CN112788712B - Detection method of random access response RAR, terminal equipment and network equipment - Google Patents

Detection method of random access response RAR, terminal equipment and network equipment Download PDF

Info

Publication number
CN112788712B
CN112788712B CN201911067632.9A CN201911067632A CN112788712B CN 112788712 B CN112788712 B CN 112788712B CN 201911067632 A CN201911067632 A CN 201911067632A CN 112788712 B CN112788712 B CN 112788712B
Authority
CN
China
Prior art keywords
rar
dci
random access
target
sfn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911067632.9A
Other languages
Chinese (zh)
Other versions
CN112788712A (en
Inventor
莫毅韬
鲍炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201911067632.9A priority Critical patent/CN112788712B/en
Publication of CN112788712A publication Critical patent/CN112788712A/en
Application granted granted Critical
Publication of CN112788712B publication Critical patent/CN112788712B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/008Transmission of channel access control information with additional processing of random access related information at receiving side
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a detection method of a Random Access Response (RAR), terminal equipment and network equipment, wherein the method comprises the following steps: after sending a random access request message to the network equipment, starting an RAR window to detect RAR sent by the network equipment; and if the first downlink control information DCI is detected, scrambling the first DCI by using a target radio network temporary identifier RNTI and carrying first system frame number SFN information, wherein the target RNTI is related to a random access opportunity (RO) for sending a random access request message, and determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI. The embodiment of the invention is beneficial to saving electricity and power consumption of the terminal equipment and reducing the random access time delay.

Description

Detection method of random access response RAR, terminal equipment and network equipment
Technical Field
The present invention relates to the field of communications, and in particular, to a detection method for a random access response RAR, a terminal device, and a network device.
Background
Currently, in a wireless communication system, a User Equipment (UE) (also referred to as a terminal device) needs to establish a connection with a network device, and this process is generally referred to as a Random Access (Random Access) process. In a New Radio (NR) system, the Random Access procedure includes Contention and non-Contention, including a 4-step Contention-Based Random Access (CBRA) procedure, a 4-step non-Contention Random Access (CFRA) procedure, a 2-step Random Access Channel (RACH), and a 2-step CFRA.
In the Random Access process, the UE needs to send a Random Access request message to a network device (e.g., a base station gNB), where the Random Access request message may be defined as message 1 or message a (Msg 1/Msg a), and then the UE needs to monitor a downlink channel in an entire Random Access Response window (RAR-window) or an MsgB receiving window (MsgB-reception window) to receive the network device issuing an RAR, where the RAR message may be defined as message 2 or message B (Msg 2/Msg B). As shown in fig. 1, specifically:
(1) The UE selects a Random Access request resource and sends a Random Access request message (Msg 1/MsgA) to the Network equipment by using the resource, and calculates a Random Access Radio Network Temporary Identifier (RA-RNTI) according to the resource time-frequency position or calculates the MsgB-RNTI according to the resource time-frequency position and the Random Access type. After the Msg1/MsgA is sent, an RAR-window or an MsgB-playback window is started.
(2) During the RAR window or MsgB-playback window operation, the UE always listens to a Physical Downlink Control Channel (PDCCH) scrambled with the RA-RNTI or MsgB-RNTI, and the PDCCH may schedule a Physical Downlink Shared Channel (PDSCH).
In addition, the maximum value of RAR window or MsgB-reception window is extended to 40ms in a new air interface (5-Generation New radio in Unlicensed Spectrum,5G NR-U) scenario or a 2-step RACH scenario of Unlicensed Spectrum, etc. As can be seen from the above, the UE may monitor the PDCCH all the time during the window operation, which obviously results in relatively large power consumption of the UE. And due to channel fading, the network side may have a situation that the random access request message is not correctly received, and at this time, the UE cannot receive the RAR message matched with the random access request message sent by the UE during the window operation period at all, that is, until the window is overtime, the UE must monitor the PDCCH and cannot perform the next RACH attempt in time, which causes unnecessary energy loss and increases access delay.
Disclosure of Invention
One of the technical problems solved by the embodiment of the invention is that in the existing RAR monitoring process, the power consumption of terminal equipment is large and the time is prolonged during random access.
In a first aspect, an embodiment of the present invention provides a method for detecting a random access response RAR, which is applied to a terminal device, and the method includes:
after sending a random access request message to a network device, starting an RAR window to detect RAR sent by the network device;
and if first Downlink Control Information (DCI) is detected, scrambling the first DCI by using a target Radio Network Temporary Identifier (RNTI) and carrying first System Frame Number (SFN) information, wherein the target RNTI is related to a random access opportunity (RO) for sending the random access request message, determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI.
In a second aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes:
the detection module is used for starting an RAR window after sending a random access request message to network equipment so as to detect RAR sent by the network equipment;
a determining module, configured to determine, if a first downlink control information DCI is detected, where the first DCI uses a target radio network temporary identifier RNTI for scrambling and carries first system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message, whether to stop detecting the RAR during an RAR window operation period according to the first DCI.
In a third aspect, an embodiment of the present invention provides a terminal device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present invention provides a method for detecting a random access response RAR, which is applied to a network device, and the method includes:
generating target Downlink Control Information (DCI) after receiving a random access request message sent by terminal equipment, wherein the target DCI uses a target Radio Network Temporary Identifier (RNTI) for scrambling and carries System Frame Number (SFN) information, and the target RNTI is related to a random access opportunity (RO) for sending the random access request message;
and during the operation period of the RAR window, sending the target DCI to the terminal equipment, wherein the target DCI is used for the terminal equipment to determine whether to stop detecting the RAR sent by the network equipment during the operation period of the RAR window.
In a sixth aspect, an embodiment of the present invention provides a network device, where the network device includes:
a generating module, configured to generate target downlink control information DCI after receiving a random access request message sent by a terminal device, where the target DCI uses a target radio network temporary identifier RNTI for scrambling and carries system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message;
and a sending module, configured to send the target DCI to the terminal device during an RAR window operation period, where the target DCI is used for the terminal device to determine whether to stop detecting the RAR sent by the network device during the RAR window operation period.
In a seventh aspect, an embodiment of the present invention provides a network device, including: memory, a processor and a computer program stored on the memory and executable on the processor, the computer program realizing the steps of the method according to the second aspect when executed by the processor.
In an eighth aspect, the embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the steps of the method according to the second aspect.
In the embodiment of the invention, in the random access process of establishing connection between the terminal equipment and the network equipment, after the terminal equipment sends a random access request message to the network equipment, an RAR window is started, and whether the RAR matched with the sent random access request message can be received or not is detected during the operation period of the RAR window, namely before the RAR window is overtime, so as to determine whether the random access process is successful or not; further, if, during the RAR window operation period, a first downlink control information DCI loaded with a target radio network temporary identifier RNTI and carrying first system frame number SFN indication information is detected, where the first RNTI is related to a random access opportunity RO for sending a random access request message, it may be determined, as the case may be, whether to continue detecting RAR during the RAR window operation period according to the first DCI. Therefore, whether the process of continuously detecting the RAR is stopped or not is determined according to the detected DCI during the operation period of the RAR window in the random access process, the RAR detection can be stopped in time during the operation period of the RAR window when corresponding conditions are met, and compared with the existing random access process that the RAR is still required to be detected until the RAR window is overtime during the operation period of the whole RAR window under the condition that the RAR matched with the sent random access request cannot be received, the power saving and the power consumption saving of the terminal equipment are facilitated, and meanwhile, the random access time delay is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and do not limit the invention. In the drawings:
fig. 1 is a flow diagram of a random access procedure;
fig. 2 is a flowchart illustrating a method for detecting a random access response RAR according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a second method for detecting a random access response RAR according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal device in an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a network device in an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a second terminal device in the embodiment of the present invention;
fig. 7 is a schematic structural diagram of a second network device in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical scheme of the invention can be applied to various communication systems, such as: global System for Mobile communications (GSM), code Division Multiple Access (CDMA) System, wideband Code Division Multiple Access (WCDMA), general Packet Radio Service (GPRS), long Term evolution/enhanced Long Term evolution (LTE-a), NR, and the like.
User equipments, which may be Terminal equipments such as Mobile phones (or called "cellular" phones) and computers having Terminal equipments, for example, portable, pocket, hand-held, computer-included or vehicle-mounted Mobile devices, may exchange languages and/or data with a Radio Access Network (RAN).
The network device, which may also be referred to as a Base Station, may be a Base Transceiver Station (BTS) in GSM or CDMA, a Base Station (NodeB) in WCDMA, an evolved Node B (eNB or e-NodeB) in LTE, and a 5G Base Station (gNB), and the embodiments of the present invention are not limited thereto, but for convenience of description, the following embodiments use the gNB as an example for description.
The technical solutions provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Referring to fig. 2, an embodiment of the present invention provides a method for detecting a random access response RAR, where the method is executed by a terminal device, and the method includes the following steps:
step 101: after sending the random access request message to the network device, an RAR window is started to detect the RAR sent by the network device.
Optionally, the random access response RAR sent by the network device and corresponding to the random access request message includes: scheduling a PDCCH carrying the random access response message Msg2, a PDSCH carrying the random access response message Msg2, a PDCCH carrying the random access response message MsgB, or a PDSCH carrying the random access response message MsgB. Where Msg2 corresponds to a 4-step random access procedure and MsgB corresponds to a 2-step random access procedure.
Step 103: and if the first downlink control information DCI is detected, scrambling the first DCI by using a target radio network temporary identifier RNTI and carrying first system frame number SFN information, wherein the target RNTI is related to a random access opportunity (RO) for sending a random access request message, and determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI.
In the embodiment of the invention, in the random access process of establishing connection between the terminal equipment and the network equipment, after the terminal equipment sends a random access request message to the network equipment, an RAR window is started, and whether the RAR matched with the sent random access request message can be received or not is detected during the operation period of the RAR window, namely before the RAR window is overtime, so as to determine whether the random access process is successful or not; further, if, during the operation of the RAR window, first downlink control information DCI loaded with a target radio network temporary identifier RNTI and carrying first System Frame Number (SFN) indication information is detected, where the first RNTI is associated with a Random Access opportunity (RO) for sending a Random Access request message, it may be determined, as the case may be, whether to continue detecting the RAR during the operation of the RAR window according to the first DCI. Therefore, whether the process of continuously detecting the RAR is stopped or not is determined according to the detected DCI during the operation period of the RAR window in the random access process, the RAR detection can be stopped in time during the operation period of the RAR window when corresponding conditions are met, and compared with the existing random access process that the RAR is still required to be detected until the RAR window is overtime during the operation period of the whole RAR window under the condition that the RAR matched with the sent random access request cannot be received, the power saving and the power consumption saving of the terminal equipment are facilitated, and meanwhile, the random access time delay is reduced.
Optionally, the target RNTI includes RA-RNTI or MsgB-RNTI. Specifically, the target RNTI is calculated by the terminal device according to a time-frequency location or a random access type corresponding to the random access opportunity RO for sending the random access request message.
In the method for detecting a random access response RAR according to the embodiment of the present invention, for step 103, the specific procedure of determining whether to stop detecting the RAR during the RAR window operation may also be different, depending on the specific content of the first DCI.
Detailed description of the preferred embodiment
In this specific embodiment one, the first DCI further carries a target indication, where the target indication is used to indicate whether the terminal device stops detecting the RAR.
In this embodiment, whether to stop detecting RAR may be directly determined based on one target indication newly added in the first DCI scrambled using the target RNTI, so as to further save power consumption of the terminal device.
Further, the step of determining whether to stop detecting RAR during the RAR window operation according to the first DCI in step 103 may specifically be performed as follows:
judging whether the second SFN information is matched with the first SFN information in the first DCI, wherein the value of the second SFN information is an SFN corresponding to a system frame where an RO for sending the random access request message is located;
and if the second SFN information is matched with the first SFN information and the target indication in the first DCI indicates that the terminal equipment stops detecting the RAR, determining that the RAR stops detecting the RAR during the operation period of the RAR window.
It can be understood that when it is determined that the first SFN information carried in the first DCI is matched with the second SFN information corresponding to the random access request message and carries the target indication at the same time, and the target indication indicates to stop detecting the RAR, the RAR is stopped in time during the operation of the RAR window, so as to save power consumption of the terminal device and reduce the random access delay. The value of the second SFN information specifically refers to a frame number of a system frame where an RO for sending the random access request message is located.
Optionally, in this specific embodiment, the following may also be included:
if the second SFN information is not matched with the first SFN information, continuously detecting the candidate Candidates of the physical downlink control channel PDCCH on the search space in which the first DCI is currently detected;
and if the second DCI is detected, using the second DCI as a new first DCI to determine whether to stop detecting the RAR during the operation period of the RAR window according to the new first DCI.
It can be understood that, considering a case that the network device transmits multiple DCIs in one time slot, when it cannot be determined whether to stop detecting the RAR during the RAR window operation based on the first DCI, the PDCCH candidate Candidates are further detected continuously on the search space where the first DCI is currently detected, and when other DCI (i.e., the second DCI which can be the new first DCI) transmitted by the network device during the current time slot can be detected, the operation of determining whether to stop detecting the RAR during the RAR window operation based on the DCI is repeated. Specifically, when the second SFN information matches the detected SFN information in the second DCI and the target indication in the second DCI indicates the terminal device to stop detecting the RAR, it is determined to stop detecting the RAR during the RAR window operation period; otherwise, when the SFN information does not match the detected SFN information in the second DCI, the operation of continuously detecting the PDCCH Candidates on the search space where the first DCI is currently detected is repeated.
Further, if no new first DCI is detected in the current time slot corresponding to the search space in which the first DCI is detected, the RAR detection may be continued on the search space of the next period until it is determined that the RAR detection is stopped during the RAR window operation or until the RAR window times out.
Optionally, in this specific embodiment, the number of DCIs that can be processed by the terminal device in one slot is determined by protocol specification or based on capability information of the terminal device.
Optionally, in this specific embodiment, the step of determining whether the second SFN information matches the first SFN information in the first DCI may specifically be implemented as the following:
judging whether the value of the first SFN information is equal to the calculation result of running a remainder function on the value of the second SFN information and a target value, wherein the target value is specified by a protocol or configured by network equipment;
if so, determining that the second SFN information is matched with the first SFN information;
and if not, determining that the second SFN information is not matched with the first SFN information.
In this specific embodiment, according to the magnitude relationship between the value of the first SFN information and the calculation result of the running remainder function on the value of the second SFN information and the target value, whether the first SFN information carried in the first DCI matches with the second SFN information corresponding to the random access request information may be accurately determined.
For the first specific embodiment, for example, an indication, that is, a target indication, is newly added in DCI format 1_0 scrambled by RA-RNTI or MsgB-RNTI, where the indication is used to tell the UE whether to stop detecting RAR, and specifically, when a bit value corresponding to the target indication is "1", the indication may indicate that the UE stops detecting RAR.
Further, the UE selects a random access resource to send the random access request message Msg1/MsgA in a system frame with a system frame number x (i.e., a system frame corresponding to the second SFN information), and may set RA-RNTI/MsgB-RNTI = n calculated based on a time-frequency position of the random access resource (i.e., RO of the random access request message) or a random access type (i.e., 4-step RACH or 2-step RACH) at this time, and start an RAR window/MsgB retrieval window (i.e., RAR window).
Further, during the RAR window operation, the UE attempts to detect the PDCCH scrambled by RA-RNTI = n if the UE detects one PDCCH scrambled by RA-RNTI = n and the SFN (i.e., the value of the first SFN information) indicated by the SFN information in the DCI is y. Further, if y = mod (x, 4) and the indication bit (i.e., the target indication) in the DCI indicates to stop detecting RAR windows, the UE determines to stop detecting RAR during the time-out of the RAR windows.
The mod represents a remainder function, and the target value is preferably 4, but may be configured to be other specific values by protocol convention or network equipment.
Detailed description of the invention
In this embodiment two, the scheme of determining whether to stop detecting RAR during the RAR window operation according to the first DCI in step 103 may specifically be implemented as follows:
and if the response RO position corresponding to the first SFN information in the first DCI is located behind the RO position for sending the random access request message in the time domain, determining to stop detecting the RAR during the operation period of the RAR window.
It can be understood that, in the case that the first DCI does not carry an indication directly indicating whether the UE stops detecting RAR, whether to stop detecting RAR during the RAR window operation may be determined according to the first SFN information carried in the first DCI. Specifically, when it is determined that the response RO location corresponding to the first SFN information in the first DCI is located after the RO location for sending the random access request message in the time domain, it may be determined to stop detecting the RAR during the RAR window operation, so as to save power consumption of the terminal device and reduce the random access delay.
Optionally, in this specific embodiment, the first DCI is a time period [ T ] for the terminal device 1 +A×C,T 1 +A×D]Internally detected, T 1 Time to initiate a RAR window.
For example, the UE is at T 0 Sending random access request message to network equipment at any moment, then T can be 1 (T 0 Is less than T 1 Value of) to detect RAR sent by the network device.
Further, in this specific embodiment, on the one hand, it may be determined whether the response RO location corresponding to the first SFN information is located after the RO location for sending the random access request message in the time domain, that is, in the case of receiving one DCI:
if the value of the first SFN information in the first DCI is equal to the calculation result of the running remainder function for (x + M) and N, determining that a response RO location corresponding to the first SFN information is located behind the RO location for sending the random access request message in the time domain;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1,N-1 ]]D is [2,N ] as any natural number in the table]Any natural number in the table, M is [1,C ]]Any natural number in the table, the value of N is specified by a protocol or configured by network equipment, and the values of C and D enable T 1 +A×C≤T 1 + A × D holds.
It can be understood that, when the value of the first SFN information is equal to the calculation result of the running remainder function for (x + M) and N, it may be determined that the response RO location corresponding to the first SFN information in the first DCI is located after the RO location sending the random access request message in the time domain, and then it may be determined that the RAR is stopped to be detected during the operation of the RAR window, so as to save power consumption of the terminal device and reduce the random access delay.
Optionally, the frame length of a system frame (or a radio frame) in the NR system may be a =10ms; n represents the length of the RAR window, specifically, the length of the RAR window may be a unit of a system frame, where the value of N is preferably 4 (i.e., the length of the RAR window is 40ms, which is equal to the duration of 4 system frames), and the value of C, D is such that T is equal to T 1 +A×C≤T 1 The + a × D holds (e.g., C =1, D = 2).
For example, the UE selects a random access resource to send the random access request message Msg1/MsgA in a system frame with a system frame number x (i.e., a system frame corresponding to the second SFN information), and may set RA-RNTI/MsgB-RNTI = n calculated based on a time-frequency position of the random access resource (i.e., RO of the random access request message) or a random access type (i.e., 4-step RACH or 2-step RACH) at this time, the UE starts an RAR window/MsgB playback window (i.e., RAR window), and the length of the RAR window is 40ms.
Further, during the RAR window operation, the UE attempts to detect the PDCCH scrambled by RA-RNTI = n if the UE detects one PDCCH scrambled by RA-RNTI = n and the SFN (i.e., the value of the first SFN information) indicated by the SFN information in the DCI is y. Further, the UE may determine, according to the y, according to a predefined rule of the protocol or by depending on the UE itself, whether the system frame corresponding to the received SFN information in the PDCCH is after the system frame where the Msg1/MsgA is sent by the UE in the time domain.
Wherein, if the bit length occupied by y is 2 (i.e. the value of y may be 0,1,2,3), the rules predefined by the protocol or the algorithm implemented by the UE itself are: if any one of the following conditions is met, the system frame SFN corresponding to the SFN in the PDCCH is considered to be after the system frame SFN where the UE sends the Msg1/MsgA in the time domain:
(1)if the UE is in time period T 1 +A,T 1 +A×2]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI = N, and y = mod (x +1,4), wherein N is 4,C, 1,D, 2,M is 1;
(2) If the UE is in time period T 1 +A×2,T 1 +A×3]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI = N, and y = mod (x +2,4) or y = mod (x +1,4), when a value of N is 4,C is 2,D and a value of 3,M is 1 or 2;
(3) If the UE is in time period T 1 +A×3,T 1 +A×4]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI = N, and y = mod (x +3,4) or y = mod (x +2,4) or y = mod (x +1,4), in which case the value of N is 4,C is 3,D and the value of 4,M is 1,2, or 3;
the mod represents the value of the modulo function N, and may be configured to other specific values by a protocol convention or a network device.
Wherein, if the bit length occupied by y is 3 (i.e. the value of y may be 0,1,2,3,4,5,6,7), the rules predefined by the protocol or the algorithm implemented by the UE itself are: if any one of the following conditions is met, the system frame SFN corresponding to the SFN in the PDCCH is considered to be after the system frame SFN where the UE sends the Msg1/MsgA in the time domain:
(1) If the UE is in time period T 1 +A,T 1 +A×4]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI = N, and y = mod (x +1,8), wherein N is 8,C, 1,D, 4,M is 1;
(2) If the UE is in time period T 1 +A×2,T 1 +A×4]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI = N, and y = mod (x +2,8), wherein N is 8,C, 2,D, 4,M is 2;
(3) If the UE is in time period T 1 +A×3,T 1 +A×4]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI = N, and y = mod (x +3,8), wherein N is 8,C, 3,D, 4,M is 3;
the mod represents the value of the modulo function N, and may be configured to other specific values by a protocol convention or a network device.
Further, in this embodiment, on the other hand, it may also be determined whether the response RO location corresponding to the first SFN information is located after the RO location for sending the random access request message in the time domain, that is, in the case of receiving multiple DCIs:
if the value of the first SFN information in the first DCI is equal to the calculation result of the operation of the complementation function for (x + M) and N, continuously detecting PDCCH Candidates Candidates in the search space where the first DCI is currently detected;
if at least one third DCI is detected, under the condition that the value of the third SFN information in each third DCI in the at least one third DCI is equal to the calculation result of the (x + M) and N running remainder function, determining that the response RO position corresponding to the first SFN information is positioned behind the RO position for sending the random access request message in the time domain;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1,N-1 ]]Any natural number in D is [2,N ]]Any natural number in the above table, M is [1,C ]]Any natural number in, the value of N is specified by the protocol or configured by the network device, the value of C, D is such that T is 1 +A×C≤T 1 + A × D holds.
It can be understood that, considering that the network device transmits a plurality of DCIs (i.e. the first DCI and the at least one third DCI) in one slot, when values of SFN information in all DCIs detected in one slot are equal to a calculation result of running a modulo function of (x + M) and N, it is determined that a response RO location corresponding to the first SFN information is located after a RO location for transmitting a random access request message in a time domain, and it is determined that the RAR is stopped during an operation of a RAR window, so as to save power consumption of the terminal device and reduce a random access delay.
Optionally, the frame length of a system frame (or a radio frame) in the NR system may be a =10ms; n denotes the length of the RAR window, which may be in particular in system frames, the value of N being preferred hereTaking 4 (namely the RAR window length is 40ms, which is equal to the duration of 4 system frames), the value of C, D is made to be T 1 +A×C≤T 1 + a × D holds (e.g., C =1,d = 2).
Optionally, in this specific embodiment, the number of DCIs that the terminal device can process on one timeslot is determined by protocol specification or based on capability information of the terminal device.
Optionally, in any of the foregoing specific embodiments, the step of determining that the RAR detection is stopped during the RAR window operation may be specifically performed as follows:
it is determined to stop the RAR window early during the RAR window running.
It can be understood that the RAR detection is stopped in time by stopping the RAR window, that is, the RAR window is stopped in time to prepare for the next attempt of random access to reduce the random access delay when the RAR message/MsgB reception is unsuccessful or the 2-step RACH/2-step CFRA is not completed.
Optionally, in any of the above embodiments, the step of determining to stop detecting RAR during the RAR window operation may be specifically performed as follows:
when a Physical PHY Layer (Physical Layer) of a terminal device transmits an instruction to a Medium Access Control (MAC) Layer, it is determined to stop an RAR window during an RAR window operation period.
Further, when determining to stop detecting RAR during the RAR window operation period, the PHY layer of the UE sends an instruction to the MAC layer, instructing the MAC layer to stop the RAR window in advance during the RAR window operation period, and when receiving the instruction, the MAC layer stops the operating RAR window in advance. Further, optionally, in any of the above specific embodiments, the following may also be included: and performing self-adding 1 operation on the target transmission counter.
It can be understood that, under the condition that the RAR message/MsgB reception is unsuccessful or the 2-step RACH/2-step CFRA is not completed, after the RAR window is stopped in time, that is, the RAR detection is stopped in time, the operation of self-adding 1 may be performed on the target transmission counter to attempt to enter the next random access, so as to reduce the random access delay.
Optionally, the target transmission counter (transmission counter) may include a preamble transmission counter, an MsgA Physical Random Access Channel (PRACH) transmission counter, or an MsgA Physical Uplink Shared Channel (PUSCH) transmission counter.
The MsgA transmission counter is used for counting the number of MsgA transmission times, the MsgA PRACH transmission counter is used for counting the number of MsgA PRACH transmission times, and the MsgA PUSCH transmission counter is used for counting the number of MsgAPUSCH transmission times.
As can be seen from the above, with the detection method of the random access response RAR according to the embodiment of the present invention, the next RACH attempt can be performed without waiting for the RAR window timeout, so that power saving of the UE is achieved, and the access delay is reduced.
Referring to fig. 3, an embodiment of the present invention provides a method for detecting a random access response RAR, which is executed by a network device, and includes the following steps:
step 201: after receiving a random access request message sent by a terminal device, generating target Downlink Control Information (DCI), wherein the target DCI uses a target Radio Network Temporary Identifier (RNTI) for scrambling and carries System Frame Number (SFN) indication information, and the target RNTI is related to a random access opportunity (RO) for sending the random access request message.
Optionally, the target RNTI includes an RA-RNTI or an MsgB-RNTI. Specifically, the target RNTI is calculated by the terminal device according to the random access opportunity RO for transmitting the random access request message.
Step 203: and during the operation period of the RAR window, sending the target DCI to the terminal equipment, wherein the target DCI is used for the terminal equipment to determine whether to stop detecting the RAR sent by the network equipment during the operation period of the RAR window.
In the embodiment of the present invention, in a random access process in which a terminal device and a network device establish a connection, after the network device receives a random access request message sent by the terminal device, a target DCI loaded with a target radio network temporary identifier RNTI and carrying system frame number SFN information may be generated, where the target RNTI is related to a random access RO for sending the random access request message, and in a process in which the terminal device detects whether a RAR matching the sent random access request message can be received during an RAR window operation period, that is, before the RAR window is overtime, to determine whether the random access process is successful, the target DCI is sent to the terminal device, so that the terminal device determines whether to continue to detect the RAR during the RAR window operation period according to the detected target DCI. Therefore, the target DCI is sent to the terminal equipment during the RAR window running period in the random access process, so that the terminal equipment determines whether to stop continuously detecting the RAR according to the target DCI detected during the RAR window running period, and when corresponding conditions are met, the detection of the RAR is stopped in time during the RAR window running period.
Optionally, the random access response RAR sent by the network device and corresponding to the random access request message includes: scheduling a PDCCH carrying the random access response message Msg2, a PDSCH carrying the random access response message Msg2, a PDCCH carrying the random access response message MsgB, or a PDSCH carrying the random access response message MsgB. Where Msg2 corresponds to a 4-step random access procedure and MsgB corresponds to a 2-step random access procedure.
Optionally, in the method for detecting a random access response RAR according to the embodiment of the present invention, the target DCI further carries a target indication, where the target indication is used to indicate whether a terminal device stops detecting the RAR.
Specifically, under the condition that the target DCI sent to the terminal device carries the target indication, the terminal device may determine that SFN information in the target DCI matches SFN information corresponding to a system frame where a random access opportunity RO that sends the random access request message is located, and when the target indication indicates that RAR detection is stopped, the RAR detection is stopped in time during an RAR window operation period, so as to save power consumption of the terminal device and reduce random access delay.
Further, if there are multiple target DCIs sent to the terminal device, and the DCIs carry target indications, but the terminal device determines that the detected SFN information in the first DCI does not match the SFN information corresponding to the system frame where the random access opportunity RO sending the random access request message is located, the terminal device may continue to detect PDCCH Candidates in the search space where the first DCI is currently detected, so as to repeatedly determine whether to stop detecting the RAR during the operation of the RAR window according to the detection of the new DCI. The specific process may refer to corresponding content described in the embodiment of the detection method for a random access response RAR corresponding to fig. 2, and is not described herein again.
It should be further noted that, in the process of determining, by the terminal device, whether SFN information (i.e., first SFN information) in the target DCI matches SFN information (i.e., second SFN information) corresponding to the system frame where the random access opportunity RO that sends the random access request message is located, reference may be made to corresponding contents described in the embodiment of the method for detecting a random access response RAR corresponding to fig. 2, which is not described herein again.
On the other hand, in the case that the target indication is not carried in the transmitted target DCI, the terminal device may determine whether to stop detecting RAR during the RAR window operation according to the SFN information carried in the target DCI. Specifically, the number of the target DCI may be one or more, and the terminal device may implement different determination processes according to different numbers of the target DCI. Specifically, when the terminal device determines that the response RO location corresponding to the first SFN information is located at the RO location for sending the random access request message in the time domain, it is determined to stop detecting the RAR before the RAR window runs overtime, so as to save the power consumption of the terminal device and reduce the random access delay.
It should be noted that, in the process of determining, by the terminal device, whether the response RO location corresponding to the first SFN information is located after the RO location sending the random access request message in the time domain, reference may be made to corresponding contents described in the detection method for a random access response RAR corresponding to fig. 2, which is not described herein again.
Optionally, in the detection method for a random access response RAR according to the embodiment of the present invention, the following may be further included:
and determining the number of the target DCI transmitted to the terminal equipment in one time slot according to protocol convention or the capability information of the terminal equipment.
As can be seen from the above, with the detection method of the random access response RAR according to the embodiment of the present invention, the next RACH attempt can be performed without waiting for the RAR window timeout, so that power saving of the UE is achieved, and the access delay is reduced.
Referring to fig. 4, an embodiment of the present invention provides a terminal device 300, where the terminal device 300 includes:
a detection module 301, configured to start an RAR window after sending a random access request message to a network device, so as to detect an RAR sent by the network device;
a determining module 303, configured to determine, if the first downlink control information DCI is detected, where the first DCI uses a target radio network temporary identifier RNTI for scrambling and carries first system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending a random access request message, whether to stop detecting RAR during an RAR window operation period according to the first DCI.
Optionally, in the terminal device 300 in the embodiment of the present invention, the first DCI further carries a target indication, where the target indication is used to indicate whether the terminal device stops detecting the RAR.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be specifically configured to:
judging whether the second SFN information is matched with the first SFN information in the first DCI, wherein the value of the second SFN information is an SFN corresponding to a system frame where an RO (radio access control) for sending the random access request message is located;
and if the second SFN information is matched with the first SFN information and the target indication in the first DCI indicates that the terminal equipment stops detecting the RAR, determining that the RAR stops detecting the RAR during the operation period of the RAR window.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be further configured to:
if the second SFN information is not matched with the first SFN information, continuously detecting PDCCH candidate Candidates on the search space where the first DCI is currently detected;
and if the second DCI is detected, the second DCI is used as a new first DCI so as to determine whether to stop detecting the RAR during the operation of the RAR window according to the new first DCI.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be further configured to:
judging whether the value of the first SFN information is equal to the calculation result of running a remainder function on the value of the second SFN information and a target value, wherein the target value is specified by a protocol or configured by network equipment;
if so, determining that the second SFN information is matched with the first SFN information;
if not, determining that the second SFN information is not matched with the first SFN information.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module may be specifically configured to:
and if the response RO position corresponding to the first SFN information in the first DCI is located behind the RO position for sending the random access request message in the time domain, determining to stop detecting the RAR during the operation period of the RAR window.
Optionally, in the terminal device 300 of the embodiment of the present invention, the first DCI is a time period [ T ] of the terminal device 1 +A×C,T 1 +A×D]Internally detected, T 1 The moment for starting the RAR window;
the determining module 303 may be further configured to:
if the value of the first SFN information in the first DCI is equal to the calculation result of the running remainder function for (x + M) and N, determining that a response RO location corresponding to the first SFN information is located behind the RO location for sending the random access request message in the time domain;
wherein A represents the frame length of the system frame, and x represents the length of the transmission channelThe value of the SFN corresponding to the system frame where the RO of the machine access request message is positioned is [1,N-1 ]]Any natural number in D is [2,N ]]Any natural number in the above table, M is [1,C ]]Any natural number in the table, the value of N is specified by a protocol or configured by network equipment, and the values of C and D enable T 1 +A×C≤T 1 + A × D holds.
Optionally, in the terminal device 300 of the embodiment of the present invention, the first DCI is a time period [ T ] of the terminal device 1 +A×C,T 1 +A×D]Internally detected, T 1 The moment for starting the RAR window;
the determining module 303 may be further configured to:
if the value of the first SFN information in the first DCI is equal to the calculation result of the operation of the complementation function for (x + M) and N, continuously detecting PDCCH Candidates Candidates in the search space where the first DCI is currently detected;
if at least one third DCI is detected, under the condition that the value of the third SFN information in each third DCI in the at least one third DCI is equal to the calculation result of the (x + M) and N running remainder function, determining that the response RO position corresponding to the first SFN information is positioned behind the RO position for sending the random access request message in the time domain;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1,N-1 ]]In any natural number, M is [1,C ]]Any natural number in the above, D is [2,N ]]Any natural number within, the value of N being specified by the protocol or configured by the network device, the values of C and D being such that T 1 +A×C≤T 1 + A × D holds.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the number of DCIs that the terminal device can process in one timeslot is determined by protocol specification or based on capability information of the terminal device.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be further configured to:
it is determined to stop the RAR window early during the RAR window running.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be further configured to:
when the physical PHY layer of the terminal equipment sends an instruction to the media access control MAC layer, the RAR window is determined to be stopped during the operation of the RAR window.
Optionally, the terminal device 300 according to the embodiment of the present invention may further include:
and the processing module is used for performing self-adding 1 operation on the target transmission counter.
It can be understood that the terminal device 300 provided in the embodiment of the present invention can implement the foregoing method for detecting a random access response RAR executed by the terminal device 300, and the relevant explanations about the method for detecting a random access response RAR are all applicable to the terminal device 300, and are not described herein again.
In the embodiment of the invention, in the random access process of establishing connection between the terminal equipment and the network equipment, after the terminal equipment sends a random access request message to the network equipment, an RAR window is started, and whether the RAR matched with the sent random access request message can be received or not is detected during the operation period of the RAR window, namely before the RAR window is overtime so as to determine whether the random access process is successful or not; further, if a first downlink control information DCI loaded with a target radio network temporary identifier RNTI and carrying first system frame number SFN indication information is detected during the RAR window operation, where the first RNTI is related to a random access opportunity RO for sending a random access request message, it may be determined whether to continue detecting RAR during the RAR window operation according to the first DCI. Therefore, whether the process of continuously detecting the RAR is stopped or not is determined according to the detected DCI during the operation period of the RAR window in the random access process, the RAR detection can be stopped in time during the operation period of the RAR window when corresponding conditions are met, and compared with the existing random access process that the RAR is still required to be detected until the RAR window is overtime during the operation period of the whole RAR window under the condition that the RAR matched with the sent random access request cannot be received, the power saving and the power consumption saving of the terminal equipment are facilitated, and meanwhile, the random access time delay is reduced.
Referring to fig. 5, an embodiment of the present invention provides a network device 400, where the network device 400 includes:
a generating module 401, configured to generate target downlink control information DCI after receiving a random access request message sent by a terminal device, where the target DCI uses a target radio network temporary identifier RNTI for scrambling and carries system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message;
a sending module 403, configured to send target DCI to the terminal device during the RAR window operation period, where the target DCI is used for the terminal device to determine whether to stop detecting the RAR sent by the network device during the RAR window operation period.
Optionally, in the network device 400 in the embodiment of the present invention, the target DCI further carries a target indication, where the target indication is used to indicate whether the terminal device stops detecting the RAR.
Optionally, the network device 400 according to the embodiment of the present invention may further include:
and the determining module is used for determining the number of the target DCI transmitted to the terminal equipment in one time slot according to the protocol convention or the capability information of the terminal equipment.
It can be understood that the network device 400 provided in the embodiment of the present invention can implement the foregoing detection method for the random access response RAR executed by the network device 400, and the related descriptions about the detection method for the random access response RAR are all applicable to the network device 400, and are not described herein again.
In the embodiment of the present invention, in a random access process in which a terminal device and a network device establish a connection, after the network device receives a random access request message sent by the terminal device, a target DCI loaded with a target radio network temporary identifier RNTI and carrying system frame number SFN information may be generated, where the target RNTI is related to a random access RO for sending the random access request message, and in a process in which the terminal device detects whether a RAR matching the sent random access request message can be received during an RAR window operation period, that is, before the RAR window is overtime, to determine whether the random access process is successful, the target DCI is sent to the terminal device, so that the terminal device determines whether to continue to detect the RAR during the RAR window operation period according to the detected target DCI. Therefore, the target DCI is sent to the terminal equipment during the RAR window running period in the random access process, so that the terminal equipment determines whether to stop continuously detecting the RAR according to the target DCI detected during the RAR window running period, and when corresponding conditions are met, the detection of the RAR is stopped in time during the RAR window running period.
Fig. 6 is a block diagram of a terminal device of another embodiment of the present invention. The terminal device 500 shown in fig. 6 includes: at least one processor 501, memory 502, at least one network interface 504, and a user interface 503. The various components in terminal device 500 are coupled together by a bus system 505. It is understood that the bus system 505 is used to enable connection communications between these components. The bus system 505 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 505 in FIG. 6.
The user interface 503 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball (trackball), a touch pad or touch screen, etc.
It will be appreciated that memory 502 in embodiments of the present invention can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), enhanced Synchronous SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 502 of the subject systems and methods described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 502 stores elements, executable modules or data structures, or a subset thereof, or an expanded set thereof as follows: an operating system 5021 and application programs 5022.
The operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 5022 includes various applications, such as a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services. A program for implementing the method according to the embodiment of the present invention may be included in the application program 5022.
In this embodiment of the present invention, the terminal device 500 further includes: a computer program stored on the memory 502 and executable on the processor 501, the computer program when executed by the processor 501 implementing the steps of:
after sending a random access request message to the network equipment, starting an RAR window to detect RAR sent by the network equipment;
and if the first downlink control information DCI is detected, scrambling the first DCI by using a target radio network temporary identifier RNTI and carrying first system frame number SFN information, wherein the target RNTI is related to a random access opportunity (RO) for sending a random access request message, and determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI.
The method disclosed by the above-mentioned embodiments of the present invention may be applied to the processor 501, or implemented by the processor 501. The processor 501 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 501. The Processor 501 may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off the shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may reside in ram, flash, rom, prom, or eprom, registers, etc. of computer readable storage media known in the art. The computer readable storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502 and performs the steps of the above method in combination with the hardware thereof. In particular, the computer readable storage medium has stored thereon a computer program, which when executed by the processor 501 implements the steps of the resource allocation method embodiments as described above.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions of the invention, or a combination thereof.
For a software implementation, the techniques of an embodiment of the invention may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions of the embodiments of the invention. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
In the embodiment of the invention, in the random access process of establishing connection between the terminal equipment and the network equipment, after the terminal equipment sends a random access request message to the network equipment, an RAR window is started, and whether the RAR matched with the sent random access request message can be received or not is detected during the operation period of the RAR window, namely before the RAR window is overtime, so as to determine whether the random access process is successful or not; further, if, during the RAR window operation period, a first downlink control information DCI loaded with a target radio network temporary identifier RNTI and carrying first system frame number SFN indication information is detected, where the first RNTI is related to a random access opportunity RO for sending a random access request message, it may be determined, as the case may be, whether to continue detecting RAR during the RAR window operation period according to the first DCI. Therefore, whether the process of continuously detecting the RAR is stopped or not is determined according to the detected DCI during the operation period of the RAR window in the random access process, the RAR detection can be stopped in time during the operation period of the RAR window when corresponding conditions are met, and compared with the existing random access process that the RAR is still required to be detected until the RAR window is overtime during the operation period of the whole RAR window under the condition that the RAR matched with the sent random access request cannot be received, the power saving and the power consumption saving of the terminal equipment are facilitated, and meanwhile, the random access time delay is reduced.
The terminal device 500 can implement the processes implemented by the terminal device in the foregoing embodiments, and in order to avoid repetition, the descriptions are omitted here.
Referring to fig. 7, fig. 7 is a structural diagram of a network device applied in the embodiment of the present invention, which can implement the details of the method for updating beam information and achieve the same effect. As shown in fig. 7, the network device 600 includes: a processor 601, a transceiver 602, a memory 603, a user interface 604, and a bus interface 605, wherein:
in this embodiment of the present invention, the network device 600 further includes: a computer program stored in the memory 603 and executable on the processor 601, the computer program when executed by the processor 601 performing the steps of:
generating target Downlink Control Information (DCI) after receiving a random access request message sent by terminal equipment, wherein the target DCI uses a target Radio Network Temporary Identifier (RNTI) for scrambling and carries System Frame Number (SFN) information, and the target RNTI is related to a random access opportunity (RO) for sending the random access request message;
and during the operation period of the RAR window, sending target DCI to the terminal equipment, wherein the target DCI is used for the terminal equipment to determine whether to stop detecting the RAR sent by the network equipment during the operation period of the RAR window.
In fig. 7, the bus architecture may include any number of interconnected buses and bridges, with one or more processors represented by processor 601 and various circuits of memory represented by memory 603 being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. Bus interface 605 provides an interface. The transceiver 602 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The user interface 604 may also be an interface capable of interfacing with a desired device for different user devices, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 601 is responsible for managing the bus architecture and general processing, and the memory 603 may store data used by the processor 601 in performing operations.
In the embodiment of the present invention, in a random access process in which a terminal device and a network device establish a connection, after the network device receives a random access request message sent by the terminal device, a target DCI loaded with a target radio network temporary identifier RNTI and carrying system frame number SFN information may be generated, where the target RNTI is related to a random access RO for sending the random access request message, and in a process in which the terminal device detects whether a RAR matching the sent random access request message can be received during an RAR window operation period, that is, before the RAR window is overtime, to determine whether the random access process is successful, the target DCI is sent to the terminal device, so that the terminal device determines whether to continue to detect the RAR during the RAR window operation period according to the detected target DCI. Therefore, the target DCI is sent to the terminal equipment during the RAR window running period in the random access process, so that the terminal equipment determines whether to stop continuously detecting the RAR according to the target DCI detected during the RAR window running period, and when corresponding conditions are met, the detection of the RAR is stopped in time during the RAR window running period.
Preferably, an embodiment of the present invention further provides a terminal device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the above-mentioned embodiment of the method for detecting a random access response RAR, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements each process of the above-mentioned embodiment of the method for detecting a random access response RAR applied to a terminal device, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Preferably, an embodiment of the present invention further provides a network device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the embodiment of the method for detecting a random access response RAR, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the processes of the foregoing embodiment of the method for detecting a random access response RAR applied to a network device, and can achieve the same technical effects, and in order to avoid repetition, details are not described here again. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (16)

1. A detection method of a Random Access Response (RAR) is applied to a terminal device, and is characterized by comprising the following steps:
after sending a random access request message to a network device, starting an RAR window to detect RAR sent by the network device;
if first Downlink Control Information (DCI) is detected, scrambling the first DCI by using a target Radio Network Temporary Identifier (RNTI) and carrying first System Frame Number (SFN) information, wherein the target RNTI is related to a random access opportunity (RO) for sending the random access request message, determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI;
the determining whether to stop detecting the RAR during the RAR window operation according to the first DCI includes:
if the response RO position corresponding to the first SFN information in the first DCI is located behind the RO position for sending the random access request message in the time domain, determining to stop detecting the RAR during the operation period of the RAR window; or
The determining, according to the first DCI, whether to stop detecting the RAR during the RAR window operation includes:
judging whether second SFN information is matched with the first SFN information in the first DCI, wherein the value of the second SFN information is an SFN corresponding to a system frame where an RO (radio access control) for sending the random access request message is located; and if the second SFN information is matched with the first SFN information and the target indication in the first DCI indicates that the terminal equipment stops detecting the RAR, determining that the RAR stops detecting during the operation period of the RAR window.
2. The method of claim 1, further comprising:
if the second SFN information is not matched with the first SFN information, continuously detecting PDCCH Candidates Candidates on a search space where the first DCI is currently detected;
and if the second DCI is detected, using the second DCI as a new first DCI, and determining whether to stop detecting the RAR during the operation period of the RAR window according to the new first DCI.
3. The method of claim 1, wherein the determining whether second SFN information matches the first SFN information in the first DCI comprises:
judging whether the value of the first SFN information is equal to the calculation result of running a remainder function on the value of the second SFN information and a target value, wherein the target value is specified by a protocol or configured by the network equipment;
if yes, determining that the second SFN information is matched with the first SFN information;
and if not, determining that the second SFN information is not matched with the first SFN information.
4. The method of claim 1, wherein the first DCI is for the terminal device for a time period [ T [ ] 1 +A×C,T 1 +A×D]Internally detected, T 1 The moment for starting the RAR window;
wherein the method further comprises:
if the value of the first SFN information in the first DCI is equal to the calculation result of the running remainder function of (x + M) and N, determining that the response RO position corresponding to the first SFN information is positioned behind the RO position for sending the random access request message in the time domain;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1,N-1 ]]Any natural number in D is [2,N ]]Any natural number in the above table, M is [1,C ]]Any natural number in the table, the value of N is specified by a protocol or configured by the network device, and the values of C and D enable T 1 +A×C≤T 1 + A × D holds.
5. The method of claim 1, wherein the first DCI is for the terminal device in a time period [ T £ T 1 +A×C,T 1 +A×D]Internally detected, T 1 The moment for starting the RAR window;
wherein the method further comprises:
if the value of the first SFN information in the first DCI is equal to the calculation result of the running remainder function for (x + M) and N, continuously detecting PDCCH Candidates Candidates in the search space where the first DCI is currently detected;
if at least one third DCI is detected, determining that a response RO position corresponding to the first SFN information is located behind an RO position for sending the random access request message in a time domain under the condition that the value of the third SFN information in each third DCI in the at least one third DCI is equal to the calculation result of the (x + M) and the N running remainder function;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO used for sending the random access request message is located, and the value of C is [1,N-1 ]]In the table, M is [1,C ]]Any natural number in the above, D is [2,N ]]Any natural number within, the value of N being specified by the protocol or configured by said network device, the values of C and D being such that T 1 +A×C≤T 1 + A × D holds.
6. The method according to claim 2 or 5, wherein the number of DCIs that the terminal device can process in a time slot is specified by a protocol or determined based on capability information of the terminal device.
7. The method according to any one of claims 1-5, wherein the determining to stop detecting the RAR during the RAR window operation comprises:
determining to stop the RAR window prematurely during the RAR window run.
8. The method of claim 7, wherein the determining to stop the RAR window during the RAR window operation comprises:
and under the condition that the physical PHY layer of the terminal equipment sends an instruction to a Media Access Control (MAC) layer, determining to stop the RAR window during the running period of the RAR window.
9. The method of claim 8, further comprising:
and performing self-adding 1 operation on the target transmission counter.
10. A detection method of a Random Access Response (RAR) is applied to network equipment, and is characterized by comprising the following steps:
generating target Downlink Control Information (DCI) after receiving a random access request message sent by terminal equipment, wherein the target DCI uses a target Radio Network Temporary Identifier (RNTI) for scrambling and carries System Frame Number (SFN) information, and the target RNTI is related to a random access opportunity (RO) for sending the random access request message;
during the operation period of the RAR window, sending the target DCI to the terminal equipment, wherein the target DCI is used for the terminal equipment to determine whether to stop detecting the RAR sent by the network equipment during the operation period of the RAR window;
the target DCI is used for the terminal device to determine whether to stop detecting the RAR sent by the network device during the RAR window operation period, and includes:
when the terminal equipment judges that the response RO position corresponding to the first SFN information in the target DCI is located behind the RO position for sending the random access request message in the time domain, the terminal equipment determines to stop detecting the RAR during the operation period of the RAR window; or
The target DCI also carries a target indication, wherein the target indication is used for indicating whether the terminal equipment stops detecting the RAR; and the terminal equipment determines to stop detecting the RAR in the RAR window operation period under the condition that second SFN information is judged to be matched with the first SFN information in the target DCI and the target indication in the target DCI indicates the terminal equipment to stop detecting the RAR, wherein the value of the second SFN information is the SFN corresponding to the system frame where the RO for sending the random access request message is located.
11. The method of claim 10, further comprising:
and determining the number of the target DCI sent to the terminal equipment in a time slot according to protocol convention or the capability information of the terminal equipment.
12. A terminal device, comprising:
the detection module is used for starting an RAR window after sending a random access request message to network equipment so as to detect RAR sent by the network equipment;
a determining module, configured to determine, if a first downlink control information DCI is detected, where the first DCI uses a target radio network temporary identifier RNTI for scrambling and carries first system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message, whether to stop detecting the RAR during an RAR window operation period according to the first DCI;
the determination module is to: if the response RO position corresponding to the first SFN information in the first DCI is located behind the RO position for sending the random access request message in the time domain, determining to stop detecting the RAR during the operation period of the RAR window; or
The first DCI further carries a target indication, where the target indication is used to indicate whether the terminal device stops detecting the RAR, and the determining module is configured to: judging whether second SFN information is matched with the first SFN information in the first DCI, wherein the value of the second SFN information is an SFN corresponding to a system frame where an RO (radio access control) for sending the random access request message is located; and if the second SFN information is matched with the first SFN information and the target indication in the first DCI indicates the terminal equipment to stop detecting the RAR, determining to stop detecting the RAR during the operation period of the RAR window.
13. A network device, comprising:
a generating module, configured to generate target downlink control information DCI after receiving a random access request message sent by a terminal device, where the target DCI uses a target radio network temporary identifier RNTI for scrambling and carries system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message;
a sending module, configured to send the target DCI to the terminal device during an RAR window operation period, where the target DCI is used for the terminal device to determine whether to stop detecting an RAR sent by the network device during the RAR window operation period;
the target DCI is used for the terminal device to determine whether to stop detecting the RAR sent by the network device during the RAR window operation period, and includes:
when the terminal equipment judges that the response RO position corresponding to the first SFN information in the target DCI is located behind the RO position for sending the random access request message in the time domain, the terminal equipment determines to stop detecting the RAR during the operation period of the RAR window; or
The target DCI also carries a target indication, wherein the target indication is used for indicating whether the terminal equipment stops detecting the RAR or not; and the terminal equipment determines to stop detecting the RAR in the RAR window operation period under the condition that second SFN information is judged to be matched with the first SFN information in the target DCI and the target indication in the target DCI indicates the terminal equipment to stop detecting the RAR, wherein the value of the second SFN information is the SFN corresponding to the system frame where the RO for sending the random access request message is located.
14. A terminal device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 9.
15. A network device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 10 to 11.
16. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 11.
CN201911067632.9A 2019-11-04 2019-11-04 Detection method of random access response RAR, terminal equipment and network equipment Active CN112788712B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911067632.9A CN112788712B (en) 2019-11-04 2019-11-04 Detection method of random access response RAR, terminal equipment and network equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911067632.9A CN112788712B (en) 2019-11-04 2019-11-04 Detection method of random access response RAR, terminal equipment and network equipment

Publications (2)

Publication Number Publication Date
CN112788712A CN112788712A (en) 2021-05-11
CN112788712B true CN112788712B (en) 2023-04-11

Family

ID=75747356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911067632.9A Active CN112788712B (en) 2019-11-04 2019-11-04 Detection method of random access response RAR, terminal equipment and network equipment

Country Status (1)

Country Link
CN (1) CN112788712B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024082122A1 (en) * 2022-10-18 2024-04-25 Qualcomm Incorporated Early termination of random access response decoding

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106686691A (en) * 2015-11-06 2017-05-17 电信科学技术研究院 Random access response RAR transmission method and related device
CN107431983A (en) * 2015-03-11 2017-12-01 Lg 电子株式会社 The method and its equipment of quick random access procedure are operated in a wireless communication system
CN109699087A (en) * 2017-10-20 2019-04-30 维沃移动通信有限公司 Method, equipment and the terminal of random access

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10785739B2 (en) * 2017-08-10 2020-09-22 Ofinno, Llc Beam indication in RACH

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107431983A (en) * 2015-03-11 2017-12-01 Lg 电子株式会社 The method and its equipment of quick random access procedure are operated in a wireless communication system
CN106686691A (en) * 2015-11-06 2017-05-17 电信科学技术研究院 Random access response RAR transmission method and related device
CN109699087A (en) * 2017-10-20 2019-04-30 维沃移动通信有限公司 Method, equipment and the terminal of random access

Also Published As

Publication number Publication date
CN112788712A (en) 2021-05-11

Similar Documents

Publication Publication Date Title
US11540325B2 (en) Method and apparatus for random access on a wireless communication network
CN109997405B (en) Method for performing random access channel procedure and user equipment thereof
US11937306B2 (en) System information transmission method, terminal and network device
CN111083771B (en) Method, network equipment and terminal for physical random access channel enhanced transmission
EP3739933A1 (en) Beam failure recovery method, device, and apparatus
CN110167035B (en) Beam management method, terminal, network device and storage medium
EP3254510B1 (en) Method and apparatus for implementing a time-alignment guard timer
US20220174752A1 (en) Random access method, terminal device, and network device
CN110635877B (en) Transmission method of system message, terminal equipment and network equipment
WO2022152275A1 (en) Msg3 transmission method and apparatus, device and storage medium
US11051342B2 (en) Random access method and apparatus
US11895729B2 (en) Discontinuous reception method, terminal device and network device
WO2020061945A1 (en) Method used for random access, network device, and terminal device
CN112788712B (en) Detection method of random access response RAR, terminal equipment and network equipment
CN111800799B (en) 2-step random access method and device for unlicensed frequency band
EP3886496B1 (en) Resource reservation method and related device
CN113906815A (en) Contention resolution in random access procedure
CN111107661B (en) Random access resource acquisition method and device
WO2023083304A1 (en) Random access method, terminal and network side device
CN114080046A (en) Channel occupation indication method, device and related equipment
CN118104354A (en) Method, device, equipment and storage medium for determining effectiveness of timing advance
CN112584496A (en) Resource using method and communication equipment
CN110999458A (en) Message transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant