CN112788712A - Detection method of random access response RAR, terminal equipment and network equipment - Google Patents
Detection method of random access response RAR, terminal equipment and network equipment Download PDFInfo
- Publication number
- CN112788712A CN112788712A CN201911067632.9A CN201911067632A CN112788712A CN 112788712 A CN112788712 A CN 112788712A CN 201911067632 A CN201911067632 A CN 201911067632A CN 112788712 A CN112788712 A CN 112788712A
- Authority
- CN
- China
- Prior art keywords
- dci
- rar
- random access
- target
- rar window
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000004044 response Effects 0.000 title claims abstract description 55
- 238000001514 detection method Methods 0.000 title claims abstract description 29
- 238000000034 method Methods 0.000 claims abstract description 115
- 238000004590 computer program Methods 0.000 claims description 28
- 230000006870 function Effects 0.000 claims description 21
- 230000005540 biological transmission Effects 0.000 claims description 16
- 238000004364 calculation method Methods 0.000 claims description 15
- 230000009286 beneficial effect Effects 0.000 abstract 1
- 230000005611 electricity Effects 0.000 abstract 1
- 101100533725 Mus musculus Smr3a gene Proteins 0.000 description 8
- 101100274486 Mus musculus Cited2 gene Proteins 0.000 description 7
- 101150096622 Smr2 gene Proteins 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
- H04W74/006—Transmission of channel access control information in the downlink, i.e. towards the terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a detection method of a Random Access Response (RAR), a terminal device and a network device, wherein the method comprises the following steps: after sending a random access request message to the network equipment, starting an RAR window to detect RAR sent by the network equipment; and if the first downlink control information DCI is detected, scrambling the first DCI by using a target radio network temporary identifier RNTI and carrying first system frame number SFN information, wherein the target RNTI is related to a random access opportunity (RO) for sending a random access request message, and determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI. The embodiment of the invention is beneficial to saving electricity and power consumption of the terminal equipment and reducing the random access time delay.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to a detection method for a random access response RAR, a terminal device, and a network device.
Background
Currently, in a wireless communication system, a User Equipment (UE) (also referred to as a terminal device) needs to establish a connection with a network device, and this process is generally referred to as a Random Access (Random Access) process. In a New Radio (NR) system, the Random Access procedure is divided into Contention and non-Contention, and includes a 4-step Contention-Based Random Access (CBRA) procedure, a 4-step non-Contention Random Access (CFRA) procedure, a 2-step Random Access Channel (RACH), and a 2-step CFRA.
In the Random Access process, the UE needs to send a Random Access request message to a network device (e.g., a base station gNB), where the Random Access request message may be defined as message 1 or message a (Msg1/Msg a), and then the UE needs to monitor a downlink channel in an entire Random Access Response window (RAR-window) or an MsgB receiving window (MsgB-reception window) to receive a network device issuing an RAR, and the RAR message may be defined as message 2 or message B (Msg2/Msg B). As shown in fig. 1, specifically:
(1) the UE selects a Random Access request resource and sends a Random Access request message, namely Msg1/MsgA, to the Network equipment by using the resource, and calculates a Random Access Radio Network Temporary Identifier (RA-RNTI) according to the resource time-frequency position or calculates the MsgB-RNTI according to the resource time-frequency position and the Random Access type. After the Msg1/MsgA is sent, an RAR-window or an MsgB-playback window is started.
(2) During the RAR window or MsgB-playback window operation, the UE always listens to a Physical Downlink Control Channel (PDCCH) scrambled with the RA-RNTI or MsgB-RNTI, and the PDCCH may schedule a Physical Downlink Shared Channel (PDSCH).
In addition, the maximum value of RAR window or MsgB-reception window is extended to 40ms in a new 5-Generation New radio in Unlicensed Spectrum (5G NR-U) scene or a 2-step RACH scene, etc., of the Unlicensed Spectrum. As can be seen from the above, the UE may monitor the PDCCH all the time during the operation of the window, which obviously results in relatively large power consumption of the UE. Moreover, due to channel fading, there may be a case that the network side does not correctly receive the random access request message, and at this time, the UE may not receive the RAR message matched with the random access request message sent by the UE during the window operation period, that is, until the window is overtime, the UE must monitor the PDCCH, and cannot perform the next RACH attempt in time, which causes unnecessary energy loss and increases access delay.
Disclosure of Invention
One of the technical problems solved by the embodiment of the invention is that in the existing RAR monitoring process, the power consumption of the terminal equipment is large and the random access time is prolonged.
In a first aspect, an embodiment of the present invention provides a method for detecting a random access response RAR, which is applied to a terminal device, and the method includes:
after sending a random access request message to a network device, starting an RAR window to detect RAR sent by the network device;
and if first Downlink Control Information (DCI) is detected, scrambling the first DCI by using a target Radio Network Temporary Identifier (RNTI) and carrying first System Frame Number (SFN) information, wherein the target RNTI is related to a random access opportunity (RO) for sending the random access request message, determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI.
In a second aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes:
the detection module is used for starting an RAR window after sending a random access request message to network equipment so as to detect RAR sent by the network equipment;
a determining module, configured to determine, if a first downlink control information DCI is detected, where the first DCI uses a target radio network temporary identifier RNTI for scrambling and carries first system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message, whether to stop detecting the RAR during an RAR window operation period according to the first DCI.
In a third aspect, an embodiment of the present invention provides a terminal device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a fourth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present invention provides a method for detecting a random access response RAR, which is applied to a network device, and the method includes:
generating target Downlink Control Information (DCI) after receiving a random access request message sent by terminal equipment, wherein the target DCI uses a target Radio Network Temporary Identifier (RNTI) for scrambling and carries System Frame Number (SFN) information, and the target RNTI is related to a random access opportunity (RO) for sending the random access request message;
and during the operation period of the RAR window, sending the target DCI to the terminal equipment, wherein the target DCI is used for the terminal equipment to determine whether to stop detecting the RAR sent by the network equipment during the operation period of the RAR window.
In a sixth aspect, an embodiment of the present invention provides a network device, where the network device includes:
a generating module, configured to generate target downlink control information DCI after receiving a random access request message sent by a terminal device, where the target DCI uses a target radio network temporary identifier RNTI for scrambling and carries system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message;
and a sending module, configured to send the target DCI to the terminal device during an RAR window operation period, where the target DCI is used for the terminal device to determine whether to stop detecting the RAR sent by the network device during the RAR window operation period.
In a seventh aspect, an embodiment of the present invention provides a network device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the second aspect.
In an eighth aspect, the embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the steps of the method according to the second aspect.
In the embodiment of the invention, in the random access process of establishing connection between the terminal equipment and the network equipment, after the terminal equipment sends a random access request message to the network equipment, an RAR window is started, and whether the RAR matched with the sent random access request message can be received or not is detected during the operation period of the RAR window, namely before the RAR window is overtime, so as to determine whether the random access process is successful or not; further, if, during the RAR window operation period, a first downlink control information DCI loaded with a target radio network temporary identifier RNTI and carrying first system frame number SFN indication information is detected, where the first RNTI is related to a random access opportunity RO for sending a random access request message, it may be determined, as the case may be, whether to continue detecting RAR during the RAR window operation period according to the first DCI. Therefore, whether the process of continuously detecting the RAR is stopped or not is determined according to the detected DCI during the operation period of the RAR window in the random access process, the RAR detection can be stopped in time during the operation period of the RAR window when corresponding conditions are met, and compared with the existing random access process that the RAR is still required to be detected until the RAR window is overtime during the operation period of the whole RAR window under the condition that the RAR matched with the sent random access request cannot be received, the power saving and the power consumption saving of the terminal equipment are facilitated, and meanwhile, the random access time delay is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a flow diagram of a random access procedure;
fig. 2 is a flowchart illustrating a method for detecting a random access response RAR according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a second method for detecting a random access response RAR according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal device in an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a network device in an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a second terminal device in the embodiment of the present invention;
fig. 7 is a schematic structural diagram of a second network device in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical scheme of the invention can be applied to various communication systems, such as: global System for Mobile communications (GSM), Code Division Multiple Access (CDMA) System, Wideband Code Division Multiple Access (WCDMA), General Packet Radio Service (GPRS), Long Term evolution/enhanced Long Term evolution (LTE-a), NR, and the like.
User equipments, which may be Terminal equipments such as Mobile phones (or "cellular" phones) and computers with Terminal equipments, for example, portable, pocket, hand-held, computer-included or vehicle-mounted Mobile devices, may communicate with one or more core networks via a Radio Access Network (RAN), and may exchange languages and/or data with the Radio Access Network.
The network device, which may also be referred to as a Base Station, may be a Base Transceiver Station (BTS) in GSM or CDMA, a Base Station (NodeB) in WCDMA, an evolved Node B (eNB or e-NodeB) in LTE, and a 5G Base Station (gNB), and the embodiments of the present invention are not limited thereto, but for convenience of description, the following embodiments use the gNB as an example for description.
The technical solutions provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Referring to fig. 2, an embodiment of the present invention provides a method for detecting a random access response RAR, which is executed by a terminal device, and includes the following steps:
step 101: after sending the random access request message to the network device, an RAR window is started to detect RAR sent by the network device.
Optionally, the random access response RAR sent by the network device and corresponding to the random access request message includes: scheduling a PDCCH carrying the random access response message Msg2, a PDSCH carrying the random access response message Msg2, a PDCCH carrying the random access response message MsgB, or a PDSCH carrying the random access response message MsgB. Where Msg2 corresponds to a 4-step random access procedure and MsgB corresponds to a 2-step random access procedure.
Step 103: and if the first downlink control information DCI is detected, scrambling the first DCI by using a target radio network temporary identifier RNTI and carrying first system frame number SFN information, wherein the target RNTI is related to a random access opportunity (RO) for sending a random access request message, and determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI.
In the embodiment of the invention, in the random access process of establishing connection between the terminal equipment and the network equipment, after the terminal equipment sends a random access request message to the network equipment, an RAR window is started, and whether the RAR matched with the sent random access request message can be received or not is detected during the operation period of the RAR window, namely before the RAR window is overtime, so as to determine whether the random access process is successful or not; further, if, during the RAR window operation period, first downlink control information DCI loaded with a target radio network temporary identifier RNTI and carrying indication information of a first System Frame Number (SFN) is detected, where the first RNTI is associated with a Random Access opportunity (RO) for sending a Random Access request message, it may be determined, as the case may be, whether to continue detecting RAR during the RAR window operation period according to the first DCI. Therefore, whether the process of continuously detecting the RAR is stopped or not is determined according to the detected DCI during the operation period of the RAR window in the random access process, the RAR detection can be stopped in time during the operation period of the RAR window when corresponding conditions are met, and compared with the existing random access process that the RAR is still required to be detected until the RAR window is overtime during the operation period of the whole RAR window under the condition that the RAR matched with the sent random access request cannot be received, the power saving and the power consumption saving of the terminal equipment are facilitated, and meanwhile, the random access time delay is reduced.
Optionally, the target RNTI includes RA-RNTI or MsgB-RNTI. Specifically, the target RNTI is calculated by the terminal device according to a time-frequency position or a random access type corresponding to the random access opportunity RO for sending the random access request message.
In the method for detecting a random access response RAR according to the embodiment of the present invention, for step 103, the specific procedure of determining whether to stop detecting the RAR during the RAR window operation may also be different, depending on the specific content of the first DCI.
Detailed description of the preferred embodiment
In this specific embodiment one, the first DCI further carries a target indication, where the target indication is used to indicate whether the terminal device stops detecting the RAR.
In this embodiment, whether to stop detecting RAR may be directly determined based on one target indication newly added in the first DCI scrambled using the target RNTI, so as to further save power consumption of the terminal device.
Further, the step of determining whether to stop detecting the RAR during the RAR window operation according to the first DCI in step 103 may specifically be performed as follows:
judging whether the second SFN information is matched with the first SFN information in the first DCI, wherein the value of the second SFN information is an SFN corresponding to a system frame where an RO for sending the random access request message is located;
and if the second SFN information is matched with the first SFN information and the target indication in the first DCI indicates that the terminal equipment stops detecting the RAR, determining that the RAR stops detecting the RAR during the operation period of the RAR window.
It can be understood that when it is determined that the first SFN information carried in the first DCI is matched with the second SFN information corresponding to the random access request message and simultaneously carries the target indication, and the target indication indicates to stop detecting the RAR, the RAR is stopped in time during the operation of the RAR window, so as to save power consumption of the terminal device and reduce the random access delay. The value of the second SFN information specifically refers to a frame number of a system frame where the RO for transmitting the random access request message is located.
Optionally, in this specific embodiment, the following may also be included:
if the second SFN information is not matched with the first SFN information, continuously detecting PDCCH candidate Candidates on the search space where the first DCI is currently detected;
and if the second DCI is detected, using the second DCI as a new first DCI to determine whether to stop detecting the RAR during the operation period of the RAR window according to the new first DCI.
It can be understood that, considering a case that the network device transmits multiple DCIs in one time slot, when it cannot be determined whether to stop detecting the RAR during the RAR window operation based on the first DCI, the PDCCH candidate Candidates are further detected continuously on the search space where the first DCI is currently detected, and when other DCI (i.e., the second DCI which can be the new first DCI) transmitted by the network device during the current time slot can be detected, the operation of determining whether to stop detecting the RAR during the RAR window operation based on the DCI is repeated. Specifically, when the second SFN information matches the detected SFN information in the second DCI and the target indication in the second DCI indicates the terminal device to stop detecting the RAR, it is determined to stop detecting the RAR during the RAR window operation period; otherwise, when the SFN information does not match the detected SFN information in the second DCI, the operation of continuously detecting the PDCCH Candidates on the search space where the first DCI is currently detected is repeated.
Further, if no new first DCI is detected in the current time slot corresponding to the search space in which the first DCI is detected, the RAR may be continuously detected in the search space of the next period until it is determined that the RAR detection is stopped during the RAR window operation or until the RAR window times out.
Optionally, in this specific embodiment, the number of DCIs that can be processed by the terminal device in one slot is determined by protocol specification or based on capability information of the terminal device.
Optionally, in this specific embodiment, the step of determining whether the second SFN information matches the first SFN information in the first DCI may specifically be implemented as the following:
judging whether the value of the first SFN information is equal to the calculation result of running a remainder function on the value of the second SFN information and a target value, wherein the target value is specified by a protocol or configured by network equipment;
if so, determining that the second SFN information is matched with the first SFN information;
if not, determining that the second SFN information is not matched with the first SFN information.
In this specific embodiment, according to the magnitude relationship between the value of the first SFN information and the calculation result of the running remainder function on the value of the second SFN information and the target value, whether the first SFN information carried in the first DCI matches with the second SFN information corresponding to the random access request information may be accurately determined.
For the first embodiment, for example, an indication, that is, a target indication, is newly added in the DCI format 1_0 scrambled by the RA-RNTI or the MsgB-RNTI, where the indication is used to tell the UE whether to stop detecting RAR, and specifically, when a bit value corresponding to the target indication is "1", the indication indicates that the UE stops detecting RAR.
Further, the UE selects a random access resource to send the random access request message Msg1/MsgA in a system frame with a system frame number x (i.e., a system frame corresponding to the second SFN information), and may set an RA-RNTI/MsgB-RNTI ═ n calculated based on a time-frequency position of the random access resource (i.e., an RO of the random access request message) or a random access type (i.e., a 4-step RACH or a 2-step RACH) at this time, and start an RAR window/MsgB reception window (i.e., an RAR window).
Further, during the RAR window operation, the UE attempts to detect a PDCCH scrambled by RA-RNTI ═ n, if the UE detects a PDCCH scrambled by RA-RNTI ═ n and the SFN (i.e., the value of the first SFN information) indicated by the SFN information in the DCI is y. Further, if y is mod (x,4) and the indication bit (i.e., the target indication) in the DCI indicates to stop detecting RAR windows, the UE determines to stop detecting RAR before the RAR windows timeout, i.e., during operation.
The mod represents a remainder function, and the target value is preferably 4, but may be configured to be other specific values by protocol convention or network equipment.
Detailed description of the invention
In this embodiment two, the scheme of determining whether to stop detecting RAR during the RAR window operation according to the first DCI in step 103 may specifically be implemented as follows:
and if the response RO position corresponding to the first SFN information in the first DCI is located behind the RO position for sending the random access request message in the time domain, determining to stop detecting the RAR during the operation period of the RAR window.
It can be understood that, in the case that the first DCI does not carry an indication directly indicating whether the UE stops detecting RAR, whether to stop detecting RAR during the RAR window operation may be determined according to the first SFN information carried in the first DCI. Specifically, when it is determined that the response RO location corresponding to the first SFN information in the first DCI is located after the RO location for sending the random access request message in the time domain, it may be determined to stop detecting the RAR during the RAR window operation, so as to save power consumption of the terminal device and reduce the random access delay.
Optionally, in this specific embodiment, the first DCI is a time period [ T ] for the terminal device1+A×C,T1+A×D]Internally detected, T1Time to initiate a RAR window.
For example, the UE is at T0Sending a random access request message to the network device at a moment, then it can be at T1(T0Is less than T1Value of) time to startAnd moving an RAR window to detect RAR sent by the network equipment.
Further, in this specific embodiment, on the one hand, it may be determined whether the response RO location corresponding to the first SFN information is located after the RO location for sending the random access request message in the time domain, that is, in the case of receiving one DCI:
if the value of the first SFN information in the first DCI is equal to the calculation result of the running remainder function for (x + M) and N, determining that a response RO location corresponding to the first SFN information is located behind the RO location for sending the random access request message in the time domain;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1, N-1 ]]Any natural number in D is [2, N ]]Any natural number in the above, M is [1, C ]]Any natural number in the table, the value of N is specified by a protocol or configured by network equipment, and the values of C and D enable T1+A×C≤T1+ A × D holds.
It can be understood that, when the value of the first SFN information is equal to the calculation result of the running remainder function for (x + M) and N, it may be determined that the response RO location corresponding to the first SFN information in the first DCI is located after the RO location for sending the random access request message in the time domain, and then it may be determined that the RAR is stopped being detected during the RAR window running, so as to save the power consumption of the terminal device and reduce the random access delay.
Optionally, the frame length of a system frame (or radio frame) in the NR system may be taken as a ═ 10 ms; n represents the length of the RAR window, which may be specifically in units of system frames, where the value of N is preferably 4 (i.e. the RAR window length is 40ms, which is equal to the duration of 4 system frames), and the value of C, D is such that T is equal to the duration of 4 system frames1+A×C≤T1The + a × D holds (e.g., C ═ 1, D ═ 2).
For example, the UE selects a random access resource from a system frame with a system frame number x (i.e., a system frame corresponding to the second SFN information) to send the random access request message Msg1/MsgA, and may set RA-RNTI/MsgB-RNTI ═ n calculated based on a time-frequency position of the random access resource (i.e., RO of the random access request message) or a random access type (i.e., 4-step RACH or 2-step RACH) at this time, the UE starts an RAR window/MsgB reception window (i.e., RAR window), and the RAR window length is 40 ms.
Further, during the RAR window operation, the UE attempts to detect a PDCCH scrambled by RA-RNTI ═ n, if the UE detects a PDCCH scrambled by RA-RNTI ═ n and the SFN (i.e., the value of the first SFN information) indicated by the SFN information in the DCI is y. Further, the UE may determine, according to the y, according to a rule predefined by a protocol or by depending on the UE itself, whether the system frame corresponding to the SFN information received in the PDCCH is after the system frame where the Msg1/MsgA is sent by the UE in the time domain.
Wherein if y occupies a bit length of 2 (i.e. y may have a value of 0,1,2,3), the rules predefined by the protocol or the algorithm implemented by the UE itself are: if any one of the following conditions is satisfied, the system frame SFN corresponding to the SFN received in the PDCCH is considered to be after the system frame SFN where the UE sends Msg1/MsgA in the time domain:
(1) if the UE is in time period T1+A,T1+A×2]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI ═ N, and y ═ mod (x +1,4), wherein N is 4, C is 1, D is 2, and M is 1;
(2) if the UE is in time period T1+A×2,T1+A×3]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI ═ N, and y ═ mod (x +2,4) or y ═ mod (x +1,4), where N takes a value of 4, C takes a value of 2, D takes a value of 3, and M takes a value of 1 or 2;
(3) if the UE is in time period T1+A×3,T1+A×4]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI ═ N, and y ═ mod (x +3,4) or y ═ mod (x +2,4) or y ═ mod (x +1,4), where N takes a value of 4, C takes a value of 3, D takes a value of 4, and M takes a value of 1,2, or 3;
the mod represents the value of the modulo function N, and may be configured to other specific values by a protocol convention or a network device.
Wherein, if the bit length occupied by y is 3 (i.e. the value of y may be 0,1,2,3,4,5,6,7), the rules predefined by the protocol or the algorithm implemented by the UE itself are: if any one of the following conditions is satisfied, the system frame SFN corresponding to the SFN received in the PDCCH is considered to be after the system frame SFN where the UE sends Msg1/MsgA in the time domain:
(1) if the UE is in time period T1+A,T1+A×4]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI ═ N, and y ═ mod (x +1,8), wherein N is 8, C is 1, D is 4, and M is 1;
(2) if the UE is in time period T1+A×2,T1+A×4]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI ═ N, and y ═ mod (x +2,8), wherein N is 8, C is 2, D is 4, and M is 2;
(3) if the UE is in time period T1+A×3,T1+A×4]Detecting a PDCCH scrambled by RA-RNTI/MsgB-RNTI ═ N, and y ═ mod (x +3,8), wherein N is 8, C is 3, D is 4, and M is 3;
the mod represents the value of the modulo function N, and may be configured to other specific values by a protocol convention or a network device.
Further, in this embodiment, on the other hand, it may also be determined whether the response RO location corresponding to the first SFN information is located after the RO location for sending the random access request message in the time domain, that is, in the case of receiving multiple DCIs:
if the value of the first SFN information in the first DCI is equal to the calculation result of the operation of the complementation function for (x + M) and N, continuously detecting PDCCH Candidates Candidates in the search space where the first DCI is currently detected;
if at least one third DCI is detected, under the condition that the value of the third SFN information in each third DCI in the at least one third DCI is equal to the calculation result of the (x + M) and N running remainder function, determining that the response RO position corresponding to the first SFN information is positioned behind the RO position for sending the random access request message in the time domain;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1, N-1 ]]Taking any natural number in DA value of [2, N]Any natural number in the above, M is [1, C ]]Any natural number in, the value of N being specified by the protocol or configured by the network device, the value of C, D being such that T is1+A×C≤T1+ A × D holds.
It can be understood that, considering that the network device transmits a plurality of DCIs (i.e. the first DCI and the at least one third DCI) in one time slot, when the values of SFN information in all DCIs detected in one time slot are equal to the calculation result of the running remainder function for (x + M) and N, it is determined that the response RO position corresponding to the first SFN information is located after the RO position for transmitting the random access request message in the time domain, and it is further determined that the RAR is stopped during the RAR window running, so as to save the power consumption of the terminal device and reduce the random access delay.
Optionally, the frame length of a system frame (or radio frame) in the NR system may be taken as a ═ 10 ms; n represents the length of the RAR window, which may be specifically in units of system frames, where the value of N is preferably 4 (i.e. the RAR window length is 40ms, which is equal to the duration of 4 system frames), and the value of C, D is such that T is equal to the duration of 4 system frames1+A×C≤T1The + a × D holds (e.g., C ═ 1, D ═ 2).
Optionally, in this specific embodiment, the number of DCIs that can be processed by the terminal device in one slot is determined by protocol specification or based on capability information of the terminal device.
Optionally, in any of the above embodiments, the step of determining to stop detecting RAR during the RAR window operation may be specifically performed as follows:
it is determined to stop the RAR window early during the RAR window running.
It can be understood that the RAR detection is stopped in time by stopping the RAR window, that is, the RAR window is stopped in time to prepare for the next attempt of random access to reduce the random access delay when the RAR message/MsgB reception is unsuccessful or the 2-step RACH/2-step CFRA is not completed.
Optionally, in any of the above embodiments, the step of determining to stop detecting RAR during the RAR window operation may be specifically performed as follows:
when a Physical PHY Layer (Physical Layer) of a terminal device transmits an instruction to a Medium Access Control (MAC) Layer, it is determined to stop an RAR window during an RAR window operation period.
Further, when determining to stop detecting RAR during the RAR window operation period, the PHY layer of the UE sends an instruction to the MAC layer, instructing the MAC layer to stop the RAR window in advance during the RAR window operation period, and when receiving the instruction, the MAC layer stops the operating RAR window in advance. Further, optionally, in any of the above specific embodiments, the following may also be included: and performing self-adding 1 operation on the target transmission counter.
It can be understood that, under the condition that the RAR message/MsgB reception is unsuccessful or the 2-step RACH/2-step CFRA is not completed, after the RAR window is stopped in time, that is, the RAR detection is stopped in time, the operation of self-adding 1 may be performed on the target transmission counter to attempt to enter the next random access, so as to reduce the random access delay.
Optionally, the target transmission counter (transmission counter) may include a preamble transmission counter, an MsgA Physical Random Access Channel (PRACH) transmission counter, or an MsgA Physical Uplink Shared Channel (PUSCH) transmission counter.
The MsgA transmission counter is used for counting the number of MsgA transmission times, the MsgA PRACH transmission counter is used for counting the number of MsgA PRACH transmission times, and the MsgA PUSCH transmission counter is used for counting the number of MsgAPUSCH transmission times.
As can be seen from the above, with the detection method of the random access response RAR according to the embodiment of the present invention, the next RACH attempt can be performed without waiting for the RAR window timeout, so that power saving of the UE is achieved, and the access delay is reduced.
Referring to fig. 3, an embodiment of the present invention provides a method for detecting a random access response RAR, which is executed by a network device, and includes the following steps:
step 201: after receiving a random access request message sent by a terminal device, generating target Downlink Control Information (DCI), wherein the target DCI uses a target Radio Network Temporary Identifier (RNTI) for scrambling and carries System Frame Number (SFN) indication information, and the target RNTI is related to a random access opportunity (RO) for sending the random access request message.
Optionally, the target RNTI includes RA-RNTI or MsgB-RNTI. Specifically, the target RNTI is calculated by the terminal device according to the random access opportunity RO for transmitting the random access request message.
Step 203: and during the operation period of the RAR window, sending the target DCI to the terminal equipment, wherein the target DCI is used for the terminal equipment to determine whether to stop detecting the RAR sent by the network equipment during the operation period of the RAR window.
In the embodiment of the present invention, in a random access process in which a terminal device and a network device establish a connection, after the network device receives a random access request message sent by the terminal device, a target DCI loaded with a target radio network temporary identifier RNTI and carrying system frame number SFN information may be generated, where the target RNTI is related to a random access RO for sending the random access request message, and in a process in which the terminal device detects whether a RAR matching the sent random access request message can be received during an RAR window operation period, that is, before the RAR window is overtime, to determine whether the random access process is successful, the target DCI is sent to the terminal device, so that the terminal device determines whether to continue to detect the RAR during the RAR window operation period according to the detected target DCI. Therefore, the target DCI is sent to the terminal equipment during the RAR window running period in the random access process, so that the terminal equipment determines whether to stop continuously detecting the RAR according to the target DCI detected during the RAR window running period, and when corresponding conditions are met, the detection of the RAR is stopped in time during the RAR window running period.
Optionally, the random access response RAR sent by the network device and corresponding to the random access request message includes: scheduling a PDCCH carrying the random access response message Msg2, a PDSCH carrying the random access response message Msg2, a PDCCH carrying the random access response message MsgB, or a PDSCH carrying the random access response message MsgB. Where Msg2 corresponds to a 4-step random access procedure and MsgB corresponds to a 2-step random access procedure.
Optionally, in the method for detecting a random access response RAR according to the embodiment of the present invention, the target DCI further carries a target indication, where the target indication is used to indicate whether a terminal device stops detecting the RAR.
Specifically, under the condition that the target DCI sent to the terminal device carries the target indication, the terminal device may determine that SFN information in the target DCI matches SFN information corresponding to a system frame where a random access opportunity RO that sends the random access request message is located, and when the target indication indicates that RAR detection is stopped, the RAR detection is stopped in time during an RAR window operation period, so as to save power consumption of the terminal device and reduce random access delay.
Further, there are a plurality of target DCIs sent to the terminal device, and the DCIs carry the target indication, but the terminal device determines that the detected SFN information in the first DCI does not match the SFN information corresponding to the system frame where the random access opportunity RO sending the random access request message is located, and may continue to detect PDCCH Candidates in the search space where the first DCI is currently detected, so as to repeatedly determine whether to stop detecting RARs during the RAR window operation according to the detection of a new DCI. The specific process may refer to corresponding content described in the embodiment of the detection method for a random access response RAR corresponding to fig. 2, and is not described herein again.
It should be further noted that, in the process of determining, by the terminal device, whether SFN information (i.e., first SFN information) in the target DCI matches SFN information (i.e., second SFN information) corresponding to a system frame where the random access opportunity RO that sends the random access request message is located, reference may be made to corresponding contents described in the above embodiment of the method for detecting a random access response RAR corresponding to fig. 2, which is not described herein again.
On the other hand, in the case that the target indication is not carried in the transmitted target DCI, the terminal device may determine whether to stop detecting RAR during the RAR window operation according to the SFN information carried in the target DCI. Specifically, the number of the target DCI may be one or more, and the terminal device may implement different determination processes according to different numbers of the target DCI. Specifically, when the terminal device determines that the response RO location corresponding to the first SFN information is located at the RO location for sending the random access request message in the time domain, it is determined to stop detecting the RAR before the RAR window runs overtime, so as to save the power consumption of the terminal device and reduce the random access delay.
It should be noted that, in the process of determining, by the terminal device, whether the response RO location corresponding to the first SFN information is located after the RO location sending the random access request message in the time domain, reference may be made to corresponding contents described in the detection method for a random access response RAR corresponding to fig. 2, which is not described herein again.
Optionally, in the detection method for a random access response RAR according to the embodiment of the present invention, the following may be further included:
and determining the number of the target DCI transmitted to the terminal equipment in one time slot according to protocol convention or the capability information of the terminal equipment.
As can be seen from the above, with the detection method of the random access response RAR according to the embodiment of the present invention, the next RACH attempt can be performed without waiting for the RAR window timeout, so that power saving of the UE is achieved, and the access delay is reduced.
Referring to fig. 4, an embodiment of the present invention provides a terminal device 300, where the terminal device 300 includes:
a detection module 301, configured to start an RAR window after sending a random access request message to a network device, so as to detect an RAR sent by the network device;
a determining module 303, configured to determine, if the first downlink control information DCI is detected, where the first DCI uses a target radio network temporary identifier RNTI for scrambling and carries first system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending a random access request message, whether to stop detecting RAR during an RAR window operation period according to the first DCI.
Optionally, in the terminal device 300 in the embodiment of the present invention, the first DCI further carries a target indication, where the target indication is used to indicate whether the terminal device stops detecting the RAR.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be specifically configured to:
judging whether the second SFN information is matched with the first SFN information in the first DCI, wherein the value of the second SFN information is an SFN corresponding to a system frame where an RO for sending the random access request message is located;
and if the second SFN information is matched with the first SFN information and the target indication in the first DCI indicates that the terminal equipment stops detecting the RAR, determining that the RAR stops detecting the RAR during the operation period of the RAR window.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be further configured to:
if the second SFN information is not matched with the first SFN information, continuously detecting PDCCH candidate Candidates on the search space where the first DCI is currently detected;
and if the second DCI is detected, using the second DCI as a new first DCI to determine whether to stop detecting the RAR during the operation period of the RAR window according to the new first DCI.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be further configured to:
judging whether the value of the first SFN information is equal to the calculation result of running a remainder function on the value of the second SFN information and a target value, wherein the target value is specified by a protocol or configured by network equipment;
if so, determining that the second SFN information is matched with the first SFN information;
if not, determining that the second SFN information is not matched with the first SFN information.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module may be specifically configured to:
and if the response RO position corresponding to the first SFN information in the first DCI is located behind the RO position for sending the random access request message in the time domain, determining to stop detecting the RAR during the operation period of the RAR window.
Optionally, in the terminal device 300 of the embodiment of the present invention, the first DCI is a time period [ T ] of the terminal device1+A×C,T1+A×D]Internally detected, T1The moment for starting the RAR window;
the determining module 303 may be further configured to:
if the value of the first SFN information in the first DCI is equal to the calculation result of the running remainder function for (x + M) and N, determining that a response RO location corresponding to the first SFN information is located behind the RO location for sending the random access request message in the time domain;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1, N-1 ]]Any natural number in D is [2, N ]]Any natural number in the above, M is [1, C ]]Any natural number in the table, the value of N is specified by a protocol or configured by network equipment, and the values of C and D enable T1+A×C≤T1+ A × D holds.
Optionally, in the terminal device 300 of the embodiment of the present invention, the first DCI is a time period [ T ] of the terminal device1+A×C,T1+A×D]Internally detected, T1The moment for starting the RAR window;
the determining module 303 may be further configured to:
if the value of the first SFN information in the first DCI is equal to the calculation result of the operation of the complementation function for (x + M) and N, continuously detecting PDCCH Candidates Candidates in the search space where the first DCI is currently detected;
if at least one third DCI is detected, under the condition that the value of the third SFN information in each third DCI in the at least one third DCI is equal to the calculation result of the (x + M) and N running remainder function, determining that the response RO position corresponding to the first SFN information is positioned behind the RO position for sending the random access request message in the time domain;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1, N-1 ]]Any natural number in (C), M is [1, C ]]Any natural number in D is [2, N ]]Any natural number within, the value of N being specified by the protocol or configured by the network device, the values of C and D being such that T1+A×C≤T1+ A × D holds.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the number of DCIs that the terminal device can process in one slot is determined by a protocol or based on capability information of the terminal device.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be further configured to:
it is determined to stop the RAR window early during the RAR window running.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the determining module 303 may be further configured to:
in the case where the physical PHY layer of the terminal device sends an instruction to the medium access control MAC layer, it is determined to stop the RAR window during the RAR window operation.
Optionally, the terminal device 300 according to the embodiment of the present invention may further include:
and the processing module is used for performing self-adding 1 operation on the target transmission counter.
It can be understood that the terminal device 300 provided in the embodiment of the present invention can implement the foregoing method for detecting a random access response RAR executed by the terminal device 300, and the related descriptions about the method for detecting a random access response RAR are applicable to the terminal device 300, and are not described herein again.
In the embodiment of the invention, in the random access process of establishing connection between the terminal equipment and the network equipment, after the terminal equipment sends a random access request message to the network equipment, an RAR window is started, and whether the RAR matched with the sent random access request message can be received or not is detected during the operation period of the RAR window, namely before the RAR window is overtime, so as to determine whether the random access process is successful or not; further, if, during the RAR window operation period, a first downlink control information DCI loaded with a target radio network temporary identifier RNTI and carrying first system frame number SFN indication information is detected, where the first RNTI is related to a random access opportunity RO for sending a random access request message, it may be determined, as the case may be, whether to continue detecting RAR during the RAR window operation period according to the first DCI. Therefore, whether the process of continuously detecting the RAR is stopped or not is determined according to the detected DCI during the operation period of the RAR window in the random access process, the RAR detection can be stopped in time during the operation period of the RAR window when corresponding conditions are met, and compared with the existing random access process that the RAR is still required to be detected until the RAR window is overtime during the operation period of the whole RAR window under the condition that the RAR matched with the sent random access request cannot be received, the power saving and the power consumption saving of the terminal equipment are facilitated, and meanwhile, the random access time delay is reduced.
Referring to fig. 5, an embodiment of the present invention provides a network device 400, where the network device 400 includes:
a generating module 401, configured to generate target downlink control information DCI after receiving a random access request message sent by a terminal device, where the target DCI uses a target radio network temporary identifier RNTI for scrambling and carries system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message;
a sending module 403, configured to send target DCI to the terminal device during the RAR window operation period, where the target DCI is used for the terminal device to determine whether to stop detecting the RAR sent by the network device during the RAR window operation period.
Optionally, in the network device 400 in the embodiment of the present invention, the target DCI further carries a target indication, where the target indication is used to indicate whether the terminal device stops detecting the RAR.
Optionally, the network device 400 according to the embodiment of the present invention may further include:
and the determining module is used for determining the number of the target DCI transmitted to the terminal equipment in one time slot according to the protocol convention or the capability information of the terminal equipment.
It can be understood that the network device 400 provided in the embodiment of the present invention can implement the foregoing detection method for the random access response RAR executed by the network device 400, and the related descriptions about the detection method for the random access response RAR are all applicable to the network device 400, and are not described herein again.
In the embodiment of the present invention, in a random access process in which a terminal device and a network device establish a connection, after the network device receives a random access request message sent by the terminal device, a target DCI loaded with a target radio network temporary identifier RNTI and carrying system frame number SFN information may be generated, where the target RNTI is related to a random access RO for sending the random access request message, and in a process in which the terminal device detects whether a RAR matching the sent random access request message can be received during an RAR window operation period, that is, before the RAR window is overtime, to determine whether the random access process is successful, the target DCI is sent to the terminal device, so that the terminal device determines whether to continue to detect the RAR during the RAR window operation period according to the detected target DCI. Therefore, the target DCI is sent to the terminal equipment during the RAR window running period in the random access process, so that the terminal equipment determines whether to stop continuously detecting the RAR according to the target DCI detected during the RAR window running period, and when corresponding conditions are met, the detection of the RAR is stopped in time during the RAR window running period.
Fig. 6 is a block diagram of a terminal device of another embodiment of the present invention. The terminal device 500 shown in fig. 6 includes: at least one processor 501, memory 502, at least one network interface 504, and a user interface 503. The various components in the terminal device 500 are coupled together by a bus system 505. It is understood that the bus system 505 is used to enable connection communications between these components. The bus system 505 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 505 in FIG. 6.
The user interface 503 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touch pad, or touch screen, among others.
It is to be understood that the memory 502 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 502 of the subject systems and methods described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 502 stores elements, executable modules or data structures, or a subset thereof, or an expanded set thereof as follows: an operating system 5021 and application programs 5022.
The operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 5022 includes various applications, such as a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services. The program for implementing the method according to the embodiment of the present invention may be included in the application program 5022.
In this embodiment of the present invention, the terminal device 500 further includes: a computer program stored on a memory 502 and executable on a processor 501, the computer program when executed by the processor 501 implementing the steps of:
after sending a random access request message to the network equipment, starting an RAR window to detect RAR sent by the network equipment;
and if the first downlink control information DCI is detected, scrambling the first DCI by using a target radio network temporary identifier RNTI and carrying first system frame number SFN information, wherein the target RNTI is related to a random access opportunity (RO) for sending a random access request message, and determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI.
The method disclosed by the above-mentioned embodiments of the present invention may be applied to the processor 501, or implemented by the processor 501. The processor 501 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 501. The Processor 501 may be a general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may reside in ram, flash memory, rom, prom, or eprom, registers, among other computer-readable storage media known in the art. The computer readable storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502 and performs the steps of the above method in combination with the hardware thereof. In particular, the computer readable storage medium has stored thereon a computer program, which when executed by the processor 501 implements the steps of the resource allocation method embodiments as described above.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions of the invention, or a combination thereof.
For a software implementation, the techniques of an embodiment of the invention may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions of the embodiments of the invention. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
In the embodiment of the invention, in the random access process of establishing connection between the terminal equipment and the network equipment, after the terminal equipment sends a random access request message to the network equipment, an RAR window is started, and whether the RAR matched with the sent random access request message can be received or not is detected during the operation period of the RAR window, namely before the RAR window is overtime, so as to determine whether the random access process is successful or not; further, if, during the RAR window operation period, a first downlink control information DCI loaded with a target radio network temporary identifier RNTI and carrying first system frame number SFN indication information is detected, where the first RNTI is related to a random access opportunity RO for sending a random access request message, it may be determined, as the case may be, whether to continue detecting RAR during the RAR window operation period according to the first DCI. Therefore, whether the process of continuously detecting the RAR is stopped or not is determined according to the detected DCI during the operation period of the RAR window in the random access process, the RAR detection can be stopped in time during the operation period of the RAR window when corresponding conditions are met, and compared with the existing random access process that the RAR is still required to be detected until the RAR window is overtime during the operation period of the whole RAR window under the condition that the RAR matched with the sent random access request cannot be received, the power saving and the power consumption saving of the terminal equipment are facilitated, and meanwhile, the random access time delay is reduced.
The terminal device 500 can implement the processes implemented by the terminal device in the foregoing embodiments, and in order to avoid repetition, the descriptions are omitted here.
Referring to fig. 7, fig. 7 is a structural diagram of a network device applied in the embodiment of the present invention, which can implement the details of the method for updating beam information and achieve the same effect. As shown in fig. 7, the network device 600 includes: a processor 601, a transceiver 602, a memory 603, a user interface 604, and a bus interface 605, wherein:
in this embodiment of the present invention, the network device 600 further includes: a computer program stored in the memory 603 and executable on the processor 601, the computer program when executed by the processor 601 performing the steps of:
generating target Downlink Control Information (DCI) after receiving a random access request message sent by terminal equipment, wherein the target DCI uses a target Radio Network Temporary Identifier (RNTI) for scrambling and carries System Frame Number (SFN) information, and the target RNTI is related to a random access opportunity (RO) for sending the random access request message;
and during the operation period of the RAR window, sending the target DCI to the terminal equipment, wherein the target DCI is used for the terminal equipment to determine whether to stop detecting the RAR sent by the network equipment during the operation period of the RAR window.
In fig. 7, the bus architecture may include any number of interconnected buses and bridges, with one or more processors represented by processor 601 and various circuits of memory represented by memory 603 being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. Bus interface 605 provides an interface. The transceiver 602 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The user interface 604 may also be an interface capable of interfacing with a desired device for different user devices, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 601 is responsible for managing the bus architecture and general processing, and the memory 603 may store data used by the processor 601 in performing operations.
In the embodiment of the present invention, in a random access process in which a terminal device and a network device establish a connection, after the network device receives a random access request message sent by the terminal device, a target DCI loaded with a target radio network temporary identifier RNTI and carrying system frame number SFN information may be generated, where the target RNTI is related to a random access RO for sending the random access request message, and in a process in which the terminal device detects whether a RAR matching the sent random access request message can be received during an RAR window operation period, that is, before the RAR window is overtime, to determine whether the random access process is successful, the target DCI is sent to the terminal device, so that the terminal device determines whether to continue to detect the RAR during the RAR window operation period according to the detected target DCI. Therefore, the target DCI is sent to the terminal equipment during the RAR window running period in the random access process, so that the terminal equipment determines whether to stop continuously detecting the RAR according to the target DCI detected during the RAR window running period, and when corresponding conditions are met, the detection of the RAR is stopped in time during the RAR window running period.
Preferably, an embodiment of the present invention further provides a terminal device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the above-mentioned embodiment of the method for detecting a random access response RAR, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements each process of the above-mentioned embodiment of the method for detecting a random access response RAR applied to a terminal device, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Preferably, an embodiment of the present invention further provides a network device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the above-mentioned embodiment of the method for detecting a random access response RAR, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements each process of the above-mentioned embodiment of the method for detecting a random access response RAR applied to a network device, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (20)
1. A detection method of a Random Access Response (RAR) is applied to a terminal device, and is characterized by comprising the following steps:
after sending a random access request message to a network device, starting an RAR window to detect RAR sent by the network device;
and if first Downlink Control Information (DCI) is detected, scrambling the first DCI by using a target Radio Network Temporary Identifier (RNTI) and carrying first System Frame Number (SFN) information, wherein the target RNTI is related to a random access opportunity (RO) for sending the random access request message, determining whether to stop detecting the RAR during the operation period of the RAR window according to the first DCI.
2. The method according to claim 1, wherein the first DCI further carries a target indication, and the target indication is used to indicate whether the terminal device stops detecting the RAR.
3. The method of claim 2, wherein the determining whether to stop detecting the RAR during the RAR window operation according to the first DCI comprises:
judging whether second SFN information is matched with the first SFN information in the first DCI, wherein the value of the second SFN information is an SFN corresponding to a system frame where an RO (radio access control) for sending the random access request message is located;
and if the second SFN information is matched with the first SFN information and the target indication in the first DCI indicates that the terminal equipment stops detecting the RAR, determining that the RAR stops detecting during the operation period of the RAR window.
4. The method of claim 3, further comprising:
if the second SFN information is not matched with the first SFN information, continuously detecting PDCCH Candidates Candidates on a search space where the first DCI is currently detected;
and if the second DCI is detected, using the second DCI as a new first DCI, and determining whether to stop detecting the RAR during the operation period of the RAR window according to the new first DCI.
5. The method of claim 3, wherein the determining whether second SFN information matches the first SFN information in the first DCI comprises:
judging whether the value of the first SFN information is equal to the calculation result of running a remainder function on the value of the second SFN information and a target value, wherein the target value is specified by a protocol or configured by the network equipment;
if yes, determining that the second SFN information is matched with the first SFN information;
if not, determining that the second SFN information is not matched with the first SFN information.
6. The method of claim 1, wherein the determining whether to stop detecting the RAR during the RAR window operation according to the first DCI comprises:
and if the response RO position corresponding to the first SFN information in the first DCI is located behind the RO position for sending the random access request message in the time domain, determining to stop detecting the RAR during the operation period of the RAR window.
7. The method of claim 6, wherein the first DCI is for the terminal device in a time period [ T [ ]1+A×C,T1+A×D]Internally detected, T1The moment for starting the RAR window;
wherein the method further comprises:
if the value of the first SFN information in the first DCI is equal to the calculation result of running a remainder function on (x + M) and N, determining that a response RO location corresponding to the first SFN information is located behind the RO location where the random access request message is sent in the time domain;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1, N-1 ]]Any natural number in D is [2, N ]]Any natural number in the above, M is [1, C ]]Any natural number in the table, the value of N is specified by a protocol or configured by the network device, and the values of C and D enable T1+A×C≤T1+ A × D holds.
8. The method of claim 6, wherein the first DCI is for the terminal device in a time period [ T [ ]1+A×C,T1+A×D]Internally detected, T1The moment for starting the RAR window;
wherein the method further comprises:
if the value of the first SFN information in the first DCI is equal to the calculation result of the running remainder function for (x + M) and N, continuously detecting PDCCH Candidates Candidates in the search space where the first DCI is currently detected;
if at least one third DCI is detected, determining that a response RO position corresponding to the first SFN information is located behind an RO position for sending the random access request message in a time domain under the condition that the value of the third SFN information in each third DCI in the at least one third DCI is equal to the calculation result of the (x + M) and the N running remainder function;
wherein, A represents the frame length of the system frame, x represents the SFN corresponding to the system frame where the RO for sending the random access request message is located, and the value of C is [1, N-1 ]]Any natural number in (C), M is [1, C ]]Any natural number in D is [2, N ]]Any natural number within, the value of N being specified by the protocol or configured by said network device, the values of C and D being such that T1+A×C≤T1+ A × D holds.
9. The method according to claim 4 or 8, wherein the number of DCIs that the terminal device can process in a time slot is specified by a protocol or determined based on capability information of the terminal device.
10. The method according to any one of claims 3-8, wherein the determining to stop detecting the RAR during the RAR window operation comprises:
determining to stop the RAR window prematurely during the RAR window run.
11. The method of claim 10, wherein the determining to stop the RAR window during the RAR window operation comprises:
and under the condition that the physical PHY layer of the terminal equipment sends an instruction to a Media Access Control (MAC) layer, determining to stop the RAR window during the running period of the RAR window.
12. The method of claim 11, further comprising:
and performing self-adding 1 operation on the target transmission counter.
13. A detection method of a Random Access Response (RAR) is applied to a network device, and is characterized by comprising the following steps:
generating target Downlink Control Information (DCI) after receiving a random access request message sent by terminal equipment, wherein the target DCI uses a target Radio Network Temporary Identifier (RNTI) for scrambling and carries System Frame Number (SFN) information, and the target RNTI is related to a random access opportunity (RO) for sending the random access request message;
and during the operation period of the RAR window, sending the target DCI to the terminal equipment, wherein the target DCI is used for the terminal equipment to determine whether to stop detecting the RAR sent by the network equipment during the operation period of the RAR window.
14. The method according to claim 13, wherein the target DCI further carries a target indication, and the target indication is used to indicate whether the terminal device stops detecting the RAR.
15. The method according to claim 13 or 14, characterized in that the method further comprises:
and determining the number of the target DCI sent to the terminal equipment in a time slot according to protocol convention or the capability information of the terminal equipment.
16. A terminal device, comprising:
the detection module is used for starting an RAR window after sending a random access request message to network equipment so as to detect RAR sent by the network equipment;
a determining module, configured to determine, if a first downlink control information DCI is detected, where the first DCI uses a target radio network temporary identifier RNTI for scrambling and carries first system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message, whether to stop detecting the RAR during an RAR window operation period according to the first DCI.
17. A network device, comprising:
a generating module, configured to generate target downlink control information DCI after receiving a random access request message sent by a terminal device, where the target DCI uses a target radio network temporary identifier RNTI for scrambling and carries system frame number SFN information, and the target RNTI is related to a random access opportunity RO for sending the random access request message;
and a sending module, configured to send the target DCI to the terminal device during an RAR window operation period, where the target DCI is used for the terminal device to determine whether to stop detecting the RAR sent by the network device during the RAR window operation period.
18. A terminal device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 12.
19. A network device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 13 to 15.
20. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 15.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911067632.9A CN112788712B (en) | 2019-11-04 | 2019-11-04 | Detection method of random access response RAR, terminal equipment and network equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911067632.9A CN112788712B (en) | 2019-11-04 | 2019-11-04 | Detection method of random access response RAR, terminal equipment and network equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112788712A true CN112788712A (en) | 2021-05-11 |
CN112788712B CN112788712B (en) | 2023-04-11 |
Family
ID=75747356
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911067632.9A Active CN112788712B (en) | 2019-11-04 | 2019-11-04 | Detection method of random access response RAR, terminal equipment and network equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112788712B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117426134A (en) * | 2022-05-17 | 2024-01-19 | 北京小米移动软件有限公司 | Random access method and device |
WO2024082122A1 (en) * | 2022-10-18 | 2024-04-25 | Qualcomm Incorporated | Early termination of random access response decoding |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106686691A (en) * | 2015-11-06 | 2017-05-17 | 电信科学技术研究院 | Random access response RAR transmission method and related device |
CN107431983A (en) * | 2015-03-11 | 2017-12-01 | Lg 电子株式会社 | The method and its equipment of quick random access procedure are operated in a wireless communication system |
US20190069258A1 (en) * | 2017-08-10 | 2019-02-28 | Hyoungsuk Jeon | Beam Indication in RACH |
CN109699087A (en) * | 2017-10-20 | 2019-04-30 | 维沃移动通信有限公司 | Method, equipment and the terminal of random access |
-
2019
- 2019-11-04 CN CN201911067632.9A patent/CN112788712B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107431983A (en) * | 2015-03-11 | 2017-12-01 | Lg 电子株式会社 | The method and its equipment of quick random access procedure are operated in a wireless communication system |
CN106686691A (en) * | 2015-11-06 | 2017-05-17 | 电信科学技术研究院 | Random access response RAR transmission method and related device |
US20190069258A1 (en) * | 2017-08-10 | 2019-02-28 | Hyoungsuk Jeon | Beam Indication in RACH |
CN109699087A (en) * | 2017-10-20 | 2019-04-30 | 维沃移动通信有限公司 | Method, equipment and the terminal of random access |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117426134A (en) * | 2022-05-17 | 2024-01-19 | 北京小米移动软件有限公司 | Random access method and device |
WO2024082122A1 (en) * | 2022-10-18 | 2024-04-25 | Qualcomm Incorporated | Early termination of random access response decoding |
Also Published As
Publication number | Publication date |
---|---|
CN112788712B (en) | 2023-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109997405B (en) | Method for performing random access channel procedure and user equipment thereof | |
US11937306B2 (en) | System information transmission method, terminal and network device | |
US10080243B2 (en) | Mechanisms to facilitate random access by link-budget-limited devices | |
WO2022152275A1 (en) | Msg3 transmission method and apparatus, device and storage medium | |
US9565647B2 (en) | Method and apparatus for implementing a time-alignment guard timer | |
CN114080047B (en) | Signal transmission method, terminal and network side equipment for random access | |
CN110635877B (en) | Transmission method of system message, terminal equipment and network equipment | |
CN110475317B (en) | PDCCH monitoring method, terminal equipment and network side equipment | |
US11051342B2 (en) | Random access method and apparatus | |
EP4013174A1 (en) | Data transmission method and apparatus, and computer-readable storage medium | |
CN111263452A (en) | Information transmission method and terminal equipment | |
TW202025839A (en) | Method used for random access, network device, and terminal device | |
CN112788712B (en) | Detection method of random access response RAR, terminal equipment and network equipment | |
CN111800799B (en) | 2-step random access method and device for unlicensed frequency band | |
JP2020502900A (en) | Method and device for random access | |
WO2020259410A1 (en) | Method for obtaining timing advance and devices | |
CN111107661B (en) | Random access resource acquisition method and device | |
US20230164813A1 (en) | Method and apparatus for resource selection on nr sidelink | |
CN112567871B (en) | Random access preamble transmission | |
CN117413592A (en) | Communication method, terminal, network device, medium, chip, product, and program | |
CN111726884B (en) | Indication method and device | |
CN118104354A (en) | Method, device, equipment and storage medium for determining effectiveness of timing advance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |