[go: up one dir, main page]

WO2025118159A1 - Procédé de traitement de signal, premier dispositif et second dispositif - Google Patents

Procédé de traitement de signal, premier dispositif et second dispositif Download PDF

Info

Publication number
WO2025118159A1
WO2025118159A1 PCT/CN2023/136563 CN2023136563W WO2025118159A1 WO 2025118159 A1 WO2025118159 A1 WO 2025118159A1 CN 2023136563 W CN2023136563 W CN 2023136563W WO 2025118159 A1 WO2025118159 A1 WO 2025118159A1
Authority
WO
WIPO (PCT)
Prior art keywords
parameter
message
access
signal
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2023/136563
Other languages
English (en)
Chinese (zh)
Inventor
杜忠达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to PCT/CN2023/136563 priority Critical patent/WO2025118159A1/fr
Publication of WO2025118159A1 publication Critical patent/WO2025118159A1/fr
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • the present application relates to the field of communications, and more specifically, to a signal processing method, a first device, a second device, a chip, a computer-readable storage medium, a computer program product, a computer program, and a communication system.
  • Embodiments of the present application provide a signal processing method, a first device, a second device, a chip, a computer-readable storage medium, a computer program product, a computer program, and a communication system, which can be used to resolve conflicts between different devices during an initial access process.
  • the present application provides a signal processing method, including:
  • the first device receives a first signal; wherein the first signal includes a first parameter of the second device that sends the first signal;
  • the first device determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device to determine whether to respond to a received message triggering initial access.
  • the present application provides a signal processing method, including:
  • the second device sends a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine a first parameter of a target device for initial access, so as to determine whether to respond to a message triggering initial access received by the first device.
  • the present application embodiment provides a first device, including:
  • a first communication module configured to receive a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal;
  • the first processing module is used to determine a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used to determine whether to respond to a received message triggering initial access.
  • the embodiment of the present application provides a second device, including:
  • the second communication module is used to send a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine the first parameter of the target device for initial access to determine whether to respond to the message triggering initial access received by the first device.
  • the embodiment of the present application provides a first device, including: a transceiver, a processor and a memory.
  • the memory is used to store a computer program
  • the transceiver is used to communicate with other devices
  • the processor is used to call and run the computer program stored in the memory, so that the first device performs the above-mentioned signal processing method.
  • the embodiment of the present application provides a second device, including: a transceiver, a processor and a memory.
  • the memory is used to store a computer program
  • the transceiver is used to communicate with other devices
  • the processor is used to call and run the computer program stored in the memory, so that the second device performs the above-mentioned signal processing method.
  • An embodiment of the present application provides a chip for implementing the above-mentioned signal processing method.
  • the chip includes: a processor, which is used to call and run a computer program from a memory, so that a device equipped with the chip executes the above-mentioned signal processing method.
  • An embodiment of the present application provides a computer-readable storage medium for storing a computer program.
  • the computer program When the computer program is executed by a device, the device executes the above-mentioned signal processing method.
  • An embodiment of the present application provides a computer program, which, when executed on a computer, enables the computer to execute the above-mentioned signal processing method.
  • An embodiment of the present application provides a communication system, including a first device and a second device used for the above-mentioned access method.
  • the second device sends a first signal, which includes a first parameter for identifying the second device.
  • the first device receives the first signal and determines the first parameter of the target device for initial access based on the first parameter included in the first signal.
  • the first device can determine whether to respond based on the first parameter, that is, by determining the first parameter of the target device, the message triggering initial access can be distinguished, which can solve the interference problem between different second devices during the initial access process.
  • FIG. 1 is a schematic diagram of a communication system in an embodiment of the present application.
  • FIG. 2A is a schematic diagram of the four-step CBRA process.
  • FIG. 2B is a schematic diagram of the two-step CBRA process.
  • FIG3 is a schematic diagram of the basic structure of the A-IoT communication system.
  • FIG. 4A is a schematic diagram of a first topology network structure in an A-IoT communication system.
  • FIG. 4B is a schematic diagram of a second topology network structure in an A-IoT communication system.
  • FIG. 4C is a schematic diagram of a third topology network structure in an A-IoT communication system.
  • FIG4D is a schematic diagram of a fourth topology network structure in an A-IoT communication system.
  • FIG5A is a block diagram of a typical wideband receiver.
  • FIG5B is a block diagram of a typical intermediate frequency receiver.
  • FIG. 6 is a schematic diagram of an application scenario of an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of an access method according to an embodiment of the present application.
  • FIG8 is a schematic flowchart of an access method according to another embodiment of the present application.
  • FIG. 9 is a schematic diagram of a distribution method of a first parameter in an application example.
  • FIG. 10 is a schematic diagram of application example 1 of the access method according to an embodiment of the present application.
  • FIG. 11 is a schematic diagram of application example 2 of the access method according to an embodiment of the present application.
  • FIG. 12 is a schematic diagram of application example 3 of the access method according to an embodiment of the present application.
  • FIG. 13 is a schematic diagram of application example 4 of the access method according to an embodiment of the present application.
  • FIG. 14 is a schematic diagram of application example 5 of the access method according to an embodiment of the present application.
  • FIG. 15 is a schematic diagram of application example 6 of the access method according to an embodiment of the present application.
  • FIG. 16 is a schematic block diagram of a first device according to an embodiment of the present application.
  • FIG. 17 is a schematic block diagram of a second device according to an embodiment of the present application.
  • FIG18 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • FIG. 19 is a schematic block diagram of a chip according to an embodiment of the present application.
  • FIG. 20 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • LTE Long Term Evolution
  • LTE-A Advanced long term evolution
  • NR New Radio
  • NR system evolution system LTE on unlicensed spectrum
  • LTE-U LTE on unlicensed spectrum
  • NR-based access to unlicensed spectrum NR-U
  • NTN Non-Terrestrial Networks
  • UMTS Universal Mobile Telecommunication System
  • WLAN Wireless Local Area Networks
  • WiFi fifth-generation communication
  • 5G fifth-generation communication
  • D2D device to device
  • M2M machine to machine
  • MTC machine type communication
  • V2V vehicle to vehicle
  • V2X vehicle to everything
  • the communication system in the embodiment of the present application can be applied to a carrier aggregation (CA) scenario, a dual connectivity (DC) scenario, or a standalone (SA) networking scenario.
  • CA carrier aggregation
  • DC dual connectivity
  • SA standalone
  • the communication system in the embodiment of the present application can be applied to an unlicensed spectrum, wherein the unlicensed spectrum can also be considered as a shared spectrum; or, the communication system in the embodiment of the present application can also be applied to an authorized spectrum, wherein the authorized spectrum can also be considered as an unshared spectrum.
  • the terminal device may also be referred to as user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
  • UE user equipment
  • the terminal device can be a station (STAION, ST) in a WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal device in the next generation communication system such as the NR network, or a terminal device in the future evolved Public Land Mobile Network (PLMN) network, etc.
  • STAION, ST in a WLAN
  • a cellular phone a cordless phone
  • Session Initiation Protocol (SIP) phone Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • the terminal device can be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted; It can be deployed on the water (such as ships, etc.); it can also be deployed in the air (such as airplanes, balloons and satellites, etc.).
  • the terminal device may be a mobile phone, a tablet computer, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical, a wireless terminal device in smart grid, a wireless terminal device in transportation safety, a wireless terminal device in a smart city, or a wireless terminal device in a smart home, etc.
  • VR virtual reality
  • AR augmented reality
  • the terminal device may also be a wearable device.
  • Wearable devices may also be referred to as wearable smart devices, which are a general term for wearable devices that are intelligently designed and developed using wearable technology for daily wear, such as glasses, gloves, watches, clothing, and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothes or accessories. Wearable devices are not only hardware devices, but also powerful functions achieved through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, and fully or partially independent of smartphones, such as smart watches or smart glasses, as well as devices that only focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various types of smart bracelets and smart jewelry for vital sign monitoring.
  • the network device may be a device for communicating with a mobile device
  • the network device may be an access point (AP) in a WLAN, an evolved base station (eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and a network device (gNB) in an NR network, or a network device in a future evolved PLMN network, or a network device in an NTN network, etc.
  • the network device may have a mobile feature, for example, the network device may be a mobile device.
  • the network device may be a satellite or a balloon station.
  • the satellite may be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geostationary earth orbit (GEO) satellite, a high elliptical orbit (HEO) satellite, etc.
  • the network device may also be a base station set up in a location such as land or water.
  • a network device can provide services for a cell, and a terminal device communicates with the network device through transmission resources (e.g., frequency domain resources, or spectrum resources) used by the cell.
  • the cell can be a cell corresponding to a network device (e.g., a base station).
  • the cell can belong to a macro base station or a base station corresponding to a small cell.
  • the small cells here may include: metro cells, micro cells, pico cells, femto cells, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • Fig. 1 exemplarily shows a communication system 100.
  • the communication system includes a network device 110 and two terminal devices 120.
  • the communication system 100 may include multiple network devices 110, and each network device 110 may include other number of terminal devices 120 within its coverage area, which is not limited in the embodiment of the present application.
  • the device with communication function in the network/system in the embodiment of the present application can be called a communication device.
  • the communication device may include a network device and a terminal device with communication function, and the network device and the terminal device may be specific devices in the embodiment of the present application, which will not be repeated here; the communication device may also include other devices in the communication system, such as other network entities such as a network controller and a mobile management entity, which is not limited in the embodiment of the present application.
  • the "indication" mentioned in the embodiments of the present application can be a direct indication, an indirect indication, or an indication of an association relationship.
  • a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association relationship between A and B.
  • corresponding may indicate a direct or indirect correspondence between two items, or an association relationship between the two items, or a relationship between indication and being indicated, configuration and being configured, and the like.
  • the 3GPP (3rd Generation Partnership Project) communication system there are generally two ways of initial access at the MAC (Medium Access Control) layer, namely two-step random access (2-step RACH) and four-step random access (4-step RACH).
  • RACH Random Access Channel
  • the resolution of random access conflicts is performed within a cell. This is because in 3GPP's cellular communication system (including 4G and 5G), before initiating a random access process, the terminal must first obtain frequency and time synchronization with the current serving cell, and then initiate a random access process on the random access radio resources broadcast by the serving cell.
  • different serving cells either have different frequencies (for example, there are low-frequency cells responsible for coverage) or different frequencies (for example, there are low-frequency cells responsible for coverage).
  • the system time is not synchronized, or both are different.
  • the PRACH Physical Random Access Channel
  • ZC Zadoff-Chu
  • FIG. 2A is a flowchart of the four-step CBRA (Contention Based Random Access, contention-based random access). As shown in Figure 2A, the four-step CBRA includes 4 steps:
  • Step 1 The terminal will send a random access preamble to the base station.
  • This preamble is called message 1 in the MAC layer protocol.
  • After sending the preamble it waits for message 2 from the base station in a subsequent response window.
  • the start and end times of the response window are set according to the configuration parameters. From the perspective of the base station, the base station has the ability to distinguish between preamblers received in different time-frequency domains, or different preamblers in the same time-frequency domain. However, the base station cannot distinguish between the same preamble sent by multiple terminals in the same time-frequency domain. In this case, an access conflict will occur.
  • Step 2 The base station feeds back message 2 to the terminal.
  • Message 2 can be a group message, that is, it can include RAR (Random Access Response) messages to multiple terminals.
  • the addressing information of Message 2 is contained in a group identifier called RA-RNTI (Random Access-Radio Network Temporary Indentifier), which is used to identify the information of the received preamble in the time domain, frequency domain and carrier type. That is to say, the preambles received from the same carrier at the same time and frequency point can be merged into the same message 2.
  • RA-RNTI Random Access-Radio Network Temporary Indentifier
  • the RAR IE (Information Elements) sent to each terminal will include the temporary identifier T_C_RNTI configured for the terminal, the time advance (for uplink synchronization), the radio resource authorization UL-grant (uplink authorization) for sending message 3, and the index (or sequence number) of the received preamble.
  • Message 2 can also include a backoff parameter to mitigate the conflict of uplink preambles. If the terminal decides to send the preamble again, it will generate a random time based on the backoff parameter so that the next preamble sending time is at least later than the generated random time.
  • Step 3 After comparing the RA-RNTI and the preamble index in the RAR, the terminal can determine whether the base station has received the preamble it sent. After confirming that the correct RAR has been received, the terminal sends message 3 (message3) based on UL-grant, which at least includes the terminal's identifier (UE ID). Message3 is addressed using T_C_RNTI on the physical layer. The terminal then starts a timer. While the timer is running, the downlink control channel PDCCH (Physical Downlink Control Channel) is detected. If two or more terminals collide in step 1, conflicts will continue to occur in step 3 because they will send message3 based on the same information, but the terminal identifiers contained in the MAC CE (MAC Control Element) of message3 are different.
  • PDCCH Physical Downlink Control Channel
  • Step 4 If the base station decodes message3 correctly, it will send message 4 (message4) to the terminal.
  • This message4 is addressed by the T_C_RNTI of the received message3, and the MAC CE includes the terminal's identifier contained in message3 and a newly allocated C-RNTI to the terminal. If multiple terminals send message3 on the same UL-grant, the base station may be able to correctly decode one of them, or it may not be able to decode (for example, when the interference level between them is similar).
  • the terminal receives message4 if it finds that the T_C_RNTI convolved on the PDCCH matches the message3 it sent, it will further check whether the MAC CE in the message4 sent by the base station matches its own terminal ID. After that, if the terminal ID also matches, the terminal can confirm that the random access process is completed and use the newly allocated C-RNTI as its own identity. This identity is used for addressing information of subsequent PHY, MAC and RRC layer protocols.
  • FIG2B is a flow chart of the two-step CBRA. As shown in FIG2B , the two-step CBRA includes two steps:
  • Step A The terminal transmits message A to the base station, which includes a random access preamble and a data channel PUSCH (Physical Uplink Shared Channel).
  • PUSCH Physical Uplink Shared Channel
  • PUSCH includes the terminal's UE ID.
  • Step B The base station sends a response message B. There are two ways to address the terminal in message B:
  • B1 If the UE ID in messageA is C-RNTI, then the C-RNTI is also convolved on the downlink control channel (PDCCH) of messageB. In this case, if the terminal can confirm that the C-RNTI of messageB matches its own C-RNTI, it is considered that the random access process has been completed correctly, that is, the conflict has been resolved.
  • This situation of B1 is suitable for terminals in the RRC_CONNECTED state, that is, the terminal has completed the initial access and established an RRC connection with the network.
  • B2 If the UE ID in messageA is other than C-RNTI, then the RA-RNTI is convolved on the PDCCH of messageB. B2 is applicable to other situations except B1. If the UE ID contained in SuccessRAR in messageB matches its own UE ID, the terminal will consider its random access process successful and the conflict is resolved. Otherwise, the terminal will either choose It will choose to resend messageA, or fall back to 4-step RACH and send messagegae1.
  • IoT terminals are used in places such as logistics, warehousing, factory automation and animal husbandry. These IoT terminals only need to be able to intermittently communicate with the network or perform rough positioning and tracking.
  • IoT terminals such as NB-IoT (Narrow Band IoT) terminals used for coal and electricity metering, require batteries to provide energy. Although the energy consumption is very low, the batteries in these terminals will be exhausted in a few years at most. In this way, at least a lot of manpower is required to replace the battery. And some industrial scenarios are too dangerous and are not suitable for manual operation at all. Based on this, battery-free IoT terminals came into being.
  • RFID Radio Frequency Identification
  • Transplanting communication systems such as RFID into 3GPP's cellular networks can effectively solve the coverage problem.
  • the deployed cellular networks such as 4G and 5G
  • the advantage of full coverage is that the communication or positioning process between the IoT terminal and the network does not require human intervention, so it can work 24 hours a day, 7 days a week, and the work efficiency is high. It can even work efficiently in environments that are not suitable for human intervention (such as wilderness, mines, and factories). In this way, except for the initial need to associate the IoT terminal with a specific object, subsequent data reading, writing, and operation and maintenance can be operated through an APP on a smartphone, which is very convenient and efficient.
  • A-IoT communication uses energy harvesting and backscattering communication technology.
  • the A-IoT communication network consists of network equipment and A-IoT terminals (also called A-IoT devices, zero-power terminals, electronic tags, tags).
  • Figure 3 shows a schematic diagram of the basic structure of the A-IoT communication system.
  • the network equipment is used to send wireless power supply signals, downlink communication signals, and backscatter signals for receiving tags to the tags.
  • a basic tag includes an energy harvesting module, a backscattering communication module, and a low-power computing module.
  • the tag may also have a memory or sensor for storing some basic information (such as item identification, etc.) or obtaining sensor data such as ambient temperature and ambient humidity.
  • inventory refers to checking for missing goods when goods enter and leave the warehouse.
  • sensors include temperature, pressure, humidity and other sensors, which are used in industry, agriculture and smart cities.
  • the sensor information is uploaded to a third-party app through the A-IoT system for monitoring and management.
  • Tracking generally refers to obtaining the approximate location of an object at irregular intervals. For example, users can basically understand the location of their express delivery in real time through a smartphone.
  • Command refers to the operation of a certain servo mechanism through the A-IoT communication system, and these servo mechanisms are connected to the A-IoT terminal. For example, during a break in the office, water the flowers and plants in the backyard through a mobile phone app, and the watering servo mechanism is connected to an A-IoT terminal.
  • FIGS 4A to 4D show schematic diagrams of four topological network structures.
  • the A-IoT terminal can be connected to a network device for two-way communication.
  • the A-IoT terminal can be connected to an intermediate node for two-way communication, and the intermediate node is connected to a network device for two-way communication; optionally, the intermediate node can be a UE, which is connected to the network device for communication through a Uu interface.
  • the A-IoT terminal can receive a power supply signal/downlink communication signal sent by an auxiliary node, and send an uplink signal to the network device; optionally, the auxiliary node can be a UE, which is connected to the network device for communication through a Uu interface. As shown in Figure 4D, the A-IoT terminal can be connected to a UE for two-way communication.
  • A-IoT terminal comes from the surrounding environment, such as radio waves (RF), solar energy, thermal energy, mechanical vibration, wind energy, etc.
  • RF radio waves
  • type A and B terminals can only communicate by reflecting and modulating the received radio waves. This communication method is called backscattering, which means that they cannot actively send radio signals.
  • Their power is within the range of 1 to 10 microwatts (uW).
  • uW microwatts
  • the transmission power of type A terminals is the lowest and the hardware complexity is the lowest, which is basically close to the level of RFID terminals.
  • Type B is slightly more complex, such as having signal amplifier devices and certain energy storage devices, so the communication distance with the network can be farther than that of type A.
  • Type C has the ability to actively send radio waves, with a transmission power of about 1 to 10 milliwatts (mW), and can store a certain amount of energy. All three types of terminals can obtain energy from the environment and can work continuously for several years or more than 10 years. In order to save energy, type A and B terminals are basically in a dormant state before the network triggers the communication process. It will only wake up and work when stimulated by the wireless signal of the network.
  • A-IoT receivers can be divided into two categories:
  • Receiver type 1 Wideband receiver. This type of receiver is also called an RF receiver. It uses an RF bandpass filter to obtain the signal within the bandwidth to be received, and then performs envelope detection and subsequent baseband processing.
  • the structure of this architecture is the simplest, and its power consumption can be as low as several uW or even lower.
  • the receiver due to the poor accuracy of the RF bandpass filter, even when the target signal occupies a narrow bandwidth, the receiver often receives signals within a wider bandwidth. Therefore, more noise and interference are introduced in the reception process, and the receiver performance is poor. That is, its sensitivity is poor.
  • Figure 5A is a block diagram of a typical wideband receiver.
  • Receiver type 2 narrowband receiver.
  • Typical examples include intermediate frequency receivers or zero intermediate frequency receivers.
  • the RF signal is down-converted and the baseband signal is further filtered using a low-pass filter to eliminate noise and interference. Therefore, the receiver has a narrow receiving bandwidth and high receiving performance, i.e., receiver sensitivity.
  • the receiver requires the use of an LO (Local oscillator). Even the recommended LO consumes 100uW or even more power. Therefore, the power consumption of the receiver is relatively high, but because its absolute power consumption is very low, it is still suitable for use in zero-power devices.
  • Figure 5B is a block diagram of a typical intermediate frequency receiver.
  • type A terminals usually use broadband receivers
  • type C terminals usually use narrowband receivers
  • type B terminals may use one or both types of receivers.
  • FIG. 6 is a schematic diagram of an application scenario of an embodiment of the present application. As shown in Figure 6, a tag is likely to be between the coverage ranges of different readers.
  • FIG7 is a schematic flow chart of a signal processing method according to an embodiment of the present application.
  • the method can optionally be applied to the system shown in FIG1 , but is not limited thereto.
  • the method includes at least part of the following contents.
  • a first device receives a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal;
  • the first device determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device to determine whether to respond to a message received by the first device that triggers initial access.
  • the first device may be a terminal device.
  • the first device may be a terminal in IoT, such as an A-IoT device, a zero-power terminal, or an electronic tag.
  • the second device may be a node in the system/network.
  • the second device may be a node for communicating with the first device.
  • the node may be a terminal device, a network device, or a node (power supply node) that provides backscattered radio waves separately.
  • the second device may be a network device (e.g., a base station) shown in FIG. 4A, an intermediate node shown in FIG. 4B, an auxiliary node shown in FIG. 4C, or a UE shown in FIG. 4D.
  • the embodiment of the present application does not limit the topological structure in the network, and therefore, the second device is not limited to the above-mentioned various forms, and the second device may include any form of node capable of performing point-to-point communication with the first device.
  • the above-mentioned access method can be applied to the scenario where the first device may be within the coverage of multiple second devices, such as the scenario shown in FIG6, and can solve the conflict problem between multiple second devices.
  • the first device may receive messages sent by one or more second devices. Since the distances between each second device and the first device may be different, the first device may not be able to correctly receive the message of each second device, or the signal quality of each message received by the first device is different.
  • the first device determines the first parameter of the target device based on the first parameter in the received first signal, and when receiving the message triggering the initial access, it can determine whether to respond based on the first parameter. In this way, the first device can only respond to the message triggering the initial access sent by the target device, avoiding interference/conflict between the target device and other second devices.
  • the first parameter is introduced in the embodiment of the present application to distinguish different second devices, that is, to identify a specific second device in at least one second device.
  • the first parameter can be called an RCC (Reader Color Code) parameter. Based on the first parameter, it is possible to distinguish and process messages that trigger initial access from different second devices, and resolve conflicts between different second devices at a lower cost of system bandwidth overhead and signaling overhead.
  • RCC Reader Color Code
  • the above step S720 in which the first device determines the first parameter of the target device to be initially connected based on the first parameter in the first signal, includes:
  • the first device determines, among the multiple first signals received, a first signal having the greatest signal strength
  • the first device determines the first parameter in the first signal with the largest signal strength as the first parameter of the target device.
  • the first device when the first device receives multiple first signals, the first device can measure the first signals to determine the strength of each first signal, select the second device corresponding to the first signal with the largest signal strength as the target device, and record its first parameter.
  • the first device may directly determine the first parameter in the first signal as the first parameter of the target device.
  • FIG8 is a schematic flow chart of a signal processing method according to another embodiment of the present application. The method includes:
  • the second device sends a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine a first parameter of a target device for initial access, so as to determine whether to respond to a message triggering initial access received by the first device.
  • the first signal sent by the second device includes the first parameter of the second device, so that the first device can use the first signal to determine the first parameter of the target device for initial access, and distinguish between the messages triggering initial access from different second devices according to the first parameter of the target device. Therefore, the second device can help the first device resolve conflicts between different second devices during the initial access process by sending the first signal.
  • the first parameter is unique globally or locally within the communication system.
  • the first parameter is unique in the global scope of the communication system, that is, the first parameter of the target device is different from the first parameter of any other second device in the global scope of the communication system. In this way, the target device can be distinguished from other second devices in the global scope to ensure conflict resolution.
  • Another implementation manner is that the first parameter is unique in a local range of the communication system, that is, the first parameter of the target device is different from the first parameter of any other second device in the communication system.
  • FIG9 is a schematic diagram of the allocation method of the first parameter in an application example, in which a hexagon represents the range that a second device can cover, and the 3-bit information in the hexagon is the first parameter of the second device represented by the hexagon.
  • the first parameters of each second device are different from each other, that is, each second device is unique within the local range of the 7 hexagons. Since the interference in the communication system is related to the distance between the devices, when the distance between different second devices increases, the possibility of conflict decreases. Therefore, the first parameter of the second device is unique within the local range of the communication system, and can distinguish the target device from other second devices within the local range. At the same time, devices that are farther away will not conflict with the target device, so conflict resolution can also be achieved.
  • the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter is related to the number of second devices in the global scope. If the first parameter is unique in the local scope, the number of bits of the first parameter is related to the number of second devices in the local scope.
  • the number of bits of the first parameter increases or remains unchanged.
  • the number of second devices in a local range varies according to different application scenarios, so the number of bits or the bit length of the first parameter in different application scenarios can be set differently.
  • a first parameter of 3 bits can be used.
  • some scenarios may be relatively simple.
  • the first parameter of the reader can be 2 bits or even 1 bit.
  • the distribution of readers may be relatively dense, so the first parameter of the reader may require 4 bits.
  • the number of bits of the first parameter increases or remains unchanged as the number of second devices increases, so it can be ensured that each second device is assigned a unique first parameter in the local range within an appropriate bit length.
  • a message includes a first parameter, and specifically, the first parameter may be compiled in the information of the physical layer or compiled in the L2 (Layer 2, layer 2) message, such as compiled in the MAC layer or the RRC layer.
  • the first parameter may appear alone as a parameter in the message, or may be compiled in the message together with other parameters.
  • the first signal includes a beacon signal periodically broadcast by the second device. That is, the second device sends the first signal to the first device, including: the second device periodically broadcasts the beacon signal.
  • any second device may periodically broadcast a beacon signal, wherein the beacon signal includes its own first parameter, so that a first device within a coverage area may determine the first parameter of a target device for initial access.
  • the broadcast period of the beacon signal is selected from a preconfigured period set.
  • FIG10 is a schematic diagram of an application example of a signal processing method according to an embodiment of the present application. Taking the first device including a tag and the second device near the first device including a reader as an example, as shown in FIG10 , the above signal processing method based on the beacon signal includes the following steps:
  • Step 1 Before triggering the tag to initiate initial access, each reader first broadcasts a beacon signal periodically.
  • the signal at least includes an RCC parameter (first parameter).
  • the beacon signal is generally a broadband signal, such as broadcast within the bandwidth of a carrier.
  • Candidates for the beacon signal broadcast period may include a limited number of period values agreed in advance.
  • Step 2 The tag attempts to receive the beacon signal from the reader and measures the signal. The tag selects the beacon with the highest signal strength as the best reader (target device) and records its RCC parameters.
  • the first device receives the first signal, including:
  • the first device searches for a beacon signal within a first time window
  • the first device searches for multiple beacon signals containing the same first parameter, it determines the broadcast period of the second device corresponding to the same first parameter based on the multiple beacon signals containing the same first parameter, and receives the beacon signal from the second device based on the broadcast period.
  • the first device receiving the beacon signal can be divided into two stages.
  • the first stage is the scanning stage, during which the first device is not sure of the transmission time of the beacon signal of the second device, so it searches for the beacon signal within a certain time window.
  • the first device can determine the broadcast period of the second device corresponding to the first parameter, so it can determine the transmission time of the beacon signal based on the broadcast period, and receive the beacon signal when it is transmitted, thereby saving energy consumption.
  • the broadcast period of the beacon signal is selected from a preconfigured period set, and the length of the first time window is greater than the maximum period in the period set.
  • the pre-configured period set includes multiple period values, the largest of which is 20ms (milliseconds), and the second device can select the period value used for beacon signal broadcasting from the period set.
  • the first device searches for beacon signals within a time window greater than or equal to 20ms, so it is certain that it can search for beacon signals sent twice by the same second device, so it can determine the broadcast period of the second device, and perform subsequent reception based on the broadcast period, saving energy consumption.
  • the first device receives at least one first signal, including: the first device sends a second signal, the second signal is used to trigger the second device that receives the second signal to send the first signal; the first device receives the first signal sent by the second device.
  • the second device sends a first signal to the first device, including: the second device sends the first signal to the first device when receiving the second signal sent by the first device.
  • the occurrence of the first signal may be actively triggered by the first device.
  • the first device may include a type C tag that only supports MO (Message Original) services.
  • the first signal for configuring the initial access parameters of the first device may be triggered on-demand to save energy consumption of the second device (e.g., a network device).
  • FIG11 is a schematic diagram of another application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, where the first device includes a tag and the second device near the first device includes a reader as an example, as shown in FIG11 , the above signal processing method based on active triggering by the first device includes the following steps:
  • Step 1 When the tag wants to initiate a call, it will first send a wakeup signal (equivalent to the second signal) to the surrounding readers. If more than one reader receives the wakeup signal, then these readers will respond to the wakeup signal.
  • a wakeup signal equivalent to the second signal
  • Step 2 Both reader A and reader B respond to the wake-up signal by sending message 0 (msg0, equivalent to the first signal).
  • Step 3 If the two msg0s do not conflict, that is, the tag correctly receives the two msg0s through signal demodulation, then the tag can determine the best reader (target device) by measuring the signal strength of msg0. If the two msg0s conflict, the tag determines the best reader based on the result of signal demodulation. In the latter case, only the reader that is correctly demodulated is the best reader. The tag records its RCC parameters.
  • the signal processing method also includes: the second device sends a trigger message; wherein the trigger message includes a first parameter of the second device; the trigger message is used to trigger the first device to send a first access message when the first parameter in the trigger message is the same as the first parameter of the target device.
  • the above-mentioned signal processing method also includes: the first device receives a trigger message, the trigger message is used to trigger initial access, and the trigger message includes a first parameter of the device sending the trigger message; the first device sends a first access message when the first parameter in the trigger message is the same as the first parameter of the target device.
  • the initial access may be actively triggered by the second device.
  • the second device may broadcast a trigger message so that when the first device within the coverage receives the trigger message, it determines whether to send the first message for accessing the network, i.e., the first access message, according to the first parameter in the trigger message.
  • the first device ignores or discards the trigger message.
  • the first device only responds to the trigger message sent by the target device. Since the target device is the second device with the best communication signal with the first device, the signal quality in the subsequent initial access process can be guaranteed.
  • the second device may send a trigger message based on the requirements of a specific application scenario.
  • the trigger message may include a message for initiating an inventory count, that is, the second device may send a trigger message in order to implement an inventory count.
  • the first access message includes a first parameter of the target device, and the first parameter of the target device is used to instruct the target device to send a response message.
  • the signal processing method also includes: the second device receives a first access message, the first access message includes a first parameter of the target device; the second device sends a response message to the first device when the first parameter in the first access message is the same as the first parameter of the second device.
  • each second device can determine whether it is the target device, and thus determine whether to respond to the first access message sent by the first device, thereby achieving differentiated processing of different second devices.
  • FIG12 is a schematic diagram of an application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, the first device includes a tag, and the second device near the first device includes a reader as an example, as shown in FIG12, the signal processing method includes the following steps:
  • Step 0 For the purpose of inventory, the network broadcasts a message (msg0, trigger message) to trigger inventory on a certain frequency band through a reader (for example, reader A).
  • Msg0 contains at least the RCC parameter (first parameter) that represents the reader.
  • the first access message sent by the tag contains the RCC parameters selected by the tag.
  • Step 2 The first access message is received by reader A and reader B.
  • reader B since the RCC contained in the message is different from its own RCC, reader B will ignore the message and not send a response message.
  • the first access message also includes a first identifier of the first device, and the first access message is used to trigger the target device to send a response message including the first identifier.
  • the response message includes the first identifier of the first device, the first identifier is obtained based on the first access message, and the response message is used by the first device to determine that the initial access is successful based on the first identifier. That is, the above-mentioned signal processing method also includes: the first device receives the response message, and when the first identifier in the response message is the same as the first identifier of the first device, it is determined that the initial access is successful.
  • the response message may be a response message to a first access message sent by another device, and the first device may ignore or discard the response message.
  • the above initial access process implements conflict resolution between the first device and other devices by carrying the first identifier of the first device in the first access message sent by the first device and also carrying the first identifier of the first device in the response message sent by the second device.
  • the response message includes a second identifier of the first device.
  • the response message when the response message includes the first identifier of the first device, the response message also includes a second identifier assigned to the first device by the target device.
  • the response message sent by the second device when the received first access message includes its own first parameter, the response message sent by the second device includes the second identifier assigned to the first device by the second device.
  • the second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.
  • the uplink message content that the first device needs to send can be carried by the first access message, or compiled in the first access message.
  • the uplink message content that the first device needs to send has been sent to the second device through the first access message, and there will be no subsequent process.
  • the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.
  • the second identifier in the response message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the response message is determined based on at least the first parameter of the second device.
  • the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.
  • FIG13 shows a schematic diagram of another application example of the signal processing method according to an embodiment of the present application.
  • the signal processing method includes:
  • Step 1 After receiving the trigger message, the tag compares the RCC parameter (first parameter) in the trigger message with the RCC parameter of the best reader (target device) saved by itself, and finds that the two are the same, so it sends the first access message to the reader.
  • Step 2 After receiving the first access message from the tag and comparing the RCC, reader A feeds back a response message containing the received first identifier tag-id and the second identifier Tag-RNTI assigned to the tag.
  • the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes.
  • the first access message sent by the first device when the first parameter in the trigger message is the same as the first parameter of the target device may include a first preamble code; at least part of the information in the sequence number of the first preamble code is determined based on the first parameter of the target device, and at least part of the information is used to instruct the target device to send a response message.
  • the signal processing method also includes: the second device receives a first access message, the first access message includes a first preamble code; the second device sends a response message to the first device when at least part of the information in the sequence number of the first preamble code matches the first parameter of the second device; wherein the response message includes the sequence number of the first preamble code, so that the first device sends the second access message.
  • the signal processing method further includes: the first device receives a response message, and sends a second access message when the preamble code sequence number included in the response message is the same as the sequence number of the first preamble code.
  • the first parameter of the target device is carried by the sequence number of the first preamble in the first access message, so that each second device can determine whether to send a response message, and the second device also carries the preamble sequence number in the response message, so that the first device determines whether the response message is used to respond to the first access message sent by itself, and further, sends the second access message when the preamble sequence number is the same.
  • the second access message can be used to send uplink message content.
  • the second access message includes the first identifier of the first device; the signal processing method also includes: the second device receives the second access message; the second device sends an access confirmation message to the first device; wherein the access confirmation message includes the first identifier, so that the first device determines that the initial access is successful.
  • the above method also includes: after sending the second access message, the first device receives an access confirmation message, and determines that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device.
  • the first device may ignore or discard the access confirmation message.
  • the second device after receiving the second access message, the second device feeds back an access confirmation message including the first identifier in the message to the first device, so that the first device can confirm that the conflict between the first device and other devices is resolved, thereby determining that the initial access is successful.
  • the access confirmation message includes the second identifier of the first device.
  • the access confirmation message when the access confirmation message includes the first identifier of the first device, the access confirmation message also includes the second identifier assigned to the first device by the target device.
  • the access confirmation message sent by the second device after receiving the second access message, the access confirmation message sent by the second device also includes the second identifier assigned to the first device by the second device.
  • the second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.
  • the uplink message content that the first device needs to send can be carried by the second access message, or compiled in the second access message.
  • the uplink message content that the first device needs to send has been sent to the second device through the second access message, and there will be no subsequent process.
  • the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.
  • the second identifier in the access confirmation message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the access confirmation message is determined based on at least the first parameter of the second device.
  • the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.
  • FIG14 shows a schematic diagram of another application example of the signal processing method according to an embodiment of the present application.
  • the signal processing method includes:
  • Step 1 After the tag receives the trigger message, it compares the RCC parameters in the trigger message with the RCC parameters of the best reader it has saved, and finds that the two are the same, so it randomly selects a preamble to send the first access message.
  • a sequence is modulated on the preamble. The number of these sequences is limited, for example, there are 16 in total, and each sequence has a fixed serial number.
  • the reader can demodulate preambles of different sequences. If the preambles with the same sequence are received from different tags, the reader cannot distinguish between different tags, that is, they may be demodulated as one preamble.
  • the serial number (preamble index) of the preamble selected by the tag also contains the RCC parameters.
  • Step 3 After receiving the preamble index, the tag will compare it with the index of the preamble it just sent. If the two indexes are found to be the same, the tag will send a second access message containing at least the tag-id to the reader; otherwise, it is considered that the initial access has failed.
  • the tag-id can be a random number generated by the tag itself.
  • Step 4 After receiving the message from the tag, reader A returns an access confirmation message, which contains the received tag-id and the tag-RNTI (second identifier) assigned to the tag. After the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes.
  • tag-RNTI second identifier
  • the first access message includes a first preamble.
  • the signal processing method further includes: the second device receives the first access message; the second device sends a response message; wherein the response message includes a first parameter of the second device and a sequence number of the first preamble, so that the first device sends the second access message.
  • the signal processing method also includes: the first device receives a response message to the first access message, and the response message includes a first parameter of the second device that sends the access response message; the first device sends a second access message when the first parameter in the response message is the same as the first parameter of the target device and the response message includes the sequence number of the first preamble code.
  • the first device when the first device processes the first preamble, it does not need to refer to the first parameter of the target device.
  • Each second device can respond to the first access message sent by the first device.
  • the first parameters in the response messages sent by different second devices are different, and the first device can determine the response message sent by the target device, and send the second access message when the response message contains the sequence number of the first preamble.
  • the second access message includes the first identifier of the first device; the signal processing method also includes: the second device receives the second access message; the second device sends an access confirmation message to the first device; wherein the access confirmation message includes the first identifier, so that the first device determines that the initial access is successful.
  • the above method also includes: after sending the second access message, the first device receives an access confirmation message, and determines that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device.
  • the first device may ignore or discard the access confirmation message.
  • the second device after receiving the second access message, the second device feeds back an access confirmation message including the first identifier in the message to the first device, so that the first device can confirm that the conflict between the first device and other devices is resolved, thereby determining that the initial access is successful.
  • the access confirmation message includes the second identifier of the first device.
  • the access confirmation message when the access confirmation message includes the first identifier of the first device, the access confirmation message also includes the second identifier assigned to the first device by the target device.
  • the access confirmation message sent by the second device after receiving the second access message, the access confirmation message sent by the second device also includes the second identifier assigned to the first device by the second device.
  • the second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.
  • the uplink message content that the first device needs to send can be carried by the second access message, or compiled in the second access message.
  • the uplink message content that the first device needs to send has been sent to the second device through the second access message, and there will be no subsequent process.
  • the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.
  • the second identifier in the access confirmation message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the access confirmation message is determined based on at least the first parameter of the second device.
  • the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.
  • FIG15 shows a schematic diagram of another application example of the signal processing method according to an embodiment of the present application. Taking the method used in an IoT system, the first device includes a tag, and the second device near the first device includes a reader as an example, as shown in FIG15, the signal processing method includes:
  • Step 1 After the tag receives the trigger message, it compares the RCC in the trigger message with the RCC of the best reader it has saved and finds that the two are the same, so it randomly selects a preamble to send the first access message.
  • a sequence is modulated on the preamble. The number of these sequences is limited, for example, there are 16 in total, and each sequence has a fixed serial number.
  • the reader can demodulate preambles of different sequences. If the preambles with the same sequence are received from different tags, the reader cannot distinguish between different tags, and may demodulate them as one preamble.
  • Step 2 After receiving the preamble, reader A and reader B respond with a message containing the preamble index (preamble sequence number). The response message is sent to the tag to indicate that the preamble corresponding to the preamble index has been correctly received and demodulated.
  • Step 3 After receiving the preamble index, the tag will compare it with the index of the preamble it just sent. If the two indices are the same, the tag will send a second access message containing at least the tag-id to the reader; otherwise, it is considered that the initial access has failed.
  • the tag-id can be a random number generated by the tag itself. In this step, although the tag receives the response messages from reader A and reader B almost at the same time, because reader A is the best reader, the tag demodulates the response message of reader A, and the response message of reader B becomes an interference signal.
  • Step 4 After receiving the message from the tag, reader A returns an access confirmation message, which contains the received tag-id and the tag-RNTI (second identifier) assigned to the tag. After the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes.
  • tag-RNTI second identifier
  • the second access message and/or the access confirmation message may include the first parameter of the target device, wherein the first value may be a preset value.
  • the first identifiers of all first devices that are in the initial access process and around the first device can always remain unique.
  • the above embodiment provides another solution, which allows the bit length of the first identifier to be smaller, so that only the first devices that are in the initial access process of one second device can remain unique to each other, that is, the first devices that are in the initial access process of different second devices may have the same first identifier.
  • the first parameter can be added to the second access message and the access confirmation message to distinguish all first devices that are in the initial access process.
  • the signal processing method of an embodiment of the present application determines the strongest (closest) network node by measuring the signal strength of a beacon signal or a wake-up signal (such as a message that triggers an inventory) sent by a network node, and distinguishes the network nodes through a first parameter.
  • This solution can basically eliminate the interference problem between the uplink and downlink of readers during the initial access process at the cost of a smaller system bandwidth overhead and signaling overhead.
  • FIG16 is a schematic block diagram of a first device 1600 according to an embodiment of the present application.
  • the first device 1600 may include:
  • the first communication module 1610 is configured to receive a first signal; wherein the first signal includes a first parameter of a second device that sends the first signal;
  • the first processing module 1620 is used to determine a first parameter of the target device for initial access based on the first parameter in the first signal; the first parameter of the target device is used to determine whether to respond to the message triggering initial access received by it.
  • the first processing module 1620 is further configured to:
  • the first parameter in the first signal with the largest signal strength is determined as the first parameter of the target device.
  • the first parameter is unique in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter increases or remains unchanged.
  • the first signal includes a beacon signal periodically broadcast by the second device.
  • the first communication module 1610 is further configured to search for a beacon signal within the first time window
  • the first processing module 1620 is further configured to determine the broadcast period of the second device corresponding to the same first parameter based on the multiple beacon signals containing the same first parameter if multiple beacon signals containing the same first parameter are searched;
  • the first communication module 1610 is further configured to receive a beacon signal from a second device based on a broadcast period.
  • the broadcast period is selected from a preconfigured period set, and the length of the first time window is greater than the maximum period in the period set.
  • the first communication module 1610 is further configured to:
  • Sending a second signal wherein the second signal is used to trigger the second device that receives the second signal to send the first signal;
  • a first signal sent by a second device is received.
  • the first communication module 1610 is further configured to:
  • a first access message is sent.
  • the trigger message includes a message for initiating an inventory.
  • the first access message includes a first parameter of the target device, and the first parameter of the target device is used to indicate the target device.
  • the device sends a response message.
  • the first access message further includes a first identifier of the first device, and the first access message is used to trigger the target device to send a response message including the first identifier;
  • the first communication module 1610 is further configured to receive a response message
  • the first processing module 1620 is further configured to determine that the initial access is successful when the first identifier in the response message is the same as the first identifier of the first device.
  • the response message includes the second identifier allocated by the target device to the first device.
  • the first access message includes a first preamble; at least part of the information in the sequence number of the first preamble is determined based on a first parameter of the target device, and at least part of the information is used to instruct the target device to send a response message;
  • the first communication module 1610 is further configured to:
  • a response message is received, and when the preamble code sequence number included in the response message is the same as the sequence number of the first preamble code, a second access message is sent.
  • the first access message includes a first preamble
  • the first communication module 1610 is further configured to:
  • a second access message is sent.
  • the second access message includes a first identifier of the first device
  • the first communication module 1610 is further configured to receive an access confirmation message after sending the second access message;
  • the first processing module 1620 is further configured to determine that the initial access is successful when the first identifier in the access confirmation message is the same as the first identifier of the first device.
  • the access confirmation message includes the second identifier allocated by the target device to the first device.
  • the second identifier is determined based on at least a first parameter of the target device.
  • the second access message and/or the access confirmation message includes the first parameter of the target device.
  • the first device 1600 of the embodiment of the present application can implement the corresponding functions of the first device in the aforementioned method embodiment.
  • the processes, functions, implementation methods and beneficial effects corresponding to the various modules (sub-modules, units or components, etc.) in the first device 1600 can be found in the corresponding descriptions in the above method embodiments, which will not be repeated here.
  • the functions described by the various modules (sub-modules, units or components, etc.) in the first device 1600 of the application embodiment can be implemented by different modules (sub-modules, units or components, etc.) or by the same module (sub-module, unit or component, etc.).
  • FIG17 is a schematic block diagram of a second device 1700 according to an embodiment of the present application.
  • the second device 1700 may include:
  • the second communication module 1710 is used to send a first signal; wherein the first signal includes a first parameter of the second device; the first signal is used by the first device to determine the first parameter of the target device for initial access to determine whether to respond to the message triggering initial access received by the first device.
  • the first parameter is unique in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter is related to the number of second devices in a global scope or a local scope of the communication system.
  • the number of bits of the first parameter increases or remains unchanged.
  • the second communication module 1710 is further configured to:
  • the broadcast period of the beacon signal is selected from a preconfigured period set.
  • the second communication module 1710 is further configured to:
  • the first signal is sent to the first device.
  • the second communication module 1710 is further configured to:
  • the trigger message includes a first parameter of the second device; the trigger message is used to trigger the first device to send a first access message when the first parameter in the trigger message is the same as the first parameter of the target device.
  • the trigger message includes a message for initiating an inventory.
  • the second communication module 1710 is further configured to:
  • a response message is sent to the first device.
  • the response message includes a first identifier of the first device; the first identifier is obtained based on the first access message, and the response message includes a first identifier of the first device; The response message is used by the first device to determine that the initial access is successful based on the first identifier.
  • the response message includes the second identifier allocated by the second device to the first device.
  • the second communication module 1710 is further configured to:
  • a response message is sent to the first device; wherein the response message includes the sequence number of the first preamble code, so that the first device sends a second access message.
  • the second communication module 1710 is further configured to:
  • the response message includes the first parameter of the second device and the sequence number of the first preamble code, so that the first device sends a second access message.
  • the second communication module 1710 is further configured to:
  • An access confirmation message is sent to the first device, wherein the access confirmation message includes a first identifier, so that the first device determines that the initial access is successful.
  • the access confirmation message includes a second identifier allocated by the second device to the first device.
  • the second identifier is determined based on at least a first parameter of the second device.
  • the second access message and/or the access confirmation message includes the first parameter of the second device.
  • the second device 1700 of the embodiment of the present application can implement the corresponding functions of the second device in the aforementioned method embodiment.
  • the processes, functions, implementation methods and beneficial effects corresponding to the various modules (sub-modules, units or components, etc.) in the second device 1700 can be found in the corresponding descriptions in the above method embodiments, which will not be repeated here.
  • the functions described by the various modules (sub-modules, units or components, etc.) in the second device 1700 of the application embodiment can be implemented by different modules (sub-modules, units or components, etc.), or by the same module (sub-module, unit or component, etc.).
  • Fig. 18 is a schematic structural diagram of a communication device 1800 according to an embodiment of the present application.
  • the communication device 1800 includes a processor 1810, and the processor 1810 can call and run a computer program from a memory to enable the communication device 1800 to implement the method in the embodiment of the present application.
  • the communication device 1800 may further include a memory 1820.
  • the processor 1810 may call and run a computer program from the memory 1820 to enable the communication device 1800 to implement the method in the embodiment of the present application.
  • the memory 1820 may be a separate device independent of the processor 1810 , or may be integrated into the processor 1810 .
  • the communication device 1800 may further include a transceiver 1830, and the processor 1810 may control the transceiver 1830 to communicate with other devices, specifically, may send information or data to other devices, or receive information or data sent by other devices.
  • the transceiver 1830 may include a transmitter and a receiver.
  • the transceiver 1830 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 1800 may be the first device of the embodiment of the present application, and the communication device 1800 may implement the corresponding processes implemented by the first device in each method of the embodiment of the present application, which will not be repeated here for the sake of brevity.
  • the communication device 1800 may be the second device of the embodiment of the present application, and the communication device 1800 may implement the corresponding processes implemented by the second device in each method of the embodiment of the present application, which will not be described again for the sake of brevity.
  • Fig. 19 is a schematic structural diagram of a chip 1900 according to an embodiment of the present application.
  • the chip 1900 includes a processor 1910, and the processor 1910 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the chip 1900 may further include a memory 1920.
  • the processor 1910 may call and run a computer program from the memory 1920 to implement the method executed by the first device or the second device in the embodiment of the present application.
  • the memory 1920 may be a separate device independent of the processor 1910 , or may be integrated into the processor 1910 .
  • the chip 1900 may further include an input interface 1930.
  • the processor 1910 may control the input interface 1930 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
  • the chip 1900 may further include an output interface 1940.
  • the processor 1910 may control the output interface 1940 to communicate with other devices or chips, and specifically, may output information or data to other devices or chips.
  • the chip can be applied to the first device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the first device in each method of the embodiments of the present application. For the sake of brevity, they will not be repeated here.
  • the chip can be applied to the second device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the second device in each method of the embodiments of the present application. For the sake of brevity, they will not be repeated here.
  • the chips applied to the first device and the second device may be the same chip or different chips.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • the memory mentioned above may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM), a programmable ROM (PROM), an erasable programmable ROM (EPROM), an electrically erasable programmable ROM (EEPROM) or a flash memory.
  • the volatile memory may be a random access memory (RAM).
  • the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
  • FIG20 is a schematic block diagram of a communication system 2000 according to an embodiment of the present application.
  • the communication system 2000 includes a first device 2010 and a second device 2020 .
  • the first device 2010 receives a first signal, wherein the first signal includes a first parameter of the second device 2020 that sends the first signal;
  • the first device 2010 determines a first parameter of a target device for initial access based on a first parameter in the first signal; the first parameter of the target device is used by the first device 2010 to determine whether to respond to a received message triggering initial access.
  • the second device 2020 sends a first signal; wherein the first signal includes a first parameter of the second device 2020; the first signal is used by the first device 2010 to determine the first parameter of the target device for initial access, so as to determine whether to respond to the message triggering initial access received by the first device 2010.
  • the first device 2010 may be used to implement the corresponding function implemented by the first device in the above method
  • the second device 2020 may be used to implement the corresponding function implemented by the second device in the above method.
  • the sake of brevity it will not be described here.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that a computer can access or a data storage device such as a server or data center that includes one or more available media integrated.
  • the available medium can be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a solid state drive (SSD)), etc.
  • the size of the serial numbers of the above-mentioned processes does not mean the order of execution.
  • the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande concerne un procédé de traitement de signal, un premier dispositif, un second dispositif, une puce, un support de stockage lisible par ordinateur, un produit programme informatique, un programme informatique et un système de communication. Le procédé comprend les étapes suivantes : un premier dispositif reçoit un premier signal, le premier signal comprenant un premier paramètre d'un second dispositif qui a envoyé le premier signal ; et sur la base du premier paramètre dans le premier signal, le premier dispositif détermine un premier paramètre d'un dispositif cible ayant fait l'objet d'un accès initial, le premier paramètre du dispositif cible étant utilisé par le premier dispositif pour déterminer s'il faut répondre à un message reçu pour déclencher un accès initial. Selon des modes de réalisation de la présente demande, des messages déclenchant un accès initial sont distingués par détermination d'un premier paramètre d'un dispositif cible, de telle sorte que le problème d'interférence entre différents seconds dispositifs pendant un accès initial peut être résolu.
PCT/CN2023/136563 2023-12-05 2023-12-05 Procédé de traitement de signal, premier dispositif et second dispositif Pending WO2025118159A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2023/136563 WO2025118159A1 (fr) 2023-12-05 2023-12-05 Procédé de traitement de signal, premier dispositif et second dispositif

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2023/136563 WO2025118159A1 (fr) 2023-12-05 2023-12-05 Procédé de traitement de signal, premier dispositif et second dispositif

Publications (1)

Publication Number Publication Date
WO2025118159A1 true WO2025118159A1 (fr) 2025-06-12

Family

ID=95981345

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/136563 Pending WO2025118159A1 (fr) 2023-12-05 2023-12-05 Procédé de traitement de signal, premier dispositif et second dispositif

Country Status (1)

Country Link
WO (1) WO2025118159A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016058166A1 (fr) * 2014-10-16 2016-04-21 华为技术有限公司 Procédé pour déclencher une interaction de protocole de machine d'enregistrement, point d'accès et point de station
CN107484215A (zh) * 2017-09-04 2017-12-15 深圳市盛路物联通讯技术有限公司 基于天线接收信号强度推荐接入基站的方法及移动终端
CN108174407A (zh) * 2017-12-27 2018-06-15 宇龙计算机通信科技(深圳)有限公司 一种通信控制方法及终端
WO2023060577A1 (fr) * 2021-10-15 2023-04-20 Oppo广东移动通信有限公司 Procédé d'établissement de connexion, dispositif terminal et dispositif de réseau

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016058166A1 (fr) * 2014-10-16 2016-04-21 华为技术有限公司 Procédé pour déclencher une interaction de protocole de machine d'enregistrement, point d'accès et point de station
CN107484215A (zh) * 2017-09-04 2017-12-15 深圳市盛路物联通讯技术有限公司 基于天线接收信号强度推荐接入基站的方法及移动终端
CN108174407A (zh) * 2017-12-27 2018-06-15 宇龙计算机通信科技(深圳)有限公司 一种通信控制方法及终端
WO2023060577A1 (fr) * 2021-10-15 2023-04-20 Oppo广东移动通信有限公司 Procédé d'établissement de connexion, dispositif terminal et dispositif de réseau

Similar Documents

Publication Publication Date Title
CN108616968B (zh) 传输帧的方法和设备
US9510312B2 (en) Method and apparatus for performing network entry/reentry in wireless communication system
CN118661457A (zh) 反向散射通信的方法及设备
US20240147424A1 (en) Communication method and apparatus
CN117812728A (zh) 一种上行唤醒的方法及装置
WO2023173439A1 (fr) Procédé de communication, dispositif terminal et dispositif réseau
WO2024065267A1 (fr) Procédé et dispositif de communication sans fil
EP4213547A1 (fr) Procédés d'envoi et de surveillance d'informations de radiomessagerie, et appareil et système de communication
WO2024082205A1 (fr) Techniques de déclenchement de procédures d'accès aléatoire au niveau de dispositifs passifs
US20240414767A1 (en) Channel listening method and communication device
WO2025118159A1 (fr) Procédé de traitement de signal, premier dispositif et second dispositif
WO2025107313A1 (fr) Procédé de communication sans fil et dispositif de communication
WO2025118160A1 (fr) Procédé d'accès, premier dispositif et second dispositif
WO2025102253A1 (fr) Procédé, appareil, dispositif de transmission de canal, et support de stockage
WO2025118135A1 (fr) Procédé de communication sans fil et dispositif de communication
US20240276466A1 (en) Communication method and system, and related apparatus
WO2025118137A1 (fr) Procédé de communication et dispositif de communication sans fil
WO2024243900A1 (fr) Procédé de transmission d'informations, premier dispositif et deuxième dispositif
US20250365713A1 (en) Channel preemption methods and apparatuses, and communication device
WO2025199766A1 (fr) Dispositif et procédé de synchronisation
US20250374373A1 (en) Measurement method and related apparatus
US20250301460A1 (en) Communication method and system, and apparatus
US20250261112A1 (en) Information transmission method and apparatus
US20250374332A1 (en) Wireless communication method, amp device, and network device
WO2024239726A1 (fr) Accès aléatoire pour dispositifs

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23960473

Country of ref document: EP

Kind code of ref document: A1