METHOD AND DEVICE FOR PERFORMING BACKOFF IN TWO-STEP RANDOM ACCESS PROCEDURE IN WIRELESS COMMUNICATION SYSTEM
20220322427 · 2022-10-06
Inventors
Cpc classification
H04W74/008
ELECTRICITY
International classification
Abstract
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The present invention discloses a method for applying backoff when using two-step random access.
Claims
1. A method for random access by a terminal in a wireless communication system, the method comprising: receiving, from a base station, a preconfigured threshold value and random access-related information; determining a random access type as one of a two-step random access type and a four-step random access type based on the preconfigured threshold value and a strength of a reception signal received from the base station; transmitting a signal related to a first preamble for random access to the base station, based on the determined random access type and the random access-related information; in case that the determined random access type is the two-step random access type, identifying, among Msg B according to the two-step random access type and Msg 2 according to the four-step random access type, a backoff indicator included in the Msg B; in case that the determined random access type is the four-step random access type, identifying, among Msg B according to the two-step random access type and Msg 2 according to the four-step random access type, a backoff indicator included in the Msg 2; and transmitting a signal related to a second preamble to the base station, based on the identified backoff indicator.
2. The method of claim 1, wherein transmitting the signal related to the second preamble comprises: transmitting the signal related to the second preamble after a backoff time corresponding to the backoff indicator included in the Msg B, in case that the determined random access type is the two-step random access type; and transmitting the signal related to the second preamble after a backoff time corresponding to the backoff indicator included in the Msg 2, in case that the determined random access type is the four-step random access type.
3. The method of claim 1, wherein the signal related to the first preamble is Msg A including a preamble and an RRC request message in a case of the two-step random access type, and wherein the signal related to the first preamble is Msg 1 in a case of the four-step random access type.
4. The method of claim 1, wherein determining the random access type comprises: determining the random access type as the two-step random access type in case that the strength of the reception signal is greater than or equal to the preconfigured threshold value, and determining the random access type as the four-step random access type in case that the strength of the reception signal is less than the preconfigured threshold value.
5. The method of claim 1, wherein the Msg 2 includes response information on random access, and wherein the Msg B includes response information on random access and contention resolution-related information.
6. A method for random access by a base station in a wireless communication system, the method comprising: transmitting a preconfigured threshold value and random access-related information to a terminal; receiving, from the terminal, a signal related to a first preamble, determined based on a random access type and the random access-related information; transmitting Msg B and Msg 2 including a backoff indicator to the terminal, in response to the signal related to the first preamble; and receiving a signal related to a second preamble from the terminal, based on a backoff indicator identified by the terminal, wherein the backoff indicator identified by the terminal is an indicator identified as the backoff indicator included in the Msg B among the Msg 2 and the Msg B in case that the random access type determined by the terminal is a two-step random access type, and wherein the backoff indicator identified by the terminal is an indicator identified as the backoff indicator included in the Msg 2 among the Msg 2 and the Msg B in case that the random access type determined by the terminal is a four-step random access type.
7. The method of claim 6, wherein the Msg 2 includes response information on random access, and wherein the Msg B includes response information on random access and contention resolution-related information.
8. The method of claim 6, wherein the signal related to the first preamble is one of Msg 1 and Msg A.
9. A terminal in a wireless communication system, the terminal comprising: a transceiver configured to transmit or receive a signal to or from a base station; and a controller configured to: receive, from a base station, a preconfigured threshold value and random access-related information, determine a random access type as one of a two-step random access type and a four-step random access type based on the preconfigured threshold value and a strength of a reception signal received from the base station, transmit a signal related to a first preamble for random access to the base station, based on the determined random access type and the random access-related information, in case that the determined random access type is the two-step random access type, identify, among Msg B according to the two-step random access type and Msg 2 according to the four-step random access type, a backoff indicator included in the Msg B, in case that the determined random access type is the four-step random access type, identify, among Msg B according to the two-step random access type and Msg 2 according to the four-step random access type, a backoff indicator included in the Msg 2, and transmit a signal related to a second preamble to the base station based on the identified backoff indicator.
10. The terminal of claim 9, wherein the controller is configured to: transmit a signal related to the second preamble after a backoff time corresponding to the backoff indicator included in the Msg B, in case that the determined random access type is the two-step random access type; and transmit the signal related to the second preamble after a backoff time corresponding to the backoff indicator included in the Msg 2, in case that the determined random access type is the four-step random access type.
11. The terminal of claim 9, wherein the signal related to the first preamble is Msg A including a preamble and an RRC request message in a case of the two-step random access type, and wherein the signal related to the first preamble is Msg 1 in a case of the four-step random access type.
12. The terminal of claim 9, wherein the controller is configured to: determine the random access type as the two-step random access type in case that the strength of the reception signal is greater than or equal to the preconfigured threshold value; and determine the random access type as the four-step random access type in case that the strength of the reception signal is less than the preconfigured threshold value.
13. The terminal of claim 9, wherein the Msg 2 includes response information on random access, and wherein the Msg B includes response information on random access and contention resolution-related information.
14. A base station in a wireless communication system, the base station comprising: a transceiver configured to transmit or receive a signal to or from a terminal; and a controller configured to: transmit a preconfigured threshold value and random access-related information to a terminal, receive, from the terminal, a signal related to a first preamble, determined based on a random access type and the random access-related information, transmit Msg B and Msg 2 including a backoff indicator to the terminal in response to the signal related to the first preamble, and receive a signal related to a second preamble from the terminal based on the backoff indicator identified by the terminal, wherein the backoff indicator identified by the terminal is an indicator identified as the backoff indicator included in the Msg B among the Msg 2 and the Msg B in case that the random access type determined by the terminal is a two-step random access type, and wherein the backoff indicator identified by the terminal is an indicator identified as the backoff indicator included in the Msg 2 among the Msg 2 and the Msg B in case that the random access type determined by the terminal is a four-step random access type.
15. The base station of claim 14, wherein the Msg 2 includes response information on random access, and wherein the Msg B includes response information on random access and contention resolution-related information.
Description
BRIEF DESCRIPTION OF DRAWINGS
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
MODE FOR CARRYING OUT THE INVENTION
[0023] Hereinafter, embodiments of the disclosure will be described in detail with reference to the accompanying drawings. In the following description of the disclosure, a detailed description of known functions or configurations incorporated herein will be omitted when it may make the subject matter of the disclosure unnecessarily unclear. The terms which will be described below are terms defined in consideration of the functions in the disclosure, and may be different according to users, intentions of the users, or customs. Therefore, the definitions of the terms should be made based on the contents throughout the specification.
[0024] The advantages and features of the disclosure and ways to achieve them will be apparent by making reference to embodiments as described below in detail in conjunction with the accompanying drawings. However, the disclosure is not limited to the embodiments set forth below, but may be implemented in various different forms. The following embodiments are provided only to completely disclose the disclosure and inform those skilled in the art of the scope of the disclosure, and the disclosure is defined only by the scope of the appended claims. Throughout the specification, the same or like reference numerals designate the same or like elements.
[0025] In the following description, terms for identifying access nodes, terms referring to network entities, terms referring to messages, terms referring to interfaces between network entities, terms referring to various identification information, and the like are illustratively used for the sake of convenience. Therefore, the disclosure is not limited by the terms as used below, and other terms referring to subjects having equivalent technical meanings may be used.
[0026] In the following description, the disclosure will be described using terms and names defined in LTE and NR standards, which are the latest standards specified by the 3rd generation partnership project (3GPP) group among existing communication standards, for the convenience of description. However, the disclosure is not limited by these terms and names, and may be applied in the same way to systems that conform other standards. In particular, the disclosure may be applied to the 3GPP NR (5th generation mobile communication standard).
[0027]
[0028] Referring to
[0029] The eNBs 1a-05, 1a-10, 1a-15, and 1a-20 are access nodes of a cellular network and provide a wireless connection to UEs accessing the network. That is, the eNBs 1a-05, 1a-10, 1a-15, and 1a-20 perform scheduling by collecting state information, such as buffer states of the UEs, available transmission power states, and channel states, in order to service traffic of users, and support connection between the UEs and a core network (CN). The MME 1a-25 corresponds to a device which is responsible for various control functions including a mobility management function for a UE and is connected to a plurality of eNBs, and the S-GW 1a-30 corresponds to a device which provides a data bearer. In addition, the MME 1a-25 and the S-GW 1a-30 may further perform authentication, bearer management, and the like for a UE accessing a network, and processes a packet arrived from the eNBs 1a-05, 1a-10, 1a-15, and 1a-20 or a packet to be transferred to the eNBs 1a-05, 1a-10, 1a-15, and 1a-20.
[0030]
[0031] Referring to
[0032] Although not illustrated, a radio resource control (RRC) layer exists above a PDCP layer of each of a UE and an eNB, and the RRC layer may transmit or receive an access- and measurement-related configuration control message in order to control radio resources.
[0033] Meanwhile, the PHY layer may include one or a plurality of frequencies/carriers, and a technology of simultaneously configuring and using a plurality of frequencies is called a carrier aggregation technology (hereinafter, referred to as CA). Only one carrier has been used for communication between a terminal (or user equipment (UE)) and a base station (E-UTRAN nodeB (eNB)) in the past, but the CA technology can significantly increase the transmission amount as much as the number of subcarriers by additionally using a main carrier and one or more subcarriers. Meanwhile, in the LTE system, a cell in an eNB using a main carrier is referred to as a main cell or a primary cell (PCell), and a cell in an eNB using a subcarrier is referred to as a sub-cell or a secondary cell (SCell).
[0034]
[0035] In
[0036] Meanwhile, depending on whether the UE is connected to the eNB, the state of the UE is divided into an idle mode (RRC_IDLE) and a connected mode (RRC_CONNECTED). Accordingly, the eNB does not recognize location of the UE in the idle mode.
[0037] If the UE in the idle mode is to be shifted to the connected mode, the UE may receive synchronization signal blocks (SSBs) 1c-21, 1c-23, 1c-25, and 1c-27 transmitted by the eNB. The SSBs are transmitted periodically according to a cycle configured by the eNB, and each of the SSBs may include a primary synchronization signal (PSS) 1c-41, a secondary synchronization signal (SSS) 1c-43, and a physical broadcast channel (PBCH).
[0038] In this exemplary drawing, a scenario in which an SSB is transmitted for each beam is assumed. For example, it is assumed that SSB #0 1c-21 is transmitted using beam #0 1c-11, SSB #1 1c-23 is transmitted using beam #1 1c-13, SSB #2 1c-25 is transmitted using beam #2 1c-15, and SSB #3 1c-27 is transmitted using beam #3 1c-17. In this drawing, it is assumed that the UE in the idle mode is located in beam #1. However, if the UE in the connected mode performs random access, the UE selects an SSB received at the time of performing random access.
[0039] Accordingly, in
[0040] Accordingly, the UE recognizes locations of the PRACH occasions 1c-32 and 1c-33 for SSB #1, and transmits a random access preamble at the currently earliest PRACH occasion among the PRACH occasions 1c-32 and 1c-33 corresponding to SSB #1 (for example, 1c-32). Since the eNB has received the preamble at the PRACH occasion 1c-32, it can be seen that the corresponding UE has transmitted the preamble by selecting SSB #1. Accordingly, data may be transmitted or received through the corresponding beam when subsequent random access is performed.
[0041] Meanwhile, when the UE in the connected mode moves from the current (source) eNB to a target eNB due to handover, etc., the UE performs random access at the target eNB and selects an SSB as described above to perform an operation of transmitting a random access preamble. In addition, during handover, a handover command is transmitted to the UE to allow the UE to move from the source eNB to the target eNB. Here, the message may include a corresponding UE dedicated random access preamble identifier allocated to each SSB of the target eNB to enable use of the identifier at the time of performing random access at the target eNB. The eNB may not allocate a dedicated random access preamble identifier for all beams (depending on the current location of the UE, etc.), and some SSBs may not be allocated with a dedicated random access preamble (for example, allocation of a dedicated random access preamble to beam #2 and beam #3 only may occur). If a dedicated random access preamble is not allocated to an SSB selected by the UE for preamble transmission, the UE randomly selects a contention-based random access preamble to perform random access. For example, in this drawing, after the UE is located in beam #1 and first performs random access but fails, the UE may be located in beam #3 to transmit a dedicated preamble when transmitting a random access preamble again. That is, even in one random access procedure, if preamble retransmission occurs, a contention-based random access procedure and a contention-free random access procedure may be mixed depending on whether a dedicated random access preamble is allocated to a selected SSB for each preamble transmission.
[0042]
[0043] In order to perform access to a base station 1d-03, a UE 1d-01 selects a PRACH according to
[0044] Upon receiving the preamble, the base station may transmit a random access response (hereinafter, “RAR”) message (this is also referred to as Msg2) to the UE in response to the preamble (operation 1d-21). The RAR message includes identifier information of the preamble used in operation 1d-11, uplink transmission timing correction information, uplink resource allocation information to be used for a subsequent operation (that is, operation 1d-31), and temporary UE identifier information. The identifier information of the preamble is transmitted to notify that the RAR message may include responses to respective preambles and which preamble the RAR message is transmitted in response to, for example, when a plurality of UEs transmit different preambles to attempt random access in operation 1d-11. The uplink resource allocation information, which is included in responses to respective preambles, is detailed information about resources to be used by the UE in operation 1d-31, and includes physical locations and sizes of the resources, a modulation and coding scheme used during transmission, and power adjustment information during transmission. The temporary UE identifier information is a value transmitted for use since the UE does not include an identifier allocated by the base station for communication with the base station if the UE having transmitted a preamble performs initial access.
[0045] Meanwhile, the RAR message may include not only the response(s) to each of the preambles, but also optionally include a backoff indicator (BI). The backoff indicator indicates a value transmitted to delay transmission randomly according to the value of the backoff indicator, rather than immediately retransmitting the preamble when the random access preamble needs to be retransmitted because random access is not successfully performed. More specifically, if the UE does not properly receive the RAR, or if contention resolution, which will be described later, is not properly achieved, the random access preamble should be retransmitted. Here, the value indicated by the back-off indicator may be indicated by the index values of the following table (Table 1), and the UE selects a random value from among 0 to the values indicated by the index values, and after a period of time equal to the value, the UE retransmits the random access preamble. For example, if the base station indicates 5 (that is, 60 ms) as the BI value and the UE randomly selects a value of 23 ms among 0 to 60 ms, the selected value is stored in a parameter called PREAMBLE_BACKOFF, and the UE performs a procedure of retransmitting the preamble after a 23 ms period of time. If the backoff indicator is not transmitted, and if random access is not successfully performed and thus the random access preamble needs to be retransmitted, the UE immediately transmits the random access preamble.
TABLE-US-00001 TABLE 1 Backoff Parameter value Index (ms) 0 5 1 10 2 20 3 30 4 40 5 60 6 80 7 120 8 160 9 240 10 320 11 480 12 960 13 1920 14 Reserved 15 Reserved
[0046] The RAR message needs to be transmitted within a predetermined period starting from a predetermined period time after the preamble is transmitted, and the period is referred to as a “RAR window”. The RAR window starts from a time point at which a predetermined period of time has passed after the first preamble is transmitted. The predetermined period of time may have a subframe unit (1 ms) or a smaller value than thereof. In addition, the length of the RAR window may be a predetermined value set by the base station for each PRACH resource or for at least one PRACH resource set within a system information message broadcast by the base station. Meanwhile, when the RAR message is transmitted, the base station schedules the RAR message through a PDCCH, and the corresponding scheduling information is scrambled using a random access-radio network temporary identifier (RA-RNTI). The RA-RNTI is mapped to a PRACH resource used for transmission of the message 1d-11, the UE having transmitted a preamble via a specific PRACH resource attempts to receive a PDCCH based on a corresponding RA-RNTI and determines whether there is a corresponding RAR message. That is, if the RAR message is a response to the preamble transmitted by the UE in operation 1d-11 as shown in this exemplary drawing, the RA-RNTI used for the scheduling information of the RAR message may include information about transmission performed in operation 1d-11. To this end, the RA-RNTI is calculated according to the equation as follows:
RA-RNTI=1+s_id+14*t_id+14*80*f_id+14*80*8*ul_carrier_id
[0047] Here, s_id denotes an index corresponding to a first OFDM symbol from which the preamble transmission occasion in operation 1d-11 is started, and has a value of 0≤s_id<14 (that is, the maximum number of OFDMs in one slot). Further, t_id denotes an index corresponding to a first slot in which preamble transmission occasion in operation 1d-11 is started, and has a value of 0≤t_id<80 (that is, the maximum number of slots in one system frame (10 ms)). Furthermore, f_id indicates the sequential position of a PRACH resource in a frequency domain through which the preamble transmission occasion in operation 1d-11 is transmitted, and has a value of 0≤f_id<8 (that is, the maximum number of PRACHs in the frequency domain within the same period of time). In addition, ul_carrier_id is a factor used to distinguish, if two carriers are used as uplink in connection with one cell, whether uplink through which the preamble is transmitted is a normal uplink (NUL) (in this case, ul_carrier_id has a value of 0) or a supplementary uplink (SUL) (in this case, ul_carrier_id has a value of 1).
[0048] Upon receiving the RAR message, the UE transmits a different message via a resource allocated through the RAR message according to various purposes described above (operation 1d-31). Here, the third transmitted message in this exemplary drawing may be referred to as Msg3 (that is, the preamble in operation 1d-11 or 1d-13 is also referred to as Msg1, and the RAR in operation 1d-21 is also referred to as Msg2). Examples of Msg3 transmitted by the UE may include an RRCSetupRequest message, which is an RRC layer message, in case of initial access, an RRCReestablishmentRequest message in case of re-access, and an RRCReconfigurationComplete message in case of handover. Alternatively, a buffer status report (BSR) message for a resource request may be transmitted.
[0049] Thereafter, in a case of initial transmission (that is, in case that Msg3 does not include base station identifier information previously allocated to the UE, etc.), the UE may receive a contention resolution message from the base station (operation 1d-41). The content resolution message includes the same content as that transmitted by the UE through Msg3. Thus, even if a plurality of UEs select the same preamble in operation 1d-11 or 1d-13, it is possible to notify of which UE the contention resolution message is transmitted in response to.
[0050]
[0051] As described above in
[0052] To this end, the UE successively transmits preamble Msg1 1e-11 (corresponding to 1d-11) and Msg3 1e-13 (corresponding to 1d-31) in a four-step random access procedure, thereby transmitting MsgA 1e-15. Thereafter, the base station having received the MsgA transmits MsgB 1e-19 including information of Msg2 (RAR) (corresponding to 1d-21) and Msg4 (corresponding to 1d-41) in the four-step random access procedure. Thus, the random access procedure can be reduced.
[0053] Here, when the MsgA is shown in a time domain, the MsgA may include a PRACH resource 1e-21 for transmission of Msg 1, a PUSCH resource 1e-23 for transmission of Msg3, and a gap resource 1e-22 for resolving interference problem that may occur during transmission to the PUSCH resource. In addition, Msg3 includes information related to Msg1, and thus it can be seen that Msg3 is transmitted by a UE having transmitted a predetermined preamble (Msg1).
[0054] Upon receiving both Msg1 and Msg3 included in MsgA, the base station transmits MsgB to the UE (operation 1e-19). Here, the MsgB may include the BI described above.
[0055] Meanwhile, if collision occurs due to transmission of several MsgAs in operation 1e-15, a case that the base station receives only Msg1(s) included in MsgA and cannot receive Msg3 may occur. Here, the base station may transmit, to the UE, aforementioned Msg2 (operation 1e-33) instead of MsgB (operation 1e-19), may change the procedure to the four-step random access procedure described in
[0056] In addition, in case in which the base station receives the MsgA, multiple Msg1 receptions and only one Msg3 reception may occur. Here, the base station may transmit, to the UE, a response (i.e., MsgB) (operation 1e-19) to the UE from which both Msg1 and Msg3 have been received and a response (i.e., Msg2) (operation 1e-33) to only Msg1. Different responses can be included in the same message or in different messages (operation 1e-19) (operation 1e-33). In case of responding with different messages as shown in this drawing, the base station enables an indicator to be included in the PDCCH (operation 1e-17) (operation 1e-31) for scheduling the MsgB or Msg2, notifies the UE of whether the scheduled message is MsgB or Msg2, and enables the UE to correctly perform decoding. Alternatively, the RA-RNTI value for scrambling the PDCCH may be distinguished by using a different value. Here, an identifier for determining whether MsgB is included is added in calculation of the RA-RNTI. Each of the MsgB or Msg2 messages may include the BI value described above. Thereafter, if random access is not successful, the UE needs to determine, using the BI value included in a message, whether to delay the preamble transmission.
[0057] In addition, if the UE does not establish a connection with the base station (for example, in order to shift from IDLE to CONNECTED) and thus the MsgA includes a common control channel (CCCH)-related message (e.g., messages such as RRCSetupRequest, RRCResumeRequest, RRCReestablishmentRequest, RRCSystemInfoRequest, etc. of the RRC layer), the contents in the MsgB include uplink transmission timing information (timing advance command (TAC)) transmitted through the above-described Msg2, temporary identifier (temporary C-RNTI) of a UE to be used in a base station by the UE in the future, and contention resolution related information (UE contention resolution identity) transmitted through Msg4. In addition, if the UE is already connected to the base station and thus the C-RNTI MAC CE including the identifier information of the UE has been transmitted through the MsgA, the MsgB is a message through which the base station transmits resource allocation to the UE using the identifier (C-RNTI) of the corresponding UE via the PDCCH.
[0058] Meanwhile, as described above in
[0059] Meanwhile, when the UE normally accesses the base station, the UE may transmit or receive messages belonging to a dedicated control channel (DCCH) and a dedicated traffic channel (DTCH) in a connected mode (RRC_CONNECTED). In connection with the message transmitted by the UE, the UE transmits a “buffer status report (BSR)” message notifying that the UE currently includes data to be transmitted through uplink to the base station so as to request uplink resource allocation. To this end, the base station may allocate a dedicated PUCCH resource for transmission of a “scheduling request (SR)” with respect to a specific logical channel to the UE. Accordingly, when receiving the SR from the UE through the PUCCH, the base station may allocate an uplink resource to be used for transmission of the BSR, and when transmitting the BSR through the corresponding uplink resource, the base station may identify the buffer state of the UE and provide allocation of uplink resources for data.
[0060] On the other hand, if the base station does not allocate the SR to a specific logical channel (a logical concept that is divided according to the types of control and general data), or if the BSR cannot be transmitted because there is no uplink resource even if the base station performs allocation of the SR and the SR has been transmitted as many as the maximum number of SR transmissions, the UE may perform random access and transmit the BSR through Msg3.
[0061] Accordingly, when the UE accesses the base station and then configures each logical channel for transmission of data belonging to a logical channel dedicated control channel (DCCH) and a dedicated traffic channel (DTCH), if the UE performs random access to perform transmission for the corresponding logical channel, the UE transmits the C-RNTI MAC CE including the identifier information of the UE through MsgA so as to notify that the subject performing the random access is the UE. In this case, the MsgB is a message through which the base station transmits resource allocation to the corresponding UE by using the identifier (C-RNTI) of the corresponding UE via the PDCCH.
[0062]
[0063] The UE receives random access related configuration information from a base station, which is currently camped on or being accessed, through an RRC layer message (operation 1f-03). The RRC layer message may be transmitted as a system information message (SIB) that the base station broadcasts to all UEs in a cell, or may be transmitted, in connection with connected UEs, only to the corresponding UE through an RRCReconfiguration message. The random access-related configuration information includes configuration information for a PRACH capable of transmitting a random access preamble (Msg1) (i.e., a resource for a four-step random access procedure) and configuration information for a channel capable of transmitting MsgA (i.e., a resource for a two-step random access procedure), and the PRACH resource for the four-step random access procedure and the PRACH resource among MsgA for the two-step random access procedure may be configured independently each other or configured to be shared. The configuration of sharing the PRACH resources denotes that a UE for performing the four-step random access procedure and a UE for performing the two-step random access procedure can transmit the random access preamble to the same PRACH resource. However, in this case, since the UE randomly selects the random access preamble within a predetermined configuration, a preamble index to be used may be the same or different.
[0064] Thereafter, the UE triggers a random access procedure (operation 1f-05). The triggering of the random access procedure may occur in order to transmit the CCCH for the purpose of shifting from the idle mode to the connected mode as described above, may occur for beam failure recovery, or may occur in a scenario such as handover. Here, if the base station provides the two-step random access resource and the UE supports the two-step random access, the UE may determine whether to perform the two-step random access or the fourth-step random access according to a predetermined condition (operation 1f-07). That is, if the UE determines to perform two-step random access, in order to perform MsgA transmission, the PRACH and PUSCH transmission to a resource capable of transmitting MsgA is performed, and if the UE determines to perform four-step random access, in order to perform Msg1 transmission, preamble transmission to the PRACH resource capable of transmitting Msg1 is performed. The predetermined condition may be exemplified by, for example, performing a two-step random access procedure when the strength of a received signal from the base station is greater than a threshold value indicated by the base station.
[0065] Accordingly, if the UE determines to perform four-step random access, the UE receives only Msg2 (operation 1f-21). If the base station transmits Msg2 by including the BI value therein, the PREAMBLE_BACKOFF value is determined according to the corresponding value (operation 1f-23). Thereafter, the above-described Msg3 transmission and Msg4 reception are performed (operation 1f-31), and if the random access is not successfully completed, the UE determines whether to attempt retransmission of the preamble, and after a delay time equal to the determined PREAMBLE_BACKOFF value, performs the random access preamble transmission again (operation 1f-07).
[0066] If the UE determines to perform two-step random access, the UE may receive Msg2 and/or MsgB after transmission of MsgA (operation 1f-11). This is because, as in the above example, when multiple UEs transmit MsgA, if a scenario occurs in which the base station receives only the PRACH due to collision in PUSCH transmission, the base station may response to the reception through Msg2. Accordingly, a scenario in which the base station transmits both Msg2 and MsgB may occur, and here, a scenario in which the BI is included in both Msg2 and MsgB and transmitted may also be considered. This may occur in a scenario in which the PRACH resource is shared in the four-step random access and the two-step random access. That is, in this scenario, BI transmitted through Msg2 is for UEs performing four-step random access, and BI transmitted through MsgB is for UEs performing two-step random access. Accordingly, if the UE transmits MsgA, and then if the UE receives both MsgB and Msg2 in response to the corresponding MsgA transmission, the UE determines the PREAMBLE_BACKOFF value according to the BI value included in MsgB (operation 1f-13). In addition, if the UE receives only Msg2, the UE configures the PREAMBLE_BACKOFF value to be 0 even if the BI is included in the message.
[0067] Thereafter, the above-described Msg3 transmission and Msg4 reception are performed (operation 1f-31) and if the random access is not successfully completed, the UE determines whether to attempt retransmission of the preamble, and after a delay time equal to the determined PREAMBLE_BACKOFF value, performs the random access preamble transmission again (operation 1f-07).
[0068]
[0069] The UE receives random access related configuration information from a base station, which is currently camped on or being accessed, through an RRC layer message (operation 1g-03). The RRC layer message may be transmitted as a system information message (SIB) that the base station broadcasts to all UEs in a cell, or may be transmitted, in connection with connected UEs, only to the corresponding UE through an RRCReconfiguration message. The random access-related configuration information includes configuration information for a PRACH capable of transmitting a random access preamble (Msg1) (i.e., a resource for a four-step random access procedure), configuration information for a channel capable of transmitting MsgA (i.e., a resource for a two-step random access procedure), and the like, wherein the PRACH resource for the four-step random access procedure and the PRACH resource among MsgA for the two-step random access procedure may be configured independently each other or configured to be shared. The configuration of sharing the PRACH resources denotes that a UE for performing the four-step random access procedure and a UE for performing the two-step random access procedure can transmit the random access preamble to the same PRACH resource. However, in this case, since the UE randomly selects the random access preamble within a predetermined configuration, the used preamble index may be the same or different.
[0070] Thereafter, the UE triggers a random access procedure (operation 1g-05). The triggering of the random access procedure may occur in order to transmit the CCCH for the purpose of shifting from the idle mode to the connected mode as described above, may occur for beam failure recovery, or may occur in a scenario such as handover. Here, if the base station provides the two-step random access resource and the UE supports the two-step random access, the UE may determine whether to perform the two-step random access or the fourth-step random access according to a predetermined condition (operation 1g-07). That is, if the UE determines to perform two-step random access, the PRACH and PUSCH transmission to a resource capable of transmitting MsgA is performed for MsgA transmission, and if the UE determines to perform four-step random access, preamble transmission to the PRACH resource capable of transmitting Msg1 is performed for Msg1 transmission. The predetermined condition may be exemplified by, for example, performing a two-step random access procedure when the strength of a received signal from the base station is greater than a threshold value indicated by the base station.
[0071] Accordingly, if the UE determines to perform four-step random access, the UE receives only Msg2 (operation 1g-21). If the base station transmits Msg2 by including the BI value therein, the PREAMBLE_BACKOFF value is determined according to the corresponding value (operation 1g-23). Thereafter, the above-described Msg3 transmission and Msg4 reception are performed (operation 1g-31), and if the random access is not successfully completed, the UE determines whether to attempt retransmission of the preamble, and after a delay time equal to the determined PREAMBLE_BACKOFF value, performs the random access preamble transmission again (operation 1g-07).
[0072] If the UE determines to perform two-step random access, the UE may receive Msg2 and/or MsgB after transmission of MsgA (operation 1g-11). This is because, as in the above example, when multiple UEs transmit MsgA, if a scenario occurs in which the base station receives only the PRACH due to collision in PUSCH transmission, the base station may response to the reception through Msg2. Accordingly, a scenario in which the base station transmits both Msg2 and MsgB may occur, and here, a scenario in which the BI is included in both Msg2 and MsgB and transmitted may also be considered. This may occur in a scenario in which the PRACH resource is shared in the four-step random access and the two-step random access. Accordingly, if the PRACH resource is shared in the four-step random access procedure and the two-step random access procedure, the Msg2 response is transmitted to both the UE that has performed the two-step random access and the UE that has performed the four-step random access. Thus, if the base station wants to transmit the BI value to the UE that has performed the two-step random access, the BI value transmission is performed through MsgB, and even if the UE receives both Msg2 and MsgB, the PREAMBLE_BACKOFF value is determined according to the BI value included in MsgB (operation 1g-17). In addition, if the UE receives only Msg2, the UE configures the PREAMBLE_BACKOFF value to be 0 even if the BI is included in the message.
[0073] However, if the PRACH resource is not shared in the four-step random access procedure and the two-step random access procedure and is configured only for the two-step random access, both Msg2 and MsgB with respect to transmission of the corresponding MsgA are used for UEs that have performed the two-step random access. Therefore, the UE determines the PREAMBLE_BACKOFF value according to the last received BI value from either Msg2 or MsgB (operation 1g-15).
[0074] Thereafter, the above-described Msg3 transmission and Msg4 reception are performed (operation 1g-31), and if the random access is not successfully completed, the UE determines whether to attempt retransmission of the preamble, and after a delay time equal to the determined PREAMBLE_BACKOFF value, performs the random access preamble transmission again (operation 1g-07).
[0075]
[0076] The UE receives random access related configuration information from a base station, which is currently camped on or being accessed, through an RRC layer message (operation 1h-03). The RRC layer message may be transmitted as a system information message (SIB) that the base station broadcasts to all UEs in a cell, or may be transmitted, in connection with connected UEs, only to the corresponding UE through an RRCReconfiguration message. The random access-related configuration information includes configuration information for a PRACH capable of transmitting a random access preamble (Msg1) (i.e., a resource for a four-step random access procedure), configuration information for a channel capable of transmitting MsgA (i.e., a resource for a two-step random access procedure), and the like, wherein the PRACH resource for the four-step random access procedure and the PRACH resource among MsgA for the two-step random access procedure may be configured independently each other or configured to be shared. The configuration of sharing the PRACH resources denotes that a UE for performing the four-step random access procedure and a UE for performing the two-step random access procedure can transmit the random access preamble to the same PRACH resource. However, in this case, since the UE randomly selects the random access preamble within a predetermined configuration, the used preamble index may be the same or different.
[0077] Thereafter, the UE triggers a random access procedure (operation 1h-05). The triggering of the random access procedure may occur in order to transmit the CCCH for the purpose of shifting from the idle mode to the connected mode as described above, may occur for beam failure recovery, or may occur in a scenario such as handover. Here, if the base station provides the two-step random access resource and the UE supports the two-step random access, the UE may determine whether to perform the two-step random access or the fourth-step random access according to a predetermined condition (operation 1h-07). That is, if the UE determines to perform two-step random access, the PRACH and PUSCH transmission to a resource capable of transmitting MsgA is performed for MsgA transmission, and if the UE determines to perform four-step random access, preamble transmission to the PRACH resource capable of transmitting Msg1 is performed for Msg1 transmission. The predetermined condition may be exemplified by, for example, performing a two-step random access procedure when the strength of a received signal from the base station is greater than a threshold value indicated by the base station.
[0078] Accordingly, if the UE determines to perform four-step random access, the UE receives only Msg2 (operation 1h-21). If the base station transmits Msg2 by including the BI value therein, the PREAMBLE_BACKOFF value is determined according to the corresponding value (operation 1h-23). Thereafter, the above-described Msg3 transmission and Msg4 reception are performed (operation 1h-31), and if the random access is not successfully completed, the UE determines whether to attempt retransmission of the preamble, and after a delay time equal to the determined PREAMBLE_BACKOFF value, performs the random access preamble transmission again (operation 1h-07).
[0079] If the UE determines to perform two-step random access, the UE may receive Msg2 and/or MsgB after transmission of MsgA (operation 1h-11). This is because, as in the above example, when multiple UEs transmit MsgA, if a scenario occurs in which the base station receives only the PRACH due to collision in PUSCH transmission, the base station may response to the reception through Msg2. Accordingly, a scenario in which the base station transmits both Msg2 and MsgB may occur, and here, a scenario in which the BI is included in both Msg2 and MsgB and transmitted may also be considered. Accordingly, if the UE transmits MsgA, and then if the UE receives both MsgB and Msg2 in response to the corresponding MsgA transmission, the UE determines the PREAMBLE_BACKOFF value according to the last received BI value from either Msg2 or MsgB (operation 1h-15). Here, it is assumed that the base station configures the BI values, which are included in Msg2 and MsgB transmitted in response to the corresponding MsgA transmission, to be identical value, and transmits the same.
[0080] Thereafter, the above-described Msg3 transmission and Msg4 reception are performed (operation 1h-31), and if the random access is not successfully completed, the UE determines whether to attempt retransmission of the preamble, and after a delay time equal to the determined PREAMBLE_BACKOFF value, performs the random access preamble transmission again (operation 1h-07).
[0081]
[0082] Referring to
[0083] The RF processor 1i-10 performs functions for transmission/reception of signals through a wireless channel, such as signal band conversion, amplification, and the like. That is, the RF processor 1i-10 up-converts a baseband signal provided from the baseband processor 1i-20 into an RF band signal, transmits the same through an antenna, and down-converts an RF band signal received through the antenna into a baseband signal. For example, the RF processor 1i-10 may include a transmission filter, a reception filter, an amplifier, a mixer, an oscillator, a digital-to-analog converter (DAC), an analog-to-digital converter (ADC), and the like. Although only one antenna is illustrated in
[0084] The baseband processor 1i-20 performs a function of conversion between a baseband signal and a bit string according to the physical layer specification of the system. For example, during data transmission, the baseband processor 1i-20 encodes and modulates a transmission bit string, thereby generating complex symbols. In addition, during data reception, the baseband processor 1i-20 demodulates and decodes a baseband signal provided from the RF processor 1i-10, thereby reconstructing a reception bit string. For example, when an orthogonal frequency division multiplexing (OFDM) scheme is followed, during data transmission, the baseband processor 1i-20 encodes and modulates a transmission bit string so as to generate complex symbols, maps the complex symbols to subcarriers, and then configures OFDM symbols through an inverse fast Fourier transform (IFFT) operation and cyclic prefix (CP) insertion. In addition, during data reception, the baseband processor 1i-20 divides a baseband signal provided from the RF processor 1i-10 in units of OFDM symbols, reconstructs the signals mapped to subcarriers, through a fast Fourier transform (FFT) operation, and then reconstructs the reception bit string through demodulation and decoding.
[0085] The baseband processor 1i-20 and the RF processor 1i-10 transmit or receive signals as described above. Accordingly, the baseband processor 1i-20 and the RF processor 1i-10 may be referred to as transmitter, receiver, transceiver, or communication units. In addition, at least one of the baseband processor 1i-20 and the RF processor 1i-10 may include multiple communication modules in order to support multiple different radio access technologies. Furthermore, at least one of the baseband processor 1i-20 and the RF processor 1i-10 may include different communication modules in order to process signals in different frequency bands. For example, the different radio access technologies may include a wireless LAN (for example, IEEE 802.11), a cellular network (for example, LTE), and the like. In addition, the different frequency bands may include a super high frequency (SHF) (for example, 2.5 GHz, 5 GHz) band and a millimeter wave (for example, 60 GHz) band.
[0086] The storage 1i-30 stores data for operation of the UE, such as a basic program, an application program, and configuration information. Particularly, the storage 1i-30 may store information regarding a wireless LAN node configured to perform wireless communication by using a wireless LAN access technology. In addition, the storage 1i-30 provides stored data at a request of the controller 1i-40.
[0087] The controller 1i-40 controls the overall operations of the UE. For example, the controller 1i-40 transmits/receives signals through the baseband processor 1i-20 and the RF processor 1i-10. In addition, the controller 1i-40 records and reads data in and from the storage 1i-30. To this end, the controller 1i-40 may include at least one processor. For example, the controller 1i-40 may include a communication processor (CP) configured to perform control for communication, and an application processor (AP) configured to control the higher layer, such as an application program. According to an embodiment of the disclosure, the controller 1i-40 includes a multi-connection processor 1i-42 configured to perform processing for operating in a multi-connection mode. For example, the controller 1i-40 may control the UE so as to perform the procedure of operations of the UE illustrated in
[0088] The controller 1i-40 according to an embodiment of the disclosure determines, if two-step random access is triggered, whether to use the BI which has been received from a message, from among the received BI values, and thus determines the BI value to be used at the time of retransmission of MsgA or Msg1.
[0089]
[0090] Referring to
[0091] The transceiver 210 may transmit or receive a signal to or from another network. The transceiver 210 may receive system information, for example, from a base station, and may receive a synchronization signal or reference signal.
[0092] The controller 220 may control the overall operation of the UE according to an embodiment proposed in the disclosure. For example, the controller 220 may control signal flow between blocks to perform an operation according to the procedures described above by referring to
[0093] The storage 230 may store at least one of information transmitted or received through the transceiver 210 and information generated through the controller 220. For example, the storage 230 may store information required to use the two-step random access according to the above-described embodiment.
[0094]
[0095] Referring to
[0096] The transceiver 310 may transmit or receive a signal to or from another network. The transceiver 310 may transmit system information, for example, to a UE, and may transmit a synchronization signal or reference signal.
[0097] The controller 320 may control the overall operation of the base station according to an embodiment proposed in the disclosure. For example, the controller 320 may control signal flow between blocks to perform an operation according to the procedures described above by referring to
[0098] The storage 330 may store at least one of information transmitted or received through the transceiver 310 and information generated through the controller 320. For example, the storage 330 may store information required to use the two-step random access according to the above-described embodiment.
[0099] Methods disclosed in the claims and/or methods according to various embodiments described in the specification of the disclosure may be implemented by hardware, software, or a combination of hardware and software.
[0100] When the methods are implemented by software, a computer-readable storage medium for storing one or more programs (software modules) may be provided. The one or more programs stored in the computer-readable storage medium may be configured for execution by one or more processors within the electronic device. The at least one program may include instructions that cause the electronic device to perform the methods according to various embodiments of the disclosure as defined by the appended claims and/or disclosed herein.
[0101] The programs (software modules or software) may be stored in non-volatile memories including a random access memory and a flash memory, a read only memory (ROM), an electrically erasable programmable read only memory (EEPROM), a magnetic disc storage device, a compact disc-ROM (CD-ROM), digital versatile discs (DVDs), or other type optical storage devices, or a magnetic cassette. Alternatively, any combination of some or all of them may form a memory in which the program is stored. Further, a plurality of such memories may be included in the electronic device.
[0102] In addition, the programs may be stored in an attachable storage device which may access the electronic device through communication networks such as the Internet, Intranet, Local Area Network (LAN), Wide LAN (WLAN), and Storage Area Network (SAN) or a combination thereof. Such a storage device may access the electronic device via an external port. Further, a separate storage device on the communication network may access a portable electronic device.
[0103] In the above-described detailed embodiments of the disclosure, an element included in the disclosure is expressed in the singular or the plural according to presented detailed embodiments. However, the singular form or plural form is selected appropriately to the presented situation for the convenience of description, and the disclosure is not limited by elements expressed in the singular or the plural. Therefore, either an element expressed in the plural may also include a single element or an element expressed in the singular may also include multiple elements.
[0104] Although specific embodiments have been described in the detailed description of the disclosure, various modifications and changes may be made thereto without departing from the scope of the disclosure. Therefore, the scope of the disclosure should not be defined as being limited to the embodiments, but should be defined by the appended claims and equivalents thereof.