WO2021142580A1 - 无线通信的方法、终端设备和网络设备 - Google Patents
无线通信的方法、终端设备和网络设备 Download PDFInfo
- Publication number
- WO2021142580A1 WO2021142580A1 PCT/CN2020/071808 CN2020071808W WO2021142580A1 WO 2021142580 A1 WO2021142580 A1 WO 2021142580A1 CN 2020071808 W CN2020071808 W CN 2020071808W WO 2021142580 A1 WO2021142580 A1 WO 2021142580A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- terminal device
- random access
- slice information
- network
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 188
- 238000004891 communication Methods 0.000 title claims abstract description 67
- 230000008569 process Effects 0.000 claims description 64
- 230000015654 memory Effects 0.000 claims description 50
- 238000004590 computer program Methods 0.000 claims description 43
- 238000012545 processing Methods 0.000 claims description 29
- 230000001360 synchronised effect Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 13
- 230000005540 biological transmission Effects 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 101100274486 Mus musculus Cited2 gene Proteins 0.000 description 3
- 101100533725 Mus musculus Smr3a gene Proteins 0.000 description 3
- 101150096622 Smr2 gene Proteins 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000001356 surgical procedure Methods 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
- H04W74/0841—Random access procedures, e.g. with 4-step access with collision treatment
- H04W74/085—Random access procedures, e.g. with 4-step access with collision treatment collision avoidance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0866—Non-scheduled access, e.g. ALOHA using a dedicated channel for access
- H04W74/0875—Non-scheduled access, e.g. ALOHA using a dedicated channel for access with assigned priorities based access
Definitions
- This application relates to the field of communications, in particular to a wireless communication method, terminal equipment and network equipment.
- the new radio (NR) system (or 5G system, 5G network) has higher requirements for time delay.
- ultra-reliability and low latency (Ultra Reliability and Low Latency Communication, uRLLC) scenarios (such as scenarios such as autonomous driving, remote surgery, industrial control, etc.) need to support an ultra-low latency of 1 ms.
- a terminal device When a terminal device performs certain actions, such as accessing a certain cell, it also needs to access the cell with a lower delay. Therefore, how the terminal device performs certain actions (such as accessing a certain cell) with a lower delay is an urgent problem to be solved.
- the embodiments of the present application provide a wireless communication method, terminal device, and network device, which can meet the requirement of the terminal device to perform a series of actions with a lower delay.
- a wireless communication method includes: a terminal device receives first information, where the first information is used to indicate at least one piece of slice information supported by a target cell;
- the terminal device determines target slice information based on the at least one slice information.
- a wireless communication method includes: a network device sends first information to a terminal device, where the first information is used to indicate at least one slice information supported by a target cell.
- a terminal device which is used to execute the method in the foregoing first aspect or each of its implementation modes.
- the terminal device includes a functional module for executing the method in the foregoing first aspect or each of its implementation manners.
- a network device is provided, which is used to execute the method in the second aspect or its implementation manners.
- the network device includes a functional module for executing the method in the foregoing second aspect or each of its implementation manners.
- a terminal device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned first aspect or each of its implementation modes.
- a network device including a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the method in the second aspect or its implementation manners.
- a chip is provided for implementing any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
- the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes any one of the above-mentioned first aspect to the second aspect or any of the implementations thereof method.
- a computer-readable storage medium for storing a computer program that enables a computer to execute any one of the above-mentioned first to second aspects or the method in each implementation manner thereof.
- a computer program product including computer program instructions that cause a computer to execute any one of the above-mentioned first to second aspects or the method in each implementation manner thereof.
- a computer program which when running on a computer, causes the computer to execute any one of the above-mentioned first aspect to the second aspect or the method in each implementation manner thereof.
- the network device indicates the slice information supported by the target cell to the terminal device, so that the terminal device can quickly obtain the slice information supported by the target cell and determine the target slice information, so that the execution can be performed based on the target slice information with a small delay.
- the follow-up behavior can meet the requirements of the terminal device to perform a series of actions with a lower delay.
- Fig. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
- Fig. 2 is a schematic flowchart of a wireless communication method according to an embodiment of the present application.
- Fig. 3 is a schematic flowchart of a four-step random access process according to an embodiment of the present application.
- Fig. 4 is a schematic flowchart of a two-step random access process according to an embodiment of the present application.
- Fig. 5 is a schematic block diagram of a terminal device according to an embodiment of the present application.
- Fig. 6 is a schematic block diagram of a network device according to an embodiment of the present application.
- Fig. 7 is a schematic block diagram of a communication device according to an embodiment of the present application.
- Fig. 8 is a schematic block diagram of a chip according to an embodiment of the present application.
- Fig. 9 is a schematic block diagram of a communication system according to an embodiment of the present application.
- FIG. 1 is a schematic diagram of a communication system suitable for this application.
- the communication system 100 includes a network device 110 and a terminal device 120.
- the terminal device 120 communicates with the network device 110 through electromagnetic waves.
- the terminal device 120 may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to a wireless modem, for example, the third generation partnership program (3rd generation partnership project).
- 3rd generation partnership project 3rd generation partnership project
- UE user equipment
- MS mobile station
- soft terminal home gateway
- set-top box etc.
- the network device 110 may be a base station defined by 3GPP, for example, a base station (gNB) in a 5G mobile communication system.
- the network device 110 may also be a non-3GPP (non-3GPP) access network device, such as an access gateway (AG).
- the network device 110 may also be a relay station, an access point, a vehicle-mounted device, a wearable device, and other types of devices.
- the terminal devices 120 may perform direct terminal connection (Device to Device, D2D) communication.
- D2D Direct terminal connection
- the 5G system or 5G network may also be referred to as a New Radio (NR) system or NR network.
- NR New Radio
- the communication system 100 is only an example, and the communication system applicable to the present application is not limited to this.
- the number of network devices and terminal devices included in the communication system 100 may also be other numbers.
- the devices with communication functions in the network/system in the embodiments of the present application may be referred to as communication devices.
- the communication device may include a network device 110 having a communication function and a terminal device 120.
- the network device 110 and the terminal device 120 may be the specific devices described above, which will not be repeated here.
- the communication device may also include other devices in the communication system 100, such as network controllers, mobility management entities and other network entities, which are not limited in the embodiment of the present application.
- the communication system 100 shown in FIG. 1 may also be a Non-Terrestrial Network (NTN) system, that is, the network device 110 in FIG. 1 may be a satellite.
- NTN Non-Terrestrial Network
- RAN needs to enhance how to support vertical industries in the access network.
- one way to enhance the access network to support vertical industries is to provide lower latency, more targeted, greater flexibility, and higher reliability for multiple services with different needs based on slicing.
- Extensible service More specifically, RAN slicing can enable application providers to participate in the design, deployment, and operation of customized RANs to better support the business of application providers. Therefore, Version 17 (Release 17, Rel-17) introduces enhancements to slicing in the access network.
- slicing may also be referred to as network slicing (Network Slicing).
- eMBB Enhanced Mobile Broadband
- mMTC massive Machine Type Communication
- uRLLC autonomous driving, remote surgery, industrial control, etc.
- Slicing is deployed on a physical or virtual infrastructure to support a logically isolated network of specific network capabilities and network characteristics. It can include a complete end-to-end network, including access networks, transmission networks, core networks, and application servers. The entire network, part of the network function can also be shared in multiple slicing. Slicing can also be any combination of terminal equipment, access network, transmission network, core network and application server.
- the network characteristics of different slicing are not the same, and the slicing is required to be isolated from each other without affecting each other.
- the slicing of Augmented Reality (AR) or Virtual Reality (VR) services requires large bandwidth and low latency; the slicing of Internet of Things (IOT) services must support the access of massive terminal devices , But the bandwidth is small and there is no requirement for delay.
- AR Augmented Reality
- VR Virtual Reality
- IOT Internet of Things
- FIG. 2 is a schematic flowchart of a wireless communication method 200 according to an embodiment of the present application.
- the method described in FIG. 2 may be executed by a terminal device and a network device.
- the terminal device may be, for example, the terminal device 120 shown in FIG. 1
- the network device may be, for example, the network device 110 shown in FIG. 1.
- the method 200 may include at least part of the following content.
- the terminal device receives first information, where the first information is used to indicate at least one slice information supported by the target cell.
- the network device can send the first information to the terminal device.
- the terminal device determines target slice information based on the at least one slice information.
- the target cell may be a camping cell or a serving cell, and the target slice information is slice information of the target cell.
- the slice information may include but is not limited to at least one of the following: network slice selection assistance information (NSSAI), slice type (slice type), service type (service type), slice identification, target cell identification , The frequency of the target cell, the public land mobile network (PLMN) identification, and the tracking area (TA) identification.
- NSSAI network slice selection assistance information
- slice type slice type
- service type service type
- slice identification target cell identification
- PLMN public land mobile network
- PLMN public land mobile network
- TA tracking area
- the NSSAI may be, for example, a single network slice selection assistance information (S-NSSAI), and the identity of the target cell may be the ID of the target cell, where the ID of the target cell may be the cell global identity ( cell global identifier, CGI).
- CGI cell global identity
- the CGI mentioned here may be an evolved universal terrestrial radio access network (E-UTRAN) CGI (ECGI), or it may also be NR CGI (NCGI).
- E-UTRAN evolved universal terrestrial radio access network
- NCGI NR CGI
- the terminal device can access the network or perform random access based on the target slice information. For example, the terminal device can access the target cell based on the target slice information.
- the network device indicates the slice information supported by the target cell to the terminal device, so that the terminal device can quickly obtain the slice information of the target cell, so that the terminal device can quickly select a suitable cell or resource based on the slice information, and avoid This reduces the delay of terminal equipment accessing the network and the delay of business services.
- the random access process can usually be triggered by the following events:
- the terminal device can enter the RRC connected state (RRC_CONNECTED) from the radio resource control (Radio Resource Control, RRC) idle state (RRC_IDLE state).
- RRC Radio Resource Control
- the terminal device is in the connected state and needs to establish uplink synchronization with the new cell.
- the uplink is in a "non-synchronised” state (DL or UL data arrival during RRC_CONNECTED when UL synchronisation status is "non-synchronised”).
- the terminal device transitions from the RRC inactive state (Transition from RRC_INACTIVE).
- the terminal device requests other system information (Other System Information, OSI).
- OSI Operating System Information
- the terminal device needs to perform beam failure recovery.
- the random access method based on contention as shown in FIG. 3 and the random access method based on non-contention.
- Step 1 The terminal device sends a random access preamble (Preamble, that is, message1, Msg1) to the network device.
- Preamble that is, message1, Msg1
- the random access preamble may also be referred to as a preamble, a random access preamble sequence, a preamble sequence, and so on.
- the terminal device can select physical random access channel (Physical Random Access Channel, PRACH) resources, and the PRACH resources can include time domain resources, frequency domain resources, and code domain resources.
- PRACH Physical Random Access Channel
- the terminal device can send the selected Preamble on the selected PRACH resource.
- the network device can estimate the transmission delay between it and the terminal device according to the Preamble and use this to calibrate the uplink timing, and can roughly determine the size of the resource required for the terminal device to transmit message 3 (Msg3).
- Msg3 message 3
- Step 2 The network device sends a random access response (Random Access Response, RAR, that is, message2, Msg2) to the terminal device.
- RAR Random Access Response
- a RAR window can be opened, and the corresponding physical downlink control channel (Physical Downlink) is detected according to the random access radio network temporary identifier (RA-RNTI) in the RAR window. Control Channel, PDCCH). If the terminal device detects the PDCCH scrambled by the RA-RNTI, it can obtain the Physical Downlink Shared Channel (PDSCH) scheduled by the PDCCH. Wherein, the PDSCH includes the RAR corresponding to the Preamble.
- Physical Downlink control channel Physical Downlink
- PDCCH Physical Downlink Shared Channel
- the terminal device can consider that this random access procedure has failed. It should be understood that both the terminal equipment and the network equipment need to uniquely determine the value of RA-RNTI, otherwise the terminal equipment cannot decode the RAR.
- the RA-RNTI may calculate the value of the RA-RNTI through the time-frequency position of the Preamble that is clear to both the sender and the receiver.
- RA-RNTI associated with Preamble can be calculated by formula (1):
- RA-RNTI 1+s_id+14 ⁇ t_id+14 ⁇ 80 ⁇ f_id+14 ⁇ 80 ⁇ 8 ⁇ ul_carrier_id (1)
- s_id is the index of the first Orthogonal Frequency Division Multiplexing (OFDM) symbol of the PRACH resource (0 ⁇ s_id ⁇ 14), and t_id is the index of the first time slot of the PRACH resource in a system frame.
- f_id is the index of the PRACH resource in the frequency domain (0 ⁇ f_id ⁇ 8)
- ul_carrier_id is the uplink carrier used to transmit the Preamble (0 indicates the NUL carrier, 1 indicates the SUL carrier).
- f_id is fixed to 0.
- the network device since the time-frequency position of the Preamble sent by the terminal device is determined, the network device also obtains the time-frequency position of the Preamble when decoding the Preamble, and can then know the RA-RNTI that needs to be used in the RAR.
- the terminal device successfully receives a RAR (using the determined RA-RNTI to decode), and the random access sequence identifier (Random Access Preamble Identifier, RAPID) in the RAR is the same as the preamble index sent by the terminal device, it can It is considered that the RAR is successfully received, and the terminal device can stop detecting the PDCCH scrambled by the RA-RNTI at this time.
- RAPID Random Access Preamble Identifier
- Step 3 The terminal device sends Msg3.
- the terminal device After receiving the RAR message, the terminal device determines whether the RAR is its own RAR message. For example, the terminal device can use the preamble index to check, and after determining that it is its own RAR message, it can generate Msg3 at the RRC layer and send it to The network device sends Msg3, which needs to carry the identification information of the terminal device, etc.
- Msg3 is mainly used to notify the network equipment of the random access trigger event.
- the Msg3 sent by the terminal device in step 3 may include different content.
- Msg3 may include an RRC connection request message (RRC Setup Request) generated by the RRC layer.
- RRC Setup Request RRC Setup Request
- Msg3 may also carry, for example, the 5G-service temporary mobile subscriber identity (Serving-Temporary Mobile Subscriber Identity, S-TMSI) or random number of the terminal device.
- S-TMSI Serving-Temporary Mobile Subscriber Identity
- Msg3 may include an RRC connection re-establishment request message (RRC Reestabilshment Request) generated by the RRC layer.
- RRC Reestabilshment Request RRC connection re-establishment request message
- Msg3 may also carry, for example, a Cell Radio Network Temporary Identifier (C-RNTI) and so on.
- C-RNTI Cell Radio Network Temporary Identifier
- Msg3 may include an RRC handover confirmation message (RRC Handover Confirm) generated by the RRC layer, which carries the C-RNTI of the terminal device.
- RRC Handover Confirm RRC handover confirmation message
- Msg3 may also carry information such as a Buffer Status Report (BSR).
- BSR Buffer Status Report
- Msg3 may at least include the C-RNTI of the terminal device.
- Step 4 The network device sends a contention resolution message (Msg4) to the terminal device.
- Msg4 contention resolution message
- the network device sends Msg4 to the terminal device, and the terminal device correctly receives the Msg4 to complete the contention resolution (Contention Resolution).
- Msg4 may carry the RRC connection establishment message.
- the network device Since the terminal device in step 3 can carry its own unique identifier in Msg3, the network device will carry the unique identifier of the terminal device in Msg4 in the contention resolution mechanism to specify the terminal device that wins the competition. Other terminal devices that did not win in the contention resolution will re-initiate random access.
- the Msg4 can be scheduled with the PDCCH scrambled by the TC-RNTI.
- the resolution of the contention conflict can be through the terminal device receiving the PDSCH of Msg4 to obtain the conflict resolution ID, and by matching the conflict resolution ID with the common control channel (CCCH) service data unit in msg3 , SDU) to determine whether to resolve the conflict.
- CCCH common control channel
- the delay of four-step random access is relatively large, which is not suitable for the low-latency and high-reliability scenarios in 5G.
- a two-step random access process is proposed. As shown in Figure 5, in the two-step random access process, in simple terms, it is equivalent to combining the first and third steps of the four-step random access process into the first step in the two-step random access process. The second step and the fourth step of the four-step random access process are combined into the second step of the two-step random access process.
- the two-step random access procedure may include:
- Step 1 The terminal device sends the first message to the network device.
- the first message may be composed of a preamble and a payload (payload).
- the Preamble is a four-step random access Preamble.
- the preamble is transmitted on the PRACH resource.
- the payload mainly carries information in Msg3 in the four-step random access.
- it can include CCCH SDU, such as corresponding to random access in RRC idle state, or C-RNTI media access control (Media Access Control, MAC) control element (CE), for example, it mainly corresponds to RRC connected state Random access.
- the payload may be carried on an uplink channel, and the channel may be, for example, a physical uplink shared channel (PUSCH).
- PUSCH physical uplink shared channel
- the first message may carry part or all of the information carried in the Preamble and Msg3 in the four-step random access process.
- Step 2 The network device sends a second message to the terminal device.
- the network device can send the second message to the terminal device.
- the second message may include part or all of the information carried in Msg2 and Msg4 in the four-step random access process.
- the names of the first message and the second message are not limited, that is, they can also be expressed as other names.
- the first message may also be called Msg A, random access request message or new Msg1
- the second message may also be called Msg B or new Msg2.
- FIG. 4 is only a specific implementation of the two-step random access process, and should not limit the scope of protection of the present application.
- the network device may broadcast the first information through the system information, so that the terminal device may receive the first information.
- the network device may send the first information to the terminal device through a random access process.
- the network device may send the first information to the terminal device through the RAR in the four-step random access process, or the network device may send the first information to the terminal device through the second message in the two-step random access process.
- the format of the RAR carrying the first information may be different from the current RAR format.
- the network equipment may use a new RNTI to scramble the RAR to distinguish the existing RAR from the RAR carrying the first information.
- the RAR carrying the first information may include an M-bit distinguishing field to distinguish the RAR of the present application from the RAR in the prior art.
- M is greater than or equal to 1.
- the implementation of the second message can refer to the above-mentioned implementation of the RAR. For the sake of brevity, the details will not be repeated here.
- the terminal device accesses the network or performs random access based on the target slice information, which may specifically include: the terminal device may determine the target random access parameter corresponding to the target slice information, and then perform the execution based on the target random access parameter Random access.
- the terminal device may determine the target random access parameter according to the target slice information and the corresponding relationship between the slice information and the random access parameter.
- the first information may also be used to indicate the correspondence between slice information and random access parameters. That is, when the network device indicates at least one piece of slice information to the terminal device, it also indicates to the terminal device the random access parameter corresponding to each piece of slice information in the at least one piece of slice information. Or, when the network device indicates the random access parameter to the terminal device, it also indicates to the terminal device at least one piece of slice information corresponding to the random access parameter.
- the corresponding relationship between the slice information and the random access parameter may be preset on the terminal device.
- the random access parameters may include but are not limited to at least one of the following: L1 parameters, L2 parameters, and random access resources.
- the L1 parameter and the L2 parameter are at least one of the parameters in RACH-configCommon, RACH-ConfigDedicated, and RACH-ConfigGeneri
- the random access resource may include at least one of the following: Preamble, PRACH resource, and rsrp-ThresholdSSB.
- the terminal device can select a random access resource to perform a random access process. For example, if the slicing type indicated by the target slice information is TSC1, and the random access resource corresponding to TSC1 is Preamble5-7, the terminal device can select Preamble5 to initiate the random access process.
- the network device can determine the target slice information determined by the terminal device through the random access parameter, or according to the correspondence between the random access parameter parameter and the target slice information, so that the network device can select the corresponding access according to the target slice information.
- a management function Access Management Function, AMF is used to establish a business session with a terminal device.
- the terminal device accessing the network or performing random access based on the target slice information may include: the terminal device based on the target slice information and parameters for access control (slicing-specific access control parameters), Access the network or perform random access.
- the network device can control the slice information-based access network or random access of the terminal device based on the parameters used for access control.
- the terminal device may also report the result of the access attempt to the higher layer when accessing the network based on the slice information or performing random access. For example, whether the access type is barred.
- the slicing-specific access control parameter may include at least one of the following parameters: a bar parameter (slicing-specific cellbarred) corresponding to at least one slice information, and a unified access control corresponding to at least one slice information (Unified Access Control, UAC) parameter (slicing-specific uac-BarringInfo) and access priority parameter corresponding to at least one slice information.
- a bar parameter scaling-specific cellbarred
- UAC Unified Access Control
- the bar parameter corresponding to the at least one slice information can be understood as: the bar parameter configured for the slicing indicated by the at least one slice information; the UAC parameter corresponding to the at least one slice information can be understood as: the UAC parameter indicating the slicing indicated by the at least one slice information; at least The access priority parameter corresponding to one piece of slice information can be understood as: a parameter used to indicate the priority of slicing indicated by at least one piece of slice information.
- the first information may also be used to indicate slicing-specific access control parameters.
- the UAC parameters of different slicing may be different and/or the backoff indicator (BI) value used for random access may be different.
- the embodiment of the present application does not specifically limit the names of the bar parameter, the UAC parameter, and the access priority parameter.
- the bar parameter can also be referred to as bar information
- the UAC parameter can also be referred to as UAC information
- the access priority parameter can also be referred to as access priority information.
- the BI value specifies the time range that the terminal device needs to wait before resending the Preamble. If the terminal device does not receive the RAR in the RAR window, or if none of the received RARs matches the preamble index selected by the terminal device, the terminal device can consider the RAR reception failed. At this time, the terminal device needs to wait for a period of time before initiating random access.
- the waiting time can be any random value in the waiting time interval specified by the value 0 to BI.
- the bar parameter corresponding to different slice information may be the same or different. That is, the bar parameters corresponding to at least one piece of slice information may all be the same, or may be partially the same, or may be different. That is, the network device can set the corresponding bar parameter for each slicing.
- the network device can configure the bar parameter for slicing X. If the bar parameter configured by the network device for slicing X is cell bar for slicing X, it means that the terminal device's access based on slicing X is barred.
- the network device can also set the bar parameter corresponding to the slice information for the terminal device.
- the bar parameter configured by the network device is cell bar for non-slicing
- the network device can bar terminal devices that do not support slicing. That is, if the bar parameter is a parameter that prohibits terminal devices that do not support slicing, the network device can prohibit terminal devices that do not support slicing from accessing the network or perform random access.
- the network device can use a proprietary message element (Information Element, IE) (such as cellReservedForOtherUse) to bar terminal devices that do not support slicing. For example, when cellReservedForOtherUse is set to true, the network device can bar the terminal devices that do not support slicing.
- Information Element such as cellReservedForOtherUse
- the possible values of the UAC parameter can be 0,1,2...x.
- x may be 13 or 11 or other values, which is not limited in the embodiment of the present application. Among them, different values can correspond to different services.
- the value of the UAC parameter is referred to as the threshold below.
- the value of the UAC parameter may also be called the access factor or other names.
- the terminal device can access the network or perform random access.
- the terminal device can select a random number, and then the terminal device can access the network or perform random access control according to the random number and the threshold value. .
- the terminal device may access the network or perform random access; if the random number is greater than the threshold, the terminal device may not access the network or perform random access.
- the terminal device can re-access according to the priority of slicing (referred to as target slicing for convenience of description) indicated by the target slice information and/or the BI value corresponding to the target slicing The internet.
- target slicing the priority of slicing
- the network device indicates two slicing information, which respectively indicate slicing1 and slicing2, where the threshold of slicing1 is 0.5, the threshold of slicing2 is 1, and the terminal device determines slicing1 as the target slicing. If the random number randomly selected by the terminal device is 0.3, since 0.3 is less than 0.5, the terminal device can access the network. If the random number randomly selected by the terminal device is 0.9, since 0.9 is greater than 0.5, the terminal device does not access the network.
- the network device indicates two slice information, which respectively indicate slicing1 and slicing2, where the threshold value of slicing1 is 0.5, the BI value corresponding to slicing1 is A, the threshold value of slicing2 is 1, and slicing2 The corresponding BI value is B, and the terminal device determines slicing2 as the target slicing. If the random number randomly selected by the terminal device is 0.3, since 0.3 is less than 1, the terminal device can access the network. If the random number randomly selected by the terminal device is 1.2, since 1.2 is greater than 1, the terminal device does not access the network, and the terminal device can try to access the network again after backing off for a period of time B.
- the network device indicates two slice information, which respectively indicate slicing1 and slicing2, where the threshold of slicing1 is 0.5, the priority of slicing1 is H, the threshold of slicing2 is 1, and the threshold of slicing2 is 1.
- the priority is L
- the BI values corresponding to slicing1 and slicing2 are both K
- the terminal device determines slicing1 as the target slicing. If the random number randomly selected by the terminal device is 0.3, since 0.3 is less than 0.5, the terminal device can access the network. If the random number randomly selected by the terminal device is 1.2, since 1.2 is greater than 0.5, the terminal device does not access the network, and the terminal device can back off the H*K duration and then try to access the network.
- the terminal device may determine the priority order of the target slicing in at least one slicing according to the access priority parameter corresponding to the at least one slice information. If the target slicing is the slicing with the highest priority among the at least one slicing, The terminal device can access the network or perform random access; if the target slicing is one of the N slicing with the highest priority in at least one slicing, the terminal device can access the network or perform random access, and N is greater than or equal to 1. .
- the terminal device accesses the network or performs random access according to the access priority parameter of slicing, which can avoid cell access congestion, so that the terminal device that supports high-priority slicing can access the network preferentially, ensuring the terminal The performance of the device.
- the terminal device may also determine the target slice information according to the access priority parameter.
- the terminal device may determine the slice information used to indicate the slicing with the highest priority in the at least one slice information according to the access priority parameter, and then determine the slice information as the target slice information.
- the method 200 may further include: the terminal device determines a backoff indicator (BI) value for random access according to the target slice information.
- BI backoff indicator
- the slicing priority indicated by the at least one slice information may be inversely proportional to the BI value, that is, the higher the slicing priority, the smaller the BI value.
- the terminal device may determine that the BI value is 0; if the priority of the target slicing is the second priority, the terminal device may determine that the BI value is B; if the priority of the target slicing is B If the priority is the third priority, the terminal device can determine that BI is A. Among them, B can be smaller than A.
- the BI values corresponding to at least part of the slicing indicated by the at least one piece of slicing information may be different.
- the terminal device can re-access the network or perform random access based on the BI value.
- the method 200 may further include: the terminal device sends second information to the network device, and the second information may be used to indicate slice information supported or selected by the terminal device.
- the second information may be carried in the RRC message.
- the RRC message may be an RRC connection establishment request message, or the RRC message may be an RRC connection reestablishment request message, or alternatively, the RRC message may be an RRC connection recovery message.
- the second information may be carried in the random access process.
- the second information may be carried in Msg1 or Msg3 in the four-step random access process, or the second information may be carried in the second message in the two-step random access process.
- the slice information supported or selected by the terminal device may belong to at least one slice information indicated by the first information.
- the slice information supported or selected by the terminal device may include target slice information.
- the terminal device after receiving the first information, obtains at least one slice information supported by the target cell, and then the terminal device selects the slice information it supports from the at least one slice information, and then indicates to the network device through the second information Supported or selected slice information. If there is only one slice information supported by the terminal device in the at least one slice information, the terminal device may determine the supported slice information as the target slice information.
- the terminal device can send the multiple pieces of slice information to the network device, and after receiving the multiple pieces of slice information, the network device can check the multiple pieces of slice information. After selecting a piece of slice information and determining it as the target slice information, the network device then indicates the selected target slice information to the terminal device. Alternatively, the terminal device may select one piece of slice information from the multiple pieces of slice information as the target slice information, and indicate the target slice information to the network device through the second information.
- the network device may not send the first information to the terminal device, that is, not indicate to the terminal device the slice information supported by the target cell.
- the terminal device reports the slice information supported or selected by the terminal device to the network device through the second information.
- the network device selects an appropriate AMF according to the slice information reported by the terminal device to establish a service session with the terminal device.
- the slice information supported or selected by the terminal device may not be the slice information supported by the target cell.
- the type of slicing indicated by the slicing information supported or selected by the terminal device is TSC1
- the resident cell does not support the slicing
- the network device can bar the terminal device, and the terminal device can select other cells to access.
- the size of the sequence number of the above-mentioned processes does not mean the order of execution.
- the execution order of each process should be determined by its function and internal logic, and should not be implemented in this application.
- the implementation process of the example constitutes any limitation.
- the wireless communication method according to the embodiment of the present application is described in detail above.
- the communication device according to the embodiment of the present application will be described below in conjunction with FIG. 5 to FIG. 7.
- the technical features described in the method embodiment are applicable to the following device embodiments.
- FIG. 5 shows a schematic block diagram of a terminal device 300 according to an embodiment of the present application. As shown in FIG. 5, the terminal device 300 includes:
- the communication unit 310 is configured to receive first information, where the first information is used to indicate at least one slice information supported by the target cell.
- the processing unit 320 is configured to determine the target slice information based on the at least one slice information by the terminal device.
- the processing unit 320 is further configured to: access the network or perform random access based on the target slice information.
- the processing unit 320 is specifically configured to: determine a target random access parameter corresponding to the target slice information; and perform random access based on the target random access parameter.
- the first information is further used to indicate the random access parameter corresponding to the at least one slice information
- the processing unit 320 is specifically configured to: The random access parameter corresponding to the at least one slice information determines the target random access parameter.
- the target random access parameter includes a random access resource.
- the processing unit 320 is specifically configured to: access the network or perform random access based on the target slice information and parameters used for access control.
- the first information is also used to indicate the parameter used for access control.
- the parameter used for access control includes at least one of the following parameters: a barring parameter corresponding to the at least one slice information, the at least one The UAC parameter corresponding to the slice information and the access priority parameter corresponding to the at least one slice information.
- barring parameters corresponding to different slice information are different.
- the processing unit 320 is specifically configured to: if the value of the UAC parameter corresponding to the target slice information is 0, access the network or perform random access.
- the processing unit 320 is specifically configured to: select a random number; access the network or perform random access according to the random number and the UAC parameter corresponding to the target slice information.
- the processing unit 320 is specifically configured to: if the random number is less than or equal to the value of the UAC parameter, access the network or perform random access; if the random number If it is greater than the value of the UAC parameter, no network is accessed or random access is not performed.
- the processing unit 320 is specifically configured to: determine, according to the access priority parameter corresponding to the at least one slice information, the target slice information in the at least one slice information. Priority order; if the target slice information is at least one of the N slice information with the highest priority in the at least one slice information, access to the network or perform random access, N is greater than or equal to 1.
- the processing unit 320 is further configured to: determine a backoff indicator BI value for random access according to the target slice information.
- the priority of the slice indicated by the at least one slice information is inversely proportional to the BI value.
- the BI values corresponding to at least part of the slices indicated by the at least one slice information are different.
- the communication unit 310 is specifically configured to receive the first information broadcast by the network device through system information.
- the communication unit 310 is specifically configured to: receive the first information sent by the network device through a random access process.
- the communication unit 310 is further configured to send second information to the network device, where the second information is used to indicate slice information supported or selected by the terminal device.
- the communication unit 310 is specifically configured to send the second information to the network device through a random access process.
- the second information is carried in the first message in the two-step random access process, or carried in the first message or the first message in the four-step random access process.
- Three messages are carried.
- the second information is carried in a radio resource control RRC message.
- the at least one piece of slice information includes at least one of the following: network slice selection assistance information NSSAI, slice type, service type, slice identifier, identifier of the target cell, and The frequency point of the target cell, the public land mobile network PLMN identification, and the tracking area TA identification.
- terminal device 300 may correspond to the terminal device in the method 200, and can implement the corresponding operations of the terminal device in the method 200. For the sake of brevity, details are not described herein again.
- FIG. 6 shows a schematic block diagram of a network device 400 according to an embodiment of the present application.
- the network device 400 includes:
- the communication unit 410 is configured to send first information to the terminal device, where the first information is used to indicate at least one slice information supported by the target cell.
- the network device 400 further includes: a processing unit 420, configured to determine target slice information determined by the terminal device according to target random access parameters, where the target slice information is used for The terminal device accesses the network or performs random access, and the at least one piece of slice information includes the target slice information.
- a processing unit 420 configured to determine target slice information determined by the terminal device according to target random access parameters, where the target slice information is used for The terminal device accesses the network or performs random access, and the at least one piece of slice information includes the target slice information.
- the first information is further used to indicate the random access parameter corresponding to the at least one slice information, and the random access parameter corresponding to the at least one slice information includes the target random access parameter. Access parameters.
- the target random access parameter includes a random access resource.
- the first information is also used to indicate parameters used for access control
- the network device 400 further includes: a processing unit 420, configured to be used for access control based on the The parameter of the terminal device controls the access network or random access based on the slice information of the terminal device.
- the parameter used for access control includes at least one of the following parameters: a barring parameter corresponding to the at least one slice information, the at least one The UAC parameter corresponding to the slice information and the access priority parameter corresponding to the at least one slice information.
- barring parameters corresponding to different slice information are different.
- the processing unit 420 is further configured to: if the prohibition parameter corresponding to the at least one slice information is a parameter that prohibits terminal devices that do not support slicing from accessing the network or performing random access, Then, terminal devices that do not support slicing are prohibited from accessing the network or performing random access.
- the communication unit 410 is specifically configured to broadcast the first information through system information.
- the communication unit 410 is specifically configured to send the first information to the terminal device through a random access process.
- the communication unit 410 is further configured to: receive second information sent by the terminal device, where the second information is used to indicate slice information supported or selected by the terminal device.
- the communication unit 410 is specifically configured to receive the second information sent by the terminal device through a random access process.
- the second information is carried in the first message in the two-step random access process, or carried in the first message or the first message in the four-step random access process.
- Three messages are carried.
- the second information is carried in a radio resource control RRC message.
- the at least one piece of slice information includes at least one of the following: network slice selection assistance information NSSAI, slice type, service type, slice identifier, identifier of the target cell, and The frequency point of the target cell, the public land mobile network PLMN identification, and the tracking area TA identification.
- the network device 400 may correspond to the network device in the method 200, and can implement the corresponding operations of the network device in the method 200. For the sake of brevity, details are not described herein again.
- FIG. 7 is a schematic structural diagram of a communication device 500 provided by an embodiment of the present application.
- the communication device 500 shown in FIG. 7 includes a processor 510, and the processor 510 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- the communication device 500 may further include a memory 520.
- the processor 510 may call and run a computer program from the memory 520 to implement the method in the embodiment of the present application.
- the memory 520 may be a separate device independent of the processor 510, or may be integrated in the processor 510.
- the communication device 500 may further include a transceiver 530, and the processor 5710 may control the transceiver 530 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
- the transceiver 530 may include a transmitter and a receiver.
- the transceiver 530 may further include an antenna, and the number of antennas may be one or more.
- the communication device 500 may specifically be a network device of an embodiment of the present application, and the communication device 500 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. For the sake of brevity, it will not be repeated here. .
- the communication device 500 may specifically be a terminal device of an embodiment of the application, and the communication device 500 may implement the corresponding process implemented by the terminal device in each method of the embodiment of the application. For brevity, details are not repeated here. .
- FIG. 8 is a schematic structural diagram of a chip of an embodiment of the present application.
- the chip 600 shown in FIG. 8 includes a processor 610, and the processor 610 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- the chip 600 may further include a memory 620.
- the processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
- the memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
- the chip 600 may further include an input interface 630.
- the processor 610 can control the input interface 630 to communicate with other devices or chips, and specifically, can obtain information or data sent by other devices or chips.
- the chip 600 may further include an output interface 640.
- the processor 610 can control the output interface 640 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
- the chip can be applied to the terminal device in the embodiment of the present application, and the device can implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the device can implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the chip can be applied to the network equipment in the embodiments of the present application, and the device can implement the corresponding processes implemented by the network equipment in the various methods of the embodiments of the present application.
- the device can implement the corresponding processes implemented by the network equipment in the various methods of the embodiments of the present application.
- the chip mentioned in the embodiment of the present application may also be called a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip.
- the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
- the steps of the foregoing method embodiments may be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
- the above-mentioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
- DSP Digital Signal Processor
- ASIC application specific integrated circuit
- FPGA Field Programmable Gate Array
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
- the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
- the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- DRAM synchronous dynamic random access memory
- DDR SDRAM Double Data Rate Synchronous Dynamic Random Access Memory
- Enhanced SDRAM, ESDRAM Enhanced Synchronous Dynamic Random Access Memory
- Synchronous Link Dynamic Random Access Memory Synchronous Link Dynamic Random Access Memory
- DR RAM Direct Rambus RAM
- the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is to say, the memory in the embodiments of the present application is intended to include but not limited to these and any other suitable types of memory.
- FIG. 9 is a schematic block diagram of a communication system 700 according to an embodiment of the present application. As shown in FIG. 9, the communication system 700 includes a terminal device 710 and a network device 720.
- the terminal device 710 can be used to implement the corresponding function implemented by the terminal device in the above method
- the network device 720 can be used to implement the corresponding function implemented by the network device in the above method. For brevity, it will not be repeated here. .
- the embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
- the computer-readable storage medium may be applied to the terminal device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the embodiments of the present application also provide a computer program product, including computer program instructions.
- the computer program product can be applied to the terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- the sake of brevity it is not here. Go into details again.
- the computer program product may be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the embodiment of the present application also provides a computer program.
- the computer program can be applied to the terminal device in the embodiment of the present application.
- the computer program runs on the computer, the computer is caused to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
- I won’t repeat it here.
- the computer program can be applied to the network device in the embodiment of the present application.
- the computer program runs on the computer, it causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- I won’t repeat it here.
- the disclosed system, device, and method can be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请实施例涉及一种通信方法、终端设备和网路设备,可以满足终端设备以较低的时延进行一系列动作的要求。该方法包括:终端设备接收第一信息,所述第一信息用于指示目标小区支持的至少一个切片信息;所述终端设备基于所述至少一个切片信息,确定目标切片信息。
Description
本申请涉及通信领域,具体涉及一种无线通信的方法、终端设备和网络设备。
新无线(new radio,NR)系统(或称5G系统、5G网络)对时延的要求较高。比如,超可靠低时延(Ultra reliability and Low Latency Communication,uRLLC)场景(例如自动驾驶、远程手术、工业控制等场景),需要支持1ms的超低时延。
终端设备在进行某些动作时,如接入某个小区,同样也需要以较低的时延接入该小区。因此,终端设备如何以较低的时延进行某些动作(如接入某个小区),是一项亟待解决的问题。
发明内容
本申请实施例提供一种无线通信的方法、终端设备和网络设备,可以满足终端设备以较低的时延进行一系列动作的要求。
第一方面,提供了一种无线通信的方法,所述方法包括:终端设备接收第一信息,所述第一信息用于指示目标小区支持的至少一个切片信息;
所述终端设备基于所述至少一个切片信息,确定目标切片信息。
第二方面,提供了一种无线通信的方法,所述方法包括:网络设备向终端设备发送第一信息,所述第一信息用于指示目标小区支持的至少一个切片信息。
第三方面,提供了一种终端设备,用于执行上述第一方面或其各实现方式中的方法。
具体地,该终端设备包括用于执行上述第一方面或其各实现方式中的方法的功能模块。
第四方面,提供了一种网络设备,用于执行上述第二方面或其各实现方式中的方法。
具体地,该网络设备包括用于执行上述第二方面或其各实现方式中的方法的功能模块。
第五方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第一方面或其各实现方式中的方法。
第六方面,提供了一种网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第二方面或其各实现方式中的方法。
第七方面,提供了一种芯片,用于实现上述第一方面至第二方面中的任一方面或其各实现方式中的方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行如上述第一方面至第二方面中的任一方面或其各实现方式中的方法。
第八方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第一方面至第二方面中的任一方面或其各实现方式中的方法。
第九方面,提供了一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述第一方面至第二方面中的任一方面或其各实现方式中的方法。
第十方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面至第二方面中的任一方面或其各实现方式中的方法。
上述技术方案,网络设备向终端设备指示目标小区支持的切片信息,这样终端设备可以很快获取到目标小区支持的切片信息并确定目标切片信息,从而可以以较小的时延 基于目标切片信息执行后续行为,即可以满足终端设备以较低的时延进行一系列动作的要求。
图1是根据本申请实施例的一种通信系统架构的示意性图。
图2是根据本申请实施例的无线通信的方法的示意性流程图。
图3是根据本申请实施例的一种四步随机接入过程的示意性流程图。
图4是根据本申请实施例的一种两步随机接入过程的示意性流程图。
图5是根据本申请实施例的终端设备的示意性框图。
图6是根据本申请实施例的网络设备的示意性框图。
图7是根据本申请实施例的通信设备的示意性框图。
图8是根据本申请实施例的芯片的示意性框图。
图9是根据本申请实施例的通信系统的示意性框图。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
首先介绍本申请的应用场景,图1是一种适用于本申请的通信系统的示意图。
通信系统100包括网络设备110和终端设备120。终端设备120通过电磁波与网络设备110进行通信。
在本申请中,终端设备120可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备,例如,第三代合作伙伴计划(3rd generation partnership project,3GPP)所定义的用户设备(user equipment,UE),移动台(mobile station,MS),软终端,家庭网关,机顶盒等等。
网络设备110可以是3GPP所定义的基站,例如,5G移动通信系统中的基站(gNB)。网络设备110也可以是非3GPP(non-3GPP)的接入网设备,例如接入网关(access gateway,AG)。网络设备110还可以是中继站、接入点、车载设备、可穿戴设备以及其它类型的设备。
可选地,终端设备120之间可以进行终端直连(Device to Device,D2D)通信。
可选地,5G系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。
通信系统100仅是举例说明,适用本申请的通信系统不限于此,例如,通信系统100中包含的网络设备和终端设备的数量还可以是其它的数量。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端设备120,网络设备110和终端设备120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
还应理解,图1所示的通信系统100还可以是非地面通信网络(Non-Terrestrial Network,NTN)系统,也就是说,图1中的网络设备110可以是卫星。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。
垂直市场对无线通信的强劲需求是有目共睹的,为了满足垂直行业对延迟、移动性、可靠性、位置精度等方面的需求,RAN需要对如何在接入网支持垂直行业进行增强。其中,在接入网支持垂直行业方面进行增强的一种方式为基于切片(slicing)对不同需求的多个业务提供更低时延、更有目标性、更大的灵活性和更高的可扩展性服务。更具体地 说,RAN slicing可以使得应用程序提供商参与定制RAN的设计、部署和操作,更好地支持应用程序提供商的业务。因此,版本17(Release 17,Rel-17)引入了接入网对slicing的增强。
应理解,在本申请实施例中,slicing也可以称为网络切片(Network Slicing)。
为了方便对本申请实施例的理解,下面对slicing进行简单介绍。
5G中,多样化的业务需求对网络在速度、性能、安全、可靠性、时延等方面的需求各不相同。例如,增加移动带宽(Enhanced Mobile Broadband,eMBB)场景(例如虚拟现实、增强现实等场景),对带宽要求较高,需要xGbps的带宽。再例如,海量机器类通信(Massive Machine Type Communication,mMTC)场景(例如可穿戴场景、智能电网等场景),需要支持海量的设备接入,例如需要支持数亿或数十亿的超低时延的设备接入。再例如,uRLLC场景(例如自动驾驶、远程手术、工业控制等场景),需要支持1ms的超低时延。面对不同的场景、不同的要求以及极致体验的需求,slicing应运而生,它可以基于5G场景和需求灵活构建不同特征的网络。
slicing是部署在物理或者虚拟的基础设施上的,用于支持特定网络能力与网络特性的逻辑隔离的网络,可以包括接入网、传输网、核心网和应用服务器在内的完整的端到端的整个网络,部分网络功能也可以在多个slicing中共享。slicing也可以是终端设备、接入网、传输网、核心网和应用服务器的任意组合。
通常,不同slicing的网络特征并不相同,且要求slicing之间相互隔离,互不影响。如增强现实(Augmented Reality,AR)或虚拟现实(Virtual Reality,VR)业务的slicing要求大带宽、低时延;物联网(Internet of Things,IOT)业务的slicing要去支持海量终端设备的接入,但带宽小,对时延没要求。
图2是根据本申请实施例的无线通信的方法200的示意性流程图。图2所述的方法可以由终端设备和网络设备执行,该终端设备例如可以为图1中所示的终端设备120,该网络设备例如可以为图1中所示的网络设备110。如图2所示,该方法200可以包括以下内容中的至少部分内容。
在210中,终端设备接收第一信息,该第一信息用于指示目标小区支持的至少一个切片信息。
相应地,网络设备可以向终端设备发送第一信息。
在220中,终端设备基于至少一个切片信息,确定目标切片信息。
其中,目标小区可以是驻留小区或服务小区,目标切片信息是目标小区的切片信息。
切片信息可以包括但不限于以下中的至少一种:网络切片选择辅助信息(network slice selection assistance information,NSSAI)、切片类型(slice type)、服务类型(Service type)、切片标识、目标小区的标识、目标小区的频点、公共陆地移动网络(public land mobile network,PLMN)标识、跟踪区(tracking area,TA)标识。
示例性地,NSSAI例如可以为单网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI),目标小区的标识可以是目标小区的ID,其中,目标小区的ID可以为小区全局标识(cell global identifier,CGI)。应理解,此处提到的CGI可以为演进的通用路基无线接入网(evolved universal terrestrial radio access network,E-UTRAN)CGI(ECGI),或者,也可以为NR CGI(NCGI)。
终端设备确定目标切片信息后,可以基于目标切片信息,接入网络或者执行随机接入。比如终端设备可以基于目标切片信息接入目标小区。
该技术方案,网络设备向终端设备指示目标小区支持的切片信息,使得终端设备可以较快获取到目标小区的切片信息,从而终端设备可以较快地根据切片信息来选择合适的小区或资源,避免了终端设备接入网络的时延和业务服务时延。
下面将结合图3和图4简单介绍随机接入过程。
随机接入过程通常可以由以下事件触发:
(1)初始接入(Initial Access)。
终端设备可以从无线资源控制(Radio Resource Control,RRC)空闲态(RRC_IDLE态)进入RRC连接态(RRC_CONNECTED)。
(2)RRC连接重建过程(RRC Connection Re-establishment procedure)。
(3)切换(Handover)。
此时,终端设备处于连接态,需要与新的小区建立上行同步。
(4)RRC连接态下,下行数据或上行数据到达时,上行处于“不同步”状态(DL or UL data arrival during RRC_CONNECTED when UL synchronisation status is"non-synchronised")。
(5)RRC连接态下,上行数据到达时,没有可用的物理上行控制信道(Physical Uplink Control Channel,PUCCH)资源用于调度请求(Scheduling Request,SR)传输(UL data arrival during RRC_CONNECTED when there are no PUCCH resources for SR available)。
(6)SR失败(SR failure)。
(7)RRC在同步配置时的请求(Request by RRC upon synchronous reconfiguration)。
(8)终端设备从RRC非激活态过渡(Transition from RRC_INACTIVE)。
(9)在SCell添加时建立时间对齐(To establish time alignment at SCell addition)。
(10)终端设备请求其他系统信息(Other System Information,OSI)。
(11)终端设备需要进行波束(Beam)失败的恢复(Beam failure recovery)。
在NR系统中,可以支持两种随机接入方式:如图3所示的基于竞争的随机接入方式和基于非竞争的随机接入方式。下面简单描述基于竞争的四步随机接入过程:
步骤1,终端设备向网络设备发送随机接入前导码(Preamble,也即message1,Msg1)。
其中,随机接入前导码也可以称为前导码、随机接入前导码序列、前导码序列等。
具体而言,终端设备可以选择物理随机接入信道(Physical Random Access Channel,PRACH)资源,PRACH资源可以包括时域资源、频域资源和码域资源。接下来,终端设备可以在选择的PRACH资源上发送选择的Preamble。网络设备可以根据Preamble估计其与终端设备之间的传输时延并以此校准上行定时(timing),以及可以大体确定终端设备传输消息3(Msg3)所需要的资源大小。
步骤2,网络设备向终端设备发送随机接入响应(Random Access Response,RAR,也即message2,Msg2)。
终端设备向网络设备发送Preamble后,可以开启一个RAR窗口,在该RAR窗口内根据随机访问无线网络临时标识符(Random Access Radio Network Temporary Identifier,RA-RNTI)检测对应的物理下行控制信道(Physical Downlink Control Channel,PDCCH)。若终端设备检测到RA-RNTI加扰的PDCCH后,可以获得该PDCCH调度的物理下行共享信道(Physical Downlink Shared Channel,PDSCH)。其中,该PDSCH中包括Preamble对应的RAR。
如果在此RAR窗口内没有接收到网络设备回复的RAR,则终端设备可以认为此次随机接入过程失败。应理解,终端设备和网络设备都需要唯一地确定RA-RNTI的值,否则终端设备就无法解码RAR。
可选地,本申请实施例中,RA-RNTI可以通过收发双方都明确的Preamble的时频位置来计算RA-RNTI的值。比如,与Preamble相关联的RA-RNTI可以通过公式(1)计算:
RA-RNTI=1+s_id+14×t_id+14×80×f_id+14×80×8×ul_carrier_id (1)
其中,s_id为PRACH资源的第一个正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)符号的索引(0≤s_id<14),t_id为一个系统帧中PRACH资源的第一个时隙的索引(0≤t_id<80),f_id为频域中PRACH资源的索引(0≤f_id<8),ul_carrier_id为用于传输Preamble的上行载波(0表示NUL载波,1表示SUL载波)。对于FDD而 言,每个子帧只有一个PRACH资源,因此,f_id固定为0。
换句话说,由于终端设备发送的Preamble时频位置是确定的,网络设备在解码Preamble时,也获得了该Preamble的时频位置,进而可以知道RAR中需要使用的RA-RNTI。当终端设备成功地接收到一个RAR(使用确定的RA-RNTI来解码),且该RAR中的随机访问序列标识符(Random Access Preamble Identifier,RAPID)与终端设备发送的Preamble index相同时,则可以认为成功接收了RAR,此时终端设备就可以停止检测RA-RNTI加扰的PDCCH了。
步骤3,终端设备发送Msg3。
终端设备在收到RAR消息后,判断该RAR是否为属于自己的RAR消息,例如终端设备可以利用前导码索引进行核对,在确定是属于自己的RAR消息后,可以在RRC层产生Msg3,并向网络设备发送Msg3,其中需要携带终端设备的标识信息等。
其中,Msg3主要用于通知网络设备该随机接入的触发事件。针对不同的随机接入触发事件,终端设备在步骤3中发送的Msg3可以包括不同的内容。
例如,对于初始接入的场景,Msg3可以包括RRC层生成的RRC连接请求消息(RRC Setup Request)。此外,Msg3还可以携带例如终端设备的5G-服务临时移动用户标识(Serving-Temporary Mobile Subscriber Identity,S-TMSI)或随机数等。
又例如,对于RRC连接重建场景,Msg3可以包括RRC层生成的RRC连接重建请求消息(RRC Reestabilshment Request)。此外,Msg3还可以携带例如小区无线网络临时标识(Cell Radio Network Temporary Identifier,C-RNTI)等。
又例如,对于切换场景,Msg3可以包括RRC层生成的RRC切换确认消息(RRC Handover Confirm),其携带终端设备的C-RNTI。此外,Msg3还可携带例如缓冲状态报告(Buffer Status Report,BSR)等信息。对于其它触发事件例如上/下行数据到达的场景,Msg3至少可以包括终端设备的C-RNTI。
步骤4,网络设备向终端设备发送冲突解决消息(contention resolution),即Msg4。
网络设备向终端设备发送Msg4,终端设备正确接收Msg4完成竞争解决(Contention Resolution)。例如在RRC连接建立过程中,Msg4中可以携带RRC连接建立消息。
由于步骤3中的终端设备可以在Msg3中携带自己唯一的标识,从而网络设备在竞争解决机制中,会在Msg4中携带终端设备的唯一标识以指定竞争中胜出的终端设备。而其它没有在竞争解决中胜出的终端设备将重新发起随机接入。
应理解,在本申请实施例中,竞争冲突解决可以有两种方式:
方式一、如果终端设备在Msg3携带了C-RNTI,则Msg4可以用C-RNTI加扰的PDCCH调度。
方式二、如果终端设备没有在Msg3中携带C-RNTI,比如是初始接入,则Msg4可以用TC-RNTI加扰的PDCCH调度。此时,竞争冲突的解决可以是通过终端设备接收Msg4的PDSCH,获得冲突解决ID,通过匹配该冲突解决ID与msg3中中的公共控制信道(Common control channel,CCCH)服务数据单元(Service Data Unit,SDU)来判断是否解决冲突。
四步随机接入的时延比较大,对于5G中的低时延高可靠场景是不合适的。考虑到低时延高可靠相关业务的特点,提出了两步随机接入过程的方案。如图5所示,在两步随机接入过程中,简单的说,相当于将四步随机接入过程的第一步和第三步合并为两步随机接入过程中的第一步,将四步随机接入过程的第二步和第四步合并为两步随机接入过程中的第二步。
更具体地,两步随机接入过程可以包括:
第一步:终端设备向网络设备发送第一消息。
其中,第一消息可以由Preamble和有效载荷(payload)组成,Preamble为四步随机接入的Preamble,该Preamble在PRACH资源上传输,Payload主要携带四步随机接入中 的Msg3中的信息。例如,可以包含CCCH SDU,比如对应RRC空闲态下的随机接入,也可以包含C-RNTI媒体访问控制(Media Access Control,MAC)控制单元(Control Element,CE),比如主要对应RRC连接态下的随机接入。Payload可以承载于上行信道,该信道例如可以为物理上行共享信道(Physical Uplink Shared Channel,PUSCH)。
应理解,第一消息可以携带四步随机接入过程中的Preamble和Msg3中携带的部分或全部信息。
第二步:网络设备向终端设备发送第二消息。
若网络设备成功接收到终端设备发送的第一消息,则可以向终端设备发送第二消息。该第二消息中可以包含四步随机接入过程中的Msg2和Msg4中携带的部分或全部信息。第一消息和第二消息的名称并不限定,也就是说,它们也可以表述为其他名称。例如,第一消息也可以称为Msg A、随机接入请求消息或新Msg1,第二消息也可以称为Msg B或新Msg2。
还应理解,图4仅仅是两步随机接入过程的一种具体实现方式,不应对本申请的保护范围构成限定。
在本申请实施例中,作为一种示例,网络设备可以通过系统信息,广播第一信息,从而终端设备可以接收到第一信息。
作为另一种示例,网络设备可以通过随机接入过程向终端设备发送第一信息。例如,网络设备可以通过四步随机接入过程中的RAR向终端设备发送第一信息,或者,网络设备可以通过两步随机接入过程中的第二消息向终端设备发送第一信息。
需要说明的是,若第一信息承载于四步随机接入过程中的RAR中,则承载第一信息的RAR的格式可以与目前的RAR的格式不同。进一步地,网络设备可以采用新的RNTI加扰RAR,以区分现有的RAR和承载第一信息的RAR。
或者,承载第一信息的RAR中可以包括M比特的区分域,以将本申请的RAR和现有技术中的RAR进行区分。其中,M大于或等于1。
若第一信息承载于两步随机接入过程中的第二消息中,该第二消息的实现方式可以参考上述RAR的实现方式,为了内容的简洁,此处不再赘述。
在一种实现方式中,终端设备基于目标切片信息,接入网络或者执行随机接入,具体可以包括:终端设备可以确定目标切片信息对应的目标随机接入参数,然后基于目标随机接入参数执行随机接入。
在一种可能的实施例中,终端设备可以根据目标切片信息,以及根据切片信息和随机接入参数的对应关系,确定目标随机接入参数。
可选地,第一信息还可以用于指示切片信息和随机接入参数的对应关系。即网络设备在向终端设备指示至少一个切片信息时,同时还向终端设备指示该至少一个切片信息中的每个切片信息对应的随机接入参数。或者,网络设备在向终端设备指示随机接入参数时,同时还向终端设备指示该随机接入参数对应的至少一个切片信息。
可选地,切片信息和随机接入参数的对应关系可以是预设在终端设备上的。
随机接入参数可以包括但不限于以下中的至少一种:L1参数、L2参数、随机接入资源。其中,L1参数和L2参数为RACH-configCommon,RACH-ConfigDedicated,RACH-ConfigGeneri中的参数至少之一,随机接入资源可以包括以下至少之一:Preamble、PRACH资源和rsrp-ThresholdSSB。
在终端设备确定了目标随机接入参数后,终端设备可以选择随机接入资源,从而执行随机接入过程。举例说明,目标切片信息指示的slicing type为TSC1,TSC1对应的随机接入资源为Preamble5-7,则终端设备可以选择Preamble5发起随机接入过程。
相应地,网络设备可以通过随机接入参数,或者,根据随机接入参数参数和目标切片信息的对应关系,确定终端设备确定的目标切片信息,从而网络设备可以根据目标切片信息选择对应的接入管理功能(Access Management Function,AMF)以建立和终端设 备之间的业务会话。
在另一种实现方式中,终端设备基于目标切片信息,接入网络或者执行随机接入,可以包括:终端设备基于目标切片信息和用于接入控制的参数(slicing-specific access control参数),接入网络或者执行随机接入。
相应地,网络设备可以基于用于接入控制的参数,对终端设备的基于切片信息的接入网络或者随机接入进行控制。
需要说明的是,若slicing-specific access controlcheck是高层要求或指示的,则终端设备在基于切片信息的接入网络或者执行随机接入时,还可以向高层上报接入尝试的结果。如,该接入类型是否被禁止(barred)。
其中,针对目标小区,slicing-specific access control参数可以包括以下参数中的至少一种:至少一个切片信息对应的禁止(bar)参数(slicing-specific cellbarred)、至少一个切片信息对应的统一接入控制(Unified Access Control,UAC)参数(slicing-specific uac-BarringInfo)和至少一个切片信息对应的接入优先级参数。
至少一个切片信息对应的bar参数可以理解为:为至少一个切片信息指示的slicing配置的bar参数;至少一个切片信息对应的UAC参数可以理解为:指示至少一个切片信息指示的slicing的UAC参数;至少一个切片信息对应的接入优先级参数可以理解为:用于指示至少一个切片信息指示的slicing的优先级的参数。
可选地,第一信息还可以用于指示slicing-specific access control参数。
应理解,在本申请实施例中,若不同slicing的优先级不同,则不同slicing的UAC参数可能不同和/或用于随机接入的回退指示(Backoff Indicator,BI)值可能不同。
还应理解,本申请实施例对bar参数、UAC参数和接入优先级参数的名称并不做具体限定。例如,bar参数还可以称为bar信息、UAC参数还可以称为UAC信息、接入优先级参数还可以称为接入优先级信息等。
BI值指定了终端设备重发Preamble前需要等待的时间范围。如果终端设备在RAR窗口内没有接收到RAR,或接收到的RAR中没有一个RAPID与自己选择的preamble索引相符合,则终端设备可以认为此次RAR接收失败。此时终端设备需要等待一段时间后,再发起随机接入。等待的时间可以为在0至BI值指定的等待时间区间内的任意一个随机值。
关于bar参数,不同的切片信息对应的bar参数可以相同也可以不同。也就是说,至少一个切片信息对应的bar参数可以都相同,或者,可以部分相同,或者,可以都不相同。即网络设备可以针对每个slicing设置对应的bar参数。
例如,网络设备可以针对slicing X配置bar参数,若网络设备针对slicing X配置的bar参数为cell bar for slicing X,则表示终端设备基于slicing X的接入被bar掉。
当然,网络设备也可以针对终端设备设置切片信息对应的bar参数。例如,若网络设备配置的bar参数为cell bar for non slicing,则网络设备可以bar掉不支持slicing的终端设备。也就是说,若bar参数为禁止不支持slicing的终端设备的参数,则网络设备可以禁止不支持slicing的终端设备接入网络或者执行随机接入。具体而言,当特定slicing拥塞或者即将拥塞时,网络设备可以利用专有消息元素(Information Element,IE)(如cellReservedForOtherUse)bar掉不支持slicing的终端设备。如cellReservedForOtherUse设置为true时,网络设备可以将不支持slicing的终端设备bar掉。
关于UAC参数,UAC参数可能的取值可以为0,1,2……x。示例性地,x可以为13或者11或者其他取值,本申请实施例对此不作限定。其中,不同的取值可以对应不同的业务。为了便于描述,以下将UAC参数的取值称为门限值。当然,UAC参数的取值也可以称为接入因子或者其他名称。
作为一种示例,若目标切片信息对应的门限值为0,则终端设备可以接入网络或者执行随机接入。
作为另一种示例,终端设备可以选择随机数,然后终端设备可以根据该随机数和门限值,接入网络或者执行随机接入控制。。
具体而言,若随机数小于或等于门限值,则终端设备可以接入网络或者执行随机接入;若随机数大于门限值,则终端设备可以不接入网络或者不执行随机接入。
若终端设备不接入网络或者不执行随机接入,则终端设备可以根据目标切片信息指示的slicing(为了描述方便,称为目标slicing)的优先级和/或目标slicing对应的BI值重新接入网络。
应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。
举例说明,网络设备指示了两个切片信息,该两个切片信息分别指示slicing1和slicing2,其中,slicing1的门限值为0.5,slicing2的门限值为1,终端设备将slicing1确定为目标slicing。若终端设备随机选择的随机数为0.3,由于0.3小于0.5,则终端设备可以接入网络。若终端设备随机选择的随机数为0.9,由于0.9大于0.5,则终端设备不接入网络。
又例如,网络设备指示了两个切片信息,该两个切片信息分别指示slicing1和slicing2,其中,slicing1的门限值为0.5,slicing1对应的BI值为A,slicing2的门限值为1,slicing2对应的BI值为B,终端设备将slicing2确定为目标slicing。若终端设备随机选择的随机数为0.3,由于0.3小于1,则终端设备可以接入网络。若终端设备随机选择的随机数为1.2,由于1.2大于1,则终端设备不接入网络,终端设备回退B时长后可以再尝试接入网络。
又例如,网络设备指示了两个切片信息,该两个切片信息分别指示slicing1和slicing2,其中,slicing1的门限值为0.5,slicing1的优先级为H,slicing2的门限值为1,slicing2的优先级为L,slicing1和slicing2对应的BI值都为K,终端设备将slicing1确定为目标slicing。若终端设备随机选择的随机数为0.3,由于0.3小于0.5,则终端设备可以接入网络。若终端设备随机选择的随机数为1.2,由于1.2大于0.5,则终端设备不接入网络,终端设备可以回退H*K时长后再尝试接入网络。
关于接入优先级参数,终端设备可以根据至少一个切片信息对应的接入优先级参数,确定目标slicing在至少一个slicing中的优先级顺序,若目标slicing为至少一个slicing中优先级最高的slicing,则终端设备可以接入网络或者执行随机接入;若目标slicing为至少一个slicing中优先级最高的N个slicing中的一个,则终端设备可以接入网络或者执行随机接入,N大于或等于1。
上述技术方案,终端设备根据slicing的接入优先级参数接入网络或者执行随机接入,可以避免小区接入拥塞,使得支持高优先级的slicing的终端设备可以优先接入网络,保证了该终端设备的性能。
可选地,终端设备还可以根据接入优先级参数确定目标切片信息。示例性地,终端设备可以根据接入优先级参数,在至少一个切片信息中确定用于指示优先级最高的slicing的切片信息,然后将该切片信息确定为目标切片信息。
可选地,在本申请实施例中,方法200还可以包括:终端设备根据目标切片信息,确定用于随机接入的回退指示(Backoff Indicator,BI)值。
可选地,该至少一个切片信息指示的slicing的优先级高低可以与BI值的大小成反比,即slicing的优先级越高,BI值越小。
例如,若目标slicing的优先级为第一优先级,则终端设备可以确定BI值为0;若目标slicing的优先级为第二优先级,则终端设备可以确定BI值为B;若目标slicing的优先级为第三优先级,则终端设备可以确定BI至为A。其中,B可以小于A。
可选地,该至少一个切片信息指示的slicing中的至少部分slicing对应的BI值可以 不同。
这样,若终端设备接入网络或执行随机接入未成功,则终端设备可以基于BI值重新接入网络或者执行随机接入。
可选地,方法200还可以包括:终端设备向网络设备发送第二信息,该第二信息可以用于指示终端设备支持或选择的切片信息。
第二信息可以承载于RRC消息中。例如,RRC消息可以是RRC连接建立请求消息,或者,RRC消息可以是RRC连接重建请求消息,再或者,RRC消息可以是RRC连接恢复消息。
或者,第二信息可以承载于随机接入过程中。具体地,第二信息可以承载于四步随机接入过程中的Msg1或者Msg3中,或者,第二信息可以承载于两步随机接入过程中的第二消息中。
可选地,终端设备支持或选择的切片信息可以属于第一信息指示的至少一个切片信息中的。此时,终端设备支持或选择的切片信息可以包括目标切片信息。
具体而言,终端设备接收到第一信息后,获取到目标小区支持的至少一个切片信息,然后终端设备在该至少一个切片信息中选择自己支持的切片信息,再通过第二信息向网络设备指示支持或选择的切片信息。若该至少一个切片信息中终端设备支持的切片信息只有一个,则终端设备可以将支持的切片信息确定为目标切片信息。
若该至少一个切片信息中终端设备支持的切片信息有多个,终端设备可以将该多个切片信息都发送给网络设备,网络设备接收到该多个切片信息后,可以在该多个切片信息后选择一个切片信息确定为目标切片信息,然后网络设备再将选择的目标切片信息指示给终端设备。或者,终端设备可以在该多个切片信息中选择一个切片信息作为目标切片信息,通过第二信息向网络设备指示目标切片信息。
需要说明的是,在本申请实施例中,网络设备可以不向终端设备发送第一信息,即不向终端设备指示目标小区支持的切片信息。终端设备通过第二信息向网络设备上报自己支持或选择的切片信息,网络设备接收到第二信息后,根据终端设备上报的切片信息选择合适的AMF以建立和终端设备之间的业务会话。
在这种情况中,终端设备支持或选择的切片信息可能并不是目标小区支持的切片信息。例如,终端设备支持或选择的切片信息指示的slicing的类型为TSC1,驻留小区不支持该slicing,则网络设备可以将终端设备bar掉,终端设备可以选择其他小区接入。
应理解,在本申请实施例中,“第一”和“第二”仅仅为了区分不同的对象,但并不对本申请实施例的范围构成限制。
以上结合附图详细描述了本申请的优选实施方式,但是,本申请并不限于上述实施方式中的具体细节,在本申请的技术构思范围内,可以对本申请的技术方案进行多种简单变型,这些简单变型均属于本申请的保护范围。
例如,在上述具体实施方式中所描述的各个具体技术特征,在不矛盾的情况下,可以通过任何合适的方式进行组合,为了避免不必要的重复,本申请对各种可能的组合方式不再另行说明。
又例如,本申请的各种不同的实施方式之间也可以进行任意组合,只要其不违背本申请的思想,其同样应当视为本申请所公开的内容。
应理解,在本申请的各种方法实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
上文中详细描述了根据本申请实施例的无线通信的方法,下面将结合图5至图7,描述根据本申请实施例的通信装置,方法实施例所描述的技术特征适用于以下装置实施例。
图5示出了本申请实施例的终端设备300的示意性框图。如图5所示,该终端设备300包括:
通信单元310,用于接收第一信息,所述第一信息用于指示目标小区支持的至少一个切片信息。
处理单元320,用于所述终端设备基于所述至少一个切片信息,确定目标切片信息。
可选地,在本申请实施例中,所述处理单元320还用于:基于所述目标切片信息,接入网络或者执行随机接入。
可选地,在本申请实施例中,所述处理单元320具体用于:确定所述目标切片信息对应的目标随机接入参数;基于所述目标随机接入参数,执行随机接入。
可选地,在本申请实施例中,所述第一信息还用于指示所述至少一个切片信息对应的随机接入参数,所述处理单元320具体用于:基于所述目标切片信息和所述至少一个切片信息对应的随机接入参数,确定所述目标随机接入参数。
可选地,在本申请实施例中,所述目标随机接入参数包括随机接入资源。
可选地,在本申请实施例中,所述处理单元320具体用于:基于所述目标切片信息和用于接入控制的参数,接入网络或者执行随机接入。
可选地,在本申请实施例中,所述第一信息还用于指示所述用于接入控制的参数。
可选地,在本申请实施例中,针对所述目标小区,所述用于接入控制的参数包括以下参数中的至少一种:所述至少一个切片信息对应的禁止参数、所述至少一个切片信息对应的UAC参数和所述至少一个切片信息对应的接入优先级参数。
可选地,在本申请实施例中,在所述用于接入控制的参数中,不同切片信息对应的禁止参数不同。
可选地,在本申请实施例中,所述处理单元320具体用于:若所述目标切片信息对应的UAC参数的取值为0,接入网络或者执行随机接入。
可选地,在本申请实施例中,处理单元320具体用于:选择随机数;根据所述随机数和所述目标切片信息对应的UAC参数,接入网络或者执行随机接入。
可选地,在本申请实施例中,所述处理单元320具体用于:若所述随机数小于或等于所述UAC参数的取值,接入网络或者执行随机接入;若所述随机数大于所述UAC参数的取值,不接入网络或者不执行随机接入。
可选地,在本申请实施例中,所述处理单元320具体用于:根据所述至少一个切片信息对应的接入优先级参数,确定所述目标切片信息在所述至少一个切片信息中的优先级顺序;若所述目标切片信息为所述至少一个切片信息中优先级最高的N个切片信息中的至少一个,接入网络或者执行随机接入,N大于或等于1。
可选地,在本申请实施例中,所述处理单元320还用于:根据所述目标切片信息,确定用于随机接入的回退指示BI值。
可选地,在本申请实施例中,所述至少一个切片信息指示的切片的优先级高低与BI值的大小成反比。
可选地,在本申请实施例中,所述至少一个切片信息指示的至少部分切片对应的BI值不同。
可选地,在本申请实施例中,所述通信单元310具体用于:接收网络设备通过系统信息广播的所述第一信息。
可选地,在本申请实施例中,所述通信单元310具体用于:接收所述网络设备通过随机接入过程发送的所述第一信息。
可选地,在本申请实施例中,所述通信单元310还用于:向网络设备发送第二信息,所述第二信息用于指示所述终端设备支持或选择的切片信息。
可选地,在本申请实施例中,所述通信单元310具体用于:通过随机接入过程,向所述网络设备发送所述第二信息。
可选地,在本申请实施例中,所述第二信息承载于两步随机接入过程中的第一条消息中,或承载于四步随机接入过程中的第一条消息中或第三条消息中。
可选地,在本申请实施例中,所述第二信息承载于无线资源控制RRC消息中。
可选地,在本申请实施例中,所述至少一个切片信息包括以下中的至少一种:网络切片选择辅助信息NSSAI、切片类型、服务类型、切片标识、所述目标小区的标识、所述目标小区的频点、公共陆地移动网络PLMN标识、跟踪区TA标识。
应理解,该终端设备300可对应于方法200中的终端设备,可以实现该方法200中的终端设备的相应操作,为了简洁,在此不再赘述。
图6示出了本申请实施例的网络设备400的示意性框图。如图6所示,该网络设备400包括:
通信单元410,用于向终端设备发送第一信息,所述第一信息用于指示目标小区支持的至少一个切片信息。
可选地,在本申请实施例中,所述网络设备400还包括:处理单元420,用于根据目标随机接入参数,确定所述终端设备确定的目标切片信息,所述目标切片信息用于所述终端设备接入网络或者执行随机接入,所述至少一个切片信息包括所述目标切片信息。
可选地,在本申请实施例中,所述第一信息还用于指示所述至少一个切片信息对应的随机接入参数,所述至少一个切片信息对应的随机接入参数包括所述目标随机接入参数。
可选地,在本申请实施例中,所述目标随机接入参数包括随机接入资源。
可选地,在本申请实施例中,所述第一信息还用于指示用于接入控制的参数,所述网络设备400还包括:处理单元420,用于基于所述用于接入控制的参数,对所述终端设备的基于切片信息的接入网络或者随机接入进行控制。
可选地,在本申请实施例中,针对所述目标小区,所述用于接入控制的参数包括以下参数中的至少一种:所述至少一个切片信息对应的禁止参数、所述至少一个切片信息对应的UAC参数和所述至少一个切片信息对应的接入优先级参数。
可选地,在本申请实施例中,在所述用于接入控制的参数中,不同切片信息对应的禁止参数不同。
可选地,在本申请实施例中,所述处理单元420还用于:若所述至少一个切片信息对应的禁止参数为禁止不支持切片的终端设备接入网络或者执行随机接入的参数,则禁止不支持切片的终端设备接入网络或者执行随机接入。
可选地,在本申请实施例中,所述通信单元410具体用于:通过系统信息广播所述第一信息。
可选地,在本申请实施例中,所述通信单元410具体用于:通过随机接入过程向所述终端设备发送所述第一信息。
可选地,在本申请实施例中,所述通信单元410还用于:接收所述终端设备发送的第二信息,所述第二信息用于指示所述终端设备支持或选择的切片信息。
可选地,在本申请实施例中,所述通信单元410具体用于:通过随机接入过程,接收所述终端设备发送的所述第二信息。
可选地,在本申请实施例中,所述第二信息承载于两步随机接入过程中的第一条消息中,或承载于四步随机接入过程中的第一条消息中或第三条消息中。
可选地,在本申请实施例中,所述第二信息承载于无线资源控制RRC消息中。
可选地,在本申请实施例中,所述至少一个切片信息包括以下中的至少一种:网络切片选择辅助信息NSSAI、切片类型、服务类型、切片标识、所述目标小区的标识、所述目标小区的频点、公共陆地移动网络PLMN标识、跟踪区TA标识。
应理解,该网络设备400可对应于方法200中的网络设备,可以实现该方法200中的网络设备的相应操作,为了简洁,在此不再赘述。
图7是本申请实施例提供的一种通信设备500示意性结构图。图7所示的通信设备500包括处理器510,处理器510可以从存储器中调用并运行计算机程序,以实现本申请 实施例中的方法。
可选地,如图7所示,通信设备500还可以包括存储器520。其中,处理器510可以从存储器520中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器520可以是独立于处理器510的一个单独的器件,也可以集成在处理器510中。
可选地,如图7所示,通信设备500还可以包括收发器530,处理器5710可以控制该收发器530与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器530可以包括发射机和接收机。收发器530还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备500具体可为本申请实施例的网络设备,并且该通信设备500可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备500具体可为本申请实施例的终端设备,并且该通信设备500可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
图8是本申请实施例的芯片的示意性结构图。图8所示的芯片600包括处理器610,处理器610可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图8所示,芯片600还可以包括存储器620。其中,处理器610可以从存储器620中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器620可以是独立于处理器610的一个单独的器件,也可以集成在处理器610中。
可选地,该芯片600还可以包括输入接口630。其中,处理器610可以控制该输入接口630与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片600还可以包括输出接口640。其中,处理器610可以控制该输出接口640与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的终端设备,并且该装置可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该装置可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可 包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
图9是本申请实施例提供的一种通信系统700的示意性框图。如图9所示,该通信系统700包括终端设备710和网络设备720。
其中,该终端设备710可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备720可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选地,该计算机可读存储介质可应用于本申请实施例中的终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选地,该计算机程序产品可应用于本申请实施例中的终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选地,该计算机程序可应用于本申请实施例中的终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。
Claims (86)
- 一种无线通信的方法,其特征在于,所述方法包括:终端设备接收第一信息,所述第一信息用于指示目标小区支持的至少一个切片信息;所述终端设备基于所述至少一个切片信息,确定目标切片信息。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:所述终端设备基于所述目标切片信息,接入网络或者执行随机接入。
- 根据权利要求2所述的方法,其特征在于,所述终端设备基于所述目标切片信息,接入网络或者执行随机接入,包括:所述终端设备确定所述目标切片信息对应的目标随机接入参数;所述终端设备基于所述目标随机接入参数,执行随机接入。
- 根据权利要求3所述的方法,其特征在于,所述第一信息还用于指示所述至少一个切片信息对应的随机接入参数,所述终端设备确定所述目标切片信息对应的目标随机接入参数,包括:所述终端设备基于所述目标切片信息和所述至少一个切片信息对应的随机接入参数,确定所述目标随机接入参数。
- 根据权利要求3或4所述的方法,其特征在于,所述目标随机接入参数包括随机接入资源。
- 根据权利要求2至5中任一项所述的方法,其特征在于,所述终端设备基于所述目标切片信息,接入网络或者执行随机接入,包括:所述终端设备基于所述目标切片信息和用于接入控制的参数,接入网络或者执行随机接入。
- 根据权利要求6所述的方法,其特征在于,所述第一信息还用于指示所述用于接入控制的参数。
- 根据权利要求6或7所述的方法,其特征在于,针对所述目标小区,所述用于接入控制的参数包括以下参数中的至少一种:所述至少一个切片信息对应的禁止参数、所述至少一个切片信息对应的统一接入控制UAC参数和所述至少一个切片信息对应的接入优先级参数。
- 根据权利要求8所述的方法,其特征在于,在所述用于接入控制的参数中,不同切片信息对应的禁止参数不同。
- 根据权利要求8或9所述的方法,其特征在于,所述终端设备基于所述目标切片信息和用于接入控制的参数,接入网络或者执行随机接入,包括:若所述目标切片信息对应的UAC参数的取值为0,所述终端设备接入网络或者执行随机接入。
- 根据权利要求8或9所述的方法,其特征在于,所述终端设备基于所述目标切片信息和用于接入控制的参数,接入网络或者执行随机接入,包括:所述终端设备选择随机数;所述终端设备根据所述随机数和所述目标切片信息对应的UAC参数,接入网络或者执行随机接入。
- 根据权利要求11所述的方法,其特征在于,所述终端设备根据所述随机数和所述目标切片信息对应的UAC参数,接入网络或者执行随机接入,包括:若所述随机数小于或等于所述UAC参数的取值,所述终端设备接入网络或者执行随机接入;若所述随机数大于所述UAC参数的取值,所述终端设备不接入网络或者不执行随机接入。
- 根据权利要求8至12中任一项所述的方法,其特征在于,所述终端设备基于所 述目标切片信息和用于接入控制的参数,接入网络或者执行随机接入,包括:所述终端设备根据所述至少一个切片信息对应的接入优先级参数,确定所述目标切片信息在所述至少一个切片信息中的优先级顺序;若所述目标切片信息为所述至少一个切片信息中优先级最高的N个切片信息中的至少一个,所述终端设备接入网络或者执行随机接入,N大于或等于1。
- 根据权利要求1至13中任一项所述的方法,其特征在于,所述方法还包括:所述终端设备根据所述目标切片信息,确定用于随机接入的回退指示BI值。
- 根据权利要求14所述的方法,其特征在于,所述至少一个切片信息指示的切片的优先级高低与BI值的大小成反比。
- 根据权利要求14或15所述的方法,其特征在于,所述至少一个切片信息指示的至少部分切片对应的BI值不同。
- 根据权利要求1至16中任一项所述的方法,其特征在于,所述终端设备接收第一信息,包括:所述终端设备接收网络设备通过系统信息广播的所述第一信息。
- 根据权利要求1至16中任一项所述的方法,其特征在于,所述终端设备接收第一信息,包括:所述终端设备接收所述网络设备通过随机接入过程发送的所述第一信息。
- 根据权利要求1至18中任一项所述的方法,其特征在于,所述方法还包括:所述终端设备向网络设备发送第二信息,所述第二信息用于指示所述终端设备支持或选择的切片信息。
- 根据权利要求19所述的方法,其特征在于,所述终端设备向网络设备发送第二信息,包括:所述终端设备通过随机接入过程,向所述网络设备发送所述第二信息。
- 根据权利要求20所述的方法,其特征在于,所述第二信息承载于两步随机接入过程中的第一条消息中,或承载于四步随机接入过程中的第一条消息中或第三条消息中。
- 根据权利要求19所述的方法,其特征在于,所述第二信息承载于无线资源控制RRC消息中。
- 根据权利要求1至22中任一项所述的方法,其特征在于,所述至少一个切片信息包括以下中的至少一种:网络切片选择辅助信息NSSAI、切片类型、服务类型、切片标识、所述目标小区的标识、所述目标小区的频点、公共陆地移动网络PLMN标识、跟踪区TA标识。
- 一种无线通信的方法,其特征在于,所述方法包括:网络设备向终端设备发送第一信息,所述第一信息用于指示目标小区支持的至少一个切片信息。
- 根据权利要求24所述的方法,其特征在于,所述方法还包括:所述网络设备根据目标随机接入参数,确定所述终端设备确定的目标切片信息,所述目标切片信息用于所述终端设备接入网络或者执行随机接入,所述至少一个切片信息包括所述目标切片信息。
- 根据权利要求25所述的方法,其特征在于,所述第一信息还用于指示所述至少一个切片信息对应的随机接入参数,所述至少一个切片信息对应的随机接入参数包括所述目标随机接入参数。
- 根据权利要求25或26所述的方法,其特征在于,所述目标随机接入参数包括随机接入资源。
- 根据权利要求24至27中任一项所述的方法,其特征在于,所述第一信息还用于指示用于接入控制的参数,所述方法还包括:所述网络设备基于所述用于接入控制的参数,对所述终端设备的基于切片信息的接 入网络或者随机接入进行控制。
- 根据权利要求28所述的方法,其特征在于,针对所述目标小区,所述用于接入控制的参数包括以下参数中的至少一种:所述至少一个切片信息对应的禁止参数、所述至少一个切片信息对应的统一接入控制UAC参数和所述至少一个切片信息对应的接入优先级参数。
- 根据权利要求29所述的方法,其特征在于,在所述用于接入控制的参数中,不同切片信息对应的禁止参数不同。
- 根据权利要求29所述的方法,其特征在于,所述方法还包括:若所述至少一个切片信息对应的禁止参数为禁止不支持切片的终端设备接入网络或者执行随机接入的参数,则所述网络设备禁止不支持切片的终端设备接入网络或者执行随机接入。
- 根据权利要求24至31中任一项所述的方法,其特征在于,所述网络设备向终端设备发送第一信息,包括:所述网络设备通过系统信息广播所述第一信息。
- 根据权利要求24至31中任一项所述的方法,其特征在于,所述网络设备向终端设备发送第一信息,包括:所述网络设备通过随机接入过程向所述终端设备发送所述第一信息。
- 根据权利要求24至33中任一项所述的方法,其特征在于,所述方法还包括:所述网络设备接收所述终端设备发送的第二信息,所述第二信息用于指示所述终端设备支持或选择的切片信息。
- 根据权利要求34所述的方法,其特征在于,所述网络设备接收所述终端设备发送的第二信息,包括:所述网络设备通过随机接入过程,接收所述终端设备发送的所述第二信息。
- 根据权利要求35所述的方法,其特征在于,所述第二信息承载于两步随机接入过程中的第一条消息中,或承载于四步随机接入过程中的第一条消息中或第三条消息中。
- 根据权利要求34所述的方法,其特征在于,所述第二信息承载于无线资源控制RRC消息中。
- 根据权利要求24至37中任一项所述的方法,其特征在于,所述至少一个切片信息包括以下中的至少一种:网络切片选择辅助信息NSSAI、切片类型、服务类型、切片标识、所述目标小区的标识、所述目标小区的频点、公共陆地移动网络PLMN标识、跟踪区TA标识。
- 一种终端设备,其特征在于,包括:通信单元,用于接收第一信息,所述第一信息用于指示目标小区支持的至少一个切片信息;处理单元,用于所述终端设备基于所述至少一个切片信息,确定目标切片信息。
- 根据权利要求39所述的终端设备,其特征在于,所述处理单元还用于:基于所述目标切片信息,接入网络或者执行随机接入。
- 根据权利要求40所述的终端设备,其特征在于,所述处理单元具体用于:确定所述目标切片信息对应的目标随机接入参数;基于所述目标随机接入参数,执行随机接入。
- 根据权利要求41所述的终端设备,其特征在于,所述第一信息还用于指示所述至少一个切片信息对应的随机接入参数,所述处理单元具体用于:基于所述目标切片信息和所述至少一个切片信息对应的随机接入参数,确定所述目标随机接入参数。
- 根据权利要求41或42所述的终端设备,其特征在于,所述目标随机接入参数包括随机接入资源。
- 根据权利要求40至43中任一项所述的终端设备,其特征在于,所述处理单元具体用于:基于所述目标切片信息和用于接入控制的参数,接入网络或者执行随机接入。
- 根据权利要求44所述的终端设备,其特征在于,所述第一信息还用于指示所述用于接入控制的参数。
- 根据权利要求44或45所述的终端设备,其特征在于,针对所述目标小区,所述用于接入控制的参数包括以下参数中的至少一种:所述至少一个切片信息对应的禁止参数、所述至少一个切片信息对应的统一接入控制UAC参数和所述至少一个切片信息对应的接入优先级参数。
- 根据权利要求46所述的终端设备,其特征在于,在所述用于接入控制的参数中,不同切片信息对应的禁止参数不同。
- 根据权利要求46或47所述的终端设备,其特征在于,所述处理单元具体用于:若所述目标切片信息对应的UAC参数的取值为0,接入网络或者执行随机接入。
- 根据权利要求46或47所述的终端设备,其特征在于,处理单元具体用于:选择随机数;根据所述随机数和所述目标切片信息对应的UAC参数,接入网络或者执行随机接入。
- 根据权利要求49所述的终端设备,其特征在于,所述处理单元具体用于:若所述随机数小于或等于所述UAC参数的取值,接入网络或者执行随机接入;若所述随机数大于所述UAC参数的取值,不接入网络或者不执行随机接入。
- 根据权利要求46至50中任一项所述的终端设备,其特征在于,所述处理单元具体用于:根据所述至少一个切片信息对应的接入优先级参数,确定所述目标切片信息在所述至少一个切片信息中的优先级顺序;若所述目标切片信息为所述至少一个切片信息中优先级最高的N个切片信息中的至少一个,接入网络或者执行随机接入,N大于或等于1。
- 根据权利要求39至51中任一项所述的终端设备,其特征在于,所述处理单元还用于:根据所述目标切片信息,确定用于随机接入的回退指示BI值。
- 根据权利要求52所述的终端设备,其特征在于,所述至少一个切片信息指示的切片的优先级高低与BI值的大小成反比。
- 根据权利要求52或53所述的终端设备,其特征在于,所述至少一个切片信息指示的至少部分切片对应的BI值不同。
- 根据权利要求39至54中任一项所述的终端设备,其特征在于,所述通信单元具体用于:接收网络设备通过系统信息广播的所述第一信息。
- 根据权利要求39至54中任一项所述的终端设备,其特征在于,所述通信单元具体用于:接收所述网络设备通过随机接入过程发送的所述第一信息。
- 根据权利要求39至56中任一项所述的终端设备,其特征在于,所述通信单元还用于:向网络设备发送第二信息,所述第二信息用于指示所述终端设备支持或选择的切片信息。
- 根据权利要求57所述的终端设备,其特征在于,所述通信单元具体用于:通过随机接入过程,向所述网络设备发送所述第二信息。
- 根据权利要求58所述的终端设备,其特征在于,所述第二信息承载于两步随机 接入过程中的第一条消息中,或承载于四步随机接入过程中的第一条消息中或第三条消息中。
- 根据权利要求57所述的终端设备,其特征在于,所述第二信息承载于无线资源控制RRC消息中。
- 根据权利要求39至60中任一项所述的终端设备,其特征在于,所述至少一个切片信息包括以下中的至少一种:网络切片选择辅助信息NSSAI、切片类型、服务类型、切片标识、所述目标小区的标识、所述目标小区的频点、公共陆地移动网络PLMN标识、跟踪区TA标识。
- 一种网络设备,其特征在于,包括:通信单元,用于向终端设备发送第一信息,所述第一信息用于指示目标小区支持的至少一个切片信息。
- 根据权利要求62所述的网络设备,其特征在于,所述网络设备还包括:处理单元,用于根据目标随机接入参数,确定所述终端设备确定的目标切片信息,所述目标切片信息用于所述终端设备接入网络或者执行随机接入,所述至少一个切片信息包括所述目标切片信息。
- 根据权利要求63所述的网络设备,其特征在于,所述第一信息还用于指示所述至少一个切片信息对应的随机接入参数,所述至少一个切片信息对应的随机接入参数包括所述目标随机接入参数。
- 根据权利要求63或64所述的网络设备,其特征在于,所述目标随机接入参数包括随机接入资源。
- 根据权利要求62至65中任一项所述的网络设备,其特征在于,所述第一信息还用于指示用于接入控制的参数,所述网络设备还包括:处理单元,用于基于所述用于接入控制的参数,对所述终端设备的基于切片信息的接入网络或者随机接入进行控制。
- 根据权利要求66所述的网络设备,其特征在于,针对所述目标小区,所述用于接入控制的参数包括以下参数中的至少一种:所述至少一个切片信息对应的禁止参数、所述至少一个切片信息对应的统一接入控制UAC参数和所述至少一个切片信息对应的接入优先级参数。
- 根据权利要求67所述的网络设备,其特征在于,在所述用于接入控制的参数中,不同切片信息对应的禁止参数不同。
- 根据权利要求67所述的网络设备,其特征在于,所述处理单元还用于:若所述至少一个切片信息对应的禁止参数为禁止不支持切片的终端设备接入网络或者执行随机接入的参数,则禁止不支持切片的终端设备接入网络或者执行随机接入。
- 根据权利要求62至69中任一项所述的网络设备,其特征在于,所述通信单元具体用于:通过系统信息广播所述第一信息。
- 根据权利要求62至69中任一项所述的网络设备,其特征在于,所述通信单元具体用于:通过随机接入过程向所述终端设备发送所述第一信息。
- 根据权利要求62至71中任一项所述的网络设备,其特征在于,所述通信单元还用于:接收所述终端设备发送的第二信息,所述第二信息用于指示所述终端设备支持或选择的切片信息。
- 根据权利要求72所述的网络设备,其特征在于,所述通信单元具体用于:通过随机接入过程,接收所述终端设备发送的所述第二信息。
- 根据权利要求73所述的网络设备,其特征在于,所述第二信息承载于两步随机 接入过程中的第一条消息中,或承载于四步随机接入过程中的第一条消息中或第三条消息中。
- 根据权利要求72所述的网络设备,其特征在于,所述第二信息承载于无线资源控制RRC消息中。
- 根据权利要求62至75中任一项所述的网络设备,其特征在于,所述至少一个切片信息包括以下中的至少一种:网络切片选择辅助信息NSSAI、切片类型、服务类型、切片标识、所述目标小区的标识、所述目标小区的频点、公共陆地移动网络PLMN标识、跟踪区TA标识。
- 一种终端设备,其特征在于,包括:处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至23中任一项所述的方法。
- 一种网络设备,其特征在于,包括:处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求24至38中任一项所述的方法。
- 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至23中任一项所述的方法。
- 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求24至38中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至23中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求24至38中任一项所述的方法。
- 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至23中任一项所述的方法。
- 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求24至38中任一项所述的方法。
- 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求1至23中任一项所述的方法。
- 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求24至38中任一项所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202080093860.8A CN115004648A (zh) | 2020-01-13 | 2020-01-13 | 无线通信的方法、终端设备和网络设备 |
EP20913570.6A EP4089961A4 (en) | 2020-01-13 | 2020-01-13 | WIRELESS COMMUNICATION METHOD, TERMINAL DEVICE AND NETWORK DEVICE |
PCT/CN2020/071808 WO2021142580A1 (zh) | 2020-01-13 | 2020-01-13 | 无线通信的方法、终端设备和网络设备 |
US17/861,009 US20220345999A1 (en) | 2020-01-13 | 2022-07-08 | Wireless communication methods, terminal device, and network device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/071808 WO2021142580A1 (zh) | 2020-01-13 | 2020-01-13 | 无线通信的方法、终端设备和网络设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/861,009 Continuation US20220345999A1 (en) | 2020-01-13 | 2022-07-08 | Wireless communication methods, terminal device, and network device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021142580A1 true WO2021142580A1 (zh) | 2021-07-22 |
Family
ID=76863403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/071808 WO2021142580A1 (zh) | 2020-01-13 | 2020-01-13 | 无线通信的方法、终端设备和网络设备 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20220345999A1 (zh) |
EP (1) | EP4089961A4 (zh) |
CN (1) | CN115004648A (zh) |
WO (1) | WO2021142580A1 (zh) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106851589A (zh) * | 2016-12-30 | 2017-06-13 | 北京小米移动软件有限公司 | 无线网络接入方法、装置及系统 |
CN109565451A (zh) * | 2018-11-15 | 2019-04-02 | 北京小米移动软件有限公司 | 网络切片的使用方法及装置 |
CN110213066A (zh) * | 2018-02-28 | 2019-09-06 | 华为技术有限公司 | 一种切片信息的获取方法和中继装置 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102530272B1 (ko) * | 2017-04-26 | 2023-05-09 | 삼성전자 주식회사 | 랜덤 액세스 절차를 수행하는 방법 및 장치 |
-
2020
- 2020-01-13 CN CN202080093860.8A patent/CN115004648A/zh active Pending
- 2020-01-13 WO PCT/CN2020/071808 patent/WO2021142580A1/zh unknown
- 2020-01-13 EP EP20913570.6A patent/EP4089961A4/en active Pending
-
2022
- 2022-07-08 US US17/861,009 patent/US20220345999A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106851589A (zh) * | 2016-12-30 | 2017-06-13 | 北京小米移动软件有限公司 | 无线网络接入方法、装置及系统 |
CN110213066A (zh) * | 2018-02-28 | 2019-09-06 | 华为技术有限公司 | 一种切片信息的获取方法和中继装置 |
CN109565451A (zh) * | 2018-11-15 | 2019-04-02 | 北京小米移动软件有限公司 | 网络切片的使用方法及装置 |
Non-Patent Citations (3)
Title |
---|
OPPO: "Discussion on Access Control for Network Slicing", 3GPP TSG-RAN WG2#101 R2-1801792, 13 February 2018 (2018-02-13), XP051398969 * |
See also references of EP4089961A4 * |
ZTE ET AL.: "Consideration on the Impact of NW Slicing on RAN", 3GPP TSG-RAN WG2 MEETING #97 R2-1701387, 4 February 2017 (2017-02-04), XP051223508 * |
Also Published As
Publication number | Publication date |
---|---|
US20220345999A1 (en) | 2022-10-27 |
EP4089961A4 (en) | 2023-01-25 |
EP4089961A1 (en) | 2022-11-16 |
CN115004648A (zh) | 2022-09-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12048021B2 (en) | Random access method and device | |
EP3611943B1 (en) | Method and apparatus for acquiring system information | |
CN110933762B (zh) | 基于竞争的随机接入方法、系统、终端以及基站 | |
US20210410195A1 (en) | Method for two-step random access, terminal device and network device | |
WO2020215330A1 (zh) | 随机接入过程中传输信息的方法、终端设备和网络设备 | |
WO2020186466A1 (zh) | 无线通信的方法、终端设备和网络设备 | |
WO2021189254A1 (en) | Method and apparatus for sidelink resource re-evaluation | |
WO2020223878A1 (zh) | 随机接入的方法、终端设备和网络设备 | |
KR102433683B1 (ko) | 랜덤 접속 절차 메시지를 포함하는 타이밍 충돌 처리 | |
US10667299B2 (en) | Control plane latency reduction in a wireless communications network | |
WO2023019438A1 (zh) | 通信方法、终端、网络设备、介质、芯片、产品及程序 | |
US20220124825A1 (en) | 2-step random access method and apparatus, terminal and storage medium | |
WO2021142580A1 (zh) | 无线通信的方法、终端设备和网络设备 | |
CN116981071A (zh) | 随机接入方法及设备 | |
CN114208376B (zh) | 接收或发送随机接入消息的方法和装置 | |
WO2021223191A1 (zh) | 信息发送、接收方法、终端及网络设备 | |
WO2020206658A1 (zh) | 无线通信方法、终端设备和网络设备 | |
EP3836475A1 (en) | Method for controlling power ramp counter, and terminal device | |
WO2024230321A1 (zh) | 一种随机接入方法及相关设备 | |
WO2020186468A1 (zh) | 随机接入的方法和设备 | |
CN118972976A (zh) | 一种随机接入方法及相关设备 | |
CN116803159A (zh) | Cg资源维护方法、终端设备和网络设备 | |
JP2023506685A (ja) | ランダムアクセス問題の報告方法、端末デバイス及び記憶媒体 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20913570 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2020913570 Country of ref document: EP Effective date: 20220816 |