WO2020221306A1 - 一种随机接入方法和装置 - Google Patents

一种随机接入方法和装置 Download PDF

Info

Publication number
WO2020221306A1
WO2020221306A1 PCT/CN2020/087840 CN2020087840W WO2020221306A1 WO 2020221306 A1 WO2020221306 A1 WO 2020221306A1 CN 2020087840 W CN2020087840 W CN 2020087840W WO 2020221306 A1 WO2020221306 A1 WO 2020221306A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
type
terminal
access resource
resource
Prior art date
Application number
PCT/CN2020/087840
Other languages
English (en)
French (fr)
Inventor
酉春华
黄曲芳
郭英昊
娄崇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20798088.9A priority Critical patent/EP3955684A4/en
Publication of WO2020221306A1 publication Critical patent/WO2020221306A1/zh
Priority to US17/511,686 priority patent/US20220053557A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • H04W74/0858Random access procedures, e.g. with 4-step access with collision treatment collision detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • H04W74/085Random access procedures, e.g. with 4-step access with collision treatment collision avoidance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements
    • H04W56/001Synchronization between nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/02Selection of wireless resources by user or terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0866Non-scheduled access, e.g. ALOHA using a dedicated channel for access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0866Non-scheduled access, e.g. ALOHA using a dedicated channel for access
    • H04W74/0875Non-scheduled access, e.g. ALOHA using a dedicated channel for access with assigned priorities based access

Definitions

  • This application relates to the field of mobile communication technology, and in particular to a random access method and device.
  • the first random access process includes the following four steps: Step 1: The terminal sends a preamble to the network device; Step 2: The network device feeds back a random access response (RAR) according to the received preamble Step 3: The terminal sends uplink data according to the random access response; Step 4: The network device feeds back a contention resolution message to the terminal according to the uplink data; the industry refers to this random access process as a four-step random access (random access channel, RACH) ) Process or 4-step RACH or 4-step random access.
  • RACH random access channel
  • the second random access procedure includes the following two steps: Step A: The terminal sends a message A (MSGA) to the network device, where MSGA may include two parts: the preamble and the uplink data; Step B: The network device receives the MSGA and then the terminal Send message B (MSGB), MSGB can include random access response and contention resolution message; the industry refers to this kind of random access process as two-step random access process or 2-step RACH or 2-step random access.
  • MSGA message A
  • MSGA may include two parts: the preamble and the uplink data
  • Step B The network device receives the MSGA and then the terminal Send message B (MSGB), MSGB can include random access response and contention resolution message; the industry refers to this kind of random access process as two-step random access process or 2-step RACH or 2-step random access.
  • either the first random access procedure or the second random access procedure can be initiated.
  • the random access procedure currently performed by the terminal fails, what should the terminal do? There is currently no corresponding solution.
  • the embodiments of the present application provide a random access method and device, so that in a scenario where two random access processes coexist, after the current random access process performed by the terminal fails, random access resources are selected to initiate a new random access process.
  • the embodiments of the present application provide a random access method, which can be applied to a terminal, or can also be applied to a chip inside the terminal.
  • the terminal obtains the first type of random access resources and the second type of random access resources
  • the terminal uses the resources in the first type of random access resources to send the first message to the network device
  • the terminal receives the fallback from the network device Instructed, in the case of the first type of random access failure, the terminal performs random access resource selection from the target type random access resource within the backoff time.
  • the embodiments of the present application provide a random access method, which can be applied to a network device, or can also be applied to a chip inside the network device.
  • the network device receives the first message sent by the terminal using the resources in the first type of random access resources, and the network device sends a backoff instruction to the terminal.
  • the present application provides a random access device, including: including units or means for performing each step of the first aspect or the second aspect.
  • the present application provides a random access device including at least one processor and a memory, and the at least one processor is configured to execute the method provided in the above first aspect or the second aspect.
  • this application provides a random access device, including at least one processor and an interface circuit, and at least one processor is configured to execute the method provided in the above first aspect or the second aspect.
  • this application provides a program, which is used to execute the method of the first aspect or the second aspect when executed by a processor.
  • a seventh aspect provides a program product, such as a computer-readable storage medium, including the program of the sixth aspect.
  • the first type of random access resources are used for the first type of random access
  • the second type of random access resources are used for the second type of random access
  • the first message is used to initiate the first type of random access.
  • the back-off indication is used to indicate the time value
  • the time value is used to determine the back-off time range
  • the back-off time is the time selected from the back-off time range
  • the target type random access resource includes the first type random access resource or the second type random access resource. Class random access resources.
  • the terminal can select random access resources within the back-off time, without waiting until the back-off time is over to perform random access.
  • the selection of access resources can reduce the selection delay of random access resources, thereby reducing the delay for the terminal to re-initiate the random access process, and can improve user experience.
  • the terminal receives a first indication from the network device, the first indication is used to indicate the type of random access resource associated with the fallback indication; or, the terminal determines the type of random access resource corresponding to the first message to return Exit indicates the type of random access resource associated with. In this way, the terminal can more accurately determine the type of random access resource associated with the back-off indication, and then can perform the selection of the random access resource more reasonably.
  • the target type random access resource is the second type of random access resource; or, when the fallback indication is When the associated random access resource type is the second type random access resource, the target type random access resource is the first type random access resource.
  • the terminal after the backoff time, performs random access resource selection among random access resources of the random access resource type associated with the backoff indication. In this way, if the terminal does not select a random access resource within the back-off time, it can also select a random access resource after the back-off time to initiate random access again.
  • the target type random access resource is the second type of random access resource.
  • the terminal when the first condition is satisfied within the back-off time, the terminal performs random access resource selection among the target type random access resources within the back-off time. In this way, the terminal performs random access resource selection only when the first condition is met within the backoff time, which can perform resource selection more effectively.
  • the terminal when the first condition is not met within the back-off time, the terminal performs random access resources in the first-type random access resources or the second-type random access resources after the back-off time s Choice.
  • the terminal uses the selected random access resource to initiate random access.
  • the terminal does not receive a response message to the first message sent by the network device within the first preset time period, and it is determined that the first type of random access fails; or, the terminal is within the second preset time period The contention resolution message for the first message sent by the network device is not received, and it is determined that the first type of random access fails.
  • the first condition may include but is not limited to: the reference signal received power RSRP included in the synchronization signal block SSB corresponding to the target type random access resource is higher than the first preset threshold; or, the target type random access resource
  • the reference signal reception quality RSRQ included in the SSB corresponding to the incoming resource is higher than the second preset threshold; or, the quality of the physical downlink control channel PDCCH included in the SSB corresponding to the target type random access resource is higher than the third preset threshold; or,
  • the first timer expires, and the first timer is a timer started for the target type random access resource when the first type of random access is initiated or a timer started for the target type random access resource after sending the first message; or ,
  • the target type random access resource arrives first. In this way, the terminal uses the random access resource selected in the design to initiate random access, which can make the random access success rate higher.
  • the first type of random access is a four-step random access process
  • the second type of random access is a two-step random access process
  • the first type of random access is a two-step random access Process
  • the second type of random access is a four-step random access process.
  • the first message includes a random access signal; or, the first message includes a random access signal and information for contention resolution.
  • the embodiments of the present application provide another random access method, which can be applied to a terminal or can also be applied to a chip inside the terminal.
  • the terminal obtains the first type of random access resources and the second type of random access resources
  • the terminal uses the resources in the first type of random access resources to send a first message to the network device
  • the terminal receives the first message from the network device.
  • Back-off instruction and second back-off instruction when the first type of random access fails, the terminal performs random access resource selection in the first type of random access resource after the first back-off time, or, After the second backoff time, random access resource selection is performed in the second type of random access resources.
  • the embodiments of the present application provide another random access method, which can be applied to a network device, or can also be applied to a chip inside the network device.
  • the network device receives the first message sent by the terminal using the resources in the first type of random access resources, and the network device sends the first fallback instruction and the second fallback instruction to the terminal.
  • the present application provides a random access device, including: a unit or means for performing each step of the eighth aspect or the ninth aspect.
  • the present application provides a random access device, including at least one processor and a memory, and the at least one processor is configured to execute the method provided in the eighth or ninth aspect above.
  • the present application provides a random access device, including at least one processor and an interface circuit, and the at least one processor is configured to execute the method provided in the eighth or ninth aspect above.
  • this application provides a program, which is used to execute the method of the eighth aspect or the ninth aspect when executed by a processor.
  • a fourteenth aspect provides a program product, such as a computer-readable storage medium, including the program of the thirteenth aspect.
  • the first type of random access resources are used for the first type of random access
  • the second type of random access resources are used for the second type of random access
  • the first message is used to initiate the first type of random access.
  • the first fallback indicator is associated with the first type of random access
  • the second fallback indicator is associated with the second type of random access
  • the first fallback indicator is used to indicate the first time value
  • the first time value is used to determine the first fallback Time range
  • the second fallback indication is used to indicate the second time value
  • the second time value is used to determine the second fallback time range
  • the first fallback time is the time selected from the first fallback time range
  • the second The fallback time is the time selected from the second fallback time range.
  • the terminal can execute the fallback according to the fallback instructions corresponding to the two random access respectively.
  • the terminal selects random access within the first backoff time if the random access resource selection condition is satisfied within the first backoff time Resource, initiate random access, and no longer perform backoff according to the second backoff time; or, in the case of the first type of random access failure, if the terminal meets the random access resource selection conditions within the second backoff time, Then the terminal selects random access resources within the second back-off time, initiates random access, and no longer executes back-off according to the first back-off time.
  • the terminal if the terminal fails in the first type of random access, if the random access resource selection conditions are not met within the first back-off time and the second back-off time, the terminal can Random access resources are selected from the first type of random access resources or the second type of random access resources to initiate random access.
  • the terminal may select a resource for initiating random access among random access resources with a higher priority among the first type of random access resources and the second type of random access resources.
  • the priority of the first type of random access resource and the second type of random access resource can be preset or configured by the network equipment, and the network equipment can also indicate the priority of the random access resource with higher or lower priority. Types of.
  • the first back-off instruction and the second back-off instruction may be located in the same MAC PDU.
  • it can also be located in different MAC PDUs, which is not limited.
  • the MAC PDU also includes first indication information and second indication information.
  • the first indication information is used to indicate the random access mode or random access resource type corresponding to the first backoff indication.
  • the second indication information is used to indicate the random access mode or the random access resource type corresponding to the second backoff indication.
  • the first back-off indication and the second back-off indication are located in different sub-PDUs (subPDUs) of the MAC PDU.
  • the terminal can determine the random access mode or random access corresponding to the first back-off instruction and the second back-off instruction according to the sequence of the arrival time of the subPDU where the first back-off instruction and the second back-off instruction are located respectively. Enter the resource type.
  • FIG. 1 is a schematic diagram of a communication system applicable to the embodiments of this application;
  • FIG. 2 is a schematic diagram of another communication system applicable to the embodiments of this application.
  • FIG. 3 is a schematic diagram of another communication system applicable to the embodiments of this application.
  • FIG. 4 is a schematic diagram of a four-step random access process provided by an embodiment of this application.
  • FIG. 5 is a schematic diagram of a two-step random access process provided by an embodiment of this application.
  • FIG. 6 is an implementation flowchart of a random access method provided by an embodiment of this application.
  • FIG. 7 is an implementation flowchart of another random access method provided by an embodiment of this application.
  • FIG. 8 is an implementation flowchart of yet another random access method provided by an embodiment of this application.
  • FIG. 9 is a schematic diagram of a random access process handover provided by an embodiment of this application.
  • FIG. 10 is an implementation flowchart of yet another random access method provided by an embodiment of this application.
  • FIG. 11 is an implementation flowchart of yet another random access method provided by an embodiment of this application.
  • Figure 12 is a schematic diagram of a MAC PDU provided by an embodiment of the application.
  • FIG. 13 is a schematic structural diagram of a random access device provided by an embodiment of this application.
  • 15 is a schematic diagram of a terminal structure provided by an embodiment of the application.
  • FIG. 16 is a schematic structural diagram of a network device provided by an embodiment of this application.
  • Terminals also called user equipment (UE), mobile station (MS), mobile terminal (MT), etc.
  • UE user equipment
  • MS mobile station
  • MT mobile terminal
  • terminals are devices that provide users with voice and/or data connectivity.
  • handheld devices with wireless connectivity vehicle-mounted devices, etc.
  • some examples of terminals are: mobile phones, tablets, laptops, handheld computers, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, and augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving (self-driving), wireless terminals in remote medical surgery, and smart grid (smart grid)
  • a network device is a device in a wireless network.
  • a network device may be a radio access network (RAN) node (or device) that connects a terminal to the wireless network, and may also be called a base station.
  • RAN nodes are: continuously evolving node B (gNB), transmission reception point (TRP), evolved Node B (evolved Node B, eNB), radio network controller (radio network controller, RNC), Node B (Node B, NB), Base Station Controller (BSC), Base Transceiver Station (BTS), Home Base Station (for example, home evolved NodeB, or home Node B, HNB) , Base band unit (BBU), or wireless fidelity (wireless fidelity, Wifi) access point (AP), etc.
  • gNB continuously evolving node B
  • TRP transmission reception point
  • eNB evolved Node B
  • RNC radio network controller
  • Node B Node B
  • BSC Base Station Controller
  • BTS Base Transceiver Station
  • HNB Base Station
  • the network device may include a centralized unit (CU) node, or a distributed unit (DU) node, or a RAN device including a CU node and a DU node.
  • the RAN equipment including the CU node and the DU node separates the protocol layer of the eNB in the long term evolution (LTE) system.
  • LTE long term evolution
  • Some of the protocol layer functions are placed under the centralized control of the CU, and some or all of the protocol layer functions are left.
  • the CU centrally controls the DU.
  • a network device may be a core network (CN) device that provides service support for the terminal.
  • CN core network
  • AMF access and mobility management function
  • SMF session management function
  • UPF user plane function
  • AMF access and mobility management function
  • SMF session management function
  • UPF user plane function
  • the AMF entity may be responsible for terminal access management and mobility management
  • the SMF entity may be responsible for session management, such as user session establishment, etc.
  • the UPF entity may be a functional entity of the user plane, mainly responsible for connecting to external The internet.
  • the network device may be a RAN device or a CN device.
  • FIG. 1 is a schematic diagram of a communication system applicable to the embodiments of this application.
  • the terminal 130 can access a wireless network to obtain services from an external network (such as the Internet) through the wireless network, or communicate with other devices through the wireless network, such as communicating with other terminals.
  • the wireless network includes a RAN110 and a CN120.
  • the RAN110 is used to connect the terminal 130 to the wireless network
  • the CN120 is used to manage the terminal and provide a gateway for communication with the external network.
  • the number of devices in the communication system shown in FIG. 1 is only for illustration, and the embodiments of the present application are not limited thereto. In actual applications, the communication system may also include more terminals 130, more RANs 110, and Can include other devices.
  • This application does not limit the type of the communication system shown in Figure 1.
  • it may be an LTE system, a new radio (NR) system, or a transitional system between the LTE system and the NR system.
  • the transition system can also be called a 4.5G system, and of course it can also be a future communication system.
  • CN120 may include multiple CN devices.
  • CN120 may include an AMF entity, a UPF entity, or an SMF entity, etc.
  • the CN120 may include a mobility management entity (mobility management entity, MME) and a serving gateway (serving gateway, S-GW), etc.
  • MME mobility management entity
  • S-GW serving gateway
  • the network architecture includes CN equipment and RAN equipment.
  • the RAN equipment includes a baseband device and a radio frequency device.
  • the baseband device can be implemented by one node or by multiple nodes.
  • the radio frequency device can be implemented remotely from the baseband device, or integrated into the baseband device, or partially remote. Partly integrated in the baseband device.
  • the RAN equipment eNB
  • the RAN equipment includes a baseband device and a radio frequency device, where the radio frequency device can be arranged remotely relative to the baseband device, such as a remote radio unit (RRU) arranged remotely relative to the BBU.
  • RRU remote radio unit
  • the control plane protocol layer structure may include the radio resource control (RRC) layer, the packet data convergence protocol (PDCP) layer, the radio link control (RLC) layer, and the media interface. Access control (media access control, MAC) layer and physical layer and other protocol layer functions.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • RLC radio link control
  • MAC media access control
  • the user plane protocol layer structure can include the functions of the PDCP layer, the RLC layer, the MAC layer, and the physical layer; in one implementation, the PDCP layer can also include a service data adaptation protocol (SDAP) layer .
  • SDAP service data adaptation protocol
  • the RAN equipment can be implemented by one node to implement the functions of the RRC, PDCP, RLC, and MAC protocol layers; or multiple nodes can implement the functions of these protocol layers; for example, in an evolution structure, the RAN equipment can include a centralized unit (centralized unit). unit, CU) and distributed unit (distributed unit, DU), multiple DUs can be centrally controlled by one CU. As shown in Figure 2, CU and DU can be divided according to the protocol layers of the wireless network. For example, the functions of the PDCP layer and above protocol layers are set in the CU, and the protocol layers below the PDCP, such as the RLC layer and MAC layer, are set in the DU.
  • This type of protocol layer division is just an example, it can also be divided in other protocol layers, for example, in the RLC layer, the functions of the RLC layer and above protocol layers are set in the CU, and the functions of the protocol layers below the RLC layer are set in the DU; Or, in a certain protocol layer, for example, part of the functions of the RLC layer and the functions of the protocol layer above the RLC layer are set in the CU, and the remaining functions of the RLC layer and the functions of the protocol layer below the RLC layer are set in the DU. In addition, it can also be divided in other ways, for example, by time delay, and functions that need to meet the delay requirement for processing time are set in the DU, and functions that do not need to meet the delay requirement are set in the CU.
  • the radio frequency device can be remote, not placed in the DU, can also be integrated in the DU, or part of the remote part is integrated in the DU, and there is no restriction here.
  • control plane (CP) and the user plane (UP) of the CU can also be separated and divided into different entities for implementation. They are the control plane CU entity (CU-CP). Entity) and user plane CU entity (CU-UP entity).
  • the signaling generated by the CU can be sent to the terminal through the DU, or the signaling generated by the terminal can be sent to the CU through the DU.
  • the DU can directly pass the protocol layer encapsulation and transparently transmit to the terminal or CU without analyzing the signaling. If the following embodiments involve the transmission of such signaling between the DU and the terminal, at this time, the sending or receiving of the signaling by the DU includes this scenario.
  • RRC or PDCP layer signaling will eventually be processed as PHY layer signaling and sent to the terminal, or converted from received PHY layer signaling.
  • the RRC or PDCP layer signaling can also be considered to be sent by the DU, or sent by the DU and radio frequency loading.
  • the CU can be divided into network equipment on the RAN side.
  • the CU can also be divided into network equipment on the CN side, which is not limited here.
  • the devices in the following embodiments of the present application may be located in terminals or network devices according to the functions they implement.
  • the network device may be a CU node, or a DU node, or a RAN device including a CU node and a DU node.
  • the random access process refers to the process from when a terminal sends a random access signal to try to access the network to the process before a basic signaling connection is established with a network device.
  • the random access signal can be used to initiate random access.
  • the random access signal can be a random access preamble.
  • the random access signal may also be a demodulation reference signal (demodulation reference signal, DMRS).
  • DMRS demodulation reference signal
  • the terminal can exchange information with the network equipment through the random access process to achieve uplink time synchronization with the communication system.
  • it can also perform resource request or data transmission through the random access process.
  • the random access process may also be referred to as random access or random access channel process or random access mode. This application does not distinguish this, and can be used instead in the following description.
  • the random access process can be divided into a contention-based random access process and a non-contention-based random access process.
  • the embodiment of the present application mainly takes a contention-based random access process as an example for description, where the contention-based random access process may include a four-step random access process and a two-step random access process. Introduce separately below.
  • FIG. 4 is a schematic diagram of a four-step random access process provided by an embodiment of this application. As shown in Figure 4, the four-step random access process provided by this application includes the following steps.
  • Step 100 The network device sends random access configuration information to the terminal, and the terminal can receive random access configuration information from the network device.
  • the random access configuration information is used to configure four-step random access parameters, for example,
  • the four-step random access resource is configured.
  • the four-step random access resource may include time-frequency resources and preamble sets for the four-step random access. This step is used to perform the preparatory work before the four-step random access process, and is not a step included in the four-step random access process.
  • Step 101 The terminal sends a random access preamble to the network device on the pre-configured four-step random access resource, and the network device receives the preamble from the terminal.
  • the preamble is also called the preamble in the random access process.
  • the first message or message 1 (MSG1).
  • the preamble sent by the terminal to the network device in step 101 may be a preamble selected from the preamble set for four-step random access acquired in step 100.
  • Step 102 After detecting the preamble sent by the terminal, the network device sends a random access response (RAR) message to the terminal, and the terminal receives the RAR message from the network device.
  • the RAR message is also called four-step The second message or message 2 (MSG2) in the random access process.
  • Message 2 may include one or more of the following information: the identification or index of the detected preamble, uplink time synchronization information, the uplink resources allocated for the terminal to send Message 3, and the backoff indicator (BI), Of course, message 2 can also include other information.
  • the identifier of the preamble is, for example, a random access preamble identifier (RAPID).
  • the network device may send a back-off instruction to it, the back-off instruction may be used to indicate a time value, and the time value is used to determine the back-off time range, when the random access process fails ,
  • the terminal can select the back-off time within the back-off time range, and can use the four-step random access resource configured for it in step 100 by the network device again after the selected back-off time ends. It should be noted that if the network device does not receive the preamble sent by the terminal, the message 2 sent by the network device does not include the identifier of the preamble corresponding to the terminal.
  • Step 103 The terminal sends uplink data to the network device according to MSG2, and the network device receives the uplink data from the terminal.
  • the uplink data is also referred to as the third message or message 3 (MSG3) in the four-step random access process.
  • MSG3 may include identifiers of different scene information, for example, the terminal identifier (UE-ID).
  • UE-ID terminal identifier
  • C-RNTI cell radio network temporary identifier
  • the MSG 2 can carry uplink resources and TA commands (command). After receiving the MSG 2, the terminal uses the TA value indicated by the TA command to send the MSG 3 on the uplink resource indicated by the MSG 2.
  • Step 104 When the network device detects message 3, it sends a contention resolution message to the terminal, and the terminal receives the contention resolution message from the network device, where the contention resolution message is also called the fourth message in the four-step random access process Or message 4 (MSG4).
  • the message 4 may include part of the content of the message 3 or a physical downlink control channel (PDCCH) containing the C-RNTI, that is, the message 4 includes the C-RNTI carried by the PDCCH.
  • PDCH physical downlink control channel
  • the message 4 can carry the identification of the terminal; if the network device does not receive the uplink data sent by the terminal, the message 4 sent by the network device does not include the identification of the terminal; When the message 4 is received, it can be determined whether the terminal's identity carried in the message 4 matches with its own identity to determine whether the network device is successfully connected. If the two match, it is determined that the terminal has successfully connected to the network device. If they match, it is determined that the terminal access fails.
  • FIG. 5 is a schematic diagram of a two-step random access process provided by an embodiment of this application. As shown in Figure 5, the two-step random access process provided by this application includes the following steps.
  • Step 200 The network device sends random access configuration information to the terminal, and the terminal can receive random access configuration information from the network device.
  • the random access configuration information is used to configure two-step random access parameters, for example, Two-step random access resources are configured.
  • the two-step random access resources may include time-frequency resources and preamble sets used for two-step random access. This step is used to perform the preparatory work before the two-step random access process, and is not a step included in the two-step random access process.
  • Step 201 The terminal sends a message A (MSG A) to the network device on the pre-configured two-step random access resource, and the network device receives MSG A from the terminal, where MSG A includes random access signals and contention resolution information.
  • MSG A includes random access signals and contention resolution information.
  • the random access signal is, for example, preamble and/or DMRS.
  • the random access signal may be used for receiving the information for contention resolution by the network device.
  • the network device can determine the transmission boundary for the terminal to transmit the information for contention resolution based on the random access signal, such as the position where the terminal transmits the information for contention resolution, such as the starting position and/or the slot End position etc.
  • the random access signal may be used to assist the network device in demodulating information used for contention resolution.
  • the information used for contention resolution can also be called data or payload.
  • the data may include one or more of the following information: the identification of the terminal, a random number, and a reason value for random access.
  • the identity of the terminal can be an identity assigned by RAN or an identity assigned by CN, such as cell radio network temporary identifier (C-RNTI), 5G-S-temporary mobile user identifier (5G S- Temporary mobile subscription identifier, 5G-S-TMSI) (the identification of the terminal allocated by the core network) part of the bits (bits), or the system architecture evolution temporary mobile user identifier (SAE-temporary mobile subscription identifier, s-TMSI) (core network Part of the bits (bits) of the assigned terminal ID).
  • C-RNTI cell radio network temporary identifier
  • 5G S-temporary mobile user identifier 5G S- Temporary mobile subscription identifier, 5G-S-TMSI
  • SAE-temporary mobile subscription identifier system architecture evolution temporary mobile user identifier
  • s-TMSI core network Part of the bits (bits) of the assigned terminal ID.
  • the identity of the terminal may be carried in the data all, or may be partly carried in
  • the reason value may include information about the type or reason of random access, which may be an RRC message.
  • the data may include C-RNTI media access control elements (medium access control control elements, MAC CE), and in this case, the data may also include buffer status report (buffer status report, BSR) MAC CE And/or power headroom report (PHR) MAC CE, where BSR is used to report the buffer status of the terminal, and PHR is used to report the power headroom of the terminal, so that network equipment can perform effective scheduling during scheduling. Scheduling to reduce waste of resources.
  • the preamble sent by the terminal to the network device in step 201 may be a preamble selected from the preamble set for two-step random access obtained in step 200.
  • Step 202 The network device sends a message B (MSG B) to the terminal after receiving the MSG A, and the network device receives the MSG B from the terminal.
  • MSG B message B
  • the MSG B may include the first response to the random access signal, or the second response to the data, or both the first response and the second response.
  • the first response may include, for example, an identifier of the random access signal.
  • the first response may include RAPID.
  • the second response may include contention resolution information, which may be obtained from information used for contention resolution, for example, and may be part or all of the information used for contention resolution.
  • the contention resolution information indicates success of random access or success of contention resolution.
  • other information in the response message can be carried in the first response, can also be carried in the second response, or the first response and the second response are independent.
  • the first response may be called a random access response message, and the second response may be called a contention resolution message. It should be noted that if the data is successfully decoded and does not conflict with other terminals, the network device can send a contention resolution message to the terminal. If the data is not successfully decoded, the network device can send an uplink authorization to the terminal, and the terminal can use the uplink authorization to transmit the data in MSG A.
  • both the terminal and the network device can support the four-step random access process and the two-step random access process.
  • the terminal involved in this application refers to the four-step random access process at the same time.
  • the network equipment involved refers to the network equipment that can simultaneously support the four-step random access process and the two-step random access process.
  • the RAN110 is a RAN that can support two-step random access procedures and four-step random access simultaneously
  • terminal 130 is a RAN that can support two-step random access procedures and four-step random access simultaneously.
  • the RAN110 can configure the two-step random access parameters and/or the four-step random access parameters for the terminal 130.
  • the RAN110 configures the two-step random access parameters and the four-step random access parameters for the terminal 130 at the same time.
  • the terminal 130 can either use the two-step random access parameters to initiate a two-step random access process, or use the four-step random access parameters to initiate a four-step random access process.
  • the access process coexists if the random access process currently performed by the terminal 130 fails, how the terminal 130 handles it? There is currently no corresponding solution.
  • the embodiments of the present application provide multiple random access methods to adapt to different scenarios.
  • the network device can send a back-off instruction to the terminal.
  • the terminal can select a back-off time within the back-off time range, and select After the back-off time is over, the four-step random access resource is reselected, and then a new four-step random access process can be initiated using the reselected four-step random access resource.
  • the time delay of this fallback method is relatively high.
  • the network device when random access fails, can carry a back-off indication in MSG B, and the meaning of the back-off indication is the same as that in the four-step random access process. In another possible implementation, when random access fails, the network device does not carry a fallback indication in MSG B.
  • the network device can send a fallback instruction to the terminal, but the terminal only receives one fallback instruction at a time.
  • the fallback instruction sent by the network device to the terminal can be associated with a four-step random access resource or a two-step random access resource. It can be understood that when the fallback instruction is associated with a four-step random access resource, the fallback instruction It is a fallback instruction in the four-step random access process. Correspondingly, when the fallback instruction is associated with a two-step random access resource, the fallback instruction is a fallback instruction in the two-step random access process.
  • an embodiment of the present application provides a random access method.
  • a terminal obtains a first type of random access resource and a second type of random access resource, where the first type of random access resource is used for the first type. Random access, the second type of random access resources are used for the second type of random access, the terminal uses the resources in the first type of random access resources to send the first message to the network device, and the first message is used to initiate the first type of random access Access, the terminal receives a fallback instruction from the network device.
  • the fallback instruction is associated with the first type of random access resource or the second type of random access resource.
  • the terminal When the fallback instruction is associated with the first type of random access resource, the terminal is in the first In the case of a type of random access failure, the selection of random access resources is performed in the second type of random access resources within the back-off time determined according to the back-off instructions, and when the back-off instructions are associated with the second type of random access resources In the case that the first type of random access fails, the terminal performs the selection of the random access resource in the first type of random access resource within the backoff time determined according to the backoff instruction.
  • the network device sends a fallback instruction to the terminal, and for the two-step random access process, when the terminal fails to access, the network device does not Send back instructions to the terminal.
  • the fallback instruction sent by the network device to the terminal can only be associated with the four-step random access resource.
  • an embodiment of this application provides a random access method.
  • the terminal obtains a four-step random access resource and a two-step random access resource, where the four-step random access resource is used for the four-step random access process ,
  • the two-step random access resource is used in the two-step random access process.
  • the terminal uses the resources in the four-step random access resource to send a preamble to the network device, initiate a four-step random access process, and the terminal receives a fallback instruction from the network device.
  • the terminal performs random access resource selection in the two-step random access resource within the back-off time determined according to the back-off instruction.
  • the terminal can select random access within the backoff time determined according to the backoff instruction Resources, there is no need to wait until the end of the back-off time to perform random access resource selection, which can reduce the delay of random access resource selection, thereby reducing the delay for the terminal to re-initiate the random access process and improving user experience.
  • the network device can send a fallback instruction to the terminal, and the terminal can receive two fallback instructions at a time.
  • an embodiment of the application provides a random access method.
  • the terminal obtains the first type of random access resource and the second type of random access resource, where the first type of random access resource is used for the first type Random access, the second type of random access resources are used for the second type of random access;
  • the terminal uses the resources in the first type of random access resources to send the first message to the network device, and the first message is used to initiate the first type of random access Access;
  • the terminal receives the first fallback instruction and the second fallback instruction from the network device, the first fallback instruction is associated with the first type of random access, the second fallback instruction is associated with the second type of random access, the first fallback
  • the indication is used to indicate the first time value, the first time value is used to determine the first fallback time range, the second fallback indication is used to indicate the second time value, and the second time value is used to determine the second fallback time range;
  • the terminal performs the selection of random access resources in the first type of random access resources after the first back-off time selected
  • the terminal can perform fallback according to the fallback instructions corresponding to the two random access respectively.
  • FIG. 6 is an implementation flowchart of a random access method provided in an embodiment of this application.
  • the above-mentioned first scenario is described in FIG. 6, and the method may include, but is not limited to, the following steps:
  • Step 301 The terminal obtains the first type of random access resources and the second type of random access resources, where the first type of random access resources are used for the first type of random access, and the second type of random access resources are used for the second type of random access resources. Class random access.
  • the random access resource may include at least one type of resource among time domain resources, frequency domain resources, or preamble.
  • the first type of random access may be a two-step random access process or a four-step random access process
  • the second type of random access may be a two-step random access process or a four-step random access process.
  • the "first type" and "second type" in this application do not indicate the degree of importance or the order of sequence. That is to say, the first type of random access and the second type of random access in this application Access is a different random access.
  • the second type of random access may be a two-step random access process.
  • the second type of random access may be a four-step random access process.
  • the first type of random access resource can be understood as a four-step random access resource, and the four-step random access resource refers to a four-step random access resource.
  • Incoming resources refer to resources used in the two-step random access process.
  • the second type of random access resource can be understood as a four-step random access resource; or, when the second type of random access is two During the random access process, correspondingly, the second type of random access resources can be understood as two-step random access resources.
  • the first type of random access resources and the second type of random access resources may be determined by random access configuration information sent by the network device to the terminal (see step 100 in FIG. 1 or step 200 in FIG. 2) It can be understood that the first type of random access resources and the second type of random access resources can be configured to the terminal by the network device.
  • the first type of random access resources and the second type of random access resources may include overlapping time-frequency resources, but the first type of random access resources and the second type of random access resources include random access signal resources (For example, the preamble resource) is different.
  • the first type of random access resources and the second type of random access resources include different time-frequency resources, but may have overlapping random access signal resources.
  • the time-frequency resources and random access signal resources of the first type of random access resources and the second type of random access resources are different.
  • the first type of random access resources and the second type of random access resources may be time-frequency resources or random access signal resources, or include both time-frequency resources and random access signal resources.
  • the random access resources of the first type and the random resources of the second type may be configured in the same configuration message, or may be configured in different configuration messages.
  • Step 302 The terminal sends a first message to the network device using resources in the first type of random access resources, where the first message is used to initiate the first type of random access.
  • the first message when the first type of random access resource is a four-step random access resource, the first message may include a random access signal, such as a preamble.
  • the first message may be understood as message 1 in FIG. 4 , Used to initiate a four-step random access process; or, when the first type of random access resource is a two-step random access resource, the first message may include a random access signal and information for contention resolution.
  • a message can be understood as message A in Figure 5, which is used to initiate a two-step random access procedure.
  • Step 303 The terminal receives a fallback instruction from the network device, the fallback instruction is used to indicate a time value, and the time value is used to determine a fallback time range.
  • the backoff instruction received by the terminal in step 303 may be associated with the first type of random access resource or the second type of random access resource, which is not limited in this application.
  • the terminal since the terminal initiates the first type of random access, when receiving the back-off instruction, it can default that the back-off instruction is associated with the first type of random access resource or associated with the first type of random access .
  • the terminal may determine the type of random access resource associated with the fallback indication received in step 303 through an implicit indication or an explicit indication.
  • the following describes the implicit instructions and explicit instructions respectively.
  • the terminal receives a first indication from the network device, where the first indication is used to indicate the type of random access resource associated with the fallback indication.
  • the first indication may be used to indicate that the random access resource type associated with the back-off indication is the first type of random access resource or the second type of random access resource.
  • the terminal determines the random access resource type associated with the backoff indication according to the random access resource type corresponding to the first message.
  • the type of random access resource corresponding to the first message can be understood as the type of random access resource used to send the first message. For example, when the terminal uses a four-step random access resource to send the first message, the random access resource type corresponding to the first message is a four-step random access resource. When the terminal uses a two-step random access resource to send the first message, The random access resource type corresponding to the first message is a two-step random access resource.
  • the corresponding random access resource type at this time is a four-step random access resource; if the first message includes a random access signal And the information used for contention resolution is used to initiate a two-step random access process, then the corresponding random access resource type at this time is a two-step random access resource.
  • the terminal can determine an RNTI according to the four-step random access resource, and the subsequent fallback indication received through the RNTI can be determined to be associated
  • the random access resource type is a four-step random access resource.
  • the terminal can determine another RNTI according to the two-step random access resource, and the subsequent fallback indication received through the RNTI can be determined as
  • the associated random access resource type is a two-step random access resource.
  • Step 304 When the first type of random access fails, the terminal performs random access resource selection from the target type random access resource within the backoff time.
  • the target type random access resource includes the first type random access resource or the second type random access resource.
  • the fallback time is the time selected from the fallback time range.
  • the terminal may determine the back-off time in the following manner: the terminal determines the range from zero to the time value indicated by the back-off instruction as the back-off time range, and is within the back-off time range Randomly select a time value as the fallback time. For example, taking the time value indicated by the back-off instruction as 10ms, the terminal can determine the range from 0 to 10ms as the back-off time range, and then randomly select a time value as the back-off time range from 0 to 10ms For the back-off time, for example, 5ms may be selected as the back-off time, or 8ms may be selected as the back-off time, etc.
  • the first indication may also be used to indicate the target type of random access resource, that is, the target type of the random access resource for performing random access resource selection in step 304.
  • the first indication may be used to indicate that the random access resource for performing random access resource selection in step 304 is the first type of random access resource or the second type of random access resource.
  • the target type random access resource is the second type random access resource.
  • the target type random access resource is the first type random access resource
  • the terminal may perform step 304 in but not limited to the following manner.
  • the terminal when the first condition is satisfied within the back-off time, the terminal performs random access resource selection among the target type random access resources within the back-off time.
  • the terminal when the terminal fails in the first type of random access, when the first condition is not met within the back-off time, the terminal can use the first type of random access resource or the second type of random access after the back-off time. Random access resource selection is performed in the incoming resources.
  • the first condition includes any of the following:
  • the reference signal receiving power (RSRP) included in the synchronization signal block (synchronization signal block, SSB) corresponding to the target type random access resource is higher than or equal to the first preset threshold.
  • the first preset threshold may be configured by a network device.
  • the reference signal receiving quality (RSRQ) included in the SSB corresponding to the target type random access resource is higher than or equal to the second preset threshold.
  • the second preset threshold may be configured by a network device.
  • the quality of the physical downlink control channel (PDCCH) included in the SSB corresponding to the target type random access resource is higher than or equal to the third preset threshold.
  • the third preset threshold may be configured by a network device.
  • the first timer expires, the first timer is started for the target type random access resource when the first type of random access is initiated or after the first message is sent for the target type of random access resource Timer.
  • the function of the first timer is as follows: when the first timer is running, the use of the target type of random access resources is restricted, or the use of the target type of random access resources is restricted to initiate random access, which can be understood as: The random access resource of the target type cannot be used to initiate random access within the time.
  • starting the first timer after sending the first message can be understood as starting the first timer when the sending of the first message is completed, or it can be understood as starting within the preset time after the sending of the first message is completed The first timer.
  • the random access resource of the target type arrives first. It can be understood that the start time of the target type random access resource is earlier than other types of random access resources.
  • the target type of random access resources and other types of random access resources are a relative concept. For example, when the target type of random access resource is the first type of random access resource, other types of random access resources are the second type of random access resource; conversely, when the target type of random access resource is the second type of random access resource In the case of resources, other types of random access resources are the first type of random access resources.
  • the terminal may also perform random access resource selection in random access resources of the type of random access resources associated with the back-off indication. For example, taking the random access resource type associated with the backoff indication as the first type of random access resource as an example, the terminal may also perform random access resource selection in the first type of random access resource after the backoff time. For another example, taking the type of random access resource associated with the backoff indication as the second type of random access resource as an example, after the backoff time, the terminal may also perform random access resource selection in the second type of random access resource .
  • the terminal if the terminal selects the random access resource within the back-off time, it can use the random access resource selected within the back-off time to initiate random access. Alternatively, if the terminal selects the random access resource after the back-off time, it can initiate random access using the random access resource selected after the back-off time.
  • the terminal may also use but not limited to the following methods to determine that the first type of random access fails.
  • Manner 1 The terminal does not receive a response message to the first message sent by the network device within the first preset time period, and determines that the first type of random access fails. For example, if the first message is the message 1 in the four-step random access process, the first type of random access is four-step random access, if the terminal does not receive the message sent by the network device within the first preset time period 2. It is determined that the four-step random access fails. For another example, taking the first message as the message A in the two-step random access process and the first type of random access as the two-step random access as an example, if the terminal does not receive the message sent by the network device within the first preset time period Message B, it is determined that the two-step random access fails.
  • Manner 2 The terminal does not receive the contention resolution message for the first message sent by the network device within the second preset time period, and determines that the first type of random access fails.
  • first preset duration and the second preset duration may be the same or different.
  • the first preset duration and the second preset duration can be configured by the network device, and can be adapted to different scenarios with different values, which are not limited.
  • the network device or terminal may perform some or all of the steps in the above-mentioned embodiments, and these steps or operations are only examples, and the embodiments of the present application may also perform other operations or various operation variations.
  • each step may be executed in a different order presented in the foregoing embodiment, and it may not be necessary to perform all operations in the foregoing embodiment.
  • FIG. 7 is an implementation flowchart of a random access method provided in an embodiment of this application.
  • the first type of random access is a four-step random access process
  • the first type of random access resource is a four-step random access resource
  • the second type of random access is a two-step random access process.
  • the access process and the second type of random access resources are two-step random access resources as an example.
  • the method may but is not limited to include the following steps:
  • Step 401 The terminal obtains a four-step random access resource and a two-step random access resource.
  • the four-step random access resource and the two-step random access resource may include time-frequency resources, or preamble resources, or time-frequency resources and preamble resources.
  • Step 402 The terminal uses the time-frequency resource in the four-step random access resource to send a preamble to the network device to initiate a four-step random access process.
  • the preamble is the preamble included in the four-step random access resource.
  • Step 403 The terminal receives a fallback instruction from the network device.
  • the fallback indicates to associate four-step random access resources or four-step random access.
  • the terminal may determine that the backoff instruction is associated with the four-step random access resource or the four-step random access according to the instruction information sent by the network device.
  • the terminal may determine that the backoff indication is associated with the four-step random access resource or the four-step random access according to the type of the random access resource corresponding to the preamble.
  • Step 404a In the case that the four-step random access process fails, the terminal performs random access resource selection among the target type random access resources within the backoff time when the first condition is satisfied within the backoff time.
  • the target type random access resource is a two-step random access resource.
  • Step 404b In the case that the terminal fails in the four-step random access process, when the first condition is not met within the back-off time, the terminal can access resources in four-step random access or in two-step random access after the back-off time Random access resource selection is performed among resources.
  • Step 404a and step 404b can be executed alternatively.
  • Step 405a If step 404a is performed, the terminal can initiate random access with the random access resource selected within the backoff time.
  • Step 405b If step 404b is performed, the terminal can initiate random access with the random access resource selected after the back-off time.
  • FIG. 7 is only for illustration, and the method shown in FIG. 7 may also include more or fewer steps in practical applications, which is not limited in this application.
  • FIG. 8 is an implementation flowchart of a random access method provided in an embodiment of this application.
  • the first type of random access is a two-step random access process
  • the first type of random access resource is a two-step random access resource
  • the second type of random access is a four-step random access process.
  • the entry process and the second type of random access resource are four-step random access resources as an example.
  • the method may but is not limited to include the following steps:
  • Step 501 The terminal obtains a two-step random access resource and a four-step random access resource.
  • the four-step random access resource and the two-step random access resource may include time-frequency resources, or preamble resources, or time-frequency resources and preamble resources.
  • Step 502 The terminal uses the time-frequency resource in the two-step random access resource to send the preamble and information for contention resolution to the network device, and initiate a two-step random access process.
  • the preamble is the preamble included in the two-step random access resource.
  • Step 503 The terminal receives a fallback instruction from the network device.
  • the fallback indicates to associate two-step random access resources or two-step random access.
  • the terminal may determine that the fallback instruction is associated with the two-step random access resource or the two-step random access according to the instruction information sent by the network device.
  • the terminal may determine that the backoff indication is associated with the two-step random access resource or the two-step random access according to the type of the random access resource corresponding to the preamble.
  • Step 504a In the case where the two-step random access procedure fails, the terminal performs random access resource selection among the target type random access resources within the backoff time when the first condition is satisfied within the backoff time.
  • the target type random access resource is a four-step random access resource.
  • Step 504b In the case that the terminal fails in the two-step random access process, when the first condition is not met within the back-off time, the terminal can access resources in four-step random access or in two-step random access after the back-off time Random access resource selection is performed among resources.
  • Step 504a and step 504b can be executed alternatively.
  • Step 505a If step 504a is performed, the terminal can initiate random access with the random access resource selected within the backoff time.
  • Step 505b If step 504b is performed, the terminal can initiate random access with the random access resource selected after the backoff time.
  • FIG. 8 is only for illustration, and the method shown in FIG. 8 may also include more or fewer steps in practical applications, which is not limited in this application.
  • the random access resource can be selected from the two-step random access resource to initiate the two-step random access process within the backoff time associated with the four-step random access, which can be understood as the four-step random access process Switch to the two-step random access process; similarly, when the terminal fails in the two-step random access process, if it is determined that the backoff time associated with the two-step random access, the conditions for using the four-step random access resource are met , The random access resource can be selected from the four-step random access resource to initiate the four-step random access process within the backoff time associated with the two-step random access, which can be understood as switching from the two-step random access process to the four-step random access process.
  • Step random access process see Figure 9.
  • the terminal can select random access resources within the backoff time, without waiting until the backoff time is over to perform random access resource selection ,
  • the selection delay of random access resources can be reduced, and the delay of the terminal re-initiating the random access process can be reduced, and the user experience can be improved.
  • FIG. 10 is an implementation flowchart of a random access method provided in an embodiment of this application.
  • the second scenario described above is illustrated in FIG. 10.
  • the method may, but is not limited to, include the following steps:
  • Step 601 The terminal obtains a four-step random access resource and a two-step random access resource.
  • the four-step random access resource and the two-step random access resource may include time-frequency resources, or preamble resources, or time-frequency resources and preamble resources.
  • Step 602a The terminal uses the time-frequency resource in the four-step random access resource to send a preamble to the network device to initiate a four-step random access process.
  • the preamble is the preamble included in the four-step random access resource.
  • Step 602b The terminal uses the time-frequency resource in the two-step random access resource to send the preamble and information for contention resolution to the network device, and initiate a two-step random access process. It can be understood that the preamble is a preamble included in the two-step random access resource.
  • step 602a and step 602b are executed alternatively.
  • Step 603 The terminal receives a fallback instruction from the network device. Since in the second scenario, for the two-step random access process, when the terminal fails to access, the network device does not send a fallback instruction to the terminal, so the fallback instruction received by the terminal in step 603 must be associated with the four-step random access process. Access resources or four-step random access.
  • Step 604a In the case that the four-step random access procedure fails, the terminal performs random access resource selection among the target type random access resources within the backoff time when the first condition is met within the backoff time.
  • the target type random access resource is a two-step random access resource.
  • Step 604b In the case that the terminal fails in the four-step random access process, when the first condition is not met within the back-off time, the terminal can access resources in four-step random access or two-step random access after the back-off time Random access resource selection is performed among resources.
  • Step 604a and step 604b can be executed alternatively.
  • Step 605a If step 604a is performed, the terminal can initiate random access with the random access resource selected within the backoff time.
  • Step 605b If step 604b is performed, the terminal can initiate random access with the random access resource selected after the backoff time.
  • FIG. 10 is only for illustration, and in actual applications, the method shown in FIG. 10 may further include more or fewer steps, which is not limited in this application.
  • FIG. 11 is an implementation flowchart of a random access method provided by an embodiment of this application.
  • the third scenario described above is illustrated in FIG. 11.
  • the method may, but is not limited to, include the following steps:
  • Step 701-step 702 perform the same operation as step 301-step 302, which will not be repeated here.
  • Step 703 The terminal receives the first fallback instruction and the second fallback instruction from the network device.
  • the first fallback indication is associated with the first type of random access
  • the second fallback indication is associated with the second type of random access
  • the first fallback indication is used to indicate the first time value
  • the first time value is used to determine the first time value.
  • the fallback time range the second fallback indication is used to indicate the second time value
  • the second time value is used to determine the second fallback time range.
  • the first fallback instruction and the second fallback instruction may be carried by the same media access control (MAC) layer protocol data unit (PDU), or may be carried by different MAC PDU bearer.
  • MAC media access control
  • PDU media access control layer protocol data unit
  • This application mainly uses the same MAC PDU bearer as an example.
  • the same MAC PDU used to carry the first fallback indication and the second fallback indication may also include first indication information and second indication information, and the first indication information is used to indicate The back-off indication corresponds to the random access mode or random access resource type, and the second indication information is used to indicate the random access mode or the random access resource type corresponding to the second back-off indication.
  • the first back-off instruction and the second back-off instruction may be carried in different sub-PDUs of the same MAC PDU.
  • the first back-off indication and the first indication information may be carried in the same sub-PDU of the same MAC PDU
  • the second back-off indication and the second indication information may be carried in the same sub-PDU of the same MAC PDU.
  • the first back-off indication and the second back-off indication are carried by different sub-PDUs of the same MAC PDU as an example.
  • the sub-PDU1 carrying the first back-off indication also includes the first Indication information
  • the sub PDU2 carrying the second fallback indication also includes second indication information.
  • both the first indication information and the second indication information may be one bit, and the value of the bit may be used to indicate the random access mode or the random access resource type corresponding to the backoff indication.
  • the first indication information of 1 bit when the value of this 1 bit is 1, it can be used to indicate that the random access mode corresponding to the first fallback indication is four-step random access or used to indicate The random access resource type corresponding to the first backoff instruction is a four-step random access resource.
  • the value of this 1 bit is 0, it can be used to indicate that the random access mode corresponding to the first backoff instruction is two. Step random access or used to indicate that the type of random access resource corresponding to the first backoff instruction is a two-step random access resource.
  • the second indication information being 1 bit as an example
  • the value of 1 bit when the value of 1 bit is 1, it can be used to indicate that the random access mode corresponding to the second backoff indication is four-step random access or used for Indicates that the random access resource type corresponding to the second back-off instruction is a four-step random access resource.
  • the value of this 1 bit is 0, it can be used to indicate that the random access method corresponding to the second back-off instruction is Two-step random access or used to indicate that the type of random access resource corresponding to the second back-off instruction is two-step random access resource.
  • the first back-off instruction and the second back-off instruction are located in different sub-PDUs (subPDUs) of the same MAC PDU.
  • the terminal can determine the random access mode or random access corresponding to the first back-off instruction and the second back-off instruction according to the sequence of the arrival time of the subPDU where the first back-off instruction and the second back-off instruction are respectively located. Enter the resource type.
  • the first back-off indication included in the subPDU that arrived first may be determined as the back-off indication corresponding to the four-step random access mode or the four-step random access resource type, and correspondingly, the first back-off indication included in the subPDU that arrived later
  • the included second back-off instruction is determined to be the back-off instruction corresponding to the two-step random access mode or the two-step random access resource type; of course, the first back-off instruction included in the subPDU that arrived first may also be determined to be the same as The two-step random access mode or the fallback instruction corresponding to the two-step random access resource type, and accordingly, the second fallback instruction included in the subPDU that arrives later is determined to be the same as the four-step random access method or the four-step random access
  • the rollback instruction corresponding to the incoming resource type is not limited.
  • Step 704 In the case that the first type of random access fails, the terminal performs random access resource selection in the first type of random access resource after the first back-off time, or, after the second back-off time, Random access resources are selected in the second type of random access resources.
  • the first back-off time is a time selected from the first back-off time range
  • the second back-off time is a time selected from the second back-off time range.
  • the method for the terminal to determine the first back-off time and the second back-off time may refer to the method of determining the back-off time in step 304, and details are not described herein again.
  • the terminal when the terminal fails in the first type of random access, if the random access resource selection condition is satisfied within the first backoff time, the terminal selects random access within the first backoff time Resource, initiate random access, at this time, no fallback is performed according to the second fallback time; or, if the terminal fails in the first type of random access, if the random access resource is satisfied within the second fallback time
  • the selection condition is that the terminal selects random access resources within the second back-off time and initiates random access. At this time, the back-off is no longer performed according to the first back-off time.
  • the terminal fails in the first type of random access, if the quality of the RSRP or RSRQ or PDCCH included in the SSB corresponding to the second type of random access resource is higher than or equal to the preset value within the first backoff time, Or, the timer for disabling the second type of random access resource expires, or, if the second type of random access resource arrives first, the terminal can select the second type of random access resource within the first backoff time to initiate random access , At this time, the rollback is no longer executed according to the second rollback time.
  • the terminal when the terminal fails in the first type of random access, if the quality of the RSRP or RSRQ or PDCCH included in the SSB corresponding to the first type of random access resource is higher than or equal to the preset value within the second backoff time , Or, the timer for disabling the first type of random access resource expires, or, if the first type of random access resource arrives first, the terminal can select the first type of random access resource within the second backoff time to initiate random access At this time, the rollback is no longer executed according to the first rollback time.
  • the terminal when the terminal fails in the first type of random access, if the random access resource selection conditions are not satisfied within the first back-off time and the second back-off time, the terminal may be After the first backoff time and the second backoff time, random access resources are selected from the first type of random access resources or the second type of random access resources to initiate random access.
  • the terminal may select a resource for initiating random access among random access resources with a higher priority in the first type of random access resources and the second type of random access resources.
  • the priority of the first type of random access resource and the second type of random access resource can be preset or configured by the network equipment, and the network equipment can also indicate the priority of the random access resource with higher or lower priority.
  • the priority of selecting the four-step random access resource can be pre-configured to be higher than the priority of selecting the two-step random access resource, or the pre-configured selection of the two-step random access resource has a higher priority than the four-step random access The priority of the resource.
  • the network device may send a priority indication to the terminal, which may be used to indicate the priority relationship between the four-step random access resource and the two-step random access resource.
  • a priority indication may be used to indicate the priority relationship between the four-step random access resource and the two-step random access resource.
  • the network device may send a priority indication to the terminal, which may be used to indicate the priority relationship between the four-step random access resource and the two-step random access resource.
  • a 1-bit indication when the value of the 1-bit is When 1, it can indicate that the priority of the four-step random access resource is higher than the priority of the two-step random access resource.
  • the value of the 1 bit is 0, it can indicate the priority of the four-step random access resource The priority is lower than the priority of two-step random access resources.
  • the terminal and the network device include hardware structures and/or software modules corresponding to each function.
  • the embodiments of the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Those skilled in the art can use different methods for each specific application to implement the described functions, but such implementation should not be considered as going beyond the scope of the technical solutions of the embodiments of the present application.
  • the embodiment of the present application may divide the terminal and the network device into functional units according to the foregoing method examples.
  • each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • embodiments of the present application also provide a device for implementing any of the above methods.
  • a device is provided that includes units (or means for implementing each step performed by the terminal in any of the above methods).
  • another device is also provided, including a unit (or means) for implementing each step performed by the network device in any of the above methods.
  • an embodiment of the present application provides a random access device 100.
  • the random access device 100 can be applied to a terminal.
  • FIG. 13 is a schematic structural diagram of a random access device 100 provided by an embodiment of this application.
  • the random access device 100 includes a processing unit 110.
  • the random access device 100 may further include a sending unit 120 and a receiving unit 130.
  • the processing unit 110 may be used to obtain the first type of random access resources and the second type of random access resources, and the sending unit 120 may be used to use the first type of random access resources.
  • the resource in the random access resource sends a first message to the network device.
  • the receiving unit 130 may be used to receive a fallback indication from the network device.
  • the processing unit 110 may also be used to perform a fallback time when the first type of random access fails. The selection of random access resources is performed among the inherent target type random access resources.
  • the processing unit 110 may be used to obtain the first type of random access resources and the second type of random access resources, and the sending unit 120 may be used to use the first type of random access resources.
  • the resource in the random access resource sends a first message to the network device, and the receiving unit 130 can be used to receive the first back-off instruction and the second back-off instruction from the network device, and the processing unit 110 can also be configured to receive the first type of random access failure.
  • the processing unit 110 may be used to obtain the first type of random access resources and the second type of random access resources, and the sending unit 120 may be used to use the first type of random access resources.
  • the resource in the random access resource sends a first message to the network device
  • the receiving unit 130 can be used to receive the first back-off instruction and the second back-off instruction from the network device, and the processing unit 110 can also be configured to receive the first type of random access failure.
  • the first type of random access resources are used for the first type of random access
  • the second type of random access resources are used for the second type of random access
  • the first message is used to initiate the first type of random access.
  • the back-off indication is used to indicate the time value
  • the time value is used to determine the back-off time range
  • the back-off time is the time selected from the back-off time range
  • the target type random access resources include the first type of random access resources Or the second type of random access resources.
  • an embodiment of the present application further provides a random access apparatus 200.
  • the random access apparatus 200 can be applied to network equipment.
  • FIG. 14 is a schematic structural diagram of a random access device 200 provided by an embodiment of the application. Referring to FIG. 14, the random access device 200 includes a receiving unit 210 and a sending unit 220.
  • the receiving unit 210 can be used to receive the first message sent by the terminal using the resources in the first type of random access resources, and the sending unit 220 can be used to The terminal sends a rollback instruction.
  • the receiving unit 210 may be used to receive the first message sent by the terminal using the resources in the first type of random access resources, and the sending unit 220 may be used to send the terminal Send the first back-off instruction and the second back-off instruction.
  • the first type of random access resources are used for the first type of random access
  • the second type of random access resources are used for the second type of random access
  • the first message is used to initiate the first type of random access.
  • the first fallback indicator is associated with the first type of random access
  • the second fallback indicator is associated with the second type of random access
  • the first fallback indicator is used to indicate the first time value
  • the first time value is used to determine the first time value.
  • a fallback time range the second fallback indication is used to indicate the second time value
  • the second time value is used to determine the second fallback time range
  • the first fallback time is the time selected from the first fallback time range
  • the second fallback time is the time selected from the second fallback time range.
  • the random access apparatus 100 When the random access apparatus 100 is applied to a terminal and the random access apparatus 200 is applied to a network device, and the method shown in FIG. 6 is executed, the following operations may also be performed:
  • the sending unit 220 may also be used to send a first instruction to the terminal, and the receiving unit 130 may also be used to receive a first instruction from a network device.
  • the first instruction is used to indicate a random access associated with the fallback instruction. Enter the resource type.
  • the processing unit 110 may be further configured to determine the random access resource type associated with the backoff indication according to the random access resource type corresponding to the first message.
  • the target type random access resource is the second type random access resource; or, when the fallback indication When the associated random access resource type is the second type random access resource, the target type random access resource is the first type random access resource.
  • the processing unit 110 may be further configured to perform random access resource selection among random access resources of the random access resource type associated with the backoff indication after the backoff time.
  • the target type random access resource is the second type of random access resource.
  • the processing unit 110 may be further configured to perform random access resource selection from the target type random access resources within the back-off time.
  • the processing unit 110 may be further configured to perform the first type random access resource or the second type random access resource after the back-off time. Perform random access resource selection in
  • the processing unit 110 may also be configured to initiate random access using the selected random access resource.
  • the processing unit 110 may be further configured to determine that the first type of random access fails if the response message for the first message sent by the network device is not received within the first preset time period; or, the processing unit 110 may also be used to determine that the first type of random access fails if the contention resolution message for the first message sent by the network device is not received within the second preset time period.
  • the first condition may include but is not limited to: the reference signal received power RSRP included in the synchronization signal block SSB corresponding to the target type random access resource is higher than the first preset threshold; or, the target type random access resource
  • the reference signal reception quality RSRQ included in the SSB corresponding to the incoming resource is higher than the second preset threshold; or, the quality of the physical downlink control channel PDCCH included in the SSB corresponding to the target type random access resource is higher than the third preset threshold; or,
  • the first timer expires, and the first timer is a timer started for the target type random access resource when the first type of random access is initiated or a timer started for the target type random access resource after sending the first message; or , The target type random access resource arrives first.
  • the first type of random access is a four-step random access process
  • the second type of random access is a two-step random access process
  • the first type of random access is a two-step random access Process
  • the second type of random access is a four-step random access process.
  • the first message includes a random access signal; or, the first message includes a random access signal and information used for contention resolution.
  • the random access apparatus 100 When the random access apparatus 100 is applied to a terminal and the random access apparatus 200 is applied to a network device, and the method shown in FIG. 11 is executed, the following operations may also be performed:
  • the processing unit 110 may be further configured to, in the case that the first type of random access fails, if the random access resource selection condition is satisfied within the first back-off time, then at the first back-off time Random access resources are selected in the internal, random access is initiated, and no fallback is performed according to the second fallback time.
  • the processing unit 110 may also be configured to, in the case of the first type of random access failure, if the random access resource selection is not satisfied within the first back-off time and the second back-off time If conditions are met, random access resources can be selected from the first type of random access resources or the second type of random access resources to initiate random access.
  • the processing unit 110 may also be configured to select a random access resource for initiating random access from among the random access resources of the first type and the second type of random access resources with higher priority.
  • Resources include the priority of the first type of random access resource and the second type of random access resource.
  • the priority of the first type of random access resource and the second type of random access resource can be preset or configured by the network equipment, and the network equipment can also indicate the priority of the random access resource with higher or lower priority. Types of.
  • the first back-off instruction and the second back-off instruction may be located in the same MAC PDU. Of course, it can also be located in different MAC PDUs.
  • the MAC PDU further includes first indication information and second indication information.
  • the first indication information is used to indicate the random access mode or random access resource type corresponding to the first backoff indication.
  • the second indication information is used to indicate the random access mode or the random access resource type corresponding to the second backoff indication.
  • the first back-off instruction and the second back-off instruction are located in different sub-PDUs (subPDUs) of the MAC PDU.
  • the processing unit 110 may also be configured to determine the random access corresponding to the first back-off instruction and the second back-off instruction according to the sequence of the arrival time of the subPDU where the first back-off instruction and the second back-off instruction are located respectively. Access mode or random access resource type.
  • each unit in the device can be implemented in the form of software called by processing elements; they can also be implemented in the form of hardware; part of the units can be implemented in the form of software called by the processing elements, and some of the units can be implemented in the form of hardware.
  • each unit can be a separately established processing element, or it can be integrated in a certain chip of the device for implementation.
  • it can also be stored in the memory in the form of a program, which is called and executed by a certain processing element of the device.
  • all or part of these units can be integrated together or implemented independently.
  • the processing element here can also become a processor, which can be an integrated circuit with signal processing capabilities.
  • each step of the above method or each of the above units may be implemented by an integrated logic circuit of hardware in a processor element or implemented in a form of being called by software through a processing element.
  • the unit in any of the above devices may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (ASIC), or, one or Multiple microprocessors (digital singnal processors, DSP), or, one or more field programmable gate arrays (FPGA), or a combination of at least two of these integrated circuits.
  • ASIC application specific integrated circuits
  • DSP digital singnal processors
  • FPGA field programmable gate arrays
  • the unit in the device can be implemented in the form of a processing element scheduler
  • the processing element can be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call programs.
  • CPU central processing unit
  • these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • the above receiving unit is an interface circuit of the device for receiving signals from other devices.
  • the receiving unit is an interface circuit used by the chip to receive signals from other chips or devices.
  • the above unit for sending is an interface circuit of the device for sending signals to other devices.
  • the sending unit is an interface circuit used by the chip to send signals to other chips or devices.
  • the terminal exchanges information with the terminal through the interface protocol with the network device, for example, sending a first message; the terminal and the network device are wirelessly connected, and the terminal exchanges information with the network device through the wireless interface, for example, sending the first message.
  • FIG. 15 is a schematic structural diagram of a terminal provided by an embodiment of the application. It may be the terminal in the above embodiment, and is used to implement the operation of the terminal in the above embodiment.
  • the terminal includes: an antenna 1501, a radio frequency part 1502, and a signal processing part 1503.
  • the antenna 1501 is connected to the radio frequency part 1502.
  • the radio frequency part 1502 receives the information sent by the network device through the antenna 1501, and sends the information sent by the network device to the signal processing part 1503 for processing.
  • the signal processing part 1503 processes the terminal information and sends it to the radio frequency part 1502, and the radio frequency part 1502 processes the terminal information and sends it to the network device via the antenna 1501.
  • the signal processing part 1503 may include a modem subsystem, which is used to process data at various communication protocol layers; it may also include a central processing subsystem, which is used to process terminal operating systems and application layers; in addition, it may also include Other subsystems, such as multimedia subsystem, peripheral subsystem, etc., where the multimedia subsystem is used to control the terminal camera, screen display, etc., and the peripheral subsystem is used to realize the connection with other devices.
  • the modem subsystem can be a separate chip.
  • the above apparatus for the terminal may be located in the modem subsystem.
  • the modem subsystem may include one or more processing elements 15031, for example, including a main control CPU and other integrated circuits.
  • the modem subsystem may also include a storage element 15032 and an interface circuit 15033.
  • the storage element 15032 is used to store data and programs, but the program used to execute the method executed by the terminal in the above method may not be stored in the storage element 15032, but is stored in a memory outside the modem subsystem. When the modem subsystem is loaded and used.
  • the interface circuit 15033 is used to communicate with other subsystems.
  • the above device for the terminal may be located in the modem subsystem, the modem subsystem may be implemented by a chip, the chip includes at least one processing element and an interface circuit, wherein the processing element is used to execute any of the methods executed by the above terminal In each step, the interface circuit is used to communicate with other devices.
  • the unit for the terminal to implement each step in the above method can be implemented in the form of a processing element scheduler.
  • a device applied to the terminal includes a processing element and a storage element, and the processing element calls the program stored by the storage element to execute the above The method executed by the terminal in the method embodiment.
  • the storage element may be a storage element whose processing element is on the same chip, that is, an on-chip storage element.
  • the program for executing the method executed by the terminal in the above method may be a storage element on a different chip from the processing element, that is, an off-chip storage element.
  • the processing element calls or loads the program from the off-chip storage element on the on-chip storage element to call and execute the method executed by the terminal in the above method embodiment.
  • the unit applied to the terminal for implementing each step in the above method may be configured as one or more processing elements, and these processing elements are provided on the modem subsystem, where the processing elements may be Integrated circuits, for example: one or more ASICs, or, one or more DSPs, or, one or more FPGAs, or a combination of these types of integrated circuits. These integrated circuits can be integrated together to form a chip.
  • the units of the terminal that implement the steps in the above method can be integrated together and implemented in the form of a system-on-a-chip (SOC), and the SOC chip is used to implement the above method.
  • SOC system-on-a-chip
  • At least one processing element and a storage element can be integrated in the chip, and the above terminal execution method can be realized by the processing element calling the stored program of the storage element; or, at least one integrated circuit can be integrated in the chip for realizing the above terminal execution Or, can be combined with the above implementations, the functions of some units are implemented in the form of processing element calling programs, and the functions of some units are implemented in the form of integrated circuits.
  • the above apparatus applied to a terminal may include at least one processing element and an interface circuit, wherein at least one processing element is used to execute any method executed by the terminal provided in the above method embodiments.
  • the processing element can execute part or all of the steps executed by the terminal in the first way: calling the program stored in the storage element; or in the second way: combining instructions through the integrated logic circuit of the hardware in the processor element Part or all of the steps executed by the terminal are executed in a manner; of course, part or all of the steps executed by the terminal may also be executed in combination with the first manner and the second manner.
  • the processing element here is the same as the above description, and may be a general-purpose processor, such as a CPU, or one or more integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • a general-purpose processor such as a CPU
  • integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • the storage element can be a memory or a collective term for multiple storage elements.
  • FIG. 16 is a schematic structural diagram of a network device provided by an embodiment of this application. Used to implement the operation of the network device in the above embodiment.
  • the network equipment includes: an antenna 1601, a radio frequency device 1602, and a baseband device 1603.
  • the antenna 1601 is connected to the radio frequency device 1602.
  • the radio frequency device 1602 receives the information sent by the terminal through the antenna 1601, and sends the information sent by the terminal to the baseband device 1603 for processing.
  • the baseband device 1603 processes the terminal information and sends it to the radio frequency device 1602, and the radio frequency device 1602 processes the terminal information and sends it to the terminal via the antenna 1601.
  • the baseband device 1603 may include one or more processing elements 16031, for example, a main control CPU and other integrated circuits.
  • the baseband device 1603 may also include a storage element 16032 and an interface circuit 16033.
  • the storage element 16032 is used to store programs and data; the interface circuit 16033 is used to exchange information with the radio frequency device 1602.
  • the interface circuit is, for example, a common public radio interface, CPRI).
  • the above device applied to network equipment may be located in the baseband device 1603.
  • the above device applied to network equipment may be a chip on the baseband device 1603.
  • the chip includes at least one processing element and an interface circuit, wherein the processing element is used to execute the above network For each step of any method executed by the device, the interface circuit is used to communicate with other devices.
  • the unit for the network device to implement each step in the above method can be implemented in the form of a processing element scheduler.
  • a device applied to the network device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the network device in the above method embodiment.
  • the storage element may be a storage element with the processing element on the same chip, that is, an on-chip storage element, or a storage element on a different chip from the processing element, that is, an off-chip storage element.
  • the unit applied to the network equipment to implement each step in the above method may be configured as one or more processing elements, and these processing elements are provided on the baseband device, where the processing elements may be integrated circuits For example: one or more ASICs, or, one or more DSPs, or, one or more FPGAs, or a combination of these types of integrated circuits. These integrated circuits can be integrated together to form a chip.
  • the units for the network equipment to implement each step in the above method can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • the baseband device includes the SOC chip for implementing the above method.
  • At least one processing element and storage element can be integrated in the chip, and the processing element can call the stored program of the storage element to implement the method executed by the above network device; or, at least one integrated circuit can be integrated in the chip to implement the above network The method executed by the device; or, it can be combined with the above implementations.
  • the functions of some units are implemented in the form of processing elements calling programs, and the functions of some units are implemented in the form of integrated circuits.
  • the above apparatus applied to a network device may include at least one processing element and an interface circuit, wherein at least one processing element is used to execute any method executed by the network device provided in the above method embodiments.
  • the processing element can execute part or all of the steps executed by the network device in the first way: calling the program stored in the storage element; or in the second way: combining instructions through the integrated logic circuit of the hardware in the processor element Part or all of the steps performed by the network device are executed in the method; of course, part or all of the steps executed by the network device can be executed in combination with the first method and the second method.
  • the processing element here is the same as the above description, and it can be a general-purpose processor, such as a CPU, or one or more integrated circuits configured to implement the above methods, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • a general-purpose processor such as a CPU
  • integrated circuits configured to implement the above methods, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • the storage element can be a memory or a collective term for multiple storage elements.
  • the embodiments of the present application can be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种随机接入方法和装置,在终端当前执行的随机接入过程失败后,选择随机接入资源以发起新的随机接入过程。本申请中终端可以获取第一类随机接入资源和第二类随机接入资源,第一类随机接入资源用于第一类随机接入,第二类随机接入资源用于第二类随机接入,终端使用第一类随机接入资源中的资源向网络设备发送第一消息,发起第一类随机接入,终端从网络设备接收回退指示,回退指示用于指示时间值,时间值用于确定回退时间范围,终端在第一类随机接入失败的情况下,在从回退时间范围内选择的回退时间内在目标类型随机接入资源中执行随机接入资源的选择,目标类型随机接入资源包括第一类随机接入资源或第二类随机接入资源。

Description

一种随机接入方法和装置
相关申请的交叉引用
本申请要求在2019年04月29日提交中国专利局、申请号为201910357356.3、申请名称为“一种随机接入方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及移动通信技术领域,尤其涉及一种随机接入方法和装置。
背景技术
目前,针对第三代合作伙伴计划(3rd generation partnership project,3GPP)网络提出两种基于竞争的随机接入(random access,RA)过程。
第一种随机接入过程包括如下四个步骤:步骤1:终端向网络设备发送前导码(preamble);步骤2:网络设备根据接收到的前导码反馈随机接入响应(random access response,RAR);步骤3:终端根据随机接入响应发送上行数据;步骤4:网络设备根据上行数据向终端反馈竞争解决消息;业界将该种随机接入过程称为四步随机接入(random access channel,RACH)过程或4-step RACH或4步随机接入。
第二种随机接入过程包括如下两个步骤:步骤A:终端向网络设备发送消息A(MSGA),其中MSGA可包括前导码和上行数据两部分;步骤B:网络设备接收到MSGA后向终端发送消息B(MSGB),MSGB可包括随机接入响应和竞争解决消息;业界将该种随机接入过程称为两步随机接入过程或2-step RACH或2步随机接入。
对于同时支持上述两种随机接入过程的终端来说,既可以发起第一种随机接入过程,也可以发起第二种随机接入过程,针对所述两种随机接入过程共存的场景,若终端当前执行的随机接入过程失败,终端该如何处理,目前还没有相应的解决方法。
发明内容
本申请实施例提供一种随机接入方法和装置,以期在两种随机接入过程共存的场景下,终端当前执行的随机接入过程失败后,选择随机接入资源以发起新的随机接入过程。
第一方面,本申请实施例提供一种随机接入方法,该方法可以应用于终端,或者也可以应用于终端内部的芯片。在该方法中,终端获取第一类随机接入资源和第二类随机接入资源,终端使用第一类随机接入资源中的资源向网络设备发送第一消息,终端从网络设备接收回退指示,终端在第一类随机接入失败的情况下,在回退时间内在目标类型随机接入资源中执行随机接入资源的选择。
第二方面,本申请实施例提供一种随机接入方法,该方法可以应用于网络设备,或者也可以应用于网络设备内部的芯片。在该方法中,网络设备接收终端使用第一类随机接入资源中的资源发送的第一消息,网络设备向终端发送回退指示。
第三方面,本申请提供一种随机接入装置,包括:包括用于执行以上第一方面或第二 方面各个步骤的单元或手段(means)。
第四方面,本申请提供一种随机接入装置,包括至少一个处理器和存储器,至少一个处理器用于执行以上第一方面或第二方面提供的方法。
第五方面,本申请提供一种随机接入装置,包括至少一个处理器和接口电路,至少一个处理器用于执行以上第一方面或第二方面提供的方法。
第六方面,本申请提供一种程序,该程序在被处理器执行时用于执行以上第一方面或第二方面的方法。
第七方面,提供一种程序产品,例如计算机可读存储介质,包括第六方面的程序。
在以上各个方面,第一类随机接入资源用于第一类随机接入,第二类随机接入资源用于第二类随机接入,第一消息用于发起第一类随机接入,回退指示用于指示时间值,时间值用于确定回退时间范围,回退时间为从回退时间范围内选择的时间,目标类型随机接入资源包括第一类随机接入资源或第二类随机接入资源。
可见,在以上各个方面,针对两种随机接入过程共存的场景,若终端当前执行的随机接入过程失败,终端可以在回退时间内选择随机接入资源,无需等到回退时间结束执行随机接入资源的选择,可减小随机接入资源的选择时延,进而可减小终端重新发起随机接入过程的时延,可提升用户体验。
在一种可能的设计中,终端从网络设备接收第一指示,第一指示用于指示回退指示关联的随机接入资源类型;或者,终端根据第一消息对应的随机接入资源类型确定回退指示关联的随机接入资源类型。这样,终端可以更准确的确定与回退指示关联的随机接入资源类型,进而可更合理的执行随机接入资源的选择。
在一种可能的设计中,当回退指示关联的随机接入资源类型为第一类随机接入资源时,目标类型随机接入资源为第二类随机接入资源;或,当回退指示关联的随机接入资源类型为第二类随机接入资源时,目标类型随机接入资源为第一类随机接入资源。
在一种可能的设计中,终端在回退时间之后,在回退指示关联的随机接入资源类型的随机接入资源中执行随机接入资源的选择。这样,若终端在回退时间内未选择随机接入资源,则还可以在回退时间后选择随机接入资源以重新发起随机接入。
在一种可能的设计中,目标类型随机接入资源为第二类随机接入资源。
在一种可能的设计中,当在回退时间内满足第一条件时,终端在回退时间内在目标类型随机接入资源中执行随机接入资源的选择。这样,终端在回退时间内,在满足第一条件的情况下才执行随机接入资源的选择,可更有效的执行资源选择。
在一种可能的设计中,当在回退时间内不满足第一条件时,终端在回退时间之后,在第一类随机接入资源或第二类随机接入资源中执行随机接入资源的选择。
在一种可能的设计中,终端使用选择的随机接入资源发起随机接入。
在一种可能的设计中,终端在第一预设时长内未接收到网络设备发送的针对第一消息的响应消息,确定第一类随机接入失败;或者,终端在第二预设时长内未接收到网络设备发送的针对第一消息的竞争解决消息,确定第一类随机接入失败。
在一种可能的设计中,第一条件可以包括但不限于:目标类型随机接入资源对应的同步信号块SSB包括的参考信号接收功率RSRP高于第一预设门限;或,目标类型随机接入资源对应的SSB包括的参考信号接收质量RSRQ高于第二预设门限;或,目标类型随机接入资源对应的SSB包括的物理下行控制信道PDCCH的质量高于第三预设门限;或,第一 定时器超时,第一定时器是在发起第一类随机接入时针对目标类型随机接入资源启动的定时器或发送第一消息后针对目标类型随机接入资源启动的定时器;或,目标类型随机接入资源先到达。这样,终端使用该设计中选择出的随机接入资源发起随机接入,可以使得随机接入成功率更高。
在一种可能的设计中,第一类随机接入为四步随机接入过程,第二类随机接入为两步随机接入过程;或者,第一类随机接入为两步随机接入过程,第二类随机接入为四步随机接入过程。
在一种可能的设计中,第一消息包括随机接入信号;或者,第一消息包括随机接入信号和用于竞争解决的信息。
第八方面,本申请实施例提供另一种随机接入方法,该方法可以应用于终端,或者也可以应用于终端内部的芯片。在该方法中,终端获取第一类随机接入资源和第二类随机接入资源,终端使用第一类随机接入资源中的资源向网络设备发送第一消息,终端从网络设备接收第一回退指示和第二回退指示,终端在第一类随机接入失败的情况下,在第一回退时间后在第一类随机接入资源中执行随机接入资源的选择,或,在第二回退时间后在第二类随机接入资源中执行随机接入资源的选择。
第九方面,本申请实施例提供另一种随机接入方法,该方法可以应用于网络设备,或者也可以应用于网络设备内部的芯片。在该方法中,网络设备接收终端使用第一类随机接入资源中的资源发送的第一消息,网络设备向终端发送第一回退指示和第二回退指示。
第十方面,本申请提供一种随机接入装置,包括:包括用于执行以上第八方面或第九方面各个步骤的单元或手段(means)。
第十一方面,本申请提供一种随机接入装置,包括至少一个处理器和存储器,所述至少一个处理器用于执行以上第八方面或第九方面提供的方法。
第十二方面,本申请提供一种随机接入装置,包括至少一个处理器和接口电路,所述至少一个处理器用于执行以上第八方面或第九方面提供的方法。
第十三方面,本申请提供一种程序,该程序在被处理器执行时用于执行以上第八方面或第九方面的方法。
第十四方面,提供一种程序产品,例如计算机可读存储介质,包括第十三方面的程序。
在以上各个方面,第一类随机接入资源用于第一类随机接入,第二类随机接入资源用于第二类随机接入,第一消息用于发起第一类随机接入,第一回退指示关联第一类随机接入,第二回退指示关联第二类随机接入,第一回退指示用于指示第一时间值,第一时间值用于确定第一回退时间范围,第二回退指示用于指示第二时间值,第二时间值用于确定第二回退时间范围,第一回退时间为从第一回退时间范围内选择的时间,第二回退时间为从第二回退时间范围内选择的时间。
可见,在以上各个方面,针对两种随机接入过程共存的场景,若终端当前执行的随机接入过程失败,终端可以分别根据两种随机接入对应的回退指示执行回退。
在一种可能的设计中,终端在第一类随机接入失败的情况下,若在第一回退时间内满足随机接入资源选择条件,则终端在第一回退时间内选择随机接入资源,发起随机接入,不再根据第二回退时间执行回退;或者,终端在第一类随机接入失败的情况下,若在第二回退时间内满足随机接入资源选择条件,则终端在第二回退时间内选择随机接入资源,发起随机接入,不再根据第一回退时间执行回退。
在一种可能的设计中,终端在第一类随机接入失败的情况下,若在第一回退时间内和第二回退时间内均不满足随机接入资源选择条件,则终端可以在第一类随机接入资源或第二类随机接入资源中选择随机接入资源以发起随机接入。
在一种可能的设计中,终端可在第一类随机接入资源与第二类随机接入资源中优先级较高的随机接入资源中选择用于发起随机接入的资源。其中,第一类随机接入资源与第二类随机接入资源的优先级可预先设置,也可以由网络设备配置,还可以由网络设备指示优先级较高或较低的随机接入资源的类型。
在一种可能的设计中,第一回退指示和第二回退指示可以位于同一个MAC PDU中。当然也可以位于不同的MAC PDU中,不做限定。
在一种可能的设计中,MAC PDU中还包括第一指示信息和第二指示信息,第一指示信息用于指示与第一回退指示对应的随机接入方式或随机接入资源类型,第二指示信息用于指示与第二回退指示对应的随机接入方式或随机接入资源类型。
在一种可能的设计中,第一回退指示和第二回退指示位于MAC PDU的不同子PDU(subPDU)。基于该设计,终端可以根据第一回退指示和第二回退指示分别位于的subPDU到达时间的先后顺序,确定与第一回退指示和第二回退指示对应的随机接入方式或随机接入资源类型。
附图说明
图1为本申请实施例可应用的一种通信***的示意图;
图2为本申请实施例可应用的另一种通信***的示意图;
图3为本申请实施例可应用的又一种通信***的示意图;
图4为本申请实施例提供的一种四步随机接入过程示意图;
图5为本申请实施例提供的一种两步随机接入过程示意图;
图6为本申请实施例提供的一种随机接入方法的实施流程图;
图7为本申请实施例提供的另一种随机接入方法的实施流程图;
图8为本申请实施例提供的又一种随机接入方法的实施流程图;
图9为本申请实施例提供的一种随机接入过程切换示意图;
图10为本申请实施例提供的又一种随机接入方法的实施流程图;
图11为本申请实施例提供的又一种随机接入方法的实施流程图;
图12为本申请实施例提供的一种MAC PDU示意图;
图13为本申请实施例提供的一种随机接入装置结构示意图;
图14为本申请实施例提供的另一种随机接入装置结构示意图;
图15为本申请实施例提供的一种终端结构示意图;
图16为本申请实施例提供的一种网络设备结构示意图。
具体实施方式
首先,对本申请中的部分用语进行解释说明,以便于本领域技术人员理解。
1)终端,又称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)等,是指向用户提供语音和/或数据连通性的设备。例如, 具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例为:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备、虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。
2)网络设备,是无线网络中的设备,例如网络设备可以为将终端接入到无线网络的无线接入网(radio access network,RAN)节点(或设备),又可以称为基站。目前,一些RAN节点的举例为:继续演进的节点B(gNB)、传输接收点(transmission reception point,TRP)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU),或无线保真(wireless fidelity,Wifi)接入点(access point,AP)等。另外,在一种网络结构中,网络设备可以包括集中单元(centralized unit,CU)节点、或分布单元(distributed unit,DU)节点、或包括CU节点和DU节点的RAN设备。其中包括CU节点和DU节点的RAN设备将长期演进(long term evolution,LTE)***中eNB的协议层拆分开,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。又例如网络设备可以是为终端提供业务支持的核心网(core network,CN)设备,常见的核心网设备包括接入和移动性管理功能(access and mobility management function,AMF)实体、会话管理功能(session management function,SMF)实体、用户面功能(user plane function,UPF)实体等,此处不一一列举。其中,所述AMF实体可以负责终端的接入管理和移动性管理;所述SMF实体可以负责会话管理,如用户的会话建立等;所述UPF实体可以是用户面的功能实体,主要负责连接外部网络。
根据本申请实施例中网络设备执行的方法,该网络设备可以是RAN设备或CN设备。
3)“多个”是指两个或两个以上,其它量词与之类似。“和/或”描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。此外,对于单数形式“a”,“an”和“the”出现的元素(element),除非上下文另有明确规定,否则其不意味着“一个或仅一个”,而是意味着“一个或多于一个”。例如,“a device”意味着对一个或多个这样的device。再者,至少一个(at least one of).......”意味着后续关联对象中的一个或任意组合,例如“A,B和C中的至少一个”包括A,B,C,AB,AC,BC,或ABC。
需要说明的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。
下面结合说明书附图对本申请的技术方案作进一步地详细描述。
请参考图1,其为本申请实施例可应用的一种通信***的示意图。如图1所示,终端130可接入到无线网络,以通过无线网络获取外网(例如因特网)的服务,或者通过无线网络与其它设备通信,如可以与其它终端通信。该无线网络包括RAN110和CN120,其中RAN110用于将终端130接入到无线网络,CN120用于对终端进行管理并提供与外网通信的网关。应理解,图1所示的通信***中各个设备的数量仅作为示意,本申请实施例并不 限于此,实际应用中在通信***中还可以包括更多的终端130、更多的RAN110,还可以包括其它设备。
本申请对图1所示的通信***的类型不做限定,例如可以是LTE***,也可以是新无线(new radio,NR)***,也可以是LTE***与NR***之间的过渡***,该过渡***也可以称为4.5G***,当然也可以是未来的通信***。
CN120中可以包括多个CN设备,当图1所示的通信***为NR***时,CN120中可以包括AMF实体、UPF实体、或SMF实体等,当图1所示的通信***为LTE***时,CN120中可以包括移动性管理实体(mobility management entity,MME)和服务网关(serving gateway,S-GW)等。
请参考图2,其为本申请实施例可应用的另一种网络架构的示意图。如图2所示,该网络架构包括CN设备和RAN设备。其中RAN设备包括基带装置和射频装置,其中基带装置可以由一个节点实现,也可以由多个节点实现,射频装置可以从基带装置拉远独立实现,也可以集成在基带装置中,或者部分拉远部分集成在基带装置中。例如,在LTE***中,RAN设备(eNB)包括基带装置和射频装置,其中射频装置可以相对于基带装置拉远布置,例如射频拉远单元(remote radio unit,RRU)相对于BBU拉远布置。
RAN设备和终端之间的通信遵循一定的协议层结构。例如控制面协议层结构可以包括无线资源控制(radio resource control,RRC)层、分组数据汇聚层协议(packet data convergence protocol,PDCP)层、无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理层等协议层的功能。用户面协议层结构可以包括PDCP层、RLC层、MAC层和物理层等协议层的功能;在一种实现中,PDCP层之上还可以包括业务数据适配(service data adaptation protocol,SDAP)层。
RAN设备可以由一个节点实现RRC、PDCP、RLC和MAC等协议层的功能;或者可以由多个节点实现这些协议层的功能;例如,在一种演进结构中,RAN设备可以包括集中单元(centralized unit,CU)和分布单元(distributed unit,DU),多个DU可以由一个CU集中控制。如图2所示,CU和DU可以根据无线网络的协议层划分,例如PDCP层及以上协议层的功能设置在CU,PDCP以下的协议层,例如RLC层和MAC层等的功能设置在DU。
这种协议层的划分仅仅是一种举例,还可以在其它协议层划分,例如在RLC层划分,将RLC层及以上协议层的功能设置在CU,RLC层以下协议层的功能设置在DU;或者,在某个协议层中划分,例如将RLC层的部分功能和RLC层以上的协议层的功能设置在CU,将RLC层的剩余功能和RLC层以下的协议层的功能设置在DU。此外,也可以按其它方式划分,例如按时延划分,将处理时间需要满足时延要求的功能设置在DU,不需要满足该时延要求的功能设置在CU。
此外,射频装置可以拉远,不放在DU中,也可以集成在DU中,或者部分拉远部分集成在DU中,在此不作任何限制。
请继续参考图3,相对于图2所示的网络架构,还可以将CU的控制面(CP)和用户面(UP)分离,分成不同实体来实现,分别为控制面CU实体(CU-CP实体)和用户面CU实体(CU-UP实体)。
在以上网络架构中,CU产生的信令可以通过DU发送给终端,或者终端产生的信令可以通过DU发送给CU。DU可以不对该信令进行解析而直接通过协议层封装而透传给终 端或CU。以下实施例中如果涉及这种信令在DU和终端之间的传输,此时,DU对信令的发送或接收包括这种场景。例如,RRC或PDCP层的信令最终会处理为PHY层的信令发送给终端,或者,由接收到的PHY层的信令转变而来。在这种架构下,该RRC或PDCP层的信令,即也可以认为是由DU发送的,或者,由DU和射频装载发送的。
在以上实施例中可以将CU划分为RAN侧的网络设备,此外,也可以将CU划分为CN侧的网络设备,在此不做限制。
本申请以下实施例中的装置,根据其实现的功能,可以位于终端或网络设备。当采用以上CU-DU的结构时,网络设备可以为CU节点、或DU节点、或包括CU节点和DU节点的RAN设备。
为便于理解本申请内容,下面对本申请涉及的一些通信术语进行解释说明。需要说明的是,该部分内容也作为本申请发明内容的一部分。
随机接入过程,是指从终端发送随机接入信号开始尝试接入网络,到与网络设备建立起基本的信令连接之前的过程。随机接入信号可用于发起随机接入,例如随机接入信号可以为随机接入前导码(random access preamble)。可选的,随机接入信号还可以为解调参考信号(demodulation reference signal,DMRS)。终端可通过随机接入过程与网络设备进行信息交互,实现与通信***的上行时间同步,可选的,还可以通过随机接入过程进行资源请求或数据传输。本申请实施例中,随机接入过程也可以称为随机接入或随机接入信道过程或随机接入方式,本申请对此不做区分,下文描述中可替代使用。
随机接入过程可分为基于竞争的随机接入过程和基于非竞争的随机接入过程。本申请实施例主要以基于竞争的随机接入过程为例进行说明,其中,基于竞争的随机接入过程可包括四步随机接入过程和两步随机接入过程。下面分别介绍。
a、四步随机接入过程
请参考图4,其为本申请实施例提供的一种四步随机接入过程示意图。如图4所示,本申请提供的四步随机接入过程包括如下步骤。
步骤100:网络设备向终端发送随机接入配置信息,则终端可接收来自网络设备的随机接入配置信息,所述随机接入配置信息用于配置四步随机接入的参数,例如,可用于配置四步随机接入资源,四步随机接入资源可包括用于四步随机接入的时频资源以及preamble集合等。该步骤用于执行四步随机接入过程之前的准备工作,不属于四步随机接入过程包括的步骤。
步骤101:终端在预先配置的四步随机接入资源上向网络设备发送随机接入前导码(preamble),则网络设备从终端接收preamble,其中,该preamble又被称为随机接入过程中的第1消息或消息1(MSG1)。
其中,步骤101中终端向网络设备发送的preamble可以为从步骤100中获取到的用于四步随机接入的preamble集合中选择的一个preamble。
步骤102:网络设备在检测到终端发送的preamble后,向终端发送随机接入响应(random access response,RAR)消息,则终端从网络设备接收RAR消息,其中,该RAR消息又被称为四步随机接入过程中的第2消息或消息2(MSG2)。消息2中可包括如下信息中的一种或多种:检测到的preamble的标识或索引、上行时间同步信息、为终端发送消息3分配的上行资源、和回退指示(backoff indicator,BI),当然消息2中还可以包括其他信息。preamble的标识例如为随机接入前导标识(random access preamble identifier,RAPID)。 对于随机接入失败的终端,网络设备可向其发送回退指示,所述回退指示可以用于指示时间值,所述时间值用于确定回退时间范围,当该随机接入过程失败时,终端可在该回退时间范围内选择回退时间,并在选择的回退时间结束之后才可以再次使用网络设备在步骤100中为其配置的四步随机接入资源。需要说明的是,若网络设备未接收到终端发送的preamble,则网络设备发送的消息2中不包括与该终端对应的preamble的标识。
步骤103:终端根据MSG2向网络设备发送上行数据,则网络设备从终端接收该上行数据。其中,该上行数据又被称为四步随机接入过程中的第3消息或消息3(MSG3),MSG3可以包括不同的场景信息的标识,例如,终端的标识(UE-ID)。例如,针对终端进行无线资源控制(radio resource control,RRC)连接重建的场景,对应的场景信息的标识为小区无线网络临时标识(cell radio network temporary identifier,C-RNTI)。MSG 2中可以携带上行资源和TA命令(command)。终端接收到MSG 2之后,使用该TA command所指示的TA值在MSG 2指示的上行资源上发送MSG 3。
步骤104:网络设备在检测到消息3时,向终端发送竞争解决消息,则终端从网络设备接收竞争解决消息,其中,该竞争解决消息又被称为四步随机接入过程中的第4消息或消息4(MSG4)。消息4可以包括消息3的部分内容或包含C-RNTI的物理下行控制信道(physical downlink control channel,PDCCH),即消息4包括PDCCH承载的C-RNTI。例如若网络设备未接收到终端发送的上行数据,消息4可以携带终端的标识;若网络设备未接收到终端发送的上行数据,则网络设备发送的消息4中不包括该终端的标识;终端在接收到该消息4时,可根据消息4携带的终端的标识与自身的标识是否相符来确定是否成功接入网络设备,其中,若两者相符则确定终端成功接入网络设备,若两者不相符则确定终端接入失败。
b、两步随机接入过程
请参考图5,其为本申请实施例提供的一种两步随机接入过程示意图。如图5所示,本申请提供的两步随机接入过程包括如下步骤。
步骤200:网络设备向终端发送随机接入配置信息,则终端可接收来自网络设备的随机接入配置信息,所述随机接入配置信息用于配置两步随机接入的参数,例如,可用于配置两步随机接入资源,两步随机接入资源可包括用于两步随机接入的时频资源以及preamble集合等。该步骤用于执行两步随机接入过程之前的准备工作,不属于两步随机接入过程包括的步骤。
步骤201:终端在预先配置的两步随机接入资源上向网络设备发送消息A(MSG A),则网络设备从终端接收MSG A,其中,MSG A包括随机接入信号和用于竞争解决的信息。
随机接入信号例如为preamble和/或DMRS。可选的,该随机接入信号可以用于网络设备对该用于竞争解决的信息的接收。例如,网络设备根据该随机接入信号可以确定终端传输该用于竞争解决的信息的传输边界,比如终端传输用于竞争解决的信息的位置,例如时隙(slot)的起始位置和/或结束位置等。或者,该随机接入信号可以用于辅助该网络设备对用于竞争解决的信息进行解调。用于竞争解决的信息又可以称为数据或载荷(payload)。该数据可以包括以下信息中的一个或多个:终端的标识、随机数、随机接入的原因值。其中,终端的标识可以为RAN分配的标识,也可以为CN分配的标识,例如小区无线网络临时标识(cell radio network temporary identifier,C-RNTI),5G-S-临时移动用户标识(5G S-temporary mobile subscription identifier,5G-S-TMSI)(核心网分配的终端的标识)的部分 bits(比特),或者***架构演进临时移动用户标识(SAE-temporary mobile subscription identifier,s-TMSI)(核心网分配的终端的标识)的部分bits(比特)。其中,终端的标识可以全部携带于该数据中,或者可以部分携带于该数据中,部分携带于该随机接入信号中。原因值可以包括随机接入的类型或原因的信息,其可以为RRC消息。一种可能的场景中,该数据可包括C-RNTI媒体接入控制元素(medium access control control elements,MAC CE),此时该数据还可以包括缓冲区状态报告(buffer status report,BSR)MAC CE和/或功率余量报告(power headroom report,PHR)MAC CE,其中,BSR用于上报终端的缓冲区状态,PHR用于上报终端的功率余量,以便网络设备在调度的时,进行有效的调度,减少资源浪费。
其中,步骤201中终端向网络设备发送的preamble可以为从步骤200中获取到的用于两步随机接入的preamble集合中选择的一个preamble。
步骤202:网络设备接收到MSG A后向终端发送消息B(MSG B),则网络设备从终端接收MSG B。
MSG B可以包括对随机接入信号的第一响应,或者包括对数据的第二响应,或者,既包括第一响应又包括第二响应。其中第一响应例如可以包括随机接入信号的标识,例如随机接入信号为preamble时,第一响应可以包括RAPID。第二响应可以包括竞争解决信息,该竞争解决信息例如根据用于竞争解决的信息获得,可以为用于竞争解决的信息的部分或全部。该竞争解决信息指示随机接入成功或竞争解决成功。此外,响应消息中的其它信息可以携带在第一响应中,也可以携带在第二响应中,或者独立第一响应和第二响应。
第一响应可以称为随机接入响应消息,第二响应可以称为竞争解决消息。需要说明的是,若数据解码成功且和其他终端没有冲突,网络设备可以发送竞争解决消息给终端。若数据没有解码成功,则网络设备可以发送上行授权给终端,终端可以利用该上行授权传输MSG A中的数据。
本申请实施例中,终端和网络设备均可支持四步随机接入过程和两步随机接入过程,若无特别说明,本申请中所涉及的终端是指可同时支持四步随机接入过程和两步随机接入过程的终端,所涉及的网络设备均是指可同时支持四步随机接入过程和两步随机接入过程的网络设备。
以图1所示的通信***为例,假设RAN110为可同时支持两步随机接入过程和四步随机接入过程的RAN,终端130为可同时支持两步随机接入过程和四步随机接入过程的终端,则RAN110可以为终端130配置两步随机接入的参数和/或四步随机接入的参数,当RAN110为终端130同时配置了两步随机接入的参数和四步随机接入的参数时,终端130既可以采用两步随机接入的参数发起两步随机接入过程,也可以采用四步随机接入的参数发起四步随机接入过程,针对所述两种随机接入过程共存的场景,若终端130当前执行的随机接入过程失败,终端130如何处理,目前还没有相应的解决方法。
鉴于上述存在的问题,本申请实施例提供多种随机接入方法,以适应不同的场景。
针对四步随机接入过程,上文中已描述,对于随机接入失败的终端,网络设备可向终端发送回退指示,终端可在该回退时间范围内选择回退时间,并在选择的回退时间结束之后重新选择四步随机接入资源,进而可使用重新选择的四步随机接入资源发起新的四步随机接入过程。该种回退方法时延较高。
针对两步随机接入过程,在随机接入失败时,可能存在两种可能的实现。一种可能的实现中,在随机接入失败时,网络设备可在MSG B中携带回退指示,且该回退指示的含义与四步随机接入过程中的回退指示含义相同。另一种可能的实现中,在随机接入失败时,网络设备在MSG B中不携带回退指示。
第一种场景中,针对四步随机接入过程和两步随机接入过程,当终端接入失败时,网络设备均可以向终端发送回退指示,但是终端一次仅接收一个回退指示。针对该种场景,网络设备向终端发送的回退指示可以关联四步随机接入资源或两步随机接入资源,可以理解,当回退指示关联四步随机接入资源时,该回退指示为四步随机接入过程中的回退指示,相应的,当回退指示关联两步随机接入资源时,该回退指示为两步随机接入过程中的回退指示。
针对第一种场景,本申请实施例提供一种随机接入方法,终端获取第一类随机接入资源和第二类随机接入资源,其中,第一类随机接入资源用于第一类随机接入,第二类随机接入资源用于第二类随机接入,终端使用第一类随机接入资源中的资源向网络设备发送第一消息,第一消息用于发起第一类随机接入,终端从网络设备接收回退指示,该回退指示关联第一类随机接入资源或第二类随机接入资源,当回退指示关联第一类随机接入资源时,终端在第一类随机接入失败的情况下,在根据回退指示确定的回退时间内在第二类随机接入资源中执行随机接入资源的选择,当回退指示关联第二类随机接入资源时,终端在第一类随机接入失败的情况下,在根据回退指示确定的回退时间内在第一类随机接入资源中执行随机接入资源的选择。
第二种场景中,针对四步随机接入过程,当终端接入失败时,网络设备向终端发送回退指示,且,针对两步随机接入过程,当终端接入失败时,网络设备不向终端发送回退指示。针对该种场景,网络设备向终端发送的回退指示仅可以关联四步随机接入资源。
针对第二种场景,本申请实施例提供一种随机接入方法,终端获取四步随机接入资源和两步随机接入资源,其中,四步随机接入资源用于四步随机接入过程,两步随机接入资源用于两步随机接入过程,终端使用四步随机接入资源中的资源向网络设备发送preamble,发起四步随机接入过程,终端从网络设备接收回退指示,终端在四步随机接入失败的情况下,在根据回退指示确定的回退时间内在两步随机接入资源中执行随机接入资源的选择。
通过本申请实施例提供的上述方法,针对两种随机接入过程共存的场景,若终端当前执行的随机接入过程失败,终端可以在根据回退指示确定出的回退时间内选择随机接入资源,无需等到回退时间结束执行随机接入资源的选择,可减小随机接入资源的选择时延,进而可减小终端重新发起随机接入过程的时延,可提升用户体验。
第三种场景中,针对四步随机接入过程和两步随机接入过程,当终端接入失败时,网络设备均可以向终端发送回退指示,终端一次可接收两个回退指示。
针对第三种场景,本申请实施例提供一种随机接入方法,终端获取第一类随机接入资源和第二类随机接入资源,其中,第一类随机接入资源用于第一类随机接入,第二类随机接入资源用于第二类随机接入;终端使用第一类随机接入资源中的资源向网络设备发送第一消息,第一消息用于发起第一类随机接入;终端从网络设备接收第一回退指示和第二回退指示,第一回退指示关联第一类随机接入,第二回退指示关联第二类随机接入,第一回退指示用于指示第一时间值,第一时间值用于确定第一回退时间范围,第二回退指示用于指示第二时间值,第二时间值用于确定第二回退时间范围;终端在第一类随机接入失败的 情况下,在从第一回退时间范围内选择的第一回退时间后在第一类随机接入资源中执行随机接入资源的选择,或,在从第二回退时间范围内选择的第二回退时间后在第二类随机接入资源中执行随机接入资源的选择。
通过本申请实施例提供的上述方法,针对两种随机接入过程共存的场景,若终端当前执行的随机接入过程失败,终端可以分别根据两种随机接入对应的回退指示执行回退。
下面针对上述场景提供的随机接入方法分别进行说明。
请参考图6,其为本申请实施例提供的一种随机接入方法的实施流程图。参阅图6所示,图6中针对上述第一种场景进行说明,该方法可以但不限于包括如下步骤:
步骤301:终端获取第一类随机接入资源和第二类随机接入资源,其中,第一类随机接入资源用于第一类随机接入,第二类随机接入资源用于第二类随机接入。
其中,随机接入资源可以包括时域资源、频域资源或preamble中的至少一类资源。
本申请实施例中,第一类随机接入可以是两步随机接入过程或四步随机接入过程,第二类随机接入可以是两步随机接入过程或四步随机接入过程,本申请中“第一类”和“第二类”为了区分不同的随机接入过程,并不表示重要程度或先后顺序,也就是说,本申请中第一类随机接入和第二类随机接入为不同的随机接入。例如,当第一类随机接入为四步随机接入过程时,第二类随机接入可以为两步随机接入过程。又例如,当第一类随机接入为两步随机接入过程时,第二类随机接入可以为四步随机接入过程。
可以理解,当第一类随机接入为四步随机接入过程时,相应的,第一类随机接入资源可以理解为四步随机接入资源,四步随机接入资源是指用于四步随机接入过程的资源;或者,当第一类随机接入为两步随机接入过程时,相应的,第一类随机接入资源可以理解为两步随机接入资源,两步随机接入资源是指用于两步随机接入过程的资源。类似的,当第二类随机接入为四步随机接入过程时,相应的,第二类随机接入资源可以理解为四步随机接入资源;或者,当第二类随机接入为两步随机接入过程时,相应的,第二类随机接入资源可以理解为两步随机接入资源。
本申请实施例中,第一类随机接入资源和第二类随机接入资源可以由网络设备发送给终端的随机接入配置信息确定(可以参见图1中步骤100或图2中步骤200),可以理解为,第一类随机接入资源和第二类随机接入资源可以由网络设备配置给终端。
可选的,第一类随机接入资源和第二类随机接入资源可以包括重叠的时频资源,但第一类随机接入资源和第二类随机接入资源包括的随机接入信号资源(例如,preamble资源)不同。或者,第一类随机接入资源和第二类随机接入资源包括的时频资源不同,但可以具有重叠的随机接入信号资源。或者,第一类随机接入资源和第二类随机接入资源的时频资源和随机接入信号资源均不同。以下实施例中第一类随机接入资源和第二类随机接入资源可以是时频资源或随机接入信号资源,或者既包括时频资源也包括随机接入信号资源。
可选的,第一类随机接入资源和第二类随机资源可以在同一配置消息中配置,也可以采用不同的配置消息配置。
步骤302:终端使用第一类随机接入资源中的资源向网络设备发送第一消息,第一消息用于发起第一类随机接入。
本申请实施例中,当第一类随机接入资源为四步随机接入资源时,第一消息可以包括随机接入信号,例如preamble,此时第一消息可以理解为图4中的消息1,用于发起四步 随机接入过程;或者,当第一类随机接入资源为两步随机接入资源时,第一消息可以包括随机接入信号和用于竞争解决的信息,此时第一消息可以理解为图5中的消息A,用于发起两步随机接入过程。
步骤303:终端从网络设备接收回退指示,回退指示用于指示时间值,时间值用于确定回退时间范围。
需要说明的是,步骤303中终端接收到的回退指示可以关联第一类随机接入资源或第二类随机接入资源,本申请对此不做限定。
一种可能的实现中,由于终端发起的是第一类随机接入,故在收到回退指示时,可默认该回退指示关联第一类随机接入资源或关联第一类随机接入。
另一种可能的实现中,终端可以通过隐式指示或显式指示判断步骤303中接收到的回退指示关联的随机接入资源类型。下面分别说明隐式指示和显式指示。
第一,显式指示。终端从网络设备接收第一指示,第一指示用于指示回退指示关联的随机接入资源类型。例如,第一指示可以用于指示回退指示关联的随机接入资源类型为第一类随机接入资源或第二类随机接入资源。
第二,隐式指示。终端根据第一消息对应的随机接入资源类型确定回退指示关联的随机接入资源类型。其中,第一消息对应的随机接入资源类型,可以理解为用于发送第一消息的随机接入资源的类型。例如,当终端使用四步随机接入资源发送第一消息时,第一消息对应的随机接入资源类型为四步随机接入资源,当终端使用两步随机接入资源发送第一消息时,第一消息对应的随机接入资源类型为两步随机接入资源。又例如,若第一消息包括随机接入信号,用于发起四步随机接入过程,则此时对应的随机接入资源类型为四步随机接入资源;若第一消息包括随机接入信号和用于竞争解决的信息,用于发起两步随机接入过程,则此时对应的随机接入资源类型为两步随机接入资源。
对隐式指示的方式进行举例说明。例如,假设第一消息对应的随机接入资源类型为四步随机接入资源,则终端可根据四步随机接入资源确定一个RNTI,后续通过该RNTI接收到的回退指示可确定为关联的随机接入资源类型为四步随机接入资源。类似的,假设第一消息对应的随机接入资源类型为两步随机接入资源,则终端可根据两步随机接入资源确定另一个RNTI,后续通过该RNTI接收到的回退指示可确定为关联的随机接入资源类型为两步随机接入资源。
步骤304:终端在第一类随机接入失败的情况下,在回退时间内在目标类型随机接入资源中执行随机接入资源的选择。其中目标类型随机接入资源包括第一类随机接入资源或第二类随机接入资源。
其中,回退时间为从回退时间范围内选择的时间。一种可能的实现方式中,终端可采用如下方式确定回退时间:终端将从零到回退指示所指示的时间值的范围,确定为回退时间范围,并在所述回退时间范围内随机选择一个时间值作为回退时间。例如,以回退指示所指示的时间值为10ms为例,终端可将从0到10ms的范围确定为回退时间范围,进而可在0到10ms的回退时间范围内随机选择一个时间值作为回退时间,例如可以选择5ms作为回退时间,或者可以选择8ms作为回退时间等。
可选的,第一指示还可以用于指示目标类型随机接入资源,即步骤304中执行随机接入资源的选择的随机接入资源的目标类型。例如,第一指示可以用于指示步骤304中执行随机接入资源的选择的随机接入资源为第一类随机接入资源或第二类随机接入资源。
一种可能的实现中,当回退指示关联的随机接入资源类型为第一类随机接入资源时,目标类型随机接入资源为第二类随机接入资源。
另一种可能的实现中,当回退指示关联的随机接入资源类型为第二类随机接入资源时,目标类型随机接入资源为第一类随机接入资源。
本申请实施例中,终端可采用但不限于如下方式执行步骤304。
终端在第一类随机接入失败的情况下,当在回退时间内满足第一条件时,终端在回退时间内在目标类型随机接入资源中执行随机接入资源的选择。
此外,终端在第一类随机接入失败的情况下,当在回退时间内不满足第一条件时,终端在回退时间之后,可以在第一类随机接入资源或第二类随机接入资源中执行随机接入资源的选择。
其中,第一条件包括如下任一项:
第1项,目标类型随机接入资源对应的同步信号块(synchronization signal block,SSB)包括的参考信号接收功率(reference signal receiving power,RSRP)高于或等于第一预设门限。可选的,第一预设门限可以由网络设备配置。
第2项,目标类型随机接入资源对应的SSB包括的参考信号接收质量(reference signal receiving quality,RSRQ)高于或等于第二预设门限。可选的,第二预设门限可以由网络设备配置。
第3项,目标类型随机接入资源对应的SSB包括的物理下行控制信道(physical downlink control channel,PDCCH)的质量高于或等于第三预设门限。可选的,第三预设门限可以由网络设备配置。
第4项,第一定时器超时,第一定时器是在发起第一类随机接入时针对目标类型随机接入资源启动的定时器或发送第一消息后针对目标类型随机接入资源启动的定时器。第一定时器的功能如下:在第一定时器运行期间限制目标类型随机接入资源的使用,或者限制使用目标类型的随机接入资源发起随机接入,可以理解为,在第一定时器计时时间内不可以使用目标类型的随机接入资源发起随机接入。其中,发送第一消息后启动第一定时器,可以理解为,在第一消息发送完成的情况下启动第一定时器,也可以理解为,在第一消息发送完成后的预设时间内启动第一定时器。
第5项,目标类型随机接入资源先到达。可以理解为,目标类型随机接入资源的开始时刻早于其它类型随机接入资源。本申请中,目标类型随机接入资源与其它类型随机接入资源是一个相对的概念。例如,当目标类型随机接入资源为第一类随机接入资源时,其它类型随机接入资源为第二类随机接入资源;反之,当目标类型随机接入资源为第二类随机接入资源时,其它类型随机接入资源为第一类随机接入资源。
一种可能的实现方式中,终端在回退时间之后,还可以在回退指示关联的随机接入资源类型的随机接入资源中执行随机接入资源的选择。例如,以回退指示关联的随机接入资源类型为第一类随机接入资源为例,终端在回退时间之后,还可以在第一类随机接入资源中执行随机接入资源的选择。又例如,以回退指示关联的随机接入资源类型为第二类随机接入资源为例,终端在回退时间之后,还可以在第二类随机接入资源中执行随机接入资源的选择。
本申请实施例中,终端若在回退时间内选择随机接入资源,则可以使用回退时间内选择的随机接入资源发起随机接入。或者,终端若在回退时间后选择随机接入资源,则可以 使用回退时间后选择的随机接入资源发起随机接入。
本申请实施例中,在执行步骤304之前,终端还可以采用但不限于如下方式确定第一类随机接入失败。
方式1,终端在第一预设时长内未接收到网络设备发送的针对第一消息的响应消息,确定第一类随机接入失败。例如,以第一消息为四步随机接入过程中的消息1、第一类随机接入为四步随机接入为例,若终端在第一预设时长内未接收到网络设备发送的消息2,则确定四步随机接入失败。又例如,以第一消息为两步随机接入过程中的消息A、第一类随机接入为两步随机接入为例,若终端在第一预设时长内未接收到网络设备发送的消息B,则确定两步随机接入失败。
方式2,终端在第二预设时长内未接收到网络设备发送的针对第一消息的竞争解决消息,确定第一类随机接入失败。
需要说明的是,第一预设时长和第二预设时长可以相同,也可以不同。第一预设时长和第二预设时长可以由网络设备配置,可适应不同场景为不同的值,不做限定。
可以理解,网络设备或终端可以执行上述实施例中的部分或全部步骤,这些步骤或操作仅是示例,本申请实施例还可以执行其它操作或者各种操作的变形。此外,各个步骤可以按照上述实施例呈现的不同的顺序来执行,并且有可能并非要执行上述实施例中的全部操作。
下面以两个实例对本申请图6提供的随机接入方法进行举例说明。
实例1
请参考图7,其为本申请实施例提供的一种随机接入方法的实施流程图。参阅图7所示,图7中以第一类随机接入为四步随机接入过程、第一类随机接入资源为四步随机接入资源、第二类随机接入为两步随机接入过程、第二类随机接入资源为两步随机接入资源为例说明,该方法可以但不限于包括如下步骤:
步骤401:终端获取四步随机接入资源和两步随机接入资源。四步随机接入资源和两步随机接入资源可以包括时频资源,或preamble资源,或时频资源以及preamble资源。
步骤402:终端使用四步随机接入资源中的时频资源向网络设备发送preamble,发起四步随机接入过程。当四步随机接入资源和两步随机接入资源包括的preamble资源不同时,该preamble为四步随机接入资源包括的preamble。
步骤403:终端从网络设备接收回退指示。该回退指示关联四步随机接入资源或四步随机接入。
可选的,终端可以根据网络设备发送的指示信息确定所述回退指示关联四步随机接入资源或四步随机接入。或者,终端可以根据preamble对应的随机接入资源类型确定所述回退指示关联四步随机接入资源或四步随机接入。
步骤404a:终端在四步随机接入过程失败的情况下,当在回退时间内满足第一条件时,在回退时间内在目标类型随机接入资源中执行随机接入资源的选择。其中目标类型随机接入资源为两步随机接入资源。
步骤404b:终端在四步随机接入过程失败的情况下,当在回退时间内不满足第一条件时,终端在回退时间之后,可以在四步随机接入资源或两步随机接入资源中执行随机接入资源的选择。
步骤404a与步骤404b可以择一执行。
步骤405a:若执行步骤404a,则终端可以在回退时间内选择的随机接入资源发起随机接入。
步骤405b:若执行步骤404b,则终端可以在回退时间后选择的随机接入资源发起随机接入。
需要说明的是,图7仅作为示意,在实际应用中图7所示的方法还可包括更多或更少的步骤,本申请不做限定。
实例2
请参考图8,其为本申请实施例提供的一种随机接入方法的实施流程图。参阅图8所示,图8中以第一类随机接入为两步随机接入过程、第一类随机接入资源为两步随机接入资源、第二类随机接入为四步随机接入过程、第二类随机接入资源为四步随机接入资源为例说明,该方法可以但不限于包括如下步骤:
步骤501:终端获取两步随机接入资源和四步随机接入资源。四步随机接入资源和两步随机接入资源可以包括时频资源,或preamble资源,或时频资源以及preamble资源。
步骤502:终端使用两步随机接入资源中的时频资源向网络设备发送preamble和用于竞争解决的信息,发起两步随机接入过程。当四步随机接入资源和两步随机接入资源包括的preamble资源不同时,该preamble为两步随机接入资源包括的preamble。
步骤503:终端从网络设备接收回退指示。该回退指示关联两步随机接入资源或两步随机接入。
可选的,终端可以根据网络设备发送的指示信息确定所述回退指示关联两步随机接入资源或两步随机接入。或者,终端可以根据preamble对应的随机接入资源类型确定所述回退指示关联两步随机接入资源或两步随机接入。
步骤504a:终端在两步随机接入过程失败的情况下,当在回退时间内满足第一条件时,在回退时间内在目标类型随机接入资源中执行随机接入资源的选择。其中目标类型随机接入资源为四步随机接入资源。
步骤504b:终端在两步随机接入过程失败的情况下,当在回退时间内不满足第一条件时,终端在回退时间之后,可以在四步随机接入资源或两步随机接入资源中执行随机接入资源的选择。
步骤504a与步骤504b可以择一执行。
步骤505a:若执行步骤504a,则终端可以在回退时间内选择的随机接入资源发起随机接入。
步骤505b:若执行步骤504b,则终端可以在回退时间后选择的随机接入资源发起随机接入。
需要说明的是,图8仅作为示意,在实际应用中图8所示的方法还可包括更多或更少的步骤,本申请不做限定。
综上,对于本申请图6提供的随机接入方法,终端在四步随机接入过程失败的情况下,若确定与四步随机接入关联的回退时间内,满足使用两步随机接入资源的条件,则可以在与四步随机接入关联的回退时间内在两步随机接入资源中选择随机接入资源发起两步随机接入过程,可以理解为,从四步随机接入过程切换至两步随机接入过程;类似的,终端在两步随机接入过程失败的情况下,若确定与两步随机接入关联的回退时间内,满足使用四步随机接入资源的条件,则可以在与两步随机接入关联的回退时间内在四步随机接入资 源中选择随机接入资源发起四步随机接入过程,可以理解为,从两步随机接入过程切换至四步随机接入过程,参阅图9所示。这样,针对两种随机接入过程共存的场景,若终端当前执行的随机接入过程失败,终端可以在回退时间内选择随机接入资源,无需等到回退时间结束执行随机接入资源的选择,可减小随机接入资源的选择时延,进而可减小终端重新发起随机接入过程的时延,可提升用户体验。
请参考图10,其为本申请实施例提供的一种随机接入方法的实施流程图。参阅图10所示,图10中针对上述第二种场景进行说明,该方法可以但不限于包括如下步骤:
步骤601:终端获取四步随机接入资源和两步随机接入资源。四步随机接入资源和两步随机接入资源可以包括时频资源,或preamble资源,或时频资源以及preamble资源。
步骤602a:终端使用四步随机接入资源中的时频资源向网络设备发送preamble,发起四步随机接入过程。当四步随机接入资源和两步随机接入资源包括的preamble资源不同时,该preamble为四步随机接入资源包括的preamble。
步骤602b:终端使用两步随机接入资源中的时频资源向网络设备发送preamble和用于竞争解决的信息,发起两步随机接入过程。可以理解,该preamble为两步随机接入资源包括的preamble。
在该实例中,步骤602a与步骤602b择一执行。
步骤603:终端从网络设备接收回退指示。由于在第二种场景中,针对两步随机接入过程,当终端接入失败时,网络设备不向终端发送回退指示,故步骤603中终端收到的该回退指示必然关联四步随机接入资源或四步随机接入。
步骤604a:终端在四步随机接入过程失败的情况下,当在回退时间内满足第一条件时,在回退时间内在目标类型随机接入资源中执行随机接入资源的选择。其中目标类型随机接入资源为两步随机接入资源。
步骤604b:终端在四步随机接入过程失败的情况下,当在回退时间内不满足第一条件时,终端在回退时间之后,可以在四步随机接入资源或两步随机接入资源中执行随机接入资源的选择。
步骤604a与步骤604b可以择一执行。
步骤605a:若执行步骤604a,则终端可以在回退时间内选择的随机接入资源发起随机接入。
步骤605b:若执行步骤604b,则终端可以在回退时间后选择的随机接入资源发起随机接入。
需要说明的是,图10仅作为示意,在实际应用中图10所示的方法还可包括更多或更少的步骤,本申请不做限定。
请参考图11,其为本申请实施例提供的一种随机接入方法的实施流程图。参阅图11所示,图11中针对上述第三种场景进行说明,该方法可以但不限于包括如下步骤:
步骤701-步骤702与步骤301-步骤302执行相同操作,此处不再赘述。
步骤703:终端从网络设备接收第一回退指示和第二回退指示。其中,第一回退指示关联第一类随机接入,第二回退指示关联第二类随机接入,第一回退指示用于指示第一时间值,第一时间值用于确定第一回退时间范围,第二回退指示用于指示第二时间值,第二时间值用于确定第二回退时间范围。
本申请实施例中,第一回退指示和第二回退指示可以通过同一个媒体接入控制(media  access control,MAC)层协议数据单元(protocol data unit,PDU)承载,也可以通过不同的MAC PDU承载。本申请主要以通过同一个MAC PDU承载为例说明。
一种可能的实现方式中,用于承载第一回退指示和第二回退指示的同一MAC PDU中还可以包括第一指示信息和第二指示信息,第一指示信息用于指示与第一回退指示对应的随机接入方式或随机接入资源类型,第二指示信息用于指示与第二回退指示对应的随机接入方式或随机接入资源类型。
示例性地,第一回退指示和第二回退指示可以承载于同一MAC PDU的不同子PDU中。第一回退指示和第一指示信息可以承载于同一MAC PDU的相同子PDU中,第二回退指示和第二指示信息可以承载于同一MAC PDU的相同子PDU中。例如,如图12所示,图12中以第一回退指示和第二回退指示通过同一个MAC PDU的不同子PDU承载为例,承载第一回退指示的子PDU1中还包括第一指示信息,承载第二回退指示的子PDU2中还包括第二指示信息。
示例性地,第一指示信息和第二指示信息均可以为一个比特位,可通过该比特位的取值来指示与回退指示对应的随机接入方式或随机接入资源类型。例如,以第一指示信息为1比特为例,当该1比特的取值为1时,可以用于指示与第一回退指示对应的随机接入方式为四步随机接入或用于指示与第一回退指示对应的随机接入资源类型为四步随机接入资源,当该1比特的取值为0时,可以用于指示与第一回退指示对应的随机接入方式为两步随机接入或用于指示与第一回退指示对应的随机接入资源类型为两步随机接入资源。又例如,以第二指示信息为1比特为例,当该1比特的取值为1时,可以用于指示与第二回退指示对应的随机接入方式为四步随机接入或用于指示与第二回退指示对应的随机接入资源类型为四步随机接入资源,当该1比特的取值为0时,可以用于指示与第二回退指示对应的随机接入方式为两步随机接入或用于指示与第二回退指示对应的随机接入资源类型为两步随机接入资源。
又一种可能的实现方式中,第一回退指示和第二回退指示位于同一MAC PDU的不同子PDU(subPDU)。基于该实现,终端可以根据第一回退指示和第二回退指示分别位于的subPDU到达时间的先后顺序,确定与第一回退指示和第二回退指示对应的随机接入方式或随机接入资源类型。示例性地,可以将先到达的subPDU中包括的第一回退指示确定为与四步随机接入方式或四步随机接入资源类型对应的回退指示,相应的,将后到达的subPDU中包括的第二回退指示确定为与两步随机接入方式或两步随机接入资源类型对应的回退指示;当然,也可以将先到达的subPDU中包括的第一回退指示确定为与两步随机接入方式或两步随机接入资源类型对应的回退指示,相应的,将后到达的subPDU中包括的第二回退指示确定为与四步随机接入方式或四步随机接入资源类型对应的回退指示,不做限定。
步骤704:终端在第一类随机接入失败的情况下,在第一回退时间后在第一类随机接入资源中执行随机接入资源的选择,或,在第二回退时间后在第二类随机接入资源中执行随机接入资源的选择。其中,第一回退时间为从第一回退时间范围内选择的时间,第二回退时间为从第二回退时间范围内选择的时间。本申请实施例中,终端确定第一回退时间和第二回退时间的方法可参见步骤304中确定回退时间的方法,不再赘述。
一种可能的实现方式中,终端在第一类随机接入失败的情况下,若在第一回退时间内满足随机接入资源选择条件,则终端在第一回退时间内选择随机接入资源,发起随机接入, 此时,不再根据第二回退时间执行回退;或者,终端在第一类随机接入失败的情况下,若在第二回退时间内满足随机接入资源选择条件,则终端在第二回退时间内选择随机接入资源,发起随机接入,此时,不再根据第一回退时间执行回退。
例如,终端在第一类随机接入失败的情况下,若在第一回退时间内第二类随机接入资源对应的SSB包括的RSRP或RSRQ或PDCCH的质量高于或等于预设值,或,禁用第二类随机接入资源的定时器超时,或,第二类随机接入资源先到达,则终端可以在第一回退时间内选择第二类随机接入资源,发起随机接入,此时,不再根据第二回退时间执行回退。
又例如,终端在第一类随机接入失败的情况下,若在第二回退时间内第一类随机接入资源对应的SSB包括的RSRP或RSRQ或PDCCH的质量高于或等于预设值,或,禁用第一类随机接入资源的定时器超时,或,第一类随机接入资源先到达,则终端可以在第二回退时间内选择第一类随机接入资源,发起随机接入,此时,不再根据第一回退时间执行回退。
一种可能的实现方式中,终端在第一类随机接入失败的情况下,若在第一回退时间内和第二回退时间内均不满足随机接入资源选择条件,则终端可以在第一回退时间和第二回退时间后在第一类随机接入资源或第二类随机接入资源中选择随机接入资源以发起随机接入。
可选的,终端可在第一类随机接入资源与第二类随机接入资源中优先级较高的随机接入资源中选择用于发起随机接入的资源。其中,第一类随机接入资源与第二类随机接入资源的优先级可预先设置,也可以由网络设备配置,还可以由网络设备指示优先级较高或较低的随机接入资源的类型。例如,可以预先配置选择四步随机接入资源的优先级高于选择两步随机接入资源的优先级,或者,预先配置选择两步随机接入资源的优先级高于选择四步随机接入资源的优先级。又例如,网络设备可以向终端发送优先级指示,可以用于指示四步随机接入资源与两步随机接入资源的优先级关系,以1比特指示为例,当该1比特的取值为1时,可以指示四步随机接入资源的优先级高于两步随机接入资源的优先级,相应的,当该1比特的取值为0时,可以指示四步随机接入资源的优先级低于两步随机接入资源的优先级。
上述主要从终端和网络设备交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,终端和网络设备为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。结合本申请中所公开的实施例描述的各示例的单元及算法步骤,本申请实施例能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。本领域技术人员可以对每个特定的应用来使用不同的方法来实现所描述的功能,但是这种实现不应认为超出本申请实施例的技术方案的范围。
本申请实施例可以根据上述方法示例对终端和网络设备进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
基于相同的发明构思,本申请实施例还提供用于实现以上任一种方法的装置,例如,提供一种装置包括用以实现以上任一种方法中终端所执行的各个步骤的单元(或手段)。再如,还提供另一种装置,包括用以实现以上任一种方法中网络设备所执行的各个步骤的 单元(或手段)。
一种可能的实施方式中,本申请实施例提供一种随机接入装置100。该随机接入装置100可以应用于终端。图13所示为本申请实施例提供的一种随机接入装置100的结构示意图,参阅图13所示,该随机接入装置100包括处理单元110。在实施中,随机接入装置100还可包括发送单元120和接收单元130。
其中,当随机接入装置100用于执行图6所示的方法时,处理单元110可用于获取第一类随机接入资源和第二类随机接入资源,发送单元120可用于使用第一类随机接入资源中的资源向网络设备发送第一消息,接收单元130可用于从网络设备接收回退指示,处理单元110还可用于在第一类随机接入失败的情况下,在回退时间内在目标类型随机接入资源中执行随机接入资源的选择。
其中,当随机接入装置100用于执行图11所示的方法时,处理单元110可用于获取第一类随机接入资源和第二类随机接入资源,发送单元120可用于使用第一类随机接入资源中的资源向网络设备发送第一消息,接收单元130可用于从网络设备接收第一回退指示和第二回退指示,处理单元110还可用于在第一类随机接入失败的情况下,在第一回退时间后在第一类随机接入资源中执行随机接入资源的选择,或,在第二回退时间后在第二类随机接入资源中执行随机接入资源的选择。
在上述可能的实施方式中,第一类随机接入资源用于第一类随机接入,第二类随机接入资源用于第二类随机接入,第一消息用于发起第一类随机接入,回退指示用于指示时间值,时间值用于确定回退时间范围,回退时间为从回退时间范围内选择的时间,目标类型随机接入资源包括第一类随机接入资源或第二类随机接入资源。
另一种可能的实施方式中,本申请实施例还提供一种随机接入装置200。该随机接入装置200可以应用于网络设备。图14所示为本申请实施例提供的一种随机接入装置200的结构示意图,参阅图14所示,该随机接入装置200包括接收单元210和发送单元220。
其中,当随机接入装置200用于执行图6所示的方法时,接收单元210可用于接收终端使用第一类随机接入资源中的资源发送的第一消息,发送单元220可用于向所述终端发送回退指示。
其中,当随机接入装置200用于执行图11所示的方法时,接收单元210可用于接收终端使用第一类随机接入资源中的资源发送的第一消息,发送单元220可用于向终端发送第一回退指示和第二回退指示。
在上述可能的实施方式中,第一类随机接入资源用于第一类随机接入,第二类随机接入资源用于第二类随机接入,第一消息用于发起第一类随机接入,第一回退指示关联第一类随机接入,第二回退指示关联第二类随机接入,第一回退指示用于指示第一时间值,第一时间值用于确定第一回退时间范围,第二回退指示用于指示第二时间值,第二时间值用于确定第二回退时间范围,第一回退时间为从第一回退时间范围内选择的时间,第二回退时间为从第二回退时间范围内选择的时间。
当随机接入装置100应用于终端,随机接入装置200应用于网络设备,且执行图6所示的方法时,还可执行如下操作:
一种可能的实施方式中,发送单元220还可以用于向终端发送第一指示,接收单元130还可以用于从网络设备接收第一指示,第一指示用于指示回退指示关联的随机接入资源类型。
一种可能的实施方式中,处理单元110还可以用于根据第一消息对应的随机接入资源类型确定回退指示关联的随机接入资源类型。
一种可能的实施方式中,当回退指示关联的随机接入资源类型为第一类随机接入资源时,目标类型随机接入资源为第二类随机接入资源;或,当回退指示关联的随机接入资源类型为第二类随机接入资源时,目标类型随机接入资源为第一类随机接入资源。
一种可能的实施方式中,处理单元110还可以用于在回退时间之后,在回退指示关联的随机接入资源类型的随机接入资源中执行随机接入资源的选择。
一种可能的实施方式中,目标类型随机接入资源为第二类随机接入资源。
一种可能的实施方式中,当在回退时间内满足第一条件时,处理单元110还可以用于在回退时间内在目标类型随机接入资源中执行随机接入资源的选择。
一种可能的实施方式中,当在回退时间内不满足第一条件时,处理单元110还可以用于在回退时间之后,在第一类随机接入资源或第二类随机接入资源中执行随机接入资源的选择。
一种可能的实施方式中,处理单元110还可以用于使用选择的随机接入资源发起随机接入。
一种可能的实施方式中,处理单元110还可以用于在第一预设时长内未接收到网络设备发送的针对第一消息的响应消息,确定第一类随机接入失败;或者,处理单元110还可以用于在第二预设时长内未接收到网络设备发送的针对第一消息的竞争解决消息,确定第一类随机接入失败。
一种可能的实施方式中,第一条件可以包括但不限于:目标类型随机接入资源对应的同步信号块SSB包括的参考信号接收功率RSRP高于第一预设门限;或,目标类型随机接入资源对应的SSB包括的参考信号接收质量RSRQ高于第二预设门限;或,目标类型随机接入资源对应的SSB包括的物理下行控制信道PDCCH的质量高于第三预设门限;或,第一定时器超时,第一定时器是在发起第一类随机接入时针对目标类型随机接入资源启动的定时器或发送第一消息后针对目标类型随机接入资源启动的定时器;或,目标类型随机接入资源先到达。
一种可能的实施方式中,第一类随机接入为四步随机接入过程,第二类随机接入为两步随机接入过程;或者,第一类随机接入为两步随机接入过程,第二类随机接入为四步随机接入过程。
一种可能的实施方式中,第一消息包括随机接入信号;或者,第一消息包括随机接入信号和用于竞争解决的信息。
当随机接入装置100应用于终端,随机接入装置200应用于网络设备,且执行图11所示的方法时,还可执行如下操作:
一种可能的实施方式中,处理单元110还可以用于在第一类随机接入失败的情况下,若在第一回退时间内满足随机接入资源选择条件,则在第一回退时间内选择随机接入资源,发起随机接入,不再根据第二回退时间执行回退。
一种可能的实施方式中,处理单元110还可以用于在第一类随机接入失败的情况下,若在第一回退时间内和第二回退时间内均不满足随机接入资源选择条件,则可以在第一类随机接入资源或第二类随机接入资源中选择随机接入资源以发起随机接入。
一种可能的实施方式中,处理单元110还可以用于在第一类随机接入资源与第二类随 机接入资源中优先级较高的随机接入资源中选择用于发起随机接入的资源。其中,第一类随机接入资源与第二类随机接入资源的优先级可预先设置,也可以由网络设备配置,还可以由网络设备指示优先级较高或较低的随机接入资源的类型。
一种可能的实施方式中,第一回退指示和第二回退指示可以位于同一个MAC PDU中。当然也可以位于不同的MAC PDU中。
一种可能的实施方式中,MAC PDU中还包括第一指示信息和第二指示信息,第一指示信息用于指示与第一回退指示对应的随机接入方式或随机接入资源类型,第二指示信息用于指示与第二回退指示对应的随机接入方式或随机接入资源类型。
一种可能的实施方式中,第一回退指示和第二回退指示位于MAC PDU的不同子PDU(subPDU)。基于该设计,处理单元110还可以用于根据第一回退指示和第二回退指示分别位于的subPDU到达时间的先后顺序,确定与第一回退指示和第二回退指示对应的随机接入方式或随机接入资源类型。
应理解以上装置中单元的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且装置中的单元可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分单元以软件通过处理元件调用的形式实现,部分单元以硬件的形式实现。例如,各个单元可以为单独设立的处理元件,也可以集成在装置的某一个芯片中实现,此外,也可以以程序的形式存储于存储器中,由装置的某一个处理元件调用并执行该单元的功能。此外这些单元全部或部分可以集成在一起,也可以独立实现。这里的处理元件又可以成为处理器,可以是一种具有信号的处理能力的集成电路。在实现过程中,上述方法的各步骤或以上各个单元可以通过处理器元件中的硬件的集成逻辑电路实现或者以软件通过处理元件调用的形式实现。
在一个例子中,以上任一装置中的单元可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个特定集成电路(application specific integrated circuit,ASIC),或,一个或多个微处理器(digital singnal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA),或这些集成电路形式中至少两种的组合。再如,当装置中的单元可以通过处理元件调度程序的形式实现时,该处理元件可以是通用处理器,例如中央处理器(central processing unit,CPU)或其它可以调用程序的处理器。再如,这些单元可以集成在一起,以片上***(system-on-a-chip,SOC)的形式实现。
以上用于接收的单元是一种该装置的接口电路,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,该接收单元是该芯片用于从其它芯片或装置接收信号的接口电路。以上用于发送的单元是一种该装置的接口电路,用于向其它装置发送信号。例如,当该装置以芯片的方式实现时,该发送单元是该芯片用于向其它芯片或装置发送信号的接口电路。
终端通过与网络设备之间的接口协议与终端交互信息,例如,发送第一消息;终端与网络设备之间通过无线连接,终端通过无线接口与网络设备交互信息,例如发送第一消息。
请参考图15,其为本申请实施例提供的一种终端的结构示意图。其可以为以上实施例中的终端,用于实现以上实施例中终端的操作。如图15所示,该终端包括:天线1501、射频部分1502、信号处理部分1503。天线1501与射频部分1502连接。在下行方向上, 射频部分1502通过天线1501接收网络设备发送的信息,将网络设备发送的信息发送给信号处理部分1503进行处理。在上行方向上,信号处理部分1503对终端的信息进行处理,并发送给射频部分1502,射频部分1502对终端的信息进行处理后经过天线1501发送给网络设备。
信号处理部分1503可以包括调制解调子***,用于实现对数据各通信协议层的处理;还可以包括中央处理子***,用于实现对终端操作***以及应用层的处理;此外,还可以包括其它子***,例如多媒体子***,周边子***等,其中多媒体子***用于实现对终端相机,屏幕显示等的控制,周边子***用于实现与其它设备的连接。调制解调子***可以为单独设置的芯片。可选地,以上用于终端的装置可以位于该调制解调子***。
调制解调子***可以包括一个或多个处理元件15031,例如,包括一个主控CPU和其它集成电路。此外,该调制解调子***还可以包括存储元件15032和接口电路15033。存储元件15032用于存储数据和程序,但用于执行以上方法中终端所执行的方法的程序可能不存储于该存储元件15032中,而是存储于调制解调子***之外的存储器中,使用时调制解调子***加载使用。接口电路15033用于与其它子***通信。以上用于终端的装置可以位于调制解调子***,该调制解调子***可以通过芯片实现,该芯片包括至少一个处理元件和接口电路,其中处理元件用于执行以上终端执行的任一种方法的各个步骤,接口电路用于与其它装置通信。在一种实现中,终端实现以上方法中各个步骤的单元可以通过处理元件调度程序的形式实现,例如应用于终端的装置包括处理元件和存储元件,处理元件调用存储元件存储的程序,以执行以上方法实施例中终端执行的方法。存储元件可以为处理元件处于同一芯片上的存储元件,即片内存储元件。
在另一种实现中,用于执行以上方法中终端所执行的方法的程序可以在与处理元件处于不同芯片上的存储元件,即片外存储元件。此时,处理元件从片外存储元件调用或加载程序于片内存储元件上,以调用并执行以上方法实施例中终端执行的方法。
在又一种实现中,应用于终端的装置实现以上方法中各个步骤的单元可以是被配置成一个或多个处理元件,这些处理元件设置于调制解调子***上,这里的处理元件可以为集成电路,例如:一个或多个ASIC,或,一个或多个DSP,或,一个或者多个FPGA,或者这些类集成电路的组合。这些集成电路可以集成在一起,构成芯片。
终端实现以上方法中各个步骤的单元可以集成在一起,以片上***(system-on-a-chip,SOC)的形式实现,该SOC芯片,用于实现以上方法。该芯片内可以集成至少一个处理元件和存储元件,由处理元件调用存储元件的存储的程序的形式实现以上终端执行的方法;或者,该芯片内可以集成至少一个集成电路,用于实现以上终端执行的方法;或者,可以结合以上实现方式,部分单元的功能通过处理元件调用程序的形式实现,部分单元的功能通过集成电路的形式实现。
可见,以上应用于终端的装置可以包括至少一个处理元件和接口电路,其中至少一个处理元件用于执行以上方法实施例所提供的任一种终端执行的方法。处理元件可以以第一种方式:即调用存储元件存储的程序的方式执行终端执行的部分或全部步骤;也可以以第二种方式:即通过处理器元件中的硬件的集成逻辑电路结合指令的方式执行终端执行的部分或全部步骤;当然,也可以结合第一种方式和第二种方式执行终端执行的部分或全部步骤。
这里的处理元件同以上描述,可以是通用处理器,例如CPU,还可以是被配置成实施 以上方法的一个或多个集成电路,例如:一个或多个ASIC,或,一个或多个微处理器DSP,或,一个或者多个FPGA等,或这些集成电路形式中至少两种的组合。
存储元件可以是一个存储器,也可以是多个存储元件的统称。
请参考图16,其为本申请实施例提供的一种网络设备的结构示意图。用于实现以上实施例中网络设备的操作。如图16所示,该网络设备包括:天线1601、射频装置1602、基带装置1603。天线1601与射频装置1602连接。在上行方向上,射频装置1602通过天线1601接收终端发送的信息,将终端发送的信息发送给基带装置1603进行处理。在下行方向上,基带装置1603对终端的信息进行处理,并发送给射频装置1602,射频装置1602对终端的信息进行处理后经过天线1601发送给终端。
基带装置1603可以包括一个或多个处理元件16031,例如,包括一个主控CPU和其它集成电路。此外,该基带装置1603还可以包括存储元件16032和接口电路16033,存储元件16032用于存储程序和数据;接口电路16033用于与射频装置1602交互信息,该接口电路例如为通用公共无线接口(common public radio interface,CPRI)。以上应用于网络设备的装置可以位于基带装置1603,例如,以上应用于网络设备的装置可以为基带装置1603上的芯片,该芯片包括至少一个处理元件和接口电路,其中处理元件用于执行以上网络设备执行的任一种方法的各个步骤,接口电路用于与其它装置通信。在一种实现中,网络设备实现以上方法中各个步骤的单元可以通过处理元件调度程序的形式实现,例如应用于网络设备的装置包括处理元件和存储元件,处理元件调用存储元件存储的程序,以执行以上方法实施例中网络设备执行的方法。存储元件可以为处理元件处于同一芯片上的存储元件,即片内存储元件,也可以为与处理元件处于不同芯片上的存储元件,即片外存储元件。
在另一种实现中,应用于网络设备的装置实现以上方法中各个步骤的单元可以是被配置成一个或多个处理元件,这些处理元件设置于基带装置上,这里的处理元件可以为集成电路,例如:一个或多个ASIC,或,一个或多个DSP,或,一个或者多个FPGA,或者这些类集成电路的组合。这些集成电路可以集成在一起,构成芯片。
网络设备实现以上方法中各个步骤的单元可以集成在一起,以片上***(system-on-a-chip,SOC)的形式实现,例如,基带装置包括该SOC芯片,用于实现以上方法。该芯片内可以集成至少一个处理元件和存储元件,由处理元件调用存储元件的存储的程序的形式实现以上网络设备执行的方法;或者,该芯片内可以集成至少一个集成电路,用于实现以上网络设备执行的方法;或者,可以结合以上实现方式,部分单元的功能通过处理元件调用程序的形式实现,部分单元的功能通过集成电路的形式实现。
可见,以上应用于网络设备的装置可以包括至少一个处理元件和接口电路,其中至少一个处理元件用于执行以上方法实施例所提供的任一种网络设备执行的方法。处理元件可以以第一种方式:即调用存储元件存储的程序的方式执行网络设备执行的部分或全部步骤;也可以以第二种方式:即通过处理器元件中的硬件的集成逻辑电路结合指令的方式执行网络设备执行的部分或全部步骤;当然,也可以结合第一种方式和第二种方式执行以上网络设备执行的部分或全部步骤。
这里的处理元件同以上描述,可以是通用处理器,例如CPU,还可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个ASIC,或,一个或多个微处理器DSP, 或,一个或者多个FPGA等,或这些集成电路形式中至少两种的组合。
存储元件可以是一个存储器,也可以是多个存储元件的统称。
本领域内的技术人员应明白,本申请的实施例可提供为方法、***、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请的方法、设备(***)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (28)

  1. 一种随机接入方法,其特征在于,包括:
    终端获取第一类随机接入资源和第二类随机接入资源,其中,所述第一类随机接入资源用于第一类随机接入,所述第二类随机接入资源用于第二类随机接入;
    所述终端使用所述第一类随机接入资源中的资源向网络设备发送第一消息,所述第一消息用于发起所述第一类随机接入;
    所述终端从所述网络设备接收回退指示,所述回退指示用于指示时间值,所述时间值用于确定回退时间范围;
    所述终端在所述第一类随机接入失败的情况下,在回退时间内在目标类型随机接入资源中执行随机接入资源的选择,所述回退时间为从所述回退时间范围内选择的时间,所述目标类型随机接入资源包括所述第一类随机接入资源或所述第二类随机接入资源。
  2. 如权利要求1所述的方法,其特征在于,还包括:
    所述终端从所述网络设备接收第一指示,所述第一指示用于指示所述回退指示关联的随机接入资源类型;或者,
    所述终端根据所述第一消息对应的随机接入资源类型确定所述回退指示关联的随机接入资源类型。
  3. 如权利要求2所述的方法,其特征在于,还包括:
    当所述回退指示关联的随机接入资源类型为所述第一类随机接入资源时,所述目标类型随机接入资源为所述第二类随机接入资源;或,
    当所述回退指示关联的随机接入资源类型为所述第二类随机接入资源时,所述目标类型随机接入资源为所述第一类随机接入资源。
  4. 如权利要求2或3所述的方法,其特征在于,还包括:
    所述终端在所述回退时间之后,在所述回退指示关联的随机接入资源类型的随机接入资源中执行随机接入资源的选择。
  5. 如权利要求1所述的方法,其特征在于,所述目标类型随机接入资源为所述第二类随机接入资源。
  6. 如权利要求1至5任一项所述的方法,其特征在于,所述终端在所述第一类随机接入失败的情况下,在回退时间内在目标类型随机接入资源中执行随机接入资源的选择,包括:
    当在所述回退时间内满足第一条件时,所述终端在所述回退时间内在所述目标类型随机接入资源中执行随机接入资源的选择。
  7. 如权利要求1至5任一项所述的方法,其特征在于,还包括:
    当在所述回退时间内不满足第一条件时,所述终端在所述回退时间之后,在所述第一类随机接入资源或所述第二类随机接入资源中执行随机接入资源的选择。
  8. 如权利要求6或7所述的方法,其特征在于,所述第一条件包括:
    所述目标类型随机接入资源对应的同步信号块SSB包括的参考信号接收功率RSRP高于或等于第一预设门限;或,
    所述目标类型随机接入资源对应的SSB包括的参考信号接收质量RSRQ高于或等于第二预设门限;或,
    所述目标类型随机接入资源对应的SSB包括的物理下行控制信道PDCCH的质量高于或等于第三预设门限;或,
    第一定时器超时,所述第一定时器是在发起所述第一类随机接入时针对所述目标类型随机接入资源启动的定时器或发送所述第一消息后针对所述目标类型随机接入资源启动的定时器;或,
    所述目标类型随机接入资源先到达。
  9. 如权利要求1至8任一项所述的方法,其特征在于,还包括:
    所述终端使用选择的随机接入资源发起随机接入。
  10. 如权利要求1至9任一项所述的方法,其特征在于,还包括:
    所述终端在第一预设时长内未接收到所述网络设备发送的针对所述第一消息的响应消息,确定所述第一类随机接入失败;或者,
    所述终端在第二预设时长内未接收到所述网络设备发送的针对所述第一消息的竞争解决消息,确定所述第一类随机接入失败。
  11. 如权利要求1至10任一项所述的方法,其特征在于,所述第一类随机接入为四步随机接入过程,所述第二类随机接入为两步随机接入过程;或者,所述第一类随机接入为两步随机接入过程,所述第二类随机接入为四步随机接入过程。
  12. 如权利要求1至11任一项所述的方法,其特征在于,所述第一消息包括随机接入信号;或者,所述第一消息包括随机接入信号和用于竞争解决的信息。
  13. 一种随机接入方法,其特征在于,包括:
    网络设备接收终端使用第一类随机接入资源中的资源发送的第一消息,所述第一类随机接入资源用于第一类随机接入,所述第一消息用于发起所述第一类随机接入;
    所述网络设备向所述终端发送回退指示,所述回退指示用于指示时间值,所述时间值用于确定回退时间范围。
  14. 如权利要求13所述的方法,其特征在于,还包括:
    所述网络设备向所述终端发送第一指示,所述第一指示用于指示所述回退指示关联的随机接入资源类型;或者,
    所述第一消息对应的随机接入资源类型用于确定所述回退指示关联的随机接入资源类型。
  15. 如权利要求14所述的方法,其特征在于,还包括:
    当所述回退指示关联的随机接入资源类型为所述第一类随机接入资源时,目标类型随机接入资源为第二类随机接入资源;或,
    当所述回退指示关联的随机接入资源类型为第二类随机接入资源时,目标类型随机接入资源为所述第一类随机接入资源;
    其中,所述第二类随机接入资源用于第二类随机接入,所述目标类型随机接入资源用于所述终端执行随机接入资源的选择。
  16. 如权利要求15所述的方法,其特征在于,所述第一类随机接入为四步随机接入过程,所述第二类随机接入为两步随机接入过程;或者,所述第一类随机接入为两步随机接入过程,所述第二类随机接入为四步随机接入过程。
  17. 如权利要求13至16任一项所述的方法,其特征在于,所述第一消息包括随机接入信号;或者,所述第一消息包括随机接入信号和用于竞争解决的信息。
  18. 一种随机接入装置,用于终端,其特征在于,包括:用于执行如权利要求1至12任一项所述方法中各步骤的单元或手段。
  19. 一种随机接入装置,用于网络设备,其特征在于,包括:用于执行如权利要求13至17任一项所述方法中各步骤的单元或手段。
  20. 一种随机接入装置,其特征在于,包括:至少一个处理器和接口电路,其中,所述至少一个处理器用于通过所述接口电路与其它装置通信,并执行如权利要求1至12任一项所述的方法。
  21. 一种随机接入装置,其特征在于,包括:至少一个处理器和接口电路,其中,所述至少一个处理器用于通过所述接口电路与其它装置通信,并执行如权利要求13至17任一项所述的方法。
  22. 一种随机接入装置,其特征在于,包括处理器,用于调用存储器中存储的程序,以执行如权利要求1至12任一项所述的方法。
  23. 一种随机接入装置,其特征在于,包括处理器,用于调用存储器中存储的程序,以执行如权利要求13至17任一项所述的方法。
  24. 一种终端,其特征在于,包括如权利要求18或权利要求20或权利要求22所述的装置。
  25. 一种计算机可读存储介质,其特征在于,包括程序,当所述程序被处理器运行时,如权利要求1至17中任一项所述的方法被执行。
  26. 一种通信***,其特征在于,包括如权利要求18、20或22中任一项所述的随机接入装置以及如权利要求19、21或23中任一项所示的随机接入装置。
  27. 一种包含指令的计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得计算机执行权利要求1至17中任一项所述的方法。
  28. 一种芯片,其特征在于,包括处理器,所述处理器,用于从存储器中调用并运行计算机程序,以执行如权利要求1至17中任一所述的方法。
PCT/CN2020/087840 2019-04-29 2020-04-29 一种随机接入方法和装置 WO2020221306A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20798088.9A EP3955684A4 (en) 2019-04-29 2020-04-29 RANDOM ACCESS METHOD AND APPARATUS
US17/511,686 US20220053557A1 (en) 2019-04-29 2021-10-27 Random access method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910357356.3 2019-04-29
CN201910357356.3A CN111867125B (zh) 2019-04-29 2019-04-29 一种随机接入方法和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/511,686 Continuation US20220053557A1 (en) 2019-04-29 2021-10-27 Random access method and apparatus

Publications (1)

Publication Number Publication Date
WO2020221306A1 true WO2020221306A1 (zh) 2020-11-05

Family

ID=72966392

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/087840 WO2020221306A1 (zh) 2019-04-29 2020-04-29 一种随机接入方法和装置

Country Status (4)

Country Link
US (1) US20220053557A1 (zh)
EP (1) EP3955684A4 (zh)
CN (1) CN111867125B (zh)
WO (1) WO2020221306A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113891487A (zh) * 2020-07-03 2022-01-04 维沃移动通信有限公司 随机接入方法、装置及网络侧设备
CN115175270A (zh) * 2021-04-02 2022-10-11 北京紫光展锐通信技术有限公司 通信方法、装置、可读取存储介质和计算机设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103037473A (zh) * 2011-09-30 2013-04-10 中兴通讯股份有限公司 一种终端对上行无线公共资源的使用方法和终端
CN103037474A (zh) * 2011-09-30 2013-04-10 中兴通讯股份有限公司 一种终端对上行无线公共资源的使用方法和终端
CN108271275A (zh) * 2017-01-04 2018-07-10 电信科学技术研究院 一种竞争随机接入的方法和装置
US10154520B1 (en) * 2015-09-14 2018-12-11 Newracom, Inc. Methods for random access in a wireless network
US20190053289A1 (en) * 2016-03-14 2019-02-14 Futurewei Technologies, Inc. System and Method for Random Access Backoffs

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10390372B2 (en) * 2016-09-28 2019-08-20 Lg Electronics Inc. Carrier reselection under backoff mechanism of random access procedure
KR102462404B1 (ko) * 2016-10-07 2022-11-03 삼성전자 주식회사 향상된 경쟁 기반 랜덤 액세스 절차를 위한 방법 및 장치
WO2018127549A1 (en) * 2017-01-06 2018-07-12 Sony Corporation Wireless telecommunications apparatuses and methods
CN108696893B (zh) * 2017-04-07 2023-03-17 中兴通讯股份有限公司 一种上行数据发送方法、装置、基站及用户设备
CN109429355B (zh) * 2017-08-23 2022-02-01 维沃移动通信有限公司 一种随机接入的处理方法、用户终端及网络侧设备
CN112771981A (zh) * 2018-08-22 2021-05-07 上海诺基亚贝尔股份有限公司 基站配置的混合随机接入过程
EP3869837A4 (en) * 2018-10-31 2022-06-15 Beijing Xiaomi Mobile Software Co., Ltd. METHOD AND APPARATUS FOR TRANSMITTING RANDOM ACCESS INDICATION INFORMATION
CN109511156B (zh) * 2018-11-29 2021-06-04 华为技术有限公司 一种选择prach资源的方法及装置
CN111465113B (zh) * 2019-01-22 2023-04-25 上海朗帛通信技术有限公司 一种被用于无线通信的节点中的方法和节点
WO2020164825A1 (en) * 2019-02-15 2020-08-20 Sony Corporation Communications device, infrastructure equipment and methods
WO2020194758A1 (ja) * 2019-03-28 2020-10-01 株式会社Nttドコモ ユーザ装置及び通信方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103037473A (zh) * 2011-09-30 2013-04-10 中兴通讯股份有限公司 一种终端对上行无线公共资源的使用方法和终端
CN103037474A (zh) * 2011-09-30 2013-04-10 中兴通讯股份有限公司 一种终端对上行无线公共资源的使用方法和终端
US10154520B1 (en) * 2015-09-14 2018-12-11 Newracom, Inc. Methods for random access in a wireless network
US20190053289A1 (en) * 2016-03-14 2019-02-14 Futurewei Technologies, Inc. System and Method for Random Access Backoffs
CN108271275A (zh) * 2017-01-04 2018-07-10 电信科学技术研究院 一种竞争随机接入的方法和装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NOKIA ET AL.: "2-step RACH Procedure Feature lead summary- Update 3", 3GPP TSG RAN WG1 #96BIS R1-1905874, 15 April 2019 (2019-04-15), XP051707918, DOI: 20200615170811A *
See also references of EP3955684A4 *

Also Published As

Publication number Publication date
EP3955684A1 (en) 2022-02-16
CN111867125B (zh) 2022-12-06
CN111867125A (zh) 2020-10-30
US20220053557A1 (en) 2022-02-17
EP3955684A4 (en) 2022-06-01

Similar Documents

Publication Publication Date Title
EP3989644B1 (en) Network slice selection
US12028904B2 (en) Data transmission method and apparatus
TWI688302B (zh) 重新導向通訊裝置的裝置及方法
CN111565473A (zh) 一种随机接入方法和装置
WO2020135850A1 (zh) 通信方法和装置
EP3611987B1 (en) Communication method and apparatus
JP7248816B2 (ja) 情報送信方法および情報送信装置
WO2021062797A1 (zh) 配置方法和装置
US20220053557A1 (en) Random access method and apparatus
US20240121844A1 (en) Communication processing method of terminal information and related device
WO2021170110A1 (zh) 一种通信方法及装置
WO2021087929A1 (zh) 一种随机接入的方法和装置
US20240049327A1 (en) Communication method, apparatus, and system
JP2024517912A (ja) ユーザ装置、及びユーザ装置の方法
WO2020164527A1 (zh) 一种随机接入方法和装置
WO2020206643A1 (zh) 一种随机接入方法、设备及存储介质
US20220053558A1 (en) Random access method and apparatus
WO2018227510A1 (zh) 接入控制方法及相关产品
WO2022000509A1 (zh) 无线通信方法、终端设备和网络设备
CN111757537B (zh) 随机接入方法和装置
WO2021022423A1 (zh) 一种传输数据的方法和装置
WO2021062688A1 (zh) 一种随机接入方法及装置
WO2021087801A1 (zh) 一种通信方法,通信装置及通信***
RU2791244C1 (ru) Способ и устройство произвольного доступа
WO2020192441A1 (zh) 随机接入方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20798088

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020798088

Country of ref document: EP

Effective date: 20211110