CN111867135B - Random access method, device and system - Google Patents
Random access method, device and system Download PDFInfo
- Publication number
- CN111867135B CN111867135B CN201910364173.4A CN201910364173A CN111867135B CN 111867135 B CN111867135 B CN 111867135B CN 201910364173 A CN201910364173 A CN 201910364173A CN 111867135 B CN111867135 B CN 111867135B
- Authority
- CN
- China
- Prior art keywords
- message
- value
- terminal device
- values
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 94
- 238000013475 authorization Methods 0.000 claims abstract description 17
- 238000004891 communication Methods 0.000 claims description 95
- 238000012545 processing Methods 0.000 claims description 52
- 238000013528 artificial neural network Methods 0.000 claims description 31
- 230000006870 function Effects 0.000 description 25
- 238000013461 design Methods 0.000 description 22
- 238000010586 diagram Methods 0.000 description 12
- 238000010295 mobile communication Methods 0.000 description 12
- 230000000694 effects Effects 0.000 description 8
- 230000007480 spreading Effects 0.000 description 7
- 238000004590 computer program Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000012549 training Methods 0.000 description 6
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000000977 initiatory effect Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 230000007774 longterm Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013527 convolutional neural network Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 101100533725 Mus musculus Smr3a gene Proteins 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000003321 amplification Effects 0.000 description 1
- 230000003416 augmentation Effects 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 210000000988 bone and bone Anatomy 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- GVVPGTZRZFNKDS-JXMROGBWSA-N geranyl diphosphate Chemical compound CC(C)=CCC\C(C)=C\CO[P@](O)(=O)OP(O)(O)=O GVVPGTZRZFNKDS-JXMROGBWSA-N 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the application provides a random access method, a device and a system. The access efficiency of the terminal equipment can be improved. Specifically, after receiving the plurality of first messages, the network device determines K TA values, and sends a second message, where the second message includes the K TA values, and a TC-RNTI and an uplink grant corresponding to each TA value of the K TA values, and K is a positive integer greater than 1. And the first terminal equipment receives the second message, determines a first TA value from the K TA values, and sends a third message including the identifier of the first terminal equipment to the network equipment on the resource indicated by the uplink authorization corresponding to the first TA value, wherein the third message is scrambled by adopting TC-RNTI corresponding to the first TA value. The network equipment receives a third message from the first terminal equipment on the resource indicated by the uplink authorization corresponding to the first TA value, and sends a fourth message including the access resource allocated by the network equipment, and a downlink data channel bearing the fourth message is scheduled by DCI which is scrambled by TC-RNTI corresponding to the first TA value.
Description
The present application is a divisional application, the original application having an application number of 201910364173.4 and a date of 2019, 04 and 30, the entire contents of which are incorporated herein by reference.
Technical Field
The present application relates to the field of communications, and in particular, to a random access method, apparatus, and system.
Background
At present, when a terminal device initiates random access, a preamble (preamble) needs to be sent to a network device. When different terminal devices access in a contention-based (contention-based) random access manner, there may be a case where a plurality of terminal devices transmit the same preamble to the network device through different messages 1 (message 1, msg 1).
In the prior art, after receiving different Msg1 including the same preamble sent by a plurality of terminal devices, a network device will detect only a Timing Advance (TA) corresponding to one of the terminal devices (usually, the terminal device with the strongest signal power). Further, the network device sends a message 2 (message 2, msg 2) (also called Random Access Response (RAR)) to the plurality of terminal devices, where the message 2 includes a TA of the detected one terminal device, a temporary cell radio network temporary identifier (TC-RNTI) for scrambling the message 3 (message 3, msg 3), and an uplink Grant (UL-Grant), where the UL-Grant indicates a resource for the plurality of terminal devices to send Msg3. After receiving the message 2, the plurality of terminal devices respectively perform TA adjustment according to the TA included in the message 2, and send Msg3 to the network device on the resource indicated by the UL-Grant, wherein the Msg3 includes the terminal identifier of the terminal device. Since the Msg3 sent by multiple terminal devices are transmitted on the same resource, after receiving the Msg3 sent by multiple terminal devices, the network device may demodulate the Msg3 sent by only one terminal device (usually, the terminal device with the strongest signal power). Further, the network device may send a message 4 (message 4, msg 4) to a plurality of terminal devices, where the Msg4 includes a Contention Resolution Identifier (CRID) (typically, the terminal identifier included in the demodulated Msg 3) and a corresponding access resource indication. After the multiple terminal devices receive the Msg4 and demodulate the Msg4, if the CRID included in the Msg4 is the same as the terminal identifier of the Msg4, the terminal devices successfully compete, and the terminal devices can continue to send signals on the access resource indicated by the Msg4 subsequently and establish Radio Resource Control (RRC) connection; if the CRID included in the Msg4 is different from the terminal identifier, the terminal device fails to compete, and needs to continue to wait for the next access opportunity to perform random access. In summary, currently, when different terminal devices access in a contention-based random access manner, at most one terminal device in a plurality of terminal devices that send the same preamble to a network device succeeds in contention.
However, in the fifth generation (5 g) system, there is a scenario where there are a large number of terminal devices in a single cell, such as large-scale machine communication (mtc), and the like, and the access performance of the terminal devices is obviously not guaranteed by the existing random access scheme.
Disclosure of Invention
The embodiment of the application provides a random access method, a random access device and a random access system, which can improve the access efficiency of terminal equipment.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, a random access method and a corresponding apparatus are provided. In the scheme, the network device receives a plurality of first messages and determines K TA values, wherein K is a positive integer greater than 1. And the network equipment sends a second message, wherein the second message comprises K TA values, and TC-RNTI and uplink authorization corresponding to each TA value in the K TA values. The network equipment receives a third message from the first terminal equipment on a resource indicated by the uplink authorization corresponding to the first TA value, the third message is scrambled by using TC-RNTI corresponding to the first TA value, the third message comprises an identifier of the terminal equipment and sends a fourth message to the first terminal equipment, the fourth message comprises access resources allocated by the network equipment, a downlink data channel bearing the fourth message is scheduled by Downlink Control Information (DCI), and the DCI is scrambled by using the TC-RNTI corresponding to the first TA value. Based on the scheme, after receiving the multiple first messages, the network device may determine multiple TA values, and the TC-RNTI and the uplink grant corresponding to each TA value, and send the TA values in the second message, so that after receiving the second message, the multiple terminal devices initiating random access using the same preamble may determine one TA value from the K TA values, and send the third message to the network device on the resource indicated by the uplink grant corresponding to the TA value. And because the resources indicated by the uplink grant corresponding to each TA value are different, the network device may demodulate the third message sent by each terminal device, and send a fourth message for each third message, where the fourth message includes an access resource, so that multiple terminal devices using the same preamble may continue to send signals on their corresponding access resources, and thus, compared with the contention-based random access scheme in the prior art, multiple terminal devices selecting the same preamble may access at the same time, thereby improving the access efficiency of the terminal devices.
In one possible design, the fourth message further includes a contention resolution identification, CRID, indicating a terminal device for which contention is successful. Because the CRID is included in the fourth message, when the plurality of terminal devices select the same TA value from the K TA values, one terminal device of the plurality of terminal devices selecting the same TA value can still be successfully accessed, and the access efficiency of the terminal device is improved.
In one possible design, the network device determining the K TA values includes: the network equipment inputs signals carrying a plurality of first messages into a first neural network to obtain the number of the terminal equipment using the first lead codes; and the network equipment inputs the number of the terminal equipment and the signals carrying the plurality of first messages into a second neural network to obtain K TA values.
In a second aspect, a random access method and a corresponding apparatus are provided. In the scheme, a first terminal device sends a first message to a network device, wherein the first message comprises a first lead code; the first terminal equipment receives a second message from the network equipment, wherein the second message comprises K TA values, and a temporary cell radio network temporary identifier TC-RNTI and an uplink authorization corresponding to each TA value in the K TA values, and K is a positive integer greater than 1; the first terminal equipment determines a first TA value from the K TA values; the first terminal equipment sends a third message to the network equipment on the resource indicated by the uplink authorization corresponding to the first TA value, wherein the third message is scrambled by adopting TC-RNTI corresponding to the first TA value, and the third message comprises the identifier of the first terminal equipment; and the first terminal equipment receives a fourth message from the network equipment according to the TC-RNTI corresponding to the first TA value, wherein the fourth message comprises the access resource allocated by the network equipment. The technical effects of the second aspect can be referred to the technical effects of the first aspect, and are not described herein again.
In one possible design, the determining, by the first terminal device, the first TA value from the K TA values includes: the first terminal equipment determines a reference TA value according to historical TA information of the first terminal equipment; and the first terminal equipment determines the TA value closest to the reference TA value in the K TA values as the first TA value.
In one possible design, the determining, by the first terminal device, the first TA value from the K TA values includes: the first terminal equipment randomly selects a TA value from the K TA values; the first terminal device determines the randomly selected one TA value as the first TA value.
In one possible design, the fourth message further includes: the first terminal device sends a confirmation ACK to the network device on the access resource included in the fourth message if the CRID corresponds to the identifier of the first terminal device; or, if the CRID does not correspond to the identifier of the first terminal device, the first terminal device terminates the random access or switches to the next random access. Because the CRID is included in the fourth message, when the plurality of terminal devices select the same TA value from the K TA values, one terminal device of the plurality of terminal devices selecting the same TA value can still be successfully accessed, and the access efficiency of the terminal device is improved.
In a third aspect, a random access method and a corresponding apparatus are provided. In the scheme, a network device receives a plurality of first messages, wherein each first message in the plurality of first messages comprises a first preamble; the network equipment determines a first TA value according to the first lead code and sends a second message, wherein the second message comprises the first TA value, a first temporary cell radio network temporary identifier TC-RNTI corresponding to the first TA value and a first uplink authorization; after the network device successfully demodulates the K third messages scrambled by using the first TC-RNTI on the resource indicated by the first uplink grant, each of the K third messages includes an identifier of a terminal device, and K is a positive integer greater than 1; the network equipment sends a fourth message, wherein the fourth message comprises K Contention Resolution Identifiers (CRIDs) and access resources corresponding to each CRID in the K CRIDs, each CRID corresponds to an identifier of the terminal equipment in one of the K third messages, a downlink data channel bearing the fourth message is scheduled by Downlink Control Information (DCI), and the DCI is scrambled by adopting the first TC-RNTI. Based on the scheme, after receiving the third message, the network device can successfully demodulate K third messages, respectively correspond the identifier of the terminal device included in each third message in the K third messages to one CRID, and send the K CRIDs and the access resource corresponding to each CRID in the fourth message, so that after receiving the fourth message, the terminal devices using the same preamble can determine one CRID according to the identifier of the terminal device, and continue to send signals on the access resource corresponding to the CRID.
In a possible design, the fourth message further includes a TA value corresponding to each CRID, where the TA value is used for TA adjustment by the terminal device corresponding to each CRID. Based on the scheme, because the TA value corresponding to each CRID in the fourth message is obtained by the network device according to the first message or the third message sent by the terminal device corresponding to the CRID, for the terminal device corresponding to each CRID, the TA after TA adjustment is performed by using the TA value corresponding to the CRID is more accurate, thereby improving the accuracy of TA adjustment.
In a possible design, the second message further includes indication information, where the indication information is used to indicate that there are multiple terminal devices transmitting a third message to a network device on the resource indicated by the first uplink grant. Based on the scheme, the terminal device can process and then send the third message in a non-orthogonal mode after receiving the indication information, so that the complexity of the network device in demodulating a plurality of third messages on the resource indicated by the first uplink authorization is reduced, and the performance of the network device in demodulating the third messages is improved.
In a possible design, the indication information is further used to indicate the number of terminal devices that send the third message to the network device on the resource indicated by the first uplink grant.
In a possible design, the indication information is specifically a value of the first TC-RNTI.
In a possible design, the location of the time-frequency resource that transmits the second message is used to indicate that there are multiple terminal devices transmitting the third message to the network device on the resource indicated by the first uplink grant. Based on the scheme, the terminal device can process the third message in a non-orthogonal mode according to the position of the time-frequency resource for receiving the second message and then send the third message, so that the complexity of the network device in demodulating a plurality of third messages on the resource indicated by the first uplink authorization is reduced, and the performance of the network device in demodulating the third message is improved.
In one possible design, the network device successfully demodulates, on the resource indicated by the first uplink grant, the K third messages scrambled by using the first TC-RNTI, including: the network device determines non-orthogonal parameters, including one or more of: a spreading sequence, an interleaving pattern, or a multidimensional constellation modulation codebook; the network device successfully demodulates the K third messages on the resource indicated by the first uplink grant according to the non-orthogonal parameter.
In a fourth aspect, a random access method and a corresponding apparatus are provided. In the scheme, a first terminal device sends a first message to a network device, wherein the first message comprises a first lead code; a first terminal device receives a second message from a network device, wherein the second message comprises a first TA value, a first temporary cell radio network temporary identifier TC-RNTI corresponding to the first TA value and a first uplink authorization; the first terminal equipment sends a third message to the network equipment on the resource indicated by the first uplink authorization, wherein the third message is scrambled by adopting the first TC-RNTI, and the third message comprises the identifier of the first terminal equipment; the first terminal device receives a fourth message from the network device according to the first TC-RNTI, where the fourth message includes K contention resolution identifiers CRIDs and an access resource corresponding to each CRID of the K CRIDs, where each CRID respectively corresponds to an identifier of the terminal device included in one of K third messages successfully demodulated by the network device, and K is a positive integer greater than 1. The technical effects of the fourth aspect can be referred to the technical effects of the second aspect, and are not described herein again.
In one possible design, the fourth message further includes a TA value corresponding to each CRID; the random access method provided by the application further comprises the following steps: and if the K CRIDs include a first CRID corresponding to the identifier of the first terminal equipment, the first terminal equipment performs TA adjustment according to a TA value corresponding to the first CRID. Based on the scheme, the first terminal device performs TA modulation according to the TA value corresponding to the CRID corresponding to the first terminal device, so that the TA adjustment accuracy of the first terminal device can be improved.
In a possible design, the second message further includes indication information, where the indication information is used to indicate that there are multiple terminal devices transmitting a third message to the network device on the resource indicated by the first uplink grant. Based on the scheme, the terminal device can process the third message in a non-orthogonal mode after receiving the indication information and then send the third message, so that the complexity of the network device in demodulating a plurality of third messages on the resource indicated by the first uplink authorization is reduced, and the performance of the network device in demodulating the third messages is improved.
In a possible design, the indication information is further used to indicate the number of terminal devices that send the third message to the network device on the resource indicated by the first uplink grant.
In one possible design, the indication information is specifically a value of the first TC-RNTI.
In a possible design, the location of the time-frequency resource that transmits the second message is used to indicate that there are multiple terminal devices transmitting a third message to the network device on the resource indicated by the first uplink grant. Based on the scheme, the terminal device can process the third message in a non-orthogonal mode according to the position of the time-frequency resource for receiving the second message and then send the third message, so that the complexity of the network device in demodulating a plurality of third messages on the resource indicated by the first uplink authorization is reduced, and the performance of the network device in demodulating the third messages is improved.
In a possible design, the sending, by the first terminal device, the third message to the network device on the resource indicated by the first uplink grant includes: the first terminal device sends a third message processed by a non-orthogonal processing mode to the network device on the resource indicated by the first uplink grant, where the non-orthogonal processing mode includes one or more of the following: spread spectrum with a spreading sequence, interleaved with an interleaving pattern, or modulated with a multidimensional constellation modulation codebook.
In a fifth aspect, a communications apparatus is provided for implementing the various methods described above. The communication device may be the network device of the first or third aspect, or a device including the network device; alternatively, the communication device may be the first terminal device in the second aspect or the fourth aspect, or a device including the first terminal device. The communication device includes corresponding modules, units, or means (means) for implementing the above methods, and the modules, units, or means may be implemented by hardware, software, or by hardware executing corresponding software. The hardware or software includes one or more modules or units corresponding to the above functions.
In a sixth aspect, a communication apparatus is provided, including: a processor and a memory; the memory is configured to store computer instructions that, when executed by the processor, cause the communication device to perform the method of any of the above aspects. The communication device may be the network apparatus of the first aspect or the third aspect, or a device including the network apparatus; alternatively, the communication device may be the first terminal device in the second aspect or the fourth aspect, or a device including the first terminal device.
In a seventh aspect, a communication apparatus is provided, including: a processor; the processor is configured to be coupled to the memory, and after reading the instructions in the memory, perform the method according to any one of the above aspects. The communication device may be the network apparatus of the first aspect or the third aspect, or a device including the network apparatus; alternatively, the communication device may be the first terminal device in the second aspect or the fourth aspect, or a device including the first terminal device.
In an eighth aspect, a computer-readable storage medium is provided, having stored therein instructions, which when run on a communication device, cause a computer to perform the method of any of the above aspects. The communication device may be the network apparatus of the first aspect or the third aspect, or a device including the network apparatus; alternatively, the communication device may be the first terminal device in the second aspect or the fourth aspect, or a device including the first terminal device.
In a ninth aspect, there is provided a computer program product comprising instructions which, when run on a communication device, causes a computer to perform the method of any of the above aspects. The communication device may be the network apparatus of the first aspect or the third aspect, or a device including the network apparatus; alternatively, the communication device may be the first terminal device in the second aspect or the fourth aspect, or a device including the first terminal device.
In a tenth aspect, there is provided a communication device (which may be a chip or a system of chips, for example) comprising a processor for implementing the functionality referred to in any of the above aspects. In one possible design, the communication device further includes a memory for storing necessary program instructions and data. When the communication device is a chip system, it may be constituted by a chip, or may include a chip and other discrete devices.
For technical effects brought by any one of the design manners in the fifth aspect to the tenth aspect, reference may be made to the technical effects brought by different design manners in the first aspect, the second aspect, the third aspect, or the third aspect, and no further description is given here.
In an eleventh aspect, there is provided a communication system comprising the first terminal device of the above aspect and the network device of the above aspect.
Drawings
Fig. 1 is a schematic structural diagram of a communication system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a terminal device and a network device provided in an embodiment of the present application;
fig. 3 is another schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a random access method according to an embodiment of the present application;
fig. 5 is a schematic diagram illustrating a method for determining a TA value according to an embodiment of the present application;
fig. 6 is a schematic diagram of a terminal device receiving a second message and sending a third message according to an embodiment of the present application;
fig. 7 is a schematic flowchart of another random access method according to an embodiment of the present application;
fig. 8 is a schematic diagram illustrating that a terminal device receives a fourth message according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of another network device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of another terminal device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Where in the description of the present application, "/" indicates a relationship where the objects associated before and after are an "or", unless otherwise stated, for example, a/B may indicate a or B; in the present application, "and/or" is only an association relationship describing an association object, and means that there may be three relationships, for example, a and/or B, and may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. Also, in the description of the present application, "a plurality" means two or more than two unless otherwise specified. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple. In addition, in order to facilitate clear description of technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as "first" and "second" are used to distinguish identical items or similar items with substantially identical functions and actions. Those skilled in the art will appreciate that the terms "first," "second," and the like do not denote any order or importance, but rather the terms "first," "second," and the like do not denote any order or importance.
The technical scheme of the embodiment of the application can be applied to various communication systems. For example: orthogonal Frequency Division Multiple Access (OFDMA), single carrier frequency division multiple access (SC-FDMA), and other systems. The term "system" may be used interchangeably with "network". The OFDMA system may implement wireless technologies such as evolved universal radio terrestrial access (E-UTRA), ultra Mobile Broadband (UMB), and the like. E-UTRA is an evolved version of the Universal Mobile Telecommunications System (UMTS). The third generation partnership project (3 rd generation partnership project,3 GPP) is using a new version of E-UTRA in Long Term Evolution (LTE) and various versions based on LTE evolution. The 5G communication system is a next-generation communication system under study. The 5G communication system includes a non-independent Network (NSA) 5G mobile communication system, an independent network (SA) 5G mobile communication system, or an NSA 5G mobile communication system and an SA 5G mobile communication system. In addition, the communication system can also be applied to future-oriented communication technologies, and the technical solutions provided by the embodiments of the present application are all applied. The above-mentioned communication system applicable to the present application is only an example, and the communication system applicable to the present application is not limited thereto, and is herein collectively described, and will not be described again.
As shown in fig. 1, a communication system 10 is provided in accordance with an embodiment of the present application. The communication system 10 includes a network device 30, and a plurality of terminal devices 20 connected to the network device 30. Alternatively, different terminal devices 20 may communicate with each other.
Taking the network device 30 shown in fig. 1 as an example to interact with multiple terminal devices 20, where the multiple terminal devices 20 include a first terminal device 20, in this embodiment of the present application, in a possible implementation manner, the first terminal device 20 sends a first message to the network device 30, where the first message includes a first preamble, and after receiving multiple first messages, the network device 30 determines K TA values in timing advance and sends a second message, where the second message includes K TA values, and a TC-RNTI and an uplink grant corresponding to each TA value in the K TA values, where K is a positive integer greater than 1. After receiving the second message from the network device 30, the first terminal device 20 determines the first TA value from the K TA values, and sends a third message to the network device 30 on the resource indicated by the uplink grant corresponding to the first TA value, where the third message is scrambled by using the TC-RNTI corresponding to the first TA value, and the third message includes the identifier of the terminal device. After receiving the third message from the first terminal device 20 on the resource indicated by the uplink grant corresponding to the first TA value, the network device 30 sends a fourth message to the first terminal device 20, where the fourth message includes an access resource allocated by the network device 30, a downlink data channel carrying the fourth message is scheduled by downlink control information DCI, and the DCI is scrambled by using TC-RNTI corresponding to the first TA value. The specific implementation of the scheme will be described in detail in the following method embodiments, and will not be described herein again. Based on this scheme, since the network device 30 can determine a plurality of TA values, and the TC-RNTI and the uplink grant corresponding to each TA value after receiving the plurality of first messages, and send the TA values in the second message, after receiving the second message, the plurality of terminal devices initiating random access using the same preamble can determine one TA value from the K TA values, and send the third message to the network device on the resource indicated by the uplink grant corresponding to the TA value. And because the resources indicated by the uplink grant corresponding to each TA value are different, the network device may demodulate the third message sent by each terminal device, and send a fourth message for each third message, where the fourth message includes an access resource, so that multiple terminal devices using the same preamble may continue to send signals on their corresponding access resources, and thus, compared with the contention-based random access scheme in the prior art, multiple terminal devices selecting the same preamble may access at the same time, thereby improving the access efficiency of the terminal devices.
Or, taking the network device 30 shown in fig. 1 as an example, where the plurality of terminal devices 20 include the first terminal device 20, in this embodiment of the application, in another possible implementation manner, the first terminal device 20 sends a first message to the network device 30, where the first message includes a first preamble, and after receiving the plurality of first messages, the network device 30 determines a first TA value according to the first preamble and sends a second message, where the second message includes a first TC-RNTI and a first uplink grant corresponding to the first TA value. After receiving the second message from the network device 30, the first terminal device 20 sends a third message to the network device 30 on the resource indicated by the first uplink grant, where the third message is scrambled by using the first TC-RNTI, and the third message includes the identifier of the first terminal device 20. After successfully demodulating, on the resource indicated by the first uplink grant, the K third messages scrambled by using the first TC-RNTI, the network device 30 sends a fourth message, where the fourth message includes K contention resolution criteria, CRIDs, and access resources corresponding to each CRID of the K CRIDs, where K is a positive integer greater than 1, each CRID corresponds to an identifier of a terminal device in one of the K third messages, a downlink data channel carrying the fourth message is scheduled by downlink control information DCI, and the DCI uses the first TC-RNTI. The specific implementation of the scheme will be described in detail in the following method embodiments, and will not be described herein again. Based on the scheme, after receiving the third message, the network device can successfully demodulate K third messages, respectively correspond the identifier of the terminal device included in each third message in the K third messages to one CRID, and send the K CRIDs and the access resource corresponding to each CRID in the fourth message, so that after receiving the fourth message, the terminal devices using the same preamble can determine one CRID according to the identifier of the terminal device, and continue to send signals on the access resource corresponding to the CRID.
Optionally, the network device 30 in this embodiment is a device that accesses the terminal device 20 to a wireless network, and may be an evolved Node B (eNB or eNodeB) in Long Term Evolution (LTE); or a base station in a 5G network or a Public Land Mobile Network (PLMN) for future evolution, a broadband network service gateway (BNG), a convergence switch or a non-third generation partnership project (3 rd generation partnership project,3 gpp) access device, and the like, which are not specifically limited in this embodiment of the present application. Optionally, the base station in the embodiment of the present application may include various forms of base stations, for example: macro base stations, micro base stations (also referred to as small stations), relay stations, access points, and the like, which are not specifically limited in this embodiment of the present application.
Optionally, the terminal device 20 in the embodiment of the present application may be a device for implementing a wireless communication function, such as a terminal or a chip that can be used in the terminal. The terminal may be a User Equipment (UE), an access terminal, a terminal unit, a terminal station, a mobile station, a distant station, a remote terminal, a mobile device, a wireless communication device, a terminal agent or a terminal device, etc. in a 5G network or a PLMN which is evolved in the future. The access terminal may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device or a wearable device, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in self driving (self), a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid (smart grid), a wireless terminal in transport security (transport security), a wireless terminal in city (smart), a wireless terminal in smart home (smart), etc. The terminal may be mobile or stationary.
Optionally, the network device 30 and the terminal device 20 in the embodiment of the present application may also be referred to as a communication apparatus, which may be a general device or a special device, and this is not particularly limited in the embodiment of the present application.
Optionally, as shown in fig. 2, a schematic structural diagram of the network device 30 and the terminal device 20 provided in the embodiment of the present application is shown.
The terminal device 20 includes at least one processor (exemplarily illustrated in fig. 2 by including one processor 201) and at least one transceiver (exemplarily illustrated in fig. 2 by including one transceiver 203). Optionally, the terminal device 20 may further include at least one memory (exemplarily illustrated in fig. 2 by including one memory 202), at least one output device (exemplarily illustrated in fig. 2 by including one output device 204), and at least one input device (exemplarily illustrated in fig. 2 by including one input device 205).
The processor 201, memory 202 and transceiver 203 are connected by a communication line. The communication link may include a path for transmitting information between the aforementioned components.
The processor 201 may be a general processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more ics for controlling the execution of programs in accordance with the present disclosure. In a specific implementation, the processor 201 may also include a plurality of CPUs, and the processor 201 may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor, as an embodiment. A processor herein may refer to one or more devices, circuits, or processing cores that process data (e.g., computer program instructions).
The memory 202 may be a device having a storage function. Such as, but not limited to, read-only memory (ROM) or other types of static memory devices that can store static information and instructions, random Access Memory (RAM) or other types of dynamic memory devices that can store information and instructions, electrically erasable programmable read-only memory (EEPROM), compact disk read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 202 may be separate and coupled to the processor 201 via a communication link. The memory 202 may also be integrated with the processor 201.
The memory 202 is used for storing computer-executable instructions for executing the scheme of the application, and is controlled by the processor 201 to execute. Specifically, the processor 201 is configured to execute computer-executable instructions stored in the memory 202, so as to implement the method of random access described in the embodiment of the present application. Optionally, the computer execution instruction in the embodiment of the present application may also be referred to as an application program code or a computer program code, which is not specifically limited in the embodiment of the present application.
The transceiver 203 may be any transceiver or other communication network, such as an ethernet, a Radio Access Network (RAN), or a Wireless Local Area Network (WLAN), for example. The transceiver 203 includes a transmitter (Tx) and a receiver (Rx).
The output device 204 is in communication with the processor 201 and may display information in a variety of ways. For example, the output device 204 may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display device, a Cathode Ray Tube (CRT) display device, a projector (projector), or the like.
The input device 205 is in communication with the processor 201 and can accept user input in a variety of ways. For example, the input device 205 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
In conjunction with the schematic structural diagram of the terminal device 20 shown in fig. 2, fig. 3 is a specific structural form of the terminal device 20 provided in the embodiment of the present application.
Wherein, in some embodiments, the functions of the processor 201 in fig. 2 may be implemented by the processor 110 in fig. 3.
In some embodiments, the functions of the transceiver 203 in fig. 2 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, and the like in fig. 3.
Wherein the antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in terminal equipment 20 may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied on the terminal device 20. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation. The mobile communication module 150 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication applied to the terminal device 20, including Wireless Local Area Networks (WLANs) (e.g., wi-Fi networks), bluetooth (BT), global Navigation Satellite System (GNSS), frequency Modulation (FM), near Field Communication (NFC), infrared technology (IR), and the like. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, performs frequency modulation and filtering processing on electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, perform frequency modulation and amplification on the signal, and convert the signal into electromagnetic waves through the antenna 2 to radiate the electromagnetic waves. When the terminal device 20 is a first device, the wireless communication module 160 may provide a solution for NFC wireless communication applied on the terminal device 20, that is, the first device includes an NFC chip. The NFC chip can improve the NFC wireless communication function. When the terminal device 20 is a second device, the wireless communication module 160 may provide a solution for NFC wireless communication applied on the terminal device 20, that is, the first device includes an electronic tag (e.g., a Radio Frequency Identification (RFID) tag). The NFC chip of the other device is close to the electronic tag to perform NFC wireless communication with the second device.
In some embodiments, antenna 1 of terminal device 20 is coupled to mobile communications module 150 and antenna 2 is coupled to wireless communications module 160 so that terminal device 20 can communicate with networks and other devices via wireless communications technologies. The wireless communication technology may include Long Term Evolution (LTE), BT, GNSS, WLAN, NFC, FM, or IR technology, etc. The GNSS may include a Global Positioning System (GPS), a global navigation satellite system (GLONASS), a beidou navigation satellite system (BDS), a quasi-zenith satellite system (QZSS), or a Satellite Based Augmentation System (SBAS).
In some embodiments, the functions of the memory 202 in fig. 2 may be implemented by the internal memory 121 in fig. 3 or an external memory (e.g., a Micro SD card) or the like connected to the external memory interface 120.
In some embodiments, the functionality of output device 204 in FIG. 2 may be implemented by display screen 194 in FIG. 3. The display screen 194 is used to display images, videos, and the like. The display screen 194 includes a display panel.
In some embodiments, the functionality of the input device 205 in FIG. 2 may be implemented by a mouse, a keyboard, a touch screen device, or the sensor module 180 in FIG. 3. Illustratively, as shown in fig. 3, the sensor module 180 may include, for example, one or more of a pressure sensor 180A, a gyroscope sensor 180B, a barometric pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, and a bone conduction sensor 180M, which is not particularly limited in this embodiment of the present application.
In some embodiments, as shown in fig. 3, the terminal device 20 may further include one or more of an audio module 170, a camera 193, an indicator 192, a motor 191, a key 190, a SIM card interface 195, a USB interface 130, a charging management module 140, a power management module 141, and a battery 142, wherein the audio module 170 may be connected to a speaker 170A (also referred to as a "speaker"), a receiver 170B (also referred to as a "receiver"), a microphone 170C (also referred to as a "microphone", "microphone"), or an earphone interface 170D, which is not particularly limited in this embodiment of the present application.
It is to be understood that the structure shown in fig. 3 does not constitute a specific limitation to the terminal device 20. For example, in other embodiments of the present application, terminal device 20 may include more or fewer components than shown, or some components may be combined, or some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The random access method provided in the embodiment of the present application will be described below by taking an example of interaction between the network device 30 shown in fig. 1 and any terminal device 20 with reference to fig. 1 to 3.
It should be noted that, in the following embodiments of the present application, names of messages between network elements or names of parameters in messages are only an example, and other names may also be used in a specific implementation, which is not specifically limited in this embodiment of the present application.
It should be noted that, in this embodiment, the terminal device 1 and the terminal device 2 initiate random access on the same time-frequency resource by using the same preamble for description, where the terminal device 1 may also be referred to as a first terminal device, and the description is unified here, and the following embodiments are not described again. It can be understood that the random access method provided in the embodiment of the present application is not limited to a scenario in which two terminal devices initiate random access on the same time-frequency resource by using the same preamble, and when more than two terminal devices initiate random access on the same time-frequency resource by using the same preamble, the random access method provided in the embodiment of the present application is still applicable.
In a possible implementation manner, as shown in fig. 4, a random access method provided in an embodiment of the present application includes the following steps:
s401, the terminal device 1 sends a first message 11 to the network device, and the terminal device 2 sends a first message 12 to the network device. Accordingly, the network device receives the first message 11 from the terminal device 1, and the network device receives the first message 12 from the terminal device 2. Wherein the first message 11 and the first message 12 each comprise a first preamble.
S402, the network equipment determines K TA values, wherein K is a positive integer larger than 1.
Optionally, in this embodiment of the present application, the network device may determine the K TA values in the following two ways:
the first method is as follows: the network device determines K TA values by correlation peak detection.
For example, the network device performs correlation detection on the multiple first messages by using the first preamble, and determines a TA value corresponding to each correlation peak of the K correlation peaks according to positions of the K correlation peaks after obtaining the K correlation peaks.
And secondly, the network equipment determines K TA values based on the neural network.
For example, as shown in fig. 5, the network device may input the signal carrying the plurality of first messages into a first neural network (which may also be referred to as a preamble detection network), obtain the number of terminal devices using the first preamble (i.e., the number of terminal devices transmitting the first message), and then input the signal carrying the plurality of first messages and the number of terminal devices using the first preamble into a second neural network (which may also be referred to as a TA estimation network), obtain K TA values. The first neural network may be a Deep Neural Network (DNN), and the second neural network may be a Convolutional Neural Network (CNN), which is not specifically limited in this embodiment of the present invention.
Optionally, in this embodiment of the present application, the first neural network and the second neural network may be obtained by training a network device.
For example, the method of training the first neural network may be: setting the number of layers and the size of each layer of the first neural network (for example, the first neural network includes 4 layers, and the size of each layer is (128,64,32,16)), initializing a weight value in the first neural network by using a random parameter, taking a signal which is received by the network device and bears a first message as an input of the first neural network, taking a correct output of the first neural network (namely, the number of terminal devices which actually send the first lead code) as a training tag, and performing supervised learning, so as to obtain the first neural network through training.
For example, the method of training the second neural network may be: setting the number of layers and the size of each layer of the second neural network (for example, the second neural network comprises 4 layers, and the size of each layer is (128,64,32,16)), initializing a network weight by using a random parameter, taking a signal which is received by the network equipment and bears the first message and the number of terminal equipment which actually sends the first lead code as the input of the second neural network, taking the correct output (namely the actual TA value) of the second neural network as a training label, and performing supervised learning to obtain the second neural network.
It should be noted that, in this embodiment of the application, when the network device determines the K TA values by using the two manners described above, the value of K is related to the number of first messages including the first preamble received by the network device, if the multiple terminal devices that send the first message are not adjacent to each other, the value of K may be the same as the number of the first messages received by the network device, and if there is an adjacent terminal device in the multiple terminal devices that send the first message, the value of K may be smaller than the number of the first messages received by the network device, where the adjacent terminal devices may be understood as that the geographic locations of the terminal devices are close to each other. In this embodiment, only the situation that the plurality of terminal devices are not adjacent to each other is considered, that is, after receiving the first message 11 and the first message 12, the network device may determine 2 TA values according to the first preamble, that is, the value of K is 2, and the situation that the adjacent terminal devices exist in the plurality of terminal devices will be described in the subsequent embodiments, which is not described herein again.
Optionally, in this embodiment of the present application, after determining K TA values, the network device may determine a TC-RNTI and an uplink grant corresponding to each TA value in the K TA values, where the uplink grant indicates a resource used for sending the third message, and the resource indicated by the uplink grant corresponding to each TA value is different.
S403, the network equipment sends a second message. Accordingly, terminal device 1 and terminal device 2 receive the second message.
The second message comprises K TA values, and TC-RNTI and uplink authorization corresponding to each TA value in the K TA values.
Optionally, in a possible implementation manner, the second message includes K sub-messages, and each sub-message includes a TA value, a TC-RNTI corresponding to the TA value, and an uplink grant corresponding to the TA value. In another possible implementation manner, the second message includes K information groups, and each information group includes a TA value, a TC-RNTI corresponding to the TA value, and an uplink grant corresponding to the TA value. It is understood that each sub-message or information group may include other information besides the above-mentioned information, and the embodiments of the present application are not limited thereto.
Optionally, in this embodiment of the present application, after receiving the first message 11, the network device may calculate, according to a time-frequency resource position for sending the first message 11, an RA-RNTI corresponding to the terminal device 1, and scramble a Cyclic Redundancy Check (CRC) portion of Downlink Control Information (DCI) in a Physical Downlink Control Channel (PDCCH) by using the RA-RNTI corresponding to the terminal device 1, where the DCI is used to schedule a downlink data channel for carrying the second message, and in a possible implementation, the network device may include information for determining positions of sub-messages or information groups in the downlink data channel (or the second message), and optionally, the downlink data channel may be a physical shared channel (PDSCH). Meanwhile, after receiving the first message 12, the network device may also calculate an RA-RNTI corresponding to the terminal device 2 according to the time-frequency resource location for sending the first message 12, and scramble a CRC portion of another DCI in the PDCCH by using the RA-RNTI corresponding to the terminal device 2, where the DCI may include information for determining the location of each sub-message or each information group in the downlink data channel (or the second message). In another embodiment, the DCI may not include information for determining the position of each sub-message or each information group in the downlink data channel (or the second message).
Optionally, in this embodiment of the present application, as shown in fig. 6, when the terminal device 1 and the terminal device 2 receive the second message, the terminal device 1 and the terminal device 2 may descramble CRC parts of a plurality of DCIs using respective corresponding RA-RNTIs in a common search space (common search space), determine a DCI where the CRC that can be checked after descrambling is located, and receive the second message at a PDSCH position indicated by the DCI.
S404, terminal device 1 determines a first TA value from the K TA values, and terminal device 2 determines a second TA value from the K TA values.
Optionally, in this embodiment of the application, the terminal device 1 may determine a reference TA value according to the historical TA information, and determine, as the first TA value, a TA value closest to the reference TA value among the K TA values included in the second message. The reference TA value may be a TA value in TA adjustment information that is stored by the terminal device 1 and is issued for the latest time when the network device sends the second message; or, the reference TA value may also be a TA value averaged by the terminal device 1 according to the historical TA information; alternatively, the reference TA value may be derived from historical TA information by other methods.
Or, optionally, in this embodiment of the application, if the terminal device 1 does not store the historical TA information, after receiving the second message, the terminal device 1 randomly selects one TA from the K TAs, and uses the randomly selected TA value as the first TA value.
Optionally, in this embodiment of the application, after determining the first TA value, the terminal device 1 may perform TA adjustment according to the first TA value, may further store the TC-RNTI corresponding to the first TA value, and send the third message to the network device on the resource indicated by the uplink grant corresponding to the first TA value.
The method for determining the second TA value by the terminal device 2 is similar to the method for determining the first TA value by the terminal device 1, and specific reference may be made to the description of determining the first TA value by the terminal device 1, which is not described herein again. It should be noted that, when there is a terminal device that does not store historical TA information in the terminal device 1 and the terminal device 2, and a TA value is randomly selected from the K TA values, the randomly selected TA value may be the same as a TA value selected by another terminal device, that is, the first TA value and the second TA value may be the same, or when the reference TA values determined by the terminal device 1 and the terminal device 2 are the same, the first TA value and the second TA value are also the same, at this time, the terminal device 1 and the terminal device 2 send a third message to the network device on the same resource, the terminal device 1 and the terminal device 2 perform access according to an existing contention-based random access procedure, the related procedure may refer to the prior art, and details are not described herein again. In the embodiment of the present application, it is assumed that the first TA value is different from the second TA value.
S405, the terminal device 1 sends the third message 31 to the network device, and the terminal device 2 sends the third message 32 to the network device. Accordingly, the network device receives the third message 31 from the terminal device 1, and the network device receives the third message 32 from the terminal device 2.
The third message 31 is scrambled by using a TC-RNTI corresponding to the first TA value, and the third message 31 includes an identifier of the terminal device 1. The third message 32 is scrambled by using TC-RNTI corresponding to the second TA value, and the third message 32 includes the identifier of the terminal device 2.
Optionally, in this embodiment of the application, as shown in fig. 6, the terminal device 1 sends the third message 31 to the network device on the resource indicated by the uplink grant corresponding to the first TA value, and the terminal device 2 sends the third message 32 to the network device on the resource indicated by the uplink grant corresponding to the second TA value. Correspondingly, the network device receives the third message 31 on the resource indicated by the uplink grant corresponding to the first TA value, and demodulates the third message 31 and the third message 32 after receiving the third message 32 on the resource indicated by the uplink grant corresponding to the second TA value. In this embodiment of the present application, the TA values determined by the terminal device 1 and the terminal device 2 are different, and the resource indicated by the uplink grant corresponding to each TA value is different, so that the terminal device 1 and the terminal device 2 send the third message to the network device on different resources, and then the network device can successfully demodulate the third message 31 and the third message 32, and send the fourth message for each successfully demodulated third message by executing step S406.
S406, the network device sends a fourth message 41 to the terminal device 1, and the network device sends a fourth message 42 to the terminal device 2. Accordingly, terminal device 1 receives the fourth message 41 from the network device and terminal device 2 receives the fourth message 42 from the network device.
The fourth message includes the access resource allocated by the network device for the terminal device corresponding to the terminal identifier included in the successfully demodulated third message, that is, the fourth message 41 includes the access resource allocated by the network device for the terminal device 1, and the fourth message 42 includes the access resource allocated by the network device for the terminal device 2. And the downlink data channel for bearing the fourth message is scheduled by DCI, the DCI is scrambled by TC-RNTI corresponding to the TA value determined by the terminal equipment from the K TA values, namely the DCI for scheduling the downlink data channel for bearing the fourth message 41 is scrambled by TC-RNTI corresponding to the first TA value, and the DCI for scheduling the downlink data channel for bearing the fourth message 42 is scrambled by TC-RNTI corresponding to the second TA value. Optionally, the downlink data channel may be a PDSCH.
Optionally, in this embodiment of the application, after the network device demodulates the third message 31, the network device may allocate an access resource to the terminal device 1 corresponding to the identifier of the terminal device 1 included in the third message 31, and scramble a CRC portion of DCI in the PDCCH by using the TC-RNTI corresponding to the first TA value, where the DCI is used to schedule a downlink data channel carrying the fourth message 41. Accordingly, the terminal device 1 may receive the fourth message 41 from the network device according to the TC-RNTI corresponding to the first TA value. For example, the terminal device 1 descrambles CRC parts of the multiple DCIs in the general search space by using the TC-RNTI corresponding to the first TA value stored in step S404, finds a DCI where the CRC that can pass the verification after descrambling is located, receives the downlink data channel carrying the fourth message 41 according to the DCI, and obtains the fourth message 41 from the received downlink data channel. The manner of demodulating the third message 32 and the manner of sending the fourth message 42 by the network device are similar to the manner of demodulating the third message 31 and the manner of sending the fourth message 41, respectively, and the manner of receiving the fourth message 42 by the terminal device 2 is similar to the manner of receiving the fourth message 41 by the terminal device 1, which are not described again here.
Optionally, in this embodiment of the application, the fourth message further includes a contention resolution identifier CRID, where the contention resolution identifier indicates a terminal device that successfully competes, and optionally, the contention resolution identifier may be an identifier of a terminal device in the third message that is successfully demodulated, and may also be understood as an identifier of a terminal device that successfully competes. Since both the terminal device 1 and the terminal device 2 can be successfully accessed in the scenario where the plurality of terminal devices using the same preamble are not adjacent to each other and the first TA value and the second TA value are different, the contention resolution flag included in the fourth message 41 corresponds to the flag of the terminal device 1, and the contention resolution flag included in the fourth message 42 corresponds to the flag of the terminal device 2. Therefore, after receiving the fourth message 41, the terminal device 1 may determine that the terminal device 1 is successfully accessed by comparing the CRID included in the fourth message 41 with the identifier of the terminal device 1, and then the terminal device 1 may send an Acknowledgement (ACK) on the access resource allocated to the terminal device 1 by the network device, and use the TC-RNTI corresponding to the first TA value as a Cell radio network temporary identifier (C-RNTI) for subsequent transmission. After receiving the fourth message 42, the terminal device 2 may send HARQ or ACK on the access resource allocated by the network device for the terminal device 2, and use the TC-RNTI corresponding to the second TA value as the C-RNTI for subsequent transmission.
Optionally, in this embodiment, a scenario exists in which multiple adjacent terminal devices (multiple terminal devices in close geographic locations) use the same preamble to initiate random access, and in this scenario, the number of TA values determined by the network device may be different from the number of terminal devices sending the first message. For this scenario, in this embodiment of the present application, an example is described in which the geographic locations of the terminal device 3 and the terminal device 1 are close to each other, and both the terminal device 3 and the terminal device 1 initiate random access by using the first preamble. It can be understood that, when there are multiple terminal devices in close geographical locations and a random access is initiated using the same preamble, the random access method provided in the embodiment of the present application is still applicable. In this scenario, the random access method shown in fig. 4 provided in the embodiment of the present application includes:
optionally, step S401 further includes: the terminal device 3 sends a first message 13 to the network device. Accordingly, the network device receives the first message 13 from the terminal device 3.
Optionally, in step S402, when the network device determines the TA value in the first usage mode, because the positions of the terminal device 1 and the terminal device 3 are close to each other, the correlation peaks of the first message 11 and the second message 12 reaching the network device are very close, and the network device cannot distinguish the correlation peaks, the network device may consider that the position has only one correlation peak, and only one TA value may be determined according to the position of the one correlation peak. Therefore, the network device can only determine 2 TA values.
Optionally, when the network device determines the TA value in the second usage mode, the network device may also determine only 2 TA values because the positions of the terminal device 1 and the terminal device 3 are close to each other, and the accuracy of the first neural network and the accuracy of the second neural network may not be high. However, when the accuracy of the first neural network device and the second neural network device is high enough, the possibility that the network device determines 3 TA values in the scenario is not excluded, and at this time, the terminal device 1, the terminal device 2, and the terminal device 3 may all compete successfully. In the embodiment of the present application, 2 TA values determined by a network device are taken as an example for description.
Optionally, step S403 further includes: the terminal device 3 receives the second message, where reference may be made to the description part of the second message in the foregoing embodiment for the description of the second message, and details are not repeated here.
Optionally, step S404 further includes: the terminal device 3 determines a third TA value from the K TA values. Wherein, the third TA value may have the following two cases:
the first and third TA values are the same as the first TA value. When the terminal equipment 3 determines the TA value according to the historical TA information, if the reference TA values determined by the terminal equipment 3 and the terminal equipment 1 are the same, the third TA value is the same as the first TA value; alternatively, when the terminal device 3 randomly determines the TA value, the third TA value randomly selected by the terminal device 3 may be the same as the first TA value.
The second and third TA values are the same as the second TA value. When the terminal device 3 determines the TA value according to the historical TA information, if the reference TA values determined by the terminal device 3 and the terminal device 2 are the same, the third TA value is the same as the second TA value; alternatively, when the terminal device 3 randomly determines the TA value, the third TA value randomly selected by the terminal device 3 may be the same as the second TA value.
Optionally, step S405 further includes: the terminal device 3 sends a third message 33 to the network device, the third message 33 comprising the identity of the terminal device 3. Accordingly, the network device receives the third message from the terminal device 3.
Since the third TA value determined by terminal device 3 may be the same as the first TA value determined by terminal device 1, terminal device 1 and terminal device 3 both send the third message on the resource indicated by the uplink grant corresponding to the first TA value. After receiving the third message 31 and the third message 33 on the resource, the network device may only successfully demodulate one third message (taking successful demodulation of the third message 31 as an example), and obtain the identifier of the terminal device included in the successfully demodulated third message, that is, obtain the identifier of the terminal device 1 included in the third message 31.
Optionally, because the network device only successfully demodulates the third message 31, the network device only sends the fourth message 41 to the third message 31, and the contention resolution identity included in the fourth message 41 corresponds to the terminal identity included in the third message successfully demodulated by the network device, that is, the contention resolution identity in the fourth message 41 corresponds to the identity of the terminal device 1. However, since the terminal apparatus 3 and the terminal apparatus 1 use the same TA value, the terminal apparatus 3 can also receive the fourth message 41 based on the TC-RNTI corresponding to the first TA value. In this scenario, after receiving the fourth message 41, the terminal device 3 may determine that the contention resolution identity does not correspond to the identity of the terminal device 3, and may further determine that the access of the terminal device 3 fails, and terminate the random access or switch to the next random access. That is, in this scenario, terminal device 1 and terminal device 2 are successfully accessed, and terminal device 3 is failed to be accessed. It can be understood that, if the network device successfully demodulates the third message 33, the terminal device 3 and the terminal device 2 are successfully accessed, and the terminal device 1 is unsuccessfully accessed, and this example is not described in detail in this embodiment of the present application.
Or, the third TA value determined by terminal device 3 may be the same as the second TA value determined by terminal device 2, and similarly, when the network device successfully demodulates third message 32, terminal device 1 and terminal device 2 access successfully, and terminal device 3 fails to access. When the network device successfully demodulates the third message 33, the access of the terminal device 1 and the terminal device 3 is successful, and the access of the terminal device 2 is failed. The related procedure may refer to the description that the third TA value is the same as the first TA value, and is not described herein again.
Based on the random access method provided in the embodiment of the present application, after receiving a plurality of first messages, the network device may determine a plurality of TA values, and the TC-RNTI and the uplink grant corresponding to each TA value, and send the TA values in a second message, so that after receiving the second message, a plurality of terminal devices initiating random access using the same preamble may determine one TA value from the K TA values, and send a third message to the network device on the resource indicated by the uplink grant corresponding to the TA value. And because the resources indicated by the uplink grant corresponding to each TA value are different, the network device may demodulate the third message sent by each terminal device, and send a fourth message for each third message, where the fourth message includes the access resource allocated to the terminal device that sent the third message, so that multiple terminal devices using the same preamble code may continue to send signals on their corresponding access resources, and thus, compared with the contention-based random access scheme in the prior art, multiple terminal devices selecting the same preamble code may access at the same time, and the access efficiency of the terminal device is improved.
It should be noted that, although the random access method provided by the above-mentioned embodiment of the present application and shown in fig. 4 is based on four-step random access (4-step-RACH), it is not limited to be used in four-step random access, and it can be understood that the random access method provided by the above-mentioned embodiment of the present application and shown in fig. 4 can be extended to two-step random access (2-step-RACH). For example, after receiving a message a including the same preamble and uplink data sent by multiple terminal devices, the network device may execute the above steps S402, S403, and S406, determine K TA values, and send a message B, where the message B includes the K TA values, and the TC-RNTI and the access resource corresponding to each TA value of the K TA values. After receiving the message B, the terminal device may determine a TA value from the K TA values to perform TA adjustment in step S404, and continuously send a message to the network device on the access resource corresponding to the TA value. Based on this, since the TA values determined by the plurality of terminal devices may be different, there may be a plurality of terminal devices successfully accessing, thereby improving the access efficiency of the terminal devices.
The processor 301 in the network device 30 shown in fig. 2 may call the application code stored in the memory 302 to instruct the network device to perform the actions of the network device in the above steps S401 to S406, and the processor 201 in the terminal device 20 shown in fig. 2 may call the application code stored in the memory 202 to instruct the network device to perform the actions of the terminal device in the above steps S401 to S406, which is not limited in this embodiment.
In another possible implementation manner, as shown in fig. 7, another random access method provided in the embodiment of the present application is provided, where the random access method includes the following steps:
s701, the terminal device 1 sends a first message 11 to the network device, and the terminal device 2 sends a first message 12 to the network device, and accordingly, the network device receives the first message 11 from the terminal device 1 and the network device receives the first message 12 from the terminal device 2. Wherein the first message 11 and the first message 12 each comprise a first preamble.
S702, the network equipment determines a first TA value according to the first preamble.
In step S702, the processing manner of the network device is the same as the processing manner of the network device after receiving the plurality of first messages in the prior art, and the related description may refer to the prior art, which is not described herein again.
S703, the network device sends the second message. Accordingly, terminal device 1 and terminal device 2 receive the second message. The second message includes the first TC-RNTI and the first uplink grant corresponding to the first TA value, and reference may be made to step S403 for relevant description that the terminal device 1 and the terminal device 2 receive the second message, which is not described herein again.
Optionally, in this embodiment of the application, the second message may further include a first TA value, and after receiving the second message, terminal device 1 and terminal device 2 may perform TA adjustment according to the first TA value.
S704, the terminal device 1 sends the third message 31 to the network device, and the terminal device 2 sends the third message 32 to the network device. Accordingly, the network device receives the third message 31 from the terminal device 1, and the network device receives the third message 32 from the terminal device 2. The third message 31 and the third message 32 are both scrambled by using the first TC-RNTI, the third message 31 includes the identifier of the terminal device 1, and the third message 32 includes the identifier of the terminal device 2.
It should be noted that, in this embodiment of the application, because the second messages received by the multiple terminal devices only include the first uplink grant, the multiple terminal devices all send the third message to the network device on the resource indicated by the first uplink grant, after the network device receives the multiple third messages on the resource, the network device may successfully demodulate K third messages, where each of the K third messages includes an identifier of one terminal device, and K is a positive integer greater than 1. The value of K may be the same as the number of terminal devices that send the third message, that is, the network device may successfully demodulate all the third messages sent by the plurality of terminal devices, and the value of K may also be smaller than the number of terminal devices that send the third message, that is, the network device successfully demodulates the third messages sent by some terminal devices in the plurality of terminal devices. In the embodiment of the present application, the value of K is the same as the number of terminal devices that send the third message, that is, the network device can successfully demodulate the third message 31 and the third message 32.
S705, the network device sends a fourth message. Accordingly, terminal device 1 receives the fourth message from the network device, and terminal device 2 receives the fourth message from the network device.
The fourth message includes K CRIDs and access resources corresponding to each CRID of the K CRIDs, each CRID corresponds to an identifier of one terminal device, a downlink data channel carrying the fourth message is scheduled by DCI, the DCI is scrambled by using the first TC-RNTI, and optionally, the downlink data channel may be a PDSCH.
Optionally, in a possible implementation, the fourth message includes K sub-messages, and each sub-message includes a CRID and information indicating an access resource to which the CRID value corresponds. In another possible embodiment, the fourth message includes K information groups, and each information group includes a CRID and information indicating an access resource to which the CRID value corresponds. It is understood that each sub-message or information group may include other information besides the above-mentioned information, and the embodiments of the present application are not limited thereto.
Optionally, in this embodiment of the application, after the network device successfully demodulates the K third messages, the identifier of the terminal device included in the successfully demodulated third messages may respectively correspond to one contention resolution identifier CRID, for example, the identifier of the terminal device may be used as a CRID, an access resource is allocated to the terminal device corresponding to each CRID, and a CRC portion of DCI in the PDCCH is scrambled by using the first TC-RNTI, where the DCI is used to schedule a downlink data channel carrying the fourth message. In one possible embodiment, the DCI may include information for determining the position of each sub-message or information group in the downlink data channel (or the fourth message). Accordingly, as shown in fig. 8, the terminal device 1 may receive the fourth message from the network device according to the first TC-RNTI. Exemplarily, the terminal device 1 descrambles CRC parts of multiple DCIs using the first TC-RNTI in the general search space, finds a DCI where the CRC can pass the check after descrambling, receives a downlink data channel carrying the fourth message according to the DCI, and acquires the fourth message from the received downlink data channel. In a possible implementation manner, the terminal device determines the position of each sub-message or information group according to the information in the DCI for determining the position of each sub-message or information group in the downlink data channel (or the fourth message), and further obtains the information included in each information group. In another embodiment, the DCI may not include information for determining the position of each sub-message or information group in the downlink data channel (or the fourth message), for example, the position of each sub-message or information group in the uplink data channel is determined by a preset rule, and the terminal device may determine the position of each sub-message or information group according to the preset rule after receiving the data channel. The manner of receiving the fourth message by the terminal device 2 is similar to the manner of receiving the fourth message by the terminal device 1, and is not described herein again.
Optionally, in this embodiment of the application, after receiving the fourth message, if a CRID corresponding to the identifier of the terminal device 1 exists in the K CRIDs, the terminal device 1 sends an ACK on an access resource corresponding to the CRID; or, if the CRID corresponding to the identifier of the terminal device 1 does not exist in the K CRIDs, the terminal device 1 determines that the access fails, and terminates the random access or switches to the next access. The processing manner after the fourth message received by the terminal device 2 is similar to that of the terminal device 1, and is not described herein again.
Optionally, in this embodiment of the application, the fourth message may further include a TA value and a TC-RNTI corresponding to each CRID. The TA value corresponding to each CRID may be obtained according to K third messages after the network device successfully demodulates the K third messages. Optionally, the network device may estimate K TA values according to reference signals (DMRSs) carried in the K third messages; or, after receiving the plurality of first messages, the network device may determine the first TA value according to the prior art, and may also determine the plurality of TA values according to the first or second manner in step S402 and store the plurality of TA values, and after successfully demodulating the K third messages and determining the K CRIDs, the network device may assign the plurality of TA values to the terminal device corresponding to each CRID.
Optionally, when the network device allocates the multiple TA values to the terminal devices corresponding to the K CRIDs, since the TA value determined according to the first or second mode is more accurate than the TA value determined according to the third message, the K TA values may be estimated according to the K third messages, and then the TA value closest to the TA value estimated according to the third message among the multiple TA values is allocated to the CRID determined according to the third message. For example, when the network device determines that the plurality of TA values are 1.7 and 9.6 according to the first or second mode, the TA value determined according to the third message 31 is 1.8, the CRID determined according to the third message 31 is CRID 1, the TA value determined according to the third message 32 is 9.4, and the CRID determined according to the third message 31 is CRID 2, the network device assigns 1.7 to CRID 1 and 9.6 to CRID 2 when assigning the plurality of TA values to each CRID.
Optionally, in this embodiment of the application, after receiving the fourth message including the TA value corresponding to each CRID, if a CRID corresponding to the identifier exists in the K CRIDs, the terminal device may perform TA adjustment according to the TA value corresponding to the CRID. Because the network device only issues the first TA value in the second message, where the first TA value is a TA value corresponding to one terminal device of the multiple terminal devices, for other terminal devices, the TA adjusted according to the first TA value is inaccurate, but the TA value corresponding to each CRID in the fourth message is obtained by the network device according to the first message or the third message sent by the terminal device corresponding to the CRID, so that for the terminal device corresponding to each CRID, the TA adjusted by using the TA value corresponding to the CRID is more accurate, and the accuracy of TA adjustment is improved.
Based on the random access method provided by the embodiment of the application, after receiving the third message, the network device can successfully demodulate K third messages, and respectively correspond the identifier of the terminal device included in each third message of the K third messages to one CRID, and send the K CRIDs and the access resource corresponding to each CRID in the fourth message, so that after receiving the fourth message, a plurality of terminal devices using the same preamble can determine one CRID corresponding to the identifier according to the identifier, and continue to send signals on the access resource corresponding to the CRID, thereby enabling a plurality of terminal devices selecting the same preamble to access simultaneously, and improving the access efficiency of the terminal devices, compared with the contention-based random access scheme in the prior art.
The processor 301 in the network device 30 shown in fig. 2 may call the application code stored in the memory 302 to instruct the network device to execute the actions of the network device in the above steps S701 to S705, and the processor 201 in the terminal device 20 shown in fig. 2 may call the application code stored in the memory 202 to instruct the network device to execute the actions of the terminal device (including the terminal device 1 and the terminal device 2) in the above steps S701 to S705, which is not limited in this embodiment.
In the embodiment shown in fig. 7, the multiple terminal devices send the third message to the network device on the same resource, and although the network device may successfully demodulate the third messages sent by the multiple terminal devices, for the network device, it is more complex to demodulate the multiple third messages on the same time-frequency resource. Based on this, in the random access method shown in fig. 7 provided in the embodiment of the present application, the network device may indicate, to the terminal device, whether there is a collision of the third message on the resource indicated by the first uplink grant, that is, whether there are multiple terminal devices on the resource indicated by the first uplink grant to send the third message to the network device, so that the terminal device may adjust a manner of sending the third message according to the indication of the network device.
Optionally, the network device may determine whether a collision exists on the resource indicated by the first uplink grant by determining the TA value, after step S701, the network device may determine the TA value by the method in step S402, and if the number of the determined TA values is greater than 1, the network device determines that a collision exists on the resource, otherwise, the network device determines that a collision does not exist on the resource. After the network device determines whether there is a collision on the resource, it may indicate to the terminal device whether there is a collision on the resource.
Optionally, the network device may include, in the second message in step S703, indication information to indicate whether there are multiple terminal devices on the resource indicated by the first uplink grant to send the third message to the network device. Wherein the indication information may be characterized by a bit, for example, when the value of the bit is 0, it indicates that there is no collision, and when the value of the bit is 1, it indicates that there is collision; or, the indication information may specifically be a value of the first TC-RNTI included in the second message, and when the value of the first TC-RNTI is in a preset first range, it indicates that there is no collision, and when the value of the first TC-RNTI is in a preset second range, it indicates that there is collision. Or, optionally, the network device may use the location where the network device sends the second message in step S703 to indicate whether there are multiple terminal devices sending the third message to the network device on the resource indicated by the first uplink grant. For example, when the network device sends the second message in time-frequency resource position 1, it indicates that there is no collision, and when the network device sends the second message in time-frequency resource position 2, there is a collision. Further, the indication information may also indicate the number of users sending the third message to the network device on the resource indicated by the first uplink grant, for example, when the indication information is characterized by a bit value, a value of the bit is 0 to indicate that there is no collision, and when the value of the bit is X, it indicates that there are X users sending the third message to the network device on the resource indicated by the first uplink grant. It should be noted that, since the embodiment of the present application solves the access problem when multiple terminal devices use the same preamble, the network device indicates to the terminal device that there are multiple terminal devices transmitting the third message to the network device on the resource indicated by the first uplink grant.
In addition, because a plurality of different terminal devices send the same preamble on the same time-frequency resource, and the TA values included in the second messages received by the plurality of terminal devices are all the first TA values, the plurality of terminal devices all send the third message to the network device on the resource indicated by the first uplink grant corresponding to the first TA value. Based on this, the network device indicates to the terminal device whether there is a collision of the third message on the resource indicated by the first uplink grant, which may also be understood as whether the network device indicates to the terminal device whether there are multiple terminal devices that send the same preamble to the network device on the same time-frequency resource. Optionally, the network device may also include, in the second message in step S703, indication information to indicate whether there are multiple terminal devices that send the same preamble to the network device on the same time-frequency resource, where the indication information may be characterized by bits, or the indication information may specifically be a value of the first TC-RNTI included in the second message. Alternatively, the network device may also use the location of the network device sending the second message in step S703 to indicate whether there are multiple terminal devices sending the same preamble to the network device on the same time-frequency resource. Further, the indication information may also identify the number of terminal devices that send the same preamble to the network device on the same time-frequency resource. The specific description of the indication manner may refer to a manner when the network device indicates whether there is a collision of the third message to the terminal device, and is not described herein again.
Optionally, in step S704, when the terminal device 1 receives the instruction and sends the third message 31 to the network device, the terminal device 1 may process the third message 31 in a non-orthogonal processing manner, and then send the processed third message 31 to the network device. The non-orthogonal processing manner may be preconfigured by the network device, and when the terminal device 1 sends the third message 31, the terminal device may perform non-orthogonal processing on the third message 31 by using a non-orthogonal parameter, which is preconfigured by the network device or selected from a non-orthogonal parameter pool, and corresponds to the non-orthogonal processing manner preconfigured by the network device, where the non-orthogonal parameter includes one or more of a spreading sequence, an interleaving pattern, and a multidimensional constellation modulation codebook, and the non-orthogonal processing manner includes one or more of spreading with the spreading sequence, interleaving with the interleaving pattern, and modulating with the multidimensional constellation modulation codebook. The manner in which the terminal device 2 sends the third message 32 is similar to the manner in which the terminal device 1 sends the third message 31, and is not described herein again. Correspondingly, the network device may demodulate the third message in a corresponding manner, and optionally, the network device may determine a non-orthogonal parameter for processing the third message, and successfully demodulate the K third messages on the resource indicated by the first uplink grant according to the non-orthogonal parameter.
Based on the scheme, the terminal device performs non-orthogonal processing on the third message by using the non-orthogonal parameter pre-configured by the network device or selected from the non-orthogonal parameter pool when sending the third message, so that the terminal devices sending the third message can be distinguished by the difference of the non-orthogonal parameter, the complexity of the network device demodulating the third messages on the resource indicated by the first uplink authorization is reduced, and the performance of the network device demodulating the third message is improved.
It should be noted that, in the foregoing embodiment, after receiving the indication that there is a collision on the same resource of the network device, the terminal device sends the non-orthogonal processed third message to the network device, and it is understood that even if the terminal device does not receive the indication of the network device, the terminal device may send the third message to the network device after the non-orthogonal processing to improve the performance of the network device in demodulating the third message, at this time, the terminal device needs to send a message to the network device in advance to notify the network device of the non-orthogonal processing method and the non-orthogonal parameter used by the message, so that the network device can demodulate the third message in the same demodulation method.
It is to be understood that, in the above embodiments, the method and/or the step implemented by the terminal device may also be implemented by a component (e.g., a chip or a circuit) available for the terminal device, and the method and/or the step implemented by the network device may also be implemented by a component (e.g., a chip or a circuit) available for the network device.
The above-mentioned scheme provided by the embodiment of the present application is introduced mainly from the perspective of interaction between network elements. Correspondingly, the embodiment of the application also provides a communication device, and the communication device is used for realizing the various methods. The communication device may be the terminal device in the above method embodiment, or a device including the above terminal device, or a component that can be used for the terminal device; alternatively, the communication device may be the network device in the above method embodiment, or a device including the above network device, or a component that can be used for the network device. It is to be understood that the communication device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the communication apparatus may be divided into functional modules according to the method embodiments, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
For example, the communication device is taken as the network device in the above method embodiment. Fig. 9 shows a schematic structural diagram of a network device 90. The network device 90 comprises a processing module 901 and a transceiver module 902. The transceiver module 902, which may also be referred to as a transceiver unit, is used to implement a transmitting and/or receiving function, and may be, for example, a transceiver circuit, a transceiver, or a communication interface.
In one possible implementation, the transceiver module 902 is configured to receive a plurality of first messages, where each of the plurality of first messages includes a first preamble. A processing module 901, configured to determine K TA values, where K is a positive integer greater than 1. The transceiver module 902 is further configured to send a second message, where the second message includes the K TA values, and the TC-RNTI and the uplink grant corresponding to each TA value of the K TA values. The transceiver module 902 is further configured to receive a third message from the first terminal device on a resource indicated by the uplink grant corresponding to the first TA value, where the third message is scrambled by using a TC-RNTI corresponding to the first TA value, and the third message includes an identifier of the first terminal device, where the first TA value is any one of the K TA values. The transceiving module 902 is further configured to send a fourth message to the first terminal device, where the fourth message includes an access resource allocated by the network device, a downlink data channel carrying the fourth message is scheduled by downlink control information DCI, and the DCI is scrambled by using the TC-RNTI corresponding to the first TA value.
Optionally, the processing module 901 is configured to determine K TA values, and includes: a processing module 901, configured to input the signal carrying the plurality of first messages into the first neural network, so as to obtain the number of terminal devices using the first preamble. The processing module 901 is further configured to input the number of the terminal devices and the signal carrying the plurality of first messages into a second neural network, so as to obtain K TA values.
In another possible implementation manner, the transceiver module 902 is configured to receive a plurality of first messages, where each of the plurality of first messages includes a first preamble. The processing module 901 is further configured to determine a first TA value according to the first preamble. The transceiver module 902 is further configured to send a second message, where the second message includes the first TA value, and the first TC-RNTI and the first uplink grant corresponding to the first TA value. A processing module 901, configured to successfully demodulate, on the resource indicated by the first uplink grant, K third messages scrambled by using the first TC-RNTI, where each of the K third messages includes an identifier of a terminal device, and K is a positive integer greater than 1. The transceiving module 902 is further configured to send a fourth message, where the fourth message includes K contention resolution identifiers, CRIDs, and an access resource corresponding to each CRID of the K CRIDs, where each CRID corresponds to an identifier of a terminal device in one of the K third messages, and a downlink data channel carrying the fourth message is scheduled by downlink control information DCI, where the DCI is scrambled by using the first TC-RNTI.
Optionally, the processing module 901 is further configured to successfully demodulate, on the resource indicated by the first uplink grant, the K third messages scrambled by using the first TC-RNTI, where the demodulation module includes: a processing module 901 configured to determine non-orthogonal parameters, the non-orthogonal parameters including one or more of: a spreading sequence, an interleaving pattern, or a multidimensional constellation modulation codebook. The processing module 901 is further configured to successfully demodulate the K third messages on the resource indicated by the first uplink grant according to the non-orthogonal parameter.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
In the present embodiment, the network device 90 is presented in a form in which the respective functional modules are divided in an integrated manner. A "module" herein may refer to a particular ASIC, a circuit, a processor and memory that execute one or more software or firmware programs, an integrated logic circuit, and/or other device that provides the functionality described herein. In a simple embodiment, those skilled in the art will appreciate that the network device 90 may take the form of the network device 30 shown in FIG. 2.
For example, the processor 301 in the network device 30 shown in fig. 2 may execute the instructions by calling a computer stored in the memory 302, so that the network device 30 executes the random access method in the above method embodiment.
Specifically, the functions/implementation procedures of the processing module 901 and the transceiver module 902 in fig. 9 can be implemented by the processor 301 in the network device 30 shown in fig. 2 calling the computer execution instructions stored in the memory 302. Alternatively, the function/implementation procedure of the processing module 901 in fig. 9 may be implemented by the processor 301 in the network device 30 shown in fig. 2 calling a computer executing instruction stored in the memory 302, and the function/implementation procedure of the transceiver module 902 in fig. 9 may be implemented by the transceiver 303 in the network device 30 shown in fig. 2.
Since the network device 90 provided in this embodiment can execute the random access method, the technical effect obtained by the network device can refer to the method embodiment, which is not described herein again.
Or, for example, the communication device is taken as the terminal device in the above method embodiment. Fig. 10 shows a schematic structural diagram of a terminal device 100. The terminal device 100 comprises a processing module 1001 and a transceiver module 1002. The transceiver module 1002, which may also be referred to as a transceiver unit, is used to implement a transmitting and/or receiving function, and may be, for example, a transceiver circuit, a transceiver, or a communication interface.
In one possible implementation, the transceiver module 1002 is configured to transmit a first message to a network device, where the first message includes a first preamble. The transceiving module 1002 is further configured to receive a second message from the network device, where the second message includes K TA values, and a TC-RNTI and an uplink grant corresponding to each TA value of the K TA values, and K is a positive integer greater than 1. A processing module 1001 configured to determine a first TA value from the K TA values. The transceiver module 1002 is further configured to send a third message to the network device on the resource indicated by the uplink grant corresponding to the first TA value, where the third message is scrambled by using the TC-RNTI corresponding to the first TA value, and the third message includes the identifier of the terminal device. The transceiving module 1002 is further configured to receive a fourth message from the network device according to the TC-RNTI corresponding to the first TA value, where the fourth message includes an access resource allocated by the network device to the terminal device.
Optionally, the processing module 1001 is further configured to determine a first TA value from the K TA values, and includes: a processing module 1001, configured to determine a reference TA value according to historical TA information of the terminal device. The processing module 1001 is further configured to determine, as the first TA value, a TA value closest to the reference TA value among the K TA values.
Optionally, the processing module 1001 is further configured to determine a first TA value from the K TA values, and includes: a processing module 1001, configured to randomly select one TA value from the K TA values. The processing module 1001 is further configured to determine the randomly selected one TA value as the first TA value.
Optionally, the fourth message further includes a contention resolution identity CRID, and if the CRID corresponds to the identity of the first terminal device, the processing module 1001 is further configured to send an ACK to the network device on the access resource included in the fourth message; or, if the CRID does not correspond to the identifier of the first terminal device, the processing module 1001 is further configured to terminate the random access or switch to the next random access.
In another possible implementation manner, the processing module 1001 is configured to generate a first message, where the first message includes a first preamble. The transceiving module 1002 is configured to send the first message to the network device, and the transceiving module 1002 is further configured to receive a second message from the network device, where the second message includes a first TA value, and a first TC-RNTI and a first uplink grant corresponding to the first TA value. The processing module 1001 is further configured to generate a third message, where the third message is scrambled with the first TC-RNTI, and the third message includes the identifier of the first terminal device. A transceiving module 1002, configured to send the third message to the network device on the resource indicated by the first uplink grant, where the transceiving module 1002 is further configured to receive a fourth message from the network device according to the first TC-RNTI, where the fourth message includes K contention resolution identifiers, CRIDs, and an access resource corresponding to each CRID of the K CRIDs, where each CRID corresponds to an identifier of a terminal device included in one of the K third messages successfully demodulated by the network device, and K is a positive integer greater than 1.
Optionally, the fourth message further includes a TA value corresponding to each CRID. If the K CRIDs include a first CRID corresponding to the identifier of the terminal device, the processing module 1001 is further configured to perform TA adjustment according to a TA corresponding to the first CRID.
Optionally, the transceiver module 1002 is further configured to send a third message to the network device on the resource indicated by the first uplink grant, where the third message includes: a transceiver module 1002, configured to send, to the network device, a third message processed in a non-orthogonal processing manner on the resource indicated by the first uplink grant, where the non-orthogonal processing manner includes one or more of the following: spread spectrum with a spreading sequence, interleaved with an interleaving pattern, or modulated with a multidimensional constellation modulation codebook.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
In the present embodiment, the terminal device 100 is presented in a form of dividing each functional module in an integrated manner. A "module" herein may refer to a particular ASIC, a circuit, a processor and memory that execute one or more software or firmware programs, an integrated logic circuit, and/or other device that provides the described functionality. In a simple embodiment, the terminal device 100 may take the form of the terminal device 20 shown in fig. 2, as will be appreciated by those skilled in the art.
For example, the processor 201 in the terminal device 20 shown in fig. 2 may execute the instructions by calling a computer stored in the memory 202, so that the terminal device 20 executes the random access method in the above method embodiment.
Specifically, the functions/implementation procedures of the processing module 1001 and the transceiver module 1002 in fig. 10 can be implemented by the processor 201 in the terminal device 20 shown in fig. 2 calling the computer execution instructions stored in the memory 202. Alternatively, the function/implementation procedure of the processing module 1001 in fig. 10 may be implemented by the processor 201 in the terminal device 20 shown in fig. 2 calling a computer executing instruction stored in the memory 202, and the function/implementation procedure of the transceiver module 1002 in fig. 10 may be implemented by the transceiver 203 in the terminal device 20 shown in fig. 2.
Since the terminal device 100 provided in this embodiment can execute the random access method, the technical effects obtained by the terminal device 100 can refer to the method embodiments described above, and are not described herein again.
Optionally, an embodiment of the present application further provides a communication device (for example, the communication device may be a chip or a system-on-chip), where the communication device includes a processor, and is configured to implement the method in any of the above method embodiments. In one possible design, the communication device further includes a memory. The memory for storing the necessary program instructions and data, the processor may call the program code stored in the memory to instruct the communication device to perform the method of any of the above-described method embodiments. Of course, the memory may not be in the communication device. When the communication device is a chip system, the communication device may be composed of a chip, or may include a chip and other discrete devices, which is not specifically limited in this embodiment of the present application.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are all or partially generated upon loading and execution of computer program instructions on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or can comprise one or more data storage devices, such as a server, a data center, etc., that can be integrated with the medium. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others. In the embodiment of the present application, the computer may include the aforementioned apparatus.
While the present application has been described in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Although the present application has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations may be made thereto without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary of the present application as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the present application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
Claims (12)
1. A random access method, the method comprising:
a network device receives a plurality of first messages, each of the plurality of first messages comprising a first preamble;
the network equipment determines K timing advance TA values, wherein K is a positive integer greater than 1;
the network equipment sends a second message, wherein the second message comprises the K TA values, and a temporary cell radio network temporary identifier TC-RNTI and an uplink grant which correspond to each TA value in the K TA values, and resources indicated by the uplink grant corresponding to each TA value are different;
the network device receives a third message from the first terminal device on a resource indicated by an uplink grant corresponding to a first TA value, wherein the third message is scrambled by using a TC-RNTI corresponding to the first TA value, and the third message includes an identifier of the first terminal device, and the first TA value is one of the K TA values;
and the network equipment sends a fourth message to the first terminal equipment, wherein the fourth message comprises access resources distributed by the network equipment, a downlink data channel for bearing the fourth message is scheduled by Downlink Control Information (DCI), and the DCI is scrambled by adopting TC-RNTI corresponding to the first TA value.
2. The method of claim 1, wherein the fourth message further comprises a Contention Resolution Identification (CRID) indicating a terminal device that successfully contends.
3. The method of claim 1 or 2, wherein the network device determines K TA values, comprising:
the network equipment inputs signals carrying the plurality of first messages into a first neural network to obtain the number of terminal equipment using the first lead codes;
and the network equipment inputs the number of the terminal equipment and the signals bearing the plurality of first messages into a second neural network to obtain the K TA values.
4. A random access method, the method comprising:
a first terminal device sends a first message to a network device, wherein the first message comprises a first lead code;
the first terminal equipment receives a second message from the network equipment, wherein the second message comprises K TA values, and a temporary cell radio network temporary identifier TC-RNTI and an uplink authorization corresponding to each TA value in the K TA values, resources indicated by the uplink authorization corresponding to each TA value are different, and K is a positive integer greater than 1;
the first terminal equipment determines a first TA value from the K TA values;
the first terminal device sends a third message to the network device on the resource indicated by the uplink grant corresponding to the first TA value, wherein the third message is scrambled by using a TC-RNTI corresponding to the first TA value, and the third message includes an identifier of the first terminal device;
and the first terminal equipment receives a fourth message from the network equipment according to the TC-RNTI corresponding to the first TA value, wherein the fourth message comprises the access resource allocated by the network equipment.
5. The method of claim 4, wherein the first terminal device determines a first TA value from the K TA values, comprising:
the first terminal equipment determines a reference TA value according to historical TA information of the first terminal equipment;
and the first terminal equipment determines the TA value closest to the reference TA value in the K TA values as the first TA value.
6. The method of claim 4, wherein the first terminal device determines a first TA value from the K TA values, comprising:
the first terminal equipment randomly selects one TA value from the K TA values;
and the first terminal equipment determines the randomly selected TA value as the first TA value.
7. The method of any of claims 4-6, wherein the fourth message further comprises: a contention resolution identity, CRID;
if the CRID corresponds to the identifier of the first terminal equipment, the first terminal equipment sends an Acknowledgement (ACK) to the network equipment on the access resource; or,
and if the CRID does not correspond to the identifier of the first terminal equipment, the first terminal equipment terminates random access or switches to next random access.
8. A communication apparatus, characterized in that the communication apparatus comprises: a transceiver module and a processing module;
the transceiver module is configured to receive a plurality of first messages, each of the plurality of first messages including a first preamble;
the processing module is used for determining K timing advance TA values, wherein K is a positive integer greater than 1;
the transceiver module is further configured to send a second message, where the second message includes the K TA values, and a temporary cell radio network temporary identifier TC-RNTI and an uplink grant corresponding to each TA value of the K TA values, and resources indicated by the uplink grant corresponding to each TA value are different;
the transceiver module is further configured to receive a third message from the first terminal device on a resource indicated by the uplink grant corresponding to the first TA value, where the third message is scrambled by using a TC-RNTI corresponding to the first TA value, and the third message includes an identifier of the first terminal device, where the first TA value is one of the K TA values;
the transceiver module is further configured to send a fourth message to the first terminal device, where the fourth message includes an access resource allocated by the communication apparatus, and a downlink data channel carrying the fourth message is scheduled by downlink control information DCI, where the DCI is scrambled by using TC-RNTI corresponding to the first TA value.
9. A communication device according to claim 8, wherein the communication device is configured to implement the method of claim 2 or 3.
10. A communication apparatus, characterized in that the communication apparatus comprises: the device comprises a receiving and sending module and a processing module;
the transceiver module is configured to send a first message to a network device, where the first message includes a first preamble;
the transceiver module is further configured to receive a second message from the network device, where the second message includes K TA values, and a temporary cell radio network temporary identifier TC-RNTI and an uplink grant corresponding to each TA value of the K TA values, where resources indicated by the uplink grant corresponding to each TA value are different, and K is a positive integer greater than 1;
the processing module is configured to determine a first TA value from the K TA values;
the transceiver module is further configured to send a third message to the network device on the resource indicated by the uplink grant corresponding to the first TA value, where the third message is scrambled by using the TC-RNTI corresponding to the first TA value, and the third message includes an identifier of the communication apparatus;
the transceiver module is further configured to receive a fourth message from the network device according to the TC-RNTI corresponding to the first TA value, where the fourth message includes an access resource allocated by the network device.
11. The communication device according to claim 10, wherein the communication device is configured to implement the method according to any one of claims 5 to 7.
12. A computer-readable storage medium comprising instructions that, when executed on a communication apparatus, cause the communication apparatus to perform the method of any of claims 1-3 or cause the communication apparatus to perform the method of any of claims 4-7.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910364173.4A CN111867135B (en) | 2019-04-30 | 2019-04-30 | Random access method, device and system |
PCT/CN2020/087845 WO2020221310A1 (en) | 2019-04-30 | 2020-04-29 | Random access method, apparatus, and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910364173.4A CN111867135B (en) | 2019-04-30 | 2019-04-30 | Random access method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111867135A CN111867135A (en) | 2020-10-30 |
CN111867135B true CN111867135B (en) | 2022-11-18 |
Family
ID=72965199
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910364173.4A Active CN111867135B (en) | 2019-04-30 | 2019-04-30 | Random access method, device and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111867135B (en) |
WO (1) | WO2020221310A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023159624A1 (en) * | 2022-02-28 | 2023-08-31 | 北京小米移动软件有限公司 | Uplink transmission method and device, and storage medium |
WO2023225788A1 (en) * | 2022-05-23 | 2023-11-30 | Oppo广东移动通信有限公司 | Wireless communication methods, terminal devices, and network devices |
CN115333910B (en) * | 2022-08-10 | 2024-01-23 | 广东电网有限责任公司江门供电局 | Inter-frame interference continuous elimination method and related device for power line network random access |
CN118250686A (en) * | 2022-12-23 | 2024-06-25 | 大唐移动通信设备有限公司 | Information processing method, device and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103369701A (en) * | 2012-03-29 | 2013-10-23 | 京信通信系统(中国)有限公司 | A random access method and apparatus |
CN103379656A (en) * | 2012-04-13 | 2013-10-30 | 普天信息技术研究院有限公司 | Random access method and related device |
CN107534998A (en) * | 2015-05-20 | 2018-01-02 | 华为技术有限公司 | MTC device cut-in method, base station and system |
CN112075118A (en) * | 2020-08-05 | 2020-12-11 | 北京小米移动软件有限公司 | Random access method, device, equipment and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101772189A (en) * | 2009-01-04 | 2010-07-07 | 华为技术有限公司 | Message processing method and user equipment |
US9088971B2 (en) * | 2011-12-23 | 2015-07-21 | Blackberry Limited | Method implemented in a user equipment |
JP2017017487A (en) * | 2015-06-30 | 2017-01-19 | 富士通株式会社 | Base station, communication system, and processing method for base station |
CN106102182B (en) * | 2016-06-07 | 2019-02-19 | 北京交通大学 | Nonopiate accidental access method |
CN108260108B (en) * | 2018-01-16 | 2020-11-17 | 重庆邮电大学 | Non-orthogonal narrowband Internet of things NB-IoT random access method |
-
2019
- 2019-04-30 CN CN201910364173.4A patent/CN111867135B/en active Active
-
2020
- 2020-04-29 WO PCT/CN2020/087845 patent/WO2020221310A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103369701A (en) * | 2012-03-29 | 2013-10-23 | 京信通信系统(中国)有限公司 | A random access method and apparatus |
CN103379656A (en) * | 2012-04-13 | 2013-10-30 | 普天信息技术研究院有限公司 | Random access method and related device |
CN107534998A (en) * | 2015-05-20 | 2018-01-02 | 华为技术有限公司 | MTC device cut-in method, base station and system |
CN112075118A (en) * | 2020-08-05 | 2020-12-11 | 北京小米移动软件有限公司 | Random access method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2020221310A1 (en) | 2020-11-05 |
CN111867135A (en) | 2020-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111867135B (en) | Random access method, device and system | |
CN109392188B (en) | Random access method, equipment and system | |
US11817967B2 (en) | Network access method and apparatus, and storage medium | |
CN112351450B (en) | Beam failure recovery method, device and system | |
CN111586882B (en) | Random access method, device and system | |
CN109417778B (en) | Electronic device and method for wireless communication | |
RU2765993C2 (en) | Transmission device, receiving device, transmission method, receiving method and information carrier | |
US20220150956A1 (en) | Method and apparatus for resource determination | |
US20200037366A1 (en) | Electronic device in wireless communication system, and wireless communication method | |
CN110859003A (en) | Method and device for determining uplink resources | |
JP7445607B2 (en) | Communication devices, communication methods and integrated circuits | |
CN110149294B (en) | Synchronous signal block transmission method, communication device and communication equipment | |
US20210136804A1 (en) | Method and device for transmitting signal | |
US20240032096A1 (en) | Methods and apparatus for sidelink resource exclusion for intra-device coordination in wireless communication | |
CN114616911B (en) | Method for transmitting HARQ response information, method and device for receiving HARQ response information | |
US20220264653A1 (en) | Method and apparatus for transmitting an uplink signal in a wireless communication system | |
CN111478757A (en) | RA-RNTI processing method and device | |
WO2021162709A1 (en) | Synchronization priority for sidelink wireless communications | |
KR102319838B1 (en) | Apparatus and method for random access for massive connectivity | |
CN113439463A (en) | Terminal and communication method | |
CN116803141A (en) | Wireless communication method, terminal equipment and network equipment | |
EP3952538A1 (en) | Communication method, device and system | |
CN112020129A (en) | Data transmission method, device and system | |
US12143995B2 (en) | Multiplexing uplink control information (UCI) on physical uplink shared channel (PUSCH) | |
US20230362937A1 (en) | Multiplexing uplink control information (uci) on physical uplink shared channel (pusch) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |