The present disclosure relates to the field of communication technology and, more particularly, to a random access resource isolation method for radio access network slicing, a network equipment, a terminal device, an electronic device, and a non-transitory computer readable medium.
5G network slicing can provide differentiated services for users with different service requirements, meeting the needs of highly differentiated 5G vertical application scenarios.
At present, the standardization work item for RAN (Radio Access Network) slicing is being carried out, including the definition of RA (Random Access) mechanism based on RAN slicing. When defining the random access mechanism of RAN slicing, it is necessary to configure slice-based random access resources and common random access resources.
It is worth noting that the information disclosed in the background technology section above is only used to enhance the understanding of the background of the disclosure and therefore may include information that does not constitute prior art known to one skilled in the art.
The aim of the embodiments of the present disclosure is to provide a random access resource isolation method for radio access network slicing, a network equipment, a terminal device, an electronic device, and a non-transitory computer readable medium.
Other features and advantages of the present disclosure will become apparent through the detailed description below or will be partially learned through the practice of the present disclosure.
According to a first aspect of embodiments of the present disclosure, there is provided a random access resources isolation method for radio access network slicing, including: a terminal device receiving random access configuration information sent by a network equipment, the random access configuration information including information indicating that the random access resources are used for slice-based random access and/or common random access.
According to a second aspect of embodiments of the present disclosure, there is provided a random access resources isolation method for radio access network slicing, including: a network equipment sending random access configuration information, the random access configuration information being configuration information for random access resources of at least one cell, the random access configuration information comprising information indicating that the random access resources are used for slice-based random access and/or common random access.
According to a third aspect of embodiments of the present disclosure, there is provided a terminal device, including: receiving module, configured to receive random access configuration information sent by a network equipment, the random access configuration information being configuration information for random access resources of a cell where the terminal device is located, the random access configuration information including information indicating that the random access resources are used for slice-based random access and/or common random access.
According to a fourth aspect of embodiments of the present disclosure, there is provided a network equipment, including: configuration information sending module, configured to send random access configuration information, the random access configuration information being configuration information for random access resources of at least one cell, the random access configuration information including information indicating that the random access resources are used for slice-based random access and/or common random access.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer readable medium, with computer programs stored on, which are executed by a processor, making the programs able to execute a random access resources isolation method as described in the first aspect of the embodiments above.
According to a sixth aspect of embodiments of the present disclosure, there is provided an electronic device, including: one or more processors; a memory for storing one or more programs, when the executable one or more programs are executed by the processor, making the one or more processors able to execute a random access resources isolation method as described in the first aspect of the embodiments above.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present disclosure.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and, together with the description, serve to explain the principles of the invention. It is evident that the drawings in the description below are only some embodiments of the disclosure, and that other drawings may be obtained from them without creative effort by one skilled in the art. In the drawings:
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. However, exemplary embodiments can be implemented in a variety of forms and should not be understood to be limited to the examples described herein; rather, the provision of these embodiments makes the disclosure more comprehensive and complete and communicates the concept of exemplary embodiments to one skilled in the art in a comprehensive manner.
Furthermore, the features, structures, or characteristics described may be combined in one or more embodiments in any appropriate manner. In the description below, many specific details are provided to give a full understanding of the embodiments of the present disclosure. However, one skilled in the art will realize that technical solutions of the present disclosure may be practiced without one or more of the specific details, or that other methods, components, devices, steps, etc. may be employed. In other cases, no well-known methods, devices, realizations, or operations are shown or described in detail to avoid obscuring aspects of the present disclosure.
The block diagrams shown in the accompanying drawings are merely functional entities and do not necessarily correspond to physically independent entities. That is, these functional entities may be implemented in software form, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow charts shown in the accompanying drawings are merely for illustration and does not necessarily include all contents and operations/steps, or be executed in the described order. For example, some operations/steps may be decomposed, while some operations/steps may be combined or partially combined, so the actual execution order may vary according to the actual situation.
The technical solutions in the exemplary embodiments of the present disclosure will be explained in detail below with the accompanying drawings.
As shown in
The application scenario 100 also includes at least one terminal device 120 located within the coverage range of the network equipment 110. The terminal device 120 is a user terminal in a 4G radio access network or a 5G radio access network. It is worth noting that the terminal device 120 may be a portable computer, a smart phone, an on-board terminal, and a tablet computer.
Further, in exemplary embodiments, terminal device 120 receives random access configuration information sent by network equipment 110, with the random access configuration information being configuration information for random access resources of the cell where terminal device 120 is located, the random access configuration information including information indicating that the random access resources of the cell where terminal device 120 is located are used for slice-based random access and/or common random access. That is, the random access configuration information may include information indicating that the random access resources of the cell where terminal device 120 is located are used for slice-based random access; the random access configuration information may also include information indicating that the random access resources of the cell where terminal device 120 is located are used for slice-based random access and common random access; the random access configuration information may also include information indicating that the random access resources of the cell where terminal device 120 is located are used for common random access.
For example, the random access configuration information may also include information indicating that the random access resources of the cell where terminal device 120 is located are used for slice 1 and/or slice 2. The random access configuration information may also include information indicating that the random access resources of the cell where terminal device 120 is located are used for slice 1 and common random access. When no slice is defined in the random access configuration information or when it is special value 0, the random access configuration information indicates that the random access resources of the cell where terminal device 120 is located are used for common random access.
According to the technical solution in the example embodiment, on one hand, random access configuration information is broadcast through network equipment such as base stations, which is used to indicate the relationship between random access resources and slice/slice group/common random access, so that soft isolation or hard isolation of slice-based random access resources and common random access resources can be flexibly realized through random access configuration information to adapt to dynamic changes of different slice service requirements and network service loads. On another hand, the soft isolation of slice-based random access resources and common random access resources can reduce the fragmentation of random access resources, and can provide following transmission of slice-based QoS (Quality of Service)/QoE (Quality of Experience) services at the same time, and the hard isolation of slice-based random access resources and common random access resources can provide better random access resource configuration for radio access network slicing to meet the needs of various customers.
As shown in
In exemplary embodiments, network equipment 110 sends random access configuration information, with the random access configuration information being configuration information for random access resources of at least one cell. Terminal device 120 receives the random access configuration information sent by network equipment 110, with the random access configuration information including information indicating that random access resources are used for slice-based random access and/or common random access.
Taking network equipment 110 as a base station as an example, base station 110 broadcasts random access configuration information, with adding information elements to the random access configuration information broadcast (e.g. RACH-ConfigCommon, RACH-ConfigCommonTwoStepRA, RACH-ConfigDedicated). The added information elements are used to indicate slice/slice group/common random access which the random access resources can be used for, so as to realize soft or hard isolation of random access resources.
In the following, several exemplary embodiments are given to explain the random access configuration information in detail.
the random access configuration information includes information indicating that the random access resources are used for slice 1 and/or slice 2, or when the information is not defined in the random access configuration information broadcast, e.g. no new information element is added or the value of the newly added information element is the special value 0, the random access configuration information indicates that the random access resources may be used for common random access.
the random access configuration information includes information indicating that the random access resources are used for slice 1 and common random access, so as to realize soft isolation of random access resources.
the random access configuration information includes information indicating that the random access resources are merely used for target slice/slice group such as slice 1/slice group 1, so as to realize hard isolation of random access resources.
In step S220, the terminal device determines random access resources to be used based on relevant parameters and the random access configuration information.
In exemplary embodiments, the relevant parameters may be slice configuration related parameters. The relevant parameters may include: at least one of S-NSSAI (Single Network Slice Selection Assistance Information), slice group and no slicing related configuration information. Taking the relevant parameters as the parameters of slices or slice groups as an example, the terminal device selects the corresponding random access resource as the applicable random resource from the random access resources indicated in the random access configuration information according to the parameters of slices or slice groups.
For example, if the parameter of slice or slice group is 1, which means slice 1 or slice group 1, the terminal device selects the corresponding random access resource as the applicable random resource from slice-based random access resources according to slice 1 or slice group 1.
Further, the slice group may be determined in one of the following ways: a network equipment such as a core network equipment notifying the terminal device of the relationship between S-NSSAI and slice group through NAS (Non Access Stratum) signaling; using SST (Slice/Service type) as slice group; using UAC (UE Access Control) as slice group. For example, the network equipment notifies the terminal device through NAS signaling of the following relationship between S-NSSAI and slice group: that S-NSSAI equals 1, 2, and 3 associated with slice group 1, and that S-NSSAI equals 4, 5, and 6 associated with slice group 2.
In step S230, the terminal device initiates a random access request based on the random access resources to be used.
In some exemplary embodiments, terminal device 120 initiates random access to network equipment 110 based on the random access resources to be used determined based on the relevant parameters and the random access configuration information.
According to the technical solution in the example embodiment of
In the following, the exemplary embodiments of the present disclosure are explained in detail through several specific embodiments in combination with the accompanying drawings
In the exemplary embodiment, the random access configuration information includes information indicating that the random access resources are used for the slice-based random access resources and/or the common random access resources, with the slice-based random access resources and the common random access resources using shared RO, as well as preambles of the slice-based random access resources and preambles of the common random access resources are various configuration.
In the present exemplary embodiment, the random access configuration information includes: preambles associated with the slice-based random access resources and/or preambles associated with the common random access resources.
Further, in exemplary embodiments, when N<1, a synchronous signal/PBCH block SSB is mapped to 1/N random access occasions RO, and the R preambles are with consecutive indices started from preamble index 0; the Q preambles are with consecutive indices started from preamble index R, the R1 preambles are with consecutive indices started from preamble index R+Q, and the Q1 preambles are with consecutive indices started from preamble index R+Q+R1.
According to the technical solution in the example embodiment, slice-based RA resources and common RAresources are distinguished by different preambles on the same random access occasions RO, which thereby can provide more transmission opportunities for slice/slice group service and reduce time delay.
In the exemplary embodiment, the random access configuration information includes information indicating that the random access resources are used for the slice-based random access resources and/or the common random access resources, the slice-based random access resources and the common random access resources using shared preambles, a relationship between random access occasions RO of the slice-based random access resources and random access occasions RO of the common random access resources being one of the following:
As shown in
According to the technical solution in the example embodiment, slice-based RA resources and common RA resources use different ROs and the shared preambles, thereby the probability of random access collision can be reduced and the access success rate can be improved.
Embodiment three: an embodiment of hybrid schemes
In the exemplary embodiment, the random access configuration information includes information indicating that the random access resources are used for the slice-based random access resources and/or the common random access resources, a part of the slice-based random access resources and/or a part of the common random access resources using shared random access occasions RO and using different preambles; another part of the slice-based random access resources and/or another part of the common random access resources using different random access occasions RO and shared preambles.
As shown in
According to the technical solution in the example embodiment, a part of slice-based RA resources and a part of common RA resources use same ROs and are differentiated by using different preambles, and another part uses different ROs and uses shared preambles. By flexibly configuring ROs and preambles of slice-based RA resources and common RA resources, network loads and the needs of various service can be better adapted.
It should be noted that the above-mentioned accompanying drawings are only schematic descriptions of the processes included in the methods according to the exemplary embodiments of the present disclosure and are yet not intended to be limiting. It is easy to understand that the processes shown in the above-mentioned accompanying drawings do not indicate or limit the chronological order of these processes. In addition, it is also easy to understand that these processes can be executed synchronously or asynchronously, for example, in multiple modules.
The following describes an device embodiment of the present disclosure, which may be used to implement the above-mentioned random access resources isolation method for the radio access network slicing of the present disclosure.
As shown in
In some exemplary embodiments, the terminal device 800 further includes: access processing module 820, configured to determine random access resources to be used based on relevant parameters and the random access configuration information; initiate a random access request based on the random access resources to be used.
In some exemplary embodiments, the relevant parameters include: at least one of single network slice selection assistance information S-NSSAI, slice group and no slicing related configuration information.
In some exemplary embodiments, the slice group may be determined in one of the following ways: the network equipment notifying the terminal device of the relationship between S-NSSAI and slice group through non-access stratum NAS signaling; using slice/service type SST as slice group; or, using user access control UAC as slice group.
In some exemplary embodiments, the random access configuration information includes information indicating that the random access resources are used for the slice-based random access resources and/or the common random access resources, the slice-based random access resources and the common random access resources using shared random access occasions RO, as well as preambles of the slice-based random access resources and preambles of the common random access resources are various.
In some exemplary embodiments, the random access configuration information further includes: preambles associated with the slice-based random access resources and/or preambles associated with the common random access resources.
In some exemplary embodiments, the common random access resources are corresponding to: R contention based preambles for a common 4-step random access and/or Q contention based preambles for a common 2-step random access; the slice-based random access resources are corresponding to: R1 contention based 4-step random access preambles for network slice and/or Q1 contention based 2-step random access preambles for network slice.
In some exemplary embodiments, when N<1, a synchronous signal/PBCH block SSB is mapped to 1/N random access occasions RO, and the R preambles are with consecutive indices started from preamble index 0; the Q preambles are with consecutive indices started from preamble index R, the R1 preambles are with consecutive indices started from preamble index R+Q, and the Q1 preambles are with consecutive indices started from preamble index R+Q+R1;
In some exemplary embodiments, the random access configuration information includes information indicating that the random access resources are for the slice-based random access resources and/or the common random access resources, the slice-based random access resources and the common random access resources using shared preambles, a relationship between random access occasions RO of the slice-based random access resources and random access occasions RO of the common random access resources being one of the following: the slice-based random access resources and the common random access resources using time division random access occasions RO; the slice-based random access resources and the common random access resources using frequency division random access occasions RO; or, the slice-based random access resources and the common random access resources using frequency division and time division random access occasions RO.
In some exemplary embodiments, the random access configuration information includes information indicating that the random access resources are used for the slice-based random access resources and/or the common random access resources, a part of the slice-based random access resources and/or a part of the common random access resources using shared random access occasions RO, and the part of the slice-based random access resources and/or the part of the common random access resources using different preambles; another part of the slice-based random access resources and/or another part of the common random access resources using different random access occasions RO, and the another part of the slice-based random access resources and/or the another part of the common random access resources using shared preambles.
Since the various functional modules of the terminal devices of the exemplary embodiments of the present disclosure correspond to the steps of the exemplary embodiments of the random access resources isolation method described above, for details not disclosed in the terminal device embodiment of the present disclosure, please refer to the embodiments of the random access resources isolation method of the present disclosure described above.
As shown in
In some exemplary embodiments, the random access configuration information is used for a terminal device located in the cell to determine random access resources to be used based on slice related parameters and the random access configuration information.
In some exemplary embodiments, the slice related parameters include: at least one of single network slice selection assistance information S-NSSAI, slice group and no slicing related configuration information.
In some exemplary embodiments, the slice group may be determined in one of the following ways: the network equipment notifying the terminal device of the relationship between S-NSSAI and slice group through non-access stratum NAS signaling; using slice/service type SST as slice group; or, using user access control UAC as slice group.
In some exemplary embodiments, the random access configuration information includes information indicating that the random access resources are used for the slice-based random access resources and/or the common random access resources, the slice-based random access resources and the common random access resources using shared random access occasions RO, as well as preambles of the slice-based random access resources and preambles of the common random access resources are various.
In some exemplary embodiments, the random access configuration information further includes: preambles associated with the slice-based random access resources and/or preambles associated with the common random access resources.
In some exemplary embodiments, the common random access resources are corresponding to: R contention based preambles for a common 4-step random access and/or Q contention based preambles for a common 2-step random access; the slice-based random access resources are corresponding to: R1 contention based 4-step random access preambles for network slice and/or Q1 contention based 2-step random access preambles for network slice.
In some exemplary embodiments, when N<1, a synchronous signal/PBCH block SSB is mapped to 1/N random access occasions RO, and the R preambles are with consecutive indices started from preamble index 0; the Q preambles are with consecutive indices started from preamble index R, the R1 preambles are with consecutive indices started from preamble index R+Q, and the Q1 preambles are with consecutive indices started from preamble index R+Q+R1;
In some exemplary embodiments, the random access configuration information includes information indicating that the random access resources are for the slice-based random access resources and/or the common random access resources, the slice-based random access resources and the common random access resources using shared preambles, a relationship between random access occasions RO of the slice-based random access resources and random access occasions RO of the common random access resources being one of the following: the slice-based random access resources and the common random access resources using time division random access occasions RO; the slice-based random access resources and the common random access resources using frequency division random access occasions RO; or, the slice-based random access resources and the common random access resources using frequency division and time division random access occasions RO.
In some exemplary embodiments, the random access configuration information includes information indicating that the random access resources are used for the slice-based random access resources and/or the common random access resources, a part of the slice-based random access resources and/or a part of the common random access resources using shared random access occasions RO, and the part of the slice-based random access resources and/or the part of the common random access resources using different preambles; another part of the slice-based random access resources and/or another part of the common random access resources using different random access occasions RO, and the another part of the slice-based random access resources and/or the another part of the common random access resources using shared preambles.
Since the various functional modules of the network equipments of the exemplary embodiments of the present disclosure correspond to the steps of the exemplary embodiments of the random access resources isolation method described above, for details not disclosed in the network equipment embodiment of the present disclosure, please refer to the embodiments of the random access resources isolation method of the present disclosure described above.
It should be noted that although several modules or units of the devices for the execution of the actions are mentioned in detail above, such a division is not mandatory. In fact, according to the embodiments of the present disclosure, the features and functions of two or more modules or units described above can be embodied in one module or unit. Conversely, the features and functions of one module or unit described above can be further divided into being embodied by multiple modules or units.
Furthermore, although the steps of the methods of the present disclosure are described in the accompanying drawings in a particular order, it is not required or implied that the steps must be performed in that particular order or that all of the steps shown must be performed to achieve desired results. Additionally or alternatively, certain steps may be omitted, multiple steps may be combined into one step to execute and/or one step may be divided into multiple steps to execute.
It is easy for one skilled in the art to understand from the descriptions of the embodiments above that the example embodiments described herein may be implemented by software or by software in combination with necessary hardware. Therefore, the technical solutions according to the present disclosure may be embodied in the form of a software product which may be stored on a nonvolatile storage medium (may be a CD-ROM, a USB flash drive, a mobile hard disk, etc.) or on a network, and includes instructions for enabling a computing device (may be a personal computer, a server, a mobile terminal, or a network equipment, etc.) to perform the methods according to the embodiments of the present disclosure.
In exemplary embodiments of the disclosure, a computer storage medium capable of implementing the methods described above is also provided. A program product capable of implementing the methods described above of the specification is stored thereon. In some possible embodiments, aspects of the present disclosure may also be realized in the form of a program product including program codes which, when run on a terminal device, is used to cause the terminal device to perform the steps described in the “exemplary methods” section above of the specification according to the exemplary embodiments of the disclosure.
The above-mentioned program product may be in the form of a portable compact disc read-only memory (CD-ROM) and include program codes that can be run on a terminal device, such as a personal computer. However, the program product of this present disclosure is not limited to this, and in this document, the readable storage medium may be any tangible medium containing or storing a program that may be used by or in combination with an instruction execution system, device or apparatus.
The above-mentioned program product may be employed as any combination of one or more readable medium. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may, for example, be but not limited to systems, devices, or apparatus that are electrical, magnetic, optical, electromagnetic, infrared, or semiconductor, or any combination thereof. More specific examples (not an exhaustive list) of readable storage media include: electrical connections with one or more wires, portable disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fibers, compact disc read-only memory (CD-ROM), optical storage devices, magnetic storage devices, or any combination of the above as appropriate.
Computer readable signal medium may include data signals transmitted in a base band or as part of a carrier in which readable program codes are carried. Such transmitted data signals may be employed in a variety of forms including, but not limited to, electromagnetic signals, optical signals, or any suitable combination of the above. The readable signal medium may also be any readable medium other than readable storage medium that may send, transmit or transmit programs for use by or in conjunction with an instruction execution system, device or apparatus.
The program codes contained on the readable medium may be transmitted by any suitable medium, including but not limited to wireless, wired, optical cable, RF, etc., or any suitable combination thereof.
The program codes for performing operations of the present disclosure may be written in any combination of one or more programming languages, including object-oriented programming languages such as Java, C++, etc., and also including conventional procedural programming languages such as the “C” language or similar programming languages. The program codes may be executed entirely on a user's computing device, partially on a user's computing device, as an independent software package, partially on a user's computing device and partially on a remote computing device, or entirely on a remote computing device or a server. In the case of a remote computing device, the remote computing device may be connected to the user's computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device (for example, through the Internet using an Internet service provider).
Further, in the exemplary embodiments of the present disclosure, an electronic device capable of implementing the above-mentioned methods is also provided.
One skilled in the art will understand that various aspects of the present disclosure may be implemented as systems, methods or program products. Therefore, various aspects of the present disclosure may be implemented in the following forms: a complete hardware implementation, a complete software implementation (including firmware, microcode, etc.), or a combined implementation of hardware and software aspects, which may be collectively referred to as “circuit”, “module” or “system”.
An electronic device 1000 according to this embodiment of the disclosure is described below with reference to
As shown in
Wherein, the above-mentioned storage units store program codes which may be executed by the processing unit 710, thereby causing the processing unit 710 to perform the steps described in the “exemplary methods” section above of the specification in accordance with the various exemplary embodiments of the present disclosure. For example, the processing unit 710 may perform the steps described in
Exemplarily, the processing unit 710 may also perform the random access resources isolation method of the embodiments in the manner described above.
Storage unit 720 may include a readable medium in the form of a volatile storage unit, such as a random access memory (RAM) unit 7201 and/or a cache memory unit 7202, and may further include a read-only memory cell (ROM) unit 7203.
Storage unit 720 may also include a program/utility 7204 having a set of (at least one) program modules 7205, such program modules 7205 including but not limited to: an operating system, one or more applications, other program modules, and program data, and each of these examples or some combination may include an implementation of a network environment.
Bus 730 may be one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or a local bus using any of several bus structures.
Electronic device 1000 may also communicate with one or more peripheral equipment 790 (such as keyboards, pointing devices, Bluetooth devices, etc.), and may also communicate with one or more devices that enable the user to interact with the electronic device 1000, and/or with any device (such as routers, modems, etc.) that enable the electronic device 1000 to communicate with one or more other computing devices. Such communication can be carried out through an input/output (I/O) interface 750. Moreover, electronic device 1000 may also communicate with one or more networks (such as a local area network (LAN), a wide area network (WAN) and/or a common network, such as the Internet) through a network adapter 760. As shown in the figure, network adapter 760 communicates with other modules of electronic device 1000 through bus 730. It should be understood that, although not shown in the figure, other hardware and/or software modules may be used in conjunction with electronic device 1000, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems.
It is easy for one skilled in the art to understand from the descriptions of the embodiments above that the example embodiments described herein may be implemented by software or by software in combination with necessary hardware. Therefore, the technical solutions according to the present disclosure may be embodied in the form of a software product, which may be stored on a nonvolatile storage medium (may be a CD-ROM, a USB flash drive, a mobile hard disk, etc.) or on a network and includes instructions for enabling a computing device (may be a personal computer, a server, a terminal device, or a network equipment, etc.) to execute the methods according to the embodiments of the present disclosure.”
Further, the above-mentioned accompanying drawings are merely for illustrative purposes and not for restrictive purposes of the processing included in the methods according to the exemplary embodiments of the present disclosure. It is easy to understand that the processing shown in the above-mentioned accompanying drawings does not indicate or restrict a chronological order of the processing. Further, it is easy to understand that the processing may be performed synchronously or asynchronously in, for example, multiple modules.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed here. This application is intended to cover any variations, uses, or adaptations of the invention following the general principles thereof and including such departures from the present disclosure as come within known or customary practice in the art. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
Number | Date | Country | Kind |
---|---|---|---|
202110898462.X | Aug 2021 | CN | national |
This application is a national phase application under 35 U.S.C. § 371 of International Application No. PCT/CN2022/107701 filed Jul. 25, 2022, which is based upon, claims the benefit of, and claims priority to Chinese Patent Application No. 202110898462.X, entitled “Random access resource isolation method for radio access network slice, and device and medium”, filed Aug. 5, 2021 the contents of both of which are incorporated by reference in their entireties herein.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2022/107701 | 7/25/2022 | WO |