Random access method, terminal, and network device

ABSTRACT

The present disclosure provides a random access method, a terminal, and a network device. The random access method of the present disclosure comprises: receiving configuration information concerning a currently activated downlink bandwidth part (BWP) or a serving cell; detecting a random access response (RAR) in a random access procedure according to the configuration of a control resource set (CORESET) in the configuration information of the currently activated downlink BWP or the configuration information of the serving cell.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation application of InternationalApplication No. PCT/CN2019/085106 filed on Apr. 30, 2019, which claimspriority of Chinese Patent Application No. 201810444829.9 filed in Chinaon May 10, 2018, both of which are incorporated herein by reference intheir entireties.

TECHNICAL FIELD

The present disclosure relates to the field of communicationapplications technologies, and in particular, to a random access method,a terminal, and a network device.

BACKGROUND

5G New Radio (New Radio) supports a maximum system bandwidth of 400 MHz,which is far greater than a maximum system bandwidth of 20 MHz in LongTerm Evolution (Long Term Evolution, LTE), to support greater system anduser throughput.

However, supporting such a large system bandwidth will be a hugechallenge for implementing user equipment (User Equipment, UE) or aterminal, which is not conducive to implementation of low-cost UE. Inaddition, even if large-bandwidth UE is implemented, it is not necessaryto always work in large-bandwidth working mode, and only a part ofbandwidth may be opened to save power.

Therefore, the 5G NR system also supports dynamic and flexible bandwidthallocation, and the system bandwidth is divided into a plurality ofbandwidth parts (bandwidth part, BWP), to support access of narrow-bandterminals or terminals in energy-saving mode.

The 5G NR system supports working frequency bands of 6 GHz or more, andmay provide greater throughput for data transmission. A high frequencysignal has a shorter wavelength. Compared with a low frequency band,more antenna arrays can be arranged on a same-size panel, and abeamforming technology can be used to form a plurality of beams havinghigher directivity and narrower lobes. The 5G NR system sends broadcastsignals or system information to terminal users in a cell by using abeam scanning technology.

In the related technologies, both LTE and NR need to implement aplurality of objectives by supporting random access processes. In therelated technologies, objectives of random access discussed in the NRmay be as follows:

1. Support connecting an initial radio resource control idle UE (RRCidle UE) to a network.

2. RRC reconstruction.

3. Cell handover.

4. Downlink data arrives but uplink is out of step.

5. Uplink data arrives but downlink is out of step.

6. UE changes from an inactive state to an active state.

7. Support uplink synchronization acquisition of a serving cell (Scell).

8. Request for on-demand system information (on-demand SI).

9. Beam failure recovery.

In the related technologies, the random access process is divided into acontention based random access process and a contention free randomaccess process.

The contention based random access process includes four steps ofaccess: Message 1 to Message 4, and the contention free random accessprocess includes only two steps of access: Message 1 and Message 2.

Message 2 of either contention based random access or contention freerandom access is sending a random access response (Random AccessResponse, RAR). UE monitors, in a RAR window, a RAR corresponding to arandom access-radio network temporary identifier (RA-RNTI).

In the contention based random access, there is a problem that the UEmay send a same preamble to same physical random access (PRACH)resources. Therefore, after receiving Message 2, the UE further needs tosend Message 3 based on an uplink grant (UL grant) in Message 2. Inaddition, the UE may carry an identifier of the UE on Message 3, andstart a contention resolution timer simultaneously when sending Message3. Before the contention resolution timer times out, if the UE receivesMessage 4 sent by a base station, contention resolution by the UEsucceeds. The base station may carry the identifier of the UE in Message4. The UE can determine, based on the identifier of the UE carried inMessage 4, whether it is its own message, thereby determining whetherthe competition succeeds.

A synchronization signal block (SSB) is composed of a primarysynchronization signal (Primary synchronization signal, SSS), asecondary synchronization signal (Secondary synchronization signal,PSS), and a physical broadcast channel (Physical broadcast channel,PBCH), occupying four symbols in time domain, and 240 subcarriers (20PRBs) in total in frequency domain, where a master information block(master information block, MIB) message is carried in the PBCH. Amaximum quantity of SSB indexes is 64, and beam directions ofnon-overlapping SSBs in each time domain are different. Mainly used forinitial access, cell handover, beam management, and the like.

According to protocol regulations of the NR in the related technologies,a control resource set (CORESET) #0 is configured based on MIBinformation carried by the SSB and serving cell configuration (ServingCell Config Common) information.

A MIB includes 8 bits. A table specified in the protocol is selectedbased on the SSB and a subcarrier spacing of the CORESET #0. Each tableincludes indexes of 0-15, and 4 bits are used to indicate to select oneindex, which indicates a frequency domain length of the CORESET, afrequency domain location relative to the SSB, a time domain length, andthe like.

Another table specified in the protocol is selected based on amultiplexing parameter in the index indicated by the first 4 bits, FR 1or FR 2, a subcarrier spacing (subcarrier spacing, SCS), and asubcarrier spacing of a default control resource set (CORESET #0). Eachtable includes indexes of 0-15, and 4 bits are used to indicate toselect one index, which indicates a location of a first symbol in timedomain, other information, and the like.

For an active downlink bandwidth part (DL BWP), if a CORESETcorresponding to a RAR is not explicitly configured, behavior of the UEis unclear.

5G in the related technologies agrees that in the random access process,an uplink BWP on which Message 1 is sent and an active downlink BWP onwhich Message 2 is received need to have a same BWP number. If there isno corresponding CORESET #0 on the active downlink BWP, behavior of theUE is unclear.

In the foregoing two cases, when the behavior of the UE is unclear,communication may be interrupted.

SUMMARY

The present disclosure aims to provide a random access method, aterminal, and a network device, to resolve the problem that for anactive downlink BWP, when there is no explicitly configured CORESETcorresponding to a RAR or there is no corresponding CORESET #0, behaviorof UE is unclear.

According to a first aspect, an embodiment of the present disclosureprovides a random access method applied to a terminal, including:

receiving configuration information of a currently active downlinkbandwidth part BWP or a serving cell; and

monitoring a random access response RAR in a random access process basedon a configuration of a control resource set CORESET in theconfiguration information of the currently active downlink BWP or theserving cell.

According to a second aspect, an embodiment of the present disclosurefurther provides a random access method applied to a network device,including:

sending configuration information of a currently active downlinkbandwidth part BWP, where the configuration information of the currentlyactive downlink BWP includes a configuration of a control resource setCORESET.

According to a third aspect, an embodiment of the present disclosurefurther provides a terminal, including:

a receiving module, configured to receive configuration information of acurrently active downlink bandwidth part BWP or a serving cell; and

a monitoring module, configured to monitor a random access response RARin a random access process based on a configuration of a controlresource set CORESET in the configuration information of the currentlyactive downlink BWP or the serving cell.

According to a fourth aspect, an embodiment of the present disclosurefurther provides a terminal, including: a memory, a processor, and acomputer program stored in the memory and executable on the processor,where the computer program, when executed by the processor, implementsthe steps of the foregoing random access method applied to the terminal.

According to a fifth aspect, an embodiment of the present disclosurefurther provides a network device, including:

a fifth sending module, configured to send configuration information ofa currently active downlink bandwidth part BWP, where the configurationinformation of the currently active downlink BWP includes aconfiguration of a control resource set CORESET.

According to a sixth aspect, an embodiment of the present disclosurefurther provides a network device, including: a memory, a processor, anda computer program stored in the memory and executable on the processor,where the computer program, when executed by the processor, implementsthe step of the foregoing random access method applied to the networkdevice.

According to a seventh aspect, an embodiment of the present disclosurefurther provides a computer readable storage medium, where the computerreadable storage medium stores a computer program, and the computerprogram, when executed by the processor, implements the steps of theforegoing random access methods.

The embodiments of the present disclosure have the following beneficialeffects:

According to the foregoing technical solutions of the embodiments of thepresent disclosure, configuration information of a currently activedownlink bandwidth part BWP or a serving cell is received; and a randomaccess response RAR in a random access process is monitored based on aconfiguration of a control resource set CORESET in the configurationinformation of the currently active downlink BWP or the serving cell.Therefore, the problem that for an active downlink BWP, when there is noexplicitly configured CORESET corresponding to a RAR or there is nocorresponding CORESET 0, behavior of UE is unclear, is resolved.

BRIEF DESCRIPTION OF DRAWINGS

To describe the technical solutions in the embodiments of the presentdisclosure more clearly, the following briefly describes theaccompanying drawings required in the embodiments of the presentdisclosure. Apparently, the accompanying drawings in the followingdescriptions show merely some embodiments of the present disclosure, anda person of ordinary skill in the art may still derive other drawingsfrom these accompanying drawings without creative efforts.

FIG. 1 is a structural diagram of a network system to which anembodiment of the present disclosure can be applied;

FIG. 2 is a first schematic flowchart of a random access methodaccording to an embodiment of the present disclosure;

FIG. 3 is a second schematic flowchart of a random access methodaccording to an embodiment of the present disclosure;

FIG. 4 is a schematic diagram of modules of a terminal according to anembodiment of the present disclosure;

FIG. 5 is a first structural block diagram of a terminal according to anembodiment of the present disclosure;

FIG. 6 is a second structural block diagram of a terminal according toan embodiment of the present disclosure;

FIG. 7 is a schematic diagram of modules of a network device accordingto an embodiment of the present disclosure; and

FIG. 8 is a structural block diagram of a network device according to anembodiment of the present disclosure.

DESCRIPTION OF EMBODIMENTS

Exemplary embodiments of the present disclosure will be described belowin further detail with reference to the accompanying drawings. Althoughthe accompanying drawings show exemplary embodiments of the presentdisclosure, it should be understood that the present disclosure can beimplemented in various forms and shall not be limited by embodimentsdescribed herein. On the contrary, these embodiments are provided tohelp more thoroughly understand the present disclosure and entirelyconvey the scope of the present disclosure to those skilled in the art.

In the specification and claims of this application, the terms such as“first” and “second” are used for distinguishing similar objects, andare not necessarily used to describe a particular order or sequence. Itshould be understood that data used in such a way can be exchanged inproper situations, so that the embodiments of the present disclosuredescribed herein can be implemented in sequences other than thoseillustrated or described herein. In addition, the terms “comprise”,“include” and any variants thereof are intended to cover non-exclusiveinclusion. For example, a process, a method, a system, a product, or adevice that includes a series of steps or units are not necessarilylimited to those steps or units listed expressly, but instead mayinclude other steps or units not expressly listed or inherent to theprocess, the method, the system, the product, or the device. “And/or”used in the specification and claims means at least one of the connectedobjects.

The following description provides examples and does not limit thescope, applicability, or configuration set forth in the claims.Alterations may be made to functions and arrangements of the discussedelements without departing from the spirit and scope of the presentdisclosure. In various examples, various procedures or components may beomitted, replaced, or added appropriately. For example, the describedmethods can be performed in a different order than that described, andvarious steps can be added, omitted, or combined. In addition, featuresdescribed with reference to some examples may be combined in otherexamples.

Referring to FIG. 1, FIG. 1 is a structural diagram of a network systemto which an embodiment of the present disclosure can be applied. Asshown in FIG. 1, the network system includes a user terminal 11 and abase station 12, where the user terminal 11 may be user equipment (UserEquipment, UE), for example, may be a terminal side device such as amobile phone, a tablet computer, a laptop computer, a personal digitalassistant (personal digital assistant, PDA), a mobile Internet device(Mobile Internet Device, MID), or a wearable device. It should be notedthat a specific type of the user terminal 11 is not limited in thisembodiment of the present disclosure. The foregoing base station 12 maybe a base station of 5G or later releases (for example, a gNB or a 5G NRNB), or a base station in other communications systems, or referred toas a NodeB, an evolved NodeB, a transmitting receiving point(transmitting receiving point, TRP), or another term in the art.Provided that the same technical effects are achieved, the base stationis not limited to a specific technical term. It should be noted that inthe embodiments of the present disclosure, the 5G base station is merelyused as an example, but does not limit a specific type of the basestation 12.

FIG. 2 is a schematic flowchart of a random access method according toan embodiment of the present disclosure. As shown in FIG. 2, the randomaccess method provided in this embodiment of the present disclosure isapplied to a terminal and includes the following steps:

Step 201: Receive configuration information of a currently activedownlink bandwidth part BWP or a serving cell.

The configuration information of the currently active downlink bandwidthpart BWP includes a configuration of a CORESET.

Step 202: Monitor a random access response RAR in a random accessprocess based on a configuration of a control resource set CORESET inthe configuration information of the currently active downlink BWP orthe serving cell.

According to the random access method in this embodiment of the presentdisclosure, the configuration information of the currently activedownlink bandwidth part BWP or the serving cell is received; and therandom access response RAR in the random access process is monitoredbased on the configuration of the control resource set CORESET in theconfiguration information of the currently active downlink BWP or theserving cell. Therefore, the problem that for an active downlink BWP,when there is no explicitly configured CORESET corresponding to a RAR orthere is no corresponding CORESET 0, behavior of UE is unclear, isresolved.

As a first optional implementation, Step 202 includes:

when no CORESET is explicitly configured on the currently activedownlink BWP or the serving cell, monitoring the random access responseRAR in the random access process based on a configuration of a defaultCORESET 0; or

when a CORESET is configured on the currently active downlink BWP or theserving cell, monitoring the random access response RAR in the randomaccess process based on the configured CORESET.

In the first optional implementation, during a random access process forobjectives of switching, re-establishment, beam failure recovery,connection establishment, and the like, if CORESET is not explicitlyconfigured, in a RACH process, a RAR is monitored by falling CORESET toCORESET #0. The specific implementation includes the followingembodiments.

Embodiment 1

The foregoing step of monitoring the random access response RAR in therandom access process based on a configuration of a default CORESET 0includes: when the default CORESET 0 is configured on the currentlyactive downlink BWP or the serving cell, monitoring the RAR in therandom access process by directly falling back to the default CORESET 0of the currently active downlink BWP or the serving cell.

Embodiment 2

The foregoing step of monitoring the random access response RAR in therandom access process based on a configuration of a default CORESET 0includes:

when the default CORESET 0 is not configured on the currently activedownlink BWP or the serving cell, falling back to a first downlink BWP,and monitoring the RAR in the random access process on a default CORESET0 on the first downlink BWP; or

when the default CORESET 0 is configured on the currently activedownlink BWP or the serving cell, falling back to a first downlink BWP,and monitoring the RAR in the random access process on a default CORESET0 on the first downlink BWP, where

the first downlink BWP is a specific BWP, and the first downlink BWPincludes: an initial downlink BWP, or a non-initial downlink BWPconfigured with a default CORESET.

Further, before the falling back to a first downlink BWP, the methodfurther includes:

sending a preamble on a currently active uplink bandwidth part BWP.

Further, after the falling back to a first downlink BWP, the methodfurther includes:

sending a preamble on an uplink bandwidth part BWP corresponding to thefirst downlink BWP.

Further, the random access method in this embodiment of the presentdisclosure further includes:

when a random access attempt fails, sending the preamble on the activeuplink BWP or on the uplink BWP corresponding to the first downlink BWP.

Embodiment 2 includes the following two specific solutions.

Solution 1: When the default CORESET 0 is not configured on thecurrently active downlink BWP or the serving cell, fall back to adefault CORESET 0 on a specific BWP (the first downlink BWP), and usethe default CORESET 0 on the specific BWP.

Further, before falling back to the specific BWP, UE sends a preamble ona currently active uplink bandwidth part BWP.

The UE monitors the RAR in the random access process on the defaultCORESET 0 of the specific BWP.

If this random access attempt fails, a subsequent preamble is sent onthe active uplink BWP or on an uplink BWP corresponding to the specificdownlink BWP.

Solution 2: When the default CORESET 0 is not configured on thecurrently active downlink BWP or the serving cell, fall back to adefault CORESET 0 on a specific BWP (the first downlink BWP), and usethe default CORESET 0 on the specific BWP.

Further, before falling back to the specific BWP, UE does not send apreamble on a currently active uplink bandwidth part BWP, but send thepreamble after falling back to the specific BWP.

The UE monitors the RAR in the random access process on the defaultCORESET 0 of the specific BWP.

If the default CORESET 0 is configured on the currently active downlinkBWP or the serving cell, perform the methods the same as that inSolution 1 and Solution 2.

Further, after the falling back to a first downlink BWP, the methodfurther includes:

resetting at least one of a preamble transmission counter or a powerramping counter.

For the foregoing Solution 1 and Solution 2, after falling back to thespecific BWP, the UE reset at least one of a preamble transmissioncounter or a power ramping counter.

Further, in the foregoing first optional implementation, the randomaccess process includes: contention free random access CFRA andcontention based random access CBRA, and specifically includes: fallingback from contention free random access CFRA to contention free randomaccess CFRA on the first downlink BWP; or falling back from contentionfree random access CFRA to contention based random access CBRA on thefirst downlink BWP.

The foregoing falling back to a first downlink BWP includes:

falling back from contention free random access CFRA to contention freerandom access CFRA on the first downlink BWP; or

falling back from contention free random access CFRA to contention basedrandom access CBRA on the first downlink BWP.

As a second optional implementation, the foregoing Step 202 includes:when no control resource set CORESET or default control resource setCORESET corresponding to contention free random access CFRA isconfigured on the currently active downlink BWP or the serving cell,monitoring the RAR by falling back to a default CORESET 0 of a seconddownlink BWP; or

when no control resource set CORESET or default CORESET corresponding tocontention based random access CBRA is configured on the currentlyactive downlink BWP or the serving cell, monitoring the RAR by fallingback to a default CORESET 0 of a third downlink BWP; or

when no control resource set CORESET or default control resource setCORESET corresponding to contention free random access CFRA isconfigured on the currently active downlink BWP or the serving cell, buta control resource set CORESET or default CORESET corresponding tocontention based random access CBRA is configured on the currentlyactive downlink BWP, monitoring the RAR by falling back to the controlresource set CORESET or the default CORESET 0 of the CBRA on thecurrently active downlink BWP; or

when no control resource set CORESET or default control resource setCORESET corresponding to contention based random access CBRA isconfigured on the currently active downlink BWP or the serving cell, buta control resource set CORESET or default CORESET corresponding tocontention free random access CFRA is configured on the currently activedownlink BWP, monitoring the RAR by falling back to the control resourceset CORESET or the default CORESET 0 of the CFRA on the currently activedownlink BWP, where

the second downlink BWP or the third downlink BWP includes: an initialdownlink BWP, or a non-initial downlink BWP configured with a defaultCORESET, or a BWP configured with a control resource set CORESET ordefault CORESET corresponding to the CBRA or the CFRA.

As a third optional implementation, before the foregoing Step 202, themethod further includes: when the currently active downlink BWP overlapsa fourth BWP, sending a random access preamble by using a public randomaccess configuration broadcast on the fourth BWP or using resources of apublic random access configuration configured by dedicated radioresource control RRC signaling, where

the fourth BWP includes: an initial downlink BWP, or a BWP overlappingthe currently active downlink BWP.

In the third optional implementation, by reusing the public randomaccess configuration of the overlapping BWP, RRC signaling overheads arereduced.

According to the random access method in this embodiment of the presentdisclosure, the configuration information of the currently activedownlink bandwidth part BWP or the serving cell is received; and therandom access response RAR in the random access process is monitoredbased on the configuration of the control resource set CORESET in theconfiguration information of the currently active downlink BWP or theserving cell. Therefore, the problem that for an active downlink BWP,when there is no explicitly configured CORESET corresponding to a RAR orthere is no corresponding CORESET 0, behavior of UE is unclear, isresolved.

As shown in FIG. 3, an embodiment of the present disclosure furtherprovides a random access method applied to a network device. The methodincludes the following step.

Step 301: Send configuration information of a currently active downlinkbandwidth part BWP or a serving cell, where the configurationinformation of the currently active downlink BWP or the serving cellincludes a configuration of a control resource set CORESET.

Further, after the sending configuration information of a currentlyactive downlink bandwidth part BWP or a serving cell, the method furtherincludes:

sending a random access response RAR in a random access process.

According to the random access method in this embodiment of the presentdisclosure, the configuration information of the currently activedownlink bandwidth part BWP or the serving cell is sent to a terminal,so that the terminal monitors the random access response RAR in therandom access process based on a configuration of a CORESET in theconfiguration information of the currently active downlink BWP or theserving cell. Therefore, the problem that for an active downlink BWP,when there is no explicitly configured CORESET corresponding to an RARor there is no corresponding CORESET #0, behavior of UE is unclear, isresolved.

FIG. 4 is a schematic diagram of modules of a terminal according to anembodiment of the present disclosure. As shown in FIG. 4, the terminal400 provided in this embodiment of the present disclosure includes:

a receiving module 401, configured to receive configuration informationof a currently active downlink bandwidth part BWP or a serving cell; and

a monitoring module 402, configured to monitor a random access responseRAR in a random access process based on a configuration of a controlresource set CORESET in the configuration information of the currentlyactive downlink BWP or the serving cell.

According to the terminal in this embodiment of the present disclosure,the monitoring module 402 is configured to: when no CORESET isexplicitly configured on the currently active downlink BWP or theserving cell, monitor the random access response RAR in the randomaccess process based on a configuration of a default CORESET 0; or

when a CORESET is configured on the currently active downlink BWP or theserving cell, monitor the random access response RAR in the randomaccess process based on the configured CORESET.

According to the terminal in this embodiment of the present disclosure,the monitoring module 402 is configured to: when the default CORESET 0is configured on the currently active downlink BWP or the serving cell,monitor the RAR in the random access process by directly falling back tothe default CORESET 0 of the currently active downlink BWP or theserving cell.

According to the terminal in this embodiment of the present disclosure,the monitoring module 402 is configured to: when the default CORESET 0is not configured on the currently active downlink BWP or the servingcell, fall back to a first downlink BWP, and monitor the RAR in therandom access process on a default CORESET 0 on the first downlink BWP;or

when the default CORESET 0 is configured on the currently activedownlink BWP or the serving cell, fall back to a first downlink BWP, andmonitor the RAR in the random access process on a default CORESET 0 onthe first downlink BWP, where

the first downlink BWP includes: an initial downlink BWP, or anon-initial downlink BWP configured with a default CORESET.

The terminal in this embodiment of the present disclosure furtherincludes:

a first sending module, configured to, before falling back to the firstdownlink BWP, send a preamble on a currently active uplink bandwidthpart BWP.

The terminal in this embodiment of the present disclosure furtherincludes:

a second sending module, configured to: after falling back to the firstdownlink BWP, send a preamble on an uplink bandwidth part BWPcorresponding to the first downlink BWP.

The terminal in this embodiment of the present disclosure furtherincludes:

a third sending module, configured to: when a random access attemptfails, send the preamble on the active uplink BWP or on the uplink BWPcorresponding to the first downlink BWP.

The terminal in this embodiment of the present disclosure furtherincludes:

a resetting module, configured to: after falling back to the firstdownlink BWP, reset at least one of a preamble transmission counter or apower ramping counter.

According to the terminal in this embodiment of the present disclosure,the monitoring module includes:

a fallback submodule, configured to: fall back from contention freerandom access CFRA to contention free random access CFRA on the firstdownlink BWP; or

fall back from contention free random access CFRA to contention basedrandom access CBRA on the first downlink BWP.

According to the terminal in this embodiment of the present disclosure,the monitoring module 402 is configured to: when no control resource setCORESET or default control resource set CORESET corresponding tocontention free random access CFRA is configured on the currently activedownlink BWP or the serving cell, monitor the RAR by falling back to adefault CORESET 0 of a second downlink BWP; or

when no control resource set CORESET or default CORESET corresponding tocontention based random access CBRA is configured on the currentlyactive downlink BWP or the serving cell, monitor the RAR by falling backto a default CORESET 0 of a third downlink BWP; or

when no control resource set CORESET or default control resource setCORESET corresponding to contention free random access CFRA isconfigured on the currently active downlink BWP or the serving cell, buta control resource set CORESET or default CORESET corresponding tocontention based random access CBRA is configured on the currentlyactive downlink BWP, monitor the RAR by falling back to the controlresource set CORESET or the default CORESET 0 of the CBRA on thecurrently active downlink BWP; or

when no control resource set CORESET or default control resource setCORESET corresponding to contention based random access CBRA isconfigured on the currently active downlink BWP or the serving cell, buta control resource set CORESET or default CORESET corresponding tocontention free random access CFRA is configured on the currently activedownlink BWP, monitor the RAR by falling back to the control resourceset CORESET or the default CORESET 0 of the CFRA on the currently activedownlink BWP, where

the second downlink BWP or the third downlink BWP includes: an initialdownlink BWP, or a non-initial downlink BWP configured with a defaultCORESET, or a BWP configured with a control resource set CORESET ordefault CORESET corresponding to the CBRA or the CFRA.

The terminal in this embodiment of the present disclosure furtherincludes:

a fourth sending module, configured to: when the currently activedownlink BWP overlaps a fourth BWP, send a random access preamble byusing a public random access configuration broadcast on the fourth BWPor using resources of a public random access configuration configured bydedicated radio resource control RRC signaling, where

the fourth BWP includes: an initial downlink BWP, or a BWP overlappingthe currently active downlink BWP.

According to the terminal in this embodiment of the present disclosure,the configuration information of the currently active downlink bandwidthpart BWP or the serving cell is received; and the random access responseRAR in the random access process is monitored based on the configurationof the control resource set CORESET in the configuration information ofthe currently active downlink BWP or the configuration information ofthe serving cell. Therefore, the problem that for an active downlinkBWP, when there is no explicitly configured CORESET corresponding to aRAR or there is no corresponding CORESET 0, behavior of UE is unclear,is resolved.

An embodiment of the present disclosure further provides a terminal,including: a memory, a processor, and a computer program stored in thememory and executable on the processor, where the computer program, whenexecuted by the processor, implements the processes of the foregoingembodiments of the random access method applied to the terminal, and thesame technical effects can be achieved. To avoid repetition, details arenot described herein again.

An embodiment of the present disclosure further provides a computerreadable storage medium, where the computer readable storage mediumstores a computer program, the computer program, when executed by theprocessor, implements the processes of the foregoing embodiments of therandom access method applied to the terminal, and the same technicaleffects can be achieved. To avoid repetition, details are not describedherein again. The computer readable storage medium may be a read-onlymemory (Read-Only Memory, ROM), a random access memory (Random AccessMemory, RAM), a magnetic disk, a compact disc, or the like.

To better achieve the foregoing objectives, as shown in FIG. 5, anembodiment of the present disclosure further provides a terminal,including a memory 520, a processor 500, a transceiver 510, a userinterface 530, a bus interface, and a computer program stored in thememory 520 and executable on the processor 500, where the processor 500is configured to read the program in the memory 520 to perform thefollowing processes:

receiving configuration information of a currently active downlinkbandwidth part BWP or a serving cell; and

monitoring a random access response RAR in a random access process basedon a configuration of a control resource set CORESET in theconfiguration information of the currently active downlink BWP or theconfiguration information of the serving cell.

In FIG. 5, a bus architecture may include any quantity of interconnectedbuses and bridges, which are specifically connected together by one ormore processors represented by the processor 500 and various circuits ofa memory represented by the memory 520. The bus architecture may furtherconnect together various other circuits of a peripheral device, avoltage stabilizer, a power management circuit, and the like, which areknown in this art and will not be further described herein. The businterface provides an interface. The transceiver 510 may include aplurality of elements, that is, include a transmitter and a receiver,and provide units for communication with various other apparatuses on atransmission medium. For different user equipment, the user interface530 may alternatively be an interface for externally and internallyconnecting required equipment. The connected equipment includes but isnot limited to a keypad, a display, a speaker, a microphone, a joystick,and the like.

The processor 500 is responsible for management of the bus architectureand general processing. The memory 520 may store data used by theprocessor 500 when operations are performed.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following processes:

when no CORESET is explicitly configured on the currently activedownlink BWP or the serving cell, monitoring the random access responseRAR in the random access process based on a configuration of a defaultCORESET 0; or

when a CORESET is configured on the currently active downlink BWP or theserving cell, monitoring the random access response RAR in the randomaccess process based on the configured CORESET.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following process:

when the default CORESET 0 is configured on the currently activedownlink BWP or the serving cell, monitoring the RAR in the randomaccess process by directly falling back to the default CORESET 0 of thecurrently active downlink BWP or the serving cell.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following processes:

when the default CORESET 0 is not configured on the currently activedownlink BWP or the serving cell, falling back to a first downlink BWP,and monitoring the RAR in the random access process on a default CORESET0 on the first downlink BWP; or

when the default CORESET 0 is configured on the currently activedownlink BWP or the serving cell, falling back to a first downlink BWP,and monitoring the RAR in the random access process on a default CORESET0 on the first downlink BWP, where

the first downlink BWP includes: an initial downlink BWP, or anon-initial downlink BWP configured with a default CORESET.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following process:

sending a preamble on a currently active uplink bandwidth part BWP.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following process:

sending a preamble on an uplink bandwidth part BWP corresponding to thefirst downlink BWP.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following process:

when a random access attempt fails, sending the preamble on the activeuplink BWP or on the uplink BWP corresponding to the first downlink BWP.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following process:

resetting at least one of a preamble transmission counter or a powerramping counter.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following processes:

falling back from contention free random access CFRA to contention freerandom access CFRA on the first downlink BWP; or

falling back from contention free random access CFRA to contention basedrandom access CBRA on the first downlink BWP.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following processes:

when no control resource set CORESET or default control resource setCORESET corresponding to contention free random access CFRA isconfigured on the currently active downlink BWP or the serving cell,monitoring the RAR by falling back to a default CORESET 0 of a seconddownlink BWP; or

when no control resource set CORESET or default CORESET corresponding tocontention based random access CBRA is configured on the currentlyactive downlink BWP or the serving cell, monitoring the RAR by fallingback to a default CORESET 0 of a third downlink BWP; or

when no control resource set CORESET or default control resource setCORESET corresponding to contention free random access CFRA isconfigured on the currently active downlink BWP or the serving cell, buta control resource set CORESET or default CORESET corresponding tocontention based random access CBRA is configured on the currentlyactive downlink BWP, monitoring the RAR by falling back to the controlresource set CORESET or the default CORESET 0 of the CBRA on thecurrently active downlink BWP; or

when no control resource set CORESET or default control resource setCORESET corresponding to contention based random access CBRA isconfigured on the currently active downlink BWP or the serving cell, buta control resource set CORESET or default CORESET corresponding tocontention free random access CFRA is configured on the currently activedownlink BWP, monitoring the RAR by falling back to the control resourceset CORESET or the default CORESET 0 of the CFRA on the currently activedownlink BWP, where

the second downlink BWP or the third downlink BWP includes: an initialdownlink BWP, or a non-initial downlink BWP configured with a defaultCORESET, or a BWP configured with a control resource set CORESET ordefault CORESET corresponding to the CBRA or the CFRA.

Optionally, the processor 500 reads the program in the memory 520 tofurther perform the following process:

when the currently active downlink BWP overlaps a fourth BWP, sending arandom access preamble by using a public random access configurationbroadcast on the fourth BWP or using resources of a public random accessconfiguration configured by dedicated radio resource control RRCsignaling, where

the fourth BWP includes: an initial downlink BWP, or a BWP overlappingthe currently active downlink BWP.

FIG. 6 is a schematic structural diagram of hardware of a terminalimplementing embodiments of the present disclosure. The terminal 600includes but is not limited to: a radio frequency unit 601, a networkmodule 602, an audio output unit 603, an input unit 604, a sensor 605, adisplay unit 606, a user input unit 607, an interface unit 608, a memory609, a processor 610, a power supply 611, and other components. A personskilled in the art may understand that the structure of the terminalshown in FIG. 6 does not constitute a limitation to the terminal. Theterminal may include more or fewer components than that shown in thefigure, or a combination of some components, or an arrangement ofdifferent components. In this embodiment of the present disclosure, theterminal includes but is not limited to a mobile phone, a tabletcomputer, a notebook computer, a palmtop computer, a vehicle-mountedterminal, a wearable device, a pedometer, or the like.

The processor 610 is configured to: receive configuration information ofa currently active downlink bandwidth part BWP or a serving cell; andmonitor a random access response RAR in a random access process based ona configuration of a control resource set CORESET in the configurationinformation of the currently active downlink BWP or the configurationinformation of the serving cell.

According to the foregoing technical solution in this embodiment of thepresent disclosure, the configuration information of the currentlyactive downlink bandwidth part BWP or the serving cell is received; andthe random access response RAR in the random access process is monitoredbased on the configuration of the control resource set CORESET in theconfiguration information of the currently active downlink BWP or theconfiguration information of the serving cell. Therefore, the problemthat for an active downlink BWP, when there is no explicitly configuredCORESET corresponding to a RAR or there is no corresponding CORESET 0,behavior of UE is unclear, is resolved.

It should be understood that, in this embodiment of the presentdisclosure, the radio frequency unit 601 can be configured to receiveand transmit information, or receive and transmit signals during a call.Specifically, the radio frequency unit 601 receives downlink data from anetwork device, and transmits the downlink data to the processor 610 forprocessing; and in addition, transmits uplink data to the networkdevice. Generally, the radio frequency unit 601 includes but is notlimited to an antenna, at least one amplifier, a transceiver, a coupler,a low noise amplifier, a duplexer, and the like. In addition, the radiofrequency unit 601 can also communicate with another device through awireless communications system and network.

The terminal provides a user with wireless broadband Internet accessthrough the network module 602, for example, helps the user send andreceive emails, browse web pages, and access streaming media.

The audio output unit 603 can convert audio data received by the radiofrequency unit 601 or the network module 602 or stored in the memory 609into an audio signal, and output the audio signal into sound. Inaddition, the audio output unit 603 can also provide audio outputrelated to a specific function performed by the terminal 600 (forexample, call signal receiving sound or message receiving sound). Theaudio output unit 603 includes a speaker, a buzzer, a receiver, and thelike.

The input unit 604 is configured to receive an audio signal or a videosignal. The input unit 604 may include a graphics processing unit(Graphics Processing Unit, GPU) 6041 and a microphone 6042. The graphicsprocessing unit 6041 is configured to process image data of a staticpicture or a video obtained by an image capture apparatus (for example,a camera) in video capture mode or image capture mode. A processed imageframe can be displayed on the display unit 606. The image frameprocessed by the graphics processing unit 6041 can be stored in thememory 609 (or another storage medium) or sent via the radio frequencyunit 601 or the network module 602. The microphone 6042 can receivesound and can process such sound into audio data. Processed audio datacan be converted, in telephone call mode, into a format that can be sentto a mobile communication network device via the radio frequency unit601 for output.

The terminal 600 further includes at least one sensor 605, such as alight sensor, a motion sensor, and other sensors. Specifically, thelight sensor includes an ambient light sensor and a proximity sensor,where the ambient light sensor can adjust brightness of the displaypanel 6061 based on brightness of ambient light, and the proximitysensor can turn off the display panel 6061 and/or backlight when theterminal 600 moves towards the ear. As a motion sensor, an accelerometersensor can detect magnitude of acceleration in various directions(usually three axes), can detect magnitude and the direction of gravitywhen stationary, can be configured to identify terminal postures (suchas horizontal and vertical screen switch, related games, andmagnetometer posture calibration), can perform functions related tovibration identification (such as a pedometer and a knock), and thelike. The sensor 605 may further include a fingerprint sensor, apressure sensor, an iris sensor, a molecular sensor, a gyroscope, abarometer, a hygrometer, a thermometer, an infrared sensor, or the like.Details are not described herein.

The display unit 606 is configured to display information input by theuser or information provided to the user. The display unit 606 mayinclude the display panel 6061, and the display panel 6061 may beconfigured in a form of a liquid crystal display (Liquid CrystalDisplay, LCD), an organic light-emitting diode (Organic Light-EmittingDiode, OLED), or the like.

The user input unit 607 can be configured to receive input numeric orcharacter information, and generate key signal inputs related to usersettings and function control of the terminal. Specifically, the userinput unit 607 includes a touch panel 6071 and another input device6072. The touch panel 6071, also called a touch screen, can collect atouch operation of the user on or near the touch panel 6071 (Forexample, the user uses any suitable object or accessory such as a fingeror a stylus to operate on or near the touch panel 6071). The touch panel6071 may include two parts: a touch detection apparatus and a touchcontroller. The touch detection apparatus detects a touch position ofthe user, detects a signal brought by the touch operation, and transmitsthe signal to the touch controller. The touch controller receives touchinformation from the touch detection apparatus, converts the touchinformation into contact coordinates, transmits the contact coordinatesto the processor 610, receives a command sent by the processor 610, andexecutes the command In addition, the touch panel 6071 can beimplemented in various types such as resistive, capacitive, infrared,and surface acoustic wave. In addition to the touch panel 6071, the userinput unit 607 may further include the another input device 6072.Specifically, the another input device 6072 may include but is notlimited to a physical keyboard, function keys (such as a volume controlkey and a switch key), a trackball, a mouse, and a joystick. Details arenot described herein.

Further, the touch panel 6071 can cover the display panel 6061. Whendetecting a touch operation on or near the touch panel 6071, the touchpanel 6071 transmits the touch operation to the processor 610 todetermine a type of a touch event. Then the processor 610 providescorresponding visual output on the display panel 6061 based on the typeof the touch event. Although in FIG. 6, the touch panel 6071 and thedisplay panel 6061 are configured as two independent components toimplement input and output functions of the terminal, in someembodiments, the touch panel 6071 and the display panel 6061 can beintegrated to implement the input and output functions of the terminal.Details are not limited herein.

The interface unit 608 is an interface for connecting an externalapparatus to the terminal 600. For example, the external apparatus mayinclude a wired or wireless headphone port, an external power supply (ora battery charger) port, a wired or wireless data port, a storage cardport, a port for connecting an apparatus having an identificationmodule, an audio input/output (I/O) port, a video I/O port, a headphoneport, or the like. The interface unit 608 can be configured to receivean input (for example, data information and power) from the externalapparatus and transmit the received input to one or more elements in theterminal 600, or transmit data between the terminal 600 and the externalapparatus.

The memory 609 may be configured to store software programs and variousdata. The memory 609 may mainly include a program storage area and adata storage area. The program storage area may store an operatingsystem, an application program required by at least one function (suchas a sound playback function and an image playback function), and thelike. The data storage area may store data (such as audio data and aphone book) created based on use of the mobile phone, and the like. Inaddition, the memory 609 may include a high-speed random access memoryor a nonvolatile memory, for example, at least one disk storage device,a flash memory, or another volatile solid-state storage device.

The processor 610 is a control center of the terminal, connects variousparts of the entire terminal by using various interfaces and circuits,and performs various functions of the terminal and processes data byrunning or executing software programs and/or modules stored in thememory 609 and invoking data stored in the memory 609, so as to monitorthe terminal as a whole. The processor 610 may include one or moreprocessing units. Optionally, the processor 610 may integrate anapplication processor with a modem processor. The application processormainly processes the operating system, a user interface, the applicationprogram, and the like, and the modem processor mainly processes wirelesscommunication. It may be understood that the foregoing modem processormay not be integrated into the processor 610.

The terminal 600 may further include the power supply 611 (for example,a battery) configured to supply power to various components. Optionally,the power supply 611 may be logically connected to the processor 610through a power management system, so as to implement functions such asmanaging charging, discharging, and power consumption through the powermanagement system.

In addition, the terminal 600 includes some function modules not shown.Details are not described herein.

As shown in FIG. 7, an embodiment of the present disclosure furtherprovides a network device 700, including:

a fifth sending module 701, configured to send configuration informationof a currently active downlink bandwidth part BWP or a serving cell,where the configuration information of the currently active downlink BWPor the serving cell includes a configuration of a control resource setCORESET.

The network device in this embodiment of the present disclosure furtherincludes:

a sixth sending module, configured to send a random access response RARin a random access process.

According to the network device in this embodiment of the presentdisclosure, the configuration information of the currently activedownlink bandwidth part BWP or the serving cell is sent to a terminal,so that the terminal monitors the random access response RAR in therandom access process based on a configuration of a CORESET in theconfiguration information of the currently active downlink BWP or theserving cell. Therefore, the problem that for an active downlink BWP,when there is no explicitly configured CORESET corresponding to an RARor there is no corresponding CORESET #0, behavior of UE is unclear, isresolved.

An embodiment of the present disclosure further provides a networkdevice, including: a memory, a processor, and a computer program storedin the memory and executable on the processor, where the computerprogram, when executed by the processor, implements the processes of theforegoing method embodiment of the random access method applied to thenetwork device, and the same technical effects can be achieved. To avoidrepetition, details are not described herein again.

An embodiment of the present disclosure further provides a computerreadable storage medium, where the computer readable storage mediumstores a computer program, the computer program, when executed by theprocessor, implements the processes of the foregoing method embodimentof the random access method applied to the network device, and the sametechnical effects can be achieved. To avoid repetition, details are notdescribed herein again. The computer readable storage medium may be aread-only memory (Read-Only Memory, ROM), a random access memory (RandomAccess Memory, RAM), a magnetic disk, a compact disc, or the like.

As shown in FIG. 8, an embodiment of the present disclosure furtherprovides a network device 800, including a processor 801, a transceiver802, a memory 803, and a bus interface.

The processor 801 is configured to read a program in the memory 803 toperform the following process:

sending configuration information of a currently active downlinkbandwidth part BWP or a serving cell, where the configurationinformation of the currently active downlink BWP or the serving cellincludes a configuration of a control resource set CORESET.

In FIG. 8, a bus architecture may include any quantity of interconnectedbuses and bridges, which are specifically connected together by one ormore processors represented by the processor 801 and various circuits ofa memory represented by the memory 803. The bus architecture may furtherconnect together various other circuits of a peripheral device, avoltage stabilizer, a power management circuit, and the like, which areknown in this art and will not be further described herein. The businterface provides an interface. The transceiver 802 may include aplurality of elements, that is, include a transmitter and a receiver,and provide units for communication with various other apparatuses on atransmission medium.

The processor 801 is responsible for management of the bus architectureand general processing. The memory 803 may store data used by theprocessor 801 when operations are performed.

Optionally, the processor 801 reads the program in the memory 803 tofurther perform the following process:

sending a random access response RAR in a random access process.

It should be noted that in this specification, the terms “comprise”,“include” and any other variants thereof are intended to covernon-exclusive inclusion, so that a process, a method, an article, or anapparatus that includes a series of elements not only includes thesevery elements, but may also include other elements not expressly listed,or also include elements inherent to this process, method, article, orapparatus. Without being subject to further limitations, an elementdefined by a phrase “including a” does not exclude presence of otheridentical elements in the process, method, article, or apparatus thatincludes the very element.

By means of the foregoing description of the embodiments, a personskilled in the art may clearly understand that the method in theforegoing embodiments may be implemented by software with a necessarygeneral hardware platform. Certainly, the method in the foregoingembodiments may also be implemented by hardware. However, in many cases,the former is a preferred embodiment. Based on such an understanding,the technical solutions of the present disclosure essentially, or thepart contributing to the related technologies may be implemented in aform of a computer software product. The computer software product isstored in a storage medium (for example, a ROM/RAM, a magnetic disk, ora compact disc), and includes a plurality of instructions forinstructing a terminal (which may be a mobile phone, a computer, aserver, an air conditioner, a network device, or the like) to performthe method described in the embodiments of the present disclosure.

The embodiments of the present disclosure are described above withreference to the accompanying drawings, but the present disclosure isnot limited to the foregoing specific implementations. The foregoingspecific implementations are merely schematic instead of restrictive.Under enlightenment of the present disclosure, a person of ordinaryskills in the art may make many forms without departing from theprotection scope of aims of the present disclosure and claims, all ofwhich fall within the protection of the present disclosure.

The invention claimed is:
 1. A random access method applied to aterminal, comprising: receiving configuration information of a currentlyactive downlink bandwidth part BWP or a serving cell; and monitoring arandom access response RAR in a random access process based on aconfiguration of a control resource set CORESET in the configurationinformation of the currently active downlink BWP or the configurationinformation of the serving cell; wherein the step of monitoring a randomaccess response RAR in a random access process based on a configurationof a control resource set CORESET in the configuration information ofthe currently active downlink BWP or the configuration information ofthe serving cell comprises: monitoring the random access response RAR inthe random access process based on a configuration of a default CORESET0 in a case that no CORESET is explicitly configured on the currentlyactive downlink BWP or the serving cell.
 2. The random access methodaccording to claim 1, wherein the step of monitoring the random accessresponse RAR in the random access process based on a configuration of adefault CORESET 0 comprises: when the default CORESET 0 is configured onthe currently active downlink BWP or the serving cell, monitoring theRAR in the random access process by directly falling back to the defaultCORESET 0 of the currently active downlink BWP or the serving cell. 3.The random access method according to claim 1, wherein the step ofmonitoring the random access response RAR in the random access processbased on a configuration of a default CORESET 0 comprises: when thedefault CORESET 0 is not configured on the currently active downlink BWPor the serving cell, falling back to a first downlink BWP, andmonitoring the RAR in the random access process on a default CORESET 0on the first downlink BWP; or when the default CORESET 0 is configuredon the currently active downlink BWP or the serving cell, falling backto a first downlink BWP, and monitoring the RAR in the random accessprocess on a default CORESET 0 on the first downlink BWP, wherein thefirst downlink BWP comprises: an initial downlink BWP, or a non-initialdownlink BWP configured with a default CORESET.
 4. The random accessmethod according to claim 3, wherein before the falling back to a firstdownlink BWP, the method further comprises: sending a preamble on acurrently active uplink bandwidth part BWP.
 5. The random access methodaccording to claim 3, wherein after the falling back to a first downlinkBWP, the method further comprises: sending a preamble on an uplinkbandwidth part BWP corresponding to the first downlink BWP.
 6. Therandom access method according to claim 4, further comprising: when arandom access attempt fails, sending the preamble on the active uplinkBWP or on the uplink BWP corresponding to the first downlink BWP.
 7. Therandom access method according to claim 3, wherein after the fallingback to a first downlink BWP, the method further comprises: resetting atleast one of a preamble transmission counter or a power ramping counter.8. The random access method according to claim 3, wherein the fallingback to a first downlink BWP comprises: falling back from contentionfree random access CFRA on the currently active downlink BWP tocontention free random access CFRA on the first downlink BWP; or fallingback from contention free random access CFRA on the currently activedownlink BWP to contention based random access CBRA on the firstdownlink BWP.
 9. The random access method according to claim 1, whereinthe step of monitoring a random access response RAR in a random accessprocess based on a configuration of a control resource set CORESET inthe configuration information of the currently active downlink BWP orthe configuration information of the serving cell comprises: when nocontrol resource set CORESET or default control resource set CORESETcorresponding to contention free random access CFRA is configured on thecurrently active downlink BWP or the serving cell, monitoring the RAR byfalling back to a default CORESET 0 of a second downlink BWP; or when nocontrol resource set CORESET or default CORESET corresponding tocontention based random access CBRA is configured on the currentlyactive downlink BWP or the serving cell, monitoring the RAR by fallingback to a default CORESET 0 of a third downlink BWP; or when no controlresource set CORESET or default control resource set CORESETcorresponding to contention free random access CFRA is configured on thecurrently active downlink BWP or the serving cell, but a controlresource set CORESET or default CORESET corresponding to contentionbased random access CBRA is configured on the currently active downlinkBWP, monitoring the RAR by falling back to the control resource setCORESET or the default CORESET 0 of the CBRA on the currently activedownlink BWP; or when no control resource set CORESET or default controlresource set CORESET corresponding to contention based random accessCBRA is configured on the currently active downlink BWP or the servingcell, but a control resource set CORESET or default CORESETcorresponding to contention free random access CFRA is configured on thecurrently active downlink BWP, monitoring the RAR by falling back to thecontrol resource set CORESET or the default CORESET 0 of the CFRA on thecurrently active downlink BWP, wherein the second downlink BWP or thethird downlink BWP comprises: an initial downlink BWP, or a non-initialdownlink BWP configured with a default CORESET, or a BWP configured witha control resource set CORESET or default CORESET corresponding to theCBRA or the CFRA.
 10. The random access method according to claim 1,wherein before the step of monitoring a random access response RAR in arandom access process based on a configuration of a control resource setCORESET in the configuration information of the currently activedownlink BWP or the configuration information of the serving cell, themethod comprises: when the currently active downlink BWP overlaps afourth BWP, sending a random access preamble by using a public randomaccess configuration broadcast on the fourth BWP or using resources of apublic random access configuration configured by dedicated radioresource control RRC signaling, wherein the fourth BWP comprises: aninitial downlink BWP, or a BWP overlapping the currently active downlinkBWP.
 11. A terminal, comprising: a memory, a processor, and a computerprogram stored in the memory and executable on the processor, whereinthe computer program, when executed by the processor, implements thesteps in a random access method, the method comprising: receivingconfiguration information of a currently active downlink bandwidth partBWP or a serving cell; and monitoring a random access response RAR in arandom access process based on a configuration of a control resource setCORESET in the configuration information of the currently activedownlink BWP or the configuration information of the serving cell;wherein the step of monitoring a random access response RAR in a randomaccess process based on a configuration of a control resource setCORESET in the configuration information of the currently activedownlink BWP or the configuration information of the serving cellcomprises: monitoring the random access response RAR in the randomaccess process based on a configuration of a default CORESET 0 in a casethat no CORESET is explicitly configured on the currently activedownlink BWP or the serving cell.
 12. The terminal according to claim11, wherein in the random access method implemented by the computerprogram, the step of monitoring a random access response RAR in a randomaccess process based on a configuration of a control resource setCORESET in the configuration information of the currently activedownlink BWP or the configuration information of the serving cellcomprises: when no CORESET is explicitly configured on the currentlyactive downlink BWP or the serving cell, monitoring the random accessresponse RAR in the random access process based on a configuration of adefault CORESET 0; or when a CORESET is configured on the currentlyactive downlink BWP or the serving cell, monitoring the random accessresponse RAR in the random access process based on the configuredCORESET.
 13. The terminal according to claim 12, wherein in the randomaccess method implemented by the computer program, the step ofmonitoring the random access response RAR in the random access processbased on a configuration of a default CORESET 0 comprises: when thedefault CORESET 0 is configured on the currently active downlink BWP orthe serving cell, monitoring the RAR in the random access process bydirectly falling back to the default CORESET 0 of the currently activedownlink BWP or the serving cell.
 14. The terminal according to claim12, wherein in the random access method implemented by the computerprogram, the step of monitoring the random access response RAR in therandom access process based on a configuration of a default CORESET 0comprises: when the default CORESET 0 is not configured on the currentlyactive downlink BWP or the serving cell, falling back to a firstdownlink BWP, and monitoring the RAR in the random access process on adefault CORESET 0 on the first downlink BWP; or when the default CORESET0 is configured on the currently active downlink BWP or the servingcell, falling back to a first downlink BWP, and monitoring the RAR inthe random access process on a default CORESET 0 on the first downlinkBWP, wherein the first downlink BWP comprises: an initial downlink BWP,or a non-initial downlink BWP configured with a default CORESET.
 15. Theterminal according to claim 14, wherein in the random access methodimplemented by the computer program, before the falling back to a firstdownlink BWP, the method further comprises: sending a preamble on acurrently active uplink bandwidth part BWP.
 16. The terminal accordingto claim 14, wherein in the random access method implemented by thecomputer program, after the falling back to a first downlink BWP, themethod further comprises: sending a preamble on an uplink bandwidth partBWP corresponding to the first downlink BWP.
 17. The terminal accordingto claim 15, wherein in the random access method implemented by thecomputer program, after the falling back to a first downlink BWP, themethod further comprises: resetting at least one of a preambletransmission counter or a power ramping counter.
 18. A network device,comprising: a memory, a processor, and a computer program stored in thememory and executable on the processor, wherein the computer program,when executed by the processor, implements the steps in a random accessmethod, the method comprising: sending configuration information of acurrently active downlink bandwidth part BWP or a serving cell to aterminal, wherein the configuration information of the currently activedownlink BWP or the serving cell comprises a configuration of a controlresource set CORESET; and sending a random access response RAR in arandom access process to the terminal, to enable the terminal to monitorthe random access response RAR in the random access process based on aconfiguration of a default CORESET 0 in a case that no CORESET isexplicitly configured on the currently active downlink BWP or theserving cell.