WO2023102943A1 - 一种随机接入资源配置的确定方法及设备/存储介质/装置 - Google Patents

一种随机接入资源配置的确定方法及设备/存储介质/装置 Download PDF

Info

Publication number
WO2023102943A1
WO2023102943A1 PCT/CN2021/137261 CN2021137261W WO2023102943A1 WO 2023102943 A1 WO2023102943 A1 WO 2023102943A1 CN 2021137261 W CN2021137261 W CN 2021137261W WO 2023102943 A1 WO2023102943 A1 WO 2023102943A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
access resource
resource configuration
contention
rule
Prior art date
Application number
PCT/CN2021/137261
Other languages
English (en)
French (fr)
Inventor
吴昱民
刘晓菲
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202180004522.7A priority Critical patent/CN116711440A/zh
Priority to PCT/CN2021/137261 priority patent/WO2023102943A1/zh
Publication of WO2023102943A1 publication Critical patent/WO2023102943A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular, to a method and equipment/storage medium/apparatus for determining random access resource configuration.
  • a network side device may provide a UE (User Equipment, user equipment) with a variety of different random access resource configurations, so as to implement different random access controls for the UE.
  • UE User Equipment
  • a network side device may provide a UE (User Equipment, user equipment) with a variety of different random access resource configurations, so as to implement different random access controls for the UE.
  • part of the resource configuration content in different random access resource configurations may be the same or missing, it is necessary to determine the usage rules of the random access configuration when the UE triggers different random access procedures.
  • the method for determining the configuration of random access resources and the equipment/storage medium/device proposed in the present disclosure aim to propose a method for determining the configuration of random access resources.
  • the method for determining random access resource configuration proposed by an embodiment of the present disclosure is applied to a UE, including:
  • the random access resource configuration is determined based on the determined usage rule, and random access is performed based on the determined random access resource configuration.
  • Another aspect of the present disclosure provides a method for determining random access resource configuration, which is applied to network-side devices, including:
  • the random access resource configuration is determined based on the determined usage rule, and random access is performed based on the determined random access resource configuration.
  • the device for determining random access resource configuration proposed by an embodiment includes:
  • a determining module configured to determine usage rules for random access resource configuration in response to the UE triggering a random access procedure
  • the random access module is configured to determine random access resource configuration based on the determined usage rule, and perform random access based on the determined random access resource configuration.
  • the device for determining random access resource configuration proposed by an embodiment includes:
  • a determining module configured to determine usage rules for random access resource configuration in response to UE triggering a random access procedure
  • a configuration module configured to determine random access resource configuration based on the determined usage rule, and perform random access based on the determined random access resource configuration.
  • an embodiment provides a communication device, the device includes a processor and a memory, a computer program is stored in the memory, and the processor executes the computer program stored in the memory, so that the The device executes the method provided in the embodiment of the foregoing aspect.
  • an embodiment provides a communication device, the device includes a processor and a memory, a computer program is stored in the memory, and the processor executes the computer program stored in the memory, so that the The device executes the method provided in the above embodiment of another aspect.
  • an embodiment provides a communication device, the device includes a processor and a memory, a computer program is stored in the memory, and the processor executes the computer program stored in the memory, so that the The device executes the method provided in the embodiment of the above yet another aspect.
  • a communication device provided by an embodiment of another aspect of the present disclosure includes: a processor and an interface circuit;
  • the interface circuit is used to receive code instructions and transmit them to the processor
  • the processor is configured to run the code instructions to execute the method provided in one embodiment.
  • a communication device provided by an embodiment of another aspect of the present disclosure includes: a processor and an interface circuit;
  • the interface circuit is used to receive code instructions and transmit them to the processor
  • the processor is configured to run the code instructions to execute the method provided in another embodiment.
  • a communication device provided by an embodiment of another aspect of the present disclosure includes: a processor and an interface circuit;
  • the interface circuit is used to receive code instructions and transmit them to the processor
  • the processor is configured to run the code instructions to execute the method provided in the embodiment according to another aspect.
  • the computer-readable storage medium provided by another embodiment of the present disclosure is used to store instructions, and when the instructions are executed, the method provided by the first embodiment is implemented.
  • the computer-readable storage medium provided by another embodiment of the present disclosure is used to store instructions, and when the instructions are executed, the method provided by another embodiment is implemented.
  • the computer-readable storage medium provided by another embodiment of the present disclosure is used to store instructions, and when the instructions are executed, the method provided by another embodiment is implemented.
  • the UE in response to the UE triggering the random access process, can determine the usage rules of the random access resource configuration , determining a random access resource configuration based on the determined usage rule, and performing random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • FIG. 1 is a schematic flowchart of a method for determining random access resource configuration provided by an embodiment of the present disclosure
  • FIG. 2 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure
  • FIG. 3 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure
  • FIG. 4 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure
  • FIG. 5 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure
  • FIG. 6 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure.
  • FIG. 7 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure.
  • FIG. 8 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of an apparatus for determining random access resource configuration provided by an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of an apparatus for determining random access resource configuration provided by another embodiment of the present disclosure.
  • Fig. 11 is a block diagram of a user equipment provided by an embodiment of the present disclosure.
  • Fig. 12 is a block diagram of a network side device provided by an embodiment of the present disclosure.
  • first, second, third, etc. may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the embodiments of the present disclosure, first information may also be called second information, and similarly, second information may also be called first information.
  • first information may also be called second information
  • second information may also be called first information.
  • the words "if” and "if” as used herein may be interpreted as “at” or "when” or "in response to a determination.”
  • FIG. 1 is a schematic flowchart of a method for determining random access resource configuration provided by an embodiment of the present disclosure, which is applied to a UE. As shown in FIG. 1 , the method for determining random access resource configuration may include the following steps:
  • Step 101 in response to UE triggering a random access procedure, determine usage rules for random access resource configuration.
  • a UE may be a device that provides voice and/or data connectivity to a user.
  • Terminal equipment can communicate with one or more core networks via RAN (Radio Access Network, wireless access network), and UE can be an IoT terminal, such as a sensor device, a mobile phone (or called a "cellular" phone) and a
  • the computer of the networked terminal for example, may be a fixed, portable, pocket, hand-held, built-in computer or vehicle-mounted device.
  • station Station, STA
  • subscriber unit subscriber unit
  • subscriber station subscriber station
  • mobile station mobile station
  • mobile station mobile
  • remote station remote station
  • access point remote terminal
  • user terminal or user agent.
  • the UE may also be a device of an unmanned aerial vehicle.
  • the UE may also be a vehicle-mounted device, for example, it may be a trip computer with a wireless communication function, or a wireless terminal connected externally to the trip computer.
  • the UE may also be a roadside device, for example, it may be a street lamp, a signal lamp, or other roadside devices with a wireless communication function.
  • the use rule may be specifically used to determine the random access resource configuration used in the random access process. And, in an embodiment of the present disclosure, when the UE triggers different random access procedures, the determined usage rules are also different.
  • a first usage rule is determined, and the first usage rule is used to determine random access resource configuration.
  • the second usage rule is determined, and the second usage rule is used to determine the random access in the contention-based random access procedure resource allocation.
  • the method for the UE to determine the usage rule of the random access resource configuration may include at least one of the following:
  • Step 102 Determine random access resource configuration based on the determined usage rule, and perform random access based on the determined random access resource configuration.
  • the UE-triggered random access process may be a non-contention-based random access process, and at this time, the first usage rule may be used to determine the random access resource configuration.
  • the UE-triggered random access process may be a contention-based random access process, and at this time, the second usage rule may be used to determine the random access resource configuration.
  • the UE can determine the use rule of the random access resource configuration, and in response to the UE triggering the random access process, determine the random access resource configuration based on the use rule. Access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • FIG. 2 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure, which is applied to a UE. As shown in FIG. 2 , the method for determining random access resource configuration may include the following steps:
  • Step 201 acquire the first random access resource configuration and/or the second random access resource configuration sent by the network side device.
  • the first random access resource configuration and the second random access resource configuration respectively include at least one random access resource configuration.
  • the first random access resource configuration may be the random access resource configuration corresponding to the first version
  • the second random access resource configuration may be the random access resource configuration corresponding to the second version. Enter the resource configuration.
  • the first version is prior to the second version.
  • the first version may be Release-15 and/or Release-16.
  • the second version may be a Release-17 version.
  • the first random access resource configuration may include at least one of the following:
  • System information request random access resource configuration (eg, Rel-15 SI-RequestConfig, for system information request based on Msg1).
  • the contention-based random access resource configuration may further include contention-based 2-step random access resource configuration and contention-based 4-step random access resource configuration.
  • the foregoing non-contention-based random access resource configuration may further include non-contention-based 2-step random access resource configuration and non-contention-based 4-step random access resource configuration.
  • the first random access resource configuration may include contention-based 4-step random access resource configuration (such as Rel-15 RACH -ConfigCommon), non-contention-based 4-step random access resource configuration (Rel-15 RACH-ConfigDedicated (for handover process), or Rel-15BeamFailureRecoveryConfig (for beam failure recovery process)).
  • contention-based 4-step random access resource configuration such as Rel-15 RACH -ConfigCommon
  • Non-contention-based 4-step random access resource configuration (Rel-15 RACH-ConfigDedicated (for handover process)
  • Rel-15BeamFailureRecoveryConfig for beam failure recovery process
  • the first random access resource configuration may include contention-based 2-step random access resource configuration (such as Rel-16 RACH-ConfigCommonTwoStepRA ), based on non-contention 2-step random access resource configuration (Rel-16 RACH-ConfigGenericTwoStepRA).
  • contention-based 2-step random access resource configuration such as Rel-16 RACH-ConfigCommonTwoStepRA
  • non-contention 2-step random access resource configuration Rel-16 RACH-ConfigGenericTwoStepRA
  • each random access resource configuration in the second random access resource configuration corresponds to a specific function.
  • the above specific functions may include at least one of the following:
  • the second random access resource configuration may include a contention-based random access resource configuration.
  • the random access resource configuration based on contention in the second random access resource configuration may include at least one of the following:
  • Contention-based 2-step random access resource configuration (eg, Rel-17 RACH-ConfigCommonTwoStepRA);
  • Contention-based 4-step random access resource configuration (eg, Rel-17 RACH-ConfigCommon).
  • Step 202 in response to the UE triggering the random access process, determine the usage rules of the random access resource configuration.
  • Step 203 Determine a random access resource configuration from the first random access resource configuration and/or the second random access resource configuration based on the determined usage rule, and perform random access based on the determined random access resource configuration.
  • the UE in response to the UE triggering the random access process, can determine the use rule of the random access resource configuration, based on the determined use rule Determine the random access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • FIG. 3 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure, which is applied to a UE. As shown in FIG. 3 , the method for determining random access resource configuration may include the following steps:
  • Step 301 Acquire the first random access resource configuration and/or the second random access resource configuration sent by the network side device.
  • Step 302 In response to the UE triggering a non-contention-based random access procedure, determine a first usage rule for random access resource configuration.
  • the first usage rule may include at least one of the following:
  • Rule 1 Determine the random access resource configuration based on the non-contention-based random access resource configuration in the first random access resource configuration
  • Rule 2 Determine the random access resource based on at least one of the non-contention-based random access resource configuration in the first random access resource configuration and at least part of the contention-based random access resource configuration in the first random access resource configuration. input resource allocation;
  • Rule 3 Determine the random access resource configuration based on all random access resource configurations in the first random access resource configuration, and/or all random access resource configurations in the second random access resource configuration;
  • Rule 4 Based on non-contention-based random access resource configuration in the first random access resource configuration, at least partially contention-based random access resource configuration in the first random access resource configuration, and second random access resource configuration at least one of the random access resource configurations corresponding to the first specific function determines the random access resource configuration;
  • Rule 5 Determine the random access resource configuration based on at least one of the non-contention-based random access resource configuration in the first random access resource configuration and the random access resource configuration corresponding to the first specific function in the second random access resource configuration. Access resource configuration.
  • Step 303 Determine a random access resource configuration from the first random access resource configuration and/or the second random access resource configuration based on the first usage rule, and perform random access based on the determined random access resource configuration.
  • the first usage rule includes multiple different rules. Therefore, in one embodiment of the present disclosure, when the first usage rules determined in step 302 are different, this step 303 The method for determining the random access resource configuration based on the first usage rule will also be different.
  • the method for determining the random access resource configuration in the access resource configuration may be: determining the random access resource configuration from the non-contention-based random access resource configuration in the first random access resource configuration.
  • the UE may determine the random access resource configuration according to the RO (RACH Occasion, random access opportunity) resource and Preamble identifier indicated in Rel-15 RACH-ConfigDedicated.
  • RO RACH Occasion, random access opportunity
  • the first random access resource configuration and/or the second random access resource may be: from the non-contention-based random access resource configuration in the first random access resource configuration, and/or, at least part of the first random access resource configuration is contention-based The random access resource configuration is determined in the random access resource configuration.
  • RACH-ConfigDedicated does not include RO resources (that is, the non-contention-based random access resource configuration in the first random access resource configuration does not include RO resources), but includes Preamble identification and RSRP configuration for beam selection (for example, SSB (Synchronous Signal Block, synchronization signal block) or CSI-RS (Channel State Information Reference Signal, channel state information reference signal) corresponding to RSRP (Reference Signal Received Power, reference Signal reception strength)), then at this time, the UE can combine the RO resources indicated in Rel-15 RACH-ConfigCommon (that is, part of the contention-based random access resource configuration in the first random access resource configuration) and RACH-ConfigDedicated The indicated Preamble identifier (that is, the non-contention-based random access resource configuration in the first random access resource configuration) is determined as the random access resource configuration.
  • SSB Synchronous Signal Block, synchronization signal block
  • CSI-RS Channel State Information Reference Signal, channel state information reference signal
  • RSRP Reference Signal Received Power, reference
  • the RACH-ConfigDedicated does not include the RO resource, nor does it include the RSRP configuration for beam selection, but includes the Preamble indication. Then the UE can configure the RSRP configuration of RO resources in Rel-15 RACH-ConfigCommon and beam selection in Rel-15 RACH-ConfigCommon (that is, all contention-based random access resource configurations in the first random access resource configuration) and RACH -
  • the Preamble identifier indicated in ConfigDedicated (that is, the non-contention-based random access resource configuration in the first random access resource configuration) is determined as the random access resource configuration.
  • the first usage rule determined in the above step 303 is the above rule 3
  • the first random access resource configuration and/or the second random access resource may be: from all random access resource configurations in the first random access resource configuration, and/or, from all random access resource configurations in the second random access resource configuration Determine random access resource configuration.
  • RACH-ConfigDedicated indicates RO resource, Preamble indication, and RSRP configuration for beam selection.
  • Rel-15 RACH-ConfigCommon indicates RO resource and RSRP configuration for beam selection.
  • Rel-17 featureCombinationRACH-ConfigCommon indicates RO resource and RSRP configuration for beam selection. Then the UE may determine the RO indicated in RACH-ConfigDedicated, the RO indicated in Rel-15 RACH-ConfigCommon, and the RO indicated in Rel-17 featureCombinationRACH-ConfigCommon (random access resource configuration in the second random access resource configuration) as Random access resource configuration RO resource.
  • the first random access resource configuration and/or the second random access resource may be: from the non-contention-based random access resource configuration in the first random access resource configuration, at least part of the contention-based random access resource configuration in the first random access resource configuration At least one of the resource configuration and the random access resource configuration corresponding to the first specific function in the second random access resource configuration determines the random access resource configuration.
  • the first specific function may include at least one of the following:
  • Non-contention-based random access resource configuration in the input resource configuration, at least partially contention-based random access resource configuration in the first random access resource configuration, and corresponding to the RedCap function and the SDT function in the second random access resource configuration At least one of the random access resource configurations determines the random access resource configuration.
  • the configuration from the first random access resource and/or the second random access resource may be: from the non-contention-based random access resource configuration in the first random access resource configuration, the random access resource configuration corresponding to the first specific function in the second random access resource configuration At least one of the input resource configurations is used to determine the random access resource configuration.
  • the UE in response to the UE triggering the random access process, can determine the use rule of the random access resource configuration, based on the determined use rule Determine the random access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • FIG. 4 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure, which is applied to a UE. As shown in FIG. 4 , the method for determining random access resource configuration may include the following steps:
  • Step 401 Acquire the first random access resource configuration and/or the second random access resource configuration sent by the network side device.
  • Step 402 in response to the UE triggering a contention-based random access process, determine a second usage rule for random access resource configuration.
  • the second usage rule may include at least one of the following:
  • Rule 6 In response to the contention-based random access procedure being triggered by a function other than a specific function, determine the random access resource configuration based on all random access resource configurations of the first random access resource configuration;
  • Rule 7 In response to the contention-based random access procedure being triggered by a function other than a specific function, all random access resource configurations based on the first random access resource configuration, and/or, in the second random access resource configuration determining the random access resource configuration corresponding to the random access resource configuration of the first specific function;
  • Rule 8 In response to the contention-based random access process being triggered by a specific function, determine the random access resource configuration based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, wherein the second The specific function is a specific function that triggers a contention-based random access process; in an embodiment of the present disclosure, the second specific function may be one or more of the RedCap function, the SDT function, the CovEnh function, and the Slicing function combination of functions;
  • Rule 9 In response to the contention-based random access process being triggered by a specific function, based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, and/or the first random access resource configuration At least part of the random access resource configuration in the random access resource configuration determines the random access resource configuration, wherein the second specific function is a specific function for triggering a contention-based random access procedure; in an embodiment of the present disclosure, the second specific function The function may be one or a combination of RedCap function, SDT function, CovEnh function, and Slicing function.
  • Step 403 Determine a random access resource configuration from the first random access resource configuration and/or the second random access resource configuration based on the second usage rule, and perform random access based on the determined random access resource configuration.
  • the second usage rule includes multiple different rules. Therefore, in one embodiment of the present disclosure, when the second usage rules determined in step 402 are different, this step 403 The method for determining the configuration of the random access resource based on the second usage rule will also be different.
  • the method for determining the random access resource configuration in the access resource configuration may be: determining the random access resource configuration from all random access resource configurations based on the first random access resource configuration.
  • the network side device is configured with Rel-15 RACH-ConfigCommon and Rel-17 featureCombinationRACH-ConfigCommon. Then, in response to the contention-based random access procedure being triggered by functions other than specific functions, the UE may determine Rel-15 RACH-ConfigCommon as the random access resource configuration.
  • the first random access resource configuration and/or the second random access resource may be: from all random access resource configurations based on the first random access resource configuration, and/or, in the second random access resource configuration corresponding to the random access resource configuration of the first specific function
  • the access resource configuration determines the random access resource configuration.
  • the UE may support the RedCap function and the SDT function in any combination, in response to the contention-based random access process being triggered by a function other than a specific function, all random access resource configurations based on the first random access resource configuration may be configured, and/or the second random access The random access resource configuration corresponding to the RedCap function and the SDT function in the resource configuration determines the random access resource configuration.
  • the first random access resource configuration and/or the second random access resource may be: determining the random access resource configuration from the random access resource configuration corresponding to the second specific function based on the second random access resource configuration.
  • the network side device is configured with Rel-15 RACH-ConfigCommon, and also configured with Rel-17 featureCombinationRACH-ConfigCommon corresponding to the second specific function.
  • the UE triggers the contention-based random access process by the second specific function (for example, triggers the contention-based random access process of the SDT process of slice-1)
  • the UE determines Rel-17 featureCombinationRACH-ConfigCommon as random access resource allocation.
  • the first random access resource configuration and/or the second random access resource may be: based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, and/or, at least The partial random access resource configuration determines the random access resource configuration.
  • the network side device is configured with Rel-15 RACH-ConfigCommon, and at the same time configured with Rel-17 featureCombinationRACH-ConfigCommon corresponding to the second specific function, and in Rel-17 featureCombinationRACH-ConfigCommon There is no RO configuration in ConfigCommon but there is RSRP configuration for beam selection.
  • the UE when the UE triggers the contention-based random access process by the second specific function (for example, the UE triggers the contention-based random access process of the SDT process of slice-1, that is, the second specific function is the slice function and the SDT function combination), the UE will correspond to the RSRP configuration for beam selection in the Rel-17 featureCombinationRACH-ConfigCommon of the second specific function, and the RO configuration in the Rel-15 RACH-ConfigCommon (that is, in the first random access resource configuration Part of the random access resource configuration) is determined as the random access resource configuration.
  • the network side device is configured with Rel-15 RACH-ConfigCommon, and also configured with Rel-17 featureCombinationRACH-ConfigCommon corresponding to the second specific function, but Rel-17featureCombinationRACH-ConfigCommon There is no RO configuration in ConfigCommon, nor RSRP configuration for beam selection.
  • the UE determines the RSRP configuration for beam selection in Rel-15 RACH-ConfigCommon and the RO configuration in Rel-15 RACH-ConfigCommon (that is, all random access resource configurations in the first random access resource configuration) Configured for random access resources.
  • the network side device is configured with Rel-15 RACH-ConfigCommon, and also configured with Rel-17 featureCombinationRACH-ConfigCommon corresponding to the second specific function, and Rel-17 featureCombinationRACH - There is RO configuration in the configuration of ConfigCommon, but there is no RSRP configuration for beam selection.
  • the UE can configure the RSRP for beam selection in Rel-15 RACH-ConfigCommon, and configure the RO in Rel-15 RACH-ConfigCommon (that is, all random access resources in the first random access resource configuration configuration), and the RO configuration in Rel-17 featureCombinationRACH-ConfigCommon is determined as random access resource configuration.
  • the UE in response to the UE triggering the random access process, can determine the use rule of the random access resource configuration, based on the determined use rule Determine the random access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • FIG. 5 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure, which is applied to network side equipment. As shown in FIG. 5 , the method for determining random access resource configuration may include the following step:
  • Step 501 in response to UE triggering a random access procedure, determine usage rules for random access resource configuration.
  • the use rule may be specifically used to determine the random access resource configuration used in the random access process. And, in an embodiment of the present disclosure, when the random access procedure triggered by the UE is different, the determined usage rules are also different.
  • the first usage rule is determined, and the first usage rule is used to determine the non-contention-based random access procedure Random access resource configuration in .
  • the second usage rule is determined, and the second usage rule is used to determine the random access in the contention-based random access procedure. Enter the resource configuration.
  • the method for the network side device to determine the usage rule of the random access resource configuration may include: determining the usage rule of the random access resource configuration based on the agreement, and/or, the network side device Independently determine usage rules for random access resource configuration.
  • the network side device can determine the type of the random access procedure triggered by the UE according to all currently existing usage rules and the random access resources used by the UE, and then A usage rule corresponding to the type of the random access procedure is determined.
  • the types of the random access process may include: contention-based 4-step random access, contention-based 2-step random access, non-contention-based 4-step random access, non-contention-based 2-step random access, system Information requests random access.
  • Step 502 Determine random access resource configuration based on the determined usage rule, and perform random access based on the determined random access resource configuration.
  • the UE-triggered random access process may be based on a non-contention random access process, and at this time, the first usage rule may be used to determine the random access resource configuration.
  • the UE-triggered random access process may be based on a contention-based random access process, and at this time, the second usage rule may be used to determine the random access resource configuration.
  • the network side device can respond to the UE triggering the random access process, and determine the usage rules of the random access resource configuration, based on the determined The usage rules determine the random access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • FIG. 6 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure, which is applied to a network side device. As shown in FIG. 6 , the method for determining random access resource configuration may include the following step:
  • Step 601. Send the first random access resource configuration and/or the second random access resource configuration to the UE.
  • the first random access resource configuration and the second random access resource configuration respectively include at least one random access resource configuration.
  • each random access resource configuration in the second random access resource configuration corresponds to a specific function.
  • Step 602 in response to the UE triggering the random access procedure, determine the usage rule of the random access resource configuration.
  • Step 603 Determine a random access resource configuration from the first random access resource configuration and/or the second random access resource configuration based on the determined usage rule, and perform random access based on the determined random access resource configuration.
  • the network side device can respond to the UE triggering the random access process, and determine the usage rules of the random access resource configuration, based on the determined The usage rules determine the random access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • FIG. 7 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure, which is applied to a network side device. As shown in FIG. 7 , the method for determining random access resource configuration may include the following step:
  • Step 701 Send the first random access resource configuration and/or the second random access resource configuration to the UE.
  • Step 702 In response to the UE triggering a non-contention based random access procedure, determine a first usage rule for random access resource configuration.
  • the first usage rule may include at least one of the following:
  • Rule 1 Determine the random access resource configuration based on the non-contention-based random access resource configuration in the first random access resource configuration
  • Rule 2 Determine the random access resource based on at least one of the non-contention-based random access resource configuration in the first random access resource configuration and at least part of the contention-based random access resource configuration in the first random access resource configuration. input resource allocation;
  • Rule 3 Determine the random access resource configuration based on all random access resource configurations in the first random access resource configuration, and/or all random access resource configurations in the second random access resource configuration;
  • Rule 4 Based on non-contention-based random access resource configuration in the first random access resource configuration, at least partially contention-based random access resource configuration in the first random access resource configuration, and second random access resource configuration at least one of the random access resource configurations corresponding to the first specific function determines the random access resource configuration;
  • Rule 5 Determine the random access resource configuration based on at least one of the non-contention-based random access resource configuration in the first random access resource configuration and the random access resource configuration corresponding to the first specific function in the second random access resource configuration. Access resource configuration.
  • Step 703 Determine a random access resource configuration from the first random access resource configuration and/or the second random access resource configuration based on the first usage rule, and perform random access based on the determined random access resource configuration.
  • the first usage rule includes multiple different rules. Therefore, in one embodiment of the present disclosure, when the first usage rules determined in step 702 are different, this step 703 The method for determining the random access resource configuration based on the first usage rule will also be different.
  • the method for determining the random access resource configuration in the access resource configuration may be: determining the random access resource configuration from the non-contention-based random access resource configuration in the first random access resource configuration.
  • the first usage rule determined in the above step 703 is the above rule 2
  • the first random access resource configuration and/or the second random access resource may be: from the non-contention-based random access resource configuration in the first random access resource configuration, and/or, at least part of the first random access resource configuration is contention-based
  • the random access resource configuration is determined in the random access resource configuration.
  • the configuration from the first random access resource and/or the second random access resource may be: from all random access resource configurations in the first random access resource configuration, and/or, from all random access resource configurations in the second random access resource configuration Determine random access resource configuration.
  • the first random access resource configuration and/or the second random access resource may be: from the non-contention-based random access resource configuration in the first random access resource configuration, at least part of the contention-based random access resource configuration in the first random access resource configuration At least one of the resource configuration and the random access resource configuration corresponding to the first specific function in the second random access resource configuration determines the random access resource configuration.
  • the first specific function may include at least one of the following:
  • the configuration from the first random access resource and/or the second random access resource may be: from the non-contention-based random access resource configuration in the first random access resource configuration, the random access resource configuration corresponding to the first specific function in the second random access resource configuration At least one of the input resource configurations is used to determine the random access resource configuration.
  • the network side device can respond to the UE triggering the random access process, and determine the usage rules of the random access resource configuration, based on the determined The usage rules determine the random access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • FIG. 8 is a schematic flowchart of a method for determining random access resource configuration provided by another embodiment of the present disclosure, which is applied to network side equipment. As shown in FIG. 8 , the method for determining random access resource configuration may include the following step:
  • Step 801 Send the first random access resource configuration and/or the second random access resource configuration to the UE.
  • Step 802 In response to the UE triggering a non-contention based random access procedure, determine a second usage rule for random access resource configuration.
  • the second usage rule may include at least one of the following:
  • Rule 6 In response to the contention-based random access procedure being triggered by a function other than a specific function, determine the random access resource configuration based on all random access resource configurations of the first random access resource configuration;
  • Rule 7 In response to the contention-based random access procedure being triggered by a function other than a specific function, all random access resource configurations based on the first random access resource configuration, and/or, in the second random access resource configuration determining the random access resource configuration corresponding to the random access resource configuration of the first specific function;
  • Rule 8 In response to the contention-based random access process being triggered by a specific function, determine the random access resource configuration based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, wherein the second The specific function is a specific function that triggers a contention-based random access process; in an embodiment of the present disclosure, the second specific function may be one or more of the RedCap function, the SDT function, the CovEnh function, and the Slicing function combination of functions;
  • Rule 9 In response to the contention-based random access process being triggered by a specific function, based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, and/or the first random access resource configuration At least part of the random access resource configuration in the random access resource configuration determines the random access resource configuration, wherein the second specific function is a specific function for triggering a contention-based random access procedure; in an embodiment of the present disclosure, the second specific function The function may be one or a combination of RedCap function, SDT function, CovEnh function, and Slicing function.
  • Step 803 Determine a random access resource configuration from the first random access resource configuration and/or the second random access resource configuration based on the second usage rule, and perform random access based on the determined random access resource configuration.
  • the second usage rule includes multiple different rules. Therefore, in one embodiment of the present disclosure, when the second usage rules determined in step 802 are different, this step 803 The method for determining the configuration of the random access resource based on the second usage rule will also be different.
  • the method for determining the random access resource configuration in the access resource configuration may be: determining the random access resource configuration from all random access resource configurations based on the first random access resource configuration.
  • the first random access resource configuration and/or the second random access resource may be: from all random access resource configurations based on the first random access resource configuration, and/or, in the second random access resource configuration corresponding to the random access resource configuration of the first specific function
  • the access resource configuration determines the random access resource configuration.
  • the first random access resource configuration and/or the second random access resource may be: determining the random access resource configuration from the random access resource configuration corresponding to the second specific function based on the second random access resource configuration.
  • the first random access resource configuration and/or the second random access resource may be: based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, and/or, at least The partial random access resource configuration determines the random access resource configuration.
  • the network side device can respond to the UE triggering the random access process, and determine the usage rules of the random access resource configuration, based on the determined The usage rules determine the random access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • FIG. 9 is a schematic structural diagram of an apparatus for determining random access resource configuration provided by an embodiment of the present disclosure. As shown in FIG. 9 , the apparatus 900 may include:
  • a determining module 901 configured to determine usage rules for random access resource configuration in response to the UE triggering a random access procedure
  • the random access module 902 is configured to determine a random access resource configuration based on the determined usage rule, and perform random access based on the determined random access resource configuration.
  • the UE in response to the UE triggering the random access process, the UE can determine the use rule of the random access resource configuration, based on the determined use rule Determine the random access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • the above-mentioned device is also used for:
  • the first random access resource configuration and/or the second random access resource configuration sent by the network side device the first random access resource configuration and the second random access resource configuration respectively include at least one random access resource configuration; the second Each random access resource configuration in the two random access resource configurations corresponds to a specific function.
  • the specific function includes at least one of the following:
  • the first random access resource configuration includes at least one of the following:
  • System information requests random access resource configuration.
  • the second random access resource configuration includes contention-based random access resource configuration.
  • the above determination module 901 is also used to:
  • the above-mentioned random access module 902 is also used for:
  • the random access resource configuration is determined from the first random access resource configuration and/or the second random access resource configuration based on the first usage rule.
  • the first usage rule includes at least one of the following:
  • Rule 1 Determine the random access resource configuration based on the non-contention-based random access resource configuration in the first random access resource configuration
  • Rule 2 Determine the random access resource based on at least one of the non-contention-based random access resource configuration in the first random access resource configuration and at least part of the contention-based random access resource configuration in the first random access resource configuration. input resource allocation;
  • Rule 3 Determine the random access resource configuration based on all random access resource configurations in the first random access resource configuration, and/or all random access resource configurations in the second random access resource configuration;
  • Rule 4 Based on non-contention-based random access resource configuration in the first random access resource configuration, at least partially contention-based random access resource configuration in the first random access resource configuration, and second random access resource configuration at least one of the random access resource configurations corresponding to the first specific function determines the random access resource configuration;
  • Rule 5 Determine the random access resource configuration based on at least one of the non-contention-based random access resource configuration in the first random access resource configuration and the random access resource configuration corresponding to the first specific function in the second random access resource configuration. Access resource configuration.
  • the first specific function includes at least one of the following:
  • the above determination module 901 is also used to:
  • the above-mentioned random access module 902 is also used for:
  • the random access resource configuration is determined from the first random access resource configuration and/or the second random access resource configuration based on the second usage rule.
  • the second usage rule includes at least one of the following:
  • Rule 6 In response to the contention-based random access process being triggered by a function other than the specific function, determine the random access resource configuration based on all random access resource configurations of the first random access resource configuration;
  • Rule 7 In response to the contention-based random access procedure being triggered by a function other than a specific function, all random access resource configurations based on the first random access resource configuration, and/or, in the second random access resource configuration determining the random access resource configuration corresponding to the random access resource configuration of the first specific function;
  • Rule 8 In response to the contention-based random access process being triggered by a specific function, determine the random access resource configuration based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, the second specific function The function is a specific function to trigger the contention-based random access procedure;
  • Rule 9 In response to the contention-based random access process being triggered by a specific function, based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, and/or the first random access resource configuration At least part of the random access resource configurations in the random access resource configuration determine the random access resource configuration, and the second specific function is a specific function of triggering a contention-based random access process.
  • the first specific function includes at least one of the following:
  • the contention-based random access resource configuration includes at least one of the following:
  • the non-contention-based random access resource configuration includes at least one of the following:
  • FIG. 10 is a schematic structural diagram of an apparatus for determining random access resource configuration provided by another embodiment of the present disclosure. As shown in FIG. 10 , the apparatus 1000 may include:
  • a determination module 1001 configured to determine usage rules for random access resource configuration in response to UE triggering a random access process
  • the configuration module 1002 is configured to determine a random access resource configuration based on the determined usage rule, and perform random access based on the determined random access resource configuration.
  • the network side device can respond to the UE triggering the random access process, and determine the usage rules of the random access resource configuration, based on the determined The usage rules determine the random access resource configuration, and perform random access based on the determined random access resource configuration. It can be seen that, in the embodiments of the present disclosure, when triggering different random access procedures, the UE can determine a specific random access resource configuration based on the usage rules, and allow the network side equipment and the UE to maintain the random access resource configuration based on the usage rules. If the input resource configuration is consistent, the stability of the random access process is improved.
  • the above-mentioned device is also used for:
  • the first random access resource configuration and/or the second random access resource configuration respectively include at least one random access resource configuration; the second Each random access resource configuration in the random access resource configuration corresponds to a specific function.
  • the specific function includes at least one of the following:
  • the first random access resource configuration includes at least one of the following:
  • System information requests random access resource configuration.
  • the second random access resource configuration includes contention-based random access resource configuration.
  • the above determination module 1001 is also used for:
  • a first usage rule for random access resource configuration is determined.
  • the above configuration module 1002 is also used for:
  • the random access resource configuration is determined from the first random access resource configuration and/or the second random access resource configuration based on the first usage rule.
  • the first usage rule includes at least one of the following:
  • Rule 1 Determine the random access resource configuration based on the non-contention-based random access resource configuration in the first random access resource configuration
  • Rule 2 Determine the random access resource based on at least one of the non-contention-based random access resource configuration in the first random access resource configuration and at least part of the contention-based random access resource configuration in the first random access resource configuration. input resource allocation;
  • Rule 3 Determine the random access resource configuration based on all random access resource configurations in the first random access resource configuration and/or all random access resource configurations in the second random access resource configuration;
  • Rule 4 Based on non-contention-based random access resource configuration in the first random access resource configuration, at least partially contention-based random access resource configuration in the first random access resource configuration, and second random access resource configuration at least one of the random access resource configurations corresponding to the first specific function determines the random access resource configuration;
  • Rule 5 Determine the random access resource configuration based on at least one of the non-contention-based random access resource configuration in the first random access resource configuration and the random access resource configuration corresponding to the first specific function in the second random access resource configuration. Access resource configuration.
  • the first specific function includes at least one of the following:
  • the above determination module 1001 is also used for:
  • a second usage rule for random access resource configuration is determined.
  • the above configuration module 1002 is also used for:
  • the random access resource configuration is determined from the first random access resource configuration and/or the second random access resource configuration based on the second usage rule.
  • the second usage rule includes at least one of the following:
  • Rule 6 In response to the contention-based random access process being triggered by a function other than the specific function, determine the random access resource configuration based on all random access resource configurations of the first random access resource configuration;
  • Rule 7 In response to the contention-based random access procedure being triggered by a function other than the specified function, all random access resource configurations based on the first random access resource configuration, and/or, the second random access resource determining the random access resource configuration corresponding to the random access resource configuration of the first specific function in the configuration;
  • Rule 8 In response to the contention-based random access process being triggered by a specific function, determine the random access resource configuration based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, the second specific function The function is a specific function to trigger the contention-based random access procedure;
  • Rule 9 In response to the contention-based random access process being triggered by a specific function, based on the random access resource configuration corresponding to the second specific function in the second random access resource configuration, and/or the first random access resource configuration At least part of the random access resource configurations in the random access resource configuration determine the random access resource configuration, and the second specific function is a specific function of triggering a contention-based random access process.
  • the first specific function includes at least one of the following:
  • the contention-based random access resource configuration includes at least one of the following:
  • the non-contention-based random access resource configuration includes at least one of the following:
  • Fig. 11 is a block diagram of a user equipment UE 1100 provided by an embodiment of the present disclosure.
  • the UE 1100 may be a mobile phone, a computer, a digital broadcast terminal device, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • UE1100 may include at least one of the following components: a processing component 1102, a memory 1104, a power supply component 1106, a multimedia component 1108, an audio component 1110, an input/output (I/O) interface 1112, a sensor component 1113, and a communication component 1116.
  • a processing component 1102 a memory 1104, a power supply component 1106, a multimedia component 1108, an audio component 1110, an input/output (I/O) interface 1112, a sensor component 1113, and a communication component 1116.
  • a processing component 1102 may include at least one of the following components: a processing component 1102, a memory 1104, a power supply component 1106, a multimedia component 1108, an audio component 1110, an input/output (I/O) interface 1112, a sensor component 1113, and a communication component 1116.
  • I/O input/output
  • Processing component 1102 generally controls the overall operations of UE 1100, such as those associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 1102 may include at least one processor 1120 to execute instructions to complete all or part of the steps of the above-mentioned method.
  • processing component 1102 can include at least one module to facilitate interaction between processing component 1102 and other components.
  • processing component 1102 may include a multimedia module to facilitate interaction between multimedia component 1108 and processing component 1102 .
  • the memory 1104 is configured to store various types of data to support operations at the UE 1100 . Examples of such data include instructions for any application or method operating on UE 1100, contact data, phonebook data, messages, pictures, videos, etc.
  • the memory 1104 can be implemented by any type of volatile or non-volatile memory device or their combination, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • the power supply component 1106 provides power to various components of the UE 1100.
  • Power component 1106 may include a power management system, at least one power supply, and other components associated with generating, managing, and distributing power for UE 1100 .
  • the multimedia component 1108 includes a screen providing an output interface between the UE 1100 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • the touch panel includes at least one touch sensor to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or slide action, but also detect a wake-up time and pressure related to the touch or slide operation.
  • the multimedia component 1108 includes a front camera and/or a rear camera. When the UE1100 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
  • the audio component 1110 is configured to output and/or input audio signals.
  • the audio component 1110 includes a microphone (MIC), which is configured to receive an external audio signal when the UE 1100 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. Received audio signals may be further stored in memory 1104 or sent via communication component 1116 .
  • the audio component 1110 also includes a speaker for outputting audio signals.
  • the I/O interface 1112 provides an interface between the processing component 1102 and a peripheral interface module, which may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.
  • the sensor component 1113 includes at least one sensor, and is used to provide various aspects of state assessment for the UE 1100 .
  • the sensor component 1113 can detect the open/closed state of the device 1100, the relative positioning of components, such as the display and the keypad of the UE1100, the sensor component 1113 can also detect the position change of the UE1100 or a component of the UE1100, and the user and Presence or absence of UE1100 contact, UE1100 orientation or acceleration/deceleration and temperature change of UE1100.
  • the sensor assembly 1113 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • the sensor assembly 1113 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 1113 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
  • Communication component 1116 is configured to facilitate wired or wireless communications between UE 1100 and other devices.
  • UE1100 can access wireless networks based on communication standards, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 1116 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 1116 also includes a near field communication (NFC) module to facilitate short-range communication.
  • NFC near field communication
  • the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID Radio Frequency Identification
  • IrDA Infrared Data Association
  • UWB Ultra Wideband
  • Bluetooth Bluetooth
  • UE 1100 may be powered by at least one Application Specific Integrated Circuit (ASIC), Digital Signal Processor (DSP), Digital Signal Processing Device (DSPD), Programmable Logic Device (PLD), Field Programmable Gate Array ( FPGA), controller, microcontroller, microprocessor or other electronic components for implementing the above method.
  • ASIC Application Specific Integrated Circuit
  • DSP Digital Signal Processor
  • DSPD Digital Signal Processing Device
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • controller microcontroller, microprocessor or other electronic components for implementing the above method.
  • Fig. 12 is a block diagram of a network-side device 1200 provided by an embodiment of the present application.
  • the network side device 1200 may be provided as a network side device.
  • the network side device 1200 includes a processing component 1211, which further includes at least one processor, and a memory resource represented by a memory 1232 for storing instructions executable by the processing component 1222, such as application programs.
  • the application program stored in memory 1232 may include one or more modules each corresponding to a set of instructions.
  • the processing component 1215 is configured to execute instructions, so as to execute any of the aforementioned methods applied to the network side device, for example, the method shown in FIG. 1 .
  • the network side device 1200 may also include a power supply component 1226 configured to perform power management of the network side device 1200, a wired or wireless network interface 1250 configured to connect the network side device 1200 to the network, and an input/output (I/O ) interface 1258.
  • the network side device 1200 can operate based on the operating system stored in the memory 1232, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, Free BSDTM or similar.
  • the methods provided in the embodiments of the present disclosure are introduced from the perspectives of the network side device, the UE, and the RIS array respectively.
  • the network side device and the UE may include a hardware structure and a software module, and implement the above functions in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • a certain function among the above-mentioned functions may be implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • the methods provided in the embodiments of the present disclosure are introduced from the perspectives of the network side device, the UE, and the RIS array respectively.
  • the network side device and the UE may include a hardware structure and a software module, and implement the above functions in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • a certain function among the above-mentioned functions may be implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • the communication device may include a transceiver module and a processing module.
  • the transceiver module may include a sending module and/or a receiving module, the sending module is used to realize the sending function, the receiving module is used to realize the receiving function, and the sending and receiving module can realize the sending function and/or the receiving function.
  • the communication device may be a terminal device (such as the terminal device in the foregoing method embodiments), or a device in the terminal device, or a device that can be matched with the terminal device.
  • the communication device may be a network device, or a device in the network device, or a device that can be matched with the network device.
  • the communication device may be a network device, or a terminal device (such as the terminal device in the above method embodiment), or a chip, a chip system, or a processor that supports the network device to implement the above method, or it may be a terminal device that supports A chip, a chip system, or a processor for realizing the above method.
  • the device can be used to implement the methods described in the above method embodiments, and for details, refer to the descriptions in the above method embodiments.
  • a communications device may include one or more processors.
  • the processor may be a general purpose processor or a special purpose processor or the like.
  • it can be a baseband processor or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data
  • the central processor can be used to control communication devices (such as network side equipment, baseband chips, terminal equipment, terminal equipment chips, DU or CU, etc.)
  • a computer program that processes data for a computer program.
  • the communication device may further include one or more memories, on which computer programs may be stored, and the processor executes the computer programs, so that the communication device executes the methods described in the foregoing method embodiments.
  • data may also be stored in the memory.
  • the communication device and the memory can be set separately or integrated together.
  • the communication device may further include a transceiver and an antenna.
  • the transceiver may be referred to as a transceiver unit, a transceiver, or a transceiver circuit, etc., and is used to implement a transceiver function.
  • the transceiver may include a receiver and a transmitter, and the receiver may be called a receiver or a receiving circuit for realizing a receiving function; the transmitter may be called a transmitter or a sending circuit for realizing a sending function.
  • the communication device may further include one or more interface circuits.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor executes the code instructions to enable the communication device to execute the methods described in the foregoing method embodiments.
  • the communication device is a terminal device (such as the terminal device in the above method embodiment): the processor is configured to execute the method shown in FIG. 8 .
  • the communication device is a network device: the transceiver is used to execute the method shown in any one of Fig. 6-Fig. 7 .
  • the communication device is an RIS array: the transceiver is used to execute the method shown in any one of Fig. 1-Fig. 5 .
  • the processor may include a transceiver for implementing receiving and transmitting functions.
  • the transceiver may be a transceiver circuit, or an interface, or an interface circuit.
  • the transceiver circuits, interfaces or interface circuits for realizing the functions of receiving and sending can be separated or integrated together.
  • the above-mentioned transceiver circuit, interface or interface circuit may be used for reading and writing code/data, or the above-mentioned transceiver circuit, interface or interface circuit may be used for signal transmission or transmission.
  • the processor may store a computer program, and the computer program runs on the processor to enable the communication device to execute the methods described in the foregoing method embodiments.
  • a computer program may be embedded in a processor, in which case the processor may be implemented by hardware.
  • the communication device may include a circuit, and the circuit may implement the function of sending or receiving or communicating in the foregoing method embodiments.
  • the processors and transceivers described in this disclosure can be implemented on integrated circuits (integrated circuits, ICs), analog ICs, radio frequency integrated circuits (RFICs), mixed signal ICs, application specific integrated circuits (ASICs), printed circuit boards ( printed circuit board, PCB), electronic equipment, etc.
  • the processor and transceiver can also be fabricated using various IC process technologies such as complementary metal oxide semiconductor (CMOS), nMetal-oxide-semiconductor (NMOS), P-type Metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (bipolar junction transistor, BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (Gas), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS nMetal-oxide-semiconductor
  • PMOS bipolar junction transistor
  • BJT bipolar CMOS
  • SiGe silicon germanium
  • Gas gallium arsenide
  • the communication device described in the above embodiments may be a network device or a terminal device (such as the terminal device in the above method embodiments), but the scope of the communication device described in this disclosure is not limited thereto, and the structure of the communication device may not be limited limits.
  • a communication device may be a stand-alone device or may be part of a larger device.
  • the communication device may be:
  • a set of one or more ICs may also include storage components for storing data and computer programs;
  • ASIC such as modem (Modem);
  • the communications device may be a chip or system-on-a-chip
  • the chip includes a processor and an interface.
  • the number of processors may be one or more, and the number of interfaces may be more than one.
  • the chip also includes a memory, which is used to store necessary computer programs and data.
  • An embodiment of the present disclosure also provides a system for determining the duration of a side link, the system includes a communication device as a terminal device (such as the first terminal device in the method embodiment above) in the above embodiment and a communication device as a network device, Alternatively, the system includes a communication device serving as a terminal device in the above embodiment (such as the first terminal device in the above method embodiment) and a communication device serving as a network device.
  • the present disclosure also provides a readable storage medium on which instructions are stored, and when the instructions are executed by a computer, the functions of any one of the above method embodiments are realized.
  • the present disclosure also provides a computer program product, which implements the functions of any one of the above method embodiments when executed by a computer.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product comprises one or more computer programs. When the computer program is loaded and executed on the computer, all or part of the processes or functions according to the embodiments of the present disclosure will be generated.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer program can be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program can be downloaded from a website, computer, server or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disk, SSD)) etc.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a high-density digital video disc (digital video disc, DVD)
  • a semiconductor medium for example, a solid state disk (solid state disk, SSD)
  • At least one in the present disclosure can also be described as one or more, and a plurality can be two, three, four or more, and the present disclosure is not limited.
  • the technical feature is distinguished by "first”, “second”, “third”, “A”, “B”, “C” and “D”, etc.
  • the technical features described in the “first”, “second”, “third”, “A”, “B”, “C” and “D” have no sequence or order of magnitude among the technical features described.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开提出一种随机接入资源配置的确定方法、装置、用户设备、RIS阵列、网络侧设备及存储介质,属于通信技术领域。其中,该方法包括:响应于UE触发随机接入过程,确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。本公开提供的随机接入资源配置的确定方法可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。

Description

一种随机接入资源配置的确定方法及设备/存储介质/装置 技术领域
本公开涉及通信技术领域,尤其涉及一种随机接入资源配置的确定方法及设备/存储介质/装置。
背景技术
在通信***中,网络侧设备可以为UE(User Equipment,用户设备)提供多种不同的随机接入资源配置,以便对UE实现不同的随机接入控制。但是,由于不同随机接入资源配置中的部分资源配置内容可能是相同的或是缺失的,由此需要确定当UE触发不同随机接入过程时候的随机接入配置的使用规则。
发明内容
本公开提出的随机接入资源配置的确定方法及设备/存储介质/装置,以提出一种随机接入资源配置的确定方法。
本公开一方面实施例提出的随机接入资源配置的确定方法,应用于UE,包括:
响应于所述UE触发随机接入过程,确定随机接入资源配置的使用规则;
基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
本公开另一方面实施例提出的随机接入资源配置的确定方法,应用于网络侧设备,包括:
响应于UE触发随机接入过程,确定随机接入资源配置的使用规则;
基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
本公开又一方面实施例提出的随机接入资源配置的确定装置,包括:
确定模块,用于响应于所述UE触发随机接入过程,确定随机接入资源配置的使用规则;
随机接入模块,用于基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
本公开又一方面实施例提出的随机接入资源配置的确定装置,包括:
确定模块,用于响应于UE触发随机接入过程,确定随机接入资源配置的使用规则;
配置模块,用于基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
本公开又一方面实施例提出的一种通信装置,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如上一方面实施例提出的方法。
本公开又一方面实施例提出的一种通信装置,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如上另一方面实施例提出的方法。
本公开又一方面实施例提出的一种通信装置,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如上又一方面实施例提出的方法。
本公开又一方面实施例提出的通信装置,包括:处理器和接口电路;
所述接口电路,用于接收代码指令并传输至所述处理器;
所述处理器,用于运行所述代码指令以执行如一方面实施例提出的方法。
本公开又一方面实施例提出的通信装置,包括:处理器和接口电路;
所述接口电路,用于接收代码指令并传输至所述处理器;
所述处理器,用于运行所述代码指令以执行如另一方面实施例提出的方法。
本公开又一方面实施例提出的通信装置,包括:处理器和接口电路;
所述接口电路,用于接收代码指令并传输至所述处理器;
所述处理器,用于运行所述代码指令以执行如又一方面实施例提出的方法。
本公开又一方面实施例提出的计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如一方面实施例提出的方法被实现。
本公开又一方面实施例提出的计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如另一方面实施例提出的方法被实现。
本公开又一方面实施例提出的计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如又一方面实施例提出的方法被实现。
综上所述,在本公开实施例提供的随机接入资源配置的确定方法及设备/存储介质/装置之中,响应于UE触发随机接入过程,UE可以确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
本公开附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本公开的实践了解到。
附图说明
本公开上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1为本公开一个实施例所提供的随机接入资源配置的确定方法的流程示意图;
图2为本公开另一个实施例所提供的随机接入资源配置的确定方法的流程示意图;
图3为本公开再一个实施例所提供的随机接入资源配置的确定方法的流程示意图;
图4为本公开又一个实施例所提供的随机接入资源配置的确定方法的流程示意图;
图5为本公开又一个实施例所提供的随机接入资源配置的确定方法的流程示意图;
图6为本公开又一个实施例所提供的随机接入资源配置的确定方法的流程示意图;
图7为本公开又一个实施例所提供的随机接入资源配置的确定方法的流程示意图;
图8为本公开又一个实施例所提供的随机接入资源配置的确定方法的流程示意图;
图9为本公开一个实施例所提供的随机接入资源配置的确定装置的结构示意图;
图10为本公开另一个实施例所提供的随机接入资源配置的确定装置的结构示意图;
图11是本公开一个实施例所提供的一种用户设备的框图;
图12为本公开一个实施例所提供的一种网络侧设备的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”及“若”可以被解释成为“在……时”或“当……时”或“响应于确定”。
下面详细描述本公开的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号 表示相同或类似的要素。下面通过参考附图描述的实施例是示例性的,旨在用于解释本公开,而不能理解为对本公开的限制。
下面参考附图对本公开提供的随机接入资源配置的确定方法、装置、用户设备、网络侧设备及存储介质进行详细描述。
图1为本公开实施例所提供的一种随机接入资源配置的确定方法的流程示意图,应用于UE,如图1所示,该随机接入资源配置的确定方法可以包括以下步骤:
步骤101、响应于UE触发随机接入过程,确定随机接入资源配置的使用规则。
需要说明的是,在本公开的一个实施例之中,UE可以是指向用户提供语音和/或数据连通性的设备。终端设备可以经RAN(Radio Access Network,无线接入网)与一个或多个核心网进行通信,UE可以是物联网终端,如传感器设备、移动电话(或称为“蜂窝”电话)和具有物联网终端的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程终端(remoteterminal)、接入终端(access terminal)、用户装置(user terminal)或用户代理(useragent)。或者,UE也可以是无人飞行器的设备。或者,UE也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线终端。或者,UE也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
其中,在本公开的一个实施例之中,该使用规则具体可以用于确定随机接入过程中所使用的随机接入资源配置。以及,在本公开的一个实施例之中,当UE触发的随机接入过程不同时,所确定的使用规则也不相同。
具体而言,在本公开的一个实施例之中,当UE触发基于非竞争的随机接入过程时,确定第一使用规则,该第一使用规则用于确定基于非竞争的随机接入过程中的随机接入资源配置。
在本公开的另一个实施例之中,当UE触发基于非竞争的随机接入过程时,确定第二使用规则,该第二使用规则用于确定基于竞争的随机接入过程中的随机接入资源配置。
进一步地,在本公开的一个实施例之中,UE确定随机接入资源配置的使用规则的方法可以包括以下至少一种:
基于网络侧设备指示确定随机接入资源配置的使用规则;
基于协议约定确定随机接入资源配置的使用规则。
步骤102、基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
其中,在公开的一个实施例之中,UE触发的随机接入过程可以是基于非竞争的随机接入过程,此时,可以使用第一使用规则确定随机接入资源配置。以及,在本公开的另一个实施例之中,UE触发的随机接入过程可以是基于竞争的随机接入过程,此时,可以使用第二使用规则确定随机接入资源配置。
以及,关于第一使用规则和第二使用规则的详细介绍可以参考后续实施例描述。
综上所述,在本公开实施例提供的随机接入资源配置的确定方法之中,UE可以确定随机接入资源配置的使用规则,并响应于UE触发随机接入过程,基于使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
图2为本公开另一个实施例所提供的一种随机接入资源配置的确定方法的流程示意图,应用于UE,如图2所示,该随机接入资源配置的确定方法可以包括以下步骤:
步骤201、获取网络侧设备发送的第一随机接入资源配置和/或第二随机接入资源配置。
其中,在本公开的一个实施例之中,第一随机接入资源配置和第二随机接入资源配置分别包括至少一个随机接入资源配置。
以及,在本公开的一个实施例之中,上述第一随机接入资源配置可以是第一版本对应的随机接入资源配置,上述第二随机接入资源配置可以是第二版本对应的随机接入资源配置。其中,第一版本先于第 二版本。示例的,在本公开的一个实施例之中,该第一版本可以为Release-15版本和/或Release-16版本。该第二版本可以为Release-17版本。
进一步地,在本公开的一个实施例之中,第一随机接入资源配置可以包括以下至少一种:
基于竞争的随机接入资源配置;
基于非竞争的随机接入资源配置;
***信息请求随机接入资源配置(如,Rel-15 SI-RequestConfig,用于基于Msg1的***信息请求)。
其中,在本公开的一个实施例之中,上述基于竞争的随机接入资源配置又可以包括基于竞争的2步随机接入资源配置,基于竞争的4步随机接入资源配置。上述基于非竞争的随机接入资源配置又可以包括基于非竞争的2步随机接入资源配置,基于非竞争的4步随机接入资源配置。
示例的,在本公开的一个实施例之中,当第一版本为Release-15版本时,第一随机接入资源配置可以包括有基于竞争的4步随机接入资源配置(如Rel-15 RACH-ConfigCommon),基于非竞争的4步随机接入资源配置(Rel-15 RACH-ConfigDedicated(用于切换过程),或Rel-15BeamFailureRecoveryConfig(用于波束失败恢复过程))。
在本公开的另一个实施例之中,当第一版本为Release-16版本时,第一随机接入资源配置可以包括有基于竞争的2步随机接入资源配置(如Rel-16 RACH-ConfigCommonTwoStepRA),基于非竞争的2步随机接入资源配置(Rel-16 RACH-ConfigGenericTwoStepRA)。
以及,在本公开的一个实施例之中,第二随机接入资源配置中的每一随机接入资源配置对应一特定功能。
具体的,在本公开的一个实施例之中,上述特定功能可以包括以下至少一种:
RedCap(Reduced Capability,降低能力)功能;
SDT(Small Data Transmission,小数据传输)功能;
CovEnh(Coverage enhancement,覆盖增强)功能;
Slicing(切片)功能。
并且,在本公开的一个实施例之中,第二随机接入资源配置可以包括基于竞争的随机接入资源配置。
进一步地,在本公开的一个实施例之中,上述基于第二随机接入资源配置中的竞争的随机接入资源配置可以包括以下至少一种:
基于竞争的2步随机接入资源配置(如,Rel-17 RACH-ConfigCommonTwoStepRA);
基于竞争的4步随机接入资源配置(如,Rel-17 RACH-ConfigCommon)。
步骤202、响应于UE触发随机接入过程,确定随机接入资源配置的使用规则。
步骤203、基于所确定的使用规则从第一随机接入资源配置和/或第二随机接入资源配置确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
其中,在本公开的一个实施例之中,关于步骤202~203的详细介绍可以参考上述实施例中的相关介绍,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的随机接入资源配置的确定方法之中,响应于UE触发随机接入过程,UE可以确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
图3为本公开再一个实施例所提供的一种随机接入资源配置的确定方法的流程示意图,应用于UE,如图3所示,该随机接入资源配置的确定方法可以包括以下步骤:
步骤301、获取网络侧设备发送的第一随机接入资源配置和/或第二随机接入资源配置。
其中,在本公开的一个实施例之中,关于第一随机接入资源配置和第二随机接入资源配置的详细介绍可以参考上述实施例中的相关介绍,本公开实施例在此不做赘述。
步骤302、响应于UE触发基于非竞争的随机接入过程,确定随机接入资源配置的第一使用规则。
其中,在本公开的一个实施例之中,第一使用规则可以包括以下至少一种:
规则1、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置确定随机接入资源配置;
规则2、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置中的至少一种确定随机接入资源配置;
规则3、基于第一随机接入资源配置中的所有随机接入资源配置,和/或第二随机接入资源配置中的所有随机接入资源配置确定随机接入资源配置;
规则4、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置;
规则5、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
步骤303、基于第一使用规则从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
其中,参考上述步骤302可知,第一使用规则中包括多个不同的规则,由此,在本公开的一个实施例之中,当步骤302中所确定的第一使用规则不同时,本步骤303中基于第一使用规则确定随机接入资源配置的方法也会有所不同。
具体而言,在本公开的一个实施例之中,当上述步骤303中所确定的第一使用规则为上述规则1时,则基于规则1从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的基于非竞争的随机接入资源配置确定随机接入资源配置。
示例的,在本公开的一个实施例之中,UE可以根据Rel-15 RACH-ConfigDedicated中指示的RO(RACH Occasion,随机接入机会)资源和Preamble标识确定随机接入资源配置。
在本公开的另一个实施例之中,当上述步骤303中所确定的第一使用规则为上述规则2时,则基于规则2从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的基于非竞争的随机接入资源配置、和/或、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置中确定随机接入资源配置。
示例的,在本公开的一个实施例之中,假设RACH-ConfigDedicated没有包括RO资源(即第一随机接入资源配置中的基于非竞争的随机接入资源配置没有包括RO资源),但包括了Preamble标识和用于波束选择的RSRP配置(例如,SSB(Synchronous Signal Block,同步信号块)或CSI-RS(Channel State Information Reference Signal,信道状态信息参考信号)对应的RSRP(Reference Signal Received Power,参考信号接收强度)),则此时,UE可以将Rel-15 RACH-ConfigCommon中指示的RO资源(即第一随机接入资源配置中的部分基于竞争的随机接入资源配置)和RACH-ConfigDedicated中指示的Preamble标识(即第一随机接入资源配置中的基于非竞争的随机接入资源配置)确定为随机接入资源配置。
示例的,在本公开的另一个实施例之中,假设RACH-ConfigDedicated中没有包括RO资源,也没有包括用于波束选择的RSRP配置,但包括了Preamble指示。则UE可以将Rel-15 RACH-ConfigCommon中RO资源和Rel-15 RACH-ConfigCommon中的波束选择的RSRP配置(即第一随机接入资源配置中的全部基于竞争的随机接入资源配置)和RACH-ConfigDedicated中指示的Preamble标识(即第一随机接入资源配置中的基于非竞争的随机接入资源配置)确定为随机接入资源配置。
在本公开的又一个实施例之中,当上述步骤303中所确定的第一使用规则为上述规则3时,则基于规则3从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的所有随机接入资源配置、和/或、第二随机接入资源配置中的所有随机接入资源配置中确定随机接入资源配置。
示例的,在本公开的一个实施例之中,假设RACH-ConfigDedicated中指示了RO资源、Preamble指示、和用于波束选择的RSRP配置。Rel-15 RACH-ConfigCommon指示了RO资源和用于波束选择的RSRP配置。以及Rel-17 featureCombinationRACH-ConfigCommon中指示了RO资源和用于波束选择的RSRP配置。则UE可以将RACH-ConfigDedicated中指示的RO和Rel-15 RACH-ConfigCommon中 指示的RO和Rel-17 featureCombinationRACH-ConfigCommon中指示的RO(第二随机接入资源配置中随机接入资源配置)确定为随机接入资源配置的RO资源。
在本公开的又一个实施例之中,当上述步骤303中所确定的第一使用规则为上述规则4时,则基于规则4从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
其中,在本公开的一个实施例之中,第一特定功能可以包括以下至少一种:
UE支持的特定功能;
网络侧设备指定的特定功能;
协议约定的特定功能。
示例的,在本公开的一个实施例之中,假设UE支持的特定功能中的RedCap功能和SDT功能,则可以确定第一特定功能为RedCap功能和SDT功能,此时,可以从第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置、第二随机接入资源配置中对应于RedCap功能和SDT功能的随机接入资源配置中的至少一种确定随机接入资源配置。
在本公开的又一个实施例之中,当上述步骤303中所确定的第一使用规则为上述规则5时,则基于规则5从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的基于非竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
关于第一特定功能的介绍可以参考上述规则4中的相关介绍。
综上所述,在本公开实施例提供的随机接入资源配置的确定方法之中,响应于UE触发随机接入过程,UE可以确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
图4为本公开又一个实施例所提供的一种随机接入资源配置的确定方法的流程示意图,应用于UE,如图4所示,该随机接入资源配置的确定方法可以包括以下步骤:
步骤401、获取网络侧设备发送的第一随机接入资源配置和/或第二随机接入资源配置。
其中,关于第一随机接入资源配置和第二随机接入资源配置的详细介绍可以参考上述实施例中的相关介绍,本公开实施例在此不做赘述。
步骤402、响应于UE触发基于竞争的随机接入过程,确定随机接入资源配置的第二使用规则。
其中,在本公开的一个实施例之中,第二使用规则可以包括以下至少一种:
规则6、响应于基于竞争的随机接入过程由除特定功能之外的功能触发,基于第一随机接入资源配置的所有随机接入资源配置确定随机接入资源配置;
规则7、响应于基于竞争的随机接入过程由除特定功能之外的功能触发,基于第一随机接入资源配置的所有随机接入资源配置,和/或,第二随机接入资源配置中对应于第一特定功能的随机接入资源配置确定随机接入资源配置;
规则8、响应于基于竞争的随机接入过程由特定功能触发,基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置确定随机接入资源配置,其中,该第二特定功能为触发基于竞争的随机接入过程的特定功能;在本公开的一个实施例之中,该第二特定功能可以为RedCap功能、SDT功能、CovEnh功能、Slicing功能中的一种或多种功能的组合;
规则9、响应于基于竞争的随机接入过程由特定功能触发,基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置,和/或,第一随机接入资源配置中的至少部分随机接入资源配置确定随机接入资源配置,其中,该第二特定功能为触发基于竞争的随机接入过程的特定功能;在本公开的一 个实施例之中,该第二特定功能可以为RedCap功能、SDT功能、CovEnh功能、Slicing功能中的一种或多种功能的组合。
步骤403、基于第二使用规则从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
其中,参考上述步骤402可知,第二使用规则中包括多个不同的规则,由此,在本公开的一个实施例之中,当步骤402中所确定的第二使用规则不同时,本步骤403中基于第二使用规则确定随机接入资源配置的方法也会有所不同。
具体而言,在本公开的一个实施例之中,当上述步骤403中所确定的第二使用规则为上述规则6时,则基于规则6从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从基于第一随机接入资源配置的所有随机接入资源配置确定随机接入资源配置。
示例的,在本公开的一个实施例之中,假设网络侧设备配置了Rel-15 RACH-ConfigCommon,同时也配置了Rel-17 featureCombinationRACH-ConfigCommon。则响应于基于竞争的随机接入过程由除特定功能之外的功能触发的,UE可以将Rel-15 RACH-ConfigCommon确定为随机接入资源配置。
在本公开的另一个实施例之中,当上述步骤403中所确定的第二使用规则为上述规则7时,则基于规则7从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从基于第一随机接入资源配置的所有随机接入资源配置,和/或,第二随机接入资源配置中对应于第一特定功能的随机接入资源配置确定随机接入资源配置。
示例的,在本公开的一个实施例之中,假设第一特定功能为UE支持的特定功能,且该UE支持特定功能中的RedCap功能和SDT功能,则该UE可以支持RedCap功能和SDT功能的任意组合,则响应于基于竞争的随机接入过程由除特定功能之外的功能触发,可以从基于第一随机接入资源配置的所有随机接入资源配置,和/或,第二随机接入资源配置中对应于RedCap功能和SDT功能的随机接入资源配置确定随机接入资源配置。
在本公开的又一个实施例之中,当上述步骤403中所确定的第二使用规则为上述规则8时,则基于规则8从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置确定随机接入资源配置。
示例的,在本公开的一个实施例之中,假设网络侧设备配置了Rel-15 RACH-ConfigCommon,同时也配置了对应于第二特定功能Rel-17 featureCombinationRACH-ConfigCommon。当UE由第二特定功能触发基于竞争的随机接入过程(例如,触发slice-1的SDT过程的基于竞争的随机接入过程)时,则UE将Rel-17 featureCombinationRACH-ConfigCommon确定为随机接入资源配置。
在本公开的又一个实施例之中,当上述步骤403中所确定的第二使用规则为上述规则9时,则基于规则9从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置,和/或,第一随机接入资源配置中的至少部分随机接入资源配置确定随机接入资源配置。
示例的,在本公开的一个实施例之中,假设网络侧设备配置了Rel-15 RACH-ConfigCommon,同时配置了对应于第二特定功能的Rel-17 featureCombinationRACH-ConfigCommon,以及在Rel-17 featureCombinationRACH-ConfigCommon中没有RO配置但是有用于波束选择的RSRP配置。则当UE由第二特定功能触发基于竞争的随机接入过程(例如,UE由触发slice-1的SDT过程的基于竞争的随机接入过程,即,第二特定功能为slice功能和SDT功能的组合)时,UE将对应于第二特定功能的Rel-17 featureCombinationRACH-ConfigCommon中的用于波束选择的RSRP配置,以及Rel-15 RACH-ConfigCommon中的RO配置(即第一随机接入资源配置中的部分随机接入资源配置)确定为随机接入资源配置。
示例的,在本公开的另一个实施例之中,假设网络侧设备配置了Rel-15 RACH-ConfigCommon,同时也配置了对应于第二特定功能的Rel-17 featureCombinationRACH-ConfigCommon,但是Rel-17featureCombinationRACH-ConfigCommon中没有RO配置,也没有用于波束选择的RSRP配置。则当UE由第一特定功能触发基于竞争的随机接入过程(例如,触发slice-1的SDT过程的基于竞争的随机 接入过程,即,第二特定功能为slice功能和SDT功能的组合)时,UE将Rel-15 RACH-ConfigCommon中的用于波束选择的RSRP配置,以及Rel-15 RACH-ConfigCommon中的RO配置(即第一随机接入资源配置中的全部随机接入资源配置)确定为随机接入资源配置。
示例的,在本公开的另一个实施例之中,假设网络侧设备配置了Rel-15 RACH-ConfigCommon,同时也配置了对应于第二特定功能的Rel-17 featureCombinationRACH-ConfigCommon,以及Rel-17 featureCombinationRACH-ConfigCommon的配置中有RO配置,但是没有用于波束选择的RSRP配置。则当UE由第二特定功能触发基于竞争的随机接入过程(例如,触发slice-1的SDT过程的基于竞争的随机接入过程,即,第二特定功能为slice功能和SDT功能的组合)时,则UE可以将Rel-15 RACH-ConfigCommon中的用于波束选择的RSRP配置,以及将Rel-15 RACH-ConfigCommon中的RO配置(即第一随机接入资源配置中的全部随机接入资源配置),和Rel-17 featureCombinationRACH-ConfigCommon中的RO配置确定为随机接入资源配置。
关于第一特定功能的介绍可以参考上述实施例中的相关介绍。
综上所述,在本公开实施例提供的随机接入资源配置的确定方法之中,响应于UE触发随机接入过程,UE可以确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
图5为本公开又一个实施例所提供的一种随机接入资源配置的确定方法的流程示意图,应用于网络侧设备,如图5所示,该随机接入资源配置的确定方法可以包括以下步骤:
步骤501、响应于UE触发随机接入过程,确定随机接入资源配置的使用规则。
其中,在本公开的一个实施例之中,该使用规则具体可以用于确定随机接入过程中所使用的随机接入资源配置。以及,在本公开的一个实施例之中,当UE触发随机接入过程不同时,所确定的使用规则也不相同。
具体而言,在本公开的一个实施例之中,当UE触发基于非竞争的随机接入过程时,确定第一使用规则,该第一使用规则是用于确定基于非竞争的随机接入过程中的随机接入资源配置。
在本公开的另一个实施例之中,当UE触发基于非竞争的随机接入过程时,确定第二使用规则,该第二使用规则是用于确定基于竞争的随机接入过程中的随机接入资源配置。
进一步地,在本公开的一个实施例之中,网络侧设备确定随机接入资源配置的使用规则的方法可以包括:基于协议约定确定随机接入资源配置的使用规则,和/或,网络侧设备自主确定随机接入资源配置的使用规则。
需要说明的是,在本公开的一个实施例之中,网络侧设备可以根据当前所存在的全部使用规则,以及UE使用的随机接入资源,判断出UE触发的随机接入过程的类型,进而确定出与该随机接入过程的类型对应的使用规则。其中,随机接入过程的类型可以包括:基于竞争的4步随机接入、基于竞争的2步随机接入、基于非竞争的4步随机接入、基于非竞争的2步随机接入、***信息请求随机接入。
步骤502、基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
其中,在公开的一个实施例之中,UE触发的随机接入过程可以基于非竞争的随机接入过程,此时,可以使用第一使用规则确定随机接入资源配置。以及,在本公开的另一个实施例之中,UE触发的随机接入过程可以基于竞争的随机接入过程,此时,可以使用第二使用规则确定随机接入资源配置。
其中,关于第一使用规则和第二使用规则的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的随机接入资源配置的确定方法之中,网络侧设备可以响应于UE触发随机接入过程,并确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE 基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
图6为本公开又一个实施例所提供的一种随机接入资源配置的确定方法的流程示意图,应用于网络侧设备,如图6所示,该随机接入资源配置的确定方法可以包括以下步骤:
步骤601、向UE发送第一随机接入资源配置和/或第二随机接入资源配置。
其中,在本公开的一个实施例之中,第一随机接入资源配置和第二随机接入资源配置分别包括至少一个随机接入资源配置。
以及,在本公开的一个实施例之中,第二随机接入资源配置中的每一随机接入资源配置对应一特定功能。
其中,关于第一随机接入资源配置和第二随机接入资源配置的详细介绍可以参考上述实施例中的相关介绍,本公开实施例在此不做赘述。
步骤602、响应于UE触发随机接入过程,确定随机接入资源配置的使用规则。
步骤603、基于所确定的使用规则从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
其中,关于步骤602~603的详细介绍可以参考上述实施例中的相关介绍,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的随机接入资源配置的确定方法之中,网络侧设备可以响应于UE触发随机接入过程,并确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
图7为本公开又一个实施例所提供的一种随机接入资源配置的确定方法的流程示意图,应用于网络侧设备,如图7所示,该随机接入资源配置的确定方法可以包括以下步骤:
步骤701、向UE发送第一随机接入资源配置和/或第二随机接入资源配置。
其中,关于第一随机接入资源配置和第二随机接入资源配置的详细介绍可以参考上述实施例中的相关介绍,本公开实施例在此不做赘述。
步骤702、响应于UE触发基于非竞争的随机接入过程,确定随机接入资源配置的第一使用规则。
其中,在本公开的一个实施例之中,第一使用规则可以包括以下至少一种:
规则1、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置确定随机接入资源配置;
规则2、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置中的至少一种确定随机接入资源配置;
规则3、基于第一随机接入资源配置中的所有随机接入资源配置,和/或第二随机接入资源配置中的所有随机接入资源配置确定随机接入资源配置;
规则4、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置;
规则5、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
步骤703、基于第一使用规则从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
其中,参考上述步骤702可知,第一使用规则中包括多个不同的规则,由此,在本公开的一个实施例之中,当步骤702中所确定的第一使用规则不同时,本步骤703中基于第一使用规则确定随机接入资源配置的方法也会有所不同。
具体而言,在本公开的一个实施例之中,当上述步骤703中所确定的第一使用规则为上述规则1时,则基于规则1从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的基于非竞争的随机接入资源配置确定随机接入资源配置。
在本公开的另一个实施例之中,当上述步骤703中所确定的第一使用规则为上述规则2时,则基于规则2从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的基于非竞争的随机接入资源配置、和/或、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置中确定随机接入资源配置。
在本公开的又一个实施例之中,当上述步骤703中所确定的第一使用规则为上述规则3时,则基于规则3从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的所有随机接入资源配置、和/或、第二随机接入资源配置中的所有随机接入资源配置中确定随机接入资源配置。
在本公开的又一个实施例之中,当上述步骤703中所确定的第一使用规则为上述规则4时,则基于规则4从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
其中,在本公开的一个实施例之中,第一特定功能可以包括以下至少一种:
UE支持的特定功能;
网络侧设备指定的特定功能;
协议约定的特定功能。
在本公开的又一个实施例之中,当上述步骤703中所确定的第一使用规则为上述规则5时,则基于规则5从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从第一随机接入资源配置中的基于非竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
关于第一特定功能的介绍可以参考上述规则4中的相关介绍。
综上所述,在本公开实施例提供的随机接入资源配置的确定方法之中,网络侧设备可以响应于UE触发随机接入过程,并确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
图8为本公开又一个实施例所提供的一种随机接入资源配置的确定方法的流程示意图,应用于网络侧设备,如图8所示,该随机接入资源配置的确定方法可以包括以下步骤:
步骤801、向UE发送第一随机接入资源配置和/或第二随机接入资源配置。
其中,关于第一随机接入资源配置和第二随机接入资源配置的详细介绍可以参考上述实施例中的相关介绍,本公开实施例在此不做赘述。
步骤802、响应于UE触发基于非竞争的随机接入过程,确定随机接入资源配置的第二使用规则。
其中,在本公开的一个实施例之中,第二使用规则可以包括以下至少一种:
规则6、响应于基于竞争的随机接入过程由除特定功能之外的功能触发,基于第一随机接入资源配置的所有随机接入资源配置确定随机接入资源配置;
规则7、响应于基于竞争的随机接入过程由除特定功能之外的功能触发,基于第一随机接入资源配置的所有随机接入资源配置,和/或,第二随机接入资源配置中对应于第一特定功能的随机接入资源配置确定随机接入资源配置;
规则8、响应于基于竞争的随机接入过程由特定功能触发,基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置确定随机接入资源配置,其中,该第二特定功能为触发基于竞争的随机接入过程的特定功能;在本公开的一个实施例之中,该第二特定功能可以为RedCap功能、SDT功能、CovEnh功能、Slicing功能中的一种或多种功能的组合;
规则9、响应于基于竞争的随机接入过程由特定功能触发,基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置,和/或,第一随机接入资源配置中的至少部分随机接入资源配置确定 随机接入资源配置,其中,该第二特定功能为触发基于竞争的随机接入过程的特定功能;在本公开的一个实施例之中,该第二特定功能可以为RedCap功能、SDT功能、CovEnh功能、Slicing功能中的一种或多种功能的组合。
步骤803、基于第二使用规则从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
其中,参考上述步骤802可知,第二使用规则中包括多个不同的规则,由此,在本公开的一个实施例之中,当步骤802中所确定的第二使用规则不同时,本步骤803中基于第二使用规则确定随机接入资源配置的方法也会有所不同。
具体而言,在本公开的一个实施例之中,当上述步骤803中所确定的第二使用规则为上述规则6时,则基于规则6从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从基于第一随机接入资源配置的所有随机接入资源配置确定随机接入资源配置。
在本公开的另一个实施例之中,当上述步骤803中所确定的第二使用规则为上述规则7时,则基于规则7从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从基于第一随机接入资源配置的所有随机接入资源配置,和/或,第二随机接入资源配置中对应于第一特定功能的随机接入资源配置确定随机接入资源配置。
在本公开的又一个实施例之中,当上述步骤403中所确定的第二使用规则为上述规则8时,则基于规则8从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置确定随机接入资源配置。
在本公开的又一个实施例之中,当上述步骤403中所确定的第二使用规则为上述规则9时,则基于规则9从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置的方法可以为:从基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置,和/或,第一随机接入资源配置中的至少部分随机接入资源配置确定随机接入资源配置。
关于第二特定功能的介绍可以参考上述实施例中的相关介绍。
综上所述,在本公开实施例提供的随机接入资源配置的确定方法之中,网络侧设备可以响应于UE触发随机接入过程,并确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
图9本公开一个实施例所提供的一种随机接入资源配置的确定装置的结构示意图,如图9所示,装置900可以包括:
确定模块901,用于响应于所述UE触发随机接入过程,确定随机接入资源配置的使用规则;
随机接入模块902,用于基于所确定使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
综上所述,在本公开实施例提供的随机接入资源配置的确定装置之中,响应于UE触发随机接入过程,UE可以确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
在本公开一个实施例之中,上述装置还用于:
获取网络侧设备发送的第一随机接入资源配置和/或第二随机接入资源配置;第一随机接入资源配置和第二随机接入资源配置分别包括至少一个随机接入资源配置;第二随机接入资源配置中的每一随机接入资源配置对应一特定功能。
进一步地,在本公开另一个实施例之中,特定功能包括以下至少一种:
RedCap功能;
SDT功能;
CovEnh功能;
Slicing功能。
进一步地,在本公开另一个实施例之中,第一随机接入资源配置包括以下至少一种:
基于竞争的随机接入资源配置;
基于非竞争的随机接入资源配置;
***信息请求随机接入资源配置。
进一步地,在本公开另一个实施例之中,第二随机接入资源配置包括基于竞争的随机接入资源配置。
进一步地,在本公开另一个实施例之中,上述确定模块901还用于:
响应于UE触发基于非竞争的随机接入过程,确定随机接入资源配置的第一使用规则;
进一步地,在本公开另一个实施例之中,上述随机接入模块902还用于:
基于第一使用规则从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置。
进一步地,在本公开另一个实施例之中,第一使用规则包括以下至少一种:
规则1、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置确定随机接入资源配置;
规则2、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置中的至少一种确定随机接入资源配置;
规则3、基于第一随机接入资源配置中的所有随机接入资源配置,和/或第二随机接入资源配置中的所有随机接入资源配置确定随机接入资源配置;
规则4、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置;
规则5、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
进一步地,在本公开另一个实施例之中,第一特定功能包括以下至少一种:
UE支持的特定功能;
网络侧设备指定的特定功能;
协议约定的特定功能。
进一步地,在本公开另一个实施例之中,上述确定模块901还用于:
响应于UE触发基于竞争的随机接入过程,确定随机接入资源配置的第一使用规则;
进一步地,在本公开另一个实施例之中,上述随机接入模块902还用于:
基于第二使用规则从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置。
进一步地,在本公开另一个实施例之中,第二使用规则包括以下至少一种:
规则6、响应于基于竞争的随机接入过程由除所述特定功能之外的功能触发,基于第一随机接入资源配置的所有随机接入资源配置确定随机接入资源配置;
规则7、响应于基于竞争的随机接入过程由除特定功能之外的功能触发,基于第一随机接入资源配置的所有随机接入资源配置,和/或,第二随机接入资源配置中对应于第一特定功能的随机接入资源配置确定随机接入资源配置;
规则8、响应于基于竞争的随机接入过程由特定功能触发,基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置确定随机接入资源配置,所述第二特定功能为触发基于竞争的随机接入过程的特定功能;
规则9、响应于基于竞争的随机接入过程由特定功能触发,基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置,和/或,第一随机接入资源配置中的至少部分随机接入资源配置确定随机接入资源配置,所述第二特定功能为触发基于竞争的随机接入过程的特定功能。
进一步地,在本公开另一个实施例之中,第一特定功能包括以下至少一种:
UE支持的特定功能;
网络侧设备指定的特定功能;
协议约定的特定功能。
进一步地,在本公开另一个实施例之中,基于竞争的随机接入资源配置包括以下至少一种:
基于竞争的2步随机接入资源配置;
基于竞争的4步随机接入资源配置。
进一步地,在本公开另一个实施例之中,基于非竞争的随机接入资源配置包括以下至少一种:
基于非竞争的2步随机接入资源配置;
基于非竞争的4步随机接入资源配置。
图10为本公开另一个实施例所提供的一种随机接入资源配置的确定装置的结构示意图,如图10所示,装置1000可以包括:
确定模块1001,用于响应于UE触发随机接入过程,确定随机接入资源配置的使用规则;
配置模块1002,用于基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
综上所述,在本公开实施例提供的随机接入资源配置的确定装置之中,网络侧设备可以响应于UE触发随机接入过程,并确定随机接入资源配置的使用规则,基于所确定的使用规则确定随机接入资源配置,并基于确定的随机接入资源配置进行随机接入。由此可知,在本公开实施例中,UE可以在触发不同的随机接入过程时,基于使用规则确定出特定的随机接入资源配置,以及可以让网络侧设备和UE基于使用规则保持随机接入资源配置一致,则提高了随机接入过程的稳定性。
在本公开一个实施例之中,上述装置还用于:
向UE发送第一随机接入资源配置和/或第二随机接入资源配置;第一随机接入资源配置和所述第二随机接入资源配置分别包括至少一个随机接入资源配置;第二随机接入资源配置中的每一随机接入资源配置对应一特定功能。
进一步地,在本公开另一个实施例之中,特定功能包括以下至少一种:
RedCap功能;
SDT功能;
CovEnh功能;
Slicing功能。
进一步地,在本公开另一个实施例之中,第一随机接入资源配置包括以下至少一种:
基于竞争的随机接入资源配置;
基于非竞争的随机接入资源配置;
***信息请求随机接入资源配置。
进一步地,在本公开另一个实施例之中,第二随机接入资源配置包括基于竞争的随机接入资源配置。
进一步地,在本公开另一个实施例之中,上述确定模块1001还用于:
响应于UE触发基于非竞争的随机接入过程,确定随机接入资源配置的第一使用规则。
进一步地,在本公开另一个实施例之中,上述配置模块1002还用于:
基于第一使用规则从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置。
进一步地,在本公开另一个实施例之中,第一使用规则包括以下至少一种:
规则1、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置确定随机接入资源配置;
规则2、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置中的至少一种确定随机接入资源配置;
规则3、基于第一随机接入资源配置中的所有随机接入资源配置,和/或所述第二随机接入资源配置中的所有随机接入资源配置确定随机接入资源配置;
规则4、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置;
规则5、基于第一随机接入资源配置中的基于非竞争的随机接入资源配置、第二随机接入资源配置 中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
进一步地,在本公开另一个实施例之中,第一特定功能包括以下至少一种:
UE支持的特定功能;
网络侧设备指定的特定功能;
协议约定的特定功能。
进一步地,在本公开另一个实施例之中,上述确定模块1001还用于:
响应于UE触发基于竞争的随机接入过程,确定随机接入资源配置的第二使用规则。
进一步地,在本公开另一个实施例之中,上述配置模块1002还用于:
基于第二使用规则从第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置。
进一步地,在本公开另一个实施例之中,第二使用规则包括以下至少一种:
规则6、响应于基于竞争的随机接入过程由除所述特定功能之外的功能触发,基于第一随机接入资源配置的所有随机接入资源配置确定随机接入资源配置;
规则7、响应于基于竞争的随机接入过程由除所述特定功能之外的功能触发,基于第一随机接入资源配置的所有随机接入资源配置,和/或,第二随机接入资源配置中对应于第一特定功能的随机接入资源配置确定随机接入资源配置;
规则8、响应于基于竞争的随机接入过程由特定功能触发,基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置确定随机接入资源配置,所述第二特定功能为触发基于竞争的随机接入过程的特定功能;
规则9、响应于基于竞争的随机接入过程由特定功能触发,基于第二随机接入资源配置中对应于第二特定功能的随机接入资源配置,和/或,第一随机接入资源配置中的至少部分随机接入资源配置确定随机接入资源配置,所述第二特定功能为触发基于竞争的随机接入过程的特定功能。
进一步地,在本公开另一个实施例之中,第一特定功能包括以下至少一种:
UE支持的特定功能;
网络侧设备指定的特定功能;
协议约定的特定功能。
进一步地,在本公开另一个实施例之中,基于竞争的随机接入资源配置包括以下至少一种:
基于竞争的2步随机接入资源配置;
基于竞争的4步随机接入资源配置。
进一步地,在本公开另一个实施例之中,基于非竞争的随机接入资源配置包括以下至少一种:
基于非竞争的2步随机接入资源配置;
基于非竞争的4步随机接入资源配置。
图11是本公开一个实施例所提供的一种用户设备UE1100的框图。例如,UE1100可以是移动电话,计算机,数字广播终端设备,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图11,UE1100可以包括以下至少一个组件:处理组件1102,存储器1104,电源组件1106,多媒体组件1108,音频组件1110,输入/输出(I/O)的接口1112,传感器组件1113,以及通信组件1116。
处理组件1102通常控制UE1100的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1102可以包括至少一个处理器1120来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1102可以包括至少一个模块,便于处理组件1102和其他组件之间的交互。例如,处理组件1102可以包括多媒体模块,以方便多媒体组件1108和处理组件1102之间的交互。
存储器1104被配置为存储各种类型的数据以支持在UE1100的操作。这些数据的示例包括用于在UE1100上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1104可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存 储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1106为UE1100的各种组件提供电力。电源组件1106可以包括电源管理***,至少一个电源,及其他与为UE1100生成、管理和分配电力相关联的组件。
多媒体组件1108包括在所述UE1100和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括至少一个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的唤醒时间和压力。在一些实施例中,多媒体组件1108包括一个前置摄像头和/或后置摄像头。当UE1100处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜***或具有焦距和光学变焦能力。
音频组件1110被配置为输出和/或输入音频信号。例如,音频组件1110包括一个麦克风(MIC),当UE1100处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1104或经由通信组件1116发送。在一些实施例中,音频组件1110还包括一个扬声器,用于输出音频信号。
I/O接口1112为处理组件1102和***接口模块之间提供接口,上述***接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1113包括至少一个传感器,用于为UE1100提供各个方面的状态评估。例如,传感器组件1113可以检测到设备1100的打开/关闭状态,组件的相对定位,例如所述组件为UE1100的显示器和小键盘,传感器组件1113还可以检测UE1100或UE1100一个组件的位置改变,用户与UE1100接触的存在或不存在,UE1100方位或加速/减速和UE1100的温度变化。传感器组件1113可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1113还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1113还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1116被配置为便于UE1100和其他设备之间有线或无线方式的通信。UE1100可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件1116经由广播信道接收来自外部广播管理***的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1116还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,UE1100可以被至少一个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
图12是本申请实施例所提供的一种网络侧设备1200的框图。例如,网络侧设备1200可以被提供为一网络侧设备。参照图12,网络侧设备1200包括处理组件1211,其进一步包括至少一个处理器,以及由存储器1232所代表的存储器资源,用于存储可由处理组件1222的执行的指令,例如应用程序。存储器1232中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件1215被配置为执行指令,以执行上述方法前述应用在所述网络侧设备的任意方法,例如,如图1所示方法。
网络侧设备1200还可以包括一个电源组件1226被配置为执行网络侧设备1200的电源管理,一个有线或无线网络接口1250被配置为将网络侧设备1200连接到网络,和一个输入输出(I/O)接口1258。网络侧设备1200可以操作基于存储在存储器1232的操作***,例如Windows Server TM,Mac OS XTM,Unix TM,Linux TM,Free BSDTM或类似。
上述本公开提供的实施例中,分别从网络侧设备、UE、RIS阵列的角度对本公开实施例提供的方法进行了介绍。为了实现上述本公开实施例提供的方法中的各功能,网络侧设备和UE可以包括硬件结构、软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能可以以硬件结构、软件模块、或者硬件结构加软件模块的方式来执行。
上述本公开提供的实施例中,分别从网络侧设备、UE、RIS阵列的角度对本公开实施例提供的方法进行了介绍。为了实现上述本公开实施例提供的方法中的各功能,网络侧设备和UE可以包括硬件结构、软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能可以以硬件结构、软件模块、或者硬件结构加软件模块的方式来执行。
本公开实施例提供的一种通信装置。通信装置可包括收发模块和处理模块。收发模块可包括发送模块和/或接收模块,发送模块用于实现发送功能,接收模块用于实现接收功能,收发模块可以实现发送功能和/或接收功能。
通信装置可以是终端设备(如上述方法实施例中的终端设备),也可以是终端设备中的装置,还可以是能够与终端设备匹配使用的装置。或者,通信装置可以是网络设备,也可以是网络设备中的装置,还可以是能够与网络设备匹配使用的装置。
本公开实施例提供的另一种通信装置。通信装置可以是网络设备,也可以是终端设备(如上述方法实施例中的终端设备),也可以是支持网络设备实现上述方法的芯片、芯片***、或处理器等,还可以是支持终端设备实现上述方法的芯片、芯片***、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
通信装置可以包括一个或多个处理器。处理器可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,网络侧设备、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行计算机程序,处理计算机程序的数据。
可选的,通信装置中还可以包括一个或多个存储器,其上可以存有计算机程序,处理器执行所述计算机程序,以使得通信装置执行上述方法实施例中描述的方法。可选的,所述存储器中还可以存储有数据。通信装置和存储器可以单独设置,也可以集成在一起。
可选的,通信装置还可以包括收发器、天线。收发器可以称为收发单元、收发机、或收发电路等,用于实现收发功能。收发器可以包括接收器和发送器,接收器可以称为接收机或接收电路等,用于实现接收功能;发送器可以称为发送机或发送电路等,用于实现发送功能。
可选的,通信装置中还可以包括一个或多个接口电路。接口电路用于接收代码指令并传输至处理器。处理器运行所述代码指令以使通信装置执行上述方法实施例中描述的方法。
通信装置为终端设备(如上述方法实施例中的终端设备):处理器用于执行图8所示的方法。
通信装置为网络设备:收发器用于执行图6-图7任一所示的方法。
通信装置为RIS阵列:收发器用于执行图1-图5任一所示的方法。
在一种实现方式中,处理器中可以包括用于实现接收和发送功能的收发器。例如该收发器可以是收发电路,或者是接口,或者是接口电路。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在一种实现方式中,处理器可以存有计算机程序,计算机程序在处理器上运行,可使得通信装置执行上述方法实施例中描述的方法。计算机程序可能固化在处理器中,该种情况下,处理器可能由硬件实现。
在一种实现方式中,通信装置可以包括电路,所述电路可以实现上述方法实施例中发送或接收或者通信的功能。本公开中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(Gas)等。
以上实施例描述中的通信装置可以是网络设备或者终端设备(如上述方法实施例中的终端设备), 但本公开中描述的通信装置的范围并不限于此,而且通信装置的结构可以不受的限制。通信装置可以是独立的设备或者可以是较大设备的一部分。例如所述通信装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片***或子***;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据,计算机程序的存储部件;
(3)ASIC,例如调制解调器(Modem);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;
(6)其他等等。
对于通信装置可以是芯片或芯片***的情况,芯片包括处理器和接口。其中,处理器的数量可以是一个或多个,接口的数量可以是多个。
可选的,芯片还包括存储器,存储器用于存储必要的计算机程序和数据。
本领域技术人员还可以了解到本公开实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个***的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本公开实施例保护的范围。
本公开实施例还提供一种确定侧链路时长的***,该***包括上述实施例中作为终端设备(如上述方法实施例中的第一终端设备)的通信装置和作为网络设备的通信装置,或者,该***包括上述实施例中作为终端设备(如上述方法实施例中的第一终端设备)的通信装置和作为网络设备的通信装置。
本公开还提供一种可读存储介质,其上存储有指令,该指令被计算机执行时实现上述任一方法实施例的功能。
本公开还提供一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地产生按照本公开实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解:本公开中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本公开实施例的范围,也表示先后顺序。
本公开中的至少一个还可以描述为一个或多个,多个可以是两个、三个、四个或者更多个,本公开不做限制。在本公开实施例中,对于一种技术特征,通过“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”等区分该种技术特征中的技术特征,该“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”描述的技术特征间无先后顺序或者大小顺序。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (34)

  1. 一种随机接入资源配置的确定方法,其特征在于,应用于用户设备UE,包括:
    响应于所述UE触发随机接入过程,确定随机接入资源配置的使用规则;
    基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
  2. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    获取网络侧设备发送的第一随机接入资源配置和/或第二随机接入资源配置;所述第一随机接入资源配置和所述第二随机接入资源配置分别包括至少一个随机接入资源配置;所述第二随机接入资源配置中的每一随机接入资源配置对应一特定功能。
  3. 如权利要求2所述的方法,其特征在于,所述特定功能包括以下至少一种:
    降低能力RedCap功能;
    小数据传输SDT功能;
    覆盖增强CovEnh功能;
    切片Slicing功能。
  4. 如权利要求2所述的方法,其特征在于,所述第一随机接入资源配置包括以下至少一种:
    基于竞争的随机接入资源配置;
    基于非竞争的随机接入资源配置;
    ***信息请求随机接入资源配置。
  5. 如权利要求2所述的方法,其特征在于,所述第二随机接入资源配置包括基于竞争的随机接入资源配置。
  6. 如权利要求4或5所述的方法,其特征在于,所述响应于所述UE触发随机接入过程,确定随机接入资源配置的使用规则,包括:
    响应于所述UE触发基于非竞争的随机接入过程,确定随机接入资源配置的第一使用规则;
    所述基于所确定的使用规则确定随机接入资源配置,包括:
    基于所述第一使用规则从所述第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置。
  7. 如权利要求6所述的方法,其特征在于,所述第一使用规则包括以下至少一种:
    规则1、基于所述第一随机接入资源配置中的基于非竞争的随机接入资源配置确定随机接入资源配置;
    规则2、基于所述第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置中的至少一种确定随机接入资源配置;
    规则3、基于所述第一随机接入资源配置中的所有随机接入资源配置,和/或所述第二随机接入资源配置中的所有随机接入资源配置确定随机接入资源配置;
    规则4、基于所述第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置;
    规则5、基于所述第一随机接入资源配置中的基于非竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
  8. 如权利要求7所述的方法,其特征在于,所述第一特定功能包括以下至少一种:
    所述UE支持的特定功能;
    所述网络侧设备指定的特定功能;
    协议约定的特定功能。
  9. 如权利要求4或5所述的方法,其特征在于,所述响应于所述UE触发随机接入过程,确定随机接入资源配置的使用规则,包括:
    响应于所述UE触发基于竞争的随机接入过程,确定随机接入资源配置的第二使用规则;
    所述基于所确定的使用规则确定随机接入资源配置,包括:
    基于所述第二使用规则从所述第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置。
  10. 如权利要求9所述的方法,其特征在于,所述第二使用规则包括以下至少一种:
    规则6、响应于所述基于竞争的随机接入过程由除所述特定功能之外的功能触发,基于所述第一随机接入资源配置的所有随机接入资源配置确定随机接入资源配置;
    规则7、响应于所述基于竞争的随机接入过程由除所述特定功能之外的功能触发,基于所述第一随机接入资源配置的所有随机接入资源配置,和/或,所述第二随机接入资源配置中对应于第一特定功能的随机接入资源配置确定随机接入资源配置;
    规则8、响应于所述基于竞争的随机接入过程由特定功能触发,基于所述第二随机接入资源配置中对应于第二特定功能的随机接入资源配置确定随机接入资源配置,所述第二特定功能为触发基于竞争的随机接入过程的特定功能;
    规则9、响应于所述基于竞争的随机接入过程由特定功能触发,基于所述第二随机接入资源配置中对应于第二特定功能的随机接入资源配置,和/或,所述第一随机接入资源配置中的至少部分随机接入资源配置确定随机接入资源配置,所述第二特定功能为触发基于竞争的随机接入过程的特定功能。
  11. 如权利要求10所述的方法,其特征在于,所述第一特定功能包括以下至少一种:
    所述UE支持的特定功能;
    所述网络侧设备指定的特定功能;
    协议约定的特定功能。
  12. 如权利要求4-11任一所述的方法,其特征在于,所述基于竞争的随机接入资源配置包括以下至少一种:
    基于竞争的2步随机接入资源配置;
    基于竞争的4步随机接入资源配置。
  13. 如权利要求4-11任一所述的方法,其特征在于,所述基于非竞争的随机接入资源配置包括以下至少一种:
    基于非竞争的2步随机接入资源配置;
    基于非竞争的4步随机接入资源配置。
  14. 一种随机接入资源配置的确定方法,其特征在于,应用于网络侧设备,包括:
    响应于UE触发随机接入过程,确定随机接入资源配置的使用规则;
    基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
  15. 如权利要求14所述的方法,其特征在于,所述方法还包括:
    向所述UE发送第一随机接入资源配置和/或第二随机接入资源配置;所述第一随机接入资源配置和所述第二随机接入资源配置分别包括至少一个随机接入资源配置;所述第二随机接入资源配置中的每一随机接入资源配置对应一特定功能。
  16. 如权利要求15所述的方法,其特征在于,所述特定功能包括以下至少一种:
    RedCap功能;
    SDT功能;
    CovEnh功能;
    Slicing功能。
  17. 如权利要求15所述的方法,其特征在于,所述第一随机接入资源配置包括以下至少一种:
    基于竞争的随机接入资源配置;
    基于非竞争的随机接入资源配置;
    ***信息请求随机接入资源配置。
  18. 如权利要求15所述的方法,其特征在于,所述第二随机接入资源配置包括基于竞争的随机接入资源配置。
  19. 如权利要求17或18所述的方法,其特征在于,所述响应于UE触发随机接入过程,确定随机 接入资源配置的使用规则,包括:
    响应于所述UE触发基于非竞争的随机接入过程,确定随机接入资源配置的第一使用规则;
    所述基于所确定的使用规则确定随机接入资源配置,包括:
    基于所述第一使用规则从所述第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置。
  20. 如权利要求19所述的方法,其特征在于,所述第一使用规则包括以下至少一种:
    规则1、基于所述第一随机接入资源配置中的基于非竞争的随机接入资源配置确定随机接入资源配置;
    规则2、基于所述第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置中的至少一种确定随机接入资源配置;
    规则3、基于所述第一随机接入资源配置中的所有随机接入资源配置,和/或所述第二随机接入资源配置中的所有随机接入资源配置确定随机接入资源配置;
    规则4、基于所述第一随机接入资源配置中的基于非竞争的随机接入资源配置、第一随机接入资源配置中的至少部分基于竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置;
    规则5、基于所述第一随机接入资源配置中的基于非竞争的随机接入资源配置、第二随机接入资源配置中对应于第一特定功能的随机接入资源配置中的至少一种确定随机接入资源配置。
  21. 如权利要求20所述的方法,其特征在于,所述第一特定功能包括以下至少一种:
    所述UE支持的特定功能;
    所述网络侧设备指定的特定功能;
    协议约定的特定功能。
  22. 如权利要求17或18所述的方法,其特征在于,所述响应于所述UE触发随机接入过程,确定随机接入资源配置的使用规则,包括:
    响应于所述UE触发基于竞争的随机接入过程,确定随机接入资源配置的第二使用规则;
    所述基于所确定的使用规则确定随机接入资源配置,包括:
    基于所述第二使用规则从所述第一随机接入资源配置和/或第二随机接入资源配置中确定随机接入资源配置。
  23. 如权利要求22所述的方法,其特征在于,所述第二使用规则包括以下至少一种:
    规则6、响应于所述基于竞争的随机接入过程由除所述特定功能之外的功能触发,基于所述第一随机接入资源配置的所有随机接入资源配置确定随机接入资源配置;
    规则7、响应于所述基于竞争的随机接入过程由除所述特定功能之外的功能触发,基于所述第一随机接入资源配置的所有随机接入资源配置,和/或,所述第二随机接入资源配置中对应于第一特定功能的随机接入资源配置确定随机接入资源配置;
    规则8、响应于所述基于竞争的随机接入过程由特定功能触发,基于所述第二随机接入资源配置中对应于第二特定功能的随机接入资源配置确定随机接入资源配置,所述第二特定功能为触发基于竞争的随机接入过程的特定功能;
    规则9、响应于所述基于竞争的随机接入过程由特定功能触发,基于所述第二随机接入资源配置中对应于第二特定功能的随机接入资源配置,和/或,所述第一随机接入资源配置中的至少部分随机接入资源配置确定随机接入资源配置,所述第二特定功能为触发基于竞争的随机接入过程的特定功能。
  24. 如权利要求23所述的方法,其特征在于,所述第一特定功能包括以下至少一种:
    所述UE支持的特定功能;
    所述网络侧设备指定的特定功能;
    协议约定的特定功能。
  25. 如权利要求17-24任一所述的方法,其特征在于,所述基于竞争的随机接入资源配置包括以下至少一种:
    基于竞争的2步随机接入资源配置;
    基于竞争的4步随机接入资源配置。
  26. 如权利要求17-24任一所述的方法,其特征在于,所述基于非竞争的随机接入资源配置包括以下至少一种:
    基于非竞争的2步随机接入资源配置;
    基于非竞争的4步随机接入资源配置。
  27. 一种随机接入资源配置的确定装置,其特征在于,包括:
    确定模块,用于响应于所述UE触发随机接入过程,确定随机接入资源配置的使用规则;
    随机接入模块,用于基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
  28. 一种随机接入资源配置的确定装置,其特征在于,包括:
    确定模块,用于响应于UE触发随机接入过程,确定随机接入资源配置的使用规则;
    配置模块,用于基于所确定的使用规则确定随机接入资源配置,基于确定的随机接入资源配置进行随机接入。
  29. 一种通信装置,其特征在于,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求1至13中任一项所述的方法。
  30. 一种通信装置,其特征在于,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求14至26中任一项所述的方法。
  31. 一种通信装置,其特征在于,包括:处理器和接口电路;
    所述接口电路,用于接收代码指令并传输至所述处理器;
    所述处理器,用于运行所述代码指令以执行如权利要求1至13中任一项所述的方法。
  32. 一种通信装置,其特征在于,包括:处理器和接口电路;
    所述接口电路,用于接收代码指令并传输至所述处理器;
    所述处理器,用于运行所述代码指令以执行如权利要求14至26任一所述的方法。
  33. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求1至13中任一项所述的方法被实现。
  34. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求14至26中任一项所述的方法被实现。
PCT/CN2021/137261 2021-12-10 2021-12-10 一种随机接入资源配置的确定方法及设备/存储介质/装置 WO2023102943A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202180004522.7A CN116711440A (zh) 2021-12-10 2021-12-10 一种随机接入资源配置的确定方法及设备/存储介质/装置
PCT/CN2021/137261 WO2023102943A1 (zh) 2021-12-10 2021-12-10 一种随机接入资源配置的确定方法及设备/存储介质/装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/137261 WO2023102943A1 (zh) 2021-12-10 2021-12-10 一种随机接入资源配置的确定方法及设备/存储介质/装置

Publications (1)

Publication Number Publication Date
WO2023102943A1 true WO2023102943A1 (zh) 2023-06-15

Family

ID=86729545

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/137261 WO2023102943A1 (zh) 2021-12-10 2021-12-10 一种随机接入资源配置的确定方法及设备/存储介质/装置

Country Status (2)

Country Link
CN (1) CN116711440A (zh)
WO (1) WO2023102943A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106413117A (zh) * 2015-07-29 2017-02-15 索尼公司 无线通信***、基站侧和用户设备侧的装置及方法
US20180124836A1 (en) * 2016-10-30 2018-05-03 Lg Electronics Inc. Method and user equipment for performing random access procedure
CN109699087A (zh) * 2017-10-20 2019-04-30 维沃移动通信有限公司 随机接入的方法、设备及终端
US20190357265A1 (en) * 2017-01-06 2019-11-21 China Academy Of Telecommunications Technology Random access method and terminal
CN111465112A (zh) * 2019-01-21 2020-07-28 中兴通讯股份有限公司 接入控制信令的发送、处理方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106413117A (zh) * 2015-07-29 2017-02-15 索尼公司 无线通信***、基站侧和用户设备侧的装置及方法
US20180124836A1 (en) * 2016-10-30 2018-05-03 Lg Electronics Inc. Method and user equipment for performing random access procedure
US20190357265A1 (en) * 2017-01-06 2019-11-21 China Academy Of Telecommunications Technology Random access method and terminal
CN109699087A (zh) * 2017-10-20 2019-04-30 维沃移动通信有限公司 随机接入的方法、设备及终端
CN111465112A (zh) * 2019-01-21 2020-07-28 中兴通讯股份有限公司 接入控制信令的发送、处理方法及装置

Also Published As

Publication number Publication date
CN116711440A (zh) 2023-09-05

Similar Documents

Publication Publication Date Title
WO2022257127A1 (zh) 时域窗口确定方法、装置、用户设备、基站及存储介质
CN115004764A (zh) PScell添加或改变的成功报告的记录方法、装置
WO2023000178A1 (zh) 一种信号接收方法、装置、用户设备、基站及存储介质
WO2023193278A1 (zh) 一种阈值确定方法/装置/设备及存储介质
WO2023133686A1 (zh) 一种测量放松方法、设备、存储介质及装置
WO2023102943A1 (zh) 一种随机接入资源配置的确定方法及设备/存储介质/装置
CN115004765A (zh) 成功PScell添加或更换报告的上报方法、装置
WO2023102944A1 (zh) 一种非竞争随机接入cfra中阈值确定方法及设备/存储介质/装置
WO2023122987A1 (zh) 一种重复传输方法及设备/存储介质/装置
WO2023108574A1 (zh) 一种定位方法及设备/存储介质/装置
WO2023108374A1 (zh) 一种测量方法/装置/用户设备/网络侧设备及存储介质
WO2023225827A1 (zh) 多prach传输配置方法、装置
WO2023065339A1 (zh) 一种按需定位参考信号prs请求方法、装置、用户设备、网络侧设备及存储介质
WO2023092602A1 (zh) 一种预编码方法、装置、用户设备、ris阵列、基站及存储介质
WO2023225829A1 (zh) 多prach传输配置方法、装置
WO2023065075A1 (zh) 一种上报方法、装置、用户设备、网络侧设备及存储介质
WO2023077472A1 (zh) 一种信息更新方法、装置、用户设备、基站及存储介质
WO2023133694A1 (zh) 一种测量放松方法、设备、存储介质及装置
WO2023150989A1 (zh) 一种定位方法及设备/存储介质/装置
WO2023122986A1 (zh) 一种重复传输的终止方法及设备/存储介质/装置
WO2023150990A1 (zh) 一种定位方法/装置/设备及存储介质
WO2023035116A1 (zh) 一种无线资源控制rrc状态切换方法、装置、用户设备、基站及存储介质
WO2023225828A1 (zh) 支持跨ssb的多prach传输配置方法、装置
WO2023130283A1 (zh) 一种映射方式确定方法/装置/设备及存储介质
WO2023004554A1 (zh) 一种业务控制方法、装置、用户设备、基站及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202180004522.7

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21966861

Country of ref document: EP

Kind code of ref document: A1

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112024011420

Country of ref document: BR