WO2025118135A1 - Wireless communication method and communication device - Google Patents
Wireless communication method and communication device Download PDFInfo
- Publication number
- WO2025118135A1 WO2025118135A1 PCT/CN2023/136415 CN2023136415W WO2025118135A1 WO 2025118135 A1 WO2025118135 A1 WO 2025118135A1 CN 2023136415 W CN2023136415 W CN 2023136415W WO 2025118135 A1 WO2025118135 A1 WO 2025118135A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- time domain
- information
- time
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
Definitions
- the present application relates to the field of communication technology, and more specifically, to a wireless communication method and communication device.
- the traditional random access process is too complicated and may cause the terminal device to consume more power.
- low-capability terminal devices for example, the electronic tags mentioned above
- the communication methods supported by this type of terminal device may be simpler.
- this type of terminal device still uses the traditional random access method to access the network device, the power consumption of the terminal device may increase.
- the present application provides a wireless communication method and a communication device.
- the following introduces various aspects involved in the present application.
- a method for wireless communication comprising: a first terminal device sends a preamble code to a target device; the first terminal device receives a first index sent by the target device, the first index being used to indicate the preamble code received by the target device; in response to the first index being the same as the index of the preamble code, the first terminal device sends a first terminal device identifier to the target device; the first terminal device receives first information sent by the target device, the first information including the terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
- a random access method comprising: a target device receives a preamble code sent by a first terminal device; the target device sends a first index to the first terminal device, the first index being used to indicate the preamble code received by a network device; the target device receives a terminal device identification sent by the terminal device; the target device sends first information to the terminal device, the first information including the terminal device identification received by the target device; wherein the target device includes a network device and/or a second terminal device.
- a terminal device which is a first terminal device, comprising: a sending unit, configured to send a preamble code to a target device; a receiving unit, configured to receive a first index sent by the target device, wherein the first index is used to indicate the preamble code received by the target device; the sending unit, configured to send a first terminal device identifier to the target device in response to the first index being the same as the index of the preamble code; the receiving unit, configured to receive first information sent by the target device, wherein the first information includes the terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
- a communication device which is a target device, comprising: a receiving unit, used to receive a preamble code sent by a first terminal device; a sending unit, used to send a first index to the first terminal device, the first index being used to indicate the preamble code received by a network device; the receiving unit, used to receive a terminal device identifier sent by the terminal device; the sending unit, used to send first information to the terminal device, the first information including the terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
- a terminal device comprising a processor, a memory and a communication interface, wherein the memory is used to store one or more computer programs, and the processor is used to call the computer programs in the memory so that the terminal device executes part or all of the steps in the method of the first aspect.
- a communication device comprising a processor, a memory, and a transceiver, wherein the memory is used to store one or more computer programs, and the processor is used to call the computer programs in the memory so that the communication device executes part or all of the steps in the method of the second aspect.
- an embodiment of the present application provides a communication system, which includes the above-mentioned terminal device and/or communication device.
- the system may also include other devices that interact with the terminal device or network device in the solution provided by the embodiment of the present application.
- an embodiment of the present application provides a computer-readable storage medium, which stores a computer program, and the computer program enables a communication device (for example, a terminal device or a communication device) to perform some or all of the steps in the methods of the above aspects.
- a communication device for example, a terminal device or a communication device
- an embodiment of the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to enable a communication device (e.g., a terminal device or a communication device) to perform some or all of the steps in the above-mentioned various aspects of the method.
- the computer program product can be a software installation package.
- an embodiment of the present application provides a chip, which includes a memory and a processor.
- the processor can call and run a computer program from the memory to implement some or all of the steps described in the methods of the above aspects.
- the first terminal device can perform a random access process based on the first terminal device identifier. For the random access process, it helps to reduce the power consumption of terminal devices during random access.
- FIG. 1 is a wireless communication system 100 to which an embodiment of the present application is applied.
- FIG. 2A is a schematic diagram of a conventional four-step random access process.
- FIG. 2B is a flow chart of a non-contention random access process.
- FIG. 2C is a schematic diagram of a conventional two-step random access process.
- FIG. 2D is a flow chart of another conventional two-step random access process.
- FIG3 is a schematic diagram of an A-IoT communication system applicable to an embodiment of the present application.
- 4A to 4D are schematic diagrams of four topological network structures of an A-IoT communication system applicable to embodiments of the present application.
- FIG5 is a schematic diagram of a receiving process of an RF receiver to which an embodiment of the present application is applicable.
- FIG6 is a schematic diagram of a receiving process of an intermediate frequency receiver applicable to an embodiment of the present application.
- FIG. 7 shows a schematic flow chart of the initial access process of radio frequency identification (RFID).
- RFID radio frequency identification
- FIG8 is a schematic flowchart of a wireless communication method according to an embodiment of the present application.
- FIG. 9 is a schematic diagram of a method for indicating a second time domain resource in an embodiment of the present application.
- FIG10 is a schematic diagram of time domain resources for sending a preamble code and time domain resources for sending a terminal device identifier in an embodiment of the present application.
- FIG. 11 is a schematic diagram illustrating a method for indicating a first time domain resource in an embodiment of the present application.
- FIG12 is a schematic flowchart of a random access method according to an embodiment of the present application.
- FIG13 is a schematic flowchart of a random access method according to another embodiment of the present application.
- FIG14 is a schematic flowchart of a random access method according to another embodiment of the present application.
- FIG15 is a schematic flowchart of a random access method according to another embodiment of the present application.
- FIG. 16 is a schematic diagram of a terminal device according to an embodiment of the present application.
- FIG. 17 is a schematic diagram of a communication device according to an embodiment of the present application.
- FIG. 18 is a schematic structural diagram of a communication device according to an embodiment of the present application.
- FIG1 is a wireless communication system 100 used in an embodiment of the present application.
- the wireless communication system 100 may include a network device 110 and a terminal device 120.
- the network device 110 may be a device that communicates with the terminal device 120.
- the network device 110 may provide communication coverage for a specific geographical area, and may communicate with the terminal device 120 located in the coverage area.
- FIG1 exemplarily shows a network device and two terminals.
- the wireless communication system 100 may include multiple network devices and each network device may include other number of terminal devices within its coverage area, which is not limited in the embodiments of the present application.
- the wireless communication system 100 may also include other network entities such as a network controller and a mobility management entity, which is not limited in the embodiments of the present application.
- network entities such as a network controller and a mobility management entity, which is not limited in the embodiments of the present application.
- the technical solutions of the embodiments of the present application can be applied to various communication systems, such as: the fifth generation (5th generation, 5G) system or new radio (new radio, NR), long term evolution (long term evolution, LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE time division duplex (time division duplex, TDD), etc.
- 5G fifth generation
- NR new radio
- long term evolution long term evolution
- LTE long term evolution
- LTE frequency division duplex frequency division duplex
- FDD frequency division duplex
- TDD time division duplex
- future communication systems such as the sixth generation mobile communication system, satellite communication system, etc.
- the terminal device in the embodiment of the present application may also be referred to as user equipment (UE), access terminal, user unit, user station, mobile station, mobile station (MS), mobile terminal (MT), remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device.
- the terminal device in the embodiment of the present application may be a device that provides voice and/or data connectivity to a user, and can be used to connect people, objects and machines, such as a handheld device with wireless connection function, a vehicle-mounted device, etc.
- the terminal device in the embodiment of the present application can be a mobile phone, a tablet computer, a laptop, a PDA, a mobile internet device (MID), a wearable device, a virtual reality (VR) device, an augmented reality (AR) device, a wireless terminal in industrial control, a wireless terminal in self-driving, a wireless terminal in remote medical surgery, a wireless terminal in smart grid, a wireless terminal in transportation safety, a wireless terminal in smart city, a wireless terminal in smart home, etc.
- the UE can be used to act as a base station.
- the UE can act as a scheduling entity that provides sidelink signals between UEs in V2X or D2D, etc.
- a cellular phone and a car communicate with each other using sidelink signals.
- the cellular phone and the smart home device communicate with each other without relaying the communication signal through the base station.
- the network device in the embodiment of the present application may be a device for communicating with a terminal device, and the network device may also be referred to as an access network device or a wireless access network device.
- the network device may be a base station.
- the network device in the embodiment of the present application may refer to a device that connects a terminal device to a wireless access network.
- a radio access network (RAN) node (or device) of a wireless network may be a radio access network (RAN) node (or device) of a wireless network.
- RAN radio access network
- a base station can broadly cover various names as follows, or be replaced with the following names, such as: NodeB, evolved NodeB (eNB), next generation NodeB (gNB), relay station, access point, transmitting point (TRP), transmitting point (TP), master station MeNB, secondary station SeNB, multi-standard radio (MSR) node, home base station, network controller, access node, wireless node, access point (AP), transmitting node, transceiver node, base band unit (BBU), remote radio unit (RRU), active antenna unit (AAU), remote radio head (RRH), central unit (CU), distributed unit (DU), positioning node, etc.
- a base station can be a macro base station, a micro base station, a relay node, a donor node or the like, or a combination thereof.
- the base station may also refer to a communication module, modem or chip used to be set in the aforementioned device or apparatus.
- the base station may also be a mobile switching center and a device to device D2D, vehicle-to-everything (V2X), machine-to-machine (M2M) communication device that performs the base station function, a network side device in a 6G network, and a device that performs the base station function in a future communication system.
- the base station may support networks with the same or different access technologies.
- the embodiments of the present application do not limit the specific technology and specific device form adopted by the network equipment.
- Base stations can be fixed or mobile.
- a helicopter or drone can be configured to act as a mobile base station, and one or more cells can move based on the location of the mobile base station.
- a helicopter or drone can be configured to act as a device that communicates with another base station.
- the network device in the embodiments of the present application may refer to a CU or a DU, or the network device includes a CU and a DU.
- the gNB may also include an AAU.
- the network equipment and terminal equipment can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; they can also be deployed on the water surface; they can also be deployed on aircraft, balloons and satellites in the air.
- the embodiments of the present application do not limit the scenarios in which the network equipment and terminal equipment are located.
- two random access procedures are specified: 2-step random access channel (2-step RACH) and 4-step random access channel (4-step RACH).
- 2-step RACH 2-step random access channel
- 4-step RACH 4-step random access channel
- the 4-step RACH process is introduced in the LTE system and is also used in the NR system.
- the following introduces the traditional 4-step random access process in conjunction with Figure 2A.
- the terminal device can first obtain the PRACH resource configuration from the system message or dedicated signaling. Afterwards, steps S210 to S240 can be executed.
- step S210 the terminal device sends a preamble to the network device.
- the preamble may be referred to as message 1 (Msg1) in the MAC layer protocol.
- the network device After sending the preamble, you can wait for message 2 (Msg2) fed back by the network device in the reception window.
- Msg2 message 2
- the start time and end time of the reception window are set according to the configuration parameters. From the perspective of the network device, the network device has the ability to distinguish preambles received in different time-frequency domains, or different preambles in the same time-frequency domain. However, the network device cannot distinguish the same preamble sent by multiple terminal devices received in the same time-frequency domain, in which case an access conflict will occur.
- step S220 the network device sends message 2 to the terminal device.
- the message 2 may be a group message, that is, the message 2 may include a random access response (RAR) message to multiple terminal devices.
- the addressing information of the message 2 is contained in a group identifier called a random access network temporary identifier (RA-RNTI), which is used to identify the time domain resource information, frequency domain resource information and carrier type information of the received preamble code, wherein the carrier type information is used to indicate whether the carrier of the preamble code is a SUL carrier or a NUL carrier.
- RA-RNTI random access network temporary identifier
- a message 2 may include the RAR corresponding to the preamble received from the same carrier and the same time-frequency point.
- the RAR IE sent to each terminal device may include the temporary identifier (temporary cell-radio network temporary identifier, T_C_RNTI) configured by the network device for the terminal device, the time advance (for uplink synchronization), the uplink grant (UL-GRANT) for sending message 3 (message3, Msg3), and the index of the preamble received by the network device.
- T_C_RNTI temporary cell-radio network temporary identifier
- UL-GRANT uplink grant
- message 2 may also include a backoff parameter to mitigate conflicts between preambles.
- a backoff parameter to mitigate conflicts between preambles.
- step S230 if the terminal device confirms that the network device has received the preamble code sent by itself, the terminal device sends message 3, also known as "scheduled transmission", to the network device based on UL-GRANT.
- message 3 includes the terminal device identification (also known as the terminal device ID).
- the terminal device can determine whether the network device has received the preamble code it sent based on the RA-RNTI and the preamble code index in the RAR. If the terminal device confirms that the network device has received the preamble code it sent, the terminal device sends message 3 based on UL-GRANT. At least the terminal identifier (terminal device ID) is included. Message 3 can be addressed using T_C_RNTI on the physical layer.
- the terminal device may start a timer and, during the timer operation, detect the downlink control channel PDCCH carrying message 4. If multiple terminal devices collide in step S210, then the conflict will continue to be sent in step S230, because multiple terminal devices will send message 3 based on the same UL-GRANT, but the terminal identifiers contained in the MAC CE of message 3 are different.
- step S240 if the network device correctly decodes message 3, the network device may send message 4 (message 4, Msg4) to the terminal device. This message is also called "contention resolution”.
- this message 4 is addressed using the T_C_RNTI received in message 3, and the MAC CE therein includes the terminal device identifier included in message 3 and a newly allocated C-RNTI.
- the network device may be able to correctly decode one of them or not (for example, when the interference level between the messages 3 sent by multiple terminal devices is similar). Therefore, when the terminal device receives message 4, if it finds that the T_C_RNTI convolved on the physical downlink control channel (PDCCH) matches the message 3 sent by itself, it will further check whether the medium access control control element (MAC CE) in the message 4 sent by the network device contains its own terminal device identification. After that, if message 4 contains its own terminal device identification, the terminal device can confirm that the random access process is completed and use the newly allocated C-RNTI as its own identity. This identity is used for addressing information of subsequent physical layer, MAC and radio resource control (RRC) layer protocols.
- PDCCH physical downlink control channel
- the random access process described above in conjunction with FIG2A can also be called a competitive random access process (contention based random access, CBRA).
- CBRA channel based random access
- CFRA contention free random access
- FIG2B shows a flow chart of a non-competitive random access process.
- the network device can allocate a specific random access resource to the terminal device, and accordingly, the network device can identify a specific terminal device through a random access preamble.
- the network device sends RA preamble assignment information to the terminal device. Afterwards, in response to the RA preamble assignment information, the terminal device may send a preamble to the network device, and accordingly, the MAC processing process in the network device is the same as the contention-based random access process. After receiving the preamble, the network device may send a random access response (RAR) to the terminal device, and accordingly, the processing process of the terminal device is the same as the contention-based random access process.
- RAR random access response
- the difference between the 2-step random access procedure and the 4-step random access procedure is that the 2-step random access procedure combines the contents of message 1 and message 3 of the 4-step random access procedure in message A, and combines the contents of message 2 and message 4 of the 4-step random access procedure in message B.
- FIG2C and FIG2D show the conventional 2-step random access procedure.
- the terminal device sends a message A to the network device, wherein the message A includes a preamble and a physical uplink shared channel (PUSCH), wherein the PUSCH includes a terminal device identifier of the terminal device.
- the network device sends a message B (also called a “conflict resolution message”) to the terminal device.
- message B also called a “conflict resolution message”.
- the terminal device identifier in message A is a cell-radio network temporary identifier (C-RNTI)
- C-RNTI cell-radio network temporary identifier
- the terminal device can confirm that the C-RNTI convolved on the PDCCH of message B (also known as conflict resolution) matches its own C-RNTI, the random access process has been successful, that is, the conflict has been resolved.
- method 1 is applicable to a terminal device in the RRC_CONNECTED state, that is, the terminal device has completed initial access and established an RRC connection with the network device.
- the terminal device identifier in message A is an identifier other than C-RNTI
- the RA-RNTI is convolved on the PDCCH carrying message B.
- the terminal device identifier contained in the Success RAR (SuccessRAR) in message B matches the terminal device identifier of the terminal device itself, then the terminal device considers that the random access process is successful and the conflict is resolved. Otherwise, the terminal device can choose to resend message A, or the terminal device falls back to the 4-step random access process.
- method 2 is applicable to other scenarios besides method 1.
- the network device sends allocation information (also known as RA preamble and PUSCH allocation information) to the terminal device to allocate transmission resources for the transmission preamble and PUSCH.
- allocation information also known as RA preamble and PUSCH allocation information
- the terminal device sends message A to the network device based on the allocation information, wherein message A includes the preamble and PUSCH, wherein the PUSCH includes the terminal device identifier of the terminal device.
- the network device sends message B (also known as "random access response") to the terminal device.
- IoT terminal devices can include logistics, warehousing, factory automation, and animal husbandry.
- IoT terminal devices and network devices can communicate intermittently or perform rough positioning and tracking.
- IoT terminal devices have low energy consumption, their internal batteries can only last for a few years at most, but will eventually be exhausted. Therefore, the batteries of IoT terminal devices need to be replaced regularly, which consumes a lot of manpower.
- some industrial scenarios are dangerous and not suitable for manual operation. Therefore, battery-free IoT terminal devices came into being.
- Radio frequency identification (RFID) terminal devices can meet people's demand for battery-free IoT terminal devices to some extent.
- RFID systems still requires human participation.
- some RFID systems require manual handheld readers.
- the wireless coverage range of a single RFID reader is limited (within 10 meters), so RFID systems deployed over a large area require more human participation. For example, when using an RFID system to take inventory of goods in a large supermarket, it takes a lot of manpower, material resources and time.
- Transplanting systems like RFID into cellular networks can effectively solve the problem of limited coverage, because cellular networks (such as the fourth generation (4G) system and 5G system) have achieved full coverage or at least coverage of major cities in some countries or regions (such as China and Europe and the United States). Based on the wider network coverage, the communication or positioning process between IoT terminal devices and network devices can be done without human intervention. Therefore, IoT terminal devices can work uninterruptedly and efficiently. In addition, IoT terminal devices can even work efficiently in environments that are not suitable for human intervention (such as wilderness, mines, and factories).
- Such a communication system can be called an ambient IoT communication system or a zero-power communication system.
- the A-IoT communication system may be composed of a network device 310 and a terminal device 320.
- the network device 310 may be, for example, a reader.
- the terminal device 320 is also called an A-IoT device, for example, a tag, also known as an electronic tag.
- the energy source of an A-IoT device comes from the surrounding environment, such as radio frequency (RF), solar energy, thermal energy, mechanical vibration, wind energy, etc.
- RF radio frequency
- the A-IoT communication system adopts energy harvesting and backscattering communication technology, and the network device 310 can send wireless power supply signals, downlink communication signals, and receive backscattering signals from the terminal device 320 to the terminal device 320.
- the terminal device 320 may include an energy collection module 321, a backscatter communication module 322, and a low-power computing module 323.
- the terminal device 320 may also include a memory module (not shown) for storing some basic information (such as item identification, etc.).
- the terminal device 320 may also include a sensor module 324 for acquiring sensor data such as ambient temperature and ambient humidity.
- the use cases of A-IoT communication systems can be divided into four categories: inventory, sensor, tracking, and command.
- Inventory refers to checking for missing goods when goods enter and leave the warehouse.
- Common sensors can include temperature, pressure, humidity and other sensors. Sensors can be used in industry, agriculture, smart cities and other occasions.
- the information collected by the sensors can be uploaded to a third-party application (application, App) through the A-IoT system for monitoring and management.
- Tracking generally refers to obtaining the approximate location of an object at irregular intervals. For example, users can use smartphones to understand the location of their express delivery in real time.
- Command refers to the operation of a certain servo mechanism through the A-IoT system, which can be connected to an A-IoT terminal device. For example, people can water the flowers and plants in the backyard through a mobile phone app while working or taking a break in the office, and the watering servo mechanism can be connected to an A-IoT terminal device.
- the A-IoT communication system is divided into four topological network structures as shown in Figures 4A to 4D.
- data or signals also called A-IoT data or signals
- A-IoT data or signals can be directly transmitted between network devices and A-IoT devices.
- the network device and the A-IoT device can communicate through an intermediate node, wherein the data or information transmitted between the intermediate node and the terminal device is also called A-IoT data or signal.
- the intermediate node can be another network device, in which case the intermediate node and the network device can communicate through the Uu interface, for example, the intermediate node can send data or signals to the network device through the Uu interface, and the intermediate node can receive data or signals sent by the network device through the Uu interface.
- the network device and the A-IoT device can communicate through the auxiliary point node, wherein the data or information transmitted between the auxiliary node and the terminal device is also called A-IoT data or signal, and the data or information transmitted between the terminal device and the network device is also called A-IoT data or signal.
- the auxiliary node can be another network device. In this case, the auxiliary node can only receive the data or signal sent by the network device through the Uu interface. In this case, the auxiliary node cannot send data or signals to the network device.
- data or signals can be directly transmitted between the terminal device and the A-IoT device.
- A-IoT devices can be divided into three types: Type A, Type B, and Type C.
- terminal devices of type A and type B such devices can only communicate by reflecting and modulating received radio waves. This communication method is called back-scattering. In other words, such devices cannot actively send radio signals, and their power is within the range of 1 to 10 microwatts (uW).
- uW microwatts
- the terminal devices of type A have the lowest transmission power and the lowest hardware complexity, which is basically close to the level of RFID terminal devices.
- the hardware of type B terminal devices is slightly more complicated, which may include signal amplification devices and certain energy storage devices. Therefore, the communication distance between the terminal devices of type B and the network devices is compared with the communication distance between the terminal devices of type A and the network devices. Further.
- Type C terminal devices usually have the ability to actively send radio waves, with a transmission power of about 1 to 10 milliwatts (mW), and can store a certain amount of energy. All three types of terminal devices can obtain energy from the environment and can continue to work for several years or more than 10 years.
- type A and type B terminal devices are basically in a dormant state before the network device triggers the communication process with them. Only after being activated by the wireless signal of the network device, the type A and type B terminal devices will start working.
- receiver type 1 is a broadband receiver, which is also called an RF receiver.
- the RF receiver can obtain the signal within the bandwidth to be received based on the RF bandpass filter, and then perform envelope detection and subsequent baseband processing.
- the structure of the RF receiver is the simplest, and its power consumption can be as low as several uW or even lower.
- the RF receiver due to the poor accuracy of the RF bandpass filter, even when the target signal occupies a narrow bandwidth, the RF receiver often receives signals within a wider bandwidth. Therefore, more noise and interference will be introduced in the receiving process of the RF receiver, and its receiving performance is poor, or the receiving sensitivity is poor.
- the receiving process of a typical RF receiver can be shown in Figure 5.
- Receiver type 2 is a narrowband receiver, which may include an intermediate frequency receiver or a zero intermediate frequency receiver.
- a narrowband receiver can also down-convert the RF signal and further filter the baseband signal using a low-pass filter to eliminate noise and interference. Therefore, the narrowband receiver has a narrow receiving bandwidth and good receiving performance, or a high receiving sensitivity.
- a narrowband receiver requires the use of a local oscillator (LO).
- the power consumption of LO is high, and even the recommended LO consumes 100uW or even more power. Therefore, the relative power consumption of a narrowband receiver is high, but because its absolute power consumption is very low, it is still suitable for use in zero-power devices.
- the receiving process of a typical intermediate frequency receiver can be shown in Figure 6.
- the above-mentioned type A terminal device usually adopts a broadband receiver
- the type C communication device usually adopts a narrowband receiver
- the type B terminal device may adopt one or both types of receivers.
- FIG7 shows a schematic flow chart of the initial access process of RFID.
- the interrogator can be the network device introduced above.
- the interrogator can initiate a query to the tag to trigger the tag to initiate the initial access process.
- the tag sends a 16-bit random number (indicated by "RN16") to the interrogator.
- RNN 16-bit random number
- the tag responds to the correctly decoded random number through an ACK.
- the tag that successfully conflicts will receive the same random number as it sent, while the tag that failed the conflict will receive a different random number from the one it sent.
- tags that successfully collide they can send their EPC or related information to the interrogator.
- the interrogator will repeatedly feed back the same random number (the one that is correctly decoded) to the tag through a random number request (Req_RN).
- the tag will feed back an identifier (handle) to the interrogator, which will be used as the identifier of the tag in the subsequent process.
- the identifier is also a 16-bit random number.
- the interrogator can send a command to the tag, in which the tag identifier is written.
- the identifier (handle) used by the tag in the subsequent process is actually generated by the tag.
- This method is more suitable for RFID because the coverage of the interrogator is usually small, and the length of the identifier is sufficient to distinguish different RFIDs.
- this initial access process is not suitable for scenarios where the network equipment has a large coverage range.
- the above-mentioned identifier (handle) may not be long enough for the network equipment to distinguish different terminal devices.
- the traditional random access process is too complicated and may cause the terminal equipment to consume more power. At this time, the degree to which power consumption can be reduced by introducing low-capability terminal devices (for example, the electronic tags introduced above) will be limited.
- an embodiment of the present application provides a wireless communication method to reduce the power consumption of a terminal device (also referred to as a "first terminal device") during a random access process.
- the wireless communication method of an embodiment of the present application is described below in conjunction with Figure 8.
- the first terminal device may be a low-power device.
- the first terminal device is the A-IoT device introduced above, for example, it may be a terminal device of type A.
- it may be a terminal device of type B.
- it may be a terminal device of type C.
- the terminal device may also be a terminal device in an IoT system.
- the target device shown in FIG8 may be a second terminal device, in which case the first terminal device may access the network through the second terminal device.
- the second terminal device may serve as an auxiliary node or intermediate node for communication between the first terminal device and the network device, so as to help the first terminal device access the network device.
- the target device may be a network device other than the network device that the terminal device is ready to access, in other words, the network device as the target device may serve as an auxiliary node or intermediate node for communication between the first terminal device and the network device (the network device that the terminal device attempts to access), so as to help the first terminal device access the network device.
- the target device may be a network device that the terminal device attempts to access, in which case the first terminal device may communicate directly with the network device to attempt to access the network device.
- the network device may be a general term for network nodes including a reader.
- the network device may also only include a node that provides backscattered radio waves to the first terminal device alone.
- the first terminal device and the second terminal device are not limited.
- the second terminal device The capability of the second terminal device may be higher than that of the first terminal device.
- the second terminal device may be an intelligent terminal device, and the first terminal device may be the electronic tag described above.
- the second terminal device may be a terminal device with similar capabilities to the first terminal device.
- Fig. 8 is a schematic flow chart of a wireless communication method according to an embodiment of the present application. The method shown in Fig. 8 includes steps S810 to S840.
- step S810 the first terminal device sends a preamble code to the target device.
- the preamble may be generated based on a sequence.
- the preamble may be generated based on multiple fixed sequences, which helps to simplify the generation method of the preamble compared to the traditional preamble that is generated based on a derivative sequence of a root sequence, thereby saving the power consumption required for the first terminal device to generate the preamble.
- the preamble may be generated based on a limited number of sequences, which helps to simplify the complexity of generating the preamble.
- the generation process of the preamble code can also be simplified by other methods.
- the sequence used in the embodiments of the present application can adopt a relatively simple orthogonal method, for example, the minimum mean square error sequence can be used.
- the sequence used in the embodiments of the present application can adopt a relatively simple modulation method, for example, binary on-off keying (OOK) can be used for modulation.
- the length of the preamble code used in the embodiments of the present application can be shorter than the length of the preamble code used in the traditional random access process.
- preamble codes generated based on different sequences may correspond to different indexes for easy identification by a network device.
- the transmission of the preamble code described above may be used as the first piece of information in the random access process, and therefore, the preamble code may be referred to as message 1 (Msg 1).
- step S820 the target device sends a first index to the first terminal device.
- the first index is used to indicate a preamble code received by the target device, and therefore, the first index may also be referred to as a “preamble code index”.
- the target device if the target device successfully receives and demodulates the preamble, the target device will send the first index corresponding to the preamble. Therefore, the target device sending the first index to the terminal device can be understood as the target device successfully receiving and demodulating the preamble indicated by the first index.
- the transmission of the first index can be used as the second information in the random access process. Therefore, the information where the first index is located (i.e., the third information below) can be called message 2 (Msg 2).
- step S830 in response to the first index being the same as the index of the preamble code, the first terminal device sends the first terminal device identifier to the target device.
- the first terminal device can send the first terminal device identifier to the target device.
- the first terminal device may consider that the conflict resolution has failed.
- the first terminal device identifier may be generated by the first terminal device, for example, the first terminal device identifier may be a random number generated by the first terminal device, which is shorter than the terminal device identifier configured by the network device for the terminal device in the traditional random access process, and helps to simplify the power consumption required by the first terminal device to transmit the first terminal device identifier.
- the length of the first terminal device identifier may be 16 bits.
- the transmission of the first terminal device identifier may be used as the third piece of information in the random access process. Therefore, the information containing the terminal device identifier (i.e., the fourth information below) may be referred to as message 3 (Msg 3).
- the time domain resource for sending the first terminal device identifier may be randomly selected by the first terminal device.
- the target device receives the terminal device identification sent by the terminal device, wherein the terminal device may be the first terminal device, or the terminal device may include other terminal devices and the first terminal device.
- the terminal device may be the terminal device that sends the preamble in step S810.
- the terminal device that sends the preamble may be multiple terminal devices, and the multiple terminal devices include the first terminal device.
- the terminal device in step S830 may be the multiple terminal devices in step S810.
- the terminal device that sends the preamble may be the first terminal device.
- the terminal device in step S830 may be the first terminal device in step S810.
- step S840 the first terminal device receives first information sent by the target device, where the first information includes a terminal device identifier received by the target device.
- the target device sends the first information to the terminal device, wherein the terminal device may be the first terminal device, or the terminal device may include other terminal devices and the first terminal device.
- the terminal device in step S840 may be the terminal device in step S830, or the terminal device in step S840 is one of the terminal devices in step S830.
- the multiple terminal devices will also send terminal device identifiers to the target device, and accordingly, the target device may only successfully receive the terminal device identifier of one of the terminal devices.
- the following description is made by taking the first terminal device as an example, wherein the terminal device identifier of the first terminal device is the first terminal device identifier (or referred to as the identifier of the first terminal device).
- the access process of other terminal devices may be similar.
- the first terminal device may compare the terminal device identifier carried in the first information with the first terminal device identifier to determine whether to successfully access the target device to resolve the conflict.
- the first terminal device conflict resolution successfully accesses the target device.
- the terminal device identifier in the first information is different from the first terminal device identifier, the first terminal device conflict resolution fails.
- the first information may also include a first radio network temporary identifier (RNTI) associated with the terminal device identifier received by the target device.
- RNTI radio network temporary identifier
- the first terminal device may retain the first RNTI.
- the first terminal device may communicate with the target device based on the first RNTI, that is, use the first RNTI as the identifier of the first terminal device.
- the first RNTI may be carried only in the first information, and at this time, the transmission of other messages in the random access process may not be performed based on the RNTI.
- the third information may not contain the RNTI, and for another example, the fourth information may not be processed using the RNTI.
- the RNTI is carried in the message 2, and the RNTI is used for processing in the transmission message 3, which helps to simplify the complexity of the first terminal device accessing the target device and reduce the power consumption of the first terminal device accessing the target device.
- the first terminal device can first perform random access with the network device based on the first terminal device identifier, and then indicate the first RNTI in the first information. Since the length of the first terminal device identifier is shorter than the first RNTI, it helps to simplify the power consumption of the first terminal device performing random access.
- the first terminal device may access the target device because there is information to be transmitted (for example, the ambient temperature collected by the first terminal device). If the information to be transmitted has been transmitted to the network device during the process of the first terminal device accessing the target device, the network device may no longer carry the first RNTI in the first information to reduce the overhead of transmitting the first information.
- information to be transmitted for example, the ambient temperature collected by the first terminal device.
- the length of the first RNTI is adjustable, or in other words, the first RNTI is variable in length.
- the length of the first RNTI may be associated with the number of terminal devices served by the network device, that is, if the number of terminal devices served by the network device is large, the length of the first RNTI may be long to facilitate distinguishing multiple terminal devices. On the contrary, if the number of terminal devices served by the network device is small, the length of the first RNTI may be short to reduce the complexity of the first terminal device communicating based on the first RNTI.
- the number of terminal devices served by the network device may be tens of thousands, and the length of the first RNTI may require 4 bytes.
- the number of terminal devices served by the network device may be only a few hundred, and the length of the first RNTI may only require 2 bytes.
- the length of the first RNTI can be adjusted by using different encoding methods, or the network device can use different encoding methods to generate first RNTIs of different lengths.
- the length change of the first RNTI can be achieved by truncation, that is, an original RNTI of uniform length can be generated, and then the original RNTI can be truncated by truncation to obtain the first RNTI.
- the network device may indicate the length of the first RNTI to the first terminal device.
- the target device may configure the length of the first RNTI for the first terminal device through configuration information, that is, the target device may send configuration information to the first terminal device, and the configuration information is used to configure the length of the first RNTI for the first terminal device.
- the first terminal device may receive the first information within the second time period to increase the probability of successfully receiving the first information, wherein the starting position of the second time period may be determined based on the sending time of the first terminal device identifier (or the sending time of the fourth information).
- the starting position of the second time period is the sending time of the first terminal device identifier. That is to say, after the first terminal device sends the first terminal device identifier, the first terminal device immediately enters the second time period to prepare to receive the first information, which helps the first terminal device to receive energy from other communication devices (e.g., readers) in the second time period for subsequent communication through backscattered radio waves.
- the first terminal device immediately enters the second time period to prepare to receive the first information, which helps the first terminal device to receive energy from other communication devices (e.g., readers) in the second time period for subsequent communication through backscattered radio waves.
- the second time period is separated from the sending time of the first terminal device identifier by a second time interval, or the second time period is obtained by starting from the sending time of the first terminal device identifier and offsetting by the second time interval in the direction of time elapse. That is to say, after the first terminal device sends the first terminal device identifier, it will enter the second time period again after a second time interval to prepare to receive the first information, which helps the first terminal device save power consumption.
- the implementation method of the second time period is not limited.
- the second time period can be represented by a time window.
- the second time period can also be represented by a timer.
- conflict resolution of the first terminal device fails.
- the first terminal device may support receiving messages within a bandwidth range, or support receiving messages within a channel.
- the first information may be a narrowband message transmitted in a channel to save the first terminal device. The power consumption of the device when receiving the first information.
- the third information includes one or more of the following: information used to instruct the first terminal device to access the network based on the backoff mechanism; parameters used for the first terminal device to access the network based on the backoff mechanism; information used to instruct the terminal device to send a second time domain resource identifying the terminal device.
- the third information includes information for indicating that the first terminal device accesses the network based on the backoff mechanism, or in other words, the third information is used to indicate that the backoff mechanism is supported during the process of the first terminal device accessing the network.
- the parameters are used to indicate the maximum number of times the first terminal device attempts to access the network.
- the first terminal device confirms that the conflict resolution fails and the number of times the first terminal device attempts to access the target device is less than the maximum number, the first terminal device can re-listen to the second information.
- the first terminal device when the first terminal device confirms that the conflict resolution fails and the number of times the first terminal device attempts to access the target device is greater than or equal to the maximum number, the first terminal device may confirm that access to the target device has failed.
- the first terminal device may no longer monitor the second information.
- the first terminal device may monitor the second information again after a long interval, which is not limited in the embodiment of the present application.
- the first terminal device may set a counter to record the maximum number of times the first terminal device attempts to access the network. Accordingly, the counter increases by 1 each time the first terminal device attempts to access the network.
- the above parameters are also used to indicate the backoff time information for the first terminal device to try to access the target device again, or in other words, the above parameters are used to indicate the waiting time for the first terminal device to try to access the target device again, that is, the time interval between the time when the first terminal device initiates the random access process next time and the time when the random access process is initiated this time is greater than or equal to the backoff time indicated by the parameter.
- the first terminal device re-listens to the second information at the first moment, and the first moment is the moment after the time indicated by the backoff time information, starting from the moment when the first terminal device confirms that the conflict resolution fails.
- the above parameter may be the backoff time.
- the above parameter may be indication information for indicating the backoff time, for example, the above parameter may be an index for indicating the backoff time, which helps to reduce the bits occupied by indicating the backoff time.
- the terminal device may send the terminal device identification on the second time domain resource.
- the information for indicating the second time domain resource may include one or more of the following: a time domain offset between the reception time of the third information and the second time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources; a time interval between two time domain resources that are adjacent in time domain in a plurality of time domain resources.
- the time domain offset between the time domain resource corresponding to the reception time of the third information and the second time domain resource can be replaced by the time offset between the reception time of the third information and the time corresponding to the second time domain resource.
- the above-mentioned time domain offset may include one of the following: a time domain offset between a starting position of a time domain resource corresponding to a receiving time of the above-mentioned third information and a starting position of a second time domain resource, a time domain offset between an ending position of a time domain resource corresponding to a receiving time of the above-mentioned third information and an ending position of the second time domain resource, a time domain offset between a starting position of a time domain resource corresponding to a receiving time of the above-mentioned third information and an ending position of the second time domain resource, and a time domain offset between an ending position of a time domain resource corresponding to a receiving time of the above-mentioned third information and a starting position of the second time domain resource.
- the above-mentioned time offset may include one of the following: the time domain offset between the reception time of the above-mentioned third information and the start time of the second time domain resource, and the time domain offset between the reception time of the above-mentioned third information and the end time of the second time domain resource.
- the implementation method of the above-mentioned time domain offset and/or time offset is not limited.
- the time domain offset and/or time offset can be represented by a period of time.
- the time domain offset and/or time offset can be represented by the number of time domain resources.
- the multiple time domain resources may be multiple time domain resources that can be used to transmit the terminal device identifier, or in other words, the multiple time domain resources are candidate time domain resources for transmitting the terminal device identifier, wherein the multiple time domain resources include the second time domain resource.
- the time interval between two time domain resources that are adjacent in the time domain among multiple time domain resources can be indicated by parameter t3, and the parameter t3 can be the duration between the starting time domain position of a time domain resource among the multiple time domain resources and the starting time domain position of the next time domain resource.
- the first terminal device can determine the above time interval based on the duration corresponding to a time domain resource and parameter t3.
- the above time interval can also be the duration between the ending time domain position of a time domain resource and the starting time domain position of the next time domain resource.
- multiple time domain resources include time domain resources 0 to N, and the time when the first terminal device receives the third information is t.
- the information carried in the above third information for indicating the second time domain resource includes: a time domain offset t1 between the reception time of the third information and the second time domain resource, a duration t2 corresponding to each time domain resource in the multiple time domain resources, and a duration t3 between the starting position of time domain resource 0 and the starting position of time domain resource 1. Accordingly, the first terminal device can determine that the second time domain resource is time domain resource 0 based on the above parameters in the third information.
- the network device may successfully receive and demodulate multiple preamble codes.
- the third information may carry multiple indexes. To indicate multiple preamble codes received by the network device.
- the third information is further used to indicate: information about time domain resources where multiple preamble codes corresponding to multiple indexes are located; and/or information about channels where preamble codes corresponding to each of the multiple indexes are located, which helps the first terminal device distinguish the preamble codes corresponding to the multiple indexes.
- the multiple indexes include the first index.
- the information of the channels where the multiple preambles are located may be used to identify the information of the channel where each of the multiple preambles is located.
- the information may be an index of the channel where each of the multiple preambles is located.
- the information of the time domain resources where the multiple preambles are located can be used to identify the time domain resource where each of the multiple preambles is located.
- the information can be an index of the time domain resource where each of the multiple preambles is located.
- the indexes of the time domain resources where the multiple preamble codes are located may increase in order from early to late in the time domain.
- the indexes of the time domain resources where the multiple preamble codes are located may increase in order from early to late in the time domain.
- the target device receives preambles sent by multiple terminal devices.
- the multiple terminal devices will send their respective terminal device identifiers to the target device.
- the network device will receive the terminal device identifiers of multiple terminal devices.
- the index of the time domain resources where the multiple preambles are located can be set to correspond one by one with the time domain resources carrying the multiple terminal device identifiers.
- the network device can determine which preamble is sent by the terminal device indicated by the terminal device identifier based on the correspondence and the time domain resource where the terminal device identifier is located.
- the above correspondence may include multiple terminal device identifiers being carried on multiple time domain resources in a first order, and the first order is the order of the indexes of the time domain resources where the multiple preamble codes corresponding to the multiple terminal device identifiers are located from small to large.
- the terminal device that sends the preamble code first its corresponding terminal device identifier is preferentially sent on the time domain resources where the multiple terminal device identifiers are located.
- the order in which the preamble codes (i.e., the multiple preamble codes in the previous text) are transmitted on multiple time domain resources among multiple terminal devices is the same as the order in which the terminal device identifiers (i.e., the multiple terminal device identifiers in the previous text) are transmitted on multiple time domain resources by multiple terminal devices.
- terminal device 1 to terminal device 3 send preambles 1 to 3 to the network device respectively, wherein terminal device 1 sends preamble 1 on time domain resource 1, terminal device 2 sends preamble 2 on time domain resource 2, and terminal device 3 sends preamble 3 on time domain resource 3, and the arrangement order of the above three time domain resources from early to late in the time domain is time domain resource 1, time domain resource 2, and time domain resource 3. Accordingly, the network device successfully receives preambles 1 to 3 and sends the indexes corresponding to preambles 1 to 3.
- terminal device 1 can transmit the terminal device identification of terminal device 1 on time domain resource n+1
- terminal device 2 can transmit the terminal device identification of terminal device 2 on time domain resource n+2
- terminal device 3 can transmit the terminal device identification of terminal device 3 on time domain resource n+3.
- the arrangement order of time domain resources n+1 to time domain resources n+3 from early to late in the time domain is time domain resource n+1, time domain resource n+2, and time domain resource n+3.
- the third information may be transmitted in a broadcast manner, that is, the channel for sending the third information may be a broadcast channel.
- the network device may send the third information in a broadcast manner within a bandwidth range, wherein the third information may include one or more indexes to indicate multiple preamble codes received by the target device.
- the channel for sending the third information may be the same as the channel for sending the preamble code by the first terminal device, or in other words, the channel for sending the third information may be the same as the channel for sending the first terminal device identifier, which helps to simplify the complexity of the first terminal device receiving the third information.
- the channel for sending the third information can be the same as the channel for sending the preamble by the first terminal device, and the first terminal device selects the time domain resource for sending the preamble, then the time domain resource for sending the preamble indicated in the third information is selected by the first terminal device.
- the third information may not indicate the channel information for transmitting the preamble to save power consumption for transmitting the third information.
- the third information may also indicate the channel information for transmitting the preamble.
- the first terminal device may receive the third information within a first time period to increase the probability of successfully receiving the third information, wherein the starting position of the first time period may be determined based on the transmission time of the preamble code.
- the starting position of the first time period is the sending time of the preamble code.
- the starting position of the first time period is set to the sending time of the preamble code, that is, after the first terminal device sends the preamble code, the first terminal device immediately enters the first time period to prepare to receive the third information, which helps the first terminal device to receive energy from other communication devices (for example, readers) in the first time period for subsequent communication through backscattered radio waves.
- the starting position of the first time period is separated from the sending time of the preamble by a first time interval, or the starting position of the first time period is obtained by starting from the sending time of the preamble and shifting by the first time interval in the direction of time lapse. That is to say, after the first terminal device sends the preamble, it will continue to wait for the first time interval before entering the first time period to prepare for receiving the third information, which helps the first terminal device save power consumption.
- the implementation method of the first time period is not limited.
- the first time period can be represented by a time window.
- the first time period can also be identified by a timer.
- conflict resolution of the first terminal device fails.
- the network device usually sends trigger information in a periodic form to trigger the first terminal device to perform a random access process.
- this method of periodically triggering the random access process is unnecessary and may result in reduced utilization of transmission resources.
- the terminal device of type A or type B introduced above its working principle is based on backscattering, so before initiating any process, the reader usually sends one or more messages to the terminal device so that the terminal device can perform backscattering based on one or more messages sent by the reader. At this time, one or more messages can realize the function of triggering the random access process mentioned above. At this time, sending the trigger information in a periodic manner is obviously more consuming of system resources.
- an embodiment of the present application provides a wireless communication method, in which the target device can send second information to the first terminal device to trigger the first terminal device to perform a random access process, or in other words, the second information is used to trigger the first terminal device to send a preamble, wherein the second information can be transmitted aperiodically.
- the second information can be transmitted periodically.
- the network device can send the second information to the electronic tag on the item (as an example of the first terminal device).
- the second information is triggered based on the need to take inventory of items in the warehouse.
- the second information may be information broadcast within a bandwidth range so that multiple terminal devices can receive it.
- the time domain resource for sending the second information can be used to determine the time domain resource for sending the preamble (also called “first time domain resource”).
- the first time domain resource is determined based on the reference time domain resource.
- the first time domain resource is determined based on a reference time domain resource and a resource configuration parameter, wherein the resource configuration parameter is used to indicate one or more of the following: a time domain offset between the reference time domain resource and the first time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources; a time interval between two time domain resources that are adjacent in time domain in a plurality of time domain resources; and the number of time domain resources in a plurality of time domain resources.
- the time domain offset between the reference time domain resource and the first time domain resource may be replaced by a time offset between a time corresponding to the reference time domain resource and a time corresponding to the first time domain resource.
- the above-mentioned time domain offset may include one of the following: a time domain offset between the starting position of the above-mentioned reference time domain resource and the starting position of the first time domain resource, a time domain offset between the ending position of the above-mentioned reference time domain resource and the ending position of the first time domain resource, a time domain offset between the starting position of the above-mentioned reference time domain resource and the ending position of the first time domain resource, and a time domain offset between the ending position of the above-mentioned reference time domain resource and the starting position of the first time domain resource.
- the above-mentioned time offset may include one of the following: a time domain offset between the start time of the above-mentioned reference time domain resource and the start time of the first time domain resource, a time domain offset between the end time of the above-mentioned reference time domain resource and the end time of the first time domain resource, a time domain offset between the start time of the above-mentioned reference time domain resource and the end time of the first time domain resource, and a time domain offset between the end time of the above-mentioned reference time domain resource and the start time of the first time domain resource.
- the implementation method of the above-mentioned time domain offset and/or time offset is not limited.
- the time domain offset and/or time offset can be represented by a period of time.
- the time domain offset and/or time offset can be represented by the number of time domain resources.
- the multiple time domain resources may be multiple time domain resources that can be used to transmit the preamble, or in other words, the multiple time domain resources are candidate time domain resources for transmitting the preamble, wherein the multiple time domain resources include the first time domain resource.
- the time interval between two time domain resources that are adjacent in the time domain among multiple time domain resources can be indicated by parameter t6, which can be the duration between the starting time domain position of a time domain resource among the multiple time domain resources and the starting time domain position of the next time domain resource.
- the first terminal device can determine the above time interval based on the duration corresponding to a time domain resource and parameter t6.
- the above time interval can also be the duration between the ending time domain position of a time domain resource and the starting time domain position of the next time domain resource.
- the multiple time domain resources include time domain resources 0 to N, and the reference time domain resource is time domain resource t.
- the above-mentioned resource configuration parameters include: a time domain offset t4 used to indicate the reference time domain resource and the first time domain resource, a duration t5 corresponding to each time domain resource in the multiple time domain resources, and a time interval t6 between the starting position of time domain resource 0 and the starting position of time domain resource 1. Accordingly, the first terminal device can determine that the first time domain resource is time domain resource 0 based on the above-mentioned parameters in the resource configuration parameters.
- the resource configuration parameters are carried in the second information.
- the resource configuration parameters may be predefined or preconfigured.
- the first terminal device may use a different transmission power each time it attempts to access the network.
- the transmission power used by the first terminal device may be increased.
- the transmission power used by the first terminal device may be adjusted based on a power step.
- the transmission power used by the first terminal device may be obtained by adjusting the power step based on the initial transmission power.
- the initial transmission power may be used by the first terminal device when it attempts to access the target device for the first time, and N is a positive integer greater than or equal to 0.
- the transmission power used by the first terminal device when it attempts to access the target device for the first time may be the sum of the initial transmission power and the power step, and N is a positive integer greater than or equal to 1.
- the transmission power used by the first terminal device to attempt to access the target device may refer to the transmission power used to transmit the preamble code and/or the fourth information (or the terminal device identifier) during the process of the first terminal device attempting to access the target device.
- the parameters for power adjustment may be configured by the network device through the second information.
- the parameters for power adjustment e.g., initial transmit power and/or power step
- the information (e.g., one or more of the second information, the third information, and the first information) sent by the network device to the first terminal device may be transmitted within a bandwidth range or within a certain channel. Accordingly, the information (e.g., the preamble and/or the fourth information) sent by the first terminal device to the network device may be transmitted within a certain channel.
- the timing at which the first terminal device sends information is associated with the terminal type of the first terminal device.
- the time to start sending information can be determined based on internal preparations and whether external radio waves for backscattering exist. When both are ready, the terminal device of type A and/or type B starts sending messages.
- the time to start sending information can be determined based on internal preparations, that is, if the internal preparations have been completed, the terminal device of type C can send information.
- the network device may not be able to demodulate the fourth information sent by multiple terminal devices (if the transmission power used by the fourth information sent by multiple terminal devices is similar, the network device may not be able to demodulate the fourth information sent by multiple terminal devices). At this time, multiple terminal devices fail to access the target device.
- the fourth information sent by multiple terminal devices may be successfully demodulated, while the fourth information sent by the remaining terminal devices cannot be demodulated. (If the fourth information sent by multiple terminal devices uses different transmission powers, for the network device, the fourth information sent with the maximum transmission power may be successfully demodulated.) In this case, the terminal device identifier fed back by the network device in the first information is the terminal device identifier in the successfully demodulated fourth information. The terminal devices corresponding to the other fourth information that has not been successfully demodulated will fail to access because they cannot wait for the first information.
- Msg0 can be used as an example of the second information
- Msg1 can be used as an example of information carrying a preamble code
- Msg2 can be used as an example of the third information
- Msg3 can be used as an example of the fourth information
- Msg4 can be used as an example of the first information.
- Fig. 12 is a schematic flow chart of a random access method according to an embodiment of the present application. The method shown in Fig. 12 includes steps S1210 to S1250.
- step S1210 the network device sends Msg0.
- the network device may broadcast Msg0 on a certain frequency band to trigger multiple terminal devices to perform random access, wherein the multiple terminal devices include the first terminal device.
- step S1220 in response to the first terminal device receiving Msg0, the first terminal device sends a preamble code 1 (also referred to as Msg1) to the network device.
- a preamble code 1 also referred to as Msg1
- a sequence may be modulated in preamble 1, and the sequence may be one of 16 preset sequences.
- each of the 16 sequences may correspond to an index so that the network device can demodulate preambles carrying different sequences. If the network device receives preambles modulated with the same sequence from different terminal devices, the network device cannot identify that the multiple preambles come from different terminal devices. At this time, the network device may demodulate the multiple preambles sent by the multiple terminal devices as a preamble sent by one terminal device.
- step S1230 the network device sends Msg2 to the first terminal device.
- Msg2 may include the index of the preamble that the network device received and correctly demodulated.
- step S1240 if the index of the preamble code carried in Msg2 includes the index of preamble code 1, the first terminal device sends Msg3 to the network device.
- Msg3 includes a terminal device identifier of the first terminal device, wherein the terminal device identifier is a random number generated by the first terminal device.
- the first terminal device determines whether the index of the preamble code carried in Msg2 includes the index of preamble code 1. If the index of the preamble code carried in Msg2 includes the index of preamble code 1, it means that the preamble code 1 sent by the first terminal device is received and correctly demodulated by the network device, and the first terminal device sends Msg3 to the network device.
- the index of the preamble code carried in Msg2 does not include the index of the preamble code 1, it means that the preamble code 1 sent by the first terminal device is not received and correctly demodulated by the network device, then the first terminal device may consider that the random access has failed.
- step S1250 in response to the network device receiving the terminal device identification, the network device sends Msg4 to the first terminal device.
- Msg4 includes a terminal device identifier received by the network device and a first RNTI corresponding to the terminal device identifier.
- the first terminal device may consider that the random access is successful, and then the first terminal device may use the first RNTI as its own identifier and communicate with the network device based on the first RNTI. If the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device may consider that the random access has failed.
- Fig. 13 is a schematic flow chart of a random access method according to another embodiment of the present application. The method shown in Fig. 13 includes steps S1310 to S1350.
- step S1310 the network device sends Msg0.
- the network device may broadcast Msg0 on a certain frequency band to trigger multiple terminal devices to perform random access, wherein the multiple terminal devices include the first terminal device.
- Msg0 may include resource configuration parameters for determining a first time domain resource, where the first time domain resource may be used to send preamble 1. It should be understood that the determination method of the first time domain resource may refer to FIG. 11 , and for the sake of brevity, it will not be repeated here.
- step S1320 in response to the first terminal device receiving Msg0, the first terminal device sends a preamble code 1 (also referred to as Msg1) to the network device on the first time domain resource.
- a preamble code 1 also referred to as Msg1
- a sequence may be modulated in preamble 1, and the sequence may be one of 16 preset sequences.
- each of the 16 sequences may correspond to an index so that the network device can demodulate preambles carrying different sequences. If the network device receives preambles modulated with the same sequence from different terminal devices, the network device cannot identify that the multiple preambles come from different terminal devices. At this time, the network device may demodulate the multiple preambles sent by the multiple terminal devices as a preamble sent by one terminal device.
- step S1330 the network device sends Msg2 to the first terminal device.
- Msg2 may include the index of the preamble code received and correctly demodulated by the network device, and the index of the time domain resource where the preamble code was sent.
- Msg2 if Msg2 is sent via a broadcast message, Msg2 also needs to carry the index of the channel on which the preamble code is sent.
- Msg2 may include resource configuration parameters for determining a second time domain resource, wherein the second time domain resource may be used to send Msg3. It should be understood that the determination method of the second time domain resource may refer to FIG9 , and for the sake of brevity, it will not be described here.
- step S1340 if the index of the preamble code carried in Msg2 includes the index of the preamble code 1, the first terminal device sends Msg3 to the network device on the second time domain resources.
- Msg3 includes a terminal device identifier of the first terminal device, wherein the terminal device identifier is a random number generated by the first terminal device.
- the first terminal device determines whether the index of the preamble code carried in Msg2 includes the index of preamble code 1. If the index of the preamble code carried in Msg2 includes the index of preamble code 1, it means that the preamble code 1 sent by the first terminal device is received and correctly demodulated by the network device, and the first terminal device sends Msg3 to the network device.
- the index of the preamble code carried in Msg2 does not include the index of the preamble code 1, it means that the preamble code 1 sent by the first terminal device is not received and correctly demodulated by the network device, then the first terminal device may consider that the random access has failed.
- step S1350 in response to the network device receiving the terminal device identification, the network device sends Msg4 to the first terminal device.
- Msg4 includes a terminal device identifier received by the network device and a first RNTI corresponding to the terminal device identifier.
- the first terminal device may consider that the random access is successful, and then the first terminal device may use the first RNTI as its own identifier and communicate with the network device based on the first RNTI. If the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device may consider that the random access has failed.
- FIG14 is a schematic flow chart of a random access method according to another embodiment of the present application.
- the first terminal device is a terminal device of type C described above, and the terminal device of this type can autonomously select a channel to send information.
- the first terminal device of this type can operate in an FDD frequency band.
- the method shown in FIG14 includes steps S1410 to S1460.
- step S1410 the first terminal device sends a wake-up signal to the network device to wake up the network device.
- the network device if the network device requires the first terminal device to actively send information (if the first terminal device is a sensor for detecting temperature, the information actively sent by the first terminal device includes temperature information), then, since the network device does not know whether the first terminal device sends The time to start the random access process, therefore, the network device usually triggers the first terminal device to perform random access by periodically broadcasting Msg0. However, the periodic broadcasting of Msg0 will consume system energy and bandwidth. In this case, if no terminal device needs to initiate a random access process, the network device can stop broadcasting Msg0. If a terminal device needs to initiate a random access process, but does not find Msg0, the first terminal device can send a wake-up signal to the network device to trigger the network device to send Msg0.
- step S1420 in response to the wake-up signal, the network device sends Msg0.
- the network device may broadcast Msg0 on a certain frequency band to trigger multiple terminal devices to perform random access, wherein the multiple terminal devices include the first terminal device.
- step S1430 in response to the first terminal device receiving Msg0, the first terminal device sends a preamble code 1 (also referred to as Msg1) to the network device.
- a preamble code 1 also referred to as Msg1
- the transmission resource for the first terminal device to send the preamble 1 may be independently selected by the first terminal device.
- the transmission resource may include one or more of the following time domain resources, frequency domain resources, and spatial domain resources.
- a sequence may be modulated in preamble 1, and the sequence may be one of 16 preset sequences.
- each of the 16 sequences may correspond to an index so that the network device can demodulate preambles carrying different sequences. If the network device receives preambles modulated with the same sequence from different terminal devices, the network device cannot identify that the multiple preambles come from different terminal devices. At this time, the network device may demodulate the multiple preambles sent by the multiple terminal devices as a preamble sent by one terminal device.
- step S1440 the network device sends Msg2 to the first terminal device.
- Msg2 may include one or more of the following: an index of a preamble code received and correctly demodulated by the network device, an index of a time domain resource for sending the preamble code, an index of a channel for sending the preamble code, and a timing advance (TA) value for uplink synchronization.
- TA timing advance
- Msg2 may include a TA value to facilitate time synchronization between the network device and the terminal device.
- Msg2 may include resource configuration parameters for determining a second time domain resource, wherein the second time domain resource may be used to send Msg3. It should be understood that the determination method of the second time domain resource can be shown in FIG9, and for the sake of brevity, it is not repeated here. Of course, in the embodiment of the present application, Msg2 may also include a frequency domain resource for transmitting Msg3.
- the network device may successfully receive and demodulate multiple preamble codes.
- Msg2 includes the indexes of multiple preamble codes.
- the indexes of multiple preamble codes can correspond to a set of the above parameters: the index of the preamble code received and correctly demodulated by the network device, as well as the index of the time domain resource for sending the preamble code, the index of the channel for sending the preamble code, the TA value used for uplink synchronization; the resource configuration parameters for determining the second time domain resources; and the frequency domain resources for transmitting Msg3.
- step S1450 if the index of the preamble code carried in Msg2 includes the index of preamble code 1, the first terminal device sends Msg3 to the network device.
- the transmission resources for sending Msg3 by the first terminal device may be determined based on Msg2, or in other words, the first terminal device sends Msg3 on the transmission resources indicated by Msg2.
- Msg3 includes a terminal device identifier of the first terminal device, wherein the terminal device identifier is a random number generated by the first terminal device.
- the first terminal device determines whether the index of the preamble code carried in Msg2 includes the index of preamble code 1. If the index of the preamble code carried in Msg2 includes the index of preamble code 1, it means that the preamble code 1 sent by the first terminal device is received and correctly demodulated by the network device, and the first terminal device sends Msg3 to the network device.
- the index of the preamble code carried in Msg2 does not include the index of the preamble code 1, it means that the preamble code 1 sent by the first terminal device is not received and correctly demodulated by the network device, then the first terminal device may consider that the random access has failed.
- step S1460 in response to the network device receiving the terminal device identification, the network device sends Msg4 to the first terminal device.
- Msg4 includes a terminal device identifier received by the network device and a first RNTI corresponding to the terminal device identifier.
- the first terminal device may consider that the random access is successful, and then the first terminal device may use the first RNTI as its own identifier and communicate with the network device based on the first RNTI. If the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device may consider that the random access has failed.
- Fig. 15 is a schematic flow chart of a random access method according to another embodiment of the present application.
- the method shown in Fig. 15 includes steps S1510 to S1570.
- step S1510 the network device sends Msg0.
- step S1520 in response to the first terminal device receiving Msg0, the first terminal device sends a preamble code 1 (also referred to as Msg1) to the network device.
- a preamble code 1 also referred to as Msg1
- the transmission resource for the first terminal device to send the preamble 1 may be independently selected by the first terminal device.
- the transmission resource may include one or more of the following time domain resources, frequency domain resources, and spatial domain resources.
- a sequence may be modulated in preamble 1, and the sequence may be one of 16 preset sequences.
- each of the 16 sequences may correspond to an index so that the network device can demodulate preambles carrying different sequences. If the network device receives preambles modulated with the same sequence from different terminal devices, the network device cannot identify that the multiple preambles come from different terminal devices. At this time, the network device may demodulate the multiple preambles sent by the multiple terminal devices as a preamble sent by one terminal device.
- step S1530 the network device sends Msg2 to the first terminal device.
- Msg2 may include one or more of the following: an index of a preamble code received and correctly demodulated by the network device, an index of a time domain resource for sending the preamble code, an index of a channel for sending the preamble code, and a timing advance (TA) value for uplink synchronization.
- TA timing advance
- Msg2 may include a TA value to facilitate time synchronization between the network device and the terminal device.
- Msg2 may include resource configuration parameters for determining a second time domain resource, wherein the second time domain resource may be used to send Msg3. It should be understood that the determination method of the second time domain resource can be shown in FIG9, and for the sake of brevity, it is not repeated here. Of course, in the embodiment of the present application, Msg2 may also include a frequency domain resource for transmitting Msg3.
- Msg2 may include information for instructing the first terminal device to access the network based on the backoff mechanism; parameters for the first terminal device to access the network based on the backoff mechanism (e.g., the maximum number of times the first terminal device attempts to access the target device).
- the network device may successfully receive and demodulate multiple preamble codes.
- Msg2 includes indexes of multiple preamble codes.
- the indexes of multiple preamble codes can correspond to a set of the above parameters: the index of the preamble code received and correctly demodulated by the network device, as well as the index of the time domain resource for sending the preamble code, the index of the channel for sending the preamble code, and the TA value for uplink synchronization; resource configuration parameters for determining the second time domain resources; frequency domain resources for transmitting Msg3; information for indicating that the first terminal device accesses the network based on the backoff mechanism; and parameters for the first terminal device to access the network based on the backoff mechanism.
- step S1540 if the index of the preamble code carried in Msg2 includes the index of preamble code 1, the first terminal device sends Msg3 to the network device.
- the transmission resources for sending Msg3 by the first terminal device may be determined based on Msg2, or in other words, the first terminal device sends Msg3 on the transmission resources indicated by Msg2.
- Msg3 includes a terminal device identifier of the first terminal device, wherein the terminal device identifier is a random number generated by the first terminal device.
- the first terminal device determines whether the index of the preamble code carried in Msg2 includes the index of preamble code 1. If the index of the preamble code carried in Msg2 includes the index of preamble code 1, it means that the preamble code 1 sent by the first terminal device is received and correctly demodulated by the network device, and the first terminal device sends Msg3 to the network device.
- the index of the preamble code carried in Msg2 does not include the index of the preamble code 1, it means that the preamble code 1 sent by the first terminal device is not received and correctly demodulated by the network device, then the first terminal device may consider that the random access has failed.
- step S1550 in response to the network device receiving the terminal device identification, the network device sends Msg4.
- Msg4 includes a terminal device identifier received by the network device and a first RNTI corresponding to the terminal device identifier.
- the first terminal device may consider that the random access is successful, and then the first terminal device may use the first RNTI as its own identifier and communicate with the network device based on the first RNTI. If the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device may consider that the random access has failed.
- step S1560 if the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device considers that the random access has failed.
- step S1570 if the number of times the current first terminal device attempts to access the target device has not reached the maximum number, the first terminal device may continue to attempt to access the target device, that is, re-execute steps S1510 to S1550.
- the transmission resources for the first terminal device to transmit the preamble code and the fourth information can be independently selected by the first terminal device.
- the transmission power PN can be used to transmit the preamble code and/or Msg3 during the Nth attempt of the first terminal device to access the target device.
- the above text takes the case where the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device as an example to introduce a solution in which the first terminal device retries to access the target device.
- the first terminal device will also retry to access the target device after failing to access the target device.
- the way in which the first terminal device retries to access the target device is similar to the solution introduced in step S1570.
- the time domain resources are not limited.
- the time domain resources may be time slots, subframes, mini-subframes, symbols, etc.
- the time domain resources may also be other time domain resources newly introduced in future communication systems.
- access network In addition, in the embodiments of the present application, terms such as “access network”, “access network device”, “access target device” and “random access” can be used interchangeably.
- Fig. 16 is a schematic diagram of a terminal device according to an embodiment of the present application.
- the terminal device 1600 shown in Fig. 16 is a first terminal device, including: a sending unit 1610 and a receiving unit 1620.
- the sending unit 1610 is used to send a preamble code to a target device
- the receiving unit 1620 is configured to receive a first index sent by the target device, where the first index is used to indicate a preamble received by the target device;
- the sending unit 1610 is configured to send a first terminal device identifier to the target device in response to the first index being the same as the index of the preamble;
- the receiving unit 1620 is used to receive first information sent by the target device, where the first information includes a terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
- the first information also includes a first radio network temporary identifier RNTI associated with the terminal device identifier.
- the receiving unit is further used to receive configuration information sent by the target device, where the configuration information is used to configure the length of the first RNTI for the first terminal device.
- the terminal device further includes:
- the third processing unit is used to retain the first RNTI associated with the first terminal device identifier when the first terminal device confirms that the conflict is successfully resolved.
- the first terminal device identifier is generated by the first terminal device.
- the receiving unit is further used to receive second information sent by the target device, where the second information is used to instruct the first terminal device to send the preamble code, and the second information is information that is sent non-periodically, or the second information is information that is sent periodically.
- the first time domain resource for sending the preamble is determined based on a reference time domain resource, and the reference time domain resource is used to receive the second information.
- the first time domain resource is determined based on the reference time domain resource and a resource configuration parameter, and the resource configuration parameter is used to indicate one or more of the following: a time domain offset between the reference time domain resource and the first time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources, the plurality of time domain resources including the first time domain resource; a time interval between two time domain resources that are adjacent in time domain in the plurality of time domain resources; and the number of time domain resources in the plurality of time domain resources.
- the resource configuration parameter is carried in the second information.
- the second information includes a power adjustment parameter
- the power adjustment parameter is used to adjust the transmission power of the preamble code and/or the transmission power of the first terminal device identifier.
- the time domain resource for sending the first terminal device identifier is randomly selected by the first terminal device.
- the first index is carried in third information
- the third information includes one or more of the following: information used to indicate that the first terminal device accesses the network based on the backoff mechanism; parameters used for the first terminal device to access the network based on the backoff mechanism; information used to indicate a second time domain resource for sending the first terminal device identifier.
- the parameter is used to indicate the maximum number of times the first terminal device attempts to access the target device; and/or backoff time information for the first terminal device to attempt to access the target device again.
- the receiving unit is further used to re-listen to the second information when the first terminal device confirms that the conflict resolution has failed and the number of times the first terminal device attempts to access the target device is less than the maximum number of times.
- the terminal device also includes: a fourth processing unit, which is also used to confirm that access to the target device has failed when the first terminal device confirms that the conflict resolution has failed and the number of times the first terminal device attempts to access the target device is greater than or equal to the maximum number of times.
- the receiving unit is used to re-listen to the second information at a first moment, where the first moment is a moment starting from the moment when the first terminal device confirms that the conflict resolution has failed and after the duration indicated by the backoff time information has passed.
- the third information includes one or more of the following: a time domain offset between a time domain resource corresponding to a reception time of the third information and the second time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources, the plurality of time domain resources including the second time domain resource; and a time interval between two time domain resources that are adjacent in time domain in the plurality of time domain resources.
- the multiple indexes are used to indicate multiple preamble codes received by the target device, the multiple indexes include the first index, and the third information is used to indicate information about time domain resources where the multiple preamble codes corresponding to the multiple indexes are located; and/or information about channels where the multiple preamble codes corresponding to the multiple indexes are located.
- the information of the time domain resources where the multiple preamble codes are located includes indexes of the time domain resources where the multiple preamble codes are located, and the indexes of the time domain resources where the multiple preamble codes are located increase in order from early to late in the time domain.
- the multiple preamble codes are sent by multiple terminal devices, and the time domain resources where the multiple preamble codes are located correspond one-to-one to the time domain resources where the multiple terminal devices send multiple terminal device identifiers.
- the order in which the multiple terminal devices send preamble codes on the multiple time domain resources is the same as the order in which the multiple terminal devices send terminal device identifications on the multiple time domain resources.
- the third information channel is a broadcast channel.
- the first terminal device receives the third information within a first time period, and a starting position of the first time period is determined based on a sending time of the preamble code.
- the starting position of the first time period is the sending time of the preamble code, or the starting position of the first time period is separated from the sending time of the preamble code by a first time interval.
- the terminal device further includes: if the third information is not received within the first time period, the fifth processing unit is used to confirm that the conflict resolution fails.
- the first terminal device receives the first information within a second time period, and a starting position of the second time period is determined based on a sending time of the first terminal device identifier.
- the starting position of the second time period is the sending time of the first terminal device identifier, or the starting position of the second time period is separated from the sending time of the first terminal device identifier by a second time interval.
- the terminal device further includes: if the first information is not received within the second time period, a sixth processing unit is used to confirm that the conflict resolution fails.
- the channel for sending the preamble code is the same as the channel for sending the first terminal device identifier.
- Fig. 17 is a schematic diagram of a communication device according to an embodiment of the present application.
- the communication device 1700 shown in Fig. 17 is a target device, and the communication device 1700 includes: a receiving unit 1710 and a sending unit 1720.
- a sending unit 1720 is configured to send a first index to the first terminal device, where the first index is used to indicate a preamble received by a target device;
- the receiving unit 1710 is configured to receive a terminal device identification sent by the terminal device
- the sending unit 1720 is used to send first information to the terminal device, where the first information includes a terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
- the terminal device includes the first terminal device, and the first terminal device corresponds to a first terminal device identifier. If the terminal device identifier in the first information matches the first terminal device identifier, the conflict resolution of the first terminal device is successful; and/or if the terminal device identifier in the first information does not match the first terminal device identifier, the conflict resolution of the first terminal device fails.
- the first information also includes a first radio network temporary identifier RNTI associated with the terminal device identifier.
- the target device when the conflict of the first terminal device is successfully resolved, the target device communicates with the first terminal device based on the first RNTI.
- the sending unit is used to send configuration information to the first terminal device, and the configuration information is used to The first terminal device configures the length of the first RNTI.
- the first terminal device corresponds to a first terminal device identifier
- the first terminal device identifier is generated by the first terminal device.
- the sending unit is used to send second information to the first terminal device, where the second information is used to instruct the first terminal device to send the preamble code, and the second information is information that is sent non-periodically, or the second information is information that is sent periodically.
- the first time domain resource for sending the preamble is determined based on a reference time domain resource, and the reference time domain resource is used to receive the second information.
- the first time domain resource is determined based on the reference time domain resource and a resource configuration parameter, and the resource configuration parameter is used to indicate one or more of the following: a time domain offset between the reference time domain resource and the first time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources, the plurality of time domain resources including the first time domain resource; a time interval between two time domain resources that are adjacent in time domain in the plurality of time domain resources; and the number of time domain resources in the plurality of time domain resources.
- the resource configuration parameter is carried in the second information.
- the second information includes a power adjustment parameter
- the power adjustment parameter is used to adjust the transmission power of the preamble code and/or the transmission power of the terminal device identifier, and the terminal device corresponding to the terminal device identifier includes the first terminal device.
- the time domain resource for sending the first terminal device identifier is randomly selected by the first terminal device.
- the first index is carried in third information
- the third information includes one or more of the following: information used to instruct the terminal device to access the target device based on a backoff mechanism; parameters used for the terminal device to access the target device based on the backoff mechanism; and information used to instruct the terminal device to send a second time domain resource corresponding to the terminal device identifier.
- the parameter is used to indicate the maximum number of times the terminal device attempts to access the target device; and/or backoff time information for the terminal device to attempt to access the target device again.
- the first terminal device fails to resolve the conflict and the number of times the first terminal device attempts to access the target device is greater than or equal to the maximum number of times, the first terminal device fails to access the target device.
- the first moment is the moment when the first terminal device listens to the second information again, and the first moment is the moment after the time indicated by the backoff time information, starting from the moment when the conflict resolution of the first terminal device fails.
- the third information includes one or more of the following: a time domain offset between a time domain resource corresponding to a reception time of the third information and the second time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources, the plurality of time domain resources including the second time domain resource; and a time interval between two time domain resources that are adjacent in time domain in the plurality of time domain resources.
- the multiple indexes are used to indicate multiple preamble codes received by the target device, the multiple indexes include the first index, and the third information is used to indicate information about time domain resources where the multiple preamble codes corresponding to the multiple indexes are located; and/or information about channels where the multiple preamble codes corresponding to the multiple indexes are located.
- the information of the time domain resources where the multiple preamble codes are located includes indexes of the time domain resources where the multiple preamble codes are located, and the indexes of the time domain resources where the multiple preamble codes are located increase in order from early to late in the time domain.
- the multiple preamble codes are sent by multiple terminal devices, and the time domain resources where the multiple preamble codes are located correspond one-to-one to the time domain resources where the multiple terminal devices send multiple terminal device identifiers.
- the order in which the multiple terminal devices send preamble codes on the multiple time domain resources is the same as the order in which the multiple terminal devices send terminal device identifications on the multiple time domain resources.
- the third information channel is a broadcast channel.
- the first terminal device receives the third information within a first time period, and a starting position of the first time period is determined based on a sending time of the preamble code.
- the starting position of the first time period is the sending time of the preamble code, or the starting position of the first time period is separated from the sending time of the preamble code by a first time interval.
- conflict resolution of the first terminal device fails.
- the terminal device is the first terminal device, the first terminal device corresponds to a first terminal device identifier, the first terminal device receives the first information within a second time period, and the starting position of the second time period is determined based on the sending time of the first terminal device identifier.
- the starting position of the second time period is the sending time of the first terminal device identifier, or the second The start position of the time period is separated from the sending time of the first terminal device identifier by a second time interval.
- conflict resolution of the first terminal device fails.
- the terminal device is the first terminal device, the first terminal device corresponds to a first terminal device identifier, and a channel for sending the preamble code is the same as a channel for sending the first terminal device identifier.
- the sending unit 1610 and the receiving unit 1620 may be a transceiver 1830.
- the terminal device 1600 may further include a processor 1810 and a memory 1820, as specifically shown in FIG. 18 .
- the sending unit 1710 and the receiving unit 1720 may be a transceiver 1830.
- the communication device 1700 may further include a processor 1810 and a memory 1820, as specifically shown in FIG. 18 .
- FIG18 is a schematic structural diagram of a communication device according to an embodiment of the present application.
- the dotted lines in FIG18 indicate that the unit or module is optional.
- the device 1800 may be used to implement the method described in the above method embodiment.
- the device 1800 may be a chip, a terminal device, or a network device.
- the device 1800 may include one or more processors 1810.
- the processor 1810 may support the device 1800 to implement the method described in the above method embodiment.
- the processor 1810 may be a general-purpose processor or a special-purpose processor.
- the processor may be a central processing unit (CPU).
- the processor may also be other general-purpose processors, digital signal processors (DSP), application specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
- DSP digital signal processor
- ASIC application specific integrated circuits
- FPGA field programmable gate arrays
- a general-purpose processor may be a microprocessor or the processor may also be any conventional processor, etc.
- the apparatus 1800 may further include one or more memories 1820.
- the memory 1820 stores a program, which can be executed by the processor 1810, so that the processor 1810 executes the method described in the above method embodiment.
- the memory 1820 may be independent of the processor 1810 or integrated in the processor 1810.
- the apparatus 1800 may further include a transceiver 1830.
- the processor 1810 may communicate with other devices or chips through the transceiver 1830.
- the processor 1810 may transmit and receive data with other devices or chips through the transceiver 1830.
- the present application also provides a computer-readable storage medium for storing a program.
- the computer-readable storage medium can be applied to a terminal or network device provided in the present application, and the program enables a computer to execute the method performed by the terminal or network device in each embodiment of the present application.
- the embodiment of the present application also provides a computer program product.
- the computer program product includes a program.
- the computer program product can be applied to the terminal or network device provided in the embodiment of the present application, and the program enables the computer to execute the method performed by the terminal or network device in each embodiment of the present application.
- the embodiment of the present application also provides a computer program.
- the computer program can be applied to the terminal or network device provided in the embodiment of the present application, and the computer program enables a computer to execute the method executed by the terminal or network device in each embodiment of the present application.
- the "indication" mentioned can be a direct indication, an indirect indication, or an indication of an association relationship.
- a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association relationship between A and B.
- B corresponding to A means that B is associated with A, and B can be determined according to A.
- determining B according to A does not mean determining B only according to A, and B can also be determined according to A and/or other information.
- the term "corresponding" may indicate that there is a direct or indirect correspondence between the two, or an association relationship between the two, or a relationship of indication and being indicated, configuration and being configured, etc.
- pre-definition or “pre-configuration” can be implemented by pre-saving corresponding codes, tables or other methods that can be used to indicate relevant information in a device (for example, including a terminal device and a network device), and the present application does not limit the specific implementation method.
- pre-definition can refer to what is defined in the protocol.
- the “protocol” may refer to a standard protocol in the communication field, for example, it may include an LTE protocol, an NR protocol, and related protocols used in future communication systems, and the present application does not limit this.
- the term "and/or" is only a description of the association relationship of the associated objects, indicating that there can be three relationships.
- a and/or B can represent: A exists alone, A and B exist at the same time, and B exists alone.
- the character "/" in this article generally indicates that the associated objects before and after are in an "or" relationship.
- the size of the serial numbers of the above-mentioned processes does not mean the order of execution.
- the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
- the disclosed systems, devices and methods can be implemented in other ways.
- the device embodiments described above are only schematic, for example, the division of the units is only a logical function division, and there may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed.
- Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the computer program product includes one or more computer instructions.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
- the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer instructions may be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
- the computer-readable storage medium may be any available medium that can be read by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
- the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
- a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
- an optical medium e.g., a digital video disc (DVD)
- DVD digital video disc
- SSD solid state disk
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本申请涉及通信技术领域,并且更为具体地,涉及一种无线通信的方法及通信设备。The present application relates to the field of communication technology, and more specifically, to a wireless communication method and communication device.
传统的随机接入过程过于复杂,可能导致终端设备的功耗较大。在一些场景中,为了降低终端设备的功耗,引入了低能力终端设备(例如,前文介绍的电子标签),该类型的终端设备相比于传统的终端设备而言,其支持的通信方式可能较为简单。此时,如果该类型终端设备仍然采用传统的随机接入方式接入网络设备,可能导致终端设备的功耗增大。The traditional random access process is too complicated and may cause the terminal device to consume more power. In some scenarios, in order to reduce the power consumption of the terminal device, low-capability terminal devices (for example, the electronic tags mentioned above) are introduced. Compared with traditional terminal devices, the communication methods supported by this type of terminal device may be simpler. At this time, if this type of terminal device still uses the traditional random access method to access the network device, the power consumption of the terminal device may increase.
发明内容Summary of the invention
本申请提供一种无线通信的方法及通信设备。下面对本申请涉及的各个方面进行介绍。The present application provides a wireless communication method and a communication device. The following introduces various aspects involved in the present application.
第一方面,提供了一种无线通信的方法,包括:第一终端设备向目标设备发送前导码;所述第一终端设备接收所述目标设备发送的第一索引,所述第一索引用于指示目标设备接收的前导码;响应于所述第一索引与所述前导码的索引相同,所述第一终端设备向所述目标设备发送第一终端设备标识;所述第一终端设备接收所述目标设备发送的第一信息,所述第一信息包括所述目标设备接收的终端设备标识;其中,所述目标设备包括网络设备和/或第二终端设备。In a first aspect, a method for wireless communication is provided, comprising: a first terminal device sends a preamble code to a target device; the first terminal device receives a first index sent by the target device, the first index being used to indicate the preamble code received by the target device; in response to the first index being the same as the index of the preamble code, the first terminal device sends a first terminal device identifier to the target device; the first terminal device receives first information sent by the target device, the first information including the terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
第二方面,提供了一种随机接入的方法,包括:目标设备接收第一终端设备发送的前导码;所述目标设备向所述第一终端设备发送第一索引,所述第一索引用于指示网络设备接收的前导码;所述目标设备接收所述终端设备发送的终端设备标识;所述目标设备向所述终端设备发送第一信息,所述第一信息包括所述目标设备接收的终端设备标识;其中,所述目标设备包括网络设备和/或第二终端设备。In a second aspect, a random access method is provided, comprising: a target device receives a preamble code sent by a first terminal device; the target device sends a first index to the first terminal device, the first index being used to indicate the preamble code received by a network device; the target device receives a terminal device identification sent by the terminal device; the target device sends first information to the terminal device, the first information including the terminal device identification received by the target device; wherein the target device includes a network device and/or a second terminal device.
第三方面,提供了一种终端设备,所述终端设备为第一终端设备,包括:发送单元,用于向目标设备发送前导码;接收单元,用于接收所述目标设备发送的第一索引,所述第一索引用于指示目标设备接收的前导码;所述发送单元,用于响应于所述第一索引与所述前导码的索引相同,向所述目标设备发送第一终端设备标识;所述接收单元,用于接收所述目标设备发送的第一信息,所述第一信息包括所述目标设备接收到的终端设备标识;其中,所述目标设备包括网络设备和/或第二终端设备。According to a third aspect, a terminal device is provided, which is a first terminal device, comprising: a sending unit, configured to send a preamble code to a target device; a receiving unit, configured to receive a first index sent by the target device, wherein the first index is used to indicate the preamble code received by the target device; the sending unit, configured to send a first terminal device identifier to the target device in response to the first index being the same as the index of the preamble code; the receiving unit, configured to receive first information sent by the target device, wherein the first information includes the terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
第四方面,提供了一种通信设备,所述通信设备为目标设备,包括:接收单元,用于接收第一终端设备发送的前导码;发送单元,用于向所述第一终端设备发送第一索引,所述第一索引用于指示网络设备接收的前导码;所述接收单元,用于接收所述终端设备发送的终端设备标识;所述发送单元,用于向所述终端设备发送第一信息,所述第一信息包括所述目标设备接收的终端设备标识;其中,所述目标设备包括网络设备和/或第二终端设备。In a fourth aspect, a communication device is provided, which is a target device, comprising: a receiving unit, used to receive a preamble code sent by a first terminal device; a sending unit, used to send a first index to the first terminal device, the first index being used to indicate the preamble code received by a network device; the receiving unit, used to receive a terminal device identifier sent by the terminal device; the sending unit, used to send first information to the terminal device, the first information including the terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
第五方面,提供一种终端设备,包括处理器、存储器以及通信接口,所述存储器用于存储一个或多个计算机程序,所述处理器用于调用所述存储器中的计算机程序,使得所述终端设备执行第一方面的方法中的部分或全部步骤。In a fifth aspect, a terminal device is provided, comprising a processor, a memory and a communication interface, wherein the memory is used to store one or more computer programs, and the processor is used to call the computer programs in the memory so that the terminal device executes part or all of the steps in the method of the first aspect.
第六方面,提供一种通信设备,包括处理器、存储器、收发器,所述存储器用于存储一个或多个计算机程序,所述处理器用于调用所述存储器中的计算机程序,使得所述通信设备执行第二方面的方法中的部分或全部步骤。In a sixth aspect, a communication device is provided, comprising a processor, a memory, and a transceiver, wherein the memory is used to store one or more computer programs, and the processor is used to call the computer programs in the memory so that the communication device executes part or all of the steps in the method of the second aspect.
第七方面,本申请实施例提供了一种通信系统,该系统包括上述的终端设备和/或通信设备。在另一种可能的设计中,该系统还可以包括本申请实施例提供的方案中与终端设备或网络设备进行交互的其他设备。In a seventh aspect, an embodiment of the present application provides a communication system, which includes the above-mentioned terminal device and/or communication device. In another possible design, the system may also include other devices that interact with the terminal device or network device in the solution provided by the embodiment of the present application.
第八方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序使得通信设备(例如,终端设备或通信设备)执行上述各个方面的方法中的部分或全部步骤。In an eighth aspect, an embodiment of the present application provides a computer-readable storage medium, which stores a computer program, and the computer program enables a communication device (for example, a terminal device or a communication device) to perform some or all of the steps in the methods of the above aspects.
第九方面,本申请实施例提供了一种计算机程序产品,其中,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使通信设备(例如,终端设备或通信设备)执行上述各个方面的方法中的部分或全部步骤。在一些实现方式中,该计算机程序产品可以为一个软件安装包。In a ninth aspect, an embodiment of the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to enable a communication device (e.g., a terminal device or a communication device) to perform some or all of the steps in the above-mentioned various aspects of the method. In some implementations, the computer program product can be a software installation package.
第十方面,本申请实施例提供了一种芯片,该芯片包括存储器和处理器,处理器可以从存储器中调用并运行计算机程序,以实现上述各个方面的方法中所描述的部分或全部步骤。In the tenth aspect, an embodiment of the present application provides a chip, which includes a memory and a processor. The processor can call and run a computer program from the memory to implement some or all of the steps described in the methods of the above aspects.
在本申请实施例中,第一终端设备可以基于第一终端设备标识进行随机接入过程,相比于传统的随 机接入过程而言,有助于降低随机接入过程中终端设备的功耗。In the embodiment of the present application, the first terminal device can perform a random access process based on the first terminal device identifier. For the random access process, it helps to reduce the power consumption of terminal devices during random access.
图1是本申请实施例应用的无线通信系统100。FIG. 1 is a wireless communication system 100 to which an embodiment of the present application is applied.
图2A是传统的4步随机接入过程的示意图。FIG. 2A is a schematic diagram of a conventional four-step random access process.
图2B是非竞争性的随机接入过程的流程图。FIG. 2B is a flow chart of a non-contention random access process.
图2C是传统的2步随机接入过程的示意图。FIG. 2C is a schematic diagram of a conventional two-step random access process.
图2D是传统的另一种2步随机接入过程的流程图。FIG. 2D is a flow chart of another conventional two-step random access process.
图3是本申请实施例适用的A-IoT通信系统的示意图。FIG3 is a schematic diagram of an A-IoT communication system applicable to an embodiment of the present application.
图4A~图4D是本申请实施例适用的A-IoT通信系统的4种拓扑网络结构的示意图。4A to 4D are schematic diagrams of four topological network structures of an A-IoT communication system applicable to embodiments of the present application.
图5是本申请实施例适用的RF接收机的接收过程的示意图。FIG5 is a schematic diagram of a receiving process of an RF receiver to which an embodiment of the present application is applicable.
图6是本申请实施例适用的中频接收机的接收过程的示意图。FIG6 is a schematic diagram of a receiving process of an intermediate frequency receiver applicable to an embodiment of the present application.
图7示出了射频识别(radio frequency identification,RFID)的初始接入过程的示意性流程图。Figure 7 shows a schematic flow chart of the initial access process of radio frequency identification (RFID).
图8是本申请实施例的无线通信方法的示意性流程图。FIG8 is a schematic flowchart of a wireless communication method according to an embodiment of the present application.
图9是本申请实施例中的第二时域资源的指示方式的示意图。FIG. 9 is a schematic diagram of a method for indicating a second time domain resource in an embodiment of the present application.
图10是本申请实施例中发送前导码的时域资源与发送终端设备标识的时域资源的示意图。FIG10 is a schematic diagram of time domain resources for sending a preamble code and time domain resources for sending a terminal device identifier in an embodiment of the present application.
图11介绍本申请实施例中的第一时域资源的指示方式的示意图。FIG. 11 is a schematic diagram illustrating a method for indicating a first time domain resource in an embodiment of the present application.
图12是本申请实施例的随机接入方法的示意性流程图。FIG12 is a schematic flowchart of a random access method according to an embodiment of the present application.
图13是本申请另一实施例的随机接入方法的示意性流程图。FIG13 is a schematic flowchart of a random access method according to another embodiment of the present application.
图14是本申请另一实施例的随机接入方法的示意性流程图。FIG14 is a schematic flowchart of a random access method according to another embodiment of the present application.
图15是本申请另一实施例的随机接入方法的示意性流程图。FIG15 is a schematic flowchart of a random access method according to another embodiment of the present application.
图16是本申请实施例的终端设备的示意图。FIG. 16 is a schematic diagram of a terminal device according to an embodiment of the present application.
图17是本申请实施例的通信设备的示意图。FIG. 17 is a schematic diagram of a communication device according to an embodiment of the present application.
图18是本申请实施例的通信装置的示意性结构图。FIG. 18 is a schematic structural diagram of a communication device according to an embodiment of the present application.
下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below in conjunction with the accompanying drawings.
图1是本申请实施例应用的无线通信系统100。该无线通信系统100可以包括网络设备110和终端设备120。网络设备110可以是与终端设备120通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备120进行通信。FIG1 is a wireless communication system 100 used in an embodiment of the present application. The wireless communication system 100 may include a network device 110 and a terminal device 120. The network device 110 may be a device that communicates with the terminal device 120. The network device 110 may provide communication coverage for a specific geographical area, and may communicate with the terminal device 120 located in the coverage area.
图1示例性地示出了一个网络设备和两个终端,可选地,该无线通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。FIG1 exemplarily shows a network device and two terminals. Optionally, the wireless communication system 100 may include multiple network devices and each network device may include other number of terminal devices within its coverage area, which is not limited in the embodiments of the present application.
可选地,该无线通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。Optionally, the wireless communication system 100 may also include other network entities such as a network controller and a mobility management entity, which is not limited in the embodiments of the present application.
应理解,本申请实施例的技术方案可以应用于各种通信系统,例如:第五代(5th generation,5G)系统或新无线(new radio,NR)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)等。本申请提供的技术方案还可以应用于未来的通信系统,如第六代移动通信系统,又如卫星通信系统,等等。It should be understood that the technical solutions of the embodiments of the present application can be applied to various communication systems, such as: the fifth generation (5th generation, 5G) system or new radio (new radio, NR), long term evolution (long term evolution, LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE time division duplex (time division duplex, TDD), etc. The technical solutions provided by the present application can also be applied to future communication systems, such as the sixth generation mobile communication system, satellite communication system, etc.
本申请实施例中的终端设备也可以称为用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台(mobile station,MS)、移动终端(mobile terminal,MT)、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。本申请实施例中的终端设备可以是指向用户提供语音和/或数据连通性的设备,可以用于连接人、物和机,例如具有无线连接功能的手持式设备、车载设备等。本申请的实施例中的终端设备可以是手机(mobile phone)、平板电脑(Pad)、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。可选地,UE可以用于充当基站。例如,UE可以充当调度实体,其在V2X或D2D等中的UE之间提供侧行链路信号。比如,蜂窝电话和汽车利用侧行链路信号彼此通信。蜂窝电话和智能家居设备之间通信,而无需通过基站中继通信信号。The terminal device in the embodiment of the present application may also be referred to as user equipment (UE), access terminal, user unit, user station, mobile station, mobile station (MS), mobile terminal (MT), remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device. The terminal device in the embodiment of the present application may be a device that provides voice and/or data connectivity to a user, and can be used to connect people, objects and machines, such as a handheld device with wireless connection function, a vehicle-mounted device, etc. The terminal device in the embodiment of the present application can be a mobile phone, a tablet computer, a laptop, a PDA, a mobile internet device (MID), a wearable device, a virtual reality (VR) device, an augmented reality (AR) device, a wireless terminal in industrial control, a wireless terminal in self-driving, a wireless terminal in remote medical surgery, a wireless terminal in smart grid, a wireless terminal in transportation safety, a wireless terminal in smart city, a wireless terminal in smart home, etc. Optionally, the UE can be used to act as a base station. For example, the UE can act as a scheduling entity that provides sidelink signals between UEs in V2X or D2D, etc. For example, a cellular phone and a car communicate with each other using sidelink signals. The cellular phone and the smart home device communicate with each other without relaying the communication signal through the base station.
本申请实施例中的网络设备可以是用于与终端设备通信的设备,该网络设备也可以称为接入网设备或无线接入网设备,如网络设备可以是基站。本申请实施例中的网络设备可以是指将终端设备接入到 无线网络的无线接入网(radio access network,RAN)节点(或设备)。基站可以广义的覆盖如下中的各种名称,或与如下名称进行替换,比如:节点B(NodeB)、演进型基站(evolved NodeB,eNB)、下一代基站(next generation NodeB,gNB)、中继站、接入点、发送点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、主站MeNB、辅站SeNB、多制式无线(MSR)节点、家庭基站、网络控制器、接入节点、无线节点、接入点(access point,AP)、发送节点、收发节点、基带单元(base band unit,BBU)、射频拉远单元(remote radio unit,RRU)、有源天线单元(active antenna unit,AAU)、射频头(remote radio head,RRH)、中心单元(central unit,CU)、分布式单元(distributed unit,DU)、定位节点等。基站可以是宏基站、微基站、中继节点、施主节点或类似物,或其组合。基站还可以指用于设置于前述设备或装置内的通信模块、调制解调器或芯片。基站还可以是移动交换中心以及设备到设备D2D、车辆外联(vehicle-to-everything,V2X)、机器到机器(machine-to-machine,M2M)通信中承担基站功能的设备、6G网络中的网络侧设备、未来的通信系统中承担基站功能的设备等。基站可以支持相同或不同接入技术的网络。本申请的实施例对网络设备所采用的具体技术和具体设备形态不做限定。The network device in the embodiment of the present application may be a device for communicating with a terminal device, and the network device may also be referred to as an access network device or a wireless access network device. For example, the network device may be a base station. The network device in the embodiment of the present application may refer to a device that connects a terminal device to a wireless access network. A radio access network (RAN) node (or device) of a wireless network. A base station can broadly cover various names as follows, or be replaced with the following names, such as: NodeB, evolved NodeB (eNB), next generation NodeB (gNB), relay station, access point, transmitting point (TRP), transmitting point (TP), master station MeNB, secondary station SeNB, multi-standard radio (MSR) node, home base station, network controller, access node, wireless node, access point (AP), transmitting node, transceiver node, base band unit (BBU), remote radio unit (RRU), active antenna unit (AAU), remote radio head (RRH), central unit (CU), distributed unit (DU), positioning node, etc. A base station can be a macro base station, a micro base station, a relay node, a donor node or the like, or a combination thereof. The base station may also refer to a communication module, modem or chip used to be set in the aforementioned device or apparatus. The base station may also be a mobile switching center and a device to device D2D, vehicle-to-everything (V2X), machine-to-machine (M2M) communication device that performs the base station function, a network side device in a 6G network, and a device that performs the base station function in a future communication system. The base station may support networks with the same or different access technologies. The embodiments of the present application do not limit the specific technology and specific device form adopted by the network equipment.
基站可以是固定的,也可以是移动的。例如,直升机或无人机可以被配置成充当移动基站,一个或多个小区可以根据该移动基站的位置移动。在其他示例中,直升机或无人机可以被配置成用作与另一基站通信的设备。Base stations can be fixed or mobile. For example, a helicopter or drone can be configured to act as a mobile base station, and one or more cells can move based on the location of the mobile base station. In other examples, a helicopter or drone can be configured to act as a device that communicates with another base station.
在一些部署中,本申请实施例中的网络设备可以是指CU或者DU,或者,网络设备包括CU和DU。gNB还可以包括AAU。In some deployments, the network device in the embodiments of the present application may refer to a CU or a DU, or the network device includes a CU and a DU. The gNB may also include an AAU.
网络设备和终端设备可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上;还可以部署在空中的飞机、气球和卫星上。本申请实施例中对网络设备和终端设备所处的场景不做限定。The network equipment and terminal equipment can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; they can also be deployed on the water surface; they can also be deployed on aircraft, balloons and satellites in the air. The embodiments of the present application do not limit the scenarios in which the network equipment and terminal equipment are located.
应理解,本申请中的通信设备的全部或部分功能也可以通过在硬件上运行的软件功能来实现,或者通过平台(例如云平台)上实例化的虚拟化功能来实现。It should be understood that all or part of the functions of the communication device in the present application may also be implemented by software functions running on hardware, or by virtualization functions instantiated on a platform (eg, a cloud platform).
随机接入过程Random access process
在一些协议中,规定了两种随机接入过程的方式:2步随机接入信道(2-step random access channel,2-step RACH)和4步随机接入信道(4-step random access channel,4-step RACH)。其中,4-step RACH过程是在LTE系统中引入,同样也在NR系统中应用。下文结合图2A介绍传统的4步随机接入过程。通常,终端设备在发起RACH过程之前,可以先从系统消息或者专用信令中获取PRACH资源配置。之后,可以执行步骤S210至步骤S240。In some protocols, two random access procedures are specified: 2-step random access channel (2-step RACH) and 4-step random access channel (4-step RACH). Among them, the 4-step RACH process is introduced in the LTE system and is also used in the NR system. The following introduces the traditional 4-step random access process in conjunction with Figure 2A. Usually, before initiating the RACH process, the terminal device can first obtain the PRACH resource configuration from the system message or dedicated signaling. Afterwards, steps S210 to S240 can be executed.
在步骤S210中,终端设备向网络设备发送前导码(preamble)。该前导码在MAC层协议中可以称为消息1(message1,Msg1)。In step S210, the terminal device sends a preamble to the network device. The preamble may be referred to as message 1 (Msg1) in the MAC layer protocol.
通常,在发送前导码之后,可以在接收窗口(reception window)中等待网络设备反馈的消息2(message2,Msg2)。接收窗口的起始时间和终止时间是根据配置参数设定的。从网络设备的角度,网络设备有能力区分不同时频域上收到的前导码,或者相同时频域上不同的前导码。但是网络设备无法区分相同时频域上收到的多个终端设备发送的相同的前导码,在这种情况下就会发生接入冲突。Usually, after sending the preamble, you can wait for message 2 (Msg2) fed back by the network device in the reception window. The start time and end time of the reception window are set according to the configuration parameters. From the perspective of the network device, the network device has the ability to distinguish preambles received in different time-frequency domains, or different preambles in the same time-frequency domain. However, the network device cannot distinguish the same preamble sent by multiple terminal devices received in the same time-frequency domain, in which case an access conflict will occur.
在步骤S220中,网络设备向终端设备发送消息2。In step S220, the network device sends message 2 to the terminal device.
通常,该消息2可以是一个群发的消息,也就是说,消息2可以包括给多个终端设备的随机接入响应(random access response,RAR)消息。消息2的寻址信息包含在一个称为随机接入-无线网络临时标识(random access network temporary identifier,RA-RNTI)的群发标识中,用来标识收到的前导码所在的时域资源信息、频域资源信息和载波类型信息,其中,载波类型信息用于指示前导码所在的载波为SUL载波或NUL载波。Typically, the message 2 may be a group message, that is, the message 2 may include a random access response (RAR) message to multiple terminal devices. The addressing information of the message 2 is contained in a group identifier called a random access network temporary identifier (RA-RNTI), which is used to identify the time domain resource information, frequency domain resource information and carrier type information of the received preamble code, wherein the carrier type information is used to indicate whether the carrier of the preamble code is a SUL carrier or a NUL carrier.
也就是说,一个消息2中可以包括从相同载波以及相同时频点上收到的前导码对应的RAR。在发送给每个终端设备的RAR IE中可以包含网络设备为终端设备配置的临时标识(temporary cell-radio network temporary identifier,T_C_RNTI),时间提前量(用于上行同步),用于发送消息3(message3,Msg3)的上行授权(UL-GRANT)以及网络设备接收的前导码的索引。That is, a message 2 may include the RAR corresponding to the preamble received from the same carrier and the same time-frequency point. The RAR IE sent to each terminal device may include the temporary identifier (temporary cell-radio network temporary identifier, T_C_RNTI) configured by the network device for the terminal device, the time advance (for uplink synchronization), the uplink grant (UL-GRANT) for sending message 3 (message3, Msg3), and the index of the preamble received by the network device.
在一些实现方式中,消息2中还可以包含一个退避(backoff)参数,用于缓减前导码之间的冲突。此时,终端设备如果决定再次发送前导码,那么会基于退避参数产生一个随机时间,使得再次发送的前导码的发送时间至少晚于所产生的随机时间。In some implementations, message 2 may also include a backoff parameter to mitigate conflicts between preambles. At this time, if the terminal device decides to send the preamble again, a random time will be generated based on the backoff parameter, so that the sending time of the preamble sent again is at least later than the generated random time.
在步骤S230中,若终端设备确认网络设备收到了自己发送的前导码,终端设备基于UL-GRANT向网络设备发送消息3,又称“调度传输(scheduled transmission)”。消息3包括终端设备标识(又称终端设备ID)。In step S230, if the terminal device confirms that the network device has received the preamble code sent by itself, the terminal device sends message 3, also known as "scheduled transmission", to the network device based on UL-GRANT. Message 3 includes the terminal device identification (also known as the terminal device ID).
通常,终端设备可以基于RA-RNTI和RAR中的前导码索引,确定网络设备是否收到了自己发送的前导码。若终端设备确认网络设备收到了自己发送的前导码,终端设备基于UL-GRANT发送message3, 其中至少包括了终端的标识(终端设备ID)。消息3在物理层上可以采用T_C_RNTI来寻址。Usually, the terminal device can determine whether the network device has received the preamble code it sent based on the RA-RNTI and the preamble code index in the RAR. If the terminal device confirms that the network device has received the preamble code it sent, the terminal device sends message 3 based on UL-GRANT. At least the terminal identifier (terminal device ID) is included. Message 3 can be addressed using T_C_RNTI on the physical layer.
之后,终端设备可以启动一个定时器,并且在定时器运行期间,检测承载消息4的下行控制信道PDCCH。假如多个终端设备在步骤S210发生冲突的话,那么在步骤S230会继续发送冲突,因为多个终端设备会基于相同的UL-GRANT发送消息3,但是消息3的MAC CE中包含的终端标识是不相同的。Afterwards, the terminal device may start a timer and, during the timer operation, detect the downlink control channel PDCCH carrying message 4. If multiple terminal devices collide in step S210, then the conflict will continue to be sent in step S230, because multiple terminal devices will send message 3 based on the same UL-GRANT, but the terminal identifiers contained in the MAC CE of message 3 are different.
在步骤S240中,若网络设备正确解码了消息3,网络设备可以向终端设备发送消息4(message4,Msg4)。该消息又称“冲突解决(contention resolution)”In step S240, if the network device correctly decodes message 3, the network device may send message 4 (message 4, Msg4) to the terminal device. This message is also called "contention resolution".
通常,这个消息4中是以收到的消息3中的T_C_RNTI来寻址,并且在其中的MAC CE中包括了终端设备在消息3中包含的终端设备标识和一个新分配的C-RNTI。Typically, this message 4 is addressed using the T_C_RNTI received in message 3, and the MAC CE therein includes the terminal device identifier included in message 3 and a newly allocated C-RNTI.
如果多个终端设备在相同的UL GRANT上发送了消息3,网络设备可能可以正确解码其中的一个或者无法解码(比如,多个终端设备发送的消息3之间的干扰水平相当的时候)。因此,终端设备在收到消息4的时候,如果发现物理下行控制信道(physical downlink control channel,PDCCH)上卷积的T_C_RNTI和自己发送消息3的吻合,那么会进一步检查网络设备发送的消息4中的媒体接入控制控制元素(medium access control control element,MAC CE)中是否包含自己的终端设备标识。之后,若消息4包含自己的终端设备标识,终端设备才能确认随机接入过程完成,并且把新分配的C-RNTI作为自己的身份标识。这个身份标识用于以后的物理层,MAC和无线资源控制(radio resource control,RRC)层协议的寻址信息。If multiple terminal devices send message 3 on the same UL GRANT, the network device may be able to correctly decode one of them or not (for example, when the interference level between the messages 3 sent by multiple terminal devices is similar). Therefore, when the terminal device receives message 4, if it finds that the T_C_RNTI convolved on the physical downlink control channel (PDCCH) matches the message 3 sent by itself, it will further check whether the medium access control control element (MAC CE) in the message 4 sent by the network device contains its own terminal device identification. After that, if message 4 contains its own terminal device identification, the terminal device can confirm that the random access process is completed and use the newly allocated C-RNTI as its own identity. This identity is used for addressing information of subsequent physical layer, MAC and radio resource control (RRC) layer protocols.
上文结合图2A介绍的随机接入过程又可以称为竞争性随机接入过程(contention based random access,CBRA),在一些协议中还引入了非竞争性的随机接入过程(non contention or contention free random access,CFRA)。图2B示出了非竞争性的随机接入过程的流程图。在非竞争性随机接入过程中,网络设备可以将特定的随机接入资源分配给终端设备,相应地,网络设备通过随机接入前导码可以识别特定的终端设备。The random access process described above in conjunction with FIG2A can also be called a competitive random access process (contention based random access, CBRA). In some protocols, a non-competitive random access process (non-contention or contention free random access, CFRA) is also introduced. FIG2B shows a flow chart of a non-competitive random access process. In the non-competitive random access process, the network device can allocate a specific random access resource to the terminal device, and accordingly, the network device can identify a specific terminal device through a random access preamble.
参见图2B所示,网络设备向终端设备发送RA前导码分配信息(RA preamble assignment)。之后,响应于RA前导码分配信息,终端设备可以向网络设备前导码,相应地,网络设备中MAC处理过程同基于竞争的随机接入过程。网络设备接收到前导码之后,可以向终端设备发送随机接入响应(random access response,RAR),相应地,终端设备的处理过程同基于竞争的随机接入过程。As shown in FIG. 2B , the network device sends RA preamble assignment information to the terminal device. Afterwards, in response to the RA preamble assignment information, the terminal device may send a preamble to the network device, and accordingly, the MAC processing process in the network device is the same as the contention-based random access process. After receiving the preamble, the network device may send a random access response (RAR) to the terminal device, and accordingly, the processing process of the terminal device is the same as the contention-based random access process.
2步随机接入过程与4步随机接入过程之间的差异在于:2步随机接入过程在消息A的内容合并了4步随机接入过程的消息1和消息3,在消息B中合并了4步随机接入过程的消息2和消息4的内容。图2C以及图2D中示出了传统的2步随机接入过程。The difference between the 2-step random access procedure and the 4-step random access procedure is that the 2-step random access procedure combines the contents of message 1 and message 3 of the 4-step random access procedure in message A, and combines the contents of message 2 and message 4 of the 4-step random access procedure in message B. FIG2C and FIG2D show the conventional 2-step random access procedure.
参见图2C所示,终端设备向网络设备发送消息A,其中,消息A包括前导码以及物理上行共享信道(physical uplink shared channel,PUSCH),其中,PUSCH中包含终端设备的终端设备标识。之后,网络设备向终端设备发送消息B(又称“冲突解决消息”)。在消息B中用于寻址终端设备的方式有两种:方式1以及方式2。As shown in FIG. 2C , the terminal device sends a message A to the network device, wherein the message A includes a preamble and a physical uplink shared channel (PUSCH), wherein the PUSCH includes a terminal device identifier of the terminal device. Afterwards, the network device sends a message B (also called a “conflict resolution message”) to the terminal device. There are two ways to address the terminal device in message B: way 1 and way 2.
在方式1中,如果在消息A中的终端设备标识为小区无线网络临时标识(cell-radio network temporary identifier,C-RNTI),那么承载在消息B的PDCCH上卷积的也是C-RNTI。在这种情况下,如果终端设备能够确认消息B(又称冲突解决)的PDCCH上卷积的C-RNTI和自己的C-RNTI吻合,则随机接入过程已经成功,即冲突已经解决。In mode 1, if the terminal device identifier in message A is a cell-radio network temporary identifier (C-RNTI), then the C-RNTI is also convolved on the PDCCH carried in message B. In this case, if the terminal device can confirm that the C-RNTI convolved on the PDCCH of message B (also known as conflict resolution) matches its own C-RNTI, the random access process has been successful, that is, the conflict has been resolved.
通常,方式1适用于RRC_CONNECTED状态下的终端设备,即终端设备已经完成了初始接入,并且和网络设备之间建立了RRC连接。Generally, method 1 is applicable to a terminal device in the RRC_CONNECTED state, that is, the terminal device has completed initial access and established an RRC connection with the network device.
在方式2中,如果在消息A中的终端设备标识为除了C-RNTI之外的其他的标识,那么在承载消息B的PDCCH上卷积的是RA-RNTI。相应地,如果消息B中的成功RAR(SuccessRAR)中包含的终端设备标识和终端设备本身的终端设备标识是吻合的,那么终端设备认为随机接入过程成功,冲突解决。否则终端设备可以选择重新发送消息A,或者,终端设备回落到4步随机接入过程。In mode 2, if the terminal device identifier in message A is an identifier other than C-RNTI, then the RA-RNTI is convolved on the PDCCH carrying message B. Correspondingly, if the terminal device identifier contained in the Success RAR (SuccessRAR) in message B matches the terminal device identifier of the terminal device itself, then the terminal device considers that the random access process is successful and the conflict is resolved. Otherwise, the terminal device can choose to resend message A, or the terminal device falls back to the 4-step random access process.
通常,方式2适用于除了方式1适用的其他场景。Generally, method 2 is applicable to other scenarios besides method 1.
参见图2D所示,网络设备向终端设备发送分配信息(又称RA前导码以及PUSCH分配信息),以分配传输前导码以及PUSCH的传输资源。之后,终端设备基于分配信息向网络设备发送消息A,其中,消息A包括前导码以及PUSCH,其中,PUSCH中包含终端设备的终端设备标识。之后,网络设备向终端设备发送消息B(又称“随机接入响应”)。As shown in FIG. 2D , the network device sends allocation information (also known as RA preamble and PUSCH allocation information) to the terminal device to allocate transmission resources for the transmission preamble and PUSCH. Afterwards, the terminal device sends message A to the network device based on the allocation information, wherein message A includes the preamble and PUSCH, wherein the PUSCH includes the terminal device identifier of the terminal device. Afterwards, the network device sends message B (also known as "random access response") to the terminal device.
物联网(internet of thing,IoT)技术Internet of Things (IoT) Technology
IoT技术的兴起对于通信系统提出了新的挑战。IoT终端设备的使用场景可以包括物流、仓储、工厂自动化和畜牧等。IoT终端设备和网络设备之间可以进行间歇性的简单通信或者进行初略的定位跟踪。即便是最简单的IoT终端设备,比如用于煤电表计量的NB-IoT终端设备,也需要电池来提供能量。然 而尽管IoT终端设备的能耗很低,它们内部的电池最多可以维持几年,最终仍会消耗殆尽。因此IoT终端设备的电池需要定期进行更换,这会消耗大量的人工。而且一些工业场景存在一定的危险,并不适合人工操作。因此,无电池IoT终端设备应运而生。The rise of IoT technology has brought new challenges to communication systems. The use scenarios of IoT terminal devices can include logistics, warehousing, factory automation, and animal husbandry. IoT terminal devices and network devices can communicate intermittently or perform rough positioning and tracking. Even the simplest IoT terminal devices, such as NB-IoT terminal devices used for coal and electricity metering, require batteries to provide energy. Although IoT terminal devices have low energy consumption, their internal batteries can only last for a few years at most, but will eventually be exhausted. Therefore, the batteries of IoT terminal devices need to be replaced regularly, which consumes a lot of manpower. In addition, some industrial scenarios are dangerous and not suitable for manual operation. Therefore, battery-free IoT terminal devices came into being.
无电池IoT终端设备的数量庞大,成本低廉,一般在安装之后便不再需要人工维护。无线射频识别(radio frequency identification,RFID)终端设备可以在某种程度上满足人们对无电池IoT终端设备的需求。然而,RFID系统的运营仍需要人工参与,例如某些RFID系统中需要人工手持阅读器(reader)。而且,单个RFID reader的无线覆盖范围是有限的(10米之内),因此大范围内布置的RFID系统需要更多的人工参与。例如,利用RFID系统对一个大型超市的货物进行盘点的时候,需要花费不少人力物力和时间。Battery-free IoT terminal devices are huge in number and low in cost. Generally, they do not require manual maintenance after installation. Radio frequency identification (RFID) terminal devices can meet people's demand for battery-free IoT terminal devices to some extent. However, the operation of RFID systems still requires human participation. For example, some RFID systems require manual handheld readers. Moreover, the wireless coverage range of a single RFID reader is limited (within 10 meters), so RFID systems deployed over a large area require more human participation. For example, when using an RFID system to take inventory of goods in a large supermarket, it takes a lot of manpower, material resources and time.
环境(ambient IoT,A-IoT)通信系统Ambient IoT (A-IoT) communication systems
把类似于RFID这样的系统移植到蜂窝网络中可以很好地解决覆盖范围有限的问题,这是因为蜂窝网络(例如第四代(4th generation,4G)系统和5G系统)在一些国家或地区(例如中国和欧美)已经达到了全境覆盖或者至少主要城市的覆盖。基于更广阔的网络覆盖范围,IoT终端设备和网络设备之间的通信或者定位过程可以不需要人工的参与。所以IoT终端设备可以不间断地工作,而且工作效率高。另外,IoT终端设备甚至可以在不适合人工的环境中(例如旷野,矿场,工厂)高效地工作。因此,应用IoT终端设备时,除了初期需要把IoT终端设备和某个具体的物件关联在一起之外,后续的数据读写和运维可以通过如智能手机上的APP进行操作即可,非常方便和高效。这样的通信系统可以称为ambient IoT通信系统或者零功耗通信系统。Transplanting systems like RFID into cellular networks can effectively solve the problem of limited coverage, because cellular networks (such as the fourth generation (4G) system and 5G system) have achieved full coverage or at least coverage of major cities in some countries or regions (such as China and Europe and the United States). Based on the wider network coverage, the communication or positioning process between IoT terminal devices and network devices can be done without human intervention. Therefore, IoT terminal devices can work uninterruptedly and efficiently. In addition, IoT terminal devices can even work efficiently in environments that are not suitable for human intervention (such as wilderness, mines, and factories). Therefore, when applying IoT terminal devices, in addition to the initial need to associate the IoT terminal device with a specific object, subsequent data reading, writing, and operation and maintenance can be operated through apps such as on smartphones, which is very convenient and efficient. Such a communication system can be called an ambient IoT communication system or a zero-power communication system.
如图3所示,A-IoT通信系统可以由网络设备310和终端设备320构成。其中网络设备310可以例如可以是阅读器。终端设备320又称A-IoT设备,例如可以是标签(tag),又称为电子标签。通常,A-IoT设备的能量来源来自于周围环境,比如无线电波(radio frequency,RF)、太阳能、热能、机械振动、风能等。相应地,A-IoT通信系统采用能量采集和反向散射通信技术,网络设备310可以向终端设备320发送无线供能信号,下行通信信号以及接收终端设备320的反向散射信号。As shown in FIG3 , the A-IoT communication system may be composed of a network device 310 and a terminal device 320. The network device 310 may be, for example, a reader. The terminal device 320 is also called an A-IoT device, for example, a tag, also known as an electronic tag. Usually, the energy source of an A-IoT device comes from the surrounding environment, such as radio frequency (RF), solar energy, thermal energy, mechanical vibration, wind energy, etc. Accordingly, the A-IoT communication system adopts energy harvesting and backscattering communication technology, and the network device 310 can send wireless power supply signals, downlink communication signals, and receive backscattering signals from the terminal device 320 to the terminal device 320.
继续参见图3所示,终端设备320可以包括能量采集模块321、反向散射通信模块322以及低功耗计算模块323。在另一些场景中,终端设备320还可包括存储器模块(图中未示出),用于存储一些基本信息(如物品标识等)。在另一些场景中,终端设备320还可以包括传感器模块324,用于获取环境温度、环境湿度等传感数据。Continuing to refer to FIG. 3 , the terminal device 320 may include an energy collection module 321, a backscatter communication module 322, and a low-power computing module 323. In other scenarios, the terminal device 320 may also include a memory module (not shown) for storing some basic information (such as item identification, etc.). In other scenarios, the terminal device 320 may also include a sensor module 324 for acquiring sensor data such as ambient temperature and ambient humidity.
在一些协议中讨论可以将A-IoT通信系统的用例划分为4大类:盘点(inventory)、传感器(sensor)、跟踪(tracking)和命令(command)。其中,盘点指货物进出仓库的时候,对货物进行查缺补遗。常见的传感器可以包括温度、压力、湿度等传感器,传感器可以用在工业和农业以及智慧城市等场合,传感器采集到的信息可以通过A-IoT系统上传到某个第三方的应用(application,App)进行监控和管理。跟踪泛指不定期获取物件所在的大致方位,例如用户可以通过智能手机实时地了解自己的快件所在的方位。命令指的是通过A-IoT系统对某种伺服机构进行操作,这些伺服机构可以和A-IoT终端设备连接在一起。例如,人们可以在办公室工作或休息期间,通过手机App给后院的花草浇水,其中浇水的伺服机构可以和某个A-IoT终端设备相连。In some protocols, the use cases of A-IoT communication systems can be divided into four categories: inventory, sensor, tracking, and command. Inventory refers to checking for missing goods when goods enter and leave the warehouse. Common sensors can include temperature, pressure, humidity and other sensors. Sensors can be used in industry, agriculture, smart cities and other occasions. The information collected by the sensors can be uploaded to a third-party application (application, App) through the A-IoT system for monitoring and management. Tracking generally refers to obtaining the approximate location of an object at irregular intervals. For example, users can use smartphones to understand the location of their express delivery in real time. Command refers to the operation of a certain servo mechanism through the A-IoT system, which can be connected to an A-IoT terminal device. For example, people can water the flowers and plants in the backyard through a mobile phone app while working or taking a break in the office, and the watering servo mechanism can be connected to an A-IoT terminal device.
在一些协议中,将A-IoT通信系统划分为图4A~图4D所示的4种拓扑网络结构。参见图4A所示,网络设备与A-IoT设备之间可以直接传输数据或信号(又称A-IoT数据或信号)。In some protocols, the A-IoT communication system is divided into four topological network structures as shown in Figures 4A to 4D. As shown in Figure 4A, data or signals (also called A-IoT data or signals) can be directly transmitted between network devices and A-IoT devices.
参见图4B所示,网络设备与A-IoT设备之间可以通过中间点节点进行通信,其中,中间节点与终端设备之间传输的数据或信息又称A-IoT数据或信号。中间节点可以是另外一个网络设备,此时,中间节点与网络设备之间可以通过Uu接口进行通信,例如,中间节点可以通过Uu接口向网络设备发送数据或信号,并且中间节点可以通过Uu接口接收网络设备发送的数据或信号。As shown in FIG4B , the network device and the A-IoT device can communicate through an intermediate node, wherein the data or information transmitted between the intermediate node and the terminal device is also called A-IoT data or signal. The intermediate node can be another network device, in which case the intermediate node and the network device can communicate through the Uu interface, for example, the intermediate node can send data or signals to the network device through the Uu interface, and the intermediate node can receive data or signals sent by the network device through the Uu interface.
参见图4C所示,网络设备与A-IoT设备之间可以通过辅助点节点进行通信,其中,辅助节点与终端设备之间传输的数据或信息又称A-IoT数据或信号,终端设备与网络设备之间传输的数据或信息又称A-IoT数据或信号。辅助节点可以是另外一个网络设备,此时,辅助节点可以仅接收网络设备通过Uu接口发送的数据或信号,此时,辅助节点无法向网络设备发送数据或信号。As shown in FIG4C , the network device and the A-IoT device can communicate through the auxiliary point node, wherein the data or information transmitted between the auxiliary node and the terminal device is also called A-IoT data or signal, and the data or information transmitted between the terminal device and the network device is also called A-IoT data or signal. The auxiliary node can be another network device. In this case, the auxiliary node can only receive the data or signal sent by the network device through the Uu interface. In this case, the auxiliary node cannot send data or signals to the network device.
参见图4D所示,终端设备与A-IoT设备之间可以直接传输数据或信号(又称A-IoT数据或信号)。As shown in FIG. 4D , data or signals (also referred to as A-IoT data or signals) can be directly transmitted between the terminal device and the A-IoT device.
在一些协议中,将A-IoT设备可以分成3种类型:类型A、类型B和类型C。对于类型A和类型B中的终端设备而言,该类设备只能通过反射和调制收到的无线电波进行通信,这种通信方式称为反向散射(back-scattering)。也就是说,该类设备无法主动发送无线电信号,它们的功率在1~10微瓦(uW)范围之内。其中,类型A的终端设备的发射功率最低,硬件复杂度最低,基本上接近RFID终端设备的水平。而类型B的终端设备的硬件稍微复杂一些,可以包括信号放大器件,以及一定的储能器件,所以类型B的终端设备和网络设备之间的通信距离,与类型A的终端设备和网络设备之间的通信距离相比 更远一些。类型C的终端设备通常具备有主动发送无线电波的能力,其发射功率大约在1~10毫瓦(mW),并且能够储备一定的能量。这三种类型的终端设备都能够从环境中获取能量,并且可以持续工作几年或者10年以上。此外,类型A和类型B的终端设备为了节能,在网络设备没有触发与其之间的通信过程之前,基本上处于休眠状态。只有被网络设备的无线信号激活之后,类型A和类型B的终端设备才会开始工作。In some protocols, A-IoT devices can be divided into three types: Type A, Type B, and Type C. For terminal devices of type A and type B, such devices can only communicate by reflecting and modulating received radio waves. This communication method is called back-scattering. In other words, such devices cannot actively send radio signals, and their power is within the range of 1 to 10 microwatts (uW). Among them, the terminal devices of type A have the lowest transmission power and the lowest hardware complexity, which is basically close to the level of RFID terminal devices. The hardware of type B terminal devices is slightly more complicated, which may include signal amplification devices and certain energy storage devices. Therefore, the communication distance between the terminal devices of type B and the network devices is compared with the communication distance between the terminal devices of type A and the network devices. Further. Type C terminal devices usually have the ability to actively send radio waves, with a transmission power of about 1 to 10 milliwatts (mW), and can store a certain amount of energy. All three types of terminal devices can obtain energy from the environment and can continue to work for several years or more than 10 years. In addition, in order to save energy, type A and type B terminal devices are basically in a dormant state before the network device triggers the communication process with them. Only after being activated by the wireless signal of the network device, the type A and type B terminal devices will start working.
目前,A-IoT设备的接收机可以包括两大类型:接收机类型1和接收机类型2。接收机类型1为宽带接收机,这种接收机又称为RF接收机。RF接收机可以基于射频带通滤波器获得其待接收的带宽范围内的信号,然后进行包络检波以及后续的基带处理。RF接收机的结构最为简单,其功耗最低可至数个uW甚至更低。但由于射频带通滤波器精度较差,即使在目标信号占用窄带宽的情况下,RF接收机也往往会接收到较宽带宽内的信号。因此,RF接收机的接收过程中会引入较多的噪声与干扰,其接收性能较差,或者说接收灵敏度较差。典型的RF接收机的接收过程可以如图5所示。At present, the receivers of A-IoT devices can include two major types: receiver type 1 and receiver type 2. Receiver type 1 is a broadband receiver, which is also called an RF receiver. The RF receiver can obtain the signal within the bandwidth to be received based on the RF bandpass filter, and then perform envelope detection and subsequent baseband processing. The structure of the RF receiver is the simplest, and its power consumption can be as low as several uW or even lower. However, due to the poor accuracy of the RF bandpass filter, even when the target signal occupies a narrow bandwidth, the RF receiver often receives signals within a wider bandwidth. Therefore, more noise and interference will be introduced in the receiving process of the RF receiver, and its receiving performance is poor, or the receiving sensitivity is poor. The receiving process of a typical RF receiver can be shown in Figure 5.
接收机类型2为窄带接收机,这种接收机可以包括中频接收机或零中频接收机。窄带接收机在信号接收中,除了使用射频带通滤波器获得其待接收的带宽范围内的信号外,还可以对RF信号进行下变频,并对基带信号进一步使用低通滤波器进行滤波消除掉噪声与干扰。因此,窄带接收机的接收带宽窄,其接收性能好,或者说接收灵敏度较高。但是,窄带接收机需要使用本地振荡器(local oscillator,LO)。LO的功耗较高,即使是推荐使用的LO也需要消耗100uW甚至更高的功耗。因此窄带接收机的相对功耗较高,但由于其绝对功耗很低,也依然适合零功耗设备使用。典型的中频接收机的接收过程可以如图6所示。Receiver type 2 is a narrowband receiver, which may include an intermediate frequency receiver or a zero intermediate frequency receiver. In signal reception, in addition to using an RF bandpass filter to obtain a signal within the bandwidth to be received, a narrowband receiver can also down-convert the RF signal and further filter the baseband signal using a low-pass filter to eliminate noise and interference. Therefore, the narrowband receiver has a narrow receiving bandwidth and good receiving performance, or a high receiving sensitivity. However, a narrowband receiver requires the use of a local oscillator (LO). The power consumption of LO is high, and even the recommended LO consumes 100uW or even more power. Therefore, the relative power consumption of a narrowband receiver is high, but because its absolute power consumption is very low, it is still suitable for use in zero-power devices. The receiving process of a typical intermediate frequency receiver can be shown in Figure 6.
在一些场景中,上述类型A的终端设备通常会采用宽带接收机,类型C的通信设备通常会采用窄带接收机,而类型B的终端设备则可能会采用其中一种或者两种类型的接收机。In some scenarios, the above-mentioned type A terminal device usually adopts a broadband receiver, the type C communication device usually adopts a narrowband receiver, and the type B terminal device may adopt one or both types of receivers.
RFID的初始接入过程RFID initial access process
在一些协议中,引入针对IoT系统调整了初始接入过程。图7示出了RFID的初始接入过程的示意性流程图。其中,询问机(interrogator)可以前文介绍的网络设备。参见图7所示,询问机(interrogator)可以向标签发起询问(Query),以触发标签发起初始接入过程。之后,标签向询问机发送16位的随机数(用“RN16”表示)。在这个过程中,如果有另外一个标签在基本相同的时间,通过同一个信道内也发送了随机数,那么第一次冲突就会发生在询问机接收的过程。若询问机通过ACK应答正确解码的随机数。对于标签而言,冲突成功的标签会收到和自己发送的相同的随机数,而冲突失败的标签则会收到和自己发送的不同的随机数。In some protocols, an initial access process adjusted for the IoT system is introduced. FIG7 shows a schematic flow chart of the initial access process of RFID. Among them, the interrogator can be the network device introduced above. As shown in FIG7, the interrogator can initiate a query to the tag to trigger the tag to initiate the initial access process. After that, the tag sends a 16-bit random number (indicated by "RN16") to the interrogator. In this process, if another tag also sends a random number through the same channel at substantially the same time, the first conflict will occur during the interrogator's reception process. If the interrogator responds to the correctly decoded random number through an ACK. For the tag, the tag that successfully conflicts will receive the same random number as it sent, while the tag that failed the conflict will receive a different random number from the one it sent.
对于冲突成功的标签来说,可以向询问机发送自己的EPC或者相关信息,相应地,询问机会通过随机数请求(Req_RN)重复反馈相同的随机数(正确解码的那个)给标签,接着标签向询问机反馈一个标识(handle),作为后续过程这个标签的标识,该标识也是一个16位的随机数。之后,询问机可以向标签发送命令,该命令中写到标签的标识。For tags that successfully collide, they can send their EPC or related information to the interrogator. Correspondingly, the interrogator will repeatedly feed back the same random number (the one that is correctly decoded) to the tag through a random number request (Req_RN). Then the tag will feed back an identifier (handle) to the interrogator, which will be used as the identifier of the tag in the subsequent process. The identifier is also a 16-bit random number. After that, the interrogator can send a command to the tag, in which the tag identifier is written.
在上述RFID的初始接入过程中,作为标签在后续过程中使用的标识(handle)其实是由标签产生的。这种方式较为适用RFID,这是因为询问机的覆盖范围通常较小,该标识的长度足以区分不同的RFID。然而,这种初始接入过程无法适用于网络设备覆盖范围较大的场景,上述标识(handle)可能会由于长度不够而无法供网络设备区分不同的终端设备。而传统的随机接入过程过于复杂,可能导致终端设备的功耗较大。此时,会限制引入低能力终端设备(例如,前文介绍的电子标签)而降低功耗的程度。In the above-mentioned RFID initial access process, the identifier (handle) used by the tag in the subsequent process is actually generated by the tag. This method is more suitable for RFID because the coverage of the interrogator is usually small, and the length of the identifier is sufficient to distinguish different RFIDs. However, this initial access process is not suitable for scenarios where the network equipment has a large coverage range. The above-mentioned identifier (handle) may not be long enough for the network equipment to distinguish different terminal devices. The traditional random access process is too complicated and may cause the terminal equipment to consume more power. At this time, the degree to which power consumption can be reduced by introducing low-capability terminal devices (for example, the electronic tags introduced above) will be limited.
因此,针对上述问题,本申请实施例提供了一种无线通信方法,以降低随机接入过程中终端设备(又称“第一终端设备”)的功耗。下文结合图8介绍本申请实施例的无线通信方法。在一些实现方式中,第一终端设备可以为低功耗设备。在一些实现方式中,第一终端设备为前文介绍的A-IoT设备,例如,可以是类型A的终端设备。又例如,可以是类型B的终端设备。又例如,可以是类型C的终端设备。当然,在本申请实施例中,终端设备还可以是IoT系统中的终端设备。Therefore, in response to the above problems, an embodiment of the present application provides a wireless communication method to reduce the power consumption of a terminal device (also referred to as a "first terminal device") during a random access process. The wireless communication method of an embodiment of the present application is described below in conjunction with Figure 8. In some implementations, the first terminal device may be a low-power device. In some implementations, the first terminal device is the A-IoT device introduced above, for example, it may be a terminal device of type A. For another example, it may be a terminal device of type B. For another example, it may be a terminal device of type C. Of course, in an embodiment of the present application, the terminal device may also be a terminal device in an IoT system.
在一些实现方式中,图8所示的目标设备可以是第二终端设备,此时,第一终端设备可以通过第二终端设备接入网络。也即是说,第二终端设备可以作为第一终端设备与网络设备之间通信的辅助节点或中间节点,以便帮助第一终端设备接入网络设备。在另一些实现方式中,目标设备可以是除终端设备准备接入的网络设备之外的其他网络设备,也即是说,作为目标设备的网络设备可以作为第一终端设备与网络设备(终端设备尝试接入的网络设备)之间通信的辅助节点或中间节点,以便帮助第一终端设备接入网络设备。当然,在本申请实施例中,目标设备可以为终端设备尝试接入的网络设备,此时,第一终端设备可以直接与网络设备进行通信,以尝试接入网络设备。In some implementations, the target device shown in FIG8 may be a second terminal device, in which case the first terminal device may access the network through the second terminal device. In other words, the second terminal device may serve as an auxiliary node or intermediate node for communication between the first terminal device and the network device, so as to help the first terminal device access the network device. In other implementations, the target device may be a network device other than the network device that the terminal device is ready to access, in other words, the network device as the target device may serve as an auxiliary node or intermediate node for communication between the first terminal device and the network device (the network device that the terminal device attempts to access), so as to help the first terminal device access the network device. Of course, in an embodiment of the present application, the target device may be a network device that the terminal device attempts to access, in which case the first terminal device may communicate directly with the network device to attempt to access the network device.
在本申请实施例中,网络设备可以是包括阅读器的网络节点的统称。当然,网络设备也可以仅包括单独向第一终端设备提供反向散射电波的节点。In the embodiment of the present application, the network device may be a general term for network nodes including a reader. Of course, the network device may also only include a node that provides backscattered radio waves to the first terminal device alone.
在本申请实施例中,对第一终端设备与第二终端设备不作限定。在一些实现方式中,第二终端设备 的能力可以高于第一终端设备,例如,第二终端设备可以是智能终端设备,第一终端设备可以是前文介绍的电子标签。在另一些实现方式中,第二终端设备可以与第一终端设备为能力相近的终端设备。In the embodiments of the present application, the first terminal device and the second terminal device are not limited. In some implementations, the second terminal device The capability of the second terminal device may be higher than that of the first terminal device. For example, the second terminal device may be an intelligent terminal device, and the first terminal device may be the electronic tag described above. In other implementations, the second terminal device may be a terminal device with similar capabilities to the first terminal device.
图8是本申请实施例的无线通信方法的示意性流程图。图8所示的方法包括步骤S810至步骤S840。Fig. 8 is a schematic flow chart of a wireless communication method according to an embodiment of the present application. The method shown in Fig. 8 includes steps S810 to S840.
在步骤S810中,第一终端设备向目标设备发送前导码。In step S810, the first terminal device sends a preamble code to the target device.
在一些实现方式中,上述前导码可以是基于序列生成的。例如,前导码可以基于固定的多个序列生成,相比于传统的前导码是基于根序列的衍生序列来生成,有助于简化前导码的生成方式,以节约第一终端设备生成前导码所需的功耗。In some implementations, the preamble may be generated based on a sequence. For example, the preamble may be generated based on multiple fixed sequences, which helps to simplify the generation method of the preamble compared to the traditional preamble that is generated based on a derivative sequence of a root sequence, thereby saving the power consumption required for the first terminal device to generate the preamble.
在一些实现方式中,上述多个序列的数量可以是有限的,例如,多个序列的数量可以为24=16个。在本申请实施例中,可以基于有限数量的序列来生成前导码,有助于简化生成前导码的复杂度。In some implementations, the number of the plurality of sequences may be limited, for example, the number of the plurality of sequences may be 2 4 = 16. In the embodiment of the present application, the preamble may be generated based on a limited number of sequences, which helps to simplify the complexity of generating the preamble.
在本申请实施例中,还可以通过其他方式来简化前导码的生成过程。在一些实现方式中,本申请实施例中采用的序列可以采用较为简单的正交方式,例如,可以采用最小均方差对序列。在一些实现方式中,本申请实施例中采用的序列可以采用较为简单的调制方式,例如,可以采用二进制启闭键控(on-off keying,OOK)进行调制。在一些实现方式中,本申请实施例中采用的前导码的长度可以短于传统随机接入过程中使用的前导码的长度。In the embodiments of the present application, the generation process of the preamble code can also be simplified by other methods. In some implementations, the sequence used in the embodiments of the present application can adopt a relatively simple orthogonal method, for example, the minimum mean square error sequence can be used. In some implementations, the sequence used in the embodiments of the present application can adopt a relatively simple modulation method, for example, binary on-off keying (OOK) can be used for modulation. In some implementations, the length of the preamble code used in the embodiments of the present application can be shorter than the length of the preamble code used in the traditional random access process.
在一些实现方式中,基于不同序列生成的前导码可以对应不同的索引,以便网络设备进行识别。In some implementations, preamble codes generated based on different sequences may correspond to different indexes for easy identification by a network device.
在一些实现方式中,上述前导码的传输可以作为随机接入过程中的第一条信息,因此,前导码可以称为消息1(Msg 1)。In some implementations, the transmission of the preamble code described above may be used as the first piece of information in the random access process, and therefore, the preamble code may be referred to as message 1 (Msg 1).
在步骤S820中,目标设备向第一终端设备发送第一索引。In step S820, the target device sends a first index to the first terminal device.
在一些实现方式中,第一索引用于指示目标设备接收的前导码,因此,第一索引又可以称为“前导码索引”。In some implementations, the first index is used to indicate a preamble code received by the target device, and therefore, the first index may also be referred to as a “preamble code index”.
在一些实现方式中,若目标设备成功接收并解调前导码,则目标设备会发送该前导码对应的第一索引。因此,上述目标设备向终端设备发送第一索引,可以理解为目标设备成功接收并解调第一索引指示的前导码。In some implementations, if the target device successfully receives and demodulates the preamble, the target device will send the first index corresponding to the preamble. Therefore, the target device sending the first index to the terminal device can be understood as the target device successfully receiving and demodulating the preamble indicated by the first index.
在一些实现方式中,上述第一索引的传输可以作为随机接入过程中的第二条信息,因此,第一索引所在的信息(即下文中的第三信息)可以称为消息2(Msg 2)。In some implementations, the transmission of the first index can be used as the second information in the random access process. Therefore, the information where the first index is located (i.e., the third information below) can be called message 2 (Msg 2).
在步骤S830中,响应于第一索引与前导码的索引相同,第一终端设备向目标设备发送第一终端设备标识。In step S830, in response to the first index being the same as the index of the preamble code, the first terminal device sends the first terminal device identifier to the target device.
在一些实现方式中,若第一索引与前导码的索引相同,则可以说明网络设备成功接收并解调的前导码为第一终端设备发送的前导码,此时,第一终端设备可以向目标设备发送第一终端设备标识。In some implementations, if the first index is the same as the index of the preamble code, it can be indicated that the preamble code successfully received and demodulated by the network device is the preamble code sent by the first terminal device. At this time, the first terminal device can send the first terminal device identifier to the target device.
在一些实现方式中,若第一索引与前导码的索引不同,则可以说明网络设备成功接收并解调的前导码不是第一终端设备发送的前导码,此时,第一终端设备可以认为冲突解决失败。In some implementations, if the first index is different from the index of the preamble code, it may indicate that the preamble code successfully received and demodulated by the network device is not the preamble code sent by the first terminal device. At this time, the first terminal device may consider that the conflict resolution has failed.
在一些实现方式中,第一终端设备标识可以是第一终端设备生成的,例如,第一终端设备标识可以是第一终端设备生成的随机数,相比于传统随机接入过程中,网络设备为终端设备配置的终端设备标识而言长度较短,有助于简化第一终端设备传输第一终端设备标识所需的功耗。例如,第一终端设备标识的长度可以为16位。In some implementations, the first terminal device identifier may be generated by the first terminal device, for example, the first terminal device identifier may be a random number generated by the first terminal device, which is shorter than the terminal device identifier configured by the network device for the terminal device in the traditional random access process, and helps to simplify the power consumption required by the first terminal device to transmit the first terminal device identifier. For example, the length of the first terminal device identifier may be 16 bits.
在一些实现方式中,上述第一终端设备标识的传输可以作为随机接入过程中的第三条信息,因此,终端设备标识所在的信息(即下文中的第四信息)可以称为消息3(Msg 3)。In some implementations, the transmission of the first terminal device identifier may be used as the third piece of information in the random access process. Therefore, the information containing the terminal device identifier (i.e., the fourth information below) may be referred to as message 3 (Msg 3).
在一些实现方式中,发送第一终端设备标识的时域资源可以是第一终端设备随机选择的。In some implementations, the time domain resource for sending the first terminal device identifier may be randomly selected by the first terminal device.
相应地,上述步骤S830,从目标设备的角度来看,目标设备接收终端设备发送的终端设备标识。其中,该终端设备可以为第一终端设备,或者该终端设备为包含其他终端设备以及第一终端设备。Correspondingly, in the above step S830, from the perspective of the target device, the target device receives the terminal device identification sent by the terminal device, wherein the terminal device may be the first terminal device, or the terminal device may include other terminal devices and the first terminal device.
在一些实现方式中,该终端设备可以为步骤S810中发送前导码的终端设备。例如,发送前导码的终端设备可以为多个终端设备,并且多个终端设备包括第一终端设备,此时,步骤S830中的终端设备可以为步骤S810中的多个终端设备。又例如,发送前导码的终端设备可以为第一终端设备,此时,步骤S830中的终端设备可以为步骤S810中的第一终端设备。In some implementations, the terminal device may be the terminal device that sends the preamble in step S810. For example, the terminal device that sends the preamble may be multiple terminal devices, and the multiple terminal devices include the first terminal device. In this case, the terminal device in step S830 may be the multiple terminal devices in step S810. For another example, the terminal device that sends the preamble may be the first terminal device. In this case, the terminal device in step S830 may be the first terminal device in step S810.
在步骤S840中,第一终端设备接收目标设备发送的第一信息,第一信息包括目标设备接收的终端设备标识。In step S840, the first terminal device receives first information sent by the target device, where the first information includes a terminal device identifier received by the target device.
相应地,上述步骤S840,从目标设备的角度来看,目标设备向终端设备发送第一信息。其中,该终端设备可以为第一终端设备,或者该终端设备为包含其他终端设备以及第一终端设备。Correspondingly, in the above step S840, from the perspective of the target device, the target device sends the first information to the terminal device, wherein the terminal device may be the first terminal device, or the terminal device may include other terminal devices and the first terminal device.
在一些实现方式中,步骤S840中的终端设备可以为步骤S830中的终端设备,或者,步骤S840中的终端设备属于步骤S830中的终端设备中的一个。在一些场景中,假设多个终端设备发送的前导码相同,此时,在步骤S830中,这多个终端设备也都会向目标设备发送终端设备标识,相应地,目标设备可能仅成功接收其中一个终端设备的终端设备标识。 In some implementations, the terminal device in step S840 may be the terminal device in step S830, or the terminal device in step S840 is one of the terminal devices in step S830. In some scenarios, assuming that the preambles sent by multiple terminal devices are the same, in this case, in step S830, the multiple terminal devices will also send terminal device identifiers to the target device, and accordingly, the target device may only successfully receive the terminal device identifier of one of the terminal devices.
为了便于理解,下文以第一终端设备为例进行介绍,其中,第一终端设备的终端设备标识为第一终端设备标识(或者称为第一终端设备的标识)。其他终端设备的接入过程可以与之类似。For ease of understanding, the following description is made by taking the first terminal device as an example, wherein the terminal device identifier of the first terminal device is the first terminal device identifier (or referred to as the identifier of the first terminal device). The access process of other terminal devices may be similar.
在一些实现方式中,第一终端设备可以基于第一信息中承载的终端设备标识,与第一终端设备标识进行比较,以确定是否成功接入目标设备解决冲突。In some implementations, the first terminal device may compare the terminal device identifier carried in the first information with the first terminal device identifier to determine whether to successfully access the target device to resolve the conflict.
例如,若第一信息中的终端设备标识与第一终端设备标识相同,则第一终端设备冲突解决成功接入目标设备。又例如,若第一信息中的终端设备标识与第一终端设备标识不同,则第一终端设备冲突解决失败。For example, if the terminal device identifier in the first information is the same as the first terminal device identifier, the first terminal device conflict resolution successfully accesses the target device. For another example, if the terminal device identifier in the first information is different from the first terminal device identifier, the first terminal device conflict resolution fails.
在一些实现方式中,第一信息还可以包括与目标设备接收的终端设备标识关联的第一无线网临时标识(radio network temporary identifier,RNTI)。相应地,若第一信息中的终端设备标识与第一终端设备标识相同(或者说,若第一终端设备冲突解决成功),则第一终端设备可以保留第一RNTI。在一些场景中,第一终端设备可以基于第一RNTI与目标设备进行通信,即将第一RNTI作为第一终端设备的标识。In some implementations, the first information may also include a first radio network temporary identifier (RNTI) associated with the terminal device identifier received by the target device. Accordingly, if the terminal device identifier in the first information is the same as the first terminal device identifier (or, if the conflict resolution of the first terminal device is successful), the first terminal device may retain the first RNTI. In some scenarios, the first terminal device may communicate with the target device based on the first RNTI, that is, use the first RNTI as the identifier of the first terminal device.
在本申请实施例中,第一RNTI可以仅在第一信息中承载,此时,随机接入过程中的其他消息的传输可以不基于RNTI执行。例如,第三信息中可以不包含RNTI,又例如,第四信息可以不使用RNTI进行处理,相比于传统的随机接入过程中,在消息2中携带RNTI,并且在传输消息3中使用RNTI进行处理,有助于简化第一终端设备接入目标设备的复杂度,降低第一终端设备接入目标设备的功耗。In the embodiment of the present application, the first RNTI may be carried only in the first information, and at this time, the transmission of other messages in the random access process may not be performed based on the RNTI. For example, the third information may not contain the RNTI, and for another example, the fourth information may not be processed using the RNTI. Compared with the traditional random access process, the RNTI is carried in the message 2, and the RNTI is used for processing in the transmission message 3, which helps to simplify the complexity of the first terminal device accessing the target device and reduce the power consumption of the first terminal device accessing the target device.
另外,在本申请实施例中,第一终端设备可以与网络设备之间先基于第一终端设备标识进行随机接入,并在第一信息中才指示第一RNTI,由于第一终端设备标识的长度相比于第一RNTI而言较短,有助于简化第一终端设备进行随机接入的功耗。In addition, in an embodiment of the present application, the first terminal device can first perform random access with the network device based on the first terminal device identifier, and then indicate the first RNTI in the first information. Since the length of the first terminal device identifier is shorter than the first RNTI, it helps to simplify the power consumption of the first terminal device performing random access.
在一些场景中,第一终端设备接入目标设备可能是由于有待传输的信息(例如,第一终端设备采集的环境温度),如果在第一终端设备接入目标设备的过程中,待传输的信息已经被传输到网络设备,则网络设备在第一信息中可以不再携带第一RNTI,以减小传输第一信息的开销。In some scenarios, the first terminal device may access the target device because there is information to be transmitted (for example, the ambient temperature collected by the first terminal device). If the information to be transmitted has been transmitted to the network device during the process of the first terminal device accessing the target device, the network device may no longer carry the first RNTI in the first information to reduce the overhead of transmitting the first information.
在一些实现方式中,第一RNTI的长度是可调整的,或者说,第一RNTI是变长的。例如,第一RNTI的长度可以与网络设备服务的终端设备的数量关联,即若网络设备服务的终端设备的数量较多,则第一RNTI的长度可以较长,以便于区分多个终端设备。相反地,若网络设备服务的终端设备的数量较少,则第一RNTI的长度可以较短,以降低第一终端设备基于第一RNTI通信的复杂度。In some implementations, the length of the first RNTI is adjustable, or in other words, the first RNTI is variable in length. For example, the length of the first RNTI may be associated with the number of terminal devices served by the network device, that is, if the number of terminal devices served by the network device is large, the length of the first RNTI may be long to facilitate distinguishing multiple terminal devices. On the contrary, if the number of terminal devices served by the network device is small, the length of the first RNTI may be short to reduce the complexity of the first terminal device communicating based on the first RNTI.
假设网络设备位于室外场景,此时,网络设备服务的终端设备的数量可能会有成千上万个,此时,第一RNTI的长度可能需要4个字节。假设网络设备位于室内场景,此时,网络设备服务的终端设备的数量可能只有几百个,此时,第一RNTI的长度可能仅需要2个字节。Assuming that the network device is located in an outdoor scenario, the number of terminal devices served by the network device may be tens of thousands, and the length of the first RNTI may require 4 bytes. Assuming that the network device is located in an indoor scenario, the number of terminal devices served by the network device may be only a few hundred, and the length of the first RNTI may only require 2 bytes.
在本申请实施例中,对第一RNTI的长度的变化不作限定。例如,第一RNTI的长度可以通过采用不同的编码方式来调整,或者说,网络设备可以采用不同编码方式来生成不同长度的第一RNTI。当然,在本申请实施例中,若第一RNTI的长度变化可以通过截断处理来实现,也即是说,可以生成统一长度的原始RNTI,然后,采用截断处理来对原始RNTI进行截断以得到第一RNTI。In the embodiment of the present application, there is no limitation on the change of the length of the first RNTI. For example, the length of the first RNTI can be adjusted by using different encoding methods, or the network device can use different encoding methods to generate first RNTIs of different lengths. Of course, in the embodiment of the present application, if the length change of the first RNTI can be achieved by truncation, that is, an original RNTI of uniform length can be generated, and then the original RNTI can be truncated by truncation to obtain the first RNTI.
如上文所述,第一RNTI的长度是可变的,因此,为了降低第一终端设备获取第一RNTI的复杂度,网络设备可以向第一终端设备指示第一RNTI的长度。在一些实现方式中,目标设备可以通过配置信息为第一终端设备配置第一RNTI的长度,也即是说,目标设备可以向第一终端设备发送配置信息,该配置信息用于为第一终端设备配置第一RNTI的长度。As described above, the length of the first RNTI is variable. Therefore, in order to reduce the complexity of the first terminal device acquiring the first RNTI, the network device may indicate the length of the first RNTI to the first terminal device. In some implementations, the target device may configure the length of the first RNTI for the first terminal device through configuration information, that is, the target device may send configuration information to the first terminal device, and the configuration information is used to configure the length of the first RNTI for the first terminal device.
在一些实现方式中,第一终端设备可以在第二时间段内接收第一信息,以提高成功接收到第一信息的概率。其中,第二时间段的起始位置可以基于第一终端设备标识的发送时间(或者说第四信息的发送时间)确定。In some implementations, the first terminal device may receive the first information within the second time period to increase the probability of successfully receiving the first information, wherein the starting position of the second time period may be determined based on the sending time of the first terminal device identifier (or the sending time of the fourth information).
例如,第二时间段的起始位置为第一终端设备标识的发送时间。也即是说,第一终端设备发送了第一终端设备标识之后,第一终端设备立刻进入第二时间段准备接收第一信息,有助于第一终端设备可以在第二时间段接收其他通信设备(例如,reader)的能量,以供后续通过反向散射的电波进行通信。For example, the starting position of the second time period is the sending time of the first terminal device identifier. That is to say, after the first terminal device sends the first terminal device identifier, the first terminal device immediately enters the second time period to prepare to receive the first information, which helps the first terminal device to receive energy from other communication devices (e.g., readers) in the second time period for subsequent communication through backscattered radio waves.
又例如,第二时间段的起始位置与第一终端设备标识的发送时间之间间隔第二时间间隔,或者说,第二时间段的起始位置是以第一终端设备标识的发送时间为起始,按照时间流逝的方向偏移第二时间间隔后得到的。也即是说,第一终端设备发送了第一终端设备标识之后,会间隔第二时间间隔再进入第二时间段准备接收第一信息,有助于第一终端设备节约功耗。For another example, the second time period is separated from the sending time of the first terminal device identifier by a second time interval, or the second time period is obtained by starting from the sending time of the first terminal device identifier and offsetting by the second time interval in the direction of time elapse. That is to say, after the first terminal device sends the first terminal device identifier, it will enter the second time period again after a second time interval to prepare to receive the first information, which helps the first terminal device save power consumption.
在本申请实施例中,对第二时间段的实现方式不作限定。例如,第二时间段可以通过时间窗表示。当然,第二时间段还可以通过计时器表示。In the embodiment of the present application, the implementation method of the second time period is not limited. For example, the second time period can be represented by a time window. Of course, the second time period can also be represented by a timer.
在一些实现方式中,在第二时间段内未接收到第一信息的情况下,第一终端设备冲突解决失败。In some implementations, when the first information is not received within the second time period, conflict resolution of the first terminal device fails.
通常,第一终端设备可能会支持在带宽范围内接收消息,或者支持在信道内接收消息。对于支持在信道内接收消息的第一终端设备而言,第一信息可以是在一个信道中传输的窄带消息,以节约第一终端 设备接收第一信息的功耗。Generally, the first terminal device may support receiving messages within a bandwidth range, or support receiving messages within a channel. For the first terminal device that supports receiving messages within a channel, the first information may be a narrowband message transmitted in a channel to save the first terminal device. The power consumption of the device when receiving the first information.
上文介绍了本申请实施例中的第一信息,下文介绍本申请实施例中用于承载第一索引的第三信息。The above introduces the first information in the embodiment of the present application, and the following introduces the third information used to carry the first index in the embodiment of the present application.
在一些实现方式中,第三信息包括以下一种或多种:用于指示第一终端设备基于退避机制接入网络的信息;用于第一终端设备基于退避机制接入网络的参数;用于指示终端设备发送终端设备标识的第二时域资源的信息。In some implementations, the third information includes one or more of the following: information used to instruct the first terminal device to access the network based on the backoff mechanism; parameters used for the first terminal device to access the network based on the backoff mechanism; information used to instruct the terminal device to send a second time domain resource identifying the terminal device.
以第三信息包括用于指示第一终端设备基于退避机制接入网络的信息为例,或者说,第三信息用于指示第一终端设备接入网络的过程中支持退避机制。Take the example that the third information includes information for indicating that the first terminal device accesses the network based on the backoff mechanism, or in other words, the third information is used to indicate that the backoff mechanism is supported during the process of the first terminal device accessing the network.
以第三信息包括上述参数为例,在一些实现方式中,参数用于指示第一终端设备尝试接入网络的最大次数。在一些实现方式中,在第一终端设备确认冲突解决失败,且第一终端设备尝试接入目标设备的次数小于最大次数的情况下,第一终端设备可以重新监听第二信息。Taking the third information including the above parameters as an example, in some implementations, the parameters are used to indicate the maximum number of times the first terminal device attempts to access the network. In some implementations, when the first terminal device confirms that the conflict resolution fails and the number of times the first terminal device attempts to access the target device is less than the maximum number, the first terminal device can re-listen to the second information.
在另一些实现方式中,在第一终端设备确认冲突解决失败,且第一终端设备尝试接入目标设备的次数大于或等于最大次数的情况下,第一终端设备可以确认接入目标设备失败。In some other implementations, when the first terminal device confirms that the conflict resolution fails and the number of times the first terminal device attempts to access the target device is greater than or equal to the maximum number, the first terminal device may confirm that access to the target device has failed.
在本申请实施例中,若第一终端设备确认接入目标设备失败,则第一终端设备可以不再监听第二信息。或者,第一终端设备可以间隔一段较长的时间后重新监听第二信息,本申请实施例对此不作限定。In the embodiment of the present application, if the first terminal device confirms that the access to the target device fails, the first terminal device may no longer monitor the second information. Alternatively, the first terminal device may monitor the second information again after a long interval, which is not limited in the embodiment of the present application.
在一些实现方式中,第一终端设备可以设置一个计数器,用来记录第一终端设备尝试接入网络的最大次数。相应地,第一终端设备每次尝试接入网络,则计数器增1。In some implementations, the first terminal device may set a counter to record the maximum number of times the first terminal device attempts to access the network. Accordingly, the counter increases by 1 each time the first terminal device attempts to access the network.
在另一些实现方式中,上述参数还用于指示第一终端设备再次尝试接入目标设备的退避时间信息,或者说,上述参数用于指示第一终端设备再次尝试接入目标设备所需等待的时间,也即是说,第一终端设备下一次发起随机接入过程的时间与本次发起随机接入过程的时间之间的时间间隔大于或等于该参数指示的退避时间。或者说,第一终端设备在第一时刻重新监听第二信息,第一时刻为以第一终端设备确认冲突解决失败的时刻为起始时刻,经过退避时间信息所指示的时长之后的时刻。In other implementations, the above parameters are also used to indicate the backoff time information for the first terminal device to try to access the target device again, or in other words, the above parameters are used to indicate the waiting time for the first terminal device to try to access the target device again, that is, the time interval between the time when the first terminal device initiates the random access process next time and the time when the random access process is initiated this time is greater than or equal to the backoff time indicated by the parameter. In other words, the first terminal device re-listens to the second information at the first moment, and the first moment is the moment after the time indicated by the backoff time information, starting from the moment when the first terminal device confirms that the conflict resolution fails.
在本申请实施例中,上述参数可以为退避时间。当然,在本申请实施例中,上述参数可以为用于指示退避时间的指示信息,例如,上述参数可以为用于指示退避时间的索引,有助于减少指示退避时间占用的比特。In the embodiment of the present application, the above parameter may be the backoff time. Of course, in the embodiment of the present application, the above parameter may be indication information for indicating the backoff time, for example, the above parameter may be an index for indicating the backoff time, which helps to reduce the bits occupied by indicating the backoff time.
以第三信息包括用于指示第二时域资源的信息为例,在一些实现方式中,终端设备可以在第二时域资源上发送终端设备标识。或者说,用于指示第二时域资源的信息(或者说,第三信息)可以包括以下一种或多种:用于指示第三信息的接收时间与第二时域资源之间的时域偏移;多个时域资源中每个时域资源对应的时长;多个时域资源中在时域上相邻的两个时域资源之间的时间间隔。Taking the third information including information for indicating the second time domain resource as an example, in some implementations, the terminal device may send the terminal device identification on the second time domain resource. In other words, the information for indicating the second time domain resource (or the third information) may include one or more of the following: a time domain offset between the reception time of the third information and the second time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources; a time interval between two time domain resources that are adjacent in time domain in a plurality of time domain resources.
在一些实现方式中,上述第三信息的接收时间对应的时域资源与第二时域资源之间的时域偏移,可以替换为,上述第三信息的接收时间与第二时域资源对应的时间之间的时间偏移。In some implementations, the time domain offset between the time domain resource corresponding to the reception time of the third information and the second time domain resource can be replaced by the time offset between the reception time of the third information and the time corresponding to the second time domain resource.
在本申请实施例中,上述时域偏移可以包括以下一种:上述第三信息的接收时间对应的时域资源的起始位置与第二时域资源的起始位置之间的时域偏移,上述第三信息的接收时间对应的时域资源的结束位置与第二时域资源的结束位置之间的时域偏移,上述第三信息的接收时间对应的时域资源的起始位置与第二时域资源的结束位置之间的时域偏移,上述第三信息的接收时间对应的时域资源的结束位置与第二时域资源的起始位置之间的时域偏移。In an embodiment of the present application, the above-mentioned time domain offset may include one of the following: a time domain offset between a starting position of a time domain resource corresponding to a receiving time of the above-mentioned third information and a starting position of a second time domain resource, a time domain offset between an ending position of a time domain resource corresponding to a receiving time of the above-mentioned third information and an ending position of the second time domain resource, a time domain offset between a starting position of a time domain resource corresponding to a receiving time of the above-mentioned third information and an ending position of the second time domain resource, and a time domain offset between an ending position of a time domain resource corresponding to a receiving time of the above-mentioned third information and a starting position of the second time domain resource.
在本申请实施例中,上述时间偏移可以包括以下一种:上述第三信息的接收时间与第二时域资源的起始时间之间的时域偏移,上述第三信息的接收时间与第二时域资源的结束时间之间的时域偏移。In an embodiment of the present application, the above-mentioned time offset may include one of the following: the time domain offset between the reception time of the above-mentioned third information and the start time of the second time domain resource, and the time domain offset between the reception time of the above-mentioned third information and the end time of the second time domain resource.
在本申请实施例中,对上述时域偏移和/或时间偏移的实现方式不作限定。例如,时域偏移和/或时间偏移可以通过一段时间表示。又例如,时域偏移和/或时间偏移可以通过时域资源的数量表示。In the embodiment of the present application, the implementation method of the above-mentioned time domain offset and/or time offset is not limited. For example, the time domain offset and/or time offset can be represented by a period of time. For another example, the time domain offset and/or time offset can be represented by the number of time domain resources.
在一些实现方式中,上述多个时域资源可以是可用于传输终端设备标识的多个时域资源,或者说,多个时域资源为用于传输终端设备标识的候选时域资源。其中,多个时域资源包括第二时域资源。In some implementations, the multiple time domain resources may be multiple time domain resources that can be used to transmit the terminal device identifier, or in other words, the multiple time domain resources are candidate time domain resources for transmitting the terminal device identifier, wherein the multiple time domain resources include the second time domain resource.
在一些实现方式中,多个时域资源中在时域上相邻的两个时域资源之间的时间间隔,可以通过参数t3指示,该参数t3可以为多个时域资源中某个时域资源的起始时域位置,与下一个时域资源的起始时域位置之间的时长。此时,第一终端设备可以基于一个时域资源对应的时长与参数t3确定上述时间间隔。当然,在本申请实施例中,上述时间间隔也可以为某个时域资源的结束时域位置,与下一个时域资源的起始时域位置之间的时长。In some implementations, the time interval between two time domain resources that are adjacent in the time domain among multiple time domain resources can be indicated by parameter t3, and the parameter t3 can be the duration between the starting time domain position of a time domain resource among the multiple time domain resources and the starting time domain position of the next time domain resource. At this time, the first terminal device can determine the above time interval based on the duration corresponding to a time domain resource and parameter t3. Of course, in an embodiment of the present application, the above time interval can also be the duration between the ending time domain position of a time domain resource and the starting time domain position of the next time domain resource.
为了便于理解,下文结合图9介绍本申请实施例中的第二时域资源的指示方式。参见图9所示,多个时域资源包括时域资源0~N,并且第一终端设备接收第三信息的时间为t。上述第三信息中携带的用于指示第二时域资源的信息包括:用于指示第三信息的接收时间与第二时域资源之间的时域偏移t1,多个时域资源中每个时域资源对应的时长t2,以及时域资源0的起始位置与时域资源1的起始位置之间的时长t3。相应地,第一终端设备可以基于第三信息中的上述参数确定第二时域资源为时域资源0。For ease of understanding, the following describes a method for indicating the second time domain resource in an embodiment of the present application in conjunction with Figure 9. As shown in Figure 9, multiple time domain resources include time domain resources 0 to N, and the time when the first terminal device receives the third information is t. The information carried in the above third information for indicating the second time domain resource includes: a time domain offset t1 between the reception time of the third information and the second time domain resource, a duration t2 corresponding to each time domain resource in the multiple time domain resources, and a duration t3 between the starting position of time domain resource 0 and the starting position of time domain resource 1. Accordingly, the first terminal device can determine that the second time domain resource is time domain resource 0 based on the above parameters in the third information.
在一些场景中,网络设备可能成功接收并解调了多个前导码,此时,第三信息可能携带多个索引, 来指示网络设备接收的多个前导码。In some scenarios, the network device may successfully receive and demodulate multiple preamble codes. In this case, the third information may carry multiple indexes. To indicate multiple preamble codes received by the network device.
在一些实现方式中,第三信息还用于指示:多个索引对应的多个前导码所在的时域资源的信息;和/或多个索引中每个索引对应的前导码所在的信道的信息,有助于第一终端设备区分多个索引对应的前导码。其中,多个索引包括第一索引。In some implementations, the third information is further used to indicate: information about time domain resources where multiple preamble codes corresponding to multiple indexes are located; and/or information about channels where preamble codes corresponding to each of the multiple indexes are located, which helps the first terminal device distinguish the preamble codes corresponding to the multiple indexes. The multiple indexes include the first index.
在一些实现方式,上述多个前导码所在的信道的信息可以用于标识多个前导码中每个前导码所在的信道的信息,例如,该信息可以为多个前导码中每个前导码所在的信道的索引。In some implementations, the information of the channels where the multiple preambles are located may be used to identify the information of the channel where each of the multiple preambles is located. For example, the information may be an index of the channel where each of the multiple preambles is located.
在一些实现方式,上述多个前导码所在的时域资源的信息可以用于标识多个前导码中每个前导码所在的时域资源,例如,该信息可以为多个前导码中每个前导码所在的时域资源的索引。In some implementations, the information of the time domain resources where the multiple preambles are located can be used to identify the time domain resource where each of the multiple preambles is located. For example, the information can be an index of the time domain resource where each of the multiple preambles is located.
在一些实现方式,多个前导码所在的时域资源的索引可以按照时域上从早到晚的顺序增大,例如,多个前导码所在的时域资源的索引可以按照时域上从早到晚的顺序递增。In some implementations, the indexes of the time domain resources where the multiple preamble codes are located may increase in order from early to late in the time domain. For example, the indexes of the time domain resources where the multiple preamble codes are located may increase in order from early to late in the time domain.
通常,若第三信息包含多个索引,说明目标设备接收到多个终端设备发送的前导码,此时,多个终端设备在确定多个索引指示前导码中有自己发送的前导码后,都会向目标设备发送各自的终端设备标识。也即是说,网络设备会接收到多个终端设备的终端设备标识。为了便于网络设备确定接收到终端设备标识与接收的前导码之间的对应关系,可以设置多个前导码所在的时域资源的索引与承载多个终端设备标识的时域资源一一对应。此时,网络设备可以基于该对应关系,以及终端设备标识所在的时域资源,确定该终端设备标识指示的终端设备的发送的前导码是哪个。Usually, if the third information includes multiple indexes, it means that the target device receives preambles sent by multiple terminal devices. At this time, after determining that the preambles indicated by the multiple indexes include the preambles sent by themselves, the multiple terminal devices will send their respective terminal device identifiers to the target device. In other words, the network device will receive the terminal device identifiers of multiple terminal devices. In order to facilitate the network device to determine the correspondence between the received terminal device identifier and the received preamble, the index of the time domain resources where the multiple preambles are located can be set to correspond one by one with the time domain resources carrying the multiple terminal device identifiers. At this time, the network device can determine which preamble is sent by the terminal device indicated by the terminal device identifier based on the correspondence and the time domain resource where the terminal device identifier is located.
在一些实现方式中,上述对应关系可以包括多个终端设备标识在多个时域资源上以第一顺序承载,第一顺序为多个终端设备标识对应的多个前导码所在的时域资源的索引从小到大的顺序。也即是说,对于先发前导码的终端设备而言,其对应的终端设备标识在多个终端设备标识所在的时域资源上优先发送。又或者说,多个终端设备中在多个时域资源上传输前导码(即前文的多个前导码)的顺序,与多个终端设备在多个时域资源上传输终端设备标识(即前文的多个终端设备标识)的顺序相同。In some implementations, the above correspondence may include multiple terminal device identifiers being carried on multiple time domain resources in a first order, and the first order is the order of the indexes of the time domain resources where the multiple preamble codes corresponding to the multiple terminal device identifiers are located from small to large. In other words, for the terminal device that sends the preamble code first, its corresponding terminal device identifier is preferentially sent on the time domain resources where the multiple terminal device identifiers are located. In other words, the order in which the preamble codes (i.e., the multiple preamble codes in the previous text) are transmitted on multiple time domain resources among multiple terminal devices is the same as the order in which the terminal device identifiers (i.e., the multiple terminal device identifiers in the previous text) are transmitted on multiple time domain resources by multiple terminal devices.
参见图10所示,假设终端设备1~终端设备3分别向网络设备发送前导码1~3,其中,终端设备1在时域资源1上发送前导码1,终端设备2在时域资源2上发送前导码2,终端设备3在时域资源3上发送前导码3,并且上述三个时域资源在时域上从早到晚的排布顺序为时域资源1,时域资源2以及时域资源3。相应地,网络设备成功接收前导码1~3并发送了前导码1~3对应的索引。此时,终端设备1可以在时域资源n+1上传输终端设备1的终端设备标识,终端设备2可以在时域资源n+2上传输终端设备2的终端设备标识,终端设备3可以在时域资源n+3上传输终端设备3的终端设备标识。其中,时域资源n+1~时域资源n+3在时域上从早到晚的排布顺序为时域资源n+1,时域资源n+2以及时域资源n+3。As shown in FIG. 10 , it is assumed that terminal device 1 to terminal device 3 send preambles 1 to 3 to the network device respectively, wherein terminal device 1 sends preamble 1 on time domain resource 1, terminal device 2 sends preamble 2 on time domain resource 2, and terminal device 3 sends preamble 3 on time domain resource 3, and the arrangement order of the above three time domain resources from early to late in the time domain is time domain resource 1, time domain resource 2, and time domain resource 3. Accordingly, the network device successfully receives preambles 1 to 3 and sends the indexes corresponding to preambles 1 to 3. At this time, terminal device 1 can transmit the terminal device identification of terminal device 1 on time domain resource n+1, terminal device 2 can transmit the terminal device identification of terminal device 2 on time domain resource n+2, and terminal device 3 can transmit the terminal device identification of terminal device 3 on time domain resource n+3. Among them, the arrangement order of time domain resources n+1 to time domain resources n+3 from early to late in the time domain is time domain resource n+1, time domain resource n+2, and time domain resource n+3.
在一些实现方式中,第三信息可以以广播的方式传输,也即是说,发送第三信息的信道可以为广播信道。例如,网络设备可以在带宽范围内以广播的方式发送第三信息,其中,第三信息可以包括一个或多个索引来指示目标设备接收的多个前导码。In some implementations, the third information may be transmitted in a broadcast manner, that is, the channel for sending the third information may be a broadcast channel. For example, the network device may send the third information in a broadcast manner within a bandwidth range, wherein the third information may include one or more indexes to indicate multiple preamble codes received by the target device.
在一些实现方式中,发送第三信息的信道可以与第一终端设备发送前导码的信道相同,或者说,发送第三信息的信道可以与发送第一终端设备标识的信道相同,有助于简化第一终端设备接收第三信息复杂度。In some implementations, the channel for sending the third information may be the same as the channel for sending the preamble code by the first terminal device, or in other words, the channel for sending the third information may be the same as the channel for sending the first terminal device identifier, which helps to simplify the complexity of the first terminal device receiving the third information.
需要说明的是,若发送第三信息的信道可以与第一终端设备发送前导码的信道相同,并且第一终端设备选择了发送前导码的时域资源,此时,第三信息中指示的发送前导码的时域资源为第一终端设备选择的。此时,第三信息可以不指示传输前导码的信道信息,以节约传输第三信息的功耗。当然,在本申请实施例中,如果不考虑上述问题,第三信息也可以指示传输前导码的信道信息。It should be noted that if the channel for sending the third information can be the same as the channel for sending the preamble by the first terminal device, and the first terminal device selects the time domain resource for sending the preamble, then the time domain resource for sending the preamble indicated in the third information is selected by the first terminal device. At this time, the third information may not indicate the channel information for transmitting the preamble to save power consumption for transmitting the third information. Of course, in the embodiment of the present application, if the above problem is not considered, the third information may also indicate the channel information for transmitting the preamble.
在一些实现方式中,第一终端设备可以在第一时间段内接收第三信息,以提高成功接收到第三信息的概率。其中,第一时间段的起始位置可以基于前导码的发送时间确定。In some implementations, the first terminal device may receive the third information within a first time period to increase the probability of successfully receiving the third information, wherein the starting position of the first time period may be determined based on the transmission time of the preamble code.
例如,第一时间段的起始位置为前导码的发送时间。在本申请实施例中,将第一时间段的起始位置设置为前导码的发送时间,也即是说,第一终端设备发送了前导码之后,第一终端设备立刻进入第一时间段准备接收第三信息,有助于第一终端设备可以在第一时间段接收其他通信设备(例如,reader)的能量,以供后续通过反向散射的电波进行通信。For example, the starting position of the first time period is the sending time of the preamble code. In the embodiment of the present application, the starting position of the first time period is set to the sending time of the preamble code, that is, after the first terminal device sends the preamble code, the first terminal device immediately enters the first time period to prepare to receive the third information, which helps the first terminal device to receive energy from other communication devices (for example, readers) in the first time period for subsequent communication through backscattered radio waves.
又例如,第一时间段的起始位置与前导码的发送时间之间间隔第一时间间隔,或者说,第一时间段的起始位置是以前导码的发送时间为起始,按照时间流逝的方向偏移第一时间间隔后得到的。也即是说,第一终端设备发送了前导码之后,会继续间隔第一时间间隔后,再进入第一时间段准备接收第三信息,有助于第一终端设备节约功耗。For another example, the starting position of the first time period is separated from the sending time of the preamble by a first time interval, or the starting position of the first time period is obtained by starting from the sending time of the preamble and shifting by the first time interval in the direction of time lapse. That is to say, after the first terminal device sends the preamble, it will continue to wait for the first time interval before entering the first time period to prepare for receiving the third information, which helps the first terminal device save power consumption.
在本申请实施例中,对第一时间段的实现方式不作限定。例如,第一时间段可以通过时间窗表示。当然,第一时间段还可以通过计时器标识。In the embodiment of the present application, the implementation method of the first time period is not limited. For example, the first time period can be represented by a time window. Of course, the first time period can also be identified by a timer.
在一些实现方式中,在第一时间段内未接收到第三信息的情况下,第一终端设备冲突解决失败。 In some implementations, when the third information is not received within the first time period, conflict resolution of the first terminal device fails.
在传统的随机接入过程中,网络设备通常会以周期的形式来发送触发信息,来触发第一终端设备进行随机接入过程。然而,这种以周期性触发随机接入过程的方式是不必要的,可能导致传输资源的利用率降低。例如,针对前文介绍的类型A的终端设备,或者类型B的终端设备而言,其工作原理是基于反向散射进行的,所以在发起任何流程之前,reader通常会发送一个或多个消息给终端设备,以便终端设备可以基于reader发送的一个或多个消息进行反向散射。此时,一个或多个消息可以实现上述触发随机接入过程的功能,此时,再以周期性的方式发送触发信息显然是较为消耗系统资源的。In the traditional random access process, the network device usually sends trigger information in a periodic form to trigger the first terminal device to perform a random access process. However, this method of periodically triggering the random access process is unnecessary and may result in reduced utilization of transmission resources. For example, for the terminal device of type A or type B introduced above, its working principle is based on backscattering, so before initiating any process, the reader usually sends one or more messages to the terminal device so that the terminal device can perform backscattering based on one or more messages sent by the reader. At this time, one or more messages can realize the function of triggering the random access process mentioned above. At this time, sending the trigger information in a periodic manner is obviously more consuming of system resources.
因此,针对上述问题,本申请实施例提供了一种无线通信的方法,在该方法中目标设备可以向第一终端设备发送第二信息,来触发第一终端设备进行随机接入过程,或者说,第二信息用于触发第一终端设备发送前导码,其中,第二信息可以是非周期性传输的。当然,若不考虑上述问题,第二信息可以以周期性传输。Therefore, in response to the above problem, an embodiment of the present application provides a wireless communication method, in which the target device can send second information to the first terminal device to trigger the first terminal device to perform a random access process, or in other words, the second information is used to trigger the first terminal device to send a preamble, wherein the second information can be transmitted aperiodically. Of course, if the above problem is not considered, the second information can be transmitted periodically.
例如,在物流传输的场景中,若网络设备需要对货仓中的物品进行盘点,此时,网络设备可以向物品上的电子标签(作为第一终端设备的示例)发送第二信息。此时,可以理解第二信息是基于盘点货仓中物品的需求而触发的。For example, in a logistics transmission scenario, if the network device needs to take inventory of items in a warehouse, the network device can send the second information to the electronic tag on the item (as an example of the first terminal device). At this time, it can be understood that the second information is triggered based on the need to take inventory of items in the warehouse.
在一些实现方式中,第二信息可以是在带宽范围内广播的信息,以便多个终端设备可以接收到。In some implementations, the second information may be information broadcast within a bandwidth range so that multiple terminal devices can receive it.
在一些实现方式中,发送第二信息的时域资源(又称“参考时域资源”)可以用于确定发送前导码的时域资源(又称“第一时域资源”)。或者说,第一时域资源是基于参考时域资源确定的。In some implementations, the time domain resource for sending the second information (also called "reference time domain resource") can be used to determine the time domain resource for sending the preamble (also called "first time domain resource"). In other words, the first time domain resource is determined based on the reference time domain resource.
在一些实现方式中,第一时域资源是基于参考时域资源以及资源配置参数确定的,其中,资源配置参数用于指示以下一种或多种:参考时域资源与第一时域资源之间的时域偏移;多个时域资源中每个时域资源对应的时长;多个时域资源中在时域上相邻的两个时域资源之间的时间间隔;多个时域资源的时域资源的个数。In some implementations, the first time domain resource is determined based on a reference time domain resource and a resource configuration parameter, wherein the resource configuration parameter is used to indicate one or more of the following: a time domain offset between the reference time domain resource and the first time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources; a time interval between two time domain resources that are adjacent in time domain in a plurality of time domain resources; and the number of time domain resources in a plurality of time domain resources.
在一些实现方式中,上述参考时域资源与第一时域资源之间的时域偏移,可以替换为,上述参考时域资源对应的时间与第一时域资源对应的时间之间的时间偏移。In some implementations, the time domain offset between the reference time domain resource and the first time domain resource may be replaced by a time offset between a time corresponding to the reference time domain resource and a time corresponding to the first time domain resource.
在本申请实施例中,上述时域偏移可以包括以下一种:上述参考时域资源的起始位置与第一时域资源的起始位置之间的时域偏移,上述参考时域资源的结束位置与第一时域资源的结束位置之间的时域偏移,上述参考时域资源的起始位置与第一时域资源的结束位置之间的时域偏移,上述参考时域资源的结束位置与第一时域资源的起始位置之间的时域偏移。In an embodiment of the present application, the above-mentioned time domain offset may include one of the following: a time domain offset between the starting position of the above-mentioned reference time domain resource and the starting position of the first time domain resource, a time domain offset between the ending position of the above-mentioned reference time domain resource and the ending position of the first time domain resource, a time domain offset between the starting position of the above-mentioned reference time domain resource and the ending position of the first time domain resource, and a time domain offset between the ending position of the above-mentioned reference time domain resource and the starting position of the first time domain resource.
在本申请实施例中,上述时间偏移可以包括以下一种:上述参考时域资源的起始时间与第一时域资源的起始时间之间的时域偏移,上述参考时域资源的结束时间与第一时域资源的结束时间之间的时域偏移,上述参考时域资源的起始时间与第一时域资源的结束时间之间的时域偏移,上述参考时域资源的结束时间与第一时域资源的起始时间之间的时域偏移。In an embodiment of the present application, the above-mentioned time offset may include one of the following: a time domain offset between the start time of the above-mentioned reference time domain resource and the start time of the first time domain resource, a time domain offset between the end time of the above-mentioned reference time domain resource and the end time of the first time domain resource, a time domain offset between the start time of the above-mentioned reference time domain resource and the end time of the first time domain resource, and a time domain offset between the end time of the above-mentioned reference time domain resource and the start time of the first time domain resource.
在本申请实施例中,对上述时域偏移和/或时间偏移的实现方式不作限定。例如,时域偏移和/或时间偏移可以通过一段时间表示。又例如,时域偏移和/或时间偏移可以通过时域资源的数量表示。In the embodiment of the present application, the implementation method of the above-mentioned time domain offset and/or time offset is not limited. For example, the time domain offset and/or time offset can be represented by a period of time. For another example, the time domain offset and/or time offset can be represented by the number of time domain resources.
在一些实现方式中,上述多个时域资源可以是可用于传输前导码的多个时域资源,或者说,多个时域资源为用于传输前导码的候选时域资源。其中,多个时域资源包括第一时域资源。In some implementations, the multiple time domain resources may be multiple time domain resources that can be used to transmit the preamble, or in other words, the multiple time domain resources are candidate time domain resources for transmitting the preamble, wherein the multiple time domain resources include the first time domain resource.
在一些实现方式中,多个时域资源中在时域上相邻的两个时域资源之间的时间间隔,可以通过参数t6指示,该参数t6可以为多个时域资源中某个时域资源的起始时域位置,与下一个时域资源的起始时域位置之间的时长。此时,第一终端设备可以基于一个时域资源对应的时长与参数t6确定上述时间间隔。当然,在本申请实施例中,上述时间间隔也可以为某个时域资源的结束时域位置,与下一个时域资源的起始时域位置之间的时长。In some implementations, the time interval between two time domain resources that are adjacent in the time domain among multiple time domain resources can be indicated by parameter t6, which can be the duration between the starting time domain position of a time domain resource among the multiple time domain resources and the starting time domain position of the next time domain resource. At this time, the first terminal device can determine the above time interval based on the duration corresponding to a time domain resource and parameter t6. Of course, in an embodiment of the present application, the above time interval can also be the duration between the ending time domain position of a time domain resource and the starting time domain position of the next time domain resource.
为了便于理解,下文结合图11介绍本申请实施例中的第一时域资源的指示方式。参见图11所示,多个时域资源包括时域资源0~N,并且参考时域资源为时域资源t。上述资源配置参数包括:用于指示参考时域资源与第一时域资源之间的时域偏移t4,多个时域资源中每个时域资源对应的时长t5,以及时域资源0的起始位置与时域资源1的起始位置之间的时间间隔t6。相应地,第一终端设备可以基于资源配置参数中的上述参数确定第一时域资源为时域资源0。For ease of understanding, the following describes the indication method of the first time domain resource in an embodiment of the present application in conjunction with Figure 11. As shown in Figure 11, the multiple time domain resources include time domain resources 0 to N, and the reference time domain resource is time domain resource t. The above-mentioned resource configuration parameters include: a time domain offset t4 used to indicate the reference time domain resource and the first time domain resource, a duration t5 corresponding to each time domain resource in the multiple time domain resources, and a time interval t6 between the starting position of time domain resource 0 and the starting position of time domain resource 1. Accordingly, the first terminal device can determine that the first time domain resource is time domain resource 0 based on the above-mentioned parameters in the resource configuration parameters.
在一些实现方式中,上述资源配置参数承载于第二信息。当然,在本申请实施例中,上述资源配置参数可以是预定义或预配置的。In some implementations, the resource configuration parameters are carried in the second information. Of course, in the embodiment of the present application, the resource configuration parameters may be predefined or preconfigured.
在一些场景中,为了提高第一终端设备接入目标设备的成功率,第一终端设备在每次尝试接入网络时,可以采用不同的发射功率。在一些实现方式中,在第一终端设备尝试多次接入目标设备的过程中,第一终端设备使用的发射功率可以增大。例如,在第一终端设备尝试多次接入目标设备的过程中,第一终端设备使用的发射功率可以以功率步长进行调整。又例如,在第一终端设备尝试多次接入目标设备的过程中,第一终端设备使用的发射功率可以以初始发射功率基础,基于功率步长进行调整后得到的。例如,功率步长为ΔP,初始发射功率为P,则第一终端设备第N次尝试接入目标设备时使用的发射功率可 以为PN,则PN可以通过以下公式确定:PN=P+N×ΔP。In some scenarios, in order to improve the success rate of the first terminal device accessing the target device, the first terminal device may use a different transmission power each time it attempts to access the network. In some implementations, during the process in which the first terminal device attempts to access the target device multiple times, the transmission power used by the first terminal device may be increased. For example, during the process in which the first terminal device attempts to access the target device multiple times, the transmission power used by the first terminal device may be adjusted based on a power step. For another example, during the process in which the first terminal device attempts to access the target device multiple times, the transmission power used by the first terminal device may be obtained by adjusting the power step based on the initial transmission power. For example, if the power step is ΔP and the initial transmission power is P, then the transmission power used by the first terminal device when attempting to access the target device for the Nth time may be Assume that PN , then PN can be determined by the following formula: PN = P + N × ΔP.
在一些实现方式中,上述初始发射功率可以是第一终端设备第一次尝试接入目标设备使用的,此时,N为大于或等于0的正整数。当然,在本申请实施例中,第一终端设备第一次尝试接入目标设备使用的发射功率可以是初始发射功率与功率步长之和,此时,N为大于或等于1的正整数。In some implementations, the initial transmission power may be used by the first terminal device when it attempts to access the target device for the first time, and N is a positive integer greater than or equal to 0. Of course, in the embodiment of the present application, the transmission power used by the first terminal device when it attempts to access the target device for the first time may be the sum of the initial transmission power and the power step, and N is a positive integer greater than or equal to 1.
在本申请实施例中,上述第一终端设备尝试接入目标设备使用的发射功率可以指在第一终端设备尝试接入目标设备的过程中,发射前导码和/或第四信息(或者说终端设备标识)使用的发射功率。In an embodiment of the present application, the transmission power used by the first terminal device to attempt to access the target device may refer to the transmission power used to transmit the preamble code and/or the fourth information (or the terminal device identifier) during the process of the first terminal device attempting to access the target device.
在一些实现方式中,上述用于功率调整的参数(例如,初始发射功率和/或功率步长)可以由网络设备通过第二信息配置。当然,在本申请实施例中,上述用于功率调整的参数(例如,初始发射功率和/或功率步长)可以是预定义或预配置的。In some implementations, the parameters for power adjustment (e.g., initial transmit power and/or power step) may be configured by the network device through the second information. Of course, in the embodiment of the present application, the parameters for power adjustment (e.g., initial transmit power and/or power step) may be predefined or preconfigured.
在一些实现方式中,在第一终端设备尝试接入目标设备的过程中,网络设备向第一终端设备发送的信息(例如,第二信息,第三信息以及第一信息中的一种或多种)可以是在带宽范围内传输的,也可以是在某一信道内传输的。相应地,第一终端设备向网络设备发送的信息(例如,前导码和/或第四信息)可以是在某一信道内传输的。In some implementations, during the process of the first terminal device attempting to access the target device, the information (e.g., one or more of the second information, the third information, and the first information) sent by the network device to the first terminal device may be transmitted within a bandwidth range or within a certain channel. Accordingly, the information (e.g., the preamble and/or the fourth information) sent by the first terminal device to the network device may be transmitted within a certain channel.
在一些实现方式中,第一终端设备发送信息(例如,前导码和/或第四信息)时机与第一终端设备的终端类型关联。例如,对于类型A和/或类型B的终端设备而言,开始发送信息的时间可以基于内部的准备工作和外部的用于反向散射的无线电波是否存在确定。当两者都准备好的时候,类型A和/或类型B的终端设备才开始发送消息。又例如,对于类型C的终端设备而言,开始发送信息的时间可以基于内部的准备工作确定,即如果内部的准备工作已经完成,类型C的终端设备就可以发送信息。In some implementations, the timing at which the first terminal device sends information (e.g., a preamble and/or the fourth information) is associated with the terminal type of the first terminal device. For example, for a terminal device of type A and/or type B, the time to start sending information can be determined based on internal preparations and whether external radio waves for backscattering exist. When both are ready, the terminal device of type A and/or type B starts sending messages. For another example, for a terminal device of type C, the time to start sending information can be determined based on internal preparations, that is, if the internal preparations have been completed, the terminal device of type C can send information.
需要说明的是,当处于相同信道上的终端设备选择了相同的前导码时,冲突就会发生。在这种情况下不同的终端设备会在基本相同的时间,在相同的信道上发送第四信息。在一些情况中,多个终端设备发送的第四信息,网络设备可能均无法解调(假如多个终端设备发送的第四信息使用的发射功率类似,网络设备来说,可能多个终端设备发送的第四信息均无法解调),此时,多个终端设备接入目标设备均为失败。It should be noted that when the terminal devices on the same channel select the same preamble code, a conflict will occur. In this case, different terminal devices will send the fourth information on the same channel at substantially the same time. In some cases, the network device may not be able to demodulate the fourth information sent by multiple terminal devices (if the transmission power used by the fourth information sent by multiple terminal devices is similar, the network device may not be able to demodulate the fourth information sent by multiple terminal devices). At this time, multiple terminal devices fail to access the target device.
在另一些情况中,可能多个终端设备发送的第四信息中某个第四信息被成功解调,而剩余终端设备发送的第四信息均无法被解调。(假如多个终端设备发送的第四信息使用的发射功率不同,对于网络设备来说,以最大发射功率发送的第四信息可能被成功解调)。在这种情况下,网络设备在第一信息中反馈的终端设备标识即为成功解调的第四信息中的终端设备标识。其他没有解调成功的第四信息对应的终端设备则会因为等不到第一信息而接入失败。In other cases, some of the fourth information sent by multiple terminal devices may be successfully demodulated, while the fourth information sent by the remaining terminal devices cannot be demodulated. (If the fourth information sent by multiple terminal devices uses different transmission powers, for the network device, the fourth information sent with the maximum transmission power may be successfully demodulated.) In this case, the terminal device identifier fed back by the network device in the first information is the terminal device identifier in the successfully demodulated fourth information. The terminal devices corresponding to the other fourth information that has not been successfully demodulated will fail to access because they cannot wait for the first information.
为了便于理解,下文结合图12至图15介绍本申请实施例的随机接入方法,在下文介绍的随机接入过程中,Msg0可以作为第二信息的示例,Msg1可以作为承载前导码的信息的示例,Msg2可以作为第三信息的示例,Msg3可以作为第四信息的示例,Msg4可以作为第一信息的示例。For ease of understanding, the random access method of an embodiment of the present application is introduced below in conjunction with Figures 12 to 15. In the random access process introduced below, Msg0 can be used as an example of the second information, Msg1 can be used as an example of information carrying a preamble code, Msg2 can be used as an example of the third information, Msg3 can be used as an example of the fourth information, and Msg4 can be used as an example of the first information.
图12是本申请实施例的随机接入方法的示意性流程图。图12所示的方法包括步骤S1210至步骤S1250。Fig. 12 is a schematic flow chart of a random access method according to an embodiment of the present application. The method shown in Fig. 12 includes steps S1210 to S1250.
在步骤S1210中,网络设备发送Msg0。In step S1210, the network device sends Msg0.
在一些实现方式中,出于盘点的目的,网络设备可以在某个频段上广播Msg0以触发多个终端设备进行随机接入,其中,多个终端设备包括第一终端设备。In some implementations, for inventory purposes, the network device may broadcast Msg0 on a certain frequency band to trigger multiple terminal devices to perform random access, wherein the multiple terminal devices include the first terminal device.
在步骤S1220中,响应于第一终端设备接收到Msg0,第一终端设备向网络设备发送前导码1(又称Msg1)。In step S1220, in response to the first terminal device receiving Msg0, the first terminal device sends a preamble code 1 (also referred to as Msg1) to the network device.
在一些实现方式中,前导码1中可以调制一个序列,该序列可以是预设的16个序列中的一个。In some implementations, a sequence may be modulated in preamble 1, and the sequence may be one of 16 preset sequences.
在一些实现方式中,16个序列中的每个序列都可以对应一个索引,以供网络设备能够解调承载不同序列的前导码。如果网络设备从不同的终端设备收到了调制了相同序列的前导码,网络设备无法识别多个前导码来自不同的终端设备,此时,网络设备可能将多个终端设备发送的多个前导码作为一个终端设备发送的前导码进行解调。In some implementations, each of the 16 sequences may correspond to an index so that the network device can demodulate preambles carrying different sequences. If the network device receives preambles modulated with the same sequence from different terminal devices, the network device cannot identify that the multiple preambles come from different terminal devices. At this time, the network device may demodulate the multiple preambles sent by the multiple terminal devices as a preamble sent by one terminal device.
在步骤S1230中,网络设备向第一终端设备发送Msg2。In step S1230, the network device sends Msg2 to the first terminal device.
在一些实现方式中,Msg2可以包括网络设备接收并正确解调的前导码的索引。In some implementations, Msg2 may include the index of the preamble that the network device received and correctly demodulated.
在步骤S1240中,若Msg2中携带的前导码的索引包括前导码1的索引,第一终端设备向网络设备发送Msg3。In step S1240, if the index of the preamble code carried in Msg2 includes the index of preamble code 1, the first terminal device sends Msg3 to the network device.
在一些实现方式中,Msg3中包含第一终端设备的终端设备标识,其中,终端设备标识为第一终端设备产生的随机数。In some implementations, Msg3 includes a terminal device identifier of the first terminal device, wherein the terminal device identifier is a random number generated by the first terminal device.
在一些实现方式中,第一终端设备接收到Msg2后,确定Msg2中携带的前导码的索引是否包括前导码1的索引。若Msg2中携带的前导码的索引包括前导码1的索引,说明第一终端设备发送的前导码1被网络设备接收并正确解调,则第一终端设备向网络设备发送Msg3。 In some implementations, after receiving Msg2, the first terminal device determines whether the index of the preamble code carried in Msg2 includes the index of preamble code 1. If the index of the preamble code carried in Msg2 includes the index of preamble code 1, it means that the preamble code 1 sent by the first terminal device is received and correctly demodulated by the network device, and the first terminal device sends Msg3 to the network device.
若Msg2中携带的前导码的索引不包括前导码1的索引,说明第一终端设备发送的前导码1未被网络设备接收并正确解调,则第一终端设备可以认为随机接入失败。If the index of the preamble code carried in Msg2 does not include the index of the preamble code 1, it means that the preamble code 1 sent by the first terminal device is not received and correctly demodulated by the network device, then the first terminal device may consider that the random access has failed.
在步骤S1250中,响应于网络设备接收终端设备标识,网络设备向第一终端设备发送Msg4。In step S1250, in response to the network device receiving the terminal device identification, the network device sends Msg4 to the first terminal device.
在一些实现方式中,Msg4包括网络设备接收的终端设备标识,以及与该终端设备标识对应的第一RNTI。In some implementations, Msg4 includes a terminal device identifier received by the network device and a first RNTI corresponding to the terminal device identifier.
在一些实现方式中,若Msg4中携带的终端设备标识包含第一终端设备的终端设备标识,则第一终端设备可以认为随机接入成功,之后,第一终端设备可以将第一RNTI作为自己的标识,并基于第一RNTI与网络设备通信。若Msg4中携带的终端设备标识不包含第一终端设备的终端设备标识,则第一终端设备可以认为随机接入失败。In some implementations, if the terminal device identifier carried in Msg4 includes the terminal device identifier of the first terminal device, the first terminal device may consider that the random access is successful, and then the first terminal device may use the first RNTI as its own identifier and communicate with the network device based on the first RNTI. If the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device may consider that the random access has failed.
图13是本申请另一实施例的随机接入方法的示意性流程图。图13所示的方法包括步骤S1310至步骤S1350。Fig. 13 is a schematic flow chart of a random access method according to another embodiment of the present application. The method shown in Fig. 13 includes steps S1310 to S1350.
在步骤S1310中,网络设备发送Msg0。In step S1310, the network device sends Msg0.
在一些实现方式中,出于盘点的目的,网络设备可以在某个频段上广播Msg0以触发多个终端设备进行随机接入,其中,多个终端设备包括第一终端设备。In some implementations, for inventory purposes, the network device may broadcast Msg0 on a certain frequency band to trigger multiple terminal devices to perform random access, wherein the multiple terminal devices include the first terminal device.
在一些实现方式中,Msg0可以包括用于确定第一时域资源的资源配置参数,其中,第一时域资源可以用于发送前导码1。应理解,第一时域资源的确定方式可以参见图11所示,为了简洁,在此不再赘述。In some implementations, Msg0 may include resource configuration parameters for determining a first time domain resource, where the first time domain resource may be used to send preamble 1. It should be understood that the determination method of the first time domain resource may refer to FIG. 11 , and for the sake of brevity, it will not be repeated here.
在步骤S1320中,响应于第一终端设备接收到Msg0,第一终端设备在第一时域资源上向网络设备发送前导码1(又称Msg1)。In step S1320, in response to the first terminal device receiving Msg0, the first terminal device sends a preamble code 1 (also referred to as Msg1) to the network device on the first time domain resource.
在一些实现方式中,前导码1中可以调制一个序列,该序列可以是预设的16个序列中的一个。In some implementations, a sequence may be modulated in preamble 1, and the sequence may be one of 16 preset sequences.
在一些实现方式中,16个序列中的每个序列都可以对应一个索引,以供网络设备能够解调承载不同序列的前导码。如果网络设备从不同的终端设备收到了调制了相同序列的前导码,网络设备无法识别多个前导码来自不同的终端设备,此时,网络设备可能将多个终端设备发送的多个前导码作为一个终端设备发送的前导码进行解调。In some implementations, each of the 16 sequences may correspond to an index so that the network device can demodulate preambles carrying different sequences. If the network device receives preambles modulated with the same sequence from different terminal devices, the network device cannot identify that the multiple preambles come from different terminal devices. At this time, the network device may demodulate the multiple preambles sent by the multiple terminal devices as a preamble sent by one terminal device.
在步骤S1330中,网络设备向第一终端设备发送Msg2。In step S1330, the network device sends Msg2 to the first terminal device.
在一些实现方式中,Msg2可以包括网络设备接收并正确解调的前导码的索引,以及发送前导码的时域资源的索引。In some implementations, Msg2 may include the index of the preamble code received and correctly demodulated by the network device, and the index of the time domain resource where the preamble code was sent.
在一些实现方式中,若Msg2通过广播消息发送,Msg2中还需要携带发送前导码的信道的索引。In some implementations, if Msg2 is sent via a broadcast message, Msg2 also needs to carry the index of the channel on which the preamble code is sent.
在一些实现方式中,Msg2可以包括用于确定第二时域资源的资源配置参数,其中,第二时域资源可以用于发送Msg3。应理解,第二时域资源的确定方式可以参见图9所示,为了简洁,在此不再赘述。In some implementations, Msg2 may include resource configuration parameters for determining a second time domain resource, wherein the second time domain resource may be used to send Msg3. It should be understood that the determination method of the second time domain resource may refer to FIG9 , and for the sake of brevity, it will not be described here.
在步骤S1340中,若Msg2中携带的前导码的索引包括前导码1的索引,第一终端设备在第二时域资源上向网络设备发送Msg3。In step S1340, if the index of the preamble code carried in Msg2 includes the index of the preamble code 1, the first terminal device sends Msg3 to the network device on the second time domain resources.
在一些实现方式中,Msg3中包含第一终端设备的终端设备标识,其中,终端设备标识为第一终端设备产生的随机数。In some implementations, Msg3 includes a terminal device identifier of the first terminal device, wherein the terminal device identifier is a random number generated by the first terminal device.
在一些实现方式中,第一终端设备接收到Msg2后,确定Msg2中携带的前导码的索引是否包括前导码1的索引。若Msg2中携带的前导码的索引包括前导码1的索引,说明第一终端设备发送的前导码1被网络设备接收并正确解调,则第一终端设备向网络设备发送Msg3。In some implementations, after receiving Msg2, the first terminal device determines whether the index of the preamble code carried in Msg2 includes the index of preamble code 1. If the index of the preamble code carried in Msg2 includes the index of preamble code 1, it means that the preamble code 1 sent by the first terminal device is received and correctly demodulated by the network device, and the first terminal device sends Msg3 to the network device.
若Msg2中携带的前导码的索引不包括前导码1的索引,说明第一终端设备发送的前导码1未被网络设备接收并正确解调,则第一终端设备可以认为随机接入失败。If the index of the preamble code carried in Msg2 does not include the index of the preamble code 1, it means that the preamble code 1 sent by the first terminal device is not received and correctly demodulated by the network device, then the first terminal device may consider that the random access has failed.
在步骤S1350中,响应于网络设备接收终端设备标识,网络设备向第一终端设备发送Msg4。In step S1350, in response to the network device receiving the terminal device identification, the network device sends Msg4 to the first terminal device.
在一些实现方式中,Msg4包括网络设备接收的终端设备标识,以及与该终端设备标识对应的第一RNTI。In some implementations, Msg4 includes a terminal device identifier received by the network device and a first RNTI corresponding to the terminal device identifier.
在一些实现方式中,若Msg4中携带的终端设备标识包含第一终端设备的终端设备标识,则第一终端设备可以认为随机接入成功,之后,第一终端设备可以将第一RNTI作为自己的标识,并基于第一RNTI与网络设备通信。若Msg4中携带的终端设备标识不包含第一终端设备的终端设备标识,则第一终端设备可以认为随机接入失败。In some implementations, if the terminal device identifier carried in Msg4 includes the terminal device identifier of the first terminal device, the first terminal device may consider that the random access is successful, and then the first terminal device may use the first RNTI as its own identifier and communicate with the network device based on the first RNTI. If the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device may consider that the random access has failed.
图14是本申请另一实施例的随机接入方法的示意性流程图。假设第一终端设备为前文介绍的类型C的终端设备,该类型的终端设备可以自主选择信道发送信息。在一些场景中,该类型的第一终端设备可以工作在FDD频段。图14所示的方法包括步骤S1410至步骤S1460。FIG14 is a schematic flow chart of a random access method according to another embodiment of the present application. Assume that the first terminal device is a terminal device of type C described above, and the terminal device of this type can autonomously select a channel to send information. In some scenarios, the first terminal device of this type can operate in an FDD frequency band. The method shown in FIG14 includes steps S1410 to S1460.
在步骤S1410中,第一终端设备向网络设备发送唤醒信号以唤醒网络设备。In step S1410, the first terminal device sends a wake-up signal to the network device to wake up the network device.
在一些实现方式中,假如网络设备需要第一终端设备主动发送信息(若第一终端设备为检测温度的传感器,则第一终端设备主动发送的信息包括温度信息),那么,由于网络设备不知道第一终端设备发 起随机接入过程的时间,因此,网络设备通常会以周期性广播Msg0来触发第一终端设备进行随机接入。但是周期性的广播Msg0会带来系统能量和带宽的消耗。在这种情况下,如果没有任何终端设备需要发起随机接入过程,网络设备可以停止广播Msg0。如果有终端设备需要发起随机接入过程,但是没有发现Msg0,那么第一终端设备可以向网络设备发送唤醒信号,以触发网络设备发送Msg0。In some implementations, if the network device requires the first terminal device to actively send information (if the first terminal device is a sensor for detecting temperature, the information actively sent by the first terminal device includes temperature information), then, since the network device does not know whether the first terminal device sends The time to start the random access process, therefore, the network device usually triggers the first terminal device to perform random access by periodically broadcasting Msg0. However, the periodic broadcasting of Msg0 will consume system energy and bandwidth. In this case, if no terminal device needs to initiate a random access process, the network device can stop broadcasting Msg0. If a terminal device needs to initiate a random access process, but does not find Msg0, the first terminal device can send a wake-up signal to the network device to trigger the network device to send Msg0.
在步骤S1420中,响应于唤醒信号,网络设备发送Msg0。In step S1420, in response to the wake-up signal, the network device sends Msg0.
在一些实现方式中,网络设备可以在某个频段上广播Msg0以触发多个终端设备进行随机接入,其中,多个终端设备包括第一终端设备。In some implementations, the network device may broadcast Msg0 on a certain frequency band to trigger multiple terminal devices to perform random access, wherein the multiple terminal devices include the first terminal device.
在步骤S1430中,响应于第一终端设备接收到Msg0,第一终端设备向网络设备发送前导码1(又称Msg1)。In step S1430, in response to the first terminal device receiving Msg0, the first terminal device sends a preamble code 1 (also referred to as Msg1) to the network device.
在一些实现方式中,第一终端设备发送前导码1的传输资源可以是第一终端设备自主选择的。其中,传输资源可以包括以下一种或多种时域资源、频域资源以及空域资源。In some implementations, the transmission resource for the first terminal device to send the preamble 1 may be independently selected by the first terminal device. The transmission resource may include one or more of the following time domain resources, frequency domain resources, and spatial domain resources.
在一些实现方式中,前导码1中可以调制一个序列,该序列可以是预设的16个序列中的一个。In some implementations, a sequence may be modulated in preamble 1, and the sequence may be one of 16 preset sequences.
在一些实现方式中,16个序列中的每个序列都可以对应一个索引,以供网络设备能够解调承载不同序列的前导码。如果网络设备从不同的终端设备收到了调制了相同序列的前导码,网络设备无法识别多个前导码来自不同的终端设备,此时,网络设备可能将多个终端设备发送的多个前导码作为一个终端设备发送的前导码进行解调。In some implementations, each of the 16 sequences may correspond to an index so that the network device can demodulate preambles carrying different sequences. If the network device receives preambles modulated with the same sequence from different terminal devices, the network device cannot identify that the multiple preambles come from different terminal devices. At this time, the network device may demodulate the multiple preambles sent by the multiple terminal devices as a preamble sent by one terminal device.
在步骤S1440中,网络设备向第一终端设备发送Msg2。In step S1440, the network device sends Msg2 to the first terminal device.
在一些实现方式中,Msg2可以包括以下一种或多种:网络设备接收并正确解调的前导码的索引,以及发送前导码的时域资源的索引,发送前导码的信道的索引,用于上行同步的时间提前(timing advance,TA)值。In some implementations, Msg2 may include one or more of the following: an index of a preamble code received and correctly demodulated by the network device, an index of a time domain resource for sending the preamble code, an index of a channel for sending the preamble code, and a timing advance (TA) value for uplink synchronization.
在一些实现方式中,由于网络设备的覆盖范围可能较大(例如,覆盖范围超过500米),则Msg2可以包括TA值,以便网络设备与终端设备之间进行时间同步。In some implementations, since the coverage range of the network device may be large (for example, the coverage range exceeds 500 meters), Msg2 may include a TA value to facilitate time synchronization between the network device and the terminal device.
在一些实现方式中,Msg2可以包括用于确定第二时域资源的资源配置参数,其中,第二时域资源可以用于发送Msg3。应理解,第二时域资源的确定方式可以参见图9所示,为了简洁,在此不再赘述。当然,在本申请实施例中,Msg2还可以包括用于传输Msg3的频域资源。In some implementations, Msg2 may include resource configuration parameters for determining a second time domain resource, wherein the second time domain resource may be used to send Msg3. It should be understood that the determination method of the second time domain resource can be shown in FIG9, and for the sake of brevity, it is not repeated here. Of course, in the embodiment of the present application, Msg2 may also include a frequency domain resource for transmitting Msg3.
在一些场景中,网络设备可能会成功接收并解调多个前导码,此时,Msg2中包括多个前导码的索引,此时,多个前导码的索引中都可以对应一组上述参数:网络设备接收并正确解调的前导码的索引,以及发送前导码的时域资源的索引,发送前导码的信道的索引,用于上行同步的TA值;用于确定第二时域资源的资源配置参数;用于传输Msg3的频域资源。In some scenarios, the network device may successfully receive and demodulate multiple preamble codes. In this case, Msg2 includes the indexes of multiple preamble codes. At this time, the indexes of multiple preamble codes can correspond to a set of the above parameters: the index of the preamble code received and correctly demodulated by the network device, as well as the index of the time domain resource for sending the preamble code, the index of the channel for sending the preamble code, the TA value used for uplink synchronization; the resource configuration parameters for determining the second time domain resources; and the frequency domain resources for transmitting Msg3.
在步骤S1450中,若Msg2中携带的前导码的索引包括前导码1的索引,第一终端设备向网络设备发送Msg3。In step S1450, if the index of the preamble code carried in Msg2 includes the index of preamble code 1, the first terminal device sends Msg3 to the network device.
在一些实现方式中,第一终端设备发送Msg3的传输资源可以基于Msg2确定,或者说,第一终端设备在Msg2指示的传输资源上发送Msg3。In some implementations, the transmission resources for sending Msg3 by the first terminal device may be determined based on Msg2, or in other words, the first terminal device sends Msg3 on the transmission resources indicated by Msg2.
在一些实现方式中,Msg3中包含第一终端设备的终端设备标识,其中,终端设备标识为第一终端设备产生的随机数。In some implementations, Msg3 includes a terminal device identifier of the first terminal device, wherein the terminal device identifier is a random number generated by the first terminal device.
在一些实现方式中,第一终端设备接收到Msg2后,确定Msg2中携带的前导码的索引是否包括前导码1的索引。若Msg2中携带的前导码的索引包括前导码1的索引,说明第一终端设备发送的前导码1被网络设备接收并正确解调,则第一终端设备向网络设备发送Msg3。In some implementations, after receiving Msg2, the first terminal device determines whether the index of the preamble code carried in Msg2 includes the index of preamble code 1. If the index of the preamble code carried in Msg2 includes the index of preamble code 1, it means that the preamble code 1 sent by the first terminal device is received and correctly demodulated by the network device, and the first terminal device sends Msg3 to the network device.
若Msg2中携带的前导码的索引不包括前导码1的索引,说明第一终端设备发送的前导码1未被网络设备接收并正确解调,则第一终端设备可以认为随机接入失败。If the index of the preamble code carried in Msg2 does not include the index of the preamble code 1, it means that the preamble code 1 sent by the first terminal device is not received and correctly demodulated by the network device, then the first terminal device may consider that the random access has failed.
在步骤S1460中,响应于网络设备接收终端设备标识,网络设备向第一终端设备发送Msg4。In step S1460, in response to the network device receiving the terminal device identification, the network device sends Msg4 to the first terminal device.
在一些实现方式中,Msg4包括网络设备接收的终端设备标识,以及与该终端设备标识对应的第一RNTI。In some implementations, Msg4 includes a terminal device identifier received by the network device and a first RNTI corresponding to the terminal device identifier.
在一些实现方式中,若Msg4中携带的终端设备标识包含第一终端设备的终端设备标识,则第一终端设备可以认为随机接入成功,之后,第一终端设备可以将第一RNTI作为自己的标识,并基于第一RNTI与网络设备通信。若Msg4中携带的终端设备标识不包含第一终端设备的终端设备标识,则第一终端设备可以认为随机接入失败。In some implementations, if the terminal device identifier carried in Msg4 includes the terminal device identifier of the first terminal device, the first terminal device may consider that the random access is successful, and then the first terminal device may use the first RNTI as its own identifier and communicate with the network device based on the first RNTI. If the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device may consider that the random access has failed.
图15是本申请另一实施例的随机接入方法的示意性流程图。图15所示的方法包括步骤S1510至步骤S1570。Fig. 15 is a schematic flow chart of a random access method according to another embodiment of the present application. The method shown in Fig. 15 includes steps S1510 to S1570.
在步骤S1510中,网络设备发送Msg0。In step S1510, the network device sends Msg0.
在一些实现方式中,网络设备可以在某个频段上广播Msg0以触发多个终端设备进行随机接入,其中,多个终端设备包括第一终端设备。 In some implementations, the network device may broadcast Msg0 on a certain frequency band to trigger multiple terminal devices to perform random access, wherein the multiple terminal devices include the first terminal device.
在步骤S1520中,响应于第一终端设备接收到Msg0,第一终端设备向网络设备发送前导码1(又称Msg1)。In step S1520, in response to the first terminal device receiving Msg0, the first terminal device sends a preamble code 1 (also referred to as Msg1) to the network device.
在一些实现方式中,第一终端设备发送前导码1的传输资源可以是第一终端设备自主选择的。其中,传输资源可以包括以下一种或多种时域资源、频域资源以及空域资源。In some implementations, the transmission resource for the first terminal device to send the preamble 1 may be independently selected by the first terminal device. The transmission resource may include one or more of the following time domain resources, frequency domain resources, and spatial domain resources.
在一些实现方式中,前导码1中可以调制一个序列,该序列可以是预设的16个序列中的一个。In some implementations, a sequence may be modulated in preamble 1, and the sequence may be one of 16 preset sequences.
在一些实现方式中,16个序列中的每个序列都可以对应一个索引,以供网络设备能够解调承载不同序列的前导码。如果网络设备从不同的终端设备收到了调制了相同序列的前导码,网络设备无法识别多个前导码来自不同的终端设备,此时,网络设备可能将多个终端设备发送的多个前导码作为一个终端设备发送的前导码进行解调。In some implementations, each of the 16 sequences may correspond to an index so that the network device can demodulate preambles carrying different sequences. If the network device receives preambles modulated with the same sequence from different terminal devices, the network device cannot identify that the multiple preambles come from different terminal devices. At this time, the network device may demodulate the multiple preambles sent by the multiple terminal devices as a preamble sent by one terminal device.
在步骤S1530中,网络设备向第一终端设备发送Msg2。In step S1530, the network device sends Msg2 to the first terminal device.
在一些实现方式中,Msg2可以包括以下一种或多种:网络设备接收并正确解调的前导码的索引,以及发送前导码的时域资源的索引,发送前导码的信道的索引,用于上行同步的时间提前(timing advance,TA)值。In some implementations, Msg2 may include one or more of the following: an index of a preamble code received and correctly demodulated by the network device, an index of a time domain resource for sending the preamble code, an index of a channel for sending the preamble code, and a timing advance (TA) value for uplink synchronization.
在一些实现方式中,由于网络设备的覆盖范围可能较大(例如,覆盖范围超过500米),则Msg2可以包括TA值,以便网络设备与终端设备之间进行时间同步。In some implementations, since the coverage range of the network device may be large (for example, the coverage range exceeds 500 meters), Msg2 may include a TA value to facilitate time synchronization between the network device and the terminal device.
在一些实现方式中,Msg2可以包括用于确定第二时域资源的资源配置参数,其中,第二时域资源可以用于发送Msg3。应理解,第二时域资源的确定方式可以参见图9所示,为了简洁,在此不再赘述。当然,在本申请实施例中,Msg2还可以包括用于传输Msg3的频域资源。In some implementations, Msg2 may include resource configuration parameters for determining a second time domain resource, wherein the second time domain resource may be used to send Msg3. It should be understood that the determination method of the second time domain resource can be shown in FIG9, and for the sake of brevity, it is not repeated here. Of course, in the embodiment of the present application, Msg2 may also include a frequency domain resource for transmitting Msg3.
在一些实现方式中,Msg2可以包括用于指示第一终端设备基于退避机制接入网络的信息;用于第一终端设备基于退避机制接入网络的参数(例如,第一终端设备尝试接入目标设备的最大次数)。In some implementations, Msg2 may include information for instructing the first terminal device to access the network based on the backoff mechanism; parameters for the first terminal device to access the network based on the backoff mechanism (e.g., the maximum number of times the first terminal device attempts to access the target device).
在一些场景中,网络设备可能会成功接收并解调多个前导码,此时,Msg2中包括多个前导码的索引,此时,多个前导码的索引中都可以对应一组上述参数:网络设备接收并正确解调的前导码的索引,以及发送前导码的时域资源的索引,发送前导码的信道的索引,用于上行同步的TA值;用于确定第二时域资源的资源配置参数;用于传输Msg3的频域资源;用于指示第一终端设备基于退避机制接入网络的信息;用于第一终端设备基于退避机制接入网络的参数。In some scenarios, the network device may successfully receive and demodulate multiple preamble codes. In this case, Msg2 includes indexes of multiple preamble codes. In this case, the indexes of multiple preamble codes can correspond to a set of the above parameters: the index of the preamble code received and correctly demodulated by the network device, as well as the index of the time domain resource for sending the preamble code, the index of the channel for sending the preamble code, and the TA value for uplink synchronization; resource configuration parameters for determining the second time domain resources; frequency domain resources for transmitting Msg3; information for indicating that the first terminal device accesses the network based on the backoff mechanism; and parameters for the first terminal device to access the network based on the backoff mechanism.
在步骤S1540中,若Msg2中携带的前导码的索引包括前导码1的索引,第一终端设备向网络设备发送Msg3。In step S1540, if the index of the preamble code carried in Msg2 includes the index of preamble code 1, the first terminal device sends Msg3 to the network device.
在一些实现方式中,第一终端设备发送Msg3的传输资源可以基于Msg2确定,或者说,第一终端设备在Msg2指示的传输资源上发送Msg3。In some implementations, the transmission resources for sending Msg3 by the first terminal device may be determined based on Msg2, or in other words, the first terminal device sends Msg3 on the transmission resources indicated by Msg2.
在一些实现方式中,Msg3中包含第一终端设备的终端设备标识,其中,终端设备标识为第一终端设备产生的随机数。In some implementations, Msg3 includes a terminal device identifier of the first terminal device, wherein the terminal device identifier is a random number generated by the first terminal device.
在一些实现方式中,第一终端设备接收到Msg2后,确定Msg2中携带的前导码的索引是否包括前导码1的索引。若Msg2中携带的前导码的索引包括前导码1的索引,说明第一终端设备发送的前导码1被网络设备接收并正确解调,则第一终端设备向网络设备发送Msg3。In some implementations, after receiving Msg2, the first terminal device determines whether the index of the preamble code carried in Msg2 includes the index of preamble code 1. If the index of the preamble code carried in Msg2 includes the index of preamble code 1, it means that the preamble code 1 sent by the first terminal device is received and correctly demodulated by the network device, and the first terminal device sends Msg3 to the network device.
若Msg2中携带的前导码的索引不包括前导码1的索引,说明第一终端设备发送的前导码1未被网络设备接收并正确解调,则第一终端设备可以认为随机接入失败。If the index of the preamble code carried in Msg2 does not include the index of the preamble code 1, it means that the preamble code 1 sent by the first terminal device is not received and correctly demodulated by the network device, then the first terminal device may consider that the random access has failed.
在步骤S1550中,响应于网络设备接收终端设备标识,网络设备发送Msg4。In step S1550, in response to the network device receiving the terminal device identification, the network device sends Msg4.
在一些实现方式中,Msg4包括网络设备接收的终端设备标识,以及与该终端设备标识对应的第一RNTI。In some implementations, Msg4 includes a terminal device identifier received by the network device and a first RNTI corresponding to the terminal device identifier.
在一些实现方式中,若Msg4中携带的终端设备标识包含第一终端设备的终端设备标识,则第一终端设备可以认为随机接入成功,之后,第一终端设备可以将第一RNTI作为自己的标识,并基于第一RNTI与网络设备通信。若Msg4中携带的终端设备标识不包含第一终端设备的终端设备标识,则第一终端设备可以认为随机接入失败。In some implementations, if the terminal device identifier carried in Msg4 includes the terminal device identifier of the first terminal device, the first terminal device may consider that the random access is successful, and then the first terminal device may use the first RNTI as its own identifier and communicate with the network device based on the first RNTI. If the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device may consider that the random access has failed.
在步骤S1560中,若Msg4中携带的终端设备标识不包含第一终端设备的终端设备标识,则第一终端设备认为随机接入失败。In step S1560, if the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device, the first terminal device considers that the random access has failed.
在步骤S1570中,若当前第一终端设备尝试接入目标设备的次数未到达最大次数,则第一终端设备可以继续尝试接入目标设备,即重新执行步骤S1510至步骤S1550。In step S1570, if the number of times the current first terminal device attempts to access the target device has not reached the maximum number, the first terminal device may continue to attempt to access the target device, that is, re-execute steps S1510 to S1550.
在一些实现方式中,若重新执行步骤S1510至步骤S1550,第一终端设备传输前导码以及第四信息的传输资源可以由第一终端设备自主选择。In some implementations, if steps S1510 to S1550 are re-executed, the transmission resources for the first terminal device to transmit the preamble code and the fourth information can be independently selected by the first terminal device.
在一些实现方式中,若重新执行步骤S1510至步骤S1550为第一终端设备第N次尝试接入目标设备,并且Msg0中携带了用于调整发射功率的参数,例如,功率步长ΔP以及初始发射功率P,则第一终端设备第N次尝试接入目标设备时使用的发射功率可以为PN,则PN可以通过以下公式确定:PN=P+ N×ΔP。In some implementations, if re-execution of steps S1510 to S1550 is the Nth attempt of the first terminal device to access the target device, and Msg0 carries parameters for adjusting the transmit power, for example, the power step ΔP and the initial transmit power P, then the transmit power used by the first terminal device when attempting to access the target device for the Nth time may be PN , and PN may be determined by the following formula: PN = P+ N×ΔP.
需要说明是,发射功率PN可以在第一终端设备第N次尝试接入目标设备的过程中,用于发射前导码和/或Msg3。It should be noted that the transmission power PN can be used to transmit the preamble code and/or Msg3 during the Nth attempt of the first terminal device to access the target device.
需要说明的是,上文以Msg4中携带的终端设备标识不包含第一终端设备的终端设备标识为例,介绍了第一终端设备重新尝试接入目标设备的方案。在一些场景中,在步骤1540中若Msg2中携带的前导码的索引不包括前导码1的索引,第一终端设备尝试接入目标设备失败后,也会重新尝试接入目标设备,此时,第一终端设备重新尝试接入目标设备的方式与步骤S1570中介绍的方案类似,具体可以参见上文的介绍,为了简洁不再赘述。It should be noted that the above text takes the case where the terminal device identifier carried in Msg4 does not include the terminal device identifier of the first terminal device as an example to introduce a solution in which the first terminal device retries to access the target device. In some scenarios, if the index of the preamble code carried in Msg2 does not include the index of preamble code 1 in step 1540, the first terminal device will also retry to access the target device after failing to access the target device. At this time, the way in which the first terminal device retries to access the target device is similar to the solution introduced in step S1570. For details, please refer to the above introduction, which will not be repeated for the sake of brevity.
在本申请实施例中,对时域资源不作限定。例如,时域资源可以为时隙、子帧、mini-子帧、符号等。当然,在本申请实施例中,时域资源还可以是未来通信系统中新引入的其他时域资源。In the embodiment of the present application, the time domain resources are not limited. For example, the time domain resources may be time slots, subframes, mini-subframes, symbols, etc. Of course, in the embodiment of the present application, the time domain resources may also be other time domain resources newly introduced in future communication systems.
另外,在本申请实施例中,“接入网络”、“接入网络设备”、“接入目标设备”以及“随机接入”等术语可以相互替换。In addition, in the embodiments of the present application, terms such as "access network", "access network device", "access target device" and "random access" can be used interchangeably.
上文结合图1至图15,详细描述了本申请的方法实施例,下面结合图16至图18,详细描述本申请的装置实施例。应理解,方法实施例的描述与装置实施例的描述相互对应,因此,未详细描述的部分可以参见前面方法实施例。The method embodiment of the present application is described in detail above in conjunction with Figures 1 to 15, and the device embodiment of the present application is described in detail below in conjunction with Figures 16 to 18. It should be understood that the description of the method embodiment corresponds to the description of the device embodiment, so the part not described in detail can refer to the previous method embodiment.
图16是本申请实施例的终端设备的示意图。图16所述终端设备1600为第一终端设备,包括:发送单元1610以及接收单元1620。Fig. 16 is a schematic diagram of a terminal device according to an embodiment of the present application. The terminal device 1600 shown in Fig. 16 is a first terminal device, including: a sending unit 1610 and a receiving unit 1620.
发送单元1610,用于向目标设备发送前导码;The sending unit 1610 is used to send a preamble code to a target device;
接收单元1620,用于接收所述目标设备发送的第一索引,所述第一索引用于指示目标设备接收的前导码;The receiving unit 1620 is configured to receive a first index sent by the target device, where the first index is used to indicate a preamble received by the target device;
所述发送单元1610,用于响应于所述第一索引与所述前导码的索引相同,向所述目标设备发送第一终端设备标识;The sending unit 1610 is configured to send a first terminal device identifier to the target device in response to the first index being the same as the index of the preamble;
所述接收单元1620,用于接收所述目标设备发送的第一信息,所述第一信息包括所述目标设备接收的终端设备标识;其中,所述目标设备包括网络设备和/或第二终端设备。The receiving unit 1620 is used to receive first information sent by the target device, where the first information includes a terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
在一些实现方式中,所述终端设备包括:第一处理单元,用于在所述第一信息中的终端设备标识与所述第一终端设备标识匹配的情况下,确认冲突解决成功;和/或第二处理单元,用于在所述第一信息中的终端设备标识与所述第一终端设备标识不匹配的情况下,确认冲突解决失败。In some implementations, the terminal device includes: a first processing unit, used to confirm that the conflict resolution is successful when the terminal device identifier in the first information matches the first terminal device identifier; and/or a second processing unit, used to confirm that the conflict resolution fails when the terminal device identifier in the first information does not match the first terminal device identifier.
在一些实现方式中,所述第一信息还包括与所述终端设备标识关联的第一无线网临时标识RNTI。In some implementations, the first information also includes a first radio network temporary identifier RNTI associated with the terminal device identifier.
在一些实现方式中,所述接收单元,还用于接收所述目标设备发送的配置信息,所述配置信息用于为所述第一终端设备配置所述第一RNTI的长度。In some implementations, the receiving unit is further used to receive configuration information sent by the target device, where the configuration information is used to configure the length of the first RNTI for the first terminal device.
在一些实现方式中,所述终端设备还包括:In some implementations, the terminal device further includes:
第三处理单元,用于在所述第一终端设备确认冲突解决成功的情况下,保留与所述第一终端设备标识关联的第一RNTI。The third processing unit is used to retain the first RNTI associated with the first terminal device identifier when the first terminal device confirms that the conflict is successfully resolved.
在一些实现方式中,所述第一终端设备标识是所述第一终端设备生成的。In some implementations, the first terminal device identifier is generated by the first terminal device.
在一些实现方式中,所述接收单元,还用于接收所述目标设备发送的第二信息,所述第二信息用于指示所述第一终端设备发送所述前导码,所述第二信息为非周期性发送的信息,或者,所述第二信息为周期性发送的信息。In some implementations, the receiving unit is further used to receive second information sent by the target device, where the second information is used to instruct the first terminal device to send the preamble code, and the second information is information that is sent non-periodically, or the second information is information that is sent periodically.
在一些实现方式中,发送所述前导码的第一时域资源是基于参考时域资源确定的,所述参考时域资源用于接收所述第二信息。In some implementations, the first time domain resource for sending the preamble is determined based on a reference time domain resource, and the reference time domain resource is used to receive the second information.
在一些实现方式中,所述第一时域资源是基于所述参考时域资源以及资源配置参数确定的,所述资源配置参数用于指示以下一种或多种:所述参考时域资源与所述第一时域资源之间的时域偏移;多个时域资源中每个时域资源对应的时长,所述多个时域资源包括所述第一时域资源;所述多个时域资源中在时域上相邻的两个时域资源之间的时间间隔;所述多个时域资源的时域资源的个数。In some implementations, the first time domain resource is determined based on the reference time domain resource and a resource configuration parameter, and the resource configuration parameter is used to indicate one or more of the following: a time domain offset between the reference time domain resource and the first time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources, the plurality of time domain resources including the first time domain resource; a time interval between two time domain resources that are adjacent in time domain in the plurality of time domain resources; and the number of time domain resources in the plurality of time domain resources.
在一些实现方式中,所述资源配置参数承载于所述第二信息。In some implementations, the resource configuration parameter is carried in the second information.
在一些实现方式中,所述第二信息包括功率调整参数,所述功率调整参数用于调整所述前导码的发射功率和/或所述第一终端设备标识的发射功率。In some implementations, the second information includes a power adjustment parameter, and the power adjustment parameter is used to adjust the transmission power of the preamble code and/or the transmission power of the first terminal device identifier.
在一些实现方式中,发送所述第一终端设备标识的时域资源是所述第一终端设备随机选择的。In some implementations, the time domain resource for sending the first terminal device identifier is randomly selected by the first terminal device.
在一些实现方式中,所述第一索引承载于第三信息,所述第三信息包括以下一种或多种:用于指示所述第一终端设备基于退避机制接入网络的信息;用于所述第一终端设备基于所述退避机制接入网络的参数;用于指示发送所述第一终端设备标识的第二时域资源的信息。In some implementations, the first index is carried in third information, and the third information includes one or more of the following: information used to indicate that the first terminal device accesses the network based on the backoff mechanism; parameters used for the first terminal device to access the network based on the backoff mechanism; information used to indicate a second time domain resource for sending the first terminal device identifier.
在一些实现方式中,若所述第三信息包括所述参数,所述参数用于指示所述第一终端设备尝试接入所述目标设备的最大次数;和/或所述第一终端设备再次尝试接入所述目标设备的退避时间信息。 In some implementations, if the third information includes the parameter, the parameter is used to indicate the maximum number of times the first terminal device attempts to access the target device; and/or backoff time information for the first terminal device to attempt to access the target device again.
在一些实现方式中,若所述参数用于指示所述最大次数,所述接收单元,还用于在所述第一终端设备确认冲突解决失败,且所述第一终端设备尝试接入所述目标设备的次数小于所述最大次数的情况下,重新监听所述第二信息。In some implementations, if the parameter is used to indicate the maximum number of times, the receiving unit is further used to re-listen to the second information when the first terminal device confirms that the conflict resolution has failed and the number of times the first terminal device attempts to access the target device is less than the maximum number of times.
在一些实现方式中,若所述参数用于指示所述最大次数,所述终端设备还包括:第四处理单元,还用于在所述第一终端设备确认冲突解决失败,且所述第一终端设备尝试接入所述目标设备的次数大于或等于所述最大次数的情况下,确认接入所述目标设备失败。In some implementations, if the parameter is used to indicate the maximum number of times, the terminal device also includes: a fourth processing unit, which is also used to confirm that access to the target device has failed when the first terminal device confirms that the conflict resolution has failed and the number of times the first terminal device attempts to access the target device is greater than or equal to the maximum number of times.
在一些实现方式中,若所述参数用于指示所述退避时间信息,所述接收单元,用于在第一时刻重新监听所述第二信息,所述第一时刻为以所述第一终端设备确认冲突解决失败的时刻为起始时刻,经过所述退避时间信息所指示的时长之后的时刻。In some implementations, if the parameter is used to indicate the backoff time information, the receiving unit is used to re-listen to the second information at a first moment, where the first moment is a moment starting from the moment when the first terminal device confirms that the conflict resolution has failed and after the duration indicated by the backoff time information has passed.
在一些实现方式中,若所述第三信息用于指示发送所述终端设备标识的第二时域资源,所述第三信息包括以下一种或多种:用于指示所述第三信息的接收时间对应的时域资源与所述第二时域资源之间的时域偏移;多个时域资源中每个时域资源对应的时长,所述多个时域资源包括所述第二时域资源;所述多个时域资源中在时域上相邻的两个时域资源之间的时间间隔。In some implementations, if the third information is used to indicate a second time domain resource for sending the terminal device identifier, the third information includes one or more of the following: a time domain offset between a time domain resource corresponding to a reception time of the third information and the second time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources, the plurality of time domain resources including the second time domain resource; and a time interval between two time domain resources that are adjacent in time domain in the plurality of time domain resources.
在一些实现方式中,若所述第三信息承载多个索引,所述多个索引用于指示所述目标设备接收的多个前导码,所述多个索引包括所述第一索引,所述第三信息用于指示所述多个索引对应的多个前导码所在的时域资源的信息;和/或所述多个索引对应的多个前导码所在的信道的信息。In some implementations, if the third information carries multiple indexes, the multiple indexes are used to indicate multiple preamble codes received by the target device, the multiple indexes include the first index, and the third information is used to indicate information about time domain resources where the multiple preamble codes corresponding to the multiple indexes are located; and/or information about channels where the multiple preamble codes corresponding to the multiple indexes are located.
在一些实现方式中,所述多个前导码所在的时域资源的信息包括所述多个前导码所在的时域资源的索引,所述多个前导码所在的时域资源的索引以时域从早到晚的顺序增大。In some implementations, the information of the time domain resources where the multiple preamble codes are located includes indexes of the time domain resources where the multiple preamble codes are located, and the indexes of the time domain resources where the multiple preamble codes are located increase in order from early to late in the time domain.
在一些实现方式中,所述多个前导码是由多个终端设备发送的,所述多个前导码所在的时域资源与所述多个终端设备发送多个终端设备标识所在的时域资源一一对应。In some implementations, the multiple preamble codes are sent by multiple terminal devices, and the time domain resources where the multiple preamble codes are located correspond one-to-one to the time domain resources where the multiple terminal devices send multiple terminal device identifiers.
在一些实现方式中,所述多个终端设备在多个时域资源上发送前导码的顺序,与所述多个终端设备在多个时域资源上发送终端设备标识的顺序相同。In some implementations, the order in which the multiple terminal devices send preamble codes on the multiple time domain resources is the same as the order in which the multiple terminal devices send terminal device identifications on the multiple time domain resources.
在一些实现方式中,发送所述第三信息信道为广播信道。In some implementations, the third information channel is a broadcast channel.
在一些实现方式中,所述第一终端设备在第一时间段内接收所述第三信息,所述第一时间段的起始位置基于所述前导码的发送时间确定。In some implementations, the first terminal device receives the third information within a first time period, and a starting position of the first time period is determined based on a sending time of the preamble code.
在一些实现方式中,所述第一时间段的起始位置为所述前导码的发送时间,或所述第一时间段的起始位置与所述前导码的发送时间之间间隔第一时间间隔。In some implementations, the starting position of the first time period is the sending time of the preamble code, or the starting position of the first time period is separated from the sending time of the preamble code by a first time interval.
在一些实现方式中,所述终端设备还包括:若在所述第一时间段内未接收到所述第三信息,所述第五处理单元用于确认冲突解决失败。In some implementations, the terminal device further includes: if the third information is not received within the first time period, the fifth processing unit is used to confirm that the conflict resolution fails.
在一些实现方式中,所述第一终端设备在第二时间段内接收所述第一信息,所述第二时间段的起始位置基于所述第一终端设备标识的发送时间确定。In some implementations, the first terminal device receives the first information within a second time period, and a starting position of the second time period is determined based on a sending time of the first terminal device identifier.
在一些实现方式中,所述第二时间段的起始位置为所述第一终端设备标识的发送时间,或所述第二时间段的起始位置与所述第一终端设备标识的发送时间之间间隔第二时间间隔。In some implementations, the starting position of the second time period is the sending time of the first terminal device identifier, or the starting position of the second time period is separated from the sending time of the first terminal device identifier by a second time interval.
在一些实现方式中,所述终端设备还包括:若在所述第二时间段内未接收到所述第一信息,第六处理单元用于确认冲突解决失败。In some implementations, the terminal device further includes: if the first information is not received within the second time period, a sixth processing unit is used to confirm that the conflict resolution fails.
在一些实现方式中,发送所述前导码的信道与发送所述第一终端设备标识的信道相同。In some implementations, the channel for sending the preamble code is the same as the channel for sending the first terminal device identifier.
图17是本申请实施例的通信设备的示意图。图17所示的通信设备1700为目标设备,通信设备1700包括:接收单元1710以及发送单元1720。Fig. 17 is a schematic diagram of a communication device according to an embodiment of the present application. The communication device 1700 shown in Fig. 17 is a target device, and the communication device 1700 includes: a receiving unit 1710 and a sending unit 1720.
接收单元1710,用于接收第一终端设备发送的前导码;The receiving unit 1710 is configured to receive a preamble sent by a first terminal device;
发送单元1720,用于向所述第一终端设备发送第一索引,所述第一索引用于指示目标设备接收的前导码;A sending unit 1720 is configured to send a first index to the first terminal device, where the first index is used to indicate a preamble received by a target device;
所述接收单元1710,用于接收所述终端设备发送的终端设备标识;The receiving unit 1710 is configured to receive a terminal device identification sent by the terminal device;
所述发送单元1720,用于向所述终端设备发送第一信息,所述第一信息包括所述目标设备接收的终端设备标识;其中,所述目标设备包括网络设备和/或第二终端设备。The sending unit 1720 is used to send first information to the terminal device, where the first information includes a terminal device identifier received by the target device; wherein the target device includes a network device and/or a second terminal device.
在一些实现方式中,所述终端设备包括所述第一终端设备,且所述第一终端设备对应第一终端设备标识,若所述第一信息中的终端设备标识与所述第一终端设备标识匹配,则所述第一终端设备冲突解决成功;和/或若所述第一信息中的终端设备标识与所述第一终端设备标识不匹配,则所述第一终端设备冲突解决失败。In some implementations, the terminal device includes the first terminal device, and the first terminal device corresponds to a first terminal device identifier. If the terminal device identifier in the first information matches the first terminal device identifier, the conflict resolution of the first terminal device is successful; and/or if the terminal device identifier in the first information does not match the first terminal device identifier, the conflict resolution of the first terminal device fails.
在一些实现方式中,所述第一信息还包括与所述终端设备标识关联的第一无线网临时标识RNTI。In some implementations, the first information also includes a first radio network temporary identifier RNTI associated with the terminal device identifier.
在一些实现方式中,在所述第一终端设备冲突解决成功的情况下,所述目标设备基于所述第一RNTI与所述第一终端设备通信。In some implementations, when the conflict of the first terminal device is successfully resolved, the target device communicates with the first terminal device based on the first RNTI.
在一些实现方式中,所述发送单元,用于向所述第一终端设备发送配置信息,所述配置信息用于为 所述第一终端设备配置所述第一RNTI的长度。In some implementations, the sending unit is used to send configuration information to the first terminal device, and the configuration information is used to The first terminal device configures the length of the first RNTI.
在一些实现方式中,所述第一终端设备对应第一终端设备标识,所述第一终端设备标识是所述第一终端设备生成的。In some implementations, the first terminal device corresponds to a first terminal device identifier, and the first terminal device identifier is generated by the first terminal device.
在一些实现方式中,所述发送单元,用于向所述第一终端设备发送第二信息,所述第二信息用于指示所述第一终端设备发送所述前导码,所述第二信息为非周期性发送的信息,或所述第二信息为周期性发送的信息。In some implementations, the sending unit is used to send second information to the first terminal device, where the second information is used to instruct the first terminal device to send the preamble code, and the second information is information that is sent non-periodically, or the second information is information that is sent periodically.
在一些实现方式中,发送所述前导码的第一时域资源是基于参考时域资源确定的,所述参考时域资源用于接收所述第二信息。In some implementations, the first time domain resource for sending the preamble is determined based on a reference time domain resource, and the reference time domain resource is used to receive the second information.
在一些实现方式中,所述第一时域资源是基于所述参考时域资源以及资源配置参数确定的,所述资源配置参数用于指示以下一种或多种:所述参考时域资源与所述第一时域资源之间的时域偏移;多个时域资源中每个时域资源对应的时长,所述多个时域资源包括所述第一时域资源;所述多个时域资源中在时域上相邻的两个时域资源之间的时间间隔;所述多个时域资源的时域资源的个数。In some implementations, the first time domain resource is determined based on the reference time domain resource and a resource configuration parameter, and the resource configuration parameter is used to indicate one or more of the following: a time domain offset between the reference time domain resource and the first time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources, the plurality of time domain resources including the first time domain resource; a time interval between two time domain resources that are adjacent in time domain in the plurality of time domain resources; and the number of time domain resources in the plurality of time domain resources.
在一些实现方式中,所述资源配置参数承载于所述第二信息。In some implementations, the resource configuration parameter is carried in the second information.
在一些实现方式中,所述第二信息包括功率调整参数,所述功率调整参数用于调整所述前导码的发射功率和/或所述终端设备标识的发射功率,所述终端设备标识对应的终端设备包括所述第一终端设备。In some implementations, the second information includes a power adjustment parameter, and the power adjustment parameter is used to adjust the transmission power of the preamble code and/or the transmission power of the terminal device identifier, and the terminal device corresponding to the terminal device identifier includes the first terminal device.
在一些实现方式中,发送所述第一终端设备标识的时域资源是所述第一终端设备随机选择的。In some implementations, the time domain resource for sending the first terminal device identifier is randomly selected by the first terminal device.
在一些实现方式中,所述第一索引承载于第三信息,所述第三信息包括以下一种或多种:用于指示所述终端设备基于退避机制接入所述目标设备的信息;用于所述终端设备基于所述退避机制接入所述目标设备的参数;用于指示所述终端设备发送所述终端设备对应的终端设备标识的第二时域资源的信息。In some implementations, the first index is carried in third information, and the third information includes one or more of the following: information used to instruct the terminal device to access the target device based on a backoff mechanism; parameters used for the terminal device to access the target device based on the backoff mechanism; and information used to instruct the terminal device to send a second time domain resource corresponding to the terminal device identifier.
在一些实现方式中,若所述第三信息包括所述参数,所述参数用于指示所述终端设备尝试接入所述目标设备的最大次数;和/或所述终端设备再次尝试接入所述目标设备的退避时间信息。In some implementations, if the third information includes the parameter, the parameter is used to indicate the maximum number of times the terminal device attempts to access the target device; and/or backoff time information for the terminal device to attempt to access the target device again.
在一些实现方式中,若所述参数用于指示所述最大次数,则在所述第一终端设备冲突解决失败,且所述第一终端设备尝试接入所述目标设备的次数大于或等于所述最大次数的情况下,所述第一终端设备接入所述目标设备失败。In some implementations, if the parameter is used to indicate the maximum number of times, then when the first terminal device fails to resolve the conflict and the number of times the first terminal device attempts to access the target device is greater than or equal to the maximum number of times, the first terminal device fails to access the target device.
在一些实现方式中,若所述参数用于指示所述退避时间信息,则第一时刻为所述第一终端设备重新监听所述第二信息的时刻,所述第一时刻为以所述第一终端设备冲突解决失败的时刻为起始时刻,经过所述退避时间信息所指示的时长之后的时刻。In some implementations, if the parameter is used to indicate the backoff time information, the first moment is the moment when the first terminal device listens to the second information again, and the first moment is the moment after the time indicated by the backoff time information, starting from the moment when the conflict resolution of the first terminal device fails.
在一些实现方式中,若所述第三信息用于指示发送所述终端设备标识的第二时域资源,所述第三信息包括以下一种或多种:用于指示所述第三信息的接收时间对应的时域资源与所述第二时域资源之间的时域偏移;多个时域资源中每个时域资源对应的时长,所述多个时域资源包括所述第二时域资源;所述多个时域资源中在时域上相邻的两个时域资源之间的时间间隔。In some implementations, if the third information is used to indicate a second time domain resource for sending the terminal device identifier, the third information includes one or more of the following: a time domain offset between a time domain resource corresponding to a reception time of the third information and the second time domain resource; a duration corresponding to each time domain resource in a plurality of time domain resources, the plurality of time domain resources including the second time domain resource; and a time interval between two time domain resources that are adjacent in time domain in the plurality of time domain resources.
在一些实现方式中,若所述第三信息承载多个索引,所述多个索引用于指示所述目标设备接收的多个前导码,所述多个索引包括所述第一索引,所述第三信息用于指示所述多个索引对应的多个前导码所在的时域资源的信息;和/或所述多个索引对应的多个前导码所在的信道的信息。In some implementations, if the third information carries multiple indexes, the multiple indexes are used to indicate multiple preamble codes received by the target device, the multiple indexes include the first index, and the third information is used to indicate information about time domain resources where the multiple preamble codes corresponding to the multiple indexes are located; and/or information about channels where the multiple preamble codes corresponding to the multiple indexes are located.
在一些实现方式中,所述多个前导码所在的时域资源的信息包括所述多个前导码所在的时域资源的索引,所述多个前导码所在的时域资源的索引以时域从早到晚的顺序增大。In some implementations, the information of the time domain resources where the multiple preamble codes are located includes indexes of the time domain resources where the multiple preamble codes are located, and the indexes of the time domain resources where the multiple preamble codes are located increase in order from early to late in the time domain.
在一些实现方式中,所述多个前导码是由多个终端设备发送的,所述多个前导码所在的时域资源与所述多个终端设备发送多个终端设备标识所在的时域资源一一对应。In some implementations, the multiple preamble codes are sent by multiple terminal devices, and the time domain resources where the multiple preamble codes are located correspond one-to-one to the time domain resources where the multiple terminal devices send multiple terminal device identifiers.
在一些实现方式中,所述多个终端设备在多个时域资源上发送前导码的顺序,与所述多个终端设备在多个时域资源上发送终端设备标识的顺序相同。In some implementations, the order in which the multiple terminal devices send preamble codes on the multiple time domain resources is the same as the order in which the multiple terminal devices send terminal device identifications on the multiple time domain resources.
在一些实现方式中,发送所述第三信息信道为广播信道。In some implementations, the third information channel is a broadcast channel.
在一些实现方式中,所述第一终端设备在第一时间段内接收所述第三信息,所述第一时间段的起始位置基于所述前导码的发送时间确定。In some implementations, the first terminal device receives the third information within a first time period, and a starting position of the first time period is determined based on a sending time of the preamble code.
在一些实现方式中,所述第一时间段的起始位置为所述前导码的发送时间,或所述第一时间段的起始位置与所述前导码的发送时间之间间隔第一时间间隔。In some implementations, the starting position of the first time period is the sending time of the preamble code, or the starting position of the first time period is separated from the sending time of the preamble code by a first time interval.
在一些实现方式中,在所述第一时间段内未接收到所述第三信息的情况下,所述第一终端设备冲突解决失败。In some implementations, when the third information is not received within the first time period, conflict resolution of the first terminal device fails.
在一些实现方式中,所述终端设备为所述第一终端设备,所述第一终端设备对应第一终端设备标识,所述第一终端设备在第二时间段内接收所述第一信息,所述第二时间段的起始位置基于所述第一终端设备标识的发送时间确定。In some implementations, the terminal device is the first terminal device, the first terminal device corresponds to a first terminal device identifier, the first terminal device receives the first information within a second time period, and the starting position of the second time period is determined based on the sending time of the first terminal device identifier.
在一些实现方式中,所述第二时间段的起始位置为所述第一终端设备标识的发送时间,或所述第二 时间段的起始位置与所述第一终端设备标识的发送时间之间间隔第二时间间隔。In some implementations, the starting position of the second time period is the sending time of the first terminal device identifier, or the second The start position of the time period is separated from the sending time of the first terminal device identifier by a second time interval.
在一些实现方式中,若在所述第二时间段内未接收到所述第一信息,则所述第一终端设备冲突解决失败。In some implementations, if the first information is not received within the second time period, conflict resolution of the first terminal device fails.
在一些实现方式中,所述终端设备为所述第一终端设备,所述第一终端设备对应第一终端设备标识,发送所述前导码的信道与发送所述第一终端设备标识的信道相同。In some implementations, the terminal device is the first terminal device, the first terminal device corresponds to a first terminal device identifier, and a channel for sending the preamble code is the same as a channel for sending the first terminal device identifier.
在可选的实施例中,所述发送单元1610以及接收单元1620可以为收发器1830。终端设备1600还可以包括处理器1810和存储器1820,具体如图18所示。In an optional embodiment, the sending unit 1610 and the receiving unit 1620 may be a transceiver 1830. The terminal device 1600 may further include a processor 1810 and a memory 1820, as specifically shown in FIG. 18 .
在可选的实施例中,所述发送单元1710以及接收单元1720可以为收发器1830。通信设备1700还可以包括处理器1810和存储器1820,具体如图18所示。In an optional embodiment, the sending unit 1710 and the receiving unit 1720 may be a transceiver 1830. The communication device 1700 may further include a processor 1810 and a memory 1820, as specifically shown in FIG. 18 .
图18是本申请实施例的通信装置的示意性结构图。图18中的虚线表示该单元或模块为可选的。该装置1800可用于实现上述方法实施例中描述的方法。装置1800可以是芯片、终端设备或网络设备。FIG18 is a schematic structural diagram of a communication device according to an embodiment of the present application. The dotted lines in FIG18 indicate that the unit or module is optional. The device 1800 may be used to implement the method described in the above method embodiment. The device 1800 may be a chip, a terminal device, or a network device.
装置1800可以包括一个或多个处理器1810。该处理器1810可支持装置1800实现前文方法实施例所描述的方法。该处理器1810可以是通用处理器或者专用处理器。例如,该处理器可以为中央处理单元(central processing unit,CPU)。或者,该处理器还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。The device 1800 may include one or more processors 1810. The processor 1810 may support the device 1800 to implement the method described in the above method embodiment. The processor 1810 may be a general-purpose processor or a special-purpose processor. For example, the processor may be a central processing unit (CPU). Alternatively, the processor may also be other general-purpose processors, digital signal processors (DSP), application specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor or the processor may also be any conventional processor, etc.
装置1800还可以包括一个或多个存储器1820。存储器1820上存储有程序,该程序可以被处理器1810执行,使得处理器1810执行前文方法实施例所描述的方法。存储器1820可以独立于处理器1810也可以集成在处理器1810中。The apparatus 1800 may further include one or more memories 1820. The memory 1820 stores a program, which can be executed by the processor 1810, so that the processor 1810 executes the method described in the above method embodiment. The memory 1820 may be independent of the processor 1810 or integrated in the processor 1810.
装置1800还可以包括收发器1830。处理器1810可以通过收发器1830与其他设备或芯片进行通信。例如,处理器1810可以通过收发器1830与其他设备或芯片进行数据收发。The apparatus 1800 may further include a transceiver 1830. The processor 1810 may communicate with other devices or chips through the transceiver 1830. For example, the processor 1810 may transmit and receive data with other devices or chips through the transceiver 1830.
本申请实施例还提供一种计算机可读存储介质,用于存储程序。该计算机可读存储介质可应用于本申请实施例提供的终端或网络设备中,并且该程序使得计算机执行本申请各个实施例中的由终端或网络设备执行的方法。The present application also provides a computer-readable storage medium for storing a program. The computer-readable storage medium can be applied to a terminal or network device provided in the present application, and the program enables a computer to execute the method performed by the terminal or network device in each embodiment of the present application.
本申请实施例还提供一种计算机程序产品。该计算机程序产品包括程序。该计算机程序产品可应用于本申请实施例提供的终端或网络设备中,并且该程序使得计算机执行本申请各个实施例中的由终端或网络设备执行的方法。The embodiment of the present application also provides a computer program product. The computer program product includes a program. The computer program product can be applied to the terminal or network device provided in the embodiment of the present application, and the program enables the computer to execute the method performed by the terminal or network device in each embodiment of the present application.
本申请实施例还提供一种计算机程序。该计算机程序可应用于本申请实施例提供的终端或网络设备中,并且该计算机程序使得计算机执行本申请各个实施例中的由终端或网络设备执行的方法。The embodiment of the present application also provides a computer program. The computer program can be applied to the terminal or network device provided in the embodiment of the present application, and the computer program enables a computer to execute the method executed by the terminal or network device in each embodiment of the present application.
应理解,本申请中术语“系统”和“网络”可以被可互换使用。另外,本申请使用的术语仅用于对本申请的具体实施例进行解释,而非旨在限定本申请。本申请的说明书和权利要求书及所述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。It should be understood that the terms "system" and "network" in this application can be used interchangeably. In addition, the terms used in this application are only used to explain the specific embodiments of the present application, and are not intended to limit the present application. The terms "first", "second", "third" and "fourth" in the specification and claims of this application and the accompanying drawings are used to distinguish different objects, rather than to describe a specific order. In addition, the terms "including" and "having" and any of their variations are intended to cover non-exclusive inclusions.
在本申请的实施例中,提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。In the embodiments of the present application, the "indication" mentioned can be a direct indication, an indirect indication, or an indication of an association relationship. For example, A indicates B, which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association relationship between A and B.
在本申请实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。In the embodiment of the present application, "B corresponding to A" means that B is associated with A, and B can be determined according to A. However, it should be understood that determining B according to A does not mean determining B only according to A, and B can also be determined according to A and/or other information.
在本申请实施例中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。In the embodiments of the present application, the term "corresponding" may indicate that there is a direct or indirect correspondence between the two, or an association relationship between the two, or a relationship of indication and being indicated, configuration and being configured, etc.
本申请实施例中,“预定义”或“预配置”可以通过在设备(例如,包括终端设备和网络设备)中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请对于其具体的实现方式不做限定。比如预定义可以是指协议中定义的。In the embodiments of the present application, "pre-definition" or "pre-configuration" can be implemented by pre-saving corresponding codes, tables or other methods that can be used to indicate relevant information in a device (for example, including a terminal device and a network device), and the present application does not limit the specific implementation method. For example, pre-definition can refer to what is defined in the protocol.
本申请实施例中,所述“协议”可以指通信领域的标准协议,例如可以包括LTE协议、NR协议以及应用于未来的通信系统中的相关协议,本申请对此不做限定。In the embodiments of the present application, the “protocol” may refer to a standard protocol in the communication field, for example, it may include an LTE protocol, an NR protocol, and related protocols used in future communication systems, and the present application does not limit this.
本申请实施例中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。In the embodiments of the present application, the term "and/or" is only a description of the association relationship of the associated objects, indicating that there can be three relationships. For example, A and/or B can represent: A exists alone, A and B exist at the same time, and B exists alone. In addition, the character "/" in this article generally indicates that the associated objects before and after are in an "or" relationship.
在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。In various embodiments of the present application, the size of the serial numbers of the above-mentioned processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式 实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods can be implemented in other ways. Implementation. For example, the device embodiments described above are only schematic, for example, the division of the units is only a logical function division, and there may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够读取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,数字通用光盘(digital video disc,DVD))或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。In the above embodiments, it can be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented by software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the process or function described in the embodiment of the present application is generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device. The computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center. The computer-readable storage medium may be any available medium that can be read by a computer or a data storage device such as a server or data center that includes one or more available media integrated. The available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。 The above is only a specific implementation of the present application, but the protection scope of the present application is not limited thereto. Any person skilled in the art who is familiar with the present technical field can easily think of changes or substitutions within the technical scope disclosed in the present application, which should be included in the protection scope of the present application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.
Claims (125)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/136415 WO2025118135A1 (en) | 2023-12-05 | 2023-12-05 | Wireless communication method and communication device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/136415 WO2025118135A1 (en) | 2023-12-05 | 2023-12-05 | Wireless communication method and communication device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025118135A1 true WO2025118135A1 (en) | 2025-06-12 |
Family
ID=95981457
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2023/136415 Pending WO2025118135A1 (en) | 2023-12-05 | 2023-12-05 | Wireless communication method and communication device |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2025118135A1 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2022140450A1 (en) * | 2020-12-21 | 2022-06-30 | Ofinno, Llc | Scheduling random access response for reduced capability device |
| WO2022246588A1 (en) * | 2021-05-24 | 2022-12-01 | Oppo广东移动通信有限公司 | Wireless communication method, terminal device and network device |
| WO2023019438A1 (en) * | 2021-08-17 | 2023-02-23 | Oppo广东移动通信有限公司 | Communication method, and terminal, network device, medium, chip, product and program |
| CN116112134A (en) * | 2021-11-11 | 2023-05-12 | 维沃移动通信有限公司 | Random access method, device, terminal and network side equipment |
-
2023
- 2023-12-05 WO PCT/CN2023/136415 patent/WO2025118135A1/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2022140450A1 (en) * | 2020-12-21 | 2022-06-30 | Ofinno, Llc | Scheduling random access response for reduced capability device |
| WO2022246588A1 (en) * | 2021-05-24 | 2022-12-01 | Oppo广东移动通信有限公司 | Wireless communication method, terminal device and network device |
| WO2023019438A1 (en) * | 2021-08-17 | 2023-02-23 | Oppo广东移动通信有限公司 | Communication method, and terminal, network device, medium, chip, product and program |
| CN116112134A (en) * | 2021-11-11 | 2023-05-12 | 维沃移动通信有限公司 | Random access method, device, terminal and network side equipment |
Non-Patent Citations (1)
| Title |
|---|
| VIVO, GUANGDONG GENIUS: "Framework and Principles for Reduced Capability NR devices", 3GPP DRAFT; R1-2007671, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), 17 October 2020 (2020-10-17), XP051939833 * |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP4492887A1 (en) | Paging method and apparatus | |
| US11178703B2 (en) | Communication method and communications device | |
| CN114642044A (en) | Synchronization signal block indication method and communication device | |
| US20250212177A1 (en) | Wireless communication method, terminal, and network device | |
| WO2024082205A1 (en) | Techniques for triggering random access procedures at passive devices | |
| KR20220089705A (en) | Information instruction method and device | |
| US20240276466A1 (en) | Communication method and system, and related apparatus | |
| CN111885684B (en) | Communication method and device | |
| US12382502B2 (en) | Random access response method and apparatus | |
| US20250358866A1 (en) | Wireless communication method, terminal device, and network device | |
| CN113260089A (en) | Determination of active time using multiple discontinuous reception groups | |
| US20250219775A1 (en) | Systems and methods for performing ambient-internet-of-things (a-iot) based communications | |
| WO2025118135A1 (en) | Wireless communication method and communication device | |
| WO2023043344A1 (en) | Ultra lean random access for wireless devices | |
| US20240179750A1 (en) | Random access method and apparatus | |
| WO2025118137A1 (en) | Wireless communication method and communication device | |
| WO2025107313A1 (en) | Wireless communication method and communication device | |
| WO2025102253A1 (en) | Channel transmission method, apparatus, device and storage medium | |
| CN119586300A (en) | Wireless communication method and device | |
| WO2025118159A1 (en) | Method for processing signal, first device, and second device | |
| US20250240779A1 (en) | Reader-guided transmission and reception | |
| US20250348694A1 (en) | Ambient internet-of-things devices and methods of operation of same | |
| EP4618668A1 (en) | Communication method, system, and apparatus | |
| EP4304259A1 (en) | Communication method and apparatus | |
| EP4564918A1 (en) | Communication method and related apparatus |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23960450 Country of ref document: EP Kind code of ref document: A1 |