message can be performed independently.
  • the user equipment can include any number of each component in any suitable arrangement.
  • the figures do not limit the scope of this disclosure to any particular configuration(s).
  • figures illustrate operational environments in which various user equipment features disclosed in this patent document can be used, these features can be used in any other suitable system.
  • the various illustrative logic blocks, modules, and circuits described in this application may be implemented or performed by a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logics, discrete hardware components, or any combination thereof designed to perform the functions described herein.
  • the general purpose processor may be a microprocessor, but in an alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
  • the processor may also be implemented as a combination of computing devices, such as a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors cooperating with a DSP core, or any other such configuration.
  • the steps of the method or algorithm described in this application may be embodied directly in hardware, in a software module executed by a processor, or in a combination thereof.
  • the software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, register, hard disk, removable disk, or any other form of storage medium known in the art.
  • a storage medium is coupled to a processor to enable the processor to read and write information from/to the storage media.
  • the storage medium may be integrated into the processor.
  • the processor and the storage medium may reside in an ASIC.
  • the ASIC may reside in a user terminal.
  • the processor and the storage medium may reside in the user terminal as discrete components.
  • the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, each function may be stored as one or more pieces of instructions or codes on a computer-readable medium or delivered through it.
  • the computer-readable medium includes both a computer storage medium and a communication medium, the latter including any medium that facilitates the transfer of computer programs from one place to another.
  • the storage medium may be any available medium that can be accessed by a general purpose or special purpose computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. A method, for a User Equipment (UE), for performing random access in a network is disclosed. The method comprises: selecting a Synchronisation Signal Block (SSB); and performing random access to a network entity based on the selected SSB, wherein the SSB is selected based on an SSB group to which the SSB belongs.

Description

METHOD AND APPARATUS FOR RANDOM ACCESS IN A WIRELESS COMMUNICATION SYSTEM
Embodiments of the present disclosure provide a technique for performing random access to a network. For example, embodiments of the disclosure provide a technique for performing random access to a 3rd Generation Partnership Project (3GPP) 5th Generation (5G) New Radio (NR) network including a Network Control Repeater (NCR).
5G mobile communication technologies define broad frequency bands such that high transmission rates and new services are possible, and can be implemented not only in “Sub 6GHz” bands such as 3.5GHz, but also in “Above 6GHz” bands referred to as mmWave including 28GHz and 39GHz. In addition, it has been considered to implement 6G mobile communication technologies (referred to as Beyond 5G systems) in terahertz (THz) bands (for example, 95GHz to 3THz bands) in order to accomplish transmission rates fifty times faster than 5G mobile communication technologies and ultra-low latencies one-tenth of 5G mobile communication technologies.
At the beginning of the development of 5G mobile communication technologies, in order to support services and to satisfy performance requirements in connection with enhanced Mobile BroadBand (eMBB), Ultra Reliable Low Latency Communications (URLLC), and massive Machine-Type Communications (mMTC), there has been ongoing standardization regarding beamforming and massive MIMO for mitigating radio-wave path loss and increasing radio-wave transmission distances in mmWave, supporting numerologies (for example, operating multiple subcarrier spacings) for efficiently utilizing mmWave resources and dynamic operation of slot formats, initial access technologies for supporting multi-beam transmission and broadbands, definition and operation of BWP (BandWidth Part), new channel coding methods such as a LDPC (Low Density Parity Check) code for large amount of data transmission and a polar code for highly reliable transmission of control information, L2 pre-processing, and network slicing for providing a dedicated network specialized to a specific service.
Currently, there are ongoing discussions regarding improvement and performance enhancement of initial 5G mobile communication technologies in view of services to be supported by 5G mobile communication technologies, and there has been physical layer standardization regarding technologies such as V2X (Vehicle-to-everything) for aiding driving determination by autonomous vehicles based on information regarding positions and states of vehicles transmitted by the vehicles and for enhancing user convenience, NR-U (New Radio Unlicensed) aimed at system operations conforming to various regulation-related requirements in unlicensed bands, NR UE Power Saving, Non-Terrestrial Network (NTN) which is UE-satellite direct communication for providing coverage in an area in which communication with terrestrial networks is unavailable, and positioning.
Moreover, there has been ongoing standardization in air interface architecture/protocol regarding technologies such as Industrial Internet of Things (IIoT) for supporting new services through interworking and convergence with other industries, IAB (Integrated Access and Backhaul) for providing a node for network service area expansion by supporting a wireless backhaul link and an access link in an integrated manner, mobility enhancement including conditional handover and DAPS (Dual Active Protocol Stack) handover, and two-step random access for simplifying random access procedures (2-step RACH for NR). There also has been ongoing standardization in system architecture/service regarding a 5G baseline architecture (for example, service based architecture or service based interface) for combining Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technologies, and Mobile Edge Computing (MEC) for receiving services based on UE positions.
As 5G mobile communication systems are commercialized, connected devices that have been exponentially increasing will be connected to communication networks, and it is accordingly expected that enhanced functions and performances of 5G mobile communication systems and integrated operations of connected devices will be necessary. To this end, new research is scheduled in connection with eXtended Reality (XR) for efficiently supporting AR (Augmented Reality), VR (Virtual Reality), MR (Mixed Reality) and the like, 5G performance improvement and complexity reduction by utilizing Artificial Intelligence (AI) and Machine Learning (ML), AI service support, metaverse service support, and drone communication.
Furthermore, such development of 5G mobile communication systems will serve as a basis for developing not only new waveforms for providing coverage in terahertz bands of 6G mobile communication technologies, multi-antenna transmission technologies such as Full Dimensional MIMO (FD-MIMO), array antennas and large-scale antennas, metamaterial-based lenses and antennas for improving coverage of terahertz band signals, high-dimensional space multiplexing technology using OAM (Orbital Angular Momentum), and RIS (Reconfigurable Intelligent Surface), but also full-duplex technology for increasing frequency efficiency of 6G mobile communication technologies and improving system networks, AI-based communication technology for implementing system optimization by utilizing satellites and AI (Artificial Intelligence) from the design stage and internalizing end-to-end AI support functions, and next-generation distributed computing technology for implementing services at levels of complexity exceeding the limit of UE operation capability by utilizing ultra-high-performance communication and computing resources.
Random access is a procedure that allows a User Equipment (UE) to make an unscheduled connection to a network. Random access may be triggered by a number of situations, for example initial UE access to the network, handover, reconnection following connection failure, etc.
Figure 1A illustrates a typical random access procedure in which a UE connects to a base station (e.g. eNB or gNB). For example, the procedure in Figure 1A is used in Long Term Evolution (LTE). In a first step 101, the UE selects resources (e.g. time and frequency resources) for performing random access. Then, the UE(100) and eNB(105) exchange a sequence of four messages. The first message (Msg1: preamble/PRACH) transmitted from UE(100) to eNB(105) includes a preamble selected from a set of (e.g. 64) orthogonal preambles. The second message (Msg2: Random Access Response (RAR)) transmitted from eNB(105) to UE(100) is a response to Msg1 and includes timing advance information to correct the timing of the UE(100), and an uplink grant for the third message. The third message (Msg3) transmitted from UE(100) to eNB(105) over Physical Uplink Shared CHannel (PUSCH) includes a (scheduled) first Radio Resource Control (RRC) message (e.g. RRCSetupRequest, RRCResumeRequest, RRCReestablishmentRequest, RRCReconfigurationComplete, etc. depending on the situation) and may also contain user plane data. The fourth message (Msg4) transmitted from eNB(105) to UE(100) over Physical Downlink Shared CHannel (PDSCH) includes a second RRC message in response to the first RRC message (e.g. RRCSetup, RRCResume, etc.) and includes a contention resolution Medium Access Control (MAC) Control Element (CE). The fourth message is sent in the case of Contention-Based Random Access (CBRA) but not in the case of Contention-Free Random Access (CFRA).
Figure 1B illustrates an alternative random access procedure adopted in 3GPP Release 16 in which the four-step procedure of Figure 1A is reduced to two steps by combining messages. In a first step, the UE(100) selects resources for performing random access. Then, the UE(100) and gNB(110) exchange a sequence of two messages. The first message (MsgA) transmitted from UE(100) to gNB(110) corresponds to a combination of Msg1 and Msg3 of Figure 1A and includes a preamble, and a first RRC message or user plane data. The second message (MsgB) transmitted from gNB(110) to UE(100) corresponds to a combination of Msg2 and Msg4 of Figure 1A and includes timing advance information and contention resolution information.
As noted above, in Figures 1A and 1B, before the messages are sent, the UE(100) needs to select the correct random access resources, comprising PRACH (Physical Random Access CHannel) resources in time and frequency as well as a specific preamble. These selections may be made according to a variety of techniques, including the following.
● Supplementary UpLink (SUL) vs Normal UpLink (NUL), which may include comparing a Reference Signal Received Power (RSRP) with the cell with a threshold, rsrp-ThresholdSSB-SUL.
● Bandwidth Part (BWP) selection.
● 2-step vs 4-step, which may be preamble divided or entirely separate PRACH resources.
● Msg3 repetitions, in which the UE selects a specific preamble to signal that it is capable of performing Msg3 repetitions and that it may be needed for coverage purposes.
● CBRA vs CFRA, wherein if the UE is configured with CFRA but the RSRP is low, the UE may instead select the configured CBRA resources.
● Synchronization Signal Block (SSB) selection
● Random access group A/B, in which if the UE has good coverage and a large Msg3 payload, it can signal through preambles that it needs a larger Msg3 payload.
The random access procedure may be triggered by a number of events, for example as described in 3GPP 38.300, V17.2.0, Clause 9.2.6:
- Initial access from RRC_IDLE;
- RRC Connection Re-establishment procedure;
- DL or UL data arrival, during RRC_CONNECTED or during RRC_INACTIVE while SDT procedure (see clause 18.0) is ongoing, when UL synchronisation status is "non-synchronised";
- UL data arrival, during RRC_CONNECTED or during RRC_INACTIVE while SDT procedure is ongoing, when there are no PUCCH resources for SR(Scheduling Request) available;
- SR failure;
- Request by RRC upon synchronous reconfiguration (e.g. handover);
- RRC Connection Resume procedure from RRC_INACTIVE;
- To establish time alignment for a secondary TAG(Timing Advance Group);
- Request for Other SI(System Information) (see clause 7.3);
- Beam failure recovery;
- Consistent UL LBT failure on SpCell;
- SDT(Small Data Transmission) in RRC_INACTIVE (see clause 18);
- Positioning purpose during RRC_CONNECTED requiring random access procedure, e.g., when timing advance is needed for UE positioning.
In order to provide enhanced network coverage, a variety of different types of network nodes have been developed. For example, a Radio Frequency (RF) repeater may be deployed to amplify and forward any signal that it receives to supplement coverage provided by a regular cell. An enhanced type of repeater node, called a Network-Controlled Repeater (NCR), is currently under development and is a Release 18 Study Item/Work Item (3GPP RP-213700).
Figure 2 illustrates the network architecture of NCR communication. As shown, the NCR(220) receives and forwards signals from gNB(210) to UE(200) via an NCR-Fwd(Forward) link. The NCR(220) also receives control signals from gNB(210) via a NCR-Mobile Termination (MT) link, which are used to configure the NCR(220). Once configured, the NCR(220) provides an amplify-and-forward function that is transparent to the UE(200). Accordingly, gNB(210) may communicate with UE(200) directly or through an NCR(220).
A 5G NR(New Radio) base station provides multi-beam operation in which the base station may transmit a signal through a relatively narrow beam (in the spatial domain) steered in a particular direction (directional transmission). The base station may transmit a signal through two or more such beams steered in respective different directions (see Figure 3). Each beam may be identified by a beam index (e.g. SSB index). It is intended that an NCR(320) deployed in a 5G NR network is also capable of directional transmission via beamforming.
A UE(300) may detect signals transmitted through the different beams. Due to factors including the relative locations of the UE(300) and base station, and the different steering directions of the beams, the UE(300) typically detects the signals with different signal strengths/power, with beams steered towards the UE(300) typically being received with the highest signal strength/power.
The beam-based concept for 5G NR may be used in the random access procedure. A UE(300) may measure different SSBs of a cell, and during the random access procedure the UE(300) will select one SSB and a preamble that is associated with that specific SSB. When the network receives a preamble, the network will thus be aware of which SSB that the UE(300) is attempting to connect through.
When an NCR(320) is deployed, to make the NCR(320) transparent to the UE(300) for the random access procedure, the gNB(310) may allocate a set of SSB indices to the NCR(320) when the NCR(320) registers to the network, for example as described in 3GPP R1-2203741, Section 5. This procedure is illustrated in Figure 3, in which SSB indices 9 and 10 are allocated to the NCR(320) while other SSB indices 1-8 remain with gNB(310). The UE(300) may then perform the random access procedure via SSBs transmitted via SSB indices allocated to the NCR(320) as though the random access procedure was performed via the gNB(310). As illustrated in Figure 3, the UE(300) may measure and perform random access to a beam originating from a different location compared to the gNB(310).
The above information is presented as background information only to assist with an understanding of the disclosure. No determination has been made, and no assertion is made, as to whether any of the above might be applicable as prior art with regard to the present invention.
It is an aim of embodiments of the disclosure to address, solve and/or mitigate, at least partly, at least one of the problems and/or disadvantages associated with the related art, for example at least one of the problems and/or disadvantages described herein. It is an aim of embodiments of the disclosure to provide at least one advantage over the related art, for example at least one of the advantages described herein.
The present invention is defined in the independent claims. Advantageous features are defined in the dependent claims.
Embodiments or examples disclosed in the description and/or figures falling outside the scope of the claims are to be understood as examples useful for understanding the present invention.
Other aspects, advantages and salient features of the invention will become apparent to those skilled in the art from the following detailed description taken in conjunction with the accompanying drawings.
Aspects of the disclosure are to address at least the above-mentioned problems and/or disadvantages and to provide at least the advantages described below. Accordingly, an aspect of the disclosure is to provide efficient communication methods in a wireless communication system.
Figures 1A and 1B illustrate examples of a random access procedure;
Figure 2 illustrates the network architecture of NCR communication;
Figure 3 illustrates a technique in which gNB allocate a set of SSB indices to an NCR for a random access procedure;
Figure 4 illustrates an example of a UE selecting an NCR-associated SSB during a random access event;
Figure 5 is a flow diagram of a method for performing a random access procedure;
Figures 6A-D and 7 are flow diagrams of various methods for selecting an SSB; and
Figure 8 is a block diagram of an exemplary network entity that may be used in embodiments of the disclosure.
Figure 9 illustrates an example of a UE according to an embodiment.
Figure 10 illustrates an example of a base station according to an embodiment.
Aspects of the disclosure are to address at least the above-mentioned problems and/or disadvantages and to provide at least the advantages described below. Accordingly, an aspect of the disclosure is to provide a terminal and a communication method thereof in a wireless communication system.
The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of various embodiments of the disclosure as defined by the claims and their equivalents. It includes various specific details to assist in that understanding but these are to be regarded as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the various embodiments described herein can be made without departing from the scope and spirit of the disclosure. In addition, descriptions of well-known functions and constructions may be omitted for clarity and conciseness.
The terms and words used in the following description and claims are not limited to their bibliographical meanings, but, are merely used by the inventor to enable a clear and consistent understanding of the disclosure. Accordingly, it should be apparent to those skilled in the art that the following description of various embodiments of the disclosure is provided for illustration purpose only and not for the purpose of limiting the disclosure as defined by the appended claims and their equivalents.
It is to be understood that the singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to “a component surface” includes reference to one or more of such surfaces.
It should be understood that “first”, “second” and similar words used in the disclosure do not express any order, quantity or importance, but are only used to distinguish different components.
As used herein, any reference to “an example” or “example”, “an implementation” or “implementation”, “an embodiment” or “embodiment” means that particular elements, features, structures or characteristics described in connection with the embodiment is included in at least one embodiment. The phrases “in one embodiment” or “in one example” appearing in different places in the specification do not necessarily refer to the same embodiment.
As used herein, “a portion of” something means “at least some of” the thing, and as such may mean less than all of, or all of, the thing. As such, “a portion of” a thing includes the entire thing as a special case, i.e., the entire thing is an example of a portion of the thing.
As used herein, the term “set” means one or more. Accordingly, a set of items can be a single item or a collection of two or more items.
In this disclosure, to determine whether a specific condition is satisfied or fulfilled, expressions, such as “greater than” or “less than” are used by way of example and expressions, such as “greater than or equal to” or “less than or equal to” are also applicable and not excluded. For example, a condition defined with “greater than or equal to” may be replaced by “greater than” (or vice-versa), a condition defined with “less than or equal to” may be replaced by “less than” (or vice-versa), etc.
It will be further understood that similar words such as the term “include” or “comprise” mean that elements or objects appearing before the word encompass the listed elements or objects appearing after the word and their equivalents, but other elements or objects are not excluded. Similar words such as “connect” or “connected” are not limited to physical or mechanical connection, but can include electrical connection, whether direct or indirect. “Upper”, “lower”, “left” and “right” are only used to express a relative positional relationship, and when an absolute position of the described object changes, the relative positional relationship may change accordingly.
Those skilled in the art will understand that the principles of the disclosure can be implemented in any suitably arranged wireless communication system. For example, although the following detailed description of the embodiments of the disclosure will be directed to LTE and/or 5G communication systems, those skilled in the art will understand that the main points of the disclosure can also be applied to other communication systems with similar technical backgrounds and channel formats with slight modifications without departing from the scope of the disclosure. The technical schemes of the embodiments of the application can be applied to various communication systems, and for example, the communication systems may include global systems for mobile communications (GSM), code division multiple access (CDMA) systems, wideband code division multiple access (WCDMA) systems, general packet radio service (GPRS) systems, long term evolution (LTE) systems, LTE frequency division duplex (FDD) systems, LTE time division duplex (TDD) systems, universal mobile telecommunications system (UMTS), worldwide interoperability for microwave access (WiMAX) communication systems, 5th generation (5G) systems or new radio (NR) systems, etc. In addition, the technical schemes of the embodiments of the application can be applied to future-oriented communication technologies. In addition, the technical schemes of the embodiments of the application can be applied to future-oriented communication technologies.
In order to meet the increasing demand for wireless data communication services since the deployment of 4G communication systems, efforts have been made to develop improved 5G or pre-5G communication systems. Therefore, 5G or pre-5G communication systems are also called “Beyond 4G networks” or “Post-LTE systems”.
The following description of examples of the disclosure, with reference to the accompanying drawings, is provided to assist in a comprehensive understanding of the present invention, as defined by the claims. The description includes various specific details to assist in that understanding but these are to be regarded as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the examples described herein can be made without departing from the scope of the invention.
The same or similar components may be designated by the same or similar reference numerals, although they may be illustrated in different drawings.
Detailed descriptions of techniques, structures, constructions, functions or processes known in the art may be omitted for clarity and conciseness, and to avoid obscuring the subject matter of the present invention.
The terms and words used herein are not limited to the bibliographical or standard meanings, but, are merely used to enable a clear and consistent understanding of the invention.
Throughout the description and claims of this specification, the words “comprise”, “include” and “contain” and variations of the words, for example “comprising” and “comprises”, means “including but not limited to”, and is not intended to (and does not) exclude other features, elements, components, integers, steps, processes, operations, functions, characteristics, properties and/or groups thereof.
Throughout the description and claims of this specification, the singular form, for example “a”, “an” and “the”, encompasses the plural unless the context otherwise requires. For example, reference to “an object” includes reference to one or more of such objects. Throughout the description and claims of this specification, language in the general form of “X for Y” (where Y is some action, process, operation, function, activity or step and X is some means for carrying out that action, process, operation, function, activity or step) encompasses means X adapted, configured or arranged specifically, but not necessarily exclusively, to do Y.
Features, elements, components, integers, steps, processes, operations, functions, characteristics, properties and/or groups thereof described or disclosed in conjunction with a particular aspect, embodiment, example or claim are to be understood to be applicable to any other aspect, embodiment, example or claim described herein unless incompatible therewith.
The skilled person will appreciate that the techniques described herein may be used in any suitable combination.
Embodiments of the disclosure provide methods, apparatus and systems for performing random access to a network. For example, embodiments of the disclosure provide methods, apparatus and systems for performing random access to a 3GPP 5G NR network including an NCR. However, the skilled person will appreciate that the present invention is not limited to these examples, and may be applied in any suitable system or standard, for example one or more existing and/or future generation wireless communication systems or standards, including any existing or future releases of the same standards specification, for example 3GPP 5G.
The following examples are applicable to, and use terminology associated with, 3GPP 5G. However, the skilled person will appreciate that the techniques disclosed herein are not limited to 3GPP 5G. For example, the functionality of the various network entities and other features disclosed herein may be applied to corresponding or equivalent entities or features in other communication systems or standards. Corresponding or equivalent entities or features may be regarded as entities or features that perform the same or similar role, function or purpose within the network.
A particular network entity may be implemented as a network element on a dedicated hardware, as a software instance running on a dedicated hardware, and/or as a virtualised function instantiated on an appropriate platform, e.g. on a cloud infrastructure.
Embodiments of the disclosure may be provided in the form of an apparatus/device/network entity configured to perform one or more defined network functions and/or a method therefor. Embodiments of the disclosure may be provided in the form of a system (e.g. network or wireless communication system) comprising one or more such apparatuses/devices/network entities, and/or a method therefor.
At least the following problem exist in view of the related art:
While an NCR can be deployed without expected impact to a UE through appropriate SSB-layouts, some problem may arise. For example, one problem is that a control link is needed between the NCR and the gNB(5G NR Base Station) in order to control the NCR transmissions. Therefore, when a UE connects to an NCR rather than a gNB, the NCR-MT and NCR-Fwd components may need to be activated.
In a random access procedure, the selection of an SSB can be rather dynamic. For example, the following is described in 3GPP TS(Technical Specification) 38.321, Clause 5.1.2, in relation to how an SSB is selected (emphasis added):
1> else (i.e. for the contention-based Random Access preamble selection):
2> if at least one of the SSBs with SS-RSRP above rsrp-ThresholdSSB is available:
3> select an SSB with SS-RSRP above rsrp-ThresholdSSB.
2> else:
3> select any SSB.
Thus, how a UE selects a specific SSB is not always specified if there are multiple SSBs that are above the rsrp-ThresholdSSB. For example, this may cause problems if selecting an SSB actually results in selecting a different access point (e.g. NCR vs gNB) very dynamically.
As noted above, random access is performed in many different cases. For example, some cases involve radio-related failures and some involve synchronization issues. During a failure when communicating with a gNB(410), the UE(400) might select an SSB associated with an NCR(420). However, due inactivity of the NCR(420), the NCR(420) might not be activated rapidly and therefore a quick response might not be possible. This problem may be especially acute in the case of non-initial random access, such as for Beam Failure Recovery (BFR) and similar. One example of this problem is illustrated in Figure 4.
Accordingly, what is required is one or more techniques for selecting an SSB when performing random access that avoid certain problems associated with the related art, for example the problems discussed above. Embodiments of the disclosure provide one or more techniques for selecting an SSB that aims to restrict a UE from dynamically switching between gNB and NCR.
Herein, NCR and gNB may be referred to as different network elements, entities and/or nodes. The skilled person will appreciate that the techniques described herein may be applied to network elements, entities and/or nodes other than NCR and gNB.
Embodiments of the disclosure provide a method, for a User Equipment (UE), for performing random access in a network, the method comprising: selecting a Synchronisation Signal Block (SSB); and performing random access to a network entity based on the selected SSB, wherein the SSB is selected based on an SSB group to which the SSB belongs.
In embodiments, a plurality of SSB groups may be configured including a first SSB group and one or more second SSB groups.
In embodiments, the first SSB group may be associated with a first network entity (e.g. gNB), and the one or more second SSB groups may be associated with one or more second network entities (e.g. NCR).
In embodiments, the method may further comprise determining a network entity to which the UE is, or was, connected, wherein the first SSB group may be associated with the determined network entity.
In embodiments, the method may further comprise receiving, by the UE from the network, when the UE is in connected mode, information (e.g. a flag, system information, dedicated signalling and/or broadcast signal) indicating to which network entity, or through which SSB group, the UE is connected.
In embodiments, the SSB may be selected from the first SSB group.
In embodiments, the method may further comprise selecting, by the UE, one of the first SSB group and the second SSB group.
In embodiments, if the first SSB group is selected, the SSB may be selected from the first SSB group, and if the second SSB group is selected, the SSB may be selected from the second SSB group.
In embodiments, the SSB may be selected based on a first condition and/or a second condition, wherein the first condition may comprise: the first SSB group includes an SSB for which the Reference Signal Received Power (RSRP) for the SSB exceeds a first threshold, and wherein the second condition may comprise: the second SSB group includes an SSB for which the RSRP for the SSB exceeds a second threshold.
In embodiments, the first threshold and/or the second threshold may be dynamically configurable.
In embodiments, the SSB may be selected based on one or more of: if the first condition is satisfied, the SSB may be selected from the first SSB group; if the first condition is not satisfied and the second condition is satisfied, the SSB may be selected from the second SSB group; if the first condition is not satisfied and the second condition is not satisfied, the SSB may be selected from the first SSB group and/or the second SSB group; and if both the first condition and the second condition are satisfied, the SSB may be selected from the SSB group through which the UE is currently connected or was previously connected.
In embodiments, the SSB may be selected based on one or more of: when the first condition is satisfied and the SSB is selected from the first SSB group, the SSB may be selected from among SSBs of the first SSB group for which the first threshold is exceeded; when the second condition is satisfied and the SSB is selected from the second SSB group, the SSB may be selected from among SSBs of the second SSB group for which the second threshold is exceeded; when the first condition is not satisfied and the SSB is selected from the first SSB group, the SSB may be selected from among any SSBs of the first SSB group; when the second condition is not satisfied and the SSB is selected from the second SSB group, the SSB may be selected from among any SSBs of the second SSB group; and when both the first condition and the second condition are satisfied, the SSB through which the UE is currently connected or was previously connected may be selected as the SSB.
In embodiments, the method may further comprise receiving signalling for determining which SSBs belong to the first and second SSB groups.
In embodiments, performing random access based on the selected SSB may comprise: attempting random access a first time based on the selected SSB; and attempting random access a second time based on the same selected SSB.
In embodiments, performing random access based on the selected SSB may comprise: attempting random access a first time based on the selected SSB; and attempting random access a second time based on an SSB belonging to the same SSB group as the selected SSB.
In embodiments, the method may further comprise: triggering the random access based on occurrence of an event; and selecting a scheme for selecting the SSB based on the type of event that triggers the random access.
In embodiments, the type of event may include one or more of: initial access from RRC_IDLE; RRC Connection Re-establishment procedure; DL(Down Link) and/or UL(Uplink) data arrival; SR failure; request by RRC upon synchronous reconfiguration; RRC Connection Resume procedure from RRC_INACTIVE; establishment of time alignment for a secondary TAG; request for Other SI; beam failure recovery; consistent UL LBT(Listen Before Talk) failure on SpCell; SDT in RRC_INACTIVE; and positioning purpose during RRC_CONNECTED.
In embodiments, performing random access based on the selected SSB may comprise: selecting a preamble based on the selected SSB; and performing random access using the selected preamble.
Embodiments of the disclosure provide an apparatus (e.g. a UE) for performing random access in a network, the apparatus comprising a transceiver and a processor coupled with the transceiver, and the processor configured to: perform a method according to any aspect, example, claim or embodiment disclosed herein. The processor configured to select a Synchronisation Signal Block (SSB), and perform random access to a network entity based on the selected SSB. The SSB is selected based on an SSB group to which the SSB belongs.
Embodiments of the disclosure provide a network (or wireless communication system) comprising an apparatus according to any aspect, example, claim or embodiment disclosed herein.
Embodiments of the disclosure provide a computer program comprising instructions which, when the program is executed by a computer or processor, cause the computer or processor to carry out a method according to any aspect, example, claim or embodiment disclosed herein.
Embodiments of the disclosure provide a computer or processor-readable data carrier having stored thereon a computer program according to any aspect, example, claim or embodiment disclosed herein.
Figure 5 is a flowchart of a method for performing a random access procedure. For example, the method of Figure 5 may be applied in a network configurations illustrated in any of Figures 1-4. In a first step 501, the UE triggers random access. Any suitable trigger may be used in various examples of the disclosure. Various non-limiting examples are described above. In a next step 503, the UE selects an SSB. For example, the UE may select an SSB from among a first set of SSBs (e.g. gNB SSBs) and a second set of SSBs (e.g. NCR SSBs). Various non-limiting examples of rules for selecting the SSB are described further below. Although not shown in Figure 5, the UE may perform a step of selecting a preamble from a preamble group associated with the selected SSB. In a next step 505, the UE performs random access based on the selected SSB (e.g. using the selected preamble).
In embodiments, the particular rule(s) used to select the SSB (e.g. select between gNB SSBs and NCR SSBs) in step 503 may depend on the type of event that triggered the random access.
For example, for initial access or random access triggered by beam failure, one or more rules may be applied to select an SSB with no or relatively few restrictions, for example to allow the UE to perform random access to an NCR node from RRC_IDLE, rather than being restricted from accessing the NCR in favour of the gNB.
For example, for random access triggered by SR failure or random access used for positioning purposes, one or more rules, for example one or more rules disclosed herein, may be applied to select an SSB with more restrictions. For SR failure, this may be important to prevent the UE from suddenly “disappearing” from a gNB to an NCR or the other way around, where, for example, the failure might be due to congestion in the network rather than related to failures of the Scheduling Request.
For example, for random access triggered by one or more other types of events, one or more other rules may be applied, for example one or more rules disclosed herein with one or more modifications. Such modification may include changes to the SSB selection thresholds, for example so that another NCR beam is only selected following NCR beam failure if the quality is higher than nominally expected.
The following disclose various exemplary rules for selecting an SSB. The skilled person will appreciate that these rules, as well as any other techniques disclosed herein, may be used in any suitable combinations.
In embodiments, the UE may determine a network entity (e.g. NCR or gNB) and may select an SSB in consideration of the determined network entity. In embodiments, the determination may be made based on which network entity the UE is, or has been, connected to. In other examples, the determination may be made based on a selection by the UE.
In embodiments, the UE may determine whether it is connected to an NCR or gNB. For example, this determination may be made in advance of a random access procedure. The UE may select an SSB based on a result of the determination. For example, the UE may select an SSB such that the UE does not switch connection from a current network node to a different network node (e.g. from an NCR to a gNB, or the other way around). The relevant information for allowing the UE to make the determination could be indicated by the network to the UE, for example through system information, or any dedicated signaling. In embodiments, the information may be indicated only when a UE is connected to an NCR node. In embodiments, the information may be implicit. For example, the information may be deduced based on information obtained by the UE indicating which SSB the UE is connected to. For example, the UE may save the SSB-index used by the UE to perform initial access and/or subsequent access.
In embodiments, one or more of the following rules may be applied in order to restrict or improve the dynamic movement between a gNB and an NCR SSB. In the following examples, different levels of restrictions may be applied. For example, one or more rules imposing a “hard” restriction” may be applied. Alternatively, one or more rules may be applied imposing a “soft” restriction.
According to an exemplary “hard” restriction, a UE should remain on an SSB that is associated with either the gNB or the NCR and not switch between if random access is triggered. In this case, the network may signal and configure certain SSBs that are associated with the gNB and certain SSBs that are associated with the NCR. For example, this may be possible for UEs in connected mode or inactive mode (RRC_INACTIVE) that are aware of whether they are connected to a gNB or an NCR.
The following is an example of a procedure applying a hard restriction.
1. UE is configured with information regarding a first set of SSBs associated with NCR and a second set of SSBs associated with gNB, so that the UE knows which SSBs are associated with NCR and which SSBs are associated with gNB
2. UE triggers random access
3. UE selects from SSBs associated with NCR (first set) and SSBs associated with gNB (second set) according to the following rules:
a. If UE is connected to gNB -> select gNB SSB
b. If UE is connected to NCR -> select NCR SSB
4. UE performs random access to gNB or NCR according to the selection
According to an exemplary “soft” restriction, a UE should preferably remain on an SSB that is associated with either the gNB or the NCR and not switch between if random access is triggered, but some switching may be allowed in certain situations. For example, if a UE is connected to a certain network entity, SSBs associated with that network entity may be prioritised over SSBs associated with other network entities in the SSB selection process.
In embodiments, one or more thresholds may be configured, and switching may be permitted based on the thresholds. For example, UE may be configured with one or more thresholds associated with NCR and gNB SSBs and the one or more thresholds may be used to select between NCR SSB and gNB SSB. In some examples, a single threshold rsrp-ThresholdSSB may apply to both NCR and gNB, while in other examples independent thresholds rsrp-ThresholdSSB-NCR and rsrp-ThresholdSSB-gNB may apply to NCR and gNB, respectively. In embodiments the thresholds may be configurable (e.g. dynamically configurable).
Various examples will now be described in which a UE is configured with two thresholds. According to an exemplary rule, if the RSRP to NCR SSB is larger than rsrp-ThresholdSSB-NCR then UE may select an NCR SSB. According to another exemplary rule, if RSRP to gNB SSB is larger than rsrp-ThresholdSSB-gNB then UE may select a gNB SSB. According to another exemplary rule, if both NCR and gNB SSBs are above the respective threshold then UE may select any SSB. According to another exemplary rule, if both NCR and gNB SSBs are above the respective threshold then UE may select the same SSB (group) as previously used/associated with. According to another exemplary rule, if none of NCR and gNB SSBs are above the respective threshold then UE may select any SSB. In embodiments, when permitted, UE may select an SSB that UE was associated with before triggering the random access procedure.
The above rules may be applied in any suitable combination and may be applied in combination with any other suitable alternative and/or additional rules. Figures 6A-D are flow diagrams of various exemplary methods for selecting an SSB according to the application of certain rules.
According to the above rules, switching between gNB and NCR is not fully restricted, but rather switching is permitted, for example if the RSRP is much higher to a specific gNB or NCR. For example, in Figure 6A, UE is connected to NCR and the UE selects any NCR or gNB SSB at the last step. In Figure 6B, the UE only selects gNB SSB. In Figure 6C, the UE is connected to gNB and selects any NCR or gNB SSB at the last step. In Figure 6D, the UE only selects NCR SSB.
In certain example, the selection of SSBs may be performed based on rsrp-Threshold offsets instead of configuring full threshold(s) for the NCR or gNB SSBs. In particular, the two thresholds rsrp-ThresholdSSB-NCR and rsrp-ThresholdSSB-gNB may be defined based on a single threshold rsrp-ThresholdSSB and respective offset values rsrp-OffsetSSB-NCR and rsrp-OffsetSSB-gNB. For example, this may be an offset with a value range of {-10, -8, …, 0, 2, …., 10}, or any other suitable values, that is configured each of NCR and gNB. For example, the threshold rsrp-ThresholdSSB may be pre-configured, or may be signaled separately or together with the offset values.
In embodiments, the selection of an SSB may be based on UE selection of a network entity. For example, the selection of the NCR or gNB may be done before SSB selection.
Figure 7 is a flow diagram of an exemplary method for selecting an SSB based on a selection. In this example, the UE first selects whether to perform random access to NCR or to gNB and then uses the appropriate rsrp threshold. In embodiments, this may be done through the Random Access Indication and Partitioning framework (also referred to as common RACH(Random Access Channel) framework). In embodiments, this may be done by the UE comparing the RSRP to a threshold to an SSB that is associated with NCR or gNB and then determining based upon this that NCR or gNB should be selected.
Herein, various examples are described in which an SSB is selected from among a first set (or group) of SSBs associated with a first network entity (e.g. NCR) and a second set (or group) of SSBs associated with a second network entity (e.g. gNB). The skilled person will appreciate that the disclosure is not limited to these examples. For example, more generally, an SSB may be selected from among a first set (or group) of SSBs (SSB set/group) and a second set (or group) of SSBs (SSB set/group), where the first and second sets of SSBs are not necessarily associated with particular network entities. The skilled person will appreciate that various techniques disclosed herein may be applied with this more general definition.
In embodiments, the UE is not allowed to switch SSBs in between Msg1 (preamble) attempts. Thus, when the UE performs random access, it selects one SSB and continues to use the same SSB and selects preamble from that preamble group. According to this technique, the UE does not switch between NCR and gNB once one SSB has been selected. This may be important, for example when performing idle mode random access.
Any suitable technique may be applied to signal to, or inform, the UE which SSBs belong to NCR and gNB. Suitable exemplary techniques include one or more of the following, which may be used individually or in any suitable combination.
● A list of preambles for each of gNB and NCR may be explicitly signalled.
● Only a list of preambles for NCR may be signalled. In this case, the UE may deduce the gNB preambles, for example based on the number of SSBs, which the UE may be aware of.
● The first NCR preamble only may be signalled. In this case, the set of SSBs {1,…,X-1} may be gNB SSBs, while the set of preambles {X,…,Y} may be NCR SSBS, where X is the first NCR preamble and Y is the total number of preambles.
● Differential signalling may be used. In this case, only indices in a previously shared list for those SSBs (preambles) whose allocation has changed may be signalled.
● New system information or other dedicated signaling indicating a pre-configured split of preambles (SSBs) may be used.
Figure 8 is a block diagram of an exemplary network entity that may be used in examples of the disclosure. The skilled person will appreciate that a network entity may be implemented, for example, as a network element on a dedicated hardware, as a software instance running on a dedicated hardware, and/or as a virtualised function instantiated on an appropriate platform, e.g. on a cloud infrastructure.
The entity 800 comprises a processor (or controller) 801, a transmitter 803 and a receiver 805. The receiver 805 is configured for receiving one or more messages from one or more other network entities, for example as described above. The transmitter 803 is configured for transmitting one or more messages to one or more other network entities, for example as described above. The processor 801 is configured for performing one or more operations, for example according to the operations as described above.
Figure 9 illustrates an example of a UE according to an embodiment of the disclosure.
As shown in FIG. 9, the UE according to an embodiment may include a transceiver 910, a memory 920, and a processor 930. The transceiver 910, the memory 920, and the processor 930 of the UE may operate according to a communication method of the UE described above. However, the components of the UE are not limited thereto. For example, the UE may include more or fewer components than those described above. In addition, the processor 930, the transceiver 910, and the memory 920 may be implemented as a single chip. Also, the processor 930 may include at least one processor. Furthermore, the UE of FIG. 9 corresponds to the UE of the other Figures.
The transceiver 910 collectively refers to a UE receiver and a UE transmitter, and may transmit/receive a signal to/from a base station or a network entity. The signal transmitted or received to or from the base station or a network entity may include control information and data. The transceiver 910 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal. However, this is only an example of the transceiver 910 and components of the transceiver 910 are not limited to the RF transmitter and the RF receiver.
Also, the transceiver 910 may receive and output, to the processor 930, a signal through a wireless channel, and transmit a signal output from the processor 930 through the wireless channel.
The memory 920 may store a program and data required for operations of the UE. Also, the memory 920 may store control information or data included in a signal obtained by the UE. The memory 920 may be a storage medium, such as read-only memory (ROM), random access memory (RAM), a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
The processor 930 may control a series of processes such that the UE operates as described above. For example, the transceiver 910 may receive a data signal including a control signal transmitted by the base station or the network entity, and the processor 930 may determine a result of receiving the control signal and the data signal transmitted by the base station or the network entity.
Figure 10 illustrates an example of a base station according to an embodiment of the disclosure.
As shown in FIG. 10, the base station according to an embodiment may include a transceiver 1010, a memory 1020, and a processor 1030. The transceiver 1010, the memory 1020, and the processor 1030 of the base station may operate according to a communication method of the base station described above. However, the components of the base station are not limited thereto. For example, the base station may include more or fewer components than those described above. In addition, the processor 1030, the transceiver 1010, and the memory 1020 may be implemented as a single chip. Also, the processor 1030 may include at least one processor. Furthermore, the base station of FIG. 10 corresponds to a gNB or like.
The transceiver 1010 collectively refers to a base station receiver and a base station transmitter, and may transmit/receive a signal to/from a terminal (UE) or a network entity. The signal transmitted or received to or from the terminal or a network entity may include control information and data. The transceiver 1010 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal. However, this is only an example of the transceiver 1010 and components of the transceiver 1010 are not limited to the RF transmitter and the RF receiver.
Also, the transceiver 1010 may receive and output, to the processor 1030, a signal through a wireless channel, and transmit a signal output from the processor 1030 through the wireless channel.
The memory 1020 may store a program and data required for operations of the base station. Also, the memory 1020 may store control information or data included in a signal obtained by the base station. The memory 1020 may be a storage medium, such as read-only memory (ROM), random access memory (RAM), a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
The processor 1030 may control a series of processes such that the base station operates as described above. For example, the transceiver 1010 may receive a data signal including a control signal transmitted by the terminal, and the processor 1030 may determine a result of receiving the control signal and the data signal transmitted by the terminal.
The techniques described herein may be implemented using any suitably configured apparatus and/or system. Such an apparatus and/or system may be configured to perform a method according to any aspect, embodiment, example or claim disclosed herein. Such an apparatus may comprise one or more elements, for example one or more of receivers, transmitters, transceivers, processors, controllers, modules, units, and the like, each element configured to perform one or more corresponding processes, operations and/or method steps for implementing the techniques described herein. For example, an operation/function of X may be performed by a module configured to perform X (or an X-module). The one or more elements may be implemented in the form of hardware, software, or any combination of hardware and software.
It will be appreciated that examples of the disclosure may be implemented in the form of hardware, software or any combination of hardware and software. Any such software may be stored in the form of volatile or non-volatile storage, for example a storage device like a ROM, whether erasable or rewritable or not, or in the form of memory such as, for example, RAM, memory chips, device or integrated circuits or on an optically or magnetically readable medium such as, for example, a CD, DVD, magnetic disk or magnetic tape or the like.
It will be appreciated that the storage devices and storage media are embodiments of machine-readable storage that are suitable for storing a program or programs comprising instructions that, when executed, implement embodiments of the disclosure. Accordingly, embodiments provide a program comprising code for implementing a method, apparatus or system according to any example, embodiment, aspect and/or claim disclosed herein, and/or a machine-readable storage storing such a program. Still further, such programs may be conveyed electronically via any medium, for example a communication signal carried over a wired or wireless connection.
While the invention has been shown and described with reference to embodiments, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the scope of the invention, as defined by the appended claims.
Those skilled in the art will understand that the various illustrative logical blocks, modules, circuits, and steps described in this application may be implemented as hardware, software, or a combination of both. To clearly illustrate this interchangeability between hardware and software, various illustrative components, blocks, modules, circuits, and steps are generally described above in the form of their functional sets. Whether such function sets are implemented as hardware or software depends on the specific application and the design constraints imposed on the overall system. Technicians may implement the described functional sets in different ways for each specific application, but such design decisions should not be interpreted as causing a departure from the scope of this application.
In the above-described embodiments of the disclosure, all operations and messages may be selectively performed or may be omitted. In addition, the operations in each embodiment do not need to be performed sequentially, and the order of operations may vary. Messages do not need to be transmitted in order, and the transmission order of messages may change. Each operation and transfer of each message can be performed independently.
Although the figures illustrate different examples of user equipment, various changes may be made to the figures. For example, the user equipment can include any number of each component in any suitable arrangement. In general, the figures do not limit the scope of this disclosure to any particular configuration(s). Moreover, while figures illustrate operational environments in which various user equipment features disclosed in this patent document can be used, these features can be used in any other suitable system.
The various illustrative logic blocks, modules, and circuits described in this application may be implemented or performed by a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logics, discrete hardware components, or any combination thereof designed to perform the functions described herein. The general purpose processor may be a microprocessor, but in an alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. The processor may also be implemented as a combination of computing devices, such as a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors cooperating with a DSP core, or any other such configuration.
The steps of the method or algorithm described in this application may be embodied directly in hardware, in a software module executed by a processor, or in a combination thereof. The software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, register, hard disk, removable disk, or any other form of storage medium known in the art. A storage medium is coupled to a processor to enable the processor to read and write information from/to the storage media. In an alternative, the storage medium may be integrated into the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In an alternative, the processor and the storage medium may reside in the user terminal as discrete components.
In one or more designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, each function may be stored as one or more pieces of instructions or codes on a computer-readable medium or delivered through it. The computer-readable medium includes both a computer storage medium and a communication medium, the latter including any medium that facilitates the transfer of computer programs from one place to another. The storage medium may be any available medium that can be accessed by a general purpose or special purpose computer.
While the disclosure has been shown and described with reference to various embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents.

Claims (15)

  1. A method, performed by a User Equipment (UE), for performing random access in a network, the method comprising:
    selecting a Synchronisation Signal Block (SSB); and
    performing random access to a network entity based on the selected SSB,
    wherein the SSB is selected based on an SSB group to which the SSB belongs.
  2. The method of claim 1, wherein a plurality of SSB groups are configured including a first SSB group and one or more second SSB groups.
  3. The method of claim 2, wherein the first SSB group is associated with a first network entity, and the one or more second SSB groups are associated with one or more second network entities.
  4. The method of claim 3, further comprising: determining a network entity to which the UE is, or was, connected, wherein the first SSB group is associated with the determined network entity.
  5. The method of claim 1, further comprising:
    receiving, by the UE from the network, when the UE is in connected mode, information indicating to which network entity, or through which SSB group, the UE is connected.
  6. The method of claim 4, wherein the SSB is selected from the first SSB group.
  7. The method of claims 2, further comprising: selecting, by the UE, one of the first SSB group and the second SSB group,
    wherein if the first SSB group is selected, the SSB is selected from the first SSB group, and if the second SSB group is selected, the SSB is selected from the second SSB group.
  8. The method of claims 2, wherein the SSB is selected based on a first condition and/or a second condition,
    wherein the first condition comprises: the first SSB group includes an SSB for which the Reference Signal Received Power (RSRP) for the SSB exceeds a first threshold, and
    wherein the second condition comprises: the second SSB group includes an SSB for which the RSRP for the SSB exceeds a second threshold,
    wherein the first threshold and/or the second threshold are dynamically configurable.
  9. The method of claim 8, wherein the SSB is selected based on one or more of:
    if the first condition is satisfied, the SSB is selected from the first SSB group;
    if the first condition is not satisfied and the second condition is satisfied, the SSB is selected from the second SSB group;
    if the first condition is not satisfied and the second condition is not satisfied, the SSB is selected from the first SSB group and/or the second SSB group; and
    if both the first condition and the second condition are satisfied, the SSB is selected from the SSB group through which the UE is currently connected or was previously connected.
  10. The method of claim 7, further comprising: receiving signalling for determining which SSBs belong to the first and second SSB groups,
    wherein the SSB is selected based on one or more of:
    when the first condition is satisfied and the SSB is selected from the first SSB group, the SSB is selected from among SSBs of the first SSB group for which the first threshold is exceeded;
    when the second condition is satisfied and the SSB is selected from the second SSB group, the SSB is selected from among SSBs of the second SSB group for which the second threshold is exceeded;
    when the first condition is not satisfied and the SSB is selected from the first SSB group, the SSB is selected from among any SSBs of the first SSB group;
    when the second condition is not satisfied and the SSB is selected from the second SSB group, the SSB is selected from among any SSBs of the second SSB group; and
    when both the first condition and the second condition are satisfied, the SSB through which the UE is currently connected or was previously connected is selected as the SSB.
  11. The method of claim 1, wherein the performing random access based on the selected SSB comprises:
    attempting random access a first time based on the selected SSB; and
    attempting random access a second time based on the same selected SSB.
  12. The method of claim 1, wherein the performing random access based on the selected SSB comprises:
    attempting random access a first time based on the selected SSB; and
    attempting random access a second time based on an SSB belonging to the same SSB group as the selected SSB.
  13. The method of claim 1, further comprising:
    triggering the random access based on occurrence of an event; and
    selecting a scheme for selecting the SSB based on a type of event that triggers the random access,
    wherein the type of event includes one or more of:
    initial access from RRC_IDLE;
    RRC Connection Re-establishment procedure;
    DL and/or UL data arrival;
    SR failure;
    request by RRC upon synchronous reconfiguration;
    RRC Connection Resume procedure from RRC_INACTIVE;
    establishment of time alignment for a secondary TAG;
    request for Other SI;
    beam failure recovery;
    consistent UL LBT failure on SpCell;
    SDT in RRC_INACTIVE; and
    positioning purpose during RRC_CONNECTED.
  14. The method of claim 1, wherein the performing random access based on the selected SSB comprises:
    selecting a preamble based on the selected SSB; and
    performing random access using the selected preamble.
  15. A User Equipment for performing random access in a network, comprising:
    a transceiver;
    a processor coupled with the transceiver, configured to:
    select a Synchronisation Signal Block (SSB), and
    perform random access to a network entity based on the selected SSB,
    wherein the SSB is selected based on an SSB group to which the SSB belongs.
PCT/KR2023/015360 2022-10-07 2023-10-05 Method and apparatus for random access in a wireless communication system WO2024076183A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB2214813.4A GB2623740A (en) 2022-10-07 2022-10-07 Random access to network
GB2214813.4 2022-10-07

Publications (1)

Publication Number Publication Date
WO2024076183A1 true WO2024076183A1 (en) 2024-04-11

Family

ID=84818025

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2023/015360 WO2024076183A1 (en) 2022-10-07 2023-10-05 Method and apparatus for random access in a wireless communication system

Country Status (2)

Country Link
GB (1) GB2623740A (en)
WO (1) WO2024076183A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210083730A1 (en) * 2018-06-22 2021-03-18 Lg Electronics Inc. Method for performing measurement and wireless communication device
KR20220070686A (en) * 2020-11-23 2022-05-31 한국전자통신연구원 Method and apparatus for synchronization of relay signals

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10966168B1 (en) * 2019-11-25 2021-03-30 Qualcomm Incorporated Page collision avoidance for 5G NR single receiver multiple subscriber identity module devices
WO2022139665A1 (en) * 2020-12-23 2022-06-30 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for random access resource mapping in non-terrestrial network
WO2024015422A1 (en) * 2022-07-13 2024-01-18 Kyocera Corporation Providing rrc parameters in network controlled repeater deployments

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210083730A1 (en) * 2018-06-22 2021-03-18 Lg Electronics Inc. Method for performing measurement and wireless communication device
KR20220070686A (en) * 2020-11-23 2022-05-31 한국전자통신연구원 Method and apparatus for synchronization of relay signals

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHINA TELECOM: "Discussion on side control information and NCR behavior", 3GPP TSG RAN WG1 #110BIS-E, R1-2208778, 30 September 2022 (2022-09-30), XP052276701 *
SONY: "Considerations on side control information to enable NR network- controlled repeaters", 3GPP TSG RAN WG1#109-E, R1-2203741, 29 April 2022 (2022-04-29), XP052153158 *
VIVO: "Discussion on side control information and NCR behavior", 3GPP TSG RAN WG1 #110BIS-E, R1-2208656, 30 September 2022 (2022-09-30), XP052276579 *

Also Published As

Publication number Publication date
GB2623740A (en) 2024-05-01
GB202214813D0 (en) 2022-11-23

Similar Documents

Publication Publication Date Title
WO2022158938A1 (en) Method and user equipment for determining resource for sidelink communication
WO2023090855A1 (en) Method and system for self optimization of random access channel in wireless communication system
WO2022235117A1 (en) Method and apparatus for supporting system information acquisition by sidelink remote terminal over sidelink relay
WO2022270964A1 (en) Method and apparatus for handling ul timing alignment upon receiving tci state update signal in a wireless communication system
WO2024076183A1 (en) Method and apparatus for random access in a wireless communication system
WO2024025392A1 (en) Method and apparatus for performing random access in wireless communication system
WO2024034960A1 (en) Method and apparatus for enhanced connected mode discontinuous reception considering traffic period in wireless communication system
WO2023113398A1 (en) Method and apparatus for certification of ue oriented beam management
WO2023195675A1 (en) Integrated access and backhaul timing mode signaling
WO2023219407A1 (en) Method and apparatus for sidelink synchronization signal transmission and reception in communication system based on unlicensed band
WO2024085485A1 (en) Apparatus and method for handling cell switch off for network energy saving in wireless communication system
WO2023195826A1 (en) Method and apparatus for managing gap configuration of multiple measurement gaps in a wireless communication system
WO2024096447A1 (en) Method and device for configuring tci state for cell switching in wireless communication system
WO2024072032A1 (en) Method and apparatus for handling lbt for sidelink communication
WO2023234668A1 (en) Method and apparatus for ue information delivery for network energy saving
WO2024076180A1 (en) Measurement report method and apparatus for path switching in a wireless communication system
WO2024101949A1 (en) Connection of repeater node to network
WO2024147545A1 (en) Method and apparatus of small data transmission using configured resources by reduced capability ue in wireless communication system
WO2022211487A1 (en) Method of handling common channel monitoring for l1 based mobility
WO2024071919A1 (en) Method and apparatus for performing discovery for sidelink communication in wireless communication system
WO2024147634A1 (en) Method and device relating to random-access configuration in consideration of multiple separated uplink nodes
WO2023229314A1 (en) Method and apparatus to optimize random access in wireless communication system
WO2023239170A1 (en) Method and apparatus for self-optimization of random access channel in wireless communication system
WO2024096575A1 (en) Method and apparatus for handling release of cfra resource for l1 signaling based mobility in wireless communication system
WO2024072089A1 (en) System and method of determining channel access priority for sidelink communication on unlicensed carrier

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23875245

Country of ref document: EP

Kind code of ref document: A1