[go: up one dir, main page]

WO2020192441A1 - Procédé et dispositif d'accès aléatoire - Google Patents

Procédé et dispositif d'accès aléatoire Download PDF

Info

Publication number
WO2020192441A1
WO2020192441A1 PCT/CN2020/079012 CN2020079012W WO2020192441A1 WO 2020192441 A1 WO2020192441 A1 WO 2020192441A1 CN 2020079012 W CN2020079012 W CN 2020079012W WO 2020192441 A1 WO2020192441 A1 WO 2020192441A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
random access
contention resolution
terminal device
mac
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2020/079012
Other languages
English (en)
Chinese (zh)
Inventor
赵力
酉春华
郭英昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201910252477.1A external-priority patent/CN111757537B/zh
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2020192441A1 publication Critical patent/WO2020192441A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a random access method and device.
  • the terminal device can achieve uplink synchronization with the network device through a random access (RA) process.
  • the random access process includes a contention-based random access process and a non-contention random access process.
  • the contention-based random access process is completed in four steps: The first step is to send a random access request from the terminal device to the network device.
  • the random access request can also be called message 1 (Msg1), which contains the random access preamble. (preamble);
  • the second step is for the network device to send a random access response (RAR) message to the terminal device.
  • RAR random access response
  • This RAR message can also be called message 2 (Msg2); the third step is for the terminal device to receive the RAR After that, message transmission is performed based on RAR scheduling, which may also be called message 3 (Msg3); the fourth step is for the network device to send contention resolution information to the terminal device, and the message carrying this information is called message 4 (Msg4).
  • the RAR message may include a random access preamble identifier (RAP ID), and if the RAP ID matches (or is the same) as the preamble ID selected by the terminal device, it is considered that the RAR message is received successfully. After determining that the RAR is successfully received, the terminal device does not monitor subsequent RARs.
  • RAP ID random access preamble identifier
  • the competition-based 4-step random access process requires more interaction procedures, and the delay is large, and it cannot be well applied to scenarios with high delay requirements. Therefore, a contention-based 2-step random access process is introduced, but in the 2-step random access process, the size of the response message of different terminal devices may be different, which leads to when the terminal device determines that the currently detected response message is not the one described above. When the terminal device responds to the message, the next step of detection cannot be performed because the starting position of the next response message to be detected cannot be determined.
  • the embodiments of the present application provide a random access method and device, so that the terminal device can detect the response message.
  • a random access method including:
  • the terminal device sends a message for requesting random access to the network device. After that, the terminal device receives the response message of the message from the network device.
  • the response message may include a MAC layer data packet, and the MAC layer data packet includes a load and a MAC subheader.
  • the MAC subheader of the MAC layer data packet includes the first indication information.
  • the first indication information is used to determine the length of the load.
  • a random access method including:
  • the network device receives the message for requesting random access sent by the terminal device. After that, the network device sends a response message of the message to the terminal device.
  • the response message may include a MAC layer data packet, and the MAC layer data packet includes a load and a MAC subheader.
  • the MAC subheader of the MAC layer data packet includes the first indication information.
  • the first indication information is used to determine the length of the load.
  • a device including: a unit or means for executing each step of the first aspect above.
  • a device which includes: units or means for performing each step of the second aspect above.
  • a device including a processor and an interface circuit, where the processor is configured to communicate with other devices through the interface circuit and execute the method provided in the first aspect above.
  • the processor includes one or more.
  • a device including a processor and an interface circuit.
  • the processor is configured to communicate with other devices through the interface circuit and execute the method provided in the second aspect above.
  • the processor includes one or more.
  • a device including a processor, configured to be connected to a memory and used to call a program stored in the memory to execute the method provided in the above first aspect.
  • the memory can be located inside the device or outside the device.
  • the processor includes one or more.
  • a device including a processor, which is connected to a memory and used to call a program stored in the memory to execute the method provided in the second aspect above.
  • the memory can be located inside the device or outside the device.
  • the processor includes one or more.
  • a program which when executed by a processor is used to execute the method of the first aspect above, or is used to execute the method of the second aspect above.
  • a tenth aspect provides a program product, such as a computer-readable storage medium, including the program provided in the ninth aspect.
  • a terminal device which includes any device of the third aspect above, or includes any device of the fifth aspect above, or includes any device of the seventh aspect above.
  • a network device which includes any device in the fourth aspect above, or includes any device in the sixth aspect above, or includes any device in the eighth aspect above.
  • the terminal device sends a message to the network device, and the message is used for the terminal device to request random access from the network device.
  • the network device sends a response message of the message to the terminal device.
  • the response message may include a MAC layer data packet.
  • the MAC layer data packet includes the load of the MAC layer data packet and the MAC subheader of the MAC layer data packet.
  • the MAC subheader includes the first indication information.
  • the response message length is not fixed, for example, in a contention-based 2-step random access process, by setting the first indication information in the MAC subheader of the MAC layer data packet, the MAC layer data can be determined according to the first indication information The length of the payload of the packet.
  • the length of the MAC layer data packet can be determined.
  • the terminal device can determine the MAC PDU according to the first indication information carried in the MAC subheader of the MAC layer data packet included in each response message in the MAC PDU The starting position of each response message, thus, the correct detection of the response message is realized in a scenario where the length of the response message is not fixed.
  • the message sent by the terminal device to the network device includes a random access signal and information for contention resolution, and the random access signal is used to request random access.
  • the load includes contention resolution information, which is used to indicate contention resolution or to indicate success of random access, and contention resolution information is obtained based on the information used for contention resolution; or, the load does not include contention resolution information, which is used to indicate The contention resolution failure is either used to indicate random access failure or used to indicate random access fallback.
  • the contention resolution information includes part or all of the content of the contention resolution information.
  • the load further includes one or more of the following information: uplink grant information, timing advance command, TC-RNTI, and RRC message.
  • the first indication information is used to indicate the length of the load.
  • the length of the payload of the MAC layer data packet can be directly indicated through the first indication information. Therefore, the starting position of the MAC layer data packet can be determined through the first indication information. In scenarios where the response message length is not fixed Realize the detection of response messages in.
  • the first indication information is a preset bit length.
  • the first indication information includes N indication fields, and N is greater than or equal to 1; each indication field corresponds to a type of information, and the indication field is used to indicate Whether the load contains information corresponding to the indicated domain.
  • the payload of the MAC layer data packet includes information corresponding to each indicator field. After the information included in the load of the MAC layer data packet is determined, the length of the load of the MAC layer data packet can be determined. Therefore, the starting position of the MAC layer data packet can be determined according to the load length of the MAC layer data packet, and the detection of the response message is realized in a scenario where the length of the response message is not fixed.
  • the information corresponding to the N indication fields includes contention resolution information, and the contention resolution information has a preset length, and the indication field corresponding to the contention resolution information is 1 bit.
  • the information corresponding to the N indication fields includes contention resolution information, the indication field corresponding to the contention resolution information is 2 bits, and the indication field corresponding to the contention resolution information is also used to indicate the length of the contention resolution information.
  • the valid bit of the contention resolution information is a preset length or a part of the preset length.
  • the first indication information includes an information index value, and there is a corresponding relationship between the information index value and the length of the load; the information index value is used according to a preset information index The correspondence between the value and the length of the load determines the length of the load.
  • the terminal device After obtaining the information index value carried in the MAC subheader of the MAC layer data packet, the terminal device can determine the load length of the MAC layer data packet according to the correspondence between the information index value and the load length of the MAC layer data packet. After the length of the payload of the MAC layer data packet is determined, the terminal device can determine the starting position of the MAC layer data packet, and realize the detection of the response message in a scenario where the length of the response message is not fixed. In addition, the information index value further reduces the bit length occupied by the first indication information, further reduces bit waste, and improves resource utilization.
  • the MAC subheader further includes the second Indication information
  • the second indication information is used to indicate the content of the information included in the load.
  • the length of the payload of the MAC layer data packet can be determined through the first indication information.
  • the load of the MAC layer data packet includes more content.
  • the load of the MAC layer data packet includes at least two types of information with the same length, by setting the second indication information in the MAC subheader of the MAC layer data packet, you can Indicate the content of the information included in the load of the MAC layer data packet, which facilitates determining the specific content included in the load of the MAC layer data packet, and improves the efficiency of data processing.
  • the terminal device sends a message for requesting random access to the network device.
  • the message includes information for contention resolution. If the network device fails to successfully decode the information used for contention resolution, the network device may not send a response message to the terminal device.
  • the terminal device After the terminal device sends a message for requesting random access to the network device, if the network device fails to successfully decode the information for contention resolution, the network device may not send a response message. Therefore, the terminal device is controlled to re-execute the contention-based 2-step random access process or the contention-based 4-step random access process, which improves the flexibility of random access.
  • the MAC subheader further includes back-off indication information, which is used to indicate whether to perform random access back-off.
  • the fallback indication information can control whether the terminal device performs random access fallback.
  • the terminal device may fall back from the contention-based 2-step random access procedure to the contention-based 4-step random access procedure.
  • the terminal device can re-perform the contention-based 2-step random access process or the contention-based 4-step random access process, which improves the flexibility of random access Sex.
  • the first indication information is also used to instruct the terminal device to re-execute the 2-step competition-based Random access process, or the first indication information is also used to instruct the terminal device to perform a contention-based 4-step random access process, or the first indication information is also used to instruct the terminal device to perform random access fallback.
  • the network device can control the terminal device through the value of the first indication information Perform random access fallback, or re-perform the contention-based 2-step random access process, or perform the contention-based 4-step random access process, which improves the flexibility of random access.
  • FIG. 1 is an architecture diagram of a communication system to which an embodiment of this application is applicable;
  • FIG. 2 is an architecture diagram of another communication system to which the embodiments of this application are applicable;
  • FIG. 3 is an architecture diagram of another communication system to which the embodiments of this application are applicable.
  • Figure 4 is a message interaction diagram of an existing contention-based 4-step random access process
  • Figure 5 is a schematic diagram of the existing MAC PDU and MAC sub-PDU structure
  • FIG. 6 is a message interaction diagram of a random access method provided by an embodiment of this application.
  • FIG. 7 is a schematic diagram of a general structure of a MAC sub-PDU provided by an embodiment of the application.
  • 8A to 8C are schematic diagrams of the structure of MAC PDU and MAC sub-PDU provided by embodiments of this application;
  • FIG. 9 is a schematic structural diagram of an implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of the application.
  • FIG. 10 is a schematic structural diagram of another implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of the application;
  • FIG. 11 is a schematic structural diagram of yet another implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of the application;
  • FIG. 12 is a schematic structural diagram of yet another implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of the application;
  • FIG. 13 is a schematic structural diagram of another implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of the application;
  • FIG. 14 is a schematic structural diagram of a device provided by an embodiment of this application.
  • 15 is a schematic structural diagram of another device provided by an embodiment of the application.
  • FIG. 16 is a schematic structural diagram of a network device provided by an embodiment of this application.
  • FIG. 17 is a schematic structural diagram of a terminal device provided by an embodiment of the application.
  • the communication system may include a terminal device 100 and a network device 200.
  • the embodiment of the present application does not limit the number of terminal devices 100 and network devices 200.
  • the terminal device 100 located within the coverage area of the network device 200 may communicate with the network device 200 in a wireless manner.
  • the network device 200 serves as the sender, it can send downlink information to the terminal device 100.
  • the terminal device 100 as a receiver can receive the downlink information sent by the network device 200.
  • the terminal device 100 acts as a sender, it can send uplink information to the network device 200.
  • the network device 200 can receive the uplink information sent by the terminal device 100.
  • the terminal device 100 may be a fixed location, or it may be movable.
  • the communication system may also include other devices.
  • the communication system may also include core network equipment (not shown in FIG. 1).
  • the network device 200 may be connected to the core network device in a wireless or wired manner.
  • the core network device and the network device 200 can be separate and different physical devices, or the functions of the core network device and the network device 200 can be integrated on the same physical device, or the core network device can be integrated on the same physical device Part of the function and part of the function of the network device 200.
  • the communication system may also include a wireless relay device or a wireless backhaul device (not shown in FIG. 1).
  • the network equipment 200 is a device for transmitting and receiving signals on the network side, for example, a radio access network (RAN) node that connects terminal equipment to the wireless network.
  • RAN nodes are: new radio access technology (NR) (or 5G) systems in the new generation of base stations (generation Node B, gNB), transmission reception point (transmission reception point, TRP) , Evolved Node B (evolved Node B, eNB), radio network controller (RNC), Node B (Node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (BBU), relay station, or wireless fidelity (Wifi) access point (access point, AP) etc.
  • NR new radio access technology
  • gNB new radio access technology
  • TRP transmission reception point
  • RNC radio network controller
  • Node B Node B
  • a network device may include a centralized unit (CU) node, or a distributed unit (DU) node, or a RAN device including a CU node and a DU node.
  • the wireless coverage area of the network device 200 may include one or more cells.
  • the terminal device 100 within the coverage of the cell communicates with the network device 200 through the transmission resource (for example, frequency domain resource, spectrum resource, or time-frequency resource) of the cell.
  • the cell may be a macro cell or a small cell (small cell).
  • the small cell may include: a metro cell, a micro cell, a pico cell, or a femto cell, etc.
  • the embodiment of the present application does not limit the specific technology and specific device form adopted by the network device 200.
  • the terminal device 100 also known as user equipment (UE), mobile station (MS), or mobile terminal (MT), is a device that provides users with voice/data connectivity , For example, handheld devices with wireless connectivity, or in-vehicle devices.
  • terminal devices are: mobile phones (mobile phones), tablet computers, notebook computers, palmtop computers, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, augmented Augmented reality (AR) equipment, wireless terminals in industrial control (industrial control), wireless terminals in self-driving (self-driving), wireless terminals in remote medical surgery, and smart grid (smart grid)
  • the network architecture includes core network (CN) equipment and RAN equipment.
  • the RAN equipment includes a baseband device and a radio frequency device.
  • the baseband device can be implemented by one node or by multiple nodes.
  • the radio frequency device can be implemented remotely from the baseband device, or integrated into the baseband device, or partially remote Integrated in the baseband device.
  • the RAN equipment (eNB) includes a baseband device and a radio frequency device.
  • the radio frequency device can be arranged remotely from the baseband device, such as a remote radio unit (radio unit).
  • RRU is arranged farther away from the BBU.
  • the control plane protocol layer structure may include the radio resource control (RRC) layer, the packet data convergence protocol (PDCP) layer, the radio link control (RLC) layer, and the media interface. Access control (media access control, MAC) layer and physical layer and other protocol layer functions.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • RLC radio link control
  • MAC media access control
  • the user plane protocol layer structure can include the functions of the PDCP layer, the RLC layer, the MAC layer, and the physical layer; in one implementation, the PDCP layer can also include a service data adaptation protocol (SDAP) layer .
  • SDAP service data adaptation protocol
  • the functions of these protocol layers may be implemented by one node, or may be implemented by multiple nodes; for example, in an evolution structure, the RAN device may include CUs and DUs, and multiple DUs may be centrally controlled by one CU. As shown in Figure 2, CU and DU can be divided according to the protocol layers of the wireless network. For example, the functions of the PDCP layer and above protocol layers are set in the CU, and the protocol layers below the PDCP, such as the RLC layer and MAC layer, are set in the DU.
  • This type of protocol layer division is just an example, it can also be divided in other protocol layers, for example, in the RLC layer, the functions of the RLC layer and above protocol layers are set in the CU, and the functions of the protocol layers below the RLC layer are set in the DU; Or, in a certain protocol layer, for example, part of the functions of the RLC layer and the functions of the protocol layer above the RLC layer are set in the CU, and the remaining functions of the RLC layer and the functions of the protocol layer below the RLC layer are set in the DU. In addition, it can also be divided in other ways, for example, by time delay, and functions that need to meet the delay requirement for processing time are set in the DU, and functions that do not need to meet the delay requirement are set in the CU.
  • the radio frequency device can be remote, not placed in the DU, can also be integrated in the DU, or part of the remote part is integrated in the DU, and there is no restriction here.
  • control plane (CP) and the user plane (UP) of the CU can also be separated and divided into different entities for implementation. They are the control plane CU entity (CU-CP entity). ) And the user plane CU entity (CU-UP entity).
  • the signaling generated by the CU can be sent to the terminal device through the DU, or the signaling generated by the terminal device can be sent to the CU through the DU.
  • the DU can directly pass the protocol layer encapsulation without analyzing the signaling and transparently transmit it to the terminal device or CU. If the following embodiments involve the transmission of such signaling between the DU and the terminal device, at this time, the sending or receiving of the signaling by the DU includes this scenario.
  • the RRC or PDCP layer signaling will eventually be processed as the PHY layer signaling and sent to the terminal device, or converted from the received PHY layer signaling.
  • the RRC or PDCP layer signaling can also be considered to be sent by the DU, or sent by the DU and radio frequency.
  • the CU is divided into network equipment on the RAN side.
  • the CU can also be divided into network equipment on the CN side, which is not limited here.
  • the network device in each embodiment of the present application may be a CU node, or a DU node, or a RAN device including a CU node and a DU node.
  • the terminal equipment can realize the uplink synchronization with the network equipment through the random access process.
  • FIG. 4 is a message interaction diagram of an existing contention-based random access process. As shown in Figure 4, this process mainly includes 4 steps, so it can be called a 4-step random access process.
  • the terminal device sends a random access request to the network device.
  • the random access request may also be referred to as message 1 (Msg1), which includes a random access preamble.
  • the network device receives the preamble, knows that a terminal device requests access, and then executes the following step S402.
  • the network device sends a random access response (RAR) message to the terminal device.
  • RAR random access response
  • the RAR message may also be referred to as message 2 (Msg2).
  • RAR may include the following contents: 1) RAPID, RAPID is the preamble index (preamble index) obtained by the network device when detecting the preamble. 2) Timing advance command (timing advance command, or TA command). The TA command is used to specify the amount of time adjustment (also called timing advance) required for the terminal device to perform uplink synchronization. 3) Uplink grant information (UL grant), UL grant is used to specify the uplink resources allocated by the network device to the terminal device to send Msg3 (message 3). 4) Temporary cell radio network temporary identity (TC-RNTI), used for subsequent data transmission between terminal equipment and network equipment.
  • TC-RNTI Temporary cell radio network temporary identity
  • the terminal device calculates the random access radio network temporary identifier (RA-RNTI) by sending the time-frequency resource of the preamble, and monitors the RA-RNTI scrambled physical downlink control within the RAR time window Channel (physical downlink control channel, PDCCH) to receive the RAR corresponding to the RA-RNTI.
  • RA-RNTI random access radio network temporary identifier
  • PDCCH physical downlink control channel
  • the MAC PDU may include multiple MAC subPDUs (MAC subPDU).
  • the MAC sub-PDU structure includes the MAC sub-header and the load of the MAC sub-PDU.
  • the RAR of a terminal device may correspond to a MAC sub-PDU, for example, MAC sub-PDU 3.
  • the MAC subheader of the MAC subPDU may include RAPID, and the load of the MAC subPDU may include RAR.
  • RAR can include timing advance command, uplink authorization information and TC-RNTI.
  • the MAC subheader is a fixed size of 1 byte, and the RAR is a fixed size of 7 bytes.
  • the terminal device monitors the MAC PDU scheduled by the PDCCH scrambled by the RA-RNTI
  • the MAC PDU is decoded to determine whether the RAR of the terminal device is received.
  • the terminal device acquires the MAC sub-PDU to be detected in the MAC PDU in a preset order, and determines whether the RAPID carried in the MAC subheader of the MAC sub-PDU to be detected is the same as the preamble ID sent by the terminal device.
  • This embodiment does not limit the preset sequence. For example, it may be the order from the head to the tail of the MAC PDU.
  • the terminal device determines that the RAR is successfully received, and can process the load carried by the MAC subPDU to be detected RAR specifically includes timing advance command, uplink authorization information and TC-RNTI.
  • the terminal device acquires the next undetected MAC subPDU following the MAC subPDU to be detected in a preset order For the MAC sub-PDU that is not detected, the next undetected MAC sub-PDU is used as the new MAC sub-PDU to be detected, and the above operations are repeated. If the terminal device does not detect the RAR of the terminal device within the RAR time window, it is considered that the RAR reception fails.
  • the terminal device can initiate a contention-based 4-step random access procedure again after a period of time.
  • the terminal device determines that the RAPID carried in the MAC subheader of the currently detected MAC subPDU is different from the preamble ID sent by the terminal device. , The starting position of the next MAC sub-PDU to be detected can be known exactly, so that the MAC sub-header of the next MAC sub-PDU can be detected.
  • the terminal device uses the timing advance indicated by the network device to send Msg3 (message 3) to the network device on the uplink resources allocated by the network device according to the RAR.
  • Msg3 contains the identification of the terminal device.
  • the identification of the terminal device will be used for contention resolution in S404.
  • the identification of the terminal device may be related to the state of the terminal device in the communication system.
  • the identifier of the terminal device when the terminal device is in the RRC connected state (RRC_CONNECTED state), the identifier of the terminal device may be a Cell Radio Network Temporary Identifier (C-RNTI).
  • C-RNTI Cell Radio Network Temporary Identifier
  • the identifier of the terminal device When the terminal device is in a non-RRC connection state, the identifier of the terminal device may be the terminal device identifier from the core network.
  • the terminal device identifier from the core network may be a system architecture evolution temporary mobile station identifier (S-TMSI) or a random number.
  • S-TMSI system architecture evolution temporary mobile station identifier
  • Msg3 may also carry a radio resource control (radio resource control, RRC) message.
  • RRC radio resource control
  • the RRC message is related to the random access trigger mode, which can be seen in Table 1.
  • the network device sends Msg4 (message 4) to the terminal device.
  • Msg4 may include contention resolution information to indicate successful contention resolution.
  • the contention resolution information may be part of the content of Msg3, or the entire content of Msg3, or a PDCCH scrambled by a cell radio network temporary identifier (C-RNTI).
  • C-RNTI cell radio network temporary identifier
  • the terminal device waits to receive Msg4 within the contention resolution timer. If the contention resolution timer expires and the terminal device has not received the contention resolution information, it returns to S401 to perform a 4-step random access based on contention again.
  • the network device needs to reply to the RRC message after the terminal device contention is resolved successfully.
  • the returned RRC message is related to the random access trigger mode, which can be seen in Table 2.
  • the size of the response message of different terminal devices may be different. It is assumed that the MAC PDU structure shown in FIG. 5 is used, that is, one MAC PDU includes response messages corresponding to multiple terminal devices. In this scenario, when the terminal device determines that the currently detected response message in the MAC PDU is not the response message of the terminal device, due to the uncertainty of the size of the response message, the terminal device cannot determine that the currently detected response message is next The starting position of an undetected response message. Therefore, the next test cannot be performed.
  • the embodiments of the present application provide a random access method, which can be applied to a contention-based 2-step random access process.
  • the response message of the terminal device may include a MAC layer data packet, and the MAC layer data packet may include a MAC subheader and a payload.
  • the size of the load of the MAC layer data packet can be determined.
  • the terminal device can determine the size of each MAC layer data packet and the size of each MAC layer data packet according to the indication information in the MAC layer data packet included in each response message in the MAC PDU. The starting position of a response message.
  • the terminal device determines that the currently detected response message is not the response message of the terminal device, the terminal device can exactly know the starting position of the next undetected response message after the currently detected response message, thereby achieving random Detection of response messages during the access process.
  • FIG. 6 is a message interaction diagram of a random access method provided in an embodiment of this application.
  • the random access method may include:
  • the terminal device sends a message to the network device.
  • the network device can receive the message sent by the terminal device.
  • the message is used by the terminal device to request random access from the network device. It should be noted that this embodiment does not limit the name of the message.
  • the message may include but is not limited to the following information: random access signal and information for contention resolution.
  • the random access signal is used to request random access.
  • the network device can detect the random access signal and learn that the random access signal is used by the terminal device to request random access.
  • the implementation of random access signals may be different.
  • the random access signal may be a preamble (preamble), a demodulation reference signal (Demodulation Reference Signal, DMRS), or other detection signals used for random access. This embodiment does not limit the name and length of the random access signal.
  • the information used for contention resolution is sent by the terminal equipment to the network equipment for contention resolution.
  • the information used for contention resolution includes at least the identification of the terminal device.
  • identification of the terminal device please refer to the related description in S403, and the principle is similar, and will not be repeated here.
  • the random access signal may be sent on a physical random access channel (Physical Random Access Channel, PRACH) resource.
  • PRACH Physical Random Access Channel
  • the information used for contention resolution may be sent on physical uplink shared channel (PUSCH) resources.
  • PUSCH physical uplink shared channel
  • the network device sends a response message of the message to the terminal device.
  • the terminal device receives the response message of the message from the network device. It should be noted that this embodiment does not limit the name of the response message.
  • the response message may include a MAC layer data packet.
  • the MAC layer data packet may include a payload and a MAC subheader of the payload.
  • the MAC subheader includes first indication information. The first indication information is used to determine the length of the load. It should be noted that, for the convenience of distinction and description, the MAC subheader included in the MAC layer data packet may be referred to as the MAC subheader of the MAC layer data packet, and the load included in the MAC layer data packet may be referred to as the load of the MAC layer data packet.
  • the load length of the MAC layer data packet can be determined according to the first indication information. Furthermore, the length of the MAC layer data packet can be determined.
  • the terminal device can determine each of the MAC PDUs according to the first indication information carried in the MAC subheader of the MAC layer data packet included in each response message in the MAC PDU The starting position of the response message, thus, in a scenario where the length of the response message is not fixed, for example, a contention-based 2-step random access process, the correct detection of the response message is realized.
  • the MAC subheader of the MAC layer data packet may also include a random access signal identifier.
  • the random access signal identifier is obtained based on the random access signal.
  • the network device determines whether to obtain the random access signal sent by the terminal device according to the message sent by the terminal device. If the network device obtains the random access signal, the network device can obtain the random access signal identifier according to the random access signal.
  • the random access signal identifier may be carried in the MAC subheader of the MAC layer data packet included in the response message of the terminal device. It should be noted that this embodiment does not limit the name, implementation manner, and length of the random access signal identifier.
  • the random access signal is different, the random access signal identifier can be different. For example, when the random access signal is Preamble, the random access signal identifier may be RAPID. RAPID can be 6 bits in length.
  • the response message may include contention resolution information, the contention resolution information is used to indicate contention resolution or used to indicate success of random access, and the contention resolution information is obtained according to the information used for contention resolution; or, the response message It does not include contention resolution information and is used to indicate contention resolution failure or random access failure or random access fallback.
  • the network device determines whether to obtain the information for contention resolution sent by the terminal device according to the message sent by the terminal device. If the network device obtains the information used for contention resolution, the network device can obtain the contention resolution information according to the information used for contention resolution.
  • the response message may include contention resolution information. At this time, the terminal device determines the contention resolution or determines that the random access is successful according to the contention resolution information. If the network device does not obtain the information used for contention resolution, then the response message does not include contention resolution information. At this time, the terminal device determines that the contention resolution fails or the random access fails or can perform random access fallback.
  • the random access fallback refers to a fallback from a contention-based 2-step random access process to a contention-based 4-step random access process.
  • the contention resolution information may be a contention resolution message in a contention-based 4-step random access process.
  • the contention resolution information may be a 48-bit UE Contention Resolution Identity MAC CE (UE Contention Resolution Identity MAC CE).
  • a message response message also referred to as a terminal device response message or response message
  • MAC PDU also referred to as a terminal device response message or response message
  • MAC sub-PDU MAC sub-PDU
  • MAC layer data packet MAC layer data packet
  • a response message of a terminal device may include a first response to the random access signal and a second response to information used for contention resolution.
  • the first response may include a random access signal identifier and a payload
  • the second response may include contention resolution information.
  • the response message may include only the first response or only the second response, or Both the first response and the second response are included.
  • the first response and the second response may be located in the same MAC subPDU (MAC subPDU), or may be located in different MAC subPDUs.
  • the first response and the second response may be located in different MAC PDUs, and may be MAC sub-PDUs in different MAC PDUs.
  • the payload (Payload) in the first response may include part or all of the content in the RAR in the 4-step random access process based on competition. For example, it may include one or any combination of the following information: uplink grant information (UL grant), timing advance command (TA command), TC-RNTI, and RRC message.
  • the RRC message is related to the contention-based 2-step random access trigger mode, and the corresponding relationship can be seen in Table 2.
  • the MAC layer data packet may include one or more MAC sub-PDUs, and may include a first response, or a second response, or a first response and a second response.
  • FIG. 7 is a schematic diagram of a general structure of a MAC sub-PDU provided by an embodiment of the application
  • FIG. 8A to FIG. 8C are schematic diagrams of a MAC PDU and a MAC sub-PDU provided by an embodiment of the application.
  • the general structure of the MAC sub-PDU may include a MAC subheader (MAC subheader) and a load.
  • MAC subheader included in the MAC subPDU
  • the load included in the MAC subPDU may be referred to as the load of the MAC subPDU.
  • the name of the load of the MAC sub-PDU and the content and length of the load of the MAC sub-PDU are not limited, and they may be different in different communication systems and different scenarios.
  • the load of the MAC sub-PDU may also be called UE Contention Resolution Identity MAC CE (UE Contention Resolution Identity MAC CE).
  • the name "random access response” is used.
  • the name of "random access response” is just an example, and this embodiment does not limit it.
  • the random access response is the load of the first response, and in the structure shown in this embodiment, it is located in the load of the MAC sub-PDU.
  • the content of the random access response may include information in the existing RAR load, such as one or more of uplink authorization information, timing advance command, TC-RNTI, and RRC message.
  • a response message of a terminal device corresponds to a MAC sub-PDU in a MAC PDU.
  • the response message of the terminal device is designed such that the MAC subheader of the MAC subPDU includes a random access signal identifier. If the response message of the terminal device includes contention resolution information, the load of the MAC subPDU may include random access response and contention resolution information.
  • the MAC subPDU and the MAC layer data packet included in the response message have the same meaning.
  • the load of the MAC subPDU or the load of the MAC layer data packet includes contention resolution information, the contention resolution information is used to indicate contention resolution or the success of random access, and the contention resolution information is used according to Information for contention resolution; or, the load of the MAC sub-PDU or the load of the MAC layer data packet does not include contention resolution information, which is used to indicate contention resolution failure or random access failure or random access failure. Access rollback.
  • the load of the MAC sub-PDU or the load of the MAC layer data packet may also include the 0 item, any one, and any two of the uplink authorization information, timing advance commands, TC-RNTI and RRC messages. Item, any three items, or all four items.
  • the content of the MAC subPDU corresponding to the response message of a terminal device can be any of the following:
  • MAC sub-header including: random access signal identification
  • MAC sub-PDU load including: contention resolution information
  • MAC subheader including: random access signal identification; MAC subPDU load, including: random access response and contention resolution information.
  • the random access response may include any one, any two, any three, or all four of the uplink authorization information, timing advance command, TC-RNTI and RRC messages.
  • MAC subheader including: random access signal identification; MAC subPDU load, including: random access response.
  • the random access response includes uplink authorization information, timing advance command and TC-RNTI.
  • the response message of one terminal device corresponds to two MAC sub-PDUs in one MAC PDU.
  • the embodiment of the present application does not limit the positions of the two MAC subPDUs.
  • the two MAC sub-PDUs are two adjacent MAC sub-PDUs.
  • the two MAC sub-PDUs may not be adjacent.
  • the response message of the terminal device is designed as: one of the MAC sub-PDUs may include the random access signal identifier and the random access response.
  • the random access signal identifier is located in the MAC subheader of the MAC subPDU, and the load of the MAC subPDU may include the random access response.
  • the random access response may include uplink authorization information, timing advance commands, 0 items, any one, any two items, any three items, or all four items in the TC-RNTI and RRC messages.
  • another MAC subPDU includes the contention resolution information.
  • the contention resolution information is located in the load of another MAC subPDU.
  • the another MAC subPDU may refer to the existing structure in the NR system.
  • one of the MAC sub-PDUs may be located before or after the other MAC sub-PDU.
  • the one of the MAC subPDUs has the same meaning as the MAC layer data packet included in the response message.
  • the content of the two MAC subPDUs corresponding to the response message of one terminal device may be any of the following:
  • the MAC subheader of one of the MAC subPDUs includes: a random access signal identifier.
  • the load of another MAC sub-PDU includes contention resolution information.
  • the MAC subheader of one of the MAC sub-PDUs includes: a random access signal identifier; the load of one of the MAC sub-PDUs includes: a random access response.
  • the random access response may include any one, any two, any three, or all four of the uplink authorization information, timing advance command, TC-RNTI and RRC messages.
  • the load of another MAC sub-PDU includes contention resolution information.
  • the MAC subheader of one of the MAC sub-PDUs includes: a random access signal identifier; the load of one of the MAC sub-PDUs includes: a random access response.
  • the random access response includes uplink authorization information, timing advance command and TC-RNTI.
  • the response message of a terminal device can be located in two MAC PDUs.
  • the MAC sub-PDU carrying the random access signal identifier is located in one MAC PDU
  • the MAC sub-PDU carrying contention resolution information is located in another MAC PDU.
  • the response message of a terminal device specifically corresponds to one MAC sub-PDU in one MAC PDU and one MAC sub-PDU in the other MAC PDU.
  • the response message of the terminal device is designed as: one MAC sub-PDU in one MAC PDU may include the random access signal identifier and the random access response.
  • the random access signal identifier is located in the MAC subheader of the MAC subPDU, and the load of the MAC subPDU may include the random access response.
  • the random access response may include 0 items, any one, any two items, any three items, or all four items in the uplink grant information, timing advance command, TC-RNTI and RRC messages. If the response message of the terminal device includes contention resolution information, one MAC sub-PDU in another MAC PDU includes the contention resolution information.
  • one MAC sub-PDU in one of the MAC PDUs has the same meaning as the MAC layer data packet included in the response message.
  • the content respectively included in the two MAC sub-PDUs corresponding to the response message of a terminal device may refer to the content respectively included in the two MAC sub-PDUs in the second implementation manner.
  • the difference is that in the second implementation manner, the two MAC sub-PDUs corresponding to the response message are in the same MAC PDU. In this implementation, the two MAC sub-PDUs corresponding to the response message are in different MAC PDUs.
  • the first situation the terminal device contention is resolved, and the terminal device is in the non-RRC_Connected state.
  • condition for the terminal device to trigger the contention-based 2-step random access procedure can be initial access from RRC idle (initial access in the RRC idle state), RRC connection re-establishment (RRC connection re-establishment process) or Transition from RRC_INACTIVE (RRC inactive transfer), etc.
  • the response message of the terminal device may or may not include uplink authorization information.
  • the uplink authorization information may be used by the terminal device to send new data.
  • the response message of the terminal device may or may not include the timing advance command.
  • timing advance commands may not be needed in certain scenarios (such as small cells).
  • the response message of the terminal device may include TC-RNTI/C-RNTI.
  • the terminal device since the terminal device is in the non-RRC_Connected state, the terminal device has not yet obtained the C-RNTI, and therefore, the network device needs to allocate the C-RNTI/TC-RNTI.
  • the response message of the terminal device may include contention resolution information.
  • the random access response may include TC-RNTI/C-RNTI, and may also include 0, any one, or both of the uplink authorization information and the timing advance command.
  • the random access response may also include an RRC message.
  • the second situation the terminal device contention is resolved, and the terminal device is in the RRC_Connected state.
  • the conditions for the terminal device to trigger the contention-based 2-step random access procedure can be Handover, DL or UL data arrival during RRC_CONNECTED when UL synchronisation status is “non-synchronised” (RRC connected and uplink out of synchronization) When there is uplink/downlink data arrival) and so on.
  • the response message of the terminal device may or may not include uplink authorization information.
  • the response message of the terminal device may or may not include the timing advance command.
  • the response message of the terminal device may include TC-RNTI/C-RNTI, or may not include TC-RNTI/C-RNTI.
  • the terminal device since the terminal device is in the RRC_Connected state, the terminal device has already obtained the C-RNTI, so there is no need for network device redistribution.
  • the response message of the terminal device may include contention resolution information.
  • the random access response may include uplink authorization information, timing advance command, and 0, any one, any two, or all three of the TC-RNTI/C-RNTI.
  • the random access response may also include an RRC message.
  • the third situation the terminal equipment contention resolution fails in the 2-step random access process based on contention.
  • the network device does not obtain information for contention resolution according to the message sent by the terminal device.
  • the response message or random access response of the terminal device may include uplink authorization information, timing advance command and TC-RNTI.
  • the response message or the random access response may also include an RRC message.
  • the network device may instruct the terminal device to fall back from the contention-based 2-step random access process to the contention-based 4-step random access process.
  • the terminal device can perform the operation shown in S403 in FIG. 4 according to the parameters contained in the response message or the random access response, and fall back from the contention-based 2-step random access process to the 4-step random access process.
  • the network device may instruct the terminal device to perform the contention-based 2-step random access procedure again.
  • the terminal device can perform S601 again.
  • This embodiment provides a random access method, including: a terminal device sends a message to a network device, and the network device sends a response message of the message to the terminal device, where the response message includes a MAC layer data packet, and the MAC layer data packet includes a load and a load
  • the MAC subheader includes first indication information, and the first indication information is used to determine the length of the load.
  • the terminal device can determine the starting position of the MAC layer data packet, thereby realizing the detection of the response message. This method can be applied to scenarios where the response message size is not fixed, for example, in a contention-based 2-step random access process.
  • the second embodiment of the present application provides a random access method. Based on the embodiment shown in FIG. 6, a specific implementation manner of the first identification information is provided. It can be applied to the structure shown in FIG. 8A to FIG. 8C.
  • the first indication information is used to indicate the length of the payload of the MAC layer data packet.
  • the terminal device can determine the starting position of the MAC layer data packet through the first indication information, which is implemented in a contention-based 2-step random access process It detects the response message.
  • the length of the first indication information and the occupied position of the first indication information in the MAC subheader of the MAC layer data packet are not limited.
  • the first indication information may be a preset bit length.
  • the preset bit length can be 7bits, 8bits, 15bits, or 16bits, etc.
  • This embodiment does not limit the unit of the payload length of the MAC layer data packet.
  • the unit of the length may be a byte or a bit.
  • FIG. 9 is a schematic structural diagram of an implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of the application.
  • the random access signal identifier may be RAPID.
  • the first indication information is represented by the L field, which occupies a length of 8 bits.
  • the MAC subheader of the MAC layer data packet includes the first indication information (L field).
  • the L field is 8 bits long.
  • the length unit of the payload of the MAC layer data packet is byte, and the L field can indicate up to 255 bytes.
  • the L field can directly indicate the length of the MAC layer data packet load. For example, when the L field is a binary sequence of 00001111, it indicates that the length of the payload of the MAC layer data packet is 15 bytes.
  • the L field when the L field is a binary sequence of 000111111, it indicates that the length of the payload of the MAC layer data packet is 31 bytes.
  • the length unit of the payload of the MAC layer data packet is bit (bit), and the L field can indicate up to 255 bits.
  • the L field when the L field is a binary sequence of 00011011, it indicates that the length of the payload of the MAC layer data packet is 27 bits.
  • the L field is the binary sequence 00110111, it indicates that the length of the payload of the MAC layer data packet is 55 bits.
  • the MAC subheader of the MAC layer data packet may further include second indication information.
  • the second indication information is used to indicate the content of the information included in the payload of the MAC layer data packet.
  • the first indication information indicates the length of the payload of the MAC layer data packet.
  • the load of the MAC layer data packet includes more content, for example, it may include one or a combination of uplink grant information, timing advance command, TC-RNTI, RRC message, and contention resolution information.
  • the payload of the MAC layer data packet includes at least two types of information with the same length.
  • the payload of the MAC layer data packet includes information A and information B of the same length.
  • the payload of the MAC layer data packet includes information A and information B with the same length, and information C and information D with the same length. Among them, the length of information A and information C are different.
  • the first indication information indicates the length of the load of the MAC layer data packet
  • the length and quantity of the second indication information are related to information groups of the same length that may be included in the payload of the MAC layer data packet and the number of information in each information group.
  • information A and information B are one information group, and the number of information in the information group is two.
  • information A and information B are one information group, and information C and information D are another information group, and the number of information in each information group is two.
  • This embodiment does not limit the quantity of the second indication information, the occupied bit length, and the occupied position in the MAC subheader of the MAC layer data packet.
  • the payload of the MAC layer data packet includes information A and information B of the same length.
  • FIG. 10 is a schematic structural diagram of another implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of the application.
  • the first indication information is represented by the L1 field, which occupies a length of 7 bits.
  • the second indication information is represented by the L2 field and occupies a length of 1 bit.
  • the length unit of the payload of the MAC layer data packet is byte
  • the first indication information (L1 field) is 7 bits long, which can indicate up to 127 bytes.
  • the value of the L2 field When the value of the L2 field is 0, it indicates that the load of the MAC layer data packet includes information A, and when the value is 1, it indicates that the load of the MAC layer data packet includes information B.
  • the value of the L2 field is 1, it indicates that the load of the MAC layer data packet includes information A, and when the value is 0, it indicates that the load of the MAC layer data packet includes information B.
  • the payload of the MAC layer data packet includes information A and information B with the same length, and also includes information C and information D with the same length.
  • the number of the second indication information may be two, and each second indication information occupies a length of 1 bit.
  • the value of one of the second indication information may indicate that the payload of the MAC layer data packet includes information A or information B.
  • the value of the other second indication information may indicate that the load of the MAC layer data packet includes information C or information D.
  • the payload of the MAC layer data packet includes information A and information B with the same length, and also includes information C and information D with the same length.
  • the number of the second indication information may be one, occupying 2 bits in length.
  • the value of the second indication information can indicate that the load of the MAC layer data packet includes a combination of information A, information B, information C, or information D.
  • the second indication information is a binary sequence 01, it means that the payload of the MAC layer data packet includes information A and information C.
  • the second indication information is the binary sequence 11, it indicates that the payload of the MAC layer data packet includes information B and information C.
  • the second indication information is a binary sequence 00, it means that the payload of the MAC layer data packet includes information A and information D.
  • the second indication information is the binary sequence 10
  • the payload of the MAC layer data packet includes information B and information D.
  • the meaning of each value is not restricted and can be adjusted.
  • the random access method provided in this embodiment directly indicates the load length of the MAC layer data packet through the first indication information.
  • the terminal device can determine the start position of the MAC layer data packet through the first indication information, and realizes the detection of the response message in the 2-step random access process based on contention.
  • the third embodiment of the present application provides a random access method. On the basis of the embodiment shown in FIG. 6, another specific implementation manner of the first identification information is provided. It can be applied to the structure shown in FIG. 8A to FIG. 8C.
  • the first indication information may include N indication fields, and N is greater than or equal to 1.
  • Each indication field corresponds to a type of information, and the indication field is used to indicate whether the payload of the MAC layer data packet contains information corresponding to the indication field.
  • the terminal device can determine whether the load of the MAC layer data packet includes information corresponding to each indicator field. After the information included in the load of the MAC layer data packet is determined, the length of the load of the MAC layer data packet can be determined. Therefore, the terminal device can determine the starting position of the MAC layer data packet according to the load length of the MAC layer data packet, and realize the detection of the response message in the 2-step random access process based on contention.
  • this embodiment does not limit the specific value of N, the bit length occupied by each indicator field, and the occupied positions of the N indicator fields in the MAC subheader of the MAC layer data packet.
  • the bit lengths occupied by indication fields corresponding to different information may be the same or different.
  • N indication fields included in the first indication information will be described with reference to the structure shown in FIG. 8A.
  • FIG. 11 is a schematic structural diagram of another implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of this application
  • FIG. 12 is another implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of this application Schematic diagram of the structure. The difference between FIG. 11 and FIG. 12 is that the bit length of the CR field is different.
  • the load of the MAC layer data packet may include 0, any one, any two or all three of the uplink grant information, the timing advance command, and the TC-RNTI. Therefore, the N indication fields include at least three indication fields respectively corresponding to uplink grant information, timing advance command and TC-RNTI.
  • the indication fields corresponding to the uplink grant information, timing advance command and TC-RNTI are respectively marked as U field, T1 field and T2 field. This embodiment does not limit the names of the U field, the T1 field, and the T2 field, the length of bits occupied respectively, and the occupied position in the MAC subheader of the MAC layer data packet.
  • the U field, the T1 field, and the T2 field may all have a length of 1 bit, and refer to the U field, the T1 field, and the T2 field in FIG. 11 or FIG. 12.
  • the value of the U field when the value of the U field is the first value, it may indicate that the load of the MAC layer data packet includes uplink authorization information.
  • the value of the U field when the value of the U field is the second value, it may indicate that the payload of the MAC layer data packet does not include uplink authorization information.
  • This embodiment does not limit the specific values of the first value and the second value. For example, when the U field is 1 bit in length, the first value is 0 and the second value is 1. Or, the first value is 1, and the second value is 0.
  • the value of the T1 field indicates whether the load of the MAC layer data packet contains a timing advance command
  • the value of the T2 field indicates whether the load of the MAC layer data packet contains TC-RNTI, which is similar to the U field and is not here anymore. Repeat.
  • the load of the MAC layer data packet may also include contention resolution information. Therefore, the N indication fields also include at least indication fields corresponding to contention resolution information. For ease of description, the indication field corresponding to the contention resolution information is marked as the CR field. This embodiment does not limit the name of the CR field, the bit length, and the occupied position in the MAC subheader of the MAC layer data packet.
  • the indication field corresponding to the contention resolution information is 1 bit.
  • the preset length may be 48 bits.
  • the valid bit of the contention resolution information is a preset length or a part of the preset length.
  • this embodiment does not limit the specific length of the valid bit of the contention resolution information.
  • the preset length is 48 bits
  • the effective bit length of the contention resolution information can be 16 bits, 32 bits, 48 bits, and so on.
  • this embodiment does not limit the occupied position of the effective bit of the contention resolution information in the preset length.
  • the preset length is 48 bits
  • the effective bit length of the contention resolution information is 16 bits.
  • the 16 bits can be the first 16 bits of the preset length, or the last 16 bits, and so on.
  • the preset length is 48 bits for description.
  • the effective bit of the contention resolution information is a preset length.
  • the contention resolution information may refer to Msg4 in the example S404 shown in FIG. 4.
  • Msg4 is a fixed 48 bits.
  • the effective bit of contention resolution information is a preset length.
  • the 1-bit CR field can indicate whether the load of the MAC layer data packet includes contention resolution information.
  • the valid bits of the contention resolution information are part of the preset length.
  • Msg4 is implemented through the PDCCH scrambled by the C-RNTI.
  • the terminal device has already obtained the C-RNTI.
  • the C-RNTI may be sent to the network device as information for contention resolution.
  • the network device may carry the C-RNTI display in the load of the MAC layer data packet. Therefore, the contention resolution information can also be a C-RNTI with a length of 16 bits. Since the preset length is 48 bits, the effective bits of the contention resolution information are part of the preset length.
  • the 1-bit CR field can indicate whether the load of the MAC layer data packet includes contention resolution information.
  • the indication field corresponding to the contention resolution information can be 2 bits, and the indication field corresponding to the contention resolution information indicates whether the load of the MAC layer data packet contains contention resolution information. Used to indicate the length of contention resolution information. Exemplarily, refer to the CR field in FIG. 12. It should be noted that this embodiment does not limit the specific value of the length of the contention resolution information.
  • the contention resolution information may be a 48-bit UE Contention Resolution Identity MAC CE or a 16-bit C-RNTI MAC CE.
  • the following describes how the value of the CR field indicates whether the load of the MAC layer data packet contains contention resolution information and the length of contention resolution information. Assume that there are two types of contention resolution information, one is 48 bits and the other is 16 bits.
  • the 2-bit CR field directly indicates whether the load of the MAC layer data packet includes contention resolution information and the length of contention resolution information.
  • the CR field is a binary sequence of 00, it is used to indicate that the load of the MAC layer data packet does not include contention resolution information.
  • the CR field is a binary sequence 01, it is used to indicate that the load of the MAC layer data packet includes contention resolution information, and the length of the contention resolution information is 16 bits.
  • the CR field is a binary sequence of 10
  • the length of the contention resolution information is 48 bits.
  • 1 bit in the CR field is used to indicate whether the load of the MAC layer data packet includes contention resolution information, and the other bit in the CR field is used to indicate the length of the contention resolution information .
  • the first bit in the CR field is used to indicate whether the load of the MAC layer data packet includes contention resolution information.
  • a value of 0 indicates that the load of the MAC layer data packet does not include contention resolution information, and a value of 1 indicates that the load of the MAC layer data packet includes contention resolution information.
  • the second bit is used to indicate the length of contention resolution information.
  • a value of 0 indicates that the length of the contention resolution information is 48 bits, and a value of 1 indicates that the length of the contention resolution information is 16 bits.
  • the CR field is a binary sequence of 00 or 01, it is used to indicate that the load of the MAC layer data packet does not include contention resolution information.
  • the CR field is a binary sequence 11
  • the load of the MAC layer data packet includes contention resolution information
  • the length of the contention resolution information is 16 bits.
  • the CR field is a binary sequence of 10
  • the load of the MAC layer data packet includes contention resolution information
  • the length of the contention resolution information is 48 bits.
  • N indication fields included in the first indication information will be described with reference to the structures shown in FIGS. 8B to 8C.
  • FIG. 13 is a schematic structural diagram of another implementation manner of the MAC subheader of a MAC layer data packet provided by an embodiment of the application. Compared with FIG. 11 and FIG. 12, the difference between FIG. 13 is that, in FIG. 13, there is no CR field corresponding to the contention resolution information.
  • the description of the U field, T1 field, and T2 field in FIG. 13 can refer to the related description in the structure shown in FIG. 8A, and the principles are similar, and will not be repeated here.
  • the first indication information may include N indication fields, and N is greater than or equal to 1.
  • Each indication field corresponds to a type of information, and the indication field is used to indicate whether the payload of the MAC layer data packet contains information corresponding to the indication field.
  • the terminal device can determine whether the load of the MAC layer data packet includes information corresponding to each indicator field, and further, can determine the length of the load of the MAC layer data packet.
  • the terminal device can determine the starting position of the MAC layer data packet through N indication fields, and realizes the detection of the MAC layer data packet in the 2-step random access process based on contention.
  • the fourth embodiment of the present application provides a random access method. On the basis of the embodiment shown in FIG. 6, another specific implementation manner of the first indication information is provided. It can be applied to the structure shown in FIG. 8A to FIG. 8C.
  • the first indication information may include an information index value, and the information index value has a corresponding relationship with the load length of the MAC layer data packet.
  • the information index value is used to determine the load length of the MAC layer data packet according to the corresponding relationship between the preset information index value and the load length of the MAC layer data packet.
  • the terminal device can determine the load length of the MAC layer data packet according to the correspondence between the information index value and the load length of the MAC layer data packet. After the length of the load of the MAC layer data packet is determined, the terminal device can determine the starting position of the MAC layer data packet, and realize the detection of the response message in the 2-step random access process based on contention. In addition, the length of bits occupied by the first indication information can be further reduced, bit waste is further reduced, and resource utilization is improved.
  • this embodiment does not limit the bit length of the information index value, the occupied position in the MAC subheader of the MAC layer data packet, and the correspondence between the information index value and the load length of the MAC layer data packet.
  • the following describes the correspondence between the information index value and the payload length of the MAC layer data packet in conjunction with the structures shown in FIG. 8A to FIG. 8C.
  • the uplink authorization information is 27 bits
  • the timing advance command is 12 bits
  • the TC-RNTI is 16 bits.
  • the contention resolution information includes two lengths, one is 48 bits in length and the other is 16 bits in length. It should be noted that this embodiment does not limit the length of each piece of information, and this is only an example.
  • the load of the MAC layer data packet may include 0, any one, any two or all three of the uplink grant information, timing advance command and TC-RNTI, and may also include contention resolution information. And the contention resolution information can have various lengths. By permuting and combining different information, the length of the payload of the MAC layer data packet can be determined.
  • the bit length occupied by the information index value and the corresponding relationship between the information index value and the load length of the MAC layer data packet can be determined according to the number of payload lengths of the MAC layer data packet.
  • Table 3 shows some examples of the correspondence between the information index value and the load length of the MAC layer data packet. Wherein, the information index value may be 5 bits in length.
  • the load of the MAC layer data packet may include 0, any one, any two, or all three of the uplink authorization information, the timing advance command, and the TC-RNTI.
  • Table 4 shows some examples of the correspondence between the information index value and the payload length of the MAC layer data packet. Wherein, the information index value may be 3 bits in length.
  • the MAC subheader of the MAC layer data packet may further include second indication information.
  • the second indication information is used to indicate the content of the information included in the payload of the MAC layer data packet.
  • the first indication information may include an information index value, and the information index value has a corresponding relationship with the load length of the MAC layer data packet.
  • the information index value is used to determine the load length of the MAC layer data packet according to the corresponding relationship between the preset information index value and the load length of the MAC layer data packet.
  • the terminal device can determine the length of the load of the MAC layer data packet, and further, the terminal device can determine the starting position of the MAC layer data packet, and realize the response message in the 2-step random access process based on contention. Detection.
  • a terminal device performs a contention-based 2-step random access process.
  • the network device can determine that the terminal device performs a 2-step random access process based on contention. For example, in S601, the terminal device sends a message to the network device.
  • the message may include random access signals and information for contention resolution.
  • the network device can determine whether the terminal device performs a contention-based 2-step random access process according to the type of the random access signal or the time-frequency resource (for example, PRACH time-frequency resource) sent by the random access signal.
  • the network device determines that the terminal device is performing a 2-step random access process based on contention, but the network device fails to decode the information used for contention resolution, the network device can control the terminal device to access the 2-step random access process based on contention.
  • the entry process falls back to a contention-based 4-step random access process; or, the network device can control the terminal device to re-execute the contention-based 2-step random access process; or, the network device can control the terminal device to perform a contention-based 4-step random access process.
  • Access process If the network device controls the terminal device to fall back from the contention-based 2-step random access process to the contention-based 4-step random access process, at this time, the network device may send a response message of the message to the terminal device.
  • the response message of the message includes uplink authorization information, timing advance command and TC-RNTI.
  • the terminal device may execute S403 to S404 in FIG. 4 according to the received response message of the message to perform random access fallback. If the network device controls the terminal device to perform the contention-based 2-step random access process again, or controls the terminal device to perform the contention-based 4-step random access process, at this time, the network device can send a response message of the message to the terminal device, Or, the network device does not send a message response message to the terminal device.
  • the response message of the message may include the 0 item, any one, and any two items in the uplink grant information, the timing advance command, and TC-RNTI.
  • the terminal device may re-perform the contention-based 2-step random access process and re-execute S601 in FIG. 6; or, the terminal device may re-perform the contention-based 4-step random access process and execute S401 to S404 in FIG. 4.
  • the random access method provided by the embodiment of the present application will be described in combination with the above-mentioned scenarios through Embodiment 5 to Embodiment 7.
  • the fifth to seventh embodiments can be combined with the above-mentioned first embodiment.
  • the terminal device can use the MAC PDU. Detect the response message of the terminal device.
  • the network device sends a response message of a message to the terminal device, the response message of the message does not include contention resolution information.
  • the fifth embodiment of the present application provides a random access method, and the execution subject involves network equipment and terminal equipment.
  • the random access method provided in this embodiment may include:
  • the terminal device sends a message to the network device.
  • the network device receives the message sent by the terminal device.
  • the terminal device After the terminal device sends a message to the network device, it will start the timer.
  • the terminal device waits to receive the response message of the message sent by the network device within the time range indicated by the timer.
  • This embodiment does not limit the name of the timer and the indicated time range. For example, refer to the RAR time window in S402 in the example shown in FIG. 4.
  • the network device receives the message sent by the terminal device and determines that the terminal device is performing a two-step random access process based on contention, but the network device fails to decode the information used for contention resolution. At this time, the network device may not send the response message of the message to the terminal device. Correspondingly, the terminal device will not receive the response message of the message sent by the network device before the timer expires.
  • the terminal device may perform a contention-based 2-step random access procedure again. For example, execute S601 in FIG. 6 again.
  • the terminal device may perform a 4-step random access procedure based on contention. For example, S401 to S404 in FIG. 4 are executed.
  • a terminal device sends a message to a network device and starts a timer. When the timer expires, the terminal device does not receive a response message from the terminal device, and the terminal device will restart Perform a 2-step random access process based on contention or a 4-step random access process based on contention.
  • a terminal device performs a contention-based 2-step random access process, and the network device can control the terminal device to perform a contention-based 2-step random access process again or perform a contention-based 4-step random access process The process improves the flexibility of random access.
  • the sixth embodiment of the present application provides a random access method.
  • the execution subject involves network equipment and terminal equipment, and the involved message interaction process can be referred to S601 to S602 in FIG. 6.
  • the MAC subheader of the MAC layer data packet may also include back-off indication information, and the back-off indication information is used to indicate whether to perform random access back-off.
  • the random access fallback refers to a fallback from a contention-based 2-step random access process to a contention-based 4-step random access process.
  • the terminal device After the terminal device sends a message to the network device, it receives a response message to the message sent by the network device. If the MAC subheader of the MAC layer data packet included in the response message carries back-off indication information, the terminal device may determine whether to perform random access back-off according to the back-off indication information. If the fallback indication information instructs the terminal device to perform random access fallback, the response message of the message includes uplink authorization information, timing advance command and TC-RNTI, and subsequently, the terminal device may carry out the response message according to the message To perform a 4-step random access process based on contention, perform S403 and S404 in Figure 4.
  • the terminal device can re-perform the contention-based 2-step random access process, and perform the step shown in FIG. 6 S601 ⁇ S602.
  • the terminal device may perform a contention-based 4-step random access procedure, and execute S401 to S404 in FIG. 4.
  • this embodiment does not limit the length of the fallback indication information and the occupied position in the MAC subheader of the MAC layer data packet.
  • the length of the backoff indication information is 1 bit in length.
  • the terminal device when the value of the fallback indication information is the first value, the terminal device is instructed to perform random access fallback.
  • the value of the fallback indication information is the second value, the terminal device is instructed not to perform random access fallback.
  • this embodiment does not limit the specific values of the first value and the second value. For example, when the backoff instruction information is 1 bit in length, the first value is 0 and the second value is 1. Or, the first value is 1, and the second value is 0.
  • the network device can use the back-off indication information during the contention-based 2-step random access process of the terminal device Control whether the terminal device falls back to a contention-based 4-step random access process.
  • the terminal device can re-perform the contention-based 2-step random access process or the contention-based 4-step random access process, which improves The flexibility of random access.
  • the seventh embodiment of the present application provides a random access method.
  • the execution subject involves network equipment and terminal equipment, and the involved message interaction process can be referred to S601 to S602 in FIG. 6.
  • the MAC subheader of the MAC layer data packet includes the first indication information.
  • the first indication information is used to determine the length of the payload of the MAC layer data packet, and the value of the first indication information is a preset value.
  • the first indication information is further used to instruct the terminal device to re-perform the contention-based 2-step random access procedure.
  • the response message of the message includes the 0 item, any one or any two items in the uplink grant information, the timing advance command and the TC-RNTI.
  • the terminal device may re-perform the contention-based 2-step random access procedure, and execute S601 to S602 in FIG. 6.
  • the first indication information is further used to instruct the terminal device to perform a contention-based 4-step random access procedure.
  • the response message of the message includes the 0 item, any one or any two items in the uplink grant information, the timing advance command and the TC-RNTI.
  • the terminal device performs a 4-step random access procedure based on contention, and executes S401 to S404 in FIG. 4.
  • the first indication information is further used to instruct the terminal device to perform random access fallback.
  • the response message of the message includes uplink authorization information, timing advance command and TC-RNTI.
  • the terminal device may fall back from the contention-based 2-step random access process to the contention-based 4-step random access process according to the response message of the message, and perform S403 to S404 in FIG. 4.
  • the first indication information is used to indicate the length of the payload of the MAC layer data packet.
  • the first indication information may be a preset bit length.
  • the MAC subheader of the MAC layer data packet may further include second indication information, and the second indication information is used to indicate the content of the information included in the payload of the MAC layer data packet.
  • the length unit of the payload of the MAC layer data packet is bit (bit).
  • the MAC subheader of the MAC layer data packet includes the first indication information (L field), which is 8 bits long.
  • the preset value of the first indication information (L field) is the binary sequence 00000000, corresponding to the decimal number 0.
  • the first indication information (L field) indicates that the payload length of the MAC layer data packet is 0 bit.
  • the first indication information is a preset value, which is used to instruct the terminal device to re-execute the contention-based 2-step random access process, and execute S601 ⁇ S602 in Figure 6, or to instruct the terminal device to perform the contention-based 4-step random access process. In the entry process, S401 to S404 in Figure 4 are executed.
  • the MAC subheader of the MAC layer data packet includes the first indication information (L field), which is 8 bits long.
  • the preset value of the first indication information (L field) is the binary sequence 00011011, which corresponds to the decimal value 27.
  • the first indication information (L field) indicates that the length of the payload of the MAC layer data packet is 27 bits. It can be determined that the response message of the message only includes uplink authorization information.
  • the first indication information is a preset value, which is used to instruct the terminal device to re-execute the contention-based 2-step random access process, and execute S601 ⁇ S602 in Figure 6, or to instruct the terminal device to perform the contention-based 4-step random access process. In the entry process, S401 to S404 in Figure 4 are executed.
  • the MAC subheader of the MAC layer data packet includes first indication information (L1 field) and second indication information (L2 field).
  • the L1 field is 7 bits long, and the L2 field is 1 bit long.
  • the preset value of the first indication information (L field) is the binary sequence 00000000, corresponding to the decimal number 0.
  • the first indication information (L1 field) indicates that the payload length of the MAC layer data packet is 0 bit.
  • the first indication information is a preset value, which is used to instruct the terminal device to re-execute the contention-based 2-step random access process, and execute S601 ⁇ S602 in Figure 6, or to instruct the terminal device to perform the contention-based 4-step random access process. In the entry process, S401 to S404 in Figure 4 are executed.
  • the MAC subheader of the MAC layer data packet includes first indication information (L1 field) and second indication information (L2 field).
  • the L1 field is 7 bits long, and the L2 field is 1 bit long.
  • the preset value of the first indication information (L1 field) is the binary sequence 00110111.
  • the first indication information (L1 field) indicates that the length of the payload of the MAC layer data packet is 55 bits.
  • the second indication information (L2 field) is a binary value of 0, which is used to indicate that the load of the MAC layer data packet includes TC-RNTI. It can be determined that the response message of the message includes uplink authorization information, timing advance command and TC-RNTI.
  • the first indication information is a preset value, which is used to instruct the terminal device to fall back from the contention-based 2-step random access process to the contention-based 4-step random access process.
  • the terminal device may execute S403 to S404 in FIG. 4 according to the response message of the message.
  • the first indication information may include N indication fields, and N is greater than or equal to 1.
  • Each indication field corresponds to a type of information, and the indication field is used to indicate whether the payload of the MAC layer data packet contains information corresponding to the indication field.
  • the N indication fields include the U field, the T1 field, the T2 field, and the CR field.
  • the value of the CR field is 0, which is used to indicate that the load of the MAC layer data packet does not include contention resolution information.
  • the U field, T1 field, and T2 field in the first indication information are all binary values 0, the first indication information indicates that the length of the payload of the MAC layer data packet is 0.
  • the first indication information is a preset value, which is used to instruct the terminal device to re-execute the contention-based 2-step random access process, and execute S601 ⁇ S602 in Figure 6, or to instruct the terminal device to perform the contention-based 4-step random access process.
  • S401 to S404 in Figure 4 are executed.
  • the N indication fields include the U field, the T1 field, the T2 field, and the CR field.
  • the value of the CR field is 0, which is used to indicate that the load of the MAC layer data packet does not include contention resolution information.
  • the U field and the T1 field in the first indication information are both a binary value of 0 and the T2 field is a binary value of 1
  • the first indication information indicates that the load of the MAC layer data packet does not include uplink authorization information and TC-RNTI, but only includes Timing advance command
  • the length of the payload of the MAC layer data packet is 12 bits.
  • the first indication information is a preset value, which is used to instruct the terminal device to re-execute the contention-based 2-step random access process, and execute S601 ⁇ S602 in Figure 6, or to instruct the terminal device to perform the contention-based 4-step random access process.
  • S401 to S404 in Figure 4 are executed.
  • the N indication fields include the U field, the T1 field, the T2 field, and the CR field.
  • the value of the CR field is 0, which is used to indicate that the load of the MAC layer data packet does not include contention resolution information.
  • the U field, T1 field, and T2 field in the first indication information are all binary values 1
  • the first indication information indicates that the load of the MAC layer data packet includes uplink authorization information, timing advance command and TC-RNTI, MAC layer data
  • the payload length of the packet is 55 bits.
  • the first indication information is a preset value, which is used to instruct the terminal device to fall back from the contention-based 2-step random access process to the contention-based 4-step random access process.
  • the terminal device may execute S403 to S404 in FIG. 4 according to the response message of the message.
  • the structure shown in FIG. 13 does not have the CR field in FIG.
  • the values of the U field, T1 field, and T2 field are similar to the principle that the terminal device performs random access fallback or re-executes the contention-based 2-step random access process or the contention-based 4-step random access process. You can refer to the above three examples, which will not be repeated here.
  • the first indication information may include an information index value, and the information index value has a corresponding relationship with the load length of the MAC layer data packet.
  • the information index value is used to determine the load length of the MAC layer data packet according to the correspondence between the preset information index value and the load length of the MAC layer data packet.
  • the information index value may be a preset bit length.
  • the MAC subheader of the MAC layer data packet may further include second indication information, and the second indication information is used to indicate the content of the information included in the payload of the MAC layer data packet.
  • the MAC subheader of the MAC layer data packet includes an information index value and is 5 bits long.
  • the preset value of the information index value is the binary sequence 00000, corresponding to the decimal number 0.
  • the information index value indicates that the payload length of the MAC layer data packet is 0 bit.
  • the first indication information is a preset value, which is used to instruct the terminal device to re-execute the contention-based 2-step random access process, and execute S601 ⁇ S602 in Figure 6, or to instruct the terminal device to perform the contention-based 4-step random access process. In the entry process, S401 to S404 in Figure 4 are executed.
  • the MAC subheader of the MAC layer data packet includes the information index value and is 3 bits long.
  • the preset value of the information index value is a binary sequence 001.
  • the information index value indicates that the payload length of the MAC layer data packet is 27 bits. It can be determined that the response message of the message includes only uplink authorization information.
  • the first indication information is a preset value, which is used to instruct the terminal device to re-execute the contention-based 2-step random access process, and execute S601 ⁇ S602 in Figure 6, or to instruct the terminal device to perform the contention-based 4-step random access process. In the entry process, S401 to S404 in Figure 4 are executed.
  • the MAC subheader of the MAC layer data packet includes the information index value and the second indication information.
  • the information index value is 5 bits long, and the second indication information is 1 bit long.
  • the preset value of the information index value is the binary sequence 01001. At this time, the information index value indicates that the payload length of the MAC layer data packet is 55 bits.
  • the second indication information is a binary value of 0, which is used to indicate that the payload of the MAC layer data packet includes TC-RNTI. It can be determined that the response message of the message includes uplink authorization information, timing advance command and TC-RNTI.
  • the first indication information is a preset value, which is used to instruct the terminal device to fall back from the contention-based 2-step random access process to the contention-based 4-step random access process.
  • the terminal device may execute S403 to S404 in FIG. 4 according to the response message of the message.
  • the MAC subheader of the MAC layer data packet includes an information index value and is 3 bits in length.
  • the preset value of the information index value is a binary sequence 111.
  • the information index value indicates that the payload length of the MAC layer data packet is 55 bits.
  • the response message of the message includes uplink authorization information, timing advance command and TC-RNTI.
  • the first indication information is a preset value, which is used to instruct the terminal device to fall back from the contention-based 2-step random access process to the contention-based 4-step random access process.
  • the terminal device may execute S403 to S404 in FIG. 4 according to the response message of the message.
  • the first indication information is set in the MAC subheader of the MAC layer data packet.
  • the network device can control the terminal device to re-execute the contention-based 2-step random access process by setting the first indication information to a preset value, or perform a contention-based random access process. 4-step random access process, or fall back from contention-based 2-step random access process to contention-based 4-step random access process.
  • the embodiments of the present application also provide a device for implementing any of the above methods.
  • a chip device is provided for use in a terminal device or a network device, including, for implementing the terminal device in any of the above methods.
  • FIG. 14 is a schematic structural diagram of an apparatus provided by an embodiment of the application.
  • the device provided in this embodiment may include:
  • the sending module 11 is configured to send a message to a network device, where the message is used by the terminal device to request random access from the network device;
  • the receiving module 12 is configured to receive a response message of the message from the network device, the response message including a MAC layer data packet, the MAC layer data packet including a payload and a MAC subheader of the payload, the MAC subheader
  • the header includes first indication information, and the first indication information is used to determine the length of the payload.
  • the device may also include a processing module 13 for controlling the sending module 11 to send messages.
  • the processing module 13 may also process the response message, for example, process the information carried in the load of the response message, and for example, detect the response message according to the first indication information.
  • the message includes a random access signal and information used for contention resolution, and the random access signal is used to request random access;
  • the load includes contention resolution information, the contention resolution information is used to indicate contention resolution or random access success, and the contention resolution information is obtained according to the information used for contention resolution; or, the load is not It includes contention resolution information, which is used to indicate contention resolution failure or random access failure or random access fallback.
  • the load further includes one or more of the following information: uplink authorization information, timing advance command, temporary cell radio network temporary identifier TC-RNTI, and radio resource control RRC message.
  • the first indication information is used to indicate the length of the load.
  • the first indication information is a preset bit length.
  • the first indication information includes N indication fields, where N is greater than or equal to 1; each indication field corresponds to one type of information, and the indication field is used to indicate whether the load includes the corresponding indication field information.
  • the information corresponding to the N indication fields includes contention resolution information, and the contention resolution information has a preset length, and the indication field corresponding to the contention resolution information is 1 bit; or, the N indication fields
  • the corresponding information includes contention resolution information, the indication field corresponding to the contention resolution information is 2 bits, and the indication field corresponding to the contention resolution information is also used to indicate the length of the contention resolution information.
  • the valid bit of the contention resolution information is the preset length or a part of the preset length.
  • the first indication information includes an information index value, and there is a corresponding relationship between the information index value and the length of the load; the information index value is used according to the preset information index value and the length of the load. The corresponding relationship determines the length of the load.
  • the MAC subheader further includes fallback indication information, and the fallback indication information is used to indicate whether to perform random access fallback.
  • the device provided in this embodiment is used to perform operations performed by the terminal device in the random access method provided in any of the above embodiments.
  • the technical principles and technical effects are similar, and will not be repeated here.
  • FIG. 15 is a schematic structural diagram of another device provided in an embodiment of the application.
  • the device provided in this embodiment may include:
  • the receiving module 21 is configured to receive a message sent by a terminal device, where the message is used by the terminal device to request random access from a network device;
  • the sending module 22 is configured to send a response message of the message to the terminal device, the response message includes a MAC layer data packet, the MAC layer data packet includes a payload and a MAC subheader of the payload, and the MAC subheader
  • the header includes first indication information, and the first indication information is used to determine the length of the payload.
  • the device may also include a control module 23 for generating a response message, and controlling the sending module 22 to send the response message.
  • a control module 23 for generating a response message, and controlling the sending module 22 to send the response message.
  • the message includes a random access signal and information used for contention resolution, and the random access signal is used to request random access;
  • the load includes contention resolution information, the contention resolution information is used to indicate contention resolution or random access success, and the contention resolution information is obtained according to the information used for contention resolution; or, the load is not It includes contention resolution information, which is used to indicate contention resolution failure or random access failure or random access fallback.
  • the load further includes one or more of the following information: uplink authorization information, timing advance command, temporary cell radio network temporary identifier TC-RNTI, and radio resource control RRC message.
  • the first indication information is used to indicate the length of the load.
  • the first indication information is a preset bit length.
  • the first indication information includes N indication fields, where N is greater than or equal to 1; each indication field corresponds to one type of information, and the indication field is used to indicate whether the load includes the corresponding indication field information.
  • the information corresponding to the N indication fields includes contention resolution information, and the contention resolution information has a preset length, and the indication field corresponding to the contention resolution information is 1 bit;
  • the information corresponding to the N indication fields includes contention resolution information, the indication field corresponding to the contention resolution information is 2 bits, and the indication field corresponding to the contention resolution information is also used to indicate the length of the contention resolution information.
  • the valid bit of the contention resolution information is the preset length or a part of the preset length.
  • the first indication information includes an information index value, and there is a corresponding relationship between the information index value and the length of the load; the information index value is used according to the preset information index value and the length of the load. The corresponding relationship determines the length of the load.
  • the MAC subheader further includes fallback indication information, and the fallback indication information is used to indicate whether to perform random access fallback.
  • the device provided in this embodiment is used to perform the operations performed by the network equipment in the random access method provided in any of the above embodiments.
  • the technical principles and technical effects are similar and will not be repeated here.
  • modules in the above device is only a division of logical functions, and may be fully or partially integrated into one physical entity in actual implementation, or may be physically separated.
  • the modules in the device can be all implemented in the form of software called by processing elements; they can also be all implemented in the form of hardware; part of the modules can also be implemented in the form of software called by the processing elements, and some of the modules can be implemented in the form of hardware.
  • each module can be a separately set up processing element, or it can be integrated in a certain chip of the device for implementation.
  • it can also be stored in the memory in the form of a program, which is called and executed by a certain processing element of the device.
  • each step of the above method or each of the above modules may be implemented by an integrated logic circuit of hardware in a processor element or implemented in a form of being called by software through a processing element.
  • the modules in any of the above devices may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (ASICs), or, one or Multiple microprocessors (digital singnal processors, DSPs), or, one or more field programmable gate arrays (Field Programmable Gate Arrays, FPGAs), or a combination of at least two of these integrated circuits.
  • ASICs application specific integrated circuits
  • DSPs digital singnal processors
  • FPGAs Field Programmable Gate Arrays
  • FPGAs Field Programmable Gate Arrays
  • the module in the device can be implemented in the form of a processing element scheduler
  • the processing element can be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call programs.
  • these modules can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • SOC system-on-a-chip
  • the above receiving module is an interface circuit of the device for receiving signals from other devices.
  • the receiving module is an interface circuit used by the chip to receive signals from other chips or devices.
  • the module used for sending above is an interface circuit of the device for sending signals to other devices.
  • the sending module is an interface circuit used by the chip to send signals to other chips or devices.
  • FIG. 16 is a schematic structural diagram of a network equipment provided in an embodiment of the application. It may be the network device in the above embodiment, and is used to implement the operation of the network device in the above embodiment.
  • the network equipment includes: an antenna 201, a radio frequency device 202, and a baseband device 203.
  • the antenna 201 is connected to the radio frequency device 202.
  • the radio frequency device 202 receives the information sent by the terminal device through the antenna 201, and sends the information sent by the terminal device to the baseband device 203 for processing.
  • the baseband device 203 processes the information of the terminal device and sends it to the radio frequency device 202
  • the radio frequency device 202 processes the information of the terminal device and sends it to the terminal device via the antenna 201.
  • the baseband device 203 may include one or more processing elements 2031, for example, a main control CPU and other integrated circuits.
  • the baseband device 203 may also include a storage element 2032 and an interface 2033.
  • the storage element 2032 is used to store programs and data; the interface 2033 is used to exchange information with the radio frequency device 202.
  • the interface is, for example, a common public radio interface. , CPRI).
  • the above apparatus for network equipment may be located in the baseband apparatus 203.
  • the above apparatus for network equipment may be a chip on the baseband apparatus 203.
  • the chip includes at least one processing element and an interface circuit, wherein the processing element is used to execute the above network For each step of any method executed by the device, the interface circuit is used to communicate with other devices.
  • the unit for the network device to implement each step in the above method can be implemented in the form of a processing element scheduler.
  • the device for the network device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the network device in the above method embodiment.
  • the storage element may be a storage element with the processing element on the same chip, that is, an on-chip storage element, or a storage element on a different chip from the processing element, that is, an off-chip storage element.
  • the unit of the network device that implements each step in the above method may be configured as one or more processing elements, and these processing elements are provided on the baseband device.
  • the processing elements here may be integrated circuits, such as one Or multiple ASICs, or, one or more DSPs, or, one or more FPGAs, or a combination of these types of integrated circuits. These integrated circuits can be integrated together to form a chip.
  • the units for the network equipment to implement each step in the above method can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • the baseband device includes the SOC chip for implementing the above method.
  • At least one processing element and storage element can be integrated in the chip, and the processing element can call the stored program of the storage element to implement the method executed by the above network device; or, at least one integrated circuit can be integrated in the chip to implement the above network The method executed by the device; or, it can be combined with the above implementations.
  • the functions of some units are implemented in the form of calling programs by processing elements, and the functions of some units are implemented in the form of integrated circuits.
  • the above apparatus for a network device may include at least one processing element and an interface circuit, wherein at least one processing element is used to execute any method executed by the network device provided in the above method embodiments.
  • the processing element can execute part or all of the steps executed by the network device in the first way: calling the program stored in the storage element; or in the second way: combining instructions through the integrated logic circuit of the hardware in the processor element Part or all of the steps performed by the network device are executed in the method; of course, part or all of the steps executed by the network device can be executed in combination with the first method and the second method.
  • the processing element here is the same as the above description, and may be a general-purpose processor, such as a CPU, or one or more integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • a general-purpose processor such as a CPU
  • integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • the storage element can be a memory or a collective term for multiple storage elements.
  • FIG. 17 is a schematic structural diagram of a terminal equipment provided in an embodiment of the application. It may be the terminal device in the above embodiment, and is used to implement the operation of the terminal device in the above embodiment.
  • the terminal equipment includes: an antenna 310, a radio frequency device 320, and a baseband device 330.
  • the antenna 310 is connected to the radio frequency device 320.
  • the radio frequency device 320 receives the information sent by the network device through the antenna 310, and sends the information sent by the network device to the baseband device 330 for processing.
  • the baseband device 330 processes the information of the terminal device and sends it to the radio frequency device 320
  • the radio frequency device 320 processes the information of the terminal device and sends it to the network device via the antenna 310.
  • the baseband device 330 may include a modem subsystem, which is used to process data at various communication protocol layers; it may also include a central processing subsystem, which is used to process terminal equipment operating systems and application layers; in addition, it may also include Other subsystems, such as multimedia subsystems, peripheral subsystems, etc., where the multimedia subsystem is used to control the terminal device camera, screen display, etc., and the peripheral subsystem is used to realize the connection with other devices.
  • the modem subsystem can be a separate chip.
  • the above apparatus for terminal equipment may be located in the modem subsystem.
  • the modem subsystem may include one or more processing elements 331, for example, a main control CPU and other integrated circuits.
  • the modem subsystem may also include a storage element 332 and an interface circuit 333.
  • the storage element 332 is used to store data and programs, but the program used to execute the method executed by the terminal device in the above method may not be stored in the storage element 332, but stored in a memory outside the modem subsystem.
  • the modem subsystem is loaded and used.
  • the interface circuit 333 is used to communicate with other subsystems.
  • the above apparatus for terminal equipment may be located in a modem subsystem, which may be implemented by a chip.
  • the chip includes at least one processing element and an interface circuit, wherein the processing element is used to perform any of the above terminal equipment executions.
  • the interface circuit is used to communicate with other devices.
  • the unit for the terminal device to implement each step in the above method can be implemented in the form of a processing element scheduler.
  • the device for the terminal device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the terminal device in the above method embodiment.
  • the storage element may be a storage element whose processing element is on the same chip, that is, an on-chip storage element.
  • the program for executing the method executed by the terminal device in the above method may be a storage element on a different chip from the processing element, that is, an off-chip storage element.
  • the processing element calls or loads a program from the off-chip storage element on the on-chip storage element to call and execute the method executed by the terminal device in the above method embodiment.
  • the unit of the terminal device that implements each step in the above method may be configured as one or more processing elements, and these processing elements are arranged on the modem subsystem, where the processing elements may be integrated circuits, For example: one or more ASICs, or, one or more DSPs, or, one or more FPGAs, or a combination of these types of integrated circuits. These integrated circuits can be integrated together to form a chip.
  • the units of the terminal device that implement each step in the above method can be integrated together and implemented in the form of a system-on-a-chip (SOC), and the SOC chip is used to implement the above method.
  • SOC system-on-a-chip
  • the chip can integrate at least one processing element and a storage element, and the processing element can call the stored program of the storage element to implement the method executed by the above terminal device; or, the chip can integrate at least one integrated circuit to implement the above terminal The method executed by the device; or, it can be combined with the above implementations.
  • the functions of some units are implemented in the form of calling programs by processing elements, and the functions of some units are implemented in the form of integrated circuits.
  • the above apparatus for terminal equipment may include at least one processing element and an interface circuit, wherein at least one processing element is used to execute any of the methods performed by the terminal equipment provided in the above method embodiments.
  • the processing element can execute part or all of the steps executed by the terminal device in the first way: calling the program stored in the storage element; or in the second way: combining instructions through the integrated logic circuit of the hardware in the processor element Part or all of the steps performed by the terminal device are executed in a manner; of course, part or all of the steps executed by the terminal device can also be executed in combination with the first manner and the second manner.
  • the processing element here is the same as the above description, and may be a general-purpose processor, such as a CPU, or one or more integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • a general-purpose processor such as a CPU
  • integrated circuits configured to implement the above method, such as: one or more ASICs, or, one or more micro-processing DSP, or, one or more FPGAs, etc., or a combination of at least two of these integrated circuit forms.
  • the storage element can be a memory or a collective term for multiple storage elements.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Conformément à des modes de réalisation, la présente invention concerne un procédé et un dispositif d'accès aléatoire. Le procédé d'accès aléatoire comprend les étapes suivantes : un dispositif terminal transmet un message à un dispositif de réseau, le message étant utilisé par le dispositif terminal lors de la demande d'un accès aléatoire au dispositif de réseau ; et le dispositif terminal reçoit, à partir du dispositif de réseau, un message de réponse au message, le message de réponse comprenant un paquet de données de couche de contrôle d'accès au support (MAC), le paquet de données de couche MAC comprenant des données utiles et un sous-en-tête MAC des données utiles, le sous-en-tête MAC comprenant des premières informations d'indication, les premières informations d'indication étant utilisées pour déterminer la longueur des données utiles. Le procédé d'accès aléatoire fourni dans les modes de réalisation de la présente invention, par fourniture des premières informations d'indication dans le sous-en-tête MAC du paquet de données de couche MAC, permet au dispositif terminal de déterminer la position de départ du paquet de données de couche MAC, mettant ainsi en œuvre la détection du message de réponse.
PCT/CN2020/079012 2019-03-28 2020-03-12 Procédé et dispositif d'accès aléatoire Ceased WO2020192441A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201910245788 2019-03-28
CN201910245788.5 2019-03-28
CN201910252477.1A CN111757537B (zh) 2019-03-28 2019-03-29 随机接入方法和装置
CN201910252477.1 2019-03-29

Publications (1)

Publication Number Publication Date
WO2020192441A1 true WO2020192441A1 (fr) 2020-10-01

Family

ID=72610214

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/079012 Ceased WO2020192441A1 (fr) 2019-03-28 2020-03-12 Procédé et dispositif d'accès aléatoire

Country Status (1)

Country Link
WO (1) WO2020192441A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120113877A1 (en) * 2009-05-15 2012-05-10 Eun Jong Lee Structure of efficient signaling header in broadband wireless access system
US20170111818A1 (en) * 2014-03-21 2017-04-20 Nokia Solutions And Networks Oy Cross reporting or empty buffers in dual connectivity
CN107113200A (zh) * 2015-01-26 2017-08-29 富士通株式会社 缓存状态报告的处理方法、装置以及通信系统
WO2018183578A1 (fr) * 2017-03-29 2018-10-04 Sharp Laboratories Of America, Inc. Procédure(s) d'accès aléatoire pour système radio

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120113877A1 (en) * 2009-05-15 2012-05-10 Eun Jong Lee Structure of efficient signaling header in broadband wireless access system
US20170111818A1 (en) * 2014-03-21 2017-04-20 Nokia Solutions And Networks Oy Cross reporting or empty buffers in dual connectivity
CN107113200A (zh) * 2015-01-26 2017-08-29 富士通株式会社 缓存状态报告的处理方法、装置以及通信系统
WO2018183578A1 (fr) * 2017-03-29 2018-10-04 Sharp Laboratories Of America, Inc. Procédure(s) d'accès aléatoire pour système radio

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CATT: "Consideration on 2-step RA", 3GPP TSG RAN WG2 MEETING AD HOC R2-1700205, 19 January 2017 (2017-01-19), XP051210789, DOI: 20200529145741X *

Similar Documents

Publication Publication Date Title
CN104854947B (zh) 用于随机接入的基站、用户设备和方法
US20220417985A1 (en) Communication method and apparatus
WO2019184956A1 (fr) Procédé et appareil d'accès aléatoire
WO2020020270A1 (fr) Procédé d'accès aléatoire, et dispositif de communication
CN110557837A (zh) 通信方法和装置
CN111757543B (zh) 一种数据传输方法及装置、终端
CN111867125B (zh) 一种随机接入方法和装置
WO2020164527A1 (fr) Procédé et appareil d'accès aléatoire
US20250193927A1 (en) Communication control method and user equipment
WO2022027238A1 (fr) Procédé de communication sans fil, équipement terminal et dispositif de réseau
WO2020221279A1 (fr) Procédé et appareil d'accès aléatoire
US20230129426A1 (en) Wireless communication method and terminal device
WO2023169580A1 (fr) Procédé de transmission de données, appareil, support de stockage, dispositif terminal et dispositif de réseau
JP2021533621A (ja) ランダムアクセス方法及び関連機器
WO2022067614A1 (fr) Procédé de communication sans fil, dispositif terminal et dispositif de réseau
WO2019014903A1 (fr) Procédé d'accès aléatoire, dispositif réseau et dispositif terminal
CN111757537B (zh) 随机接入方法和装置
CN117580188A (zh) 无线通信方法、终端设备和网络设备
WO2021022423A1 (fr) Procédé et dispositif permettant de transmettre des données
CN113573401B (zh) 通信方法、装置及系统
WO2020192441A1 (fr) Procédé et dispositif d'accès aléatoire
WO2018227510A1 (fr) Procédé de contrôle d'accès et produit associé
CN111757525B (zh) 随机接入方法和装置
WO2021120192A1 (fr) Procédé de traitement de procédure d'accès aléatoire, et dispositif terminal
RU2791244C1 (ru) Способ и устройство произвольного доступа

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20776505

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20776505

Country of ref document: EP

Kind code of ref document: A1