Method and device for two-step contention based random access
11470647 · 2022-10-11
Assignee
Inventors
Cpc classification
H04W56/0045
ELECTRICITY
International classification
H04W28/02
ELECTRICITY
Abstract
A method and a device for two-step contention based random access are provided. The method includes: sending, by a user equipment (UE), an Msg1 message; and determining that two-step random access of the user equipment is successful, in a case that a UE identifier carried in the Msg1 message is a cell radio network temporary identifier (C-RNTI) and physical layer scheduling signaling addressed based on the C-RNTI is received by the user equipment. For two-step contention based random access, if the UE identifier carried in the Msg1 message is a C-RNTI, the user equipment determines that the two-step random access is successful in a case that the physical layer scheduling signaling addressed based on the C-RNTI is received by the user equipment. In this way, the two-step contention based random access can be achieved.
Claims
1. A method for two-step contention based random access, comprising: sending, by a user equipment (UE), an Msg1 message; and determining that two-step random access of the user equipment is successful, in a case that a UE identifier carried in the Msg1 message is a cell radio network temporary identifier (C-RNTI) and physical layer scheduling signaling addressed based on the C-RNTI is received by the user equipment; the method further comprises: monitoring, by the user equipment, within an Msg2 message receiving window or before an Msg2 message receiving timer times out, the physical layer scheduling signaling addressed by using the C-RNTI carried in the Msg1 message and a physical layer scheduling signaling addressed with a temporary cell radio network temporary identifier (T-CRNTI), wherein the physical layer scheduling signaling addressed with the T-CRNTI is used for retreating to a four-step contention based random access in a case that the two-step contention based random access fails; wherein a search space corresponding to the physical layer scheduling signaling addressed by using the C-RNTI carried in the Msg1 message is a UE-specific search space.
2. The method according to claim 1, wherein the sending, by a user equipment, an Msg1 message comprises: determining, by the user equipment, whether the user equipment meets a two-step random access triggering condition that a C-RNTI is used as a UE identifier, and sending, by the user equipment, the Msg1 message in a case that the user equipment meets the two-step random access triggering condition, wherein the UE identifier carried in the Msg1 message is the C-RNTI.
3. The method according to claim 2, wherein the two-step random access triggering condition that a C-RNTI is used as a UE identifier comprises that: the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization, and the user equipment has uplink data to be sent while having no uplink resources; or the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization, and the user equipment hands over.
4. The method according to claim 1, wherein the Msg1 message comprises: a Random Access Preamble and a data portion, and the C-RNTI is carried in the data portion.
5. The method according to claim 4, wherein the data portion further comprises a scheduling request (SR), a buffer status report (BSR) or data.
6. The method according to claim 1, further comprising: receiving, by the user equipment, an Msg2 message within the Msg2 message receiving window or before the Msg2 message receiving timer times out, and stopping, by the user equipment, reception of the Msg2 message in a case that the Msg2 message is successfully received by the user equipment, wherein the Msg2 message is a message generated by a network side and corresponding to the Msg1 message.
7. The method according to claim 1, wherein a search space corresponding to the physical layer scheduling signaling addressed with the T-CRNTI is a common search space.
8. A user equipment, comprising: a memory, a processor, and computer programs stored in the memory and executable by the processor, wherein, when the computer programs are executed by the processor, the processor is configured to implement the method according to claim 1.
9. The user equipment according to claim 8, wherein the sending, by a user equipment, an Msg1 message comprises: determining, by the user equipment, whether the user equipment meets a two-step random access triggering condition that a C-RNTI is used as a UE identifier, and sending, by the user equipment, the Msg1 message in a case that the user equipment meets the two-step random access triggering condition, wherein the UE identifier carried in the Msg1 message is the C-RNTI.
10. The user equipment according to claim 9, wherein the two-step random access triggering condition that a C-RNTI is used as a UE identifier comprises that: the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization, and the user equipment has uplink data to be sent while having no uplink resources; or the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization, and the user equipment hands over.
11. The user equipment according to claim 8, wherein a search space corresponding to the physical layer scheduling signaling addressed with the T-CRNTI is a common search space.
12. A non-transitory computer readable storage medium, on which computer programs are stored, wherein, when the computer programs are executed by a processor, the method according to claim 1 is implemented.
13. The method according to claim 1, further comprising: in a case that the physical layer scheduling signaling addressed based on the C-RNTI or the temporary C-RNTI is not received by the user equipment within the Msg2 message receiving window or before the Msg2 message receiving timer times out, directly determining the random access to be failed, and attempting subsequent two-step or four-step random access; in a case that the physical layer scheduling signaling addressed based on the temporary C-RNTI is received by the user equipment within the Msg2 message receiving window or before the Msg2 message receiving timer times out, receiving an RAR MAC PDU in response to an indication of the temporary C-RNTI and proceeding with a four-step random access, wherein an Msg3 message for a four-step contention based random access is sent by using a UL grant indicated in the RAR MAC PDU.
14. A method for two-step contention based random access, comprising: receiving, by a network side device, an Msg1 message sent by a user equipment (UE); determining, by the network side device, that a contention is successful, in a case that the Msg1 is successfully received by the network side device and a UE identifier carried in the Msg1 message is a cell radio network temporary identifier (C-RNTI), and sending, by the network side device, physical layer scheduling signaling addressed based on the C-RNTI, to the user equipment to schedule an Msg2 transmission; and sending, by the network side device, physical layer scheduling signaling addressed based on a T-CRNTI, to the user equipment to schedule an Msg2 transmission, in a case that only a Random Access Preamble in the Msg1 can be successfully received by the network side device while a data portion is not successfully received, wherein the physical layer scheduling signaling addressed with the T-CRNTI is used for retreating to a four-step contention based random access in a case that the two-step contention based random access fails; wherein the physical layer scheduling signaling addressed based on the C-RNTI or addressed based on the T-CRNTI needs to be sent within an Msg2 message receiving window or before an Msg2 message receiving timer times out; wherein a search space corresponding to the physical layer scheduling signaling addressed based on the C-RNTI carried in the Msg1 message is a UE-specific search space.
15. The method according to claim 14, wherein the Msg1 message comprises the Random Access Preamble and the data portion, and the C-RNTI is carried in the data portion.
16. The method according to claim 15, wherein the data portion further comprises an SR, a BSR or data.
17. A network side device, comprising: a memory, a processor, and computer programs stored in the memory and executable by the processor, wherein, when the computer programs are executed by the processor, the processor is configured to implement the method according to claim 14.
18. The network side device according to claim 17, wherein the Msg1 message comprises the Random Access Preamble and the data portion, and the C-RNTI is carried in the data portion.
19. The network side device according to claim 18, wherein the data portion further comprises an SR, a BSR or data.
20. A non-transitory computer readable storage medium, on which computer programs are stored, wherein, when the computer programs are executed by a processor, the method according to claim 14 is implemented.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION
(9) Exemplary embodiments of the present disclosure will be described in more detail below with reference to the drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be carried out in various ways instead of being limited by the embodiments set forth herein. On the contrary, the embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.
(10) Reference is made to
(11) In step 301, a user equipment (UE) sends an Msg1 message.
(12) Optionally, the Msg1 message includes: a Random Access Preamble and a data portion. The cell radio network temporary identifier (C-RNTI) may be carried in the data portion. Further, the data portion further includes a scheduling request (SR), a buffer status report (BSR) or data.
(13) In an optional implementation of the embodiment, the UE determines whether it meets a two-step random access triggering condition that a C-RNTI is used as a UE identifier, and sends the Msg1 message in a case that the user equipment meets the two-step random access triggering condition, wherein the UE identifier carried in the Msg1 message is the C-RNTI.
(14) Optionally, the two-step random access triggering condition that a C-RNTI is used as a UE identifier includes that:
(15) the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization, and the user equipment has uplink data to be sent while having no uplink resources; or
(16) the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization, and the user equipment hands over.
(17) In step 302, it is determined that two-step random access of the user equipment is successful, in a case that a UE identifier carried in the Msg1 message is a cell radio network temporary identifier (C-RNTI) and physical layer scheduling signaling addressed based on the C-RNTI is received by the user equipment.
(18) In the embodiment, optionally, the method further includes the following step:
(19) receiving, by the user equipment, an Msg2 message within an Msg2 message receiving window or before an Msg2 message receiving timer times out, and stopping, by the user equipment, reception of the Msg2 message in a case that the Msg2 message is successfully received by the user equipment, wherein the Msg2 message is a message generated by a network side and corresponding to the Msg1 message.
(20) In the embodiment, optionally, the method further includes the following step:
(21) monitoring, by the user equipment, within an Msg2 message receiving window or before an Msg2 message receiving timer times out,
(22) the physical layer scheduling signaling addressed by using the C-RNTI carried in the Msg1 message. Further, a search space corresponding to the physical layer scheduling signaling is a UE-specific search space.
(23) In the embodiment, optionally, the method further includes the following step:
(24) monitoring, by the user equipment, within an Msg2 message receiving window or before an Msg2 message receiving timer times out:
(25) physical layer scheduling signaling addressed with a temporary cell radio network temporary identifier (T-CRNTI). Further, a search space corresponding to the physical layer scheduling signaling is a common search space.
(26) In the embodiment, for a two-step contention based random access, if the UE identifier carried in the Msg1 message is a C-RNTI, it is determined that the two-step random access is successful in a case that the physical layer scheduling signaling addressed based on the C-RNTI is received by the UE. In this way, the two-step contention based random access can be achieved.
(27) Reference is made to
(28) In step 401, a network side device receives an Msg1 message sent by a user equipment (UE).
(29) The network side device may be a base station, and is not limited thereto.
(30) In the embodiment, optionally, the Msg1 message includes: a Random Access Preamble and a data portion, and the C-RNTI may be carried in the data portion. Further, the data portion further includes: an SR, a BSR or data.
(31) In step 402, it is determined by the network side device that a contention is successful, in a case that the Msg1 is successfully received by the network side device and a UE identifier carried in the Msg1 message is a cell radio network temporary identifier (C-RNTI).
(32) In step 403, the network side device sends physical layer scheduling signaling addressed based on the C-RNTI, to the user equipment to schedule an Msg2 transmission.
(33) In the embodiment, the method further includes the following step:
(34) sending, by the network side device, physical layer scheduling signaling addressed based on a T-CRNTI, to the user equipment to schedule an Msg2 transmission, in a case that only the Random Access Preamble in the Msg1 can be successfully received by the network side device while the data portion is not successfully received.
(35) In the embodiment, the physical layer scheduling signaling addressed based on the C-RNTI or addressed based on a T-CRNTI needs to be sent within an Msg2 message receiving window or before an Msg2 message receiving timer times out.
(36) In the embodiment, for a two-step contention based random access, if the UE identifier carried in the Msg1 message is a C-RNTI, it is determined that the two-step random access is successful in a case that the physical layer scheduling signaling addressed based on the C-RNTI is received by the UE. In this way, the two-step contention based random access can be achieved.
(37) Reference is made to
(38) In step 501, a user equipment (UE) sends an Msg1 message.
(39) A UE having a C-RNTI determines whether it meets a two-step contention based random access triggering condition, and triggers a two-step contention based random access in a case that the user equipment meets the triggering condition.
(40) The two-step random access triggering condition that a C-RNTI is used as a UE identifier includes that: the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization (for example, the coverage of a cell is very small and is less than one time advance (TA) adjustment step), and
(41) the user equipment has uplink data to be sent while having no uplink resources; or
(42) the user equipment hands over.
(43) Optionally, the Msg1 message includes: a Random Access Preamble and a data portion. The C-RNTI is carried in the data portion. In addition, the data portion may further include: an SR/BSR, or data.
(44) In step 502, the Msg1 message is processed by a base station, and an Msg2 message is generated.
(45) If the Msg1 message, including the Random Access Preamble and the data portion, is successfully received by the base station, it is determined that the contention is successful. In this case, physical layer scheduling signaling addressed based on the C-RNTI is sent to the user equipment. The C-RNTI is a C-RNTI included in the data portion of the Msg1 message.
(46) It should be noted that, the Msg2 message needs to be sent within a window corresponding to the Msg2 message or before a timer corresponding to the Msg2 message times out.
(47) In step 503, the Msg2 message is processed by the user equipment.
(48) In the embodiment, the user equipment receives the Msg2 message only within the Msg2 message receiving window or before the Msg2 message receiving timer times out, and stops reception of the Msg2 message once the Msg2 message is successfully received.
(49) In the embodiment, within the Msg2 message receiving window or before the Msg2 message receiving timer times out, the user equipment needs to monitor:
(50) the physical layer scheduling signaling addressed by using the C-RNTI carried in the Msg1 message, to determine whether the contention is solved, wherein a search space corresponding to the physical layer scheduling signaling is a UE-specific search space (USS); or
(51) physical layer scheduling signaling addressed with a temporary C-RNTI, to retreat to a four-step contention based random access if the two-step contention based random access fails, wherein a search space corresponding to the physical layer scheduling signaling is a Common Search Space (CSS).
(52) In the embodiment, if the contention is successfully solved, the physical layer scheduling signaling addressed based on the C-RNTI may be received by the user equipment within the Msg2 message receiving window or before the Msg2 message receiving timer times out. In this case, it is determined by the user equipment that the contention is successfully solved.
(53) Reference is made to
(54) In step 601, a user equipment sends an Msg1 message.
(55) A UE having a C-RNTI determines whether it meets a two-step contention based random access triggering condition, and triggers a two-step contention based random access in a case that the user equipment meets the triggering condition.
(56) The two-step random access triggering condition that a C-RNTI is used as a UE identifier includes that: the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization (for example, the coverage of a cell is very small and is less than one time advance (TA) adjustment step), and
(57) the user equipment has uplink data to be sent while having no uplink resources; or
(58) the user equipment hands over.
(59) The Msg1 message includes: a Random Access Preamble and a data portion. The C-RNTI is carried in the data portion. In addition, the data portion may further include: an SR/BSR, or data.
(60) In step 602, the Msg1 message is processed by a base station, and an Msg2 message is generated.
(61) In a case that only the Random Access Preamble is received successfully by the base station and the data portion is not successfully received, the process retreats to a four-step contention based random access, to generate an RAR MAC PDU addressed based on the temporary C-RNTI. The Msg2 message needs to be sent within a window corresponding to the Msg2 message or before a timer corresponding to the Msg2 message times out.
(62) If neither the Random Access Preamble nor the data portion is received successfully, no processing is performed, and no content is replied to the user equipment.
(63) In step 603, the Msg2 message is processed by the user equipment.
(64) The user equipment receives the Msg2 message only within the Msg2 message receiving window or before the Msg2 message receiving timer times out, and stops reception of the Msg2 message once the Msg2 message is successfully received.
(65) Within the Msg2 message receiving window or before the Msg2 message receiving timer times out, the user equipment needs to monitor:
(66) the physical layer scheduling signaling addressed by using the C-RNTI carried in the Msg1 message, to determine whether the contention is solved, wherein a search space corresponding to the physical layer scheduling signaling is a UE-specific search space (USS); or
(67) physical layer scheduling signaling addressed with a temporary C-RNTI, to retreat to a four-step contention based random access if the two-step contention based random access fails, wherein a search space corresponding to the physical layer scheduling signaling is a Common Search Space (CSS).
(68) In the embodiment, if nothing is received within the Msg2 message receiving window or before the Msg2 message receiving timer times out, the random access is directly determined to be failed, and subsequent two-step or four-step random access is attempted.
(69) If the physical layer scheduling signaling addressed based on the temporary C-RNTI is received by the user equipment within the Msg2 message receiving window or before the Msg2 message receiving timer times out, the user equipment receives the RAR MAC PDU in response to an indication of the temporary C-RNTI and proceeds with a four-step random access. An Msg3 message for the four-step contention based random access is sent by using a UL grant indicated in the RAR MAC PDU.
(70) Reference is made to
(71) a first sending module 701, configured to send an Msg1 message; and
(72) a first determining module 702, configured to determine that two-step random access of the user equipment is successful, in a case that a UE identifier carried in the Msg1 message is a cell radio network temporary identifier (C-RNTI) and physical layer scheduling signaling addressed based on the C-RNTI is received by the sending module.
(73) In the embodiment, optionally, the first sending module 701 includes:
(74) a determining unit, configured to determine whether the user equipment meets a two-step random access triggering condition that a C-RNTI is used as a UE identifier; and
(75) a sending unit, configured to send the Msg1 message in a case that the user equipment meets the two-step random access triggering condition that a C-RNTI is used as a UE identifier, wherein the UE identifier carried in the Msg1 message is the C-RNTI.
(76) In the embodiment, optionally, the two-step random access triggering condition that a C-RNTI is used as a UE identifier comprises that:
(77) the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization, and the user equipment has uplink data to be sent while having no uplink resources; or
(78) the user equipment is currently in an uplink synchronization state or does not need an uplink synchronization, and the user equipment hands over.
(79) In the embodiment, optionally, the Msg1 message comprises a Random Access Preamble and a data portion, and the C-RNTI is carried in the data portion.
(80) In the embodiment, optionally, the data portion further comprises an SR, a BSR or data.
(81) In the embodiment, optionally, the user equipment further includes:
(82) a first receiving module, configured to receive an Msg2 message within an Msg2 message receiving window or before an Msg2 message receiving timer times out, and stop reception of the Msg2 message in a case that the Msg2 message is successfully received, wherein the Msg2 message is a message generated by a network side and corresponding to the Msg1 message.
(83) In the embodiment, optionally, the user equipment further includes:
(84) a first monitoring module, configured to monitor the physical layer scheduling signaling addressed by using the C-RNTI carried in the Msg1 message, within an Msg2 message receiving window or before an Msg2 message receiving timer times out.
(85) In the embodiment, optionally, a search space corresponding to the physical layer scheduling signaling is a UE-specific search space.
(86) In the embodiment, optionally, the user equipment further includes:
(87) a second monitoring module, configured to monitor physical layer scheduling signaling addressed with a temporary cell radio network temporary identifier (T-CRNTI), within an Msg2 message receiving window or before an Msg2 message receiving timer times out.
(88) In the embodiment, optionally, a search space corresponding to the physical layer scheduling signaling is a common search space.
(89) In the embodiment, for a two-step contention based random access, if the UE identifier carried in the Msg1 message is a C-RNTI, the user equipment determines that the two-step random access is successful in a case that the physical layer scheduling signaling addressed based on the C-RNTI is received by the user equipment. In this way, the two-step contention based random access can be achieved.
(90) Reference is made to
(91) The network side device 800 includes:
(92) a second receiving module 801, configured to receive an Msg1 message sent by a user equipment (UE);
(93) a second determining module 802, configured to determine that a contention is successful, in a case that the Msg1 is successfully received by the network side device and a UE identifier carried in the Msg1 message is a cell radio network temporary identifier C-RNTI; and
(94) a second sending module 803, configured to send physical layer scheduling signaling addressed based on the C-RNTI, to the user equipment to schedule an Msg2 transmission.
(95) In the embodiment, optionally, the Msg1 message includes: a Random Access Preamble and a data portion, and the C-RNTI is carried in the data portion.
(96) In the embodiment, optionally, the data portion further includes: an SR, a BSR or data.
(97) In the embodiment, optionally, the network side device further includes:
(98) a third sending module, configured to send physical layer scheduling signaling addressed based on a T-CRNTI, to the user equipment to schedule an Msg2 transmission, in a case that only the Random Access Preamble in the Msg1 can be successfully received by the network side device while the data portion is not successfully received.
(99) In the embodiment, optionally, the physical layer scheduling signaling addressed based on the C-RNTI or addressed based on a T-CRNTI needs to be sent within an Msg2 message receiving window or before an Msg2 message receiving timer times out.
(100) For a two-step contention based random access, if the UE identifier carried in the Msg1 message is a C-RNTI, the user equipment determines that the two-step random access is successful in a case that the physical layer scheduling signaling addressed based on the C-RNTI is received by the user equipment. In this way, the two-step contention based random access can be achieved.
(101) It is to be understood that the phrase “one embodiment” or “an embodiment” mentioned throughout the specification means that particular features, structures or characteristics related to the embodiment are included in at least one embodiment of the present disclosure. Therefore, the phrase “in one embodiment” or “in an embodiment” appearing at various parts of the entire specification does not necessarily refer to the same embodiment. In addition, these particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
(102) In various embodiments of the present disclosure, it should be understood that the magnitude of the serial numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not limit the implementation process of the embodiments of the present disclosure.
(103) Additionally, the terms “system” and “network” are used interchangeably herein.
(104) It should be understood that the term “and/or” as used herein is merely to describe an association relationship of associated objects, indicating that there may be three relationships. For example, A and/or B may indicate the following three situations: A exists separately, A and B exist simultaneously, and B exists separately. In addition, the character “I” as used herein generally indicates that the associated objects are of an “or” relationship.
(105) In the embodiments provided by the present disclosure, it should be understood that “B corresponding to A” means that B is associated with A, and B can be determined according to A. However, it should also be understood that determining B according to A does not mean that B is determined only according to A; instead, B can also be determined according to A and/or other information.
(106) In the several embodiments provided by the present disclosure, it should be understood that the disclosed method and device may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of the units is only a division in terms of logical function. In actual implementation, there may also be other division manners; for example, multiple units or components may be combined or integrated into another system, or some features can be omitted or not executed. In addition, the mutual coupling or direct coupling or communication connection as shown or discussed may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
(107) In addition, individual functional units in various embodiments of the present disclosure may be integrated into one processing unit, or individual units may be physically included separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of a combination of hardware functional units and software functional units.
(108) The above described integrated unit implemented in the form of software functional unit can be stored in a computer readable storage medium. The above software functional unit is stored in a storage medium and includes a plurality of instructions for enabling a computer device (which may be a personal computer, a server, or a network side device, etc.) to execute part of the steps of the transceiving method of the various embodiments of the present disclosure. The foregoing storage medium includes: a U disk, a mobile hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various media that can store program codes thereon.
(109) Described above are optional embodiments of the present disclosure, and it should be noted that those skilled in the art can also make various improvements and modifications without departing from the principles of the present disclosure, which will also fall within the protection scope of the present disclosure.