Examples of the present disclosure relate to signalling in a radio access network. Some examples, though without prejudice to the foregoing, relate to controlling or configuring repetition of a Message 3 (Msg3) transmitted by a User Equipment, UE, in Uplink, UL, during a Random Access Channel, RACH, procedure.
Message 2 (Msg2) is a signal transmitted in downlink, DL, during a RACH procedure. Msg2 enables a radio access node, i.e., gNB, to provide configuration information to a UE enabling the UE to transmit a Msg3 signal over a Physical Uplink Shared Channel, PUSCH.
UL grants for Msg3 transmission in New Radio (NR) are currently conveyed via Msg2 over a Physical Downlink Shared Channel, PDSCH, scheduled by Downlink Control Information, DCI, 1_0, during the RACH procedure.
The listing or discussion of any prior-published document or any background in this specification should not necessarily be taken as an acknowledgement that the document or background is part of the state of the art or is common general knowledge. One or more aspects/examples of the present disclosure may or may not address one or more of the background issues.
Currently, (i.e., with respect to the 3rd Generation Partnership Project, 3GPP, Release 15 and Release 16) Msg3 repetitions by a User Equipment, UE, are not supported. In some circumstances it can be desirable to support repeated transmissions of Msg3. This may increase reliability and coverage of reception of Msg3. It may also help reduce latency by avoiding needing to restart a RACH procedure if there were an issue the gNB receiving an initially transmitted Msg3. In some circumstances it can be desirable to trigger and/or configure Msg3 repetitions by a UE in an efficient manner with minimal overhead and minimal additional signalling. In some circumstances it can be desirable to trigger and/or configure Msg3 repetitions by a UE in a manner with minimal impact on legacy UE (i.e., with 3GPP Release 15 and/or Release 16 operation).
The scope of protection sought for various embodiments of the invention is set out by the claims.
Any features described in this specification that do not fall under the scope of the claims are to be interpreted as examples useful for understanding various embodiments of the invention.
According to at least some examples of the disclosure there is provided a User Equipment, UE, configured to:
According to various, but not necessarily all, examples of the disclosure there is provided a method for a User Equipment, UE, the method comprising:
According to various, but not necessarily all, examples of the disclosure there is provided computer program instructions for causing a User Equipment, UE, to perform:
According to various, but not necessarily all, examples of the disclosure there is provided a User Equipment, UE, comprising:
According to various, but not necessarily all, examples of the disclosure there is provided a non-transitory computer readable medium encoded with instructions that, when performed by at least one processor, causes at least the following to be performed:
According to various, but not necessarily all, examples of the disclosure there is provided a chipset comprising processing circuitry configured to perform the above-mentioned method.
According to at least some examples of the disclosure there is provided an apparatus configured to:
According to various, but not necessarily all, examples of the disclosure there is provided a method comprising:
According to various, but not necessarily all, examples of the disclosure there is provided computer program instructions for causing an apparatus to perform
According to various, but not necessarily all, examples of the disclosure there is provided an apparatus comprising:
According to various, but not necessarily all, examples of the disclosure there is provided a non-transitory computer readable medium encoded with instructions that, when performed by at least one processor, causes at least the following to be performed:
The following portion of this ‘Brief Summary’ section describes various features that can be features of any of the examples described in the foregoing portion of the ‘Brief Summary’ section. The description of a function should additionally be considered to also disclose any means suitable for performing that function.
In some but not necessarily all examples, the control information and/or configuration information comprises, at least one selected from the group of:
In some but not necessarily all examples, the message is a Msg3 message.
In some but not necessarily all examples, the identifier comprises at least one selected from the group of:
In some but not necessarily all examples, the identifier is a Temporary Cell Radio Network Temporary Identifier, TC-RNTI.
In some but not necessarily all examples, the received identifier encodes an indication of the control information and/or the configuration information, and wherein the UE is configured to:
In some but not necessarily all examples, at least a part of the received identifier is associated with the control information and/or the configuration information, and wherein the UE is configured to:
In some but not necessarily all examples, the received identifier comprises an identifier value associated with one or more of a plurality of sets of identifier values, and wherein the UE is configured to:
In some but not necessarily all examples, each of the plurality of sets of identifier values is respectively associated with control information and/or configuration information, and wherein the UE is configured to:
In some but not necessarily all examples, the received identifier comprises a bit sequence, and wherein the UE is configured to:
In some but not necessarily all examples, each of the subset of bits of the identifier is associated with differing control information and/or configuration information, and wherein the UE is configured to:
In some but not necessarily all examples, the association information is, at least one selected from the group of:
In some but not necessarily all examples, the UE is further configured to:
While the above examples of the disclosure and optional features are described separately, it is to be understood that their provision in all possible combinations and permutations is contained within the disclosure. Also, it is to be understood that various examples of the disclosure can comprise any or all of the features described in respect of other examples of the disclosure, and vice versa.
According to various, but not necessarily all, examples of the disclosure there are provided examples as claimed in the appended claims.
Some examples will now be described with reference to the accompanying drawings in which:
The figures are not necessarily to scale. Certain features and views of the figures can be shown schematically or exaggerated in scale in the interest of clarity and conciseness. For example, the dimensions of some elements in the figures can be exaggerated relative to other elements to aid explication. Similar reference numerals are used in the figures to designate similar features. For clarity, all reference numerals are not necessarily displayed in all figures.
In the drawings (and description) a similar feature is referenced by the same three digit number. In the drawings (and description), an optional subscript to the three digit number can be used to differentiate different instances of similar features. Therefore, a three digit number without a subscript can be used as a generic reference and the three digit number with a subscript can be used as a specific reference. A subscript can comprise a single digit that labels different instances. A subscript can comprise two digits including a first digit that labels a group of instances and a second digit that labels different instances in the group.
The network 100 is in this example a radio telecommunications network, i.e., a Radio Access Network, RAN, in which at least some of the terminal nodes 110 and access nodes 120 communicate with each other using transmission/reception of radio waves.
The RAN 100 may be a cellular network comprising a plurality of cells 122 each served by an access node 120. The access nodes 120 comprise cellular radio transceivers. The terminal nodes 110 comprise cellular radio transceivers.
In the particular example illustrated, the network 100 is a Next Generation (NG) or New Radio (NR) network. NR is the Third Generation Partnership Project (3GPP) name for 5G technology.
The interfaces between the terminal nodes 110 and the access nodes 120 are radio interfaces 124 (e.g., Uu interfaces). The interfaces between the access nodes 120 and one or more core nodes 130 are backhaul interfaces 128 (e.g., S1 and/or NG interfaces).
Depending on the exact deployment scenario, the access nodes 120 can be RAN nodes such as NG-RAN nodes. NG-RAN nodes may be gNodeBs (gNBs) that provide NR user plane and control plane protocol terminations towards the UE. NG-RAN nodes may be New Generation Evolved Universal Terrestrial Radio Access network (E-UTRAN) NodeBs (ng-eNBs) that provide E-UTRA user plane and control plane protocol terminations towards the UE. The gNBs and ng-eNBs may be interconnected with each other by means of Xn interfaces. The gNBs and ng-eNBs are also connected by means of NG interfaces to the 5G Core (5GC), more specifically to the AMF (Access and Mobility Management Function) by means of the NG-C interface and to the UPF (User Plane Function) by means of the NG-U interface. The access nodes 120 may be interconnected with each other by means of Xn interfaces 126. The cellular network 100 could be configured to operate in licensed or unlicensed frequency bands, not least such as a 60 GHz unlicensed band where beamforming is mandatory in order to achieve required coverage.
The access nodes 120 can be deployed in a NR standalone operation/scenario. The access nodes 120 can be deployed in a NR non-standalone operation/scenario. The access nodes can be deployed in a Carrier Aggregation operation/scenario. The access nodes 120 can be deployed in a dual connectivity operation/scenario, i.e., Multi Radio Access Technology—Dual Connection (MR-DC), not least for example such as:
In such non-standalone/dual connectivity deployments, the access nodes 120 may be interconnected to each other by means of X2 or Xn interfaces, and connected to an Evolved Packet Core (EPC) by means of an S1 interface or to the 5GC by means of a NG interface.
The terminal nodes 110 are network elements in the network that terminate the user side of the radio link. They are devices allowing access to network services. The terminal nodes 110 may be referred to as User Equipment (UE), mobile terminals or mobile stations. The term ‘User Equipment’ may be used to designate mobile equipment comprising a smart card for authentication/encryption etc such as a subscriber identity module (SIM). In other examples, the term ‘User Equipment’ is used to designate mobile equipment comprising circuitry embedded as part of the user equipment for authentication/encryption such as software SIM.
The access nodes 120 are network elements in the network responsible for radio transmission and reception in one or more cells 122 to or from the terminal nodes 110. Such access nodes may also be referred to as a transmission reception points (TRP's) or base stations. The access nodes 120 are the network termination of a radio link. An access node 120 can be implemented as a single network equipment, or disaggregated/distributed over two or more RAN nodes, such as a central unit (CU), a distributed unit (DU), a remote radio head-end (RRH), using different functional-split architectures and different interfaces.
In the following description, an access node will be referred to as gNB 120 and a terminal node 110 will be referred to as a UE 110.
The gNB 120 signals to the UE 110, via a message 201, an identifier 202 for the UE. The identifier 202 is configured so as to serve to provide an identity of the UE. The identifier is further configured to signal control information and/or configuration information for the UE. The control information is configured to trigger the UE to perform a particular action, whereas the configuration information is configured to configure the UE, e.g., to perform a particular action (wherein the performance of the action can be separately triggered, e.g., via a separate message, or via the control information).
As illustrated by block 203, the UE 110 determines, based at least in part on the received identifier 202, the control information and/or the configuration information.
As illustrated by block 204, the UE 110 performs the action and/or configures itself in accordance with the determined control and/or the determined configuration information.
By way of illustration, the following is a non-limiting example of a specific implementation of an example of the present disclosure. In this example, an action, namely Type A Msg3 repetitions, can be triggered and/or configured via an identifier, namely a Temporary Cell Radio Network Temporary Identifier, TC-RNTI. The Type A Msg3 repetition may mean repetition of slots (which may or may not be fully filled with a msg3 allocation). In other examples, differing types of Msg3 repetitions can be triggered and/or configured, not least such as Type B Msg3 repetitions. The Type B Msg3 repetition may mean repetition of msg3 allocation and not the slot containing the Msg3. Type B Msg3 repetition may allow the msg3 to repeated within the same slot and even across slot boundaries.
In this example, a base station, gNB 120, selects a TC-RNTI value to be included in a UL grant given to a UE 110 in a Medium Access Control, MAC, Random Access Response, RAR. The gNB selects a particular value of the TC-RNTI in dependence on whether the UE is to be triggered or configured to perform Msg3 repetitions. In this regard, out of the pool of possible TC-RNTI values, 1 to 65519 (0x0001 to 0xFFEF), a subset of the values is pre-associated with triggering and/or configuring Msg3 repetitions. Accordingly, the gNB, by selecting a TC-RNTI value within the subset of TC-RNTI values can indicated that Msg3 repetitions are to be triggered and/or configured. The UE, upon receiving such a TC-RNTI value within the subset of TC-RNTI values, can then trigger/be configured to perform Msg3 repetitions.
In some examples, the identifier comprises, at least one selected from the group of:
As will be discussed further below, the identifier may be configured so that, in addition to serving to provide an identify to the UE, it also conveys/indicates/encodes/implicitly signals control information and/or configuration information for the UE.
In some examples, the control information and/or configuration information comprises, at least one selected from the group of:
In some examples, the above-mentioned message is a Message 3, Msg3, of a Random Access procedure, such as a 4 step RACH procedure/CBRA procedure.
In some examples, actions other than repetition/no repetition of a message transmission may be triggered and/or configured. For instance, the control and/or configuration information may be for triggering and/or configuring the performance of effecting a power boost/no power boost in a transmitted signal, such as a Msg3.
In some examples, wherein the control information and/or the configuration information is signalled in the received identifier via the received identifier encoding an indication of the control information and/or the configuration information, the UE decodes the encoded received identifier to extract the indication of the control information and/or the configuration information.
In some examples, at least a part of the received identifier is associated with the control information and/or the configuration information. In this regard, at least part of the received identifier (such as for example, where the identifier is a bitstring, a sequence of bits of the bitstring) may be mapped to or pre-associated with the control information and/or the configuration information. Such pre-mapping/pre-associated may be done by the gNB as will be discussed in further detail below. The UE determines or receives the association information (e.g., the mapping of a particular sequence of bits to particular control and/or configuration information) for enabling the UE to determine the control information and/or the configuration information associated with the at least part of the received identifier.
In some examples the association information is, at least one selected from the group of:
In some examples, the received identifier comprises an identifier value associated with one or more of a plurality of sets of identifier values, and the UE determines or receives association information for enabling the UE to determine which set of identifier values the received identifier value is associated with. In some examples, each of the plurality of sets of identifier values is respectively associated with control information and/or configuration information, and the UE determines or receives association information for enabling the UE to determine which set of identifier values are associated with which differing control information and/or configuration information. By way of a simplified example, if the identifier were a TC-RNTI, the identifier can have a value that goes from 1 to 65519 [0x0001 to 0xFFEF]. In this simplified example, a first set of identifier values is pre-defined as values ranging from 1 to 31759 and a second set of identifier values is pre-defined as values ranging from 31760 to 65519. Moreover, the first set of identifier values is pre-associated with control information to trigger repeated transmission of Msg3, whereas the second set of identifier values is pre-associated with control information to trigger only a single transmission of Msg3. The UE can determine (e.g., look up in a pre-determined codebook pre-stored in a memory of the UE) or receive (e.g., in a received message) association information that associates values ranges with the first set (i.e., thereby defining the first set by specifying the ranges of values, 1 to 31759, that constitute the first set) and associates value ranges with the second set (i.e., thereby defining the second set by specifying the ranges of values, 31760 to 65519, that constitute the second set).
The UE can also determine (e.g., look up in a pre-determined codebook pre-stored in a memory of the UE) or receive (e.g., in a received message) association information that associates each set with a particular action to be triggered, e.g., associating the first set with triggering repeated transmission of Msg3, and the second set with triggering just a single transmission of Msg3. Hence, if the UE were to receive an identifier value 12345, it could determine that it has received an identifier from the first set. Moreover, the UE could determine that the first set is associated with triggering repeated transmission of Msg3. Hence, the receipt of the identifier 12345 can trigger the UE to perform repeated transmissions of Msg3. In such a manner, a gNB, which generates and sends the identifier to the UE, can generate and select a value of the identifier, i.e., from an available pool of identifiers from either the first set or second set, depending on whether the gNB wishes to receive from the UE either repeated transmissions of Msg3 (for improved coverage and/or reliability, e.g., where channel conditions are poor) or a single transmission of Msg3 (to save resource, reduce latency, increase network capacity e.g., where channel conditions are good). In such a manner the gNB can control the UE's repeated transmissions of Msg3. Significantly, since the control information is encoded in a conventional TC-RNTI, i.e., the TC-RNTI still adapts a number from 1 to 65519 for identifying the UE in the RACH procedure, if a legacy UE (i.e., one not configured and/or able to decode the TC-RNTI to extract control/configuration information therefrom) were to receive such an “encoded” TC-RNTI, it could still use the TC-RNTI in the conventional manner to carry out the conventional RACH procedure.
Advantageously, various examples of the disclosure may thereby provide a new signaling framework that allows a gNB to trigger and/or configure Msg3 repetitions to duly configured UEs (referred to herein as Coverage Enhanced, CE, UEs, as compared to legacy UEs without the capability of extracting the triggering and/or configuration information from the identifier). Moreover, advantageously, operations at legacy UEs are kept unchanged, since the signaling framework and its related method are fully transparent to legacy UEs. Various examples may thereby enable control of Msg3 repetitions without enforcing any non-negligible trade-off in terms of performance or backward compatibility.
In effect, in various examples of the invention, the previously fully open/random choice of TC-RNTI (i.e., any value from 1 to 65519) is constrained, in order for the TC-RNTI to carry additional information (e.g., regarding triggering or configuring the UE to perform repeated transmissions of Msg3). This additional meaning of the TC-RNTI is only visible to UEs that support CE. Legacy UEs are simply not aware of the “presence” of the additional information and behave as before.
It will be appreciated that an identifier value can be expressed as a bitstring. Accordingly, rather than associating one or more sets of values with control information and/or configuration information, instead one or more bit sequences of the bitstring could be associated with control information and/or configuration information.
In various examples, the UE determines, based on a subset of bits of the bit sequence of the received identifier, the control information and/or the configuration information.
In some examples, the received identifier comprises a bit sequence, and the UE determines, based on a subset of bits of the received identifier, the control information and/or the configuration information.
In some examples, each of the subset of bits of the identifier is associated with differing control information and/or configuration information, and the UE determines or receives association information for enabling the UE to determine which subset of bits of the identifier are associated with which differing control information and/or configuration information.
In some examples the UE checks for receipt of an indicator and whether or not the UE determines the control information and/or the configuration information is based, at least in part upon receipt of the indicator. The indicator may indicate to the UE whether it should expect the identifier to encode control and/or configuration information and hence whether the UE ought to attempt to extract the control and/or configuration information and implement the same. For example, the gNB could send the UE an indicator that informs the UE whether or not the gNB supports triggering/configuring of Msg3 repetitions via TC-RNTI. The UE could thereby check, via the indicator, if the gNB supports such repetitions before considering that the TC-RNTI is used to provide information on the Msg3 repetition configuration. The indicator could be a flag or a dedicated message that serves to inform the UE that the encoded identifier feature/functionality is active in the cell currently serving the UE. In some examples, the receipt of association information, e.g., presence of association information in an SI (such as information elements (IEs), e.g., SIB1 or RMSI, received via higher-signaling), in itself can act as the indicator. Moreover, any configuration information related to the association information can act as an implicit indicator. Such a checking step may avoid issues with legacy gNBs (e.g., Rel-16 gNBs that do not support the conveying of triggering and/or configuring information for Msg3 repetition via TC-RNTI), which could produce unwanted emissions and interference from the UE.
Msg2 is a signal transmitted in DL during the RACH procedure, by means of which a gNB provides to UE useful information to be used for configuring and transmission of Msg3 over the PUSCH. Msg2 typically contains a MAC PDU 301, which in turn consists of one or more MAC subPDUs. Whenever the size of the MAC PDU does not coincide with a valid Transport Block Size, TBS, value, resulting from the amount of resources scheduled by the gNB for transmitting Msg2, a padding is added at the end of the MAC PDU. In other words, presence and length of padding is implicit based on both TBS and size of MAC subPDU(s). In general, each MAC subPDU consists of one of the following:
Different combinations of the above subPDU instances can occur in a MAC PDU, as shown in
At least one MAC subheader with RAPID and MAC RAR 302 must be included in the MAC PDU during access for the UE to be able to configure and perform Msg3 transmission. A ‘MAC subPDU(s) with RAPID and MAC RAR’ can be placed anywhere between MAC subPDU with Backoff Indicator only (if any) and padding (if any).
Upon decoding Msg2, the UE uses the received TC-RNTI for scrambling Msg3's CRC (PUSCH corresponding to RAR grant) and for its future retransmissions in the uplink, if any. If the gNB were to fail to decode Msg3, the gNB would send a grant (DCI format 0_0) to the UE which is addressed to TC-RNTI. Accordingly, the TC-RNTI serves the purpose of an identity/signature used to address the UE prior to RRC connection establishment, during CBRA procedure.
Moreover, after Msg3's reception at gNB, the TC-RNTI is also used to scramble the CRC of a subsequent PDCCH (DCI format 1_0) which scrambles the PDSCH over which a UE Contention Resolution (UE Contention Resolution Identity MAC Control Element) is sent to the UE. The TC-RNTI is then promoted to C-RNTI for a UE which wins a contention and does not already have a C-RNTI. The TC-RNTI is dropped by the other UEs (for which contention is not successful).
3GPP Rel-15 and Rel-16 do not support Msg3 repetitions. UL grants for Msg3 transmission in NR are currently conveyed in a Msg2 sent via PDSCH scheduled by DCI 1_0, during RACH procedure. For this reason, existing scheduling solutions for PUSCH repetitions cannot be reused, i.e., via DCI 0_0/0_1/0_2.
Examples of the present disclosure provide a new solution to provide the necessary support to Msg3 repetitions in NR (as per a currently ongoing 3GPP Rel-17 Work Item Description, WID). Furthermore, examples also achieve the same and provide such functionality with minimal (or zero) impact on legacy UE (Rel-15/16) operation, where legacy UEs not supporting the functionality can work in the system without the gNB needing to know in advance whether the UE attempting a random access procedure is a new UE supporting the functionality or a legacy UE not supporting the functionality.
In various examples of the present disclosure, a specific set of values of TC-RNTI (included in each UL grant, which is in turn carried by MAC RAR) are used to at least trigger and/or configure Msg3 repetitions for the UE whose RAPID is included as sub-header of the MAC RAR. The set of values may or may not be a continuous range of values.
In essence, the previously fully open/random choice/selection of TC-RNTI (with values ranging from 1 to 65519 (0x0001 to 0xFFEF)), is constrained in order to enable the TC-RNTI to carry additional information. The additional meaning of a particular TC-RNTI value is only ‘visible’ to UEs that support such functionality—referred to as Coverage Enhanced, CE, UEs. Legacy UEs are not aware of the “presence” of the additional information and behave, unaffected, as before.
Various examples of the disclosure may enable the following design goals to be met, without enforcing any non-negligible trade-off in terms of performance or backward compatibility:
In various examples, a specific logic is used by the gNB by which to decide/select the TC-RNTI(s) included in the MAC PDU (one per UL grant), depending on how different TC-RNTI value(s) among the 65519 available ones are mapped to specific Msg3-related signaling, e.g., triggering and/or configuring the UE to perform repeated Msg3 transmissions. Such implicit signalling could be used to simply trigger Msg3 repetitions, and/or also used to configure additional aspects of the Msg3 repetitions, e.g., number of repetitions. Advantageously, the gNB does not need to alter the structure or the size of the MAC PDU carried by Msg2, nor the DCI 1_0 (whose CRC is scrambled by the RA-RNTI, corresponding to the Random Access Occasion, RO, over which one or more preambles have been detected by gNB) used to schedule the PDSCH that carries Msg2. Advantageously, such functionality is thereby achieved with no impact on legacy UEs operations, nor on their performance. Furthermore, the present method could be used regardless of whether the gNB is aware of the capabilities of the UEs attempting access, i.e., whether or not the gNB is aware of whether the UE is a CE UE (that has the capability to support the convening of Msg3 repetition information conveyed via TC-RNTI) or a legacy UE.
Only CE UEs would be able to infer the additional meaning conveyed by the specific TC-RNTI values associated to Msg3-related signalling, whereas legacy UEs would keep operating as per Rel-15/Rel-16 specification. Indeed, all UEs would keep using their received TC-RNTI to scramble the CRC of Msg3 as per legacy RACH procedure, regardless of whether they are also using TC-RNTI to infer additional Msg3-related signalling. Hence, the signaling method of the present disclosure advantageously provides compatibility and full backward compatibility with current NR network operations and procedures.
The information on the aforementioned mapping between particular TC-RNTI value(s) and their corresponding Msg3-related meaning, could be made available at the UEs at least via such information being:
In various examples of the disclosure provides a method to trigger and/or configure Msg3 repetitions, along with a suitable signaling structure used by the method itself, which can be added to the current network operations as per Rel-16.
The Msg3 repetition triggering and configuration method makes use of an existing field of the MAC RAR, e.g., the TC-RNTI, while establishing a relationship between specific instances of that field and Msg3-related signaling.
Advantageously, examples of the proposed method of the present disclosure do not require modifications to existing UL grant, nor an increase of number of UL grants carried by the MAC PDU. Examples of the proposed method do not enforce any new requirements on PDSCH capacity as compared to other UL grant based counterparts. Examples of the proposed method do not require modification to existing DCI 1_0 format, in terms of neither additional fields nor use of the existing fields. Examples of the method do not require any change to RA-RNTI number space or calculation. This ensures a much lower specification impact (i.e., null). This may be particularly beneficial given the significant role RA-RNTI has on the RO/SSB/DCI 1_0 mapping in the context of RACH.
Examples of the proposed method do not assume that specific conditions are met in the cell or at the UE side for being applied and used. In examples of the proposed method, the informative content of existing fields of the UL grant, such as MCS and TPC, is not reduced. Examples of the proposed method do not propose the existence of a Rel-17 grant among Rel-15/Rel-16 ones, differentiated using a reserved bit in the MAC RAR (e.g., ‘IR’ bit in the MAC RAR, or the reserved CSI request field of the UL grant in the MAC RAR).
The UE 110 signals a PRACH preamble 502 to the gNB 120.
The gNB may decide whether or not to trigger and/or configure Msg3 repetitions depending, for example, on whether one or more of the following conditions are met:
If the gNB decides to trigger and/or configure Msg3 repetitions, in block 503 the gNB then selects an appropriate TC-RNTI value 2021 to be included in the payload of a Msg2 2011. The TC-RNTI is selected depending on whether it is used to trigger Msg3 repetitions and/or configure the number of Msg3 repetitions.
Block 503 may or may not also include a dynamic/semi-static indication (e.g., via DCI over broadcast PDCCH) to configure the mapping of TC-RNTI values to suitable configurations of Msg3 repetitions (e.g., related to triggering and/or number of repetitions). Such further signaling can be alternative to higher-layer signaling 501, or hard-coded configuration in specification.
The higher-layer signaling 501 may provide information on the mapping of TC-RNTI values to triggering and/or configuring Msg3 repetitions by the UE. It may comprise configuration options such as triggering and/or number of Msg3 repetitions. The higher-layer signaling may be provided via SIB1 or RMSI. The higher layer signalling can be omitted if the mapping information is hardcoded in the specification, or otherwise provided to the UE, e.g., via the above-mentioned dynamic/semi-static indication (e.g., via DCI over broadcast PDCCH. For instance, a semi-static indication could be provided by the DCI triggering and/or configuring the repetition which remains stays active until a new DCI [or something else] de-activates or changes it).
Once the TC-RNTI 2021 has been selected, the gNB signals the Msg2 2011 (comprising the selected TC-RNTI 2021 in its MAC RAR part) to the UE.
In block 2031 the UE determines information, i.e., triggering and/or configurating information, based at least in part on the TC-RNTI 2011. The UE decodes the information encoded in the TC-RNTI. The UE may determine whether Msg3 repetitions are triggered and/or a number of repetitions is configured based on the TC-RNTI provided by gNB, and on the mapping between TC-RNTI values and configurations related to Msg3 repetitions (such mapping information being either: hard coded, received via higher layer signalling or dynamically/semi-statically indicated e.g., via DCI).
UEs that have the capability to infer Msg3 triggering/configuration from TC-RNTI, i.e., CE UEs, are able to use the TC-RNTI also as implicit signaling related to Msg3 repetitions, whereas legacy UEs are not (though can continue to use the TC-RNTI in the conventional way, not least to scramble a CRC of the legacy UEs Msg3).
With reference to 2041 the UE acts in accordance with the decoded triggering information and/or configuration information related to Msg3 repetitions. In this particular example, the UE (i.e., the CE UE) is triggered to perform Msg3 repetitions and hence the UE proceeds to perform such an action, i.e., repeatedly transmits its Msg3 504 for a number of times, i.e., 5041 5042 (the number of repetition times may be encoded as configuration information in the TC-RNTI, or it may be: hard coded, received via higher layer signalling 501 or dynamically/semi-statically indicated e.g., via DCI).
As with the above-described examples, the gNB 120 can select TC-RNTI values to be included in each UL grant, depending on whether gNB wants to, or shall, trigger and/or configure Msg3 repetitions to the recipient of the UL grant (i.e., the targeted UE(s) whose RAPID is used as sub-header of the MAC RAR).
Only CE UEs 110 would be able to interpret the implicit signalling conveyed by the gNB through its selected TC-RNTI, i.e., “decode” the trigger or configuration (or both) of Msg3 repetitions via TC-RNTI, whereas legacy UEs would operate with no modifications, e.g., with regards to Rel-15/Rel-16 operations.
Two possible implementations will now be described (it being appreciated that others are possible):
1. Use a Set of TC-RNTI Values to at Least Indicate that Repetitions are Triggered
According to this implementation, a set of TC-RNTI values is used to at least indicate that repetitions are triggered. Other implicit signalling via TC-RNTI may take place together with the trigger. The set of TC-RNTI values, or multiple sub-sets of TC-RNTI values, may also be also used to configure the number of Msg3 repetitions (such configuration may also serve the purpose of trigger as well, or one or more bits of the TC-RNTI field can be used to trigger the repetitions).
The set of TC-RNTI values could be a range of contiguous TC-RNTI values.
The set of TC-RNTI values could be hard-coded in the specs. A non-limiting example, is provided in the below table, which shows a hard-coded set of TC-RNTI values with corresponding Msg3 repetition trigger state.
where:
The set of TC-RNTI values could be provided via higher-layer signaling (e.g., SIB1 or RMSI).
The set of TC-RNTI values could be indicated via a sub-set of specific TC-RNTI instances (e.g., considering the whole 16-bit sequence of TC-RNTI).
The set of TC-RNTI values can be indicated via a sub-set of N bits of the TC-RNTI field.
The sub-set of N bits could be given by the N Least Significant Bits, LSBs/Most Significant Bits, MSBs of the TC-RNTI field.
In one implementation, the set of TC-RNTI values could be also used to configure the number of Msg3 repetitions. A non-limiting example of this in provided in the below table, which shows an example of a hard-coded, or gNB-configured, set of TC-RNTI values with corresponding indicated number of Msg3 repetitions.
where:
The same set or different sub-sets of values can be used to indicate the number of Msg3 repetitions
A specific sub-set of m TC-RNTI values can be used to trigger Msg3 repetitions and configure a value for the number of Msg3 repetitions from a set containing m elements.
M LSBs/MSBs of the m TC-RNTI values can be used to trigger Msg3 repetitions and configure a value for the number of Msg3 repetitions among at least 2 M values.
The M LSBs/MSBs of the m TC-RNTI values can be used in conjunction with other indicators to configure more than 2 M values for the number of Msg3 repetitions.
The LSB/MSB of the TC-RNTI can be used to trigger the Msg3 repetitions, while the remaining M−1 bits of the TC-RNTI can be used to configure a value for the number of Msg3 repetitions among at least 2M-1 values by associating a range of values to a specific number of repetitions.
The M−1 LSBs/MSBs of the TC-RNTI can be used in conjunction with other indicators to configure more than 2M-1 values for the number of Msg3 repetitions.
Having different sub-sets may help provide false-alarm robustness.
In one implementation, the number of Msg3 repetitions could be configured via higher-layer signaling (e.g., via SIB1).
In one implementation, the number of Msg3 repetitions could be hard-coded in the specification.
In one implementation, the number of Msg3 repetition could be configured dynamically via other indicators provided to UE.
In one implementation, the gNB could provide, via higher-layer signaling, (e.g., SIB1), at least a flag to indicate that Msg3 repetitions are supported in the cell/by the gNB instructing the UE to repeat the Msg3 according to the received TC-RNTI. Remaining configuration on the use of TC-RNTI can be provided in SIB1 or other RMSI
2. Use a Set of TC-RNTI Values to at Least Configure the Number of Msg3 Repetitions
According to this implementation, a set of TC-RNTI values is used to at least configure the number of Msg3 repetitions. Differently from the previous implementation, here the at least does not necessarily imply that Msg3 repetitions are also triggered via TC-RNTI (indeed they may or may not), but simply that further implicit signalling via TC-RNTI may take place together with the Msg3-related implicit signalling).
The set of TC-RNTI values could be a range of contiguous TC-RNTI values.
The set of TC-RNTI values could be hard-coded in the specs or configured by the gNB (an example, and by no means a unique possible example, is provided in the below table showing an example of sets of TC-RNTI values with corresponding indicated number of Msg3 repetitions:
where:
In the above table, the range Ni to Nj is mapped to “no repetition”. This could arguably be deemed to be a redundant configuration. However, representing a perfectly valid “Msg3 repetitions are not configured” case has been added for the sake of clarity, and logically a set of TC-RNTIs must map to a “no repetition” action, either explicitly or by not being included in any of the ranges that map to any of the repetition values larger than 1.
The set of TC-RNTI values could be provided via higher-layer signaling (e.g., SIB1 or RMSI).
The set of TC-RNTI values could be indicated via a sub-set of TC-RNTI instances (e.g., considering the whole 16-bit sequence).
The set of TC-RNTI values could be indicated via a sub-set of N bits of the TC-RNTI field. The sub-set of N bits could be given by the N LSBs/MSBs of the TC-RNTI field. The same set or different sub-sets of TC-RNTI values could be used to indicate the number of Msg3 repetitions. A specific sub-set of m TC-RNTI values could be used to configure a value for the number of Msg3 repetitions among at least m values.
M LSBs/MSBs of the TC-RNTI could be used to configure a value for the number of Msg3 repetitions among at least 2 M values. The M LSBs/MSBs of the TC-RNTI could be used in conjunction with other indicators to configure more than 2 M values for the number of Msg3 repetitions.
In one implementation, the gNB could provide, via higher-layer signaling (e.g., in SIB1 or RMSI), an indication, such as at least a flag, to indicate that Msg3 repetitions are supported in the cell/by the gNB. The remaining configuration on the use of TC-RNTI could be provided via higher-layer signalling, e.g., in SIB1 or RMSI
Whist
The signaling diagrams and flowcharts of
The blocks illustrated in
It will be understood that each block and combinations of blocks, can be implemented by various means, such as hardware, firmware, and/or software including one or more computer program instructions. For example, one or more of the procedures described above can be embodied by computer program instructions. In this regard, the computer program instructions which embody the procedures described above can be stored by a memory storage device and performed by a processor.
As will be appreciated, any such computer program instructions can be loaded onto a computer or other programmable apparatus (i.e., hardware) to produce a machine, such that the instructions when performed on the programmable apparatus create means for implementing the functions specified in the blocks. These computer program instructions can also be stored in a computer-readable medium that can direct a programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the blocks. The computer program instructions can also be loaded onto a programmable apparatus to cause a series of operational actions to be performed on the programmable apparatus to produce a computer-implemented process such that the instructions which are performed on the programmable apparatus provide actions for implementing the functions specified in the blocks.
Various, but not necessarily all, examples of the present disclosure can take the form of a method, an apparatus or a computer program. Accordingly, various, but not necessarily all, examples can be implemented in hardware, software or a combination of hardware and software.
Various, but not necessarily all, examples of the present disclosure are described using signaling diagrams, flowchart illustrations and schematic block diagrams. It will be understood that each block (of the flowchart illustrations and block diagrams), and combinations of blocks, can be implemented by computer program instructions of a computer program. These program instructions can be provided to one or more processor(s), processing circuitry or controller(s) such that the instructions which execute on the same create means for causing implementing the functions specified in the block or blocks, i.e., such that the method can be computer implemented. The computer program instructions can be executed by the processor(s) to cause a series of operational steps/actions to be performed by the processor(s) to produce a computer implemented process such that the instructions which execute on the processor(s) provide steps for implementing the functions specified in the block or blocks.
Accordingly, the blocks support: combinations of means for performing the specified functions; combinations of actions for performing the specified functions; and computer program instructions/algorithm for performing the specified functions. It will also be understood that each block, and combinations of blocks, can be implemented by special purpose hardware-based systems which perform the specified functions or actions, or combinations of special purpose hardware and computer program instructions.
Various, but not necessarily all, examples of the present disclosure provide both a method and corresponding apparatus comprising various modules, means or circuitry that provide the functionality for performing/applying the actions of the method. The modules, means or circuitry can be implemented as hardware, or can be implemented as software or firmware to be performed by a computer processor. In the case of firmware or software, examples of the present disclosure can be provided as a computer program product including a computer readable storage structure embodying computer program instructions (i.e., the software or firmware) thereon for performing by the computer processor.
The apparatus comprises a controller 11, which could be provided within a device such as a UE 110 or a gNB 120. The controller 11 can be embodied by a computing device, not least such as those mentioned above. In some, but not necessarily all examples, the apparatus can be embodied as a chip, chip set or module, i.e., for use in any of the foregoing. As used here ‘module’ refers to a unit or apparatus that excludes certain parts/components that would be added by an end manufacturer or a user.
Implementation of the controller 11 may be as controller circuitry. The controller 11 may be implemented in hardware alone, have certain aspects in software including firmware alone or can be a combination of hardware and software (including firmware).
The controller 11 may be implemented using instructions that enable hardware functionality, for example, by using executable instructions of a computer program 14 in a general-purpose or special-purpose processor 12 that may be stored on a computer readable storage medium 13, for example memory, or disk etc, to be executed by such a processor 12.
The processor 12 is configured to read from and write to the memory 13. The processor 12 may also comprise an output interface via which data and/or commands are output by the processor 12 and an input interface via which data and/or commands are input to the processor 12. The apparatus may be coupled to or comprise one or more other components 15 (not least for example: a radio transceiver, sensors, input/output user interface elements and/or other modules/devices/components for inputting and outputting data/commands).
The memory 13 stores a computer program 14 comprising computer program instructions (computer program code) that controls the operation of the apparatus 10 when loaded into the processor 12. The computer program instructions, of the computer program 14, provide the logic and routines that enables the apparatus to perform the methods, processes and procedures described in the present disclosure and illustrated in
Although the memory 13 is illustrated as a single component/circuitry it may be implemented as one or more separate components/circuitry some or all of which may be integrated/removable and/or may provide permanent/semi-permanent/dynamic/cached storage.
Although the processor 12 is illustrated as a single component/circuitry it may be implemented as one or more separate components/circuitry some or all of which may be integrated/removable. The processor 12 may be a single core or multi-core processor.
The apparatus may include one or more components for effecting the methods, processes and procedures described in the present disclosure and illustrated in
Although examples of the apparatus have been described above in terms of comprising various components, it should be understood that the components can be embodied as or otherwise controlled by a corresponding controller or circuitry such as one or more processing elements or processors of the apparatus. In this regard, each of the components described above can be one or more of any device, means or circuitry embodied in hardware, software or a combination of hardware and software that is configured to perform the corresponding functions of the respective components as described above.
The apparatus can, for example, be a node of a network, a UE, a gNB, a RAN node, a gNB-CU, a gNB-DU. The apparatus can be a base station in a mobile cellular telecommunication system, a server device, a client device, a mobile cellular telephone, a wireless communications device, a hand-portable electronic device, a location/position tag, a hyper tag etc. The apparatus can be embodied by a computing device, not least such as those mentioned above. However, in some examples, the apparatus can be embodied as a chip, chip set or module, i.e., for use in any of the foregoing.
In one example, the apparatus is embodied on a hand held portable electronic device, such as a mobile telephone, wearable computing device or personal digital assistant, that can additionally provide one or more audio/text/video communication functions (for example tele-communication, video-communication, and/or text transmission (Short Message Service (SMS)/Multimedia Message Service (MMS)/emailing) functions), interactive/non-interactive viewing functions (for example web-browsing, navigation, TV/program viewing functions), music recording/playing functions (for example Moving Picture Experts Group-1 Audio Layer 3 (MP3) or other format and/or (frequency modulation/amplitude modulation) radio broadcast recording/playing), downloading/sending of data functions, image capture function (for example using a (for example in-built) digital camera), and gaming functions.
In some examples, the apparatus 10 is provided in a UE 110, the apparatus comprising:
Where the apparatus is implemented in a UE, the UE may be configured for one or more the following purposes:
In some examples, the apparatus is provided in a radio access node 120, the apparatus comprising:
According to some examples of the present disclosure, there is provided a system comprising: a centralized unit, distributed unit and UE as described above.
The above described examples find application as enabling components of: telecommunication systems; tracking systems, automotive systems; electronic systems including consumer electronic products; distributed computing systems; media systems for generating or rendering media content including audio, visual and audio visual content and mixed, mediated, virtual and/or augmented reality; personal systems including personal health systems or personal fitness systems; navigation systems; user interfaces also known as human machine interfaces; networks including cellular, non-cellular, and optical networks; ad-hoc networks; the internet; the internet of things (IOT); Vehicle-to-everything (V2X), virtualized networks; and related software and services.
The apparatus can be provided in an electronic device, for example, a mobile terminal, according to an example of the present disclosure. It should be understood, however, that a mobile terminal is merely illustrative of an electronic device that would benefit from examples of implementations of the present disclosure and, therefore, should not be taken to limit the scope of the present disclosure to the same. While in certain implementation examples, the apparatus can be provided in a mobile terminal, other types of electronic devices, such as, but not limited to, hand portable electronic devices, wearable computing devices, portable digital assistants (PDAs), pagers, mobile computers, desktop computers, televisions, gaming devices, laptop computers, cameras, video recorders, GPS devices and other types of electronic systems, can readily employ examples of the present disclosure. Furthermore, devices can readily employ examples of the present disclosure regardless of their intent to provide mobility.
In certain examples of the present disclosure, there is provided computer program instructions for causing a distributed unit of an access node or a UE to perform at least the following or for causing performing at least the following:
In certain examples of the present disclosure, there is provided computer program instructions for causing a centralized unit of an access node to perform at least the following or for causing performing at least the following:
References to ‘computer program’, ‘computer-readable storage medium’, ‘computer program product’, ‘tangibly embodied computer program’ etc. or a ‘controller’, ‘computer’, ‘processor’ etc. should be understood to encompass not only computers having different architectures such as single/multi-processor architectures and sequential (Von Neumann)/parallel architectures but also specialized circuits such as field-programmable gate arrays (FPGA), application specific circuits (ASIC), signal processing devices and other devices. References to computer program, instructions, code etc. should be understood to encompass software for a programmable processor or firmware such as, for example, the programmable content of a hardware device whether instructions for a processor, or configuration settings for a fixed-function device, gate array or programmable logic device etc.
As used in this application, the term ‘circuitry’ may refer to one or more or all of the following:
This definition of circuitry applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term circuitry also covers an implementation of merely a hardware circuit or processor and its (or their) accompanying software and/or firmware. The term circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit for a mobile device or a similar integrated circuit in a server, a cellular network device, or other computing or network device.
Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Features described in the preceding description can be used in combinations other than the combinations explicitly described.
Although functions have been described with reference to certain features, those functions can be performable by other features whether described or not. Although features have been described with reference to certain examples, those features can also be present in other examples whether described or not. Accordingly, features described in relation to one example/aspect of the disclosure can include any or all of the features described in relation to another example/aspect of the disclosure, and vice versa, to the extent that they are not mutually inconsistent.
Although various examples of the present disclosure have been described in the preceding paragraphs, it should be appreciated that modifications to the examples given can be made without departing from the scope of the invention as set out in the claims.
The term ‘comprise’ is used in this document with an inclusive not an exclusive meaning. That is any reference to X comprising Y indicates that X can comprise only one Y or can comprise more than one Y. If it is intended to use ‘comprise’ with an exclusive meaning then it will be made clear in the context by referring to “comprising only one . . . ” or by using “consisting”.
As used herein, the term “determine/determining” (and grammatical variants thereof) can include, not least: calculating, computing, processing, deriving, measuring, investigating, looking up (for example, looking up in a table, a database or another data structure), ascertaining and the like. Also, “determining” can include receiving (for example, receiving information), accessing (for example, accessing data in a memory), obtaining and the like. Also, “determine/determining” can include resolving, selecting, choosing, establishing, and the like.
References to a parameter can be replaced by references to “data indicative of”, “data defining” or “data representative of” the relevant parameter if not explicitly stated.
In this description, reference has been made to various examples. The description of features or functions in relation to an example indicates that those features or functions are present in that example. The use of the term ‘example’ or ‘for example’, ‘can’ or ‘may’ in the text denotes, whether explicitly stated or not, that such features or functions are present in at least the described example, whether described as an example or not, and that they can be, but are not necessarily, present in some or all other examples. Thus ‘example’, ‘for example’, ‘can’ or ‘may’ refers to a particular instance in a class of examples. A property of the instance can be a property of only that instance or a property of the class or a property of a sub-class of the class that includes some but not all of the instances in the class.
In this description, references to “a/an/the” [feature, element, component, means . . . ] are to be interpreted as “at least one” [feature, element, component, means . . . ] unless explicitly stated otherwise. That is any reference to X comprising a/the Y indicates that X can comprise only one Y or can comprise more than one Y unless the context clearly indicates the contrary. If it is intended to use ‘a’ or ‘the’ with an exclusive meaning then it will be made clear in the context. In some circumstances the use of ‘at least one’ or ‘one or more’ can be used to emphasise an inclusive meaning but the absence of these terms should not be taken to infer any exclusive meaning.
The presence of a feature (or combination of features) in a claim is a reference to that feature (or combination of features) itself and also to features that achieve substantially the same technical effect (equivalent features). The equivalent features include, for example, features that are variants and achieve substantially the same result in substantially the same way. The equivalent features include, for example, features that perform substantially the same function, in substantially the same way to achieve substantially the same result.
In this description, reference has been made to various examples using adjectives or adjectival phrases to describe characteristics of the examples. Such a description of a characteristic in relation to an example indicates that the characteristic is present in some examples exactly as described and is present in other examples substantially as described.
In the above description, the apparatus described can alternatively or in addition comprise an apparatus which in some other examples comprises a distributed system of apparatus, for example, a client/server apparatus system. In examples where an apparatus provided forms (or a method is implemented as) a distributed system, each apparatus forming a component and/or part of the system provides (or implements) one or more features which collectively implement an example of the present disclosure. In some examples, an apparatus is re-configured by an entity other than its initial manufacturer to implement an example of the present disclosure by being provided with additional software, for example by a user downloading such software, which when executed causes the apparatus to implement an example of the present disclosure (such implementation being either entirely by the apparatus or as part of a system of apparatus as mentioned hereinabove).
The above description describes some examples of the present disclosure however those of ordinary skill in the art will be aware of possible alternative structures and method features which offer equivalent functionality to the specific examples of such structures and features described herein above and which for the sake of brevity and clarity have been omitted from the above description. Nonetheless, the above description should be read as implicitly including reference to such alternative structures and method features which provide equivalent functionality unless such alternative structures or method features are explicitly excluded in the above description of the examples of the present disclosure.
Whilst endeavouring in the foregoing specification to draw attention to those features of examples of the present disclosure believed to be of particular importance it should be understood that the applicant claims protection in respect of any patentable feature or combination of features hereinbefore referred to and/or shown in the drawings whether or not particular emphasis has been placed thereon.
The examples of the present disclosure and the accompanying claims can be suitably combined in any manner apparent to one of ordinary skill in the art.
Each and every claim is incorporated as further disclosure into the specification and the claims are embodiment(s) of the present invention. Further, while the claims herein are provided as comprising specific dependencies, it is contemplated that any claims can depend from any other claims and that to the extent that any alternative embodiments can result from combining, integrating, and/or omitting features of the various claims and/or changing dependencies of claims, any such alternative embodiments and their equivalents are also within the scope of the disclosure.
Number | Date | Country | Kind |
---|---|---|---|
20215366 | Mar 2021 | FI | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/FI2022/050151 | 3/10/2022 | WO |