WO2022193258A1 - Procédé et appareil d'accès aléatoire, terminal, et support de stockage - Google Patents
Procédé et appareil d'accès aléatoire, terminal, et support de stockage Download PDFInfo
- Publication number
- WO2022193258A1 WO2022193258A1 PCT/CN2021/081637 CN2021081637W WO2022193258A1 WO 2022193258 A1 WO2022193258 A1 WO 2022193258A1 CN 2021081637 W CN2021081637 W CN 2021081637W WO 2022193258 A1 WO2022193258 A1 WO 2022193258A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- rach
- slice
- random access
- information
- specific
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
Definitions
- the present application relates to the field of mobile communications, and in particular, to a random access method, device, terminal and storage medium.
- the Radio Access Network needs to enhance how to support vertical services in the access network. For example, based on network slicing, it provides lower latency, more targeted, more flexible and more scalable services for multiple services with different requirements.
- the embodiments of the present application provide a random access method, apparatus, terminal, and storage medium, where a user equipment (User Equipment, UE) can choose to use a random access channel (Random Access Channel, RACH) resource configured in a system information block, Alternatively, use the RACH resources configured in dedicated signaling.
- a user equipment User Equipment, UE
- RACH Random Access Channel
- a random access method comprising:
- SIB System Information Block
- a random access procedure is performed using the first RACH information and/or the second RACH information.
- a random access method comprising:
- a random access procedure is performed using one set of RACH configuration parameters in the at least two sets of RACH configuration parameters.
- a random access device comprising:
- a receiving module configured to receive the first RACH information in the system information block; and, receive the second RACH information in the dedicated signaling;
- a random access module configured to use the first RACH information and/or the second RACH information to perform a random access procedure.
- a random access device comprising:
- a receiving module configured to obtain at least two groups of RACH configuration parameters of the random access channel, where the at least two groups of RACH configuration parameters are configured by a system information block and/or dedicated signaling;
- the random access module is configured to use a set of RACH configuration parameters in the at least two sets of RACH configuration parameters to perform a random access procedure when a trigger condition is satisfied.
- a terminal comprising: a processor; a transceiver connected to the processor; a memory for storing executable instructions of the processor; wherein the processing The processor is configured to load and execute the executable instructions to implement the random access method as described in the above aspects.
- a computer-readable storage medium is provided, and executable instructions are stored in the computer-readable storage medium, and the executable instructions are loaded and executed by a processor to implement the above-mentioned aspects. random access method.
- a computer program product or computer program comprising computer instructions stored in a computer-readable storage medium, the processor of the computer device being readable from the computer
- the storage medium reads the computer instructions, and the processor executes the computer instructions, so that the computer device executes the random access method described in the above aspects.
- a chip is provided, the chip includes a programmable logic circuit or a program, and the chip is configured to implement the random access method described in the above aspect.
- the UE selects the first RACH information and/or the second RACH information to perform the random access process, so that the UE can better
- the random access process is performed by using RACH resources suitable for itself in different RACH information, so as to reduce the time-consuming of the random access process or improve the success rate of the random access process.
- FIG. 1 is a schematic diagram of a communication system provided by an exemplary embodiment of the present application
- FIG. 2 is a schematic diagram of a four-step random access process provided by an exemplary embodiment of the present application
- FIG. 3 is a schematic diagram of a two-step random access process provided by an exemplary embodiment of the present application.
- FIG. 4 is a flowchart of a random access method provided by an exemplary embodiment of the present application.
- FIG. 5 is a flowchart of a random access method provided by an exemplary embodiment of the present application.
- FIG. 6 is a flowchart of a random access method provided by an exemplary embodiment of the present application.
- FIG. 7 is a flowchart of a random access method provided by an exemplary embodiment of the present application.
- FIG. 8 is a flowchart of a random access method provided by an exemplary embodiment of the present application.
- FIG. 9 is a flowchart of a random access method provided by an exemplary embodiment of the present application.
- FIG. 10 is a flowchart of a priority determination method or a conflict resolution method provided by an exemplary embodiment of the present application.
- FIG. 11 is a flowchart of a priority determination method or a conflict resolution method provided by an exemplary embodiment of the present application.
- FIG. 12 shows a flowchart of a data transmission method provided by an exemplary embodiment of the present application.
- FIG. 13 is a structural block diagram of a random access apparatus provided by an exemplary embodiment of the present application.
- FIG. 14 is a block diagram of a priority determination device or a conflict resolution device or a data transmission device provided by an exemplary embodiment of the present application;
- FIG. 15 is a schematic structural diagram of a terminal provided by an exemplary embodiment of the present application.
- the "instruction" mentioned in the embodiments of the present application may be a direct instruction, an indirect instruction, or an associated relationship.
- a indicates B it can indicate that A directly indicates B, for example, B can be obtained through A; it can also indicate that A indicates B indirectly, such as A indicates C, and B can be obtained through C; it can also indicate that there is an association between A and B relation.
- corresponding may indicate that there is a direct or indirect corresponding relationship between the two, or may indicate that there is an associated relationship between the two, or indicate and be instructed, configure and be instructed configuration, etc.
- predefinition may be implemented by pre-saving corresponding codes, forms, or other means that can be used to indicate relevant information in devices (for example, including terminal devices and network devices).
- the implementation method is not limited.
- predefined may refer to the definition in the protocol.
- FIG. 1 shows a schematic diagram of a system architecture provided by an embodiment of the present application.
- the system architecture may include: a terminal 10 and a network device 20 .
- the number of terminals 10 is usually multiple, and one or more terminals 10 may be distributed in a cell managed by each network device 20 .
- the terminal 10 may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to the wireless modem, as well as various forms of user equipment (User Equipment, UE), mobile stations ( Mobile Station, MS) and so on.
- UE User Equipment
- MS Mobile Station
- the network device 20 is a device deployed in the access network to provide the terminal 10 with a wireless communication function.
- the network device 20 may include various forms of macro base stations, micro base stations, relay stations, access points, and the like.
- the names of devices with network device functions may be different, for example, in 5G NR systems, they are called gNodeBs or gNBs.
- gNodeBs As communications technology evolves, the name "network equipment" may change.
- network devices For the convenience of description, in the embodiments of the present application, the above-mentioned apparatuses for providing a wireless communication function for the terminal 10 are collectively referred to as network devices.
- the "5G NR system" in the embodiments of the present disclosure may also be referred to as a 5G system or an NR system, but those skilled in the art can understand its meaning.
- the technical solutions described in the embodiments of the present disclosure may be applicable to the 5G NR system, and may also be applicable to the subsequent evolution system of the 5G NR system.
- the random access procedure shown in FIG. 2 is divided into four steps. The detailed steps are as follows:
- the terminal sends Msg1 (Message 1, message 1) to the network device.
- the terminal selects a PRACH (Physical Random Access Channel, physical random access channel) resource, and sends the selected preamble (preamble) on the selected PRACH.
- PRACH Physical Random Access Channel
- preamble the selected preamble
- the PRACH resource and preamble can be specified by the network device.
- the network device can estimate the uplink Timing (timing) and the grant (scheduling) size required by the terminal to transmit Msg3 (Message 3, Message 3).
- the network device sends an RAR (Random Access Response, random access response) to the terminal.
- RAR Random Access Response, random access response
- RA-RNTI Random Access Radio Network Temporary Identifier, random access wireless network temporary identifier
- RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id;
- the RA-RNTI is related to the PRACH time-frequency resource used by the UE to send the Msg1.
- the terminal After the terminal successfully receives the PDCCH scrambled by the RA-RNTI, the terminal can obtain the PDSCH scheduled by the PDCCH, which includes the RAR (random access response), and the RAR specifically includes the following information:
- the subheader (packet header) of RAR contains BI, which is used to indicate the fallback time of retransmission of Msg1;
- RAPID in RAR The network device responds to the received preamble index (preamble indication);
- the payload of RAR contains TAG, which is used to adjust the uplink timing
- UL grant Uplink grant, uplink scheduling: used to schedule the uplink resource indication of Msg3;
- Temporary C-RNTI Temporary Cell Radio Network Temporary Identifier, Temporary Cell Radio Network Temporary Identifier: used to scramble the PDCCH (initial access) of Msg4.
- RAR-RNTI Random Access Response Radio Network Temporary Identifier, random access response wireless network temporary identifier
- the terminal transmits the Msg3 on the network equipment scheduling resource.
- Msg3 is mainly used to notify the network device what event triggers the RACH (Random Access Channel, random access channel) process. For example, if it is an initial access random process, the UE identity and establishment cause (establishment cause) will be carried in Msg3; if it is RRC reestablishment, the connected UE identity and establishment cause will be carried.
- RACH Random Access Channel, random access channel
- the network device sends Msg4 to the terminal.
- Msg4 has two functions, one is for contention conflict resolution, and the other is for the network device to transmit an RRC configuration message to the terminal. There are two ways to resolve contention conflicts: one is that if the UE carries a C-RNTI (Cell Radio Network Temporary Identifier, cell wireless network temporary identifier) in Msg3, then Msg4 is scheduled with a PDCCH scrambled by C-RNTI.
- C-RNTI Cell Radio Network Temporary Identifier, cell wireless network temporary identifier
- Msg4 uses TC-RNTI (Temporary Cell Radio Network Temporary Identifier, temporary cell radio network temporary identifier) scrambled PDCCH scheduling, conflicting
- TC-RNTI Temporary Cell Radio Network Temporary Identifier, temporary cell radio network temporary identifier
- the UE receives the PDSCH (Physical Downlink Shared Channel, Physical Downlink Shared Channel) of Msg4, and matches the CCCH SDU (Common Control Channel Service Data Unit) in the PDSCH.
- PDSCH Physical Downlink Shared Channel
- CCCH SDU Common Control Channel Service Data Unit
- the two-step random access method can improve the delay and reduce the signaling overhead at the same time.
- msgA is used to transmit msg1+msg3 of the four-step random access method
- msgB is used to transmit the msg2+msg4 of the four-step random access method.
- RACH resource is configured in a radio resource control release (RRC release) message in the related art.
- RRC release radio resource control release
- the UE has a problem of selecting the RACH resource configured in the SIB or the RACH resource in the dedicated (dedicated) RRC. Accordingly, the following examples are provided:
- FIG. 4 shows a flowchart of a random access method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being executed by a terminal. The method includes:
- Step 420 Receive the first RACH information in the system information block
- the first RACH information is configured with a first RACH resource.
- the first RACH information is broadcast by the access network device of the first cell, or the first RACH information is broadcast by the access network device of the second cell.
- the first cell is the cell where the terminal resides.
- the first cell is the cell where the terminal is camping before handover
- the second cell is the cell where the terminal is camping after the handover.
- the first cell is the cell where the terminal resides before the reselection
- the second cell is the cell where the terminal resides after the reselection.
- the first RACH information is configured with a first RACH resource.
- the system information block is also called system broadcast or broadcast.
- the system information block is SIB1; or, the system information block is other SIBs except SIB1.
- the first RACH information is carried in SIB1
- other broadcast information is carried in other SIBs.
- the system information block includes: at least one type of range information from the valid range (or use range) corresponding to the first RACH information, a cell, an area, a PLMN, a registration area, and a tracking area.
- the representation of the above range information includes but is not limited to: cell identification, frequency identification, RAN notification area, RAN area code, tracking area code, public land mobile network ( At least one of the Public Land Mobile Network, PLMN) identities.
- the system information block includes: at least one of slice information, time-frequency resources of RACH, and random access preamble.
- the slice information includes: a slice identifier, a corresponding relationship between the slice and the first RACH resource, and the like.
- the slice identifier may also be a slice group identifier, or a slice identifier or a parameter corresponding to the slice group identifier, or a specific parameter (corresponding to slice information) or a specified parameter or a predetermined parameter, or It can be a slice/service type (Slice/Service Type, SST), a slice index (index) or a slice group index, or an access category (access category), etc.
- SST slice/service type
- index index
- access category access category
- the slice information may also include (common) frequency point priority information for slices and/or non-slices.
- the slice information is information supported by the cell and/or neighboring cells.
- the corresponding behavior may be at least one of the following: for the slice that provides services to the UE, the UE may initiate or complete the registration correspondingly, and the UE may establish For a corresponding protocol data unit (Protocol Data Unit, PDU) session, the UE can establish a corresponding air interface resource, such as a data radio bearer (DRB), and the UE can activate the user plane accordingly.
- PDU Protocol Data Unit
- DRB data radio bearer
- the corresponding behavior can be at least one of the following: 1: For slices that are not serving the UE, the UE can initiate or complete the registration but the registration fails, the UE cannot initiate or complete the registration, the UE cannot trigger or establish the corresponding PDU session, the UE can establish the corresponding PDU session but does not Support data transmission, UE cannot establish corresponding air interface resources (such as DRB), UE can establish corresponding air interface resources (such as DRB) but does not support data transmission, UE can activate user plane correspondingly but does not support data transmission, UE cannot The corresponding active user plane.
- the system information block further includes: a priority parameter.
- the priority parameter includes at least one of Backoff Indicator (BI) information and power boost information.
- the BI information may be a BI adjustment factor
- the power ramping information may be a power ramping step.
- the priority parameters include slice-for-slice and/or non-slice-for-slice (common).
- the priority parameters include slice-for-slice and/or non-slice-for-slice (common).
- the first RACH information includes: a first RACH configuration, where the first RACH configuration is used to configure at least one RACH configuration parameter among RACH resources, RACH types, and RACH priorities.
- the RACH resources include: at least one of RACH time-frequency resources, random access opportunities, and random access preambles. For example, random access opportunity (RACH Occasion, RO) and/or random access preamble.
- RACH Occasion, RO random access opportunity
- one RO includes 64 random access preambles, and at most 8 such ROs can be arranged simultaneously in the frequency domain.
- system information block further includes: first indication information, used to indicate whether to use the second RACH information to override (override) the first RACH information.
- the first RACH configuration is used to configure at least two sets of RACH configuration parameters
- the first RACH information further includes: a selection threshold used to select at least two sets of RACH configuration parameters.
- the selection threshold includes at least one of the following:
- a first threshold a threshold for selecting between public RACH and slice-specific RACH
- the slice-specific RACH resource is selected if the channel quality is higher than the first threshold; if the channel quality is lower than the first threshold, the public RACH resource is selected.
- the second threshold used to select the threshold of 2-step slice-specific RACH between two sets of RACH resources
- the slice-specific RACH resources of the 2-step RACH are selected; if the channel quality is lower than the second threshold, the RACH resources corresponding to the 2-step or 4-step RACH are selected.
- the "2-step slice-specific RACH” is an abbreviation for slice-specific RACH resources of the 2-step RACH.
- a third threshold a threshold for selecting between 2-step slice-specific RACH and 4-step slice-specific RACH
- the slice-dedicated RACH resources of the 2-step RACH are selected; if the channel quality is lower than the third threshold, the slice-dedicated RACH resources of the 4-step RACH are selected.
- the "4-step slice-specific RACH” is an abbreviation for slice-specific RACH resources of the 4-step RACH.
- a fourth threshold a threshold for selecting between 2-step slice-specific RACH and 2-step RACH
- the slice-specific RACH resources of the 2-step RACH are selected; if the channel quality is lower than the fourth threshold, the RACH resources corresponding to the 2-step RACH are selected.
- a fifth threshold used to select a slice-specific RACH threshold between two sets of RACH resources
- the slice-specific RACH resource is selected; if the channel quality is lower than the fifth threshold, the RACH resource corresponding to the 2-step or 4-step RACH is selected.
- a sixth threshold a threshold for selecting between 4-step slice-specific RACH and 4-step RACH.
- the slice-specific RACH resources of the 4-step RACH are selected; if the channel quality is lower than the sixth threshold, the RACH resources corresponding to the 4-step RACH are selected.
- any two of the above-mentioned six thresholds may be the same or different.
- the first RACH configuration is used to configure at least two sets of RACH configuration parameters
- the first RACH information further includes: a selection indication used to select at least two sets of RACH configuration parameters.
- the selection indication includes at least one of the following:
- the third indication information is used to indicate the selection of 2-step slice-specific RACH or slice-specific RACH between two sets of RACH resources;
- the fourth indication information for selecting the common RACH between the common RACH and the slice-specific RACH is the fourth indication information for selecting the common RACH between the common RACH and the slice-specific RACH
- the fifth indication information is used to indicate the selection of a 2-step slice-specific RACH or a RACH other than the slice-specific RACH between the two groups of RACH resources;
- the sixth indication information is used to indicate the threshold for selecting the 2-step slice-specific RACH between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- the seventh indication information is used to indicate the threshold for selecting the 4-step slice-specific RACH between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- Eighth indication information used to indicate the selection of 4-step slice-specific RACH or slice-specific RACH between two sets of RACH resources;
- the ninth indication information is used to indicate that the 2-step slice-specific RACH is selected between the 2-step slice-specific RACH and the 2-step slice-specific RACH;
- the tenth indication information is used to indicate that the 2-step RACH is selected between the 2-step slice dedicated RACH and the 2-step RACH;
- Eleventh indication information used to indicate that the 4-step slice-specific RACH is selected between the 4-step slice-specific RACH and the 4-step slice-specific RACH;
- the twelfth indication information is used to indicate that the 4-step RACH is selected between the 4-step slice-specific RACH and the 4-step RACH.
- the first RACH configuration is used to configure at least two sets of RACH configuration parameters
- the first RACH information further includes: selection conditions used to select the at least two sets of RACH configuration parameters.
- the selection condition includes at least one of the following:
- a designated slice refers to one or more designated slices in a plurality of slices.
- the requirement slice refers to the slice expected to be used by the terminal, or the slice required to be used.
- the demand slice is not the slice that the terminal is using.
- a specified type of slice refers to one or several types of slices specified in multiple types of slices.
- the public RACH is selected
- the terminal does not support slicing, select non-slicing dedicated RACH or public RACH or 2-step RACH or 4-step RACH;
- the slice used by the terminal is the same as the slice supported by the network, select the slice-specific RACH or the 2-step slice-specific RACH or the 4-step slice-specific RACH;
- the network supports slicing, select the dedicated RACH for slicing or the dedicated RACH for 2-step slicing or the dedicated RACH for 4-step slicing;
- Different slice information includes at least one of: different supported slice identifiers, different correspondences between slices and RACH resources, different correspondences between slices and frequencies, different correspondences between slices and frequency priorities, and different RACH information.
- the predetermined version is the R17 version of the Third Generation Partnership Project (3GPP).
- 3GPP Third Generation Partnership Project
- the random access procedure is a contention random access procedure
- the random access procedure is a non-contention random access procedure
- the random access procedure is a contention random access procedure
- the random access procedure is a non-contention random access procedure
- the random access procedure is a non-contention random access procedure
- the random access procedure is a contention random access procedure
- a group of RACH configuration parameters can be selected from at least two groups of RACH configuration parameters to perform the random access process.
- the RACH configuration parameters include: at least one configuration parameter among RACH time-frequency resources, RACH type, RACH priority, random access opportunity, and random access preamble.
- Step 440 Receive the second RACH information in the dedicated signaling
- the second RACH information is configured with second RACH resources.
- the second RACH information is sent by the access network device of the first cell, or the second RACH information is sent by the access network device of the second cell.
- the first cell is the cell where the terminal resides.
- the first cell is the cell where the terminal is camping before handover
- the second cell is the cell where the terminal is camping after the handover.
- the dedicated signaling includes: dedicated radio resource control (Radio Resource Control, RRC) message;
- RRC Radio Resource Control
- the dedicated RRC message includes: an RRC reconfiguration (RRC Reconfiguration) message, or an RRC release (Release) message.
- the dedicated signaling includes: valid duration or usage duration corresponding to the second RACH information.
- the valid duration includes: starting from the first time unit, or starting from the first time unit and ending with the second time unit.
- the first timer is valid before expiration, for example, the first timer is a new timer or the first timer is a T320 timer.
- the dedicated signaling includes: at least one type of range information from a valid range (or use range) corresponding to the second RACH information, a cell, an area, a PLMN, a registration area, and a tracking area.
- the representation of the above range information includes but is not limited to: cell identification, frequency identification, RAN notification area, RAN area code, tracking area code, public land mobile network ( At least one of the Public Land Mobile Network, PLMN) identities.
- the dedicated signaling includes: at least one of slice information, time-frequency resources of RACH, and random access preamble.
- the slice information includes: a slice identifier, a correspondence between slices and the second RACH resource, and the like.
- the slice identifier may also be a slice group identifier, or a slice identifier or a parameter corresponding to the slice group identifier, or a specific parameter (corresponding to slice information) or a specified parameter or a predetermined parameter, or It can be a slice/service type (Slice/Service type, SST), a slice index (index) or a slice group index, or an access category (access category), etc.
- SST slice/service type
- index index
- access category access category
- the slice information may also include (common) frequency bin priority information for slices and/or non-slices.
- the slice information is information supported by the cell and/or neighboring cells.
- the corresponding behavior may be at least one of the following: for the slice that provides services to the UE, the UE may initiate or complete the registration correspondingly, and the UE may establish For a corresponding protocol data unit (Protocol Data Unit, PDU) session, the UE can establish corresponding air interface resources, such as a data radio bearer (Data Radio Bearer, DRB), and the UE can activate the user plane correspondingly.
- PDU Protocol Data Unit
- DRB data Radio Bearer
- the corresponding behavior can be at least one of the following: 1: For slices that are not serving the UE, the UE can initiate or complete the registration but the registration fails, the UE cannot initiate or complete the registration, the UE cannot trigger or establish the corresponding PDU session, the UE can establish the corresponding PDU session but does not Support data transmission, UE cannot establish corresponding air interface resources (such as DRB), UE can establish corresponding air interface resources (such as DRB) but does not support data transmission, UE can activate user plane correspondingly but does not support data transmission, UE cannot The corresponding active user plane.
- the dedicated signaling further includes: a priority parameter.
- the priority parameter includes at least one of BI information and power boost information.
- the BI information may be a BI adjustment factor
- the power boost information may be a power boost step size.
- the priority parameters include slice-for-slice and/or non-slice-for-slice (common).
- the second RACH information includes: a second RACH configuration, where the second RACH configuration is used to configure at least one RACH configuration parameter among RACH resources, RACH types, and RACH priorities.
- the RACH resources include: at least one of RACH time-frequency resources, random access opportunities, and random access preambles.
- the second RACH configuration is used to configure at least two sets of RACH configuration parameters, and the second RACH information further includes at least one of the following:
- Selection threshold for selecting at least two sets of RACH configuration parameters See step 420 for a specific example of selecting the threshold.
- the second RACH configuration includes at least two groups, and the second RACH information further includes:
- Selection indication for selecting at least two sets of RACH configuration parameters See step 420 for a specific example of the selection indication.
- the second RACH configuration includes at least two groups, and the second RACH information further includes:
- Selection criteria for selecting at least two sets of RACH configuration parameters See step 420 for specific examples of selection conditions.
- the dedicated signaling further includes: first indication information, used to indicate whether to use the second RACH information to cover the first RACH information.
- a group of RACH configuration parameters can be selected from at least two groups of RACH configuration parameters to perform the random access process.
- the RACH configuration parameters include: at least one configuration parameter among RACH time-frequency resources, random access opportunity, random access preamble, RACH priority and RACH type.
- Step 420 may be executed before step 440, may be executed after step 440, or may be executed simultaneously with step 440, which is not limited.
- Step 460 Use the first RACH information and/or the second RACH information to perform a random access procedure.
- the terminal selects or uses the first RACH information and/or the second RACH information to perform a random access procedure.
- the terminal selects or uses the first RACH information and/or the second RACH information according to an instruction of the network to perform a random access procedure.
- This step includes but is not limited to at least one of the following implementations:
- the terminal uses the first RACH information to perform a random access procedure.
- the terminal ignores the second RACH information in the dedicated signaling, and/or considers that the first RACH information in the SIB has a higher priority, and/or only applies the second RACH information in the dedicated signaling.
- the dedicated signaling is an RRC reconfiguration message about synchronization
- the terminal considers that the second RACH information in the dedicated signaling has a high priority.
- the dedicated signaling is an RRC release message
- the terminal considers that the priority of the first RACH information is high.
- the terminal uses the second RACH information to perform a random access procedure.
- the terminal ignores the first RACH information in the SIB, and/or considers that the second RACH information in the dedicated signaling has a higher priority, and/or only applies the second RACH information in the dedicated signaling.
- the dedicated signaling is an RRC reconfiguration message about synchronization
- the terminal considers that the second RACH information in the dedicated signaling has a high priority.
- the terminal selects or uses the first RACH information to perform a random access procedure.
- the terminal selects or uses the second RACH information to perform a random access procedure.
- the terminal selects or uses the first RACH information and the second RACH information to perform a random access procedure.
- the random access procedure is performed using the selection threshold or selection indication or selection condition configured in the first RACH information and the RACH resources configured in the second RACH information.
- the terminal uses one set of RACH configuration parameters from at least two sets of RACH configuration parameters according to slice information or support for network slicing.
- At least two sets of RACH configuration parameters are configured by the first RACH information; or, at least two sets of RACH configuration parameters are configured by the second RACH information; or, at least two sets of RACH configuration parameters are configured by the first RACH information and the second RACH information
- the RACH information is configured, that is, the first RACH information is configured with a part of at least two sets of RACH configuration parameters, and the second RACH information is configured with the remaining part of at least two sets of RACH configuration parameters.
- the terminal selects the first RACH information and/or the second RACH information to The random access process is performed, so that the terminal can better utilize the RACH resources suitable for itself in different RACH information to perform the random access process, thereby reducing the time-consuming of the random access process or improving the success rate of the random access process.
- FIG. 5 shows a flowchart of a random access method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being executed by a terminal. The method includes:
- Step 420 Receive the first RACH information in the system information block
- the first RACH information is configured with a first RACH resource. Step 420 in the embodiment of FIG. 4 is described, and details are not repeated here.
- Step 440 Receive the second RACH information in the dedicated signaling
- the second RACH information is configured with second RACH resources. Step 440 in the embodiment of FIG. 4 is described, and details are not repeated here.
- Step 462 Under the condition that the first condition is satisfied, use the first RACH information to perform a random access procedure;
- This step includes but is not limited to at least one of the following implementations:
- Mode 1 When the priority of the first RACH information is higher than the priority of the second RACH information, use the first RACH information to perform a random access procedure;
- the first RACH information is preferentially used, and/or the first RACH information is applied, and a random access procedure is performed.
- the first RACH information is preferentially used, and/or the first RACH information is applied, and a random access procedure is performed.
- the random access process is performed using the first RACH information; in the second time period (the valid time of the second RACH information), the random access process is performed using the second RACH information.
- the first indication information is used to indicate that when the first RACH information is always used preferentially, the random access procedure is performed using the first RACH information.
- Manner 5 According to the support of the terminal device or the access network device for network slicing, use the first RACH information to perform a random access procedure;
- the SIB or dedicated signaling of the first cell carries RACH parameters other than traditional RACH parameters, but the second cell does not carry RACH parameters other than traditional RACH parameters. of the first RACH information to perform a random access procedure.
- the random access procedure is performed using the first RACH information without being within the coverage or service range of the cell or base station that sends the second RACH information.
- the terminal is located outside the coverage or service range of the cell or base station that sends the second RACH information, and uses the first RACH information to perform the random access procedure.
- the terminal uses the first RACH information to perform random
- the access process enables the terminal to better utilize the RACH resources suitable for itself in different RACH information to perform the random access process, thereby reducing the time-consuming of the random access process or improving the success rate of the random access process.
- FIG. 6 shows a flowchart of a random access method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being executed by a terminal. The method includes:
- Step 420 Receive the first RACH information in the system information block
- the first RACH information is configured with a first RACH resource. Step 420 in the embodiment of FIG. 4 is described, and details are not repeated here.
- Step 440 Receive the second RACH information in the dedicated signaling
- the second RACH information is configured with second RACH resources. Step 440 in the embodiment of FIG. 4 is described, and details are not repeated here.
- Step 464 When the second condition is satisfied, use the second RACH information to perform a random access procedure.
- This step includes but is not limited to at least one of the following implementations:
- Manner 1 When the priority of the second RACH information is higher than the priority of the first RACH information, use the second RACH information to perform a random access procedure.
- Mode 2 When belonging to the valid time of the second RACH information, or belonging to the valid range of the second RACH, or belonging to the valid time and valid range of the second RACH information, use the second RACH information to perform a random access procedure;
- Manner 3 When the first indication information is used to indicate that the second RACH information is used preferentially, use the second RACH information to perform a random access procedure;
- Mode 4 When the slice information in the first RACH information or the second RACH information is different, and/or belong to the valid time and/or valid range of the second RACH information, use the second RACH information to perform random access process;
- Manner 5 According to the support of the terminal device or the access network device for network slicing, use the second RACH information to perform a random access procedure.
- the traditional base station sends the SIB
- the enhanced base station B that sends the dedicated signaling performs the random access procedure according to the second RACH information configured by the dedicated signaling.
- the RRC release message carries the second RACH information, and the random access procedure is performed according to the second RACH information.
- the SIB or dedicated signaling of the first cell carries RACH parameters other than traditional RACH parameters, but the second cell does not carry RACH parameters other than traditional RACH parameters.
- the second RACH information in the signaling performs the random access procedure.
- Manner 6 Within the coverage or service range of the cell or base station that sends the second RACH information, use the second RACH information to perform a random access procedure.
- the cell that sends the second RACH information is the cell where the terminal resides, the terminal is located within the coverage of the cell, and the random access procedure is performed using the second RACH information.
- the terminal uses the second RACH information to perform random
- the access process enables the terminal to better utilize the RACH resources suitable for itself in different RACH information to perform the random access process, thereby reducing the time-consuming of the random access process or improving the success rate of the random access process.
- FIG. 7 shows a flowchart of a random access method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being executed by a terminal. The method includes:
- Step 420 Receive the first RACH information in the system information block
- the first RACH information is configured with a first RACH resource. Step 420 in the embodiment of FIG. 4 is described, and details are not repeated here.
- Step 440 Receive the second RACH information in the dedicated signaling
- the second RACH information is configured with second RACH resources. Step 440 in the embodiment of FIG. 4 is described, and details are not repeated here.
- Step 466 When the third condition is satisfied, use the first RACH information and the second RACH information to perform a random access procedure.
- the first RACH information includes at least two sets of RACH configuration parameters
- the second RACH information includes selection information of RACH configuration parameters
- randomization is performed using at least two sets of RACH configuration parameters and selection information of RACH configuration parameters. access process.
- the randomization is performed using at least two sets of RACH configuration parameters and selection information of RACH configuration parameters. access process.
- the selection information includes at least one of a selection threshold, a selection instruction and a selection condition.
- the selection information is used to select target configuration parameters from at least two groups of RACH configuration parameters.
- the target configuration parameters include, but are not limited to, at least one of RACH time-frequency resources, random access opportunity, random access preamble, RACH type, and RACH priority.
- the terminal uses the first RACH information and the second RACH information according to the currently satisfied trigger conditions.
- the random access process is performed with two RACH information, so that the terminal can better utilize the RACH resources suitable for itself in different RACH information to perform the random access process, reduce the time-consuming of the random access process or improve the success rate of the random access process.
- the terminal uses one set of RACH configurations in the at least two sets of RACH configurations to perform an embodiment of the random access procedure:
- FIG. 8 shows a flowchart of a random access method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being executed by a terminal. The method includes:
- Step 420 Receive the first RACH information in the SIB
- the first RACH information is configured with the first RACH configuration. Step 420 in the embodiment of FIG. 4 is described, and details are not repeated here.
- Step 440 Receive the second RACH information in the dedicated signaling
- the second RACH information is configured with a second RACH configuration. Step 440 in the embodiment of FIG. 4 is described, and details are not repeated here.
- Step 468 Under the condition that the trigger condition is satisfied, use one set of RACH configuration parameters from at least two sets of RACH configuration parameters to perform the random access procedure.
- the at least two sets of RACH configuration parameters may also be referred to as: at least two sets of RACH configurations, or at least two sets of RACH types.
- at least two sets of RACH configuration parameters are configured by the first RACH information; or, at least two sets of RACH configuration parameters are configured by the second RACH information; or, at least two sets of RACH configuration parameters are configured by the first RACH information and the second RACH information.
- RACH information is configured.
- the at least two sets of RACH configuration parameters include at least two of the following:
- Non-slicing dedicated RACH
- the slice-specific RACH includes: at least one of a 2-step slice-specific RACH and a 4-step slice-specific RACH.
- the non-slice dedicated RACH includes at least one of a 2-step RACH and a 4-step RACH.
- This step includes but is not limited to at least one of the following implementations:
- At least two sets of RACH configuration parameters include slice-specific RACH and public RACH;
- Slice-specific RACH is a RACH resource dedicated to network slicing.
- RACH resources dedicated to all network slices slice dedicated RACH dedicated to 2-step random access process (referred to as 2-step slice dedicated RACH), dedicated to 4-step random access process slice dedicated RACH (referred to as 4-step slice dedicated RACH) RACH).
- Common RACH refers to non-dedicated RACH resources.
- the terminal uses the slice-specific RACH to perform the random access procedure; or, when the fifth condition is met, the terminal uses the common RACH to perform the random access procedure.
- the fourth condition includes at least one of the following:
- the terminal uses slices of the specified type
- the slice used by the terminal is the same as the slice supported by the network
- the demand slice of the terminal is the same as the network support slice;
- ⁇ The version of the communication protocol supported by the terminal is higher than or equal to the predetermined version
- the channel quality is above a first threshold, which is a threshold for selecting between common RACH and slice-specific RACH;
- the channel quality is higher than a second threshold, which is a threshold for selecting a 2-step slice dedicated RACH between two sets of RACH resources;
- the second indication information is used to indicate that the slice-specific RACH is selected between the common RACH and the slice-specific RACH;
- third indication information is used to indicate the selection of a 2-step slice-specific RACH or a slice-specific RACH between the two groups of RACH resources;
- the random access process is a contention random access process
- the channel quality is higher than a fifth threshold, which is a threshold for selecting slice-specific RACH between two sets of RACH resources.
- the fifth condition includes at least one of the following:
- the terminal does not support slicing
- the terminal does not use the specified slice
- the terminal does not use slices of the specified type
- the slice used by the terminal is different from the slice supported by the network
- the demand slice of the terminal is different from the network support slice
- ⁇ The version of the communication protocol supported by the terminal is lower than the predetermined version
- the channel quality is below a first threshold, which is a threshold for selecting between common RACH and slice-specific RACN;
- the channel quality is lower than a second threshold, the second threshold is a threshold for selecting a 2-step slice dedicated RACH between two sets of RACH resources;
- fourth indication information where the fourth indication information is used to indicate that the common RACH is selected between the common RACH and the slice-specific RACH;
- the fifth indication information is used to indicate the selection of a 2-step slice-specific RACH or a RACH other than the slice-specific RACH between the two groups of RACH resources;
- Random access using 2-step slice-specific RACH fails, and 4-step slice-specific RACH is not configured;
- the random access process is a non-contention random access process
- the channel quality is below a fifth threshold, which is a threshold for selecting slice-specific RACH between two sets of RACH resources.
- the terminal uses the slice-specific RACH to perform a random access procedure.
- the terminal supports slice 1, the RACH corresponding to slice 1 is configured in the second RACH information, the common RACH is configured in the first RACH information, and the terminal selects the RACH configured in the second RACH information.
- the terminal uses the slice-specific RACH to perform a random access procedure.
- the terminal uses the slice-specific RACH to perform a random access procedure. For example, the terminal supports slice 1, the RACH corresponding to slice or slice 1 is not configured in the second RACH information, the RACH corresponding to the slice information is configured in the first RACH information, and the terminal selects the RACH configured in the first RACH information.
- the terminal uses the slice-specific RACH to perform a random access procedure. For example, the terminal supports slice 1, the first RACH information does not configure the RACH corresponding to the slice or slice 1, the second RACH information configures the RACH corresponding to the slice information, and the terminal selects the RACH configured in the second RACH information.
- the terminal uses the slice-specific RACH to perform a random access procedure.
- the terminal supports slice 1
- the second RACH information is configured with the RACH corresponding to slice 1
- the second RACH information satisfies the valid duration and/or the valid area
- the terminal selects the RACH indicated in the dedicated information.
- At least two sets of RACH configuration parameters include 2-step slice-specific RACH and 4-step slice-specific RACH;
- the terminal uses the 2-step slice-specific RACH to perform the random access procedure; or, when the seventh condition is satisfied, the terminal uses the 4-step slice-specific RACH to perform the random access procedure.
- the sixth condition includes at least one of the following:
- the terminal uses slices of the specified type
- the slice used by the terminal is the same as the slice supported by the network
- the demand slice of the terminal is the same as the network support slice;
- ⁇ The version of the communication protocol supported by the terminal is higher than or equal to the predetermined version
- the channel quality is higher than a second threshold, which is a threshold for selecting a 2-step slice dedicated RACH between two sets of RACH resources;
- the channel quality is above a third threshold, which is a threshold for selecting between a 2-step slice-specific RACH and a 4-step slice-specific RACH;
- the sixth indication information is used to indicate that the 2-step slice-specific RACH is selected between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- third indication information is used to indicate the selection of a 2-step slice-specific RACH or a slice-specific RACH between the two groups of RACH resources;
- the random access procedure is a contention random access procedure.
- the seventh condition includes at least one of the following:
- the terminal does not use slices of the specified type
- the slice used by the terminal is different from the slice supported by the network
- the demand slice of the terminal is different from the network support slice
- ⁇ The version of the communication protocol supported by the terminal is lower than the predetermined version
- the channel quality is lower than a second threshold, the second threshold is a threshold for selecting a 2-step slice dedicated RACH between two sets of RACH resources;
- the channel quality is below a third threshold, the second threshold being a threshold for selecting between a 2-step slice-specific RACH and a 4-step slice-specific RACH;
- the seventh indication information is used to indicate that the 4-step slice-specific RACH is selected between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- the eighth indication information is used to indicate the selection of a 4-step slice-specific RACH or a slice-specific RACH between the two groups of RACH resources;
- the random access procedure is a non-contention random access procedure.
- At least two sets of RACH configuration parameters include 2-step RACH and 2-step slice-specific RACH;
- the terminal uses the 2-step slice-specific RACH to perform the random access procedure; or, when the ninth condition is satisfied, the terminal uses the 2-step RACH to perform the random access procedure.
- the eighth condition includes at least one of the following:
- the terminal uses slices of the specified type
- the slice used by the terminal is the same as the slice supported by the network
- the demand slice of the terminal is the same as the network support slice;
- ⁇ The version of the communication protocol supported by the terminal is higher than or equal to the predetermined version
- the channel quality is above a fourth threshold, which is a threshold for selecting between 2-step slice-specific RACH and 2-step RACH;
- the channel quality is higher than a fifth threshold, which is a threshold for selecting slice-specific RACH between two sets of RACH resources;
- the ninth indication information is received, and the ninth indication information is used to indicate that the 2-step slice-specific RACH is selected between the 2-step slice-specific RACH and the 2-step slice-specific RACH;
- third indication information is used to indicate the selection of a 2-step slice-specific RACH or a slice-specific RACH between the two groups of RACH resources;
- the random access procedure is a contention random access procedure.
- the ninth condition includes at least one of the following:
- the terminal does not use slices of the specified type
- the slice used by the terminal is different from the slice supported by the network
- the demand slice of the terminal is different from the network support slice
- ⁇ The version of the communication protocol supported by the terminal is lower than the predetermined version
- the channel quality is below a third threshold, which is a threshold for selecting between 2-step slice-specific RACH and 2-step RACH;
- the channel quality is lower than a second threshold, the second threshold is a threshold for selecting a 2-step slice dedicated RACH between two sets of RACH resources;
- the tenth indication information is used to indicate that the 2-step RACH is selected between the 2-step slice-specific RACH and the 2-step RACH;
- Random access using 2-step slice-specific RACH fails, and 4-step slice-specific RACH is not configured;
- the fifth indication information is used to indicate a 2-step slice-specific RACH or a RACH other than the slice-specific RACH to be selected between two sets of RACH resources;
- the random access procedure is a non-contention random access procedure.
- At least two sets of RACH configuration parameters include 4-step RACH and 4-step slice-specific RACH;
- the random access procedure is performed using the 4-step slice-specific RACH; or, if the eleventh condition is satisfied, the random access procedure is performed using the 4-step RACH.
- the tenth condition includes at least one of the following:
- the terminal uses slices of the specified type
- the slice used by the terminal is the same as the slice supported by the network
- the demand slice of the terminal is the same as the network support slice;
- ⁇ The version of the communication protocol supported by the terminal is higher than or equal to the predetermined version
- the channel quality is above a sixth threshold, which is a threshold for selecting between 4-step slice-specific RACH and 4-step RACH;
- the eleventh indication information is received, and the eleventh indication information is used to indicate that the 4-step slice-specific RACH is selected between the 4-step slice-specific RACH and the 4-step slice-specific RACH;
- the channel quality is higher than a fifth threshold, which is a threshold for selecting slice-specific RACH between two sets of RACH resources;
- the eighth indication information is used to indicate the selection between the two groups of RACH resources 4-step slice-specific RACH or slice-specific RACH;
- the random access procedure is a contention random access procedure.
- the eleventh condition includes at least one of the following:
- the terminal does not use slices of the specified type
- the slice used by the terminal is different from the slice supported by the network
- the demand slice of the terminal is different from the network support slice
- ⁇ The version of the communication protocol supported by the terminal is lower than the predetermined version
- the channel quality is below a sixth threshold, which is a threshold for selecting between 4-step slice-specific RACH and 4-step RACH;
- the twelfth indication information is used to indicate that the 4-step RACH is selected between the 4-step slice-specific RACH and the 4-step RACH;
- the channel quality is lower than a fifth threshold, which is a threshold for selecting slice-specific RACH between two sets of RACH resources;
- Random access using 2-step slice-specific RACH fails, and 4-step slice-specific RACH is not configured;
- the fifth indication information is used to indicate a 2-step slice-specific RACH or a RACH other than the slice-specific RACH to be selected between two sets of RACH resources;
- the random access procedure is a non-contention random access procedure.
- any two ways are combined, for example, way 1 and way 2, way 1 and way 3, way 1 and way 4, etc.; Mode 1, mode 2 and mode 3 are combined, mode 1, mode 3 and mode 4 are combined; illustratively, all four modes are combined.
- RACH configurations include: common RACH, 2-step slice-specific RACH, and 4-step slice-specific RACH
- the above mode 1 and mode 2 are combined.
- at least two sets of RACH configurations include: 2-step RACH, 2-step slice-specific RACH, and 4-step slice-specific RACH
- the above-mentioned method 2 and method 3 are combined, which is easy for those skilled in the art to think based on the above disclosure. The content will not be repeated one by one.
- the terminal uses at least two sets of slice information or slice support according to the slice information.
- a set of RACH configuration parameters in the RACH configuration parameters performs the random access process, so that the terminal can better use the RACH resources suitable for itself in different RACH information to perform the random access process, reduce the time-consuming of the random access process or improve the random access process.
- the success rate of the access process is the case where the first RACH information in the SIB and the second RACH information in the dedicated signaling exist at the same time.
- FIG. 9 shows a flowchart of a random access method provided by an exemplary embodiment of the present application. This embodiment is exemplified by the method being executed by a terminal. The method includes:
- Step 430 Acquire at least two sets of RACH configuration parameters, and at least two sets of RACH configuration parameters are configured by system information blocks and/or dedicated signaling;
- the at least two sets of RACH configuration parameters include at least two of the following:
- Non-slicing dedicated RACH
- ⁇ RACH corresponds to the priority parameter.
- the slice-specific RACH includes: at least one of a 2-step slice-specific RACH and a 4-step slice-specific RACH.
- the non-slice dedicated RACH includes: 2-step RACH and 4-step RACH.
- the terminal receives the SIB, and the SIB is configured with at least two sets of RACH configuration parameters.
- the terminal receives dedicated signaling, where at least two sets of RACH configuration parameters are configured in the dedicated signaling.
- the terminal receives SIB and dedicated signaling
- the SIB is configured with a part of RACH resources in at least two sets of RACH configuration parameters
- the dedicated signaling is configured with the remaining part of RACH resources in at least two sets of RACH configuration parameters.
- the SIB and the dedicated signaling are sent by the same cell or base station, or the SIB and the dedicated signaling are sent by different cells or base stations.
- Step 468 Under the condition that the trigger condition is satisfied, use one set of RACH configurations from at least two sets of RACH configurations to perform a random access procedure.
- step 468 reference may be made to the content of step 468 shown in FIG. 8 , which will not be repeated.
- the terminal uses a set of RACH configuration parameters from the at least two sets of RACH configuration parameters according to slice information or slice support.
- the random access process enables the terminal to better utilize the RACH resources suitable for itself to perform the random access process, thereby reducing the time-consuming of the random access process or improving the success rate of the random access process.
- the random access behaviors of the terminal in different cells are the same or different. Specifically, the same behavior is used to perform the random access procedure in different cells, and the behavior includes the behavior of using the first RACH information and/or the second RACH information; or, the random access process is performed using different behaviors in different cells, Actions include actions using the first RACH information and/or the second RACH information.
- the terminal when the terminal moves into the range of the second cell, or when the terminal is handed over/redirected/cell selection/cell reselection to the second cell, the terminal performs a random access procedure in the second cell.
- the terminal uses the same behavior as the first cell to perform a random access procedure in the second cell; or, the terminal uses a different behavior from the first cell to perform the random access procedure in the second cell.
- the behavior in the random access process includes: the behavior of using the first RACH information and/or the second RACH information.
- the terminal performs related actions according to the second RACH information.
- the terminal moves into the range of the second cell, the terminal performs related actions according to the first RACH information.
- the terminal ignores the second RACH information in the dedicated signaling, and/or considers that the first RACH information in the SIB has a high priority.
- the dedicated signaling is an RRC release message
- the terminal considers that the information in the dedicated signaling has a high priority.
- the terminal ignores the first RACH information in the SIB, and/or considers that the second RACH information in the dedicated signaling has a high priority, and/or applies the second RACH information in the dedicated signaling, and/or Or, apply other RACH indications in the SIB (eg selection threshold, selection indication, selection condition, etc.).
- RACH indications in the SIB eg selection threshold, selection indication, selection condition, etc.
- the terminal ignores the second RACH information in the dedicated signaling (or deletes the second RACH information in the dedicated signaling), and considers the second RACH information in the SIB A RACH message has a high priority, and/or the first RACH message in the SIB is applied.
- the UE If the valid time and/or valid range conditions of the second RACH information are satisfied, the UE considers that the second RACH information in the dedicated signaling has a high priority, and/or applies the second RACH information in the dedicated signaling.
- the terminal selects the first RACH information in the SIB and performs the random access procedure.
- the terminal reads the first RACH information in the SIB of the second cell, and performs a random access procedure in the second cell according to the first RACH information.
- the terminal can read two kinds of RACH information first, and then judge to use the first RACH information or the second RACH information; the terminal can also read the first RACH information when the judgment result is that the second RACH information is invalid; Read when the first RACH message needs to be used.
- the terminal performs random access according to the second RACH information of the dedicated RRC of the first cell within the first time; the terminal performs random access according to the first RACH information of the SIB of the second cell within the second time process.
- FIG. 10 shows a flowchart of a priority determination method or a conflict resolution method provided by an exemplary embodiment of the present application.
- the method may be performed by the terminal.
- the method includes:
- Step 520 If the priority based on the logical channel is configured, when there is a conflict between a dynamic grant (Dynamic Grant, DG) and at least one configured grant (Configured Grant, CG), and the priority of the resources is the same or the highest logical channel in the resources takes priority. If the priority of the logical channels of the same level is the same, the dynamic authorization is given priority or the dynamic authorization is regarded as the priority authorization.
- DG Dynamic Grant
- Configured Grant Configured Grant
- the priority based on logical channel is configured, when there is a conflict between a dynamic grant and at least one configured grant, and the priority of the resource is the same or the priority of the logical channel with the highest logical channel priority in the resource is the same, which grant will take precedence Depends on UE implementation.
- the dynamic grant is the prioritized uplink grant.
- the base station configures the terminal with configuration information based on the priority of the logical channel.
- the base station can also schedule dynamic authorization and configuration authorization at the same time.
- the terminal determines, according to the first policy or the first condition, one of the conflicting dynamic authorization and the configuration authorization as the priority authorization.
- the first strategy or the first condition includes at least one of the following:
- the resource priority of the conflicting dynamic authorization and configuration authorization is the same, or the priority of the logical channel with the highest logical priority in the conflicting dynamic authorization and configuration authorization resources If the same, the dynamic authorization is given priority or the dynamic authorization is considered as the priority authorization.
- priority based on logical channel is configured, when there is a conflict between dynamic authorization and at least one configuration authorization, and the conflicting dynamic authorization and configuration authorization are the same resources, or the highest logic among the conflicting dynamic authorization and configuration authorization resources If the priorities of the logical channels with the same priority are the same, the dynamic authorization is given priority or the dynamic authorization is regarded as the priority authorization.
- the conflicting dynamic authorization When there is a conflict between a dynamic authorization and at least one configuration authorization, and the conflicting dynamic authorization is the same as the highest logical highest priority in the resource priority of the configuration authorization, then it depends on the UE implementation to prioritize one of the authorizations, or consider the dynamic authorization For the priority authorization, or the priority configuration authorization, or the priority configuration authorization as the priority authorization.
- priority based on logical channel is configured, when there is a conflict between dynamic authorization and at least one configuration authorization, and the conflicting dynamic authorization and configuration authorization are the same resources, or the highest logic among the conflicting dynamic authorization and configuration authorization resources If the priorities of the priority logical channels are the same, it depends on the UE implementation to prioritize one of the grants, or consider the dynamic grant as the priority grant, or the priority configuration grant, or the priority configuration grant as the priority grant.
- the UE prioritizes the dynamic authorization, or considers the dynamic authorization as the prioritized authorization, or prioritizes the configuration authorization, or prioritizes the configuration authorization as the prioritized authorization based on the base station's instruction or the base station's configuration.
- the configuration of the base station includes at least one of a selection condition and a selection threshold for preferentially selecting dynamic authorization or configuration authorization.
- FIG. 11 shows a flowchart of a priority determination method or a conflict resolution method provided by an exemplary embodiment of the present application.
- the method may be performed by the terminal.
- the method includes:
- Step 620 If there are multiple resource conflicts, such as multiple Physical Uplink Shared Channel (PUSCH) PUSCH or uplink scheduling (UL-grant) conflicts, if at least some of the resources are multiplexed without the logical channel to be transmitted or can be multiplexed on the resource, the priority of these resources is the same, and/or the priority of these resources is lower than the priority or scheduling of the logical channel to which the data to be transmitted is multiplexed or can be multiplexed with other resources The priority of the Scheduling Request (SR), and/or the lowest priority of these resources.
- PUSCH Physical Uplink Shared Channel
- UL-grant uplink scheduling
- the priority based on logical channels is configured, and if there are multiple resource conflicts, such as multiple PUSCH or UL-grant conflicts, if at least some of the resources are not multiplexed on the logical channel to be transmitted or can be multiplexed in the On this resource, the priority of these resources is the same, and/or the priority of these resources is lower than the priority of other resources or the priority of SR that the logical channel to which the data is to be transmitted is multiplexed or can be multiplexed, and/or Or, these resources have the lowest priority.
- multiple resource conflicts such as multiple PUSCH or UL-grant conflicts
- the terminal determines the priority between the first type of resources according to the second policy or the second condition, or the priority between the first type of resources and the second type of resources.
- the priority alternatively, determines the priority of the first type of resource.
- the first type of resource is a resource in which no logical channel to be transmitted is multiplexed on the resource among the plurality of conflicting resources.
- the first type of resource is a resource on which no logical channel to be transmitted can (or can) be multiplexed among the multiple resources in which the conflict occurs.
- the second type of resource is a resource in which a logical channel to be transmitted is multiplexed on the resource among the multiple resources in conflict.
- the second type of resource is a resource on which a logical channel to be transmitted can (or can) be multiplexed among multiple resources in conflict.
- the second type of resource is an SR, or a PUCCH resource corresponding to the SR.
- the second strategy or the second condition includes at least one of the following:
- the multiple resources include at least two first type resources, and the terminal determines that the priorities of the at least two first type resources are the same.
- the multiple resources include the first type resource and the second type resource, and the terminal determines that the priority of the first type resource is lower than the priority of the second type resource.
- the multiple resources include the first type resource and the second type resource, and the terminal determines that the first type resource has the lowest priority.
- the resources in the multiple resources may be PUSCH resources and/or resources indicated by uplink scheduling and/or PUCCH resources.
- the priority is the priority of the resource, or the priority of the logical channel, or the priority of the logical channel with the highest priority in the resource.
- FIG. 12 shows a flowchart of a data transmission method provided by an exemplary embodiment of the present application.
- the method may be performed by the terminal.
- the method includes:
- Step 720 In the case of configuring the configuration granted retransmission timer (cg-RetransmissionTimer), or in the case of accessing/operating in an unlicensed band (unlicensed band), determine the priority transmission according to the third policy or the third condition.
- This step includes at least one of the following three ways:
- Method 1 When configuring cg-RetransmissionTimer, or in the case of unlicensed band access/operation, compared to new transmission, UE prioritizes the transmission of low-priority uplink resources, or prioritizes incompletely transmitted media access control protocol data units
- the transmission of the Hybrid Automatic Repeat Request (HARQ) process where the (Medium Access Control Protocol Data Unit, MAC PDU) is located, or the transmission of the resource where the incompletely transmitted MAC PDU is located is prioritized.
- the UE gives priority to the new transmission.
- this transmission and other retransmissions which one is prioritized depends on UE implementation, or one of predefined priorities, or is determined based on logical channel priorities (eg, the one with higher priority).
- the first uplink transmission includes at least one of the following:
- the UE preferentially performs the first uplink transmission.
- the UE when cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if there is a new transmission and a first uplink transmission at the same time, the UE performs one of the new transmission and the first uplink transmission according to predefined information. Priority transmission.
- the UE when the cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if there are new transmission and first uplink transmission at the same time, the UE based on the logical channel priority (such as the one with the higher priority) will One of the transmission and the first upstream transmission is transmitted preferentially.
- the logical channel priority such as the one with the higher priority
- the UE preferentially performs first uplink transmission.
- cg-RetransmissionTimer when cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if retransmission and first uplink transmission exist at the same time, depending on the UE implementation, one of the retransmission and the first uplink transmission will be prioritized. Priority transmission.
- the UE when cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if retransmission and first uplink transmission exist at the same time, the UE will perform one of retransmission and first uplink transmission according to predefined information. Priority transmission.
- the UE when cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if retransmission and first uplink transmission exist at the same time, the UE will retransmit based on the logical channel priority (such as the one with higher priority). One of the transmission and the first upstream transmission is transmitted preferentially.
- the UE preferentially performs the first uplink transmission.
- One of the upstream transmissions performs priority transmission.
- the UE will perform new transmission, retransmission and first uplink transmission according to predefined information.
- One of the upstream transmissions performs priority transmission.
- the UE is based on the logical channel priority (such as the one with the higher priority). ) performs priority transmission on one of new transmission, retransmission and first uplink transmission.
- new transmission refers to the first transmission or data transmitted for the first time in the (uplink) HARQ process
- retransmission refers to the non-first transmission in the (uplink) HARQ process or retransmission after failure or retransmission after failure transmitted data.
- Method 2 In the case of configuring cg-RetransmissionTimer, or in the case of unlicensed band access/operation, the UE considers the transmission of the priority uplink resources as retransmission.
- the UE implementation or one of the predefined priorities, or determined based on the logical channel priority (such as the one with the higher priority);
- the first uplink transmission is a type of retransmission.
- the following optional implementations are included:
- the UE preferentially performs retransmission or retransmission of uplink resources.
- the UE in the case of configuring cg-RetransmissionTimer, or in the case of unlicensed band access/operation, if the UE has multiple retransmissions at the same time, it depends on the UE implementation to implement one of the multiple retransmissions for priority transmission.
- the UE transmits one of the multiple retransmissions preferentially according to predefined information.
- the UE in the case of configuring cg-RetransmissionTimer, or in the case of unlicensed band access/operation, if the UE has multiple retransmissions at the same time, the UE will retransmit multiple one of them for priority transmission.
- Mode 3 In the case of configuring cg-RetransmissionTimer, or in the case of unlicensed band access/operation, when selecting the priority HARQ process, the UE considers the transmission of the priority uplink resources as retransmission. Optionally, when there are multiple retransmissions During transmission, which one is prioritized depends on the implementation of the UE, or one of the pre-defined priorities, or is based on the logical channel priority (eg, the one with the higher priority is prioritized).
- the first uplink transmission is considered to be a type of retransmission.
- the following optional implementations are included:
- the UE preferentially performs transmission of the first HARQ process, and the first HARQ process is a HARQ process with retransmission or retransmission of uplink resources.
- the UE in the case of configuring cg-RetransmissionTimer, or in the case of unlicensed band access/operation, if the UE has multiple first HARQ processes at the same time, it depends on the UE implementation to realize that one of the multiple first HARQ processes is prioritized. transmission.
- the UE when the cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if the UE has multiple first HARQ processes at the same time, the UE prioritizes one of the multiple first HARQ processes according to predefined information. transmission.
- the UE when the cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if the UE has multiple first HARQ processes at the same time, the UE sends multiple first HARQ processes based on the logical channel One of the first HARQ processes performs priority transmission.
- the UE may also regard the first uplink transmission as a type of new transmission.
- the UE Before initial transmissions, the UE shall prioritize the transmission for which MAC PDU is obtanied and the obtained MAC PDU has not been completely performed;
- the UE shall prioritize the transmission for which the obtained MAC PDU has not been completely performed before initial transmissions.
- FIG. 13 shows a block diagram of a random access apparatus provided by an exemplary embodiment of the present application.
- the random access apparatus can be implemented as a terminal or a part of the terminal.
- the device includes:
- a receiving module 920 configured to receive the first RACH information in the system information block; and, receive the second RACH information in the dedicated signaling;
- a random access module 940 configured to use the first RACH information and/or the second RACH information to perform a random access procedure in the first cell.
- the random access module 940 is configured to use the first RACH information to perform the random access procedure; or, use the second RACH information to perform the random access process access procedure; or, when the first condition is met, use the first RACH information to perform the random access procedure; or, when the second condition is met, use the second RACH information, Execute the random access procedure; or, when the third condition is satisfied, use the first RACH information and the second RACH information to execute the random access procedure.
- the random access module 940 is configured to use the first RACH information when the priority of the first RACH information is higher than the priority of the second RACH information RACH information, performing the random access procedure; or, in the case of not belonging to the valid time and/or valid range of the second RACH information, using the first RACH information, performing the random access procedure; Or, when the first indication information is used to indicate that the first RACH information is preferentially used, the random access procedure is performed by using the first RACH information; or, in the first RACH information or the When the slice information in the second RACH information is different, use the first RACH information to perform the random access procedure; or, according to the support of the network slice by the apparatus or the access network device, use the first RACH information RACH information, and perform the random access procedure. Or, the random access procedure is performed using the first RACH information without being within the coverage or service area of the cell or base station that sends the second RACH information.
- the random access module 940 is configured to use the second RACH information when the priority of the second RACH information is higher than the priority of the first RACH information RACH information, perform the random access procedure; or, at the valid time belonging to the second RACH information, or belonging to the valid range of the second RACH, or belonging to the valid time and valid range of the second RACH information
- the random access procedure is performed; or, in the case that the first indication information is used to indicate that the second RACH information is preferentially used, the second RACH information is used, performing the random access procedure; or, the slice information in the first RACH information or the second RACH information is different, and/or belongs to the valid time and/or valid range of the second RACH information
- use the second RACH information to perform the random access process or, according to the support of the apparatus or access network equipment for network slicing, use the second RACH information to perform the random access process ; or, within the coverage or service range of the cell or
- the random access module 940 is configured to, when the first RACH information includes at least two sets of RACH configurations and the second RACH information includes selection information of the RACH configuration parameters In this case, the random access procedure is performed using the at least two sets of RACH configurations and the selection information of the RACH configuration parameters; or, when the second RACH information includes at least two sets of RACH configurations and the first RACH When the information includes selection information of the RACH configuration parameters, the random access procedure is performed using the at least two sets of RACH configurations and the selection information of the RACH configuration parameters; wherein the selection information includes: a selection threshold , at least one of a selection indication and a selection condition.
- the first RACH information and/or the second RACH information is configured with at least two sets of RACH configuration parameters
- the random access module 940 is configured to use a set of RACH configuration parameters in the at least two sets of RACH configuration parameters to perform the random access procedure when a trigger condition is satisfied.
- the at least two groups of RACH configuration parameters include slice-specific RACH and public RACH;
- the random access module 940 is configured to use the slice-specific RACH to perform the random access process when the fourth condition is satisfied; or, perform the public RACH when the fifth condition is satisfied the random access procedure.
- the fourth condition includes at least one of the following:
- the device supports slicing
- the device uses a specified slice
- the device uses slices of the specified type
- the slice used by the device is the same as the network support slice
- the requirement slice of the device is the same as the network support slice
- the communication protocol version supported by the device is higher than or equal to a predetermined version
- the channel quality is higher than a first threshold, the first threshold being a threshold for selecting between the common RACH and the slice-specific RACH;
- the channel quality is higher than a second threshold, and the second threshold is a threshold for selecting a dedicated RACH for 2-step slices between two groups of RACH resources;
- the channel quality is higher than a fifth threshold, and the fifth threshold is a threshold for selecting slice-specific RACH between two groups of RACH resources;
- the second indication information is used to indicate that the slice-specific RACH is selected between the common RACH and the slice-specific RACH;
- third indication information is used to indicate that the 2-step slice-specific RACH or the slice-specific RACH is selected between the two groups of RACH resources;
- the random access procedure is a contention random access procedure.
- the fifth condition includes at least one of the following:
- the device does not support slicing
- the device does not use the specified slice
- the device does not use slices of the specified type
- the slice used by the device is different from the network supported slice
- the requirement slice of the device is different from the network support slice
- the version of the communication protocol supported by the device is lower than the predetermined version
- the channel quality is lower than a first threshold, the first threshold being a threshold for selecting between the common RACH and the slice-specific RACN;
- the channel quality is lower than a second threshold, and the second threshold is a threshold for selecting a dedicated RACH for 2-step slices between two groups of RACH resources;
- the channel quality is lower than a fifth threshold, and the fifth threshold is a threshold for selecting slice-specific RACH between two groups of RACH resources;
- fourth indication information where the fourth indication information is used to indicate that the common RACH is selected between the common RACH and the slice-specific RACH;
- the fifth indication information is used to indicate that the 2-step slice-specific RACH or a RACH other than the slice-specific RACH is selected between the two groups of RACH resources;
- the random access using the 2-step slice dedicated RACH fails, and the 4-step slice dedicated RACH is not configured;
- the random access procedure is a non-contention random access procedure.
- the at least two groups of RACH configuration parameters include a 2-step slice-specific RACH and a 4-step slice-specific RACH;
- the random access module 940 is configured to use the 2-step slice dedicated RACH to perform the random access procedure when the sixth condition is met; or, use the 4 The random access procedure is performed on a slice-specific RACH.
- the sixth condition includes at least one of the following:
- the device uses slices of the specified type
- the slice used by the device is the same as the network support slice
- the requirement slice of the device is the same as the network support slice
- the communication protocol version supported by the device is higher than or equal to a predetermined version
- the channel quality is higher than a second threshold, where the second threshold is a threshold for selecting the dedicated RACH for the 2-step slice between two groups of RACH resources;
- the channel quality is higher than a third threshold, and the third threshold is a threshold for selecting between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- sixth indication information where the sixth indication information is used to indicate that the 2-step slice-specific RACH is selected between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- third indication information is used to indicate that the 2-step slice-specific RACH or the slice-specific RACH is selected between the two groups of RACH resources;
- the random access procedure is a contention random access procedure.
- the seventh condition includes at least one of the following:
- the device does not use slices of the specified type
- the slice used by the device is different from the network supported slice
- the requirement slice of the device is different from the network support slice
- the version of the communication protocol supported by the device is lower than the predetermined version
- the channel quality is lower than a second threshold, where the second threshold is a threshold for selecting the dedicated RACH for the 2-step slice between two groups of RACH resources;
- the channel quality is lower than a third threshold, and the second threshold is a threshold for selecting between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- the seventh indication information is used to indicate that the 4-step slice-specific RACH is selected between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- the eighth indication information is used to indicate that a 4-step slice-specific RACH or a slice-specific RACH is selected between the two groups of RACH resources;
- the random access procedure is a non-contention random access procedure.
- the at least two sets of RACH configuration parameters include 2-step RACH and 2-step slice-specific RACH;
- the random access module 940 is configured to use the 2-step slice-specific RACH to perform the random access procedure when the eighth condition is satisfied; or, use the 2-step slice-specific RACH when the ninth condition is satisfied.
- Step RACH performs the random access procedure.
- the eighth condition includes at least one of the following:
- the device uses slices of the specified type
- the slice used by the device is the same as the network support slice
- the requirement slice of the device is the same as the network support slice
- the communication protocol version supported by the device is higher than or equal to a predetermined version
- the channel quality is higher than a fourth threshold, and the fourth threshold is a threshold for selecting between the 2-step slice-specific RACH and the 2-step RACH;
- the channel quality is higher than a fifth threshold, where the fifth threshold is a threshold for selecting a slice-specific RACH between two sets of RACH resources;
- the ninth indication information is used to indicate that the 2-step slice-specific RACH is selected between the 2-step slice-specific RACH and the 2-step slice-specific RACH;
- third indication information is used to indicate that a 2-step slice-specific RACH or a slice-specific RACH is selected between the two groups of RACH resources;
- the random access procedure is a contention random access procedure.
- the ninth condition includes at least one of the following:
- the device does not use slices of the specified type
- the slice used by the device is different from the network supported slice
- the requirement slice of the device is different from the network support slice
- the version of the communication protocol supported by the device is lower than the predetermined version
- the channel quality is lower than a third threshold, where the third threshold is a threshold for selecting between the 2-step slice-specific RACH and the 2-step RACH;
- the channel quality is lower than a second threshold, where the second threshold is a threshold for selecting a dedicated RACH for 2-step slices between two groups of RACH resources;
- the tenth indication information is used to indicate that the 2-step RACH is selected between the 2-step slice dedicated RACH and the 2-step RACH;
- the random access using the 2-step slice dedicated RACH fails, and the 4-step slice dedicated RACH is not configured;
- the fifth indication information is used to indicate a 2-step slice-specific RACH or a RACH other than the slice-specific RACH to be selected between the two groups of RACH resources;
- the random access procedure is a non-contention random access procedure.
- the at least two sets of RACH configuration parameters include 4-step RACH and 4-step slice-specific RACH;
- the random access module 940 is configured to use the 4-step slice dedicated RACH to perform the random access process when the tenth condition is satisfied; or, when the eleventh condition is satisfied, use the The 4-step RACH performs the random access procedure.
- the tenth condition includes at least one of the following:
- the device uses slices of the specified type
- the slice used by the device is the same as the network support slice
- the requirement slice of the device is the same as the network support slice
- the communication protocol version supported by the device is higher than or equal to a predetermined version
- the channel quality is higher than a sixth threshold, and the sixth threshold is a threshold for selecting between the 4-step slice-specific RACH and the 4-step RACH;
- Eleventh indication information is received, where the eleventh indication information is used to indicate that the 4-step slice-specific RACH is selected between the 4-step slice-specific RACH and the 4-step slice-specific RACH.
- the channel quality is higher than a fifth threshold, where the fifth threshold is a threshold for selecting slice-specific RACH between two groups of RACH resources;
- Eighth indication information is received, where the eighth indication information is used to indicate that a 4-step slice-specific RACH or a slice-specific RACH is to be selected between the two groups of RACH resources;
- the random access process is a contention random access process
- the random access using the 2-step slice-specific RACH fails, and the 4-step slice-specific RACH is configured.
- the eleventh condition includes at least one of the following:
- the device does not use slices of the specified type
- the slice used by the device is different from the network supported slice
- the requirement slice of the device is different from the network support slice
- the version of the communication protocol supported by the device is lower than the predetermined version
- the channel quality is lower than a sixth threshold, and the sixth threshold is a threshold for selecting between the 4-step slice-specific RACH and the 4-step RACH;
- twelfth indication information is used to indicate that the 4-step RACH is selected between the 4-step slice-specific RACH and the 4-step RACH;
- the channel quality is lower than a fifth threshold, and the fifth threshold is a threshold for selecting slice-specific RACH between two groups of RACH resources;
- the random access using the 2-step slice dedicated RACH fails, and the 4-step slice dedicated RACH is not configured;
- the fifth indication information is used to indicate a 2-step slice-specific RACH or a RACH other than the slice-specific RACH to be selected between the two groups of RACH resources;
- the random access procedure is a non-contention random access procedure.
- the at least two sets of RACH configuration parameters are configured by the first RACH information; or, the at least two sets of RACH configuration parameters are configured by the second RACH information; or, The at least two sets of RACH configuration parameters are configured by the first RACH information and the second RACH.
- the random access module 940 is configured to use the same behavior in different cells to perform the random access procedure, where the behavior includes using the first RACH information and/or the behavior of the second RACH information; or, using different behaviors to perform the random access procedure in different cells, the behaviors including the behavior of using the first RACH information and/or the second RACH information.
- the system information block is SIB1; or, the system information block is another SIB except the SIB1; or, the system information block is the SIB1 and the SIB1 SIBs other than SIB1.
- the system information block includes:
- system information block includes at least one of the following:
- the first RACH information includes:
- a first RACH configuration where the first RACH configuration is used to configure a first RACH resource.
- the first RACH resource includes at least two sets of RACH configuration parameters
- the first RACH information includes at least one of the following:
- Selection criteria for selecting the at least two sets of RACH configuration parameters are
- the dedicated signaling includes:
- the dedicated RRC message includes: an RRC reconfiguration message, or an RRC release message
- the dedicated signaling includes:
- the valid duration corresponding to the second RACH information is the valid duration corresponding to the second RACH information.
- the dedicated signaling includes:
- the dedicated signaling includes:
- the second RACH information includes:
- a second RACH configuration where the second RACH configuration is used to configure a second RACH resource.
- the second RACH resource includes at least two sets of RACH configuration parameters
- the second RACH information further includes:
- Selection criteria for selecting at least two sets of RACH configuration parameters are
- the selection threshold includes at least one of the following:
- the first threshold a threshold for selecting between the public RACH and the slice-specific RACH
- the second threshold is used to select the threshold of the dedicated RACH for 2-step slices between the two groups of RACH resources;
- the third threshold a threshold for selecting between 2-step slice-specific RACH and 4-step slice-specific RACH;
- the fourth threshold a threshold for selecting between 2-step slice-specific RACH and 2-step RACH;
- a fifth threshold used for selecting a slice-specific RACH threshold between two sets of RACH resources
- the sixth threshold a threshold for selecting between 4-step slice-specific RACH and 4-step RACH.
- the selection indication includes at least one of the following:
- the third indication information is used to indicate that a 2-step slice-specific RACH or a slice-specific RACH is selected between the two groups of RACH resources;
- fourth indication information used to select the common RACH between the common RACH and the slice-specific RACH
- fifth indication information used to indicate the selection of a 2-step slice-specific RACH or a RACH other than the slice-specific RACH between the two groups of RACH resources;
- the sixth indication information is used to indicate the threshold for selecting the 2-step slice-specific RACH between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- seventh indication information used to indicate a threshold for selecting a 4-step slice-specific RACH between the 2-step slice-specific RACH and the 4-step slice-specific RACH;
- Eighth indication information used to indicate that the 4-step slice-specific RACH or slice-specific RACH is selected between the two groups of RACH resources;
- ninth indication information used to indicate that the 2-step slice-specific RACH is selected between the 2-step slice-specific RACH and the 2-step slice-specific RACH;
- Tenth indication information used to indicate that the 2-step RACH is selected between the 2-step slice-specific RACH and the 2-step RACH;
- the eleventh indication information is used to indicate that the 4-step slice-specific RACH is selected between the 4-step slice-specific RACH and the 4-step slice-specific RACH;
- the twelfth indication information is used to indicate that the 4-step RACH is selected between the 4-step slice-specific RACH and the 4-step RACH.
- the selection condition includes at least one of the following:
- non-slice or non-designated slice or the designated slice does not match the network-supported slice or the requirement slice does not match the network-supported slice, select the non-slice dedicated RACH;
- the public RACH is selected
- the common RACH is selected
- the 4-step slice dedicated RACH is selected
- the apparatus supports slices, selecting the slice-specific RACH or the 2-step slice-specific RACH or the 4-step slice-specific RACH;
- the apparatus does not support slicing, select the non-slicing dedicated RACH or the common RACH or the 2-step RACH or the 4-step RACH;
- the network supports slicing, select the slice-specific RACH or the 2-step slice-specific RACH or the 4-step slice-specific RACH;
- the slice used by the apparatus is the same as the slice supported by the network, select the slice-specific RACH or the 2-step slice-specific RACH or the 4-step slice-specific RACH;
- the slice used by the apparatus is different from the slice supported by the network, selecting the non-slice dedicated RACH or the common RACH or the 2-step RACH or the 4-step RACH;
- the version of the communication protocol supported by the apparatus is higher than a predetermined version, select the slice-specific RACH or the 2-step slice-specific RACH or the 4-step slice-specific RACH;
- the version of the communication protocol supported by the device is lower than a predetermined version, select the non-slicing dedicated RACH or the public RACH or the 2-step RACH or the 4-step RACH;
- the random access process is a contention random access process, selecting the slice-specific RACH or the 2-step slice-specific RACH or the 4-step slice-specific RACH;
- the random access procedure is a non-contention random access procedure, selecting the non-slice dedicated RACH or the common RACH or the 2-step RACH or the 4-step RACH;
- the random access procedure is a contention random access procedure, selecting the slice-specific RACH or the 2-step slice-specific RACH or the 2-step common RACH;
- the random access procedure is a non-contention random access procedure, select the non-slice dedicated RACH or the common RACH or the 2-step RACH or the 4-step RACH or the 4-step slice dedicated RACH .
- the random access process is a non-contention random access process, selecting the slice-specific RACH or the 2-step slice-specific RACH or the 4-step slice-specific RACH;
- the non-slice dedicated RACH or the common RACH or the 2-step RACH or the 4-step RACH is selected.
- the receiving module 920 is configured to acquire at least two sets of RACH configuration parameters, where the at least two sets of RACH configuration parameters are configured by a system information block and/or dedicated signaling;
- the random access module 940 is configured to use a set of RACH configuration parameters in the at least two sets of RACH configuration parameters to perform a random access procedure when a trigger condition is satisfied.
- the functions of the random access module 940 when performing the random access process can be referred to the content of the embodiment in FIG. 13 , and details are not repeated here.
- FIG. 14 shows a block diagram of a priority determination apparatus or a conflict resolution apparatus or a data transmission apparatus provided by an exemplary embodiment of the present application.
- the device is implemented as a terminal or a part of the terminal or a medium access control (Medium Access Control, MAC) entity or a part of the MAC entity in the terminal.
- the device includes:
- the processing module 1020 is configured to, if the priority based on the logical channel is configured, when there is a conflict between a dynamic grant (Dynamic Grant, DG) and at least one configuration grant (Configured Grant, CG), and the resources have the same priority or the highest among the resources If the priorities of the logical channels of the logical channel priority are the same, the dynamic authorization is given priority or the dynamic authorization is regarded as the priority authorization.
- a dynamic grant Dynamic Grant, DG
- Configured Grant Configured Grant
- the processing module 1020 which authorization is used to take precedence depends on the implementation.
- the dynamic grant is the prioritized uplink grant.
- the base station configures the terminal with configuration information based on the priority of the logical channel.
- the base station can also schedule dynamic authorization and configuration authorization at the same time.
- the terminal determines, according to the first policy or the first condition, one of the conflicting dynamic authorization and the configuration authorization as the priority authorization.
- the first strategy or the first condition includes at least one of the following:
- the processing module 1020 is used to give priority to dynamic authorization or to consider the dynamic authorization to be the priority authorization.
- the processing module 1020 is configured to prioritize the dynamic authorization or consider the dynamic authorization as the priority authorization.
- the processing module 1020 is configured to prioritize one of them depending on its own implementation Authorization, or consider the dynamic authorization as the priority authorization, or the priority configuration authorization, or the priority configuration authorization as the priority authorization.
- the processing module 1020 is configured to prioritize one of the authorizations, or consider the dynamic authorization as the priority, or the configuration authorization, or the configuration authorization as the priority authorization, depending on its implementation.
- the processing module 1020 is configured to prioritize the dynamic authorization, or consider the dynamic authorization as the prioritized authorization, or prioritize the configuration authorization, or prioritize the configuration authorization as the prioritized authorization, depending on its implementation based on the base station's instruction or the base station's configuration.
- the configuration of the base station includes at least one of a selection condition and a selection threshold for preferentially selecting dynamic authorization or configuration authorization.
- the processing module 1020 is configured to, if there are multiple resource conflicts, such as multiple Physical Uplink Shared Channel (PUSCH) PUSCH or uplink scheduling (UL-grant) conflicts, if at least some of the resources conflict No logical channel to be transmitted is multiplexed or can be multiplexed on the resource, then the priority of these resources is the same, and/or the priority of these resources is lower than that of the logical channel to be transmitted data is multiplexed or can be multiplexed The priority of multiplexing other resources or the priority of Scheduling Request (SR).
- PUSCH Physical Uplink Shared Channel
- UL-grant uplink scheduling
- the priority based on logical channels is configured, and if there are multiple resource conflicts, such as multiple PUSCH or UL-grant conflicts, if at least some of the resources are not multiplexed on the logical channel to be transmitted or can be multiplexed in the On this resource, the priority of these resources is the same, and/or the priority of these resources is lower than the priority of other resources or the priority of SR that the logical channel to which the data is to be transmitted is multiplexed or can be multiplexed, and/or Or, these resources have the lowest priority.
- multiple resource conflicts such as multiple PUSCH or UL-grant conflicts
- the processing module 1020 is configured to determine the priority between the first type of resources according to the second strategy or the second condition, or, the first type of resources and the second type of resources.
- the first type of resource is a resource in which no logical channel to be transmitted is multiplexed on the resource among the plurality of conflicting resources.
- the first type of resource is a resource on which no logical channel to be transmitted can (or can) be multiplexed among the multiple resources in which the conflict occurs.
- the second type of resource is a resource in which a logical channel to be transmitted is multiplexed on the resource among the multiple resources in conflict.
- the second type of resource is a resource on which a logical channel to be transmitted can (or can) be multiplexed among multiple resources in conflict.
- the second type of resource is an SR, or a PUCCH resource corresponding to the SR.
- the second strategy or the second condition includes at least one of the following:
- the processing module 1020 is configured to determine that the at least two first type resources have the same priority.
- the processing module 1020 is configured to determine that the priority of the first type resource is lower than the priority of the second type resource.
- the processing module 1020 is configured to determine that the first type resource has the lowest priority.
- the resources in the multiple resources may be PUSCH resources and/or resources indicated by uplink scheduling and/or PUCCH resources.
- the priority is the priority of the resource, or the priority of the logical channel, or the priority of the logical channel with the highest priority in the resource.
- the processing module 1020 is configured to determine the priority transmission according to the third policy or the third condition when the cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation.
- This step includes at least one of the following three ways:
- the processing module 1020 is used to configure the cg-RetransmissionTimer, or in the case of unlicensed band access/operation, compared to the new transmission, the UE prioritizes the transmission of uplink resources with low priority, or prioritizes the transmission of media that has not been fully transmitted.
- the transmission of the Hybrid Automatic Repeat Request (HARQ) process where the Medium Access Control Protocol Data Unit (MAC PDU) is located, or the transmission of the resource where the incompletely transmitted MAC PDU is located is given priority. Or, on the contrary, the UE gives priority to the new transmission.
- HARQ Hybrid Automatic Repeat Request
- MAC PDU Medium Access Control Protocol Data Unit
- the UE gives priority to the new transmission.
- this transmission and other retransmissions which one is prioritized depends on UE implementation, or one of predefined priorities, or is determined based on logical channel priorities (eg, the one with higher priority).
- the first uplink transmission includes at least one of the following:
- the UE preferentially performs the first uplink transmission.
- the UE when cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if there is a new transmission and a first uplink transmission at the same time, the UE performs one of the new transmission and the first uplink transmission according to predefined information. Priority transmission.
- the UE when the cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if there are new transmission and first uplink transmission at the same time, the UE based on the logical channel priority (such as the one with the higher priority) will One of the transmission and the first upstream transmission is transmitted preferentially.
- the logical channel priority such as the one with the higher priority
- the UE preferentially performs first uplink transmission.
- cg-RetransmissionTimer when cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if retransmission and first uplink transmission exist at the same time, depending on the UE implementation, one of the retransmission and the first uplink transmission will be prioritized. Priority transmission.
- the UE when cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if retransmission and first uplink transmission exist at the same time, the UE will perform one of retransmission and first uplink transmission according to predefined information. Priority transmission.
- the UE when cg-RetransmissionTimer is configured, or in the case of unlicensed band access/operation, if retransmission and first uplink transmission exist at the same time, the UE will retransmit based on the logical channel priority (such as the one with higher priority). One of the transmission and the first upstream transmission is transmitted preferentially.
- the UE preferentially performs the first uplink transmission.
- One of the upstream transmissions performs priority transmission.
- the UE will perform new transmission, retransmission and first uplink transmission according to predefined information.
- One of the upstream transmissions performs priority transmission.
- the UE is based on the logical channel priority (such as the one with the higher priority). ) performs priority transmission on one of new transmission, retransmission and first uplink transmission.
- new transmission refers to the first transmission or data transmitted for the first time in the (uplink) HARQ process
- retransmission refers to the non-first transmission in the (uplink) HARQ process or retransmission after failure or retransmission after failure transmitted data.
- Method 2 In the case of configuring cg-RetransmissionTimer, or in the case of unlicensed band access/operation, the UE considers the transmission of the priority uplink resources as retransmission.
- the UE implementation or one of the predefined priorities, or determined based on the logical channel priority (such as the one with the higher priority);
- the first uplink transmission is a type of retransmission.
- the following optional implementations are included:
- the processing module 1020 is configured to perform retransmission preferentially, or retransmission transmission of uplink resources.
- the processing module 1020 is configured to implement one of the multiple retransmissions depending on the UE implementation to give priority. transmission.
- the processing module 1020 is configured to transmit one of the multiple retransmissions preferentially according to predefined information. .
- the processing module 1020 is configured to retransmit the One of the retransmissions is prioritized for transmission.
- the processing module 1020 is configured to consider the transmission of the priority uplink resource as retransmission when selecting the priority HARQ process.
- which one is prioritized depends on the implementation of the UE, or one of the pre-defined priorities, or is based on logical channel priorities (eg, the one with the higher priority is prioritized).
- the first uplink transmission is considered to be a type of retransmission.
- the following optional implementations are included:
- the processing module 1020 is configured to preferentially perform transmission of the first HARQ process, and the first HARQ process is the presence of retransmission or retransmission of uplink resources. the HARQ process.
- the processing module 1020 is used to implement the multiple first HARQ processes depending on the UE implementation. one for priority transmission.
- the processing module 1020 is configured to transfer the multiple first HARQ processes according to predefined information. One for priority transmission.
- the processing module 1020 is configured to be based on the logical channel priority (such as the priority with high priority) One of the plurality of first HARQ processes is preferentially transmitted.
- the apparatus may also regard the first uplink transmission as a type of new transmission.
- FIG. 15 shows a schematic structural diagram of a terminal provided by an exemplary embodiment of the present application.
- the terminal includes: a processor 101 , a receiver 102 , a transmitter 103 , a memory 104 , and a bus 105 .
- the processor 101 includes one or more processing cores, and the processor 101 executes various functional applications and information processing by running software programs and modules.
- the receiver 102 and the transmitter 103 may be implemented as a communication component, which may be a communication chip.
- the memory 104 is connected to the processor 101 through the bus 105 .
- the memory 104 may be configured to store at least one instruction, and the processor 101 may be configured to execute the at least one instruction, so as to implement various steps in the foregoing method embodiments.
- the transmitter 103 is used to perform the steps related to sending; the receiver 104 is used to perform the steps related to receiving; the processor 101 is used to perform the steps other than sending and receiving.
- memory 104 may be implemented by any type or combination of volatile or non-volatile storage devices including, but not limited to, magnetic or optical disks, electrically erasable programmable Read Only Memory (Electrically-Erasable Programmable Read Only Memory, EEPROM), Erasable Programmable Read Only Memory (EPROM), Static Random Access Memory (SRAM), Read Only Memory (Read-Only Memory, ROM), magnetic memory, flash memory, programmable read-only memory (Programmable Read-Only Memory, PROM).
- volatile or non-volatile storage devices including, but not limited to, magnetic or optical disks, electrically erasable programmable Read Only Memory (Electrically-Erasable Programmable Read Only Memory, EEPROM), Erasable Programmable Read Only Memory (EPROM), Static Random Access Memory (SRAM), Read Only Memory (Read-Only Memory, ROM), magnetic memory, flash memory, programmable read-only memory (Programmable Read-Only Memory, PROM).
- a computer-readable storage medium stores at least one instruction, at least one piece of program, code set or instruction set, the at least one instruction, the At least one section of program, the code set or the instruction set is loaded and executed by the processor to implement the random access method or the priority determination method or the conflict resolution method or the data transmission method provided by the above method embodiments.
- a computer program product or computer program comprising computer instructions stored in a computer readable storage medium from which a processor of a communication device is readable by a computer Reading the storage medium reads the computer instructions, and the processor executes the computer instructions, so that the communication device executes the random access method or the priority determination method or the conflict resolution method or the data transmission method described in the above aspects.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente demande concerne le domaine des communications mobiles, et divulgue un procédé et un appareil d'accès aléatoire, un terminal, et un support de stockage. Le procédé comprend les étapes suivantes : un terminal reçoit des premières informations RACH dans un bloc d'informations système (SIB) ; et reçoit des secondes informations RACH dans une signalisation dédiée ; et réalise une procédure d'accès aléatoire à l'aide des premières informations RACH ou des secondes informations RACH. Dans le cas où des informations RACH sont configurées à la fois pour le SIB et la signalisation dédiée en même temps, la présente demande fournit une solution dans laquelle le terminal sélectionne, en présence d'une pluralité de groupes de configurations RACH, les informations RACH appropriées pour que le terminal lui-même effectue la procédure d'accès aléatoire.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2021/081637 WO2022193258A1 (fr) | 2021-03-18 | 2021-03-18 | Procédé et appareil d'accès aléatoire, terminal, et support de stockage |
| CN202180076923.3A CN116530194A (zh) | 2021-03-18 | 2021-03-18 | 随机接入方法、装置、终端及存储介质 |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2021/081637 WO2022193258A1 (fr) | 2021-03-18 | 2021-03-18 | Procédé et appareil d'accès aléatoire, terminal, et support de stockage |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022193258A1 true WO2022193258A1 (fr) | 2022-09-22 |
Family
ID=83321325
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2021/081637 Ceased WO2022193258A1 (fr) | 2021-03-18 | 2021-03-18 | Procédé et appareil d'accès aléatoire, terminal, et support de stockage |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN116530194A (fr) |
| WO (1) | WO2022193258A1 (fr) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10462825B2 (en) * | 2017-03-06 | 2019-10-29 | Tata Consultancy Services Limited | Systems and methods for delay based power ramping of devices |
| CN111557119A (zh) * | 2020-03-09 | 2020-08-18 | 北京小米移动软件有限公司 | 通信方法及装置、存储介质 |
| WO2020164035A1 (fr) * | 2019-02-14 | 2020-08-20 | Qualcomm Incorporated | Priorisation de procédures d'accès aléatoire |
-
2021
- 2021-03-18 WO PCT/CN2021/081637 patent/WO2022193258A1/fr not_active Ceased
- 2021-03-18 CN CN202180076923.3A patent/CN116530194A/zh active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10462825B2 (en) * | 2017-03-06 | 2019-10-29 | Tata Consultancy Services Limited | Systems and methods for delay based power ramping of devices |
| WO2020164035A1 (fr) * | 2019-02-14 | 2020-08-20 | Qualcomm Incorporated | Priorisation de procédures d'accès aléatoire |
| CN111557119A (zh) * | 2020-03-09 | 2020-08-18 | 北京小米移动软件有限公司 | 通信方法及装置、存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN116530194A (zh) | 2023-08-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7625666B2 (ja) | 優先順位付けされたランダムアクセスに関与するユーザ機器および基地局 | |
| US20240414761A1 (en) | Nr-u wideband enhancements | |
| CN111511036B (zh) | 针对系统信息请求的随机接入程序的方法和设备 | |
| US20230018487A1 (en) | Random access procedure for latency reduction | |
| US10455622B2 (en) | Performing a random access procedure in a carrier aggregation with at least one SCell operating in an unlicensed spectrum | |
| KR102077166B1 (ko) | 이동 통신 시스템에서 복수의 캐리어를 이용하는 데이터 송수신 방법 및 장치 | |
| TWI723552B (zh) | 判斷對話前監聽和通道存取優先級等級之方法及使用者設備 | |
| KR20250160102A (ko) | 비면허 대역을 활용하는 무선통신시스템에서 상향링크 LBT (Listen-Before-Talk) 실패를 감지하는 방법 및 장치 | |
| CN113905453B (zh) | 随机接入的方法和设备 | |
| US10342050B2 (en) | Method for performing a random access procedure in a carrier aggregation with at least one scell operating in an unlicensed spectrum and a device therefor | |
| WO2010127520A1 (fr) | Procédé d'accès aléatoire et station de base | |
| US20250185058A1 (en) | User equipment and base station performing transmission and reception operations | |
| CN112335288A (zh) | 缺失参考信号的情况下的无线电网络测量 | |
| CN109076600B (zh) | 一种随机接入的通信方法、终端和基站 | |
| CN116074970B (zh) | 无线通信的方法及装置 | |
| CN112997574B (zh) | 随机接入的方法、终端设备和网络设备 | |
| KR20210079361A (ko) | 무작위 접속의 방법과 장치 | |
| WO2021206620A1 (fr) | Adaptation de transmission sur canal rach sur une porteuse sans licence | |
| US12167472B2 (en) | Method and apparatus for random access resource selection in mobile wireless communication system | |
| WO2022193258A1 (fr) | Procédé et appareil d'accès aléatoire, terminal, et support de stockage | |
| US20240430937A1 (en) | A Coordinating Wireless Device, A Network Node, A Wireless Device and Methods Therein for Enabling Uplink, UL, Transmissions in a Wireless Communications Network | |
| CN117561782A (zh) | 一种随机接入方法及装置、终端设备、网络设备 | |
| EP4039034A1 (fr) | Procédés, équipement utilisateur et noeud de réseau pour gérer des configurations de prach | |
| JP2023506685A (ja) | ランダムアクセス問題の報告方法、端末デバイス及び記憶媒体 | |
| CN113709894B (zh) | 搜索空间配置方法及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21930850 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202180076923.3 Country of ref document: CN |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 21930850 Country of ref document: EP Kind code of ref document: A1 |