Signal sending method, signal receiving method, resource determining method, and device

ABSTRACT

A signal sending method includes: generating a MAC CE indicating a power headroom in a first power headroom set or a power headroom in a second power headroom set; and if the MAC CE indicates the power headroom in the first power headroom set, the MAC CE includes a first bit field and a second bit field, the first bit field is a reserved bit field, and the second bit field indicates the power headroom in the first power headroom set; or if the MAC CE indicates the power headroom in the second power headroom set, the MAC CE includes a third bit field, the third bit field is used to indicate the power headroom in the second power headroom set, and the third bit field includes a bit of the first bit field and a bit of the second bit field; and sending the MAC CE to a network device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/941,276, filed on Jul. 28, 2020, which is a continuation ofInternational Application No. PCT/CN2018/074838, filed on Jan. 31, 2018.All of the afore-mentioned patent applications are hereby incorporatedby reference in their entireties.

TECHNICAL FIELD

This application relates to the field of communications technologies,and in particular, to a signal sending method, a signal receivingmethod, a resource determining method, and a device.

BACKGROUND

Uplink power control is very important in a wireless communicationssystem. Through uplink power control, a terminal device can ensurequality of uplink data, and also minimize interference to the system andanother user, thereby prolonging a battery usage time of the terminaldevice. In a current uplink power control manner, the terminal devicesends a power headroom report (PHR) to a base station, and the basestation controls an uplink transmit power of the terminal device basedon the PHR sent by the terminal device.

In the existing narrowband internet of things (NB-IoT) release (Release(Rel)-13/14), the PHR is sent by the terminal device to the base stationby using a media access control (MAC) control element (CE) in a thirdmessage (msg3) in a random access process.

Currently, how to further properly avoid power waste and interference toa network is a problem that needs to be urgently resolved.

SUMMARY

Embodiments of this application provide a signal sending method, asignal receiving method, a resource determining method, and a device, toproperly avoid power waste and interference to a network.

According to a first aspect, a first signal sending method is provided.The method may be performed by a terminal device. The method includes:generating a MAC CE, where the MAC CE is used to indicate a powerheadroom in a first power headroom set or a power headroom in a secondpower headroom set; and if the MAC CE is used to indicate the powerheadroom in the first power headroom set, the MAC CE includes a firstbit field and a second bit field, the first bit field is a reserved bitfield, and the second bit field is used to indicate the power headroomin the first power headroom set; or if the MAC CE is used to indicatethe power headroom in the second power headroom set, the MAC CE includesa third bit field, the third bit field is used to indicate the powerheadroom in the second power headroom set, and the third bit fieldincludes a bit of the first bit field and a bit of the second bit field;and sending the MAC CE to a network device.

Correspondingly, according to a second aspect, a first signal receivingmethod is provided. The method may be performed by a network device, andthe network device is, for example, an access network device such as abase station. The method includes: receiving a MAC CE from a terminaldevice, where the MAC CE is used to indicate a power headroom in a firstpower headroom set or a power headroom in a second power headroom set;and determining the power headroom in the first power headroom set basedon a second bit field included in the MAC CE, where the MAC CE includesa first bit field and the second bit field, and the first bit field is areserved bit field; or determining the power headroom in the secondpower headroom set based on a third bit field included in the MAC CE,where the third bit field includes a bit of the first bit field and abit of the second bit field.

In the embodiments of this application, the terminal device indicatesthe power headroom of the terminal device by using the third bit fieldincluded in the MAC CE. The bit of the second bit field that is includedin the third bit field is an original reserved bit field in the MAC CE.This is equivalent to that in the embodiments of this application, anoriginally unused bit field in the MAC CE is used with the first bitfield, in the MAC CE, that is originally used to indicate the powerheadroom, to jointly indicate the power headroom. In this case, becausea quantity of bits used to indicate the power headroom increases, aquantity of power headrooms that can be indicated correspondinglyincreases. Alternatively, in the embodiments of this application,indicating the power headroom may be understood as indicating a PHRlevel, so that a quantity of PHR levels that can be indicatedcorrespondingly increases. In this solution, a PHR of the terminaldevice may be divided into more power headroom levels, so that eachpower headroom level includes fewer power headrooms. In this way, areporting granularity is reduced, and the terminal device can report amore precise power headroom. The network device can correspondinglyperform more accurate power control on the terminal device, so that theterminal device can send data by using proper power. This avoids powerwaste and properly avoids interference to a network while ensuringtransmission quality.

In a possible design, if the MAC CE is used to indicate the powerheadroom in the first power headroom set, the fourth bit field is areserved bit field in the MAC CE; or if the MAC CE is used to indicatethe power headroom in the second power headroom set, the fourth bitfield is used to indicate that the power headroom is indicated by usingthe third bit field. Correspondingly, the method according to the secondaspect further includes: the MAC CE further includes a fourth bit field;and if the MAC CE is used to indicate the power headroom in the firstpower headroom set, the fourth bit field is a reserved bit field in theMAC CE; or if the MAC CE is used to indicate the power headroom in thesecond power headroom set, determining, based on the fourth bit field,that the power headroom is indicated by using the third bit field.

The MAC CE may be used to indicate the power headroom in the first powerheadroom set, or may be used to indicate the power headroom in thesecond power headroom set. Therefore, the network device needs to know apower headroom in which power headroom set is indicated by the MAC CE,and then can finally determine the power headroom of the terminal devicebased on the corresponding power headroom set and the MAC CE. Therefore,in a manner, the MAC CE is also used to indicate whether the powerheadroom is indicated by using the third bit field or the power headroomis indicated by using the first bit field and the second bit field.However, the embodiments of this application focus on a case in whichthe power headroom is indicated by using the third bit field. Therefore,it may be considered that the MAC CE is used to indicate that the powerheadroom is indicated by using the third bit field. In this way, thenetwork device may be notified of the power headroom set to which thespecifically indicated power headroom belongs, so that the networkdevice can determine the power headroom of the terminal device based onthe correct power headroom set. This improves accuracy of the determinedpower headroom and avoids an error.

In a possible design, the method according to the first aspect furtherincludes: sending first signaling to the network device, where the firstsignaling is used to indicate that the power headroom is indicated byusing the third bit field; or sending the MAC CE to the network devicethrough a CCCH, where a logical channel identifier of the CCCH is afirst identifier, and the first identifier is used to indicate that thepower headroom is indicated by using the third bit field.Correspondingly, the method according to the second aspect furtherincludes: receiving first signaling from the terminal device, where thefirst signaling is used to indicate that the power headroom is indicatedby using the third bit field; or receiving the MAC CE from the terminaldevice through a CCCH, where a logical channel identifier of the CCCH isa first identifier, and the first identifier is used to indicate thatthe power headroom is indicated by using the third bit field.

As described above, the network device needs to know a power headroom inwhich power headroom set is indicated by the MAC CE, and then canfinally determine the power headroom of the terminal device based on thecorresponding power headroom set and the MAC CE. Therefore, in anothermanner, the first signaling is used to indicate, to the network device,that the power headroom is indicated by using the third bit field, wherethe first signaling is, for example, higher layer signaling such as RRCsignaling, or may be other signaling; or a logical channel number of theCCCH may be used to indicate that the power headroom is indicated byusing the third bit field. Regardless which of the two manners is usedfor indication, no additional bit in the MAC CE needs to be occupied, sothat more bits in the MAC CE can be used to indicate the power headroom.This further increases a quantity of bits in the MAC CE that are used toindicate the power headroom, so that the quantity of power headroomsthat can be indicated further increases. In this way, finer powerheadroom levels can be obtained through division, and power headroomvalues included in each power headroom level may be fewer, so thataccuracy of power headroom reporting is further increased.

In a possible design, the method according to the first aspect furtherincludes: receiving second signaling from the network device, where thesecond signaling is used to instruct to indicate the power headroom byusing the third bit field included in the MAC CE. Correspondingly, themethod according to the second aspect further includes: sending secondsignaling to the terminal device, where the second signaling is used toinstruct to indicate the power headroom by using the third bit fieldincluded in the MAC CE.

The network device may support the terminal device in indicating orrequire the terminal device to indicate the power headroom by using thethird bit field, or may support the terminal device in indicating orrequire the terminal device to indicate the power headroom by using thefirst bit field and the second bit field. Therefore, the network devicemay notify the terminal device of an objective condition (to bespecific, whether the network device supports indicating the powerheadroom by using the third bit field or by using the first bit fieldand the second bit field) or a requirement of the network device inadvance by using the second signaling. For example, if the secondsignaling is used to instruct to indicate the power headroom by usingthe third bit field, the terminal device may indicate the power headroomby using the third bit field, so that an indication manner of theterminal device is consistent with a cognitive manner of the networkdevice. This reduces an error rate. The second signaling is, forexample, broadcast signaling. Strictly speaking, the network deviceactually broadcasts the second signaling instead of sending the secondsignaling to a device. However, the terminal device receives the secondsignaling. Therefore, it may be considered that the network device sendsthe second signaling to the terminal device.

According to a third aspect, a second signal sending method is provided.The method may be performed by a terminal device. The method includes:generating a MAC CE, where the MAC CE is used to indicate a powerheadroom in a first power headroom set or a power headroom in a secondpower headroom set, and the MAC CE includes a first bit field and asecond bit field; and if the MAC CE is used to indicate the powerheadroom in the first power headroom set, the first bit field is areserved bit field, and the second bit field is used to indicate thepower headroom in the first power headroom set; or if the MAC CE is usedto indicate the power headroom in the second power headroom set, thefirst bit field and the second bit field are used to indicate the powerheadroom in the second power headroom set; and sending the MAC CE to anetwork device.

Correspondingly, according to a fourth aspect, a second signal receivingmethod is provided. The method may be performed by a network device, andthe network device is, for example, an access network device such as abase station. The method includes: receiving a MAC CE from a terminaldevice, where the MAC CE is used to indicate a power headroom in a firstpower headroom set or a power headroom in a second power headroom set,where the MAC CE includes a first bit field and a second bit field; anddetermining the power headroom in the first power headroom set based onthe second bit field, where the first bit field is a reserved bit field;or determining the power headroom in the second power headroom set basedon the first bit field and the second bit field.

In the embodiments of this application, the terminal device indicatesthe power headroom of the terminal device by using the first bit fieldand the second bit field included in the MAC CE. The second bit field isan original reserved bit field in the MAC CE. This is equivalent to thatin the embodiments of this application, an originally unused bit fieldin the MAC CE is used with the first bit field, in the MAC CE, that isoriginally used to indicate the power headroom, to jointly indicate thepower headroom. In this case, because a quantity of bits used toindicate the power headroom increases, a quantity of power headroomsthat can be indicated correspondingly increases. Alternatively, in theembodiments of this application, indicating the power headroom may beunderstood as indicating a PHR level, so that a quantity of PHR levelsthat can be indicated correspondingly increases. In this solution, a PHRof the terminal device may be divided into more power headroom levels,so that each power headroom level includes fewer power headrooms. Inthis way, a reporting granularity is reduced, and the terminal devicecan report a more precise power headroom. The network device cancorrespondingly perform more accurate power control on the terminaldevice, so that the terminal device can send data by using proper power.This avoids power waste and properly avoids interference to a networkwhile ensuring transmission quality.

In a possible design, the MAC CE further includes a fourth bit field;and if the MAC CE is used to indicate the power headroom in the firstpower headroom set, the fourth bit field is a reserved bit field in theMAC CE; or if the MAC CE is used to indicate the power headroom in thesecond power headroom set, the fourth bit field is used to indicate thatthe power headroom is indicated by using the first bit field and thesecond bit field. Correspondingly, the method according to the secondaspect further includes: the MAC CE further includes a fourth bit field;and if the MAC CE is used to indicate the power headroom in the firstpower headroom set, the fourth bit field is a reserved bit field in theMAC CE; or if the MAC CE is used to indicate the power headroom in thesecond power headroom set, determining, based on the fourth bit field,that the power headroom is indicated by using the first bit field andthe second bit field.

In a possible design, the method according to the third aspect furtherincludes: sending first signaling to the network device, where the firstsignaling is used to indicate that the power headroom is indicated byusing the third bit field, or sending the MAC CE to the network devicethrough a CCCH, where a logical channel identifier of the CCCH is afirst identifier, and the first identifier is used to indicate that thepower headroom is indicated by using the third bit field.Correspondingly, the method according to the fourth aspect furtherincludes: receiving first signaling from the terminal device, where thefirst signaling is used to indicate that the power headroom is indicatedby using the first bit field and the second bit field; or receiving theMAC CE from the terminal device through a CCCH, where a logical channelidentifier of the CCCH is a first identifier, and the first identifieris used to indicate that the power headroom is indicated by using thefirst bit field and the second bit field.

In a possible design, the method according to the third aspect furtherincludes: receiving second signaling from the network device, where thesecond signaling is used to instruct to indicate the power headroom byusing the third bit field included in the MAC CE. Correspondingly, themethod according to the fourth aspect further includes: sending secondsignaling to the terminal device, where the second signaling is used toinstruct to indicate the power headroom by using the first bit field andthe second bit field included in the MAC CE.

The method according to the first aspect and the method according to thesecond aspect differ from the method according to the third aspect andthe method according to the fourth aspect only in understanding of a bitfield. In the method according to the first aspect and the methodaccording to the second aspect, the bit field used to indicate the powerheadroom is understood as one entire bit field (namely, the third bitfield). In the method according to the third aspect and the methodaccording to the fourth aspect, the bit field used to indicate the powerheadroom is understood as two independent bit fields (namely, the firstbit field and the second bit field). Other implementations of themethods are similar. Therefore, for technical effects of correspondingdesigns in the method according to the third aspect and the methodaccording to the fourth aspect, refer to related descriptions of designsin the method according to the first aspect and the method according tothe second aspect.

According to a fifth aspect, a third signal sending method is provided.The method may be performed by a terminal device. The method includes:when being in a connected state, generating a MAC CE carrying a BSR,where the MAC CE further includes at least 3 bits, and the at least 3bits are used to indicate a power headroom; and sending the MAC CE tothe network device.

Correspondingly, according to a sixth aspect, a third signal receivingmethod is provided. The method may be performed by a network device, andthe network device is, for example, an access network device such as abase station. The method includes: receiving a MAC CE from a terminaldevice; and determining a power headroom of the terminal device based onat least 3 bits included in the MAC CE, and obtaining a BSR from the MACCE.

In the embodiments of this application, the terminal device may indicatethe power headroom of the terminal device to the network device whenbeing in the connected state. For example, if the power headroom of theterminal device changes in a data transmission process, the terminaldevice may indicate the power headroom of the terminal device to thenetwork device in the manner provided in the embodiments of thisapplication, to improve uplink power control performance. In addition,the terminal device may add the power headroom of the terminal deviceand the BSR into one MAC CE for sending. This helps reduce signalingoverheads.

In addition, in the embodiments of this application, the power headroomreported by the terminal device may be a power headroom in a first powerheadroom set, or may be a power headroom in a second power headroom set.If the power headroom is the power headroom in the second power headroomset, a PHR may be re-divided into more power headroom levels than fourpower headroom levels in Table 1. When a value range of the powerheadroom of the terminal device remains unchanged, the second powerheadroom set provided in the embodiments of this application can providea finer division granularity, so that power headroom values included ineach power headroom level are fewer than those in the current firstpower headroom set. In addition, in the embodiments of this application,more bits are provided to indicate the power headroom of the terminaldevice, to adapt to the newly provided power headroom set. In this way,a reporting granularity is reduced, and the terminal device can report amore precise power headroom. The network device can correspondinglyperform more accurate power control on the terminal device, so that theterminal device can send data by using proper power. This avoids powerwaste and properly avoids interference to a network while ensuringtransmission quality.

In a possible design, the MAC CE carrying the BSR is generated when atleast one of the following conditions is met:

a difference between a first downlink path loss of the terminal deviceand a second downlink path loss of the terminal device is greater than afirst threshold, where the first downlink path loss is a currentdownlink path loss of the terminal device, and the second downlink pathloss is a downlink path loss caused when the terminal device lastindicates a power headroom of the terminal device to the network device;

a difference between the power headroom and a first power headroom ofthe terminal device is greater than a second threshold, wherein thefirst power headroom is a power headroom last sent by the terminaldevice to the network device;

the first downlink path loss of the terminal device is greater than athird threshold, wherein the first downlink path loss is the currentdownlink path loss of the terminal device; and

the power headroom is greater than a fourth threshold.

When being in a connected state, the terminal device may have moreopportunities to send the BSR to the network device. In this case, theterminal device may indicate a power headroom of the terminal deviceeach time the terminal device sends the BSR. Alternatively, because thepower headroom of the terminal device may not continuously change, theterminal device may not need to continuously indicate the power headroomto the network device. Continuously indicating the power headroom mayeven cause some interference to the network device and consumeadditional signaling overheads. Therefore, this embodiment of thisapplication further provides a determining mechanism. The terminaldevice may determine, by using the determining mechanism, whether toindicate the power headroom of the terminal device to the networkdevice. This can effectively avoid frequent reporting of the powerheadroom. In addition, the determining mechanism is relatively flexible,and at least one determining mechanism may be selected for use in actualapplication.

In a possible design, the method according to the fifth aspect furtherincludes: receiving first signaling from the network device, where thefirst signaling is used to configure to indicate the power headroomwhile sending the BSR to the network device. Correspondingly, the methodaccording to the sixth aspect further includes: sending first signalingto the terminal device, where the first signaling is used to configurethe terminal device to indicate the power headroom while sending the BSRto the network device.

The network device may support the terminal device in indicating orrequire the terminal device to indicate the power headroom while sendingthe BSR to the network device, or may not support the terminal device inindicating or not require the terminal device to indicate the powerheadroom while sending the BSR to the network device. Therefore, if thenetwork device supports the terminal device in indicating or requiresthe terminal device to indicate the power headroom while sending the BSRto the network device, the network device may configure the terminaldevice by using the first signaling, so that the terminal device mayindicate the power headroom while sending the BSR to the network devicein the manner provided in the embodiments of this application. If thenetwork device does not configure the terminal device, the terminaldevice may not indicate the power headroom while sending the BSR to thenetwork device. In this way, an operation manner of the terminal deviceis consistent with a support condition or a requirement of the networkdevice, and an error rate is reduced. The first signaling is, forexample, broadcast signaling. Strictly speaking, the network deviceactually broadcasts the first signaling instead of sending the firstsignaling to a device. However, the terminal device receives the firstsignaling. Therefore, it may be considered that the network device sendsthe first signaling to the terminal device.

According to a seventh aspect, a first resource determining method isprovided. The method may be performed by a terminal device. The methodincludes: obtaining first resource information indicated by a networkdevice, where the first resource information is used to send msg3, andthe first resource information includes a parameter of a modulation andcoding scheme of msg3 and a parameter of a quantity of resource unitsused for msg3; determining second resource information based on a propersubset of the parameters included in the first resource information,where the second resource information is used to actually send msg3, asecond transport block size is smaller than a first transport blocksize, the second transport block size is a transport block size, ofmsg3, included in the second resource information, and the firsttransport block size is a transport block size, of msg3, included in thefirst resource information.

In this embodiment of this application, a data early transmissionprocedure may be used. In addition, the terminal device may directly notuse redundant resources allocated by the network device, and does notneed to add a large quantity of padding bits, so that the terminaldevice can reduce power consumption of the terminal device whiletransmitting the information to the network device.

According to an eighth aspect, a second resource determining method isprovided. The method may be performed by a terminal device. The methodincludes: obtaining first resource information indicated by a networkdevice, where the first resource information is used to send msg3, andthe first resource information includes a parameter of an MCS of msg3and a parameter of a quantity of resource units used for msg3; andre-determining second resource information when determining a firsttransport block size is greater than a second transport block size,where a transport block size included in the second resource informationis the second transport block size. The second transport block size is atransport block size needed by the terminal device to actually sendmsg3, and the first transport block size is a transport block size, ofmsg3, included in the first resource information.

In this embodiment of this application, a data early transmissionprocedure may be used. In addition, if the network device allocatesexcessively many resources, the terminal device may totally re-determinea resource based on a resource needed by the terminal device to actuallytransmit msg3. In this way, the determined resource meets an actualtransmission requirement of the terminal device, and there is noexcessive resource. Therefore, the terminal device does not need to adda large quantity of padding bits, so that the terminal device can reducepower consumption of the terminal device while transmitting theinformation to the network device.

According to a ninth aspect, a third resource determining method isprovided. The method may be performed by a terminal device. The methodincludes: obtaining a plurality of pieces of resource informationindicated by a network device, where each of the plurality of pieces ofthe resource information is used to send msg3, and each piece ofresource information includes a parameter of a modulation and codingscheme of msg3 and a parameter of a quantity of resource units used formsg3; and determining, based on a size of an actual to-be-sent msg3, tosend the actual to-be-sent msg3 by using first resource information inthe plurality of pieces of resource information.

In this embodiment of this application, the network device may allocatea plurality of pieces of resource information, so that the terminaldevice may select one piece of resource information from the pluralityof pieces of resource information for use. In this way, the terminaldevice follows instruction of the network device, and uses an early datatransmission procedure. In addition, the terminal device can selectrelatively proper resource information to transmit msg3, and does notneed to add a large quantity of padding bits, so that the terminaldevice can reduce power consumption of the terminal device whiletransmitting the information to the network device.

In a possible design, the obtaining a plurality of pieces of resourceinformation indicated by a network device includes: receiving a randomaccess response message from the network device, where the random accessresponse message carries the plurality of pieces of resourceinformation, and the random access response message is further used toindicate a quantity of the plurality of pieces of resource information.

In this embodiment of this application, the random access responsemessage may be used to carry the plurality of pieces of resourceinformation, and the random access response message may be further usedto indicate the quantity of the plurality of pieces of resourceinformation. In this way, after receiving the random access responsemessage, the terminal device can determine the quantity of the pluralityof pieces of resource information carried in the random access responsemessage, to correctly obtain the plurality of pieces of resourceinformation. In addition, the quantity of the plurality of pieces ofresource information does not need to be indicated by using additionalsignaling. This helps save transmission resources.

According to a tenth aspect, a communications apparatus is provided. Thecommunications apparatus is, for example, a terminal device. Theterminal device has functions for implementing the terminal device inthe foregoing method designs. These functions may be implemented byhardware, or may be implemented by hardware executing correspondingsoftware. The hardware or the software includes one or more unitscorresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processor and a transceiver. The processor and the transceivermay perform corresponding functions in the method provided in any one ofthe first aspect or the possible designs of the first aspect.

According to an eleventh aspect, a communications apparatus is provided.The communications apparatus is, for example, a network device. Thenetwork device has functions for implementing the network device in theforegoing method designs. These functions may be implemented byhardware, or may be implemented by hardware executing correspondingsoftware. The hardware or the software includes one or more unitscorresponding to the foregoing functions.

In a possible design, a specific structure of the network device mayinclude a processor and a transceiver. The processor and the transceivermay perform corresponding functions in the method provided in any one ofthe second aspect or the possible designs of the second aspect.

According to a twelfth aspect, a communications apparatus is provided.The communications apparatus is, for example, a terminal device. Theterminal device has functions for implementing the terminal device inthe foregoing method designs. These functions may be implemented byhardware, or may be implemented by hardware executing correspondingsoftware. The hardware or the software includes one or more unitscorresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processor and a transceiver. The processor and the transceivermay perform corresponding functions in the method provided in any one ofthe third aspect or the possible designs of the third aspect.

According to a thirteenth aspect, a communications apparatus isprovided. The communications apparatus is, for example, a networkdevice. The network device has functions for implementing the networkdevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the network device mayinclude a processor and a transceiver. The processor and the transceivermay perform corresponding functions in the method provided in any one ofthe fourth aspect or the possible designs of the fourth aspect.

According to a fourteenth aspect, a communications apparatus isprovided. The communications apparatus is, for example, a terminaldevice. The terminal device has functions for implementing the terminaldevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processor and a transceiver. The processor and the transceivermay perform corresponding functions in the method provided in any one ofthe fifth aspect or the possible designs of the fifth aspect.

According to a fifteenth aspect, a communications apparatus is provided.The communications apparatus is, for example, a network device. Thenetwork device has functions for implementing the network device in theforegoing method designs. These functions may be implemented byhardware, or may be implemented by hardware executing correspondingsoftware. The hardware or the software includes one or more unitscorresponding to the foregoing functions.

In a possible design, a specific structure of the network device mayinclude a processor and a transceiver. The processor and the transceivermay perform corresponding functions in the method provided in any one ofthe sixth aspect or the possible designs of the sixth aspect.

According to a sixteenth aspect, a communications apparatus is provided.The communications apparatus is, for example, a terminal device. Theterminal device has functions for implementing the terminal device inthe foregoing method designs. These functions may be implemented byhardware, or may be implemented by hardware executing correspondingsoftware. The hardware or the software includes one or more unitscorresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processor and a transceiver. The processor and the transceivermay perform corresponding functions in the method provided in theseventh aspect.

According to a seventeenth aspect, a communications apparatus isprovided. The communications apparatus is, for example, a terminaldevice. The terminal device has functions for implementing the terminaldevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processor and a transceiver. The processor and the transceivermay perform the eighth aspect or corresponding functions in the methodprovided in the eighth aspect.

According to an eighteenth aspect, a communications apparatus isprovided. The communications apparatus is, for example, a terminaldevice. The terminal device has functions for implementing the terminaldevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processor and a transceiver. The processor and the transceivermay perform corresponding functions in the method provided in any one ofthe ninth aspect or the possible designs of the ninth aspect.

According to a nineteenth aspect, a communications apparatus isprovided. The communications apparatus is, for example, a terminaldevice. The terminal device has functions for implementing the terminaldevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processing module and a transceiver module. The processingmodule and the transceiver module may perform corresponding functions inthe method provided in any one of the first aspect or the possibledesigns of the first aspect.

According to a twentieth aspect, a communications apparatus is provided.The communications apparatus is, for example, a network device. Thenetwork device has functions for implementing the network device in theforegoing method designs. These functions may be implemented byhardware, or may be implemented by hardware executing correspondingsoftware. The hardware or the software includes one or more unitscorresponding to the foregoing functions.

In a possible design, a specific structure of the network device mayinclude a processing module and a transceiver module. The processingmodule and the transceiver module may perform corresponding functions inthe method provided in any one of the second aspect or the possibledesigns of the second aspect.

According to a twenty-first aspect, a communications apparatus isprovided. The communications apparatus is, for example, a terminaldevice. The terminal device has functions for implementing the terminaldevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processing module and a transceiver module. The processingmodule and the transceiver module may perform corresponding functions inthe method provided in any one of the third aspect or the possibledesigns of the third aspect.

According to a twenty-second aspect, a communications apparatus isprovided. The communications apparatus is, for example, a networkdevice. The network device has functions for implementing the networkdevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the network device mayinclude a processing module and a transceiver module. The processingmodule and the transceiver module may perform corresponding functions inthe method provided in any one of the fourth aspect or the possibledesigns of the fourth aspect.

According to a twenty-third aspect, a communications apparatus isprovided. The communications apparatus is, for example, a terminaldevice. The terminal device has functions for implementing the terminaldevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processing module and a transceiver module. The processingmodule and the transceiver module may perform corresponding functions inthe method provided in any one of the fifth aspect or the possibledesigns of the fifth aspect.

According to a twenty-fourth aspect, a communications apparatus isprovided. The communications apparatus is, for example, a networkdevice. The network device has functions for implementing the networkdevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the network device mayinclude a processing module and a transceiver module. The processingmodule and the transceiver module may perform corresponding functions inthe method provided in any one of the sixth aspect or the possibledesigns of the sixth aspect.

According to a twenty-fifth aspect, a communications apparatus isprovided. The communications apparatus is, for example, a terminaldevice. The terminal device has functions for implementing the terminaldevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processing module and a transceiver module. The processingmodule and the transceiver module may perform corresponding functions inthe method provided in the seventh aspect.

According to a twenty-sixth aspect, a communications apparatus isprovided. The communications apparatus is, for example, a terminaldevice. The terminal device has functions for implementing the terminaldevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processing module and a transceiver module. The processingmodule and the transceiver module may perform the eighth aspect orcorresponding functions in the method provided in the eighth aspect.

According to a twenty-seventh aspect, a communications apparatus isprovided. The communications apparatus is, for example, a terminaldevice. The terminal device has functions for implementing the terminaldevice in the foregoing method designs. These functions may beimplemented by hardware, or may be implemented by hardware executingcorresponding software. The hardware or the software includes one ormore units corresponding to the foregoing functions.

In a possible design, a specific structure of the terminal device mayinclude a processing module and a transceiver module. The processingmodule and the transceiver module may perform corresponding functions inthe method provided in any one of the ninth aspect or the possibledesigns of the ninth aspect.

According to a twenty-eighth aspect, a communications apparatus isprovided. The communications apparatus may be the terminal device in theforegoing method designs, or a chip disposed in the terminal device. Thecommunications apparatus includes a memory, configured to store computerexecutable program code; and a processor, where the processor is coupledto the memory. The program code stored in the memory includes aninstruction. When the processor executes the instruction, thecommunications apparatus is enabled to perform the method in any one ofthe first aspect or the possible designs of the first aspect.

According to a twenty-ninth aspect, a communications apparatus isprovided. The communications apparatus may be the network device in theforegoing method designs, or a chip disposed in the network device. Thecommunications apparatus includes a memory, configured to store computerexecutable program code; and a processor, where the processor is coupledto the memory. The program code stored in the memory includes aninstruction. When the processor executes the instruction, thecommunications apparatus is enabled to perform the method in any one ofthe second aspect or the possible designs of the second aspect.

According to a thirtieth aspect, a communications apparatus is provided.The communications apparatus may be the terminal device in the foregoingmethod designs, or a chip disposed in the terminal device. Thecommunications apparatus includes a memory, configured to store computerexecutable program code; and a processor, where the processor is coupledto the memory. The program code stored in the memory includes aninstruction. When the processor executes the instruction, thecommunications apparatus is enabled to perform the method in any one ofthe third aspect or the possible designs of the third aspect.

According to a thirty-first aspect, a communications apparatus isprovided. The communications apparatus may be the network device in theforegoing method designs, or a chip disposed in the network device. Thecommunications apparatus includes a memory, configured to store computerexecutable program code; and a processor, where the processor is coupledto the memory. The program code stored in the memory includes aninstruction. When the processor executes the instruction, thecommunications apparatus is enabled to perform the method in any one ofthe fourth aspect or the possible designs of the fourth aspect.

According to a thirty-second aspect, a communications apparatus isprovided. The communications apparatus may be the terminal device in theforegoing method designs, or a chip disposed in the terminal device. Thecommunications apparatus includes a memory, configured to store computerexecutable program code; and a processor, where the processor is coupledto the memory. The program code stored in the memory includes aninstruction. When the processor executes the instruction, thecommunications apparatus is enabled to perform the method in any one ofthe fifth aspect or the possible designs of the fifth aspect.

According to a thirty-third aspect, a communications apparatus isprovided. The communications apparatus may be the network device in theforegoing method designs, or a chip disposed in the network device. Thecommunications apparatus includes a memory, configured to store computerexecutable program code; and a processor, where the processor is coupledto the memory. The program code stored in the memory includes aninstruction. When the processor executes the instruction, thecommunications apparatus is enabled to perform the method in any one ofthe sixth aspect or the possible designs of the sixth aspect.

According to a thirty-fourth aspect, a communications apparatus isprovided. The communications apparatus may be the terminal device in theforegoing method designs, or a chip disposed in the terminal device. Thecommunications apparatus includes a memory, configured to store computerexecutable program code; and a processor, where the processor is coupledto the memory. The program code stored in the memory includes aninstruction. When the processor executes the instruction, thecommunications apparatus is enabled to perform the method in any one ofthe seventh aspect or the possible designs of the seventh aspect.

According to a thirty-fifth aspect, a communications apparatus isprovided. The communications apparatus may be the terminal device in theforegoing method designs, or a chip disposed in the terminal device. Thecommunications apparatus includes a memory, configured to store computerexecutable program code; and a processor, where the processor is coupledto the memory. The program code stored in the memory includes aninstruction. When the processor executes the instruction, thecommunications apparatus is enabled to perform the method in any one ofthe eighth aspect or the possible designs of the eighth aspect.

According to a thirty-sixth aspect, a communications apparatus isprovided. The communications apparatus may be the terminal device in theforegoing method designs, or a chip disposed in the terminal device. Thecommunications apparatus includes a memory, configured to store computerexecutable program code; and a processor, where the processor is coupledto the memory. The program code stored in the memory includes aninstruction. When the processor executes the instruction, thecommunications apparatus is enabled to perform the method in any one ofthe ninth aspect or the possible designs of the ninth aspect.

According to a thirty-seventh aspect, a first communications system isprovided. The communications system includes a terminal device and anetwork device. The terminal device is configured to: generate a MAC CE,where the MAC CE is used to indicate a power headroom in a first powerheadroom set or a power headroom in a second power headroom set; and ifthe MAC CE is used to indicate the power headroom in the first powerheadroom set, the MAC CE includes a first bit field and a second bitfield, the first bit field is a reserved bit field, and the second bitfield is used to indicate the power headroom in the first power headroomset; or if the MAC CE is used to indicate the power headroom in thesecond power headroom set, the MAC CE includes a third bit field, thethird bit field is used to indicate the power headroom in the secondpower headroom set, and the third bit field includes a bit of the firstbit field and a bit of the second bit field; and send the MAC CE to thenetwork device. The network device is configured to: receive the MAC CEfrom the terminal device, where the MAC CE is used to indicate the powerheadroom in the first power headroom set or the power headroom in thesecond power headroom set; and determine the power headroom in the firstpower headroom set based on the second bit field included in the MAC CE,where the MAC CE includes the first bit field and the second bit field,and the first bit field is the reserved bit field; or determine thepower headroom in the second power headroom set based on the third bitfield included in the MAC CE, where the third bit field includes the bitof the first bit field and the bit of the second bit field.

According to a thirty-eighth aspect, a second communications system isprovided. The communications system includes a terminal device and anetwork device. The terminal device is configured to: generate a MAC CE,where the MAC CE is used to indicate a power headroom in a first powerheadroom set or a power headroom in a second power headroom set, and theMAC CE includes a first bit field and a second bit field; and if the MACCE is used to indicate the power headroom in the first power headroomset, the first bit field is a reserved bit field, and the second bitfield is used to indicate the power headroom in the first power headroomset; or if the MAC CE is used to indicate the power headroom in thesecond power headroom set, the first bit field and the second bit fieldare used to indicate the power headroom in the second power headroomset; and send the MAC CE to the network device. The network device isconfigured to: receive the MAC CE from the terminal device, where theMAC CE is used to indicate the power headroom in the first powerheadroom set or the power headroom in the second power headroom set, andthe MAC CE includes the first bit field and the second bit field; anddetermine the power headroom in the first power headroom set based onthe second bit field, where the first bit field is the reserved bitfield; or determine the power headroom in the second power headroom setbased on the first bit field and the second bit field.

According to a thirty-ninth aspect, a third communications system isprovided. The communications system includes a terminal device and anetwork device. The terminal device is configured to: when being in aconnected state, generate a MAC CE carrying a BSR, where the MAC CEfurther includes at least 3 bits, and the at least 3 bits are used toindicate a power headroom; and send the MAC CE to the network device.The network device is configured to: receive the MAC CE from theterminal device; and determine the power headroom of the terminal devicebased on the at least 3 bits included in the MAC CE, and obtain the BSRfrom the MAC CE.

The communications system provided in the thirty-seventh aspect, thecommunications system provided in the thirty-eighth aspect, and thecommunications system provided in the thirty-ninth aspect may be threedifferent communications systems, or at least two of the threecommunications systems may be a same communications system.

According to a fortieth aspect, a computer storage medium is provided.The computer-readable storage medium stores an instruction, and when theinstruction is run on a computer, the computer is enabled to perform themethod in any one of the first aspect or the possible designs of thefirst aspect.

According to a forty-first aspect, a computer storage medium isprovided. The computer-readable storage medium stores an instruction,and when the instruction is run on a computer, the computer is enabledto perform the method in any one of the second aspect or the possibledesigns of the second aspect.

According to a forty-second aspect, a computer storage medium isprovided. The computer-readable storage medium stores an instruction,and when the instruction is run on a computer, the computer is enabledto perform the method in any one of the third aspect or the possibledesigns of the third aspect.

According to a forty-third aspect, a computer storage medium isprovided. The computer-readable storage medium stores an instruction,and when the instruction is run on a computer, the computer is enabledto perform the method in any one of the fourth aspect or the possibledesigns of the fourth aspect.

According to a forty-fourth aspect, a computer storage medium isprovided. The computer-readable storage medium stores an instruction,and when the instruction is run on a computer, the computer is enabledto perform the method in any one of the fifth aspect or the possibledesigns of the fifth aspect.

According to a forty-fifth aspect, a computer storage medium isprovided. The computer-readable storage medium stores an instruction,and when the instruction is run on a computer, the computer is enabledto perform the method in any one of the sixth aspect or the possibledesigns of the sixth aspect.

According to a forty-sixth aspect, a computer storage medium isprovided. The computer-readable storage medium stores an instruction,and when the instruction is run on a computer, the computer is enabledto perform the method in any one of the seventh aspect or the possibledesigns of the seventh aspect.

According to a forty-seventh aspect, a computer storage medium isprovided. The computer-readable storage medium stores an instruction,and when the instruction is run on a computer, the computer is enabledto perform the method in any one of the eighth aspect or the possibledesigns of the eighth aspect.

According to a forty-eighth aspect, a computer storage medium isprovided. The computer-readable storage medium stores an instruction,and when the instruction is run on a computer, the computer is enabledto perform the method in any one of the ninth aspect or the possibledesigns of the ninth aspect.

According to a forty-ninth aspect, a computer program product includingan instruction is provided. The computer program product stores theinstruction, and when the instruction is run on a computer, the computeris enabled to perform the method in any one of the first aspect or thepossible designs of the first aspect.

According to a fiftieth aspect, a computer program product including aninstruction is provided. The computer program product stores theinstruction, and when the instruction is run on a computer, the computeris enabled to perform the method in any one of the second aspect or thepossible designs of the second aspect.

According to a fifty-first aspect, a computer program product includingan instruction is provided. The computer program product stores theinstruction, and when the instruction is run on a computer, the computeris enabled to perform the method in any one of the third aspect or thepossible designs of the third aspect.

According to a fifty-second aspect, a computer program product includingan instruction is provided. The computer program product stores theinstruction, and when the instruction is run on a computer, the computeris enabled to perform the method in any one of the fourth aspect or thepossible designs of the fourth aspect.

According to a fifty-third aspect, a computer program product includingan instruction is provided. The computer program product stores theinstruction, and when the instruction is run on a computer, the computeris enabled to perform the method in any one of the fifth aspect or thepossible designs of the fifth aspect.

According to a fifty-fourth aspect, a computer program product includingan instruction is provided. The computer program product stores theinstruction, and when the instruction is run on a computer, the computeris enabled to perform the method in any one of the sixth aspect or thepossible designs of the sixth aspect.

According to a fifty-fifth aspect, a computer program product includingan instruction is provided. The computer program product stores theinstruction, and when the instruction is run on a computer, the computeris enabled to perform the method in any one of the seventh aspect or thepossible designs of the seventh aspect.

According to a fifty-sixth aspect, a computer program product includingan instruction is provided. The computer program product stores theinstruction, and when the instruction is run on a computer, the computeris enabled to perform the method in any one of the eighth aspect or thepossible designs of the eighth aspect.

According to a fifty-seventh aspect, a computer program productincluding an instruction is provided. The computer program productstores the instruction, and when the instruction is run on a computer,the computer is enabled to perform the method in any one of the ninthaspect or the possible designs of the ninth aspect.

In the embodiments of this application, the power headroom is jointlyindicated by using the original unused bit field in the MAC CE and thefirst bit field, in the MAC CE, that is originally used to indicate thepower headroom. The terminal device can report a more precise powerheadroom. The network device can correspondingly perform more accuratepower control on the terminal device, so that the terminal device cansend data by using proper power. This avoids power waste and properlyavoids interference to a network while ensuring transmission quality.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic diagram of an application scenario according to anembodiment of this application;

FIG. 2 is a flowchart of a first signal sending and receiving methodaccording to an embodiment of this application;

FIG. 3 is a schematic diagram of a MAC CE included in msg3;

FIG. 4 is a schematic diagram of a MAC CE that can indicate a powerheadroom according to an embodiment of this application;

FIG. 5 is a flowchart of a second signal sending and receiving methodaccording to an embodiment of this application;

FIG. 6 is a schematic diagram of a MAC CE that carries a power headroomof a terminal device and a BSR according to an embodiment of thisapplication;

FIG. 7 is a flowchart of a first resource determining method accordingto an embodiment of this application;

FIG. 8 is a flowchart of a second resource determining method accordingto an embodiment of this application;

FIG. 9 is a flowchart of a third resource determining method accordingto an embodiment of this application;

FIG. 10 is a schematic structural diagram of a communications apparatusthat can be implemented by using a terminal device according to anembodiment of this application;

FIG. 11 is a schematic structural diagram of a communications apparatusthat can be implemented by using a network device according to anembodiment of this application;

FIG. 12 is a schematic structural diagram of a communications apparatusthat can be implemented by using a terminal device according to anembodiment of this application;

FIG. 13 is a schematic structural diagram of a communications apparatusthat can be implemented by using a network device according to anembodiment of this application;

FIG. 14 is a schematic structural diagram of a communications apparatusthat can be implemented by using a terminal device according to anembodiment of this application;

FIG. 15 is a schematic structural diagram of a communications apparatusthat can be implemented by using a terminal device according to anembodiment of this application;

FIG. 16 is a schematic structural diagram of a communications apparatusthat can be implemented by using a terminal device according to anembodiment of this application; and

FIG. 17A and FIG. 17B are two schematic structural diagrams of acommunications apparatus according to an embodiment of this application.

DESCRIPTION OF EMBODIMENTS

To make the purpose, technical solutions, and advantages of theembodiments of this application clearer, the following clearly andcompletely describes the technical solutions of the embodiments of thisapplication with reference to the accompanying drawings in theembodiments of this application.

Some terms in the embodiments of this application are described below,to facilitate understanding of a person skilled in the art.

1. A terminal device includes a device that provides a user with voiceand/or data connectivity, for example, may include a handheld devicewith a wireless connection function, or a processing device connected toa wireless modem. The terminal device may communicate with a corenetwork through a radio access network (RAN), and exchange voice and/ordata with the RAN. The terminal device may include user equipment (UE),a wireless terminal device, a mobile terminal device, a subscriber unit,a subscriber station, a mobile station, a mobile, a remote station, anaccess point (AP), a remote terminal device, an access terminal device,a user terminal device, a user agent, a user device, or the like. Forexample, the terminal device may include a mobile phone (or referred toas a “cellular” phone), a computer having a mobile terminal device, aportable, pocket-sized, handheld, computer-embedded, or vehicle-mountedmobile apparatus, or a smart wearable device. For example, the terminaldevice is a device such as a personal communication service (PCS) phone,a cordless telephone set, a session initiation protocol (SIP) phone, awireless local loop (WLL) station, or a personal digital assistant(PDA). The terminal device further includes a limited device, forexample, a device with relatively low power consumption, a device with alimited storage capability, or a device with a limited computingcapability. For example, the terminal device includes an informationsensing device such as a bar code, a radio frequency identification(RFID), a sensor, a global positioning system (GPS), or a laser scanner.

As an example instead of a limitation, the terminal device in theembodiments of this application may alternatively be a wearable device.The wearable device may also be referred to as a wearable intelligentdevice, and is a general term for wearable devices such as glasses,gloves, watches, clothes, and shoes that are developed by applyingwearable technologies in intelligent designs of daily wear. The wearabledevice is a portable device that can be directly worn on a body orintegrated into clothes or an accessory of a user. The wearable deviceis not merely a hardware device, but is used to implement a powerfulfunction through software support, data exchange, and cloud interaction.Generalized wearable intelligent devices include full-featured andlarge-size devices that can implement complete or partial functionswithout depending on smartphones, for example, smartwatches or smartglasses, and devices that focus on only one type of application functionand need to work with other devices such as smartphones, for example,various smart bands, smart helmets, or smart jewelry for monitoringphysical signs.

2. A network device, for example, including a base station (for example,an access point), may be a device that is in an access network and thatcommunicates with a wireless terminal device over an air interfacethrough one or more cells. The network device may be configured tomutually convert a received over-the-air frame and an internet protocol(IP) packet and serve as a router between the terminal device and a restportion of the access network, where the rest portion of the accessnetwork may include an IP network. The network device may coordinateattribute management of the air interface. For example, the networkdevice may include an evolved NodeB (NodeB, or eNB, or e-NodeB) in along term evolution (LTE) system or an LTE advanced (LTE-A) system, ormay include a next generation NodeB (gNB) in a 5th generation mobilecommunications technology (5G) new radio (NR) system, or may include acentralized unit (CU) and a distributed unit in a cloud access network(CloudRAN) system. This is not limited in the embodiments of thisapplication.

3. NB-IoT: Currently, the 3rd generation partnership project (3GPP)standard focuses on carrying an IoT service based on a cellular networkby designing a new air interface and fully using a characteristic of anarrowband technology. This type of IoT is referred to as NB-IoT.Compared with a conventional cellular network, a service and a terminaldevice in an NB-IoT system have the following features:

(1) Low service rate and long service period: Compared with theconventional cellular network, the NB-IoT service generates smaller datapackets, and is usually insensitive to a delay.

(2) Massive-connection requirement: One NB-IoT base station may cover alarge quantity of internet of things terminal devices such as smartwater/electricity meters, smart households, vehicles, and wearabledevices that are massively deployed. For example, a quantity of theterminal devices may exceed tens of thousands.

(3) Low-cost requirement: Compared with an existing cellular networkterminal device, the NB-IoT system requires a lower-cost terminaldevice, to implement massive deployment of terminal devices. Thelow-cost requirement requires that implementation complexity of theterminal device is also very low.

(4) Low power consumption requirement: The NB-IoT system requires lowerpower consumption of the terminal device, to save battery power of theterminal device, and ensure that the terminal device has an extra-longstandby time, so as to reduce labor costs of battery replacement.

To meet the foregoing requirements such as low costs and deep coverage,the NB-IoT system has many special designs. For example, the NB-IoTsystem has no PUCCH, to simplify the terminal device and reduce costs.In addition, to implement deep coverage, a control channel (for example,a narrowband physical downlink control channel (NPDCCH)), a data channel(for example, a narrowband physical downlink shared channel (NPDSCH),and a narrowband physical uplink shared channel (NPUSCH)) that are inthe NB-IoT system are repeatedly sent, so that a probability that aterminal device with relatively poor coverage successfully receives samecontent is increased through hundreds or thousands of times of repeatedsending.

4. A PHR represents transmit power that can be used by the terminaldevice other than transmit power used for current physical uplink sharedchannel (PUSCH) transmission. In this case, the PHR is a differencebetween a maximum transmit power allowed by the terminal device and acurrently evaluated PUSCH transmit power, and may be simply expressed byusing a formula: PH=UEAllowedMaxTransPower−PuschPower.UEAllowedMaxTransPower represents the maximum transmit power allowed bythe terminal device, and PuschPower represents the currently evaluatedPUSCH transmit power. Alternatively, a PHR represents transmit powerthat can be used by the terminal device other than transmit power usedfor current PUSCH transmission and physical uplink control channel(PUCCH) transmission. In this case, the PHR is a difference between amaximum transmit power allowed by the terminal device and a currentlyevaluated PUSCH transmit power and PUCCH transmit power, and may besimply represented by using a formula:PH=UEAllowedMaxTransPower−PuschPower−PucchPower. UEAllowedMaxTransPowerrepresents the maximum transmit power allowed by the terminal device,PuschPower represents the currently evaluated PUSCH transmit power, andPucchPower represents the currently evaluated PUCCH transmit power.

A reason for defining a power headroom is that the power headroom may beused by the network device as a reference basis for allocating an uplinkresource block (RB) resource. An example in which the PHR is thedifference between the maximum transmit power allowed by the terminaldevice and the currently evaluated PUSCH transmit power is used. Forexample, if a PH value is negative, it indicates that the current PUSCHtransmit power has exceeded the maximum transmit power allowed by theterminal device, and uplink RB resources allocated to the terminaldevice may be reduced during next scheduling; and if a PH value ispositive, a quantity of subsequently allocated uplink RBs may continueto be increased.

5. A random access process is a process from a time at which theterminal device sends a random access preamble to attempt to access anetwork to a time at which the terminal device establishes a basicsignaling connection to the network device. Random access is a key stepin a mobile communications system, and a last step for establishing acommunication link between the terminal device and the network device.For example, the terminal device exchanges information with the networkdevice by using the random access process, to complete a subsequentoperation such as calling, resource requesting, or data transmission. Inaddition, the terminal device may further implement uplink timesynchronization with a system through random access.

The random access process may include a contention-based random accessprocess and a contention-free random access process. The embodiments ofthis application are mainly described by using the contention-basedrandom access process as an example.

The contention-based random access process may usually include foursteps:

Step 1: A terminal device sends a random access preamble to a networkdevice, and the network device receives the random access preamble fromthe terminal device, where the random access preamble is also referredto as a first message (msg1) in the random access process.

Step 2: The network device sends a random access response (RAR) messageto the terminal device, and the terminal device receives the RAR messagefrom the network device, where the RAR message is also referred to as asecond message (msg2) in the random access process.

Step 3. The terminal device sends, to the network device, uplinksignaling used to establish a radio resource control (RRC) connection,and the network device receives the uplink signaling from the terminaldevice. The uplink signaling is also referred to as msg3 in the randomaccess process. The uplink signaling may usually include an RRCsignaling part, a MAC CE, and the like. The RRC signaling may vary indifferent scenarios, for example, may be an RRC connection setuprequest, an RRC reestablishment request, or an RRC resume request.

Step 4: The network device sends an RRC connection setup message to theterminal device, and the terminal device receives the RRC connectionsetup message from the network device. The RRC connection setup messageis also referred to as a fourth message (msg4) in the random accessprocess.

6) The terms “system” and “network” in the embodiments of thisapplication may be used interchangeably. “A plurality of” means two ormore than two. In view of this, “a plurality of” may also be understoodas “at least two” in the embodiments of this application. The term“and/or” describes an association relationship for describing associatedobjects and represents that three relationships may exist. For example,A and/or B may represent the following three cases: Only A exists, bothA and B exist, and only B exists. In addition, the character “/”, unlessotherwise specified, usually indicates an “or” relationship between theassociated objects.

In addition, unless otherwise stated, ordinal numbers, such as “first”and “second”, mentioned in the embodiments of this application areintended to distinguish between a plurality of objects, but are notintended to limit a sequence, a time sequence, priorities, or importancelevels of the plurality of objects.

The foregoing describes some concepts included in the embodiments ofthis application, and the following describes the technical backgroundof the embodiments of this application.

Mobile communications have greatly changed people's lives, but thepursuit of mobile systems with higher performance has never stopped. A5G system emerges to cope with future explosive growth of mobile datatraffic, massive device connections, and continuous emergence of variousnew services and application scenarios. As a part of 5G, the internet ofthings has a rapidly increasing market demand. A forecast shows that bythe year 2022, a quantity of connections to 5G internet of things willreach 18 billion.

Currently, the 3rd generation partnership project (3GPP) standard hasproposed a solution based on a cellular network and a characteristic ofthe internet of things. For example, in an NB-IoT system, an IoT serviceis carried by using a characteristic of a narrowband technology. TheNB-IoT system uses a new air interface technology independent of theexisting cellular network (LTE), the terminal device has lower costs,and supports a lower rate and lower mobility.

In an early release (Rel-13/14) of the NB-IoT system, there are manyunique designs for small data packet transmission characteristics of theinternet of things. For example, considering that an amount oftransmitted data is relatively small, a time is relatively short, andthe terminal has low mobility, a power headroom is reported only oncewhen a connection is established, and a power headroom reportinggranularity is larger than that in LTE. This reduces complexity of theterminal device and signaling overheads required for reporting the powerheadroom. Table 1 is a power headroom table to which power headroomsthat can be reported in the current NB-IoT system belong. Each entry inTable 1 represents a power headroom level (where for example, PH=0represents a power headroom level, and PH=1 represents another powerheadroom level). In Table 1, an entry may also be understood as a row.It can be learned that in the current NB-IoT system, the PHR is dividedinto only four power headroom levels shown in Table 1, and each powerheadroom level corresponds to a plurality of specific power headroomvalues. For example, if the terminal device determines that a powerheadroom of the terminal device is a first power headroom, the terminaldevice determines a power headroom level that is in the four powerheadroom levels shown in Table 1 and to which the first power headroombelongs, and then sends the determined power headroom level to the basestation. The base station determines the power headroom of the terminaldevice based on the power headroom level sent by the terminal device.

TABLE 1 Power headroom level PH (Power Headroom Level) 0POWER_HEADROOM_0 1 POWER_HEADROOM_1 2 POWER_HEADROOM_2 3POWER_HEADROOM_3

Currently, there are only four power headroom levels, and therefore, apower headroom range of each power headroom level is relatively large.In other words, each power headroom level corresponds to relatively manypower headroom values. Consequently, a reporting granularity is alsorelatively large. For example, a difference between the first powerheadroom and a second power headroom is relatively large, but both thefirst power headroom and the second power headroom are covered in thepower headroom level corresponding to PH=1 in Table 1. In this case,regardless whether the power headroom of the terminal device is thefirst power headroom or the second power headroom, a power headroomlevel reported by the terminal device is the power headroom levelcorresponding to PH=1. In this case, when the network device determinesthe power headroom of the terminal device based on the power headroomlevel reported by the terminal device, it is likely that the powerheadroom of the terminal device is the first power headroom, but thenetwork device determines that the power headroom of the terminal deviceis the second power headroom. It can be learned that a relatively largereporting granularity leads to an inaccurate reported power headroom,and consequently, the power headroom of the terminal device that isdetermined by the network device is inaccurate.

With increasing commercial use of NB-IoT, more and more applicationscenarios are discovered, and new challenges are brought. For example,some applications have a relatively high requirement on a granularity ofthe PHR, and some terminal devices (for example, shared bicycles) maymove in a transmission process. In these new scenarios, the existingpower headroom reporting granularity is excessively large, andconsequently, the reported power headroom is inaccurate. In addition,the power headroom cannot be reported after the power headroom changesin the data transmission process. Consequently, uplink power controlperformance is poor.

Therefore, in the embodiments of this application, a method forreporting the power headroom in NB-IoT is optimized, to adapt to therequirement of the new application scenarios. The embodiments of thisapplication may be applied to the NB-IoT system, or may be applied toanother similar communications system.

The technical background of the embodiments of this application isdescribed above. FIG. 1 is a schematic diagram of an applicationscenario according to an embodiment of this application.

FIG. 1 includes a network device and a plurality of terminal devices.These terminal devices are terminal devices in an NB-IoT system, and forexample, include a refrigerator, a vehicle, and a television. Thenetwork device is, for example, an access network device such as a basestation. The network device and the at least one terminal device shownin FIG. 1 may be configured to implement the technical solutionsprovided in the embodiments of this application.

The technical solutions provided in the embodiments of this applicationare described below in detail with reference to the accompanyingdrawings. In the following description process, an example in which thetechnical solutions provided in the embodiments of this application areapplied to the application scenario shown in FIG. 1 is used. Certainly,this is not limited in actual application. In addition, in thisspecification, the power headroom table may also be understood as apower headroom set. For example, the power headroom table shown in Table1 may be understood as a first power headroom set. A new power headroomtable to be provided in the embodiments of this application may also beunderstood as another power headroom set. For example, the new powerheadroom table provided in the embodiments of this application may beunderstood as a second power headroom set. In other words, the two terms“table” and “set” may be replaced with each other in the embodiments ofthis application.

An embodiment of this application provides a first signal sending andreceiving method. In the first signal sending and receiving method, aterminal device indicates a power headroom of the terminal device whensending msg3 to a network device. In other words, in the first signalsending and receiving method, the terminal device indicates the powerheadroom of the terminal device to the network device in a random accessprocess. In addition, in the first signal sending method, that theterminal device indicates the power headroom of the terminal device tothe network device may also be understood as that the terminal deviceindicates, to the network device, a power headroom level to which thepower headroom of the terminal device belongs, or that the terminaldevice indicates the power headroom of the terminal device to thenetwork device may be understood as being implemented by indicating, tothe network device, a power headroom level to which the power headroomof the terminal device belongs.

In the first signal sending and receiving method, this embodiment ofthis application provides at least one new power headroom table. Thefollowing mainly uses an example in which one new power headroom tableis provided. In actual application, a quantity of new power headroomtables is not limited. For example, the new power headroom tableprovided in this embodiment of this application is referred to as afirst power headroom table, and the first power headroom table may alsobe understood as a second power headroom set. The first power headroomtable includes at least five entries. For a form of each entry, refer toa form of any entry in Table 1. Similarly, each entry represents a powerheadroom level. To be specific, in this embodiment of this application,the PHR may be re-divided into more power headroom levels than the fourpower headroom levels in Table 1, and each power headroom level may alsocorrespond to a plurality of specific power headroom values. However,compared with the power headroom table shown in Table 1, a quantity ofpower headroom values corresponding to each of the at least one powerheadroom level included in the first power headroom table is less than aquantity of power headroom values corresponding to a power headroomlevel included in the power headroom table shown in Table 1. In thiscase, when a value range of the power headroom of the terminal deviceremains unchanged, the first power headroom table provided in thisembodiment of this application can provide a finer division granularity,so that the power headroom values included in each power headroom levelare fewer than those in the current Table 1. In this way, the reportinggranularity is reduced, so that accuracy of the power headroom of theterminal device that is determined by the network device is improved. Ifthis embodiment of this application provides a plurality of powerheadroom tables, power headroom levels included in different powerheadroom tables may be different, or power headroom levels included inat least two of the power headroom tables may partially overlap. Inaddition, the power headroom levels included in the power headroom tableprovided in this embodiment of this application and the power headroomlevels included in the power headroom table shown in Table 1 may bedifferent, or may partially overlap.

Referring to FIG. 2, a procedure of the first signal sending andreceiving method is described as follows.

S21: The network device sends second signaling to the terminal device,and the terminal device receives the second signaling from the networkdevice. The second signaling is used to instruct to indicate a powerheadroom of the terminal device by using a third bit field included in aMAC CE, or the second signaling is used to instruct to indicate a powerheadroom of the terminal device by using a first bit field and a secondbit field included in a MAC CE.

It may be understood as that the second signaling is used to notify theterminal device that the network device supports using or needs to use anew power headroom table. The following uses the first power headroomtable as an example. Alternatively, it may be understood as that thesecond signaling is used to instruct the terminal device to use thefirst power headroom table when sending the power headroom to thenetwork device.

For example, the second signaling may be sent through broadcast.

S22: The terminal device sends a random access preamble to the networkdevice, and the network device receives the random access preamble fromthe terminal device. It may be considered that in S22, a random accessprocess starts.

S23: The network device sends an RAR message to the terminal device, andthe terminal device receives the RAR message from the network device.

The RAR message may carry a transmission resource of msg3 that isindicated by the network device.

S24: The terminal device generates the MAC CE, where the MAC CE is usedto indicate a power headroom in a first power headroom set or indicate apower headroom in a second power headroom set. The first power headroomset is the power headroom table shown in Table 1, and the second powerheadroom set may be understood as the first power headroom table.

In S21, the network device has indicated that the network devicesupports using or needs to use the new power headroom table, and theterminal device knows capability information of the terminal device. Ifthe capability information of the terminal device indicates that theterminal device also supports using the new power headroom table, whenthe terminal device indicates the power headroom of the terminal deviceto the network device, the terminal device can use the new powerheadroom table, for example, the first power headroom table.

The terminal device may perform physical layer measurement to obtain thepower headroom of the terminal device, and then determine, withreference to the first power headroom table, a power headroom level towhich the power headroom of the terminal device belongs in the firstpower headroom table. For example, the power headroom of the terminaldevice that is measured by the terminal device is a first powerheadroom, and the terminal device determines, with reference to thefirst power headroom table, that the first power headroom belongs to afirst power headroom level in the first power headroom table. In thiscase, the terminal device needs to send the first power headroom levelto the network device.

In an example, if the MAC CE is used to indicate the power headroom inthe first power headroom set, the MAC CE includes the first bit fieldand the second bit field, the first bit field is a reserved bit field,and the second bit field is used to indicate the power headroom in thefirst power headroom set.

Specifically, the MAC CE generated by the terminal device may includethe first bit field and the second bit field. The second bit field is abit field that is in the MAC CE and that is originally used to indicatea power headroom, and the first bit field is the reserved bit field.Reference may be made to FIG. 3. FIG. 3 shows an example of the MAC CEcarried in msg3. A bit field represented by PH in FIG. 3 is used toindicate the power headroom of the terminal device, in other words, isused to indicate the power headroom level to which the power headroom ofthe terminal device belongs. R represents reservation (reserved), thatis, a reserved bit, or referred to as a reserved bit field. DV is usedto indicate a data volume. In addition, in FIG. 3, small grids arefurther evenly divided above the blocks. One small grid represents 1bit. For example, the bit field represented by PH includes 2 bits, andone reserved bit includes 1 bit. In this case, in FIG. 3, the second bitfield may include the bit field represented by PH, and the first bitfield may include the bit field represented by R. In FIG. 3, there aretwo bit fields represented by R. In this case, the first bit field mayinclude at least one of the two bit fields represented by R. If theterminal device indicates the power headroom of the terminal device byusing the first power headroom set, that is, the terminal device needsto indicate the power headroom in the first power headroom set, theterminal device may generate the MAC CE shown in FIG. 3, and indicatethe power headroom in the first power headroom set by using the secondbit field.

In addition, FIG. 4 shows an example of the MAC CE generated by theterminal device in this embodiment of this application. In FIG. 4, DV isused to represent a data volume, R represents a reserved bit, the secondbit field includes a bit field represented by PH, and the first bitfield includes a bit field represented by PHE. It can be learned that,in FIG. 4, one original bit field represented by R in the MAC CE is usedas the PHE bit field, and the PHE bit field and the PH bit field in FIG.4 may be used to jointly indicate the power headroom of the terminaldevice. In other words, in FIG. 4, 3 bits can be used to indicate thepower headroom of the terminal device. Compared with an original case inwhich 2 bits are used to indicate the power headroom of the terminaldevice, a quantity of bits used to indicate the power headroomincreases. In addition, in FIG. 4, an example in which one of theoriginal reserved bits is used with the PH bit field to jointly indicatethe power headroom of the terminal device is used. This is not limitedin actual application. For example, alternatively, the original tworeserved bits may be used with the PH bit field to jointly indicate thepower headroom of the terminal device. That is, 4 bits are used toindicate the power headroom of the terminal device. This is not limitedin this embodiment of this application. If the terminal device indicatesthe power headroom of the terminal device by using the second powerheadroom set, that is, the terminal device needs to indicate the powerheadroom in the second power headroom set, the terminal device maygenerate the MAC CE shown in FIG. 4, to jointly indicate the powerheadroom in the first power headroom set by using the first bit fieldand the second bit field. In this case, the first bit field and thesecond bit field are two bit fields, and the terminal device jointlyindicates the power headroom of the terminal device by using the two bitfields.

Because the first power headroom table provided in this embodiment ofthis application includes at least five entries, more bits are needed toindicate the power headroom levels included in the first power headroomtable. Therefore, in this embodiment of this application, an originallyunused bit field in the MAC CE is used with the first bit field, in theMAC CE, that is originally used to indicate the power headroom level, tojointly indicate the power headroom. In this case, a quantity of powerheadroom levels that can be indicated correspondingly increases, and aquantity of power headrooms included in each power headroom leveldecreases. In this way, a reporting granularity is reduced, and accuracyof the power headroom of the terminal device that is determined by thenetwork device is improved.

In another example, if the MAC CE is used to indicate the power headroomin the second power headroom set, the MAC CE includes a third bit field,the third bit field is used to indicate the power headroom in the secondpower headroom set, and the third bit field includes a bit of the firstbit field and a bit of the second bit field.

When FIG. 4 is described above, an example in which the first bit fieldand the second bit field are two independent bit fields is used.Actually, the first bit field and the second bit field may alternativelybe considered as one bit field, for example, referred to as the thirdbit field. It may be understood as that after the first power headroomtable provided in this embodiment of this application is used, the thirdbit field may be used to indicate the power headroom of the terminaldevice. The third bit field includes a first bit part and a second bitpart, where the second bit part is the bit, in the MAC CE, that isoriginally used to indicate the power headroom, and the first bit partis the original reserved bit in the MAC CE. It may be understood as thatthe third bit field includes the bit of the first bit field and the bitof the second bit field, or it may be understood as that the third bitfield includes the original first bit field and the original second bitfield, and the first bit field and the second bit field are combinedinto one bit field. FIG. 4 is used as an example. According to thisunderstanding, the third bit field includes a bit represented by PHE anda bit represented by PH in FIG. 4. The bit represented by PH is thesecond bit part, and the bit represented by the PHE is the first bitpart. If the terminal device indicates the power headroom of theterminal device by using the second power headroom set, that is, theterminal device needs to indicate the power headroom in the second powerheadroom set, the terminal device may generate the MAC CE shown in FIG.4, and indicate the power headroom in the first power headroom set byusing the third bit field. If the second power headroom set is used toindicate the power headroom of the terminal device, the terminal devicemay be configured to indicate the power headroom of the terminal deviceby directly using the third bit field. In other words, the terminaldevice may not perceive that the third bit field actually includes twooriginal bit fields. Therefore, this understanding manner is relativelysuitable for specific implementation of the terminal device. Certainly,this is only a different way of understanding, and the essence of thesolution is not changed.

S25: The terminal device sends the MAC CE to the network device, and thenetwork device receives the MAC CE from the terminal device.

In this embodiment of this application, the terminal device may add theMAC CE to msg3 and send msg3 to the network device, and the networkdevice receives msg3 from the terminal device, and can obtain the MAC CEby parsing msg3.

As described above, this embodiment of this application provides thefirst power headroom table, and the power headroom of the terminaldevice that is sent by the terminal device is determined based on thefirst power headroom table. In this case, the network device also needsto determine, based on the first power headroom table, the powerheadroom sent by the terminal device. Currently, there is already apower headroom table, that is, the power headroom table shown in Table1, and this embodiment of this application further provides the firstpower headroom table. Although the network device notifies the terminaldevice in S21 that the network device supports reporting the powerheadroom by using the first bit field and the second bit field, in otherwords, the network device supports using the first power headroom table,considering a terminal device capability, not all terminal devices canuse the first power headroom table. For example, some terminal devicesof old versions may be capable of using only the power headroom tableshown in Table 1. Therefore, the network device needs to know a powerheadroom table that is actually used by the terminal device, and theterminal device needs to notify the network device of the used powerheadroom table.

In this embodiment of this application, a manner in which the terminaldevice indicates the used power headroom table to the network deviceincludes but is not limited to the following manners:

Manner a: Indicate the power headroom table by using the MAC CE.

For example, the MAC CE further includes a fourth bit field. If the MACCE is used to indicate the power headroom in the first power headroomset, the fourth bit field is a reserved bit field in the MAC CE; or ifthe MAC CE is used to indicate the power headroom in the second powerheadroom set, the fourth bit field is used to indicate that the powerheadroom is indicated by using the third bit field. It may be understoodas that the fourth bit field is the reserved bit field in the MAC CE.However, if the MAC CE is used to indicate the power headroom in thesecond power headroom set, the fourth bit field may be used, to indicatethat the power headroom is indicated by using the third bit field.

FIG. 4 is still used as an example. In FIG. 4, one of the two originalreserved bit fields is used with the original PH bit field to jointlyindicate the power headroom of the terminal device, the remainingreserved bit field (namely, the bit field represented by R in FIG. 4) inthe original two reserved bit fields may be used to indicate a powerheadroom table to which the power headroom indicated by the MAC CEbelongs, and the remaining reserved bit field may be used as the fourthbit field. For example, power headroom tables that can be used by theterminal device includes the power headroom table shown in Table 1 andthe first power headroom table provided in this embodiment of thisapplication, and a value of 1 bit included in the bit field representedby R in FIG. 4 may be used to indicate the power headroom table. Forexample, if the value of the bit is “1”, it indicates that the powerheadroom table to which the power headroom indicated by the MAC CEbelongs is the first power headroom table; and if the value of the bitis “0”, it indicates that the power headroom table to which the powerheadroom indicated by the MAC CE belongs is the power headroom tableshown in Table 1. Certainly, a relationship between the value of the bitand the indicated power headroom table is merely an example, and is notlimited thereto.

In Manner a, both the power headroom of the terminal device and thepower headroom table to which the power headroom belongs may beindicated in the MAC CE, and no additional resource is required forindication, so that transmission resources can be saved.

Manner b: Indicate the power headroom table by using first signaling.

For example, the first signaling is RRC signaling. In this case, theterminal device may send the RRC signaling to the network device, andthe network device receives the RRC signaling from the terminal device.The RRC signaling may be used to indicate the power headroom table towhich the power headroom of the terminal device that is indicated by theterminal device in the MAC CE belongs. Alternatively, it may beunderstood as that the RRC signaling is used to indicate that the powerheadroom is indicated by using the third bit field, or the RRC signalingis used to indicate that the power headroom is indicated by using thefirst bit field and the second bit field.

For example, the terminal device indicates, in the RRC signaling ofmsg3, the power headroom table to which the power headroom of theterminal device that is indicated in the MAC CE belongs. An indicationform in the RRC signaling may be explicit indication, or may be implicitindication. For example, the power headroom table is indicated byindicating a version number of the terminal device.

In Manner b, there may be more bits that can be used to indicate thepower headroom table in the RRC signaling, and this manner is moreapplicable to a case in which there are more power headroom tables.

Manner c: Indicate the power headroom table by using a logical channelnumber of a channel.

For example, the terminal device adds the MAC CE into msg3, and sends,to the network device through a common control channel (CCCH), msg3 thatcarries the MAC CE. In this case, the network device receives msg3 fromthe terminal device through the CCCH. The CCCH may be considered asunchanged, but one CCCH may have a plurality of logical channelidentifiers. Therefore, the logical channel identifiers of the CCCH maybe used to indicate different msg3. The different msg3 herein refers tomsg3 carrying different MAC CEs. When different power headroom tablesare used, it is considered that MAC CEs are different. It may beunderstood as that the logical channel identifiers of the CCCH may beused to indicate different power headroom tables. Alternatively, it maybe understood as that the logical channel identifier of the CCCH is usedto indicate that the power headroom is indicated by using the third bitfield, or the logical channel identifier of the CCCH is used to indicatethat the power headroom is indicated by using the first bit field andthe second bit field.

For example, the terminal device adds the generated MAC CE into msg3,and sends msg3 to the network device through the CCCH. If the powerheadroom table to which the power headroom of the terminal device thatis indicated by the MAC CE belongs is the first power headroom table,the logical channel identifier of the CCCH may a first identifier; or ifthe power headroom table to which the power headroom of the terminaldevice that is indicated by the MAC CE belongs is the power headroomtable shown in Table 1, the logical channel identifier of the CCCH maybe a second identifier. That is, either of the first identifier and thesecond identifier can be used to indicate the power headroom table towhich the power headroom of the terminal device that is indicated by theMAC CE belongs.

Regardless whether the power headroom table is indicated in Manner b orManner c, no bit in the MAC CE needs to be occupied to indicate thepower headroom table, and the reserved bit field in the MAC CE may beused with the PH field to jointly indicate the power headroom of theterminal device. This extends a range of the power headroom that can besent by using msg3, and a power headroom of a finer granularity may bereported.

In a specific implementation process, Manner a, Manner b, or Manner cmay be randomly selected to indicate the power headroom table, or thenetwork device may configure which of Manner a, Manner b, or Manner c isspecifically used to indicate the power headroom table, or a protocolmay specify which of Manner a, Manner b, or Manner c is specificallyused to indicate the power headroom table. This is not specificallylimited.

S26: The network device determines the power headroom of the terminaldevice based on the second bit field in the received MAC CE, or thenetwork device determines the power headroom of the terminal devicebased on the third bit field in the received MAC CE.

If the MAC CE is used to indicate the power headroom in the first powerheadroom set, the network device determines the power headroom in thefirst power headroom set based on the second bit field included in theMAC CE, where the MAC CE includes the first bit field and the second bitfield, and the first bit field is the reserved bit field; or if the MACCE is used to indicate the power headroom in the second power headroomset, the network device determines the power headroom in the secondpower headroom set based on the third bit field included in the MAC CE,where the third bit field includes the bit of the first bit field andthe bit of the second bit field.

Alternatively, if the MAC CE is used to indicate the power headroom inthe first power headroom set, the network device determines the powerheadroom in the first power headroom set based on the second bit field,where the first bit field is the reserved bit field; or if the MAC CE isused to indicate the power headroom in the second power headroom set,the network device determines the power headroom in the second powerheadroom set based on the first bit field and the second bit field.

Actually, the terminal device actually indicates, by using the MAC CE,the power headroom level to which the power headroom of the terminaldevice belongs. After determining the power headroom table, the networkdevice can determine the power headroom of the terminal device byperforming matching between the determined power headroom table and thepower headroom level indicated by the terminal device by using the MACCE.

Specifically, if the MAC CE includes the first bit field and the secondbit field, the first bit field is the reserved bit field, and the secondbit field is used to indicate the power headroom in the first powerheadroom set, the network device can determine the power headroom levelof the terminal device based on the second bit field, and then canfinally determine the power headroom of the terminal device based on thefirst power headroom set.

Alternatively, if the MAC CE includes the first bit field and the secondbit field, and the first bit field and the second bit field are used tojointly indicate the power headroom in the second power headroom set,the network device can determine the power headroom level of theterminal device based on the first bit field and the second bit field,and then can finally determine the power headroom of the terminal devicebased on the second power headroom set.

Alternatively, if the MAC CE includes the third bit field, and the thirdbit field is used to jointly indicate the power headroom in the secondpower headroom set, the network device can determine the power headroomlevel of the terminal device based on the third bit field, and then canfinally determine the power headroom of the terminal device based on thesecond power headroom set.

If the terminal device indicates the power headroom table in Manner adescribed in S25, the network device determines, based on the MAC CE,the power headroom table to which the power headroom of the terminaldevice belongs. If the terminal device indicates the power headroomtable in Manner b described in S25, the network device may determine,based on the received RRC signaling, the power headroom table to whichthe power headroom of the terminal device that is indicated by the MACCE belongs. If the terminal device indicates the power headroom table inManner c described in S25, the network device may determine, based onthe logical channel number of the CCCH carrying msg3, the power headroomtable to which the power headroom of the terminal device that isindicated by the MAC CE belongs.

In the procedure shown in FIG. 2, S21 to S23 are optional steps and arenot mandatory.

In this embodiment of this application, the PHR may be re-divided intomore power headroom levels than the four power headroom levels inTable 1. When the value range of the power headroom of the terminaldevice remains unchanged, the first power headroom table provided inthis embodiment of this application can provide a finer divisiongranularity, so that the power headroom values included in each powerheadroom level are fewer than those in the current Table 1. In addition,in this embodiment of this application, more bits are provided toindicate the power headroom of the terminal device, to adapt to thenewly provided power headroom table. In this way, a reportinggranularity is reduced, and the terminal device can report a moreprecise power headroom. The network device can correspondingly performmore accurate power control on the terminal device, so that the terminaldevice can send data by using proper power. This avoids power waste andproperly avoids interference to a network while ensuring transmissionquality. In addition, in this embodiment of this application, theterminal device still indicates the power headroom of the terminaldevice when sending msg3 to the network device, and an existingprocedure for indicating the power headroom of the terminal device maybe reused to some extent. This has little impact on the currentprocedure, and is more compatible with the prior art.

In addition, as described above, currently, the terminal device cannotreport the power headroom after the power headroom changes in a datatransmission process. In other words, currently, the terminal devicecannot report the power headroom when being in a connected state,resulting in poor uplink power control performance. In view of this, anembodiment of this application provides a second signal sending andreceiving method, to resolve a problem that the terminal device cannotreport the power headroom when being in the connected state. Inaddition, in the second signal sending and receiving method, that theterminal device indicates the power headroom of the terminal device tothe network device may also be understood as that the terminal deviceindicates, to the network device, the power headroom level to which thepower headroom of the terminal device belongs, or that the terminaldevice indicates the power headroom of the terminal device to thenetwork device may be understood as being implemented by indicating, tothe network device, the power headroom level to which the power headroomof the terminal device belongs.

In the second signal sending and receiving method, this embodiment ofthis application may also provide at least one new power headroom table.The following mainly uses an example in which one new power headroomtable is provided. In actual application, a quantity of new powerheadroom tables is not limited. For example, the new power headroomtable provided in this embodiment of this application is referred to asa second power headroom table, and the second power headroom table mayalso be understood as a second power headroom set. The second powerheadroom table includes at least five entries. For a form of each entry,refer to a form of any entry in Table 1. Similarly, each entryrepresents a power headroom level. To be specific, in this embodiment ofthis application, the PHR may be re-divided into more power headroomlevels than the four power headroom levels in Table 1, and each powerheadroom level may also correspond to a plurality of specific powerheadroom values. However, compared with the power headroom table shownin Table 1, a quantity of power headroom values corresponding to each ofthe at least one power headroom level included in the second powerheadroom table is less than the quantity of power headroom valuescorresponding to the power headroom level included in the power headroomtable shown in Table 1. In this case, when a value range of the powerheadroom of the terminal device remains unchanged, the second powerheadroom table provided in this embodiment of this application canprovide a finer division granularity, so that the power headroom valuesincluded in each power headroom level are fewer than those in thecurrent Table 1. In this way, the reporting granularity is reduced, sothat accuracy of the power headroom of the terminal device that isdetermined by the network device is improved. The second power headroomtable and the first power headroom table provided in the embodimentshown in FIG. 2 may be a same power headroom table, or may be differentpower headroom tables. This is not limited in this embodiment of thisapplication. If this embodiment of this application provides a pluralityof power headroom tables, power headroom levels included in differentpower headroom tables may be different, or power headroom levelsincluded in at least two of the power headroom tables may partiallyoverlap. In addition, the power headroom levels included in the powerheadroom table provided in this embodiment of this application and thepower headroom levels included in the power headroom table shown inTable 1 may be different, or may partially overlap.

However, in the second signal sending and receiving method, a specificused power headroom table is not limited. For example, the terminaldevice may use the second power headroom table, or may continue to usethe power headroom table shown in Table 1.

Referring to FIG. 5, a procedure of the second signal sending andreceiving method is described as follows.

S51: A network device obtains capability information of a terminaldevice.

In this embodiment of this application, the capability information ofthe terminal device may be used to indicate whether the terminal devicesupports extended power headroom reporting. It may be understood as thatthe capability information of the terminal device may be used toindicate whether the terminal device supports triggering power headroomreporting while triggering a buffer status report (BSR).

In other words, in the embodiment shown in FIG. 5, the terminal deviceindicates a power headroom of the terminal device while sending the BSRto the network device. When the terminal device sends the BSR to thenetwork device, the terminal device usually needs to send uplink data.In this case, the power headroom of the terminal device is alsoindicated to the network device. This helps the network device performuplink power control, so that an occasion for indicating the powerheadroom to the network device is relatively good.

A manner in which the network device obtains the capability informationof the terminal device includes but is not limited to the followingseveral manners:

Manner 1: Obtain the capability information by using a random accessprocess.

For example, in the random access process, the terminal device sends arandom access preamble to the network device, and the network devicereceives the random access preamble from the terminal device. Then, thenetwork device sends an RAR message to the terminal device, where theRAR message may carry a transmission resource of msg3, and the terminaldevice receives the RAR message from the network device. Then, theterminal device sends msg3 to the network device. In msg3, thecapability information of the terminal device may be indicated, and thecapability information of the terminal device may indicate whether theterminal device supports triggering power headroom reporting whiletriggering the BSR. In this case, the network device receives msg3 fromthe terminal device, and can obtain the capability information of theterminal device by parsing msg3, so as to determine whether the terminaldevice supports triggering power headroom reporting while triggering theBSR.

In Manner 1, the network device may directly obtain the capabilityinformation of the terminal device from the terminal device, so that theobtained capability information of the terminal device is relativelyaccurate. In addition, the capability information of the terminal devicemay be obtained by using the random access process, and the terminaldevice does not need to additionally send other information, therebysaving transmission resources.

Manner 2: Obtain the capability information by using a core networkdevice.

For example, the network device may send a request message to the corenetwork device, where the request message is used to request to obtainthe capability information of the terminal device. For example, therequest message may carry an identity (ID) of the terminal device. Afterreceiving the request message from the network device, the core networkdevice may query for the capability information of the terminal device,and send the capability information of the terminal device to thenetwork device. In this case, the network device can receive thecapability information of the terminal device from the core networkdevice, to determine whether the terminal device supports triggeringpower headroom reporting while triggering the BSR. The core networkdevice is, for example, a mobility management entity (MME). This is notspecifically limited.

In Manner 2, the network device can obtain the capability information ofthe terminal device without interacting with the terminal device. Thisreduces interaction processes or an amount of exchanged data on an airinterface, and can save air interface transmission resources.

In a specific implementation process, Manner 1 or Manner 2 may berandomly selected to obtain the capability information of the terminaldevice, or a protocol may specify which of Manner 1 or Manner 2 isspecifically used to obtain the capability information of the terminaldevice. This is not specifically limited.

S52: The network device sends first signaling to the terminal device,and the terminal device receives the first signaling from the networkdevice, where the first signaling is used to configure the terminaldevice to indicate the power headroom of the terminal device whilesending the BSR to the network device.

The network device obtains the capability information of the terminaldevice in S51. If the capability information of the terminal deviceindicates that the terminal device can support indicating the powerheadroom of the terminal device while sending the BSR to the networkdevice, the network device may send the first signaling to the terminaldevice, to configure the terminal device to indicate the power headroomof the terminal device while sending the BSR to the network device.

S53: The terminal device generates a MAC CE carrying the BSR, where theMAC CE is further used to indicate the power headroom of the terminaldevice by using at least 3 bits.

In this embodiment of this application, the terminal device may use thepower headroom table shown in Table 1, or may use the new power headroomtable. A specific power headroom to be used may be specified in aprotocol, or may be configured by the network device. In the two cases,the terminal device does not need to additionally indicate the usedpower headroom table to the network device. Alternatively, the protocoldoes not specify the power headroom table to be used, and the networkdevice does not configure the power headroom table to be used. In thiscase, the terminal device may indicate the used power headroom table byusing the MAC CE, or the terminal device may indicate the used powerheadroom table by using additional signaling, for example, by using RRCsignaling. For a specific implementation, refer to related descriptionsin the embodiment shown in FIG. 2. Details are not described.

For an example of the MAC CE generated by the terminal device in S53,refer to FIG. 6. In FIG. 6, an LCG ID represents a logical channelnumber, a bit field represented by BSR is used to carry the BSR, a bitfield represented by PH is used to indicate the power headroom of theterminal device, and R represents a reserved bit, or referred to as areserved bit field. It may be visually understood as that, in FIG. 6,the first row of blocks is used to carry the BSR, and the second row ofblocks is used to indicate the power headroom of the terminal device. Inaddition, in FIG. 6, small grids are further evenly divided above theblocks. One small grid may represent 1 bit. For example, the bit fieldrepresented by PH includes 4 bits, and one reserved bit includes 1 bit.If the terminal device separately sends the BSR and indicates the powerheadroom of the terminal device by using different MAC CEs, each MAC CEneeds to include a subheader and the subheader also needs to occupy atransmission resource. However, if the terminal device sends the BSR andindicates the power headroom of the terminal device by using one MAC CE,as shown in FIG. 6, the MAC CE needs to include only one subheader(which is not shown in FIG. 6). This reduces a quantity of subheaders,and saves transmission resources.

FIG. 6 is used as an example. If the terminal device uses the powerheadroom table shown in Table 1, the PH bit field shown in FIG. 6 may beused to indicate the power headroom of the terminal device, and at least2 bits in the MAC CE are used to indicate the power headroom of theterminal device. If the terminal device uses the second power headroomtable, the PH bit field shown in FIG. 6 may be used to indicate thepower headroom of the terminal device. Alternatively, if the secondpower headroom table includes more power headroom levels, the PH bitfield and at least one reserved bit field shown in FIG. 6 may be used tojointly indicate the power headroom of the terminal device. A specificquantity of reserved bit fields used with the PH bit field to jointlyindicate the power headroom of the terminal device is related to aquantity of power headroom levels included in the second power headroomtable. In conclusion, if the terminal device uses the second powerheadroom table, at least 3 bits in the MAC CE are used to indicate thepower headroom of the terminal device. For example, if the quantity ofpower headroom levels included in the second power headroom table is 32,the PH bit field includes 4 bits. In this case, the PH bit field and oneof the reserved bit fields may be used to jointly indicate the powerheadroom of the terminal device, that is, 5 bits are used to indicatethe power headroom of the terminal device, so that the 32 power headroomlevels can be indicated. The reserved bit field used with the PH bitfield to jointly indicate the power headroom of the terminal device maybe adjacent to or not adjacent to the PH bit field in FIG. 6. This isnot specifically limited.

S54: The terminal device sends the MAC CE to the network device, and thenetwork device receives the MAC CE from the terminal device.

S55: The network device determines the power headroom of the terminaldevice based on the at least 3 bits included in the MAC CE, and obtainsthe BSR from the MAC CE.

The network device can obtain, by parsing the MAC CE, the BSR and thepower headroom level that is indicated by the terminal device. Afterdetermining the power headroom table, the network device can determinethe power headroom of the terminal device by performing matching betweenthe determined power headroom table and the power headroom levelindicated by the terminal device by using the MAC CE.

If the terminal device determines, by using a protocol specification,the power headroom table to be used, the network device also determinesthe used power headroom table by using the protocol specification.Alternatively, if the terminal device determines, by using aconfiguration of the network device, the power headroom table to beused, the network device can determine the used power headroom tablebased on the configuration on the terminal device. Alternatively, if theterminal device indicates the power headroom table by using the MAC CE,the network device determines, based on the MAC CE, the power headroomtable to which the power headroom of the terminal device belongs. If theterminal device indicates the power headroom table by using the RRCsignaling, the network device can determine, based on the received RRCsignaling, the power headroom table to which the power headroom of theterminal device that is indicated by the MAC CE belongs.

When being in a connected state, the terminal device may have moreopportunities to send the BSR to the network device. In this case, theterminal device may indicate a power headroom of the terminal deviceeach time the terminal device sends the BSR. Alternatively, because thepower headroom of the terminal device may not continuously change, theterminal device may not need to continuously indicate the power headroomto the network device. Continuously indicating the power headroom mayeven cause some interference to the network device and consumeadditional signaling overheads. Therefore, this embodiment of thisapplication further provides a determining mechanism. The terminaldevice may determine, by using the determining mechanism, whether toindicate the power headroom of the terminal device to the networkdevice. This can effectively avoid frequent reporting of the powerheadroom.

For example, the determining mechanism includes but is not limited to atleast one of the following. When at least one of the following is met,the terminal device generates the MAC CE. In other words, when at leastone of the following is met, the terminal device may indicate the powerheadroom to the network device while sending the BSR:

a difference between a first downlink path loss of the terminal deviceand a second downlink path loss of the terminal device is greater than afirst threshold, where the first downlink path loss is a currentdownlink path loss of the terminal device, and the second downlink pathloss is a downlink path loss caused when the terminal device lastindicates a power headroom of the terminal device to the network device;

a difference between the current power headroom of the terminal deviceand a first power headroom of the terminal device is greater than asecond threshold, where the first power headroom is a power headroomlast sent by the terminal device to the network device;

the first downlink path loss of the terminal device is greater than athird threshold, where the first downlink path loss is the currentdownlink path loss of the terminal device; and

the current power headroom of the terminal device is greater than afourth threshold.

The first threshold, the second threshold, the third threshold, and thefourth threshold may be defined by using a protocol, or may beconfigured by the network device for the terminal device.

It can be learned that the determining mechanism is relatively flexible.In actual application, one or more determining mechanisms may berandomly selected for determining, or which one or more determiningmechanisms are specifically selected may be specified in a protocol, orwhich one or more determining mechanisms are specifically selected maybe configured by the network device. In addition, the foregoingdetermining mechanisms are merely examples. In a specific application,there may be another determining mechanism. This is not specificallylimited.

In the procedure shown in FIG. 5, S51 and S52 are optional steps and arenot mandatory.

In this embodiment of this application, the PHR may be re-divided intomore power headroom levels than the four power headroom levels inTable 1. When a value range of the power headroom of the terminal deviceremains unchanged, the first power headroom table provided in thisembodiment of this application can provide a finer division granularity,so that the power headroom values included in each power headroom levelare fewer than those in the current Table 1. In addition, in thisembodiment of this application, more bits are provided to indicate thepower headroom of the terminal device, to adapt to the newly providedpower headroom table. In this way, a reporting granularity is reduced,and the terminal device can report a more precise power headroom. Thenetwork device can correspondingly perform more accurate power controlon the terminal device, so that the terminal device can send data byusing proper power. This avoids power waste and properly avoidsinterference to a network while ensuring transmission quality. Inaddition, in this embodiment of this application, the terminal devicemay indicate the power headroom of the terminal device to the networkdevice when being in the connected state. For example, if the powerheadroom of the terminal device changes in a data transmission process,the terminal device may indicate the power headroom of the terminaldevice to the network device in the manner provided in this embodimentof this application, to improve uplink power control performance. Inaddition, the terminal device may add the power headroom of the terminaldevice and the BSR into one MAC CE for sending. This helps reducesignaling overheads.

In both the embodiment shown in FIG. 2 and the embodiment shown in FIG.5, an example in which the terminal device indicates the power headroomof the terminal device to the network device is used. Actually, in theembodiment shown in FIG. 2, in addition to indicating the power headroomof the terminal device to the network device by using msg3, the terminaldevice may further transmit other information to the network device. Forexample, the terminal device may transmit downlink interferenceinformation of the terminal device to the network device by using atleast one reserved bit field of msg3 or the MAC CE in msg3. Similarly,in the embodiment shown in FIG. 5, when being in the connected state, inaddition to indicating the power headroom of the terminal device and theBSR to the network device by using the MAC CE, the terminal device mayfurther transmit other information to the network device. For example,the terminal device may transmit downlink interference information ofthe terminal device to the network device by using the MAC CE.Specifically, in both the embodiment shown in FIG. 2 and the embodimentshown in FIG. 5, indicating the power headroom to the network device ismerely an example, and specific information sent to the network deviceis not limited.

In the embodiment shown in FIG. 2 or the embodiment shown in FIG. 5, theterminal device may indicate the power headroom of the terminal deviceby using more bits, to reduce a reporting granularity. This resolves atechnical problem that the power headroom of the terminal device that isdetermined by the network device is not sufficiently accurate, andimproves accuracy of the power headroom of the terminal device that isdetermined by the network device. Another technical problem is describedbelow.

In an existing random access procedure, a terminal device is allowed totransmit only basic information for connection establishment and thelike, and a network device schedules only very few resources, forexample, 88 bits, to transmit msg3. Therefore, the resources allocatedto msg3 can support transmitting a very small amount of data. Therefore,in a currently discussed enhanced version of NB-IoT, a proper amount ofuplink data is transmitted in msg3 in the random access process. This isa data early transmission procedure. In this way, the terminal devicecan transmit some data to the network device in a relatively timelymanner, and does not need to wait to transmit the data after aconnection is established. Therefore, the network device may allocatemore uplink resources to the terminal device for transmitting msg3, andthe terminal device may transmit more uplink data in msg3.

For this new feature, the terminal device may report some information inmsg3. However, compared with normal data, the information reported bythe terminal device usually has a relatively small data amount. Once thedata early transmission procedure is used, the network device cannotpredict a transmission purpose of the terminal device, and allocates,based on a typical uplink data amount, an uplink resource of at leasthundreds of bits to the terminal device for transmitting msg3, but theterminal device may need to use only very few resources to transmit theinformation that needs to be transmitted. Therefore, for a remainingresource, the terminal device needs to add padding bits. In other words,if a data early transmission mechanism is used, the terminal device addsa large quantity of padding bits for reporting a small amount ofinformation, and power consumption of the terminal device is relativelyhigh.

In view of this, an embodiment of this application provides a firstresource determining method. According to the method, some informationcan be reported by using the data early transmission mechanism, and theterminal device does not need to add a large quantity of padding bits.This helps reduce power consumption of the terminal device.

Referring to FIG. 7, a procedure of the method is described as follows:

S71: A terminal device sends a random access preamble to a networkdevice, and the network device receives the random access preamble fromthe terminal device.

Because a data early transmission mechanism is used, the terminal devicemay send the random access preamble to the network device on a reservedresource used for early data transmission, and the network device alsoreceives the random access preamble from the terminal device on thereserved resource used for early data transmission.

S72: The terminal device obtains first resource information indicated bythe network device, where the first resource information is used to sendmsg3, and the first resource information includes a parameter of amodulation and coding scheme (MCS) of msg3 and a parameter of a quantityof resource units (RU) used for msg3.

The terminal device obtains the first resource information indicated bythe network device, for example, by using an RAR received from thenetwork device. For example, the network device sends an RAR message tothe terminal device, and the terminal device receives the RAR messagefrom the network device. The RAR message may include one piece of uplinkgrant information (UL grant). The UL grant may indicate the firstresource information. It may be understood as that the UL grant may beused to indicate the MCS used for msg3 and the quantity of RUs used formsg3. The RU is a resource unit, and RUs may be different in differentsystems. The quantity of RUs may indicate a quantity of used resources.Therefore, S72 in FIG. 7 uses an example in which the terminal deviceobtains the first resource information by using the RAR received fromthe network device. In other words, S72 in FIG. 7 includes a process inwhich the network device sends the RAR to the terminal device and theterminal device receives the RAR from the network device, and furtherincludes a process in which the terminal device obtains the firstresource information by using the RAR.

A TBS that may be used to report or transmit data in msg3, and a mappingrelationship between the TBS, the MCS, and the quantity of resourceunits are information preconfigured by the network device for theterminal device, or information that is standardized and fixed in aprotocol. Therefore, after obtaining the MCS used for msg3 and thequantity of resource units used for msg3, the terminal device candetermine, by looking up a table, a transport block size (TBS) indicatedby the first resource information. For a specific table lookup manner,refer to the prior art. Alternatively, the first resource informationmay directly carry the MCS used for msg3, the quantity of resource unitsused for msg3, and the TBS used for msg3. In other words, the networkdevice may directly indicate the TBS, and the terminal device does notneed to look up a table.

S73: The terminal device determines second resource information based ona proper subset of the parameters included in the first resourceinformation, where the second resource information is used by theterminal device to actually send msg3, a second transport block size issmaller than a first transport block size, the second transport blocksize is a transport block size, of msg3, included in the second resourceinformation, and the first transport block size is a transport blocksize, of msg3, included in the first resource information.

As described above, because the data early transmission mechanism isused, the network device usually allocates more resources used totransmit msg3. In other words, the TBS indicated by the first resourceinformation may be relatively large. For example, the terminal deviceneeds to indicate a power headroom of the terminal device by using msg3.Indicating the power headroom does not actually need too many resources,and a TBS of an actually needed resource may be much smaller than theTBS indicated by the first resource information. Therefore, thisembodiment of this application proposes that the terminal device may notperform an operation completely following instruction of the networkdevice. For example, if the network device indicates two parameters: theMCS used for msg3 and the quantity of resource units used for msg3, theterminal device may finally determine the second resource information byusing only one of the two parameters.

In a first example, the terminal device may use the MCS of msg3 that isindicated by the network device in the first resource information, andkeeps the MCS unchanged but decreases the quantity of resource unitsbased on the quantity of resource units that is indicated by the firstresource information. The terminal device knows a TBS actually needed bythe terminal device to transmit msg3. Therefore, the terminal devicereselects, from TBSs that can be used to report or transmit data inmsg3, a minimum TBS that is sufficient to transmit data that needs to betransmitted, to determine the second resource information.

In a second example, the terminal device may use the quantity ofresource units of msg3 that is indicated by the network device in thefirst resource information, and keeps the quantity of resource unitsunchanged but reduces the MCS based on the MCS indicated by the firstresource information. The terminal device knows a TBS actually needed bythe terminal device to transmit msg3. Therefore, the terminal devicereselects, from TBSs that can be used to report or transmit data inmsg3, a minimum TBS that is sufficient to transmit data that needs to betransmitted.

It can be learned that regardless which of the foregoing first exampleor second example is used, the MCS, of msg3, included in the finallydetermined second resource information is the same as the MCS, of msg3,included in the first resource information, and the quantity of resourceunits, of msg3, included in the second resource information is less thanthe quantity of resource units, of msg3, included in the first resourceinformation, and the TBS, of msg3, included in the second resourceinformation is less than the TBS, of msg3, included in the firstresource information. In other words, the terminal device uses only someresources indicated by the network device, and does not use a remainingresource. In addition, in this embodiment of this application, theterminal device does not use a resource corresponding to a third TBS. Inother words, the terminal device does not need to add padding bits tothe resource corresponding to the third TBS. The third TBS is adifference between the first TBS and the second TBS, the second TBS isthe TBS, of msg3, included in the second resource information, the firstTBS is the TBS, of msg3, included in the first resource information, andthe resource corresponding to the third TBS may be understood as aremaining resource in the resources indicated by the first resourceinformation other than the resource used by the terminal device totransmit the data that needs to be transmitted.

The foregoing first example and second example are merely two examples.In actual application, the first resource information may furtherinclude another parameter, and any solution in which the terminal devicedetermines the second resource information by using the proper subset ofthe parameters included in the first resource information falls withinthe protection scope of the embodiments of this application.

S74: The terminal device transmits msg3 by using the resource indicatedby the second resource information, and the network device receives msg3from the terminal device by using the resource indicated by the secondresource information.

After determining the second resource information, the terminal devicemay transmit msg3 by using the resource indicated by the second resourceinformation. The network device actually indicates the first resourceinformation to the terminal device, but the terminal device transmitsmsg3 by using only some resources in the resources indicated by thefirst resource information. However, the network device does not knowthe resources that are actually used by the terminal device. Therefore,the network device may still perform detection on all the resourcesindicated by the first resource information, to obtain msg3 sent by theterminal device.

S75: The network device obtains, based on the received msg3, theinformation sent by the terminal device.

For example, if the terminal device indicates the power headroom of theterminal device by using msg3, the network device can determine thepower headroom of the terminal device by parsing msg3. For example, theterminal device actually indicates, by using msg3, a power headroomlevel to which the power headroom of the terminal device belongs, andthe network device can determine the power headroom of the terminaldevice by performing matching between a corresponding power headroomtable and the power headroom level indicated by the terminal device byusing msg3.

In this embodiment of this application, the terminal device may indicatethe power headroom of the terminal device to the network device by usingmsg3. For a specific indication manner, refer to the descriptions of theembodiment shown in FIG. 2. Alternatively, the terminal device maytransmit, to the network device by using msg3, other information such asdownlink interference information of the terminal device, other data, orthe like. Specific information transmitted by using msg3 is not limited.

S71, S74, and S75 in the embodiment shown in FIG. 7 are optional stepsand are not mandatory.

It can be learned that in this embodiment of this application, the dataearly transmission procedure may be used. In addition, the terminaldevice may directly not use the redundant resources allocated by thenetwork device, and does not need to add a large quantity of paddingbits, so that the terminal device can reduce power consumption of theterminal device while transmitting the information to the networkdevice.

In the embodiment shown in FIG. 7, the terminal device determines thesecond resource information by using the proper subset of the parametersincluded in the first resource information. The following describes asecond resource determining method. The method can also resolve theproblem that the terminal device needs to add a large quantity ofpadding bits when sending data to the network device by using the earlydata transmission mechanism. However, in this method, the terminaldevice may determine, in another manner, resource information used toactually transmit msg3.

Referring to FIG. 8, a procedure of the method is described as follows:

S81: A terminal device sends a random access preamble to a networkdevice, and the network device receives the random access preamble fromthe terminal device.

Because a data early transmission mechanism is used, the terminal devicemay send the random access preamble to the network device on a reservedresource used for early data transmission, and the network device alsoreceives the random access preamble from the terminal device on thereserved resource used for early data transmission.

S82: The terminal device obtains first resource information indicated bythe network device, where the first resource information is used to sendmsg3, and the first resource information includes a parameter of an MCSof msg3 and a parameter of a quantity of resource units used for msg3.

The terminal device obtains the first resource information indicated bythe network device, for example, by using an RAR received from thenetwork device. For example, the network device sends an RAR message tothe terminal device, and the terminal device receives the RAR messagefrom the network device. The RAR message may include one UL grant. TheUL grant may indicate the first resource information. It may beunderstood as that the UL grant may be used to indicate the MCS used formsg3 and the quantity of RUs used for msg3. The RU is a resource unit,and RUs may be different in different systems. The quantity of RUs mayindicate a quantity of used resources. Therefore, S82 in FIG. 8 uses anexample in which the terminal device obtains the first resourceinformation by using the RAR received from the network device. In otherwords, S82 in FIG. 8 includes a process in which the network devicesends the RAR to the terminal device and the terminal device receivesthe RAR from the network device, and further includes a process in whichthe terminal device obtains the first resource information by using theRAR.

A TBS that may be used to report or transmit data in msg3, and a mappingrelationship between the TBS, the MCS, and the quantity of resourceunits are information preconfigured by the network device for theterminal device, or information that is standardized and fixed in aprotocol. Therefore, after obtaining the MCS used for msg3 and thequantity of resource units used for msg3, the terminal device candetermine, by looking up a table, a TBS indicated by the first resourceinformation. For a specific table lookup manner, refer to the prior art.Alternatively, the first resource information may directly carry the MCSused for msg3, the quantity of resource units used for msg3, and the TBSused for msg3. In other words, the network device may directly indicatethe TBS, and the terminal device does not need to look up a table.

S83: If the terminal device determines that a first transport block sizeis greater than a second transport block size, the terminal devicere-determines second resource information, where a transport block sizeincluded in the second resource information is the second transportblock size. The second transport block size is a transport block sizeneeded by the terminal device to actually send msg3, and the firsttransport block size is a transport block size, of msg3, included in thefirst resource information.

As described above, because the data early transmission mechanism isused, the network device usually allocates more resources used totransmit msg3. In other words, the TBS indicated by the first resourceinformation may be relatively large. For example, the terminal deviceneeds to indicate a power headroom of the terminal device by using msg3.Indicating the power headroom does not actually need too many resources,and a TBS of an actually needed resource may be much smaller than theTBS indicated by the first resource information. Therefore, thisembodiment of this application proposes that the terminal device mayperform an operation without following instruction of the networkdevice. For example, if determining that the first TBS is greater thanthe second TBS, the terminal device may re-determine the second resourceinformation provided that the TBS included in the determined secondresource information is less than the first TBS.

For example, the terminal device may traverse all possible quantities ofresource units less than or equal to the quantity that is of resourceunits of msg3 and that is indicated in the first resource information,and all possible MCSs less than or equal to the MCS indicated in thefirst resource information. Because one TBS may be determined based oneach MCS and each quantity of resource units, the terminal may reselect,from all possible TBSs obtained through traversal, a smallest TBS thatis sufficient to transmit data that needs to be transmitted. If TBSscorresponding to a plurality of combinations of the MCS and the quantityof resource units are the same, the terminal may randomly select one ofthe combinations to determine the second resource information.Alternatively, one of the combinations is selected according to apredefined rule. For example, a combination with a relatively high orlow MCS is always selected, or a combination with a relatively large orsmall quantity of resource units is always selected.

The foregoing example is merely an example. In actual application, thefirst resource information may further include another parameter, andany solution in which the terminal device determines the second resourceinformation by using a similar rule falls within the protection scope ofthe embodiments of this application.

S84: After determining the second resource information, the terminaldevice can transmit msg3 by using a resource indicated by the secondresource information, and the network device receives msg3 by using theresource indicated by the second resource information.

The network device actually indicates the first resource information tothe terminal device. However, the terminal device does not use the firstresource information, but re-determines the second resource informationto transmit msg3. However, the network device does not know the secondresource information used by the terminal device. Therefore, the networkdevice may also need to use a method similar to that in step S83, andattempt to perform detection by using all quantities of resource unitsthat are less than or equal to the quantity that is of resource units ofmsg3 and that is indicated in the first resource information and allMCSs that are less than or equal to the MCS indicated in the firstresource information, to obtain msg3 sent by the terminal device.

After determining the second resource information, the terminal devicecan transmit msg3 by using the resource indicated by the second resourceinformation.

In this embodiment of this application, the terminal device may indicatethe power headroom of the terminal device to the network device by usingmsg3. For a specific indication manner, refer to the descriptions of theembodiment shown in FIG. 2. Alternatively, the terminal device maytransmit, to the network device by using msg3, other information, forexample, downlink interference information of the terminal device, orother data. Specific information transmitted by using msg3 is notlimited.

S85: The network device obtains, based on the received msg3, theinformation sent by the terminal device.

For example, if the terminal device indicates the power headroom of theterminal device by using msg3, the network device can determine thepower headroom of the terminal device by parsing msg3. For example, theterminal device actually indicates, by using msg3, a power headroomlevel to which the power headroom of the terminal device belongs, andthe network device can determine the power headroom of the terminaldevice by performing matching between a corresponding power headroomtable and the power headroom level indicated by the terminal device byusing msg3.

S81, S84, and S85 in the embodiment shown in FIG. 8 are optional stepsand are not mandatory.

It can be learned that, in this embodiment of this application, the dataearly transmission procedure may be used. In addition, if the networkdevice allocates excessively many resources, the terminal device maytotally re-determine a resource based on a resource needed by theterminal device to actually transmit msg3. In this way, the determinedresource meets an actual transmission requirement of the terminaldevice, and there is no excessive resource. Therefore, the terminaldevice does not need to add a large quantity of padding bits, so thatthe terminal device can reduce power consumption of the terminal devicewhile transmitting the information to the network device.

In the embodiment shown in FIG. 7, the terminal device determines thesecond resource information by using the proper subset of the parametersincluded in the first resource information. In the embodiment shown inFIG. 8, the terminal device re-determines the resource information usedto transmit msg3. The following describes a second resource determiningmethod. The method can also resolve the problem that the terminal deviceneeds to add a large quantity of padding bits when sending data to thenetwork device by using the early data transmission mechanism. However,in this method, the terminal device may determine, in another manner,resource information used to actually transmit msg3.

Referring to FIG. 9, a procedure of the method is described as follows:

S91: A terminal device sends a random access preamble to a networkdevice, and the network device receives the random access preamble fromthe terminal device.

Because a data early transmission mechanism is used, the terminal devicemay send the random access preamble to the network device on a reservedresource used for early data transmission, and the network device alsoreceives the random access preamble from the terminal device on thereserved resource used for early data transmission.

S92: The network device indicates a plurality of pieces of resourceinformation to the terminal device, and the terminal device obtains theplurality of pieces of resource information indicated by the networkdevice, where each of the plurality of pieces of resource information isused to send msg3, and each of the plurality of pieces of resourceinformation includes a parameter of an MCS of msg3 and a parameter of aquantity of resource units used for msg3.

The terminal device obtains the plurality of pieces of resourceinformation indicated by the network device, for example, by using anRAR received from the network device. For example, the network devicesends an RAR message to the terminal device, and the terminal devicereceives the RAR message from the network device. The RAR message mayinclude a plurality of UL grants. Each UL grant may be used to indicatea piece of resource information, and each UL grant may be used toindicate the MCS used for msg3, and a quantity of RUs used for msg3. TheRU is a resource unit, and RUs may be different in different systems.The quantity of RUs may indicate a quantity of used resources.Certainly, in parameters indicated by different UL grants, at least oneparameter is different. Therefore, S82 in FIG. 8 uses an example inwhich the terminal device obtains the first resource information byusing the RAR received from the network device. In other words, S82 inFIG. 8 includes a process in which the network device sends the RAR tothe terminal device and the terminal device receives the RAR from thenetwork device, and further includes a process in which the terminaldevice obtains the plurality of pieces of resource information by usingthe RAR.

In addition to the plurality of UL grants, the network device mayfurther indicate, in the RAR, a quantity of the UL grants included inthe RAR, namely, a quantity of pieces of resource information indicatedby the RAR. For example, the quantity of pieces of resource informationindicated by the RAR may be indicated by using a reserved bit in asubheader of the RAR, or may be indicated by using a reserved bit in apayload of the RAR. This is not specifically limited. The quantity ofpieces of resource information indicated by the RAR may be indicated indifferent manners.

Further, the network device may separately configure quantities of ULgrants for terminal devices at different coverage levels and/ordifferent downlink carriers. In this case, for the terminal devices atdifferent coverage levels and/or terminal devices that receive RARs byusing different downlink carriers, quantities of UL grants included inthe RARs may be different.

Alternatively, the network device may indicate, to the terminal devicein another manner, the quantity of UL grants included in the RAR. Forexample, the network device performs indication by using a broadcastmessage. For example, the broadcast message may be sent before S21, andthe broadcast message may indicate the quantity of UL grants included inthe RAR subsequently sent by the network device. After receiving thebroadcast message and the RAR, the terminal device can determine, basedon the broadcast message, the quantity of UL grants included in the RAR.

Similarly, when the network device performs indication by using thebroadcast message, the network device may also separately configuredifferent quantities of UL grants for the terminal devices at differentcoverage levels and/or for different downlink carriers. For example, thenetwork device may send, by using the broadcast message, a quantity ofUL grants that is configured for a terminal device at at least onecoverage level and/or at least one downlink carrier. In this case, ifthe network device sends the quantity of UL grants that is configuredfor the terminal device at at least one coverage level by using thebroadcast message, after receiving the broadcast message and the RAR,the terminal device can determine, based on the coverage level of theterminal device, the quantity of UL grants included in the RAR; or ifthe network device sends, by using the broadcast message, the quantityof UL grants that is configured for the at least one downlink carrier,after receiving the broadcast message and the RAR, the terminal devicecan determine, based on the downlink carrier used by the terminal deviceto receive the RAR, the quantity of UL grants included in the RAR.

A manner in which the network device indicates the quantity of UL grantsincluded in the RAR includes but is not limited to the following twomanners:

For example, in one manner, the quantity is directly indicated. In thiscase, if the RAR includes one UL grant, the network device indicatesthat the quantity of UL grants is 1; if the RAR includes two UL grants,the network device indicates that the quantity of UL grants is 2; if theRAR includes three UL grants, the network device indicates that thequantity of UL grants is 3; and so on. This indication manner isrelatively simple and direct, and is easy to understand and implement.

For example, in the other manner, whether the RAR includes one or moreUL grants is indicated. In this case, a specific quantity of UL grantsmay be specified by using a protocol if there are a plurality of ULgrants. For example, the protocol specifies that there are specificallytwo UL grants if there are a plurality of UL grants. In this case, forexample, 1 bit is used for indication. If a value of the bit is “0”, itindicates that the RAR includes one UL grant. If a value of the bit is“1”, it indicates that the RAR includes a plurality of UL grants, and itcan be learned from specification of the protocol that there arespecifically two UL grants if there are a plurality of UL grants.Certainly, the quantity of UL grants that is specified in the protocolis not limited to 2, and a specific bit indication manner is not limitedthereto.

A TBS that may be used to report or transmit data in msg3, and a mappingrelationship between the TBS, the MCS, and the quantity of resourceunits are information preconfigured by the network device for theterminal device, or information that is standardized and fixed in aprotocol. Therefore, after obtaining the MCS used for msg3 and thequantity of resource units used for msg3, the terminal device candetermine, by looking up a table, a TBS indicated by each of theplurality of pieces of resource information. For a specific table lookupmanner, refer to the prior art. Alternatively, each of the plurality ofpieces of resource information may directly carry the MCS used for msg3,the quantity of resource units used for msg3, and the TBS used for msg3.In other words, the network device may directly indicate the TBS, andthe terminal device does not need to look up a table.

S93: The terminal device determines, based on a size of msg3 to beactually sent by the terminal device, to send, by using first resourceinformation in the plurality of pieces of resource information, msg3 tobe actually sent by the terminal device.

The terminal device knows a TBS actually needed by the terminal deviceto transmit msg3. In this case, the terminal device may select, from theplurality of pieces of resource information based on the TBS actuallyneeded to transmit msg3, one piece of proper resource information tosend msg3. For example, the first resource information is selected. Theproper resource information may mean that a difference between a TBSincluded in the resource information and a TBS actually needed totransmit msg3 is minimum, and the TBS included in the resourceinformation is greater than or equal to the TBS actually needed by theterminal device to transmit msg3.

S94: The terminal device transmits msg3 to the network device by using aresource indicated by the first resource information, and the networkdevice receives msg3 from the terminal device by using the resourceindicated by the first resource information.

The network device actually indicates the plurality of pieces ofresource information to the terminal device, but the terminal devicetransmits msg3 by using only the resource indicated by the firstresource information. However, the network device does not know aresource corresponding to which resource information is used by theterminal device. Therefore, the network device may still performdetection on all the resources indicated by the plurality of pieces ofresource information, to obtain msg3 sent by the terminal device.

In this embodiment of this application, the terminal device may indicatea power headroom of the terminal device to the network device by usingmsg3. For a specific indication manner, refer to the descriptions of theembodiment shown in FIG. 2. Alternatively, the terminal device maytransmit, to the network device by using msg3, other information, forexample, downlink interference information of the terminal device, orother data. Specific information transmitted by using msg3 is notlimited.

S95: The network device obtains, based on the received msg3, theinformation sent by the terminal device.

For example, if the terminal device indicates the power headroom of theterminal device by using msg3, the network device can determine thepower headroom of the terminal device by parsing msg3. For example, theterminal device actually indicates, by using msg3, a power headroomlevel to which the power headroom of the terminal device belongs, andthe network device can determine the power headroom of the terminaldevice by performing matching between a corresponding power headroomtable and the power headroom level indicated by the terminal device byusing msg3.

S91, S94, and S95 in the embodiment shown in FIG. 9 are optional stepsand are not mandatory.

In this embodiment of this application, the network device may allocatea plurality of pieces of resource information, so that the terminaldevice may select one piece of resource information from the pluralityof pieces of resource information for use. In this way, the terminaldevice follows instruction of the network device, and uses the earlydata transmission procedure. In addition, the terminal device can selectrelatively proper resource information to transmit msg3, and does notneed to add a large quantity of padding bits, so that the terminaldevice can reduce power consumption of the terminal device whiletransmitting the information to the network device.

The following describes a device provided in the embodiments of thisapplication with reference to the accompanying drawings.

FIG. 10 is a schematic structural diagram of a communications apparatus1000. The communications apparatus 1000 may implement functions of theterminal device described above. The communications apparatus 1000 maybe the terminal device described above, or may be a chip disposed in theterminal device described above. The communications apparatus 1000 mayinclude a processor 1001 and a transceiver 1002. The processor 1001 maybe configured to perform S24 in the embodiment shown in FIG. 2, and/orsupport another process of the technology described in thisspecification. The transceiver 1002 may be configured to perform S21,S22, S23, and S25 in the embodiment shown in FIG. 2, and/or supportanother process of the technology described in this specification.

For example, the processor 1001 is configured to generate a MAC CE,where the MAC CE is used to indicate a power headroom in a first powerheadroom set or a power headroom in a second power headroom set, and

if the MAC CE is used to indicate the power headroom in the first powerheadroom set, the MAC CE includes a first bit field and a second bitfield, the first bit field is a reserved bit field, and the second bitfield is used to indicate the power headroom in the first power headroomset; or

if the MAC CE is used to indicate the power headroom in the second powerheadroom set, the MAC CE includes a third bit field, the third bit fieldis used to indicate the power headroom in the second power headroom set,and the third bit field includes a bit of the first bit field and a bitof the second bit field; and

the transceiver 1002 is configured to send the MAC CE to a networkdevice.

Alternatively, for example, the processor 1001 is configured to generatea MAC CE, where the MAC CE is used to indicate a power headroom in afirst power headroom set or a power headroom in a second power headroomset, and the MAC CE includes a first bit field and a second bit field;and

if the MAC CE is used to indicate the power headroom in the first powerheadroom set, the first bit field is a reserved bit field, and thesecond bit field is used to indicate the power headroom in the firstpower headroom set; or

if the MAC CE is used to indicate the power headroom in the second powerheadroom set, the first bit field and the second bit field are used toindicate the power headroom in the second power headroom set; and

the transceiver 1002 is configured to send the MAC CE to a networkdevice.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

FIG. 11 is a schematic structural diagram of a communications apparatus1100. The communications apparatus 1100 may implement functions of thenetwork device described above. The communications apparatus 1100 may bethe network device described above, or may be a chip disposed in thenetwork device described above. The communications apparatus 1100 mayinclude a processor 1101 and a transceiver 1102. The processor 1101 maybe configured to perform S26 in the embodiment shown in FIG. 2, and/orsupport another process of the technology described in thisspecification. The transceiver 1102 may be configured to perform S21,S22, S23, and S25 in the embodiment shown in FIG. 2, and/or supportanother process of the technology described in this specification.

For example, the transceiver 1102 is configured to receive a MAC CE froma terminal device, where the MAC CE is used to indicate a power headroomin a first power headroom set or a power headroom in a second powerheadroom set; and

the processor 1101 is configured to: if the MAC CE is used to indicatethe power headroom in the first power headroom set, determine the powerheadroom in the first power headroom set based on a second bit fieldincluded in the MAC CE, where the MAC CE includes a first bit field andthe second bit field, and the first bit field is a reserved bit field;or if the MAC CE is used to indicate the power headroom in the secondpower headroom set, determine the power headroom in the second powerheadroom set based on a third bit field included in the MAC CE, wherethe third bit field includes a bit of the first bit field and a bit ofthe second bit field.

Alternatively, for example, the transceiver 1102 is configured toreceive a MAC CE from a terminal device, where the MAC CE is used toindicate a power headroom in a first power headroom set or a powerheadroom in a second power headroom set, and the MAC CE includes a firstbit field and a second bit field; and

the processor 1101 is configured to: if the MAC CE is used to indicatethe power headroom in the first power headroom set, determine the powerheadroom in the first power headroom set based on the second bit field,where the first bit field is a reserved bit field; or if the MAC CE isused to indicate the power headroom in the second power headroom set,determine the power headroom in the second power headroom set based onthe first bit field and the second bit field.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

FIG. 12 is a schematic structural diagram of a communications apparatus1200. The communications apparatus 1200 may implement functions of theterminal device described above. The communications apparatus 1200 maybe the terminal device described above, or may be a chip disposed in theterminal device described above. The communications apparatus 1200 mayinclude a processor 1201 and a transceiver 1202. The processor 1201 maybe configured to perform S53 in the embodiment shown in FIG. 5, and/orsupport another process of the technology described in thisspecification. The transceiver 1202 may be configured to perform S52 andS54 in the embodiment shown in FIG. 5, and/or support another process ofthe technology described in this specification.

For example, the processor 1201 is configured to: when thecommunications apparatus 1200 is in a connected state, generate a MAC CEcarrying a BSR, where the MAC CE further includes at least 3 bits, andthe at least 3 bits are used to indicate a power headroom; and

the transceiver 1202 is configured to send the MAC CE to a networkdevice.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

FIG. 13 is a schematic structural diagram of a communications apparatus1300. The communications apparatus 1300 may implement functions of thenetwork device described above. The communications apparatus 1300 may bethe network device described above, or may be a chip disposed in thenetwork device described above. The communications apparatus 1300 mayinclude a processor 1301 and a transceiver 1302. The processor 1301 maybe configured to perform S55 in the embodiment shown in FIG. 5, and/orsupport another process of the technology described in thisspecification. The transceiver 1302 may be configured to perform S52 andS54 in the embodiment shown in FIG. 5, and/or support another process ofthe technology described in this specification.

For example, the transceiver 1102 is configured to receive a MAC CE froma terminal device; and

the processor 1101 is configured to determine a power headroom of theterminal device based on at least 3 bits included in the MAC CE, andobtain a BSR from the MAC CE.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

FIG. 14 is a schematic structural diagram of a communications apparatus1400. The communications apparatus 1400 may implement functions of theterminal device described above. The communications apparatus 1400 maybe the terminal device described above, or may be a chip disposed in theterminal device described above. The communications apparatus 1400 mayinclude a processor 1401. Optionally, the communications apparatus 1400may further include a transceiver 1402. The processor 1401 may beconfigured to perform S72 and S73 in the embodiment shown in FIG. 7,and/or support another process of the technology described in thisspecification. The transceiver 1402 may be configured to perform S71,S72 (where the transceiver 1402 receives an RAR from a network device,and the processor 1401 obtains first resource information from the RAR),and S74 in the embodiment shown in FIG. 7, and/or support anotherprocess of the technology described in this specification.

For example, the processor 1401 is configured to obtain the firstresource information indicated by the network device, where the firstresource information is used to send a third message msg3, and the firstresource information includes a parameter of a modulation and codingscheme of msg3 and a parameter of a quantity of resource units used formsg3; and

the processor 1401 is further configured to determine second resourceinformation based on a proper subset of the parameters included in thefirst resource information, where the second resource information isused to actually send msg3, a second transport block size is smallerthan a first transport block size, the second transport block size is atransport block size, of msg3, included in the second resourceinformation, and the first transport block size is a transport blocksize, of msg3, included in the first resource information.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

FIG. 15 is a schematic structural diagram of a communications apparatus1500. The communications apparatus 1500 may implement functions of theterminal device described above. The communications apparatus 1500 maybe the terminal device described above, or may be a chip disposed in theterminal device described above. The communications apparatus 1500 mayinclude a processor 1501. Optionally, the communications apparatus 1400may further include a transceiver 1502. The processor 1501 may beconfigured to perform S82 and S83 in the embodiment shown in FIG. 8,and/or support another process of the technology described in thisspecification. The transceiver 1502 may be configured to perform S81,S82 (where the transceiver 1502 receives an RAR from a network device,and the processor 1501 obtains first resource information from the RAR),and S84 in the embodiment shown in FIG. 8, and/or support anotherprocess of the technology described in this specification.

For example, the processor 1501 is configured to obtain the firstresource information indicated by the network device, where the firstresource information is used to send a third message msg3, and the firstresource information includes a parameter of a modulation and codingscheme of msg3 and a parameter of a quantity of resource units used formsg3; and

the processor 1501 is further configured to: if determining that a firsttransport block size is greater than a second transport block size,re-determine second resource information, where a transport block sizeincluded in the second resource information is the second transportblock size. The second transport block size is a transport block sizeneeded by the terminal device to actually send msg3, and the firsttransport block size is a transport block size, of msg3, included in thefirst resource information.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

FIG. 16 is a schematic structural diagram of a communications apparatus1600. The communications apparatus 1600 may implement functions of theterminal device described above. The communications apparatus 1600 maybe the terminal device described above, or may be a chip disposed in theterminal device described above. The communications apparatus 1600 mayinclude a processor 1601. Optionally, the communications apparatus 1600may further include a transceiver 1602. The processor 1601 may beconfigured to perform S92 and S93 in the embodiment shown in FIG. 9,and/or support another process of the technology described in thisspecification. The transceiver 1602 may be configured to perform S91,S92 (where the transceiver 1602 receives an RAR from a network device,and the processor 1601 obtains first resource information from the RAR),and S94 in the embodiment shown in FIG. 9, and/or support anotherprocess of the technology described in this specification.

For example, the processor 1601 is configured to obtain a plurality ofpieces of resource information indicated by the network device, whereeach of the plurality of pieces of resource information is used to senda third message msg3, and each piece of resource information includes aparameter of a modulation and coding scheme of msg3 and a parameter of aquantity of resource units used for msg3; and

the processor 1601 is further configured to determine, based on a sizeof an actual to-be-sent msg3, to send the actual to-be-sent msg3 byusing first resource information in the plurality of pieces of resourceinformation.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

In a simple embodiment, a person skilled in the art can figure out thatthe communications apparatus 1000, the communications apparatus 1100,the communications apparatus 1200, the communications apparatus 1300,the communications apparatus 1400, the communications apparatus 1500,and the communications apparatus 1600 each may alternatively beimplemented by using a structure of a communications apparatus 1700shown in FIG. 17A. The communications apparatus 1700 may implementfunctions of the network device or the terminal device described above.The communications apparatus 1700 may include a processor 1701. When thecommunications apparatus 1700 is configured to implement functions ofthe terminal device in the embodiment shown in FIG. 2, the processor1701 may be configured to perform S24 in the embodiment shown in FIG. 2,and/or support another process of the technology described in thisspecification. When the communications apparatus 1700 is configured toimplement functions of the network device in the embodiment shown inFIG. 2, the processor 1701 may be configured to perform S26 in theembodiment shown in FIG. 2, and/or support another process of thetechnology described in this specification. When the communicationsapparatus 1700 is configured to implement functions of the terminaldevice in the embodiment shown in FIG. 5, the processor 1701 may beconfigured to perform S53 in the embodiment shown in FIG. 5, and/orsupport another process of the technology described in thisspecification. When the communications apparatus 1700 is configured toimplement functions of the network device in the embodiment shown inFIG. 5, the processor 1701 may be configured to perform S55 in theembodiment shown in FIG. 5, and/or support another process of thetechnology described in this specification. When the communicationsapparatus 1700 is configured to implement functions of the terminaldevice in the embodiment shown in FIG. 7, the processor 1701 may beconfigured to perform S72 and S73 in the embodiment shown in FIG. 7,and/or support another process of the technology described in thisspecification. When the communications apparatus 1700 is configured toimplement functions of the terminal device in the embodiment shown inFIG. 8, the processor 1701 may be configured to perform S82 and S83 inthe embodiment shown in FIG. 8, and/or support another process of thetechnology described in this specification. When the communicationsapparatus 1700 is configured to implement functions of the terminaldevice in the embodiment shown in FIG. 9, the processor 1701 may beconfigured to perform S92 and S93 in the embodiment shown in FIG. 9,and/or support another process of the technology described in thisspecification.

The communications apparatus 1700 may be implemented by using afield-programmable gate array (FPGA), an application-specific integratedchip (ASIC), a system on a chip (SoC), a central processing unit (CPU),a network processor (NP), a digital signal processing circuit (DSP), amicro controller unit (MCU), a programmable controller (PLD), or anotherintegrated chip, and the communications apparatus 600 may be disposed inthe network device or the communications device in the embodiments ofthis application, to enable the network device or the communicationsdevice to implement the message transmission method provided in theembodiments of this application.

In an optional implementation, the communications apparatus 1700 mayinclude a transceiver component, configured to communicate with anetwork device. For example, when the communications apparatus 1700 isconfigured to implement functions of the network device or the terminaldevice in the embodiment shown in FIG. 2, the transceiver component maybe configured to perform S21, S22, S23, and S25 in the embodiment shownin FIG. 2, and/or support another process of the technology described inthis specification. When the communications apparatus 1700 is configuredto implement functions of the network device or the terminal device inthe embodiment shown in FIG. 5, the transceiver component may beconfigured to perform S52 and S54 in the embodiment shown in FIG. 5,and/or support another process of the technology described in thisspecification. When the communications apparatus 1700 is configured toimplement functions of the network device or the terminal device in theembodiment shown in FIG. 7, the transceiver component may be configuredto perform S71, S72 (where the transceiver component receives an RARfrom a network device, and the processor 1701 obtains first resourceinformation from the RAR), and S74 in the embodiment shown in FIG. 7,and/or support another process of the technology described in thisspecification. When the communications apparatus 1700 is configured toimplement functions of the network device or the terminal device in theembodiment shown in FIG. 8, the transceiver component may be configuredto perform S81, S82 (where the transceiver component receives an RARfrom a network device, and the processor 1701 obtains first resourceinformation from the RAR), and S84 in the embodiment shown in FIG. 8,and/or support another process of the technology described in thisspecification. When the communications apparatus 1700 is configured toimplement functions of the network device or the terminal device in theembodiment shown in FIG. 9, the transceiver component may be configuredto perform S91, S92 (where the transceiver component receives an RARfrom a network device, and the processor 1701 obtains first resourceinformation from the RAR), and S94 in the embodiment shown in FIG. 9,and/or support another process of the technology described in thisspecification.

In an optional implementation, referring to FIG. 17B, the communicationsapparatus 1700 may further include a memory 1702. The memory 1702 isconfigured to store computer programs or instructions, and the processor1701 is configured to decode and execute the computer programs or theinstructions. It should be understood that these computer programs orinstructions may include function programs of the foregoing networkdevice or the foregoing terminal device. When the function programs ofthe network device are decoded and executed by the processor 1701, thenetwork device may be enabled to implement the functions of the networkdevice in the method provided in the embodiment shown in FIG. 2, theembodiment shown in FIG. 5, the embodiment shown in FIG. 7, theembodiment shown in FIG. 8, or the embodiment shown in FIG. 9. When thefunction programs of the terminal device are decoded and executed by theprocessor 1701, the terminal device may be enabled to implement thefunctions of the terminal device in the method provided in theembodiment shown in FIG. 2, the embodiment shown in FIG. 5, theembodiment shown in FIG. 7, the embodiment shown in FIG. 8, or theembodiment shown in FIG. 9.

In another optional implementation, these function programs of thenetwork device or the terminal device are stored in an external memoryof the communications apparatus 1700. When the function programs of thenetwork device are decoded and executed by the processor 1701, thememory 1702 temporarily stores some or all of content of the functionprograms of the network device. When the function programs of theterminal device are decoded and executed by the processor 1701, thememory 1702 temporarily stores some or all content of the functionprograms of the terminal device.

In another optional implementation, these function programs of thenetwork device or the terminal device are stored in the internal memory1702 of the communications apparatus 1700. When the internal memory 1702of the communications apparatus 1700 stores the function programs of thenetwork device, the communications apparatus 1700 may be disposed in thenetwork device in the embodiments of this application. When the internalmemory 1702 of the communications apparatus 1700 stores the functionprograms of the terminal device, the communications apparatus 1700 maybe disposed in the terminal device in the embodiments of thisapplication.

In still another optional implementation, some content of these functionprograms of the network device is stored in an external memory of thecommunications apparatus 1700, and the other content of these functionprograms of the network device is stored in the internal memory 1702 ofthe communications apparatus 1700. Alternatively, some content of thesefunction programs of the terminal device is stored in an external memoryof the communications apparatus 1700, and other content of thesefunction programs of the terminal device is stored in the internalmemory 1702 of the communications apparatus 1700.

In the embodiments of this application, the communications apparatus1000, the communications apparatus 1100, the communications apparatus1200, the communications apparatus 1300, the communications apparatus1400, the communications apparatus 1500, the communications apparatus1600, and the communications apparatus 1700 are presented in a form inwhich each function module is obtained through division corresponding toeach function, or may be presented in a form in which each functionmodule is obtained through division in an integrated manner. The“module” herein may be an ASIC, a processor and a memory that executeone or more software or firmware programs, an integrated logic circuit,and/or another component that can provide the foregoing functions.

In addition, the communications apparatus 1000 provided in theembodiment shown in FIG. 10 may alternatively be implemented in anotherform. For example, the terminal device includes a processing module anda transceiver module. For example, the processing module may beimplemented by using the processor 1001, and the transceiver module maybe implemented by using the transceiver 1002. The processing module maybe configured to perform S24 in the embodiment shown in FIG. 2, and/orsupport another process of the technology described in thisspecification. The transceiver module may be configured to perform S21,S22, S23, and S25 in the embodiment shown in FIG. 2, and/or supportanother process of the technology described in this specification.

For example, the processing module is configured to generate a MAC CE,where the MAC CE is used to indicate a power headroom in a first powerheadroom set or a power headroom in a second power headroom set, and

if the MAC CE is used to indicate the power headroom in the first powerheadroom set, the MAC CE includes a first bit field and a second bitfield, the first bit field is a reserved bit field, and the second bitfield is used to indicate the power headroom in the first power headroomset; or

if the MAC CE is used to indicate the power headroom in the second powerheadroom set, the MAC CE includes a third bit field, the third bit fieldis used to indicate the power headroom in the second power headroom set,and the third bit field includes a bit of the first bit field and a bitof the second bit field; and

the transceiver module is configured to send the MAC CE to a networkdevice.

Alternatively, for example, the processing module is configured togenerate a MAC CE, where the MAC CE is used to indicate a power headroomin a first power headroom set or a power headroom in a second powerheadroom set, and the MAC CE includes a first bit field and a second bitfield; and

if the MAC CE is used to indicate the power headroom in the first powerheadroom set, the first bit field is a reserved bit field, and thesecond bit field is used to indicate the power headroom in the firstpower headroom set; or

if the MAC CE is used to indicate the power headroom in the second powerheadroom set, the first bit field and the second bit field are used toindicate the power headroom in the second power headroom set; and

the transceiver module is configured to send the MAC CE to a networkdevice.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

The communications apparatus 1100 provided in the embodiment shown inFIG. 11 may alternatively be implemented in another form. For example,the network device includes a processing module and a transceivermodule. For example, the processing module may be implemented by usingthe processor 1101, and the transceiver module may be implemented byusing the transceiver 1102. The processing module may be configured toperform S26 in the embodiment shown in FIG. 2, and/or support anotherprocess of the technology described in this specification. Thetransceiver module may be configured to perform S21, S22, S23, and S25in the embodiment shown in FIG. 2, and/or support another process of thetechnology described in this specification.

For example, the transceiver module is configured to receive a MAC CEfrom a terminal device, where the MAC CE is used to indicate a powerheadroom in a first power headroom set or a power headroom in a secondpower headroom set; and

the processing module is configured to: if the MAC CE is used toindicate the power headroom in the first power headroom set, determinethe power headroom in the first power headroom set based on a second bitfield included in the MAC CE, where the MAC CE includes a first bitfield and the second bit field, and the first bit field is a reservedbit field; or if the MAC CE is used to indicate the power headroom inthe second power headroom set, determine the power headroom in thesecond power headroom set based on a third bit field included in the MACCE, where the third bit field includes a bit of the first bit field anda bit of the second bit field.

Alternatively, for example, the transceiver module is configured toreceive a MAC CE from a terminal device, where the MAC CE is used toindicate a power headroom in a first power headroom set or a powerheadroom in a second power headroom set, and the MAC CE includes a firstbit field and a second bit field; and

the processing module is configured to: if the MAC CE is used toindicate the power headroom in the first power headroom set, determinethe power headroom in the first power headroom set based on the secondbit field, where the first bit field is a reserved bit field; or if theMAC CE is used to indicate the power headroom in the second powerheadroom set, determine the power headroom in the second power headroomset based on the first bit field and the second bit field.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

The communications apparatus 1200 provided in the embodiment shown inFIG. 12 may alternatively be implemented in another form. For example,the terminal device includes a processing module and a transceivermodule. For example, the processing module may be implemented by usingthe processor 1201, and the transceiver module may be implemented byusing the transceiver 1202. The processing module may be configured toperform S53 in the embodiment shown in FIG. 5, and/or support anotherprocess of the technology described in this specification. Thetransceiver module may be configured to perform S52 and S54 in theembodiment shown in FIG. 5, and/or support another process of thetechnology described in this specification.

For example, the processing module is configured to: when thecommunications apparatus 1200 is in a connected state, generate a MAC CEcarrying a BSR, where the MAC CE further includes at least 3 bits, andthe at least 3 bits are used to indicate a power headroom; and

the transceiver module is configured to send the MAC CE to a networkdevice.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

The communications apparatus 1300 provided in the embodiment shown inFIG. 13 may alternatively be implemented in another form. For example,the network device includes a processing module and a transceivermodule. For example, the processing module may be implemented by usingthe processor 1301, and the transceiver module may be implemented byusing the transceiver 1302. The processing module may be configured toperform S55 in the embodiment shown in FIG. 5, and/or support anotherprocess of the technology described in this specification. Thetransceiver module may be configured to perform S52 and S54 in theembodiment shown in FIG. 5, and/or support another process of thetechnology described in this specification.

For example, the transceiver module is configured to receive a MAC CEfrom a terminal device; and

the processing module is configured to determine a power headroom of theterminal device based on at least 3 bits included in the MAC CE, andobtain a BSR from the MAC CE.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

The communications apparatus 1400 provided in the embodiment shown inFIG. 14 may alternatively be implemented in another form. For example,the terminal device includes a processing module. Optionally, theterminal device further includes a transceiver module. For example, theprocessing module may be implemented by using the processor 1401, andthe transceiver module may be implemented by using the transceiver 1402.The processing module may be configured to perform S72 and S73 in theembodiment shown in FIG. 7, and/or support another process of thetechnology described in this specification. The transceiver module maybe configured to perform S71, S72 (where the transceiver module receivesan RAR from a network device, and the processing module obtains firstresource information from the RAR), and S74 in the embodiment shown inFIG. 7, and/or support another process of the technology described inthis specification.

For example, the processing module is configured to obtain the firstresource information indicated by the network device, where the firstresource information is used to send a third message msg3, and the firstresource information includes a parameter of a modulation and codingscheme of msg3 and a parameter of a quantity of resource units used formsg3; and

the processing module is further configured to determine second resourceinformation based on a proper subset of the parameters included in thefirst resource information, where the second resource information isused to actually send msg3, a second transport block size is smallerthan a first transport block size, the second transport block size is atransport block size, of msg3, included in the second resourceinformation, and the first transport block size is a transport blocksize, of msg3, included in the first resource information.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

The communications apparatus 1500 provided in the embodiment shown inFIG. 15 may alternatively be implemented in another form. For example,the terminal device includes a processing module. Optionally, theterminal device further includes a transceiver module. For example, theprocessing module may be implemented by using the processor 1501, andthe transceiver module may be implemented by using the transceiver 1502.The processing module may be configured to perform S82 and S83 in theembodiment shown in FIG. 8, and/or support another process of thetechnology described in this specification. The transceiver module maybe configured to perform S81, S82 (where the transceiver module receivesan RAR from a network device, and the processing module obtains firstresource information from the RAR), and S84 in the embodiment shown inFIG. 8, and/or support another process of the technology described inthis specification.

For example, the processing module is configured to obtain the firstresource information indicated by the network device, where the firstresource information is used to send a third message msg3, and the firstresource information includes a parameter of a modulation and codingscheme of msg3 and a parameter of a quantity of resource units used formsg3; and

the processing module is further configured to: if determining that afirst transport block size is greater than a second transport blocksize, re-determine second resource information, where a transport blocksize included in the second resource information is the second transportblock size. The second transport block size is a transport block sizeneeded by the terminal device to actually send msg3, and the firsttransport block size is a transport block size, of msg3, included in thefirst resource information.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

The communications apparatus 1600 provided in the embodiment shown inFIG. 16 may alternatively be implemented in another form. For example,the terminal device includes a processing module. Optionally, theterminal device further includes a transceiver module. For example, theprocessing module may be implemented by using the processor 1601, andthe transceiver module may be implemented by using the transceiver 1602.The processing module may be configured to perform S92 and S93 in theembodiment shown in FIG. 9, and/or support another process of thetechnology described in this specification. The transceiver module maybe configured to perform S91, S92 (where the transceiver module receivesan RAR from a network device, and the processing module obtains firstresource information from the RAR), and S94 in the embodiment shown inFIG. 9, and/or support another process of the technology described inthis specification.

For example, the processing module is configured to obtain a pluralityof pieces of resource information indicated by the network device, whereeach of the plurality of pieces of the resource information is used tosend a third message msg3, and each piece of resource informationincludes a parameter of a modulation and coding scheme of msg3 and aparameter of a quantity of resource units used for msg3; and

the processing module is further configured to determine, based on asize of an actual to-be-sent msg3, to send the actual to-be-sent msg3 byusing first resource information in the plurality of pieces of resourceinformation.

All related content of the steps in the foregoing method embodiments maybe cited in function descriptions of corresponding function modules.Details are not described herein again.

The communications apparatus 1000, the communications apparatus 1100,the communications apparatus 1200, the communications apparatus 1300,the communications apparatus 1400, the communications apparatus 1500,the communications apparatus 1600, and the communications apparatus 1700provided in the embodiments of this application may be configured toperform the method provided in the embodiment shown in FIG. 2, theembodiment shown in FIG. 5, the embodiment shown in FIG. 7, theembodiment shown in FIG. 8, or the embodiment shown in FIG. 9.Therefore, for technical effects that can be achieved by theapparatuses, refer to the foregoing method embodiments. Details are notdescribed herein again.

The embodiments of this application are described with reference to theflowcharts and/or block diagrams of the method, the device (system), andthe computer program product according to the embodiments of thisapplication. It should be understood that computer program instructionsmay be used to implement each process and/or each block in theflowcharts and/or the block diagrams and a combination of a processand/or a block in the flowcharts and/or the block diagrams. Thesecomputer program instructions may be provided for a general-purposecomputer, a dedicated computer, an embedded processor, or a processor ofany other programmable data processing device to generate a machine, sothat the instructions executed by a computer or a processor of any otherprogrammable data processing device generate an apparatus forimplementing a specific function in one or more processes in theflowcharts and/or in one or more blocks in the block diagrams.

All or some of the foregoing embodiments may be implemented by usingsoftware, hardware, firmware, or any combination thereof. When softwareis used to implement the embodiments, the embodiments may be implementedcompletely or partially in a form of a computer program product. Thecomputer program product includes one or more computer instructions.When the computer program instructions are loaded and executed on thecomputer, the procedure or functions according to the embodiments ofthis application are all or partially generated. The computer may be ageneral-purpose computer, a dedicated computer, a computer network, orother programmable apparatuses. The computer instructions may be storedin a computer-readable storage medium or may be transmitted from acomputer-readable storage medium to another computer-readable storagemedium. For example, the computer instructions may be transmitted from awebsite, computer, server, or data center to another website, computer,server, or data center in a wired (for example, a coaxial cable, anoptical fiber, or a digital subscriber line (DSL)) or wireless (forexample, infrared, radio, or microwave) manner. The computer-readablestorage medium may be any usable medium accessible by a computer, or adata storage device, such as a server or a data center, integrating oneor more usable media. The usable medium may be a magnetic medium (forexample, a floppy disk, a hard disk, or a magnetic tape), an opticalmedium (for example, a digital versatile disc (DVD), a semiconductormedium (for example, a solid-state drive (SSD)), or the like.

Obviously, a person skilled in the art can make various modificationsand variations to embodiments of this application without departing fromthe spirit and scope of this application. This application is intendedto cover these modifications and variations provided that they fallwithin the scope of protection defined by the following claims and theirequivalent technologies.

1. A signal receiving method, comprising: receiving a media accesscontrol (MAC) control element (CE) from a terminal device, wherein theMAC CE is used to indicate a power headroom in a first power headroomset or a power headroom in a second power headroom set; and when the MACCE is used to indicate the power headroom in the first power headroomset, determining the power headroom in the first power headroom setbased on a second bit field comprised in the MAC CE, wherein the MAC CEcomprises a first bit field and the second bit field, and the first bitfield is a reserved bit field; or when the MAC CE is used to indicatethe power headroom in the second power headroom set, determining thepower headroom in the second power headroom set based on a third bitfield comprised in the MAC CE, and the third bit field comprises a bitof the first bit field and a bit of the second bit field.
 2. The methodaccording to claim 1, wherein the MAC CE further comprises a fourth bitfield, and wherein: when the MAC CE is used to indicate the powerheadroom in the first power headroom set, the fourth bit field is areserved bit field in the MAC CE; and when the MAC CE is used toindicate the power headroom in the second power headroom set, the fourthbit field is used to indicate that the power headroom is indicated byusing the third bit field.
 3. The method according to claim 1, whereinthe method further comprises: receiving first signaling from theterminal device, wherein the first signaling is used to indicate thatthe power headroom is indicated by using the third bit field; orreceiving the MAC CE from the terminal device through a common controlchannel (CCCH), wherein a logical channel identifier of the CCCH is afirst identifier, and wherein the first identifier is used to indicatethat the power headroom is indicated by using the third bit field. 4.The method according to claim 1, wherein the method further comprises:sending second signaling to the terminal device, wherein the secondsignaling is used to instruct to indicate the power headroom by usingthe third bit field comprised in the MAC CE.
 5. A communicationsapparatus, comprising: at least one processor; and a memory coupled tothe at least one processor and having program instructions storedthereon which, when executed by the at least one processor, cause theapparatus to perform operations comprising: receiving a media accesscontrol (MAC) control element (CE) from a terminal device, wherein theMAC CE is used to indicate a power headroom in a first power headroomset or a power headroom in a second power headroom set; and when the MACCE is used to indicate the power headroom in the first power headroomset, determining the power headroom in the first power headroom setbased on a second bit field comprised in the MAC CE, wherein the MAC CEcomprises a first bit field and the second bit field, and the first bitfield is a reserved bit field; or when the MAC CE is used to indicatethe power headroom in the second power headroom set, determining thepower headroom in the second power headroom set based on a third bitfield comprised in the MAC CE, and the third bit field comprises a bitof the first bit field and a bit of the second bit field.
 6. Theapparatus according to claim 5, wherein the MAC CE further comprises afourth bit field, and wherein: when the MAC CE is used to indicate thepower headroom in the first power headroom set, the fourth bit field isa reserved bit field in the MAC CE; and when the MAC CE is used toindicate the power headroom in the second power headroom set, the fourthbit field is used to indicate that the power headroom is indicated byusing the third bit field.
 7. The apparatus according to claim 5,wherein the operations further comprise: receiving first signaling fromthe terminal device, wherein the first signaling is used to indicatethat the power headroom is indicated by using the third bit field; orreceiving the MAC CE from the terminal device through a common controlchannel (CCCH), wherein a logical channel identifier of the CCCH is afirst identifier, and wherein the first identifier is used to indicatethat the power headroom is indicated by using the third bit field. 8.The apparatus according to claim 5, wherein the operations furthercomprise: sending second signaling to the terminal device, wherein thesecond signaling is used to instruct to indicate the power headroom byusing the third bit field comprised in the MAC CE.
 9. A resourcedetermining method, comprising: obtaining first resource informationindicated by a network device, wherein the first resource information isused to send a third message (msg3), and the first resource informationcomprises a parameter of a modulation and coding scheme of msg3 and aparameter of a quantity of resource units used for msg3; and determiningsecond resource information based on a proper subset of the parameterscomprised in the first resource information, wherein the second resourceinformation is used to actually send msg3, a second transport block sizeis smaller than a first transport block size, the second transport blocksize is a transport block size, of msg3, comprised in the secondresource information, and the first transport block size is a transportblock size, of msg3, comprised in the first resource information.