[go: up one dir, main page]

WO2025118159A1 - Method for processing signal, first device, and second device - Google Patents

Method for processing signal, first device, and second device Download PDF

Info

Publication number
WO2025118159A1
WO2025118159A1 PCT/CN2023/136563 CN2023136563W WO2025118159A1 WO 2025118159 A1 WO2025118159 A1 WO 2025118159A1 CN 2023136563 W CN2023136563 W CN 2023136563W WO 2025118159 A1 WO2025118159 A1 WO 2025118159A1
Authority
WO
WIPO (PCT)
Prior art keywords
parameter
message
access
signal
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2023/136563
Other languages
French (fr)
Chinese (zh)
Inventor
杜忠达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to PCT/CN2023/136563 priority Critical patent/WO2025118159A1/en
Publication of WO2025118159A1 publication Critical patent/WO2025118159A1/en
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • the present application relates to the field of communications, and more specifically, to a signal processing method, a first device, a second device, a chip, a computer-readable storage medium, a computer program product, a computer program, and a communication system.
  • Embodiments of the present application provide a signal processing method, a first device, a second device, a chip, a computer-readable storage medium, a computer program product, a computer program, and a communication system, which can be used to resolve conflicts between different devices during an initial access process.
  • the present application provides a signal processing method, including:
  • the first device receives a first signal; wherein the first signal includes a first parameter of the second device that sends the first signal;
  • the first device determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device to determine whether to respond to a received message triggering initial access.
  • the present application provides a signal processing method, including:
  • the second device sends a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine a first parameter of a target device for initial access, so as to determine whether to respond to a message triggering initial access received by the first device.
  • the present application embodiment provides a first device, including:
  • a first communication module configured to receive a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal;
  • the first processing module is used to determine a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used to determine whether to respond to a received message triggering initial access.
  • the embodiment of the present application provides a second device, including:
  • the second communication module is used to send a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine the first parameter of the target device for initial access to determine whether to respond to the message triggering initial access received by the first device.
  • the embodiment of the present application provides a first device, including: a transceiver, a processor and a memory.
  • the memory is used to store a computer program
  • the transceiver is used to communicate with other devices
  • the processor is used to call and run the computer program stored in the memory, so that the first device performs the above-mentioned signal processing method.
  • the embodiment of the present application provides a second device, including: a transceiver, a processor and a memory.
  • the memory is used to store a computer program
  • the transceiver is used to communicate with other devices
  • the processor is used to call and run the computer program stored in the memory, so that the second device performs the above-mentioned signal processing method.
  • An embodiment of the present application provides a chip for implementing the above-mentioned signal processing method.
  • the chip includes: a processor, which is used to call and run a computer program from a memory, so that a device equipped with the chip executes the above-mentioned signal processing method.
  • An embodiment of the present application provides a computer-readable storage medium for storing a computer program.
  • the computer program When the computer program is executed by a device, the device executes the above-mentioned signal processing method.
  • An embodiment of the present application provides a computer program, which, when executed on a computer, enables the computer to execute the above-mentioned signal processing method.
  • An embodiment of the present application provides a communication system, including a first device and a second device used for the above-mentioned access method.
  • the second device sends a first signal, which includes a first parameter for identifying the second device.
  • the first device receives the first signal and determines the first parameter of the target device for initial access based on the first parameter included in the first signal.
  • the first device can determine whether to respond based on the first parameter, that is, by determining the first parameter of the target device, the message triggering initial access can be distinguished, which can solve the interference problem between different second devices during the initial access process.
  • FIG. 1 is a schematic diagram of a communication system in an embodiment of the present application.
  • FIG. 2A is a schematic diagram of the four-step CBRA process.
  • FIG. 2B is a schematic diagram of the two-step CBRA process.
  • FIG3 is a schematic diagram of the basic structure of the A-IoT communication system.
  • FIG. 4A is a schematic diagram of a first topology network structure in an A-IoT communication system.
  • FIG. 4B is a schematic diagram of a second topology network structure in an A-IoT communication system.
  • FIG. 4C is a schematic diagram of a third topology network structure in an A-IoT communication system.
  • FIG4D is a schematic diagram of a fourth topology network structure in an A-IoT communication system.
  • FIG5A is a block diagram of a typical wideband receiver.
  • FIG5B is a block diagram of a typical intermediate frequency receiver.
  • FIG. 6 is a schematic diagram of an application scenario of an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of an access method according to an embodiment of the present application.
  • FIG8 is a schematic flowchart of an access method according to another embodiment of the present application.
  • FIG. 9 is a schematic diagram of a distribution method of a first parameter in an application example.
  • FIG. 10 is a schematic diagram of application example 1 of the access method according to an embodiment of the present application.
  • FIG. 11 is a schematic diagram of application example 2 of the access method according to an embodiment of the present application.
  • FIG. 12 is a schematic diagram of application example 3 of the access method according to an embodiment of the present application.
  • FIG. 13 is a schematic diagram of application example 4 of the access method according to an embodiment of the present application.
  • FIG. 14 is a schematic diagram of application example 5 of the access method according to an embodiment of the present application.
  • FIG. 15 is a schematic diagram of application example 6 of the access method according to an embodiment of the present application.
  • FIG. 16 is a schematic block diagram of a first device according to an embodiment of the present application.
  • FIG. 17 is a schematic block diagram of a second device according to an embodiment of the present application.
  • FIG18 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • FIG. 19 is a schematic block diagram of a chip according to an embodiment of the present application.
  • FIG. 20 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • LTE Long Term Evolution
  • LTE-A Advanced long term evolution
  • NR New Radio
  • NR system evolution system LTE on unlicensed spectrum
  • LTE-U LTE on unlicensed spectrum
  • NR-based access to unlicensed spectrum NR-U
  • NTN Non-Terrestrial Networks
  • UMTS Universal Mobile Telecommunication System
  • WLAN Wireless Local Area Networks
  • WiFi fifth-generation communication
  • 5G fifth-generation communication
  • D2D device to device
  • M2M machine to machine
  • MTC machine type communication
  • V2V vehicle to vehicle
  • V2X vehicle to everything
  • the communication system in the embodiment of the present application can be applied to a carrier aggregation (CA) scenario, a dual connectivity (DC) scenario, or a standalone (SA) networking scenario.
  • CA carrier aggregation
  • DC dual connectivity
  • SA standalone
  • the communication system in the embodiment of the present application can be applied to an unlicensed spectrum, wherein the unlicensed spectrum can also be considered as a shared spectrum; or, the communication system in the embodiment of the present application can also be applied to an authorized spectrum, wherein the authorized spectrum can also be considered as an unshared spectrum.
  • the terminal device may also be referred to as user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
  • UE user equipment
  • the terminal device can be a station (STAION, ST) in a WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal device in the next generation communication system such as the NR network, or a terminal device in the future evolved Public Land Mobile Network (PLMN) network, etc.
  • STAION, ST in a WLAN
  • a cellular phone a cordless phone
  • Session Initiation Protocol (SIP) phone Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • the terminal device can be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted; It can be deployed on the water (such as ships, etc.); it can also be deployed in the air (such as airplanes, balloons and satellites, etc.).
  • the terminal device may be a mobile phone, a tablet computer, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical, a wireless terminal device in smart grid, a wireless terminal device in transportation safety, a wireless terminal device in a smart city, or a wireless terminal device in a smart home, etc.
  • VR virtual reality
  • AR augmented reality
  • the terminal device may also be a wearable device.
  • Wearable devices may also be referred to as wearable smart devices, which are a general term for wearable devices that are intelligently designed and developed using wearable technology for daily wear, such as glasses, gloves, watches, clothing, and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothes or accessories. Wearable devices are not only hardware devices, but also powerful functions achieved through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, and fully or partially independent of smartphones, such as smart watches or smart glasses, as well as devices that only focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various types of smart bracelets and smart jewelry for vital sign monitoring.
  • the network device may be a device for communicating with a mobile device
  • the network device may be an access point (AP) in a WLAN, an evolved base station (eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and a network device (gNB) in an NR network, or a network device in a future evolved PLMN network, or a network device in an NTN network, etc.
  • the network device may have a mobile feature, for example, the network device may be a mobile device.
  • the network device may be a satellite or a balloon station.
  • the satellite may be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geostationary earth orbit (GEO) satellite, a high elliptical orbit (HEO) satellite, etc.
  • the network device may also be a base station set up in a location such as land or water.
  • a network device can provide services for a cell, and a terminal device communicates with the network device through transmission resources (e.g., frequency domain resources, or spectrum resources) used by the cell.
  • the cell can be a cell corresponding to a network device (e.g., a base station).
  • the cell can belong to a macro base station or a base station corresponding to a small cell.
  • the small cells here may include: metro cells, micro cells, pico cells, femto cells, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • Fig. 1 exemplarily shows a communication system 100.
  • the communication system includes a network device 110 and two terminal devices 120.
  • the communication system 100 may include multiple network devices 110, and each network device 110 may include other number of terminal devices 120 within its coverage area, which is not limited in the embodiment of the present application.
  • the device with communication function in the network/system in the embodiment of the present application can be called a communication device.
  • the communication device may include a network device and a terminal device with communication function, and the network device and the terminal device may be specific devices in the embodiment of the present application, which will not be repeated here; the communication device may also include other devices in the communication system, such as other network entities such as a network controller and a mobile management entity, which is not limited in the embodiment of the present application.
  • the "indication" mentioned in the embodiments of the present application can be a direct indication, an indirect indication, or an indication of an association relationship.
  • a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association relationship between A and B.
  • corresponding may indicate a direct or indirect correspondence between two items, or an association relationship between the two items, or a relationship between indication and being indicated, configuration and being configured, and the like.
  • the 3GPP (3rd Generation Partnership Project) communication system there are generally two ways of initial access at the MAC (Medium Access Control) layer, namely two-step random access (2-step RACH) and four-step random access (4-step RACH).
  • RACH Random Access Channel
  • the resolution of random access conflicts is performed within a cell. This is because in 3GPP's cellular communication system (including 4G and 5G), before initiating a random access process, the terminal must first obtain frequency and time synchronization with the current serving cell, and then initiate a random access process on the random access radio resources broadcast by the serving cell.
  • different serving cells either have different frequencies (for example, there are low-frequency cells responsible for coverage) or different frequencies (for example, there are low-frequency cells responsible for coverage).
  • the system time is not synchronized, or both are different.
  • the PRACH Physical Random Access Channel
  • ZC Zadoff-Chu
  • FIG. 2A is a flowchart of the four-step CBRA (Contention Based Random Access, contention-based random access). As shown in Figure 2A, the four-step CBRA includes 4 steps:
  • Step 1 The terminal will send a random access preamble to the base station.
  • This preamble is called message 1 in the MAC layer protocol.
  • After sending the preamble it waits for message 2 from the base station in a subsequent response window.
  • the start and end times of the response window are set according to the configuration parameters. From the perspective of the base station, the base station has the ability to distinguish between preamblers received in different time-frequency domains, or different preamblers in the same time-frequency domain. However, the base station cannot distinguish between the same preamble sent by multiple terminals in the same time-frequency domain. In this case, an access conflict will occur.
  • Step 2 The base station feeds back message 2 to the terminal.
  • Message 2 can be a group message, that is, it can include RAR (Random Access Response) messages to multiple terminals.
  • the addressing information of Message 2 is contained in a group identifier called RA-RNTI (Random Access-Radio Network Temporary Indentifier), which is used to identify the information of the received preamble in the time domain, frequency domain and carrier type. That is to say, the preambles received from the same carrier at the same time and frequency point can be merged into the same message 2.
  • RA-RNTI Random Access-Radio Network Temporary Indentifier
  • the RAR IE (Information Elements) sent to each terminal will include the temporary identifier T_C_RNTI configured for the terminal, the time advance (for uplink synchronization), the radio resource authorization UL-grant (uplink authorization) for sending message 3, and the index (or sequence number) of the received preamble.
  • Message 2 can also include a backoff parameter to mitigate the conflict of uplink preambles. If the terminal decides to send the preamble again, it will generate a random time based on the backoff parameter so that the next preamble sending time is at least later than the generated random time.
  • Step 3 After comparing the RA-RNTI and the preamble index in the RAR, the terminal can determine whether the base station has received the preamble it sent. After confirming that the correct RAR has been received, the terminal sends message 3 (message3) based on UL-grant, which at least includes the terminal's identifier (UE ID). Message3 is addressed using T_C_RNTI on the physical layer. The terminal then starts a timer. While the timer is running, the downlink control channel PDCCH (Physical Downlink Control Channel) is detected. If two or more terminals collide in step 1, conflicts will continue to occur in step 3 because they will send message3 based on the same information, but the terminal identifiers contained in the MAC CE (MAC Control Element) of message3 are different.
  • PDCCH Physical Downlink Control Channel
  • Step 4 If the base station decodes message3 correctly, it will send message 4 (message4) to the terminal.
  • This message4 is addressed by the T_C_RNTI of the received message3, and the MAC CE includes the terminal's identifier contained in message3 and a newly allocated C-RNTI to the terminal. If multiple terminals send message3 on the same UL-grant, the base station may be able to correctly decode one of them, or it may not be able to decode (for example, when the interference level between them is similar).
  • the terminal receives message4 if it finds that the T_C_RNTI convolved on the PDCCH matches the message3 it sent, it will further check whether the MAC CE in the message4 sent by the base station matches its own terminal ID. After that, if the terminal ID also matches, the terminal can confirm that the random access process is completed and use the newly allocated C-RNTI as its own identity. This identity is used for addressing information of subsequent PHY, MAC and RRC layer protocols.
  • FIG2B is a flow chart of the two-step CBRA. As shown in FIG2B , the two-step CBRA includes two steps:
  • Step A The terminal transmits message A to the base station, which includes a random access preamble and a data channel PUSCH (Physical Uplink Shared Channel).
  • PUSCH Physical Uplink Shared Channel
  • PUSCH includes the terminal's UE ID.
  • Step B The base station sends a response message B. There are two ways to address the terminal in message B:
  • B1 If the UE ID in messageA is C-RNTI, then the C-RNTI is also convolved on the downlink control channel (PDCCH) of messageB. In this case, if the terminal can confirm that the C-RNTI of messageB matches its own C-RNTI, it is considered that the random access process has been completed correctly, that is, the conflict has been resolved.
  • This situation of B1 is suitable for terminals in the RRC_CONNECTED state, that is, the terminal has completed the initial access and established an RRC connection with the network.
  • B2 If the UE ID in messageA is other than C-RNTI, then the RA-RNTI is convolved on the PDCCH of messageB. B2 is applicable to other situations except B1. If the UE ID contained in SuccessRAR in messageB matches its own UE ID, the terminal will consider its random access process successful and the conflict is resolved. Otherwise, the terminal will either choose It will choose to resend messageA, or fall back to 4-step RACH and send messagegae1.
  • IoT terminals are used in places such as logistics, warehousing, factory automation and animal husbandry. These IoT terminals only need to be able to intermittently communicate with the network or perform rough positioning and tracking.
  • IoT terminals such as NB-IoT (Narrow Band IoT) terminals used for coal and electricity metering, require batteries to provide energy. Although the energy consumption is very low, the batteries in these terminals will be exhausted in a few years at most. In this way, at least a lot of manpower is required to replace the battery. And some industrial scenarios are too dangerous and are not suitable for manual operation at all. Based on this, battery-free IoT terminals came into being.
  • RFID Radio Frequency Identification
  • Transplanting communication systems such as RFID into 3GPP's cellular networks can effectively solve the coverage problem.
  • the deployed cellular networks such as 4G and 5G
  • the advantage of full coverage is that the communication or positioning process between the IoT terminal and the network does not require human intervention, so it can work 24 hours a day, 7 days a week, and the work efficiency is high. It can even work efficiently in environments that are not suitable for human intervention (such as wilderness, mines, and factories). In this way, except for the initial need to associate the IoT terminal with a specific object, subsequent data reading, writing, and operation and maintenance can be operated through an APP on a smartphone, which is very convenient and efficient.
  • A-IoT communication uses energy harvesting and backscattering communication technology.
  • the A-IoT communication network consists of network equipment and A-IoT terminals (also called A-IoT devices, zero-power terminals, electronic tags, tags).
  • Figure 3 shows a schematic diagram of the basic structure of the A-IoT communication system.
  • the network equipment is used to send wireless power supply signals, downlink communication signals, and backscatter signals for receiving tags to the tags.
  • a basic tag includes an energy harvesting module, a backscattering communication module, and a low-power computing module.
  • the tag may also have a memory or sensor for storing some basic information (such as item identification, etc.) or obtaining sensor data such as ambient temperature and ambient humidity.
  • inventory refers to checking for missing goods when goods enter and leave the warehouse.
  • sensors include temperature, pressure, humidity and other sensors, which are used in industry, agriculture and smart cities.
  • the sensor information is uploaded to a third-party app through the A-IoT system for monitoring and management.
  • Tracking generally refers to obtaining the approximate location of an object at irregular intervals. For example, users can basically understand the location of their express delivery in real time through a smartphone.
  • Command refers to the operation of a certain servo mechanism through the A-IoT communication system, and these servo mechanisms are connected to the A-IoT terminal. For example, during a break in the office, water the flowers and plants in the backyard through a mobile phone app, and the watering servo mechanism is connected to an A-IoT terminal.
  • FIGS 4A to 4D show schematic diagrams of four topological network structures.
  • the A-IoT terminal can be connected to a network device for two-way communication.
  • the A-IoT terminal can be connected to an intermediate node for two-way communication, and the intermediate node is connected to a network device for two-way communication; optionally, the intermediate node can be a UE, which is connected to the network device for communication through a Uu interface.
  • the A-IoT terminal can receive a power supply signal/downlink communication signal sent by an auxiliary node, and send an uplink signal to the network device; optionally, the auxiliary node can be a UE, which is connected to the network device for communication through a Uu interface. As shown in Figure 4D, the A-IoT terminal can be connected to a UE for two-way communication.
  • A-IoT terminal comes from the surrounding environment, such as radio waves (RF), solar energy, thermal energy, mechanical vibration, wind energy, etc.
  • RF radio waves
  • type A and B terminals can only communicate by reflecting and modulating the received radio waves. This communication method is called backscattering, which means that they cannot actively send radio signals.
  • Their power is within the range of 1 to 10 microwatts (uW).
  • uW microwatts
  • the transmission power of type A terminals is the lowest and the hardware complexity is the lowest, which is basically close to the level of RFID terminals.
  • Type B is slightly more complex, such as having signal amplifier devices and certain energy storage devices, so the communication distance with the network can be farther than that of type A.
  • Type C has the ability to actively send radio waves, with a transmission power of about 1 to 10 milliwatts (mW), and can store a certain amount of energy. All three types of terminals can obtain energy from the environment and can work continuously for several years or more than 10 years. In order to save energy, type A and B terminals are basically in a dormant state before the network triggers the communication process. It will only wake up and work when stimulated by the wireless signal of the network.
  • A-IoT receivers can be divided into two categories:
  • Receiver type 1 Wideband receiver. This type of receiver is also called an RF receiver. It uses an RF bandpass filter to obtain the signal within the bandwidth to be received, and then performs envelope detection and subsequent baseband processing.
  • the structure of this architecture is the simplest, and its power consumption can be as low as several uW or even lower.
  • the receiver due to the poor accuracy of the RF bandpass filter, even when the target signal occupies a narrow bandwidth, the receiver often receives signals within a wider bandwidth. Therefore, more noise and interference are introduced in the reception process, and the receiver performance is poor. That is, its sensitivity is poor.
  • Figure 5A is a block diagram of a typical wideband receiver.
  • Receiver type 2 narrowband receiver.
  • Typical examples include intermediate frequency receivers or zero intermediate frequency receivers.
  • the RF signal is down-converted and the baseband signal is further filtered using a low-pass filter to eliminate noise and interference. Therefore, the receiver has a narrow receiving bandwidth and high receiving performance, i.e., receiver sensitivity.
  • the receiver requires the use of an LO (Local oscillator). Even the recommended LO consumes 100uW or even more power. Therefore, the power consumption of the receiver is relatively high, but because its absolute power consumption is very low, it is still suitable for use in zero-power devices.
  • Figure 5B is a block diagram of a typical intermediate frequency receiver.
  • type A terminals usually use broadband receivers
  • type C terminals usually use narrowband receivers
  • type B terminals may use one or both types of receivers.
  • FIG. 6 is a schematic diagram of an application scenario of an embodiment of the present application. As shown in Figure 6, a tag is likely to be between the coverage ranges of different readers.
  • FIG7 is a schematic flow chart of a signal processing method according to an embodiment of the present application.
  • the method can optionally be applied to the system shown in FIG1 , but is not limited thereto.
  • the method includes at least part of the following contents.
  • a first device receives a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal;
  • the first device determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device to determine whether to respond to a message received by the first device that triggers initial access.
  • the first device may be a terminal device.
  • the first device may be a terminal in IoT, such as an A-IoT device, a zero-power terminal, or an electronic tag.
  • the second device may be a node in the system/network.
  • the second device may be a node for communicating with the first device.
  • the node may be a terminal device, a network device, or a node (power supply node) that provides backscattered radio waves separately.
  • the second device may be a network device (e.g., a base station) shown in FIG. 4A, an intermediate node shown in FIG. 4B, an auxiliary node shown in FIG. 4C, or a UE shown in FIG. 4D.
  • the embodiment of the present application does not limit the topological structure in the network, and therefore, the second device is not limited to the above-mentioned various forms, and the second device may include any form of node capable of performing point-to-point communication with the first device.
  • the above-mentioned access method can be applied to the scenario where the first device may be within the coverage of multiple second devices, such as the scenario shown in FIG6, and can solve the conflict problem between multiple second devices.
  • the first device may receive messages sent by one or more second devices. Since the distances between each second device and the first device may be different, the first device may not be able to correctly receive the message of each second device, or the signal quality of each message received by the first device is different.
  • the first device determines the first parameter of the target device based on the first parameter in the received first signal, and when receiving the message triggering the initial access, it can determine whether to respond based on the first parameter. In this way, the first device can only respond to the message triggering the initial access sent by the target device, avoiding interference/conflict between the target device and other second devices.
  • the first parameter is introduced in the embodiment of the present application to distinguish different second devices, that is, to identify a specific second device in at least one second device.
  • the first parameter can be called an RCC (Reader Color Code) parameter. Based on the first parameter, it is possible to distinguish and process messages that trigger initial access from different second devices, and resolve conflicts between different second devices at a lower cost of system bandwidth overhead and signaling overhead.
  • RCC Reader Color Code
  • the above step S720 in which the first device determines the first parameter of the target device to be initially connected based on the first parameter in the first signal, includes:
  • the first device determines, among the multiple first signals received, a first signal having the greatest signal strength
  • the first device determines the first parameter in the first signal with the largest signal strength as the first parameter of the target device.
  • the first device when the first device receives multiple first signals, the first device can measure the first signals to determine the strength of each first signal, select the second device corresponding to the first signal with the largest signal strength as the target device, and record its first parameter.
  • the first device may directly determine the first parameter in the first signal as the first parameter of the target device.
  • FIG8 is a schematic flow chart of a signal processing method according to another embodiment of the present application. The method includes:
  • the second device sends a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine a first parameter of a target device for initial access, so as to determine whether to respond to a message triggering initial access received by the first device.
  • the first signal sent by the second device includes the first parameter of the second device, so that the first device can use the first signal to determine the first parameter of the target device for initial access, and distinguish between the messages triggering initial access from different second devices according to the first parameter of the target device. Therefore, the second device can help the first device resolve conflicts between different second devices during the initial access process by sending the first signal.
  • the first parameter is unique globally or locally within the communication system.
  • the first parameter is unique in the global scope of the communication system, that is, the first parameter of the target device is different from the first parameter of any other second device in the global scope of the communication system. In this way, the target device can be distinguished from other second devices in the global scope to ensure conflict resolution.
  • Another implementation manner is that the first parameter is unique in a local range of the communication system, that is, the first parameter of the target device is different from the first parameter of any other second device in the communication system.
  • FIG9 is a schematic diagram of the allocation method of the first parameter in an application example, in which a hexagon represents the range that a second device can cover, and the 3-bit information in the hexagon is the first parameter of the second device represented by the hexagon.
  • the first parameters of each second device are different from each other, that is, each second device is unique within the local range of the 7 hexagons. Since the interference in the communication system is related to the distance between the devices, when the distance between different second devices increases, the possibility of conflict decreases. Therefore, the first parameter of the second device is unique within the local range of the communication system, and can distinguish the target device from other second devices within the local range. At the same time, devices that are farther away will not conflict with the target device, so conflict resolution can also be achieved.
  • the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter is related to the number of second devices in the global scope. If the first parameter is unique in the local scope, the number of bits of the first parameter is related to the number of second devices in the local scope.
  • the number of bits of the first parameter increases or remains unchanged.
  • the number of second devices in a local range varies according to different application scenarios, so the number of bits or the bit length of the first parameter in different application scenarios can be set differently.
  • a first parameter of 3 bits can be used.
  • some scenarios may be relatively simple.
  • the first parameter of the reader can be 2 bits or even 1 bit.
  • the distribution of readers may be relatively dense, so the first parameter of the reader may require 4 bits.
  • the number of bits of the first parameter increases or remains unchanged as the number of second devices increases, so it can be ensured that each second device is assigned a unique first parameter in the local range within an appropriate bit length.
  • a message includes a first parameter, and specifically, the first parameter may be compiled in the information of the physical layer or compiled in the L2 (Layer 2, layer 2) message, such as compiled in the MAC layer or the RRC layer.
  • the first parameter may appear alone as a parameter in the message, or may be compiled in the message together with other parameters.
  • the first signal includes a beacon signal periodically broadcast by the second device. That is, the second device sends the first signal to the first device, including: the second device periodically broadcasts the beacon signal.
  • any second device may periodically broadcast a beacon signal, wherein the beacon signal includes its own first parameter, so that a first device within a coverage area may determine the first parameter of a target device for initial access.
  • the broadcast period of the beacon signal is selected from a preconfigured period set.
  • FIG10 is a schematic diagram of an application example of a signal processing method according to an embodiment of the present application. Taking the first device including a tag and the second device near the first device including a reader as an example, as shown in FIG10 , the above signal processing method based on the beacon signal includes the following steps:
  • Step 1 Before triggering the tag to initiate initial access, each reader first broadcasts a beacon signal periodically.
  • the signal at least includes an RCC parameter (first parameter).
  • the beacon signal is generally a broadband signal, such as broadcast within the bandwidth of a carrier.
  • Candidates for the beacon signal broadcast period may include a limited number of period values agreed in advance.
  • Step 2 The tag attempts to receive the beacon signal from the reader and measures the signal. The tag selects the beacon with the highest signal strength as the best reader (target device) and records its RCC parameters.
  • the first device receives the first signal, including:
  • the first device searches for a beacon signal within a first time window
  • the first device searches for multiple beacon signals containing the same first parameter, it determines the broadcast period of the second device corresponding to the same first parameter based on the multiple beacon signals containing the same first parameter, and receives the beacon signal from the second device based on the broadcast period.
  • the first device receiving the beacon signal can be divided into two stages.
  • the first stage is the scanning stage, during which the first device is not sure of the transmission time of the beacon signal of the second device, so it searches for the beacon signal within a certain time window.
  • the first device can determine the broadcast period of the second device corresponding to the first parameter, so it can determine the transmission time of the beacon signal based on the broadcast period, and receive the beacon signal when it is transmitted, thereby saving energy consumption.
  • the broadcast period of the beacon signal is selected from a preconfigured period set, and the length of the first time window is greater than the maximum period in the period set.
  • the pre-configured period set includes multiple period values, the largest of which is 20ms (milliseconds), and the second device can select the period value used for beacon signal broadcasting from the period set.
  • the first device searches for beacon signals within a time window greater than or equal to 20ms, so it is certain that it can search for beacon signals sent twice by the same second device, so it can determine the broadcast period of the second device, and perform subsequent reception based on the broadcast period, saving energy consumption.
  • the first device receives at least one first signal, including: the first device sends a second signal, the second signal is used to trigger the second device that receives the second signal to send the first signal; the first device receives the first signal sent by the second device.
  • the second device sends a first signal to the first device, including: the second device sends the first signal to the first device when receiving the second signal sent by the first device.
  • the occurrence of the first signal may be actively triggered by the first device.
  • the first device may include a type C tag that only supports MO (Message Original) services.
  • the first signal for configuring the initial access parameters of the first device may be triggered on-demand to save energy consumption of the second device (e.g., a network device).
  • FIG11 is a schematic diagram of another application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, where the first device includes a tag and the second device near the first device includes a reader as an example, as shown in FIG11 , the above signal processing method based on active triggering by the first device includes the following steps:
  • Step 1 When the tag wants to initiate a call, it will first send a wakeup signal (equivalent to the second signal) to the surrounding readers. If more than one reader receives the wakeup signal, then these readers will respond to the wakeup signal.
  • a wakeup signal equivalent to the second signal
  • Step 2 Both reader A and reader B respond to the wake-up signal by sending message 0 (msg0, equivalent to the first signal).
  • Step 3 If the two msg0s do not conflict, that is, the tag correctly receives the two msg0s through signal demodulation, then the tag can determine the best reader (target device) by measuring the signal strength of msg0. If the two msg0s conflict, the tag determines the best reader based on the result of signal demodulation. In the latter case, only the reader that is correctly demodulated is the best reader. The tag records its RCC parameters.
  • the signal processing method also includes: the second device sends a trigger message; wherein the trigger message includes a first parameter of the second device; the trigger message is used to trigger the first device to send a first access message when the first parameter in the trigger message is the same as the first parameter of the target device.
  • the above-mentioned signal processing method also includes: the first device receives a trigger message, the trigger message is used to trigger initial access, and the trigger message includes a first parameter of the device sending the trigger message; the first device sends a first access message when the first parameter in the trigger message is the same as the first parameter of the target device.
  • the initial access may be actively triggered by the second device.
  • the second device may broadcast a trigger message so that when the first device within the coverage receives the trigger message, it determines whether to send the first message for accessing the network, i.e., the first access message, according to the first parameter in the trigger message.
  • the first device ignores or discards the trigger message.
  • the first device only responds to the trigger message sent by the target device. Since the target device is the second device with the best communication signal with the first device, the signal quality in the subsequent initial access process can be guaranteed.
  • the second device may send a trigger message based on the requirements of a specific application scenario.
  • the trigger message may include a message for initiating an inventory count, that is, the second device may send a trigger message in order to implement an inventory count.
  • the first access message includes a first parameter of the target device, and the first parameter of the target device is used to instruct the target device to send a response message.
  • the signal processing method also includes: the second device receives a first access message, the first access message includes a first parameter of the target device; the second device sends a response message to the first device when the first parameter in the first access message is the same as the first parameter of the second device.
  • each second device can determine whether it is the target device, and thus determine whether to respond to the first access message sent by the first device, thereby achieving differentiated processing of different second devices.
  • FIG12 is a schematic diagram of an application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, the first device includes a tag, and the second device near the first device includes a reader as an example, as shown in FIG12, the signal processing method includes the following steps:
  • Step 0 For the purpose of inventory, the network broadcasts a message (msg0, trigger message) to trigger inventory on a certain frequency band through a reader (for example, reader A).
  • Msg0 contains at least the RCC parameter (first parameter) that represents the reader.
  • the first access message sent by the tag contains the RCC parameters selected by the tag.
  • Step 2 The first access message is received by reader A and reader B.
  • reader B since the RCC contained in the message is different from its own RCC, reader B will ignore the message and not send a response message.
  • the first access message also includes a first identifier of the first device, and the first access message is used to trigger the target device to send a response message including the first identifier.
  • the response message includes the first identifier of the first device, the first identifier is obtained based on the first access message, and the response message is used by the first device to determine that the initial access is successful based on the first identifier. That is, the above-mentioned signal processing method also includes: the first device receives the response message, and when the first identifier in the response message is the same as the first identifier of the first device, it is determined that the initial access is successful.
  • the response message may be a response message to a first access message sent by another device, and the first device may ignore or discard the response message.
  • the above initial access process implements conflict resolution between the first device and other devices by carrying the first identifier of the first device in the first access message sent by the first device and also carrying the first identifier of the first device in the response message sent by the second device.
  • the response message includes a second identifier of the first device.
  • the response message when the response message includes the first identifier of the first device, the response message also includes a second identifier assigned to the first device by the target device.
  • the response message sent by the second device when the received first access message includes its own first parameter, the response message sent by the second device includes the second identifier assigned to the first device by the second device.
  • the second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.
  • the uplink message content that the first device needs to send can be carried by the first access message, or compiled in the first access message.
  • the uplink message content that the first device needs to send has been sent to the second device through the first access message, and there will be no subsequent process.
  • the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.
  • the second identifier in the response message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the response message is determined based on at least the first parameter of the second device.
  • the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.
  • FIG13 shows a schematic diagram of another application example of the signal processing method according to an embodiment of the present application.
  • the signal processing method includes:
  • Step 1 After receiving the trigger message, the tag compares the RCC parameter (first parameter) in the trigger message with the RCC parameter of the best reader (target device) saved by itself, and finds that the two are the same, so it sends the first access message to the reader.
  • Step 2 After receiving the first access message from the tag and comparing the RCC, reader A feeds back a response message containing the received first identifier tag-id and the second identifier Tag-RNTI assigned to the tag.
  • the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes.
  • the first access message sent by the first device when the first parameter in the trigger message is the same as the first parameter of the target device may include a first preamble code; at least part of the information in the sequence number of the first preamble code is determined based on the first parameter of the target device, and at least part of the information is used to instruct the target device to send a response message.
  • the signal processing method also includes: the second device receives a first access message, the first access message includes a first preamble code; the second device sends a response message to the first device when at least part of the information in the sequence number of the first preamble code matches the first parameter of the second device; wherein the response message includes the sequence number of the first preamble code, so that the first device sends the second access message.
  • the signal processing method further includes: the first device receives a response message, and sends a second access message when the preamble code sequence number included in the response message is the same as the sequence number of the first preamble code.
  • the first parameter of the target device is carried by the sequence number of the first preamble in the first access message, so that each second device can determine whether to send a response message, and the second device also carries the preamble sequence number in the response message, so that the first device determines whether the response message is used to respond to the first access message sent by itself, and further, sends the second access message when the preamble sequence number is the same.
  • the second access message can be used to send uplink message content.
  • the second access message includes the first identifier of the first device; the signal processing method also includes: the second device receives the second access message; the second device sends an access confirmation message to the first device; wherein the access confirmation message includes the first identifier, so that the first device determines that the initial access is successful.
  • the above method also includes: after sending the second access message, the first device receives an access confirmation message, and determines that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device.
  • the first device may ignore or discard the access confirmation message.
  • the second device after receiving the second access message, the second device feeds back an access confirmation message including the first identifier in the message to the first device, so that the first device can confirm that the conflict between the first device and other devices is resolved, thereby determining that the initial access is successful.
  • the access confirmation message includes the second identifier of the first device.
  • the access confirmation message when the access confirmation message includes the first identifier of the first device, the access confirmation message also includes the second identifier assigned to the first device by the target device.
  • the access confirmation message sent by the second device after receiving the second access message, the access confirmation message sent by the second device also includes the second identifier assigned to the first device by the second device.
  • the second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.
  • the uplink message content that the first device needs to send can be carried by the second access message, or compiled in the second access message.
  • the uplink message content that the first device needs to send has been sent to the second device through the second access message, and there will be no subsequent process.
  • the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.
  • the second identifier in the access confirmation message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the access confirmation message is determined based on at least the first parameter of the second device.
  • the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.
  • FIG14 shows a schematic diagram of another application example of the signal processing method according to an embodiment of the present application.
  • the signal processing method includes:
  • Step 1 After the tag receives the trigger message, it compares the RCC parameters in the trigger message with the RCC parameters of the best reader it has saved, and finds that the two are the same, so it randomly selects a preamble to send the first access message.
  • a sequence is modulated on the preamble. The number of these sequences is limited, for example, there are 16 in total, and each sequence has a fixed serial number.
  • the reader can demodulate preambles of different sequences. If the preambles with the same sequence are received from different tags, the reader cannot distinguish between different tags, that is, they may be demodulated as one preamble.
  • the serial number (preamble index) of the preamble selected by the tag also contains the RCC parameters.
  • Step 3 After receiving the preamble index, the tag will compare it with the index of the preamble it just sent. If the two indexes are found to be the same, the tag will send a second access message containing at least the tag-id to the reader; otherwise, it is considered that the initial access has failed.
  • the tag-id can be a random number generated by the tag itself.
  • Step 4 After receiving the message from the tag, reader A returns an access confirmation message, which contains the received tag-id and the tag-RNTI (second identifier) assigned to the tag. After the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes.
  • tag-RNTI second identifier
  • the first access message includes a first preamble.
  • the signal processing method further includes: the second device receives the first access message; the second device sends a response message; wherein the response message includes a first parameter of the second device and a sequence number of the first preamble, so that the first device sends the second access message.
  • the signal processing method also includes: the first device receives a response message to the first access message, and the response message includes a first parameter of the second device that sends the access response message; the first device sends a second access message when the first parameter in the response message is the same as the first parameter of the target device and the response message includes the sequence number of the first preamble code.
  • the first device when the first device processes the first preamble, it does not need to refer to the first parameter of the target device.
  • Each second device can respond to the first access message sent by the first device.
  • the first parameters in the response messages sent by different second devices are different, and the first device can determine the response message sent by the target device, and send the second access message when the response message contains the sequence number of the first preamble.
  • the second access message includes the first identifier of the first device; the signal processing method also includes: the second device receives the second access message; the second device sends an access confirmation message to the first device; wherein the access confirmation message includes the first identifier, so that the first device determines that the initial access is successful.
  • the above method also includes: after sending the second access message, the first device receives an access confirmation message, and determines that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device.
  • the first device may ignore or discard the access confirmation message.
  • the second device after receiving the second access message, the second device feeds back an access confirmation message including the first identifier in the message to the first device, so that the first device can confirm that the conflict between the first device and other devices is resolved, thereby determining that the initial access is successful.
  • the access confirmation message includes the second identifier of the first device.
  • the access confirmation message when the access confirmation message includes the first identifier of the first device, the access confirmation message also includes the second identifier assigned to the first device by the target device.
  • the access confirmation message sent by the second device after receiving the second access message, the access confirmation message sent by the second device also includes the second identifier assigned to the first device by the second device.
  • the second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.
  • the uplink message content that the first device needs to send can be carried by the second access message, or compiled in the second access message.
  • the uplink message content that the first device needs to send has been sent to the second device through the second access message, and there will be no subsequent process.
  • the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.
  • the second identifier in the access confirmation message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the access confirmation message is determined based on at least the first parameter of the second device.
  • the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.
  • FIG15 shows a schematic diagram of another application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, the first device includes a tag, and the second device near the first device includes a reader as an example, as shown in FIG15, the signal processing method includes:
  • Step 1 After the tag receives the trigger message, it compares the RCC in the trigger message with the RCC of the best reader it has saved and finds that the two are the same, so it randomly selects a preamble to send the first access message.
  • a sequence is modulated on the preamble. The number of these sequences is limited, for example, there are 16 in total, and each sequence has a fixed serial number.
  • the reader can demodulate preambles of different sequences. If the preambles with the same sequence are received from different tags, the reader cannot distinguish between different tags, and may demodulate them as one preamble.
  • Step 2 After receiving the preamble, reader A and reader B respond with a message containing the preamble index (preamble sequence number). The response message is sent to the tag to indicate that the preamble corresponding to the preamble index has been correctly received and demodulated.
  • Step 3 After receiving the preamble index, the tag will compare it with the index of the preamble it just sent. If the two indices are the same, the tag will send a second access message containing at least the tag-id to the reader; otherwise, it is considered that the initial access has failed.
  • the tag-id can be a random number generated by the tag itself. In this step, although the tag receives the response messages from reader A and reader B almost at the same time, because reader A is the best reader, the tag demodulates the response message of reader A, and the response message of reader B becomes an interference signal.
  • Step 4 After receiving the message from the tag, reader A returns an access confirmation message, which contains the received tag-id and the tag-RNTI (second identifier) assigned to the tag. After the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes.
  • tag-RNTI second identifier
  • the second access message and/or the access confirmation message may include the first parameter of the target device, wherein the first value may be a preset value.
  • the first identifiers of all first devices that are in the initial access process and around the first device can always remain unique.
  • the above embodiment provides another solution, which allows the bit length of the first identifier to be smaller, so that only the first devices that are in the initial access process of one second device can remain unique to each other, that is, the first devices that are in the initial access process of different second devices may have the same first identifier.
  • the first parameter can be added to the second access message and the access confirmation message to distinguish all first devices that are in the initial access process.
  • the signal processing method of an embodiment of the present application determines the strongest (closest) network node by measuring the signal strength of a beacon signal or a wake-up signal (such as a message that triggers an inventory) sent by a network node, and distinguishes the network nodes through a first parameter.
  • This solution can basically eliminate the interference problem between the uplink and downlink of readers during the initial access process at the cost of a smaller system bandwidth overhead and signaling overhead.
  • FIG16 is a schematic block diagram of a first device 1600 according to an embodiment of the present application.
  • the first device 1600 may include:
  • the first communication module 1610 is configured to receive a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal;
  • the first processing module 1620 is used to determine a first parameter of the target device for initial access based on the first parameter in the first signal; the first parameter of the target device is used to determine whether to respond to the message triggering initial access received by it.
  • the first processing module 1620 is further configured to:
  • the first parameter in the first signal with the largest signal strength is determined as the first parameter of the target device.
  • the first parameter is unique in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter increases or remains unchanged.
  • the first signal includes a beacon signal periodically broadcast by the second device.
  • the first communication module 1610 is further configured to search for a beacon signal within the first time window
  • the first processing module 1620 is further configured to determine the broadcast period of the second device corresponding to the same first parameter based on the multiple beacon signals containing the same first parameter if multiple beacon signals containing the same first parameter are searched;
  • the first communication module 1610 is further configured to receive a beacon signal from a second device based on a broadcast period.
  • the broadcast period is selected from a preconfigured period set, and the length of the first time window is greater than the maximum period in the period set.
  • the first communication module 1610 is further configured to:
  • Sending a second signal wherein the second signal is used to trigger the second device that receives the second signal to send the first signal;
  • a first signal sent by a second device is received.
  • the first communication module 1610 is further configured to:
  • a first access message is sent.
  • the trigger message includes a message for initiating an inventory.
  • the first access message includes a first parameter of the target device, and the first parameter of the target device is used to indicate the target device.
  • the device sends a response message.
  • the first access message further includes a first identifier of the first device, and the first access message is used to trigger the target device to send a response message including the first identifier;
  • the first communication module 1610 is further configured to receive a response message
  • the first processing module 1620 is further configured to determine that the initial access is successful when the first identifier in the response message is the same as the first identifier of the first device.
  • the response message includes the second identifier allocated by the target device to the first device.
  • the first access message includes a first preamble; at least part of the information in the sequence number of the first preamble is determined based on a first parameter of the target device, and at least part of the information is used to instruct the target device to send a response message;
  • the first communication module 1610 is further configured to:
  • a response message is received, and when the preamble code sequence number included in the response message is the same as the sequence number of the first preamble code, a second access message is sent.
  • the first access message includes a first preamble
  • the first communication module 1610 is further configured to:
  • a second access message is sent.
  • the second access message includes a first identifier of the first device
  • the first communication module 1610 is further configured to receive an access confirmation message after sending the second access message;
  • the first processing module 1620 is further configured to determine that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device.
  • the access confirmation message includes the second identifier allocated by the target device to the first device.
  • the second identifier is determined based on at least a first parameter of the target device.
  • the second access message and/or the access confirmation message includes the first parameter of the target device.
  • the first device 1600 of the embodiment of the present application can implement the corresponding functions of the first device in the aforementioned method embodiment.
  • the processes, functions, implementation methods and beneficial effects corresponding to the various modules (sub-modules, units or components, etc.) in the first device 1600 can be found in the corresponding descriptions in the above method embodiments, which will not be repeated here.
  • the functions described by the various modules (sub-modules, units or components, etc.) in the first device 1600 of the application embodiment can be implemented by different modules (sub-modules, units or components, etc.) or by the same module (sub-module, unit or component, etc.).
  • FIG17 is a schematic block diagram of a second device 1700 according to an embodiment of the present application.
  • the second device 1700 may include:
  • the second communication module 1710 is used to send a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine the first parameter of the target device for initial access to determine whether to respond to the message triggering initial access received by the first device.
  • the first parameter is unique in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter increases or remains unchanged.
  • the second communication module 1710 is further configured to:
  • the broadcast period of the beacon signal is selected from a preconfigured period set.
  • the second communication module 1710 is further configured to:
  • the first signal is sent to the first device.
  • the second communication module 1710 is further configured to:
  • the trigger message includes a first parameter of the second device; the trigger message is used to trigger the first device to send a first access message when the first parameter in the trigger message is the same as the first parameter of the target device.
  • the trigger message includes a message for initiating an inventory.
  • the second communication module 1710 is further configured to:
  • a response message is sent to the first device.
  • the response message includes a first identifier of the first device; the first identifier is obtained based on the first access message, and the response message includes a first identifier of the first device; The response message is used by the first device to determine that the initial access is successful based on the first identifier.
  • the response message includes the second identifier allocated by the second device to the first device.
  • the second communication module 1710 is further configured to:
  • a response message is sent to the first device; wherein the response message includes the sequence number of the first preamble code, so that the first device sends a second access message.
  • the second communication module 1710 is further configured to:
  • the response message includes the first parameter of the second device and the sequence number of the first preamble code, so that the first device sends a second access message.
  • the second communication module 1710 is further configured to:
  • An access confirmation message is sent to the first device, wherein the access confirmation message includes a first identifier, so that the first device determines that the initial access is successful.
  • the access confirmation message includes a second identifier allocated by the second device to the first device.
  • the second identifier is determined based on at least a first parameter of the second device.
  • the second access message and/or the access confirmation message includes the first parameter of the second device.
  • the second device 1700 of the embodiment of the present application can implement the corresponding functions of the second device in the aforementioned method embodiment.
  • the processes, functions, implementation methods and beneficial effects corresponding to the various modules (sub-modules, units or components, etc.) in the second device 1700 can be found in the corresponding descriptions in the above method embodiments, which will not be repeated here.
  • the functions described by the various modules (sub-modules, units or components, etc.) in the second device 1700 of the application embodiment can be implemented by different modules (sub-modules, units or components, etc.), or by the same module (sub-module, unit or component, etc.).
  • Fig. 18 is a schematic structural diagram of a communication device 1800 according to an embodiment of the present application.
  • the communication device 1800 includes a processor 1810, and the processor 1810 can call and run a computer program from a memory to enable the communication device 1800 to implement the method in the embodiment of the present application.
  • the communication device 1800 may further include a memory 1820.
  • the processor 1810 may call and run a computer program from the memory 1820 to enable the communication device 1800 to implement the method in the embodiment of the present application.
  • the memory 1820 may be a separate device independent of the processor 1810 , or may be integrated into the processor 1810 .
  • the communication device 1800 may further include a transceiver 1830, and the processor 1810 may control the transceiver 1830 to communicate with other devices, specifically, may send information or data to other devices, or receive information or data sent by other devices.
  • the transceiver 1830 may include a transmitter and a receiver.
  • the transceiver 1830 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 1800 may be the first device of the embodiment of the present application, and the communication device 1800 may implement the corresponding processes implemented by the first device in each method of the embodiment of the present application, which will not be repeated here for the sake of brevity.
  • the communication device 1800 may be the second device of the embodiment of the present application, and the communication device 1800 may implement the corresponding processes implemented by the second device in each method of the embodiment of the present application, which will not be described again for the sake of brevity.
  • Fig. 19 is a schematic structural diagram of a chip 1900 according to an embodiment of the present application.
  • the chip 1900 includes a processor 1910, and the processor 1910 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the chip 1900 may further include a memory 1920.
  • the processor 1910 may call and run a computer program from the memory 1920 to implement the method executed by the first device or the second device in the embodiment of the present application.
  • the memory 1920 may be a separate device independent of the processor 1910 , or may be integrated into the processor 1910 .
  • the chip 1900 may further include an input interface 1930.
  • the processor 1910 may control the input interface 1930 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
  • the chip 1900 may further include an output interface 1940.
  • the processor 1910 may control the output interface 1940 to communicate with other devices or chips, and specifically, may output information or data to other devices or chips.
  • the chip can be applied to the first device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the first device in each method of the embodiments of the present application. For the sake of brevity, they will not be repeated here.
  • the chip can be applied to the second device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the second device in each method of the embodiments of the present application. For the sake of brevity, they will not be repeated here.
  • the chips applied to the first device and the second device may be the same chip or different chips.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • the memory mentioned above may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM), a programmable ROM (PROM), an erasable programmable ROM (EPROM), an electrically erasable programmable ROM (EEPROM) or a flash memory.
  • the volatile memory may be a random access memory (RAM).
  • the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
  • FIG20 is a schematic block diagram of a communication system 2000 according to an embodiment of the present application.
  • the communication system 2000 includes a first device 2010 and a second device 2020 .
  • the first device 2010 receives a first signal, wherein the first signal includes a first parameter of the second device 2020 that sends the first signal;
  • the first device 2010 determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device 2010 to determine whether to respond to a received message triggering initial access.
  • the second device 2020 sends a first signal; wherein the first signal includes a first parameter of the second device 2020; the first signal is used by the first device 2010 to determine the first parameter of the target device for initial access, so as to determine whether to respond to the message triggering initial access received by the first device 2010.
  • the first device 2010 may be used to implement the corresponding function implemented by the first device in the above method
  • the second device 2020 may be used to implement the corresponding function implemented by the second device in the above method.
  • the sake of brevity it will not be described here.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that a computer can access or a data storage device such as a server or data center that includes one or more available media integrated.
  • the available medium can be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a solid state drive (SSD)), etc.
  • the size of the serial numbers of the above-mentioned processes does not mean the order of execution.
  • the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present application relates to a method for processing a signal, a first device, a second device, a chip, a computer-readable storage medium, a computer program product, a computer program, and a communication system. The method comprises: a first device receives a first signal, the first signal comprising a first parameter of a second device that has sent the first signal; and on the basis of the first parameter in the first signal, the first device determines a first parameter of an initially accessed target device, the first parameter of the target device being used by the first device to determine whether to respond to a received message for triggering initial access. According to embodiments of the present application, messages triggering initial access are distinguished by determining a first parameter of a target device, so that the problem of interference between different second devices during initial access can be solved.

Description

信号处理方法、第一设备和第二设备Signal processing method, first device and second device 技术领域Technical Field

本申请涉及通信领域,更具体地,涉及一种信号处理方法、第一设备、第二设备、芯片、计算机可读存储介质、计算机程序产品、计算机程序和通信系统。The present application relates to the field of communications, and more specifically, to a signal processing method, a first device, a second device, a chip, a computer-readable storage medium, a computer program product, a computer program, and a communication system.

背景技术Background Art

无线通信系统中,设备之间的干扰是普遍存在的。为了解决初始接入过程中的干扰问题,用于接入不同小区的随机接入资源在时域、频域或码域中的至少之一是错开的。然而,随着IoT(Internet of Things,物联网)的兴起,当前的无线通信出现了新的挑战,需要支持较低能力的设备接入网络中的节点,现有的小区间干扰消除手段可能并不适用。因此,需要考虑如何避免网络中不同设备之间的冲突。In wireless communication systems, interference between devices is ubiquitous. In order to solve the interference problem during the initial access process, the random access resources used to access different cells are staggered in at least one of the time domain, frequency domain or code domain. However, with the rise of IoT (Internet of Things), new challenges have emerged in current wireless communications. It is necessary to support lower-capability devices to access nodes in the network, and existing inter-cell interference elimination methods may not be applicable. Therefore, it is necessary to consider how to avoid conflicts between different devices in the network.

发明内容Summary of the invention

本申请实施例提供一种信号处理方法、第一设备、第二设备、芯片、计算机可读存储介质、计算机程序产品、计算机程序和通信系统,可以用于解决初始接入过程中不同设备之间的冲突。Embodiments of the present application provide a signal processing method, a first device, a second device, a chip, a computer-readable storage medium, a computer program product, a computer program, and a communication system, which can be used to resolve conflicts between different devices during an initial access process.

本申请实施例提供一种信号处理方法,包括:The present application provides a signal processing method, including:

第一设备接收第一信号;其中,第一信号中包含发送该第一信号的第二设备的第一参数;The first device receives a first signal; wherein the first signal includes a first parameter of the second device that sends the first signal;

第一设备基于第一信号中的第一参数,确定初始接入的目标设备的第一参数;目标设备的第一参数用于第一设备确定是否响应其接收到的触发初始接入的消息。The first device determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device to determine whether to respond to a received message triggering initial access.

本申请实施例提供一种信号处理方法,包括:The present application provides a signal processing method, including:

第二设备发送第一信号;其中,第一信号中包含第二设备的第一参数;第一信号用于第一设备确定初始接入的目标设备的第一参数,以确定是否响应第一设备接收到的触发初始接入的消息。The second device sends a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine a first parameter of a target device for initial access, so as to determine whether to respond to a message triggering initial access received by the first device.

本申请实施例提供一种第一设备,包括:The present application embodiment provides a first device, including:

第一通信模块,用于接收第一信号;其中,第一信号中包含发送该第一信号的第二设备的第一参数;A first communication module, configured to receive a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal;

第一处理模块,用于基于第一信号中的第一参数,确定初始接入的目标设备的第一参数;目标设备的第一参数用于确定是否响应其接收到的触发初始接入的消息。The first processing module is used to determine a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used to determine whether to respond to a received message triggering initial access.

本申请实施例提供一种第二设备,包括:The embodiment of the present application provides a second device, including:

第二通信模块,用于发送第一信号;其中,第一信号中包含第二设备的第一参数;第一信号用于第一设备确定初始接入的目标设备的第一参数,以确定是否响应第一设备接收到的触发初始接入的消息。The second communication module is used to send a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine the first parameter of the target device for initial access to determine whether to respond to the message triggering initial access received by the first device.

本申请实施例提供一种第一设备,包括:收发器、处理器和存储器。该存储器用于存储计算机程序,该收发器用于与其他设备进行通信,该处理器用于调用并运行该存储器中存储的计算机程序,以使该第一设备执行上述的信号处理方法。The embodiment of the present application provides a first device, including: a transceiver, a processor and a memory. The memory is used to store a computer program, the transceiver is used to communicate with other devices, and the processor is used to call and run the computer program stored in the memory, so that the first device performs the above-mentioned signal processing method.

本申请实施例提供一种第二设备,包括:收发器、处理器和存储器。该存储器用于存储计算机程序,该收发器用于与其他设备进行通信,该处理器用于调用并运行该存储器中存储的计算机程序,以使该第二设备执行上述的信号处理方法。The embodiment of the present application provides a second device, including: a transceiver, a processor and a memory. The memory is used to store a computer program, the transceiver is used to communicate with other devices, and the processor is used to call and run the computer program stored in the memory, so that the second device performs the above-mentioned signal processing method.

本申请实施例提供一种芯片,用于实现上述的信号处理方法。An embodiment of the present application provides a chip for implementing the above-mentioned signal processing method.

具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的信号处理方法。Specifically, the chip includes: a processor, which is used to call and run a computer program from a memory, so that a device equipped with the chip executes the above-mentioned signal processing method.

本申请实施例提供一种计算机可读存储介质,用于存储计算机程序,当该计算机程序被设备运行时使得该设备执行上述的信号处理方法。An embodiment of the present application provides a computer-readable storage medium for storing a computer program. When the computer program is executed by a device, the device executes the above-mentioned signal processing method.

本申请实施例提供一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的信号处理方法。An embodiment of the present application provides a computer program product, including computer program instructions, which enable a computer to execute the above-mentioned signal processing method.

本申请实施例提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述的信号处理方法。An embodiment of the present application provides a computer program, which, when executed on a computer, enables the computer to execute the above-mentioned signal processing method.

本申请实施例提供一种通信系统,包括用于上述接入方法的第一设备和第二设备。An embodiment of the present application provides a communication system, including a first device and a second device used for the above-mentioned access method.

本申请实施例,第二设备发送第一信号,其中包含用于标识第二设备的第一参数。第一设备接收第一信号,根据第一信号中包含的第一参数,确定初始接入的目标设备的第一参数。如此,在接收到触发初始接入的消息时,第一设备可以根据第一参数确定是否响应,即通过确定目标设备的第一参数,对触发初始接入的消息进行区分,可以解决初始接入过程中不同的第二设备之间的干扰问题。In an embodiment of the present application, the second device sends a first signal, which includes a first parameter for identifying the second device. The first device receives the first signal and determines the first parameter of the target device for initial access based on the first parameter included in the first signal. In this way, upon receiving a message triggering initial access, the first device can determine whether to respond based on the first parameter, that is, by determining the first parameter of the target device, the message triggering initial access can be distinguished, which can solve the interference problem between different second devices during the initial access process.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1是本申请实施例中的通信系统的示意图。FIG. 1 is a schematic diagram of a communication system in an embodiment of the present application.

图2A是四步CBRA的流程示意图。FIG. 2A is a schematic diagram of the four-step CBRA process.

图2B是两步CBRA的流程示意图。 FIG. 2B is a schematic diagram of the two-step CBRA process.

图3是A-IoT通信系统的基本构成示意图。FIG3 is a schematic diagram of the basic structure of the A-IoT communication system.

图4A是A-IoT通信系统中的第一种拓扑网络结构的示意图。FIG. 4A is a schematic diagram of a first topology network structure in an A-IoT communication system.

图4B是A-IoT通信系统中的第二种拓扑网络结构的示意图。FIG. 4B is a schematic diagram of a second topology network structure in an A-IoT communication system.

图4C是A-IoT通信系统中的第三种拓扑网络结构的示意图。FIG. 4C is a schematic diagram of a third topology network structure in an A-IoT communication system.

图4D是A-IoT通信系统中的第四种拓扑网络结构的示意图。FIG4D is a schematic diagram of a fourth topology network structure in an A-IoT communication system.

图5A是典型的宽带接收机的结构图。FIG5A is a block diagram of a typical wideband receiver.

图5B是典型的中频接收机的结构图。FIG5B is a block diagram of a typical intermediate frequency receiver.

图6是本申请实施例的一个应用场景的示意图。FIG. 6 is a schematic diagram of an application scenario of an embodiment of the present application.

图7是根据本申请一实施例的接入方法的示意性流程图。FIG. 7 is a schematic flowchart of an access method according to an embodiment of the present application.

图8是根据本申请另一实施例的接入方法的示意性流程图。FIG8 is a schematic flowchart of an access method according to another embodiment of the present application.

图9是一个应用示例中第一参数的分配方式的示意图。FIG. 9 is a schematic diagram of a distribution method of a first parameter in an application example.

图10是本申请实施例的接入方法的应用示例一的示意图。FIG. 10 is a schematic diagram of application example 1 of the access method according to an embodiment of the present application.

图11是本申请实施例的接入方法的应用示例二的示意图。FIG. 11 is a schematic diagram of application example 2 of the access method according to an embodiment of the present application.

图12是本申请实施例的接入方法的应用示例三的示意图。FIG. 12 is a schematic diagram of application example 3 of the access method according to an embodiment of the present application.

图13是本申请实施例的接入方法的应用示例四的示意图。FIG. 13 is a schematic diagram of application example 4 of the access method according to an embodiment of the present application.

图14是本申请实施例的接入方法的应用示例五的示意图。FIG. 14 is a schematic diagram of application example 5 of the access method according to an embodiment of the present application.

图15是本申请实施例的接入方法的应用示例六的示意图。FIG. 15 is a schematic diagram of application example 6 of the access method according to an embodiment of the present application.

图16是根据本申请一实施例的第一设备的示意性框图。FIG. 16 is a schematic block diagram of a first device according to an embodiment of the present application.

图17是根据本申请一实施例的第二设备的示意性框图。FIG. 17 is a schematic block diagram of a second device according to an embodiment of the present application.

图18是根据本申请实施例的通信设备示意性框图。FIG18 is a schematic block diagram of a communication device according to an embodiment of the present application.

图19是根据本申请实施例的芯片的示意性框图。FIG. 19 is a schematic block diagram of a chip according to an embodiment of the present application.

图20是根据本申请实施例的通信系统的示意性框图。FIG. 20 is a schematic block diagram of a communication system according to an embodiment of the present application.

具体实施方式DETAILED DESCRIPTION

下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。The technical solutions in the embodiments of the present application will be described below in conjunction with the drawings in the embodiments of the present application.

本申请实施例的技术方案可以应用于各种通信系统,例如:长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新无线(New Radio,NR)系统、NR系统的演进系统、非授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、非授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、非地面通信网络(Non-Terrestrial Networks,NTN)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、第五代通信(5th-Generation,5G)系统或其他通信系统等。The technical solutions of the embodiments of the present application can be applied to various communication systems, for example: Long Term Evolution (LTE) system, Advanced long term evolution (LTE-A) system, New Radio (NR) system, NR system evolution system, LTE on unlicensed spectrum (LTE-U) system, NR on unlicensed spectrum (NR-based access to unlicensed spectrum, NR-U) system, Non-Terrestrial Networks (NTN) system, Universal Mobile Telecommunication System (UMTS), Wireless Local Area Networks (WLAN), Wireless Fidelity (WiFi), fifth-generation communication (5th-Generation, 5G) system or other communication systems.

通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),车辆间(Vehicle to Vehicle,V2V)通信,或车联网(Vehicle to everything,V2X)通信等,本申请实施例也可以应用于这些通信系统。Generally speaking, traditional communication systems support a limited number of connections and are easy to implement. However, with the development of communication technology, mobile communication systems will not only support traditional communications, but will also support, for example, device to device (D2D) communication, machine to machine (M2M) communication, machine type communication (MTC) communication, vehicle to vehicle (V2V) communication, or vehicle to everything (V2X) communication, etc. The embodiments of the present application can also be applied to these communication systems.

在一种实施方式中,本申请实施例中的通信系统可以应用于载波聚合(Carrier Aggregation,CA)场景,也可以应用于双连接(Dual Connectivity,DC)场景,还可以应用于独立(Standalone,SA)布网场景。In one implementation, the communication system in the embodiment of the present application can be applied to a carrier aggregation (CA) scenario, a dual connectivity (DC) scenario, or a standalone (SA) networking scenario.

在一种实施方式中,本申请实施例中的通信系统可以应用于非授权频谱,其中,非授权频谱也可以认为是共享频谱;或者,本申请实施例中的通信系统也可以应用于授权频谱,其中,授权频谱也可以认为是非共享频谱。In one embodiment, the communication system in the embodiment of the present application can be applied to an unlicensed spectrum, wherein the unlicensed spectrum can also be considered as a shared spectrum; or, the communication system in the embodiment of the present application can also be applied to an authorized spectrum, wherein the authorized spectrum can also be considered as an unshared spectrum.

本申请实施例结合网络设备和终端设备描述了各个实施例,其中,终端设备也可以称为用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。The embodiments of the present application describe various embodiments in conjunction with network devices and terminal devices, wherein the terminal device may also be referred to as user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device, etc.

终端设备可以是WLAN中的站点(STAION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、下一代通信系统例如NR网络中的终端设备,或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的终端设备等。The terminal device can be a station (STAION, ST) in a WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal device in the next generation communication system such as the NR network, or a terminal device in the future evolved Public Land Mobile Network (PLMN) network, etc.

在本申请实施例中,终端设备可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部 署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。In the embodiment of the present application, the terminal device can be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted; It can be deployed on the water (such as ships, etc.); it can also be deployed in the air (such as airplanes, balloons and satellites, etc.).

在本申请实施例中,终端设备可以是手机(Mobile Phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self driving)中的无线终端设备、远程医疗(remote medical)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备或智慧家庭(smart home)中的无线终端设备等。In the embodiments of the present application, the terminal device may be a mobile phone, a tablet computer, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical, a wireless terminal device in smart grid, a wireless terminal device in transportation safety, a wireless terminal device in a smart city, or a wireless terminal device in a smart home, etc.

作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。As an example but not limitation, in the embodiments of the present application, the terminal device may also be a wearable device. Wearable devices may also be referred to as wearable smart devices, which are a general term for wearable devices that are intelligently designed and developed using wearable technology for daily wear, such as glasses, gloves, watches, clothing, and shoes. A wearable device is a portable device that is worn directly on the body or integrated into the user's clothes or accessories. Wearable devices are not only hardware devices, but also powerful functions achieved through software support, data interaction, and cloud interaction. Broadly speaking, wearable smart devices include full-featured, large-sized, and fully or partially independent of smartphones, such as smart watches or smart glasses, as well as devices that only focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various types of smart bracelets and smart jewelry for vital sign monitoring.

在本申请实施例中,网络设备可以是用于与移动设备通信的设备,网络设备可以是WLAN中的接入点(Access Point,AP),可以是LTE中的演进型基站(Evolutional Node B,eNB或eNodeB),或者中继站或接入点,或者车载设备、可穿戴设备以及NR网络中的网络设备(gNB)或者未来演进的PLMN网络中的网络设备或者NTN网络中的网络设备等。In an embodiment of the present application, the network device may be a device for communicating with a mobile device, the network device may be an access point (AP) in a WLAN, an evolved base station (eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and a network device (gNB) in an NR network, or a network device in a future evolved PLMN network, or a network device in an NTN network, etc.

作为示例而非限定,在本申请实施例中,网络设备可以具有移动特性,例如网络设备可以为移动的设备。可选地,网络设备可以为卫星、气球站。例如,卫星可以为低地球轨道(low earth orbit,LEO)卫星、中地球轨道(medium earth orbit,MEO)卫星、地球同步轨道(geostationary earth orbit,GEO)卫星、高椭圆轨道(High Elliptical Orbit,HEO)卫星等。可选地,网络设备还可以为设置在陆地、水域等位置的基站。As an example but not limitation, in an embodiment of the present application, the network device may have a mobile feature, for example, the network device may be a mobile device. Optionally, the network device may be a satellite or a balloon station. For example, the satellite may be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geostationary earth orbit (GEO) satellite, a high elliptical orbit (HEO) satellite, etc. Optionally, the network device may also be a base station set up in a location such as land or water.

在本申请实施例中,网络设备可以为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备进行通信,该小区可以是网络设备(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括:城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。In an embodiment of the present application, a network device can provide services for a cell, and a terminal device communicates with the network device through transmission resources (e.g., frequency domain resources, or spectrum resources) used by the cell. The cell can be a cell corresponding to a network device (e.g., a base station). The cell can belong to a macro base station or a base station corresponding to a small cell. The small cells here may include: metro cells, micro cells, pico cells, femto cells, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.

图1示例性地示出了一种通信系统100。该通信系统包括一个网络设备110和两个终端设备120。在一种实施方式中,该通信系统100可以包括多个网络设备110,并且每个网络设备110的覆盖范围内可以包括其它数量的终端设备120,本申请实施例对此不做限定。Fig. 1 exemplarily shows a communication system 100. The communication system includes a network device 110 and two terminal devices 120. In one embodiment, the communication system 100 may include multiple network devices 110, and each network device 110 may include other number of terminal devices 120 within its coverage area, which is not limited in the embodiment of the present application.

应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统为例,通信设备可包括具有通信功能的网络设备和终端设备,网络设备和终端设备可以为本申请实施例中的具体设备,此处不再赘述;通信设备还可包括通信系统中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。It should be understood that the device with communication function in the network/system in the embodiment of the present application can be called a communication device. Taking the communication system shown in Figure 1 as an example, the communication device may include a network device and a terminal device with communication function, and the network device and the terminal device may be specific devices in the embodiment of the present application, which will not be repeated here; the communication device may also include other devices in the communication system, such as other network entities such as a network controller and a mobile management entity, which is not limited in the embodiment of the present application.

应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the terms "system" and "network" are often used interchangeably in this article. The term "and/or" in this article is only a description of the association relationship of associated objects, indicating that three relationships can exist. For example, A and/or B can represent: A exists alone, A and B exist at the same time, and B exists alone. In addition, the character "/" in this article generally indicates that the associated objects before and after are in an "or" relationship.

应理解,在本申请的实施例中提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。It should be understood that the "indication" mentioned in the embodiments of the present application can be a direct indication, an indirect indication, or an indication of an association relationship. For example, A indicates B, which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association relationship between A and B.

在本申请实施例的描述中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。In the description of the embodiments of the present application, the term "corresponding" may indicate a direct or indirect correspondence between two items, or an association relationship between the two items, or a relationship between indication and being indicated, configuration and being configured, and the like.

为便于理解本申请实施例的技术方案,以下对本申请实施例的相关技术进行说明,以下相关技术作为可选方案与本申请实施例的技术方案可以进行任意结合,其均属于本申请实施例的保护范围。To facilitate understanding of the technical solutions of the embodiments of the present application, the relevant technologies of the embodiments of the present application are described below. The following related technologies can be arbitrarily combined with the technical solutions of the embodiments of the present application as optional solutions, and they all belong to the protection scope of the embodiments of the present application.

(一)随机接入(I) Random Access

在3GPP(3rd Generation Partnership Project,第三代合作伙伴计划)通信系统中,初始接入在MAC(Medium Access Control,媒体接入控制)层一般有两种方式,即两步随机接入(2-step RACH)和四步随机接入(4-step RACH)。不管哪种RACH(Random Access Channel,随机接入信道)过程,随机接入冲突的解决都是在一个小区内进行的。这是因为3GPP的蜂窝通信系统(包括4G和5G)中,终端在发起随机接入过程之前,首先要获得和当前服务小区的频率和时间同步,然后在该服务小区所广播的随机接入无线资源上发起随机接入过程。一般来说不同服务小区要么频率不同(比如有负责覆盖的低频小区 以及和低频小区有重叠覆盖范围的高频小区),要么系统时间不同步,要么两者都不同。即使是频点和时间都同步的服务小区(比如相同基站的不同扇区),为了避免相互之间的干扰,用于随机接入的PRACH(Physical Random Access Channel,物理随机接入信道)资源在时域、频域和/或码域(用于产生前导码(preamble)的ZC(Zadoff-Chu)码)会相互错开。这样当终端在某个覆盖小区发起随机接入的时候,即使发送的preamble被邻近小区收到,基站也很容易进行甄别,并且丢弃来自邻近小区的终端的preamble。In the 3GPP (3rd Generation Partnership Project) communication system, there are generally two ways of initial access at the MAC (Medium Access Control) layer, namely two-step random access (2-step RACH) and four-step random access (4-step RACH). Regardless of the RACH (Random Access Channel) process, the resolution of random access conflicts is performed within a cell. This is because in 3GPP's cellular communication system (including 4G and 5G), before initiating a random access process, the terminal must first obtain frequency and time synchronization with the current serving cell, and then initiate a random access process on the random access radio resources broadcast by the serving cell. Generally speaking, different serving cells either have different frequencies (for example, there are low-frequency cells responsible for coverage) or different frequencies (for example, there are low-frequency cells responsible for coverage). As well as high-frequency cells with overlapping coverage with low-frequency cells), either the system time is not synchronized, or both are different. Even for service cells with synchronized frequency and time (such as different sectors of the same base station), in order to avoid mutual interference, the PRACH (Physical Random Access Channel) resources used for random access will be staggered in the time domain, frequency domain and/or code domain (ZC (Zadoff-Chu) code used to generate the preamble) . In this way, when a terminal initiates random access in a certain coverage cell, even if the sent preamble is received by the neighboring cell, the base station can easily identify and discard the preamble from the terminal in the neighboring cell.

四步随机接入过程是在LTE系统中引入,也有在NR系统中应用。如前述说明,终端在发起RACH过程之前,首先需要从网络的系统消息或者专用信令中获取PRACH资源配置。图2A为四步CBRA(Contention Based Random Access,基于竞争的随机接入)的流程示意图,如图2A所示,四步CBRA包括4个步骤:The four-step random access process was introduced in the LTE system and is also used in the NR system. As mentioned above, before initiating the RACH process, the terminal first needs to obtain the PRACH resource configuration from the network's system message or dedicated signaling. Figure 2A is a flowchart of the four-step CBRA (Contention Based Random Access, contention-based random access). As shown in Figure 2A, the four-step CBRA includes 4 steps:

步骤1:终端会发送一个随机接入前导码(preamble)给基站,这个preamble在MAC层协议中称为消息1(message1)。在发送了preamble以后,在之后一个响应窗口(reception window)中等待基站反馈的消息2(message2)。响应窗口的起始时间和终止时间是根据配置参数设定的。从基站的角度,基站有能力区分不同时频域上收到的preamble,或者相同时频域上不同的preamble。但是基站无法区分相同时频域上收到的多个终端发送的相同的preamble,在这种情况下就会发生接入冲突。Step 1: The terminal will send a random access preamble to the base station. This preamble is called message 1 in the MAC layer protocol. After sending the preamble, it waits for message 2 from the base station in a subsequent response window. The start and end times of the response window are set according to the configuration parameters. From the perspective of the base station, the base station has the ability to distinguish between preamblers received in different time-frequency domains, or different preamblers in the same time-frequency domain. However, the base station cannot distinguish between the same preamble sent by multiple terminals in the same time-frequency domain. In this case, an access conflict will occur.

步骤2:基站给终端反馈message2。message2可以是一个群发的消息,也就是说可以包括给多个终端的RAR(Random Access Response,随机接入响应)消息。Message2的寻址信息包含在一个称为RA-RNTI(Random Access-Radio Network Temporary Indentifier,随机接入无线网络临时标识)的群发标识中,用来标识收到的preamble在时域、频域和载波类型的信息。也就是说在从相同载波上在相同时频点收到的preamble都可以合并在相同的message2中。在发送给每个终端的RAR IE(Information Elements,信息元素)中会包含配置给终端的临时标识T_C_RNTI、时间提前量(用于上行同步)、用于发送message3的无线资源授权UL-grant(上行授权)和接收到的preamble的索引(或者说序号)。Message2中还可以包含一个backoff参数,用于缓减上行preamble的冲突。终端如果决定再次发送preamble,那么会基于backoff参数产生一个随机时间,使得下次的preamble发送时间至少晚于所产生的随机时间。Step 2: The base station feeds back message 2 to the terminal. Message 2 can be a group message, that is, it can include RAR (Random Access Response) messages to multiple terminals. The addressing information of Message 2 is contained in a group identifier called RA-RNTI (Random Access-Radio Network Temporary Indentifier), which is used to identify the information of the received preamble in the time domain, frequency domain and carrier type. That is to say, the preambles received from the same carrier at the same time and frequency point can be merged into the same message 2. The RAR IE (Information Elements) sent to each terminal will include the temporary identifier T_C_RNTI configured for the terminal, the time advance (for uplink synchronization), the radio resource authorization UL-grant (uplink authorization) for sending message 3, and the index (or sequence number) of the received preamble. Message 2 can also include a backoff parameter to mitigate the conflict of uplink preambles. If the terminal decides to send the preamble again, it will generate a random time based on the backoff parameter so that the next preamble sending time is at least later than the generated random time.

步骤3:终端在比对了RA-RNTI和RAR中的preamble索引以后,可以确定基站是否收到了自己发送的preamble。在确认了收到了正确的RAR以后,终端基于UL-grant发送消息3(message3),其中至少包括了终端的标识(UE ID)。Message3在物理层上采用的T_C_RNTI来寻址。终端随即启动一个定时器。在定时器运行期间,检测下行控制信道PDCCH(Physical Downlink Control Channel,物理下行控制信道)。假如有2个或者多个终端在步骤1发生冲突的话,那么在步骤3会继续发生冲突,因为他们会基于相同的信息发送message3,但是message3的MAC CE(MAC Control Element,媒体接入控制层控制单元)中包含的终端标识是不相同的。Step 3: After comparing the RA-RNTI and the preamble index in the RAR, the terminal can determine whether the base station has received the preamble it sent. After confirming that the correct RAR has been received, the terminal sends message 3 (message3) based on UL-grant, which at least includes the terminal's identifier (UE ID). Message3 is addressed using T_C_RNTI on the physical layer. The terminal then starts a timer. While the timer is running, the downlink control channel PDCCH (Physical Downlink Control Channel) is detected. If two or more terminals collide in step 1, conflicts will continue to occur in step 3 because they will send message3 based on the same information, but the terminal identifiers contained in the MAC CE (MAC Control Element) of message3 are different.

步骤4:如果基站正确解码了message3,那么会给终端发送消息4(message4)。这个message4中是以收到的message3的T_C_RNTI来寻址,并且在其中的MAC CE中包括了终端在message3中包含的标识和一个新分配的C-RNTI给终端。如果多个终端在相同的UL-grant上发送了message3,基站可能可以正确解码其中的一个,或者无法解码(比如因为相互之间的干扰水平相当的时候)。终端在收到message4的时候,如果发现PDCCH上卷积的T_C_RNTI和自己发送message3的匹配,那么会进一步检查基站发送的message4中的MAC CE是否和自己的终端ID匹配。之后在终端ID也匹配的情况下,终端才能确认随机接入过程完成,并且把新分配的C-RNTI作为自己的身份标识。这个身份标识用于以后的PHY、MAC和RRC层协议的寻址信息。Step 4: If the base station decodes message3 correctly, it will send message 4 (message4) to the terminal. This message4 is addressed by the T_C_RNTI of the received message3, and the MAC CE includes the terminal's identifier contained in message3 and a newly allocated C-RNTI to the terminal. If multiple terminals send message3 on the same UL-grant, the base station may be able to correctly decode one of them, or it may not be able to decode (for example, when the interference level between them is similar). When the terminal receives message4, if it finds that the T_C_RNTI convolved on the PDCCH matches the message3 it sent, it will further check whether the MAC CE in the message4 sent by the base station matches its own terminal ID. After that, if the terminal ID also matches, the terminal can confirm that the random access process is completed and use the newly allocated C-RNTI as its own identity. This identity is used for addressing information of subsequent PHY, MAC and RRC layer protocols.

两步随机接入过程从逻辑上来说,是合并了四步随机接入过程中的步骤1和步骤3进行消息A(messageA)的传输,合并了四步随机接入过程中的步骤2和4进行消息B(messageB)的传输。图2B为两步CBRA的流程示意图,如图2B所示,两步CBRA包括2个步骤:Logically, the two-step random access process combines steps 1 and 3 of the four-step random access process to transmit message A, and combines steps 2 and 4 of the four-step random access process to transmit message B. FIG2B is a flow chart of the two-step CBRA. As shown in FIG2B , the two-step CBRA includes two steps:

步骤A:终端向基站传输messageA,其中包括随机接入前导码以及数据信道PUSCH(Physical Uplink Shared Channel,物理上行共享信道),PUSCH内包括终端的UE ID。Step A: The terminal transmits message A to the base station, which includes a random access preamble and a data channel PUSCH (Physical Uplink Shared Channel). PUSCH includes the terminal's UE ID.

步骤B:基站发送应答的messageB,在messageB中用于寻址终端的方式有两种:Step B: The base station sends a response message B. There are two ways to address the terminal in message B:

B1:如果在messageA里的UE ID是C-RNTI,那么在messageB的下行控制信道(PDCCH)上卷积的也是C-RNTI。在这种情况下,如果终端能够确认messageB的C-RNTI和自己的C-RNTI匹配的话,就认为随机接入过程已经正确完成,即冲突已经解决。B1的这种情况适合于在RRC_CONNECTED状态下的终端,即终端已经完成了初始接入,并且和网络之间建立了RRC连接。B1: If the UE ID in messageA is C-RNTI, then the C-RNTI is also convolved on the downlink control channel (PDCCH) of messageB. In this case, if the terminal can confirm that the C-RNTI of messageB matches its own C-RNTI, it is considered that the random access process has been completed correctly, that is, the conflict has been resolved. This situation of B1 is suitable for terminals in the RRC_CONNECTED state, that is, the terminal has completed the initial access and established an RRC connection with the network.

B2:如果在messageA里的UE ID是除C-RNTI之外的其他标识,那么在messageB的PDCCH上卷积的是RA-RNTI。B2适用于除了B1情况外的其他情况。如果messageB中的SuccessRAR中包含的UE ID和自己的UE ID是匹配的,那么终端会认为自己的随机接入过程成功,冲突解决。否则终端要么选 择重新发送messageA,要么会回落到4-step RACH,发送messgae1。B2: If the UE ID in messageA is other than C-RNTI, then the RA-RNTI is convolved on the PDCCH of messageB. B2 is applicable to other situations except B1. If the UE ID contained in SuccessRAR in messageB matches its own UE ID, the terminal will consider its random access process successful and the conflict is resolved. Otherwise, the terminal will either choose It will choose to resend messageA, or fall back to 4-step RACH and send messagegae1.

(二)A-IoT(Ambient IoT,环境能物联网)(ii) A-IoT (Ambient IoT)

IoT的兴起,对于通信系统提出了新的挑战。IoT终端会使用在比如物流、仓储、工厂自动化和畜牧等场合。这些IoT终端只要能够和网络间歇性进行简单的通信过程或者进行粗略的定位跟踪。在目前市场上,即使是最简单的IoT终端,比如用于煤电表计量的NB-IoT(Narrow Band IoT,窄带物联网)终端,也需要电池来提供能量。尽管能耗很低,但是最多在几年之后,这些终端内的电池也会消耗殆尽。这样一来,最起码更换电池就需要大量的人工。而有些工业场景因为太过危险,根本就不适合人工操作。基于此,无电池IoT终端应运而生。The rise of IoT has brought new challenges to communication systems. IoT terminals are used in places such as logistics, warehousing, factory automation and animal husbandry. These IoT terminals only need to be able to intermittently communicate with the network or perform rough positioning and tracking. In the current market, even the simplest IoT terminals, such as NB-IoT (Narrow Band IoT) terminals used for coal and electricity metering, require batteries to provide energy. Although the energy consumption is very low, the batteries in these terminals will be exhausted in a few years at most. In this way, at least a lot of manpower is required to replace the battery. And some industrial scenarios are too dangerous and are not suitable for manual operation at all. Based on this, battery-free IoT terminals came into being.

无电池IoT终端数量庞大,成本低廉,一般情况下在安装之后就不再进行人工维护。RFID(Radio Frequency Identification,射频识别)终端某种程度上满足这种需求。虽然如此,RFID系统本身的运营需要人工手持阅读器(reader)参与。而且由于单个RFID reader的无线覆盖范围有限(10米之内),在比如对一个大型超市的货物进行盘点的时候,还是需要花费不少人力物力和时间。Battery-free IoT terminals are in large numbers and low-cost, and generally require no manual maintenance after installation. RFID (Radio Frequency Identification) terminals meet this need to some extent. However, the operation of the RFID system itself requires the participation of manual handheld readers. Moreover, since the wireless coverage range of a single RFID reader is limited (within 10 meters), it still takes a lot of manpower, material resources and time to take inventory of goods in a large supermarket, for example.

把类似RFID这样的通信系统移植到3GPP的蜂窝网络中可以很好地解决覆盖问题,这是因为已经部署的蜂窝网络,比如4G和5G,一般已经达到了全境覆盖或者至少是主要城市的覆盖。而覆盖全的好处是IoT终端和网络之间的通信或者定位过程不需要人工参与,所以可以7天/24小时不间断工作,而且工作效率高,甚至可以在不适合人工的环境(比如旷野、矿场、工厂)中高效工作。这样一来,除了初期需要把IoT终端和某个具体的物件关联在一起之外,后续的数据读写和运维都只要通过比如智能手机上的APP进行操作就可以了,非常方便和高效。Transplanting communication systems such as RFID into 3GPP's cellular networks can effectively solve the coverage problem. This is because the deployed cellular networks, such as 4G and 5G, generally have achieved full coverage or at least coverage of major cities. The advantage of full coverage is that the communication or positioning process between the IoT terminal and the network does not require human intervention, so it can work 24 hours a day, 7 days a week, and the work efficiency is high. It can even work efficiently in environments that are not suitable for human intervention (such as wilderness, mines, and factories). In this way, except for the initial need to associate the IoT terminal with a specific object, subsequent data reading, writing, and operation and maintenance can be operated through an APP on a smartphone, which is very convenient and efficient.

这样的通信系统称为A-IoT通信系统或者零功耗通信系统。A-IoT通信采用能量采集和反向散射通信技术。A-IoT通信网络由网络设备和A-IoT终端(也可以称为A-IoT设备、零功耗终端、电子标签、tag)构成。图3示出了A-IoT通信系统的基本构成示意图。其中网络设备用于向tag发送无线供能信号、下行通信信号以及用于接收tag的反向散射信号。一个基本的tag包含能量采集模块、反向散射通信模块以及低功耗计算模块。此外,tag还可具备一个存储器或传感器,用于存储一些基本信息(如物品标识等)或获取环境温度、环境湿度等传感数据。Such a communication system is called an A-IoT communication system or a zero-power communication system. A-IoT communication uses energy harvesting and backscattering communication technology. The A-IoT communication network consists of network equipment and A-IoT terminals (also called A-IoT devices, zero-power terminals, electronic tags, tags). Figure 3 shows a schematic diagram of the basic structure of the A-IoT communication system. The network equipment is used to send wireless power supply signals, downlink communication signals, and backscatter signals for receiving tags to the tags. A basic tag includes an energy harvesting module, a backscattering communication module, and a low-power computing module. In addition, the tag may also have a memory or sensor for storing some basic information (such as item identification, etc.) or obtaining sensor data such as ambient temperature and ambient humidity.

目前,A-IoT系统所能够服务的用例主要包括:盘点(inventory),传感器(sensor),跟踪(tracking)和命令(command)。其中,盘点指的是货物进出仓库的时候,对货物查缺补遗。常见的传感器有温度、压力、湿度等传感器,用在工业、农业以及智慧城市等场合,传感信息通过A-IoT系统上传到某个第三方的App进行监控和管理。跟踪泛指不定期获取物件所在的大致方位,比如用户可以通过智能手机基本实时地了解自己的快件所在的方位。而命令指的是通过A-IoT通讯系统对某种伺服机构进行操作,这些伺服机构和A-IoT终端连接在一起。比如在办公室工作休息期间,通过手机App给后院的花草浇水,其中浇水的伺服机构和某个A-IoT终端相连。At present, the use cases that the A-IoT system can serve mainly include: inventory, sensor, tracking and command. Among them, inventory refers to checking for missing goods when goods enter and leave the warehouse. Common sensors include temperature, pressure, humidity and other sensors, which are used in industry, agriculture and smart cities. The sensor information is uploaded to a third-party app through the A-IoT system for monitoring and management. Tracking generally refers to obtaining the approximate location of an object at irregular intervals. For example, users can basically understand the location of their express delivery in real time through a smartphone. Command refers to the operation of a certain servo mechanism through the A-IoT communication system, and these servo mechanisms are connected to the A-IoT terminal. For example, during a break in the office, water the flowers and plants in the backyard through a mobile phone app, and the watering servo mechanism is connected to an A-IoT terminal.

针对上述用例,相关技术中提出了4种拓扑网络结构。图4A~图4D示出了4种拓扑网络结构的示意图。如图4A所示,A-IoT终端可以与网络设备连接进行双向通信。如图4B所示,A-IoT终端可以与中间节点连接进行双向通信,该中间节点与网络设备连接进行双向通信;可选地,该中间节点可以是UE,通过Uu接口与网络设备连接通信。如图4C所示,A-IoT终端可以接收辅助节点发送的供能信号/下行通信信号,并向网络设备发送上行信号;可选地,该辅助节点可以是UE,通过Uu接口与网络设备连接通信。如图4D所示,A-IoT终端可以与UE连接进行双向通信。For the above use cases, four topological network structures are proposed in the related art. Figures 4A to 4D show schematic diagrams of four topological network structures. As shown in Figure 4A, the A-IoT terminal can be connected to a network device for two-way communication. As shown in Figure 4B, the A-IoT terminal can be connected to an intermediate node for two-way communication, and the intermediate node is connected to a network device for two-way communication; optionally, the intermediate node can be a UE, which is connected to the network device for communication through a Uu interface. As shown in Figure 4C, the A-IoT terminal can receive a power supply signal/downlink communication signal sent by an auxiliary node, and send an uplink signal to the network device; optionally, the auxiliary node can be a UE, which is connected to the network device for communication through a Uu interface. As shown in Figure 4D, the A-IoT terminal can be connected to a UE for two-way communication.

A-IoT终端(tag)的能量来源来自于周围环境,比如无线电波(RF)、太阳能、热能、机械振动、风能等等。在3GPP目前研究的A-IoT系统中,其终端主要分成3种类型,包括类型A、B和C。其中类型A和B终端只能通过反射和调制收到的无线电波以进行通信,这种通信方式称为反向散射(back-scattering),也就是说他们无法主动发送无线电信号,他们的功率在1~10微瓦(uW)范围之内。其中类型A的终端的发射功率最低,硬件复杂度最低,基本上接近RFID终端的水平。而类型B的硬件稍微复杂一些,比如具有信号放大器件,并且具有一定的储能器件,所以和网络的通信距离较类型A可以远一些。类型C具备有主动发送无线电波的能力,发送功率大约在1~10毫瓦(mW),并且能够储备一定的能量。这三种类型的终端都能够从环境中获取能量,可以持续工作几年或者10年以上。类型A和B终端为了节能,在网络没有触发通信过程之前,基本上处于休眠状态。只有被网络的无线信号激励之后,才会醒过来工作。The energy source of A-IoT terminal (tag) comes from the surrounding environment, such as radio waves (RF), solar energy, thermal energy, mechanical vibration, wind energy, etc. In the A-IoT system currently studied by 3GPP, its terminals are mainly divided into three types, including type A, B and C. Among them, type A and B terminals can only communicate by reflecting and modulating the received radio waves. This communication method is called backscattering, which means that they cannot actively send radio signals. Their power is within the range of 1 to 10 microwatts (uW). Among them, the transmission power of type A terminals is the lowest and the hardware complexity is the lowest, which is basically close to the level of RFID terminals. The hardware of type B is slightly more complex, such as having signal amplifier devices and certain energy storage devices, so the communication distance with the network can be farther than that of type A. Type C has the ability to actively send radio waves, with a transmission power of about 1 to 10 milliwatts (mW), and can store a certain amount of energy. All three types of terminals can obtain energy from the environment and can work continuously for several years or more than 10 years. In order to save energy, type A and B terminals are basically in a dormant state before the network triggers the communication process. It will only wake up and work when stimulated by the wireless signal of the network.

A-IoT的接收机可以分成两大类型:A-IoT receivers can be divided into two categories:

接收机类型1:宽带接收机。这种接收机又称为RF接收机,基于射频带通滤波器获得其待接收的带宽范围内的信号,然后进行包络检波以及后续的基带处理,该架构的结构最为简单,其功耗最低可至数个uW甚至更低。但由于射频带通滤波器精度较差,即使在目标信号占用窄带宽的情况下,该接收机也往往接收到较宽带宽内的信号,因此其接收过程中引入了较多的噪声与干扰,其接收机性能较差,也 即其灵敏度较差。图5A是典型的宽带接收机的结构图。Receiver type 1: Wideband receiver. This type of receiver is also called an RF receiver. It uses an RF bandpass filter to obtain the signal within the bandwidth to be received, and then performs envelope detection and subsequent baseband processing. The structure of this architecture is the simplest, and its power consumption can be as low as several uW or even lower. However, due to the poor accuracy of the RF bandpass filter, even when the target signal occupies a narrow bandwidth, the receiver often receives signals within a wider bandwidth. Therefore, more noise and interference are introduced in the reception process, and the receiver performance is poor. That is, its sensitivity is poor. Figure 5A is a block diagram of a typical wideband receiver.

接收机类型2:窄带接收机。比较典型的有中频接收机或零中频接收机。在信号接收中,除了使用射频带通滤波器获得其待接收的带宽范围内的信号外,还对RF信号进行下变频并对基带信号使用低通滤波器进一步滤波消除掉噪声与干扰,因此该接收机的接收带宽窄,其接收性能也即接收机灵敏度高。但该接收机需要使用LO(Local oscillator,本地振荡器),即使建议的LO也需要消耗100uW甚至更高的功耗,因此该接收机的功耗相对较高,但由于其绝对功耗很低,也依然适合零功耗设备使用。图5B是典型的中频接收机的结构图。Receiver type 2: narrowband receiver. Typical examples include intermediate frequency receivers or zero intermediate frequency receivers. In signal reception, in addition to using an RF bandpass filter to obtain a signal within the bandwidth to be received, the RF signal is down-converted and the baseband signal is further filtered using a low-pass filter to eliminate noise and interference. Therefore, the receiver has a narrow receiving bandwidth and high receiving performance, i.e., receiver sensitivity. However, the receiver requires the use of an LO (Local oscillator). Even the recommended LO consumes 100uW or even more power. Therefore, the power consumption of the receiver is relatively high, but because its absolute power consumption is very low, it is still suitable for use in zero-power devices. Figure 5B is a block diagram of a typical intermediate frequency receiver.

上述类型A的终端通常会采用宽带接收机,类型C的终端通常会采用窄带接收机,而类型B的终端则可能会采用其中一种或者两种接收机类型。The above-mentioned type A terminals usually use broadband receivers, type C terminals usually use narrowband receivers, and type B terminals may use one or both types of receivers.

对于A-IoT系统和终端而言,LTE/NR系统的随机接入过程过于复杂,需要做进一步的简化和优化。For A-IoT systems and terminals, the random access process of LTE/NR systems is too complicated and needs further simplification and optimization.

此外,RFID系统的reader在工作的时候,因为reader的覆盖优先,而且基本上采用人工操作,所以基本上可以假设一个tag只会和一个reader进行通信。但是A-IoT系统是一个3GPP广覆盖系统,换言之不同的reader相互之间的分布基本上等同于现有基站的布局。图6是本申请实施例的一个应用场景的示意图,如图6所示,一个tag很有可能在不同的reader的覆盖范围之间。In addition, when the reader of the RFID system is working, because the coverage of the reader is prioritized and it is basically manually operated, it can be basically assumed that a tag will only communicate with one reader. However, the A-IoT system is a 3GPP wide coverage system. In other words, the distribution of different readers is basically equivalent to the layout of existing base stations. Figure 6 is a schematic diagram of an application scenario of an embodiment of the present application. As shown in Figure 6, a tag is likely to be between the coverage ranges of different readers.

A-IoT系统最典型的应用场景盘点通常需要在短时间内让大量的tag接入到系统中,为了提高频率的复用程度,不同reader所采用的频率资源往往是相同的,在信道化上也会采取类似或者相同的方式,并且一个载波上的信道个数也有限。当tag在响应某个reader的触发消息并且开始发起初始接入过程的时候,其发送的消息很容易被邻近的多个reader所接收到;同样从不同reader发送过来的信号,也很容易被同一个tag接收到。这个问题在LTE/NR系统一般并不存在,这是因为宽带系统中,即使邻近基站所使用的载波是一样的,用于初始接入的PRACH资源还是很容易在时频域上错开。即使在时频域上有重叠的部分,还是可以继续在preamble的生成码上做文章,使得不同小区产生的用于preamble的ZC码相互正交,比如可以采用不同的ZC根码。退一步讲,即使在LTE/NR这样的宽带系统中发生了冲突,这些宽带系统有比较完善的小区间干扰小区消除手段来解决问题。而类似A-IoT这样的窄带系统,其简单的信号调制和消息交互决定了这样的系统对于小区间的干扰会相当敏感,而且缺乏有效的减轻或者消除手段。The most typical application scenarios of A-IoT systems usually require a large number of tags to access the system in a short period of time. In order to improve the frequency reuse, the frequency resources used by different readers are often the same, and similar or identical methods are adopted in channelization, and the number of channels on a carrier is also limited. When a tag responds to a trigger message from a reader and starts the initial access process, the message it sends is easily received by multiple adjacent readers; similarly, signals sent from different readers are also easily received by the same tag. This problem generally does not exist in LTE/NR systems. This is because in broadband systems, even if the carriers used by adjacent base stations are the same, the PRACH resources used for initial access are still easily staggered in the time-frequency domain. Even if there are overlapping parts in the time-frequency domain, we can continue to work on the generation code of the preamble so that the ZC codes generated by different cells for preamble are mutually orthogonal, such as using different ZC root codes. Taking a step back, even if a conflict occurs in broadband systems such as LTE/NR, these broadband systems have relatively complete cell-to-cell interference elimination methods to solve the problem. However, narrowband systems like A-IoT are very sensitive to inter-cell interference due to their simple signal modulation and message interaction, and lack effective means to mitigate or eliminate it.

图7是根据本申请一实施例的信号处理方法的示意性流程图。该方法可选地可以应用于图1所示的系统,但并不仅限于此。该方法包括以下内容的至少部分内容。FIG7 is a schematic flow chart of a signal processing method according to an embodiment of the present application. The method can optionally be applied to the system shown in FIG1 , but is not limited thereto. The method includes at least part of the following contents.

S710、第一设备接收第一信号;其中,第一信号中包含发送该第一信号的第二设备的第一参数;S710: A first device receives a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal;

S720、第一设备基于第一信号中的第一参数,确定初始接入的目标设备的第一参数;目标设备的第一参数用于第一设备确定是否响应其接收到的触发初始接入的消息。S720: The first device determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device to determine whether to respond to a message received by the first device that triggers initial access.

在本申请实施例中,第一设备可以是终端设备。可选地,第一设备可以是IoT中的终端,例如A-IoT设备、零功耗终端或电子标签(tag)等。In the embodiment of the present application, the first device may be a terminal device. Optionally, the first device may be a terminal in IoT, such as an A-IoT device, a zero-power terminal, or an electronic tag.

在本申请实施例中,第二设备可以是系统/网络中的节点。可选地,第二设备可以是用于与第一设备通信的节点。该节点可以是终端设备、网络设备或单独提供反向散射电波的节点(供能节点)。例如,第二设备可以是图4A所示的网络设备(例如基站)、图4B所示的中间节点、图4C所示的辅助节点或图4D所示的UE。可以理解,本申请实施例不对网络中的拓扑结构进行限制,因此,第二设备也不限于上述各种形式,第二设备可以包括任意形式的能够与第一设备进行点对点通信的节点。In an embodiment of the present application, the second device may be a node in the system/network. Optionally, the second device may be a node for communicating with the first device. The node may be a terminal device, a network device, or a node (power supply node) that provides backscattered radio waves separately. For example, the second device may be a network device (e.g., a base station) shown in FIG. 4A, an intermediate node shown in FIG. 4B, an auxiliary node shown in FIG. 4C, or a UE shown in FIG. 4D. It is understood that the embodiment of the present application does not limit the topological structure in the network, and therefore, the second device is not limited to the above-mentioned various forms, and the second device may include any form of node capable of performing point-to-point communication with the first device.

上述接入方法可以应用在第一设备可能处于多个第二设备的覆盖范围内的场景中,例如图6所示的场景,可以解决多个第二设备之间的冲突问题。具体而言,在第一设备可能处于多个第二设备的覆盖范围内的场景中,第一设备可能接收到一个或多个第二设备发送的消息。由于各个第二设备与第一设备的距离可能不同,因此,第一设备可能无法正确接收到每个第二设备的消息,或者,第一设备接收到的各个消息的信号质量不同。根据上述方法,在初始接入之前,第一设备根据接收到的第一信号中的第一参数,确定目标设备的第一参数,在接收到触发初始接入的消息时,可以根据该第一参数确定是否响应。如此,第一设备可以只响应目标设备发送的触发初始接入的消息,避免目标设备与其他第二设备之间的干扰/冲突。The above-mentioned access method can be applied to the scenario where the first device may be within the coverage of multiple second devices, such as the scenario shown in FIG6, and can solve the conflict problem between multiple second devices. Specifically, in the scenario where the first device may be within the coverage of multiple second devices, the first device may receive messages sent by one or more second devices. Since the distances between each second device and the first device may be different, the first device may not be able to correctly receive the message of each second device, or the signal quality of each message received by the first device is different. According to the above-mentioned method, before the initial access, the first device determines the first parameter of the target device based on the first parameter in the received first signal, and when receiving the message triggering the initial access, it can determine whether to respond based on the first parameter. In this way, the first device can only respond to the message triggering the initial access sent by the target device, avoiding interference/conflict between the target device and other second devices.

可以看到,本申请实施例中引入第一参数,用于区分不同的第二设备,即在至少一个第二设备中标识出特定的第二设备。在一些场景中,第一参数可以称为RCC(Reader Color Code,阅读器色码)参数。基于第一参数,可以实现对来自不同的第二设备的触发初始接入的消息的区分处理,在较小的系统带宽开销和信令开销代价下解决了不同的第二设备之间的冲突。It can be seen that the first parameter is introduced in the embodiment of the present application to distinguish different second devices, that is, to identify a specific second device in at least one second device. In some scenarios, the first parameter can be called an RCC (Reader Color Code) parameter. Based on the first parameter, it is possible to distinguish and process messages that trigger initial access from different second devices, and resolve conflicts between different second devices at a lower cost of system bandwidth overhead and signaling overhead.

在一些实施例中,上述步骤S720、第一设备基于第一信号中的第一参数,确定初始接入的目标设备的第一参数,包括:In some embodiments, the above step S720, in which the first device determines the first parameter of the target device to be initially connected based on the first parameter in the first signal, includes:

第一设备在接收到的多个第一信号中,确定信号强度最大的第一信号; The first device determines, among the multiple first signals received, a first signal having the greatest signal strength;

第一设备将信号强度最大的第一信号中的第一参数,确定为目标设备的第一参数。The first device determines the first parameter in the first signal with the largest signal strength as the first parameter of the target device.

具体而言,在第一设备接收到多个第一信号的情况下,第一设备可以对第一信号进行测量,以确定各个第一信号的强度,选择信号强度最大的第一信号所对应的第二设备作为目标设备,并记录其第一参数。Specifically, when the first device receives multiple first signals, the first device can measure the first signals to determine the strength of each first signal, select the second device corresponding to the first signal with the largest signal strength as the target device, and record its first parameter.

可选地,在第一设备仅接收到一个第一信号的情况下,第一设备可以直接将该第一信号中的第一参数,确定为目标设备的第一参数。Optionally, in the case that the first device receives only one first signal, the first device may directly determine the first parameter in the first signal as the first parameter of the target device.

本申请实施例还从第二设备的角度提供一种信号处理方法。具体地,图8是根据本申请另一实施例的信号处理方法的示意性流程图。该方法包括:The embodiment of the present application also provides a signal processing method from the perspective of the second device. Specifically, FIG8 is a schematic flow chart of a signal processing method according to another embodiment of the present application. The method includes:

S810、第二设备发送第一信号;其中,第一信号中包含第二设备的第一参数;第一信号用于第一设备确定初始接入的目标设备的第一参数,以确定是否响应第一设备接收到的触发初始接入的消息。S810, the second device sends a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine a first parameter of a target device for initial access, so as to determine whether to respond to a message triggering initial access received by the first device.

根据上述方法,第二设备发送的第一信号中包含第二设备的第一参数,使第一设备能够利用第一信号确定初始接入的目标设备的第一参数,根据目标设备的第一参数对来自不同的第二设备的触发初始接入的消息进行区别处理,因此,第二设备通过发送第一信号,可以帮助第一设备解决初始接入过程中不同的第二设备之间的冲突。According to the above method, the first signal sent by the second device includes the first parameter of the second device, so that the first device can use the first signal to determine the first parameter of the target device for initial access, and distinguish between the messages triggering initial access from different second devices according to the first parameter of the target device. Therefore, the second device can help the first device resolve conflicts between different second devices during the initial access process by sending the first signal.

在一些实施例中,第一参数在通信系统的全局范围或局部范围内唯一。In some embodiments, the first parameter is unique globally or locally within the communication system.

一种实施方式是,第一参数在通信系统的全局范围内唯一,即目标设备的第一参数与通信系统的全局范围内的其他任一个第二设备的第一参数不同。如此,能够在全局范围内对目标设备与其他第二设备进行区分,确保实现冲突解决。In one implementation, the first parameter is unique in the global scope of the communication system, that is, the first parameter of the target device is different from the first parameter of any other second device in the global scope of the communication system. In this way, the target device can be distinguished from other second devices in the global scope to ensure conflict resolution.

另一种实施方式是,第一参数在通信系统的局部范围内唯一,即目标设备的第一参数与通信系统内的其他任一个第二设备的第一参数不同。Another implementation manner is that the first parameter is unique in a local range of the communication system, that is, the first parameter of the target device is different from the first parameter of any other second device in the communication system.

图9是一个应用示例中第一参数的分配方式的示意图,其中的一个六边形代表一个第二设备所能覆盖的范围,六边形中的3比特信息为该六边形所代表的第二设备的第一参数。可以看到,以任一第二设备为中心的7个第二设备中,各个第二设备的第一参数是互不相同的,即各个第二设备在7个六边形这一局部范围内是唯一的。由于通信系统中的干扰与设备之间的距离相关,当不同的第二设备之间距离增加,产生冲突的可能性下降。因此,第二设备的第一参数在通信系统的局部范围内唯一,能够在局部范围内对目标设备与其他第二设备进行区分,同时距离较远的设备也不会与目标设备产生冲突,因此,也可以实现冲突解决。FIG9 is a schematic diagram of the allocation method of the first parameter in an application example, in which a hexagon represents the range that a second device can cover, and the 3-bit information in the hexagon is the first parameter of the second device represented by the hexagon. It can be seen that among the 7 second devices centered on any second device, the first parameters of each second device are different from each other, that is, each second device is unique within the local range of the 7 hexagons. Since the interference in the communication system is related to the distance between the devices, when the distance between different second devices increases, the possibility of conflict decreases. Therefore, the first parameter of the second device is unique within the local range of the communication system, and can distinguish the target device from other second devices within the local range. At the same time, devices that are farther away will not conflict with the target device, so conflict resolution can also be achieved.

在一些实施例中,第一参数的比特数量与通信系统的全局范围或局部范围内的第二设备的数量相关。In some embodiments, the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system.

具体地,若第一参数在全局范围内唯一,则第一参数的比特数量与全局范围内的第二设备的数量相关。若第一参数在局部范围内唯一,则第一参数的比特数量与局部范围内的第二设备的数量相关。Specifically, if the first parameter is unique in the global scope, the number of bits of the first parameter is related to the number of second devices in the global scope. If the first parameter is unique in the local scope, the number of bits of the first parameter is related to the number of second devices in the local scope.

在一些实施例中,在第二设备的数量增加的情况下,第一参数的比特数量增加或不变。In some embodiments, when the number of second devices increases, the number of bits of the first parameter increases or remains unchanged.

实际应用中,局部范围内的第二设备的数量,根据不同的应用场景而有所不同,则不同的应用场景下第一参数的比特数量或者说比特长度可以设置得不一样。以图9为例,在局部范围内包括7个第二设备的情况下,可以采用3bit(比特)的第一参数。在实际的工程上,有些场景可能会比较简单,比如在室内场景下,可能只存在有限的几个reader,则reader的第一参数可以是2bit甚至1bit。但是在室外场景下,可能reader的分布会比较密集,则reader的第一参数也许需要4bit。采用上述实施例,第一参数的比特数量随第二设备的数量增加而增加或不变,则可以保证在适宜的比特长度内为各个第二设备分配局部范围内唯一的第一参数。In actual applications, the number of second devices in a local range varies according to different application scenarios, so the number of bits or the bit length of the first parameter in different application scenarios can be set differently. Taking Figure 9 as an example, when the local range includes 7 second devices, a first parameter of 3 bits can be used. In actual engineering, some scenarios may be relatively simple. For example, in indoor scenarios, there may be only a limited number of readers, so the first parameter of the reader can be 2 bits or even 1 bit. However, in outdoor scenarios, the distribution of readers may be relatively dense, so the first parameter of the reader may require 4 bits. Using the above embodiment, the number of bits of the first parameter increases or remains unchanged as the number of second devices increases, so it can be ensured that each second device is assigned a unique first parameter in the local range within an appropriate bit length.

需要说明的是,在本申请实施例中,某个消息包括第一参数,具体可以是第一参数编制在物理层的信息中或编制在L2(Layer2,层2)消息中,比如编制在MAC层或RRC层。可选地,第一参数可以作为消息中的参数单独出现,也可以与其他参数一起编制在消息中。It should be noted that, in the embodiment of the present application, a message includes a first parameter, and specifically, the first parameter may be compiled in the information of the physical layer or compiled in the L2 (Layer 2, layer 2) message, such as compiled in the MAC layer or the RRC layer. Optionally, the first parameter may appear alone as a parameter in the message, or may be compiled in the message together with other parameters.

下面针对第一信号的传输,提供两种可选的实施方式。Two optional implementations are provided below for the transmission of the first signal.

方式一Method 1

在本方式中,第一信号包括第二设备周期性广播的信标(beacon)信号。也就是说,第二设备向第一设备发送第一信号,包括:第二设备周期性广播信标信号。In this manner, the first signal includes a beacon signal periodically broadcast by the second device. That is, the second device sends the first signal to the first device, including: the second device periodically broadcasts the beacon signal.

可选地,任一第二设备均可以周期性广播信标信号,在信标信号中包含自身的第一参数,以使覆盖范围内的第一设备确定初始接入的目标设备的第一参数。Optionally, any second device may periodically broadcast a beacon signal, wherein the beacon signal includes its own first parameter, so that a first device within a coverage area may determine the first parameter of a target device for initial access.

可选地,信标信号的广播周期是在预先配置的周期集合中选取的。Optionally, the broadcast period of the beacon signal is selected from a preconfigured period set.

图10是根据本申请实施例的信号处理方法的一个应用示例的示意图。以第一设备包括tag,第一设备附近的第二设备包括reader为例,如图10所示,基于信标信号的上述信号处理方法包括以下步骤:FIG10 is a schematic diagram of an application example of a signal processing method according to an embodiment of the present application. Taking the first device including a tag and the second device near the first device including a reader as an example, as shown in FIG10 , the above signal processing method based on the beacon signal includes the following steps:

步骤1:在触发tag发起初始接入之前,各reader先周期性广播信标信号(beacon信号)。beacon信 号中至少包括RCC参数(第一参数)。具体地,reader A发出的beacon信号包含的RCC=001,reader B发出的beacon包含的RCC=010。Step 1: Before triggering the tag to initiate initial access, each reader first broadcasts a beacon signal periodically. The signal at least includes an RCC parameter (first parameter). Specifically, the beacon signal sent by reader A contains RCC=001, and the beacon signal sent by reader B contains RCC=010.

可选地,为了让更多的tag接收到beacon信号,beacon信号一般是宽带信号,比如在一个载波的带宽内广播。beacon信号广播的周期的候选项可以包括事先约定的有限的几个周期值。Optionally, in order to allow more tags to receive the beacon signal, the beacon signal is generally a broadband signal, such as broadcast within the bandwidth of a carrier. Candidates for the beacon signal broadcast period may include a limited number of period values agreed in advance.

步骤2:tag尝试接收reader的beacon信号,并且对信号进行测量。tag选择信号强度最高的beacon作为最佳reader(目标设备),并且记录其RCC参数。Step 2: The tag attempts to receive the beacon signal from the reader and measures the signal. The tag selects the beacon with the highest signal strength as the best reader (target device) and records its RCC parameters.

在一些实施例中,第一设备接收第一信号,包括:In some embodiments, the first device receives the first signal, including:

第一设备在第一时间窗口内搜索信标信号;The first device searches for a beacon signal within a first time window;

若第一设备搜索到多个包含相同的第一参数的信标信号,则基于多个包含相同的第一参数的信标信号,确定相同的第一参数所对应的第二设备的广播周期,并基于广播周期接收来自第二设备的信标信号。If the first device searches for multiple beacon signals containing the same first parameter, it determines the broadcast period of the second device corresponding to the same first parameter based on the multiple beacon signals containing the same first parameter, and receives the beacon signal from the second device based on the broadcast period.

也就是说,第一设备接收信标信号可以分成两个阶段。第一阶段为扫描阶段,在该阶段内,第一设备不确定第二设备的信标信号的发送时间,因此在一定的时间窗口内搜索信标信号。当第一设备搜索到多个包含相同的第一参数的信标信号之后,第一设备能够确定该第一参数对应的第二设备的广播周期,因此可以基于该广播周期确定信标信号的发送时间,在信标信号发送时进行接收,从而可以节省能量的消耗。That is to say, the first device receiving the beacon signal can be divided into two stages. The first stage is the scanning stage, during which the first device is not sure of the transmission time of the beacon signal of the second device, so it searches for the beacon signal within a certain time window. After the first device searches for multiple beacon signals containing the same first parameter, the first device can determine the broadcast period of the second device corresponding to the first parameter, so it can determine the transmission time of the beacon signal based on the broadcast period, and receive the beacon signal when it is transmitted, thereby saving energy consumption.

在一些实施例中,信标信号的广播周期是在预先配置的周期集合中选取的,第一时间窗口的长度大于周期集合中的最大周期。In some embodiments, the broadcast period of the beacon signal is selected from a preconfigured period set, and the length of the first time window is greater than the maximum period in the period set.

例如,预先配置的周期集合中包括多个周期值,其中最大的周期值为20ms(毫秒),第二设备可以从周期集合中选取信标信号广播使用的周期值。第一设备在大于或等于20ms的时间窗口内搜索信标信号,从而必然能够搜索到同一个第二设备前后两次发送的信标信号,因此能够确定第二设备的广播周期,并基于广播周期进行后续接收,节省能耗。For example, the pre-configured period set includes multiple period values, the largest of which is 20ms (milliseconds), and the second device can select the period value used for beacon signal broadcasting from the period set. The first device searches for beacon signals within a time window greater than or equal to 20ms, so it is certain that it can search for beacon signals sent twice by the same second device, so it can determine the broadcast period of the second device, and perform subsequent reception based on the broadcast period, saving energy consumption.

方式二Method 2

在本方式中,第一设备接收至少一个第一信号,包括:第一设备发送第二信号,第二信号用于触发接收到第二信号的第二设备发送第一信号;第一设备接收第二设备发送的第一信号。相应地,第二设备向第一设备发送第一信号,包括:第二设备在接收到第一设备发送的第二信号的情况下,向第一设备发送第一信号。In this method, the first device receives at least one first signal, including: the first device sends a second signal, the second signal is used to trigger the second device that receives the second signal to send the first signal; the first device receives the first signal sent by the second device. Correspondingly, the second device sends a first signal to the first device, including: the second device sends the first signal to the first device when receiving the second signal sent by the first device.

也就是说,第一信号的发生可以是由第一设备主动触发的。例如,第一设备可以包括只支持MO(Message Original,消息上行)业务的type C tag,在此情况下,用于配置第一设备初始接入参数的第一信号可以是按需求(on-demand)触发的,以节省第二设备(例如网络设备)的能量消耗。That is, the occurrence of the first signal may be actively triggered by the first device. For example, the first device may include a type C tag that only supports MO (Message Original) services. In this case, the first signal for configuring the initial access parameters of the first device may be triggered on-demand to save energy consumption of the second device (e.g., a network device).

图11是根据本申请实施例的信号处理方法的另一个应用示例的示意图。以该方法用在IoT系统中,第一设备包括tag,第一设备附近的第二设备包括reader为例,如图11所示,基于第一设备主动触发的上述信号处理方法包括以下步骤:FIG11 is a schematic diagram of another application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, where the first device includes a tag and the second device near the first device includes a reader as an example, as shown in FIG11 , the above signal processing method based on active triggering by the first device includes the following steps:

步骤1:当tag想要发起主叫的时候,tag会先发送一个唤醒信号(wakeup signal,相当于第二信号)给周围的reader。如果有多于1个的reader接收到了这个唤醒信号,那么这些reader都会响应唤醒信号。Step 1: When the tag wants to initiate a call, it will first send a wakeup signal (equivalent to the second signal) to the surrounding readers. If more than one reader receives the wakeup signal, then these readers will respond to the wakeup signal.

步骤2:reader A和reader B都通过发送消息0(msg0,相当于第一信号)来响应唤醒信号。Step 2: Both reader A and reader B respond to the wake-up signal by sending message 0 (msg0, equivalent to the first signal).

步骤3:若两个msg0没有发生冲突,即tag通过信号解调正确接收到两个msg0,则tag可以通过测量msg0的信号强度来决定最佳的reader(目标设备)。若两个msg0发生冲突,tag通过信号解调的结果决定最佳的reader。在后者情况下,只有被正确解调的reader才是最佳reader。tag记录其RCC参数。Step 3: If the two msg0s do not conflict, that is, the tag correctly receives the two msg0s through signal demodulation, then the tag can determine the best reader (target device) by measuring the signal strength of msg0. If the two msg0s conflict, the tag determines the best reader based on the result of signal demodulation. In the latter case, only the reader that is correctly demodulated is the best reader. The tag records its RCC parameters.

下面介绍本申请实施例中初始接入过程的实现方式。The following describes how to implement the initial access process in an embodiment of the present application.

在一些实施例中,信号处理方法还包括:第二设备发送触发消息;其中,触发消息中包含第二设备的第一参数;触发消息用于触发第一设备在触发消息中的第一参数与目标设备的第一参数相同的情况下,发送第一接入消息。In some embodiments, the signal processing method also includes: the second device sends a trigger message; wherein the trigger message includes a first parameter of the second device; the trigger message is used to trigger the first device to send a first access message when the first parameter in the trigger message is the same as the first parameter of the target device.

相应地,对于第一设备而言,上述信号处理方法还包括:第一设备接收触发消息,触发消息用于触发初始接入,触发消息中包含发送触发消息的设备的第一参数;第一设备在触发消息中的第一参数与目标设备的第一参数相同的情况下,发送第一接入消息。Correspondingly, for the first device, the above-mentioned signal processing method also includes: the first device receives a trigger message, the trigger message is used to trigger initial access, and the trigger message includes a first parameter of the device sending the trigger message; the first device sends a first access message when the first parameter in the trigger message is the same as the first parameter of the target device.

也就是说,初始接入可以由第二设备主动触发。可选地,第二设备可以广播发送触发消息,以使覆盖范围内的第一设备接收到触发消息时,根据触发消息中的第一参数确定是否发送第一个用于接入网络的消息,即第一接入消息。In other words, the initial access may be actively triggered by the second device. Optionally, the second device may broadcast a trigger message so that when the first device within the coverage receives the trigger message, it determines whether to send the first message for accessing the network, i.e., the first access message, according to the first parameter in the trigger message.

可选地,在触发消息中的第一参数与目标设备的第一参数不同的情况下,第一设备忽略或者说丢弃触发消息。 Optionally, when the first parameter in the trigger message is different from the first parameter of the target device, the first device ignores or discards the trigger message.

根据上述实施例,第一设备只响应目标设备发送的触发消息,由于目标设备为与第一设备通信信号最佳的第二设备,因此,可以保障后续初始接入过程中的信号质量。According to the above embodiment, the first device only responds to the trigger message sent by the target device. Since the target device is the second device with the best communication signal with the first device, the signal quality in the subsequent initial access process can be guaranteed.

可选地,第二设备可以基于特定应用场景的需求发送触发消息。在一些实施例中,触发消息可以包括用于发起盘点的消息,即第二设备可以是为了实现盘点,发送触发消息。Optionally, the second device may send a trigger message based on the requirements of a specific application scenario. In some embodiments, the trigger message may include a message for initiating an inventory count, that is, the second device may send a trigger message in order to implement an inventory count.

在一些实施例中,第一接入消息中包含目标设备的第一参数,目标设备的第一参数用于指示目标设备发送响应消息。In some embodiments, the first access message includes a first parameter of the target device, and the first parameter of the target device is used to instruct the target device to send a response message.

相应地,对于各个第二设备而言,信号处理方法还包括:第二设备接收第一接入消息,第一接入消息包括目标设备的第一参数;第二设备在第一接入消息中的第一参数与第二设备的第一参数相同的情况下,向第一设备发送响应消息。Correspondingly, for each second device, the signal processing method also includes: the second device receives a first access message, the first access message includes a first parameter of the target device; the second device sends a response message to the first device when the first parameter in the first access message is the same as the first parameter of the second device.

也就是说,通过在第一接入消息中携带目标设备的第一参数,可以使各个第二设备判断自身是否目标设备,从而确定是否响应第一设备发送的第一接入消息,实现不同的第二设备的区别处理。That is to say, by carrying the first parameter of the target device in the first access message, each second device can determine whether it is the target device, and thus determine whether to respond to the first access message sent by the first device, thereby achieving differentiated processing of different second devices.

图12是根据本申请实施例的信号处理方法的一个应用示例的示意图。以该方法用在IoT系统中,第一设备包括tag,第一设备附近的第二设备包括reader为例,如图12所示,上述信号处理方法包括以下步骤:FIG12 is a schematic diagram of an application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, the first device includes a tag, and the second device near the first device includes a reader as an example, as shown in FIG12, the signal processing method includes the following steps:

步骤0:网络为了比如盘点的目的,通过某个reader(例如reader A)在某个频段上广播了一个触发盘点的消息(msg0,触发消息),msg0中至少包含表征reader的RCC参数(第一参数)。Step 0: For the purpose of inventory, the network broadcasts a message (msg0, trigger message) to trigger inventory on a certain frequency band through a reader (for example, reader A). Msg0 contains at least the RCC parameter (first parameter) that represents the reader.

步骤1:当tag发起初始接入的时候,首先需要接收msg0,并且比对msg0中的RCC参数和自己最佳reader(目标设备)的RCC参数(本应用示例中假设最佳reader的RCC=001)。如果两者相等,那么tag开始发送上行链路信息(第一接入消息),否则就忽略msg0。在tag发送的第一接入消息中包含tag所选择的RCC参数。Step 1: When the tag initiates the initial access, it first needs to receive msg0 and compare the RCC parameters in msg0 with the RCC parameters of its best reader (target device) (in this application example, it is assumed that the RCC of the best reader = 001). If the two are equal, the tag starts to send uplink information (the first access message), otherwise it ignores msg0. The first access message sent by the tag contains the RCC parameters selected by the tag.

步骤2:第一接入消息被reader A和reader B收到。对于reader A来说,从tag来的消息中包含了RCC=001,所以reader A认为这个消息是发给它的,于是reader A会发送响应消息。对于reader B来说,由于消息中包含的RCC和自己的RCC不同,所以reader B会忽略这个消息,不发送响应消息。Step 2: The first access message is received by reader A and reader B. For reader A, the message from the tag contains RCC=001, so reader A thinks that the message is sent to it, and then reader A will send a response message. For reader B, since the RCC contained in the message is different from its own RCC, reader B will ignore the message and not send a response message.

在一些实施例中,第一接入消息中还包含第一设备的第一标识,第一接入消息用于触发目标设备发送包含第一标识的响应消息。相应地,对于各个第二设备而言,响应消息包括第一设备的第一标识,第一标识是基于第一接入消息得到的,响应消息用于第一设备基于第一标识确定初始接入成功。即上述信号处理方法还包括:第一设备接收响应消息,在响应消息中的第一标识与第一设备的第一标识相同的情况下,确定初始接入成功。In some embodiments, the first access message also includes a first identifier of the first device, and the first access message is used to trigger the target device to send a response message including the first identifier. Correspondingly, for each second device, the response message includes the first identifier of the first device, the first identifier is obtained based on the first access message, and the response message is used by the first device to determine that the initial access is successful based on the first identifier. That is, the above-mentioned signal processing method also includes: the first device receives the response message, and when the first identifier in the response message is the same as the first identifier of the first device, it is determined that the initial access is successful.

可选地,在响应消息中的第一标识与第一设备的第一标识不同的情况下,该响应消息可能是针对其他设备发出的第一接入消息的响应消息,第一设备可以忽略或者说丢弃该响应消息。Optionally, when the first identifier in the response message is different from the first identifier of the first device, the response message may be a response message to a first access message sent by another device, and the first device may ignore or discard the response message.

可以理解,上述初始接入过程通过在第一设备发送的第一接入消息中携带第一设备的第一标识,在第二设备发送的响应消息中也携带第一设备的第一标识,实现对第一设备与其他设备之间的冲突解决。It can be understood that the above initial access process implements conflict resolution between the first device and other devices by carrying the first identifier of the first device in the first access message sent by the first device and also carrying the first identifier of the first device in the response message sent by the second device.

在一些实施例中,响应消息中包括第一设备的第二标识。具体地,对于第一设备而言,在响应消息包括第一设备的第一标识时,该响应消息还包括目标设备为第一设备分配的第二标识。对于第二设备而言,在接收到的第一接入消息包含自身的第一参数的情况下,第二设备发送的响应消息包括第二设备为第一设备分配的第二标识。该第二标识可以用于后续流程中,即在后续流程中使用第二标识来区分第一设备与其他设备。In some embodiments, the response message includes a second identifier of the first device. Specifically, for the first device, when the response message includes the first identifier of the first device, the response message also includes a second identifier assigned to the first device by the target device. For the second device, when the received first access message includes its own first parameter, the response message sent by the second device includes the second identifier assigned to the first device by the second device. The second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.

可选地,第一设备需要发送的上行消息内容可以由第一接入消息承载,或者说编制在第一接入消息中。在一些场景中,例如监测/传感信息的上报、盘点等场景,第一设备需要发送的上行消息内容已经通过第一接入消息发送给第二设备了,不会有后续流程,此时响应消息中可以不包括第二标识,即第二设备无需为第一设备分配第二标识。Optionally, the uplink message content that the first device needs to send can be carried by the first access message, or compiled in the first access message. In some scenarios, such as reporting and inventory of monitoring/sensing information, the uplink message content that the first device needs to send has been sent to the second device through the first access message, and there will be no subsequent process. At this time, the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.

在一些实施例中,第一设备接收到的响应消息中的第二标识至少基于目标设备的第一参数确定。也就是说,对任一第二设备而言,在响应消息中为第一设备分配的第二标识至少基于该第二设备的第一参数确定。In some embodiments, the second identifier in the response message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the response message is determined based on at least the first parameter of the second device.

由于将第一参数编制在第二标识中,则具备不同第一参数的第二设备所分配的第二标识肯定不同,因此,上述实施例有利于实现第二标识在通信系统的局部范围内唯一,而不仅是在同时接入目标设备的多个第一设备内唯一,避免初始接入之后第一设备与目标设备之间的消息寻址出现问题。Since the first parameter is compiled in the second identifier, the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.

为了便于清楚理解上述技术方案,图13示出了根据本申请实施例的信号处理方法的另一个应用示例的示意图。以该方法用在IoT系统中,第一设备包括tag,第一设备附近的第二设备包括reader为例,如图13所示,信号处理方法包括:In order to facilitate a clear understanding of the above technical solution, FIG13 shows a schematic diagram of another application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, the first device includes a tag, and the second device near the first device includes a reader as an example, as shown in FIG13, the signal processing method includes:

步骤1:tag在接收到触发消息以后,通过比对触发消息中的RCC参数(第一参数)和自己保存的最佳reader(目标设备)的RCC参数,发现两者相同,于是发送第一接入消息给reader,第一接入消息 中至少包括tag的第一标识tag-id,它可以是一个tag自己产生的随机数。这个消息中包括了触发消息中的RCC=001。Step 1: After receiving the trigger message, the tag compares the RCC parameter (first parameter) in the trigger message with the RCC parameter of the best reader (target device) saved by itself, and finds that the two are the same, so it sends the first access message to the reader. The first access message The message includes at least the first tag identifier tag-id of the tag, which can be a random number generated by the tag itself. This message includes RCC=001 in the trigger message.

步骤2:reader A在收到tag的第一接入消息并且比对了RCC以后,反馈一个包含接收到的第一标识tag-id和分配给这个tag的第二标识Tag-RNTI的响应消息。当tag接收到这个消息以后,如果发现接收到的tag-id和自己发送的是相等的,就认为这次初始接入已经成功,并且把接收到的Tag-RNTI作为自己的标识,用于后续的流程。reader B(RCC=010)在比对了RCC以后,发现和自己的RCC不同,所以就直接忽略了收到的第一接入消息。Step 2: After receiving the first access message from the tag and comparing the RCC, reader A feeds back a response message containing the received first identifier tag-id and the second identifier Tag-RNTI assigned to the tag. When the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes. After comparing the RCC, reader B (RCC = 010) finds that it is different from its own RCC, so it directly ignores the received first access message.

在一些实施例中,第一设备在触发消息中的第一参数与目标设备的第一参数相同的情况下所发送的第一接入消息可以包括第一前导码;第一前导码的序号中的至少部分信息是基于目标设备的第一参数确定的,至少部分信息用于指示目标设备发送响应消息。In some embodiments, the first access message sent by the first device when the first parameter in the trigger message is the same as the first parameter of the target device may include a first preamble code; at least part of the information in the sequence number of the first preamble code is determined based on the first parameter of the target device, and at least part of the information is used to instruct the target device to send a response message.

相应地,对于第二设备而言,信号处理方法还包括:第二设备接收第一接入消息,第一接入消息包括第一前导码;第二设备在第一前导码的序号中的至少部分信息与第二设备的第一参数匹配的情况下,向第一设备发送响应消息;其中,响应消息包括第一前导码的序号,以使第一设备发送第二接入消息。Correspondingly, for the second device, the signal processing method also includes: the second device receives a first access message, the first access message includes a first preamble code; the second device sends a response message to the first device when at least part of the information in the sequence number of the first preamble code matches the first parameter of the second device; wherein the response message includes the sequence number of the first preamble code, so that the first device sends the second access message.

对于第一设备而言,信号处理方法还包括:第一设备接收响应消息,在响应消息中包含的前导码序号与第一前导码的序号相同的情况下,发送第二接入消息。For the first device, the signal processing method further includes: the first device receives a response message, and sends a second access message when the preamble code sequence number included in the response message is the same as the sequence number of the first preamble code.

也就是说,在第一接入消息中通过第一前导码的序号来携带目标设备的第一参数,使各个第二设备能够确定是否发送响应消息,并且第二设备还会在响应消息中携带前导码序号,以使第一设备确定该响应消息是否用于响应自己发送的第一接入消息,进一步地,在前导码序号相同的情况下发送第二接入消息。可选地,第二接入消息可以用于发送上行消息内容。That is, the first parameter of the target device is carried by the sequence number of the first preamble in the first access message, so that each second device can determine whether to send a response message, and the second device also carries the preamble sequence number in the response message, so that the first device determines whether the response message is used to respond to the first access message sent by itself, and further, sends the second access message when the preamble sequence number is the same. Optionally, the second access message can be used to send uplink message content.

在上述实施例的基础上,第二接入消息包含第一设备的第一标识;信号处理方法还包括:第二设备接收第二接入消息;第二设备向第一设备发送接入确认消息;其中,接入确认消息中包含第一标识,以使第一设备确定初始接入成功。Based on the above embodiment, the second access message includes the first identifier of the first device; the signal processing method also includes: the second device receives the second access message; the second device sends an access confirmation message to the first device; wherein the access confirmation message includes the first identifier, so that the first device determines that the initial access is successful.

相应地,对于第一设备而言,上述方法还包括:第一设备在发送第二接入消息之后,接收接入确认消息,在接入确认消息中的第一标识与第一设备的第一标识相同的情况下,确定初始接入成功。Correspondingly, for the first device, the above method also includes: after sending the second access message, the first device receives an access confirmation message, and determines that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device.

可选地,在接入确认消息中的第一标识与第一设备的第一标识不同的情况下,第一设备可以忽略或者说丢弃该接入确认消息。Optionally, when the first identifier in the access confirmation message is different from the first identifier of the first device, the first device may ignore or discard the access confirmation message.

也就是说,第二设备在接收到第二接入消息之后,反馈包含该消息中的第一标识的接入确认消息给第一设备,以使第一设备能够确认第一设备与其他设备之间的冲突解决,从而确定初始接入成功。That is, after receiving the second access message, the second device feeds back an access confirmation message including the first identifier in the message to the first device, so that the first device can confirm that the conflict between the first device and other devices is resolved, thereby determining that the initial access is successful.

可选地,接入确认消息中包括第一设备的第二标识。具体地,对于第一设备而言,在接入确认消息包括第一设备的第一标识时,该接入确认消息还包括目标设备为第一设备分配的第二标识。对于第二设备而言,在接收到第二接入消息之后,第二设备发送的接入确认消息还包括第二设备为第一设备分配的第二标识。该第二标识可以用于后续流程中,即在后续流程中使用第二标识来区分第一设备与其他设备。Optionally, the access confirmation message includes the second identifier of the first device. Specifically, for the first device, when the access confirmation message includes the first identifier of the first device, the access confirmation message also includes the second identifier assigned to the first device by the target device. For the second device, after receiving the second access message, the access confirmation message sent by the second device also includes the second identifier assigned to the first device by the second device. The second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.

可选地,第一设备需要发送的上行消息内容可以由第二接入消息承载,或者说编制在第二接入消息中。在一些场景中,例如监测/传感信息的上报、盘点等场景,第一设备需要发送的上行消息内容已经通过第二接入消息发送给第二设备了,不会有后续流程,此时响应消息中可以不包括第二标识,即第二设备无需为第一设备分配第二标识。Optionally, the uplink message content that the first device needs to send can be carried by the second access message, or compiled in the second access message. In some scenarios, such as reporting and inventory of monitoring/sensing information, the uplink message content that the first device needs to send has been sent to the second device through the second access message, and there will be no subsequent process. At this time, the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.

在一些实施例中,第一设备接收到的接入确认消息中的第二标识至少基于目标设备的第一参数确定。也就是说,对任一第二设备而言,在接入确认消息中为第一设备分配的第二标识至少基于该第二设备的第一参数确定。In some embodiments, the second identifier in the access confirmation message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the access confirmation message is determined based on at least the first parameter of the second device.

由于将第一参数编制在第二标识中,则具备不同第一参数的第二设备所分配的第二标识肯定不同,因此,上述实施例有利于实现第二标识在通信系统的局部范围内唯一,而不仅是在同时接入目标设备的多个第一设备内唯一,避免初始接入之后第一设备与目标设备之间的消息寻址出现问题。Since the first parameter is compiled in the second identifier, the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.

为了便于清楚理解上述技术方案,图14示出了根据本申请实施例的信号处理方法的另一个应用示例的示意图。以该方法用在IoT系统中,第一设备包括tag,第一设备附近的第二设备包括reader为例,如图14所示,信号处理方法包括:In order to facilitate a clear understanding of the above technical solution, FIG14 shows a schematic diagram of another application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, the first device includes a tag, and the second device near the first device includes a reader as an example, as shown in FIG14, the signal processing method includes:

步骤1:tag接收到触发消息以后,通过比对触发消息中的RCC参数和自己保存的最佳reader的RCC参数,发现两者相同,于是随机选择了一个preamble进行第一接入消息的发送。preamble上调制了一个序列,这些序列的个数是有限的,比如一共有16个,每个序列都有固定的一个序号。reader能够解调不同序列的preamble。如果从不同的tag收到了调整了相同序列的preamble,reader无法区分不同的tag,即可能作为一个preamble进行解调。tag选择的preamble的序号(preamble index)也包含了RCC参数。Step 1: After the tag receives the trigger message, it compares the RCC parameters in the trigger message with the RCC parameters of the best reader it has saved, and finds that the two are the same, so it randomly selects a preamble to send the first access message. A sequence is modulated on the preamble. The number of these sequences is limited, for example, there are 16 in total, and each sequence has a fixed serial number. The reader can demodulate preambles of different sequences. If the preambles with the same sequence are received from different tags, the reader cannot distinguish between different tags, that is, they may be demodulated as one preamble. The serial number (preamble index) of the preamble selected by the tag also contains the RCC parameters.

步骤2:reader A(RCC=001)在收到preamble并且比对了preamble index所包含的RCC=001以后, 应答一个包含preamble index的响应消息给tag,用来表示已经正确接收和解调序号包含RRC=001信息的preamble。reader B(RCC=010)因为preamble index中包含的RCC=001,和自己的RCC参数不同就忽略了该消息。Step 2: After reader A (RCC=001) receives the preamble and compares the RCC=001 contained in the preamble index, A response message containing the preamble index is sent to the tag to indicate that the preamble with the sequence number containing RRC=001 has been correctly received and demodulated. Reader B (RCC=010) ignores the message because the RCC=001 contained in the preamble index is different from its own RCC parameter.

步骤3:tag在接收到preamble index以后,会和自己刚刚发送的preamble的index进行比较。如果发现两个index是一样的,tag就会发送至少包含了tag-id的第二接入消息给reader;否则就认为这次初始接入失败。其中tag-id可以是一个tag自己产生的随机数。Step 3: After receiving the preamble index, the tag will compare it with the index of the preamble it just sent. If the two indexes are found to be the same, the tag will send a second access message containing at least the tag-id to the reader; otherwise, it is considered that the initial access has failed. The tag-id can be a random number generated by the tag itself.

步骤4:reader A在收到tag的消息以后,反馈一个接入确认消息,其中包含接收到的tag-id和分配给这个tag的标识Tag-RNTI(第二标识)。当tag接收到这个消息以后,如果发现接收到的tag-id和自己发送的是相等的,就认为这次初始接入已经成功,并且把接收到的Tag-RNTI作为自己的标识,用于后续的流程。Step 4: After receiving the message from the tag, reader A returns an access confirmation message, which contains the received tag-id and the tag-RNTI (second identifier) assigned to the tag. After the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes.

在另一些实施例中,第一接入消息包括第一前导码。信号处理方法还包括:第二设备接收第一接入消息;第二设备发送响应消息;其中,响应消息中包含第二设备的第一参数以及第一前导码的序号,以使第一设备发送第二接入消息。In some other embodiments, the first access message includes a first preamble. The signal processing method further includes: the second device receives the first access message; the second device sends a response message; wherein the response message includes a first parameter of the second device and a sequence number of the first preamble, so that the first device sends the second access message.

相应地,对于第一设备而言,信号处理方法还包括:第一设备接收针对第一接入消息的响应消息,响应消息中包含发送该接入响应消息的第二设备的第一参数;第一设备在响应消息中的第一参数与目标设备的第一参数相同,且响应消息中包含第一前导码的序号的情况下,发送第二接入消息。Correspondingly, for the first device, the signal processing method also includes: the first device receives a response message to the first access message, and the response message includes a first parameter of the second device that sends the access response message; the first device sends a second access message when the first parameter in the response message is the same as the first parameter of the target device and the response message includes the sequence number of the first preamble code.

也就是说,第一设备在处理第一前导码时,无需参考目标设备的第一参数。各个第二设备均能响应第一设备发送的第一接入消息。但不同的第二设备发送的响应消息中的第一参数不同,第一设备可以从中确定目标设备发送的响应消息,并且在响应消息包含第一前导码的序号的情况下,发送第二接入消息。通过该实施例,同样可以实现对不同的第二设备的区分,即实现多个第二设备之间的冲突解决。That is to say, when the first device processes the first preamble, it does not need to refer to the first parameter of the target device. Each second device can respond to the first access message sent by the first device. However, the first parameters in the response messages sent by different second devices are different, and the first device can determine the response message sent by the target device, and send the second access message when the response message contains the sequence number of the first preamble. Through this embodiment, it is also possible to distinguish different second devices, that is, to achieve conflict resolution between multiple second devices.

在上述实施例的基础上,第二接入消息包含第一设备的第一标识;信号处理方法还包括:第二设备接收第二接入消息;第二设备向第一设备发送接入确认消息;其中,接入确认消息中包含第一标识,以使第一设备确定初始接入成功。Based on the above embodiment, the second access message includes the first identifier of the first device; the signal processing method also includes: the second device receives the second access message; the second device sends an access confirmation message to the first device; wherein the access confirmation message includes the first identifier, so that the first device determines that the initial access is successful.

相应地,对于第一设备而言,上述方法还包括:第一设备在发送第二接入消息之后,接收接入确认消息,在接入确认消息中的第一标识与第一设备的第一标识相同的情况下,确定初始接入成功。Correspondingly, for the first device, the above method also includes: after sending the second access message, the first device receives an access confirmation message, and determines that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device.

可选地,在接入确认消息中的第一标识与第一设备的第一标识不同的情况下,第一设备可以忽略或者说丢弃该接入确认消息。Optionally, when the first identifier in the access confirmation message is different from the first identifier of the first device, the first device may ignore or discard the access confirmation message.

也就是说,第二设备在接收到第二接入消息之后,反馈包含该消息中的第一标识的接入确认消息给第一设备,以使第一设备能够确认第一设备与其他设备之间的冲突解决,从而确定初始接入成功。That is, after receiving the second access message, the second device feeds back an access confirmation message including the first identifier in the message to the first device, so that the first device can confirm that the conflict between the first device and other devices is resolved, thereby determining that the initial access is successful.

可选地,接入确认消息中包括第一设备的第二标识。具体地,对于第一设备而言,在接入确认消息包括第一设备的第一标识时,该接入确认消息还包括目标设备为第一设备分配的第二标识。对于第二设备而言,在接收到第二接入消息之后,第二设备发送的接入确认消息还包括第二设备为第一设备分配的第二标识。该第二标识可以用于后续流程中,即在后续流程中使用第二标识来区分第一设备与其他设备。Optionally, the access confirmation message includes the second identifier of the first device. Specifically, for the first device, when the access confirmation message includes the first identifier of the first device, the access confirmation message also includes the second identifier assigned to the first device by the target device. For the second device, after receiving the second access message, the access confirmation message sent by the second device also includes the second identifier assigned to the first device by the second device. The second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.

可选地,第一设备需要发送的上行消息内容可以由第二接入消息承载,或者说编制在第二接入消息中。在一些场景中,例如监测/传感信息的上报、盘点等场景,第一设备需要发送的上行消息内容已经通过第二接入消息发送给第二设备了,不会有后续流程,此时响应消息中可以不包括第二标识,即第二设备无需为第一设备分配第二标识。Optionally, the uplink message content that the first device needs to send can be carried by the second access message, or compiled in the second access message. In some scenarios, such as reporting and inventory of monitoring/sensing information, the uplink message content that the first device needs to send has been sent to the second device through the second access message, and there will be no subsequent process. At this time, the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.

在一些实施例中,第一设备接收到的接入确认消息中的第二标识至少基于目标设备的第一参数确定。也就是说,对任一第二设备而言,在接入确认消息中为第一设备分配的第二标识至少基于该第二设备的第一参数确定。In some embodiments, the second identifier in the access confirmation message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the access confirmation message is determined based on at least the first parameter of the second device.

由于将第一参数编制在第二标识中,则具备不同第一参数的第二设备所分配的第二标识肯定不同,因此,上述实施例有利于实现第二标识在通信系统的局部范围内唯一,而不仅是在同时接入目标设备的多个第一设备内唯一,避免初始接入之后第一设备与目标设备之间的消息寻址出现问题。Since the first parameter is compiled in the second identifier, the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.

为了便于清楚理解上述技术方案,图15示出了根据本申请实施例的信号处理方法的另一个应用示例的示意图。以该方法用在IoT系统中,第一设备包括tag,第一设备附近的第二设备包括reader为例,如图15所示,信号处理方法包括:In order to facilitate a clear understanding of the above technical solution, FIG15 shows a schematic diagram of another application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, the first device includes a tag, and the second device near the first device includes a reader as an example, as shown in FIG15, the signal processing method includes:

步骤1:tag接收到触发消息以后,通过比对触发消息中的RCC和自己保存的最佳reader的RCC,发现两者相同,于是随机选择了一个preamble进行第一接入消息的发送。preamble上调制了一个序列,这些序列的个数是有限的,比如一共有16个,每个序列都有固定的一个序号。reader能够解调不同序列的preamble。如果从不同的tag收到了调整了相同序列的preamble,reader无法区分不同的tag,即可能作为一个preamble进行解调。Step 1: After the tag receives the trigger message, it compares the RCC in the trigger message with the RCC of the best reader it has saved and finds that the two are the same, so it randomly selects a preamble to send the first access message. A sequence is modulated on the preamble. The number of these sequences is limited, for example, there are 16 in total, and each sequence has a fixed serial number. The reader can demodulate preambles of different sequences. If the preambles with the same sequence are received from different tags, the reader cannot distinguish between different tags, and may demodulate them as one preamble.

步骤2:reader A和reader B在收到preamble以后,应答一个包含preamble index(preamble序号) 的响应消息给tag,用来表示已经正确接收和解调该preamble index对应的preamble。Step 2: After receiving the preamble, reader A and reader B respond with a message containing the preamble index (preamble sequence number). The response message is sent to the tag to indicate that the preamble corresponding to the preamble index has been correctly received and demodulated.

步骤3:tag在接收到preamble index以后,会和自己刚刚发送的preamble的index进行比较。如果发现两个index是一样的,tag就会发送至少包含了tag-id的第二接入消息给reader;否则就认为这次初始接入失败。其中tag-id可以是一个tag自己产生的随机数。在该步骤中,虽然tag几乎同时收到了从readerA和readerB过来的响应消息,但是因为reader A是最佳reader,所以tag解调了reader A的响应消息,而reader B的响应消息就变成了干扰信号。Step 3: After receiving the preamble index, the tag will compare it with the index of the preamble it just sent. If the two indices are the same, the tag will send a second access message containing at least the tag-id to the reader; otherwise, it is considered that the initial access has failed. The tag-id can be a random number generated by the tag itself. In this step, although the tag receives the response messages from reader A and reader B almost at the same time, because reader A is the best reader, the tag demodulates the response message of reader A, and the response message of reader B becomes an interference signal.

步骤4:reader A在收到tag的消息以后,反馈一个接入确认消息,其中包含接收到的tag-id和分配给这个tag的标识Tag-RNTI(第二标识)。当tag接收到这个消息以后,如果发现接收到的tag-id和自己发送的是相等的,就认为这次初始接入已经成功,并且把接收到的Tag-RNTI作为自己的标识,用于后续的流程。Step 4: After receiving the message from the tag, reader A returns an access confirmation message, which contains the received tag-id and the tag-RNTI (second identifier) assigned to the tag. After the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes.

在一些实施例中,在第一标识的比特数量小于第一值的情况下,第二接入消息和/或接入确认消息中可以包含目标设备的第一参数。其中,第一值可以是预设的数值。In some embodiments, when the number of bits of the first identifier is less than the first value, the second access message and/or the access confirmation message may include the first parameter of the target device, wherein the first value may be a preset value.

具体来说,如果第一标识的比特长度足够,则在第一设备周围的各个第二设备上,同时正在初始接入过程中所有第一设备的第一标识总是能够保持唯一。上述实施例提供了另外一种解决方案,允许第一标识的比特长度较小,只在一个第二设备正在进行初始接入过程中的第一设备相互之间能保持唯一,也就是说在不同的第二设备上正在进行初始接入过程的第一设备有可能出现第一标识一致的情况,在此基础上,可以在第二接入消息和接入确认消息中增加第一参数,以便于区别正在初始接入过程中的所有第一设备。Specifically, if the bit length of the first identifier is sufficient, the first identifiers of all first devices that are in the initial access process and around the first device can always remain unique. The above embodiment provides another solution, which allows the bit length of the first identifier to be smaller, so that only the first devices that are in the initial access process of one second device can remain unique to each other, that is, the first devices that are in the initial access process of different second devices may have the same first identifier. On this basis, the first parameter can be added to the second access message and the access confirmation message to distinguish all first devices that are in the initial access process.

可以理解,在窄带系统中,一个网络节点的覆盖范围内的IoT设备相互之间的干扰是通过适当的多址接入的方式来消除,但是这种方法无法应用于初始接入的过程,因为初始接入的时候,tag甚至还不知道通过哪个网络节点来接入到网络中,所以不可避免存在网络节点之间的干扰。本申请实施例的信号处理方法,通过测量网络节点发送的信标信号或者唤醒信号(比如触发盘点的消息)的信号强度来确定最强(最近)的网络节点,并且通过第一参数来对网络节点进行区别。采取本方案可以在较小的系统带宽开销和信令开销代价下基本消除在初始接入过程中reader之间上下行之间的干扰问题。It can be understood that in a narrowband system, the interference between IoT devices within the coverage area of a network node is eliminated through appropriate multiple access methods, but this method cannot be applied to the initial access process, because during the initial access, the tag does not even know which network node to access the network, so interference between network nodes is inevitable. The signal processing method of an embodiment of the present application determines the strongest (closest) network node by measuring the signal strength of a beacon signal or a wake-up signal (such as a message that triggers an inventory) sent by a network node, and distinguishes the network nodes through a first parameter. This solution can basically eliminate the interference problem between the uplink and downlink of readers during the initial access process at the cost of a smaller system bandwidth overhead and signaling overhead.

图16是根据本申请一实施例的第一设备1600的示意性框图。该第一设备1600可以包括:FIG16 is a schematic block diagram of a first device 1600 according to an embodiment of the present application. The first device 1600 may include:

第一通信模块1610,用于接收第一信号;其中,第一信号中包含发送该第一信号的第二设备的第一参数;The first communication module 1610 is configured to receive a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal;

第一处理模块1620,用于基于第一信号中的第一参数,确定初始接入的目标设备的第一参数;目标设备的第一参数用于确定是否响应其接收到的触发初始接入的消息。The first processing module 1620 is used to determine a first parameter of the target device for initial access based on the first parameter in the first signal; the first parameter of the target device is used to determine whether to respond to the message triggering initial access received by it.

在一种实施方式中,第一处理模块1620还用于:In one implementation, the first processing module 1620 is further configured to:

在接收到的多个第一信号中,确定信号强度最大的第一信号;Determine, among the received multiple first signals, a first signal having the greatest signal strength;

将信号强度最大的第一信号中的第一参数,确定为目标设备的第一参数。The first parameter in the first signal with the largest signal strength is determined as the first parameter of the target device.

在一种实施方式中,第一参数在通信系统的全局范围或局部范围内唯一。In one implementation, the first parameter is unique in a global scope or a local scope of the communication system.

在一种实施方式中,第一参数的比特数量与通信系统的全局范围或局部范围内的第二设备的数量相关。In one implementation, the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system.

在一种实施方式中,在第二设备的数量增加的情况下,第一参数的比特数量增加或不变。In one implementation, when the number of second devices increases, the number of bits of the first parameter increases or remains unchanged.

在一种实施方式中,第一信号包括第二设备周期性广播的信标信号。In one embodiment, the first signal includes a beacon signal periodically broadcast by the second device.

在一种实施方式中,第一通信模块1610还用于在第一时间窗口内搜索信标信号;In one embodiment, the first communication module 1610 is further configured to search for a beacon signal within the first time window;

第一处理模块1620还用于若搜索到多个包含相同的第一参数的信标信号,则基于多个包含相同的第一参数的信标信号,确定相同的第一参数所对应的第二设备的广播周期;The first processing module 1620 is further configured to determine the broadcast period of the second device corresponding to the same first parameter based on the multiple beacon signals containing the same first parameter if multiple beacon signals containing the same first parameter are searched;

第一通信模块1610还用于基于广播周期接收来自第二设备的信标信号。The first communication module 1610 is further configured to receive a beacon signal from a second device based on a broadcast period.

在一种实施方式中,广播周期是在预先配置的周期集合中选取的,第一时间窗口的长度大于周期集合中的最大周期。In one implementation, the broadcast period is selected from a preconfigured period set, and the length of the first time window is greater than the maximum period in the period set.

在一种实施方式中,第一通信模块1610还用于:In one implementation, the first communication module 1610 is further configured to:

发送第二信号;其中,第二信号用于触发接收到第二信号的第二设备发送第一信号;Sending a second signal; wherein the second signal is used to trigger the second device that receives the second signal to send the first signal;

接收第二设备发送的第一信号。A first signal sent by a second device is received.

在一种实施方式中,第一通信模块1610还用于:In one implementation, the first communication module 1610 is further configured to:

接收触发消息;其中,触发消息用于触发初始接入,触发消息中包含发送触发消息的设备的第一参数;Receiving a trigger message; wherein the trigger message is used to trigger initial access, and the trigger message includes a first parameter of a device sending the trigger message;

在触发消息中的第一参数与目标设备的第一参数相同的情况下,发送第一接入消息。In a case where the first parameter in the trigger message is the same as the first parameter of the target device, a first access message is sent.

在一种实施方式中,触发消息包括用于发起盘点的消息。In one implementation, the trigger message includes a message for initiating an inventory.

在一种实施方式中,第一接入消息中包含目标设备的第一参数,目标设备的第一参数用于指示目标 设备发送响应消息。In one embodiment, the first access message includes a first parameter of the target device, and the first parameter of the target device is used to indicate the target device. The device sends a response message.

在一种实施方式中,第一接入消息中还包含第一设备的第一标识,第一接入消息用于触发目标设备发送包含第一标识的响应消息;In one implementation, the first access message further includes a first identifier of the first device, and the first access message is used to trigger the target device to send a response message including the first identifier;

第一通信模块1610,还用于接收响应消息;The first communication module 1610 is further configured to receive a response message;

第一处理模块1620,还用于在响应消息中的第一标识与第一设备的第一标识相同的情况下,确定初始接入成功。The first processing module 1620 is further configured to determine that the initial access is successful when the first identifier in the response message is the same as the first identifier of the first device.

在一种实施方式中,响应消息中包括目标设备为第一设备分配的第二标识。In one implementation, the response message includes the second identifier allocated by the target device to the first device.

在一种实施方式中,第一接入消息包括第一前导码;第一前导码的序号中的至少部分信息是基于目标设备的第一参数确定的,至少部分信息用于指示目标设备发送响应消息;In one embodiment, the first access message includes a first preamble; at least part of the information in the sequence number of the first preamble is determined based on a first parameter of the target device, and at least part of the information is used to instruct the target device to send a response message;

第一通信模块1610还用于:The first communication module 1610 is further configured to:

接收响应消息,在响应消息中包含的前导码序号与第一前导码的序号相同的情况下,发送第二接入消息。A response message is received, and when the preamble code sequence number included in the response message is the same as the sequence number of the first preamble code, a second access message is sent.

在一种实施方式中,第一接入消息包括第一前导码;In one embodiment, the first access message includes a first preamble;

第一通信模块1610还用于:The first communication module 1610 is further configured to:

接收针对第一接入消息的响应消息;其中,响应消息中包含发送该接入响应消息的第二设备的第一参数;Receiving a response message to the first access message; wherein the response message includes a first parameter of the second device sending the access response message;

在响应消息中的第一参数与目标设备的第一参数相同,且响应消息中包含第一前导码的序号的情况下,发送第二接入消息。In a case where the first parameter in the response message is the same as the first parameter of the target device and the response message includes the sequence number of the first preamble code, a second access message is sent.

在一种实施方式中,第二接入消息包含第一设备的第一标识;In one implementation, the second access message includes a first identifier of the first device;

第一通信模块1610还用于在发送第二接入消息之后,接收接入确认消息;The first communication module 1610 is further configured to receive an access confirmation message after sending the second access message;

第一处理模块1620还用于在接入确认消息中的第一标识与第一设备的第一标识相同的情况下,确定初始接入成功。The first processing module 1620 is further configured to determine that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device.

在一种实施方式中,接入确认消息中包含目标设备为第一设备分配的第二标识。In one implementation, the access confirmation message includes the second identifier allocated by the target device to the first device.

在一种实施方式中,第二标识至少基于目标设备的第一参数确定。In one implementation, the second identifier is determined based on at least a first parameter of the target device.

在一种实施方式中,在第一标识的比特数量小于第一值的情况下,第二接入消息和/或接入确认消息中包含目标设备的第一参数。In one implementation, when the number of bits of the first identifier is less than the first value, the second access message and/or the access confirmation message includes the first parameter of the target device.

本申请实施例的第一设备1600能够实现前述的方法实施例中的第一设备的对应功能。该第一设备1600中的各个模块(子模块、单元或组件等)对应的流程、功能、实现方式以及有益效果,可参见上述方法实施例中的对应描述,在此不再赘述。需要说明,关于申请实施例的第一设备1600中的各个模块(子模块、单元或组件等)所描述的功能,可以由不同的模块(子模块、单元或组件等)实现,也可以由同一个模块(子模块、单元或组件等)实现。The first device 1600 of the embodiment of the present application can implement the corresponding functions of the first device in the aforementioned method embodiment. The processes, functions, implementation methods and beneficial effects corresponding to the various modules (sub-modules, units or components, etc.) in the first device 1600 can be found in the corresponding descriptions in the above method embodiments, which will not be repeated here. It should be noted that the functions described by the various modules (sub-modules, units or components, etc.) in the first device 1600 of the application embodiment can be implemented by different modules (sub-modules, units or components, etc.) or by the same module (sub-module, unit or component, etc.).

图17是根据本申请一实施例的第二设备1700的示意性框图。该第二设备1700可以包括:FIG17 is a schematic block diagram of a second device 1700 according to an embodiment of the present application. The second device 1700 may include:

第二通信模块1710,用于发送第一信号;其中,第一信号中包含第二设备的第一参数;第一信号用于第一设备确定初始接入的目标设备的第一参数,以确定是否响应第一设备接收到的触发初始接入的消息。The second communication module 1710 is used to send a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine the first parameter of the target device for initial access to determine whether to respond to the message triggering initial access received by the first device.

在一种实施方式中,第一参数在通信系统的全局范围或局部范围内唯一。In one implementation, the first parameter is unique in a global scope or a local scope of the communication system.

在一种实施方式中,第一参数的比特数量与通信系统的全局范围或局部范围内的第二设备的数量相关。In one implementation, the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system.

在一种实施方式中,在第二设备的数量增加的情况下,第一参数的比特数量增加或不变。In one implementation, when the number of second devices increases, the number of bits of the first parameter increases or remains unchanged.

在一种实施方式中,第二通信模块1710还用于:In one implementation, the second communication module 1710 is further configured to:

周期性广播信标信号。Periodically broadcasts a beacon signal.

在一种实施方式中,信标信号的广播周期是在预先配置的周期集合中选取的。In one embodiment, the broadcast period of the beacon signal is selected from a preconfigured period set.

在一种实施方式中,第二通信模块1710还用于:In one implementation, the second communication module 1710 is further configured to:

在接收到第一设备发送的第二信号的情况下,向第一设备发送第一信号。In case of receiving the second signal sent by the first device, the first signal is sent to the first device.

在一种实施方式中,第二通信模块1710还用于:In one implementation, the second communication module 1710 is further configured to:

发送触发消息;其中,触发消息中包含第二设备的第一参数;触发消息用于触发第一设备在触发消息中的第一参数与目标设备的第一参数相同的情况下,发送第一接入消息。Sending a trigger message; wherein the trigger message includes a first parameter of the second device; the trigger message is used to trigger the first device to send a first access message when the first parameter in the trigger message is the same as the first parameter of the target device.

在一种实施方式中,触发消息包括用于发起盘点的消息。In one implementation, the trigger message includes a message for initiating an inventory.

在一种实施方式中,第二通信模块1710还用于:In one implementation, the second communication module 1710 is further configured to:

接收第一接入消息;其中,第一接入消息包括目标设备的第一参数;Receiving a first access message; wherein the first access message includes a first parameter of the target device;

在第一接入消息中的第一参数与第二设备的第一参数相同的情况下,向第一设备发送响应消息。In a case where the first parameter in the first access message is the same as the first parameter of the second device, a response message is sent to the first device.

在一种实施方式中,响应消息包括第一设备的第一标识;第一标识是基于第一接入消息得到的,响 应消息用于第一设备基于第一标识确定初始接入成功。In one implementation, the response message includes a first identifier of the first device; the first identifier is obtained based on the first access message, and the response message includes a first identifier of the first device; The response message is used by the first device to determine that the initial access is successful based on the first identifier.

在一种实施方式中,响应消息中包括第二设备为第一设备分配的第二标识。In one implementation, the response message includes the second identifier allocated by the second device to the first device.

在一种实施方式中,第二通信模块1710还用于:In one implementation, the second communication module 1710 is further configured to:

接收第一接入消息;其中,第一接入消息包括第一前导码;Receiving a first access message; wherein the first access message includes a first preamble;

在第一前导码的序号中的至少部分信息与第二设备的第一参数匹配的情况下,向第一设备发送响应消息;其中,响应消息包括第一前导码的序号,以使第一设备发送第二接入消息。When at least part of the information in the sequence number of the first preamble code matches the first parameter of the second device, a response message is sent to the first device; wherein the response message includes the sequence number of the first preamble code, so that the first device sends a second access message.

在一种实施方式中,第二通信模块1710还用于:In one implementation, the second communication module 1710 is further configured to:

接收第一接入消息;其中,第一接入消息包括第一前导码;Receiving a first access message; wherein the first access message includes a first preamble;

发送响应消息;其中,响应消息中包含第二设备的第一参数以及第一前导码的序号,以使第一设备发送第二接入消息。Send a response message; wherein the response message includes the first parameter of the second device and the sequence number of the first preamble code, so that the first device sends a second access message.

在一种实施方式中,第二通信模块1710还用于:In one implementation, the second communication module 1710 is further configured to:

接收第二接入消息;其中,第二接入消息包含第一设备的第一标识;Receiving a second access message; wherein the second access message includes a first identifier of the first device;

向第一设备发送接入确认消息;其中,接入确认消息中包含第一标识,以使第一设备确定初始接入成功。An access confirmation message is sent to the first device, wherein the access confirmation message includes a first identifier, so that the first device determines that the initial access is successful.

在一种实施方式中,接入确认消息中包含第二设备为第一设备分配的第二标识。In one implementation, the access confirmation message includes a second identifier allocated by the second device to the first device.

在一种实施方式中,第二标识至少基于第二设备的第一参数确定。In one implementation, the second identifier is determined based on at least a first parameter of the second device.

在一种实施方式中,在第一标识的比特数量小于第一值的情况下,第二接入消息和/或接入确认消息中包含第二设备的第一参数。In one implementation, when the number of bits of the first identifier is less than the first value, the second access message and/or the access confirmation message includes the first parameter of the second device.

本申请实施例的第二设备1700能够实现前述的方法实施例中的第二设备的对应功能。该第二设备1700中的各个模块(子模块、单元或组件等)对应的流程、功能、实现方式以及有益效果,可参见上述方法实施例中的对应描述,在此不再赘述。需要说明,关于申请实施例的第二设备1700中的各个模块(子模块、单元或组件等)所描述的功能,可以由不同的模块(子模块、单元或组件等)实现,也可以由同一个模块(子模块、单元或组件等)实现。The second device 1700 of the embodiment of the present application can implement the corresponding functions of the second device in the aforementioned method embodiment. The processes, functions, implementation methods and beneficial effects corresponding to the various modules (sub-modules, units or components, etc.) in the second device 1700 can be found in the corresponding descriptions in the above method embodiments, which will not be repeated here. It should be noted that the functions described by the various modules (sub-modules, units or components, etc.) in the second device 1700 of the application embodiment can be implemented by different modules (sub-modules, units or components, etc.), or by the same module (sub-module, unit or component, etc.).

图18是根据本申请实施例的通信设备1800示意性结构图。该通信设备1800包括处理器1810,处理器1810可以从存储器中调用并运行计算机程序,以使通信设备1800实现本申请实施例中的方法。Fig. 18 is a schematic structural diagram of a communication device 1800 according to an embodiment of the present application. The communication device 1800 includes a processor 1810, and the processor 1810 can call and run a computer program from a memory to enable the communication device 1800 to implement the method in the embodiment of the present application.

在一种实施方式中,通信设备1800还可以包括存储器1820。其中,处理器1810可以从存储器1820中调用并运行计算机程序,以使通信设备1800实现本申请实施例中的方法。In one implementation, the communication device 1800 may further include a memory 1820. The processor 1810 may call and run a computer program from the memory 1820 to enable the communication device 1800 to implement the method in the embodiment of the present application.

其中,存储器1820可以是独立于处理器1810的一个单独的器件,也可以集成在处理器1810中。The memory 1820 may be a separate device independent of the processor 1810 , or may be integrated into the processor 1810 .

在一种实施方式中,通信设备1800还可以包括收发器1830,处理器1810可以控制该收发器1830与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。In one implementation, the communication device 1800 may further include a transceiver 1830, and the processor 1810 may control the transceiver 1830 to communicate with other devices, specifically, may send information or data to other devices, or receive information or data sent by other devices.

其中,收发器1830可以包括发射机和接收机。收发器1830还可以进一步包括天线,天线的数量可以为一个或多个。The transceiver 1830 may include a transmitter and a receiver. The transceiver 1830 may further include an antenna, and the number of antennas may be one or more.

在一种实施方式中,该通信设备1800可为本申请实施例的第一设备,并且该通信设备1800可以实现本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。In one implementation, the communication device 1800 may be the first device of the embodiment of the present application, and the communication device 1800 may implement the corresponding processes implemented by the first device in each method of the embodiment of the present application, which will not be repeated here for the sake of brevity.

在一种实施方式中,该通信设备1800可为本申请实施例的第二设备,并且该通信设备1800可以实现本申请实施例的各个方法中由第二设备实现的相应流程,为了简洁,在此不再赘述。In one implementation, the communication device 1800 may be the second device of the embodiment of the present application, and the communication device 1800 may implement the corresponding processes implemented by the second device in each method of the embodiment of the present application, which will not be described again for the sake of brevity.

图19是根据本申请实施例的芯片1900的示意性结构图。该芯片1900包括处理器1910,处理器1910可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。Fig. 19 is a schematic structural diagram of a chip 1900 according to an embodiment of the present application. The chip 1900 includes a processor 1910, and the processor 1910 can call and run a computer program from a memory to implement the method in the embodiment of the present application.

在一种实施方式中,芯片1900还可以包括存储器1920。其中,处理器1910可以从存储器1920中调用并运行计算机程序,以实现本申请实施例中由第一设备或者第二设备执行的方法。In one implementation, the chip 1900 may further include a memory 1920. The processor 1910 may call and run a computer program from the memory 1920 to implement the method executed by the first device or the second device in the embodiment of the present application.

其中,存储器1920可以是独立于处理器1910的一个单独的器件,也可以集成在处理器1910中。The memory 1920 may be a separate device independent of the processor 1910 , or may be integrated into the processor 1910 .

在一种实施方式中,该芯片1900还可以包括输入接口1930。其中,处理器1910可以控制该输入接口1930与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。In one implementation, the chip 1900 may further include an input interface 1930. The processor 1910 may control the input interface 1930 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.

在一种实施方式中,该芯片1900还可以包括输出接口1940。其中,处理器1910可以控制该输出接口1940与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。In one implementation, the chip 1900 may further include an output interface 1940. The processor 1910 may control the output interface 1940 to communicate with other devices or chips, and specifically, may output information or data to other devices or chips.

在一种实施方式中,该芯片可应用于本申请实施例中的第一设备,并且该芯片可以实现本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。In one implementation, the chip can be applied to the first device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the first device in each method of the embodiments of the present application. For the sake of brevity, they will not be repeated here.

在一种实施方式中,该芯片可应用于本申请实施例中的第二设备,并且该芯片可以实现本申请实施例的各个方法中由第二设备实现的相应流程,为了简洁,在此不再赘述。In one implementation, the chip can be applied to the second device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the second device in each method of the embodiments of the present application. For the sake of brevity, they will not be repeated here.

应用于第一设备和第二设备的芯片可以是相同的芯片或不同的芯片。The chips applied to the first device and the second device may be the same chip or different chips.

应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。It should be understood that the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.

上述提及的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、现成可编 程门阵列(field programmable gate array,FPGA)、专用集成电路(application specific integrated circuit,ASIC)或者其他可编程逻辑器件、晶体管逻辑器件、分立硬件组件等。其中,上述提到的通用处理器可以是微处理器或者也可以是任何常规的处理器等。The processors mentioned above can be general-purpose processors, digital signal processors (DSPs), off-the-shelf programmable Field programmable gate array (FPGA), application specific integrated circuit (ASIC) or other programmable logic devices, transistor logic devices, discrete hardware components, etc. Among them, the general processor mentioned above can be a microprocessor or any conventional processor, etc.

上述提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。The memory mentioned above may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memories. Among them, the non-volatile memory may be a read-only memory (ROM), a programmable ROM (PROM), an erasable programmable ROM (EPROM), an electrically erasable programmable ROM (EEPROM) or a flash memory. The volatile memory may be a random access memory (RAM).

应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should be understood that the above-mentioned memory is exemplary but not restrictive. For example, the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.

图20是根据本申请实施例的通信系统2000的示意性框图。该通信系统2000包括第一设备2010和第二设备2020。FIG20 is a schematic block diagram of a communication system 2000 according to an embodiment of the present application. The communication system 2000 includes a first device 2010 and a second device 2020 .

第一设备2010接收第一信号;其中,第一信号中包含发送该第一信号的第二设备2020的第一参数;The first device 2010 receives a first signal, wherein the first signal includes a first parameter of the second device 2020 that sends the first signal;

第一设备2010基于第一信号中的第一参数,确定初始接入的目标设备的第一参数;目标设备的第一参数用于第一设备2010确定是否响应其接收到的触发初始接入的消息。The first device 2010 determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device 2010 to determine whether to respond to a received message triggering initial access.

第二设备2020发送第一信号;其中,第一信号中包含第二设备2020的第一参数;第一信号用于第一设备2010确定初始接入的目标设备的第一参数,以确定是否响应第一设备2010接收到的触发初始接入的消息。The second device 2020 sends a first signal; wherein the first signal includes a first parameter of the second device 2020; the first signal is used by the first device 2010 to determine the first parameter of the target device for initial access, so as to determine whether to respond to the message triggering initial access received by the first device 2010.

其中,该第一设备2010可以用于实现上述方法中由第一设备实现的相应的功能,以及该第二设备2020可以用于实现上述方法中由第二设备实现的相应的功能。为了简洁,在此不再赘述。The first device 2010 may be used to implement the corresponding function implemented by the first device in the above method, and the second device 2020 may be used to implement the corresponding function implemented by the second device in the above method. For the sake of brevity, it will not be described here.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行该计算机程序指令时,全部或部分地产生按照本申请实施例中的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。该计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,该计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(Digital Subscriber Line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。该可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。In the above embodiments, it can be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented using software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the process or function in accordance with the embodiment of the present application is generated in whole or in part. The computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center. The computer-readable storage medium can be any available medium that a computer can access or a data storage device such as a server or data center that includes one or more available media integrated. The available medium can be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a solid state drive (SSD)), etc.

应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that in the various embodiments of the present application, the size of the serial numbers of the above-mentioned processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices and units described above can refer to the corresponding processes in the aforementioned method embodiments and will not be repeated here.

以上仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以该权利要求的保护范围为准。 The above are only specific implementations of the present application, but the protection scope of the present application is not limited thereto. Any person skilled in the art who is familiar with the present technical field can easily think of changes or substitutions within the technical scope disclosed in the present application, which should be included in the protection scope of the present application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.

Claims (87)

一种信号处理方法,包括:A signal processing method, comprising: 第一设备接收第一信号;其中,所述第一信号中包含发送该第一信号的第二设备的第一参数;A first device receives a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal; 所述第一设备基于所述第一信号中的第一参数,确定初始接入的目标设备的第一参数;所述目标设备的第一参数用于所述第一设备确定是否响应其接收到的触发初始接入的消息。The first device determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device to determine whether to respond to a received message triggering initial access. 根据权利要求1所述的方法,其中,所述第一设备基于所述第一信号中的第一参数,确定初始接入的目标设备的第一参数,包括:The method according to claim 1, wherein the first device determines the first parameter of the target device for initial access based on the first parameter in the first signal, comprising: 所述第一设备在接收到的多个第一信号中,确定信号强度最大的第一信号;The first device determines, among the multiple first signals received, a first signal having the greatest signal strength; 所述第一设备将所述信号强度最大的第一信号中的第一参数,确定为所述目标设备的第一参数。The first device determines the first parameter in the first signal with the largest signal strength as the first parameter of the target device. 根据权利要求1或2所述的方法,其中,所述第一参数在通信系统的全局范围或局部范围内唯一。The method according to claim 1 or 2, wherein the first parameter is unique in a global scope or a local scope of the communication system. 根据权利要求1-3中任一项所述的方法,其中,所述第一参数的比特数量与通信系统的全局范围或局部范围内的第二设备的数量相关。The method according to any one of claims 1 to 3, wherein the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system. 根据权利要求4所述的方法,其中,在所述第二设备的数量增加的情况下,所述第一参数的比特数量增加或不变。The method according to claim 4, wherein, when the number of the second devices increases, the number of bits of the first parameter increases or remains unchanged. 根据权利要求1-5中任一项所述的方法,其中,所述第一信号包括第二设备周期性广播的信标信号。The method according to any one of claims 1-5, wherein the first signal comprises a beacon signal periodically broadcast by the second device. 根据权利要求6所述的方法,其中,所述第一设备接收第一信号,包括:The method according to claim 6, wherein the first device receives the first signal, comprising: 所述第一设备在第一时间窗口内搜索信标信号;The first device searches for a beacon signal within a first time window; 若所述第一设备搜索到多个包含相同的第一参数的信标信号,则基于所述多个包含相同的第一参数的信标信号,确定所述相同的第一参数所对应的第二设备的广播周期,并基于所述广播周期接收来自所述第二设备的信标信号。If the first device searches for multiple beacon signals containing the same first parameter, it determines the broadcast period of the second device corresponding to the same first parameter based on the multiple beacon signals containing the same first parameter, and receives the beacon signal from the second device based on the broadcast period. 根据权利要求7所述的方法,所述广播周期是在预先配置的周期集合中选取的,所述第一时间窗口的长度大于所述周期集合中的最大周期。According to the method of claim 7, the broadcast period is selected from a preconfigured period set, and the length of the first time window is greater than the maximum period in the period set. 根据权利要求1-5中任一项所述的方法,其中,所述第一设备接收至少一个第一信号,包括:The method according to any one of claims 1 to 5, wherein the first device receives at least one first signal, comprising: 所述第一设备发送第二信号;其中,所述第二信号用于触发接收到所述第二信号的第二设备发送第一信号;The first device sends a second signal; wherein the second signal is used to trigger a second device that receives the second signal to send a first signal; 所述第一设备接收所述第二设备发送的第一信号。The first device receives a first signal sent by the second device. 根据权利要求1-9中任一项所述的方法,其中,所述方法还包括:The method according to any one of claims 1 to 9, wherein the method further comprises: 所述第一设备接收触发消息;其中,所述触发消息用于触发初始接入,所述触发消息中包含发送所述触发消息的设备的第一参数;The first device receives a trigger message; wherein the trigger message is used to trigger initial access, and the trigger message includes a first parameter of the device sending the trigger message; 所述第一设备在所述触发消息中的第一参数与所述目标设备的第一参数相同的情况下,发送第一接入消息。The first device sends a first access message when the first parameter in the trigger message is the same as the first parameter of the target device. 根据权利要求10所述的方法,其中,所述触发消息包括用于发起盘点的消息。The method according to claim 10, wherein the trigger message comprises a message for initiating an inventory. 根据权利要求10或11所述的方法,其中,所述第一接入消息中包含所述目标设备的第一参数,所述目标设备的第一参数用于指示所述目标设备发送响应消息。The method according to claim 10 or 11, wherein the first access message includes a first parameter of the target device, and the first parameter of the target device is used to instruct the target device to send a response message. 根据权利要求12所述的方法,其中,所述第一接入消息中还包含所述第一设备的第一标识,所述第一接入消息用于触发所述目标设备发送包含所述第一标识的响应消息;The method according to claim 12, wherein the first access message further includes a first identifier of the first device, and the first access message is used to trigger the target device to send a response message including the first identifier; 所述方法还包括:The method further comprises: 所述第一设备接收响应消息,在所述响应消息中的第一标识与所述第一设备的第一标识相同的情况下,确定初始接入成功。The first device receives the response message, and determines that the initial access is successful if the first identifier in the response message is the same as the first identifier of the first device. 根据权利要求13所述的方法,其中,所述响应消息中包括所述目标设备为所述第一设备分配的第二标识。The method according to claim 13, wherein the response message includes a second identifier assigned by the target device to the first device. 根据权利要求10或11所述的方法,其中,所述第一接入消息包括第一前导码;所述第一前导码的序号中的至少部分信息是基于所述目标设备的第一参数确定的,所述至少部分信息用于指示所述目标设备发送响应消息;The method according to claim 10 or 11, wherein the first access message includes a first preamble; at least part of the information in the sequence number of the first preamble is determined based on a first parameter of the target device, and the at least part of the information is used to instruct the target device to send a response message; 所述方法还包括:The method further comprises: 所述第一设备接收所述响应消息,在所述响应消息中包含的前导码序号与所述第一前导码的序号相同的情况下,发送第二接入消息。The first device receives the response message, and sends a second access message when the preamble code sequence number included in the response message is the same as the sequence number of the first preamble code. 根据权利要求10或11所述的方法,其中,所述第一接入消息包括第一前导码;The method according to claim 10 or 11, wherein the first access message includes a first preamble; 所述方法还包括:The method further comprises: 所述第一设备接收针对所述第一接入消息的响应消息;其中,所述响应消息中包含发送该接入响应 消息的第二设备的第一参数;The first device receives a response message to the first access message; wherein the response message includes sending the access response A first parameter of a second device of the message; 所述第一设备在所述响应消息中的第一参数与所述目标设备的第一参数相同,且所述响应消息中包含所述第一前导码的序号的情况下,发送第二接入消息。The first device sends a second access message when the first parameter in the response message is the same as the first parameter of the target device and the response message includes the sequence number of the first preamble code. 根据权利要求15或16所述的方法,其中,所述第二接入消息包含所述第一设备的第一标识;The method according to claim 15 or 16, wherein the second access message includes a first identifier of the first device; 所述方法还包括:The method further comprises: 所述第一设备在发送所述第二接入消息之后,接收接入确认消息,在所述接入确认消息中的第一标识与所述第一设备的第一标识相同的情况下,确定初始接入成功。After sending the second access message, the first device receives an access confirmation message, and determines that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device. 根据权利要求17所述的方法,其中,所述接入确认消息中包含所述目标设备为所述第一设备分配的第二标识。The method according to claim 17, wherein the access confirmation message includes a second identifier allocated by the target device to the first device. 根据权利要求14或18所述的方法,其中,所述第二标识至少基于所述目标设备的第一参数确定。The method according to claim 14 or 18, wherein the second identification is determined based on at least a first parameter of the target device. 根据权利要求17或18所述的方法,其中,在所述第一标识的比特数量小于第一值的情况下,所述第二接入消息和/或所述接入确认消息中包含所述目标设备的第一参数。The method according to claim 17 or 18, wherein, when the number of bits of the first identifier is less than a first value, the second access message and/or the access confirmation message includes the first parameter of the target device. 一种信号处理方法,包括:A signal processing method, comprising: 第二设备发送第一信号;其中,所述第一信号中包含所述第二设备的第一参数;所述第一信号用于第一设备确定初始接入的目标设备的第一参数,以确定是否响应所述第一设备接收到的触发初始接入的消息。The second device sends a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine a first parameter of a target device for initial access, so as to determine whether to respond to a message triggering initial access received by the first device. 根据权利要求21所述的方法,其中,所述第一参数在通信系统的全局范围或局部范围内唯一。The method according to claim 21, wherein the first parameter is unique in a global scope or a local scope of the communication system. 根据权利要求21或22所述的方法,其中,所述第一参数的比特数量与通信系统的全局范围或局部范围内的第二设备的数量相关。The method according to claim 21 or 22, wherein the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system. 根据权利要求23所述的方法,其中,在所述第二设备的数量增加的情况下,所述第一参数的比特数量增加或不变。The method according to claim 23, wherein, when the number of the second devices increases, the number of bits of the first parameter increases or remains unchanged. 根据权利要求21-24中任一项所述的方法,其中,所述第二设备向第一设备发送第一信号,包括:The method according to any one of claims 21 to 24, wherein the second device sends a first signal to the first device, comprising: 所述第二设备周期性广播信标信号。The second device periodically broadcasts a beacon signal. 根据权利要求25所述的方法,其中,所述信标信号的广播周期是在预先配置的周期集合中选取的。The method according to claim 25, wherein the broadcast period of the beacon signal is selected from a preconfigured period set. 根据权利要求21-24中任一项所述的方法,其中,所述第二设备向第一设备发送第一信号,包括:The method according to any one of claims 21 to 24, wherein the second device sends a first signal to the first device, comprising: 所述第二设备在接收到所述第一设备发送的第二信号的情况下,向所述第一设备发送所述第一信号。When the second device receives the second signal sent by the first device, the second device sends the first signal to the first device. 根据权利要求21-27中任一项所述的方法,其中,所述方法还包括:The method according to any one of claims 21 to 27, wherein the method further comprises: 所述第二设备发送触发消息;其中,所述触发消息中包含所述第二设备的第一参数;所述触发消息用于触发所述第一设备在所述触发消息中的第一参数与所述目标设备的第一参数相同的情况下,发送第一接入消息。The second device sends a trigger message; wherein the trigger message includes a first parameter of the second device; the trigger message is used to trigger the first device to send a first access message when the first parameter in the trigger message is the same as the first parameter of the target device. 根据权利要求28所述的方法,其中,所述触发消息包括用于发起盘点的消息。The method of claim 28, wherein the trigger message comprises a message for initiating an inventory. 根据权利要求28或29所述的方法,其中,所述方法还包括:The method according to claim 28 or 29, wherein the method further comprises: 所述第二设备接收所述第一接入消息;其中,所述第一接入消息包括所述目标设备的第一参数;The second device receives the first access message; wherein the first access message includes a first parameter of the target device; 所述第二设备在所述第一接入消息中的第一参数与所述第二设备的第一参数相同的情况下,向所述第一设备发送响应消息。The second device sends a response message to the first device when the first parameter in the first access message is the same as the first parameter of the second device. 根据权利要求30所述的方法,其中,所述响应消息包括所述第一设备的第一标识;所述第一标识是基于所述第一接入消息得到的,所述响应消息用于所述第一设备基于所述第一标识确定初始接入成功。The method according to claim 30, wherein the response message includes a first identifier of the first device; the first identifier is obtained based on the first access message, and the response message is used by the first device to determine that the initial access is successful based on the first identifier. 根据权利要求31所述的方法,其中,所述响应消息中包括所述第二设备为所述第一设备分配的第二标识。The method according to claim 31, wherein the response message includes a second identifier assigned by the second device to the first device. 根据权利要求28或29所述的方法,其中,所述方法还包括:The method according to claim 28 or 29, wherein the method further comprises: 所述第二设备接收所述第一接入消息;其中,所述第一接入消息包括第一前导码;The second device receives the first access message; wherein the first access message includes a first preamble code; 所述第二设备在所述第一前导码的序号中的至少部分信息与所述第二设备的第一参数匹配的情况下,向所述第一设备发送响应消息;其中,所述响应消息包括所述第一前导码的序号,以使所述第一设备发送第二接入消息。The second device sends a response message to the first device when at least part of the information in the sequence number of the first preamble code matches the first parameter of the second device; wherein the response message includes the sequence number of the first preamble code, so that the first device sends a second access message. 根据权利要求28或29所述的方法,其中,所述方法还包括:The method according to claim 28 or 29, wherein the method further comprises: 所述第二设备接收第一接入消息;其中,所述第一接入消息包括第一前导码; The second device receives a first access message; wherein the first access message includes a first preamble; 所述第二设备发送响应消息;其中,所述响应消息中包含所述第二设备的第一参数以及所述第一前导码的序号,以使所述第一设备发送第二接入消息。The second device sends a response message; wherein the response message includes the first parameter of the second device and the sequence number of the first preamble code, so that the first device sends a second access message. 根据权利要求33或34所述的方法,其中,所述方法还包括:The method according to claim 33 or 34, wherein the method further comprises: 所述第二设备接收所述第二接入消息;其中,所述第二接入消息包含所述第一设备的第一标识;The second device receives the second access message; wherein the second access message includes the first identifier of the first device; 所述第二设备向所述第一设备发送接入确认消息;其中,所述接入确认消息中包含所述第一标识,以使所述第一设备确定初始接入成功。The second device sends an access confirmation message to the first device; wherein the access confirmation message includes the first identifier, so that the first device determines that the initial access is successful. 根据权利要求35所述的方法,其中,所述接入确认消息中包含所述第二设备为所述第一设备分配的第二标识。The method according to claim 35, wherein the access confirmation message includes a second identifier allocated by the second device to the first device. 根据权利要求32或36所述的方法,其中,所述第二标识至少基于所述第二设备的第一参数确定。A method according to claim 32 or 36, wherein the second identification is determined based on at least a first parameter of the second device. 根据权利要求35或36所述的方法,其中,在所述第一标识的比特数量小于第一值的情况下,所述第二接入消息和/或所述接入确认消息中包含所述第二设备的第一参数。The method according to claim 35 or 36, wherein, when the number of bits of the first identifier is less than a first value, the second access message and/or the access confirmation message includes a first parameter of the second device. 一种第一设备,包括:A first device includes: 第一通信模块,用于接收第一信号;其中,所述第一信号中包含发送该第一信号的第二设备的第一参数;A first communication module, configured to receive a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal; 第一处理模块,用于基于所述第一信号中的第一参数,确定初始接入的目标设备的第一参数;所述目标设备的第一参数用于确定是否响应其接收到的触发初始接入的消息。The first processing module is used to determine a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used to determine whether to respond to a received message triggering initial access. 根据权利要求39所述的第一设备,其中,所述第一处理模块还用于:The first device according to claim 39, wherein the first processing module is further configured to: 在接收到的多个第一信号中,确定信号强度最大的第一信号;Determine, among the received multiple first signals, a first signal having the greatest signal strength; 将所述信号强度最大的第一信号中的第一参数,确定为所述目标设备的第一参数。The first parameter in the first signal with the largest signal strength is determined as the first parameter of the target device. 根据权利要求39或40所述的第一设备,其中,所述第一参数在通信系统的全局范围或局部范围内唯一。The first device according to claim 39 or 40, wherein the first parameter is unique in a global scope or a local scope of the communication system. 根据权利要求39-41中任一项所述的第一设备,其中,所述第一参数的比特数量与通信系统的全局范围或局部范围内的第二设备的数量相关。The first device according to any one of claims 39-41, wherein the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system. 根据权利要求42所述的第一设备,其中,在所述第二设备的数量增加的情况下,所述第一参数的比特数量增加或不变。The first device according to claim 42, wherein, when the number of the second devices increases, the number of bits of the first parameter increases or remains unchanged. 根据权利要求39-43中任一项所述的第一设备,其中,所述第一信号包括第二设备周期性广播的信标信号。The first device according to any one of claims 39-43, wherein the first signal comprises a beacon signal periodically broadcast by the second device. 根据权利要求44所述的第一设备,其中,The first device according to claim 44, wherein 所述第一通信模块还用于在第一时间窗口内搜索信标信号;The first communication module is also used to search for a beacon signal within a first time window; 所述第一处理模块还用于若搜索到多个包含相同的第一参数的信标信号,则基于所述多个包含相同的第一参数的信标信号,确定所述相同的第一参数所对应的第二设备的广播周期;The first processing module is further configured to determine, if multiple beacon signals containing the same first parameter are searched, a broadcast period of the second device corresponding to the same first parameter based on the multiple beacon signals containing the same first parameter; 所述第一通信模块还用于基于所述广播周期接收来自所述第二设备的信标信号。The first communication module is further configured to receive a beacon signal from the second device based on the broadcast period. 根据权利要求45所述的第一设备,所述广播周期是在预先配置的周期集合中选取的,所述第一时间窗口的长度大于所述周期集合中的最大周期。According to the first device according to claim 45, the broadcast period is selected from a preconfigured period set, and the length of the first time window is greater than the maximum period in the period set. 根据权利要求39-43中任一项所述的第一设备,其中,所述第一通信模块还用于:The first device according to any one of claims 39 to 43, wherein the first communication module is further used for: 发送第二信号;其中,所述第二信号用于触发接收到所述第二信号的第二设备发送第一信号;Sending a second signal; wherein the second signal is used to trigger a second device that receives the second signal to send a first signal; 接收所述第二设备发送的第一信号。A first signal sent by the second device is received. 根据权利要求39-47中任一项所述的第一设备,其中,所述第一通信模块还用于:The first device according to any one of claims 39 to 47, wherein the first communication module is further used for: 接收触发消息;其中,所述触发消息用于触发初始接入,所述触发消息中包含发送所述触发消息的设备的第一参数;Receiving a trigger message; wherein the trigger message is used to trigger initial access, and the trigger message includes a first parameter of a device sending the trigger message; 在所述触发消息中的第一参数与所述目标设备的第一参数相同的情况下,发送第一接入消息。In a case where the first parameter in the trigger message is the same as the first parameter of the target device, a first access message is sent. 根据权利要求48所述的第一设备,其中,所述触发消息包括用于发起盘点的消息。The first device of claim 48, wherein the trigger message comprises a message for initiating an inventory. 根据权利要求48或49所述的第一设备,其中,所述第一接入消息中包含所述目标设备的第一参数,所述目标设备的第一参数用于指示所述目标设备发送响应消息。The first device according to claim 48 or 49, wherein the first access message includes a first parameter of the target device, and the first parameter of the target device is used to instruct the target device to send a response message. 根据权利要求50所述的第一设备,其中,所述第一接入消息中还包含所述第一设备的第一标识,所述第一接入消息用于触发所述目标设备发送包含所述第一标识的响应消息;The first device according to claim 50, wherein the first access message further includes a first identifier of the first device, and the first access message is used to trigger the target device to send a response message including the first identifier; 所述第一通信模块,还用于接收响应消息;The first communication module is further used to receive a response message; 所述第一处理模块,还用于在所述响应消息中的第一标识与所述第一设备的第一标识相同的情况下,确定初始接入成功。The first processing module is further configured to determine that the initial access is successful when the first identifier in the response message is the same as the first identifier of the first device. 根据权利要求51所述的第一设备,其中,所述响应消息中包括所述目标设备为所述第一设备分配的第二标识。 The first device according to claim 51, wherein the response message includes a second identifier assigned by the target device to the first device. 根据权利要求48或49所述的第一设备,其中,所述第一接入消息包括第一前导码;所述第一前导码的序号中的至少部分信息是基于所述目标设备的第一参数确定的,所述至少部分信息用于指示所述目标设备发送响应消息;The first device according to claim 48 or 49, wherein the first access message includes a first preamble; at least part of the information in the sequence number of the first preamble is determined based on a first parameter of the target device, and the at least part of the information is used to instruct the target device to send a response message; 所述第一通信模块还用于:The first communication module is also used for: 接收所述响应消息,在所述响应消息中包含的前导码序号与所述第一前导码的序号相同的情况下,发送第二接入消息。The response message is received, and a second access message is sent when the preamble code sequence number included in the response message is the same as the sequence number of the first preamble code. 根据权利要求48或49所述的第一设备,其中,所述第一接入消息包括第一前导码;The first device according to claim 48 or 49, wherein the first access message includes a first preamble; 所述第一通信模块还用于:The first communication module is also used for: 接收针对所述第一接入消息的响应消息;其中,所述响应消息中包含发送该接入响应消息的第二设备的第一参数;Receiving a response message to the first access message; wherein the response message includes a first parameter of the second device sending the access response message; 在所述响应消息中的第一参数与所述目标设备的第一参数相同,且所述响应消息中包含所述第一前导码的序号的情况下,发送第二接入消息。In a case where the first parameter in the response message is the same as the first parameter of the target device and the response message includes the sequence number of the first preamble code, a second access message is sent. 根据权利要求53或54所述的第一设备,其中,所述第二接入消息包含所述第一设备的第一标识;The first device according to claim 53 or 54, wherein the second access message includes a first identifier of the first device; 所述第一通信模块还用于在发送所述第二接入消息之后,接收接入确认消息;The first communication module is further configured to receive an access confirmation message after sending the second access message; 所述第一处理模块还用于在所述接入确认消息中的第一标识与所述第一设备的第一标识相同的情况下,确定初始接入成功。The first processing module is further configured to determine that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device. 根据权利要求55所述的第一设备,其中,所述接入确认消息中包含所述目标设备为所述第一设备分配的第二标识。The first device according to claim 55, wherein the access confirmation message includes a second identifier assigned by the target device to the first device. 根据权利要求52或56所述的第一设备,其中,所述第二标识至少基于所述目标设备的第一参数确定。The first device according to claim 52 or 56, wherein the second identification is determined based on at least a first parameter of the target device. 根据权利要求55或56所述的第一设备,其中,在所述第一标识的比特数量小于第一值的情况下,所述第二接入消息和/或所述接入确认消息中包含所述目标设备的第一参数。The first device according to claim 55 or 56, wherein, when the number of bits of the first identifier is less than a first value, the second access message and/or the access confirmation message includes the first parameter of the target device. 一种第二设备,包括:A second device, comprising: 第二通信模块,用于发送第一信号;其中,所述第一信号中包含所述第二设备的第一参数;所述第一信号用于第一设备确定初始接入的目标设备的第一参数,以确定是否响应所述第一设备接收到的触发初始接入的消息。The second communication module is used to send a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine the first parameter of the target device for initial access, so as to determine whether to respond to the message triggering initial access received by the first device. 根据权利要求59所述的第二设备,其中,所述第一参数在通信系统的全局范围或局部范围内唯一。The second device according to claim 59, wherein the first parameter is unique in a global scope or a local scope of the communication system. 根据权利要求59或60所述的第二设备,其中,所述第一参数的比特数量与通信系统的全局范围或局部范围内的第二设备的数量相关。The second device according to claim 59 or 60, wherein the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system. 根据权利要求61所述的第二设备,其中,在所述第二设备的数量增加的情况下,所述第一参数的比特数量增加或不变。The second device according to claim 61, wherein, when the number of the second devices increases, the number of bits of the first parameter increases or remains unchanged. 根据权利要求59-62中任一项所述的第二设备,其中,所述第二通信模块还用于:The second device according to any one of claims 59 to 62, wherein the second communication module is further used for: 周期性广播信标信号。Periodically broadcasts a beacon signal. 根据权利要求63所述的第二设备,其中,所述信标信号的广播周期是在预先配置的周期集合中选取的。The second device according to claim 63, wherein the broadcast period of the beacon signal is selected from a preconfigured period set. 根据权利要求59-62中任一项所述的第二设备,其中,所述第二通信模块还用于:The second device according to any one of claims 59 to 62, wherein the second communication module is further used for: 在接收到所述第一设备发送的第二信号的情况下,向所述第一设备发送所述第一信号。In case of receiving the second signal sent by the first device, sending the first signal to the first device. 根据权利要求59-65中任一项所述的第二设备,其中,所述第二通信模块还用于:The second device according to any one of claims 59 to 65, wherein the second communication module is further used for: 发送触发消息;其中,所述触发消息中包含所述第二设备的第一参数;所述触发消息用于触发所述第一设备在所述触发消息中的第一参数与所述目标设备的第一参数相同的情况下,发送第一接入消息。Sending a trigger message; wherein the trigger message includes a first parameter of the second device; the trigger message is used to trigger the first device to send a first access message when the first parameter in the trigger message is the same as the first parameter of the target device. 根据权利要求66所述的第二设备,其中,所述触发消息包括用于发起盘点的消息。The second device of claim 66, wherein the trigger message comprises a message for initiating an inventory. 根据权利要求66或67所述的第二设备,其中,所述第二通信模块还用于:The second device according to claim 66 or 67, wherein the second communication module is further used for: 接收所述第一接入消息;其中,所述第一接入消息包括所述目标设备的第一参数;Receiving the first access message; wherein the first access message includes a first parameter of the target device; 在所述第一接入消息中的第一参数与所述第二设备的第一参数相同的情况下,向所述第一设备发送响应消息。In a case where the first parameter in the first access message is the same as the first parameter of the second device, a response message is sent to the first device. 根据权利要求68所述的第二设备,其中,所述响应消息包括所述第一设备的第一标识;所述第一标识是基于所述第一接入消息得到的,所述响应消息用于所述第一设备基于所述第一标识确定初始接入成功。The second device according to claim 68, wherein the response message includes a first identifier of the first device; the first identifier is obtained based on the first access message, and the response message is used by the first device to determine that the initial access is successful based on the first identifier. 根据权利要求69所述的第二设备,其中,所述响应消息中包括所述第二设备为所述第一设备分配的第二标识。 The second device according to claim 69, wherein the response message includes a second identifier assigned by the second device to the first device. 根据权利要求66或67所述的第二设备,其中,所述第二通信模块还用于:The second device according to claim 66 or 67, wherein the second communication module is further used for: 接收所述第一接入消息;其中,所述第一接入消息包括第一前导码;receiving the first access message; wherein the first access message includes a first preamble; 在所述第一前导码的序号中的至少部分信息与所述第二设备的第一参数匹配的情况下,向所述第一设备发送响应消息;其中,所述响应消息包括所述第一前导码的序号,以使所述第一设备发送第二接入消息。When at least part of the information in the sequence number of the first preamble code matches the first parameter of the second device, a response message is sent to the first device; wherein the response message includes the sequence number of the first preamble code, so that the first device sends a second access message. 根据权利要求66或67所述的第二设备,其中,所述第二通信模块还用于:The second device according to claim 66 or 67, wherein the second communication module is further used for: 接收第一接入消息;其中,所述第一接入消息包括第一前导码;Receiving a first access message; wherein the first access message includes a first preamble; 发送响应消息;其中,所述响应消息中包含所述第二设备的第一参数以及所述第一前导码的序号,以使所述第一设备发送第二接入消息。Send a response message; wherein the response message includes the first parameter of the second device and the sequence number of the first preamble code, so that the first device sends a second access message. 根据权利要求71或72所述的第二设备,其中,所述第二通信模块还用于:The second device according to claim 71 or 72, wherein the second communication module is further used for: 接收所述第二接入消息;其中,所述第二接入消息包含所述第一设备的第一标识;receiving the second access message; wherein the second access message includes a first identifier of the first device; 向所述第一设备发送接入确认消息;其中,所述接入确认消息中包含所述第一标识,以使所述第一设备确定初始接入成功。An access confirmation message is sent to the first device; wherein the access confirmation message includes the first identifier, so that the first device determines that the initial access is successful. 根据权利要求73所述的第二设备,其中,所述接入确认消息中包含所述第二设备为所述第一设备分配的第二标识。The second device according to claim 73, wherein the access confirmation message includes a second identifier allocated by the second device to the first device. 根据权利要求70或74所述的第二设备,其中,所述第二标识至少基于所述第二设备的第一参数确定。The second device according to claim 70 or 74, wherein the second identification is determined based on at least a first parameter of the second device. 根据权利要求73或74所述的第二设备,其中,在所述第一标识的比特数量小于第一值的情况下,所述第二接入消息和/或所述接入确认消息中包含所述第二设备的第一参数。The second device according to claim 73 or 74, wherein, when the number of bits of the first identifier is less than a first value, the second access message and/or the access confirmation message includes a first parameter of the second device. 一种第一设备,包括:收发器、处理器和存储器,所述存储器用于存储计算机程序,所述收发器用于与其他设备进行通信,所述处理器用于调用并运行所述存储器中存储的计算机程序,以使所述第一设备执行如权利要求1至20中任一项所述的方法。A first device comprises: a transceiver, a processor and a memory, wherein the memory is used to store a computer program, the transceiver is used to communicate with other devices, and the processor is used to call and run the computer program stored in the memory so that the first device executes the method as described in any one of claims 1 to 20. 一种第二设备,包括:收发器、处理器和存储器,所述存储器用于存储计算机程序,所述收发器用于与其他设备进行通信,所述处理器用于调用并运行所述存储器中存储的计算机程序,以使所述第二设备执行如权利要求21至38中任一项所述的方法。A second device comprises: a transceiver, a processor and a memory, wherein the memory is used to store a computer program, the transceiver is used to communicate with other devices, and the processor is used to call and run the computer program stored in the memory so that the second device executes the method as described in any one of claims 21 to 38. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至20中任一项所述的方法。A chip comprises: a processor, configured to call and run a computer program from a memory, so that a device equipped with the chip executes a method as claimed in any one of claims 1 to 20. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求21至38中任一项所述的方法。A chip comprises: a processor, configured to call and run a computer program from a memory, so that a device equipped with the chip executes a method as claimed in any one of claims 21 to 38. 一种计算机可读存储介质,用于存储计算机程序,当所述计算机程序被设备运行时使得所述设备执行如权利要求1至20中任一项所述的方法。A computer-readable storage medium for storing a computer program, wherein when the computer program is executed by a device, the device executes the method according to any one of claims 1 to 20. 一种计算机可读存储介质,用于存储计算机程序,当所述计算机程序被设备运行时使得所述设备执行如权利要求21至38中任一项所述的方法。A computer-readable storage medium for storing a computer program, which, when executed by a device, causes the device to perform a method as claimed in any one of claims 21 to 38. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至20中任一项所述的方法。A computer program product comprises computer program instructions, wherein the computer program instructions enable a computer to execute the method according to any one of claims 1 to 20. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求21至38中任一项所述的方法。A computer program product comprising computer program instructions, the computer program instructions causing a computer to execute the method as claimed in any one of claims 21 to 38. 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至20中任一项所述的方法。A computer program, the computer program causing a computer to execute the method according to any one of claims 1 to 20. 一种计算机程序,所述计算机程序使得计算机执行如权利要求21至38中任一项所述的方法。A computer program, the computer program causing a computer to execute the method according to any one of claims 21 to 38. 一种通信系统,包括:A communication system, comprising: 第一设备,用于执行如权利要求1至20中任一项所述的方法;A first device, configured to perform the method according to any one of claims 1 to 20; 第二设备,用于执行如权利要求21至38中任一项所述的方法。 A second device, configured to execute the method according to any one of claims 21 to 38.
PCT/CN2023/136563 2023-12-05 2023-12-05 Method for processing signal, first device, and second device Pending WO2025118159A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2023/136563 WO2025118159A1 (en) 2023-12-05 2023-12-05 Method for processing signal, first device, and second device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2023/136563 WO2025118159A1 (en) 2023-12-05 2023-12-05 Method for processing signal, first device, and second device

Publications (1)

Publication Number Publication Date
WO2025118159A1 true WO2025118159A1 (en) 2025-06-12

Family

ID=95981345

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/136563 Pending WO2025118159A1 (en) 2023-12-05 2023-12-05 Method for processing signal, first device, and second device

Country Status (1)

Country Link
WO (1) WO2025118159A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016058166A1 (en) * 2014-10-16 2016-04-21 华为技术有限公司 Method for triggering registration machine protocol interaction, access point and station point
CN107484215A (en) * 2017-09-04 2017-12-15 深圳市盛路物联通讯技术有限公司 Recommend the method and mobile terminal of access base station based on antenna received signal strength
CN108174407A (en) * 2017-12-27 2018-06-15 宇龙计算机通信科技(深圳)有限公司 A communication control method and terminal
WO2023060577A1 (en) * 2021-10-15 2023-04-20 Oppo广东移动通信有限公司 Method for establishing connection, terminal device, and network device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016058166A1 (en) * 2014-10-16 2016-04-21 华为技术有限公司 Method for triggering registration machine protocol interaction, access point and station point
CN107484215A (en) * 2017-09-04 2017-12-15 深圳市盛路物联通讯技术有限公司 Recommend the method and mobile terminal of access base station based on antenna received signal strength
CN108174407A (en) * 2017-12-27 2018-06-15 宇龙计算机通信科技(深圳)有限公司 A communication control method and terminal
WO2023060577A1 (en) * 2021-10-15 2023-04-20 Oppo广东移动通信有限公司 Method for establishing connection, terminal device, and network device

Similar Documents

Publication Publication Date Title
CN108616968B (en) Method and apparatus for transmitting frame
US9510312B2 (en) Method and apparatus for performing network entry/reentry in wireless communication system
CN118661457A (en) Backscatter communication method and device
US20240147424A1 (en) Communication method and apparatus
CN117812728A (en) Uplink awakening method and device
WO2023173439A1 (en) Communication method, terminal device and network device
WO2024065267A1 (en) Wireless communication method and device
EP4213547A1 (en) Paging information sending and monitoring methods and communication apparatus and system
WO2024082205A1 (en) Techniques for triggering random access procedures at passive devices
US20240414767A1 (en) Channel listening method and communication device
WO2025118159A1 (en) Method for processing signal, first device, and second device
WO2025107313A1 (en) Wireless communication method and communication device
WO2025118160A1 (en) Access method, first device and second device
WO2025102253A1 (en) Channel transmission method, apparatus, device and storage medium
WO2025118135A1 (en) Wireless communication method and communication device
US20240276466A1 (en) Communication method and system, and related apparatus
WO2025118137A1 (en) Wireless communication method and communication device
WO2024243900A1 (en) Information transmission method, first device, and second device
US20250365713A1 (en) Channel preemption methods and apparatuses, and communication device
WO2025199766A1 (en) Synchronization method and device
US20250374373A1 (en) Measurement method and related apparatus
US20250301460A1 (en) Communication method and system, and apparatus
US20250261112A1 (en) Information transmission method and apparatus
US20250374332A1 (en) Wireless communication method, amp device, and network device
WO2024239726A1 (en) Random access for devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23960473

Country of ref document: EP

Kind code of ref document: A1