18422318. NETWORK SLICING-BASED RANDOM ACCESS METHOD AND APPARATUS, AND STORAGE MEDIUM simplified abstract (HUAWEI TECHNOLOGIES CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

NETWORK SLICING-BASED RANDOM ACCESS METHOD AND APPARATUS, AND STORAGE MEDIUM

Organization Name

HUAWEI TECHNOLOGIES CO., LTD.

Inventor(s)

Fei Sun of Shanghai (CN)

NETWORK SLICING-BASED RANDOM ACCESS METHOD AND APPARATUS, AND STORAGE MEDIUM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18422318 titled 'NETWORK SLICING-BASED RANDOM ACCESS METHOD AND APPARATUS, AND STORAGE MEDIUM

Simplified Explanation

The abstract describes a method for receiving downlink control information and random access responses in a communication system.

  • The method involves receiving downlink control information containing identifiers of specific data slices or slice groups, as well as random access resource configuration indexes corresponding to those slices or slice groups.
  • The method also includes receiving random access responses for requested data slices or slice groups based on the information received in the downlink control information.

Potential Applications

This technology could be applied in 5G networks, IoT devices, and other wireless communication systems where efficient data access and resource allocation are crucial.

Problems Solved

This technology helps in optimizing resource allocation and data access in wireless communication systems, improving overall network efficiency and user experience.

Benefits

The benefits of this technology include faster data access, reduced network congestion, improved reliability, and enhanced user satisfaction in communication systems.

Potential Commercial Applications

Potential commercial applications of this technology include telecommunications companies, network equipment manufacturers, IoT device manufacturers, and any industry relying on efficient wireless communication systems.

Possible Prior Art

One possible prior art could be the use of similar methods in previous generations of wireless communication systems, such as 4G LTE networks, to optimize resource allocation and data access.

What are the specific identifiers used in the downlink control information?

The specific identifiers used in the downlink control information are the identifier of a first slice, the identifier of a first slice group, a random access resource configuration index corresponding to the first slice, or a random access resource configuration index corresponding to the first slice group.

How does the random access response correspond to the information in the downlink control information?

The random access response corresponds to the first slice, the first slice group, the random access resource configuration index of the first slice, or the random access resource configuration index of the first slice group that the terminal requests to access based on the information received in the downlink control information.


Original Abstract Submitted

In accordance with an embodiment, a method includes: receiving downlink control information comprising at least one piece of information of the following: an identifier of a first slice, an identifier of a first slice group, a random access resource configuration index corresponding to the first slice, or a random access resource configuration index corresponding to the first slice group; and receiving a random access response in response to a second slice or a second slice group that the terminal requests to access corresponding to the at least one piece of information comprised in the downlink control information, where the random access response corresponds to the first slice, the first slice group, the random access resource configuration index of the first slice, or the random access resource configuration index of the first slice group.