WO2019062785A1 - Method for converting unlicensed transmission into licensed transmission, and device - Google Patents

Method for converting unlicensed transmission into licensed transmission, and device Download PDF

Info

Publication number
WO2019062785A1
WO2019062785A1 PCT/CN2018/107788 CN2018107788W WO2019062785A1 WO 2019062785 A1 WO2019062785 A1 WO 2019062785A1 CN 2018107788 W CN2018107788 W CN 2018107788W WO 2019062785 A1 WO2019062785 A1 WO 2019062785A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
data
transmission
sent
resource
Prior art date
Application number
PCT/CN2018/107788
Other languages
French (fr)
Chinese (zh)
Inventor
韩云博
庄宏成
丁志明
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201810533171.9A external-priority patent/CN109600748B/en
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2019062785A1 publication Critical patent/WO2019062785A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Definitions

  • the embodiments of the present application relate to the field of communications, and, more particularly, to a method, a network device, and a terminal device that are converted from an unauthorized-based transmission to an authorization-based transmission.
  • GSM global system for mobile communication
  • WCDMA wideband code division multiple access
  • LTE long term evolution
  • NR new radio access
  • M2M machine-to-machine
  • URLLC ultra-reliable and low latency communications
  • V2V vehicle to vehicle
  • a grant-based transmission method is adopted in the LTE system.
  • the user equipment User Equipment, UE
  • the SR Service Request
  • the transmission resource required for the BSR report is sent to the base station, and finally the second uplink scheduling information is received, and then the uplink can be sent to the base station.
  • the BSR Buffer Statues Report
  • the transmission resource required for the BSR report is sent to the base station, and finally the second uplink scheduling information is received, and then the uplink can be sent to the base station. data. Therefore, it can be known that sending an uplink request from the user equipment to the base station to send uplink data to the user equipment can send uplink data, and multiple signaling interactions are required, which may cause a large delay. For the future communication network system, it is obviously unable to meet the low delay. Claim. Therefore, how to reduce the delay of the uplink transmission of the user equipment and improve the communication efficiency of the system becomes a technical problem to be solved urgently.
  • the present application provides a method, a network device, and a terminal device that are converted from an unlicensed transmission to an authorization-based transmission, which can improve communication efficiency of the system.
  • a method for transitioning from an unlicensed transmission to an authorization based transmission comprising:
  • the first device receives second data that is sent by the second device according to the uplink scheduling information.
  • determining uplink scheduling information of the second device based on the authorization transmission based on the unauthorized transmission of the first message and the second device may reduce the transmission delay and improve the communication efficiency of the system.
  • the determining, according to the non-authorized transmission of the first message and the second device, determining an uplink of an authorization-based transmission of the second device includes: receiving the first data based on the unauthorized transmission sent by the second device, the first device cannot successfully demodulate the first data, but can identify the sending of the first data
  • the uplink scheduling information is determined according to at least the first message and the first data that cannot be successfully demodulated.
  • the first device may directly determine the uplink scheduling information according to the first message and the first data that cannot be successfully demodulated, without the second device sending the BSR to the first device again, which is reduced.
  • the number of signaling interactions can effectively reduce the transmission delay and improve the communication efficiency of the system.
  • the method before the first device receives the first message sent by the second device, the method further includes: receiving the Determining, by the second device, the first data based on the unauthorized transmission, where the first device cannot successfully demodulate the first data, but can identify the sender of the first data, to the second device Sending a negative response to the first data or not sending a positive response to the first data to the second device during a particular time interval.
  • the scheduling information includes: receiving the first data based on the unauthorized transmission sent by the second device, the first device cannot successfully demodulate the first data, and cannot identify the sending of the first data
  • the uplink scheduling information is determined according to at least the energy of the first message and the first data that cannot be successfully demodulated.
  • the first device may directly determine the uplink scheduling information according to at least the energy of the first message and the first data that cannot be successfully demodulated, without the second device sending the BSR to the first device again.
  • the number of signaling interactions is reduced, which can effectively reduce the transmission delay and improve the communication efficiency of the system.
  • the first message is uplink control information.
  • the uplink control information may be simple signaling, which can reduce resource overhead and improve communication efficiency of the system.
  • the frame format of the first message and the scheduling request SR Similarly, the first message is different from the constellation corresponding to the scheduling request SR.
  • the first message is different from the scheduling request SR, and the first device may distinguish the first message and the scheduling request SR according to different constellation diagrams without adding an additional indication identifier. Can improve the communication efficiency of the system.
  • the first message is configured by using an unauthorized transfer authorization request
  • the SR-like resource is sent by the SR-like resource, and the SR-like resource is used to transmit the first message and/or the scheduling request SR.
  • the SR-like resource period may be shorter than the SR resource period, which can reduce the transmission delay and improve the communication efficiency of the system.
  • the SR-like resource may also be used to send a scheduling request SR, which can improve the efficiency of using system resources.
  • the first message is transmitted by the second device The energy of the modulation method is not used.
  • the first message is the energy of the second device that does not adopt the modulation mode, and the second device does not need to transmit other indication information, which can reduce system overhead and improve communication efficiency of the system.
  • the first message is transmitted by using an uplink piggyback
  • the second device sends the third data transmitted to the first device together.
  • the first message may be sent together with the third data transmitted by the second device to the first device by means of uplink piggyback transmission, which can effectively utilize system resources and improve communication efficiency of the system.
  • the first device The message includes: the first device receiving the first message sent by the second device on a physical uplink control channel resource.
  • the first device receives the second The message includes: the first device receiving the first message sent by the second device on a physical scheduling request channel resource.
  • the first device receives the second device
  • the first message includes: the first device receiving the first message sent by the second device on a physical uplink shared channel resource.
  • the first device receives the second device
  • the first message includes: the first device receiving the first message sent by the second device on a resource based on the unlicensed transmission.
  • the first device may receive the first message sent by the second device on the resource based on the unlicensed transmission, which may improve the use efficiency of the system resource, increase the reliability of the signaling transmission, and improve the communication efficiency of the system. .
  • the first device receives the first message sent by the second device
  • the transmission period of the reserved resource may be smaller than the transmission period of the physical scheduling request channel resource, which can reduce the transmission delay and improve the communication efficiency of the system.
  • the reserved resource is shared by one terminal device or shared by multiple terminal devices.
  • the reserved resources can be shared by multiple terminal devices, which can improve the use efficiency of system resources and improve the communication efficiency of the system.
  • the method further includes: the first Before receiving the first data, the device sends a second message to the second device, where the second message is used to indicate that the unauthorized transmission by using the first message is performed or not based on the authorization.
  • the mechanism of transmission is not limited to: the first Before receiving the first data, the device sends a second message to the second device, where the second message is used to indicate that the unauthorized transmission by using the first message is performed or not based on the authorization.
  • the sending, by the second device, the second message includes: sending, by using a system message, to the second device And sending the second message to the second device by using radio resource control signaling; or sending the second message to the second device by using a physical control message.
  • a method for transitioning from an unlicensed transmission to an authorization based transmission comprising:
  • the second device sends a first message to the first device, where the first message is used to request that the resource that is occupied by the first message is transferred from the unlicensed transmission to the authorization-based transmission, and the resource buffer is compared with the transmission buffer status report BSR.
  • the second device receives the uplink scheduling information of the authorization-based transmission sent by the first device, and the uplink scheduling information is based at least on the first message and the second device based on the unauthorized And determining, by the second device, the second data is sent to the first device according to the uplink scheduling information.
  • the second device sends a first message to the first device, where the first message is used to request that the resource occupied by the first message is transferred to the transmission buffer by the unauthorized transmission to the authorization-based transmission.
  • the status report BSR occupies less resources, which can reduce resource overhead and improve system communication efficiency.
  • the sending, by the second device, the first message to the first device includes: receiving, by the first device, the first data In the case of a negative response, the second device sends the first message to the first device, where the first data is data of an unauthorized transmission based on the second device.
  • the second device in a case of receiving a negative response of the first data sent by the first device, the second device sends a first message to the first device, where the request is changed from the unauthorized-based transmission to the authorization-based Transmission can improve the reliability of system transmission, thereby improving the communication efficiency of the system.
  • the sending, by the second device, the first message to the first device includes: not receiving, by the first device, In the case of a positive response to the first data, the second device sends the first message to the first device, where the first data is data of an unauthorized transmission based on the second device.
  • the second device when the second device does not receive the negative response sent by the first device after the K times of repeated transmissions in the specific time interval, the second device considers that the first data transmission is successful, and does not The first device sends the first message; or the second device does not receive the negative response sent by the first device in a specific time interval (when no K times of repeated transmission is used), the second device considers that the first data is successfully sent, Sending a first message to the first device, where K is a positive integer not greater than the maximum number of repeated transmissions.
  • the second device in a case that the first device does not receive the positive response to the first data sent by the first device, the second device sends the first message to the first device, which can improve the reliability of the system transmission. Thereby improving the communication efficiency of the system.
  • the first message is uplink control information.
  • the uplink control information may be simple signaling, which can reduce resource overhead and improve communication efficiency of the system.
  • the first message is the same as the frame format of the scheduling request SR, where A message is different from the constellation diagram corresponding to the scheduling request SR.
  • the first message is different from the scheduling request SR, and the first device can distinguish the first message and the scheduling request SR according to different constellations without increasing the additional indication identifier, which can be improved.
  • System communication efficiency
  • the first message is sent by using an unauthorized transfer authorization request SR-like resource
  • the SR-like resource is a separately allocated resource of the first device, and the SR-like resource can be used to transmit the first message and/or the scheduling request SR.
  • the SR-like resource period may be shorter than the SR resource period, which can reduce the transmission delay and improve the communication efficiency of the system.
  • the first message is an unused modulation mode transmitted by the second device energy of.
  • the first message is the energy of the second device that does not adopt the modulation mode, and the second device does not need to transmit other indication information, so that the communication efficiency of the system can be improved.
  • the first message is transmitted by using an uplink piggybacking device and the second device
  • the third data transmitted to the first device is transmitted together.
  • the first message may be sent together with the third data transmitted by the second device to the first device by means of uplink piggyback transmission, which can effectively utilize system resources and improve communication efficiency of the system.
  • the second device is first The sending, by the device, the first message includes: sending, by the second device, the first message to the first device on a physical uplink control channel resource.
  • the second device is first The sending, by the device, the first message includes: sending, by the second device, the first message to the first device on a physical scheduling request channel resource.
  • the second device is first The sending, by the device, the first message includes: sending, by the second device, the first message to the first device on a physical uplink shared channel resource.
  • the second device Sending, by the device, the first message, the second device sends the first message to the first device on a resource based on the unlicensed transmission.
  • the first device may receive the first message sent by the second device on the resource based on the unlicensed transmission, which may improve the use efficiency of the system resource, increase the reliability of the signaling transmission, and improve the communication efficiency of the system. .
  • the second device sends the first device to the first device
  • the first message includes: the second device sends the first message to the first device on a reserved resource, where a transmission period of the reserved resource is smaller than a transmission period of a physical scheduling request channel resource.
  • the transmission period of the reserved resource may be smaller than the transmission period of the physical scheduling request channel resource, which can reduce the transmission delay and improve the communication efficiency of the system.
  • the reserved resource is shared by one terminal device or multiple terminal devices.
  • the reserved resources can be shared by multiple terminal devices, which can improve the use efficiency of system resources and improve the communication efficiency of the system.
  • the method further includes: Receiving, by the second device, the second message sent by the first device, where the second message is used to indicate that the first message is used or not based on the unauthorized The mechanism for transferring to an authorization-based transport.
  • the receiving, by the first device, the second message includes: receiving, by using a system message Receiving the second message sent by the first device; or receiving the second message sent by the first device by using radio resource control signaling; or receiving, by using a physical control message, the Second message.
  • a network device comprising means for performing the method of any of the above-described first aspect or any of the possible implementations of the first aspect.
  • a terminal device comprising means for performing the method of any of the above-described second or second aspect of the second aspect.
  • a network device comprising: a processor and a transceiver, the processor and the transceiver for performing the method of any of the first aspect or the first aspect of the first aspect.
  • the network device further includes a memory, where the computer stores a computer program executable on the processor, and when the processor executes the computer program, causing the network device to perform the first Aspect or method of any of the possible implementations of the first aspect.
  • a terminal device comprising: a processor and a transceiver, the processor and the transceiver being configured to perform the method in any of the possible implementations of the second aspect or the second aspect.
  • the network device further includes a memory, where the computer stores a computer program executable on the processor, and when the processor executes the computer program, causing the terminal device to perform the second Aspect or method of any of the possible implementations of the second aspect.
  • a computer storage medium for storing a computer program, the computer program comprising instructions for performing the method of the first aspect or any of the possible implementations of the first aspect.
  • a computer storage medium for storing a computer program, the computer program comprising instructions for performing the method of any of the second aspect or the second aspect.
  • a computer program product comprising instructions, when run on a terminal device, causes the terminal device to perform the method of the first aspect or the first aspect or any of its possible implementations.
  • a computer program product comprising instructions, when run on a network device, causes the network device to perform the method of the second or second aspect or any of its possible implementations.
  • a communication chip in which instructions are stored, which when executed on a network device or a terminal device, cause the network device or the terminal device to perform the method described in the above aspects.
  • the twelfth aspect provides a system, including the network device provided in the foregoing third aspect, and the terminal device provided in the foregoing fourth aspect; or the network device provided in the foregoing fifth aspect and the terminal device provided in the foregoing sixth aspect.
  • the present application also provides the following embodiments.
  • the numbers of the embodiments provided in this section do not have a clear correspondence with the numbers of the embodiments provided in other parts of the present application, and only the convenience of this part is expressed:
  • a method for transferring an unlicensed transmission to an authorization based transmission for a first device comprising:
  • the first device receives uplink data of the authorization-based transmission sent by the second device to the first device.
  • the second device may send the first message to the first device to notify the first device that it wants to be by Grant.
  • -free transmission is transferred to Grant-based transmission, and the two-step short process of uplink scheduling-uplink data is used for Grant-based transmission, compared with the traditional four-step process (SR--first uplink scheduling-BSR--- The second uplink scheduling) reduces overhead.
  • the first device Before the first device and the second device perform the unlicensed transmission, the first device sends a second message to the second device, where the second message is used at least for configuring and/or activating the second device.
  • the first device and the second device adopt a mechanism for performing an unauthorized-based transmission to an authorization-based transmission by using the first message.
  • the first device may configure and/or activate the aforementioned two-step mechanism of transferring from Grant-free transmission to Grant-based transmission to the second device.
  • the first message is uplink control information UCI.
  • the first message has the same frame format as the scheduling request SR, and the used constellation is different.
  • the first message is similar to the traditional scheduling request SR, but the effect is different, so the two can use the same frame format, such as UCI format 1/1a/1b, but the constellation diagrams used can be different to distinguish the two. .
  • the first message is energy, and no modulation method is adopted.
  • the first message is similar to the UCI format 1 used by the traditional SR.
  • the energy is sent only on a certain resource, and the modulation mode is not used.
  • the first device can obtain the first message by sensing the energy on the resource. .
  • the first message is sent together with the uplink data sent by the second device to the first device by means of piggybacking.
  • the second device may send the first message piggybackingly while the first device sends the uplink data.
  • the first device receives the first message sent by the second device on a resource based on unauthorized transmission.
  • the first message may be sent on a traditional PUCCH resource; or may be sent using the same PSRCH resource used by the SR.
  • transmitting in the PSRCH resource may be regarded as a special case transmitted in the PUCCH resource; Sending on the resource, for example, the scenario in which the first device uses the piggybacking method to transmit the first message and the uplink data together; further, the first message may also be sent in the Grant-free resource, where the packet may be sent in the Grant-free resource.
  • PUSCH resources a special case sent in PUSCH resources.
  • the first device sends the second message to the second device by using a system message.
  • the first device sends the second message to the second device by using RRC signaling.
  • the first device sends the second message to the second device by using a physical control channel.
  • a method for transferring an unlicensed transmission to an authorization based transmission for a second device comprising:
  • the second device sends uplink data based on the authorized transmission to the first device.
  • the second device may send the first message to the first device to notify the first device that it wants to be Grant-free.
  • the transmission is transferred to Grant-based transmission, and the two-step short process of uplink scheduling-uplink data is used for Grant-based transmission, compared with the traditional four-step process (SR--first uplink scheduling-BSR---second Secondary uplink scheduling) reduces overhead.
  • the second device receives the second message sent by the first device to the second device, where the second message is used by at least And configuring and/or activating the first device and the second device to adopt a mechanism for performing an unauthorized-based transmission to an authorization-based transmission by using the first message.
  • the first device may configure and/or activate the aforementioned two-step mechanism of transferring from Grant-free transmission to Grant-based transmission to the second device.
  • the first message is uplink control information UCI.
  • the first message has the same frame format as the scheduling request SR, and the used constellation is different.
  • the first message is similar to the traditional scheduling request SR, but the effect is different, so the two can use the same frame format, such as UCI format 1/1a/1b, etc., but the constellation diagrams used can be different to make a difference.
  • the first message is energy, and no modulation method is adopted.
  • the first message is similar to the UCI format 1 used by the traditional SR.
  • the energy is sent only on a certain resource, and the modulation mode is not used.
  • the first device can obtain the first message by sensing the energy on the resource. .
  • the first message is sent by means of piggybacking with uplink data sent by the second device to the first device.
  • the first message may be piggybacked.
  • the second device sends the first message to the first device on a physical scheduling request channel PSRCH resource;
  • the second device sends the first message to the first device on a physical shared channel PUSCH resource
  • the first message may be sent on a traditional PUCCH resource; or may be sent using the same PSRCH resource used by the SR.
  • transmitting in the PSRCH resource may be regarded as a special case transmitted in the PUCCH resource; Sending on the resource, for example, the scenario in which the first device uses the piggybacking method to transmit the first message and the uplink data together; further, the first message may also be sent in the Grant-free resource, where the packet may be sent in the Grant-free resource.
  • PUSCH resources a special case sent in PUSCH resources.
  • the second device receives the second message that is sent by the first device to the second device by using a system message.
  • the second device receives the second message that is sent by the first device to the second device by using RRC signaling.
  • the second device receives the second message that is sent by the first device to the second device by using a physical control channel.
  • a first device comprising:
  • a processor a memory, and a transceiver
  • the transceiver is configured to receive and send data
  • the memory is for storing instructions
  • the processor is configured to execute the instructions in the memory, and perform the method of any one of 1 to 10.
  • the transceiver comprises:
  • the transmitter is configured to send the second message according to any one of 1 to 10, the negative response of the uplink data, and the uplink scheduling information;
  • the receiver is further configured to receive the first message according to any one of the rights 1 to 10, the uplink data based on the unauthorized transmission, and the uplink data of the authorization-based transmission.
  • a second device comprising:
  • a processor a memory, and a transceiver
  • the transceiver is configured to receive and send data
  • the memory is for storing instructions
  • the processor is configured to execute the instructions in the memory, and perform the method of any one of 11 to 20.
  • the transceiver comprises:
  • the transmitter is configured to send the first message according to any one of 11 to 20, the uplink data based on the unauthorized transmission, and the uplink data of the authorization-based transmission;
  • the receiver is configured to receive the second message according to any one of 11 to 20, the negative response of the uplink data, and the uplink scheduling information.
  • a base station configured to perform the method of any of 1 to 10.
  • a terminal configured to perform the method of any of 11 to 20.
  • FIG. 1 is a schematic diagram of a communication system applied in an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a network architecture applied to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a method for transferring from an unlicensed transmission to an authorization based transmission according to an embodiment of the present application
  • FIG. 4 is a schematic flowchart of another method for transferring an unauthorized-based transmission to an authorization-based transmission according to an embodiment of the present application
  • FIG. 5 is a schematic diagram of a constellation map of an embodiment of the present application.
  • FIG. 6 is a schematic diagram of a constellation map of another embodiment of the present application.
  • FIG. 7 is a schematic diagram of an SR-like resource occupying an unlicensed transmission resource according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of binding of an unlicensed transmission resource and parameter information according to an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a terminal device according to an embodiment of the present application.
  • FIG. 10 is a schematic diagram of a network device according to an embodiment of the present application.
  • FIG. 1 is a schematic diagram of a system to which the embodiment of the present application is applied.
  • the system 100 can include a network device 20 and a terminal device 10, wherein the network device and the terminal device are connected by wireless.
  • FIG. 1 is only an example in which the system includes a network device, but the embodiment of the present application is not limited thereto.
  • the system may further include more network devices; similarly, the system may also include more terminals. device.
  • the system may also be referred to as a network, which is not limited by the embodiment of the present application.
  • the communication device in this embodiment of the present application may be a terminal device.
  • the terminal device may also refer to user equipment (UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent. Or user device.
  • the access terminal may be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), with wireless communication.
  • PLMN public land mobile network
  • the terminal device may also be a wearable device.
  • a wearable device which can also be called a wearable smart device, is a general term for applying wearable technology to intelligently design and wear wearable devices such as glasses, gloves, watches, clothing, and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are more than just a hardware device, but they also implement powerful functions through software support, data interaction, and cloud interaction.
  • Generalized wearable smart devices include full-featured, large-size, non-reliable smartphones for full or partial functions, such as smart watches or smart glasses, and focus on only one type of application, and need to work with other devices such as smartphones. Use, such as various smart bracelets for smart signs monitoring, smart jewelry, etc.
  • the communication device in this embodiment of the present application may be a network device.
  • the network device may be a device for communicating with the terminal device, and the network device may be a global system of mobile communication (GSM) or a base station in code division multiple access (CDMA).
  • BTS may also be a base station (NodeB, NB) in a wideband code division multiple access (WCDMA) system, or an evolved base station in a long term evolution (LTE) system
  • An evolutionary node B, an eNB or an eNodeB may also be a wireless controller in a cloud radio access network (CRAN) scenario, or the network device may be a relay station, an access point, an in-vehicle device, or a wearable device.
  • CRAN cloud radio access network
  • the network device provides a service for the cell
  • the terminal device communicates with the network device by using a transmission resource (for example, a frequency domain resource, or a spectrum resource) used by the cell
  • the cell may be a network device.
  • a transmission resource for example, a frequency domain resource, or a spectrum resource
  • the cell may be a network device.
  • the cell may belong to a macro base station, or may belong to a base station corresponding to a small cell, where the small cell may include: a metro cell, a micro cell, and a pico cell. (pico cell), femto cell, etc.
  • These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • the cell may also be a hypercell.
  • FIG. 2 is a schematic diagram of a network architecture that may be applied to an embodiment of the present application.
  • the network architecture diagram may be a network architecture diagram of a new wireless access in a next generation wireless communication system.
  • the network device can be divided into a centralized unit (CU) and multiple transmission reception point (TRP)/distributed unit (DU), that is, network equipment.
  • TRP transmission reception point
  • DU distributed unit
  • BBU bandwidth based unit
  • the form and number of the centralized unit and the TRP/DU do not constitute a limitation on the embodiments of the present application.
  • the form of the centralized unit corresponding to each of the network device 1 and the network device 2 shown in FIG. 2 is different, but does not affect the respective functions.
  • the centralized unit 1 and the TRP/DU in the dotted line range are constituent elements of the network device 1
  • the centralized unit 2 and the TRP/DU in the solid line range are constituent elements of the network device 2
  • the network device 1 and Network device 2 is a network device (or referred to as a base station) involved in the NR system.
  • the CU can handle wireless high-level protocol stack functions, such as radio resource control (RRC) layer, packet data convergence protocol (PDCP) layer, etc., and even support partial core network functions to sink and connect.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • Edge computing network can meet the higher requirements of future communication networks for emerging services such as video, online shopping, virtual/augmented reality for network delay.
  • the DU can mainly handle the physical layer function and the layer 2 function with high real-time requirements. Considering the transmission resources of the radio remote unit (RRU) and the DU, the physical layer function of some DUs can be moved up to the RRU. The miniaturization of RRUs, even more aggressive DUs, can be combined with RRUs.
  • RRU radio remote unit
  • CU can be deployed in a centralized manner, DU deployment depends on the actual network environment, core urban area, high traffic density, small station spacing, limited space in the computer room, such as colleges and universities, large-scale performance venues, etc., DU can also be centralized DUs can be deployed in a distributed manner, such as suburban counties and mountainous areas.
  • the S1-C interface exemplified in FIG. 2 may be a standard interface between the network device and the core network, and the device connected to the specific S1-C is not shown in FIG. 2.
  • FIG. 3 shows a schematic flow chart of a method for transferring from an unlicensed transmission to an authorization based transmission according to an embodiment of the present application.
  • the first device in FIG. 3 may be the network device described above; the second device may be the terminal device described above.
  • the number of the first device and the second device may not be limited to the examples in this embodiment or other embodiments, and details are not described herein again.
  • the method of transitioning from an unauthorized-based transmission to an authorization-based transmission illustrated in FIG. 3 may include step 310, step 320, step 330, and step 340.
  • Step 310 The first device receives a first message sent by the second device, where the first message is used to request that the resource that is occupied by the first message is transferred to the state of the transmission buffer by the unauthorized transmission to the authorization-based transmission. Reporting BSRs consumes less resources.
  • the first device receives the first message sent by the second device, and may obtain a request sent by the second device, which is expected to be converted from an unauthorized transmission to an authorization based transmission.
  • the authorization-based transmission means that when there is uplink data to be transmitted, the second device needs to first send a scheduling request (SR) to the first device to notify the first device that the uplink data is scheduled to be sent, and then receives the BSR ( After the uplink scheduling information of the Buffer Statues Report, the BSR sends the uplink transmission scheduling information to the base station, and finally receives the second uplink scheduling information, so that the uplink data can be transmitted to the first device.
  • SR scheduling request
  • the non-authorized transmission means that when there is uplink data to be transmitted, the first device does not need to be requested, and the second device can use the unlicensed transmission resource that the first device divides in advance, and transmits the uplink to the first device. data.
  • the uplink data may be sent due to the fact that different first devices may select the same or partially the same unlicensed transmission resource to transmit the uplink data, which may cause the uplink data sent by the different first device.
  • the transfer failed.
  • the first device can request a transfer from an unauthorized based transfer to an authorization based transfer.
  • FIG. 4 shows another schematic flowchart of a method for transferring from unauthorized transmission to authorization based transmission according to an embodiment of the present application.
  • step 301, step 302, and step 303 may also be included before step 310.
  • Step 301 The first device may send a second message to the second device, where the second message may be used to configure and/or activate the second device with or without using the first message for granting an unauthorized (grant -free) transfer to a mechanism based on grant-based transport, it should be understood whether activation here includes activation or deactivation, for example, the second message can be used to notify the second device to adopt The first message is converted to an authorization-based transmission by sending the first message to the first device.
  • the first device may send the second message to the second device by semi-static signaling or dynamic signaling, such as by using a master information block (MIB), a system information block (SIB), and the least remaining.
  • MIB master information block
  • SIB system information block
  • RMSI Remaining minimum system information
  • OSI other system information
  • RRC radio resource control
  • MAC CE media access control control element
  • L1signaling physical control information
  • the first device may send the second message immediately after establishing the connection with the second device, or may send the second message at other times. That is, the first device only needs to send the second message before the second device sends the first message.
  • Step 302 The second device may send the first data to the first device.
  • the first data may be sent by using a grant-free resource, that is, the second device may send the first data to the first device based on the unlicensed transmission.
  • Step 303 The first device may send a negative acknowledgement (NACK) of the first data to the second device when the first device fails to receive the first data of the second device based on the unauthorized transmission in step 302.
  • NACK negative acknowledgement
  • the second device when the second device receives the NACK sent by the first device, it indicates that the first data transmission based on the unauthorized transmission in the foregoing step 302 fails, and the second device may send the first message to the first device. Used to convert unlicensed based transfers to authorization based transfers.
  • a timer may also be used to determine whether the first data is sent or not.
  • the second device may determine whether the first data based on the unauthorized transmission in step 302 fails to be sent according to different timers. For example, if the second device does not receive the ACK sent by the first device before the timer expires, it is considered to be a NACK, and the first data transmission fails, the second device may send the first message to the first device; If the NACK sent by the first device after the K times of repeated transmissions is received before the timeout expires, the device considers to be an ACK. The first data is sent successfully, and the second device does not need to send the first message to the first device.
  • the ACK is considered to be ACK.
  • the first data is sent successfully, and the second device does not need to send the first message to the first device.
  • K is a positive integer not greater than the maximum number of repeated transmissions. It should be understood that the above is only an example and should not be construed as limiting the embodiments of the present application.
  • the first message sent by the second device to the first device may be simple signaling, that is, the first message may only carry the request for the transfer from the unauthorized based transmission to the authorization based transmission. (or indicating), the resource used for transmitting the first message is less than the resource occupied by the transmitting BSR, thereby reducing the overhead of the system.
  • the first message may be energy that does not adopt a modulation mode.
  • the first device After receiving the energy, the first device directly converts the current transmission mode to another transmission mode.
  • the second device is currently based on the unlicensed transmission, and may send the energy of the unmodulated mode to the first device, requesting to convert the unlicensed transmission into the authorization-based transmission; the second time sending the untransmitted to the first device
  • the energy of the modulation mode it can be used to request that the authorization-based transmission be converted to an unauthorized transmission.
  • the first message may be sent by using 1 bit of uplink control information (UCI), and the format may be format 1 or format 1a, or may be other UCI formats.
  • UCI uplink control information
  • the first message may be requested by the first device by "0" or "1". For example, when the value of the first message is “1”, it can be used to request the transfer from the unauthorized-based transmission to the authorization-based transmission, but the embodiment of the present application does not limit this.
  • the second device may send the first message to the first device on a resource of a physical uplink control channel (PUCCH).
  • PUCCH physical uplink control channel
  • the second device may send the first message to the first device on a resource of a physical scheduling request channel (PSRCH).
  • PSRCH resource may be a special case of the PUCCH resource, that is, the PSRCH resource may be a part of the PUCCH used to send the SR. That is, the first message can be sent in the SR resource.
  • the SR resource period is a period in which the SR is periodically sent, that is, a specific time interval is required between two SR resource transmissions.
  • the SR resource period can be configured.
  • the SR resource period may be set between several milliseconds (ms) to tens of milliseconds, or may be set within a range of at least one OFDM symbol (ie, the SR resource period may be less than 1 ms) to multiple OFDM symbols, or multiple time slots. .
  • the frame format of the first message sent by the second device may be the same as that of the SR.
  • the first message and the SR may both be sent by using a 1-bit message, such as UCI format 1a, and other formats may also be used. Messages are sent, such as UCI format1 or UCI in other formats.
  • the first device can distinguish the first message from the SR by using different constellation diagrams.
  • the first message may be transmitted using a 1-bit UCI format 1a, and the modulation may be binary phase shift keying (BPSK) and a constellation map using an acknowledgement (ACK).
  • BPSK binary phase shift keying
  • ACK acknowledgement
  • the SR can transmit using the 1-bit UCI format 1a, and the modulation method can be binary phase shift keying (BPSK) and use a NACK constellation map.
  • BPSK binary phase shift keying
  • the first message may correspond to a position of 180° (the constellation of the ACK) in the BPSK
  • the SR may correspond to a position of 0° (the constellation of the NACK) in the BPSK, correspondingly,
  • the first device can distinguish the first message and the SR by different constellation diagrams. It should be understood that the above is only an example and should not be construed as limiting the embodiments of the present application.
  • the modulation method QBPSK can also be used in the PUCCH.
  • quadrature phase shift keying (QBPSK) modulation mode is a newly introduced modulation mode, and QBPSK can indicate the first message to the first device with low complexity without adding extra The bit is used to indicate.
  • the second device may send, in the PUCCH, a first message with a modulation mode of QBPSK to the first device.
  • the first message may be transmitted using a 1-bit UCI format 1a or a UCI in other formats, which may be QBPSK and use a 90° or 270° constellation in QBPSK, and the SR may use 1
  • the UCI format 1a of the bit or the UCI of other formats is transmitted, and the modulation mode may be BPSK.
  • the first device may extract the first message sent by the second device or the in-phase component and/or the quadrature component of the SR by using the same decoding algorithm to determine
  • the modulation mode of the message sent by the second device is BPSK or QBPSK. If the modulation mode is BPSK, the signal may be SR. If the modulation mode is QBPSK, the signal may be the first message.
  • the second device may send the first message by using a UCI piggyback, that is, sending the first message (UCI) together with the uplink data.
  • UCI first message
  • the second device may perform the first message and the uplink data on the physical uplink shared channel in the resource based on the unlicensed transmission in a piggyback manner (physical uplink shared).
  • the channel, PUSCH) resource is sent to the first device.
  • the second device does not receive the NACK or ACK sent by the first device before the timer expires, the first message and the uplink data may be first through the PUSCH resource in the unlicensed transmission resource in a piggyback manner. The device sends.
  • the uplink data transmitted together with the first message may be the new uplink data, that is, different from the first data sent by the second device to the first device in step 302, or may be sent to the first device with the second device in step 302.
  • the first data is the same, and the application does not limit this.
  • the first device may separately allocate a part of resources to at least send the first message, and the resource may be referred to as an unauthorized transfer authorization request (SR-like) resource, and the SR-like resource may also be Used to send messages such as SR.
  • SR-like resource may also be Used to send messages such as SR.
  • the SR-like resource period can be configured.
  • the SR-like resource period may be shorter than the SR resource period, and the use of the SR-like resource to transmit the first message may significantly reduce the transmission delay.
  • the resource period that the second device in the SR resource can use is 20 ms, and the resource period that the second device can use in the SR-like resource is 5 ms or 10 ms.
  • the second device may send the first message by using the SR-like resource to request the first device that it wishes to be transferred from the grant-free transmission to the grant-based transmission.
  • the SR-like resource may be dedicated to each UE or shared by multiple UEs.
  • the first message may be an energy that does not adopt a modulation mode, or only one bit of information, that is, a frame of UCI format 1, UCI format 1a, or other UCI format may be used. structure.
  • the first message may carry the UE ID information (ie, the identifier information of the UE), and is used to indicate the UE that sends the first message.
  • UE ID information ie, the identifier information of the UE
  • a preamble can be used to identify the UE.
  • different UEs can also be identified by resources used by the UE and demodulation reference signal (DMRS) parameters.
  • DMRS demodulation reference signal
  • the second device and the other UEs may use the same time domain frequency domain resource to send the first message, but the DMRS parameters are different, and the first device receives the first message sent by multiple UEs in the same time domain frequency domain resource.
  • the DMRS parameter may be used to identify that the first message is sent by the second device or sent by other UEs.
  • the SR-like resource that sends the first message may use a grant-free resource.
  • the SR-like resource can use all of the grant-free resources, or some of the grant-free resources (such as grant-free resource 1).
  • the SR-like resource may be other time domain frequency domain resources that can be allocated by the first device, which is not limited in this application.
  • the first device may separately allocate resources in the PUCCH, PSRCH, or PUSCH in the foregoing embodiment to the second device, and use the SR-like resource to send the first message.
  • Step 320 The first device determines, according to the first message and the unlicensed transmission of the second device, uplink scheduling information of the second device based on the authorized transmission.
  • the uplink scheduling information may indicate information such as a time domain frequency domain resource and a modulation and coding scheme (MCS) used by the second device to send the uplink data, and the second device receives the uplink scheduling information. After that, the uplink data of the authorized transmission can be sent to the first device.
  • MCS modulation and coding scheme
  • the grant-free resource is bound to some parameters of the uplink scheduling, such as the MCS, the waveform, and the data size. Therefore, the uplink scheduling information of the first device does not need to be received, and the second device can directly Send upstream data.
  • the first device receives the first data sent by the second device, but does not successfully demodulate the first data, and in step 303, sends the first data to the second device.
  • the negative response that is, the first device receives the first data, and cannot successfully demodulate the first data, but can identify that the sender of the first data is the second device, and sends a NACK to the second device.
  • the first device may determine part of the parameter information used by the first data according to the grant-free resource used by the first data.
  • the grant-free resource may be bound to some parameter information such as the MCS, the waveform, and the data size, and the uplink data of the non-authorized transmission sent by the second device in the grant-free resource will use the foregoing binding.
  • Parameter information the first device may determine the parameter information bound to the grant-free resource according to the grant-free resource used by the received uplink data that cannot be demodulated, thereby determining the uplink scheduling information without obtaining the second device to the first device.
  • the BSR sent by a device can directly send uplink scheduling information to the second device.
  • the first device does not successfully receive the first data sent by the second device, and cannot determine that the second device sends the first data, that is, the first device can detect that there is energy in the grant-free resource but cannot be solved. Accordingly, the first device also does not send an ACK or NACK to the second device. At this time, the first device may determine, according to the received first message, that the first data is sent by the second device, that is, the energy in the grant-free resource is sent by the second device. As shown in FIG.
  • the first device may determine, according to the grant-free resource used by the energy, part of the parameter information used by the second device to send the first data, and also It is possible to determine the uplink scheduling information.
  • the first device may obtain the parameter information used when transmitting the first data by using the grant-free resource used when transmitting the first data, when the second device sends the first information to the first device.
  • the first device may determine the uplink scheduling information according to the parameter information obtained from the grant-free resource when the request is changed from the unlicensed transmission to the authorization-based transmission, that is, the first device may directly
  • the second device sends the uplink scheduling information without the second device sending the BSR.
  • Step 330 The first device sends the uplink scheduling information to the second device.
  • Step 340 The second device sends the second data to the first device according to the uplink scheduling information.
  • the second device receives the uplink scheduling information sent by the first device, and may send the second data to the first device in an authorized manner according to the parameter information, such as the MCS, the waveform, and the data size, which are indicated in the uplink scheduling information.
  • the parameter information such as the MCS, the waveform, and the data size, which are indicated in the uplink scheduling information.
  • FIG. 9 is a schematic diagram of a terminal device 10 (also referred to as a user equipment, abbreviated as UE) according to an embodiment of the present application. It should be understood that FIG. 9 is only an example and does not constitute a limitation on the embodiments of the present invention.
  • UE user equipment
  • the UE 10 may correspond to the second device in each method embodiment, and may have any function of the second device in the method.
  • the UE 10 includes a transceiver 101 and a processor 102.
  • the transceiver 101 can include a control circuit and an antenna, wherein the control circuit can be used for converting baseband signals and radio frequency signals and processing the radio frequency signals, and the antenna can be used to transmit and receive radio frequency signals.
  • the transceiver 101 can be used to transmit messages or data to the network device 20 (e.g., perform steps 310 and 340 in Figure 3, or perform steps 302, 310, and 340 in Figure 4), and receive messages sent by the network device 20 (e.g., Step 330 in FIG. 3 is performed, or steps 303 and 330) in FIG. 4 are performed.
  • the network device 20 e.g., perform steps 310 and 340 in Figure 3, or perform steps 302, 310, and 340 in Figure 4
  • receive messages sent by the network device 20 e.g., Step 330 in FIG. 3 is performed, or steps 303 and 330
  • the UE 10 may also include other major components of the second device, such as memory, input and output devices, and the like.
  • the input/output device can be a touch screen, a display screen, a keyboard, etc., and is mainly used for receiving data input by the user and outputting data to the user.
  • the processor 102 can be used to process communication protocols and communication data, and to control the entire UE 10, execute software programs, and process data of the software programs, for example, to support the UE 10 in performing the corresponding operations in the foregoing method embodiments.
  • Memory is primarily used to store software programs and data.
  • the processor 102 can read the software program in the memory, interpret and execute the instructions of the software program, and process the data of the software program.
  • the processor performs baseband processing on the data to be transmitted, and then outputs the baseband signal to the control circuit.
  • the control circuit performs radio frequency processing on the baseband signal, and then transmits the radio frequency signal to the outside through the antenna in the form of electromagnetic waves.
  • the control circuit receives the RF signal through the antenna, converts the RF signal into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes the data.
  • FIG. 9 shows only one memory and one processor for ease of illustration. In an actual terminal device, there may be multiple processors and memories.
  • the memory may also be referred to as a storage medium or a storage device, and the like.
  • the processor may include a baseband processor and a central processing unit, and the baseband processor is mainly used to process the communication protocol and the communication data, and the central processing unit is mainly used to control and execute the entire terminal device.
  • the processor in FIG. 9 integrates the functions of the baseband processor and the central processing unit.
  • the baseband processor and the central processing unit can also be independent processors and interconnected by technologies such as a bus.
  • the user equipment may include a plurality of baseband processors to accommodate different network formats, and the user equipment may include a plurality of central processors to enhance its processing capabilities, and various components of the user equipment may be connected by various buses.
  • the baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
  • the central processing unit can also be expressed as a central processing circuit or a central processing chip.
  • the functions of processing the communication protocol and the communication data may be built in the processor, or may be stored in the storage unit in the form of a software program, and the processor executes the software program to implement the baseband processing function.
  • the antenna and control circuit having the transceiving function can be regarded as the transceiving unit 101 of the UE 10, and the processor having the processing function is regarded as the processing unit 102 of the UE 10.
  • the UE 10 includes a transceiver unit 101 and a processing unit 102.
  • the transceiver unit can also be referred to as a transceiver, a transceiver, a transceiver, and the like.
  • the device for implementing the receiving function in the transceiver unit 101 can be regarded as a receiving unit, and the device for implementing the sending function in the transceiver unit 101 is regarded as a sending unit, that is, the transceiver unit 101 includes a receiving unit and a sending unit.
  • the receiving unit may also be referred to as a receiver, a receiver, a receiving circuit, etc.
  • the transmitting unit may be referred to as a transmitter, a transmitter, or a transmitting circuit or the like.
  • FIG. 10 is a schematic diagram of a network device 20 (eg, a base station) according to an embodiment of the present application.
  • the network device 20 may correspond to the first device in each method embodiment, and may have any function of the first device in the method.
  • the network device 20 includes a transceiver 201 and a processor 2022.
  • the transceiver 201 may be referred to as a remote radio unit (RRU) 201, a transceiver unit, a transceiver, or a transceiver circuit, and the like.
  • the transceiver 201 can include at least one antenna 2011 and a radio frequency unit 2012.
  • the transceiver 201 can be used for transceiving radio frequency signals and converting radio frequency signals with baseband signals.
  • the network device 20 can include a baseband unit (BBU) 202.
  • the BBU 202 can be used for baseband processing such as channel coding, multiplexing, modulation, spread spectrum, etc., as well as controlling network devices.
  • the RRU 201 and the BBU 202 may be physically disposed together or physically separated, such as a distributed base station.
  • the BBU 202 may be composed of one or more single boards (also referred to as a printed circuit board or a printed circuit board), and multiple boards may jointly support a single access system wireless connection. In the network access, it is also possible to separately support wireless access networks of different access systems.
  • the baseband unit can be reconstructed into the aforementioned DU and CU functional entities.
  • the BBU 202 includes a processor 2022.
  • the processor 2022 can be used to control the network device 20 to perform corresponding operations in the foregoing method embodiments.
  • the BBU 202 can also include a memory 2021 for storing the necessary instructions and data.
  • the memory 2021 and the processor 2022 can serve one or more boards. That is, the memory and processor can be individually set on each board. It is also possible that multiple boards share the same memory and processor. In addition, the necessary circuits are also provided on each board.
  • An embodiment of the present invention further provides a processing apparatus, including a processor and an interface;
  • the processor is configured to perform the method in any of the embodiments of the present application described above.
  • the processing device may be a chip, and the processor may be implemented by hardware or by software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like; when implemented by software, the processing may be performed.
  • the device may be a general purpose processor implemented by reading software code stored in a memory, which may be integrated in the processor or may exist independently of the processor.
  • the processing device may be a Field-Programmable Gate Array (FPGA), may be an Application Specific Integrated Circuit (ASIC), or may be a System on Chip (SoC). It can be a Central Processor Unit (CPU), a Network Processor (NP), a Digital Signal Processor (DSP), or a Micro Controller (Micro Controller). Unit, MCU), can also be a Programmable Logic Device (PLD) or other integrated chip.
  • FPGA Field-Programmable Gate Array
  • ASIC Application Specific Integrated Circuit
  • SoC System on Chip
  • CPU Central Processor Unit
  • NP Network Processor
  • DSP Digital Signal Processor
  • MCU Micro Controller
  • MCU Programmable Logic Device
  • PLD Programmable Logic Device
  • the embodiment of the invention further provides a communication device, including a processing unit and a transceiver unit.
  • the processing unit and the transceiver unit may be implemented in software or in hardware.
  • the transceiver unit may be the transceiver 101 in FIG. 9, and the processing unit may be the processor 102 in FIG. 9; or the transceiver unit may be the transceiver 201 in FIG.
  • the unit may be the processor 2022 in FIG.
  • the embodiment of the invention further provides a communication system, which comprises the above network device and terminal device.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)) or the like.
  • a magnetic medium eg, a floppy disk, a hard disk, a magnetic tape
  • an optical medium eg, a DVD
  • a semiconductor medium such as a Solid State Disk (SSD)
  • the term "and/or” is merely an association relationship describing an associated object, indicating that there may be three relationships.
  • a and/or B may indicate that A exists separately, and A and B exist simultaneously, and B cases exist alone.
  • the character "/" in this article generally indicates that the contextual object is an "or" relationship.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .
  • At least one means one or more, and "a plurality” means two or more.
  • At least one of the following or a similar expression thereof refers to any combination of these items, including any combination of a single item or a plurality of items.
  • at least one of "a, b, or c" may mean: a, b, c, ab ( That is, a and b), ac, bc, or abc, wherein a, b, and c may be single or plural.
  • the device structure diagrams given in the various device embodiments of the present application show only a simplified design of the corresponding device.
  • the device may include any number of transmitters, receivers, processors, memories, etc., to implement the functions or operations performed by the device in the embodiments of the present application, and all devices that can implement the present application All are within the scope of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided in the present invention are a method for converting unlicensed transmission into licensed transmission, a network device and a terminal device. The method comprises: a first device receiving a first message that is sent by a second device, the first message being used for requesting to convert unlicensed transmission into licensed transmission, and the resources occupied for transmitting the first message being less than the resources occupied for transmitting a buffer status report (BSR); determining uplink scheduling information for licensed transmission by the second device at least according to the first message and unlicensed transmission by the second device; sending the uplink scheduling information to the second device; the first device receiving second data that is sent by the second device according to the uplink scheduling information. The technical solution may reduce transmission delays and increase the communication efficiency of a system.

Description

由基于非授权的传输转为基于授权的传输的方法和设备Method and apparatus for transferring from unauthorized based transmission to authorization based transmission
本申请要求于2017年9月30日提交中国国家知识产权局、申请号为201710912955.8、申请名称为“一种基于非授权的传输转为基于授权的传输的方法”的中国专利申请的优先权,以及于2018年5月29日提交中国国家知识产权局、申请号为201810533171.9、申请名称为“由基于非授权的传输转为基于授权的传输的方法和设备”的中国专利申请的优先权,它们的全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application filed on September 30, 2017 by the State Intellectual Property Office of China, application number 201710912955.8, and the application name is “a method based on unauthorized transfer to transfer-based transfer”. And the Chinese patent application filed on May 29, 2018, the Chinese National Intellectual Property Office, application number 201810533171.9, and the application name is "Method and Equipment for Transfer from Unauthorized Transmission to Authorized Transmission". The entire contents of this application are incorporated herein by reference.
技术领域Technical field
本申请实施例涉及通信领域,并且更具体地,涉及一种由基于非授权的传输转为基于授权的传输的方法、网络设备和终端设备。The embodiments of the present application relate to the field of communications, and, more particularly, to a method, a network device, and a terminal device that are converted from an unauthorized-based transmission to an authorization-based transmission.
背景技术Background technique
现有的蜂窝通信***,如移动通信全球***(global system for mobile communication,GSM),宽带码分多址移动通信***(wideband code division multiple access,WCDMA),长期演进(long term evolution,LTE)等***中,所支持的通信主要是针对语音和数据通信的。在新无线接入(new radio access,NR)***中,不仅支持传统的语音和数据通信,还将支持海量物联网通信(massive machine type communication,mMTC)。对于机器对机器(machine to machine,M2M)通信业务而言,会存在低时延高可靠通信(ultra-reliable and low latency communications,URLLC),这类业务不仅要求传输时延短,而且要求可靠,比如车辆对车辆(vehicle to vehicle,V2V)业务。如果传输不可靠,会导致重传。Existing cellular communication systems, such as global system for mobile communication (GSM), wideband code division multiple access (WCDMA), long term evolution (LTE), etc. In the system, the supported communications are primarily for voice and data communications. In the new radio access (NR) system, not only traditional voice and data communication, but also massive machine type communication (mMTC) will be supported. For machine-to-machine (M2M) communication services, there will be ultra-reliable and low latency communications (URLLC), which require not only short transmission delays but also reliable requirements. Such as vehicle to vehicle (V2V) business. If the transmission is not reliable, it will cause a retransmission.
LTE***中采用基于授权的(grant-based)传输方法,当用户设备(User Equipment,UE)有上行数据需要传输时,需要先发送SR(Scheduling Request,调度请求)命令以通知基站有上行数据计划发送,然后接收到BSR(Buffer Statues Report,缓冲区状态报告)的上行调度信息后,再向基站发送BSR以上报所需的传输资源,最后接收到第二条上行调度信息,才能向基站发送上行数据。由此可知,从用户设备向基站发送SR申请发送上行数据到用户设备能够发送上行数据,需要有多条信令的交互,会引起较大延迟,对于未来通信网络***,显然不能满足低时延要求。因此,如何降低用户设备上行传输时的时延,提高***的通信效率,成为一个亟待解决的技术问题。A grant-based transmission method is adopted in the LTE system. When the user equipment (User Equipment, UE) has uplink data to be transmitted, the SR (Scheduling Request) command needs to be sent to notify the base station of the uplink data plan. After transmitting, and then receiving the uplink scheduling information of the BSR (Buffer Statues Report), the transmission resource required for the BSR report is sent to the base station, and finally the second uplink scheduling information is received, and then the uplink can be sent to the base station. data. Therefore, it can be known that sending an uplink request from the user equipment to the base station to send uplink data to the user equipment can send uplink data, and multiple signaling interactions are required, which may cause a large delay. For the future communication network system, it is obviously unable to meet the low delay. Claim. Therefore, how to reduce the delay of the uplink transmission of the user equipment and improve the communication efficiency of the system becomes a technical problem to be solved urgently.
发明内容Summary of the invention
本申请提供一种由基于非授权的传输转为基于授权的传输的方法、网络设备和终端设备,能够提高***的通信效率。The present application provides a method, a network device, and a terminal device that are converted from an unlicensed transmission to an authorization-based transmission, which can improve communication efficiency of the system.
第一方面,提供了一种由基于非授权的传输转为基于授权的传输的方法,包括:In a first aspect, a method for transitioning from an unlicensed transmission to an authorization based transmission is provided, comprising:
第一设备接收第二设备发送的第一消息,所述第一消息用于请求由基于非授权的传输转为基于授权的传输,传输所述第一消息所占用的资源比传输缓冲区状态报告BSR所占用的资源少;Receiving, by the first device, a first message sent by the second device, where the first message is used to request that the resource occupied by the first message is compared to a transmission buffer status report by transferring the unlicensed transmission to the authorization based transmission The resources occupied by the BSR are small;
所述第一设备至少根据所述第一消息和所述第二设备的基于非授权的传输,确定所述第二设备的基于授权的传输的上行调度信息;Determining, by the first device, uplink scheduling information of the second device based on the authorization based on at least the first message and the second device based on the unlicensed transmission;
所述第一设备向所述第二设备发送所述上行调度信息;Sending, by the first device, the uplink scheduling information to the second device;
所述第一设备接收所述第二设备根据所述上行调度信息发送的第二数据。The first device receives second data that is sent by the second device according to the uplink scheduling information.
在上述技术方案中,至少根据第一消息和第二设备的基于非授权的传输,确定该第二设备的基于授权的传输的上行调度信息,可以降低传输时延,提高***的通信效率。In the above technical solution, determining uplink scheduling information of the second device based on the authorization transmission based on the unauthorized transmission of the first message and the second device may reduce the transmission delay and improve the communication efficiency of the system.
结合第一方面,在第一种可能的实现方式中,所述至少根据所述第一消息和所述第二设备的基于非授权的传输,确定所述第二设备的基于授权的传输的上行调度信息,包括:在接收到所述第二设备发送的基于非授权的传输的第一数据,所述第一设备不能成功解调所述第一数据,但能识别所述第一数据的发送者的情况下,至少根据所述第一消息和所述不能被成功解调的第一数据,确定所述上行调度信息。With reference to the first aspect, in a first possible implementation, the determining, according to the non-authorized transmission of the first message and the second device, determining an uplink of an authorization-based transmission of the second device The scheduling information includes: receiving the first data based on the unauthorized transmission sent by the second device, the first device cannot successfully demodulate the first data, but can identify the sending of the first data In the case of the foregoing, the uplink scheduling information is determined according to at least the first message and the first data that cannot be successfully demodulated.
在上述技术方案中,第一设备可以直接至少根据第一消息和该不能被成功解调的第一数据,确定上行调度信息,而不需要第二设备再向该第一设备发送BSR,减少了信令交互的次数,可以有效降低传输时延,提高***的通信效率。In the above technical solution, the first device may directly determine the uplink scheduling information according to the first message and the first data that cannot be successfully demodulated, without the second device sending the BSR to the first device again, which is reduced. The number of signaling interactions can effectively reduce the transmission delay and improve the communication efficiency of the system.
结合第一方面的第一种可能的实现方式,在第二种可能的实现方式中,在所述第一设备接收第二设备发送的第一消息之前,所述方法还包括:在接收到所述第二设备发送的基于非授权的传输的第一数据,所述第一设备不能成功解调第一数据,但能识别所述第一数据的发送者的情况下,向所述第二设备发送对所述第一数据的否定响应或在特定时间间隔内不向所述第二设备发送对所述第一数据的肯定响应。With the first possible implementation of the first aspect, in a second possible implementation, before the first device receives the first message sent by the second device, the method further includes: receiving the Determining, by the second device, the first data based on the unauthorized transmission, where the first device cannot successfully demodulate the first data, but can identify the sender of the first data, to the second device Sending a negative response to the first data or not sending a positive response to the first data to the second device during a particular time interval.
结合第一方面,在第三种可能的实现方式中,所述至少根据所述第一消息和所述第二设备的基于非授权的传输,确定所述第二设备的基于授权的传输的上行调度信息,包括:在接收到所述第二设备发送的基于非授权的传输的第一数据,所述第一设备不能成功解调所述第一数据,且不能识别所述第一数据的发送者的情况下,至少根据所述第一消息和所述不能被成功解调的第一数据的能量,确定所述上行调度信息。With reference to the first aspect, in a third possible implementation, the determining, according to the first message and the second device based on the unauthorized transmission, determining an uplink of the second device based on the authorized transmission The scheduling information includes: receiving the first data based on the unauthorized transmission sent by the second device, the first device cannot successfully demodulate the first data, and cannot identify the sending of the first data The uplink scheduling information is determined according to at least the energy of the first message and the first data that cannot be successfully demodulated.
在上述技术方案中,第一设备可以直接至少根据第一消息和该不能被成功解调的第一数据的能量,确定上行调度信息,而不需要第二设备再向该第一设备发送BSR,减少了信令交互的次数,可以有效降低传输时延,提高***的通信效率。In the above technical solution, the first device may directly determine the uplink scheduling information according to at least the energy of the first message and the first data that cannot be successfully demodulated, without the second device sending the BSR to the first device again. The number of signaling interactions is reduced, which can effectively reduce the transmission delay and improve the communication efficiency of the system.
结合第一方面或第一方面的第一至三种可能的实现方式中的任一种可能的实现方式,在第四种可能的实现方式中,所述第一消息为上行控制信息。With reference to the first aspect, or any one of the first to the third possible implementation manners of the first aspect, in a fourth possible implementation manner, the first message is uplink control information.
在上述技术方案中,上行控制信息可以为简单信令,这样能够降低资源开销,提高***的通信效率。In the foregoing technical solution, the uplink control information may be simple signaling, which can reduce resource overhead and improve communication efficiency of the system.
结合第一方面或第一方面的第一至三种可能的实现方式中的任一种可能的实现方式,在第五种可能的实现方式中,所述第一消息与调度请求SR的帧格式相同,所述第一消息与所述调度请求SR对应的星座图不同。With reference to the first aspect or any one of the first to the third possible implementation manners of the first aspect, in a fifth possible implementation, the frame format of the first message and the scheduling request SR Similarly, the first message is different from the constellation corresponding to the scheduling request SR.
在上述技术方案中,第一消息与调度请求SR对应的星座图不同,在不增加额外指示标识的前提下,第一设备可以根据不同的星座图区分出所述第一消息和调度请求SR,可以提高***的通信效率。In the foregoing technical solution, the first message is different from the scheduling request SR, and the first device may distinguish the first message and the scheduling request SR according to different constellation diagrams without adding an additional indication identifier. Can improve the communication efficiency of the system.
结合第一方面或第一方面的第一至三种可能的实现方式中的任一种可能的实现方式,在第六种可能的实现方式中,所述第一消息通过非授权转授权调度请求SR-like资源发送,所述SR-like资源为所述第一设备单独划分的资源,所述SR-like资源能够用于传输所述第一消息和/或调度请求SR。With reference to the first aspect, or any one of the first to the third possible implementation manners of the first aspect, in a sixth possible implementation manner, the first message is configured by using an unauthorized transfer authorization request The SR-like resource is sent by the SR-like resource, and the SR-like resource is used to transmit the first message and/or the scheduling request SR.
在上述技术方案中,SR-like资源周期可以比SR资源周期短,能够降低传输时延,提高*** 的通信效率。In the foregoing technical solution, the SR-like resource period may be shorter than the SR resource period, which can reduce the transmission delay and improve the communication efficiency of the system.
在一些可能的实现方式中,SR-like资源也可以用于发送调度请求SR,这样能够提高***资源的使用效率。In some possible implementation manners, the SR-like resource may also be used to send a scheduling request SR, which can improve the efficiency of using system resources.
结合第一方面或第一方面的第一至三种可能的实现方式中的任一种可能的实现方式,在第七种可能的实现方式中,所述第一消息为所述第二设备传输的未采用调制方式的能量。With reference to the first aspect, or any one of the first to the third possible implementation manners of the first aspect, in a seventh possible implementation, the first message is transmitted by the second device The energy of the modulation method is not used.
在上述技术方案中,第一消息为第二设备传输的未采用调制方式的能量,不需要第二设备传输其它的指示信息,这样可以降低***开销,提高***的通信效率。In the foregoing technical solution, the first message is the energy of the second device that does not adopt the modulation mode, and the second device does not need to transmit other indication information, which can reduce system overhead and improve communication efficiency of the system.
结合第一方面或第一方面的第一至三种可能的实现方式中的任一种可能的实现方式,在第八种可能的实现方式中,所述第一消息通过上行捎带传输的方式与所述第二设备向所述第一设备传输的第三数据一起发送。With reference to the first aspect, or any one of the first to the three possible implementation manners of the first aspect, in an eighth possible implementation manner, the first message is transmitted by using an uplink piggyback The second device sends the third data transmitted to the first device together.
在上述技术方案中,第一消息可以通过上行捎带传输的方式与第二设备向第一设备传输的第三数据一起发送,可以有效利用***资源,提高***的通信效率。In the above technical solution, the first message may be sent together with the third data transmitted by the second device to the first device by means of uplink piggyback transmission, which can effectively utilize system resources and improve communication efficiency of the system.
结合第一方面或第一方面的第一至八种可能的实现方式中的任一种可能的实现方式,在第九种可能的实现方式中,所述第一设备接收第二设备发送的第一消息,包括:所述第一设备在物理上行控制信道资源上接收所述第二设备发送的所述第一消息。With reference to the first aspect, or any one of the first to the eighth possible implementation manners of the first aspect, in a ninth possible implementation manner, the first device The message includes: the first device receiving the first message sent by the second device on a physical uplink control channel resource.
结合第一方面或第一方面的第一至八种可能的实现方式中的任一种可能的实现方式,在第十种可能的实现方式中,所述第一设备接收第二设备发送的第一消息,包括:所述第一设备在物理调度请求信道资源上接收所述第二设备发送的所述第一消息。With reference to the first aspect, or any one of the first to the eighth possible implementation manners of the first aspect, in the tenth possible implementation, the first device receives the second The message includes: the first device receiving the first message sent by the second device on a physical scheduling request channel resource.
结合第一方面或第一方面的第一至八种可能的实现方式中的任一种可能的实现方式,在第十一种可能的实现方式中,所述第一设备接收第二设备发送的第一消息,包括:所述第一设备在物理上行共享信道资源上接收所述第二设备发送的所述第一消息。With reference to the first aspect, or any one of the first to the eighth possible implementation manners of the first aspect, in the eleventh possible implementation manner, the first device receives the second device The first message includes: the first device receiving the first message sent by the second device on a physical uplink shared channel resource.
结合第一方面或第一方面的第一至八种可能的实现方式中的任一种可能的实现方式,在第十二种可能的实现方式中,所述第一设备接收第二设备发送的第一消息,包括:所述第一设备在基于非授权的传输的资源上接收所述第二设备发送的所述第一消息。在上述技术方案中,第一设备可以在基于非授权的传输的资源上接收第二设备发送的第一消息,可以提高***资源的使用效率,增加信令传输的可靠性,提高***的通信效率。With reference to the first aspect, or any one of the first to the eighth possible implementation manners of the first aspect, in the twelfth possible implementation, the first device receives the second device The first message includes: the first device receiving the first message sent by the second device on a resource based on the unlicensed transmission. In the foregoing technical solution, the first device may receive the first message sent by the second device on the resource based on the unlicensed transmission, which may improve the use efficiency of the system resource, increase the reliability of the signaling transmission, and improve the communication efficiency of the system. .
结合第一方面的第九至十二种可能的实现方式中的任一种可能的实现方式,在第十三种可能的实现方式中,所述第一设备接收第二设备发送的第一消息,包括:所述第一设备在预留资源上接收所述第二设备发送的所述第一消息,所述预留资源的传输周期小于物理调度请求信道资源的传输周期。在上述技术方案中,预留资源的传输周期可以小于物理调度请求信道资源的传输周期,能够降低传输时延,提高***的通信效率。With reference to any one of the possible implementations of the ninth to the twelfth possible implementations of the first aspect, in the thirteenth possible implementation manner, the first device receives the first message sent by the second device The first device receives the first message sent by the second device on a reserved resource, where a transmission period of the reserved resource is smaller than a transmission period of a physical scheduling request channel resource. In the foregoing technical solution, the transmission period of the reserved resource may be smaller than the transmission period of the physical scheduling request channel resource, which can reduce the transmission delay and improve the communication efficiency of the system.
结合第一方面的第十三种可能的实现方式,在第十四种可能的实现方式中,所述预留资源为一个终端设备专有或多个终端设备共享。With reference to the thirteenth possible implementation manner of the first aspect, in the fourteenth possible implementation manner, the reserved resource is shared by one terminal device or shared by multiple terminal devices.
在上述技术方案中,预留资源可以多个终端设备共享,能够提高***资源的使用效率,提高***的通信效率。In the foregoing technical solution, the reserved resources can be shared by multiple terminal devices, which can improve the use efficiency of system resources and improve the communication efficiency of the system.
结合第一方面或第一方面的第一至十四种可能的实现方式中的任一种可能的实现方式,在第十五种可能的实现方式中,所述方法还包括:所述第一设备在接收所述第一数据之前,向所述第二设备发送第二消息,所述第二消息用于指示采用或不采用通过所述第一消息来进行基于非授权的传输转为基于授权的传输的机制。With reference to the first aspect, or any one of the first to the fourteen possible implementations of the first aspect, in a fifteenth possible implementation, the method further includes: the first Before receiving the first data, the device sends a second message to the second device, where the second message is used to indicate that the unauthorized transmission by using the first message is performed or not based on the authorization. The mechanism of transmission.
结合第一方面的第十五种可能的实现方式,在第十六种可能的实现方式中,所述向所述第二设备发送第二消息,包括:通过***消息向所述第二设备发送所述第二消息;或,通过无线资源控制信令向所述第二设备发送所述第二消息;或,通过物理控制消息向所述第二设备发送所述第二消息。With the fifteenth possible implementation manner of the first aspect, in a sixteenth possible implementation, the sending, by the second device, the second message includes: sending, by using a system message, to the second device And sending the second message to the second device by using radio resource control signaling; or sending the second message to the second device by using a physical control message.
第二方面,提供了一种由基于非授权的传输转为基于授权的传输的方法,包括:In a second aspect, a method for transitioning from an unlicensed transmission to an authorization based transmission is provided, comprising:
第二设备向第一设备发送第一消息,所述第一消息用于请求由基于非授权的传输转为基于授权的传输,传输所述第一消息所占用的资源比传输缓冲区状态报告BSR所占用的资源少;所述第二设备接收所述第一设备发送的基于授权的传输的上行调度信息,所述上行调度信息至少根据所述第一消息和所述第二设备的基于非授权的传输确定;所述第二设备根据所述上行调度信息向所述第一设备发送第二数据。The second device sends a first message to the first device, where the first message is used to request that the resource that is occupied by the first message is transferred from the unlicensed transmission to the authorization-based transmission, and the resource buffer is compared with the transmission buffer status report BSR. The second device receives the uplink scheduling information of the authorization-based transmission sent by the first device, and the uplink scheduling information is based at least on the first message and the second device based on the unauthorized And determining, by the second device, the second data is sent to the first device according to the uplink scheduling information.
在上述技术方案中,第二设备向第一设备发送第一消息,第一消息用于请求由基于非授权的传输转为基于授权的传输,传输该第一消息所占用的资源比传输缓冲区状态报告BSR所占用的资源少,可以降低资源开销,提高***的通信效率。In the foregoing technical solution, the second device sends a first message to the first device, where the first message is used to request that the resource occupied by the first message is transferred to the transmission buffer by the unauthorized transmission to the authorization-based transmission. The status report BSR occupies less resources, which can reduce resource overhead and improve system communication efficiency.
结合第二方面,在第二方面的第一种可能的实现方式中,所述第二设备向第一设备发送第一消息,包括:在接收到所述第一设备发送的对第一数据的否定响应的情况下,所述第二设备向所述第一设备发送所述第一消息,所述第一数据为所述第二设备发送的基于非授权的传输的数据。With reference to the second aspect, in a first possible implementation manner of the second aspect, the sending, by the second device, the first message to the first device includes: receiving, by the first device, the first data In the case of a negative response, the second device sends the first message to the first device, where the first data is data of an unauthorized transmission based on the second device.
在上述技术方案中,在接收到第一设备发送的第一数据的否定响应的情况下,第二设备向第一设备发送第一消息,用于请求由基于非授权的传输转为基于授权的传输,可以提高***传输的可靠性,从而提高***的通信效率。In the foregoing technical solution, in a case of receiving a negative response of the first data sent by the first device, the second device sends a first message to the first device, where the request is changed from the unauthorized-based transmission to the authorization-based Transmission can improve the reliability of system transmission, thereby improving the communication efficiency of the system.
结合第二方面,在第二方面的第二种可能的实现方式中,所述第二设备向第一设备发送第一消息,包括:在特定时间间隔内未接收到所述第一设备发送的对第一数据的肯定响应的情况下,所述第二设备向所述第一设备发送所述第一消息,所述第一数据为所述第二设备发送的基于非授权的传输的数据。With reference to the second aspect, in a second possible implementation manner of the second aspect, the sending, by the second device, the first message to the first device includes: not receiving, by the first device, In the case of a positive response to the first data, the second device sends the first message to the first device, where the first data is data of an unauthorized transmission based on the second device.
在一些可能的实现方式中,第二设备未在特定时间间隔内接收到K次重复传输之后第一设备发送的否定响应时,所述第二设备认为第一数据发送成功,不向所述第一设备发送第一消息;或者,第二设备未在特定时间间隔内接收到第一设备发送的否定响应(不使用K次重复传输时),所述第二设备认为第一数据发送成功,不向所述第一设备发送第一消息,K为不大于最大重复传输次数的正整数。In some possible implementation manners, when the second device does not receive the negative response sent by the first device after the K times of repeated transmissions in the specific time interval, the second device considers that the first data transmission is successful, and does not The first device sends the first message; or the second device does not receive the negative response sent by the first device in a specific time interval (when no K times of repeated transmission is used), the second device considers that the first data is successfully sent, Sending a first message to the first device, where K is a positive integer not greater than the maximum number of repeated transmissions.
在上述技术方案中,在特定时间间隔内未接收到第一设备发送的对第一数据的肯定响应的情况下,第二设备向第一设备发送第一消息,可以提高***传输的可靠性,从而提高***的通信效率。In the foregoing technical solution, in a case that the first device does not receive the positive response to the first data sent by the first device, the second device sends the first message to the first device, which can improve the reliability of the system transmission. Thereby improving the communication efficiency of the system.
结合第二方面或第二方面的第一或二种可能的实现方式,在第二方面的第三种可能的实现方式中,所述第一消息为上行控制信息。With reference to the second aspect or the first or the second possible implementation manner of the second aspect, in the third possible implementation manner of the second aspect, the first message is uplink control information.
在上述技术方案中,上行控制信息可以为简单信令,这样能够降低资源开销,提高***的通信效率。In the foregoing technical solution, the uplink control information may be simple signaling, which can reduce resource overhead and improve communication efficiency of the system.
结合第二方面或第二方面的第一或二种可能的实现方式,在第二方面的第四种可能的实现方式中,所述第一消息与调度请求SR的帧格式相同,所述第一消息与所述调度请求SR对应的星座图不同。With reference to the second aspect or the first or the second possible implementation manner of the second aspect, in a fourth possible implementation manner of the second aspect, the first message is the same as the frame format of the scheduling request SR, where A message is different from the constellation diagram corresponding to the scheduling request SR.
在上述技术方案中,第一消息与调度请求SR对应的星座图不同,在不增加额外指示标识的 前提下,第一设备可以根据不同的星座图区分出第一消息和调度请求SR,可以提高***的通信效率。In the foregoing technical solution, the first message is different from the scheduling request SR, and the first device can distinguish the first message and the scheduling request SR according to different constellations without increasing the additional indication identifier, which can be improved. System communication efficiency.
结合第二方面或第二方面的第一或二种可能的实现方式,在第二方面的第五种可能的实现方式中,所述第一消息通过非授权转授权调度请求SR-like资源发送,所述SR-like资源为所述第一设备单独划分的资源,所述SR-like资源能够用于传输所述第一消息和/或调度请求SR。With reference to the second aspect or the first or the second possible implementation manner of the second aspect, in a fifth possible implementation manner of the second aspect, the first message is sent by using an unauthorized transfer authorization request SR-like resource The SR-like resource is a separately allocated resource of the first device, and the SR-like resource can be used to transmit the first message and/or the scheduling request SR.
在上述技术方案中,SR-like资源周期可以比SR资源周期短,能够降低传输时延,提高***的通信效率。In the foregoing technical solution, the SR-like resource period may be shorter than the SR resource period, which can reduce the transmission delay and improve the communication efficiency of the system.
结合第二方面或第二方面的第一或二种可能的实现方式,在第二方面的第六种可能的实现方式中,所述第一消息为所述第二设备传输的未采用调制方式的能量。With reference to the second aspect or the first or the second possible implementation manner of the second aspect, in a sixth possible implementation manner of the second aspect, the first message is an unused modulation mode transmitted by the second device energy of.
在上述技术方案中,第一消息为第二设备传输的未采用调制方式的能量,不需要第二设备传输其它的指示信息,可以提高***的通信效率。In the foregoing technical solution, the first message is the energy of the second device that does not adopt the modulation mode, and the second device does not need to transmit other indication information, so that the communication efficiency of the system can be improved.
结合第二方面或第二方面的第一或二种可能的实现方式,在第二方面的第七种可能的实现方式中,所述第一消息通过上行捎带传输的方式与所述第二设备向所述第一设备传输的第三数据一起发送。With reference to the second aspect or the first or the second possible implementation manner of the second aspect, in a seventh possible implementation manner of the second aspect, the first message is transmitted by using an uplink piggybacking device and the second device The third data transmitted to the first device is transmitted together.
在上述技术方案中,第一消息可以通过上行捎带传输的方式与第二设备向第一设备传输的第三数据一起发送,可以有效利用***资源,提高***的通信效率。In the above technical solution, the first message may be sent together with the third data transmitted by the second device to the first device by means of uplink piggyback transmission, which can effectively utilize system resources and improve communication efficiency of the system.
结合第二方面或第二方面的第一至七种可能的实现方式中的任一种可能的实现方式,在第二方面的第八种可能的实现方式中,所述第二设备向第一设备发送第一消息,包括:所述第二设备在物理上行控制信道资源上向所述第一设备发送所述第一消息。With reference to the second aspect, or any one of the first to the seventh possible implementation manners of the second aspect, in the eighth possible implementation manner of the second aspect, the second device is first The sending, by the device, the first message includes: sending, by the second device, the first message to the first device on a physical uplink control channel resource.
结合第二方面或第二方面的第一至七种可能的实现方式中的任一种可能的实现方式,在第二方面的第九种可能的实现方式中,所述第二设备向第一设备发送第一消息,包括:所述第二设备在物理调度请求信道资源上向所述第一设备发送所述第一消息。With reference to the second aspect, or any one of the first to the seventh possible implementation manners of the second aspect, in a ninth possible implementation manner of the second aspect, the second device is first The sending, by the device, the first message includes: sending, by the second device, the first message to the first device on a physical scheduling request channel resource.
结合第二方面或第二方面的第一至七种可能的实现方式中的任一种可能的实现方式,在第二方面的第十种可能的实现方式中,所述第二设备向第一设备发送第一消息,包括:所述第二设备在物理上行共享信道资源上向所述第一设备发送所述第一消息。With reference to the second aspect, or any one of the first to the seventh possible implementation manners of the second aspect, in a tenth possible implementation manner of the second aspect, the second device is first The sending, by the device, the first message includes: sending, by the second device, the first message to the first device on a physical uplink shared channel resource.
结合第二方面或第二方面的第一至七种可能的实现方式中的任一种可能的实现方式,在第二方面的第十一种可能的实现方式中,所述第二设备向第一设备发送第一消息,包括:所述第二设备在基于非授权的传输的资源上向所述第一设备发送所述第一消息。With reference to the second aspect or any one of the first to the seventh possible implementation manners of the second aspect, in the eleventh possible implementation manner of the second aspect, the second device Sending, by the device, the first message, the second device sends the first message to the first device on a resource based on the unlicensed transmission.
在上述技术方案中,第一设备可以在基于非授权的传输的资源上接收第二设备发送的第一消息,可以提高***资源的使用效率,增加信令传输的可靠性,提高***的通信效率。In the foregoing technical solution, the first device may receive the first message sent by the second device on the resource based on the unlicensed transmission, which may improve the use efficiency of the system resource, increase the reliability of the signaling transmission, and improve the communication efficiency of the system. .
结合第二方面的第八至十一种可能的实现方式中的任一种可能的实现方式,在第二方面的第十二种可能的实现方式中,所述第二设备向第一设备发送第一消息,包括:所述第二设备在预留资源上向所述第一设备发送所述第一消息,所述预留资源的传输周期小于物理调度请求信道资源的传输周期。With reference to any one of the possible implementations of the eighth to the eleventh possible implementations of the second aspect, in a twelfth possible implementation manner of the second aspect, the second device sends the first device to the first device The first message includes: the second device sends the first message to the first device on a reserved resource, where a transmission period of the reserved resource is smaller than a transmission period of a physical scheduling request channel resource.
在上述技术方案中,预留资源的传输周期可以小于物理调度请求信道资源的传输周期,能够降低传输时延,提高***的通信效率。In the foregoing technical solution, the transmission period of the reserved resource may be smaller than the transmission period of the physical scheduling request channel resource, which can reduce the transmission delay and improve the communication efficiency of the system.
结合第二方面的第十二种可能的实现方式,在第二方面的第十三种可能的实现方式中,所述预留资源为一个终端设备专有或多个终端设备共享。In conjunction with the twelfth possible implementation of the second aspect, in the thirteenth possible implementation manner of the second aspect, the reserved resource is shared by one terminal device or multiple terminal devices.
在上述技术方案中,预留资源可以多个终端设备共享,能够提高***资源的使用效率,提高 ***的通信效率。In the foregoing technical solution, the reserved resources can be shared by multiple terminal devices, which can improve the use efficiency of system resources and improve the communication efficiency of the system.
结合第二方面或第二方面的第一至十三种可能的实现方式中的任一种可能的实现方式,在第二方面的第十四种可能的实现方式中,所述方法还包括:所述第二设备在发送所述第一数据前,接收所述第一设备发送的第二消息,所述第二消息用于指示采用或不采用通过所述第一消息来进行基于非授权的传输转为基于授权的传输的机制。With reference to the second aspect, or any one of the first to the thirteen possible implementations of the second aspect, in a fourteenth possible implementation manner of the second aspect, the method further includes: Receiving, by the second device, the second message sent by the first device, where the second message is used to indicate that the first message is used or not based on the unauthorized The mechanism for transferring to an authorization-based transport.
结合第二方面的第十四种可能的实现方式,在第二方面的第十五种可能的实现方式中,所述接收所述第一设备发送的第二消息,包括:通过***消息接收所述第一设备发送的所述第二消息;或,通过无线资源控制信令接收所述第一设备发送的所述第二消息;或,通过物理控制消息接收所述第一设备发送的所述第二消息。With reference to the fourteenth possible implementation manner of the second aspect, in the fifteenth possible implementation manner of the second aspect, the receiving, by the first device, the second message includes: receiving, by using a system message Receiving the second message sent by the first device; or receiving the second message sent by the first device by using radio resource control signaling; or receiving, by using a physical control message, the Second message.
第三方面,提供了一种网络设备,包括用于执行上述第一方面或第一方面的任一可能的实现方式中的方法的模块。In a third aspect, a network device is provided, comprising means for performing the method of any of the above-described first aspect or any of the possible implementations of the first aspect.
第四方面,提供了一种终端设备,包括用于执行上述第二方面或第二方面的任一可能的实现方式中的方法的模块。In a fourth aspect, there is provided a terminal device comprising means for performing the method of any of the above-described second or second aspect of the second aspect.
第五方面,提供了一种网络设备,该网络设备包括:处理器和收发器,所述处理器和收发器用于执行上述第一方面或第一方面的任一可能的实现方式中的方法。在一种可能的实现方式中,所述网络设备还包括存储器,所述存储器上存储有可在该处理器上运行的计算机程序,该处理器执行该计算机程序时使得该网络设备执行上述第一方面或第一方面的任一可能的实现方式中的方法。In a fifth aspect, a network device is provided, the network device comprising: a processor and a transceiver, the processor and the transceiver for performing the method of any of the first aspect or the first aspect of the first aspect. In a possible implementation, the network device further includes a memory, where the computer stores a computer program executable on the processor, and when the processor executes the computer program, causing the network device to perform the first Aspect or method of any of the possible implementations of the first aspect.
第六方面,提供了一种终端设备,该终端设备包括:处理器和收发器,所述处理器和收发器用于执行上述第二方面或第二方面的任一可能的实现方式中的方法。在一种可能的实现方式中,所述网络设备还包括存储器,所述存储器上存储有可在该处理器上运行的计算机程序,该处理器执行该计算机程序时使得该终端设备执行上述第二方面或第二方面的任一可能的实现方式中的方法。In a sixth aspect, a terminal device is provided, the terminal device comprising: a processor and a transceiver, the processor and the transceiver being configured to perform the method in any of the possible implementations of the second aspect or the second aspect. In a possible implementation, the network device further includes a memory, where the computer stores a computer program executable on the processor, and when the processor executes the computer program, causing the terminal device to perform the second Aspect or method of any of the possible implementations of the second aspect.
第七方面,提供了一种计算机存储介质,用于存储计算机程序,该计算机程序包括用于执行第一方面或第一方面的任一可能的实现方式中的方法的指令。In a seventh aspect, a computer storage medium is provided for storing a computer program, the computer program comprising instructions for performing the method of the first aspect or any of the possible implementations of the first aspect.
第八方面,提供了一种计算机存储介质,用于存储计算机程序,该计算机程序包括用于执行第二方面或第二方面的任一可能的实现方式中的方法的指令。In an eighth aspect, a computer storage medium is provided for storing a computer program, the computer program comprising instructions for performing the method of any of the second aspect or the second aspect.
第九方面,提供了一种包含指令的计算机程序产品,其在终端设备上运行时,使得终端设备执行上述第一方面或第一方面或其任一可能的实现方式中的方法。According to a ninth aspect, a computer program product comprising instructions, when run on a terminal device, causes the terminal device to perform the method of the first aspect or the first aspect or any of its possible implementations.
第十方面,提供了一种包含指令的计算机程序产品,其在网络设备上运行时,使得网络设备执行上述第二方面或第二方面或其任一可能的实现方式中的方法。In a tenth aspect, a computer program product comprising instructions, when run on a network device, causes the network device to perform the method of the second or second aspect or any of its possible implementations.
第十一方面,提供了一种通信芯片,其中存储有指令,当其在网络设备或终端设备上运行时,使得网络设备或终端设备执行上述各方面所述的方法。In an eleventh aspect, there is provided a communication chip in which instructions are stored, which when executed on a network device or a terminal device, cause the network device or the terminal device to perform the method described in the above aspects.
第十二方面提供一种***,包括上述第三方面提供的网络设备和上述第四方面提供的终端设备;或者,包括上述第五方面提供的网络设备和上述第六方面提供的终端设备。The twelfth aspect provides a system, including the network device provided in the foregoing third aspect, and the terminal device provided in the foregoing fourth aspect; or the network device provided in the foregoing fifth aspect and the terminal device provided in the foregoing sixth aspect.
本申请还提供了如下实施例,本部分提供的各实施例的编号与本申请其他部分提供的各实施例的编号并无明确的对应关系,仅为了此部分在表述上的方便:The present application also provides the following embodiments. The numbers of the embodiments provided in this section do not have a clear correspondence with the numbers of the embodiments provided in other parts of the present application, and only the convenience of this part is expressed:
1.一种基于非授权的传输转为基于授权的传输的方法,用于第一设备,所述方法包括:A method for transferring an unlicensed transmission to an authorization based transmission for a first device, the method comprising:
所述第一设备接收第二设备发送的基于非授权的传输的上行数据;Receiving, by the first device, uplink data that is sent by the second device based on the unauthorized transmission;
所述第一设备向所述第二设备发送所述上行数据的否定响应;Sending, by the first device, a negative response of the uplink data to the second device;
所述第一设备接收所述第二设备发送的第一消息,以通知所述第一设备其希望由基于非授权的传输转为基于授权的传输;Receiving, by the first device, the first message sent by the second device, to notify the first device that it wishes to be converted from an unauthorized-based transmission to an authorization-based transmission;
所述第一设备向所述第二设备发送上行调度信息;Sending, by the first device, uplink scheduling information to the second device;
所述第一设备接收第二设备向所述第一设备发送的基于授权的传输的上行数据。The first device receives uplink data of the authorization-based transmission sent by the second device to the first device.
上述提供的实施例中,在Grant-free传输中第一设备向第二设备发送上行数据的否定响应后,第二设备可以向第一设备发送第一消息,以通知第一设备其希望由Grant-free传输转为Grant-based传输,并使用上行调度—上行数据的两步短流程进行Grant-based的传输,相较传统的四步流程(SR--第一次上行调度—BSR---第二次上行调度)减少了开销。In the above-mentioned embodiment, after the first device sends a negative response of the uplink data to the second device in the Grant-free transmission, the second device may send the first message to the first device to notify the first device that it wants to be by Grant. -free transmission is transferred to Grant-based transmission, and the two-step short process of uplink scheduling-uplink data is used for Grant-based transmission, compared with the traditional four-step process (SR--first uplink scheduling-BSR--- The second uplink scheduling) reduces overhead.
2.如1所述的方法:2. The method as described in 1:
所述第一设备和所述第二设备在进行基于非授权的传输之前,所述第一设备向所述第二设备发送第二消息,所述第二消息至少用于配置和/或激活所述第一设备和所述第二设备采用通过所述第一消息来进行基于非授权的传输转为基于授权的传输的机制。Before the first device and the second device perform the unlicensed transmission, the first device sends a second message to the second device, where the second message is used at least for configuring and/or activating the The first device and the second device adopt a mechanism for performing an unauthorized-based transmission to an authorization-based transmission by using the first message.
在第一设备和第二设备在进行Grant-free传输之前,第一设备可以向第二设备配置和/或激活前述的由Grant-free传输转为Grant-based传输的两步机制。Before the first device and the second device perform the Grant-free transmission, the first device may configure and/or activate the aforementioned two-step mechanism of transferring from Grant-free transmission to Grant-based transmission to the second device.
3.如1或2所述的方法:3. The method as described in 1 or 2:
所述第一消息为上行控制信息UCI。The first message is uplink control information UCI.
4.如1至3任一所述的方法:4. The method of any of 1 to 3:
所述第一消息与调度请求SR的帧格式相同,使用的星座图不同。The first message has the same frame format as the scheduling request SR, and the used constellation is different.
第一消息与传统的调度请求SR相似,但作用有差异,因此二者可以使用相同的帧格式,如UCI format 1/1a/1b等,但使用的星座图可以不同,以将两者进行区别。The first message is similar to the traditional scheduling request SR, but the effect is different, so the two can use the same frame format, such as UCI format 1/1a/1b, but the constellation diagrams used can be different to distinguish the two. .
5.如1或2所述的方法:5. The method of 1 or 2:
所述第一消息为能量,未采用调制方式。The first message is energy, and no modulation method is adopted.
即第一消息与传统SR使用的UCI format 1相似,仅在某处资源上发送能量,不使用调制方式,第一设备在该处资源上感知到能量便可获得第二设备发送了第一消息。That is, the first message is similar to the UCI format 1 used by the traditional SR. The energy is sent only on a certain resource, and the modulation mode is not used. The first device can obtain the first message by sensing the energy on the resource. .
6.如1至5任一所述的方法:6. The method of any of 1 to 5:
所述第一消息通过捎带的方式与所述第二设备向所述第一设备发送的上行数据一同发送。The first message is sent together with the uplink data sent by the second device to the first device by means of piggybacking.
即第二设备先第一设备发送上行数据的同时,可以捎带的发送第一消息。That is, the second device may send the first message piggybackingly while the first device sends the uplink data.
7.如1至6任一所述的方法:7. The method of any of 1 to 6:
所述第一设备在物理控制信道PUCCH资源上接收所述第二设备发送的所述第一消息;或,Receiving, by the first device, the first message sent by the second device on a physical control channel PUCCH resource; or
所述第一设备在物理调度请求信道PSRCH资源上接收所述第二设备发送的所述第一消息;或,Receiving, by the first device, the first message sent by the second device on a physical scheduling request channel PSRCH resource; or
所述第一设备在物理共享信道PUSCH资源上接收所述第二设备发送的所述第一消息;或,Receiving, by the first device, the first message sent by the second device on a physical shared channel PUSCH resource; or
所述第一设备在基于非授权的传输的资源上接收所述第二设备发送的所述第一消息。The first device receives the first message sent by the second device on a resource based on unauthorized transmission.
第一消息可以在传统的PUCCH资源上发送;也可以使用与SR使用的相同的PSRCH资源进行发送,严格意义讲在PSRCH资源中发送可以视为在PUCCH资源中发送的一个特例;还可以在 PUSCH资源上发送,如第一设备采用捎带的方式将第一消息和上行数据一同传输的场景;进一步的,第一消息也可以在Grant-free资源中进行发送,这里在Grant-free资源中发送可以视为在PUSCH资源中发送的一个特例。The first message may be sent on a traditional PUCCH resource; or may be sent using the same PSRCH resource used by the SR. Strictly speaking, transmitting in the PSRCH resource may be regarded as a special case transmitted in the PUCCH resource; Sending on the resource, for example, the scenario in which the first device uses the piggybacking method to transmit the first message and the uplink data together; further, the first message may also be sent in the Grant-free resource, where the packet may be sent in the Grant-free resource. Considered as a special case sent in PUSCH resources.
8.如1至7任一所述的方法:8. The method of any of 1 to 7:
所述第一设备通过***消息向所述第二设备发送所述第二消息。The first device sends the second message to the second device by using a system message.
上述实施例可以理解为静态的配置方式。The above embodiments can be understood as a static configuration.
9.如1至7任一所述的方法:9. The method of any of 1 to 7:
所述第一设备通过RRC信令向所述第二设备发送所述第二消息。The first device sends the second message to the second device by using RRC signaling.
上述实施例可以理解为半静态的配置方式。The above embodiments can be understood as a semi-static configuration.
10.如1至7任一所述的方法:10. The method of any of 1 to 7:
所述第一设备通过物理控制信道向所述第二设备发送所述第二消息。The first device sends the second message to the second device by using a physical control channel.
上述实施例可以理解为动态的配置方式。The above embodiments can be understood as a dynamic configuration.
11.一种基于非授权的传输转为基于授权的传输的方法,用于第二设备,所述方法包括:11. A method for transferring an unlicensed transmission to an authorization based transmission for a second device, the method comprising:
所述第二设备向第一设备发送的基于非授权的传输的上行数据;Uplink data based on unauthorized transmission sent by the second device to the first device;
所述第二设备接收所述第一设备向所述第二设备发送的所述上行数据的否定响应;Receiving, by the second device, a negative response of the uplink data sent by the first device to the second device;
所述第二设备向所述第一设备发送第一消息,以通知所述第一设备其希望由基于非授权的传输转为基于授权的传输;Sending, by the second device, the first message to the first device, to notify the first device that it wishes to switch from an unauthorized-based transmission to an authorization-based transmission;
所述第二设备接收所述第一设备向所述第二设备发送的上行调度信息;Receiving, by the second device, uplink scheduling information that is sent by the first device to the second device;
所述第二设备向所述第一设备发送基于授权的传输的上行数据。The second device sends uplink data based on the authorized transmission to the first device.
上述实施例中,在Grant-free传输中第一设备向第二设备发送上行数据的否定响应后,第二设备可以向第一设备发送第一消息,以通知第一设备其希望由Grant-free传输转为Grant-based传输,并使用上行调度—上行数据的两步短流程进行Grant-based的传输,相较传统的四步流程(SR--第一次上行调度—BSR---第二次上行调度)减少了开销。In the above embodiment, after the first device sends a negative response of the uplink data to the second device in the Grant-free transmission, the second device may send the first message to the first device to notify the first device that it wants to be Grant-free. The transmission is transferred to Grant-based transmission, and the two-step short process of uplink scheduling-uplink data is used for Grant-based transmission, compared with the traditional four-step process (SR--first uplink scheduling-BSR---second Secondary uplink scheduling) reduces overhead.
12.如11所述的方法:12. The method as described in 11:
所述第一设备和所述第二设备在进行基于非授权的传输之前,所述第二设备接收所述第一设备向所述第二设备发送的第二消息,所述第二消息至少用于配置和/或激活所述第一设备和所述第二设备采用通过所述第一消息来进行基于非授权的传输转为基于授权的传输的机制。Before the first device and the second device perform the unlicensed transmission, the second device receives the second message sent by the first device to the second device, where the second message is used by at least And configuring and/or activating the first device and the second device to adopt a mechanism for performing an unauthorized-based transmission to an authorization-based transmission by using the first message.
在第一设备和第二设备在进行Grant-free传输之前,第一设备可以向第二设备配置和/或激活前述的由Grant-free传输转为Grant-based传输的两步机制。Before the first device and the second device perform the Grant-free transmission, the first device may configure and/or activate the aforementioned two-step mechanism of transferring from Grant-free transmission to Grant-based transmission to the second device.
13.如11或12所述的方法:13. The method of 11 or 12:
所述第一消息为上行控制信息UCI。The first message is uplink control information UCI.
14.如11至13任一所述的方法:14. The method of any of 11 to 13:
所述第一消息与调度请求SR的帧格式相同,使用的星座图不同。The first message has the same frame format as the scheduling request SR, and the used constellation is different.
第一消息与传统的调度请求SR相似,但作用有差异,因此二者可以使用相同的帧格式,如UCI format 1/1a/1b等,但使用的星座图可以不同,以进行区别。The first message is similar to the traditional scheduling request SR, but the effect is different, so the two can use the same frame format, such as UCI format 1/1a/1b, etc., but the constellation diagrams used can be different to make a difference.
15.如11或12所述的方法:15. The method of 11 or 12:
所述第一消息为能量,未采用调制方式。The first message is energy, and no modulation method is adopted.
即第一消息与传统SR使用的UCI format 1相似,仅在某处资源上发送能量,不使用调制方式,第一设备在该处资源上感知到能量便可获得第二设备发送了第一消息。That is, the first message is similar to the UCI format 1 used by the traditional SR. The energy is sent only on a certain resource, and the modulation mode is not used. The first device can obtain the first message by sensing the energy on the resource. .
16.如11至15任一所述的方法:16. The method of any of 11 to 15:
所述第一消息为通过捎带的方式与所述第二设备向所述第一设备发送的上行数据一同发送。The first message is sent by means of piggybacking with uplink data sent by the second device to the first device.
即第二设备向第一设备发送上行数据的同时,可以捎带的发送第一消息。That is, while the second device sends the uplink data to the first device, the first message may be piggybacked.
17.如11至16任一所述的方法:17. The method of any of 11 to 16:
所述第二设备在物理控制信道PUCCH资源上向所述第一设备发送所述第一消息;Sending, by the second device, the first message to the first device on a physical control channel PUCCH resource;
或,所述第二设备在物理调度请求信道PSRCH资源上向所述第一设备发送所述第一消息;Or the second device sends the first message to the first device on a physical scheduling request channel PSRCH resource;
或,所述第二设备在物理共享信道PUSCH资源上向所述第一设备发送所述第一消息;Or the second device sends the first message to the first device on a physical shared channel PUSCH resource;
或,所述第二设备在基于非授权的传输的资源上向所述第一设备发送的所述第一消息。Or the first message sent by the second device to the first device on a resource based on unauthorized transmission.
第一消息可以在传统的PUCCH资源上发送;也可以使用与SR使用的相同的PSRCH资源进行发送,严格意义讲在PSRCH资源中发送可以视为在PUCCH资源中发送的一个特例;还可以在PUSCH资源上发送,如第一设备采用捎带的方式将第一消息和上行数据一同传输的场景;进一步的,第一消息也可以在Grant-free资源中进行发送,这里在Grant-free资源中发送可以视为在PUSCH资源中发送的一个特例。The first message may be sent on a traditional PUCCH resource; or may be sent using the same PSRCH resource used by the SR. Strictly speaking, transmitting in the PSRCH resource may be regarded as a special case transmitted in the PUCCH resource; Sending on the resource, for example, the scenario in which the first device uses the piggybacking method to transmit the first message and the uplink data together; further, the first message may also be sent in the Grant-free resource, where the packet may be sent in the Grant-free resource. Considered as a special case sent in PUSCH resources.
18.如11至17任一所述的方法:18. The method of any of 11 to 17, wherein:
所述第二设备接收所述第一设备通过***消息向所述第二设备发送的所述第二消息。The second device receives the second message that is sent by the first device to the second device by using a system message.
上述实施例可以理解为静态的配置方式。The above embodiments can be understood as a static configuration.
19.如11至17任一所述的方法:19. The method of any of 11 to 17, wherein:
所述第二设备接收所述第一设备通过RRC信令向所述第二设备发送的所述第二消息。The second device receives the second message that is sent by the first device to the second device by using RRC signaling.
上述实施例可以理解为半静态的配置方式。The above embodiments can be understood as a semi-static configuration.
20.如11至17任一所述的方法:20. The method of any of 11 to 17, wherein:
所述第二设备接收所述第一设备通过物理控制信道向所述第二设备发送的所述第二消息。The second device receives the second message that is sent by the first device to the second device by using a physical control channel.
上述实施例可以理解为动态的配置方式。The above embodiments can be understood as a dynamic configuration.
21.一种第一设备,所述第一设备包括:21. A first device, the first device comprising:
处理器、存储器和收发器;a processor, a memory, and a transceiver;
所述收发器,用于接收和发送数据;The transceiver is configured to receive and send data;
所述存储器用于存储指令;The memory is for storing instructions;
所述处理器用于执行所述存储器中的所述指令,执行如1至10任一所述的方法。The processor is configured to execute the instructions in the memory, and perform the method of any one of 1 to 10.
22.根据21,所述收发器包括:22. According to 21, the transceiver comprises:
发送器和接收器;Transmitter and receiver;
所述发送器用于发送如1至10中任一所述的第二消息、所述的上行数据的否定响应、和所述的上行调度信息;The transmitter is configured to send the second message according to any one of 1 to 10, the negative response of the uplink data, and the uplink scheduling information;
所述接收器还用于接收权1至10中任一所述的第一消息、所述的基于非授权的传输的上行数据、和所述的基于授权的传输的上行数据。The receiver is further configured to receive the first message according to any one of the rights 1 to 10, the uplink data based on the unauthorized transmission, and the uplink data of the authorization-based transmission.
23.一种第二设备,所述第二设备包括:23. A second device, the second device comprising:
处理器、存储器和收发器;a processor, a memory, and a transceiver;
所述收发器,用于接收和发送数据;The transceiver is configured to receive and send data;
所述存储器用于存储指令;The memory is for storing instructions;
所述处理器用于执行所述存储器中的所述指令,执行如11至20任一所述的方法。The processor is configured to execute the instructions in the memory, and perform the method of any one of 11 to 20.
24.根据23,所述收发器包括:24. According to 23, the transceiver comprises:
发送器和接收器;Transmitter and receiver;
所述发送器用于发送如11至20中任一所述的第一消息、所述的基于非授权的传输的上行数据、和所述的基于授权的传输的上行数据;The transmitter is configured to send the first message according to any one of 11 to 20, the uplink data based on the unauthorized transmission, and the uplink data of the authorization-based transmission;
所述接收器用于接收如11至20中任一所述的第二消息、所述的上行数据的否定响应、和所述的上行调度信息。The receiver is configured to receive the second message according to any one of 11 to 20, the negative response of the uplink data, and the uplink scheduling information.
25.如1至24任一所述的方法或设备,其特征在于,所述第一设备为基站,所述第二设备为终端。The method or device of any of 1 to 24, wherein the first device is a base station and the second device is a terminal.
26.一种基站,所述基站被配置为执行如1至10任一所述的方法。26. A base station configured to perform the method of any of 1 to 10.
27.一种终端,所述终端被配置为执行如11至20任一所述的方法。27. A terminal configured to perform the method of any of 11 to 20.
附图说明DRAWINGS
图1是本申请实施例应用的一种通信***的示意图;1 is a schematic diagram of a communication system applied in an embodiment of the present application;
图2是本申请实施例应用的一种网络架构示意图;2 is a schematic diagram of a network architecture applied to an embodiment of the present application;
图3是本申请实施例的一种由基于非授权的传输转为基于授权的传输的方法的示意性流程图;3 is a schematic flowchart of a method for transferring from an unlicensed transmission to an authorization based transmission according to an embodiment of the present application;
图4是本申请实施例的另一种由基于非授权的传输转为基于授权的传输的方法的示意性流程图;FIG. 4 is a schematic flowchart of another method for transferring an unauthorized-based transmission to an authorization-based transmission according to an embodiment of the present application; FIG.
图5是本申请一个实施例的星座图映射的示意图;FIG. 5 is a schematic diagram of a constellation map of an embodiment of the present application; FIG.
图6是本申请另一个实施例的星座图映射的示意图;6 is a schematic diagram of a constellation map of another embodiment of the present application;
图7是本申请一个实施例的SR-like资源占用非授权传输资源情况的示意图;7 is a schematic diagram of an SR-like resource occupying an unlicensed transmission resource according to an embodiment of the present application;
图8是本申请一个实施例的非授权传输资源与参数信息绑定的示意图;8 is a schematic diagram of binding of an unlicensed transmission resource and parameter information according to an embodiment of the present application;
图9是本申请一个实施例的终端设备的示意图;9 is a schematic diagram of a terminal device according to an embodiment of the present application;
图10是本申请一个实施例的网络设备的示意图。FIG. 10 is a schematic diagram of a network device according to an embodiment of the present application.
具体实施方式Detailed ways
下面将结合附图,对本申请中的技术方案进行描述。The technical solutions in the present application will be described below with reference to the accompanying drawings.
图1给出了本申请实施例应用的一种***的示意图。如图1所示,***100可以包括网络设备20以及终端设备10,其中,网络设备与终端设备之间通过无线连接。应理解,图1仅以*** 包括一个网络设备为例进行说明,但本申请实施例并不限于此,例如,***还可以包括更多的网络设备;类似地,***也可以包括更多的终端设备。还应理解,***也可以称为网络,本申请实施例对此并不限定。FIG. 1 is a schematic diagram of a system to which the embodiment of the present application is applied. As shown in FIG. 1, the system 100 can include a network device 20 and a terminal device 10, wherein the network device and the terminal device are connected by wireless. It should be understood that FIG. 1 is only an example in which the system includes a network device, but the embodiment of the present application is not limited thereto. For example, the system may further include more network devices; similarly, the system may also include more terminals. device. It should also be understood that the system may also be referred to as a network, which is not limited by the embodiment of the present application.
本申请实施例中的通信设备可以为终端设备。终端设备也可以指用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公共陆地移动网络(public land mobile network,PLMN)网络中的终端设备等。The communication device in this embodiment of the present application may be a terminal device. The terminal device may also refer to user equipment (UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent. Or user device. The access terminal may be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), with wireless communication. Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in future 5G networks, or in future public land mobile network (PLMN) networks Terminal equipment, etc.
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。By way of example and not limitation, in the embodiment of the present application, the terminal device may also be a wearable device. A wearable device, which can also be called a wearable smart device, is a general term for applying wearable technology to intelligently design and wear wearable devices such as glasses, gloves, watches, clothing, and shoes. A wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are more than just a hardware device, but they also implement powerful functions through software support, data interaction, and cloud interaction. Generalized wearable smart devices include full-featured, large-size, non-reliable smartphones for full or partial functions, such as smart watches or smart glasses, and focus on only one type of application, and need to work with other devices such as smartphones. Use, such as various smart bracelets for smart signs monitoring, smart jewelry, etc.
本申请实施例中的通信设备可以为网络设备。网络设备可以是用于与终端设备通信的设备,该网络设备可以是全球移动通讯(global system of mobile communication,GSM)或码分多址(code division multiple access,CDMA)中的基站(base transceiver station,BTS),也可以是宽带码分多址(wideband code division multiple access,WCDMA)***中的基站(NodeB,NB),还可以是长期演进(long term evolution,LTE)***中的演进型基站(evolutional node B,eNB或eNodeB),还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器,或者该网络设备可以为中继站、接入点、车载设备、可穿戴设备以及未来5G网络中的网络设备或者未来演进的PLMN网络中的网络设备等。The communication device in this embodiment of the present application may be a network device. The network device may be a device for communicating with the terminal device, and the network device may be a global system of mobile communication (GSM) or a base station in code division multiple access (CDMA). , BTS), may also be a base station (NodeB, NB) in a wideband code division multiple access (WCDMA) system, or an evolved base station in a long term evolution (LTE) system ( An evolutionary node B, an eNB or an eNodeB, may also be a wireless controller in a cloud radio access network (CRAN) scenario, or the network device may be a relay station, an access point, an in-vehicle device, or a wearable device. And network devices in future 5G networks or network devices in future evolved PLMN networks.
另外,在本申请实施例中,网络设备为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备进行通信,该小区可以是网络设备(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(small cell)对应的基站,这里的小小区可以包括:城市小区(metro cell)、微小区(micro cell)、微微小区(pico cell)、毫微微小区(femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。另外,该小区还可以是超小区(hypercell)。In addition, in the embodiment of the present application, the network device provides a service for the cell, and the terminal device communicates with the network device by using a transmission resource (for example, a frequency domain resource, or a spectrum resource) used by the cell, where the cell may be a network device. (e.g., a base station) corresponding to a cell, the cell may belong to a macro base station, or may belong to a base station corresponding to a small cell, where the small cell may include: a metro cell, a micro cell, and a pico cell. (pico cell), femto cell, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services. In addition, the cell may also be a hypercell.
图2为举例地可以应用本申请实施例的一种网络架构示意图,该网络架构示意图可以是下一代无线通信***中的新无线接入的网络架构图。在该网络架构示意图中,网络设备可以被分为一个集中式单元(centralized unit,CU)和多个传输接收点(transmission reception point,TRP)/分布式单元(distributed unit,DU),即网络设备的基于带宽的单元(bandwidth based unit,BBU)被重构为DU和CU功能实体。需要说明的是,集中式单元、TRP/DU的形态和数量并不构成对本申请实施例的限定。图2所示的网络设备1和网络设备2各自对应的集中式单元的形态虽然有所不同,但是并不影响各自的功能。可以理解的是,集中式单元1和虚线范围内的TRP/DU是网络设备1的组成元素,集中式单元2和实线范围内的TRP/DU是网络设备2的组成元素,网络设备 1和网络设备2为NR***中涉及的网络设备(或称为基站)。FIG. 2 is a schematic diagram of a network architecture that may be applied to an embodiment of the present application. The network architecture diagram may be a network architecture diagram of a new wireless access in a next generation wireless communication system. In the network architecture diagram, the network device can be divided into a centralized unit (CU) and multiple transmission reception point (TRP)/distributed unit (DU), that is, network equipment. The bandwidth based unit (BBU) is reconstructed into DU and CU functional entities. It should be noted that the form and number of the centralized unit and the TRP/DU do not constitute a limitation on the embodiments of the present application. The form of the centralized unit corresponding to each of the network device 1 and the network device 2 shown in FIG. 2 is different, but does not affect the respective functions. It can be understood that the centralized unit 1 and the TRP/DU in the dotted line range are constituent elements of the network device 1, and the centralized unit 2 and the TRP/DU in the solid line range are constituent elements of the network device 2, and the network device 1 and Network device 2 is a network device (or referred to as a base station) involved in the NR system.
CU可以处理无线高层协议栈功能,例如无线资源控制(radio resource control,RRC)层,分组数据汇聚层协议(packet data convergence Protocol,PDCP)层等,甚至也能够支持部分核心网功能下沉至接入网,术语称作边缘计算网络,能够满足未来通信网络对于新兴业务例如视频,网购,虚拟/增强现实对于网络时延的更高要求。The CU can handle wireless high-level protocol stack functions, such as radio resource control (RRC) layer, packet data convergence protocol (PDCP) layer, etc., and even support partial core network functions to sink and connect. Network access, termed as edge computing network, can meet the higher requirements of future communication networks for emerging services such as video, online shopping, virtual/augmented reality for network delay.
DU可以主要处理物理层功能和实时性需求较高的层2功能,考虑到无线远端单元(radio remote unit,RRU)与DU的传输资源,部分DU的物理层功能可以上移到RRU,伴随RRU的小型化,甚至更激进的DU可以与RRU进行合并。The DU can mainly handle the physical layer function and the layer 2 function with high real-time requirements. Considering the transmission resources of the radio remote unit (RRU) and the DU, the physical layer function of some DUs can be moved up to the RRU. The miniaturization of RRUs, even more aggressive DUs, can be combined with RRUs.
CU可以集中式的布放,DU布放取决实际网络环境,核心城区,话务密度较高,站间距较小,机房资源受限的区域,例如高校,大型演出场馆等,DU也可以集中式布放,而话务较稀疏,站间距较大等区域,例如郊县,山区等区域,DU可以采取分布式的布放方式。CU can be deployed in a centralized manner, DU deployment depends on the actual network environment, core urban area, high traffic density, small station spacing, limited space in the computer room, such as colleges and universities, large-scale performance venues, etc., DU can also be centralized DUs can be deployed in a distributed manner, such as suburban counties and mountainous areas.
图2所举例的S1-C接口,可以为网络设备与核心网之间的标准接口,具体S1-C所连接的设备未在图2中示出。The S1-C interface exemplified in FIG. 2 may be a standard interface between the network device and the core network, and the device connected to the specific S1-C is not shown in FIG. 2.
图3示出了本申请实施例的一种由基于非授权的传输转为基于授权的传输的方法的示意性流程图。图3中的第一设备可以为前面描述的网络设备;第二设备可以为前面描述的终端设备。当然,实际***中,第一设备和第二设备的数量可以不局限于本实施例或其他实施例的举例,以下不再赘述。FIG. 3 shows a schematic flow chart of a method for transferring from an unlicensed transmission to an authorization based transmission according to an embodiment of the present application. The first device in FIG. 3 may be the network device described above; the second device may be the terminal device described above. Of course, in the actual system, the number of the first device and the second device may not be limited to the examples in this embodiment or other embodiments, and details are not described herein again.
图3所示的由基于非授权的传输转为基于授权的传输的方法可以包括步骤310、步骤320、步骤330和步骤340。The method of transitioning from an unauthorized-based transmission to an authorization-based transmission illustrated in FIG. 3 may include step 310, step 320, step 330, and step 340.
步骤310,第一设备接收第二设备发送的第一消息,该第一消息用于请求由基于非授权的传输转为基于授权的传输,传输该第一消息所占用的资源比传输缓冲区状态报告BSR所占用的资源少。Step 310: The first device receives a first message sent by the second device, where the first message is used to request that the resource that is occupied by the first message is transferred to the state of the transmission buffer by the unauthorized transmission to the authorization-based transmission. Reporting BSRs consumes less resources.
在本申请实施例中,第一设备接收第二设备发送的第一消息,可以获得该第二设备发送的,其希望由基于非授权的传输转为基于授权的传输的请求。In the embodiment of the present application, the first device receives the first message sent by the second device, and may obtain a request sent by the second device, which is expected to be converted from an unauthorized transmission to an authorization based transmission.
通常,基于授权的传输是指当有上行数据待传输时,第二设备需要先向第一设备发送调度请求(scheduling request,SR)以通知第一设备有上行数据计划发送,然后接收到BSR(Buffer Statues Report,缓冲区状态报告)的上行调度信息后,再向基站发送BSR以上报所需的传输资源,最后接收到第二条上行调度信息,才可以向该第一设备传输上行数据。而基于非授权的传输是指当有上行数据待传输时,不需要向第一设备请求,第二设备可以使用第一设备提前为其划分的非授权传输的资源,向该第一设备传输上行数据。然而,在基于非授权的传输中,由于不同第一设备之间可能选择相同或部分相同的非授权传输资源发送上行数据,即发生碰撞,这可能会导致所述不同第一设备发送的上行数据的传输失败。因此,第一设备可以请求由基于非授权的传输转为基于授权的传输。下面同时结合图4进行描述。Generally, the authorization-based transmission means that when there is uplink data to be transmitted, the second device needs to first send a scheduling request (SR) to the first device to notify the first device that the uplink data is scheduled to be sent, and then receives the BSR ( After the uplink scheduling information of the Buffer Statues Report, the BSR sends the uplink transmission scheduling information to the base station, and finally receives the second uplink scheduling information, so that the uplink data can be transmitted to the first device. The non-authorized transmission means that when there is uplink data to be transmitted, the first device does not need to be requested, and the second device can use the unlicensed transmission resource that the first device divides in advance, and transmits the uplink to the first device. data. However, in the unlicensed transmission, the uplink data may be sent due to the fact that different first devices may select the same or partially the same unlicensed transmission resource to transmit the uplink data, which may cause the uplink data sent by the different first device. The transfer failed. Thus, the first device can request a transfer from an unauthorized based transfer to an authorization based transfer. The following description will be made in conjunction with FIG. 4.
图4示出了本申请实施例的另一种由基于非授权的传输转为基于授权的传输的方法的示意性流程图。FIG. 4 shows another schematic flowchart of a method for transferring from unauthorized transmission to authorization based transmission according to an embodiment of the present application.
如图4所示,在步骤310之前还可以包括步骤301、步骤302和步骤303。As shown in FIG. 4, step 301, step 302, and step 303 may also be included before step 310.
步骤301,第一设备可以向第二设备发送第二消息,该第二消息可以用于配置和/或是否激活第二设备采用或不采用通过所述第一消息来进行基于非授权的(grant-free)传输转为基于授权的(grant-based)传输的机制,应理解,这里的是否激活包括激活(activation)或去激活(deactivation), 例如,第二消息可以用于通知第二设备采用通过向第一设备发送第一消息的方式,将其基于非授权的传输转为基于授权的传输。Step 301: The first device may send a second message to the second device, where the second message may be used to configure and/or activate the second device with or without using the first message for granting an unauthorized (grant -free) transfer to a mechanism based on grant-based transport, it should be understood whether activation here includes activation or deactivation, for example, the second message can be used to notify the second device to adopt The first message is converted to an authorization-based transmission by sending the first message to the first device.
这里,第一设备可以通过半静态信令或动态信令向第二设备发送第二消息,如通过主信息块(master information block,MIB)、***信息块(system information block,SIB)、剩余最少***信息(remaining minimum system information,RMSI)、其他***信息(other system information,OSI)、无线资源控制信令(radio resource control,RRC)、MAC控制元素信令(media access control control element,MAC CE)或物理控制信息(L1signaling)等发送。Here, the first device may send the second message to the second device by semi-static signaling or dynamic signaling, such as by using a master information block (MIB), a system information block (SIB), and the least remaining. Remaining minimum system information (RMSI), other system information (OSI), radio resource control (RRC), and media access control control element (MAC CE) Or physical control information (L1signaling), etc. are sent.
可选地,第一设备可以在与第二设备建立连接后立即发送第二消息,也可以在其它的时间发送第二消息。也就是说,第一设备只要在第二设备发送第一消息前发送第二消息即可。Optionally, the first device may send the second message immediately after establishing the connection with the second device, or may send the second message at other times. That is, the first device only needs to send the second message before the second device sends the first message.
步骤302,第二设备可以向第一设备发送第一数据。该第一数据可以通过grant-free资源进行发送,即,第二设备可以基于非授权的传输向第一设备发送第一数据。Step 302: The second device may send the first data to the first device. The first data may be sent by using a grant-free resource, that is, the second device may send the first data to the first device based on the unlicensed transmission.
步骤303,第一设备在未成功接收到步骤302中第二设备基于非授权的传输的第一数据时,可以向第二设备发送该第一数据的否定响应(negative acknowledge,NACK)。Step 303: The first device may send a negative acknowledgement (NACK) of the first data to the second device when the first device fails to receive the first data of the second device based on the unauthorized transmission in step 302.
可选地,第二设备接收到第一设备发送的NACK时,表示前述步骤302中基于非授权的传输的第一数据发送失败,此时,第二设备可以向第一设备发送第一消息,用于将基于非授权的传输转为基于授权的传输。Optionally, when the second device receives the NACK sent by the first device, it indicates that the first data transmission based on the unauthorized transmission in the foregoing step 302 fails, and the second device may send the first message to the first device. Used to convert unlicensed based transfers to authorization based transfers.
可选地,还可以利用定时器(timer)确定第一数据是否发送失败。Optionally, a timer may also be used to determine whether the first data is sent or not.
例如,第二设备未在特定时间间隔内接收到NACK或ACK时,可以根据不同定时器(timer)超时,判断步骤302中基于非授权的传输的第一数据是否发送失败。例如,若第二设备未在timer超时前收到第一设备发送的ACK,则认为是NACK,此时第一数据发送失败,第二设备可以向第一设备发送第一消息;若第二设备未在timer超时前收到K次重复传输之后第一设备发送的NACK,则认为是ACK,此时第一数据发送成功,第二设备不需要向第一设备发送第一消息;若第二设备未在timer超时前收到第一设备发送的NACK(不使用K次重复传输时),则认为是ACK,此时第一数据发送成功,第二设备不需要向第一设备发送第一消息,K为不大于最大重复传输次数的正整数。应理解,以上仅是示例,不应理解为对本申请实施例的限定。For example, when the second device does not receive the NACK or the ACK in the specific time interval, it may determine whether the first data based on the unauthorized transmission in step 302 fails to be sent according to different timers. For example, if the second device does not receive the ACK sent by the first device before the timer expires, it is considered to be a NACK, and the first data transmission fails, the second device may send the first message to the first device; If the NACK sent by the first device after the K times of repeated transmissions is received before the timeout expires, the device considers to be an ACK. The first data is sent successfully, and the second device does not need to send the first message to the first device. If the NACK sent by the first device is not received before the timer expires, the ACK is considered to be ACK. The first data is sent successfully, and the second device does not need to send the first message to the first device. K is a positive integer not greater than the maximum number of repeated transmissions. It should be understood that the above is only an example and should not be construed as limiting the embodiments of the present application.
在本申请的一个实施例中,第二设备向第一设备发送的第一消息可以是简单的信令,即,第一消息可以仅携带由基于非授权的传输转为基于授权的传输的请求(或指示),这样传输该第一消息所占用的资源比传输BSR所占用的资源少,从而减小***的开销。In an embodiment of the present application, the first message sent by the second device to the first device may be simple signaling, that is, the first message may only carry the request for the transfer from the unauthorized based transmission to the authorization based transmission. (or indicating), the resource used for transmitting the first message is less than the resource occupied by the transmitting BSR, thereby reducing the overhead of the system.
可选地,第一消息可以为未采用调制方式的能量。第一设备接收到该能量后,直接将当前的传输方式转换为另一种传输方式。例如,第二设备当前为基于非授权的传输,可以向第一设备发送未采用调制方式的能量,请求将基于非授权的传输转为基于授权的传输;第二次向第一设备发送该未采用调制方式的能量时,可以用于请求将基于授权的传输转为基于非授权的传输。Optionally, the first message may be energy that does not adopt a modulation mode. After receiving the energy, the first device directly converts the current transmission mode to another transmission mode. For example, the second device is currently based on the unlicensed transmission, and may send the energy of the unmodulated mode to the first device, requesting to convert the unlicensed transmission into the authorization-based transmission; the second time sending the untransmitted to the first device When the energy of the modulation mode is used, it can be used to request that the authorization-based transmission be converted to an unauthorized transmission.
可选地,第一消息可以使用1比特(bit)的上行控制信息(uplink control information,UCI)进行发送,其格式(format)可以为format 1或format 1a,也可以为其它UCI格式。第一消息可以通过“0”或“1”向第一设备进行请求。例如,当第一消息的取值为“1”时,可以用于请求由基于非授权的传输转为基于授权的传输,但本申请实施例对此并不限定。Optionally, the first message may be sent by using 1 bit of uplink control information (UCI), and the format may be format 1 or format 1a, or may be other UCI formats. The first message may be requested by the first device by "0" or "1". For example, when the value of the first message is “1”, it can be used to request the transfer from the unauthorized-based transmission to the authorization-based transmission, but the embodiment of the present application does not limit this.
作为本申请的一个实施例,第二设备可以在物理上行控制信道(physical uplink control channel,PUCCH)的资源上向第一设备发送第一消息。As an embodiment of the present application, the second device may send the first message to the first device on a resource of a physical uplink control channel (PUCCH).
可选地,该第二设备可以在物理调度请求信道(physical scheduling request channel,PSRCH) 的资源上向第一设备发送第一消息。PSRCH资源可以为PUCCH资源的一个特例,即该PSRCH资源可以是PUCCH中用于发送SR的部分资源。也就是说,第一消息可以在SR资源中进行发送。Optionally, the second device may send the first message to the first device on a resource of a physical scheduling request channel (PSRCH). The PSRCH resource may be a special case of the PUCCH resource, that is, the PSRCH resource may be a part of the PUCCH used to send the SR. That is, the first message can be sent in the SR resource.
SR资源周期为周期性发送SR的周期,即两次SR资源传输之间需等待特定的时间间隔。The SR resource period is a period in which the SR is periodically sent, that is, a specific time interval is required between two SR resource transmissions.
通常,SR资源周期可以配置。SR资源周期可以在若干毫秒(ms)到数十毫秒之间进行设置,或在至少一个OFDM符号(即SR资源周期可以小于1ms)到多个OFDM符号,或多个时隙的范围内进行设置。Generally, the SR resource period can be configured. The SR resource period may be set between several milliseconds (ms) to tens of milliseconds, or may be set within a range of at least one OFDM symbol (ie, the SR resource period may be less than 1 ms) to multiple OFDM symbols, or multiple time slots. .
可选地,该第二设备发送的第一消息的帧格式可以跟SR相同,比如,第一消息和SR可以都使用1比特的消息进行发送,如UCI format 1a,也可以都使用其它格式的消息来发送,如UCI format1或其它格式的UCI。此时,该第一设备可以通过不同的星座图来区别第一消息与SR。比如,第一消息可以使用1比特的UCI format 1a进行发送,其调制方式可以为二进制移相键控(binary phase shift keying,BPSK)并使用肯定响应(acknowledgement,ACK)的星座图(constellation map),SR可以使用1比特的UCI format 1a进行发送,其调制方式可以为二进制移相键控(binary phase shift keying,BPSK)并使用NACK的星座图(constellation map)。如图5所示,第二设备在发送时,第一消息可以对应BPSK中180°(ACK的星座图)的位置,SR可以对应BPSK中0°(NACK的星座图)的位置,相应地,第一设备在接收的时候,可以通过不同的星座图区分出第一消息和SR。应理解,以上仅是示例,不应理解为对本申请实施例的限定。Optionally, the frame format of the first message sent by the second device may be the same as that of the SR. For example, the first message and the SR may both be sent by using a 1-bit message, such as UCI format 1a, and other formats may also be used. Messages are sent, such as UCI format1 or UCI in other formats. At this time, the first device can distinguish the first message from the SR by using different constellation diagrams. For example, the first message may be transmitted using a 1-bit UCI format 1a, and the modulation may be binary phase shift keying (BPSK) and a constellation map using an acknowledgement (ACK). The SR can transmit using the 1-bit UCI format 1a, and the modulation method can be binary phase shift keying (BPSK) and use a NACK constellation map. As shown in FIG. 5, when the second device transmits, the first message may correspond to a position of 180° (the constellation of the ACK) in the BPSK, and the SR may correspond to a position of 0° (the constellation of the NACK) in the BPSK, correspondingly, When receiving, the first device can distinguish the first message and the SR by different constellation diagrams. It should be understood that the above is only an example and should not be construed as limiting the embodiments of the present application.
在PUCCH中还可以使用调制方式QBPSK。相对于BPSK调制方式,正交移相键控(quadrature BPSK,QBPSK)调制方式为新引入的调制方式,QBPSK能够以较低的复杂度向第一设备指示出第一消息,而不需要增加额外的比特位来进行指示。The modulation method QBPSK can also be used in the PUCCH. Compared with BPSK modulation mode, quadrature phase shift keying (QBPSK) modulation mode is a newly introduced modulation mode, and QBPSK can indicate the first message to the first device with low complexity without adding extra The bit is used to indicate.
作为本申请的一个实施例,第二设备可以在PUCCH中向第一设备发送调制方式为QBPSK的第一消息。如图6所示,第一消息可以使用1比特的UCI format 1a或其它格式的UCI进行发送,其调制方式可以为QBPSK并使用QBPSK中90°或270°位置的星座图,而SR可以使用1比特的UCI format 1a或其它格式的UCI进行发送,调制方式可以为BPSK。相应地,第一设备可以通过相同的解调算法(decoding algorithm)提取第二设备发送的第一消息或SR的实部(in-phase component)和/或虚部(quadrature component)从而可以判断出第二设备发送的该消息的调制方式为BPSK或QBPSK,若调制方式为BPSK,则该信号可以为SR,若调制方式为QBPSK,则该信号可以为第一消息。As an embodiment of the present application, the second device may send, in the PUCCH, a first message with a modulation mode of QBPSK to the first device. As shown in FIG. 6, the first message may be transmitted using a 1-bit UCI format 1a or a UCI in other formats, which may be QBPSK and use a 90° or 270° constellation in QBPSK, and the SR may use 1 The UCI format 1a of the bit or the UCI of other formats is transmitted, and the modulation mode may be BPSK. Correspondingly, the first device may extract the first message sent by the second device or the in-phase component and/or the quadrature component of the SR by using the same decoding algorithm to determine The modulation mode of the message sent by the second device is BPSK or QBPSK. If the modulation mode is BPSK, the signal may be SR. If the modulation mode is QBPSK, the signal may be the first message.
可选地,第二设备可以使用上行捎带传输(UCI piggyback)的方式发送第一消息,即将第一消息(UCI)和上行数据一起发送。比如,第二设备在接收到第一设备在步骤303中发送的NACK后,可以以捎带的方式在基于非授权的传输的资源中将第一消息和上行数据通过物理上行共享信道(physical uplink shared channel,PUSCH)资源向第一设备发送。同样地,若第二设备在timer超时之前未接收到第一设备发送的NACK或ACK,可以以捎带的方式在基于非授权的传输的资源中将第一消息和上行数据通过PUSCH资源向第一设备发送。这里和第一消息一起传输的上行数据可以为新的上行数据,即与步骤302中第二设备向第一设备发送的第一数据不同,也可以与步骤302中第二设备向第一设备发送的第一数据相同,本申请对此不作限定。Optionally, the second device may send the first message by using a UCI piggyback, that is, sending the first message (UCI) together with the uplink data. For example, after receiving the NACK sent by the first device in step 303, the second device may perform the first message and the uplink data on the physical uplink shared channel in the resource based on the unlicensed transmission in a piggyback manner (physical uplink shared). The channel, PUSCH) resource is sent to the first device. Similarly, if the second device does not receive the NACK or ACK sent by the first device before the timer expires, the first message and the uplink data may be first through the PUSCH resource in the unlicensed transmission resource in a piggyback manner. The device sends. The uplink data transmitted together with the first message may be the new uplink data, that is, different from the first data sent by the second device to the first device in step 302, or may be sent to the first device with the second device in step 302. The first data is the same, and the application does not limit this.
在本申请的一个实施例中,第一设备可以单独划分一部分资源至少用于发送第一消息,该资源可以称为非授权转授权调度请求(SR-like)资源,该SR-like资源还可以用于发送SR等消息。In an embodiment of the present application, the first device may separately allocate a part of resources to at least send the first message, and the resource may be referred to as an unauthorized transfer authorization request (SR-like) resource, and the SR-like resource may also be Used to send messages such as SR.
可选地,SR-like资源周期可以配置。Optionally, the SR-like resource period can be configured.
特别地,SR-like资源周期可以短于SR资源周期,使用SR-like资源来发送第一消息可以明显 减少传输时延。例如,SR资源中第二设备可以使用的资源周期为20ms,而SR-like资源中该第二设备可以使用的资源周期为5ms或10ms。In particular, the SR-like resource period may be shorter than the SR resource period, and the use of the SR-like resource to transmit the first message may significantly reduce the transmission delay. For example, the resource period that the second device in the SR resource can use is 20 ms, and the resource period that the second device can use in the SR-like resource is 5 ms or 10 ms.
可选地,第二设备可以使用SR-like资源发送第一消息,以向第一设备请求其希望由grant-free传输转为grant-based传输。Optionally, the second device may send the first message by using the SR-like resource to request the first device that it wishes to be transferred from the grant-free transmission to the grant-based transmission.
可选地,SR-like资源可以为每个UE专用,也可以为多个UE共享。Alternatively, the SR-like resource may be dedicated to each UE or shared by multiple UEs.
具体地,若SR-like资源为第二设备专用,则第一消息可以为未采用调制方式的能量,或只携带1比特信息,即可以使用UCI format 1、UCI format 1a或其它UCI格式的帧结构。Specifically, if the SR-like resource is dedicated to the second device, the first message may be an energy that does not adopt a modulation mode, or only one bit of information, that is, a frame of UCI format 1, UCI format 1a, or other UCI format may be used. structure.
若发送第一消息的SR-like资源为第二设备与其它UE共享,则第一消息可以携带UE ID信息(即UE的标识信息),用于指示发送该第一消息的UE。例如,可以使用先导信号(preamble)来标识UE。If the SR-like resource that sends the first message is shared by the second device and the other UE, the first message may carry the UE ID information (ie, the identifier information of the UE), and is used to indicate the UE that sends the first message. For example, a preamble can be used to identify the UE.
同样地,也可以通过UE使用的资源和解调参考信号(demodulation reference signal,DMRS)参数来识别不同的UE。比如,第二设备和其它UE可以使用相同的时域频域资源发送第一消息,但DMRS参数不同,第一设备接收到多个UE在相同的时域频域资源中发送的第一消息后,可以通过DMRS参数来识别出该第一消息是第二设备发送的,或是由其它UE发送的。Similarly, different UEs can also be identified by resources used by the UE and demodulation reference signal (DMRS) parameters. For example, the second device and the other UEs may use the same time domain frequency domain resource to send the first message, but the DMRS parameters are different, and the first device receives the first message sent by multiple UEs in the same time domain frequency domain resource. The DMRS parameter may be used to identify that the first message is sent by the second device or sent by other UEs.
可选地,发送第一消息的SR-like资源可以使用grant-free资源。如图7所示,SR-like资源可以使用全部的grant-free资源,也可以使用部分的grant-free资源(如grant-free资源1)。Optionally, the SR-like resource that sends the first message may use a grant-free resource. As shown in Figure 7, the SR-like resource can use all of the grant-free resources, or some of the grant-free resources (such as grant-free resource 1).
应理解,SR-like资源可以为第一设备能够划分出来的其它时域频域资源,本申请对此不作限定。例如,第一设备可以单独为第二设备划分前述实施例中PUCCH、PSRCH或PUSCH中的资源,作为SR-like资源用于发送第一消息。It should be understood that the SR-like resource may be other time domain frequency domain resources that can be allocated by the first device, which is not limited in this application. For example, the first device may separately allocate resources in the PUCCH, PSRCH, or PUSCH in the foregoing embodiment to the second device, and use the SR-like resource to send the first message.
步骤320,第一设备至少根据该第一消息和该第二设备的基于非授权的传输,确定该第二设备的基于授权的传输的上行调度信息。Step 320: The first device determines, according to the first message and the unlicensed transmission of the second device, uplink scheduling information of the second device based on the authorized transmission.
在基于授权的传输中,上行调度信息可以指示第二设备发送上行数据时使用的时域频域资源、调制编码方案(modulation and coding scheme,MCS)等信息,第二设备在接收到上行调度信息后,才可以向第一设备发送基于授权的传输的上行数据。In the authorization-based transmission, the uplink scheduling information may indicate information such as a time domain frequency domain resource and a modulation and coding scheme (MCS) used by the second device to send the uplink data, and the second device receives the uplink scheduling information. After that, the uplink data of the authorized transmission can be sent to the first device.
而在基于非授权的传输中,grant-free资源与上行调度的部分参数绑定,如MCS、波形和数据大小等参数信息,因此,无需接收第一设备的上行调度信息,第二设备可以直接发送上行数据。In the unlicensed transmission, the grant-free resource is bound to some parameters of the uplink scheduling, such as the MCS, the waveform, and the data size. Therefore, the uplink scheduling information of the first device does not need to be received, and the second device can directly Send upstream data.
在本申请的一个实施例中,如步骤302,第一设备接收到第二设备发送的第一数据,但未成功解调该第一数据,如步骤303,向第二设备发送该第一数据的否定响应,即,第一设备接收到第一数据,不能成功解调该第一数据,但能识别出该第一数据的发送者为第二设备,向第二设备发送NACK。这种情况下,第一设备可以根据该第一数据使用的grant-free资源确定第一数据使用的部分参数信息。In an embodiment of the present application, in step 302, the first device receives the first data sent by the second device, but does not successfully demodulate the first data, and in step 303, sends the first data to the second device. The negative response, that is, the first device receives the first data, and cannot successfully demodulate the first data, but can identify that the sender of the first data is the second device, and sends a NACK to the second device. In this case, the first device may determine part of the parameter information used by the first data according to the grant-free resource used by the first data.
如图8所示,grant-free资源可以与MCS、波形和数据大小等部分参数信息绑定,第二设备在grant-free资源中发送的基于非授权的传输的上行数据都会使用前述绑定的参数信息。因此,第一设备可以根据接收到的但无法解调的上行数据所使用的grant-free资源确定与grant-free资源绑定的参数信息,从而确定上行调度信息,而无需获得第二设备向第一设备发送的BSR,便可以直接向第二设备发送上行调度信息。As shown in FIG. 8, the grant-free resource may be bound to some parameter information such as the MCS, the waveform, and the data size, and the uplink data of the non-authorized transmission sent by the second device in the grant-free resource will use the foregoing binding. Parameter information. Therefore, the first device may determine the parameter information bound to the grant-free resource according to the grant-free resource used by the received uplink data that cannot be demodulated, thereby determining the uplink scheduling information without obtaining the second device to the first device. The BSR sent by a device can directly send uplink scheduling information to the second device.
可选地,第一设备未成功接收到第二设备发送的第一数据,也无法确定第二设备发送过第一数据,即,第一设备可以感知到grant-free资源中有能量但无法解调,相应地,第一设备也未向第二设备发送过ACK或NACK。此时,第一设备可以根据接收到的第一消息确定该第一数据为第二 设备发送,也就是说,grant-free资源中的能量是第二设备发送的。如图8所示,grant-free资源中接收到的能量虽然无法解调,但第一设备可以根据该能量使用的grant-free资源确定第二设备发送第一数据时使用的部分参数信息,也就可以确定上行调度信息。Optionally, the first device does not successfully receive the first data sent by the second device, and cannot determine that the second device sends the first data, that is, the first device can detect that there is energy in the grant-free resource but cannot be solved. Accordingly, the first device also does not send an ACK or NACK to the second device. At this time, the first device may determine, according to the received first message, that the first data is sent by the second device, that is, the energy in the grant-free resource is sent by the second device. As shown in FIG. 8 , although the energy received in the grant-free resource cannot be demodulated, the first device may determine, according to the grant-free resource used by the energy, part of the parameter information used by the second device to send the first data, and also It is possible to determine the uplink scheduling information.
总的来说,本申请的实施例中,第一设备可以通过传输第一数据时使用的grant-free资源获得传输第一数据时使用的参数信息,当第二设备向第一设备发送第一消息,以请求由基于非授权的传输转为基于授权的传输时,该第一设备可以根据从grant-free资源中获得的参数信息确定上行调度信息,也就是说,第一设备可以直接向第二设备发送上行调度信息,而无需该第二设备发送BSR。In general, in the embodiment of the present application, the first device may obtain the parameter information used when transmitting the first data by using the grant-free resource used when transmitting the first data, when the second device sends the first information to the first device. The first device may determine the uplink scheduling information according to the parameter information obtained from the grant-free resource when the request is changed from the unlicensed transmission to the authorization-based transmission, that is, the first device may directly The second device sends the uplink scheduling information without the second device sending the BSR.
步骤330,该第一设备向该第二设备发送该上行调度信息。Step 330: The first device sends the uplink scheduling information to the second device.
步骤340,该第二设备根据该上行调度信息向该第一设备发送第二数据。Step 340: The second device sends the second data to the first device according to the uplink scheduling information.
可选地,第二设备接收到第一设备发送的上行调度信息,可以根据上行调度信息中指示的MCS、波形和数据大小等参数信息,以基于授权的方式向第一设备发送第二数据。Optionally, the second device receives the uplink scheduling information sent by the first device, and may send the second data to the first device in an authorized manner according to the parameter information, such as the MCS, the waveform, and the data size, which are indicated in the uplink scheduling information.
图9是本申请一个实施例的终端设备10(也可称之为用户设备,简称UE)的示意图。应理解,图9仅是示例,不构成对本发明实施例的限定。FIG. 9 is a schematic diagram of a terminal device 10 (also referred to as a user equipment, abbreviated as UE) according to an embodiment of the present application. It should be understood that FIG. 9 is only an example and does not constitute a limitation on the embodiments of the present invention.
该UE10可以对应于各方法实施例中的第二设备,可以具有方法中的第二设备的任一功能。The UE 10 may correspond to the second device in each method embodiment, and may have any function of the second device in the method.
如图9所示,该UE10包括收发器101和处理器102。As shown in FIG. 9, the UE 10 includes a transceiver 101 and a processor 102.
可选地,收发器101可以包括控制电路和天线,其中,控制电路可用于基带信号与射频信号的转换以及对射频信号的处理,天线可用于收发射频信号。收发器101可以用于向网络设备20发送消息或数据(例如执行图3中的步骤310和340,或执行图4中的步骤302、310和340),以及接收网络设备20发送的消息(例如执行图3中的步骤330,或执行图4中的步骤303和330),具体可参照图3或图4相关实施例的描述。Optionally, the transceiver 101 can include a control circuit and an antenna, wherein the control circuit can be used for converting baseband signals and radio frequency signals and processing the radio frequency signals, and the antenna can be used to transmit and receive radio frequency signals. The transceiver 101 can be used to transmit messages or data to the network device 20 (e.g., perform steps 310 and 340 in Figure 3, or perform steps 302, 310, and 340 in Figure 4), and receive messages sent by the network device 20 (e.g., Step 330 in FIG. 3 is performed, or steps 303 and 330) in FIG. 4 are performed. For details, refer to the description of the related embodiment of FIG. 3 or FIG. 4.
可选地,该UE10还可以包括第二设备的其他主要部件,例如,存储器、输入输出装置等。输入输出装置可以为触摸屏、显示屏,键盘等,主要用于接收用户输入的数据以及对用户输出数据。Optionally, the UE 10 may also include other major components of the second device, such as memory, input and output devices, and the like. The input/output device can be a touch screen, a display screen, a keyboard, etc., and is mainly used for receiving data input by the user and outputting data to the user.
处理器102可用于对通信协议以及通信数据进行处理,以及对整个UE10进行控制,执行软件程序,处理软件程序的数据,例如用于支持UE10执行前述方法实施例中的相应操作。存储器主要用于存储软件程序和数据。当UE10开机后,处理器102可以读取存储器中的软件程序,解释并执行软件程序的指令,处理软件程序的数据。当需要通过无线发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至控制电路,控制电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,控制电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。The processor 102 can be used to process communication protocols and communication data, and to control the entire UE 10, execute software programs, and process data of the software programs, for example, to support the UE 10 in performing the corresponding operations in the foregoing method embodiments. Memory is primarily used to store software programs and data. When the UE 10 is powered on, the processor 102 can read the software program in the memory, interpret and execute the instructions of the software program, and process the data of the software program. When the data needs to be transmitted by wireless, the processor performs baseband processing on the data to be transmitted, and then outputs the baseband signal to the control circuit. The control circuit performs radio frequency processing on the baseband signal, and then transmits the radio frequency signal to the outside through the antenna in the form of electromagnetic waves. When data is transmitted to the terminal device, the control circuit receives the RF signal through the antenna, converts the RF signal into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes the data.
本领域技术人员可以理解,为了便于说明,图9仅示出了一个存储器和一个处理器。在实际的终端设备中,可以存在多个处理器和存储器。存储器也可以称为存储介质或者存储设备等,本发明实施例对此不做限制。Those skilled in the art will appreciate that FIG. 9 shows only one memory and one processor for ease of illustration. In an actual terminal device, there may be multiple processors and memories. The memory may also be referred to as a storage medium or a storage device, and the like.
作为一种可选的实现方式,处理器可以包括基带处理器和中央处理器,基带处理器主要用于对通信协议以及通信数据进行处理,中央处理器主要用于对整个终端设备进行控制,执行软件程序,处理软件程序的数据。图9中的处理器集成了基带处理器和中央处理器的功能,本领域技术人员可以理解,基带处理器和中央处理器也可以是各自独立的处理器,通过总线等技术互联。本 领域技术人员可以理解,用户设备可以包括多个基带处理器以适应不同的网络制式,用户设备可以包括多个中央处理器以增强其处理能力,用户设备的各个部件可以通过各种总线连接。所述基带处理器也可以表述为基带处理电路或者基带处理芯片。所述中央处理器也可以表述为中央处理电路或者中央处理芯片。对通信协议以及通信数据进行处理的功能可以内置在处理器中,也可以以软件程序的形式存储在存储单元中,由处理器执行软件程序以实现基带处理功能。As an optional implementation manner, the processor may include a baseband processor and a central processing unit, and the baseband processor is mainly used to process the communication protocol and the communication data, and the central processing unit is mainly used to control and execute the entire terminal device. A software program that processes data from a software program. The processor in FIG. 9 integrates the functions of the baseband processor and the central processing unit. Those skilled in the art can understand that the baseband processor and the central processing unit can also be independent processors and interconnected by technologies such as a bus. Those skilled in the art will appreciate that the user equipment may include a plurality of baseband processors to accommodate different network formats, and the user equipment may include a plurality of central processors to enhance its processing capabilities, and various components of the user equipment may be connected by various buses. The baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip. The central processing unit can also be expressed as a central processing circuit or a central processing chip. The functions of processing the communication protocol and the communication data may be built in the processor, or may be stored in the storage unit in the form of a software program, and the processor executes the software program to implement the baseband processing function.
示例性的,在发明实施例中,可以将具有收发功能的天线和控制电路视为UE10的收发单元101,将具有处理功能的处理器视为UE10的处理单元102。如图9所示,UE10包括收发单元101和处理单元102。收发单元也可以称为收发器、收发机、收发装置等。可选的,可以将收发单元101中用于实现接收功能的器件视为接收单元,将收发单元101中用于实现发送功能的器件视为发送单元,即收发单元101包括接收单元和发送单元。示例性的,接收单元也可以称为接收机、接收器、接收电路等,发送单元可以称为发射机、发射器或者发射电路等。Illustratively, in an embodiment of the invention, the antenna and control circuit having the transceiving function can be regarded as the transceiving unit 101 of the UE 10, and the processor having the processing function is regarded as the processing unit 102 of the UE 10. As shown in FIG. 9, the UE 10 includes a transceiver unit 101 and a processing unit 102. The transceiver unit can also be referred to as a transceiver, a transceiver, a transceiver, and the like. Optionally, the device for implementing the receiving function in the transceiver unit 101 can be regarded as a receiving unit, and the device for implementing the sending function in the transceiver unit 101 is regarded as a sending unit, that is, the transceiver unit 101 includes a receiving unit and a sending unit. Illustratively, the receiving unit may also be referred to as a receiver, a receiver, a receiving circuit, etc., and the transmitting unit may be referred to as a transmitter, a transmitter, or a transmitting circuit or the like.
图10是本申请一个实施例的网络设备20(如,基站)的示意图。该网络设备20可以对应于各方法实施例中的第一设备,可以具有方法中的第一设备的任一功能。FIG. 10 is a schematic diagram of a network device 20 (eg, a base station) according to an embodiment of the present application. The network device 20 may correspond to the first device in each method embodiment, and may have any function of the first device in the method.
如图10所示,该网络设备20包括收发器201和处理器2022。As shown in FIG. 10, the network device 20 includes a transceiver 201 and a processor 2022.
收发器201可以称为远端射频单元(remote radio unit,RRU)201、收发单元、收发机、或者收发电路等等。收发器201可以包括至少一个天线2011和射频单元2012,收发器201可以用于射频信号的收发以及射频信号与基带信号的转换。The transceiver 201 may be referred to as a remote radio unit (RRU) 201, a transceiver unit, a transceiver, or a transceiver circuit, and the like. The transceiver 201 can include at least one antenna 2011 and a radio frequency unit 2012. The transceiver 201 can be used for transceiving radio frequency signals and converting radio frequency signals with baseband signals.
该网络设备20可以包括基带单元(baseband unit,BBU)202。该BBU202可以用于进行基带处理,如信道编码,复用,调制,扩频等,以及对网络设备进行控制。该RRU201与该BBU202可以是物理上设置在一起,也可以是物理上分离设置的,如分布式基站。The network device 20 can include a baseband unit (BBU) 202. The BBU 202 can be used for baseband processing such as channel coding, multiplexing, modulation, spread spectrum, etc., as well as controlling network devices. The RRU 201 and the BBU 202 may be physically disposed together or physically separated, such as a distributed base station.
在一个示例中,BBU202可以由一个或多个单板(也可称之为电路板或PCB(Printed circuit board,印刷电路板))构成,多个单板可以共同支持单一接入制式的无线接入网,也可以分别支持不同接入制式的无线接入网。In one example, the BBU 202 may be composed of one or more single boards (also referred to as a printed circuit board or a printed circuit board), and multiple boards may jointly support a single access system wireless connection. In the network access, it is also possible to separately support wireless access networks of different access systems.
在一个示例中,基带单元可以被重构为前述的DU和CU功能实体。In one example, the baseband unit can be reconstructed into the aforementioned DU and CU functional entities.
BBU202包括处理器2022。处理器2022可以用于控制网络设备20执行前述各方法实施例中的相应操作。可选地,BBU202还可以包括存储器2021,用以存储必要的指令和数据。所述存储器2021和处理器2022可以服务于一个或多个单板。也就是说,可以每个单板上单独设置存储器和处理器。也可以是多个单板共用相同的存储器和处理器。此外每个单板上还设置有必要的电路。The BBU 202 includes a processor 2022. The processor 2022 can be used to control the network device 20 to perform corresponding operations in the foregoing method embodiments. Optionally, the BBU 202 can also include a memory 2021 for storing the necessary instructions and data. The memory 2021 and the processor 2022 can serve one or more boards. That is, the memory and processor can be individually set on each board. It is also possible that multiple boards share the same memory and processor. In addition, the necessary circuits are also provided on each board.
本发明实施例还提供了一种处理装置,包括处理器和接口;An embodiment of the present invention further provides a processing apparatus, including a processor and an interface;
该处理器,用于执行上述本申请任一实施例中的方法。The processor is configured to perform the method in any of the embodiments of the present application described above.
该处理装置可以是一个芯片,该处理器可以通过硬件来实现也可以通过软件来实现,当通过硬件实现时,该处理器可以是逻辑电路、集成电路等;当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,该存储器可以集成在处理器中,或可以位于所述处理器之外而独立存在。The processing device may be a chip, and the processor may be implemented by hardware or by software. When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like; when implemented by software, the processing may be performed. The device may be a general purpose processor implemented by reading software code stored in a memory, which may be integrated in the processor or may exist independently of the processor.
例如,该处理装置可以是现场可编程门阵列(Field-Programmable Gate Array,FPGA),可以是专用集成芯片(Application Specific Integrated Circuit,ASIC),还可以是***芯片(System on Chip,SoC),还可以是中央处理器(Central Processor Unit,CPU),还可以是网络处理器(Network Processor,NP),还可以是数字信号处理电路(Digital Signal Processor,DSP),还可以是微控 制器(Micro Controller Unit,MCU),还可以是可编程控制器(Programmable Logic Device,PLD)或其他集成芯片。For example, the processing device may be a Field-Programmable Gate Array (FPGA), may be an Application Specific Integrated Circuit (ASIC), or may be a System on Chip (SoC). It can be a Central Processor Unit (CPU), a Network Processor (NP), a Digital Signal Processor (DSP), or a Micro Controller (Micro Controller). Unit, MCU), can also be a Programmable Logic Device (PLD) or other integrated chip.
本发明实施例还提供了一种通信设备,包括处理单元和收发单元。该处理单元和该收发单元可以是软件实现也可以是硬件实现。在硬件实现的情况下,该收发单元可以是图9中的收发器101,该处理单元可以是图9中的处理器102;或者,该收发单元可以是图10中的收发器201,该处理单元可以是图10中的处理器2022。The embodiment of the invention further provides a communication device, including a processing unit and a transceiver unit. The processing unit and the transceiver unit may be implemented in software or in hardware. In the case of hardware implementation, the transceiver unit may be the transceiver 101 in FIG. 9, and the processing unit may be the processor 102 in FIG. 9; or the transceiver unit may be the transceiver 201 in FIG. The unit may be the processor 2022 in FIG.
本发明实施例还提供了一种通信***,包括上述网络设备和终端设备。The embodiment of the invention further provides a communication system, which comprises the above network device and terminal device.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.). The computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media. The usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)) or the like.
应理解,在本发明实施例中,术语“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系。例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that in the embodiment of the present invention, the term "and/or" is merely an association relationship describing an associated object, indicating that there may be three relationships. For example, A and/or B may indicate that A exists separately, and A and B exist simultaneously, and B cases exist alone. In addition, the character "/" in this article generally indicates that the contextual object is an "or" relationship.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein can be implemented in electronic hardware or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的***、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。A person skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the system, the device and the unit described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
在本申请所提供的几个实施例中,应该理解到,所揭露的***、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个 计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。The functions, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including The instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .
本申请中,“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。In the present application, “and/or” describes the association relationship of the associated objects, indicating that there may be three relationships, for example, A and/or B, which may indicate that A exists separately, A and B exist at the same time, and B exists separately. , where A, B can be singular or plural. The character "/" generally indicates that the contextual object is an "or" relationship.
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,“a,b,或c中的至少一项(个)”,或,“a,b,和c中的至少一项(个)”,均可以表示:a,b,c,a-b(即a和b),a-c,b-c,或a-b-c,其中a,b,c分别可以是单个,也可以是多个。In the present application, "at least one" means one or more, and "a plurality" means two or more. "At least one of the following" or a similar expression thereof refers to any combination of these items, including any combination of a single item or a plurality of items. For example, "at least one of "a, b, or c", or "at least one of "a, b, and c"" may mean: a, b, c, ab ( That is, a and b), ac, bc, or abc, wherein a, b, and c may be single or plural.
本申请各装置实施例中给出的装置结构图仅示出了对应的装置的简化设计。在实际应用中,该装置可以包含任意数量的发射器,接收器,处理器,存储器等,以实现本申请各装置实施例中该装置所执行的功能或操作,而所有可以实现本申请的装置都在本申请的保护范围之内。The device structure diagrams given in the various device embodiments of the present application show only a simplified design of the corresponding device. In practical applications, the device may include any number of transmitters, receivers, processors, memories, etc., to implement the functions or operations performed by the device in the embodiments of the present application, and all devices that can implement the present application All are within the scope of this application.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The foregoing is only a specific embodiment of the present application, but the scope of protection of the present application is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the present application. It should be covered by the scope of protection of this application. Therefore, the scope of protection of the present application should be determined by the scope of the claims.

Claims (30)

  1. 一种由基于非授权的传输转为基于授权的传输的方法,其特征在于,包括:A method for transitioning from an unlicensed transmission to an authorization based transmission, comprising:
    第一设备接收第二设备发送的第一消息,所述第一消息用于请求由基于非授权的传输转为基于授权的传输,传输所述第一消息所占用的资源比传输缓冲区状态报告BSR所占用的资源少;Receiving, by the first device, a first message sent by the second device, where the first message is used to request that the resource occupied by the first message is compared to a transmission buffer status report by transferring the unlicensed transmission to the authorization based transmission The resources occupied by the BSR are small;
    所述第一设备至少根据所述第一消息和所述第二设备的基于非授权的传输,确定所述第二设备的基于授权的传输的上行调度信息;Determining, by the first device, uplink scheduling information of the second device based on the authorization based on at least the first message and the second device based on the unlicensed transmission;
    所述第一设备向所述第二设备发送所述上行调度信息;Sending, by the first device, the uplink scheduling information to the second device;
    所述第一设备接收所述第二设备根据所述上行调度信息发送的第二数据。The first device receives second data that is sent by the second device according to the uplink scheduling information.
  2. 如权利要求1所述的方法,其特征在于,所述至少根据所述第一消息和所述第二设备的基于非授权的传输,确定所述第二设备的基于授权的传输的上行调度信息,包括:The method according to claim 1, wherein the determining, according to the first message and the second device based on the unauthorized transmission, the uplink scheduling information of the second device based on the authorization transmission ,include:
    在接收到所述第二设备发送的基于非授权的传输的第一数据,所述第一设备不能成功解调所述第一数据,但能识别所述第一数据的发送者的情况下,至少根据所述第一消息和所述不能被成功解调的第一数据,确定所述上行调度信息。Receiving, by the second device, the first data based on the unauthorized transmission, where the first device cannot successfully demodulate the first data, but can identify the sender of the first data, The uplink scheduling information is determined according to at least the first message and the first data that cannot be successfully demodulated.
  3. 如权利要求2所述的方法,其特征在于,在所述第一设备接收第二设备发送的第一消息之前,所述方法还包括:The method of claim 2, wherein before the first device receives the first message sent by the second device, the method further includes:
    在接收到所述第二设备发送的基于非授权的传输的第一数据,所述第一设备不能成功解调所述第一数据,但能识别所述第一数据的发送者的情况下,向所述第二设备发送对所述第一数据的否定响应或在特定时间间隔内不向所述第二设备发送对所述第一数据的肯定响应。Receiving, by the second device, the first data based on the unauthorized transmission, where the first device cannot successfully demodulate the first data, but can identify the sender of the first data, Sending a negative response to the first data to the second device or not sending a positive response to the first data to the second device within a specific time interval.
  4. 如权利要求1所述的方法,其特征在于,所述至少根据所述第一消息和所述第二设备的基于非授权的传输,确定所述第二设备的基于授权的传输的上行调度信息,包括:The method according to claim 1, wherein the determining, according to the first message and the second device based on the unauthorized transmission, the uplink scheduling information of the second device based on the authorization transmission ,include:
    在接收到所述第二设备发送的基于非授权的传输的第一数据,所述第一设备不能成功解调所述第一数据,且不能识别所述第一数据的发送者的情况下,至少根据所述第一消息和所述不能被成功解调的第一数据的能量,确定所述上行调度信息。Receiving, by the second device, the first data based on the unauthorized transmission, where the first device cannot successfully demodulate the first data, and the sender of the first data cannot be identified, The uplink scheduling information is determined according to at least the energy of the first message and the first data that cannot be successfully demodulated.
  5. 如权利要求1至4中任一项所述的方法,其特征在于,所述第一消息满足以下至少一项:The method according to any one of claims 1 to 4, wherein the first message satisfies at least one of the following:
    所述第一消息为上行控制信息;The first message is uplink control information;
    所述第一消息与调度请求SR的帧格式相同,所述第一消息与所述调度请求SR对应的星座图不同;The first message is in the same frame format as the scheduling request SR, and the first message is different from the constellation corresponding to the scheduling request SR;
    所述第一消息通过非授权转授权调度请求SR-like资源发送,所述SR-like资源为所述第一设备单独划分的资源,所述SR-like资源能够用于传输所述第一消息和/或调度请求SR;The first message is sent by the non-authorized transfer authorization requesting SR-like resource, where the SR-like resource is a separately divided resource, and the SR-like resource can be used to transmit the first message. And/or scheduling request SR;
    所述第一消息为所述第二设备传输的未采用调制方式的能量;The first message is an energy of the second device that is not in a modulation mode;
    所述第一消息通过上行捎带传输的方式与所述第二设备向所述第一设备传输的第三数据一起发送。The first message is sent by means of uplink piggyback transmission with the third data transmitted by the second device to the first device.
  6. 如权利要求1至5中任一项所述的方法,其特征在于,所述第一设备接收第二设备发送的第一消息,包括:The method according to any one of claims 1 to 5, wherein the receiving, by the first device, the first message sent by the second device comprises:
    所述第一设备在物理上行控制信道资源上接收所述第二设备发送的所述第一消息;或,Receiving, by the first device, the first message sent by the second device on a physical uplink control channel resource; or
    所述第一设备在物理调度请求信道资源上接收所述第二设备发送的所述第一消息;或,Receiving, by the first device, the first message sent by the second device on a physical scheduling request channel resource; or
    所述第一设备在物理上行共享信道资源上接收所述第二设备发送的所述第一消息;或,Receiving, by the first device, the first message sent by the second device on a physical uplink shared channel resource; or
    所述第一设备在基于非授权的传输的资源上接收所述第二设备发送的所述第一消息。The first device receives the first message sent by the second device on a resource based on unauthorized transmission.
  7. 如权利要求1至6中任一项所述的方法,其特征在于,所述方法还包括:The method of any of claims 1 to 6, wherein the method further comprises:
    所述第一设备在接收所述第一数据之前,向所述第二设备发送第二消息,所述第二消息用于指示采用或不采用通过所述第一消息来进行基于非授权的传输转为基于授权的传输的机制。Before receiving the first data, the first device sends a second message to the second device, where the second message is used to indicate that the first message is used for non-authorized transmission. Switch to a mechanism based on authorization transfer.
  8. 如权利要求7所述的方法,其特征在于,所述向所述第二设备发送第二消息,包括:The method of claim 7, wherein the sending the second message to the second device comprises:
    通过***消息向所述第二设备发送所述第二消息;或,Transmitting the second message to the second device by using a system message; or
    通过无线资源控制信令向所述第二设备发送所述第二消息;或,Transmitting the second message to the second device by using radio resource control signaling; or
    通过物理控制消息向所述第二设备发送所述第二消息。Sending the second message to the second device by using a physical control message.
  9. 一种由基于非授权的传输转为基于授权的传输的方法,其特征在于,包括:A method for transitioning from an unlicensed transmission to an authorization based transmission, comprising:
    第二设备向第一设备发送第一消息,所述第一消息用于请求由基于非授权的传输转为基于授权的传输,传输所述第一消息所占用的资源比传输缓冲区状态报告BSR所占用的资源少;The second device sends a first message to the first device, where the first message is used to request that the resource that is occupied by the first message is transferred from the unlicensed transmission to the authorization-based transmission, and the resource buffer is compared with the transmission buffer status report BSR. Less resources are used;
    所述第二设备接收所述第一设备发送的基于授权的传输的上行调度信息,所述上行调度信息至少根据所述第一消息和所述第二设备的基于非授权的传输确定;Receiving, by the second device, uplink scheduling information of the authorization-based transmission sent by the first device, where the uplink scheduling information is determined according to at least the first message and the non-authorized transmission of the second device;
    所述第二设备根据所述上行调度信息向所述第一设备发送第二数据。The second device sends the second data to the first device according to the uplink scheduling information.
  10. 如权利要求9所述的方法,其特征在于,所述第二设备向第一设备发送第一消息,包括:The method of claim 9, wherein the sending, by the second device, the first message to the first device comprises:
    在接收到所述第一设备发送的对第一数据的否定响应的情况下,所述第二设备向所述第一设备发送所述第一消息,所述第一数据为所述第二设备发送的基于非授权的传输的数据。Receiving, by the first device, a negative response to the first data, the second device sending the first message to the first device, where the first data is the second device Data sent based on unauthorized transfers.
  11. 如权利要求9所述的方法,其特征在于,所述第二设备向第一设备发送第一消息,包括:The method of claim 9, wherein the sending, by the second device, the first message to the first device comprises:
    在特定时间间隔内未接收到所述第一设备发送的对第一数据的肯定响应的情况下,所述第二设备向所述第一设备发送所述第一消息,所述第一数据为所述第二设备发送的基于非授权的传输的数据。In a case that the first device does not receive the positive response to the first data sent by the first device, the second device sends the first message to the first device, where the first data is Data transmitted by the second device based on unauthorized transmission.
  12. 如权利要求9至11中任一项所述的方法,其特征在于,所述第一消息满足以下至少一项:The method according to any one of claims 9 to 11, wherein the first message satisfies at least one of the following:
    所述第一消息为上行控制信息;The first message is uplink control information;
    所述第一消息与调度请求SR的帧格式相同,所述第一消息与所述调度请求SR对应的星座图不同;The first message is in the same frame format as the scheduling request SR, and the first message is different from the constellation corresponding to the scheduling request SR;
    所述第一消息通过非授权转授权调度请求SR-like资源发送,所述SR-like资源为所述第一设备单独划分的资源,所述SR-like资源能够用于传输所述第一消息和/或调度请求SR;The first message is sent by the non-authorized transfer authorization requesting SR-like resource, where the SR-like resource is a separately divided resource, and the SR-like resource can be used to transmit the first message. And/or scheduling request SR;
    所述第一消息为所述第二设备传输的未采用调制方式的能量;The first message is an energy of the second device that is not in a modulation mode;
    所述第一消息通过上行捎带传输的方式与所述第二设备向所述第一设备传输的第三数据一起发送。The first message is sent by means of uplink piggyback transmission with the third data transmitted by the second device to the first device.
  13. 如权利要求9至12任一项所述的方法,其特征在于,所述第二设备向第一设备发送第一消息,包括:The method according to any one of claims 9 to 12, wherein the sending, by the second device, the first message to the first device comprises:
    所述第二设备在物理上行控制信道资源上向所述第一设备发送所述第一消息;或,Sending, by the second device, the first message to the first device on a physical uplink control channel resource; or
    所述第二设备在物理调度请求信道资源上向所述第一设备发送所述第一消息;或,Sending, by the second device, the first message to the first device on a physical scheduling request channel resource; or
    所述第二设备在物理上行共享信道资源上向所述第一设备发送所述第一消息;或,Sending, by the second device, the first message to the first device on a physical uplink shared channel resource; or
    所述第二设备在基于非授权的传输的资源上向所述第一设备发送所述第一消息。The second device sends the first message to the first device on a resource based on unauthorized transmission.
  14. 如权利要求9至13中任一项所述的方法,其特征在于,所述方法还包括:The method of any of claims 9 to 13 further comprising:
    所述第二设备在发送所述第一数据前,接收所述第一设备发送的第二消息,所述第二消息用于指示采用或不采用通过所述第一消息来进行基于非授权的传输转为基于授权的传输的机制。Receiving, by the second device, the second message sent by the first device, where the second message is used to indicate that the first message is used or not based on the unauthorized The mechanism for transferring to an authorization-based transport.
  15. 如权利要求14所述的方法,其特征在于,所述接收所述第一设备发送的第二消息,包括:The method of claim 14, wherein the receiving the second message sent by the first device comprises:
    通过***消息接收所述第一设备发送的所述第二消息;或,Receiving, by the system message, the second message sent by the first device; or
    通过无线资源控制信令接收所述第一设备发送的所述第二消息;或,Receiving, by the radio resource control signaling, the second message sent by the first device; or
    通过物理控制消息接收所述第一设备发送的所述第二消息。Receiving, by the physical control message, the second message sent by the first device.
  16. 一种网络设备,其特征在于,包括收发器和处理器;其中,A network device, comprising: a transceiver and a processor; wherein
    所述收发器,用于接收终端设备发送的第一消息,所述第一消息用于请求由基于非授权的传输转为基于授权的传输,传输所述第一消息所占用的资源比传输缓冲区状态报告BSR所占用的资源少;The transceiver is configured to receive a first message sent by the terminal device, where the first message is used to request that the resource that is occupied by the first message is transferred from the unlicensed transmission to the authorization-based transmission. The zone status report BSR uses less resources;
    所述处理器,用于至少根据所述第一消息和所述终端设备的基于非授权的传输,确定所述终端设备的基于授权的传输的上行调度信息;The processor is configured to determine, according to the first message and the unlicensed transmission of the terminal device, uplink scheduling information of the authorization transmission of the terminal device;
    所述收发器,还用于向所述终端设备发送所述上行调度信息;The transceiver is further configured to send the uplink scheduling information to the terminal device;
    所述收发器,还用于接收所述终端设备根据所述上行调度信息发送的第二数据。The transceiver is further configured to receive second data that is sent by the terminal device according to the uplink scheduling information.
  17. 如权利要求16所述的网络设备,其特征在于,所述处理器具体用于:The network device according to claim 16, wherein the processor is specifically configured to:
    在所述收发器接收到所述终端设备发送的基于非授权的传输的第一数据,所述网络设备不能成功解调所述第一数据,但能识别所述第一数据的发送者的情况下,至少根据所述第一消息和所述不能被成功解调的第一数据,确定所述上行调度信息。Receiving, by the transceiver, the first data based on the unauthorized transmission sent by the terminal device, the network device cannot successfully demodulate the first data, but can identify the sender of the first data And determining, according to the first message and the first data that cannot be successfully demodulated, the uplink scheduling information.
  18. 如权利要求17所述的网络设备,其特征在于,所述收发器还用于:The network device of claim 17, wherein the transceiver is further configured to:
    在接收到所述终端设备发送的基于非授权的传输的第一数据,所述网络设备不能成功解调所述第一数据,但能识别所述第一数据的发送者的情况下,向所述终端设备发送对所述第一数据的否定响应或在特定时间间隔内不向所述第二设备发送对所述第一数据的肯定响应。Receiving, by the terminal device, the first data based on the unauthorized transmission, the network device cannot successfully demodulate the first data, but can identify the sender of the first data, The terminal device sends a negative response to the first data or does not send a positive response to the first data to the second device within a specific time interval.
  19. 如权利要求16所述的网络设备,其特征在于,所述处理器具体用于:The network device according to claim 16, wherein the processor is specifically configured to:
    在所述收发器接收到所述终端设备发送的基于非授权的传输的第一数据,所述网络设备不能成功解调所述第一数据,且不能识别所述第一数据的发送者的情况下,至少根据所述第一消息和所述不能被成功解调的第一数据的能量,确定所述上行调度信息。Receiving, by the transceiver, the first data based on the unauthorized transmission sent by the terminal device, the network device cannot successfully demodulate the first data, and cannot identify the sender of the first data And determining, according to the first message and the energy of the first data that cannot be successfully demodulated, the uplink scheduling information.
  20. 如权利要求16至19中任一项所述的网络设备,其特征在于,所述第一消息满足以下至少一项:The network device according to any one of claims 16 to 19, wherein the first message satisfies at least one of the following:
    所述第一消息为上行控制信息;The first message is uplink control information;
    所述第一消息与调度请求SR的帧格式相同,所述第一消息与所述调度请求SR对应的星座图不同;The first message is in the same frame format as the scheduling request SR, and the first message is different from the constellation corresponding to the scheduling request SR;
    所述第一消息通过非授权转授权调度请求SR-like资源发送,所述SR-like资源为所述网络设备单独划分的资源,所述SR-like资源能够用于传输所述第一消息和/或调度请求SR;The first message is sent by the non-authorized transfer authorization requesting SR-like resource, where the SR-like resource is a separately allocated resource, and the SR-like resource can be used to transmit the first message and / or scheduling request SR;
    所述第一消息为所述终端设备传输的未采用调制方式的能量;The first message is an energy that is not used in a modulation mode transmitted by the terminal device;
    所述第一消息通过上行捎带传输的方式与所述终端设备向所述网络设备传输的第三数据一起发送。The first message is sent by means of uplink piggyback transmission with the third data transmitted by the terminal device to the network device.
  21. 如权利要求16至20中任一项所述的网络设备,其特征在于,所述收发器用于接收终端设备发送的第一消息包括:The network device according to any one of claims 16 to 20, wherein the receiving, by the transceiver, the first message sent by the terminal device comprises:
    所述收发器用于在物理上行控制信道资源上接收所述终端设备发送的所述第一消息;或,The transceiver is configured to receive the first message sent by the terminal device on a physical uplink control channel resource; or
    所述收发器用于在物理调度请求信道资源上接收所述终端设备发送的所述第一消息;或,The transceiver is configured to receive the first message sent by the terminal device on a physical scheduling request channel resource; or
    所述收发器用于在物理上行共享信道资源上接收所述终端设备发送的所述第一消息;或,The transceiver is configured to receive the first message sent by the terminal device on a physical uplink shared channel resource; or
    所述收发器用于在基于非授权的传输的资源上接收所述终端设备发送的所述第一消息。The transceiver is configured to receive the first message sent by the terminal device on a resource based on unauthorized transmission.
  22. 如权利要求16至21中任一项所述的网络设备,其特征在于,所述收发器还用于在接收 所述第一数据之前,向所述终端设备发送第二消息,所述第二消息用于指示采用或不采用通过所述第一消息来进行基于非授权的传输转为基于授权的传输的机制。The network device according to any one of claims 16 to 21, wherein the transceiver is further configured to send a second message to the terminal device before receiving the first data, the second The message is used to indicate whether a mechanism for transferring the unauthorized-based transmission to the authorization-based transmission by the first message is employed or not.
  23. 如权利要求22所述的网络设备,其特征在于,所述收发器用于向所述终端设备发送第二消息包括:The network device according to claim 22, wherein the transceiver is configured to send the second message to the terminal device, including:
    通过***消息向所述终端设备发送所述第二消息;或,Sending the second message to the terminal device by using a system message; or
    通过无线资源控制信令向所述终端设备发送所述第二消息;或,Transmitting the second message to the terminal device by using radio resource control signaling; or
    通过物理控制消息向所述终端设备发送所述第二消息。Sending the second message to the terminal device by using a physical control message.
  24. 一种终端设备,其特征在于,包括收发器和处理器:其中,A terminal device, comprising: a transceiver and a processor: wherein
    所述收发器,用于向网络设备发送第一消息,所述第一消息用于请求由基于非授权的传输转为基于授权的传输,传输所述第一消息所占用的资源比传输缓冲区状态报告BSR所占用的资源少,所述收发器还用于在发送所述第一消息之后接收所述网络设备发送的基于授权的传输的上行调度信息,所述上行调度信息至少根据所述第一消息和所述终端设备的基于非授权的传输确定;The transceiver is configured to send a first message to the network device, where the first message is used to request that the resource occupied by the first message is transferred to the transmission buffer by the unlicensed transmission to the authorization based transmission The status report BSR occupies less resources, and the transceiver is further configured to receive uplink scheduling information of the authorization-based transmission sent by the network device after sending the first message, where the uplink scheduling information is at least according to the Determining a message and the non-authorized transmission of the terminal device;
    所述处理器,用于根据所述上行调度信息向所述网络设备发送第二数据。The processor is configured to send second data to the network device according to the uplink scheduling information.
  25. 如权利要求24所述的终端设备,其特征在于,所述收发器具体用于:The terminal device according to claim 24, wherein the transceiver is specifically configured to:
    在接收到所述网络设备发送的对第一数据的否定响应的情况下,所述收发器向所述网络设备发送所述第一消息,所述第一数据为所述收发器发送的基于非授权的传输的数据。Receiving, by the network device, a negative response to the first data, the transceiver sending the first message to the network device, where the first data is sent by the transceiver based on a non- Authorized transfer of data.
  26. 如权利要求24所述的终端设备,其特征在于,所述收发器具体用于:The terminal device according to claim 24, wherein the transceiver is specifically configured to:
    在特定时间间隔内未接收到所述网络设备发送的对第一数据的肯定响应的情况下,所述收发器向所述网络设备发送所述第一消息,所述第一数据为所述收发器发送的基于非授权的传输的数据。The transceiver sends the first message to the network device, where the first data is the sending and receiving, if the positive response to the first data sent by the network device is not received within a specific time interval. Data sent by the device based on unauthorized transfer.
  27. 如权利要求24至26中任一项所述的终端设备,其特征在于,所述第一消息满足以下至少一项:The terminal device according to any one of claims 24 to 26, wherein the first message satisfies at least one of the following:
    所述第一消息为上行控制信息;The first message is uplink control information;
    所述第一消息与调度请求SR的帧格式相同,所述第一消息与所述调度请求SR对应的星座图不同;The first message is in the same frame format as the scheduling request SR, and the first message is different from the constellation corresponding to the scheduling request SR;
    所述第一消息通过非授权转授权调度请求SR-like资源发送,所述SR-like资源为所述网络设备单独划分的资源,所述SR-like资源能够用于传输所述第一消息和/或调度请求SR;The first message is sent by the non-authorized transfer authorization requesting SR-like resource, where the SR-like resource is a separately allocated resource, and the SR-like resource can be used to transmit the first message and / or scheduling request SR;
    所述第一消息为所述终端设备传输的未采用调制方式的能量;The first message is an energy that is not used in a modulation mode transmitted by the terminal device;
    所述第一消息通过上行捎带传输的方式与所述终端设备向所述网络设备传输的第三数据一起发送。The first message is sent by means of uplink piggyback transmission with the third data transmitted by the terminal device to the network device.
  28. 如权利要求27所述的终端设备,其特征在于,所述收发器用于向网络设备发送第一消息包括:The terminal device according to claim 27, wherein the transmitting, by the transceiver, the first message to the network device comprises:
    所述收发器用于在物理上行控制信道资源上向所述网络设备发送所述第一消息;或,The transceiver is configured to send the first message to the network device on a physical uplink control channel resource; or
    所述收发器用于在物理调度请求信道资源上向所述网络设备发送所述第一消息;或,The transceiver is configured to send the first message to the network device on a physical scheduling request channel resource; or
    所述收发器用于在物理上行共享信道资源上向所述网络设备发送所述第一消息;或,The transceiver is configured to send the first message to the network device on a physical uplink shared channel resource; or
    所述收发器用于在基于非授权的传输的资源上向所述网络设备发送所述第一消息。The transceiver is configured to send the first message to the network device on a resource based on unauthorized transmission.
  29. 如权利要求24至28中任一项所述的终端设备,其特征在于,所述收发器还用于在发送所述第一数据前,接收所述网络设备发送的第二消息,所述第二消息用于指示采用或不采用通过所述第一消息来进行基于非授权的传输转为基于授权的传输的机制。The terminal device according to any one of claims 24 to 28, wherein the transceiver is further configured to receive a second message sent by the network device, before sending the first data, The second message is used to indicate that a mechanism for transferring the unauthorized-based transmission to the authorization-based transmission by the first message is adopted or not.
  30. 如权利要求29所述的终端设备,其特征在于,所述收发器用于接收所述网络设备发送的第二消息包括:The terminal device according to claim 29, wherein the receiving, by the transceiver, the second message sent by the network device comprises:
    通过***消息接收所述网络设备发送的所述第二消息;或,Receiving, by the system message, the second message sent by the network device; or
    通过无线资源控制信令接收所述网络设备发送的所述第二消息;或,Receiving, by the radio resource control signaling, the second message sent by the network device; or
    通过物理控制消息接收所述网络设备发送的所述第二消息。Receiving the second message sent by the network device by using a physical control message.
PCT/CN2018/107788 2017-09-30 2018-09-27 Method for converting unlicensed transmission into licensed transmission, and device WO2019062785A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201710912955 2017-09-30
CN201710912955.8 2017-09-30
CN201810533171.9A CN109600748B (en) 2017-09-30 2018-05-29 Method and apparatus for transitioning from unauthorized-based transmission to authorized-based transmission
CN201810533171.9 2018-05-29

Publications (1)

Publication Number Publication Date
WO2019062785A1 true WO2019062785A1 (en) 2019-04-04

Family

ID=65900805

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/107788 WO2019062785A1 (en) 2017-09-30 2018-09-27 Method for converting unlicensed transmission into licensed transmission, and device

Country Status (1)

Country Link
WO (1) WO2019062785A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105682243A (en) * 2016-03-25 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Scheduling signaling configuration method, receiving method associated equipment
CN105722225A (en) * 2016-01-15 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Method and device for indicating upstream sub-frame in non-authorization frequency spectrum
WO2016206083A1 (en) * 2015-06-26 2016-12-29 华为技术有限公司 Method and apparatus for uplink data transmission
CN106301686A (en) * 2016-08-16 2017-01-04 宇龙计算机通信科技(深圳)有限公司 Uplink dispatch method based on dynamic frame structure and uplink scheduling device and base station

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016206083A1 (en) * 2015-06-26 2016-12-29 华为技术有限公司 Method and apparatus for uplink data transmission
CN105722225A (en) * 2016-01-15 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Method and device for indicating upstream sub-frame in non-authorization frequency spectrum
CN105682243A (en) * 2016-03-25 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Scheduling signaling configuration method, receiving method associated equipment
CN106301686A (en) * 2016-08-16 2017-01-04 宇龙计算机通信科技(深圳)有限公司 Uplink dispatch method based on dynamic frame structure and uplink scheduling device and base station

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
CATT: "UL grant-free transmission for URLLC", 3GPP TSG RAN WG1 AH_NR MEETING R1- 1700206, 20 January 2017 (2017-01-20), XP051202710 *
HUAWEI ET AL.: "Scheduling for URLLC", 3GPP TSG-RAN WG2 MEETING #96 R2-168459, 18 November 2016 (2016-11-18), XP051178049 *
INTEL CORPORATION: "UL grant-free transmissions: Resource configuration", 3GPP TSG RAN WG1 NR AD-HOC#2 R1-1710568, 30 June 2017 (2017-06-30), XP051299775 *
ZTE: "Discussion on grant-free transmission based on sensing", 3GPP TSG RAN WG1 MEETING #86BIS R1-1609801, 14 October 2016 (2016-10-14), XP051149828 *

Similar Documents

Publication Publication Date Title
WO2019095929A1 (en) Communication method and device
CN105230077B (en) Apparatus, method and user equipment for PDCP operation
US9572040B2 (en) Unlicensed spectrum sharing method, base station using the same, and user equipment using the same
TWI513349B (en) Enhanced node b and method for rrc connection establishment for small data transfers
WO2020143692A1 (en) Communication method and communication apparatus
US10313890B2 (en) Method and device for receiving service through different wireless communication systems
CN108347778A (en) Communication means and device
WO2021023215A1 (en) Method and apparatus for wireless communication
WO2018228511A1 (en) Communication method, network device, and terminal
WO2018230191A1 (en) Transmitting device, receiving device, transmitting method, receiving method, and recording medium
WO2016004828A1 (en) Base station, user equipment and related method
WO2021036910A1 (en) Data transmission method and device
KR20200044959A (en) Signal transmission method, related device and system
WO2019174055A1 (en) Communication method and communication device
WO2018202168A1 (en) Information transmission method and apparatus
CA3214889A1 (en) Information transmission method, apparatus, and system
CN115580380A (en) Wireless communication method and device
WO2021166440A1 (en) Terminal and communication method
WO2022036523A1 (en) Data transmission method and device
US11108597B2 (en) Data transmission method and apparatus
WO2019062785A1 (en) Method for converting unlicensed transmission into licensed transmission, and device
CN109600748B (en) Method and apparatus for transitioning from unauthorized-based transmission to authorized-based transmission
US20180288791A1 (en) User equipment assisted coordination for scheduled wireless transmissions
WO2023039811A1 (en) Communication method and communication apparatus
WO2024032186A1 (en) Communication method and communication apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18860817

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18860817

Country of ref document: EP

Kind code of ref document: A1