WO2025118160A1 - Procédé d'accès, premier dispositif et second dispositif - Google Patents
Procédé d'accès, premier dispositif et second dispositif Download PDFInfo
- Publication number
- WO2025118160A1 WO2025118160A1 PCT/CN2023/136567 CN2023136567W WO2025118160A1 WO 2025118160 A1 WO2025118160 A1 WO 2025118160A1 CN 2023136567 W CN2023136567 W CN 2023136567W WO 2025118160 A1 WO2025118160 A1 WO 2025118160A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- message
- identifier
- parameter
- access message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
Definitions
- the present application relates to the field of communications, and more specifically, to an access method, a first device, a second device, a chip, a computer-readable storage medium, a computer program product, a computer program, and a communication system.
- Embodiments of the present application provide an access method, a first device, a second device, a chip, a computer-readable storage medium, a computer program product, a computer program, and a communication system, which can be used to avoid conflicts between different devices during an initial access process.
- the present application provides an access method, including:
- the first device After sending the first access message to the at least one second device, the first device receives a response message to the first access message sent by a target device in the at least one second device; wherein the response message includes a first parameter of the target device, and the first parameter is used to identify the target device in the at least one second device;
- the present application provides an access method, including:
- the second device receives a first access message from the first device
- the second device sends a response message to the first access message to the first device; wherein the response message includes a first parameter of the second device, and the first parameter is used to identify the second device; the response message is used to trigger the sending of the second access message;
- the second device receives a second access message from the first device, and determines that the first device is accessed when the second access message includes the first parameter and the first identifier of the first device.
- the present application embodiment provides a first device, including:
- a first communication module configured to receive a response message to the first access message sent by a target device in at least one second device after sending a first access message to at least one second device; wherein the response message includes a first parameter of the target device, and the first parameter is used to identify the target device in the at least one second device;
- the first communication module is further used to send a second access message to at least one second device; wherein the second access message includes the first parameter.
- the embodiment of the present application provides a second device, including:
- a second communication module configured to receive a first access message from a first device, send a response message to the first access message to the first device, and receive a second access message from the first device; wherein the response message includes a first parameter of the second device, and the first parameter is used to identify the second device; and the response message is used to trigger the sending of the second access message;
- the second processing module is configured to determine that the first device is accessed when the second access message includes the first parameter and the first identifier of the first device.
- the embodiment of the present application provides a first device, including: a transceiver, a processor and a memory.
- the memory is used to store a computer program
- the transceiver is used to communicate with other devices
- the processor is used to call and run the computer program stored in the memory, so that the first device executes the above-mentioned access method.
- the embodiment of the present application provides a second device, including: a transceiver, a processor and a memory.
- the memory is used to store a computer program
- the transceiver is used to communicate with other devices
- the processor is used to call and run the computer program stored in the memory so that the second device executes the above-mentioned access method.
- the embodiment of the present application provides a chip for implementing the above-mentioned access method.
- An embodiment of the present application provides a computer-readable storage medium for storing a computer program.
- the computer program When the computer program is executed by a device, the device executes the above-mentioned access method.
- An embodiment of the present application provides a computer program product, including computer program instructions, which enable a computer to execute the above-mentioned access method.
- An embodiment of the present application provides a computer program, which, when executed on a computer, enables the computer to execute the above-mentioned access method.
- An embodiment of the present application provides a communication system, including a first device and a second device used for the above-mentioned access method.
- the first device initiates initial access by sending a first access message
- the response message sent by each second device in the network includes a first parameter for identifying the second device.
- the first device After receiving the response message, the first device sends a second access message including the received first parameter, so that each second device can perform corresponding processing according to the first parameter in the second access message, thereby realizing the distinction of the second devices during the initial access process and resolving conflicts between different second devices.
- FIG. 1 is a schematic diagram of a communication system in an embodiment of the present application.
- FIG. 2A is a schematic diagram of the four-step CBRA process.
- FIG. 2B is a schematic diagram of the two-step CBRA process.
- FIG3 is a schematic diagram of the basic structure of the A-IoT communication system.
- FIG. 4A is a schematic diagram of a first topology network structure in an A-IoT communication system.
- FIG. 4B is a schematic diagram of a second topology network structure in an A-IoT communication system.
- FIG. 4C is a schematic diagram of a third topology network structure in an A-IoT communication system.
- FIG4D is a schematic diagram of a fourth topology network structure in an A-IoT communication system.
- FIG5A is a block diagram of a typical wideband receiver.
- FIG5B is a block diagram of a typical intermediate frequency receiver.
- FIG. 6 is a schematic diagram of an application scenario of an embodiment of the present application.
- FIG. 7 is a schematic flowchart of an access method according to an embodiment of the present application.
- FIG8 is a schematic flowchart of an access method according to another embodiment of the present application.
- FIG. 9 is a schematic diagram of a distribution method of a first parameter in an application example.
- FIG. 10 is a schematic diagram of application example 1 of the access method according to an embodiment of the present application.
- FIG. 11 is a schematic diagram of application example 2 of the access method according to an embodiment of the present application.
- FIG. 12 is a schematic block diagram of a first device according to an embodiment of the present application.
- FIG. 13 is a schematic block diagram of a first device according to another embodiment of the present application.
- FIG. 14 is a schematic block diagram of a second device according to an embodiment of the present application.
- FIG. 15 is a schematic block diagram of a communication device according to an embodiment of the present application.
- FIG. 16 is a schematic block diagram of a chip according to an embodiment of the present application.
- FIG. 17 is a schematic block diagram of a communication system according to an embodiment of the present application.
- LTE Long Term Evolution
- LTE-A Advanced Long Term Evolution
- NR New Radio
- NR system evolution system LTE on unlicensed spectrum
- LTE-based access to unlicensed spectrum LTE-U
- NR on unlicensed spectrum NR-based access to unlicensed spectrum, NR-U
- NTN non-terrestrial communication network
- Universal Mobile Telecommunication System Universal Mobile Telecommunication System, UMTS
- wireless local area network Wireless Local Area Networks, WLAN
- wireless fidelity Wireless Fidelity, WiFi
- 5G fifth-generation communication
- D2D device to device
- M2M machine to machine
- MTC machine type communication
- V2V vehicle to vehicle
- V2X vehicle to everything
- the communication system in the embodiment of the present application can be applied to a carrier aggregation (CA) scenario, a dual connectivity (DC) scenario, or a standalone (SA) networking scenario.
- CA carrier aggregation
- DC dual connectivity
- SA standalone
- the communication system in the embodiment of the present application can be applied to an unlicensed spectrum, wherein the unlicensed spectrum can also be considered as a shared spectrum; or, the communication system in the embodiment of the present application can also be applied to an authorized spectrum, wherein the authorized spectrum can also be considered as an unshared spectrum.
- the terminal device may also be referred to as user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
- UE user equipment
- the terminal device can be a station (STAION, ST) in a WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal device in the next generation communication system such as the NR network, or a terminal device in the future evolved Public Land Mobile Network (PLMN) network, etc.
- STAION, ST in a WLAN
- a cellular phone a cordless phone
- Session Initiation Protocol (SIP) phone Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- PDA Personal Digital Assistant
- the terminal device can be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted; it can also be deployed on the water surface (such as ships, etc.); it can also be deployed in the air (for example, on airplanes, balloons and satellites, etc.).
- the terminal device may be a mobile phone, a tablet computer, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical, a wireless terminal device in smart grid, a wireless terminal device in transportation safety, a wireless terminal device in a smart city, or a wireless terminal device in a smart home, etc.
- VR virtual reality
- AR augmented reality
- the terminal device may also be a wearable device.
- Wearable devices may also be referred to as wearable smart devices, which are a general term for wearable devices that are intelligently designed and developed using wearable technology for daily wear, such as glasses, gloves, watches, clothing, and shoes.
- a wearable device is a portable device that is worn directly on the body or integrated into the user's clothes or accessories. Wearable devices are not only hardware devices, but also powerful functions achieved through software support, data interaction, and cloud interaction.
- wearable smart devices include full-featured, large-sized, and fully or partially independent of smartphones, such as smart watches or smart glasses, as well as devices that only focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various types of smart bracelets and smart jewelry for vital sign monitoring.
- the network device may be a device for communicating with a mobile device, the network device may be an access point (AP) in a WLAN, or an evolutionary base station (Evolutional Node B) in an LTE.
- AP access point
- Evolutional Node B evolutionary base station
- B eNB or eNodeB
- relay station or access point or vehicle-mounted equipment
- wearable device and network equipment in NR network (gNB)
- gNB NR network
- NTN network network
- the network device may have a mobile feature, for example, the network device may be a mobile device.
- the network device may be a satellite or a balloon station.
- the satellite may be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geostationary earth orbit (GEO) satellite, a high elliptical orbit (HEO) satellite, etc.
- the network device may also be a base station set up in a location such as land or water.
- a network device can provide services for a cell, and a terminal device communicates with the network device through transmission resources (e.g., frequency domain resources, or spectrum resources) used by the cell.
- the cell can be a cell corresponding to a network device (e.g., a base station).
- the cell can belong to a macro base station or a base station corresponding to a small cell.
- the small cells here may include: metro cells, micro cells, pico cells, femto cells, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
- Fig. 1 exemplarily shows a communication system 100.
- the communication system includes a network device 110 and two terminal devices 120.
- the communication system 100 may include multiple network devices 110, and each network device 110 may include other number of terminal devices 120 within its coverage area, which is not limited in the embodiment of the present application.
- the 3GPP (3rd Generation Partnership Project) communication system there are generally two ways of initial access at the MAC (Medium Access Control) layer, namely two-step random access (2-step RACH) and four-step random access (4-step RACH).
- RACH Random Access Channel
- the resolution of random access conflicts is performed within a cell. This is because in the 3GPP cellular communication system (including 4G and 5G), before initiating the random access process, the terminal must first obtain frequency and time synchronization with the current serving cell, and then initiate the random access process on the random access radio resources broadcast by the serving cell.
- FIG. 2A is a flowchart of the four-step CBRA (Contention Based Random Access, contention-based random access). As shown in Figure 2A, the four-step CBRA includes 4 steps:
- Step 1 The terminal will send a random access preamble to the base station.
- This preamble is called message 1 in the MAC layer protocol.
- After sending the preamble it waits for message 2 from the base station in a subsequent response window.
- the start and end times of the response window are set according to the configuration parameters. From the perspective of the base station, the base station has the ability to distinguish between preamblers received in different time-frequency domains, or different preamblers in the same time-frequency domain. However, the base station cannot distinguish between the same preamble sent by multiple terminals in the same time-frequency domain. In this case, an access conflict will occur.
- Step 3 After comparing the RA-RNTI and the preamble index in the RAR, the terminal can determine whether the base station has received the preamble it sent. After confirming that the correct RAR has been received, the terminal sends message 3 (message3) based on UL-grant, which at least includes the terminal's identifier (UE ID). Message3 is addressed using T_C_RNTI on the physical layer. The terminal then starts a timer. While the timer is running, the downlink control channel PDCCH (Physical Downlink Control Channel) is detected. If two or more terminals collide in step 1, conflicts will continue to occur in step 3 because they will send message3 based on the same information, but the terminal identifiers contained in the MAC CE (MAC Control Element) of message3 are different.
- PDCCH Physical Downlink Control Channel
- Step 4 If the base station decodes message3 correctly, it will send message 4 (message4) to the terminal.
- This message4 is addressed by the T_C_RNTI of the received message3, and the MAC CE includes the terminal's identifier contained in message3 and a newly allocated C-RNTI to the terminal. If multiple terminals send message3 on the same UL-grant, the base station may be able to correctly decode one of them, or it may not be able to decode (for example, when the interference level between them is similar).
- the terminal receives message4 if it finds that the T_C_RNTI convolved on the PDCCH matches the message3 it sent, it will further check whether the MAC CE in the message4 sent by the base station matches its own terminal ID. After that, if the terminal ID also matches, the terminal can confirm that the random access process is completed and use the newly allocated C-RNTI as its own identity. This identity is used for addressing information of subsequent PHY, MAC and RRC layer protocols.
- Step A The terminal transmits message A to the base station, which includes a random access preamble and a data channel PUSCH (Physical Uplink Shared Channel).
- PUSCH Physical Uplink Shared Channel
- PUSCH includes the terminal's UE ID.
- Step B The base station sends a response message B. There are two ways to address the terminal in message B:
- B1 If the UE ID in messageA is C-RNTI, then the convolution on the downlink control channel (PDCCH) of messageB is also C-RNTI. In this case, if the terminal can confirm that the C-RNTI of messageB matches its own C-RNTI, it is considered that the random access process has been completed correctly, that is, the conflict has been resolved.
- This situation of B1 is suitable for terminals in the RRC_CONNECTED state, that is, the terminal has completed the initial access and established an RRC connection with the network.
- B2 If the UE ID in messageA is other than C-RNTI, then the RA-RNTI is convolved on the PDCCH of messageB. B2 is applicable to other cases except B1. If the UE ID contained in SuccessRAR in messageB matches its own UE ID, the terminal will consider its random access process successful and the conflict resolved. Otherwise, the terminal will either choose to resend messageA or fall back to 4-step RACH and send messagegae1.
- IoT terminals are used in places such as logistics, warehousing, factory automation and animal husbandry. These IoT terminals only need to be able to intermittently communicate with the network or perform rough positioning and tracking.
- IoT terminals such as NB-IoT (Narrow Band IoT) terminals used for coal and electricity metering, require batteries to provide energy. Although the energy consumption is very low, the batteries in these terminals will be exhausted in a few years at most. In this way, at least a lot of manpower is required to replace the battery. And some industrial scenarios are too dangerous and are not suitable for manual operation at all. Based on this, battery-free IoT terminals came into being.
- RFID Radio Frequency Identification
- Transplanting communication systems such as RFID into 3GPP's cellular networks can effectively solve the coverage problem.
- the deployed cellular networks such as 4G and 5G
- the advantage of full coverage is that the communication or positioning process between the IoT terminal and the network does not require human intervention, so it can work 24 hours a day, 7 days a week, and the work efficiency is high. It can even work efficiently in environments that are not suitable for human intervention (such as wilderness, mines, and factories). In this way, except for the initial need to associate the IoT terminal with a specific object, subsequent data reading, writing, and operation and maintenance can be operated through an APP on a smartphone, which is very convenient and efficient.
- A-IoT communication uses energy harvesting and backscattering communication technology.
- the A-IoT communication network consists of network equipment and A-IoT terminals (also called A-IoT devices, zero-power terminals, electronic tags, tags).
- Figure 3 shows a schematic diagram of the basic structure of the A-IoT communication system.
- the network equipment is used to send wireless power supply signals, downlink communication signals, and backscatter signals for receiving tags to the tags.
- a basic tag includes an energy harvesting module, a backscattering communication module, and a low-power computing module.
- the tag may also have a memory or sensor for storing some basic information (such as item identification, etc.) or obtaining sensor data such as ambient temperature and ambient humidity.
- inventory refers to checking for missing goods when goods enter and leave the warehouse.
- sensors include temperature, pressure, humidity and other sensors, which are used in industry, agriculture and smart cities.
- the sensor information is uploaded to a third-party app through the A-IoT system for monitoring and management.
- Tracking generally refers to obtaining the approximate location of an object at irregular intervals. For example, users can basically understand the location of their express delivery in real time through a smartphone.
- Command refers to the operation of a certain servo mechanism through the A-IoT communication system, and these servo mechanisms are connected to the A-IoT terminal. For example, during a break in the office, water the flowers and plants in the backyard through a mobile phone app, and the watering servo mechanism is connected to an A-IoT terminal.
- FIGS 4A to 4D show schematic diagrams of four topological network structures.
- the A-IoT terminal can be connected to a network device for two-way communication.
- the A-IoT terminal can be connected to an intermediate node for two-way communication, and the intermediate node is connected to a network device for two-way communication; optionally, the intermediate node can be a UE, which is connected to the network device for communication through a Uu interface.
- the A-IoT terminal can receive a power supply signal/downlink communication signal sent by an auxiliary node, and send an uplink signal to the network device; optionally, the auxiliary node can be a UE, which is connected to the network device for communication through a Uu interface. As shown in Figure 4D, the A-IoT terminal can be connected to a UE for two-way communication.
- A-IoT terminal comes from the surrounding environment, such as radio waves (RF), solar energy, thermal energy, mechanical vibration, wind energy, etc.
- RF radio waves
- type A and B terminals can only communicate by reflecting and modulating the received radio waves. This communication method is called backscattering, which means that they cannot actively send radio signals.
- Their power is within the range of 1 to 10 microwatts (uW).
- uW microwatts
- the transmission power of type A terminals is the lowest and the hardware complexity is the lowest, which is basically close to the level of RFID terminals.
- Type B is slightly more complex, such as having signal amplifier devices and certain energy storage devices, so the communication distance with the network can be farther than that of type A.
- Type C has the ability to actively send radio waves, with a transmission power of about 1 to 10 milliwatts (mW), and can store a certain amount of energy. All three types of terminals can obtain energy from the environment and can work continuously for several years or more than 10 years. In order to save energy, type A and B terminals are basically in a dormant state before the network triggers the communication process. It will only wake up and work when stimulated by the wireless signal of the network.
- A-IoT receivers can be divided into two categories:
- Receiver type 1 wideband receiver.
- This type of receiver is also called an RF receiver. It uses an RF bandpass filter to obtain the signal within the bandwidth to be received, and then performs envelope detection and subsequent baseband processing.
- the structure of this architecture is the simplest, and its power consumption can be as low as several uW or even lower.
- the receiver due to the poor accuracy of the RF bandpass filter, even when the target signal occupies a narrow bandwidth, the receiver often receives signals within a wider bandwidth. Therefore, more noise and interference are introduced in the reception process, and the receiver performance is poor, that is, its sensitivity is poor.
- Figure 5A is a block diagram of a typical wideband receiver.
- Receiver type 2 narrowband receiver.
- Typical examples include intermediate frequency receivers or zero intermediate frequency receivers.
- the RF signal is down-converted and the baseband signal is further filtered using a low-pass filter to eliminate noise and interference. Therefore, the receiver has a narrow receiving bandwidth and high receiving performance, i.e., receiver sensitivity.
- the receiver requires the use of an LO (Local oscillator). Even the recommended LO consumes 100uW or even more power. Therefore, the power consumption of the receiver is relatively high, but because its absolute power consumption is very low, it is still suitable for use in zero-power devices.
- Figure 5B is a block diagram of a typical intermediate frequency receiver.
- type A terminals usually use broadband receivers
- type C terminals usually use narrowband receivers
- type B terminals may use one or both types of receivers.
- FIG. 6 is a schematic diagram of an application scenario of an embodiment of the present application. As shown in Figure 6, a tag is likely to be between the coverage ranges of different readers.
- A-IoT system usually requires a large number of tags to access the system in a short period of time.
- the frequency resources used by different readers are often the same, and similar or identical methods are adopted in channelization.
- the number of channels on a carrier is also limited.
- a tag responds to a reader's trigger message and starts the initial access process, the message it sends can be easily received by multiple adjacent readers.
- signals sent from different readers can be easily received by the same tag. This problem generally does not exist in LTE/NR systems. This is because in broadband systems, even if the carriers used by adjacent base stations are the same, the PRACH resources used for initial access can easily be staggered in the time and frequency domain.
- FIG7 is a schematic flow chart of an access method according to an embodiment of the present application.
- the method may optionally be applied to the network shown in FIG4A to FIG4C , but is not limited thereto.
- the method includes:
- the first device After sending a first access message to at least one second device, the first device receives a response message to the first access message sent by a target device in at least one second device; wherein the response message includes a first parameter of the target device, and the first parameter is used to identify the target device in the at least one second device;
- the first device sends a second access message to at least one second device; wherein the second access message includes a first parameter.
- the first device may be a terminal device.
- the first device may be an IoT terminal, such as an A-IoT device, a zero-power terminal, or an electronic tag.
- the second device may be a node in the system/network.
- the second device may be a node for communicating with the first device.
- the node may be a terminal device, a network device, or a node (power supply node) that provides backscattered radio waves separately.
- the second device may be a network device (e.g., a base station) shown in FIG. 4A, an intermediate node shown in FIG. 4B, an auxiliary node shown in FIG. 4C, or a UE shown in FIG. 4D.
- the embodiment of the present application does not limit the topological structure in the network, and therefore, the second device is not limited to the above-mentioned various forms, and the second device may include any form of node capable of performing point-to-point communication with the first device.
- the above access method can be applied to a scenario where the first device may be within the coverage of multiple second devices, such as the scenario shown in FIG6, and can solve the conflict problem between multiple second devices.
- the first access message sent by the first device may be received by one or more second devices.
- Each second device can send a response message. Since the distances between each second device and the first device may be different, the first device may not be able to correctly receive the response message of each second device.
- the second device When the first device receives a response message from one of the second devices (at this time, the response messages of other second devices are interference signals), the second device is the target device, and the first device can compile the first parameter of the target device into the second access message and send it, so that each second device that receives the second access message can determine how to process the second access message by comparing its own first parameter and the first parameter in the second access message, thereby solving the interference/conflict between multiple second devices. It can be understood that in actual applications, the target device is generally the second device that is closest to the first device.
- the first parameter is introduced in the embodiment of the present application to distinguish different second devices, that is, to identify a specific second device in at least one second device.
- the first parameter can be called an RCC (Reader Color Code) parameter.
- RCC Reader Color Code
- the first device will establish a wireless link with the closest second device, which helps to ensure the performance of the initial access and subsequent communication processes.
- FIG8 is a schematic flow chart of an access method according to another embodiment of the present application.
- the method includes:
- the second device receives a first access message from the first device.
- the second device sends a response message to the first access message to the first device; wherein the response message includes a first parameter of the second device, and the first parameter is used to identify the second device; and the response message is used to trigger the sending of the second access message;
- the second device receives a second access message from the first device, and determines that the first device is accessed when the second access message includes the first parameter and the first identifier of the first device.
- the second device may determine whether the second access message is used to access the second device based on whether the second access message includes the first parameter of the second device, in other words, determine whether the second device is the target device for initial access.
- the second device may determine that the first device corresponding to the first identifier is accessing based on the first identifier in the second access message.
- each second device can determine whether the first device is connected according to the second access message, thereby distinguishing the second devices connected during the initial access process and resolving conflicts between different second devices.
- the second access message is also used to instruct other second devices other than the target device to release the context related to the first device.
- the access method may also include:
- the second device releases the context related to the first device.
- the second device can determine that the second access message is not used to access the second device. In this way, the relevant context can be released, and then the context related to the first device can be released according to the first identifier in the second access message.
- the first parameter of the target device is unique within a global scope or a local scope of the communication system.
- the first parameter of the target device is unique in the global scope of the communication system, that is, the first parameter of the target device is different from the first parameter of any other second device in the global scope of the communication system.
- the first parameter of the second device is also unique in the global scope of the communication system. In this way, the target device can be distinguished from other second devices in the global scope to ensure conflict resolution.
- the first parameter of the target device is unique within the local scope of the communication system, that is, the first parameter of the target device is different from the first parameter of any other second device in the communication system.
- the first parameter of the second device is unique within the local scope of the communication system.
- FIG9 is a schematic diagram of the allocation method of the first parameter in an application example, in which a hexagon represents the range that a second device can cover, and the 3-bit information (000, 001, 010, 011, 100, 101, 110) in the hexagon is the first parameter of the second device represented by the hexagon.
- the first parameters of each second device are different from each other, that is, each second device is unique within the local range of the 7 hexagons. Since the interference in the communication system is related to the distance between the devices, when the distance between different second devices increases, the possibility of conflict decreases. Therefore, the first parameter of the second device is unique within the local range of the communication system, and can distinguish the target device from other second devices within the local range. At the same time, devices that are farther away will not conflict with the target device, so conflict resolution can also be achieved.
- the number of bits of the first parameter of the target device or the second device is related to the number of second devices in the global scope or the local scope of the communication system.
- the number of bits of the first parameter is related to the number of second devices in the global scope. If the first parameter is unique in the local scope, the number of bits of the first parameter is related to the number of second devices in the local scope.
- the number of bits of the first parameter increases or remains unchanged.
- the number of second devices in a local range varies according to different application scenarios, so the number of bits or the bit length of the first parameter in different application scenarios can be set differently.
- a 3-bit first parameter can be used.
- some scenarios may be relatively simple.
- the first parameter of the reader can be 2 bits or even 1 bit.
- the distribution of readers may be relatively dense, so the first parameter of the reader may require 4 bits.
- the number of bits of the first parameter varies with the second device. If the number of devices increases or remains unchanged, it can be ensured that a unique first parameter within a local range is allocated to each second device within an appropriate bit length.
- a message includes a first parameter, and specifically, the first parameter may be compiled in the information of the physical layer or compiled in the L2 (Layer 2, layer 2) message, such as compiled in the MAC layer or the RRC layer.
- the first parameter may appear alone as a parameter in the message, or may be compiled in the message together with other parameters.
- the first access message includes a first identifier of the first device.
- the first device sends a second access message to at least one second device, including: the first device sends the second access message to at least one second device when the first identifier in the response message is the same as the first identifier of the first device; wherein the second access message also includes the first identifier of the first device, and the first identifier in the second access message is used by the target device to determine conflict resolution.
- a response message sent after receiving the first access message includes the first identifier of the first device, and the first identifier of the first device is determined based on the first access message.
- the access method also includes: the second device determines the conflict resolution of the access of the first device when the second access message includes the first parameter of the second device and the first identifier of the first device.
- the first device carries its own first identifier when sending a first access message; at least one second device receives the first access message, and then each second device carries the first identifier of the first device in a response message; when the first device includes its own first identifier in the response message, it can be considered that in this initial access, the conflict between the first device and the other device (such as the IoT terminal) has been resolved, and the first device sends a second access message at this time to enable the second device to determine that the conflict with the other second device has been resolved.
- the conflict between the first device and the other device such as the IoT terminal
- the response message received by the first device includes the second identifier assigned by the target device to the first device.
- the second identifier is used for message addressing after access. It can be understood that the response message sent by any second device includes the second identifier assigned by the second device to the first device.
- the second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.
- the uplink message content that the first device needs to send can be carried by the first access message, or compiled in the first access message.
- the uplink message content that the first device needs to send has been sent to the second device through the first access message, and there will be no subsequent process.
- the second identifier may not be included in the response message, that is, the second device does not need to allocate the second identifier to the first device.
- the second identifier in the response message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the response message is determined based on at least the first parameter of the second device.
- the second identifier assigned to the second device with different first parameters must be different. Therefore, the above embodiment is conducive to achieving the second identifier being unique within the local range of the communication system, rather than being unique only within multiple first devices that simultaneously access the target device, thereby avoiding problems with message addressing between the first device and the target device after initial access.
- the first identifier of the first device may be determined based on a random number.
- the access method may further include: the first device determines the first identifier of the first device based on the random number. For example, the first device may use the currently generated random number as the first identifier of the first device.
- FIG10 is a schematic diagram of an application example 1 of the access method of an embodiment of the present application.
- the distance between the tag and reader B is smaller than the distance between the tag and reader A.
- the access method includes the following steps:
- Step 1 After receiving the broadcast message triggering inventory from reader A, the tag triggers the initial access process. Specifically, the tag sends message A (msgA, first access message), which contains at least a tag-id (first identifier), which can be a random number generated internally.
- message A msgA, first access message
- Step 2 Both reader A and reader B receive msgA, and each sends a response message, which is message B (msgB, a response message to the first access message).
- msgB contains at least tag-id, Tag-RNTI (second identifier) assigned to the tag by the reader, and RCC parameter (first parameter) of the reader. Since reader B is closer to reader A, when the two msgBs are received by the tag, the msgB from reader B has a higher signal strength, so the tag decodes the msgB from reader B. The msgB from reader A is an interference signal. The tag finds that the tag-id contained in msgB is equal to the tag-id it sent, and believes that the conflict of this initial access (the conflict between tags in the reader) has been resolved.
- Step 3 The tag sends message C (msgC, the second access message).
- msgC includes at least the tag-id and the RCC parameters of reader B.
- Step 4 After reader A receives msgC, it finds that the RCC parameters contained in the message are different from its own RCC parameters, so it releases the local context related to the tag. After reader B receives msgC, it finds that the RCC parameters contained in the message are equal to its own RCC parameters, and it believes that the conflict between readers has been resolved.
- the tag does not know which reader is closer before the process starts. After the tag receives the response message to its first message, the feedback signal of the reader that is closer is usually stronger (higher SINR), and the message with a stronger signal can be decoded correctly, while the message with a weaker signal will be regarded as an interference signal. Therefore, in this way, the tag will establish a wireless link with the closest reader, which helps to ensure the performance of the initial access and subsequent communication process.
- the second access message also includes the first identifier of the first device; the first parameter in the second access message is used by the target device to determine the conflict resolution to trigger the target device to send an access confirmation message.
- the first device carries the first identifier of the first device and the first parameter of the target device in the second access message, so that the target device determines the conflict resolution with other second devices based on the first parameter, and sends an access confirmation message for the first device according to the first identifier.
- the access method further includes: after sending the second access message, the first device receives an access confirmation message, and when the access confirmation message includes the first identifier of the first device, determining that the initial access is successful.
- the access method also includes: the second device sends an access confirmation message when the second access message includes the first parameter of the second device; wherein the access confirmation message includes the first identifier of the first device, and the first identifier of the first device is determined based on the second access message; the access confirmation message is used by the first device to determine that the initial access is successful.
- the second device carries the first identifier of the first device in the access confirmation message, so that the first device confirms that the conflict between it and other devices has been resolved, thereby determining that the initial access is successful.
- the access confirmation message received by the first device includes a second identifier assigned by the target device to the first device, and the second identifier is used for message addressing after access. That is, when the second access message of the second device includes its own first parameter, the access confirmation message sent by the second device includes the second identifier assigned by the second device to the first device.
- the second identifier can be used in subsequent processes, that is, the second identifier is used in subsequent processes to distinguish the first device from other devices.
- the uplink message content that the first device needs to send can be carried by the second access message, or compiled in the second access message.
- the uplink message content that the first device needs to send has been sent to the second device through the second access message, and there will be no subsequent process.
- the access confirmation message may not include the second identifier, that is, the second device does not need to allocate the second identifier to the first device.
- the second identifier in the access confirmation message received by the first device is determined based on at least the first parameter of the target device. That is, for any second device, the second identifier allocated to the first device in the access confirmation message is determined based on at least the first parameter of the second device.
- the second identifiers allocated to the second devices with different first parameters are definitely different. Therefore, the above embodiment is conducive to achieving the second identifier being unique in the local range of the communication system, rather than being unique only in multiple first devices that simultaneously access the target device, thereby avoiding the first device and the target device being unique after the initial access. There is a problem with message addressing between target devices.
- the first identifier of the first device may be determined based on a random number.
- the access method may further include: the first device determines the first identifier of the first device based on the random number. For example, the first device may use the currently generated random number as the first identifier of the first device.
- FIG11 is a schematic diagram of application example 2 of the access method of an embodiment of the present application.
- the distance between the tag and reader B is smaller than the distance between the tag and reader A.
- the access method includes the following steps:
- Step 1 After receiving the broadcast message from reader A triggering the inventory, the tag triggers the initial access process. Specifically, the tag sends message 1 (msg1, the first access message), which contains a randomly selected preamble. A sequence is modulated on the preamble. The number of these sequences is limited, for example, there are 16 in total, and each sequence has a fixed serial number.
- the reader can demodulate preambles of different sequences. If preamblers modulated with the same sequence are received from different tags, the reader cannot distinguish between different tags, and may demodulate them as one preamble.
- Step 2 After receiving the preamble, reader A and reader B send message 2 (msg2, a response message to the first access message) respectively.
- msg2 includes at least the preamble index (the sequence number/index of the preamble code) and the RCC parameter of the reader (the first parameter). Since the signal strength of msg2 from reader B is relatively high, the tag finally decodes msg2 from reader B correctly. The msg2 from reader A becomes an interference signal.
- Step 3 After receiving the preamble index, the tag will compare it with the index of the preamble it just sent. If the two indexes are the same, the tag will send message 3 (msg3, the second access message) containing at least the tag-id (first identifier) and the RCC parameters to the reader; otherwise, it is considered that the initial access has failed.
- the tag-id can be a random number generated by the tag itself.
- Step 4 Reader A finds that the RCC in the received msg3 is not equal to its own RCC, so it considers that the initial access process has ended and releases the tag context.
- Reader B finds that the RCC in msg3 is equal to its own RCC, and feeds back a message 4 (msg4, access confirmation message) containing at least the received tag-id and the identifier Tag-RNTI (second identifier) assigned to the tag. After the tag receives this message, if it finds that the received tag-id is equal to the one it sent, it considers that the initial access has been successful, and uses the received Tag-RNTI as its own identifier for subsequent processes.
- msg4 access confirmation message
- the tag does not know which reader is closer before the process starts. After the tag receives the response message to its first message, the feedback signal of the reader that is closer is usually stronger (higher SINR), and the message with a stronger signal can be decoded correctly, while the message with a weaker signal will be regarded as an interference signal. Therefore, in this way, the tag will establish a wireless link with the closest reader, which helps to ensure the performance of the initial access and subsequent communication process.
- FIG12 is a schematic block diagram of a first device 1200 according to an embodiment of the present application.
- the first device 1200 may include:
- the first communication module 1210 is configured to receive a response message to the first access message sent by a target device in the at least one second device after sending the first access message to the at least one second device; wherein the response message includes a first parameter of the target device, and the first parameter is used to identify the target device in the at least one second device;
- the first communication module 1210 is further configured to send a second access message to at least one second device, wherein the second access message includes the first parameter.
- the first parameter of the target device is unique in a global scope or a local scope of the communication system.
- the number of bits of the first parameter of the target device is related to the number of second devices in the global scope or the local scope of the communication system.
- the second access message is further used to instruct other second devices except the target device to release the context related to the first device.
- the first access message includes a first identifier of the first device
- the first communication module 1210 is also used to send a second access message when the first identifier in the response message is the same as the first identifier of the first device; wherein the second access message also includes the first identifier of the first device, and the first identifier in the second access message is used by the target device to determine conflict resolution.
- the response message further includes a second identifier allocated by the target device to the first device, and the second identifier is used for message addressing after access.
- the second access message further includes a first identifier of the first device; and the first parameter in the second access message is used by the target device to determine a conflict resolution to trigger the target device to send an access confirmation message.
- the first communication module 1210 is further configured to receive an access confirmation message after sending the second access message; as shown in FIG. 13 , the first device 1200 further includes a first processing module 1310, and the first processing module 1310 is configured to:
- the access confirmation message includes the first identifier of the first device, it is determined that the initial access is successful.
- the access confirmation message includes a second identifier allocated by the target device to the first device, and the second identifier is used for message addressing after access.
- the second identifier is determined based on at least a first parameter of the second device.
- the first identifier of the first device is determined based on a random number.
- the first device 1200 of the embodiment of the present application can implement the corresponding functions of the first device in the aforementioned method embodiment.
- the processes, functions, implementation methods and beneficial effects corresponding to the various modules (sub-modules, units or components, etc.) in the first device 1200 can be found in the corresponding descriptions in the above method embodiments, which will not be repeated here.
- the functions described by the various modules (sub-modules, units or components, etc.) in the first device 1200 of the embodiment of the application can be implemented by different modules (sub-modules, units or components, etc.) or by the same module (sub-module, unit or component, etc.).
- FIG14 is a schematic block diagram of a second device 1400 according to an embodiment of the present application.
- the second device 1400 may include:
- the second communication module 1410 is configured to receive a first access message from the first device, send a response message to the first access message to the first device, and receive a second access message from the first device; wherein the response message includes a first parameter of the second device, and the first parameter is used to identify the second device; and the response message is used to trigger the sending of the second access message;
- the second processing module 1420 is configured to determine that the first device is accessed when the second access message includes the first parameter and the first identifier of the first device.
- the first parameter of the second device is unique in a global scope or a local scope of the communication system.
- the number of bits of the first parameter of the second device is related to the number of second devices in the global scope or the local scope of the communication system.
- the number of bits of the first parameter increases or remains unchanged.
- the second processing module 1420 is further configured to:
- the context related to the first device is released.
- the response message includes a first identifier of the first device, where the first identifier of the first device is determined based on the first access message;
- the second processing module 1420 is further configured to:
- conflict resolution for access of the first device is determined.
- the response message includes a second identifier allocated by the second device to the first device, and the second identifier is used for message addressing after access.
- the second communication module 1410 is further configured to:
- an access confirmation message is sent to the first device; wherein the access confirmation message includes the first identifier of the first device, and the first identifier of the first device is determined based on the second access message; the access confirmation message is used by the first device to determine that the initial access is successful.
- the access confirmation message includes a second identifier allocated by the second device to the first device, and the second identifier is used for message addressing after access.
- the second identifier is determined based on at least a first parameter of the second device.
- the first identifier of the first device is determined based on a random number.
- the second device 1400 of the embodiment of the present application can implement the corresponding functions of the second device in the aforementioned method embodiment.
- the processes, functions, implementation methods and beneficial effects corresponding to the various modules (sub-modules, units or components, etc.) in the second device 1400 can be found in the corresponding descriptions in the above method embodiments, which will not be repeated here.
- the functions described by the various modules (sub-modules, units or components, etc.) in the second device 1400 of the application embodiment can be implemented by different modules (sub-modules, units or components, etc.) or by the same module (sub-module, unit or component, etc.).
- Fig. 15 is a schematic structural diagram of a communication device 1500 according to an embodiment of the present application.
- the communication device 1500 includes a processor 1510, and the processor 1510 can call and run a computer program from a memory to enable the communication device 1500 to implement the method in the embodiment of the present application.
- the communication device 1500 may further include a memory 1520.
- the processor 1510 may call and run a computer program from the memory 1520 to enable the communication device 1500 to implement the method in the embodiment of the present application.
- the memory 1520 may be a separate device independent of the processor 1510 , or may be integrated into the processor 1510 .
- the communication device 1500 may further include a transceiver 1530 , and the processor 1510 may control the transceiver 1530 to communicate with other devices, specifically, may send information or data to other devices, or receive information or data sent by other devices.
- the transceiver 1530 may include a transmitter and a receiver.
- the transceiver 1530 may further include an antenna, and the number of antennas may be one or more.
- the communication device 1500 may be the first device of the embodiment of the present application, and the communication device 1500 may implement the corresponding processes implemented by the first device in each method of the embodiment of the present application, which will not be described again for the sake of brevity.
- the communication device 1500 may be the second device of the embodiment of the present application, and the communication device 1500 may implement the corresponding processes implemented by the second device in each method of the embodiment of the present application, which will not be described again for the sake of brevity.
- Fig. 16 is a schematic structural diagram of a chip 1600 according to an embodiment of the present application.
- the chip 1600 includes a processor 1610, and the processor 1610 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
- the chip 1600 may further include a memory 1620.
- the processor 1610 may call and run a computer program from the memory 1620 to implement the method executed by the first device or the second device in the embodiment of the present application.
- the memory 1620 may be a separate device independent of the processor 1610 , or may be integrated into the processor 1610 .
- the chip 1600 may further include an input interface 1630.
- the processor 1610 may control the input interface 1630 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
- the chip 1600 may further include an output interface 1640.
- the processor 1610 may The output interface 1640 is controlled to communicate with other devices or chips. Specifically, information or data can be output to other devices or chips.
- the chip can be applied to the first device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the first device in each method of the embodiments of the present application. For the sake of brevity, they will not be repeated here.
- the chip can be applied to the second device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the second device in each method of the embodiments of the present application. For the sake of brevity, they will not be repeated here.
- the chips applied to the first device and the second device may be the same chip or different chips.
- the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
- the processor mentioned above may be a general-purpose processor, a digital signal processor (DSP), a field programmable gate array (FPGA), an application specific integrated circuit (ASIC) or other programmable logic devices, transistor logic devices, discrete hardware components, etc.
- DSP digital signal processor
- FPGA field programmable gate array
- ASIC application specific integrated circuit
- the general-purpose processor mentioned above may be a microprocessor or any conventional processor, etc.
- the memory mentioned above may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memories.
- the non-volatile memory may be a read-only memory (ROM), a programmable ROM (PROM), an erasable programmable ROM (EPROM), an electrically erasable programmable ROM (EEPROM) or a flash memory.
- the volatile memory may be a random access memory (RAM).
- the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
- FIG17 is a schematic block diagram of a communication system 1700 according to an embodiment of the present application.
- the communication system 1700 includes a first device 1710 and a second device 1720 .
- the first device 1710 After sending the first access message, the first device 1710 receives a response message to the first access message; wherein the response message includes a first parameter of a target device, the target device is the second device 1720 that sends the response message, and the first parameter is used to identify the target device in at least one second device 1720;
- the first device 1710 sends a second access message, wherein the second access message includes a first parameter.
- the second device 1720 receives the first access message
- the second device 1720 sends a response message to the first access message; wherein the response message includes a first parameter of the second device 1720, and the first parameter is used to identify the second device 1720; the response message is used to trigger the sending of the second access message;
- the second device 1720 receives the second access message, and determines that the first device 1710 is accessed when the second access message includes the first parameter and the first identifier of the first device 1710 .
- the first device 1710 may be used to implement the corresponding function implemented by the first device in the above method
- the second device 1720 may be used to implement the corresponding function implemented by the second device in the above method.
- the sake of brevity it will not be described here.
- all or part of the embodiments may be implemented by software, hardware, firmware, or any combination thereof.
- all or part of the embodiments may be implemented in the form of a computer program product.
- the computer program product includes one or more computer instructions.
- the computer program instructions When the computer program instructions are loaded and executed on a computer, all or part of the embodiments may be implemented by software, hardware, firmware, or any combination thereof.
- the process or function in accordance with the embodiment of the present application is generated separately.
- the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
- the computer instruction can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer instruction can be transmitted from a website site, a computer, a server or a data center by wired (for example, coaxial cable, optical fiber, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (for example, infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
- the computer-readable storage medium can be any available medium that a computer can access or a data storage device such as a server, a data center, etc. that includes one or more available media integrations.
- the available medium can be a magnetic medium, (for example, a floppy disk, a hard disk, a tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid-state drive (Solid State Disk, SSD)), etc.
- a magnetic medium for example, a floppy disk, a hard disk, a tape
- an optical medium for example, a DVD
- a semiconductor medium for example, a solid-state drive (Solid State Disk, SSD)
- the size of the serial numbers of the above-mentioned processes does not mean the order of execution.
- the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente demande porte sur un procédé d'accès, un premier dispositif, un second dispositif, une puce, un support de stockage lisible par ordinateur, un produit programme d'ordinateur, un programme informatique, et un système de communication. Le procédé d'accès comprend : lors de l'envoi d'un premier message d'accès à au moins un second dispositif, un premier dispositif reçoit un message de réponse, en réponse au premier message d'accès envoyé par un dispositif cible parmi le ou les seconds dispositifs, le message de réponse comprenant un premier paramètre du dispositif cible, le premier paramètre étant utilisé pour identifier le dispositif cible parmi le ou les second dispositifs ; et le premier dispositif envoie un second message d'accès au ou aux second dispositifs, le second message d'accès comprenant le premier paramètre. Des modes de réalisation de la présente demande réalisent la distinction de seconds dispositifs accédés pendant un accès initial, et résolvent le conflit entre différents second dispositifs.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/136567 WO2025118160A1 (fr) | 2023-12-05 | 2023-12-05 | Procédé d'accès, premier dispositif et second dispositif |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/136567 WO2025118160A1 (fr) | 2023-12-05 | 2023-12-05 | Procédé d'accès, premier dispositif et second dispositif |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025118160A1 true WO2025118160A1 (fr) | 2025-06-12 |
Family
ID=95981360
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2023/136567 Pending WO2025118160A1 (fr) | 2023-12-05 | 2023-12-05 | Procédé d'accès, premier dispositif et second dispositif |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2025118160A1 (fr) |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180035466A1 (en) * | 2015-03-05 | 2018-02-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Network node, a wireless device and methods therein for performing random access in a cell |
| US20210100027A1 (en) * | 2019-09-26 | 2021-04-01 | Qualcomm Incorporated | Techniques for performing sidelink discovery in wireless communications |
| WO2022116809A1 (fr) * | 2020-12-04 | 2022-06-09 | 华为技术有限公司 | Procédé, appareil et système d'accès aléatoire |
| CN115884335A (zh) * | 2022-11-28 | 2023-03-31 | 深圳艾灵网络有限公司 | 无源物联网终端通信方法、通信设备及存储介质 |
| WO2023173439A1 (fr) * | 2022-03-18 | 2023-09-21 | Oppo广东移动通信有限公司 | Procédé de communication, dispositif terminal et dispositif réseau |
| CN117063597A (zh) * | 2021-02-08 | 2023-11-14 | 交互数字专利控股公司 | 零能耗空中接口的随机信道接入的方法和装置 |
-
2023
- 2023-12-05 WO PCT/CN2023/136567 patent/WO2025118160A1/fr active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180035466A1 (en) * | 2015-03-05 | 2018-02-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Network node, a wireless device and methods therein for performing random access in a cell |
| US20210100027A1 (en) * | 2019-09-26 | 2021-04-01 | Qualcomm Incorporated | Techniques for performing sidelink discovery in wireless communications |
| WO2022116809A1 (fr) * | 2020-12-04 | 2022-06-09 | 华为技术有限公司 | Procédé, appareil et système d'accès aléatoire |
| CN117063597A (zh) * | 2021-02-08 | 2023-11-14 | 交互数字专利控股公司 | 零能耗空中接口的随机信道接入的方法和装置 |
| WO2023173439A1 (fr) * | 2022-03-18 | 2023-09-21 | Oppo广东移动通信有限公司 | Procédé de communication, dispositif terminal et dispositif réseau |
| CN115884335A (zh) * | 2022-11-28 | 2023-03-31 | 深圳艾灵网络有限公司 | 无源物联网终端通信方法、通信设备及存储介质 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR102733153B1 (ko) | 무선 단말, 무선 액세스 네트워크 노드, 및 이들의 방법 | |
| WO2021253412A1 (fr) | Procédé de communication sans fil et dispositif terminal | |
| CN118661457A (zh) | 反向散射通信的方法及设备 | |
| US20240365401A1 (en) | Wireless communication method and terminal device | |
| US20250024375A1 (en) | Communication method, terminal device and network device | |
| WO2024082205A1 (fr) | Techniques de déclenchement de procédures d'accès aléatoire au niveau de dispositifs passifs | |
| US20240313882A1 (en) | Wireless communication method, terminal device, and network device | |
| US20240276466A1 (en) | Communication method and system, and related apparatus | |
| CN120615326A (zh) | 指示方法、设备、系统、存储介质及程序产品 | |
| WO2022247578A1 (fr) | Procédé de transmission de données et appareil de communication | |
| CN116803141A (zh) | 无线通信的方法、终端设备和网络设备 | |
| WO2023173379A1 (fr) | Procédés de transmission de données, premier dispositif et second dispositif | |
| US20250219775A1 (en) | Systems and methods for performing ambient-internet-of-things (a-iot) based communications | |
| WO2025118160A1 (fr) | Procédé d'accès, premier dispositif et second dispositif | |
| WO2022183406A1 (fr) | Procédé de transmission de canal de données, dispositif de terminal, et périphérique de réseau | |
| WO2025118159A1 (fr) | Procédé de traitement de signal, premier dispositif et second dispositif | |
| US20230363053A1 (en) | Method for sidelink communication, terminal device, non-transitory computer-readable storage medium | |
| WO2025102253A9 (fr) | Procédé, appareil, dispositif de transmission de canal, et support de stockage | |
| WO2025107313A1 (fr) | Procédé de communication sans fil et dispositif de communication | |
| WO2016033778A1 (fr) | Procédé et dispositif de transmission de temporisation | |
| CN119586300A (zh) | 无线通信的方法及装置 | |
| WO2023159484A1 (fr) | Procédé d'interception de canal et dispositif de communication | |
| WO2024011396A1 (fr) | Procédé de communication sans fil, dispositif de terminal et dispositif de réseau | |
| WO2025118137A1 (fr) | Procédé de communication et dispositif de communication sans fil | |
| WO2025118135A1 (fr) | Procédé de communication sans fil et dispositif de communication |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23960474 Country of ref document: EP Kind code of ref document: A1 |