Random access response method and device

A random access response and random access technology, applied in the field of communication, can solve the problem that the random access response message is no longer applicable

Active Publication Date: 2018-07-13
DATANG MOBILE COMM EQUIP CO LTD
View PDF3 Cites 96 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] Two-step random access 2-step RA is introduced in the 5G system, and the random acces

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random access response method and device
  • Random access response method and device
  • Random access response method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0279] Embodiment 1: Fixed-length MAC RAR method 1-1, UE only sends preamble code (four-step random access)

[0280]In fixed-length MAC RAR method 1-1, the MAC PDU format includes the following MAC subheader ( Figure 14a ) and MAC RAR ( Figure 14b ~ Figure 14d ).

[0281] UE side:

[0282] Step 1: Send random access request preamble code;

[0283] Step 2: Receive the random access response, determine the same number as the preamble code sent by yourself according to the RAPID field in the MAC subheader, and interpret the corresponding MAC RAR;

[0284] Step 3: Obtain MAC RAR(1), the format is as follows Figure 14b , if T1=0, read the follow-up fields, and perform relevant operations according to the instructions of each field, including uplink timing adjustment, sending uplink data transmission according to the UL Grant, obtaining the allocated Temporary C-RNTI, etc., and completing the follow-up random access process; if T1=1, it is determined that the random access r...

Embodiment 2

[0289] Embodiment 2: Fixed-length MAC RAR method 1-1, UE sends preamble code and UE ID (two-step random access)

[0290] The MAC PDU format is the same as that of Embodiment 1, and is still Figure 14a ~ Figure 14b .

[0291] UE side:

[0292] Step 1: Send a random access request, including the preamble code, UE ID and other uplink transmissions (such as BSR, PHR, uplink data). In the random access request, it is necessary to distinguish whether the UE sends a long UE ID or a short UE ID. You can Use different LCID fields in the MAC subheader to distinguish between long UE ID and short UE ID;

[0293] Step 2: Receive the random access response, determine the same number as the preamble code sent by yourself according to the RAPID field in the MAC subheader, and interpret the corresponding MAC RAR;

[0294] Step 3: Analyze T1, which has the following branches:

[0295] -3-1: If T1=0, get MAC RAR(1), the format is as follows Figure 14b , the UE determines that the network ...

Embodiment 3

[0310] Embodiment 3: Fixed-length MAC RAR method 1-2, UE only sends preamble code (four-step random access)

[0311] In fixed-length MAC RAR method 1-2, the MAC PDU format includes the following MAC subheader ( Figure 15a ) and MAC RAR ( Figure 15b ).

[0312] UE side:

[0313] Step 1: Send random access request preamble code;

[0314] Step 2: Receive the random access response, determine the same number as the preamble code sent by yourself according to the RAPID field in the MAC subheader, and interpret the corresponding MAC RAR;

[0315] Step 3: Get MAC RAR, the format is as follows Figure 15b , parse T1=0, read the follow-up fields, and perform relevant operations according to the instructions of each field, including uplink timing adjustment, sending uplink data transmission according to the UL Grant, obtaining the allocated Temporary C-RNTI, etc., and completing the follow-up random access process; if T1=1, it is determined that the random access response is not ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a random access response method and a random access response device. The method comprises the steps as follows: user equipment (UE) sends a random access request, wherein the random access request carries information including a UE identifier; the UE receives a random access response, and if the UE identifier carried in the random access response is accordant with the UE identifier in the random access request, the UE determines that a current random access is failed, and re-initiates a random access attempt; and if the random access response does not carry the UE identifier, the UE returns to the random access process in which the random access request does not carry the UE identifier information. Therefore, the problem that how to design the random access response in a new generation wireless communication system (NR system or 5G system) to meet the characteristics and the requirements of the random access process of the new generation wireless communication system is solved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a random access response method and device. Background technique [0002] The random access of the LTE system is divided into contention random access and non-contention random access. The process is as follows. [0003] The contention random access process such as figure 1 As shown, it is mainly divided into four-step random access, which can also be called 4-step RA: [0004] Msg1: UE selects random access preamble (random access preamble) and PRACH (Physical Random Access Channel, physical random access channel) resources and uses the PRACH resources to send the selected random access preamble code (random access preamble) to the base station code). [0005] Msg2: The base station receives the preamble code and sends a random access response. The random access response consists of two parts: MAC header and MAC RAR. The MAC header contains multiple sub-head...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W74/08
CPCH04W74/0833H04W74/0858H04L69/22H04W76/10H04W76/19H04W76/18H04W76/11H04W72/542
Inventor 谌丽赵亚利许芳丽
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products