EP-4738751-A2 - RECEPTION OF ON-DEMAND SYSTEM INFORMATION BLOCK 1
Abstract
A method can include receiving, by a wireless device, two search space zero information elements (IEs) of a second cell and two control resource set (coreset) zero IEs of the second cell. A first search space zero IE and a first coreset zero IE of the second cell are included in on-demand system information block 1 (OD-SIB1) request configuration IE. A second search space zero IE and a second coreset zero IE of the second cell are included in a master information block (MIB) message. The method can also include transmitting a preamble indicating a request of the OD-SIB 1 of the second cell and monitoring, in response to an IE indicating a RA search space associated with the RA procedure being absent in the OD-SIB 1 request configuration IE, a physical downlink control channel (PDCCH), for receiving a response corresponding to the transmitting the preamble.
Inventors
- ZHOU, HUA
- YI, YUNJUNG
- Dinan, Esmael Hejazi
- JEON, HYOUNGSUK
- KAZMI, MUHAMMAD ALI
- PARK, KYUNGMIN
- KIM, TAEHUN
- CIRIK, Ali Cagatay
Assignees
- Ofinno, LLC
Dates
- Publication Date
- 20260506
- Application Date
- 20251029
Claims (15)
- A method comprising: receiving, by a wireless device, two search space zero information elements (IEs) of a second cell and two control resource set (coreset) zero IEs of the second cell, wherein: a first search space zero IE and a first coreset zero IE of the second cell are comprised in on-demand system information block 1 (OD-SIB1) request configuration IE of a SIB26 message of a first cell; and a second search space zero IE and a second coreset zero IE of the second cell are comprised in a master information block (MIB) message of the second cell; transmitting, based on triggering a random access (RA) procedure on the second cell, a preamble indicating a request of the OD-SIB1 of the second cell; and monitoring, on the second cell and in response to an IE, indicating a RA search space associated with the RA procedure, being absent in the OD-SIB1 request configuration IE received via the first cell, a physical downlink control channel (PDCCH), according to the first search space zero IE and the first coreset zero IE comprised in the OD-SIB1 request configuration IE, for receiving a response corresponding to the transmitting the preamble.
- The method of claim 1, wherein the monitoring the PDCCH is not according to the second search space zero IE and the second coreset zero IE comprised in the MIB message of the second cell.
- The method of claim 1 or claim 2, wherein the wireless device is in an RRC_IDLE state or RRC_INACTIVE state.
- The method of any one of claims 1 to 3, wherein the wireless device receives: the SIB26 message via the first cell, wherein the SIB26 message comprises the OD-SIB1 request configuration IE for the second cell; and the MIB message via the second cell.
- The method of any one of claims 1 to 4, wherein the wireless device triggers, the RA procedure on the second cell for the request of the OD-SIB1 of the second cell, based on at least one of: the wireless device being capable of transmitting the preamble requesting the OD-SIB1 of the second cell; at least one synchronization signal block (SSB) being received on the second cell; and the OD-SIB1 request configuration IE being associated with the second cell.
- The method of any one of claims 1 to 5, wherein the wireless device monitors the PDCCH for receiving a downlink control formation (DCI) with cyclic redundancy check (CRC) bits of the DCI being scrambled by a random access radio network temporary identifier (RA-RNTI), wherein the DCI schedules a physical downlink shared channel (PDSCH) for the response.
- The method of claim 6, further comprising receiving the response after receiving the DCI, wherein the DCI is received based on the monitoring the PDCCH, of the second cell, according to the first search space zero IE and the first coreset zero IE of the second cell.
- The method of claim 7, further comprising, after receiving the response, monitoring, the PDCCH of the second cell, according to the first search space zero IE and the first coreset zero IE, for receiving a second DCI with CRC bits of the second DCI being scrambled by a system information radio network temporary identifier (SI-RNTI).
- The method of claim 8, further comprising receiving, the second DCI scheduling the OD-SIB1 of the second cell, based on the CRC bits of the DCI being scrambled by the SI-RNTI.
- The method of claim 9, further comprising at least one of: receiving the OD-SIB1 of the second cell after receiving the second DCI; performing a cell re-selection to the second cell based on receiving the OD-SIB1 of the second cell; and camping on the second cell.
- The method of any one of claims 1 to 10, wherein in response to the IE, indicating the RA search space, being present in the OD-SIB1 request configuration IE, the wireless device monitors the PDCCH on the RA search space according to the IE for receiving the response.
- The method of claim 11, wherein the monitoring the PDCCH on the RA search space is based on none of one or more resource elements (REs), of a PDCCH candidate of the RA search space, overlapping with at least one of one or more REs of a synchronization signal block (SSB) of the second cell, wherein the SSB of the second cell is indicated in the OD-SIB1 request configuration IE of the second cell.
- The method of claim 12, wherein the wireless device does not monitor the PDCCH on the RA search space based on at least one of the one or more REs, of the PDCCH candidate of the RA search space, overlapping with at least one of the one or more REs of the SSB of the second cell.
- An apparatus comprising: one or more processors; and memory storing instructions that, when executed by the one or more processors, cause the apparatus to perform the method of any one of claims 1 to 13.
- A non-transitory computer-readable medium comprising instructions that, when executed by one or more processors of an apparatus, cause the apparatus to perform the method of any one of claims 1 to 13.
Description
CROSS REFERENCE TO RELATED APPLICATIONS This application claims the benefit of U.S. Provisional Application No. 63/713,456, filed October 29, 2024, which is hereby incorporated by reference in its entirety. BRIEF DESCRIPTION OF THE DRAWINGS Examples of several of the various embodiments of the present disclosure are described herein with reference to the drawings. FIG. 1A and FIG. 1B illustrate example mobile communication networks in which embodiments of the present disclosure may be implemented.FIG. 2A and FIG. 2B respectively illustrate a New Radio (NR) user plane and control plane protocol stack.FIG. 3 illustrates an example of services provided between protocol layers of the NR user plane protocol stack of FIG. 2A.FIG. 4A illustrates an example downlink data flow through the NR user plane protocol stack of FIG. 2A.FIG. 4B illustrates an example format of a MAC subheader in a MAC PDU.FIG. 5A and FIG. 5B respectively illustrate a mapping between logical channels, transport channels, and physical channels for the downlink and uplink.FIG. 6 is an example diagram showing RRC state transitions of a UE.FIG. 7 illustrates an example configuration of an NR frame into which OFDM symbols are grouped.FIG. 8 illustrates an example configuration of a slot in the time and frequency domain for an NR carrier.FIG. 9 illustrates an example of bandwidth adaptation using three configured BWPs for an NR carrier.FIG. 10A illustrates three carrier aggregation configurations with two component carriers.FIG. 10B illustrates an example of how aggregated cells may be configured into one or more PUCCH groups.FIG. 11A illustrates an example of an SS/PBCH block structure and location.FIG. 11B illustrates an example of CSI-RSs that are mapped in the time and frequency domains.FIG. 12A and FIG. 12B respectively illustrate examples of three downlink and uplink beam management procedures.FIG. 13A, FIG. 13B, and FIG. 13C respectively illustrate a four-step contention-based random access procedure, a two-step contention-free random access procedure, and another two-step random access procedure.FIG. 14A illustrates an example of CORESET configurations for a bandwidth part.FIG. 14B illustrates an example of a CCE-to-REG mapping for DCI transmission on a CORESET and PDCCH processing.FIG. 15 illustrates an example of a wireless device in communication with a base station.FIG. 16A, FIG. 16B, FIG. 16C, and FIG. 16D illustrate example structures for uplink and downlink transmission.FIG. 17A, FIG. 17B, and FIG. 17C illustrate aspects of example embodiments according to the present disclosure.FIG. 18A and FIG. 18B illustrate aspects of example embodiments according to the present disclosure.FIG. 19 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 20 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 21A and FIG. 21B illustrate aspects of example embodiments according to the present disclosure.FIG. 22 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 23 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 24A, FIG. 24B, and FIG. 24C illustrate aspects of example embodiments according to the present disclosure.FIG. 25 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 26 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 27 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 28 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 29 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 30 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 31 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 32 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 33 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 34 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 35 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 36A and FIG. 36B illustrate aspects of example embodiments according to the present disclosure.FIG. 37 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 38 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 39 illustrates an aspect of an example embodiment according to the present disclosure.FIG. 40 illustrates an aspect of an example embodiment according to the present disclosure. DETAILED DESCRIPTION In the present disclosure, various embodiments are presented as examples of how the disclosed techniques may be implemented and/or how the disclosed techniques may be practiced in environments and scenarios. It will be apparent to persons