Random access method and apparatus, and user equipment and network device

ABSTRACT

Provided in the embodiments of the invention are a random access method and apparatus, and a user equipment and a network device. The method comprises: after a UE sends a first message, detecting a scheduling instruction of a second message in a first window, wherein the second message comprises at least one of the following: a first conflict resolution identifier, a second conflict resolution identifier, first indication information and second indication information; the first conflict resolution identifier is used for conflict resolution of a connected UE; the second conflict resolution identifier is used for conflict resolution of an idle UE, an inactive UE, or the connected UE; the first indication information is used for indicating that a two-step random access process returns to a four-step random access process; and the second indication information is used for indicating a random backoff value when the UE retransmits the first message.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of international PCT applicationserial no. PCT/CN2019/084154, filed on Apr. 24, 2019. The entirety ofthe above-mentioned patent application is hereby incorporated byreference herein and made a part of this specification.

BACKGROUND Field of the Disclosure

The embodiments of the disclosure relate to the field of mobilecommunication technology, and in particular to a random access methodand apparatus, a user equipment, and a network device.

Description of Related Art

In the Long Term Evolution (LTE) system, the random access processadopts a four-step random access process. The New Radio (NR) systemstill adopts the four-step random access process in the LTE system. Inthe discussion regarding standardization, it is considered that thefour-step random access process is relatively complicated and will bringa longer time delay to access to the terminal. Therefore, a two-steprandom access process is proposed. The first message msg1 and thirdmessage msg3 in the four-step random access process are transmittedthrough the message A msgA in the two-step random access process, andthe second message msg2 and fourth message msg4 in the four-step randomaccess process are transmitted through the message B msgB in thetwo-step random access process. How to design the message B msgB in thetwo-step random access process to realize the normal random accessprocess is a technical problem that needs to be solved.

SUMMARY OF THE DISCLOSURE

An embodiment of the disclosure provides a random access method andapparatus, a user equipment, and a network device.

The random access method provided by the embodiment of the disclosureincludes:

After the user equipment (UE) sends the first message, the schedulinginstruction of the second message is detected in the first window.

The second message includes at least one of the following: a firstconflict resolution identifier, a second conflict resolution identifier,first indication information, and second indication information, whereinthe first conflict resolution identifier is used for conflict resolutionof a connected UE; the second conflict resolution identifier is used forconflict resolution of an idle UE, an inactive UE, or the connected UE;the first indication information is used for indicating that a two-steprandom access process returns to a four-step random access process; andthe second indication information is used for indicating a randombackoff value when the UE retransmits the first message.

The random access method provided by the embodiment of the disclosureincludes:

The network device receives the first message transmitted by the UE, andtransmits a scheduling instruction of the second message in the firstwindow.

The second message includes at least one of the following: a firstconflict resolution identifier, a second conflict resolution identifier,first indication information, and second indication information, whereinthe first conflict resolution identifier is used for conflict resolutionof a connected UE, the second conflict resolution identifier is used forconflict resolution of an idle UE, an inactive UE, or the connected UE;the first indication information is used for indicating that a two-steprandom access process returns to a four-step random access process; andthe second indication information is used for indicating a randombackoff value when the UE retransmits the first message.

The random access apparatus provided in the embodiment of the disclosureis applied to a user equipment, and the apparatus includes:

A transmitting unit is configured to transmit the first message.

A receiving unit is configured to detect the scheduling instruction ofthe second message in the first window.

The second message includes at least one of the following: a firstconflict resolution identifier, a second conflict resolution identifier,first indication information, and second indication information, whereinthe first conflict resolution identifier is used for conflict resolutionof a connected UE, the second conflict resolution identifier is used forconflict resolution of an idle UE, an inactive UE, or the connected UE;the first indication information is used for indicating that a two-steprandom access process returns to a four-step random access process; andthe second indication information is used for indicating a randombackoff value when the UE retransmits the first message.

The random access apparatus provided in the embodiment of the disclosureis applied to a network equipment, and the apparatus includes:

A receiving unit is configured to receive the first message transmittedby the UE.

A transmitting unit is configured to transmit the scheduling instructionof the second message in the first window.

The second message includes at least one of the following: a firstconflict resolution identifier, a second conflict resolution identifier,first indication information, and second indication information, whereinthe first conflict resolution identifier is used for conflict resolutionof a connected UE, the second conflict resolution identifier is used forconflict resolution of an idle UE, an inactive UE, or the connected UE;the first indication information is used for indicating that a two-steprandom access process returns to a four-step random access process; andthe second indication information is used for indicating a randombackoff value when the UE retransmits the first message.

The user equipment provided in the embodiment of the disclosure includesa processor and a memory. The memory is used to store a computerprogram, and the processor is used to call and run the computer programstored in the memory to execute the aforementioned random access method.

The network device provided in the embodiment of the disclosure includesa processor and a memory. The memory is used to store a computerprogram, and the processor is used to call and run the computer programstored in the memory to execute the aforementioned random access method.

The chip provided in the embodiment of the disclosure is used toimplement the aforementioned random access method.

Specifically, the chip includes: a processor, which is configured tocall and run a computer program from the memory, so that the deviceinstalled with the chip executes the abovementioned random accessmethod.

The computer-readable storage medium provided by the embodiment of thedisclosure is used to store a computer program, and the computer programenables a computer to execute the abovementioned random access method.

The computer program product provided by the embodiment of thedisclosure includes a computer program instruction, and the computerprogram instruction enables the computer to execute the random accessmethod described above.

In the computer program provided by the embodiment of the disclosure,when the computer program is run on a computer, the computer programenables the computer to execute the random access method describedabove.

Through the above technical solution, the content of the second messagein the two-step random access process is made clear, that is, a messageB msgB format is designed to realize the normal two-step random accessprocess. The message B msgB format provided in the embodiment ofdisclosure can realize conflict resolution of a connected UE, an idleUE, or an inactive UE. On the other hand, the msgB format provided inthe embodiment of the disclosure can instruct the UE to return to thefour-step random access process from the two-step random access process.In this way, the UE in any state only needs to blindly detect thePhysical Downlink Control Channel (PDCCH) scrambled by the Random AccessRadio Network

Temporary Identity (RA-RNTI) in the receiving window of message B msgB,thereby saving the overhead of blindly detecting the PDCCH by the UE.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings described here are used to provide a further understandingof the disclosure and constitute a part of the disclosure. The exemplaryembodiments and descriptions of the disclosure serve to explain thedisclosure, and do not constitute an improper limitation of thedisclosure. In the accompanying figures:

FIG. 1 is a schematic view of a communication system architectureembodied by an embodiment of the disclosure.

FIG. 2 is a flowchart of a four-step random access process embodied byan embodiment of the disclosure.

FIG. 3-1 is the first structural view of media access control (MAC)protocol data unit (PDU) embodied by an embodiment of the disclosure.

FIG. 3-2 is a structural view of E/T/R/R/backoff indication (BI)sub-header embodied by an embodiment of the disclosure.

FIG. 3-3 is a structural view of E/T/random access preamble ID (RAPID)sub-header embodied by an embodiment of the disclosure.

FIG. 3-4 is a structural view of MAC random access response (RAR)embodied by an embodiment of the disclosure.

FIG. 4 is a schematic flowchart of a random access method embodied by anembodiment of the disclosure.

FIG. 5 is a schematic view of transmission of msgA and msgB embodied byan embodiment of the disclosure.

FIG. 6-1 is the first structural view of the first MAC control element(CE) embodied by an embodiment of the disclosure.

FIG. 6-2 is the second structural view of the first MAC CE embodied byan embodiment of the disclosure.

FIG. 6-3 is a structural view of the second MAC CE embodied by anembodiment of the disclosure.

FIG. 6-4 is the first structural view of the first sub-header embodiedby an embodiment of the disclosure.

FIG. 6-5 is the second structural view of the first sub-header embodiedby an embodiment of the disclosure.

FIG. 6-6 is the third structural view of the first sub-header embodiedby an embodiment of the disclosure.

FIG. 6-7 is the first structural view of the second sub-header embodiedby an embodiment of the disclosure.

FIG. 6-8 is the second structural view of the second sub-header embodiedby an embodiment of the disclosure.

FIG. 6-9 is the second structural view of MAC PDU embodied by anembodiment of the disclosure.

FIG. 6-10 is the fourth structural view of the first sub-header embodiedby an embodiment of the disclosure.

FIG. 6-11 is a structural view of the third MAC CE embodied by anembodiment of the disclosure.

FIG. 7 is the first schematic view of the structural constitution of arandom access apparatus embodied by an embodiment of the disclosure.

FIG. 8 is the second schematic view of the structural constitution of arandom access apparatus embodied by an embodiment of the disclosure.

FIG. 9 is a schematic structural view of a communication device embodiedby an embodiment of the disclosure.

FIG. 10 is a schematic structural view of a chip embodied by anembodiment of the disclosure.

FIG. 11 is a schematic block view of a communication system embodied byan embodiment of the disclosure.

DESCRIPTION OF EMBODIMENTS

The technical solutions in the embodiments of the disclosure will bedescribed below in conjunction with the drawings in the embodiments ofthe disclosure. Obviously, the described embodiments are a part of theembodiments of the disclosure, not all of the embodiments. Based on theembodiments in the disclosure, all other embodiments derived by those ofordinary skill in the art without inventive effort shall fall within thescope of disclosure.

The technical solutions in the embodiments of the disclosure can beapplied to various communication systems, such as: Global System ofMobile communication (GSM) system, Code Division Multiple Access (CDMA)system, Wideband Code Division Multiple Access (WCDMA) system, GeneralPacket Radio Service (GPRS), Long Term Evolution (LTE) system, LTEFrequency Division Duplex (FDD) system, LTE Time Division Duplex (TDD),Universal Mobile Telecommunication System (UMTS), WorldwideInteroperability for Microwave Access (WiMAX) communication system or 5Gsystem, etc.

Exemplarily, the communication system 100 applied in the embodiment ofthe disclosure is shown in FIG. 1. The communication system 100 mayinclude a network device 110, and the network device 110 may be a devicethat communicates with a terminal device 120 (or referred to as acommunication terminal or a terminal). The network device 110 mayprovide communication coverage for a specific geographic area, and maycommunicate with terminal devices located in the coverage area.Optionally, the network device 110 may be a Base Transceiver Station(BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in aWCDMA system, an evolved base station (Evolutional Node B, eNB oreNodeB) in an LTE system, a wireless controller in the Cloud RadioAccess Network (CRAN), or the network device can be a mobile switchingcenter, a relay station, an access point, a vehicle-mounted equipment, awearable device, a hub, a switch, a bridge, a router, a network sidedevice in 5G networks, or a network device of a Public Land MobileNetwork (PLMN) in future evolution, etc.

The communication system 100 further includes at least one terminaldevice 120 located within the coverage area of the network device 110.As used herein, “terminal device” includes, but is not limited to,connection via wired lines, such as via Public Switched TelephoneNetworks (PSTN), Digital Subscriber Line (DSL), digital cables, anddirect cable connections; and/or another data connection/network; and/orvia a wireless interface, such as digital TV networks such as DVB-Hnetworks, satellite networks, AM-FM broadcast transmitter for cellularnetworks, Wireless Local Area Networks (WLAN); and/or another terminaldevice that is set to receive/send communication signals; and/orInternet of Things (IoT) device. A terminal device set to communicatethrough a wireless interface may be referred to as a “wirelesscommunication terminal”, a “wireless terminal” or a “mobile terminal”.Examples of mobile terminals include, but are not limited to, satelliteor cellular phones; Personal Communications System (PCS) terminals thatcan be combined with cellular radio phones with data processing, fax,and data communication capabilities; can include radio phones, pagers,Internet/intranet PDA with internet access, Web browser, memo pad,calendar, and/or PDA of Global Positioning System (GPS) receiver; aswell as conventional laptop and/or palmtop receivers or other electronicdevices including radio telephone transceivers. Terminal device canrefer to access terminals, user equipment (UE), user units, userstations, mobile stations, mobile platforms, remote stations, remoteterminals, mobile equipment, user terminals, terminals, wirelesscommunication equipment, user agents, or user equipment. The accessterminal can be a cellular phone, a cordless phone, a Session InitiationProtocol (SIP) phone, a Wireless Local Loop (WLL) station, a PersonalDigital Assistant (PDA), handheld devices with wireless communicationfunctions, computing devices, or other processing devices connected towireless modems, in-vehicle devices, wearable devices, terminal devicesin 5G networks, or terminal devices in PLMN in future evolution etc.

Optionally, Device to Device (D2D) communication may be performedbetween the terminal devices 120.

Optionally, the 5G system or 5G network may also be referred to as a NewRadio (NR) system or an NR network.

FIG. 1 exemplarily shows one network device 110 and two terminal devices120. Optionally, the communication system 100 may include multiplenetwork devices 110 and the coverage of each network device 110 mayinclude terminal devices 112 in different quantities. The disclosureprovides no limitation thereto.

Optionally, the communication system 100 may further include othernetwork entities such as a network controller and a mobile managemententity, the disclosure provides no limitation thereto.

It should be understood that a device with a communication function inthe network/system in the embodiment of the disclosure may be referredto as a communication device. Taking the communication system 100 shownin FIG. 1 as an example, the communication device may include a networkdevice 110 and a terminal device 120 with a communication function. Thenetwork device 110 and the terminal device 120 may be the specificdevices described above, and no further description is incorporatedherein. The communication device may also include other devices in thecommunication system 100, such as network controllers, mobile managemententities, and other network entities, the disclosure provides nolimitation thereto.

It should be understood that the terms “system” and “network” used inthe disclosure are often used interchangeably. The term “and/or” in thedisclosure is only an association relationship describing the associatedobjects, which means that there can be three kinds of relationships, forexample, A and/or B, which can mean three situations: A is presentalone, A and B are present simultaneously, or B is present alone. Inaddition, the character “/” in the disclosure generally indicates thatthe associated objects are in an “or” relationship.

To facilitate understanding of the technical solutions of theembodiments of the disclosure, the technical concepts related to theembodiments of the disclosure are described below.

Random access is an important process for the UE to establish a wirelessconnection with the network. Through random access, uplinksynchronization with the base station can be obtained, and applicationfor uplink resources can be made. The random access process is separatedinto a contention-based random access process and a non-contention-basedrandom access process. Specifically, the contention-based random accessprocess includes a four-step random access process and a two-step randomaccess process. FIG. 2 shows a flowchart of the four-step random accessprocess. As shown in FIG. 2, the four-step random access processincludes the following steps:

Step 201: The UE sends the first message msg1 to the base station.

Here, the step of sending the first message msg1 by the UE to the basestation can be implemented specifically through the following process:

The UE determines the relationship between Synchronization Signal Block(SSB) and Physical Random Access Channel (PRACH) resources (configuredby layers with higher hierarchy).The UE receives a set of SSB and determines its Reference SignalReceived Power (RSRP) value, and selects the appropriate SSB accordingto the threshold.The UE determines the PRACH resource based on the selected SSB and thecorresponding relationship between the SSB and the PRACH resource.The UE sends the preamble on the PRACH time-frequency domain resource.

Step 202: The UE receives the second message msg2 sent by the basestation.

Here, the step of receiving the second message msg2 sent by the basestation through the UE can be implemented specifically through thefollowing process:

The UE opens the RAR window (ra-Response Window) at occasion of thefirst physical downlink control channel (PDCCH) after sending thepreamble, and monitors the PDCCH during the operation of the window.Specifically, PDCCH is PDCCH scrambled with RA-RNTI. RA-RNTI is relatedto the PRACH time-frequency resource selected by the UE. The calculationof RA-RNTI is as follows:

RA-RNTI=1+s_id+14×t_id+14×80×f_id+14×80×8×ul_carrier_id

Specifically, s_id is the index of the first OFDM symbol of the PRACHresource (0≤s_id<14).

t_id is the index of the first time slot of the PRACH resource in thesystem frame (0<t_id<80).f_id is the index of PRACH occasion in the frequency domain (0<f_id<8).ul_carrier_id is the uplink (UL) carrier used for preamble indextransmission.

After the UE successfully monitors the PDCCH scrambled by the RA-RNTI,the Physical Downlink Shared Channel (PDSCH) scheduled by the PDCCH canbe obtained, which contains the second message 2 msg2. The data formatof the Media Access Control Protocol Data Unit (MAC PDU) of the secondmessage msg2 is shown in FIG. 3-1. MAC PDU includes multiple MACsub-PDUs (MAC sub-PDU), namely MAC sub-PDU1, MAC sub-PDU2, MAC sub-PDU3,and so on. Among them, MAC sub-PDU1 includes Backoff Indication (BI),MAC sub-PDU1 includes E/T/R/R/BI sub-header, and the structure ofE/T/R/R/BI sub-header is shown in FIG. 3-2. MAC sub-PDU2 includes RandomAccess preamble ID (RAPID), MAC sub-PDU2 includes E/T/RAPID sub-header,and the structure of E/T/RAPID sub-header is shown in FIG. 3-3. Theremaining MAC sub-PDUs (such as MAC sub-PDU3) include RAPID and RandomAccess Response (RAR). Take MAC sub-PDU3 as an example, MAC sub-PDU3includes E/T/RAPID sub-header and MAC RAR, and the structure ofE/T/RAPID sub-header is shown in FIG. 3-3. The structure of MAC RAR isshown in FIG. 3-4. The description of various information in FIG. 3-2 toFIG. 3-4 is as follows:

BI: Backoff indication information, which is used to indicate thebackoff time for retransmission of the first message.RAPID: The preamble index received by the network in response.R: R represents the reserved bit area.TAC: Timing Advance Command, which used to adjust the uplink timing.UL Grant: Uplink Grant, which used to indicate resources for uplinktransmission of the third message Msg3.TC-RNTI: Temporary C-RNTI, which is used for the terminal tosubsequently scramble the sent the third message Msg3.

Step 203: The UE sends the third message 3 msg3 to the base station.

The third message msg3 is mainly used to send UE ID to the network toresolve contention conflicts. For example, if it is the initial accessrandom process, the hitrd message msg3 will carry the RRC layer message,that is, the common control channel (CCCH) service data unit (SDU),which contains the UE ID and the connection setup request(RRCSetupRequest); if it is the RRC reestablishment, the third messagemsg3 will carry the re-establishment request (RRCRestablishmentRequest).

Step 204: The UE receives the fourth message msg4 sent by the basestation.

The fourth message msg4 serves two functions. The first function is toresolve contention conflicts; the second function is to transmit RRCconfiguration messages to the terminal. Here, if the UE receives the DCIformat 1_0 and its corresponding PDSCH scrambled by the Cell-RadioNetwork Temporary Identifier (C-RNTI), the random access is completed;if the terminal receives the DCI format 1_0 and its corresponding PDSCHscrambled by TC-RNTI, and the content is successfully matched, therandom access is completed.

The two-step random access process is in the process of standardizationand discussion, and is in the research stage. The two-step random accessprocess can increase the time delay and reduce the signaling overhead.At present, a basic method is that the message A msgA transmits thefirst message msg1 and third message msg3 of the four-step random accessprocess, and the message B msgB transmits the second message msg2 andfourth message msg4 of the four-step random access process. To receivethe message B msgB in the two-step random access process, the receivingwindow needs to be opened, and the UE detects the PDCCH that schedulesthe message B msgB within the receiving window. If the UE receives thePDCCH that schedules the message B msgB within the receiving window, theUE will receive the PDCCH according to the scheduling information in thePDCCH, and PDSCH contains the message B msgB. Considering that themessage B msgB in the two-step random access process needs to containthe content of the second message msg2 and fourth message msg4, and theUE conflict resolution needs to be implemented. In view of the above,the following technical solutions in the embodiments of the disclosureare provided.

FIG. 4 is a schematic flowchart of a random access method embodied by anembodiment of the disclosure. The random access method in the embodimentof the disclosure is applied to a two-step random access process. Asshown in FIG. 4, the random access method includes the following steps:

Step 401: After the UE sends the first message, the UE detects thescheduling instruction of the second message in the first window; thesecond message includes at least one of the following: a first conflictresolution identifier, a second conflict resolution identifier, firstindication information, and second indication information, wherein thefirst conflict resolution identifier is used for conflict resolution ofa connected UE; the second conflict resolution identifier is used forconflict resolution of an idle UE, an inactive UE, or the connected UE;the first indication information is used for indicating that a two-steprandom access process returns to a four-step random access process; andthe second indication information is used for indicating a randombackoff value when the UE retransmits the first message.

The two-step random access process includes two steps: 1) the UE sendsthe message A msgA to the network device; 2) the network device sendsthe message B msgB to the UE. In an embodiment of the disclosure, thefirst message is the message A msgA, and the second message is themessage B msgB.

The network device mentioned in the embodiments of disclosure includesbut is not limited to LTE base station (eNB) and NR base station (gNB.)

The UE mentioned in the embodiment of the disclosure may be any devicecapable of communicating with the network, such as a mobile phone, anotebook, a tablet computer, a vehicle-mounted terminal, and a wearableterminal.

In the embodiment of the disclosure, after the UE sends the firstmessage (such as the message A msgA), the network device receives thefirst message sent by the UE. Then, the network device sends thescheduling instruction (such as PDCCH) of the second message (such asthe message B msgB) in the first window, and accordingly, the UE willdetect the scheduling instruction of the second message in the firstwindow. Here, the first message includes a preamble and an uplink datachannel (such as PUSCH).

Specifically, referring to FIG. 5, in FIG. 5, the network device isexemplified as the gNB. In the two-step random access process, after theUE sends the message A msgA, the scheduling instruction of the message BmsgB is blindly detected in the first window (or a timer is turned on,the scheduling instruction of the message B msgB is blindly detectedduring the operation period of the timer).

Specifically, the message A msgA is composed of a preamble and PUSCH,and the time when the first window starts (or the time when the timer isturned on) is after the PUSCH is sent. The UE blindly detects the PDCCHin the first window (or during the operation period of the timer). ThePDCCH is scrambled by the RA-RNTI, and the calculation method of theRA-RNTI is consistent with the RA-RNTI of the RAR in the four-steprandom access process. It should be noted that the disclosure providesno limitation to whether the same RA-RNTI is used to blindly detect themessage B msgB.

If the UE blindly detects the PDCCH scrambled by RA-RNTI in the firstwindow (or during the operation period of timer) successfully, the UEstarts to process the PDSCH scheduled by the PDCCH, which includes themessage B msgB. If the UE does not blindly detect the PDCCH scrambled byRA-RNTI in the first window (or during the operation period of timer),the UE retransmits the message A msgA.

In the embodiment of the disclosure, the second message includes atleast one of the following:

1) The first conflict resolution identifier, which is used for conflictresolution of a connected UE.2) A second conflict resolution identifier, which is used for conflictresolution of an idle UE, an inactive UE, or the connected UE.3) The first indication information, which is used to indicate that thetwo-step random access process returns to the four-step random accessprocess.4) The second indication information, which is used to indicate a randombackoff value when the UE retransmits the first message msg1.

The above situation 1), 2), and 3) can be implemented through a MediaAccess Control Control Element (MAC CE). Specifically, the secondmessage msg2 includes a MAC PDU, and the MAC PDU includes at least oneof the following:

A first MAC CE, which carries the first conflict resolution identifier,and the first conflict resolution identifier is a cell radio networktemporary identifier (Cell-RNTI, C-RNTI). Here, the first MAC CE mayalso be referred to as C-RNTI MAC CE.A second MAC CE, which carries the second conflict resolution identifier(that is, contention resolution ID). Here, the second MAC CE may also bereferred to as contention resolution MAC CE.A third MAC CE, which carries RAR, and the RAR is used to indicate thatthe two-step random access process returns to the four-step randomaccess process. Here, the content of the RAR may be the content of thesecond message msg2 in the four-step random access process, and further,a

RAPID may also be added to the RAR.

Further, for the first MAC CE:

a) In an implementation of the disclosure, the first MAC CE furthercarries uplink timing advance information. For example: referring toFIG. 6-1, the content in the first MAC CE includes: C-RNTI and TAC.Among them, the TAC is used for the UE to adjust the uplink TA forsubsequent uplink transmission, and the C-RNTI is used to resolve thecontention conflict. That is, if the C-RNTI in the message B msgBreceived by the UE is consistent with the C-RNTI carried in the messageA msgA, the conflict is considered to be resolved.b) In another implementation of the disclosure, the first MAC CE furthercarries uplink timing advance information and uplink schedulinginformation. For example: referring to FIG. 6-2, the content in thefirst MAC CE includes: C-RNTI, TAC, and UL grant. It should be notedthat the positions of these contents in the first MAC CE can be changed.This embodiment only serves as an example. The first MAC CE of thisformat is directed to the random access process that is triggered in thefollowing conditions:When the uplink synchronization state is “non-synchronised”, uplink datais reached during the RRC connection state.When there is no PUCCH resource for transmission scheduling request(SR), uplink data is reached during the RRC connected state.SR is failed.

Further, for the second MAC CE: the second MAC CE further carries uplinktiming advance information and C-RNTI. For example: referring to FIG.6-3, the content in the second MAC CE includes: Contention ResolutionID, TAC, and C-RNTI. Among them, TAC uses the UE to adjust the uplink TAfor subsequent uplink transmission; C-RNTI is used for PDCCH scramblingfor subsequent data scheduling; Contention Resolution ID is used forconflict resolution, that is, if the Contention Resolution ID in themessage B msgB received by the UE matches the CCCH SDU carried in themessage A msgA, it is considered that the conflict is resolved.

It should be noted that in the connection state, the UE initiates an RRCreestablishment to trigger random access. Under the circumstances, theconflict resolution is also implemented through the second conflictresolution identifier, but in this scenario, the UE is in the connectionstate.

Further, for the third MAC CE:

a) In an implementation of the disclosure, the RAR in the third MAC CEincludes uplink timing advance information (such as TAC), uplinkscheduling information (such as UL grant), and temporary cell radionetwork temporary identifier (TC-RNTI). For the third MAC CE, its formatis the same as the MAC RAR format in the second message msg2 in thefour-step random access process. For the specific format, please referto FIG. 3-4. The content includes: TAC, UL Grant, and TC-RNTI.b) In another implementation of the disclosure, the RAR in the third MACCE includes uplink timing advance information (such as TAC), uplinkscheduling information (such as UL grant), TC-RNTI, and RAPID. For thethird MAC CE, the specific format is shown in FIG. 6-11, and the contentincludes: TAC, UL Grant, TC-RNTI, and RAPID. The main purpose ofcarrying RAPID in the third MAC CE is to make its corresponding firstsub-header only contain 1 byte, which is consistent with the size ofother sub-headers. Please refer to the description in the secondextended solution below.

For the condition 4) described above, the second indication informationis BI information, which is used to indicate a random backoff value whenthe UE retransmits the first message. That is, for those UEs whosenetwork device does not detect the message A msgA, it is necessary toperform a backoff operation according to the BI to reduce conflicts.

In the embodiment of the disclosure, the conditions 1), 2), 3), and 4)described above can be carried in the second message in any combination.

For example: the message B msgB can contain conditions 3) and 4). Thissituation corresponds to the situation that the network device does notdetect any corresponding PUSCH (i.e., payload) at a certain randomaccess occasion (RO), but only detects one or some preambles. Under thecircumstances, the network device can make the UEs to return to thefour-step random access process by means of returning to the four-steprandom access process.

For example: the message B msgB may contain 1), 3) and 4).

For example: the message B msgB may contain 2), 3) and 4).

For example: the message B msgB may contain 1), 2), 3) and 4).

It should be noted that the BI information may or may not be included inthe message B msgB.

The content contained in the MAC PDU will be described in detail belowwith reference to the specific implementation of the MAC PDU of thesecond message.

I) The MAC PDU includes multiple first MAC sub-PDUs, the first MACsub-PDU includes a first sub-header and a target MAC CE. The firstsub-header carries the third indication information, and the thirdindication information is used to indicate the type of the target MAC

CE, and the type of the target MAC CE refers to the first MAC CE, or thesecond MAC CE, or the third MAC CE.

In an embodiment, the first sub-header carries RAPID.

The message B msgB can be detected by multiple UEs by using the same RO,so RAPID is still required to instruct and select UEs with differentpreambles, that is, when the UE detects the message B msgB, the UE willlook up the RAPID in the first sub-header according to the preambleindex used in the message A msgA, so as to see if the RAPID matches thepreamble index in the message A msgA.

In an embodiment, the first sub-header carries the third indicationinformation, and the third indication information is used to indicatethe type of the target MAC CE. Further, the third indication informationcan be implemented in the following manner:

Method 1: The third indication information is LCD, and the LCID is usedto indicate the type of the target MAC CE.

For example: referring to FIG. 6-4, the content contained in the firstsub-header includes RAPID and LCID, wherein LCID is used to indicatedifferent types of MAC CE.

Method 2: The third indication information is the first typeinformation, and the first type information is used to indicate the typeof the target MAC CE and/or the type of the sub-header. Here, there aretwo types of sub-headers, namely, the first sub-header and the secondsub-header. Specifically, the first sub-header refers to the BIsub-header, and the content contained in the BI sub-header includes thefirst type information and BI information; the second sub-header refersto a sub-header that only contains the first type information. Further,the second sub-header may or may not contain RAPID. For the firstsub-header, the first type information carried in the first sub-headeris used to indicate the type of the target MAC CE corresponding to thefirst sub-header and/or the type of the first sub-header.

For example, the first type information T1 can indicate four differenttypes by using 3 bits. Certainly, the number of bits that are actuallyused depends on the number of different types of MAC CEs that need to beindicated. Take the first type information including 3 bits as anexample, the indicated type is shown in Table 1 below:

TABLE 1 000 Third MAC CE (see FIG. 3-4) 001 First MAC CE (Format 1, seeFIG. 6-1) 010 First MAC CE (Format 2, see FIG. 6-2) 011 Second MAC CE(see FIG. 6-3) 100 Padding 101 BI sub-header

For example: referring to FIG. 6-5, the content of the first sub-headercontains RAPID and the first type information T1, wherein the first typeinformation T1 is used to indicate different types of MAC CE, and thefirst type information T1 in FIG. 6-5 contains 3 bits.

For example: referring to FIG. 6-6, in order to be compatible with thefour-step random access process, the content of the first sub-headerincludes RAPID, the second type information T, and the first typeinformation T1, wherein the second type information T is used toindicate whether the first sub-header contains RAPID or BI information,and the first type information T1 is used to indicate different types ofMAC CE. The first type information T1 in FIG. 6-6 contains 2 bits andcan only indicate four types of different MAC CE at maximum.

II) The MAC PDU further includes a second MAC sub-PDU. The second MACsub-PDU includes only a second sub-header, the second sub-header carriesthe second indication information, and the second indication informationis BI information.

Further, the second sub-header further carries first type ofinformation, wherein the first type information is used to indicate thetype of the target MAC CE and/or the type of the sub-header. For thesecond sub-header, the first type information carried in the secondsub-header is used to indicate the type of the second sub-header (thatis, the BI sub-header).

Further, the second sub-header further carries the second typeinformation, and the second type information is used to indicate whetherthe second sub-header contains RAPID or BI information.

For example: referring to FIG. 6-7, the content of the second sub-headerincludes BI and the first type information T1. Here, the first typeinformation T1 is used to indicate that the second sub-header containsBI information. The first type information T1 in FIG. 6-7 contains 3bits.

For example: referring to FIG. 6-8, in order to be compatible with thefour-step random access process, the content of the second sub-headerincludes BI and the second type information T. Here, the second typeinformation T is used to indicate that the second sub-header includes BIinformation. The second type information T in FIG. 6-8 contains 1 bit.

Specifically, the data format of MAC PDU of the the message B msgB isshown in FIG. 6-9. The MAC PDU includes multiple MAC sub-PDUs (MACsub-PDU), namely MAC sub-PDU1, MAC sub-PDU2, MAC sub-PDU3, and so on.Specifically, the MAC sub-PDU1 includes a second sub-header, and theformat of the second sub-header is shown in FIG. 6-7 or FIG. 6-8. OtherMAC sub-PDUs other than MAC sub-PDU1, for example, MAC sub-PDU2 includesa first sub-header and a target MAC CE. The target MAC CE may be theaforementioned first MAC CE, or the second MAC CE, or the third MAC CE.The format parameters of the first sub-header are shown in FIG. 6-4 orFIG. 6-5 or FIG. 6-6.

In the embodiment of the disclosure, for the design of the sub-header ofthe MAC PDU of the the message B msgB, the following extended solutionmay also be adopted.

Solution 1:

The second sub-header (that is, the sub-header that carries BI) contains1 byte (refer to FIG. 6-7), the first sub-header of the first MAC CE andthe second MAC CE contains 1 byte (refer to FIG. 6-10), and the firstsub-header of the third MAC CE contains 2 bytes (refer to FIG. 6-5).

Here, in the case of the first MAC CE and the second MAC CE, since theUE can determine whether or not the MAC sub-PDU belongs to itselfthrough the contention conflict resolution ID, there is no need to carryRAPID in the sub-header, refer to FIG. 6-10. The first sub-header of thefirst MAC CE and the second MAC CE only contains the first typeinformation T1. A value of the first type information T1 is shown inTable 2 below:

TABLE 2 000 BI sub-header 001 First MAC CE (Format 1, see FIG. 6-1) 010First MAC CE (Format 2, see FIG. 6-2) 011 Second MAC CE (see FIG. 6-3)100 Third MAC CE (see FIG. 3-4) 101 Padding

The advantageous effect of the solution 1 is that it can save 1 byte ofoverhead for the sub-header. If there are more first MAC CE or secondMAC CE responding to different UEs, the UE needs to try many MACsub-PDUs to find its own MAC sub-PDU.

Solution 2

On the basis of the above solution 1, for the design of the sub-header,a sub-header can be designed in the manner that all sub-headers are 1byte. That is, for the first sub-header of the third MAC CE, the RAPIDin the first sub-header can be moved to the third MAC CE. Specifically,the second sub-header (that is, the sub-header carrying BI) contains 1byte (refer to FIG. 6-7), and the first sub-header of the first MAC CE,the second MAC CE, and the third MAC CE contains 1 byte (refer to FIG.6-10). Correspondingly, the format of the third MAC CE needs to bemodified as shown in FIG. 6-11, and the content includes: TAC, UL Grant,TC-RNTI, and RAPID. The value of the first type information T1 in FIG.6-10 is shown in Table 3 below:

TABLE 3 000 BI sub-header 001 First MAC CE (Format 1, see FIG. 6-1) 010First MAC CE (Format 2, see FIG. 6-2) 011 Second MAC CE (see FIG. 6-3)100 Third MAC CE (see FIG. 6-10) 101 Padding

Solution 3

On the basis of the above solution 1, for the design of the sub-header,a sub-header can be designed in the manner that all sub-headers are 1byte. Specifically, the third MAC CE in the message B msgB is sent inanother PDSCH. To be specific, the second sub-header (that is, thesub-header carrying BI) contains 1 byte (refer to FIG. 6-7), and thefirst sub-header of the first MAC CE and the second MAC CE contains 1byte (refer to FIG. 6 10). The value of T1 in FIG. 6-10 is shown inTable 4 below:

TABLE 4 000 BI sub-header 001 First MAC CE (Format 1, see FIG. 6-1) 010First MAC CE (Format 2, see FIG. 6-2) 011 Second MAC CE (see FIG. 6-3)101 Padding

After the format of MAC PDU of the message B msgB is designed throughthe above solution, the embodiment of the disclosure further specifiesthe behavior of two types of UE upon receiving the MAC PDU, which can beclassified into:

I) The first type of UE: a connected UE

The UE at least transmits the fourth MAC CE in the uplink data channelof the first message, and the fourth MAC CE carries a C-RNTI. That is:the connected UE will transmit the C-RNTI MAC CE in the PUSCH of themessage A msgA.

After transmitting the first message, the first type of UE receives thescheduling instruction of the second message in the first window/timer.If the UE receives the scheduling instruction of the second message inthe first window, then the UE determines whether the MAC PDU containsthe first MAC CE and/or the third MAC CE through the third indicationinformation carried in the MAC PDU of the second message, wherein:

If the MAC PDU contains the first MAC CE, and the C-RNTI in the firstMAC CE is consistent with the C-RNTI in the first message, the conflictis resolved.

It should be noted that there may not be the first MAC CE in the MACPDU. In this case, the conflict resolution of the UE is implemented byreceiving the PDCCH scrambled by the C-RNTI. Specifically, if there isno third MAC CE in the second message received by the UE, the UEcontinues to blindly detect whether there is a PDCCH scrambled by theC-RNTI. That is to say, the first type of UE not only needs to blindlydetect the PDCCH scrambled by the RA-RNTI but also detects the PDCCHscrambled by the C-RNTI, wherein the PDCCH scrambled by the C-RNTI isused for conflict resolution.

If the MAC PDU contains a third MAC CE, and the RAPID contained in thethird MAC CE or the RAPID in the first sub-packet header correspondingto the third MAC CE is consistent with the index information of thepreamble in the first message, the UE returns to the four-step randomaccess process from the two-step random access process.

If the MAC PDU does not include the first MAC CE and the third MAC CE,the UE retransmits the first message after the first window ends,wherein the retransmission of the first message adopts the BI value inthe second message for backoff.

II) The second type of UE: an idle UE, an inactive UE, or a connected UE

The UE transmits the CCCH SDU in the uplink data channel of the firstmessage. That is: the idle UE, the inactive UE, or the connected UE willtransmit the CCCH SDU in the new PUSCH of the message A msgA.

After the second type of UE transmits the first message, the UE receivesthe scheduling instruction of the second message in the firstwindow/timer. If the UE receives the scheduling instruction of thesecond message in the first window, then the UE determines whether theMAC PDU contains the second MAC CE and/or the third MAC CE according tothe third indication information carried in the MAC PDU of the secondmessage, wherein:

If the MAC PDU contains a second MAC CE, and the second conflictresolution identifier in the second MAC CE matches the CCCH SDU in thefirst message, the conflict is resolved.

If the MAC PDU contains a third MAC CE, and the RAPID contained in thethird MAC CE or the RAPID in the first sub-packet header correspondingto the third MAC CE is consistent with the index information of thepreamble in the first message, the UE returns to the four-step randomaccess process from the two-step random access process.

If the MAC PDU does not include the second MAC CE and the third MAC CE,the UE retransmits the first message after the first window ends,wherein the retransmission of the first message adopts the BI value inthe second message for backoff.

FIG. 7 is the first schematic view of the structural constitution of arandom access apparatus embodied by an embodiment of the disclosure. Therandom access apparatus is applied to a user equipment, and theapparatus includes:

The transmitting unit 701 is configured to transmit the first message.

The receiving unit 702 is configured to detect the schedulinginstruction of the second message in the first window.

The second message includes at least one of the following: a firstconflict resolution identifier, a second conflict resolution identifier,first indication information, and second indication information, whereinthe first conflict resolution identifier is used for conflict resolutionof a connected UE; the second conflict resolution identifier is used forconflict resolution of an idle UE, an inactive UE, or the connected UE;the first indication information is used for indicating that a two-steprandom access process returns to a four-step random access process; andthe second indication information is used for indicating a randombackoff value when the UE retransmits the first message.

In an embodiment, the first message includes a preamble and an uplinkdata channel.

In an embodiment, the second message includes a MAC PDU, and the MAC PDUincludes at least one of the following:

A first MAC CE, which carries the first conflict resolution identifier,and the first conflict resolution identifier is C-RNTI.

A second MAC CE, which carries the second conflict resolutionidentifier.

A third MAC CE, which carries RAR, and the RAR is used to indicate thatthe two-step random access process returns to the four-step randomaccess process.

In an embodiment, the first MAC CE further carries uplink timing advanceinformation.

In an embodiment, the first MAC CE further carries uplink timing advanceinformation and uplink scheduling information.

In an embodiment, the second MAC CE further carries uplink timingadvance information and C-RNTI.

In an embodiment, the RAR includes uplink timing advance information,uplink scheduling information, and TC-RNTI.

In an embodiment, the RAR includes uplink timing advance information,uplink scheduling information, TC-RNTI, and RAPID.

In an embodiment, the MAC PDU includes multiple first MAC sub-PDUs, thefirst MAC sub-PDU includes a first sub-header and a target MAC CE, andthe first sub-header carries the third indication information. The thirdindication information is used to indicate the type of the target MACCE, and the type of the target MAC CE refers to the first MAC CE, or thesecond MAC CE, or the third MAC CE.

In an embodiment, the third indication information is LCID, and the LCIDis used to indicate the type of the target MAC CE.

In an embodiment, the third indication information is the first typeinformation, and the first type information is used to indicate the typeof the target MAC CE and/or the type of the first sub-header.

In an embodiment, the first sub-header further carries RAPID.

In an embodiment, the first sub-header further carries the second typeinformation, and the second type information is used to indicate whetherthe first sub-header contains RAPID or BI information.

In an embodiment, the MAC PDU further includes a second MAC sub-PDU, thesecond MAC sub-PDU only includes a second sub-header, the secondsub-header carries the second indication information, and the secondindication information is BI information.

In an embodiment, the second sub-header further carries the first typeinformation, and the first type information is used to indicate the typeof the second sub-header.

In an embodiment, the second sub-header further carries the second typeinformation, and the second type information is used to indicate whetherthe second sub-header contains RAPID or BI information.

In an embodiment, in the condition that the user equipment is aconnected UE,

The transmitting unit 701 at least transmits the fourth MAC CE in theuplink data channel of the first message, and the fourth MAC CE carriesa C-RNTI.

In an embodiment, the apparatus further includes:

The determining unit 703 is configured to determine whether the MAC PDUcontains the first MAC CE and/or the third MAC CE according to the thirdindication information carried in the MAC PDU of the second message ifthe receiving unit receives the scheduling instruction of the secondmessage in the first window.

In an embodiment, the apparatus further includes a processing unit 704,which is configured to:

If the MAC PDU contains the first MAC CE, and the C-RNTI in the firstMAC CE is consistent with the C-RNTI in the first message, the conflictis resolved.

If the MAC PDU includes a third MAC CE, and the RAPID contained in thethird MAC CE or the RAPID in the first sub-packet header correspondingto the third MAC CE is consistent with the index information of thepreamble in the first message, the UE returns to the four-step randomaccess process from the two-step random access process.

If the MAC PDU does not include the first MAC CE and the third MAC CE,the first message is retransmitted after the first window ends, whereinthe retransmission of the first message adopts the BI value in thesecond message for backoff.

In an embodiment, in the condition that the user equipment is an idleUE, an inactive UE, or the connected UE, the transmitting unit 701transmits the CCCH SDU in the uplink data channel of the first message.

In an embodiment, the apparatus further includes:

The determining unit 703 is configured to determine whether the MAC PDUcontains the second MAC CE and/or the third MAC CE according to thethird indication information carried in the MAC PDU of the secondmessage if the receiving unit receives the scheduling instruction of thesecond message in the first window.

In an embodiment, the apparatus further includes a processing unit 704,which is configured to:

If the MAC PDU includes a second MAC CE, and the second conflictresolution identifier in the second MAC CE matches the CCCH SDU in thefirst message, then the conflict is resolved.

If the MAC PDU includes a third MAC CE, and the RAPID contained in thethird MAC

CE or the RAPID in the first sub-packet header corresponding to thethird MAC CE is consistent with the index information of the preamble inthe first message, the UE returns to the four-step random access processfrom the two-step random access process.

If the MAC PDU does not include the second MAC CE and the third MAC CE,the first message is retransmitted after the first window ends, whereinthe retransmission of the first message adopts the BI value in thesecond message for backoff.

Those skilled in the art should understand that the relevant descriptionof the foregoing random access apparatus in the embodiment of thedisclosure can be understood with reference to the relevant descriptionof the random access method in the embodiment of the disclosure.

FIG. 8 is the second schematic view of the structural constitution of arandom access apparatus embodied by an embodiment of the disclosure. Therandom access apparatus is applied to network device, and the apparatusincludes:

The receiving unit 801 is configured to receive the first messagetransmitted by the UE.

The transmitting unit 802 is configured to transmit the schedulinginstruction of the second message in the first window.

The second message includes at least one of the following: a firstconflict resolution identifier, a second conflict resolution identifier,first indication information, and second indication information, whereinthe first conflict resolution identifier is used for conflict resolutionof a connected UE; the second conflict resolution identifier is used forconflict resolution of an idle UE, an inactive UE, or the connected UE;the first indication information is used for indicating that a two-steprandom access process returns to a four-step random access process; andthe second indication information is used for indicating a randombackoff value when the UE retransmits the first message.

In an embodiment, the first message includes a preamble and an uplinkdata channel.

In an embodiment, the second message includes a MAC PDU, and the MAC PDUincludes at least one of the following:

A first MAC CE, which carries the first conflict resolution identifier,and the first conflict resolution identifier is C-RNTI.

A second MAC CE, which carries the second conflict resolutionidentifier.

A third MAC CE, which carries RAR that responds to random access, andthe RAR is used to indicate that the two-step random access processreturns to the four-step random access process.

In an embodiment, the first MAC CE further carries uplink timing advanceinformation.

In an embodiment, the first MAC CE further carries uplink timing advanceinformation and uplink scheduling information.

In an embodiment, the second MAC CE further carries uplink timingadvance information and C-RNTI.

In an embodiment, the RAR includes uplink timing advance information,uplink scheduling information, and TC-RNTI.

In an embodiment, the RAR includes uplink timing advance information,uplink scheduling information, TC-RNTI, and RAPID.

In an embodiment, the MAC PDU includes multiple first MAC sub-PDUs, thefirst MAC sub-PDU includes a first sub-header and a target MAC CE, andthe first sub-header carries the third indication information. The thirdindication information is used to indicate the type of the target MACCE, and the type of the target MAC CE refers to the first MAC CE, or thesecond MAC CE, or the third MAC CE.

In an embodiment, the third indication information is LCID, and the LCIDis used to indicate the type of the target MAC CE and/or the type of thefirst sub-header.

In an embodiment, the third indication information is the first typeinformation, and the first type information is used to indicate the typeof the target MAC CE.

In an embodiment, the first sub-header further carries RAPID.

In an embodiment, the first sub-header further carries the second typeinformation, and the second type information is used to indicate whetherthe first sub-header contains RAPID or BI information.

In an embodiment, the MAC PDU further includes a second MAC sub-PDU, thesecond MAC sub-PDU only includes a second sub-header, the secondsub-header carries the second indication information, and the secondindication information is BI information.

In an embodiment, the second sub-header further carries the first typeinformation, and the first type information is used to indicate the typeof the second sub-header.

In an embodiment, the second sub-header further carries the second typeinformation, and the second type information is used to indicate whetherthe second sub-header contains RAPID or BI information.

Those skilled in the art should understand that the relevant descriptionof the foregoing random access apparatus in the embodiment of thedisclosure can be understood with reference to the relevant descriptionof the random access method in the embodiment of the disclosure.

FIG. 9 is a schematic structural view of a communication device 600embodied by an embodiment of the disclosure. The communication devicemay be a user equipment or a network device. The communication device600 shown in FIG. 9 includes a processor 610, and the processor 610 cancall and run a computer program from a memory to implement the method inthe embodiment of the disclosure.

Optionally, as shown in FIG. 9, the communication device 600 may furtherinclude a memory 620. The processor 610 may call and run a computerprogram from the memory 620 to implement the method in the embodiment ofthe disclosure.

The memory 620 may be a separate device independent of the processor610, or may be integrated in the processor 610.

Optionally, as shown in FIG. 9, the communication device 600 may furtherinclude a transceiver 630, and the processor 610 may control thetransceiver 630 to communicate with other devices. Specifically, thetransceiver 630 may send information or data to other devices, orreceive information or data sent by other devices.

Specifically, the transceiver 630 may include a transmitter and areceiver. The transceiver 630 may further include an antenna, and thenumber of antennas may be one or more.

Optionally, the communication device 600 may specifically be a networkdevice in an embodiment of the disclosure, and the communication device600 may implement the corresponding process implemented by the networkdevice in various methods of the embodiment of the disclosure. For theconciseness, related descriptions are omitted.

Optionally, the communication device 600 may specifically be a mobileterminal/terminal device in an embodiment of the disclosure, and thecommunication device 600 may implement the corresponding processimplemented by the mobile terminal/terminal device in various methods inthe embodiment of the disclosure. For conciseness, related descriptionis omitted.

FIG. 10 is a schematic structural view of a chip embodied by anembodiment of the disclosure. The chip 700 shown in FIG. 10 includes aprocessor 710, and the processor 710 can call and run a computer programfrom the memory to implement the method in the embodiment of thedisclosure.

Optionally, as shown in FIG. 10, the chip 700 may further include amemory 720. The processor 710 may call and run a computer program fromthe memory 720 to implement the method in the embodiment of thedisclosure.

The memory 720 may be a separate device independent of the processor710, or may be integrated in the processor 710.

Optionally, the chip 700 may further include an input interface 730. Theprocessor 710 can control the input interface 730 to communicate withother devices or chips, and specifically, can obtain information or datasent by other devices or chips.

Optionally, the chip 700 may further include an output interface 740.The processor 710 can control the output interface 740 to communicatewith other devices or chips, and specifically, can output information ordata to other devices or chips.

Optionally, the chip can be applied to the network device in theembodiment of the disclosure, and the chip can implement thecorresponding process implemented by the network device in variousmethods in the embodiment of the disclosure. For conciseness, relateddetails are omitted.

Optionally, the chip can be applied to the mobile terminal/terminaldevice in the embodiment of disclosure, and the chip can implement thecorresponding process implemented by the mobile terminal/terminal devicein various methods in the embodiment of the disclosure. For conciseness,related details are omitted.

It should be understood that the chip mentioned in the embodiment of thedisclosure may also be referred to as a system-level chip, a systemchip, a chip system, or a system-on-chip, etc.

FIG. 11 is a schematic block view of a communication system 1100embodied by an embodiment of the disclosure. As shown in FIG. 11, thecommunication system 1100 includes a user equipment 1110 and a networkdevice 1120.

Specifically, the user equipment 1110 can be used to implement thecorresponding functions implemented by the terminal device in the abovemethod, and the network device 1120 can be used to implement thecorresponding functions implemented by the network device in the abovemethod. For conciseness, related description is omitted.

It should be understood that the processor in the embodiment of thedisclosure may be an integrated circuit chip with signal processingcapability. In the implementation process, the steps of the foregoingmethod embodiments can be completed by integrated logic circuits ofhardware in the processor or instructions in the form of software. Theprocessor can be a general-purpose processor, a Digital Signal Processor(DSP), an Application Specific Integrated Circuit (ASIC), a ready-madeField Programmable Gate Array (FPGA) or other programmable logicdevices, discrete gates or transistor logic devices, and discretehardware components, which can implement or perform the methods, steps,and logical block diagrams disclosed in the embodiments of thedisclosure. The general-purpose processor may be a microprocessor, orthe processor may also be any conventional processor or the like. Thesteps of the method disclosed in the embodiments of the disclosure maybe directly embodied as being executed and completed by a hardwaredecoding processor, or executed and completed by a combination ofhardware and software modules in the decoding processor. The softwaremodule can be located in a developed storage medium in the field, suchas random access memory, flash memory, read-only memory, programmableread-only memory, or electrically erasable programmable memory, andregisters. The storage medium is located in the memory, and theprocessor reads the information in the memory and completes the steps ofthe above method in combination with its hardware.

It can be understood that the memory in the embodiments of thedisclosure may be a volatile memory or a non-volatile memory, or mayinclude both volatile and non-volatile memory. Specifically, thenon-volatile memory can be Read-Only Memory (ROM), Programmable ROM(PROM), Erasable PROM (EPROM), and Electrically EPROM (EEPROM) or flashmemory. The volatile memory may be a Random Access Memory (RAM), whichis used as an external cache. By way of exemplary but not restrictivedescription, many forms of RAM are available, such as Static RAM (SRAM),Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM(DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM) and DirectRambus RAM (DR RAM). It should be noted that the memories of the systemsand methods described herein are intended to include, but are notlimited to, these and any other suitable types of memories.

Among them, the user equipment 1110 can be used to implement thecorresponding functions implemented by the terminal device in the abovemethod, and the network equipment 1120 can be used to implement thecorresponding functions implemented by the network device in the abovemethod. For brevity, it will not be repeated here.

It should be understood that the memory described above is exemplary butnot restrictive. For example, the memory in the embodiment of thedisclosure may also be static RAM (SRAM), dynamic RAM (DRAM),synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhancedSDRAM (ESDRAM), synch link DRAM (SLDRAM) and Direct Rambus RAM (DR RAM),etc. That is to say, the memory in the embodiments of the disclosure isintended to include, but is not limited to, these and any other suitabletypes of memory.

The embodiments of the disclosure further provide a computer-readablestorage medium for storing computer programs.

Optionally, the computer-readable storage medium may be applied to thenetwork device in the embodiment of the disclosure, and the computerprogram enables the computer to execute the corresponding processimplemented by the network device in various methods of the embodimentof the disclosure. For conciseness, related details are omitted.

Optionally, the computer-readable storage medium can be applied to themobile terminal/terminal device in the embodiment of the disclosure, andthe computer program enables the computer to execute the correspondingprocess implemented by the mobile terminal/terminal device in variousmethods of the embodiment of the disclosure. For conciseness, relateddetails are omitted.

The embodiments of the disclosure further provide a computer programproduct, including computer program instructions.

Optionally, the computer program product may be applied to the networkdevice in the embodiment of the disclosure, and the computer programinstructions enable the computer to execute the corresponding processimplemented by the network device in various methods of the embodimentof the disclosure. For conciseness, related details are omitted.

Optionally, the computer program product can be applied to the mobileterminal/terminal device in the embodiment of the disclosure, and thecomputer program instructions enable the computer to execute thecorresponding process implemented by the mobile terminal/terminal devicein various methods of the embodiment of the disclosure. For conciseness,related details are omitted.

The embodiment of the disclosure further provides a computer program.

Optionally, the computer program can be applied to the network device inthe embodiment of the disclosure. When the computer program is run onthe computer, the computer can execute the corresponding processimplemented by the network device in various methods of the embodimentof the disclosure. For conciseness, related details are omitted.

Optionally, the computer program can be applied to the mobileterminal/terminal device in the embodiment of the disclosure. When thecomputer program is run on the computer, the computer can execute thecorresponding process implemented by the mobile terminal/terminal devicein various methods of the embodiment of the disclosure. For conciseness,related details are omitted.

A person of ordinary skill in the art may be aware that the units andalgorithm steps of the examples described in combination with theembodiments disclosed herein can be implemented by electronic hardwareor a combination of computer software and electronic hardware. Whetherthese functions are executed by hardware or software depends on thespecific application and design requirement and conditions of thetechnical solution. Professionals and technicians can use differentmethods for each specific application to implement the describedfunctions, but such implementation should not be construed as exceedingthe scope of the disclosure.

Those skilled in the art can clearly understand that, for theconvenience and conciseness of description, the specific operationprocess of the above-described system, device, and unit can be derivedfrom the corresponding process in the foregoing method embodiment, andrelated details are omitted.

In the several embodiments provided in the disclosure, it should beunderstood that the disclosed system, device, and method may beimplemented in other ways. For example, the device embodiments describedabove are only illustrative. For example, the division of the units isonly a division of logical function, and there may be other divisions inactual implementation, for example, multiple units or components can becombined or integrated into another system, or some features can beignored or not implemented. In addition, the exhibited or concernedmutual coupling or direct coupling or communication connection may beindirect coupling or communication connection through some interfaces,devices or units, and the coupling or connection may be realized inelectrical, mechanical or other forms.

The units described as separate components may or may not be physicallyseparated, and the components displayed as units may or may not bephysical units, that is, they may be located in one place, or they maybe distributed on multiple network units. Some or all of the units maybe selected according to actual needs to achieve the objectives of thesolutions of the embodiments.

In addition, the functional units in the various embodiments of thedisclosure may be integrated into one processing unit, or each unit mayexist alone physically, or two or more units may be integrated into oneunit.

If the function is implemented in the form of a software functional unitand sold or used as an independent product, it can be stored in acomputer readable storage medium. Based on this understanding, thetechnical solution of the disclosure essentially or the part thatcontributes to the existing technology or the part of the technicalsolution can be embodied in the form of a software product. Moreover,the computer software product is stored in a storage medium, includingthat several instructions are used to enable a computer device (whichmay be a personal computer, a server, or a network device, etc.) toexecute all or part of the steps of the methods described in the variousembodiments of the disclosure. The storage media include: USB flashdrive, mobile hard disk, Read-Only Memory (ROM), Random Access Memory(RAM), magnetic disk or optical disk and other media that can storeprogram code.

The above are only specific implementations of the disclosure, but thescope sought to be protected by the disclosure is not limited thereto.Any person skilled in the art can easily think of changes orsubstitutions within the technical scope disclosed in the disclosure.The above changes or substitutions should fall within the scope of thedisclosure. Therefore, the scope sought to be protected by thedisclosure shall be subject to the claims.

What is claimed is:
 1. A random access method, the method comprising:detecting a scheduling instruction of a second message in a first windowafter a user equipment (UE) sends a first message; the second messagecomprising at least one of the following: a first conflict resolutionidentifier, a second conflict resolution identifier, first indicationinformation, and second indication information, wherein the firstconflict resolution identifier is used for conflict resolution of aconnected UE; the second conflict resolution identifier is used forconflict resolution of an idle UE, an inactive UE, or the connected UE;the first indication information is used for indicating that a two-steprandom access process returns to a four-step random access process; andthe second indication information is used for indicating a randombackoff value when the UE retransmits the first message.
 2. The methodaccording to claim 1, wherein the first message comprises a preamble andan uplink data channel.
 3. The method according to claim 1, wherein thesecond message comprises a media access control (MAC) protocol data unit(PDU), and the MAC PDU comprises at least one of the following: a firstmedia access control control element (CE), wherein the first MAC CEcarries the first conflict resolution identifier, and the first conflictresolution identifier is a cell radio network temporary identifier(C-RNTI); a second MAC CE, wherein the second MAC CE carries the secondconflict resolution identifier; a third MAC CE, wherein the third MAC CEcarries a random access response (RAR), and the RAR is used to indicatethat the two-step random access process returns to the four-step randomaccess process.
 4. The method according to claim 3, wherein the RARcomprises the uplink timing advance information, the uplink schedulinginformation, and a temporary cell radio network temporary identifier(TC-RNTI).
 5. The method according to claim 3, wherein the MAC PDUcomprises a plurality of first MAC sub-PDUs, which comprise a firstsub-header and a target MAC CE, the first sub-header carries thirdindication information, and the third indication information is used toindicate the type of the target MAC CE, and a type of the target MAC CErefers to the first MAC CE, the second MAC CE, or the third MAC CE. 6.The method according to claim 5, wherein the first sub-header furthercarries the RAPID.
 7. The method according to claim 6, wherein the firstsub-header further carries second type information, and the second typeinformation is used to indicate whether the first sub-header containsthe RAPID or backoff indication (BI) information with backoffindication.
 8. A random access method, the method comprising: a networkdevice receives a first message transmitted by a user equipment (UE),and transmits a scheduling instruction of a second message in a firstwindow; wherein the second message comprises at least one of thefollowing: a first conflict resolution identifier, a second conflictresolution identifier, first indication information, and secondindication information, wherein the first conflict resolution identifieris used for conflict resolution of a connected UE, the second conflictresolution identifier is used for conflict resolution of an idle UE, aninactive UE, or the connected UE; the first indication information isused for indicating that a two-step random access process returns to afour-step random access process; and the second indication informationis used for indicating a random backoff value when the UE retransmitsthe first message.
 9. The method according to claim 8, wherein the firstmessage comprises a preamble and an uplink data channel.
 10. The methodaccording to claim 8, wherein the second message comprises a mediaaccess control (MAC) protocol data unit (PDU), and the MAC PDU comprisesat least one of the following: a first MAC control element (CE), whereinthe first MAC CE carries the first conflict resolution identifier, andthe first conflict resolution identifier is a cell radio networktemporary identifier (C-RNTI); a second MAC CE, wherein the second MACCE carries the second conflict resolution identifier; a third MAC CE,wherein the third MAC CE carries a random access response (RAR), and theRAR is used to indicate that the two-step random access process returnsto the four-step random access process.
 11. A random access device,which is applied to a user equipment (UE), and the device comprising: atransmitter, configured to transmit a first message; a receiver,configured to detect a scheduling instruction of a second message in afirst window; wherein the second message comprises at least one of thefollowing: a first conflict resolution identifier, a second conflictresolution identifier, first indication information, and secondindication information, wherein the first conflict resolution identifieris used for conflict resolution of a connected UE; the second conflictresolution identifier is used for conflict resolution of an idle UE, aninactive UE, or the connected UE; the first indication information isused for indicating that a two-step random access process returns to afour-step random access process; and the second indication informationis used for indicating a random backoff value when the UE retransmitsthe first message.
 12. The random access device according to claim 11,wherein the first message comprises a preamble and an uplink datachannel.
 13. The random access device according to claim 11, wherein thesecond message comprises a media access control (MAC) protocol data unit(PDU), and the MAC PDU comprises at least one of the following: a firstMAC control element (CE), wherein the first MAC CE carries the firstconflict resolution identifier, and the first conflict resolutionidentifier is a cell radio network temporary identifier (C-RNTI); asecond MAC CE, wherein the second MAC CE carries the second conflictresolution identifier; a third MAC CE, wherein the third MAC CE carriesa random access response (RAR), and the RAR is used to indicate that thetwo-step random access process returns to the four-step random accessprocess.
 14. The random access device according to claim 13, wherein theRAR comprises the uplink timing advance information, the uplinkscheduling information, and a temporary cell radio network temporaryidentifier (TC-RNTI).
 15. The random access device according to claim13, wherein the MAC PDU comprises a plurality of first MAC sub-PDUs,which comprise a first sub-header and a target MAC CE, the firstsub-header carries third indication information, and the thirdindication information is used to indicate a type of the target MAC CE,and the type of the target MAC CE refers to the first MAC CE, the secondMAC CE, or the third MAC CE.
 16. The random access device according toclaim 15, wherein the first sub-header further carries the RAPID. 17.The random access device according to claim 16, wherein the firstsub-header further carries second type information, and the second typeinformation is used to indicate whether the first sub-header containsthe RAPID or backoff indication (BI) information.
 18. A random accessdevice, which is applied to a network device, the device comprising: areceiver, configured to receive a first message sent by a user equipment(UE); a transmitter, configured to transmit a scheduling instruction ofa second message in a first window; wherein the second message comprisesat least one of the following: a first conflict resolution identifier, asecond conflict resolution identifier, first indication information, andsecond indication information, wherein the first conflict resolutionidentifier is used for conflict resolution of a connected UE; the secondconflict resolution identifier is used for conflict resolution of anidle UE, an inactive UE, or the connected UE; the first indicationinformation is used for indicating that a two-step random access processreturns to a four-step random access process; and the second indicationinformation is used for indicating a random backoff value when the UEretransmits the first message.
 19. The random access device according toclaim 18, wherein the first message comprises a preamble and an uplinkdata channel.
 20. The random access device according to claim 18,wherein the second message comprises a media access control (MAC)protocol data unit (PDU), and the MAC PDU comprises at least one of thefollowing: a first MAC control element (CE), wherein the first MAC CEcarries the first conflict resolution identifier, and the first conflictresolution identifier is a cell radio network temporary identifier(C-RNTI); a second MAC CE, wherein the second MAC CE carries the secondconflict resolution identifier; a third MAC CE, wherein the third MAC CEcarries a random access response (RAR), and the RAR is used to indicatethat the two-step random access process returns to the four-step randomaccess process.