Sign In to Follow Application
View All Documents & Correspondence

Method And Apparatus For Receiving Random Access Response And Method And Apparatus For Sending Random Access Response In Two Step Random Access

Abstract: A method and apparatus for receiving a random access response and a method and apparatus for sending a random access response in two-step random access. The receiving apparatus comprises: a first computation unit for computing a first RNTI, wherein the first RNTI is different from an RA-RNTI actually used in four-step random access; a first detection unit for using, in a monitoring window, the first RNTI to detect downlink control information used for scheduling a random access response; and a first receiving unit for receiving, according to the downlink control information, the random access response on a physical downlink shared channel (PDSCH) when the downlink control information is successfully detected.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
20 January 2022
Publication Number
36/2023
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2025-03-26
Renewal Date

Applicants

FUJITSU LIMITED
1-1, Kamikodanaka 4-chome,Nakahara- ku Kawasaki-shi Kanagawa 211-8588
ZHANG, Jian
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027
JIANG, Qinyan
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027
LU, Yang
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027
ZHANG, Lei
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027
WANG, Xin
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027

Inventors

1. ZHANG, Jian
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027
2. JIANG, Qinyan
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027
3. LU, Yang
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027
4. ZHANG, Lei
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027
5. WANG, Xin
308, Unit 3F, Gate 6, Space 8, Pacific Century Place No. 2A Gong Ti Bei Lu, Chaoyang District Beijing 100027

Specification

Method and device for receiving and sending random access response in two-step random access
technical field
[0001]
The present invention relates to the field of communications.
Background technique
[0002]
In the Long Term Evolution (LTE) system of the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project), when the user equipment initially accesses the network, it needs to go through cell search, obtain System Information (SI, System Information) and Random access and other processes. After acquiring downlink synchronization through cell search, the user equipment performs random access based on information such as random access configuration included in the system information, thereby establishing a connection with the cell and acquiring uplink synchronization.
[0003]
FIG. 1 is a schematic diagram of the random access process of LTE. The contention-based random access process is used as an example to illustrate, which at least includes the following four steps: the user equipment sends a preamble (preamble), also called Msg1; the network After the device receives the preamble, it feeds back a random access response (RAR, Random Access Response), also known as Msg2; the user equipment sends Msg3 through the Physical Uplink Shared Channel (PUSCH, Physical Uplink Shared Channel); the network device shares the physical downlink through The channel (PDSCH, Physical Downlink Shared Channel) feeds back Msg4. This random access procedure may be referred to as four-step random access (4-step RACH).
[0004]
FIG. 2 is a schematic diagram of a random access process of NR (New Radio), which may be called two-step random access (2-step RACH). Compared with the traditional four-step random access, the two-step random access can access the network faster. As shown in Figure 2, during two-step random access, the user equipment sends msgA, where msgA at least carries the preamble and Msg3 information during four-step random access; the network equipment sends msgB to the user equipment, where msgB at least carries Msg2 (RAR) and Msg4 information during four-step random access.
[0005]
It should be noted that the above description of the technical background is only for the convenience of clearly and completely describing the technical solutions of the present invention, and for facilitating the understanding of those skilled in the art. It should not be assumed that the above-mentioned technical solutions are well known to those skilled in the art simply because these solutions are described in the background section of the present invention.
[0006]
SUMMARY OF THE INVENTION
[0007]
In the case of four-step random access or two-step random access, the time-frequency resource available for sending the preamble is called a Physical Random Access Channel (PRACH, Physical Random Access Channel) opportunity, or RO for short. After sending the preamble, the user equipment detects Msg2 in the four-step random access or msgB in the two-step random access within a listening window corresponding to its RO. In some application scenarios, at least one user equipment using four-step random access and at least one user equipment using two-step random access coexist.
[0008]
The inventor found that an important design requirement for both Msg2 and MsgB transmission and reception is to prevent a user equipment from mistaking a random access response (Msg2 or msgB) that is not for its own RO as its own random access response. In the four-step random access, for the downlink control information (DCI, Downlink Control Information) of scheduling Msg2, its cyclic redundancy check (CRC, Cyclic Redundancy Check) uses the wireless network in random access (RA, Random Access). Temporary identity (RA-RNTI, RA-Radio Network Tempory Identity) is scrambled. The RA-RNTI is determined by the time-frequency position of the RO, so a Msg2 is always directed to a certain RO. In the listening window (also known as RAR window, RAR window), the user equipment uses the DCI scrambled by RA-RNTI by blindly checking the CRC, and can filter out Msg2 for other ROs (that is, not the RO used by the user equipment itself). , so that the Msg2 that is not aimed at the own RO can be avoided to be mistaken for the own Msg2.
[0009]
For two-step random access, the requirements become more complicated. It is necessary to avoid that the two-step random access user equipment will mistake the msgB that is not for its own RO as its own msgB, and it is necessary to avoid that the two-step random access user equipment will not be aimed at The Msg2 of its own RO is mistaken for its own msgB, and it is necessary to avoid the four-step random access user equipment mistaking the msgB that is not for its own RO as its own Msg2. The traditional four-step random access RA-RNTI method cannot meet the two requirements. The above requirements for one-step random access are no longer applicable to two-step random access.
[0010]
In order to solve at least one of the above problems, embodiments of the present invention provide a method and apparatus for receiving and sending random access responses in two-step random access.
[0011]
According to a first aspect of the embodiments of the present invention, a method for receiving a random access response in two-step random access is provided, the method is applied to a user equipment side, and the method includes: calculating a first RNTI, the first The RNTI is different from the RA-RNTI actually used by the four-step random access; the first RNTI is used in the listening window to detect the downlink control information (DCI, Downlink Control Information) that schedules the random access response; and when successfully detected During the downlink control information, a random access response is received on the physical downlink shared channel (PDSCH) according to the downlink control information.
[0012]
According to a second aspect of the embodiments of the present invention, a method for receiving a random access response in two-step random access is provided, the method is applied to the user equipment side, and the method includes: calculating a first RNTI, wherein the The value of the first RNIT is not greater than the maximum value of all possible values ​​of the RA-RNTI of the four-step random access; the first RNTI is used in the listening window to detect the downlink control information for scheduling the random access response; and when When the downlink control information is successfully detected, a random access response is received on the physical downlink shared channel according to the downlink control information.
[0013]
According to a third aspect of the embodiments of the present invention, a method for sending a random access response in two-step random access is provided, the method is applied to a network device side, and the method includes: calculating a first RNTI, the first the RNTI is different from the RA-RNTI actually used by the four-step random access; use the first RNTI to scramble a Cyclic Redundancy Check (CRC) of downlink control information used to schedule a random access response; and send the Downlink control information and the random access response.
[0014]
According to a fourth aspect of the embodiments of the present invention, a method for sending a random access response in a two-step random access is provided, the method is applied to a network device side, and the method includes: calculating a first RNTI, wherein the The value of the first RNIT is not greater than the maximum value of all possible values ​​of the RA-RNTI of the four-step random access; use the first RNTI to perform the cyclic redundancy check of the downlink control information used for scheduling the random access response scrambling; and sending the downlink control information and the random access response.
[0015]
According to a fifth aspect of the embodiments of the present invention, an apparatus for receiving a random access response in two-step random access is provided, the apparatus is applied to a user equipment side, and the apparatus includes: a first computing unit, which is used for computing The first RNTI, the first RNTI is different from the RA-RNTI actually used by the four-step random access; the first detection unit, which is used for downlink control of the scheduling random access response using the first RNTI in the listening window information (DCI, Downlink Control Information) for detection; and a first receiving unit, which is used to receive random access on the physical downlink shared channel (PDSCH) according to the downlink control information when the downlink control information is successfully detected. input response.
[0016]
According to a sixth aspect of the embodiments of the present invention, there is provided an apparatus for receiving a random access response in two-step random access, the apparatus is applied to the user equipment side, and the apparatus includes: a fourth computing unit, which is used for computing The first RNTI, wherein the value of the first RNIT is not greater than the maximum value of all possible values ​​of the RA-RNTI of the four-step random access; the fourth detection unit is used for using the first RNTI in the listening window The RNTI detects the downlink control information of the scheduling random access response; and a second receiving unit, which is used for receiving the random access on the physical downlink shared channel according to the downlink control information when the downlink control information is successfully detected. input response.
[0017]
According to a seventh aspect of the embodiments of the present invention, an apparatus for sending a random access response in two-step random access is provided, the apparatus is applied to a network device side, and the apparatus includes: a seventh computing unit, which is used for computing a first RNTI, where the first RNTI is different from the RA-RNTI actually used by the four-step random access; a first scrambling unit, which is used to use the first RNTI to pair downlink control information for scheduling a random access response and a first sending unit, which is used for sending the downlink control information and the random access response.
[0018]
According to an eighth aspect of the embodiments of the present invention, an apparatus for sending a random access response in two-step random access is provided, the apparatus is applied to a network device side, and the apparatus includes: a tenth computing unit, which is used for computing The first RNTI, wherein the value of the first RNIT is not greater than the maximum value of all possible values ​​of the RA-RNTI of the four-step random access; the second scrambling unit is used to use the first RNTI to pair performing scrambling on the cyclic redundancy check of the downlink control information for scheduling the random access response; and a second sending unit configured to send the downlink control information and the random access response.
[0019]
According to a ninth aspect of the embodiments of the present invention, there is provided user equipment, where the user equipment includes the apparatus according to the fifth aspect or the sixth aspect of the embodiments of the present invention.
[0020]
According to a tenth aspect of the embodiments of the present invention, there is provided a network device, where the network device includes the apparatus according to the seventh aspect or the eighth aspect of the embodiments of the present invention.
[0021]
According to an eleventh aspect of the embodiments of the present invention, a communication system is provided, where the communication system includes the user equipment according to the ninth aspect of the embodiments of the present invention and/or the user equipment according to the tenth aspect of the embodiments of the present invention the network equipment described.
[0022]
According to a twelfth aspect of the embodiments of the present invention, there is provided a computer-readable program, wherein when the program is executed in an apparatus or user equipment that receives a random access response in two-step random access, the program causes the program to cause The apparatus or user equipment for receiving a random access response in the two-step random access executes the method for receiving a random access response in the two-step random access described in the first aspect or the second aspect of the embodiments of the present invention.
[0023]
According to a thirteenth aspect of the embodiments of the present invention, there is provided a storage medium storing a computer-readable program, wherein the computer-readable program causes an apparatus or user equipment that receives a random access response in two-step random access to execute The method for receiving a random access response in the two-step random access described in the first aspect or the second aspect of the embodiments of the present invention.
[0024]
According to a fourteenth aspect of the embodiments of the present invention, there is provided a computer-readable program, wherein when the program is executed in an apparatus or network device for sending a random access response in two-step random access, the program causes the program to The apparatus or network device for sending a random access response in the two-step random access executes the method for receiving a random access response in the two-step random access described in the third aspect or the fourth aspect of the embodiments of the present invention.
[0025]
According to a fifteenth aspect of the embodiments of the present invention, a storage medium storing a computer-readable program is provided, wherein the computer-readable program causes the apparatus or network device for sending a random access response in two-step random access to execute The method for receiving a random access response in a two-step random access according to the third aspect or the fourth aspect of the embodiments of the present invention.
[0026]
The beneficial effects of the embodiments of the present invention are: by using an RNTI different from the RA-RNTI actually used in the four-step random access to perform CRC scrambling on the DCI scheduling msgB, the confusion of the RNTI in the two-step random access can be avoided, and the That is to say, the user equipment that can avoid the two-step random access will mistake the msgB or Msg2 that is not for its own RO as the msgB of its own RO, and the user equipment that can avoid the four-step random access will not be the msgB for its own RO. Mistaken for Msg2 for own RO.
[0027]
With reference to the following description and drawings, specific embodiments of the invention are disclosed in detail, indicating the manner in which the principles of the invention may be employed. It should be understood that embodiments of the present invention are not thereby limited in scope. Embodiments of the invention include many changes, modifications and equivalents within the spirit and scope of the appended claims.
[0028]
Features described and/or illustrated for one embodiment may be used in the same or similar manner in one or more other embodiments, in combination with, or instead of features in other embodiments .
[0029]
It should be emphasized that the term "comprising/comprising/having" as used herein refers to the presence of features, elements, steps or components, but does not exclude the presence or addition of one or more other features, elements, steps or components.
Description of drawings
[0030]
Elements and features described in one figure or embodiment of the invention may be combined with elements and features shown in one or more other figures or embodiments. Furthermore, in the figures, like reference numerals refer to corresponding parts throughout the several figures, and may be used to designate corresponding parts that are used in more than one embodiment.
[0031]
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention, constitute a part of the specification, are used to illustrate embodiments of the invention, and together with the written description, serve to explain the principles of the invention. Obviously, the drawings in the following description are only some embodiments of the present invention, and for those of ordinary skill in the art, other drawings can also be obtained from these drawings without creative effort. In the attached image:
[0032]
1 is a schematic diagram of a random access procedure of LTE;
[0033]
2 is a schematic diagram of a random access process of NR (New Radio);
[0034]
3 is a schematic diagram of a communication system according to an embodiment of the present invention;
[0035]
4 is a schematic diagram of an example of a random access procedure according to an embodiment of the present invention;
[0036]
5 is a schematic diagram of another example of a random access procedure according to an embodiment of the present invention;
[0037]
6 is a schematic diagram of another example of a random access procedure according to an embodiment of the present invention;
[0038]
7 is a schematic diagram of a method for receiving a random access response in a two-step random access according to Embodiment 1 of the present invention;
[0039]
FIG. 8 is a schematic diagram of the offset of Embodiment 1 of the present invention;
[0040]
9 is another schematic diagram of the offset of Embodiment 1 of the present invention;
[0041]
10 is another schematic diagram of the offset of Embodiment 1 of the present invention;
[0042]
11 is another schematic diagram of the offset of Embodiment 1 of the present invention;
[0043]
12 is another schematic diagram of a method for receiving a random access response in two-step random access according to Embodiment 1 of the present invention;
[0044]
13 is a schematic diagram of another example of a random access procedure according to Embodiment 1 of the present invention;
[0045]
14 is a schematic diagram of a method for receiving a random access response in two-step random access according to Embodiment 2 of the present invention;
[0046]
15 is a schematic diagram of a method for sending a random access response in two-step random access according to Embodiment 3 of the present invention;
[0047]
16 is another schematic diagram of a method for sending a random access response in two-step random access according to Embodiment 3 of the present invention;
[0048]
17 is a schematic diagram of a method for sending a random access response in two-step random access according to Embodiment 4 of the present invention;
[0049]
18 is a schematic diagram of a method for sending and receiving random access responses in two-step random access according to Embodiment 5 of the present invention;
[0050]
19 is another schematic diagram of a method for sending and receiving random access responses in two-step random access according to Embodiment 5 of the present invention;
[0051]
20 is another schematic diagram of a method for sending and receiving random access responses in two-step random access according to Embodiment 6 of the present invention;
[0052]
21 is a schematic diagram of an apparatus for receiving a random access response in a two-step random access according to Embodiment 7 of the present invention;
[0053]
FIG. 22 is a schematic diagram of the first computing unit 2101 according to Embodiment 7 of the present invention;
[0054]
23 is a schematic diagram of the first detection unit 2102 according to Embodiment 7 of the present invention;
[0055]
24 is a schematic diagram of an apparatus for receiving a random access response in two-step random access according to Embodiment 8 of the present invention;
[0056]
25 is a schematic diagram of the fourth computing unit 2401 in Embodiment 8 of the present invention;
[0057]
26 is a schematic diagram of an apparatus for sending a random access response in two-step random access according to Embodiment 9 of the present invention;
[0058]
27 is a schematic diagram of the seventh computing unit 2601 according to Embodiment 9 of the present invention;
[0059]
28 is a schematic diagram of an apparatus for sending a random access response in two-step random access according to Embodiment 10 of the present invention;
[0060]
FIG. 29 is a schematic diagram of the tenth computing unit 2801 in Embodiment 10 of the present invention;
[0061]
30 is a schematic block diagram of a system configuration of a user equipment according to Embodiment 11 of the present invention;
[0062]
FIG. 31 is a schematic structural diagram of a network device according to Embodiment 12 of the present invention.
Detailed ways
[0063]
The foregoing and other features of the present invention will become apparent from the following description with reference to the accompanying drawings. In the specification and drawings, specific embodiments of the invention are disclosed in detail, which are indicative of some of the embodiments in which the principles of the invention may be employed, it being understood that the invention is not limited to the described embodiments, but rather The invention includes all modifications, variations and equivalents falling within the scope of the appended claims.
[0064]
In the embodiments of the present invention, the terms "first", "second", etc. are used to distinguish different elements in terms of appellation, but do not indicate the spatial arrangement or temporal order of these elements, and these elements should not be used by these terms restricted. The term "and/or" includes any and all combinations of one or more of the associated listed items. The terms "comprising", "including", "having", etc. refer to the presence of stated features, elements, elements or components, but do not preclude the presence or addition of one or more other features, elements, elements or components.
[0065]
In the embodiments of the present invention, the singular forms "a", "the", etc. include plural forms, and should be broadly understood as "a" or "a class" rather than being limited to the meaning of "an"; in addition, the term "the" "" is understood to include both the singular and the plural, unless the context clearly dictates otherwise. Furthermore, the term "based on" should be understood as "at least in part based on..." and the term "based on" should be understood as "based at least in part on..." unless the context clearly dictates otherwise.
[0066]
In this embodiment of the present invention, the term "communication network" or "wireless communication network" may refer to a network conforming to any of the following communication standards, such as Long Term Evolution (LTE, Long Term Evolution), Long Term Evolution enhanced (LTE-A, LTE- Advanced), Wideband Code Division Multiple Access (WCDMA, Wideband Code Division Multiple Access), High-Speed ​​Packet Access (HSPA, High-Speed ​​Packet Access) and so on.
[0067]
In addition, the communication between devices in the communication system can be performed according to communication protocols at any stage, for example, including but not limited to the following communication protocols: 1G (generation), 2G, 2.5G, 2.75G, 3G, 4G, 4.5G and future 5G, New Radio (NR, New Radio), etc., and/or other communication protocols currently known or to be developed in the future.
[0068]
In this embodiment of the present invention, the term "network device" refers to, for example, a device in a communication system that connects a user equipment to a communication network and provides services for the user equipment. Network devices may include but are not limited to the following devices: base station (BS, Base Station), access point (AP, Access Point), transmission and reception point (TRP, Transmission Reception Point), broadcast transmitter, mobility management entity (MME, Mobile Management Entity), gateway, server, Radio Network Controller (RNC, Radio Network Controller), Base Station Controller (BSC, Base Station Controller) and so on.
[0069]
The base station may include but is not limited to: Node B (NodeB or NB), evolved Node B (eNodeB or eNB), and 5G base station (gNB), etc., and may also include a remote radio head (RRH, Remote Radio Head) , Remote Radio Unit (RRU, Remote Radio Unit), relay (relay) or low power node (eg femto, pico, etc.). And the term "base station" may include some or all of their functions, each base station may provide communication coverage for a particular geographic area. The term "cell" may refer to a base station and/or its coverage area, depending on the context in which the term is used.
[0070]
In this embodiment of the present invention, the term "user equipment" (UE, User Equipment) refers to, for example, a device that accesses a communication network through a network device and receives network services, and may also be referred to as "terminal equipment" (TE, Terminal Equipment). A terminal device may be fixed or mobile, and may also be referred to as a mobile station (MS, Mobile Station), a terminal, a subscriber station (SS, Subscriber Station), an access terminal (AT, Access Terminal), a station, and so on.
[0071]
Wherein, the terminal device may include but is not limited to the following devices: Cellular Phone (Cellular Phone), Personal Digital Assistant (PDA, Personal Digital Assistant), wireless modem, wireless communication device, handheld device, machine type communication device, laptop computer, Cordless phones, smartphones, smart watches, digital cameras, and more.
[0072]
For another example, in scenarios such as the Internet of Things (IoT, Internet of Things), the terminal device may also be a machine or device that performs monitoring or measurement, such as but not limited to: Machine Type Communication (MTC, Machine Type Communication) terminals, Vehicle communication terminal, device to device (D2D, Device to Device) terminal, machine to machine (M2M, Machine to Machine) terminal, etc.
[0073]
FIG. 3 is a schematic diagram of a communication system according to an embodiment of the present invention, which schematically illustrates the case of user equipment and network equipment as examples. As shown in FIG. For simplicity, FIG. 3 only takes one user equipment as an example for description. The network device 101 is, for example, an NR network device gNB.
[0074]
In this embodiment of the present invention, an existing service or a service that can be implemented in the future may be performed between the network device 101 and the user equipment 102 . For example, these services include but are not limited to: enhanced mobile broadband (eMBB, enhanced Mobile Broadband), massive machine type communication (mMTC, massive Machine Type Communication) and high reliability and low latency communication (URLLC, Ultra-Reliable and Low- Latency Communication), etc.
[0075]
The user equipment 102 may send data to the network device 101, for example, initiate a random access procedure, and the random access procedure may be a four-step random access (4-step RACH) or a two-step random access (2 -step RACH).
[0076]
In the two-step random access, if the RA-RNTI in the four-step random access is still used to CRC scramble the DCI of the scheduled msgB, then the user equipment that may cause the two-step random access will not be the msgB for its own RO. Or Msg2 is mistaken for the msgB for its own RO, or the user equipment causing the four-step random access mistakenly regards the msgB that is not for its own RO as the Msg2 for its own RO.
[0077]
FIG. 4 is a schematic diagram of an example of a random access procedure according to an embodiment of the present invention. As shown in FIG. 4 , it is assumed that an unpaired spectrum (unpaired spectrum) or a Time Division Duplex (TDD, Time Division Duplex) spectrum is used, and the subcarrier spacing is assumed to be 15 kHz, and no SUL (Supplementary Uplink) carrier is configured. The ROs of 2-step RACH and 4-step RACH are multiplexed in a TDM manner.
[0078]
In the time domain, according to Table 6.3.3.2-3 of 3GPP TS 38.211 V15.6.0, configure the PRACH configuration index of 4-step RACH to 5, and configure the PRACH configuration index of 2-step RACH to 6 . According to the above PRACH configuration, the RO of the 4-step RACH is located in the time slot of index 4 in the even-numbered system frame, and the RO of the 2-step RACH is located in the time slot of the index of 4 in the odd-numbered system frame. In the frequency domain, there are no restrictions on the frequency resource configuration of 2-step RACH and 4-step RACH. For simplicity, Figure 2 shows 2-step RACH and 4-step RACH with the same frequency resource index. Definition of parameters See subsection 6.3.3.2 of TS38.211V15.6.0. Similar to the definition of RO, PUSCH occasion is abbreviated as PO, which represents the time-frequency resource of PUSCH.
[0079]
In FIG. 4 , the PUSCH is located in an adjacent time slot after the RO, and the size and location of the frequency domain resources of the PUSCH are not limited. Similar to the monitoring window (also called RAR monitoring window, RAR window) in 4-step RACH, 2-step RACH has a msgB monitoring window. The RAR listening window is located after the preamble, and the msgB listening window is located after the PUSCH (PO). For simplicity, in Figure 4, the RAR monitoring window and the msgB monitoring window are collectively referred to as the monitoring window (monitoring window). window length. As shown in FIG. 4 , the monitoring window of the 2-step RACH and the monitoring window of the 4-step RACH overlap in time. According to the RA-RNTI calculation method given in subsection 5.1.3 of TS 38.321 V15.6.0, the value of RA-RNTI takes 10 milliseconds as a cycle, so RO1 and RO2 in Figure 2 will have the same RA-RNTI, that is, the occurrence of RNTI confusion. If the 2-step RACH reuses the RA-RNTI, within the time range when the two listening windows overlap, the 2-step RACH user will mistake the Msg2 originally sent to the 4-step RACH user (this Msg2 is for RO1) as sent to himself At the same time, the 4-step RACH user will also mistake the msgB originally sent to the 2-step RACH user (the msgB is for RO2) as the Msg2 sent to himself. Since RO1 and RO2 can use the same preamble (preamble), the user cannot distinguish whether the preamble belongs to 2-step RACH (corresponding to RO2) or 4-step RACH through the RAPID (Random Access Preamble Identifier, ie preamble ID) in the MAC PDU. step RACH (corresponding to RO1).
[0080]
FIG. 5 is a schematic diagram of another example of a random access procedure according to an embodiment of the present invention. Among them, the ROs of the 2-step RACH and the 4-step RACH are multiplexed in the FDM manner. More specifically, in the time domain, according to Table 6.3.3.2-3 of 3GPP TS 38.211 V15.6.0, the PRACH configuration index (PRACH configuration index) of the 4-step RACH is configured as 5, and the PRACH configuration of the 2-step RACH is configured The index is configured to 5. However, in the frequency domain, the ROs of the 4-step RACH and the 2-step RACH are configured to occupy different frequency resources, that is, multiplexed in the same time slot in an FDM manner. Other parameter configurations are the same as in Figure 4. Since the 2-step RACH and the 4-step RACH are independently configured, the frequency resource indices n RA (or f_id) of both are identified from 0. If 2-step RACH reuses the RA-RNTI calculation method, since 2-step RACH and 4-step RACH have the same frequency resource index n RA (or f_id), RO1 and RO2 will have the same RA-RNTI. RNTI confusion will occur in overlapping parts.
[0081]
In the embodiment of the present invention, the 4-step RACH only detects the preamble. In contrast, the 2-step RACH not only needs to detect the preamble, but also needs to demodulate and decode the PUSCH, which requires a longer processing time than the 4-step RACH. Therefore, a larger listening window length can be configured for 2-step RACH than for 4-step RACH. The maximum monitoring window length of 4-step RACH is 10 milliseconds, and the maximum monitoring window length of 2-step RACH can be greater than the maximum monitoring window length of 4-step RACH, that is, greater than 10 milliseconds. When the 2-step RACH listening window length is configured to be greater than the 4-step RACH maximum listening window length, as shown in Figure 4, the 2-step RACH listening window and the 4-step RACH listening window will have more parts in time Therefore, reusing the RA-RNTI method of 4-step RACH will also cause 2-step RACH users to mistake the 4-step RACH user's Msg2 as msgB for their RO, or 4-step RACH users to 2-step RACH The user's msgB is mistaken for the Msg2 for its own RO. In addition, when the 2-step RACH listening window length is configured to be larger than the 4-step RACH maximum listening window length, reusing the RA-RNTI method of 4-step RACH will also cause 2-step RACH users to msgB is mistaken for msgB for its own RO.
[0082]
FIG. 6 is a schematic diagram of another example of a random access procedure according to an embodiment of the present invention. In the time domain, according to Table 6.3.3.2-3 of 3GPP TS 38.211 V15.6.0, the PRACH configuration index (PRACH configuration index) of the 2-step RACH is configured as 12. According to the above PRACH configuration, the RO of the 2-step RACH is located in the slot with index 4 within each system frame. In the frequency domain, there is no restriction on the frequency resource configuration of the 2-step RACH. For simplicity, FIG. 6 shows the 2-step RACH with the same frequency resource index. Fig. 6 assumes that the time length of the listening window is 20 ms, which is greater than the configurable maximum listening window length of 10 ms for the 4-step RACH. As shown in Figure 6, the two listening windows of 2-step RACH overlap in time. If 2-step RACH reuses the RA-RNTI of 4-step RACH, RO1 and RO2 in Figure 6 will have the same RA-RNTI value, and within the time range where the two listening windows overlap, 2-step RACH users will The msgB originally sent to other 2-step RACH users is mistaken for the msgB sent to itself. To sum up, when the maximum listening window length of 2-step RACH is greater than the maximum listening window length of 4-step RACH, reusing the RA-RNTI method of 4-step RACH will lead to both 2-step RACH and 4-step RACH. The confusion of the RNTI will lead to the confusion of the RNTI of the 2-step RACH itself.
[0083]
Various implementations of the embodiments of the present invention will be described below with reference to the accompanying drawings. These embodiments are only exemplary and do not limit the present invention.
[0084]
Example 1
[0085]
The embodiment of the present invention provides a method for receiving a random access response in two-step random access, and the method is applied to the user equipment side.
[0086]
FIG. 7 is a schematic diagram of a method for receiving a random access response in two-step random access according to Embodiment 1 of the present invention. As shown in FIG. 7 , the method includes:
[0087]
Step 701: Calculate the first RNTI, and the first RNTI is different from the RA-RNTI actually used by the four-step random access;
[0088]
Step 702: Use the first RNTI to detect the Downlink Control Information (DCI, Downlink Control Information) of the scheduling random access response within the listening window; and
[0089]
Step 703: When the downlink control information is successfully detected, receive a random access response on the physical downlink shared channel (PDSCH) according to the downlink control information.
[0090]
In this way, by using an RNTI different from the RA-RNTI actually used in the four-step random access to CRC scramble the DCI of the scheduled msgB, the confusion of the RNTI in the two-step random access can be avoided, that is, the two-step random access can be avoided. The user equipment with one-step random access will mistake the msgB or Msg2 that is not for its own RO as the msgB for its own RO, and the user equipment that can avoid the four-step random access will mistake the msgB that is not for its own RO for its own RO. Msg2.
[0091]
In step 701, a first RNTI different from the RA-RNTI actually used by the four-step random access is calculated, and the first RNTI may be represented by msgB-RNTI, for example.
[0092]
As an example, example 1), msgB may be carried by one MAC PDU (ie, one PDSCH). In this case, for example, the first RNTI may be calculated from the second RNTI and the offset.
[0093]
For example, the first RNTI is calculated according to the following formula (1):
[0094]
msgB-RNTI=offset+RA-RNTI 2-step (1)
[0095]
Wherein, msgB-RNTI represents the first RNTI, offset represents the offset, and RA-RNTI 2-step represents the second RNTI.
[0096]
In this embodiment, the offset offset is used to avoid confusion between the msgB-RNTI of the two-step random access and the RA-RNTI of the four-step random access, and the RA-RNTI 2-step is used to avoid the two-step random access RNTI confusion. That is to say, the user equipment of the two-step random access will not mistake the Msg2 of the user equipment of the four-step random access as the msgB for its own RO, and the user equipment of the four-step random access will not mistake the two-step random access The msgB of the user equipment is mistaken as the Msg2 for its own RO, and the user equipment with two-step random access will not mistake the msgB of the other two-step random access user equipment as the msgB for its own RO. In this embodiment, the offset offset may be configured by the network device.
[0097]
For example, the offset offset may be configured by the network device through at least one of the following methods: broadcast message; RRC signaling; and MAC CE (MAC control element).
[0098]
For example, the broadcast message may be system information SIB1 or MIB.
[0099]
In this embodiment, the specific value of the offset is not limited.
[0100]
For example, the offset offset may be greater than or equal to a value determined according to one of the following: the value range of the RA-RNTI; the value range of the RA-RNTI and the configuration information of the second carrier; the value of the RA-RNTI Value range, configuration information of the second carrier, and first PRACH configuration information of four-step random access on the second carrier; configuration information of the second carrier, second PRACH configuration information of four-step random access on the second carrier and the second PRACH configuration information of the four-step random access on the first carrier.
[0101]
In this embodiment, the RA-RNTI is a four-step random access RA-RNTI. For example, the RA-RNTI can be calculated according to the following formula (2):
[0102]
RA-RNTI 4-step=1+s_id 4-step+14×t_id 4-step+14×80×f_id 4-step+14×80×8×ul_carrier_id 4-step (2)
[0103]
Among them, RA-RNTI 4-step represents the RA-RNTI of the four-step random access, s_id 4-step represents the index of the first symbol where the RO of the four-step random access is located, 0≤s_id 4-step <14; t_id 4-step indicates the index of the first time slot where the RO is located in a system frame SFN, 0≤t_id 4-step <80; f_id 4-step indicates the index of the frequency resource where the RO is located in the frequency domain, 0≤f_id 4-step <8, up to 8 ROs can be configured in the FDM mode in the frequency domain; ul_carrier_id 4-step indicates the index of the uplink carrier (carrier) used for the preamble transmission of the four-step random access, 0≤ul_carrier_id 4-step <2, when a NUL (Normal Uplink) carrier is used, ul_carrier_id 4-step =0, and when a SUL (Supplementary Uplink) carrier is used, ul_carrier_id 4-step =1.
[0104]
In this embodiment, for example, the first carrier is a NUL (Normal Uplink) carrier, and the second carrier is a SUL (Supplementary Uplink) carrier.
[0105]
For example, the offset offset is greater than or equal to a value determined according to the value range of the RA-RNTI, for example, it can be calculated according to the following formula (3):
[0106]
offset≥max{RA-RNTI that can be used by 4-step RACH} (3)
[0107]
Among them, max{RA-RNTI that can be used by 4-step RACH} represents the maximum value of RA-RNTI that can be used by four-step random access, that is, the offset can be greater than or equal to all possible values ​​of the RA-RNTI the maximum value of .
[0108]
Substituting the above formula (3) and the range of related parameters into the above formula (3), the following formula (4) is obtained:
[0109]
offset≥14×80×8×2=17920 (4)
[0110]
Among them, 17920 is the maximum value of the RA-RNTI that can be used for the four-step random access, that is, the maximum value of all possible values ​​of the RA-RNTI.
[0111]
In this way, by setting the offset to be greater than or equal to the maximum value (maximum feasible value) of all possible values ​​of the RA-RNTI of the 4-step RACH, by introducing the offset, the value range of the msgB-RNTI of the 2-step RACH can be The value range of RA-RNTI of 4-step RACH does not overlap, so it can be guaranteed that msgB-RNTI of 2-step RACH and RA-RNTI of 4-step RACH will not have the same value, because different RNTIs are used Between msgB of 2-step RACH and Msg2 of 4-step RACH, 2-step RACH users will not mistake Msg2 of 4-step RACH users as msgB for their RO, and 4-step RACH users will not mistake 2-step RACH users. The msgB of the RACH user is mistaken as the Msg2 for its own RO.
[0112]
FIG. 8 is a schematic diagram of an offset according to Embodiment 1 of the present invention. As shown in FIG. 8 , the value range of the RA-RNTI of the 4-step RACH is shown in the form of a two-dimensional graph. Each square in Figure 8 represents a possible RA-RNTI value, which depends on the PRACH resource configuration. Not all RA-RNTIs will be used. The filled squares represent the RA-RNTI that is actually used. List the available RA-RNTIs and the RA-RNTIs actually used. RA-RNTI is uniquely determined by the time index (s_id, t_id), frequency index (f_id) and carrier index (ul_carrier_id) corresponding to the RO. f_id) increases as the carrier index (ul_carrier_id) increases. The above formulas (4 and (5) are equivalent to setting the offset to be greater than or equal to the maximum value of all possible RA-RNTI values, as shown in Figure 8. It can be seen that the minimum value of the offset is determined by the value of all available RA-RNTI values. The value space is the granularity.
[0113]
For another example, the offset offset is greater than or equal to a value determined according to the value range of the RA-RNTI and the configuration information of the second carrier, for example, it can be calculated according to the following formula (5):
[0114]

[0115]
Among them, ul_carrier_id represents the index of the uplink carrier used for sending the preamble, and max{4-step RACH can use RA-RNTI when ul_carrier_id=0} represents the condition that the index of the uplink carrier used for sending the preamble is zero The maximum value of all possible values ​​of the RA-RNTI, max{RA-RNTI that can be used by 4-step RACH} represents the maximum value of RA-RNTI that can be used by four-step random access.
[0116]
Substituting the above formula (3) and the range of related parameters into the above formula (5), the following formula (6) is obtained:
[0117]

[0118]
Among them, 8960 is the maximum value of all possible values ​​of the RA-RNTI that satisfies the condition that the index of the uplink carrier used for sending the preamble is zero, and 17920 is the maximum value of the RA-RNTI that can be used for four-step random access .
[0119]
In this way, the 2-step RACH user can know the SUL carrier configuration information by receiving the system information SIB1, and the SUL carrier configuration information at least includes whether the SUL carrier is configured. Using the above information, the value range of the RA-RNTI of the 4-step RACH can be further determined. If the SUL carrier is not configured, according to the method in subsection 5.1.3 of TS 38.321 V15.6.0, since ul_carrier_id cannot be 1, the value range of RA-RNTI of 4-step RACH is determined to be 1~8960. When offset is set to be greater than or equal to 8960, it can avoid overlapping with the value range of msgB-RNTI of 2-step RACH; otherwise, if the SUL carrier is configured, set the value range of RA-RNTI of 4-step RACH to It is determined to be 1 to 17920. In this case, the offset needs to be set to be greater than or equal to 17920 to avoid overlapping with the value range of msgB-RNTI of 2-step RACH. In this way, the 2-step RACH user will not mistake the 4-step RACH user's Msg2 as his own msgB, and the 4-step RACH user will not mistake the 2-step RACH user's msgB as his own Msg2.
[0120]
FIG. 9 is another schematic diagram of the offset in Embodiment 1 of the present invention. As shown in Figure 9, the figure on the left shows that when there is no SUL carrier, setting the offset to be greater than or equal to the maximum available RA-RNTI when ul_carrier_id=0 can avoid overlapping and confusion of RNTIs; the figure on the right shows that , when there is SUL, offset needs to be set to be greater than or equal to the maximum value of all available RA-RNTI values. It can be seen that the minimum value of the offset takes ul_carrier_id (carrier) as the granularity. The offset offset of the figure on the left side of Figure 9 is the value space of all available RA-RNTIs when ul_carrier_id=0 or greater. The right side of Figure 9 The minimum value of the offset in the graph takes the value space of all available RA-RNTIs when ul_carrier_id=0 and ul_carrier_id=1 as the granularity.
[0121]
For another example, the offset offset is greater than or equal to a value determined according to the value range of the RA-RNTI, the configuration information of the second carrier, and the first PRACH configuration information of the four-step random access on the second carrier, for example, It can be calculated according to the following formula (7):
[0122]

[0123]
Among them, ul_carrier_id represents the index of the uplink carrier used for sending the preamble, and max{4-step RACH can use RA-RNTI when ul_carrier_id=0} represents that the index of the uplink carrier used for sending the preamble is zero. The maximum value of all possible values ​​of the RA-RNTI under a condition, max{RA-RNTI that can be used by 4-step RACH} represents the maximum value of RA-RNTI that can be used by four-step random access.
[0124]
Substituting the above formula (2) and the range of related parameters into the above formula (7), the following formula (8) is obtained:
[0125]

[0126]
Among them, 8960 is the maximum value of all possible values ​​of the RA-RNTI that satisfies the condition that the index of the uplink carrier used for sending the preamble is zero, and 17920 is the maximum value of the RA-RNTI that can be used for four-step random access .
[0127]
In this way, by receiving the system information SIB1, the 2-step RACH user can know the SUL carrier configuration information (at least including whether the SUL carrier is configured), and know the first PRACH configuration information of the 4-step RACH on the SUL carrier, the first PRACH The configuration information at least includes whether PRACH resources of 4-step RACH are configured. If the SUL carrier is not configured, or the SUL carrier is configured, but the SUL carrier is not configured with the PRACH resource of the 4-step RACH, the value range of the RA-RNTI of the 4-step RACH is determined to be 1 to 8960, Therefore, offset can be set to be greater than or equal to 8960 to avoid overlapping with the value range of msgB-RNTI of 2-step RACH; otherwise, the value range of RA-RNTI of 4-step RACH is determined to be 1 to 17920. At this time, offset needs to be set to be greater than or equal to 17920 to avoid overlapping with the value range of msgB-RNTI of 2-step RACH. In this way, the 2-step RACH user will not mistake the 4-step RACH user's Msg2 as his own msgB, and the 4-step RACH user will not mistake the 2-step RACH user's msgB as his own Msg2. A visualization of equations (7) and (8) can be seen in Figure 9.
[0128]
For another example, the offset offset is determined according to the configuration information of the second carrier, the second PRACH configuration information of the four-step random access on the second carrier, and the second PRACH configuration information of the four-step random access on the first carrier. , for example, the offset can be calculated according to the following formula (9):
[0129]

[0130]
Among them, it represents the msg1-FDM parameter in the PRACH resource configuration of the 4-step RACH of the NUL carrier, represents the msg1-FDM parameter in the PRACH resource configuration of the 4-step RACH of the SUL carrier, and the msg1-FDM value is 1, 2 One of , 4, and 8, used to indicate how many ROs multiplexed by FDM exist in the frequency domain.
[0131]
In this way, the 2-step RACH user can know the SUL carrier configuration information (at least including whether the SUL carrier is configured) by receiving the system information SIB1, and can obtain the second PRACH configuration information of the 4-step RACH on the NUL and/or SUL carrier , where the second PRACH configuration information includes at least whether the PRACH resource of the 4-step RACH is configured and the specific PRACH resource configuration of the 4-step RACH. The PRACH resource configuration includes the high-level parameter msg1-FDM. Using the above information, the value range of the RA-RNTI of the 4-step RACH can be further determined. If the SUL carrier is not configured, or the SUL carrier is configured, but the SUL carrier is not configured with PRACH resources of 4-step RACH, the as Greater than or equal to can avoid the overlapping of the value range of RNTI of 4-step RACH and 2-step RACH; otherwise, the value range of RA-RNTI of 4-step RACH is determined to be greater than or equal to at this time . To avoid overlapping of the value ranges of the RNTI of 4-step RACH and 2-step RACH. In this way, the 2-step RACH user will not mistake the 4-step RACH user's Msg2 as his own msgB, and the 4-step RACH user will not mistake the 2-step RACH user's msgB as his own Msg2.
[0132]
FIG. 10 is another schematic diagram of the offset according to Embodiment 1 of the present invention. As shown in FIG. 10 , the minimum value of the offset is offset with the f_id as the granularity, or the “row” in FIG. 10 as the granularity. The offset offset of the graph on the left side of Figure 10 is greater than or equal to the "row" where the largest RA-RNTI actually used when ul_carrier_id=0 (one carrier), and the offset offset of the graph on the right side of Figure 4 is greater than or equal to ul_carrier_id=0 (one carrier). Or equal to the "row" where the largest RA-RNTI actually used when ul_carrier_id=0 and ul_carrier_id=1 (two carriers). That is, the offset is greater than or equal to the maximum value of all possible values ​​of the RA-RNTI that satisfies the condition that the frequency resource index where the RO is located is equal to the frequency resource index corresponding to the actually used largest RA-RNTI.
[0133]
For another example, the offset offset is greater than or equal to the configuration information of the second carrier, the second PRACH configuration information of the four-step random access on the second carrier, and the second PRACH of the four-step random access on the first carrier. The value determined by the configuration information, for example, the offset can be calculated according to the following formula (10):
[0134]
offset≥max{4-step RACH actually used RA-RNTI} (10)
[0135]
Wherein, max{RA-RNTI actually used by 4-step RACH} represents the largest RA-RNTI actually used.
[0136]
In this way, the 2-step RACH user can know the SUL carrier configuration information by receiving the system information SIB1, the SUL carrier configuration information at least includes whether the SUL carrier is configured, and can obtain the 4-step RACH on the NUL and/or SUL carrier. 2. PRACH configuration information. The second PRACH configuration information includes at least whether the PRACH resource of the 4-step RACH is configured and the specific PRACH resource configuration of the 4-step RACH. The PRACH resource configuration contains all necessary information for calculating RA-RNTI for 4-step RACH. According to the PRACH resource configuration, the 2-step RACH user can obtain all the values ​​of the RA-RNTI that have been used by the 4-step RACH in the current period. Therefore, the offset can be selected to be greater than or equal to the maximum value of all the values ​​of the RA-RNTI, which can avoid 4 The value ranges of the RNTI of -step RACH and 2-step RACH overlap. In this way, the 2-step RACH user will not mistake the 4-step RACH user's Msg2 as his own msgB, and the 4-step RACH user will not mistake the 2-step RACH user's msgB as his own Msg2.
[0137]
FIG. 11 is another schematic diagram of the offset in Embodiment 1 of the present invention. As shown in Figure 11, the minimum value of the offset takes the grid in Figure 11 as the granularity. The offset offset of the graph on the left side of Figure 11 is the "square" where the largest RA-RNTI actually used when ul_carrier_id=0 (one carrier) is greater than or equal to, and the offset offset of the graph on the right side of Figure 11 is The "square" where the actually used largest RA-RNTI is located when it is greater than or equal to ul_carrier_id=0 and ul_carrier_id=1 (two carriers). That is, the offset offset is greater than or equal to the largest RA-RNTI actually used.
[0138]
The method for determining the offset amount offset has been exemplarily described above.
[0139]
Hereinafter, the method for determining the second RNTI will be exemplarily described according to the relationship between the length of the listening window (which may be referred to as the msgB listening window) of the two-step random access and the length of the listening window of the four-step random access.
[0140]
For example, for the case where the maximum length of the monitoring window (msgB monitoring window) of the two-step random access is not greater than the maximum length of the monitoring window of the four-step random access, the second RNTI is based on the first position where the RO of the two-step random access is located. The index of the symbol, the index of the first time slot in a system frame, the index of the frequency resource, and the index of the uplink carrier used for sending the preamble are determined.
[0141]
For example, the second RNTI may be calculated with reference to the RA-RNTI of the four-step random access.
[0142]
For example, similar to the form of formula (2), the second RNTI can be calculated according to formula (11) below:
[0143]
RA-RNTI 2-step=1+s_id 2-step+14×t_id 2-step+14×80×f_id 2-step+14×80×8×ul_carrier_id 2-step (11)
[0144]
Among them, RA-RNTI 2-step represents the second RNTI, s_id 2-step represents the index of the first symbol where the RO of the two-step random access is located, 0≤s_id 2-step <14; t_id 2-step represents a The index of the first time slot where the RO is located in the system frame SFN, 0≤t_id 2-step <80; f_id 2-step represents the index of the frequency resource where the RO is located in the frequency domain, 0≤f_id 2-step <8, In the frequency domain, up to 8 ROs can be configured in FDM mode; ul_carrier_id 2-step indicates the index of the uplink carrier (carrier) used for preamble transmission of two-step random access, 0≤ul_carrier_id 2-step <2, when the When it is a NUL (Normal Uplink) carrier, ul_carrier_id 2-step =0; when a SUL (Supplementary Uplink) carrier is used, ul_carrier_id 2-step =1.
[0145]
For example, by substituting the above formula (11) and formula (3) into formula (1), the following formula (13) is obtained: msgB-RNTI≥1+s_id 2-step +14×t_id 2-step +14×80× (f_id 2-step +16)+14×80×8 × ul_carrier_id 2-step (13)
[0146]
The meaning of each parameter may refer to formula (11) and formula (3), which will not be repeated here.
[0147]
For another example, the above formula (11) and formula (5), or, formula (11) and formula (7) are substituted into formula (1) to obtain the following formula (13):
[0148]

[0149]
Among them, condition 1 is "if the SUL carrier is not configured", and condition 2 is "if the SUL carrier is not configured, or the SUL carrier is configured but the SUL carrier is not configured with PRACH resources for 4-step RACH", the meaning of other parameters can be See formula (11), which will not be repeated here.
[0150]
For another example, the above formula (11) and formula (9) are substituted into formula (1) to obtain the following formula (14):

claims
[Claim 1]
An apparatus for receiving a random access response in two-step random access, the apparatus is applied to a user equipment side, and the apparatus includes: a first calculation unit, which is configured to calculate a first RNTI, where the first RNTI is different from The RA-RNTI actually used by the four-step random access; a first detection unit, configured to use the first RNTI to detect the downlink control information (DCI, Downlink Control Information) of the scheduling random access response within the listening window; and a first receiving unit, configured to receive a random access response on a physical downlink shared channel (PDSCH) according to the downlink control information when the downlink control information is successfully detected.
[Claim 2]
The apparatus according to claim 1, wherein the first calculation unit calculates the first RNTI according to the second RNTI and an offset.
[Claim 3]
The apparatus according to claim 1, wherein, the first RNTI includes a third RNTI and/or a fourth RNTI, and the first calculation unit includes: a second calculation unit, which is configured to calculate according to the fifth RNTI and the first RNTI an offset to calculate the third RNTI; and/or, a third calculation unit configured to calculate the fourth RNTI according to the fifth RNTI, the first offset and the second offset, where The first detection unit includes: a second detection unit, configured to use the third RNTI to detect the first downlink control information for scheduling the first random access response within the listening window; and/or, a third detection The unit is configured to use the fourth RNTI to detect the second downlink control information for scheduling the second random access response within the listening window.
[Claim 4]
The apparatus of claim 2 or 3, wherein at least one of the offset, the first offset and the second offset is configured by a network device by at least one of the following means: Broadcast message; RRC signaling; and MAC CE (MAC control element).
[Claim 5]
The apparatus according to claim 2 or 3, wherein the offset or the first offset is greater than or equal to a value determined according to one of the following: the value range of the RA-RNTI; the RA - the value range of the RNTI and the configuration information of the second carrier; the value range of the RA-RNTI, the configuration information of the second carrier, and the first PRACH configuration information of the four-step random access on the second carrier; the second The configuration information of the carrier, the second PRACH configuration information of the four-step random access on the second carrier, and the second PRACH configuration information of the four-step random access on the first carrier.
[Claim 6]
The apparatus according to claim 5, wherein the second offset is greater than or equal to a value determined according to one of the following: the value range of the fifth RNTI; the value range of the fifth RNTI and the first The configuration information of the two carriers; the value range of the fifth RNTI, the configuration information of the second carrier, and the first PRACH configuration information of the two-step random access on the second carrier; the configuration information of the second carrier, the second carrier The second PRACH configuration information of the two-step random access on the first carrier and the second PRACH configuration information of the two-step random access on the first carrier.
[Claim 7]
The apparatus according to claim 2 or 3, wherein the offset or the first offset is greater than or equal to one of the following values: the maximum value of all possible values ​​of the RA-RNTI; The maximum value of all possible values ​​of the RA-RNTI that satisfies the condition that the index of the uplink carrier used for sending the preamble is zero; satisfies that the index of the frequency resource where the RO is located is equal to the maximum actually used RA-RNTI. The maximum value of all possible values ​​of the RA-RNTI under the condition of the corresponding frequency resource index; the actually used maximum RA-RNTI.
[Claim 8]
The apparatus according to claim 7, wherein the second offset is greater than or equal to one of the following values: the maximum value of all possible values ​​of the fifth RNTI; the uplink used for sending the preamble is satisfied The maximum value of all possible values ​​of the fifth RNTI under the condition that the index of the carrier is zero; satisfies the condition that the frequency resource index where the RO is located is equal to the frequency resource index corresponding to the actually used maximum fifth RNTI the maximum value of all possible values ​​of the fifth RNTI; the actually used maximum fifth RNTI.
[claim 9]
The apparatus according to claim 2 or 3, wherein the second RNTI or the fifth RNTI is based on the index of the first symbol where the RO of the two-step random access is located, and the first time slot where the RO is located in a The index in the system frame, the index of the frequency resource where it is located, the index of the uplink carrier used for sending the preamble, the system frame index, and the maximum listening window length corresponding to the subcarrier interval are determined, or, the second RNTI or The fifth RNTI is based on the index of the first symbol where the RO of the two-step random access is located, the index of the first time slot in a system frame where it is located, the index of the frequency resource where it is located, and the index used for sending the preamble. The index of the uplink carrier, the system frame index and the maximum listening window length are determined, or, the second RNTI or the fifth RNTI is based on the index of the first symbol where the RO of the two-step random access is located, the It is determined by the index of a time slot in one system frame, the index of the frequency resource where it is located, and the index of the uplink carrier used for sending the preamble.
[claim 10]
The apparatus according to claim 9, wherein when the two-step random access and the four-step random access share RO and/or the maximum listening window length is not greater than 10 milliseconds, the fifth RNTI is based on the two-step random access The index of the first symbol where the RO is located, the index of the first time slot in a system frame, the index of the frequency resource where it is located, and the index of the uplink carrier used for sending the preamble are determined, and the An offset equals zero.
[claim 11]
9. The apparatus of claim 9, wherein 10240 is divisible by a maximum listening window length in milliseconds.
[claim 12]
The apparatus according to claim 1, wherein when the time slot or symbol in which the uplink shared channel is located is unavailable, and the time slot or symbol in which the preamble associated with the uplink shared channel is located is available, the two-step random access is allowed. The preamble is sent using the time slot or symbol where the preamble associated with the uplink shared channel is located, and the listening window is located after the time slot or symbol where the uplink shared channel is located, or, two-step random access is not allowed The preamble is sent in the time slot or symbol where the preamble associated with the uplink shared channel is located.
[claim 13]
An apparatus for sending a random access response in two-step random access, the apparatus is applied to a network device side, and the apparatus includes: a seventh calculation unit, which is used for calculating a first RNTI, where the first RNTI is different from The RA-RNTI actually used by the four-step random access; a first scrambling unit, configured to use the first RNTI to add a Cyclic Redundancy Check (CRC) of downlink control information for scheduling a random access response scrambling; and a first sending unit, configured to send the downlink control information and the random access response.
[claim 14]
The apparatus according to claim 13, wherein the seventh calculation unit calculates the first RNTI according to the second RNTI and an offset.
[claim 15]
The apparatus according to claim 13, wherein, the first RNTI includes a third RNTI and/or a fourth RNTI, and the seventh calculation unit includes: an eighth calculation unit, which is configured to calculate according to the fifth RNTI and the first RNTI an offset to calculate the third RNTI; and/or, a ninth calculation unit, configured to calculate the fourth RNTI according to the fifth RNTI, the first offset and the second offset, where the first scrambling unit uses the third RNTI to scramble the cyclic redundancy check of the first downlink control information used for scheduling the random access response, or uses the fourth RNTI to scramble the cyclic redundancy check used for scheduling the random access response The cyclic redundancy check of the second downlink control information of the access response is scrambled.
[claim 16]
The apparatus of claim 14 or 15, wherein the apparatus further comprises: a configuration unit configured to configure the offset, the first offset and the second by at least one of the following means At least one of the offsets: broadcast message; RRC signaling; and MAC CE (MAC control element).
[claim 17]
The apparatus according to claim 14 or 15, wherein the offset or the first offset is greater than or equal to a value determined according to one of the following: the value range of the RA-RNTI; the RA - the value range of the RNTI and the configuration information of the second carrier; the value range of the RA-RNTI, the configuration information of the second carrier, and the first PRACH configuration information of the four-step random access on the second carrier; the second The configuration information of the carrier, the second PRACH configuration information of the four-step random access on the second carrier, and the second PRACH configuration information of the four-step random access on the first carrier.
[claim 18]
The apparatus according to claim 17, wherein the second offset is greater than or equal to a value determined according to one of the following: the value range of the fifth RNTI; the value range of the fifth RNTI and the first The configuration information of the two carriers; the value range of the fifth RNTI, the configuration information of the second carrier, and the first PRACH configuration information of the two-step random access on the second carrier; the configuration information of the second carrier, the second carrier The second PRACH configuration information of the two-step random access on the first carrier and the second PRACH configuration information of the two-step random access on the first carrier.
[claim 19]
The apparatus according to claim 14 or 15, wherein the offset or the first offset is greater than or equal to one of the following values: the maximum value of all possible values ​​of the RA-RNTI; The maximum value of all possible values ​​of the RA-RNTI that satisfies the condition that the index of the uplink carrier used for sending the preamble is zero; satisfies that the index of the frequency resource where the RO is located is equal to the maximum actually used RA-RNTI. The maximum value of all possible values ​​of the RA-RNTI under the condition of the corresponding frequency resource index; the actually used maximum RA-RNTI.
[claim 20]
The apparatus according to claim 19, wherein the second offset is greater than or equal to one of the following values: the maximum value of all possible values ​​of the fifth RNTI; the uplink used for sending the preamble is satisfied The maximum value of all possible values ​​of the fifth RNTI under the condition that the index of the carrier is zero; satisfies the condition that the frequency resource index where the RO is located is equal to the frequency resource index corresponding to the actually used maximum fifth RNTI The maximum value of all possible values ​​of the fifth RNTI; the actually used maximum fifth RNTI.

Documents

Application Documents

# Name Date
1 202237003307.pdf 2022-01-20
2 202237003307-STATEMENT OF UNDERTAKING (FORM 3) [20-01-2022(online)].pdf 2022-01-20
3 202237003307-PROOF OF RIGHT [20-01-2022(online)].pdf 2022-01-20
4 202237003307-POWER OF AUTHORITY [20-01-2022(online)].pdf 2022-01-20
5 202237003307-FORM 1 [20-01-2022(online)].pdf 2022-01-20
6 202237003307-FIGURE OF ABSTRACT [20-01-2022(online)].pdf 2022-01-20
7 202237003307-DRAWINGS [20-01-2022(online)].pdf 2022-01-20
8 202237003307-DECLARATION OF INVENTORSHIP (FORM 5) [20-01-2022(online)].pdf 2022-01-20
9 202237003307-COMPLETE SPECIFICATION [20-01-2022(online)].pdf 2022-01-20
10 202237003307-FORM 18 [21-01-2022(online)].pdf 2022-01-21
11 202237003307-certified copy of translation [21-01-2022(online)].pdf 2022-01-21
12 202237003307-MARKED COPIES OF AMENDEMENTS [25-01-2022(online)].pdf 2022-01-25
13 202237003307-FORM 13 [25-01-2022(online)].pdf 2022-01-25
14 202237003307-AMMENDED DOCUMENTS [25-01-2022(online)].pdf 2022-01-25
15 202237003307-MARKED COPIES OF AMENDEMENTS [31-01-2022(online)].pdf 2022-01-31
16 202237003307-FORM 13 [31-01-2022(online)].pdf 2022-01-31
17 202237003307-AMMENDED DOCUMENTS [31-01-2022(online)].pdf 2022-01-31
18 202237003307-Information under section 8(2) [21-03-2022(online)].pdf 2022-03-21
19 202237003307-FORM 3 [05-08-2022(online)].pdf 2022-08-05
20 202237003307-FORM 3 [09-12-2022(online)].pdf 2022-12-09
21 202237003307-FORM 3 [25-10-2023(online)].pdf 2023-10-25
22 202237003307-FER.pdf 2024-01-02
23 202237003307-Information under section 8(2) [07-06-2024(online)].pdf 2024-06-07
24 202237003307-FORM 3 [07-06-2024(online)].pdf 2024-06-07
25 202237003307-FORM-26 [08-06-2024(online)].pdf 2024-06-08
26 202237003307-OTHERS [11-06-2024(online)].pdf 2024-06-11
27 202237003307-FER_SER_REPLY [11-06-2024(online)].pdf 2024-06-11
28 202237003307-DRAWING [11-06-2024(online)].pdf 2024-06-11
29 202237003307-COMPLETE SPECIFICATION [11-06-2024(online)].pdf 2024-06-11
30 202237003307-CLAIMS [11-06-2024(online)].pdf 2024-06-11
31 202237003307-ABSTRACT [11-06-2024(online)].pdf 2024-06-11
32 202237003307-US(14)-HearingNotice-(HearingDate-10-03-2025).pdf 2025-02-15
33 202237003307-FORM-26 [06-03-2025(online)].pdf 2025-03-06
34 202237003307-Correspondence to notify the Controller [06-03-2025(online)].pdf 2025-03-06
35 202237003307-Written submissions and relevant documents [19-03-2025(online)].pdf 2025-03-19
36 202237003307-PatentCertificate26-03-2025.pdf 2025-03-26
37 202237003307-IntimationOfGrant26-03-2025.pdf 2025-03-26

Search Strategy

1 SearchHistoryE_01-01-2024.pdf

ERegister / Renewals

3rd: 17 Apr 2025

From 16/08/2021 - To 16/08/2022

4th: 17 Apr 2025

From 16/08/2022 - To 16/08/2023

5th: 17 Apr 2025

From 16/08/2023 - To 16/08/2024

6th: 17 Apr 2025

From 16/08/2024 - To 16/08/2025

7th: 17 Apr 2025

From 16/08/2025 - To 16/08/2026