白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Method for performing random access and terminal for performing same

專利號(hào)
US10791541B2
公開(kāi)日期
2020-09-29
申請(qǐng)人
LG ELECTRONICS INC.(KR Seoul)
發(fā)明人
Seunggye Hwang; Yunjung Yi; Kijun Kim; Seonwook Kim
IPC分類
H04W72/02; H04L27/26; H04W72/04; H04W74/08; H04L29/08; H04L12/24; H04L29/06; H04W76/10; H04L5/00
技術(shù)領(lǐng)域
ue,numerology,prach,preamble,random,access,resource,enodeb,dci,in
地域: Seoul

摘要

A disclosure of the present specification provides a method for performing random access by a terminal. The method may comprise the steps of: selecting, by the terminal, a first resource among a plurality of resources for a physical random access channel (PRACH), wherein the plurality of resources exist for each numerology, and the numerology is defined by a cycle prefix (CP) length and a subcarrier spacing; and transmitting, by the terminal, the PRACH on the first resource through a first numerology when the selected first resource is for the first numerology.

說(shuō)明書

FIG. 6 illustrates the architecture of an uplink subframe in 3GPP LTE.

FIG. 7 is a block diagram illustrating the radio protocol architecture.

FIG. 8 is a diagram showing a contention-based random access method.

FIG. 9 is a diagram showing a non-contention-based random access method.

FIG. 10 is a diagram showing the structure of a random access preamble.

FIG. 11 shows a system that provides a plurality of numerologies according to an embodiment proposed in the present description.

FIG. 12 shows examples in which PRACH resources can be configured according to embodiments proposed in the present description.

FIGS. 13a to 13c show examples of selecting one of a plurality of resources according to embodiments proposed in the present description.

FIGS. 14a and 14b show examples of changing resources according to embodiments proposed in the present description.

FIG. 15 shows a 2-step random access procedure.

FIG. 16 shows a 2-step random access procedure when a random access response is composed of 2-step DCI.

FIG. 17 shows a contention-based random access procedure when a random access response is composed of 2-step DCI.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋