Method executed by user equipment and user equipment
A technology of user equipment and physical downlink, applied in the field of user equipment, can solve the problems of adding low-priority synchronization sources for UEs, failing to serve as UE synchronization sources, conflicts, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0196] Below, combine figure 1 To illustrate the method executed by the user equipment in the first embodiment of the present invention.
[0197] figure 1 It is a flowchart showing the method executed by the user equipment according to the first embodiment of the present invention.
[0198] Such as figure 1 As shown, in the first embodiment of the present invention, the steps performed by the user equipment UE include: step S101 and step S103.
[0199] Specifically, in step S101, a timing advance command is received in the uplink time slot n. among them,
[0200] · The uplink time slot n may be the last time slot of the uplink time slot that overlaps with one or more time slots for PDSCH reception.
[0201] · The PDSCH may be a PDSCH that provides a timing advance command.
[0202] · When determining the uplink time slot n, it can be assumed that T TA =0, where T TA It is the value of uplink transmission timing adjustment, the unit is second.
[0203] · When determining the uplink t...
Embodiment 2
[0262] Below, combine figure 2 To illustrate the method executed by the user equipment in the second embodiment of the present invention.
[0263] figure 2 It is a flowchart showing the method executed by the user equipment according to the second embodiment of the present invention.
[0264] Such as figure 2 As shown, in the second embodiment of the present invention, the steps performed by the user equipment UE include: step S201 and step S203.
[0265] Specifically, in step S201, a random access preamble (random access preamble, sometimes referred to as physical random access channel, PRACH) is sent. Wherein, the transmission of the random access preamble can be triggered by a higher layer, can also be triggered by a PDCCH order (PDCCH order), or can be triggered by other methods.
[0266] In addition, in step S203, the DCI format 1_0 in which the CRC is scrambled with RA-RNTI is detected in the RAR (Random Access Response) window.
[0267] Optionally, if the UE detects the DCI f...
Embodiment 3
[0273] Below, combine image 3 To illustrate the method executed by the user equipment in the third embodiment of the present invention.
[0274] image 3 It is a flowchart showing the method executed by the user equipment according to the third embodiment of the present invention.
[0275] Such as image 3 As shown, in the third embodiment of the present invention, the steps performed by the user equipment UE include: step S301 and step S303.
[0276] Specifically, in step S301, the RAR uplink authorization is received. Wherein, the RAR uplink grant may be included in a MAC RAR, the MAC RAR may be included in a MAC PDU, and the MAC PDU may be carried by a PDSCH. In addition, sometimes, when the context is clear, it can also be considered that the PDSCH carries a "RAR message" (RAR message), and the RAR message contains the RAR uplink grant.
[0277] In addition, in step S303, the PUSCH scheduled by the received RAR uplink grant is transmitted. The UE may assume that the minimum tim...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com