WO2022002203A1 - 随机接入方法、装置及网络侧设备 - Google Patents

随机接入方法、装置及网络侧设备 Download PDF

Info

Publication number
WO2022002203A1
WO2022002203A1 PCT/CN2021/104017 CN2021104017W WO2022002203A1 WO 2022002203 A1 WO2022002203 A1 WO 2022002203A1 CN 2021104017 W CN2021104017 W CN 2021104017W WO 2022002203 A1 WO2022002203 A1 WO 2022002203A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
access resource
iab
indication
resource
Prior art date
Application number
PCT/CN2021/104017
Other languages
English (en)
French (fr)
Inventor
文鸣
杨晓东
刘进华
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Priority to JP2022580905A priority Critical patent/JP7464760B2/ja
Priority to EP21833415.9A priority patent/EP4178304A4/en
Publication of WO2022002203A1 publication Critical patent/WO2022002203A1/zh
Priority to US18/147,793 priority patent/US20230138947A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • H04W74/085Random access procedures, e.g. with 4-step access with collision treatment collision avoidance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0866Non-scheduled access, e.g. ALOHA using a dedicated channel for access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/008Transmission of channel access control information with additional processing of random access related information at receiving side
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/047Public Land Mobile systems, e.g. cellular systems using dedicated repeater stations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the present application belongs to the field of communication technologies, and in particular relates to a random access method, apparatus and network side equipment.
  • a Backoff Indicator (BI) is used to instruct the terminal to prohibit access to the network for a period of time.
  • IAB nodes are usually configured with general random access resources and/or IAB-specific random access resources available.
  • the related art does not define the behavior of the IAB node when it receives BI. In this way, The IAB node will not be able to perform the next action after receiving the BI, which affects the effectiveness of the communication.
  • the purpose of the embodiments of the present application is to provide a random access method, apparatus, and network-side device, which are used to solve the problem that the behavior of an IAB node when receiving BI is not defined in the related art, which affects the effectiveness of communication.
  • a first aspect provides a random access method, which is applied to an IAB node, including: in a random access process initiated through a first random access resource, if a fallback indication is received, performing one of the following: according to The back-off indication generates a waiting time, and after the waiting time expires, the random access procedure is re-initiated; the back-off indication is ignored, and the random access process is re-initiated through the first random access resource or the second random access resource access process.
  • an apparatus for random access including: a processing module, configured to perform one of the following if a fallback indication is received during the random access process initiated by the first random access resource: according to The back-off indication generates a waiting time, and after the waiting time expires, the random access procedure is re-initiated; the back-off indication is ignored, and the random access process is re-initiated through the first random access resource or the second random access resource access process.
  • a network-side device in a third aspect, includes a processor, a memory, and a program or instruction stored on the memory and executable on the processor, the program or instruction being executed by the The method as described in the first aspect is implemented when the processor executes.
  • a readable storage medium is provided, and a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, the method according to the first aspect is implemented.
  • a chip in a fifth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement the method according to the first aspect .
  • the IAB node initiates random access through the first random access resource, and if a backoff instruction is received, it can generate a waiting time according to the backoff instruction and wait, and initiate random access again after the waiting time expires.
  • the entry process can also be ignored, that is, without waiting, the random access is directly initiated again through the first random access resource or the second random access resource.
  • the embodiment of the present application defines the behavior when the IAB node receives the fallback instruction, so as to improve the effectiveness of communication; meanwhile, the embodiment of the present application can reduce the waiting time for the IAB node to access and/or the competition risk of random access resources.
  • FIG. 1 is a block diagram of a wireless communication system according to an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a random access method according to an embodiment of the present application
  • FIG. 3 is a schematic diagram of a MAC subheader format according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a MAC subheader format according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a random access method according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of an apparatus for random access according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a network side device according to an embodiment of the present application.
  • first, second and the like in the description and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and "first”, “second” distinguishes Usually it is a class, and the number of objects is not limited.
  • the first object may be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the associated objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced LTE-Advanced
  • LTE-A Long Term Evolution-Advanced
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency-Division Multiple Access
  • system and “network” in the embodiments of the present application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies.
  • NR New Radio
  • the following description describes a New Radio (NR) system for example purposes, and uses NR terminology in most of the description below, although these techniques are also applicable to applications other than NR system applications, such as 6th generation (6 th Generation, 6G) communication system.
  • 6th generation 6 th Generation, 6G
  • FIG. 1 shows a block diagram of a wireless communication system to which the embodiments of the present application can be applied.
  • the wireless communication system includes an access device 11 and a network-side device 12 .
  • the access device 11 can be a terminal or an IAB node, and the IAB node can include a mobile terminal (Mobile Termination, MT) functional part and a distributed unit (Distributed Unit, DU) functional part, and the DU can provide network services for other access devices.
  • MT Mobile Termination
  • DU distributed Unit
  • the terminal mentioned above can be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, a super mobile personal computer Computer (ultra-mobile personal computer, UMPC), mobile Internet device (Mobile Internet Device, MID), wearable device (Wearable Device) or vehicle-mounted equipment (VUE), pedestrian terminal (PUE) and other terminal-side devices, wearable Equipment includes: bracelets, earphones, glasses, etc. It should be noted that, the embodiment of the present application does not limit the specific type of the IAB node.
  • the network side device 12 may be a base station or a core network, wherein the base station may be referred to as a Node B, an evolved Node B, an access point, a Base Transceiver Station (BTS), a radio base station, a radio transceiver, a basic service Set (Basic Service Set, BSS), Extended Service Set (Extended Service Set, ESS), Node B, Evolved Node B (eNB), Next Generation Node B (gNB), Home Node B, Home Evolved Node B, WLAN Access point, WiFi node, Transmitting Receiving Point (TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical vocabulary. In the application embodiments, only the base station in the NR system is used as an example, but the specific type of the base station is not limited.
  • the IAB node Since the behavior of the IAB node when it receives the BI is not defined in the related art, the IAB node cannot perform the next action after receiving the BI, which affects the effectiveness of communication. Assuming that the IAB node follows the BI indication method of the terminal in the related art, after receiving the BI in the existing format (as long as any one of the random access resources is congested), the IAB node will prohibit the IAB-MT from using all random access resources. For a period of time, when there are still available random access resources, the IAB node delays initiating the random access procedure according to the received BI, which increases the random access delay of the IAB node.
  • an embodiment of the present application provides a random access method 200, which can be configured by Executed from an Integrated Access and Backhaul (IAB) node, in other words, the method can be executed by software or hardware installed in the IAB node, and the method includes the following steps.
  • IAB Integrated Access and Backhaul
  • S202 During the random access process initiated through the first random access resource, if a backoff indication (Backoff Indicator, BI) is received, perform one of the following: generate a waiting time according to the backoff indication, and end the waiting time Then initiate the random access process again; ignore the fallback indication, and initiate the random access process again through the first random access resource or the second random access resource.
  • a backoff indication Backoff Indicator, BI
  • the generation of the waiting time according to the fallback indication mentioned in this embodiment may specifically be generating a waiting time value, such as 20 milliseconds, according to the fallback indication.
  • the above-mentioned re-initiating the random access process after the waiting time expires includes: after the waiting time expires, re-initiating the random access process through the first random access resource or the second random access resource.
  • the action mentioned in S202 to perform one of the following includes: performing one of the following according to a predefined rule, the predefined rule Including: the random access resource type to which the fallback indication is applicable, and/or whether the fallback indication is applicable to the IAB node, the random access resource type mentioned here includes the first random access resource type resource and/or the second random access resource.
  • the above-mentioned predefined rules may be agreed in a protocol, pre-configured, or indicated by received indication information.
  • the network side node selected by the IAB node is configured with the first random access resource and the second random access resource at the same time, and the network side node may be an upstream access point of the IAB node, such as an IAB parent node (parent node). IAB node) or IAB node (IAB-donor); the network side node can also be a base station or the like.
  • the above-mentioned first random access resource is an IAB dedicated random access resource
  • the second random access resource is a general random access resource
  • the first random access resource is a general random access resource
  • the second random access resource is an IAB dedicated random access resource
  • the above-mentioned general random access resources can be configured through the rach-ConfigCommon parameter of the random access channel common configuration (RACH-ConfigCommon) type, and the rach-ConfigCommon parameter can configure the random access resources of common terminals (such as UE) common to the cell, including Physical random access channel configuration index (prach-ConfigurationIndex), PRACH retransmission parameters, time-frequency resources for PRACH transmission, PRACH resources (preamble, PRACH time-frequency resources) and synchronization and broadcast blocks (Synchronization Signal and physical broadcast channel Block, SSB ), etc., are referred to as general random access resources in the embodiments of this application.
  • RACH-ConfigCommon random access channel common configuration
  • prach-ConfigurationIndex Physical random access channel configuration index
  • PRACH retransmission parameters time-frequency resources for PRACH transmission
  • PRACH resources preamble, PRACH time-frequency resources
  • SSB synchronization and broadcast blocks
  • the above-mentioned IAB dedicated random access resource may be configured through the rach-ConfigCommonIAB parameter of the RACH-ConfigCommonIAB type, and the rach-ConfigCommonIAB parameter is used to configure the physical random access that can be used by the IAB-Mobile Terminal (IAB-Mobile Termination, IAB-MT).
  • a channel (Physical Random Access Channel, PRACH) resource is referred to as an IAB dedicated random access resource in this embodiment of the present application.
  • the IAB node Before S202, the IAB node can initiate a random access process through the first random access resource, for example, send a random access process to the base station (or the upstream node of the IAB, etc., and the base station is used as an example for description later) on the first random access resource.
  • the base station Enter the preamble (random access preamble), the base station can send a random access response (Random Access Response, RAR) message according to the current load condition, the RAR message can also be called Msg 2 in the four-step random access process, It can also be called Msg B in the two-step random access procedure.
  • RAR Random Access Response
  • the RAR message sent by the base station to the IAB node may carry a fallback indication, so that the IAB node can execute the steps of S202.
  • receiving the fallback indication mentioned in S202 includes: receiving a RAR message, where the RAR message includes a T1 indication field and a T2 indication field, the value of the T1 indication field is 0, and the T2 indication The value of the field is 0.
  • FIG. 3 shows a MAC subheader (subheader) format of a RAR message including a back-off indication (BI) in two-step random access.
  • the E indication field is used to indicate whether there are other MAC subheaders after the MAC subheader.
  • R indicates that the field is a reserved field.
  • the T1 indication field is used to indicate whether the MAC subheader contains a random access preamble ID or T2.
  • the T1 indication field is set to "1" to indicate that the random access preamble ID exists in the MAC subheader; the T1 indication field is set to "0", indicating that there is a T2 indication field in the MAC subheader.
  • the T2 indication field is used to indicate whether the MAC subheader contains a fallback indication (BI) indication field or a MAC service data unit (Service Data Unit, SDU) indication field.
  • BI fallback indication
  • SDU Service Data Unit
  • the T2 indication field is set to "0" to indicate that there is a fallback indication field (BI field in Figure 2) in the MAC subheader; the T2 indication field is set to "1" to indicate that there is a fallback indication field in the MAC subheader MAC SDU indication field.
  • the fallback indication field ie, the BI indication field
  • the BI indication field is used to indicate the overload condition of the cell, and the size of the BI indication field may be 4 bits.
  • the receiving a fallback indication mentioned in S202 includes: receiving a RAR message.
  • the RAR message includes a T indication field, and the value of the T indication field is 0.
  • FIG. 4 shows the MAC sub-header format of the RAR message including the back-off indication (BI) in the four-step random access.
  • the E indication field is used to indicate whether there are other MAC subheaders after the MAC subheader.
  • R indicates that the field is a reserved field.
  • the T indication field is used to indicate whether the MAC subheader contains the random access preamble ID or the BI indication field.
  • the T indication field is set to "1" to indicate that the random access preamble ID exists in the MAC subheader; the T indication field is set to "0", indicating that the BI indication field exists in the MAC subheader.
  • the BI indication field shown in FIG. 3 or FIG. 4 will indicate an index value, for example, when the BI is the index value 6, the represented value is 80ms.
  • the generation of the waiting time according to the fallback instruction mentioned in S202 may include: the IAB node generates a random number within 0-80ms, such as 58ms, then the IAB node does not initiate initial access to the cell within 58ms, and then After 58ms, the random access process is initiated again.
  • the IAB node initiates random access through the first random access resource, and if it receives a fallback instruction, it can generate a waiting time according to the fallback instruction and wait, and after the waiting time expires The random access process is initiated again; the fallback indication can also be ignored, that is, the random access can be initiated again directly through the first random access resource or the second random access resource without waiting.
  • the embodiment of the present application defines the behavior when the IAB node receives the fallback instruction, so as to improve the effectiveness of communication; meanwhile, the embodiment of the present application can reduce the waiting time for the IAB node to access and/or the competition risk of random access resources.
  • the general random access resources mentioned in the various embodiments of this application may include 2-step general random access resources and 4-step general random access resources; the IAB-specific random access resources mentioned in the various embodiments of this application.
  • the incoming resources may include 2-step IAB-specific random access resources and 4-step IAB-specific random access resources.
  • the 2-step random access resources or the 4-step random access resources used by the IAB node before and after are the same. If the withdrawal instruction is not used, the corresponding 4-step general/4-step IAB dedicated random access resources are still used for access, and generally do not switch to 2-step general/2-step IAB dedicated random access resources for access.
  • the IAB-MT is configured with the first random access resource and the second random access resource at the same time, the IAB-MT initiates random access (for example, sends a random access preamble) through the first random access resource, and the IAB-MT
  • the RAR message corresponding to the first random access resource can be received (it is assumed here that the IAB-MT cannot decode the RAR message corresponding to the second random access resource), therefore, this embodiment is called the first random access resource
  • the resource and the fallback indication (BI) in the RAR message is a corresponding relationship between the resource and the fallback indication (BI) in the RAR message.
  • IAB-MT can perform one of the following methods 1 and 2.
  • Method 1 The IAB-MT ignores the above fallback indication and does not wait for any time.
  • the IAB-MT directly uses the first random access resource or the second random access resource for access, that is, uses the first random access resource or the second random access resource.
  • the random access resource initiates the random access procedure again.
  • IAB-MT generates a waiting time according to the time corresponding to the index (Index) of the BI indication field, and then selects the first random access resource or the second random access resource for access after the waiting time expires, that is, using the first random access resource.
  • a random access resource or a second random access resource initiates the random access process again.
  • the first random access resource may be an IAB dedicated random access resource
  • the second random access resource may be a general random access resource
  • the first random access resource is a general random access resource
  • the second random access resource is an IAB dedicated random access resource
  • the first random access resource is an IAB dedicated random access resource.
  • the IAB-MT directly uses the second random access resource without waiting for any time, that is, the general random access resource is used for access.
  • this example can reduce the waiting time of IAB node access, and can also reduce the competition risk of random access resources.
  • the first random access resource is the IAB dedicated random access resource.
  • the IAB-MT does not wait for any time and still uses the first random access resource, that is, still uses the IAB dedicated random access resource. Access, this example can reduce the waiting time of IAB node access.
  • the Distributed Unit (DU) function of the IAB node can provide services for more terminals, such as providing access services for terminals, which can reduce the load of the current cell, so Priority is given to allowing IAB nodes to successfully access.
  • DU Distributed Unit
  • the first random access resource is a general random access resource.
  • the IAB-MT does not wait for any time, and directly uses the second random access resource, that is, uses the IAB dedicated random access resource for access.
  • the waiting time for IAB node access can be reduced, and the competition risk of random access resources can also be reduced.
  • the first random access resource is a general random access resource.
  • the IAB-MT does not wait for any time and still uses the first random access resource, that is, the general random access resource is used for access.
  • this example can reduce the waiting time of IAB node access.
  • the Distributed Unit (DU) function of the IAB node can provide services for more terminals, such as providing access services for terminals, which can reduce the load of the current cell, so Priority is given to allowing IAB nodes to successfully access.
  • DU Distributed Unit
  • the IAB-MT is configured with the first random access resource and the second random access resource at the same time.
  • IAB-MT can perform one of the following methods 1 and 2.
  • Method 1 This BI is only applicable to general random access resources, not to IAB dedicated random access resources. Method 1 can be further subdivided into the following two sub-methods.
  • Method 1a If the access resource selected by the IAB-MT is the IAB-specific random access resource, that is, the first random access resource is the IAB-specific random access resource, the second random access resource is the general random access resource, and the IAB- The MT ignores the above-mentioned fallback instruction and does not wait for any time, and the IAB-MT initiates the random access procedure again using the IAB dedicated random access resource or general random access resource.
  • Method 1b If the access resource selected by the IAB-MT is a general random access resource, that is, the first random access resource is a general random access resource, the second random access resource is an IAB dedicated random access resource, and the IAB-MT The waiting time is generated according to the time indicated by the Index of the BI, and after the waiting time is over, the IAB dedicated random access resource or the general random access resource is selected for access.
  • Method 2 The BI is applicable to general random access resources and IAB-specific random access resources.
  • the IAB-MT generates a waiting time according to the time indicated by the Index of BI, and then selects IAB dedicated random access resources or general random access resources for access after the waiting time expires.
  • the first random access resource is a general random access resource
  • the second random access resource is an IAB dedicated random access resource
  • the first random access resource is an IAB dedicated random access resource
  • the second random access resource is an IAB dedicated random access resource.
  • the incoming resource is the general random access resource.
  • the IAB-MT ignores the BI indication in the RAR, that is, when the IAB-MT selects any random access resource for access, it does not wait for any time, and directly initiates re-initiation through the first random access resource or the second random access resource random access procedure.
  • the IAB-MT may execute any one of Method 1 to Method 3 according to a predefined rule, where the predefined rule includes: the fallback indicates an applicable random access resource type, and/or the fallback Indicates whether it is applicable to the IAB node, and the random access resource type mentioned here includes the first random access resource and/or the second random access resource.
  • the predefined rule includes: the fallback indicates an applicable random access resource type, and/or the fallback Indicates whether it is applicable to the IAB node, and the random access resource type mentioned here includes the first random access resource and/or the second random access resource.
  • the above-mentioned predefined rules may be agreed in a protocol, pre-configured, or indicated by received indication information.
  • the IAB-MT executes any one of the methods 1 to 3 according to the received indication information, which will constitute the method 4 of the second embodiment of the present application.
  • Method 4 Indicate the type of random access resource to which the BI is applicable, etc., through an additional indication.
  • this embodiment informs the IAB or the UE of the random access resource type and the like to which the fallback indication is applicable at this time through an additional indication.
  • indication information such as an RRC indication
  • the indication information is used to indicate at least one of the following: the type of random access resources to which the fallback indication is applicable, and whether the fallback indication is applicable to the IAB node; wherein, the random access resource type includes the first random access resource and/or the second random access resource.
  • the system message mentioned above can be a master system information block (MasterInformationBlock, MIB), a system information block 1 (SystemInformationBlocks 1, SIB1), or other system information blocks, such as SIBx, where x represents system information
  • MIB MasterInformationBlock
  • SIB1 SystemInformationBlocks 1, SIB1
  • SIBx system information blocks
  • x represents system information
  • the number of the block, x can be 2, 3, etc.
  • the IAB node may also receive indication information.
  • the receiving indication information includes: receiving a broadcast type Radio Resource Control (Radio Resource Control, RRC) message.
  • RRC Radio Resource Control
  • the above-mentioned indication information indicates the random access resource type applicable to the BI sent by the base station (it may indicate one resource type or both resource types at the same time) and/or whether it is applicable to IAB-MT, etc., For details, refer to Method 1 to Method 3 in Example 2, etc. In this way, the IAB-MT can be performed according to any one of the above-mentioned methods 1 to 3 based on the indication information.
  • special parameters are configured for the IAB through the RRC message.
  • the scaling factor (scaling-factor) of the BI is configured in the RRC message. After each IAB node receives the BI indication, it can first generate an initial waiting time, and then use the The initial latency is multiplied by a scaling factor, which can be a positive number less than or equal to 1, to obtain the final latency.
  • the generating the waiting time according to the fallback instruction mentioned in S202 includes: multiplying the time generated by the fallback instruction by a scaling factor to obtain the waiting time; wherein the scaling factor is less than or A positive number equal to 1.
  • the scaling factor is 0.5
  • the representative value is 80ms.
  • the IAB node generates a random number within 0 to 80ms, such as 58ms, and multiplies 58ms by the scaling factor 0.5 to get 29. Then, the IAB node no longer initiates initial access to the cell within 29ms, and at 58ms After the end, the random access procedure is initiated again.
  • the IAB node multiplies the value 80ms represented by the index value 6 by the scaling factor 0.5 to get 40, and generates a random number within 0-40ms, such as 19ms, then the IAB node will no longer initiate an initial call to the cell within 19ms access.
  • the above-mentioned scaling factor is a positive number less than 1, which is equivalent to reducing the waiting time of IAB node access in this example.
  • the Distributed Unit (DU) function of the IAB node can provide services for more terminals, such as providing access services for terminals, which can reduce the load of the current cell, so Priority is given to allowing IAB nodes to successfully access.
  • the IAB node may also receive an RRC message, where the RRC message is used to configure the scaling factor for the IAB node.
  • the fourth embodiment is a specific embodiment, as shown in FIG. 5 , including the following steps:
  • the IAB-MT receives a system message from the base station, where the system message includes MIB and SIB1 messages, and acquires PRACH transmission resource configuration and related parameters of the preamble sequence.
  • the IAB-MT sends the Preamble through the first random access resource, and calculates its own random access wireless network temporary identity (Random Access-Radio Network Temporary Identity, RA-RNTI) for identifying Msg2.
  • RA-RNTI Random Access-Radio Network Temporary Identity
  • IAB-MT blindly detects the Physical Downlink Control Channel (PDCCH), and decodes the RAR data carried by the corresponding Physical Downlink Shared Channel (PDSCH), and the received RAR message indicates that BI exists domain, as shown in Figures 3 and 4.
  • PDCCH Physical Downlink Control Channel
  • PDSCH Physical Downlink Shared Channel
  • the received RAR message includes a T1 indication field and a T2 indication field, the value of the T1 indication field is 0, and the value of the T2 indication field is 0.
  • the received RAR message includes a T indication field, and the value of the T indication field is 0.
  • Method 1 The BI is only applicable to general random access resources, and not applicable to IAB dedicated random access resources. Method 1 can be further subdivided into the following two sub-methods.
  • Method 1a The IAB-MT receives the BI when it selects the IAB dedicated random access resource for access, and does not wait for any time.
  • the IAB-MT uses the IAB dedicated random access resource or general random access resource to initiate the random access process again. .
  • IAB-MT uses general random access resources to access, generates a waiting time according to the time indicated by the Index of BI, and selects IAB dedicated random access resources or general random access resources for access after the waiting time expires.
  • Method 2 The BI is applicable to general random access resources and IAB dedicated random access resources.
  • IAB-MT When IAB-MT selects any random resource to access, it generates a waiting time according to the time indicated by the Index of BI, and then accesses after the waiting time expires.
  • the IAB-MT ignores the BI indication in the RAR, that is, the IAB-MT does not wait for any time when selecting any random resource to access.
  • Method 4 indicate at least one of the following: the random access resource type applicable to the BI and whether the BI is suitable for IAB-MT, wherein the random access resource type includes the first random access resource and/or the second random access resource.
  • the RRC indicator may be carried in the system message (MIB/SIB1/SIBx), indicating the applicable random access type of the BI sent by the base station (it may indicate one type or both types) or whether it is applicable at IAB-MT.
  • the RRC indicator indicates that the BI is suitable for the IAB dedicated random access resource type.
  • the IAB-MT selects the IAB dedicated random access resource for access, and generates the waiting time according to the time indicated by the Index of the BI. After the end, select the IAB dedicated random access resource for access.
  • the RRC indicator indicates that BI is only applicable to the general random access resource type, so the IAB-MT does not need to wait for any time when using the dedicated random access resource to access.
  • the RRC indicator indicates that BI is only applicable to general random access resources. After IAB-MT uses general random access resources to initiate random access and receives BI, IAB-MT can switch to IAB dedicated random access resources for access. , without waiting any time.
  • Contention resolution If the PDCCH is detected, the corresponding PDSCH is successfully decoded, and if there is a matching contention resolution identifier (for example, contention resolution MAC CE), it means that the contention resolution is resolved, and the TC-RNTI is set as the cell wireless network temporary identifier (Cell). -Radio Network Temporary Identity, C-RNTI).
  • contention resolution MAC CE contention resolution MAC CE
  • the execution subject may be a random access device, or a control module in the random access device for executing the random access method.
  • the random access device provided by the embodiment of the present application is described by taking the random access method performed by the random access device as an example.
  • FIG. 6 is a schematic structural diagram of an apparatus for random access according to an embodiment of the present application, and the apparatus may correspond to an IAB node in other embodiments. As shown in FIG. 6, apparatus 600 includes:
  • the processing module 602 may be configured to, in the random access process initiated by the first random access resource, if a backoff indication is received, perform one of the following: generate a waiting time according to the backoff indication, and perform one of the following steps in the backoff indication. After the waiting time expires, the random access process is re-initiated; the back-off indication is ignored, and the random access process is re-initiated through the first random access resource or the second random access resource.
  • the apparatus 600 initiates random access through the first random access resource, and if a backoff instruction is received, it can generate a waiting time according to the backoff instruction and wait, and initiate random access again after the waiting time expires
  • the entry process can also be ignored, that is, without waiting, the random access is directly initiated again through the first random access resource or the second random access resource.
  • the embodiment of the present application defines the behavior when the IAB node receives the fallback instruction, so as to improve the communication effectiveness; meanwhile, the embodiment of the present application can reduce the waiting time of access and/or the competition risk of random access resources.
  • the processing module 602 may be configured to initiate the random access procedure again by using the first random access resource or the second random access resource after the waiting time expires .
  • the first random access resource is an IAB dedicated random access resource
  • the second random access resource is a general random access resource
  • the first random access resource is General random access resources
  • the second random access resources are IAB dedicated random access resources.
  • the processing module 602 is configured to, according to the type of random access resource to which the fallback indication is applicable, and/or whether the fallback indication is applicable to the IAB node, execute the The random access resource type includes the first random access resource and/or the second random access resource.
  • the processing module 602 ignores the fallback indication, and initiates the random access procedure again through the first random access resource or the second random access resource; wherein the first random access resource
  • the random access resource is an IAB dedicated random access resource
  • the second random access resource is a general random access resource; the fallback indication is applicable to the general random access resource, not applicable to the IAB dedicated random access resource access resources.
  • the processing module 602 generates a waiting time according to the fallback indication, and initiates a random access process again after the waiting time expires; wherein, the first random access resource is General random access resources, the second random access resources are IAB dedicated random access resources; the fallback indication is applicable to the general random access resources, but not applicable to the IAB dedicated random access resources.
  • the processing module 602 generates a waiting time according to the fallback indication, and initiates a random access process again after the waiting time expires; wherein, the first random access resource is general random access resources, the second random access resources are IAB dedicated random access resources, or the first random access resources are IAB dedicated random access resources, and the second random access resources are general random access resources access resource; the fallback indication is applicable to the general random access resource and the IAB dedicated random access resource.
  • the processing module 602 ignores the fallback indication, and initiates the random access procedure again through the first random access resource or the second random access resource; wherein the fallback The indication does not apply to the device 600 .
  • the apparatus 600 further includes a receiving module, which may be configured to receive indication information, where the indication information is used to indicate at least one of the following: a random access resource type to which the fallback indication is applicable, Whether the fallback indication is applicable to the apparatus 600; wherein the random access resource type includes the first random access resource and/or the second random access resource.
  • a receiving module which may be configured to receive indication information, where the indication information is used to indicate at least one of the following: a random access resource type to which the fallback indication is applicable, Whether the fallback indication is applicable to the apparatus 600; wherein the random access resource type includes the first random access resource and/or the second random access resource.
  • the receiving module may be configured to receive a broadcast type radio resource control RRC message.
  • the processing module 602 may be configured to multiply the time generated by the rollback instruction by a scaling factor to obtain the waiting time; wherein the scaling factor is less than or equal to 1 positive number.
  • the apparatus 600 further includes a receiving module, which may be configured to receive an RRC message, where the RRC message is used to configure the scaling factor for the IAB node.
  • the receiving a fallback indication includes: receiving a random access response RAR message; wherein the RAR message includes a T1 indication field and a T2 indication field, and the value of the T1 indication field is 0, and the value of the T2 indication field is 0; or the RAR message includes a T indication field, and the value of the T indication field is 0.
  • an embodiment of the present application further provides a communication device 700, including a processor 701, a memory 702, a program or instruction stored in the memory 702 and executable on the processor 701,
  • a communication device 700 including a processor 701, a memory 702, a program or instruction stored in the memory 702 and executable on the processor 701
  • the communication device 700 is a terminal
  • the program or instruction is executed by the processor 701
  • each process of the foregoing random access method embodiment can be implemented, and the same technical effect can be achieved.
  • the communication device 700 is a network side device
  • the program or instruction is executed by the processor 701
  • each process of the foregoing random access method embodiment can be achieved, and the same technical effect can be achieved. To avoid repetition, details are not described here.
  • the network device 800 includes: an antenna 81 , a radio frequency device 82 , and a baseband device 83 .
  • the antenna 81 is connected to the radio frequency device 82 .
  • the radio frequency device 82 receives information through the antenna 81, and sends the received information to the baseband device 83 for processing.
  • the baseband device 83 processes the information to be sent and sends it to the radio frequency device 82
  • the radio frequency device 82 processes the received information and sends it out through the antenna 81 .
  • the above-mentioned frequency band processing apparatus may be located in the baseband apparatus 83, and the method performed by the network side device in the above embodiments may be implemented in the baseband apparatus 83, where the baseband apparatus 83 includes a processor 84 and a memory 85.
  • the baseband device 83 may include, for example, at least one baseband board on which a plurality of chips are arranged. As shown in FIG. 8 , one of the chips is, for example, the processor 84 and is connected to the memory 85 to call the program in the memory 85 to execute The network devices shown in the above method embodiments operate.
  • the baseband device 83 may further include a network interface 86 for exchanging information with the radio frequency device 82, and the interface is, for example, a common public radio interface (CPRI for short).
  • CPRI common public radio interface
  • the network-side device in the embodiment of the present invention further includes: instructions or programs stored on the memory 85 and executable on the processor 84, and the processor 84 invokes the instructions or programs in the memory 85 to execute the modules shown in FIG. 6 .
  • Embodiments of the present application further provide a readable storage medium, where a program or an instruction is stored on the readable storage medium.
  • a program or an instruction is stored on the readable storage medium.
  • the processor is the processor in the terminal described in the foregoing embodiment.
  • the readable storage medium includes a computer-readable storage medium, such as a computer read-only memory (Read-Only Memory, ROM).
  • An embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement the foregoing random access method embodiment and can achieve the same technical effect, in order to avoid repetition, it will not be repeated here.
  • the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.
  • the method of the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course can also be implemented by hardware, but in many cases the former is better implementation.
  • the technical solution of the present application can be embodied in the form of a software product in essence or in a part that contributes to the prior art, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, CD-ROM), including several instructions to make a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of this application.
  • a storage medium such as ROM/RAM, magnetic disk, CD-ROM

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例公开了一种随机接入方法、装置及网络侧设备,用于解决相关技术中没有对IAB节点接收到BI时的行为进行定义,影响通信有效性的问题。该方法可以应用于IAB节点,包括:在通过第一随机接入资源发起的随机接入过程中,如果接收到回退指示,则执行如下之一:根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;忽略所述回退指示,通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程。

Description

随机接入方法、装置及网络侧设备
交叉引用
本申请要求在2020年7月3日在中国提交的申请号为202010632461.6、发明名称为“随机接入方法、装置及网络侧设备”的中国专利申请的优先权,该申请的全部内容通过引用结合在本申请中。
技术领域
本申请属于通信技术领域,具体涉及一种随机接入方法、装置及网络侧设备。
背景技术
在版本15(Rel-15)中,回退指示(Backoff Indicator,BI)用于指示终端在一段时间内禁止接入网络。
自回传(Integrated Access and Backhaul,IAB)节点通常配置有通用随机接入资源和/或IAB专用随机接入资源可用,相关技术中并没有对IAB节点接收到BI时的行为进行定义,这样,IAB节点在接收到BI后将无法执行下一步动作,影响通信有效性。
发明内容
本申请实施例的目的是提供一种随机接入方法、装置及网络侧设备,用于解决相关技术中没有对IAB节点接收到BI时的行为进行定义,影响通信有效性的问题。
为了解决上述技术问题,本申请是这样实现的。
第一方面,提供了一种随机接入方法,应用于IAB节点,包括:在通过第一随机接入资源发起的随机接入过程中,如果接收到回退指示,则执行如 下之一:根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;忽略所述回退指示,通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程。
第二方面,提供了一种随机接入的装置,包括:处理模块,用于在第一随机接入资源发起的随机接入过程中,如果接收到回退指示,则执行如下之一:根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;忽略所述回退指示,通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程。
第三方面,提供了一种网络侧设备,该网络侧设备包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法。
第四方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法。
第五方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法。
在本申请实施例中,IAB节点通过第一随机接入资源发起随机接入,如果接收到回退指示,则可以根据回退指示生成等待时间并等待,并在等待时间结束后再次发起随机接入过程;还可以忽略该回退指示,即不等待,直接通过第一随机接入资源或第二随机接入资源再次发起随机接入。本申请实施例对IAB节点接收到回退指示时的行为进行定义,便于提升通信有效性;同时,本申请实施例可以降低IAB节点接入的等待时间以及/或者随机接入资源的竞争风险。
附图说明
图1是根据本申请的一个实施例的无线通信***的框图;
图2是根据本申请的一个实施例的随机接入方法的示意性流程图;
图3是根据本申请的一个实施例的MAC子头格式示意图;
图4是根据本申请的一个实施例的MAC子头格式示意图;
图5是根据本申请的一个实施例的随机接入方法的示意性流程图;
图6是根据本申请的一个实施例的随机接入的装置的结构示意图;
图7是根据本申请的一个实施例的通信设备的结构示意图;
图8是根据本申请的一个实施例的网络侧设备的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)***,还可用于其他无线通信***,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency-Division Multiple Access,SC-FDMA)和其他***。本申请实施例 中的术语“***”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的***和无线电技术,也可用于其他***和无线电技术。然而,以下描述出于示例目的描述了新空口(NewRadio,NR)***,并且在以下大部分描述中使用NR术语,尽管这些技术也可应用于NR***应用以外的应用,如第6代(6 thGeneration,6G)通信***。
图1示出本申请实施例可应用的一种无线通信***的框图。无线通信***包括接入设备11和网络侧设备12。接入设备11可以是终端或IAB节点,IAB节点可以包括移动终端(Mobile Termination,MT)功能部分和分布式单元(Distributed Unit,DU)功能部分,DU可以为其他接入设备提供网络服务,MT可以视为普通终端,具有普通终端接入网络侧的功能等。上述提到的终端可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、可穿戴式设备(Wearable Device)或车载设备(VUE)、行人终端(PUE)等终端侧设备,可穿戴式设备包括:手环、耳机、眼镜等。需要说明的是,在本申请实施例并不限定IAB节点的具体类型。网络侧设备12可以是基站或核心网,其中,基站可被称为节点B、演进节点B、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、B节点、演进型B节点(eNB)、下一代节点B(gNB)、家用B节点、家用演进型B节点、WLAN接入点、WiFi节点、发送接收点(TransmittingReceivingPoint,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR***中的基站为例,但是并不限定基站的具体类型。
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的随机接入方法、装置及网络侧设备进行详细地说明。
由于相关技术中并没有对IAB节点接收到BI时的行为进行定义,这样,IAB节点在接收到BI后将无法执行下一步动作,影响通信有效性。假设IAB节点按照相关技术中终端的BI指示方式,IAB节点在收到现有格式的BI后(只要其中任意一种随机接入资源出现拥塞),会禁止IAB-MT使用所有的随机接入资源一段时间,这会导致在仍有可用随机接入资源的情况下,IAB节点按照接收到的BI推迟发起随机接入过程,增加了IAB节点的随机接入时延。
为解决相关技术中没有对IAB节点接收到BI时的行为进行定义,影响通信有效性的问题,如图2所示,本申请的一个实施例提供一种随机接入方法200,该方法可以由自回传(Integrated Access and Backhaul,IAB)节点执行,换言之,该方法可以由安装在IAB节点的软件或硬件来执行,该方法包括如下步骤。
S202:在通过第一随机接入资源发起的随机接入过程中,如果接收到回退指示(Backoff Indicator,BI),则执行如下之一:根据回退指示生成等待时间,并在等待时间结束后再次发起随机接入过程;忽略回退指示,通过第一随机接入资源或第二随机接入资源再次发起随机接入过程。
该实施例中提到的根据回退指示生成等待时间,具体可以是根据回退指示生成一个等待时间值,如20毫秒。
可选地,上述提到的在等待时间结束后再次发起随机接入过程包括:在等待时间结束后,通过第一随机接入资源或第二随机接入资源再次发起随机接入过程。
可选地,S202中提到的执行如下之一(该处将如下至少之一的步骤省略,具体参见S202的描述)的动作包括:根据预定义规则执行所述如下之一,该预定义规则包括:所述回退指示适用的随机接入资源类型,和/或,所述回退指示是否适用于所述IAB节点,该处提到的随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
上述预定义规则可以是协议约定的,预配置的,或者是接收到的指示信 息指示的。
本申请实施例中,IAB节点选择的网络侧节点同时配置了第一随机接入资源和第二随机接入资源,该网络侧节点可以是IAB节点的上游接入点,例如IAB父节点(parent IAB node)或者IAB节点(IAB-donor);该网络侧节点还可以是基站等。
在一个例子中,上述第一随机接入资源为IAB专用随机接入资源,第二随机接入资源为通用随机接入资源。
在另一个例子中,第一随机接入资源为通用随机接入资源,第二随机接入资源为IAB专用随机接入资源。
上述通用随机接入资源可以通过随机接入信道公共配置(RACH-ConfigCommon)类型的rach-ConfigCommon参数配置,该rach-ConfigCommon参数可以配置小区公共的普通终端(例如UE)的随机接入资源,包括物理随机接入信道配置索引(prach-ConfigurationIndex)、PRACH重传参数、PRACH传输的时频资源、PRACH资源(preamble,PRACH时频资源)跟同步和广播块(Synchronization Signal and physical broadcast channel Block,SSB)的对应关系等,在本申请实施例中称为通用随机接入资源。上述IAB专用随机接入资源可以是通过RACH-ConfigCommonIAB类型的rach-ConfigCommonIAB参数配置,该rach-ConfigCommonIAB参数用于配置IAB-移动终端(IAB-Mobile Termination,IAB-MT)可以使用的物理随机接入信道(Physical Random Access Channel,PRACH)资源,在本申请实施例中称为IAB专用随机接入资源。
在S202之前,IAB节点可以通过第一随机接入资源发起随机接入过程,例如,在第一随机接入资源上向基站(或IAB上游节点等,后续以基站为例进行说明)发送随机接入前导码(random access preamble),基站可以根据当前的负荷情况下发随机接入响应(Random Access Response,RAR)消息,该RAR消息在四步随机接入过程中还可以称作是Msg 2,在两步随机接入过程中还可以称作是Msg B。
若当前基站负荷较大,则基站向IAB节点发送的RAR消息中可能携带回退指示,这样,IAB节点即可按照S202的步骤执行。
针对两步随机接入过程,在S202中提到的接收到回退指示包括:接收到RAR消息,该RAR消息包括T1指示域和T2指示域,该T1指示域的值为0,且T2指示域的值为0。
如图3所示,图3所示为两步随机接入中包含回退指示(BI)的RAR消息的MAC子头(subheader)格式。在图3中,E指示域用于指示该MAC子头之后是否还存在其他的MAC子头。R指示域为预留字段。T1指示域用于指示该MAC子头是否包含随机接入前导码ID或T2。其中,T1指示域被设置为“1”,以指示在MAC子头中存在随机接入前导码ID;T1指示域设置为“0”,表示MAC子头中存在T2指示域。T2指示域用于指示MAC子头是否包含回退指示(BI)指示域或MAC服务数据单元(Service Data Unit,SDU)指示域。其中,T2指示域设置为“0”,以指示在该MAC子头中存在回退指示域(图2中的BI域);T2指示域设置为“1”,以指示在MAC子头中存在MAC SDU指示域。回退指示域(即BI指示域)用于指示小区的超负荷情况,BI指示域的大小可以是4比特。
针对四步随机接入过程,在S202中提到的接收到回退指示包括:接收到RAR消息。该RAR消息包括T指示域,所述T指示域的值为0。
如图4所示,图4所示为四步随机接入中包含回退指示(BI)的RAR消息的MAC子头格式。在图4中,E指示域用于指示该MAC子头之后是否还存在其他的MAC子头。R指示域为预留字段。T指示域用于指示该MAC子头是否包含随机接入前导码ID或BI指示域。其中,T指示域被设置为“1”,以指示在MAC子头中存在随机接入前导码ID;T指示域设置为“0”,表示MAC子头中存在BI指示域。
图3或图4所示的BI指示域会指示一个索引值,比如当BI为索引值6时,代表的值为80ms。这样,S202中提到的根据回退指示生成等待时间可以包括:IAB节点生成一个0~80ms内的随机数,如58ms,那么,IAB节点 在58ms内不再向该小区发起初始接入,在58ms结束后再次发起随机接入过程。
本申请实施例提供的随机接入方法,IAB节点通过第一随机接入资源发起随机接入,如果接收到回退指示,则可以根据回退指示生成等待时间并等待,并在等待时间结束后再次发起随机接入过程;还可以忽略该回退指示,即不等待,直接通过第一随机接入资源或第二随机接入资源再次发起随机接入。本申请实施例对IAB节点接收到回退指示时的行为进行定义,便于提升通信有效性;同时,本申请实施例可以降低IAB节点接入的等待时间以及/或者随机接入资源的竞争风险。
为详细说明本申请实施例提供的随机接入方法,以下将结合几个具体的实施例进行说明。
需要说明的是,本申请各个实施例中提到的通用随机接入资源可以包括2步通用随机接入资源和4步通用随机接入资源;本申请各个实施例中提到的IAB专用随机接入资源可以包括2步IAB专用随机接入资源和4步IAB专用随机接入资源。在以下描述中,均假设IAB节点在前后使用的2步随机接入资源或4步随机接入资源是一致的,例如,IAB节点选择4步IAB专用随机接入资源进行接入时收到回退指示,则后续仍然采用对应的4步通用/4步IAB专用随机接入资源进行接入,而通常不会切换为使用2步通用/2步IAB专用随机接入资源进行接入。
实施例一
该实施例中,第一随机接入资源与回退指示(BI)存在对应关系。具体地,IAB-MT同时配置有第一随机接入资源和第二随机接入资源,IAB-MT通过第一随机接入资源发起随机接入(例如发送随机接入前导码),IAB-MT可以接收到与第一随机接入资源对应的RAR消息(该处假设IAB-MT无法解码得到与第二随机接入资源对应的RAR消息),因此,该实施例称作是第一随机接入资源与RAR消息中的回退指示(BI)存在对应关系。
该实施例中,IAB-MT可以使用第一随机接入资源进行接入,收到RAR 消息中表明存在BI域,也即,对于2步随机接入过程来说,MAC子头中的“T1=0,T2=0”;对于4步随机接入过程来说,MAC子头中的“T=0”。IAB-MT可以执行以下方法1和方法2之一。
方法1:IAB-MT忽略上述回退指示,不等待任何时间,IAB-MT直接使用第一随机接入资源或者第二随机接入资源进行接入,即使用第一随机接入资源或者第二随机接入资源再次发起随机接入过程。
方法2:IAB-MT根据BI指示域的索引(Index)所对应的时间生成等待时间,在等待时间结束后再选择第一随机接入资源或者第二随机接入资源进行接入,即使用第一随机接入资源或者第二随机接入资源再次发起随机接入过程。
可选地,上述第一随机接入资源可以为IAB专用随机接入资源,第二随机接入资源为通用随机接入资源。
可选地,上述第一随机接入资源为通用随机接入资源,第二随机接入资源为IAB专用随机接入资源。
在一个例子中,第一随机接入资源为IAB专用随机接入资源,方法1中IAB-MT不等待任何时间,直接使用第二随机接入资源,也即使用通用随机接入资源进行接入,该例子可以降低IAB节点接入的等待时间,还可以降低随机接入资源的竞争风险。
在另一个例子中,第一随机接入资源为IAB专用随机接入资源,方法1中IAB-MT不等待任何时间,仍然使用第一随机接入资源,也即仍然使用IAB专用随机接入资源进行接入,该例子可以降低IAB节点接入的等待时间。该例子考虑到,IAB节点成功接入后,IAB节点的分布式单元(Distributed Unit,DU)功能可以为更多的终端提供服务,例如为终端提供接入服务,可以减轻当前小区的负荷,因此优先允许IAB节点成功接入。
在再一个例子中,第一随机接入资源为通用随机接入资源,方法1中IAB-MT不等待任何时间,直接使用第二随机接入资源,也即使用IAB专用随机接入资源进行接入,该例子可以降低IAB节点接入的等待时间,还可以 降低随机接入资源的竞争风险。
在又一个例子中,第一随机接入资源为通用随机接入资源,方法1中IAB-MT不等待任何时间,仍然使用第一随机接入资源,也即使用通用随机接入资源进行接入,该例子可以降低IAB节点接入的等待时间。该例子考虑到,IAB节点成功接入后,IAB节点的分布式单元(Distributed Unit,DU)功能可以为更多的终端提供服务,例如为终端提供接入服务,可以减轻当前小区的负荷,因此优先允许IAB节点成功接入。
实施例二
该实施例中,第一随机接入资源与回退指示(BI)不存在对应关系。
该实施例中,IAB-MT同时配置有第一随机接入资源和第二随机接入资源。IAB-MT可以使用第一随机接入资源进行接入,收到RAR消息中表明存在BI域,也即,对于2步随机接入过程来说,MAC子头中的“T1=0,T2=0”;对于4步随机接入过程来说,MAC子头中的“T=0”。IAB-MT可以执行以下方法1和方法2之一。
方法1:该BI仅适用于通用随机接入资源,不适用于IAB专用随机接入资源,该方法1又可以细分为以下两个子方法。
方法1a:若IAB-MT选择的接入资源为IAB专用随机接入资源,即第一随机接入资源为IAB专用随机接入资源,第二随机接入资源为通用随机接入资源,IAB-MT忽略上述回退指示,不等待任何时间,IAB-MT使用IAB专用随机接入资源或者通用随机接入资源再次发起随机接入过程。
方法1b:若IAB-MT选择的接入资源为通用随机接入资源,即第一随机接入资源为通用随机接入资源,第二随机接入资源为IAB专用随机接入资源,IAB-MT根据BI的Index所指示的时间生成等待时间,在等待时间结束后再选择IAB专用随机接入资源或者通用随机接入资源进行接入。
方法2:该BI适用于通用随机接入资源以及IAB专用随机接入资源。
IAB-MT根据BI的Index所指示的时间生成等待时间,在等待时间结束后再选择IAB专用随机接入资源或者通用随机接入资源进行接入。
该例子中的第一随机接入资源为通用随机接入资源,第二随机接入资源为IAB专用随机接入资源;或第一随机接入资源为IAB专用随机接入资源,第二随机接入资源为所述通用随机接入资源。
方法3:该BI不适用于IAB-MT。
IAB-MT忽略RAR中的BI指示,即IAB-MT在选择任意一个随机接入资源接入时,不等待任何时间,直接通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程。
可选地,IAB-MT可以根据预定义规则执行方法1至方法3的任意一种,该预定义规则包括:所述回退指示适用的随机接入资源类型,和/或,所述回退指示是否适用于所述IAB节点,该处提到的随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
上述预定义规则可以是协议约定的,预配置的,或者是接收到的指示信息指示的。
在一个具体的例子中,IAB-MT根据接收到的指示信息执行方法1至方法3的任意一种,这将构成本申请实施例二的方法4。
方法4:通过额外指示,表明该BI适用的随机接入资源类型等。
为了适配终端,该实施例通过额外的指示来告知IAB或者UE此时回退指示适用的随机接入资源类型等。
该实施例可以在***消息中携带指示信息,例如RRC指示,该指示信息用于指示如下至少之一:所述回退指示适用的随机接入资源类型、所述回退指示是否适用于所述IAB节点;其中,所述随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
上述提到的***消息可以是主***信息块(MasterInformationBlock,MIB),还可以是***信息块1(SystemInformationBlocks 1,SIB1),还可以是其它***信息块,如SIBx,该处的x表示***信息块的编号,x可以为2,3等。
可选地,S202之前,IAB节点还可以接收指示信息。在一个例子中,所 述接收指示信息包括:接收广播类型的无线资源控制(Radio Resource Control,RRC)消息。
在一个具体的例子中,上述指示信息表明基站所发的BI适用的随机接入资源类型(可以指示其中一种资源类型或同时指示两种资源类型)和/或是否适用于IAB-MT等,具体参见实施例二的方法1至方法3等。这样,IAB-MT可以基于指示信息,按照上述方法1至方法3的任意一种方法执行。
实施例三
该实施例通过RRC消息为IAB配置专门的参数,例如,在RRC消息中配置BI的缩放因子(scaling-factor),每个IAB节点接收到BI指示后,可以首先生成初始等待时间,然后将该初始等待时间乘以缩放因子,得到最终的等待时间,该缩放因子可以是小于或者等于1的正数。
这样,S202中提到的所述根据所述回退指示生成等待时间包括:将所述回退指示所生成的时间乘以缩放因子,得到所述等待时间;其中,所述缩放因子是小于或者等于1的正数。
该例子具体例如,假设缩放因子为0.5,BI为索引值6时,代表的值为80ms。在例子一中,IAB节点生成一个0~80ms内的随机数,如58ms,并将58ms乘以缩放因子0.5得到29,那么,IAB节点在29ms内不再向该小区发起初始接入,在58ms结束后再次发起随机接入过程。在例子二中,IAB节点将索引值6代表的值80ms乘以缩放因子0.5得到40,生成一个0~40ms内的随机数,如19ms,那么,IAB节点在19ms内不再向该小区发起初始接入。
可选地,上述缩放因子是小于1的正数,该例子中相当于是降低IAB节点接入的等待时间。该例子考虑到,IAB节点成功接入后,IAB节点的分布式单元(Distributed Unit,DU)功能可以为更多的终端提供服务,例如为终端提供接入服务,可以减轻当前小区的负荷,因此优先允许IAB节点成功接入。
该实施例执行之前,IAB节点还可以接收RRC消息,所述RRC消息用于为所述IAB节点配置所述缩放因子。
实施例四
该实施例四为一个具体实施例,如图5所示,包括如下步骤:
S502:IAB-MT接收来自于基站的***消息,该***消息包括MIB和SIB1消息,获取PRACH传输资源配置以及preamble序列相关参数。
S504:IAB-MT通过第一随机接入资源发送Preamble,并计算自己的随机接入无线网络临时标识(Random Access-Radio Network Temporary Identity,RA-RNTI),用于对Msg2的识别。
S506:IAB-MT盲检物理下行控制信道(Physical Downlink Control Channel,PDCCH),并解码对应的物理下行共享信道(Physical Downlink Shared Channel,PDSCH)携带的RAR数据,收到的RAR消息中表明存在BI域,如图3和图4所示。
针对两步随机接入过程,接收到RAR消息包括T1指示域和T2指示域,该T1指示域的值为0,且T2指示域的值为0。
针对四步随机接入过程,接收到RAR消息包括T指示域,所述T指示域的值为0。
方法一:该BI仅适用于通用随机接入资源,不适用于IAB专用随机接入资源,该方法1又可以细分为以下两个子方法。
方法1a:IAB-MT在选择IAB专用随机接入资源进行接入时收到该BI,不等待任何时间,IAB-MT使用IAB专用随机接入资源或者通用随机接入资源再次发起随机接入过程。
方法1b:IAB-MT采用通用随机接入资源接入,根据BI的Index所指示的时间生成等待时间,在等待时间结束后再选择IAB专用随机接入资源或者通用随机接入资源进行接入。
方法二:该BI适用于通用随机接入资源以及IAB专用随机接入资源。
IAB-MT在选择任一随机资源接入时,根据BI的Index所指示的时间生成等待时间,在等待时间结束后再接入。
方法三:该BI不适用于IAB-MT
IAB-MT忽略RAR中的BI指示,即IAB-MT在选择任一随机资源接入时,不等待任何时间。
方法四:通过额外指示,表明如下至少之一:该BI适用的随机接入资源类型、该BI是否适用于IAB-MT,其中,所述随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
具体地,该例子可以在***消息(MIB/SIB1/SIBx)中携带RRC indicator,表明基站所发的BI适用的随机接入类型(可以指示其中一种类型或同时指示两种类型)或是否适用于IAB-MT。
RRC indicator指示BI适用于IAB专用随机接入资源类型,则IAB-MT收到BI后在选择IAB专用随机接入资源进行接入时,根据BI的Index所指示的时间生成等待时间,在等待时间结束后再选择IAB专用随机接入资源进行接入。
RRC indicator指示BI仅适用于通用随机接入资源类型,则IAB-MT在使用专用随机接入资源接入时,不用等待任何时间。
RRC indicator指示BI仅适用于通用随机接入资源类,IAB-MT使用通用随机接入资源发起随机接入后,收到BI,则IAB-MT可以转而使用IAB专用随机接入资源进行接入,不用等待任何时间。
S508:采用网络侧给定的接入资源重新接入后,若收到RAR包含Msg3的调度信息,则进行Msg3的发送。
S510:竞争解决:若检测到PDCCH,成功解码对应的PDSCH,如果有匹配的竞争解决标识(例如,contention resolution MAC CE),则表示竞争解决,将TC-RNTI设置为小区无线网络临时标识(Cell-Radio Network Temporary Identity,C-RNTI)。
S512:IAB-MT一旦成功解码竞争解决消息,就向网络侧节点发送混合自动重传请求确认消息(Hybrid Automatic Repeat request-ACKnowledge,HARQ-ACK)。
需要说明的是,本申请实施例提供的随机接入方法,执行主体可以为随 机接入的装置,或者,该随机接入的装置中的用于执行随机接入方法的控制模块。本申请实施例中以随机接入的装置执行随机接入方法为例,说明本申请实施例提供的随机接入的装置。
图6是根据本申请实施例的随机接入的装置的结构示意图,该装置可以对应于其他实施例中的IAB节点。如图6所示,装置600包括:
处理模块602,可以用于在通过第一随机接入资源发起的随机接入过程中,如果接收到回退指示,则执行如下之一:根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;忽略所述回退指示,通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程。
在本申请实施例中,装置600通过第一随机接入资源发起随机接入,如果接收到回退指示,则可以根据回退指示生成等待时间并等待,并在等待时间结束后再次发起随机接入过程;还可以忽略该回退指示,即不等待,直接通过第一随机接入资源或第二随机接入资源再次发起随机接入。本申请实施例对IAB节点接收到回退指示时的行为进行定义,便于提升通信有效性;同时,本申请实施例可以降低接入的等待时间以及/或者随机接入资源的竞争风险。
可选地,作为一个实施例,所述处理模块602,可以用于在所述等待时间结束后,通过所述第一随机接入资源或所述第二随机接入资源再次发起随机接入过程。
可选地,作为一个实施例,所述第一随机接入资源为IAB专用随机接入资源,所述第二随机接入资源为通用随机接入资源;或所述第一随机接入资源为通用随机接入资源,所述第二随机接入资源为IAB专用随机接入资源。
可选地,作为一个实施例,所述处理模块602,用于根据所述回退指示适用的随机接入资源类型,和/或,所述回退指示是否适用于所述IAB节点,执行所述如下之一;其中,所述随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
可选地,作为一个实施例,所述处理模块602忽略所述回退指示,通过 所述第一随机接入资源或第二随机接入资源再次发起随机接入过程;其中,所述第一随机接入资源为IAB专用随机接入资源,所述第二随机接入资源为通用随机接入资源;所述回退指示适用于所述通用随机接入资源,不适用于所述IAB专用随机接入资源。
可选地,作为一个实施例,所述处理模块602根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;其中,所述第一随机接入资源为通用随机接入资源,所述第二随机接入资源为IAB专用随机接入资源;所述回退指示适用于所述通用随机接入资源,不适用于所述IAB专用随机接入资源。
可选地,作为一个实施例,所述处理模块602根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;其中,所述第一随机接入资源为通用随机接入资源,所述第二随机接入资源为IAB专用随机接入资源,或所述第一随机接入资源为IAB专用随机接入资源,所述第二随机接入资源为通用随机接入资源;所述回退指示适用于所述通用随机接入资源和所述IAB专用随机接入资源。
可选地,作为一个实施例,所述处理模块602忽略所述回退指示,通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程;其中,所述回退指示不适用于所述装置600。
可选地,作为一个实施例,所述装置600还包括接收模块,可以用于接收指示信息,所述指示信息用于指示如下至少之一:所述回退指示适用的随机接入资源类型、所述回退指示是否适用于所述装置600;其中,所述随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
可选地,作为一个实施例,所述接收模块,可以用于接收广播类型的无线资源控制RRC消息。
可选地,作为一个实施例,所述处理模块602,可以用于将所述回退指示所生成的时间乘以缩放因子,得到所述等待时间;其中,所述缩放因子是小于或者等于1的正数。
可选地,作为一个实施例,所述装置600还包括接收模块,可以用于接收RRC消息,所述RRC消息用于为所述IAB节点配置所述缩放因子。
可选地,作为一个实施例,所述接收到回退指示包括:接收到随机接入响应RAR消息;其中,所述RAR消息包括T1指示域和T2指示域,所述T1指示域的值为0,且所述T2指示域的值为0;或所述RAR消息包括T指示域,所述T指示域的值为0。
可选地,作为一个实施例所述第一随机接入资源和所述回退指示存在对应关系。
根据本申请实施例的装置600可以参照对应本申请实施例的方法200的流程,并且,该装置600中的各个单元/模块和上述其他操作和/或功能分别为了实现方法200中的相应流程,并且能够达到相同或等同的技术效果,为了简洁,在此不再赘述。
可选的,如图7所示,本申请实施例还提供一种通信设备700,包括处理器701,存储器702,存储在存储器702上并可在所述处理器701上运行的程序或指令,例如,该通信设备700为终端时,该程序或指令被处理器701执行时实现上述随机接入方法实施例的各个过程,且能达到相同的技术效果。该通信设备700为网络侧设备时,该程序或指令被处理器701执行时实现上述随机接入方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
具体地,本申请实施例还提供了一种网络侧设备。如图8所示,该网络设备800包括:天线81、射频装置82、基带装置83。天线81与射频装置82连接。在上行方向上,射频装置82通过天线81接收信息,将接收的信息发送给基带装置83进行处理。在下行方向上,基带装置83对要发送的信息进行处理,并发送给射频装置82,射频装置82对收到的信息进行处理后经过天线81发送出去。
上述频带处理装置可以位于基带装置83中,以上实施例中网络侧设备执行的方法可以在基带装置83中实现,该基带装置83包括处理器84和存储器 85。
基带装置83例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图8所示,其中一个芯片例如为处理器84,与存储器85连接,以调用存储器85中的程序,执行以上方法实施例中所示的网络设备操作。
该基带装置83还可以包括网络接口86,用于与射频装置82交互信息,该接口例如为通用公共无线接口(common public radio interface,简称CPRI)。
具体地,本发明实施例的网络侧设备还包括:存储在存储器85上并可在处理器84上运行的指令或程序,处理器84调用存储器85中的指令或程序执行图6所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述随机接入方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器(Read-Only Memory,ROM)。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述随机接入方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为***级芯片,***芯片,芯片***或片上***芯片等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、 方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (27)

  1. 一种随机接入方法,应用于自回传IAB节点,包括:
    在通过第一随机接入资源发起的随机接入过程中,如果接收到回退指示,则执行如下之一:
    根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;
    忽略所述回退指示,通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程。
  2. 根据权利要求1所述的方法,其中,所述在所述等待时间结束后再次发起随机接入过程包括:
    在所述等待时间结束后,通过所述第一随机接入资源或所述第二随机接入资源再次发起随机接入过程。
  3. 根据权利要求1或2所述的方法,其中,
    所述第一随机接入资源为IAB专用随机接入资源,所述第二随机接入资源为通用随机接入资源;或
    所述第一随机接入资源为通用随机接入资源,所述第二随机接入资源为IAB专用随机接入资源。
  4. 根据权利要求1所述的方法,其中,所述执行如下之一包括:
    根据所述回退指示适用的随机接入资源类型,和/或,所述回退指示是否适用于所述IAB节点,执行所述如下之一;
    其中,所述随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
  5. 根据权利要求4所述的方法,其中,所述IAB节点忽略所述回退指示,通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程;
    其中,所述第一随机接入资源为IAB专用随机接入资源,所述第二随机接入资源为通用随机接入资源;
    所述回退指示适用于所述通用随机接入资源,不适用于所述IAB专用随 机接入资源。
  6. 根据权利要求4所述的方法,其中,所述IAB节点根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;
    其中,所述第一随机接入资源为通用随机接入资源,所述第二随机接入资源为IAB专用随机接入资源;
    所述回退指示适用于所述通用随机接入资源,不适用于所述IAB专用随机接入资源。
  7. 根据权利要求4所述的方法,其中,所述IAB节点根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;
    其中,所述第一随机接入资源为通用随机接入资源,所述第二随机接入资源为IAB专用随机接入资源,或所述第一随机接入资源为所述IAB专用随机接入资源,所述第二随机接入资源为所述通用随机接入资源;
    所述回退指示适用于所述通用随机接入资源和所述IAB专用随机接入资源。
  8. 根据权利要求4所述的方法,其中,所述IAB节点忽略所述回退指示,通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程;
    其中,所述回退指示不适用于所述IAB节点。
  9. 根据权利要求4所述的方法,其中,所述方法还包括:接收指示信息,所述指示信息用于指示如下至少之一:所述回退指示适用的随机接入资源类型、所述回退指示是否适用于所述IAB节点;
    其中,所述随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
  10. 根据权利要求9所述的方法,其中,所述接收指示信息包括:
    接收广播类型的无线资源控制RRC消息。
  11. 根据权利要求1所述的方法,其中,所述根据所述回退指示生成等待时间包括:
    将所述回退指示所生成的时间乘以缩放因子,得到所述等待时间;
    其中,所述缩放因子是小于或者等于1的正数。
  12. 根据权利要求11所述的方法,其中,所述根据所述回退指示生成等待时间之前,所述方法还包括:
    接收RRC消息,所述RRC消息用于为所述IAB节点配置所述缩放因子。
  13. 根据权利要求1所述的方法,其中,所述接收到回退指示包括:接收到随机接入响应RAR消息;
    其中,所述RAR消息包括T1指示域和T2指示域,所述T1指示域的值为0,且所述T2指示域的值为0;或
    所述RAR消息包括T指示域,所述T指示域的值为0。
  14. 根据权利要求1所述的方法,其中,
    所述第一随机接入资源和所述回退指示存在对应关系。
  15. 一种随机接入的装置,包括:
    处理模块,用于在第一随机接入资源发起的随机接入过程中,如果接收到回退指示,则执行如下之一:
    根据所述回退指示生成等待时间,并在所述等待时间结束后再次发起随机接入过程;
    忽略所述回退指示,通过所述第一随机接入资源或第二随机接入资源再次发起随机接入过程。
  16. 根据权利要求15所述的装置,其中,所述处理模块,用于在所述等待时间结束后,通过所述第一随机接入资源或所述第二随机接入资源再次发起随机接入过程。
  17. 根据权利要求15或16所述的装置,其中,
    所述第一随机接入资源为IAB专用随机接入资源,所述第二随机接入资源为通用随机接入资源;或
    所述第一随机接入资源为通用随机接入资源,所述第二随机接入资源为IAB专用随机接入资源。
  18. 根据权利要求15所述的装置,其中,所述处理模块,用于根据所述 回退指示适用的随机接入资源类型,和/或,所述回退指示是否适用于所述IAB节点,执行所述如下之一;
    其中,所述随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
  19. 根据权利要求18所述的装置,其中,
    所述第一随机接入资源为IAB专用随机接入资源,所述第二随机接入资源为通用随机接入资源,所述回退指示适用于所述通用随机接入资源,不适用于所述IAB专用随机接入资源;或
    所述第一随机接入资源为通用随机接入资源,所述第二随机接入资源为IAB专用随机接入资源,所述回退指示适用于所述通用随机接入资源,不适用于所述IAB专用随机接入资源;或
    所述第一随机接入资源为通用随机接入资源,所述第二随机接入资源为IAB专用随机接入资源,或所述第一随机接入资源为所述IAB专用随机接入资源,所述第二随机接入资源为所述通用随机接入资源,所述回退指示适用于所述通用随机接入资源和所述IAB专用随机接入资源;或
    所述回退指示不适用于所述装置。
  20. 根据权利要求18所述的装置,其中,还包括:
    接收模块,用于接收指示信息,所述指示信息用于指示如下至少之一:所述回退指示适用的随机接入资源类型、所述回退指示是否适用于所述装置;
    其中,所述随机接入资源类型包括所述第一随机接入资源和/或所述第二随机接入资源。
  21. 根据权利要求15所述的装置,其中,所述处理模块,用于将所述回退指示所生成的时间乘以缩放因子,得到所述等待时间;
    其中,所述缩放因子是小于或者等于1的正数。
  22. 根据权利要求15所述的装置,其中,
    所述第一随机接入资源和所述回退指示存在对应关系。
  23. 一种网络侧设备,包括处理器,存储器及存储在所述存储器上并可 在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至14任一项所述的随机接入方法。
  24. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至14任一项所述的随机接入方法。
  25. 一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1至14任一项所述的随机接入方法。
  26. 一种计算机程序产品,存储在可读存储介质中,所述计算机程序产品被至少一个处理器执行以实现如权利要求1至14中任一项所述的随机接入方法的步骤。
  27. 一种网络侧设备,其中,所述网络侧设备用于执行如权利要求1至14中任一项所述的随机接入方法的步骤。
PCT/CN2021/104017 2020-07-03 2021-07-01 随机接入方法、装置及网络侧设备 WO2022002203A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2022580905A JP7464760B2 (ja) 2020-07-03 2021-07-01 ランダムアクセス方法、装置及びネットワーク側機器
EP21833415.9A EP4178304A4 (en) 2020-07-03 2021-07-01 DIRECT ACCESS METHOD AND DEVICE AND NETWORK-SIDE DEVICE
US18/147,793 US20230138947A1 (en) 2020-07-03 2022-12-29 Random access method and apparatus, and network-side device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010632461.6 2020-07-03
CN202010632461.6A CN113891487A (zh) 2020-07-03 2020-07-03 随机接入方法、装置及网络侧设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/147,793 Continuation US20230138947A1 (en) 2020-07-03 2022-12-29 Random access method and apparatus, and network-side device

Publications (1)

Publication Number Publication Date
WO2022002203A1 true WO2022002203A1 (zh) 2022-01-06

Family

ID=79012622

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/104017 WO2022002203A1 (zh) 2020-07-03 2021-07-01 随机接入方法、装置及网络侧设备

Country Status (5)

Country Link
US (1) US20230138947A1 (zh)
EP (1) EP4178304A4 (zh)
JP (1) JP7464760B2 (zh)
CN (1) CN113891487A (zh)
WO (1) WO2022002203A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117676912A (zh) * 2022-09-07 2024-03-08 上海朗帛通信技术有限公司 一种被用于无线通信的通信节点中的方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108633106A (zh) * 2017-03-24 2018-10-09 电信科学技术研究院 一种随机接入回退后的随机接入及指示方法、装置
CN110198564A (zh) * 2018-02-26 2019-09-03 华为技术有限公司 随机接入方法、终端及网络设备
WO2020025023A1 (zh) * 2018-08-01 2020-02-06 Oppo广东移动通信有限公司 随机接入的方法、终端设备和网络设备
WO2020032628A1 (en) * 2018-08-10 2020-02-13 Lg Electronics Inc. Method for performing access control and device supporting the same
CN111867125A (zh) * 2019-04-29 2020-10-30 华为技术有限公司 一种随机接入方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101967721B1 (ko) * 2011-08-10 2019-04-10 삼성전자 주식회사 무선 통신 시스템에서 확장 접속 차단 적용 방법 및 장치
WO2020032544A1 (ko) * 2018-08-07 2020-02-13 삼성전자 주식회사 무선통신 시스템에서의 무선 노드 통신 방법 및 장치
US11083010B2 (en) * 2018-08-17 2021-08-03 Idac Holdings, Inc. Integrated access and backhaul associated with NR

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108633106A (zh) * 2017-03-24 2018-10-09 电信科学技术研究院 一种随机接入回退后的随机接入及指示方法、装置
CN110198564A (zh) * 2018-02-26 2019-09-03 华为技术有限公司 随机接入方法、终端及网络设备
WO2020025023A1 (zh) * 2018-08-01 2020-02-06 Oppo广东移动通信有限公司 随机接入的方法、终端设备和网络设备
WO2020032628A1 (en) * 2018-08-10 2020-02-13 Lg Electronics Inc. Method for performing access control and device supporting the same
CN111867125A (zh) * 2019-04-29 2020-10-30 华为技术有限公司 一种随机接入方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4178304A4 *

Also Published As

Publication number Publication date
JP7464760B2 (ja) 2024-04-09
EP4178304A1 (en) 2023-05-10
CN113891487A (zh) 2022-01-04
EP4178304A4 (en) 2023-11-08
US20230138947A1 (en) 2023-05-04
JP2023531551A (ja) 2023-07-24

Similar Documents

Publication Publication Date Title
WO2017028644A1 (zh) 一种mtc ue随机接入的方法及装置
US11765688B2 (en) Data transmission method, device, base station, terminal and readable storage medium
WO2018228362A1 (zh) ***信息传输方法、终端及网络设备
JP7520883B2 (ja) ランダムアクセス方法、装置及び通信システム
US11076422B2 (en) Random access responding method and device, and random access method and device
US10462827B2 (en) Random access method and apparatus
US9426826B1 (en) Contention resolution for an orthogonal frequency-division multiplexing wireless access node
CN114025433B (zh) 用于两步随机接入的方法、终端设备和网络设备
TWI771369B (zh) 系統訊息的獲取方法及裝置
US11202322B2 (en) Random access method and terminal device
WO2022002203A1 (zh) 随机接入方法、装置及网络侧设备
WO2021148053A1 (zh) 一种信息传输方法、装置及相关设备
CN113767677A (zh) 非许可频带中的随机接入消息重传
WO2020206643A1 (zh) 一种随机接入方法、设备及存储介质
WO2018227510A1 (zh) 接入控制方法及相关产品
WO2021098756A1 (zh) 一种空闲态终端设备检测方法以及相关设备
WO2019014903A1 (zh) 用于随机接入的方法、网络设备和终端设备
JP7262610B2 (ja) チャネルの伝送方法、電子機器および記憶媒体
CN111107661B (zh) 随机接入资源获取方法及装置
EP3836475B1 (en) Method for controlling power ramp counter, and terminal device
WO2020252633A1 (zh) 随机接入前导码退避的方法、装置和***
WO2023169362A1 (zh) 一种寻呼方法及其装置
WO2022067713A1 (zh) 随机接入方法及通信***、通信装置、可读存储介质
WO2023169580A1 (zh) 数据传输方法及装置、存储介质、终端设备、网络设备
WO2024103320A1 (zh) 无线通信方法、终端设备以及网络设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21833415

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022580905

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2021833415

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE